Fuzzing技术总结与工具列表 Cache Translate Page 
版权声明：本文为博主原创文章，未经博主允许不得转载。 https://blog.csdn.net/wcventure/article/details/82085251
首先推荐阅读2018年computing Surveys 的《Fuzzing: Art, Science, and Engineering》 一、什么是Fuzzing？ Fuzz本意是“羽毛、细小的毛发、使模糊、变得模糊”，后来用在软件测试领域，中文一般指“模糊测试”，英文有的叫“Fuzzing”，有的叫“Fuzz Testing”。本文用fuzzing表示模糊测试。 Fuzzing技术可以追溯到1950年，当时计算机的数据主要保存在打孔卡片上，计算机程序读取这些卡片的数据进行计算和输出。如果碰到一些垃圾卡片或一些废弃不适配的卡片，对应的计算机程序就可能产生错误和异常甚至崩溃，这样，Bug就产生了。所以，Fuzzing技术并不是什么新鲜技术，而是随着计算机的产生一起产生的古老的测试技术。 Fuzzing技术是一种基于黑盒（或灰盒）的测试技术，通过自动化生成并执行大量的随机测试用例来发现产品或协议的未知漏洞。随着计算机的发展，Fuzzing技术也在不断发展。 二、Fuzzing有用么？ Fuzzing是模糊测试，顾名思义，意味着测试用例是不确定的、模糊的。 计算机是精确的科学和技术，测试技术应该也是一样的，有什么的输入，对应什么样的输出，都应该是明确的，怎么会有模糊不确定的用例呢？这些不确定的测试用例具体会有什么作用呢？ 为什么会有不确定的测试用例，我想主要的原因是下面几点： 1、我们无法穷举所有的输入作为测试用例。我们编写测试用例的时候，一般考虑正向测试、反向测试、边界值、超长、超短等一些常见的场景，但我们是没有办法把所有的输入都遍历进行测试的。 2、我们无法想到所有可能的异常场景。由于人类脑力的限制，我们没有办法想到所有可能的异常组合，尤其是现在的软件越来越多的依赖操作系统、中间件、第三方组件，这些系统里的bug或者组合后形成的bug，是我们某个项目组的开发人员、测试人员无法预知的。 3、Fuzzing软件也同样无法遍历所有的异常场景。随着现在软件越来越复杂，可选的输入可以认为有无限个组合，所以即使是使用软件来遍历也是不可能实现的，否则你的版本可能就永远也发布不了。Fuzzing技术本质是依靠随机函数生成随机测试用例来进行测试验证，所以是不确定的。 这些不确定的测试用例会起到我们想要的测试结果么？能发现真正的Bug么？ 1、Fuzzing技术首先是一种自动化技术，即软件自动执行相对随机的测试用例。因为是依靠计算机软件自动执行，所以测试效率相对人来讲远远高出几个数量级。比如，一个优秀的测试人员，一天能执行的测试用例数量最多也就是几十个，很难达到100个。而Fuzzing工具可能几分钟就可以轻松执行上百个测试用例。 2、Fuzzing技术本质是依赖随机函数生成随机测试用例，随机性意味着不重复、不可预测，可能有意想不到的输入和结果。 3、根据概率论里面的“大数定律”，只要我们重复的次数够多、随机性够强，那些概率极低的偶然事件就必然会出现。Fuzzing技术就是大数定律的典范应用，足够多的测试用例和随机性，就可以让那些隐藏的很深很难出现的Bug成为必然现象。 目前，Fuzzing技术已经是软件测试、漏洞挖掘领域的最有效的手段之一。Fuzzing技术特别适合用于发现0 Day漏洞，也是众多黑客或黑帽子发现软件漏洞的首选技术。Fuzzing虽然不能直接达到入侵的效果，但是Fuzzing非常容易找到软件或系统的漏洞，以此为突破口深入分析，就更容易找到入侵路径，这就是黑客喜欢Fuzzing技术的原因。 三、基于生成和基于编译的Fuzzing算法？* Fuzzing引擎算法中，测试用例的生成方式主要有2种： 基于变异的算法核心要求是学习已有的数据模型，基于已有数据及对数据的分析，再生成随机数据做为测试用例。 四、stateoftheart AFL AFL就是著名的基于变异的Fuzzer。
最后，再整理一下部分开源fuzzing工具的列表 1.开源Fuzzers CollAFLhttp://chao.100871.net/papers/oakland18.pdf SnowFuzz VUzzer Aflfuzz（American fuzzy lop） Filebuster TriforceAFL Nightmare: Grr Randy: IFuzzer Dizzy: Address Sanitizer: Diffy: Wfuzz: Gofuzz: Sulley: Sulley_l2: CERT Basic Fuzzing Framework (BFF)For linux, OSX CERT Failure Observation Engine (FOE)For windows DranzerFor ActiveX Controls. Radamsaa general purpose fuzzer zzufApplication fuzzer Backfuzz KEMUfuzzer Pathgrind Wadifuzzer LibFuzzer, Clangformatfuzzer, clangfuzzer Perffuzzer HTTP/2 Fuzzer QuickFuzz SymFuzz OFuzz Bed Neural Fuzzer Pulsar Dbus fuzzer: Choronzon Exploitable Hodor 我们想设计一个通用的模糊器，可以用来配置使用已知的良好的输入和分隔符，以模糊特定的位置。在一个完全愚钝的模糊器和一些更聪明的东西之间，与实现适当的智能模糊器相比，表现着更少的努力。 BrundleFuzz Netzob syntribos honggfuzz dotdotpwn KernelFuzzer PyJFuzz RamFuzz EMFFuzzer jsfuzz syzkaller 2.模糊线束/框架使fuzzer提高： FuzzFlow fuzzinator Fuzzlabs Nodefuzz Grinder Kitty Peach 3.此外，还有这些免费的但不是开源的fuzzer： SDL MiniFuzz File Fuzzer Rfuzz Spike Regex Fuzzer 4.博客，将帮助你fuzz更好 Fuzz更聪明，更难  用afl引发模糊，来自bsidessf2016的引物 Fuzzing和afl是一种艺术 BSidesLisbon 2016主题演讲：智能模糊器革命 5.其他Fuzzer博客： 6.商业模糊器 超越安全的暴风雨 7.关于浏览器的Fuzzing Skyfire 一种用于Fuzzing的数据驱动的种子生成工具 使用libFuzzer fuzz Chrome V8入门指南 
China is capable of destabilizing or destroying Bitcoin, new research suggests Cache Translate Page 
In 2008, Bitcoin was envisioned by its pseudonymous founder Satoshi Nakamoto as a trustless, decentralized peertopeer electronic cash system. Ten years and numerous crazy price jumps later, Bitcoin appears to have withstood the test of time. But is it really decentralized and thus resilient to attacks? A new paper, signed by researchers from from Princeton University and Florida International University, suggests that Bitcoin is largely at the whim of one powerful entity: China. The paper (found via The Next Web), which hasn't been peer reviewed yet, outlines numerous potential attacks and disruptions China could launch against Bitcoin. It also argues that China has both the means and motivation to potentially launch such attacks, and that it is already influencing the network in some ways. Read more... More about China, Bitcoin, Cryptocurrencies, Tech, and Cryptocurrency Blockchain 
Strong biases in infraredselected gravitational lenses Cache Translate Page 
Дата и время публикации : 20120312T21:00:00Z Авторы публикации и институты : Stephen Serjeant Ссылка на журнализдание: Ссылка на журнализдание не найденаКоментарии к cтатье: Note added in proof citing Hezaveh et al. (arXiv:1203.3267); other minor changes made to match page proofs. MNRAS in press. 14 pages, 13 figures. Figures slightly degraded from publication version for smaller [...] 
Comment on Telling a Simple Polytope From its Graph by Gil Kalai Cache Translate Page 
Conjecture 4 is false. This was proved by Joseph Doolittle in his paper <a href="https://arxiv.org/abs/1809.00662" rel="nofollow">A minimal counterexample to a strengthening of Perles' conjecture</a> . 
We may not have found aliens yet because we’ve barely begun looking Cache Translate Page 
A new calculation compares the effort so far to exploring a hot tub’s–worth of Earth’s oceansWith no luck so far in a sixdecade search for signals from aliens, you’d be forgiven for thinking, “Where is everyone?” A new calculation shows that if space is an ocean, we’ve barely dipped in a toe. The volume of observable space combed so far for E.T. is comparable to searching the volume of a large hot tub for evidence of fish in Earth’s oceans, astronomer Jason Wright at Penn State and colleagues say in a paper posted online September 19 at arXiv.org. “If you... 
Des particules inconnues hautement énergétiques émanent de l'Antarctique Cache Translate Page 
Voilà ce que cela donne lorsque les scientifiques ne relient pas tous les points et qu’ils pratiquent la science sans conscience.
* La Terre fait partie du Cosmos car elle est une cellule à part entière de l’Univers, tout comme les êtres humains qui sont des cellules lumineuses de l’Univers, * la Terre est creuse comme toutes les autres planètes et elle contient un Grand Soleil Central. Ce sont les habitants de la Cité sacrée de Shamballa qui doivent se marrer et heureusement qu’ils sont là parce qu’avec toutes les conneries faites par les reptiliens, la Terre aurait du exploser depuis longtemps, * depuis l’année 2012 nous avons commencé à traverser la bande photonique constituée par le Grand Soleil Central : Alcyone qui est constitué de 7 soleils, et les vibrations de cet anneau de lumière transforment la matière en profondeur y compris notre ADN pour en activer le second codon sur 12. C’est ce qui va nous rendre télépathes parce que lorsque l’on touche à l’ADN on active certaines parties de notre cerveau, * C’est sûr qu’en traversant les vibrations lumineuses de l’anneau de lumière d’Alcyone, ces vibrations s’inscrivent sur l’ensemble de notre Système solaire et sur la Terre et notamment dans l’eau et la glace de l’Antarctique parce que l’eau conserve la mémoire de ces particules hautement énergétiques * en prime notre galaxie est aspirée depuis quelques années par le Grand Attracteur, et c’est sûr qu’au cours de notre trajectoire et de l’ascension de notre Galaxie nous traversons des régions cosmiques empreintes de particules hautement énergétiques parce que nous devons atteindre la 5^{ème} dimension. En conclusion : le fait que les scientifiques aient découvert ces particules de hautes énergies dans l’Antarctique dont ils ne s’expliquent pas l’origine, c’est bien une preuve que notre système solaire et que notre Galaxie ascensionnent et traversent des zones cosmiques chargées de particules hautement énergétiques et que nous sommes les témoins de notre évolution spirituelle et neurologique. Des particules émanent de l’Antarctique et on ne sait pas ce que c’est Sciences Le projet ANITA de la Nasa a permis d'observer des particules étranges en Antarctique : elles émanent de la Terre, au lieu d'arriver de la galaxie. Selon des physiciens, il est probable que nous soyons face à un phénomène jusqu'ici inconnu. Des rayonnements cosmiques intriguent les physiciens depuis plusieurs années. Dans les sols glacés de l’Antarctique, la Nasa a enregistré en 2016 la présence de particules au comportement étrange : au lieu de provenir de l’espace, elles semblent jaillir de la banquise. Des chercheurs de l’université d’État de Pennsylvanie ont uni leurs forces pour tenter de comprendre ce phénomène qui a déjà inspiré de nombreuses théories. Ils relatent cette recherche dans un article prépublié le 25 septembre 2018 sur arXiv. Leur conclusion soutient l’hypothèse sur laquelle la communauté physicienne s’est déjà reposée, sans toutefois la démontrer. La plupart des scientifiques pensaient que ces particules étaient probablement un élément inconnu : selon cette nouvelle recherche, il y a de grandes chances que ce soit le cas. La physique au delà du modèle standard« Nous explorons [l’hypothèse que] ces particules aillent au delà du modèle standard pour expliquer les événements [enregistrés par] ANITA, s’ils sont correctement interprétés, et concluons que c’est le cas », écrivent les chercheurs dans leur résumé. Ces étranges « rayonnements cosmiques » ont été observés à deux reprises par la Nasa dans le cadre du projet ANITA (Antarctic Impulsive Transient Antenna), un ballon à hélium embarquant un réseau d’antennes radio afin de repérer les rayons cosmiques d’ultra haute énergie (aussi dits zettaparticules), l’un des phénomènes les plus énergétiques connus dans la nature. Le dispositif ANITA de la Nasa en Antarctique. // Source : Flickr/CC/Nasa
Les rayonnements cosmiques sont des flux qui circulent dans le milieu interstellaire — l’espace entre les étoiles dans une galaxie. De tels rayonnements peuvent venir du Soleil, de l’intérieur ou de l’extérieur de la galaxie. Comme l’explique LiveScience, les scientifiques ont fondé de grands espoirs sur la découverte de la mission ANITA, lorsque le dispositif de la Nasa a permis de découvrir non pas des rayons cosmiques provenant de l’espace, mais des particules qui semblaient émerger de la Terre. Pour tenter d’expliquer l’existence de ces rayons cosmiques, les physiciens ont commencé à élaborer des théories. Ces particules sont très probablement un phénomène nouveau En raison de leur comportement inhabituel, les physiciens s’accordaient à dire que ces étranges particules ne pouvaient pas faire partie du modèle standard, une théorie permettant de classifier les particules subatomiques (plus petites que les atomes) connues. Toutes les hypothèses envisageaient le fait que les particules soient la manifestation d’un phénomène nouveau, sans pour autant que cela soit vérifié. Le travail des universitaires pennsylvaniens vient renforcer cette idée. Selon eux, les particules observées grâce à ANITA ne sont qu’une partie émergée de l’iceberg : ces rayonnements cosmiques sont bien plus nombreux que ce que nous pensions. Un autre observatoire situé dans l’Antarctique, baptisé IceCube, a eu l’occasion d’observer des particules similaires, mais aucun lien n’avait été fait entre les enregistrements d’IceCube et ceux d’ANITA, jusqu’à cette étude. L’observatoire IceCube en Antarctique. // Source : Flickr/CC/Eli Duke
1 chance sur 3,5 millions que nous les connaissions En combinant ces deux bases de données, les physiciens sont arrivés à la conclusion que ces étranges particules émanant de la Terre avaient une chance infime d’appartenir au modèle standard : il y a très exactement moins d’une chance sur 3,5 millions pour que ces particules en fassent partie. Autrement dit, cette découverte permet de renforcer l’hypothèse que la communauté scientifique envisageait : il est fort probable que ces particules soient une manifestation d’un phénomène nouveau. Bien que cette découverte ne résolve pas le mystère de leur provenance, le travail de ces chercheurs est important. Il montre que les scientifiques qui voudront étudier ces étranges rayonnements cosmiques devront être prêts à questionner leurs connaissances actuelles sur l’univers s’ils veulent espérer identifier ces particules. Grâce à eux, nous sommes de plus en plus certains que la science est face à un nouveau phénomène.

Quasiuniversality in singlecell sequencing data. (arXiv:1810.03602v1 [qbio.QM]) Cache Translate Page 
Authors: Luis Aparicio, Mykola Bordyuh, Andrew J. Blumberg, Raul Rabadan The development of singlecell technologies provides the opportunity to identify new cellular states and reconstruct novel celltocell relationships. Applications range from understanding the transcriptional and epigenetic processes involved in metazoan development to characterizing distinct cells types in heterogeneous populations like cancers or immune cells. However, analysis of the data is impeded by its unknown intrinsic biological and technical variability together with its sparseness; these factors complicate the identification of true biological signals amidst artifact and noise. Here we show that, across technologies, roughly 95% of the eigenvalues derived from each singlecell data set can be described by universal distributions predicted by Random Matrix Theory. Interestingly, 5% of the spectrum shows deviations from these distributions and present a phenomenon known as eigenvector localization, where information tightly concentrates in groups of cells. Some of the localized eigenvectors reflect underlying biological signal, and some are simply a consequence of the sparsity of single cell data; roughly 3% is artifactual. Based on the universal distributions and a technique for detecting sparsity induced localization, we present a strategy to identify the residual 2% of directions that encode biological information and thereby denoise singlecell data. We demonstrate the effectiveness of this approach by comparing with standard singlecell data analysis techniques in a variety of examples with marked cell populations. 
VOAs labelled by complex reflection groups and 4d SCFTs. (arXiv:1810.03612v1 [hepth]) Cache Translate Page 
Authors: Federico Bonetti, Carlo Meneghelli, Leonardo Rastelli We define and study a class of $\mathcal{N}=2$ vertex operator algebras $\mathcal{W}_{\mathcal{\mathsf{G}}}$ labelled by complex reflection groups. They are extensions of the $\mathcal{N}=2$ super Virasoro algebra obtained by introducing additional generators, in correspondence with the invariants of the complex reflection group $\mathcal{\mathsf{G}}$. If $\mathcal{\mathsf{G}}$ is a Coxeter group, the $\mathcal{N}=2$ super Virasoro algebra enhances to the (small) $\mathcal{N}=4$ superconformal algebra. With the exception of $\mathcal{\mathsf{G}} = \mathbb{Z}_2$, which corresponds to just the $\mathcal{N}=4$ algebra, these are nondeformable VOAs that exist only for a specific negative value of the central charge. We describe a freefield realization of $\mathcal{W}_{\mathcal{\mathsf{G}}}$ in terms of rank$(\mathcal{\mathsf{G}})$ $\beta \gamma bc$ ghost systems, generalizing a construction of Adamovic for the $\mathcal{N}=4$ algebra at $c = 9$. If $\mathcal{\mathsf{G}}$ is a Weyl group, $\mathcal{W}_{\mathcal{\mathsf{G}}}$ is believed to coincide with the $\mathcal{N}=4$ VOA that arises from the fourdimensional super YangMills theory whose gauge algebra has Weyl group $\mathcal{\mathsf{G}}$. More generally, if $\mathcal{\mathsf{G}}$ is a crystallographic complex reflection group, $\mathcal{W}_{\mathcal{\mathsf{G}}}$ is conjecturally associated to an $\mathcal{N}=3$ $4d$ superconformal field theory. The freefield realization allows to determine the elusive `$R$filtration' of $\mathcal{W}_{\mathcal{\mathsf{G}}}$, and thus to recover the full Macdonald index of the parent $4d$ theory 
An algebraic model for rational naivecommutative ring SO(2)spectra and equivariant elliptic cohomology. (arXiv:1810.03632v1 [math.AT]) Cache Translate Page 
Authors: David Barnes, J.P.C. Greenlees, Magdalena Kedziorek Equipping a nonequivariant topological $E_\infty$operad with the trivial $G$action gives an operad in $G$spaces. For a $G$spectrum, being an algebra over this operad does not provide any multiplicative norm maps on homotopy groups. Algebras over this operad are called na\"{i}vecommutative ring $G$spectra. In this paper we take $G=SO(2)$ and we show that commutative algebras in the algebraic model for rational $SO(2)$spectra model rational na\"{i}vecommutative ring $SO(2)$spectra. In particular, this applies to show that the $SO(2)$equivariant cohomology associated to an elliptic curve $C$ from previous work of the second author is represented by an $E_\infty$ring spectrum. Moreover, the category of modules over that $E_\infty$ring spectrum is equivalent to the derived category of sheaves over the elliptic curve $C$ with the Zariski torsion point topology. 
Aggregationdiffusion equations: dynamics, asymptotics, and singular limits. (arXiv:1810.03634v1 [math.AP]) Cache Translate Page 
Authors: Jose A. Carrillo, Katy Craig, Yao Yao Given a large ensemble of interacting particles, driven by nonlocal interactions and localized repulsion, the meanfield limit leads to a class of nonlocal, nonlinear partial differential equations known as aggregationdiffusion equations. Over the past fifteen years, aggregationdiffusion equations have become widespread in biological applications and have also attracted significant mathematical interest, due to their competing forces at different length scales. These competing forces lead to rich dynamics, including symmetrization, stabilization, and metastability, as well as sharp dichotomies separating wellposedness from finite time blowup. In the present work, we review known analytical results for aggregationdiffusion equations and consider singular limits of these equations, including the slow diffusion limit, which leads to the constrained aggregation equation, as well as localized aggregation and vanishing diffusion limits, which lead to metastability behavior. We also review the range of numerical methods available for simulating solutions, with special attention devoted to recent advances in deterministic particle methods. We close by applying such a method  the blob method for diffusion  to showcase key properties of the dynamics of aggregationdiffusion equations and related singular limits. 
Revisited version of Weyl's limit pointlimit circle criterion for essential selfadjointness. (arXiv:1810.03641v1 [mathph]) Cache Translate Page 
Authors: Vito Flavio Bellino, Giampiero Esposito A new proof of the Weyl limit pointlimit circle criterion is obtained, with systematic emphasis on Sobolevspace methods. 
Convexity and Operational Interpretation of the Quantum Information Bottleneck Function. (arXiv:1810.03644v1 [quantph]) Cache Translate Page 
Authors: Nilanjana Datta, Christoph Hirche, Andreas Winter In classical information theory, the information bottleneck method (IBM) can be regarded as a method of lossy data compression which focusses on preserving meaningful (or relevant) information. As such it has recently gained a lot of attention, primarily for its applications in machine learning and neural networks. A quantum analogue of the IBM has recently been defined, and an attempt at providing an operational interpretation of the socalled quantum IB function as an optimal rate of an informationtheoretic task, has recently been made by Salek et al. However, the interpretation given in that paper has a couple of drawbacks; firstly its proof is based on a conjecture that the quantum IB function is convex, and secondly, the expression for the rate function involves certain entropic quantities which occur explicitly in the very definition of the underlying informationtheoretic task, thus making the latter somewhat contrived. We overcome both of these drawbacks by first proving the convexity of the quantum IB function, and then giving an alternative operational interpretation of it as the optimal rate of a bona fide informationtheoretic task, namely that of quantum source coding with quantum side information at the decoder, and relate the quantum IB function to the rate region of this task. We similarly show that the related privacy funnel function is convex (both in the classical and quantum case). However, we comment that it is unlikely that the quantum privacy funnel function can characterize the optimal asymptotic rate of an information theoretic task, since even its classical version lacks a certain additivity property which turns out to be essential. 
Trilinear maps for cryptography II. (arXiv:1810.03646v1 [cs.CR]) Cache Translate Page 
Authors: MingDeh A. Huang We continue to study the construction of cryptographic trilinear maps involving abelian varieties over finite fields. We introduce Weil descent as a tool to strengthen the security of a trilinear map. More specifically, we prepare a trilinear map by starting with an abelian variety of small dimension defined over a finite field $K$ of large extension degree over a finite field $k$. The points and maps and functions involved in the trilinear maps are encoded using Weil descent. However the original abelian variety as well as the descent basis and descent table will be kept secret. We present a concrete construction involving the jacobian varieties of hyperelliptic curves. The idea of using Weil descent to strengthen security raises some interesting computational problems from a cryptanalytic perspective. 
Fluctuation lower bounds in planar random growth models. (arXiv:1810.03656v1 [math.PR]) Cache Translate Page 
Authors: Erik Bates, Sourav Chatterjee We prove $\sqrt{\log n}$ lower bounds on the order of growth fluctuations in three planar growth models (firstpassage percolation, lastpassage percolation, and directed polymers) under no assumptions on distribution of vertex or edge weights other than the minimum conditions required for avoiding pathologies. Such bounds were previously known only for certain restrictive classes of distributions. In addition, the firstpassage shape fluctuation exponent is shown to be at least $1/8$, extending previous results to more general distributions. 
Approximation schemes for countablyinfinite linear programs with moment bounds. (arXiv:1810.03658v1 [math.OC]) Cache Translate Page 
Authors: Juan Kuntz, Philipp Thomas, GuyBart Stan, Mauricio Barahona We introduce approximation schemes for a type of countablyinfinitedimensional linear programs (CILPs) whose feasible points are unsigned measures and whose optimal values are bounds on the averages of these measures. In particular, we explain how to approximate the program's optimal value, optimal points, and minimal point (should one exist) by solving finitedimensional linear programs. We show that the approximations converge to the CILP's optimal value, optimal points, and minimal point as the size of the finitedimensional program approaches that of the CILP. Inbuilt in our schemes is a degree of error control: they yield lower and upper bounds on the optimal values and we give a simple bound on the approximation error of the minimal point. To motivate our work, we discuss applications of our schemes taken from the Markov chain literature: stationary distributions, occupation measures, and exit distributions. 
Modularity experiments on $S_4$symmetric double octics. (arXiv:1810.03659v1 [math.AG]) Cache Translate Page 
Authors: Christian Meyer We will invest quite some computer power to find double octic threefolds that are connected to weight four modular forms. 
Moment Maps, Strict Linear Precision, and Maximum Likelihood Degree One. (arXiv:1810.03672v1 [math.AG]) Cache Translate Page 
Authors: Patrick Clarke, David A. Cox We study the moment maps of a smooth projective toric variety. In particular, we characterize when the moment map coming from the quotient construction is equal to a weighted FubiniStudy moment map. This leads to an investigation into polytopes with strict linear precision, and in the process we use results from and find remarkable connections between Symplectic Geometry, Geometric Modeling, Algebraic Statistics, and Algebraic Geometry. 
The smallest regulator for number fields of degree 7 with five real places. (arXiv:1810.03675v1 [math.NT]) Cache Translate Page 
Authors: Eduardo Friedman, Gabriel RamírezRaposo In 2016 Astudillo, Diaz y Diaz and Friedman published sharp lower bounds for regulators of number fields of all signatures up to degree seven, except for fields of degree seven having five real places. We deal with this signature, proving that the field with the first discriminant has minimal regulator. The new element in the proof is an extension of Pohst's geometric method from the totally real case to fields having one complex place. 
On the Fourth order Schr\"odinger equation in four dimensions: dispersive estimates and zero energy resonances. (arXiv:1810.03678v1 [math.AP]) Cache Translate Page 
Authors: William R. Green, Ebru Toprak We study the fourth order Schr\"odinger operator $H=(\Delta)^2+V$ for a decaying potential $V$ in four dimensions. In particular, we show that the $t^{1}$ decay rate holds in the $L^1\to L^\infty$ setting if zero energy is regular. Furthermore, if the threshold energies are regular then a faster decay rate of $t^{1}(\log t)^{2}$ is attained for large $t$, at the cost of logarithmic spatial weights. Zero is not regular for the free equation, hence the free evolution does not satisfy this bound due to the presence of a resonance at the zero energy. We provide a full classification of the different types of zero energy resonances and study the effect of each type on the time decay in the dispersive bounds. 
Binary Quadratic Forms in Difference Sets. (arXiv:1810.03680v1 [math.NT]) Cache Translate Page 
Authors: Alex Rice We show that if $h(x,y)=ax^2+bxy+cy^2\in \mathbb{Z}[x,y]$ satisfies $b^2\neq 4ac$, then any subset of $\{1,2,\dots,N\}$ with no nonzero differences in the image of $h$ has size at most a constant depending on $h$ times $N\exp(c\sqrt{\log N})$, where $c=c(h)>0$. We achieve this goal by adapting an $L^2$ density increment strategy previously used to establish analogous results for sums of one or more singlevariable polynomials. Our exposition is thorough and selfcontained, in order to serve as an accessible gateway for readers who are unfamiliar with previous implementations of these techniques. 
Existence theory for the Boussinesq equation in Modulation spaces. (arXiv:1810.03684v1 [math.AP]) Cache Translate Page 
Authors: Élder J. VillamizarRoa, Carlos Banquet Brango In this paper we study the Cauchy problem for the generalized Boussinesq equation with initial data in modulation spaces $M^{s}_{p^\prime,q}(\mathbb{R}^n),$ $n\geq 1.$ After a decomposition of the Boussinesq equation in a $2\times 2$nonlinear system, we obtain the existence of global and local solutions in several classes of functions with values in $ M^s_{p,q}\times D^{1}JM^s_{p,q}$ spaces for suitable $p,q$ and $s,$ including the special case $p=2,q=1$ and $s=0.$ Finally, we prove some results of scattering and asymptotic stability in the framework of modulation spaces. 
Determinantal CalabiYau varieties in Grassmannians and the Givental $I$functions. (arXiv:1810.03685v1 [hepth]) Cache Translate Page 
Authors: Yoshinori Honma, Masahide Manabe We examine a class of CalabiYau varieties of the determinantal type in Grassmannians and clarify what kind of examples can be constructed explicitly. We also demonstrate how to compute their genus0 GromovWitten invariants from the analysis of the Givental $I$functions. By constructing $I$functions from the supersymmetric localization formula for the two dimensional gauged linear sigma models, we describe an algorithm to evaluate the genus0 Amodel correlation functions appropriately. We also check that our results for the GromovWitten invariants are consistent with previous results for known examples included in our construction. 
SPDEs with fractional noise in space: continuity in law with respect to the Hurst index. (arXiv:1810.03692v1 [math.PR]) Cache Translate Page 
Authors: Luca M. Giordano, Maria Jolis, Lluís QuerSardanyons In this article, we consider the quasilinear stochastic wave and heat equations on the real line and with an additive Gaussian noise which is white in time and behaves in space like a fractional Brownian motion with Hurst index $H\in (0,1)$. The drift term is assumed to be globally Lipschitz. We prove that the solution of each of the above equations is continuous in terms of the index $H$, with respect to the convergence in law in the space of continuous functions. 
Strong nonlinear instability and growth of Sobolev norms near quasiperiodic finitegap tori for the 2D cubic NLS equation. (arXiv:1810.03694v1 [math.AP]) Cache Translate Page 
Authors: Marcel Guardia, Zaher Hani, Emanuele Haus, Alberto Maspero, Michela Procesi We consider the defocusing cubic nonlinear Schr\"odinger equation (NLS) on the twodimensional torus. The equation admits a special family of elliptic invariant quasiperiodic tori called finitegap solutions. These are inherited from the integrable 1D model (cubic NLS on the circle) by considering solutions that depend only on one variable. We study the longtime stability of such invariant tori for the 2D NLS model and show that, under certain assumptions and over sufficiently long timescales, they exhibit a strong form of transverse instability in Sobolev spaces $H^s(\mathbb{T}^2)$ ($0<s<1$). More precisely, we construct solutions of the 2D cubic NLS that start arbitrarily close to such invariant tori in the $H^s$ topology and whose $H^s$ norm can grow by any given factor. This work is partly motivated by the problem of infinite energy cascade for 2D NLS, and seems to be the first instance where (unstable) longtime nonlinear dynamics near (linearly stable) quasiperiodic tori is studied and constructed. 
ActorCritic Deep Reinforcement Learning for Dynamic Multichannel Access. (arXiv:1810.03695v1 [cs.IT]) Cache Translate Page 
Authors: Chen Zhong, Ziyang Lu, M. Cenk Gursoy, Senem Velipasalar We consider the dynamic multichannel access problem, which can be formulated as a partially observable Markov decision process (POMDP). We first propose a modelfree actorcritic deep reinforcement learning based framework to explore the sensing policy. To evaluate the performance of the proposed sensing policy and the framework's tolerance against uncertainty, we test the framework in scenarios with different channel switching patterns and consider different switching probabilities. Then, we consider a timevarying environment to identify the adaptive ability of the proposed framework. Additionally, we provide comparisons with the DeepQ network (DQN) based framework proposed in [1], in terms of both average reward and the time efficiency. 
Stable Cluster Variables. (arXiv:1810.03699v1 [math.CO]) Cache Translate Page 
Authors: Grace Zhang Richard Eager and Sebastian Franco introduced a change of basis transformation on the Fpolynomials of Fomin and Zelevinsky, corresponding to rewriting them in the basis given by fractional brane charges rather than quiver gauge groups. This transformation seems to display a surprising stabilization property, apparently causing the first few terms of the polynomials at each step of the mutation sequence to coincide. Eager and Franco conjecture that this transformation will always cause the polynomials to converge to a formal power series as the number of mutations goes to infinity, at least for quivers possessing certain symmetries and along periodic mutation sequences respecting such symmetries. In this paper, we verify this convergence in the case of the Kronecker and Conifold quivers. We also investigate convergence in the $F_0$ quiver. We provide a combinatorial interpretation for the stable cluster variables in each appropriate case. 
A ThreeDimensional Hybrid Spectral ElementFourier Spectral Method for WallBounded TwoPhase Flows. (arXiv:1810.03701v1 [physics.fludyn]) Cache Translate Page 
Authors: S.H. Challa, S. Dong, L.D. Zhu We present a hybrid spectral elementFourier spectral method for solving the coupled system of NavierStokes and CahnHilliard equations to simulate wallbounded twophase flows in a threedimensional domain which is homogeneous in at least one direction. Fourier spectral expansions are employed along the homogeneous direction and $C^0$ highorder spectral element expansions are employed in the other directions. A critical component of the method is a strategy we developed in a previous work for dealing with the variable density/viscosity of the twophase mixture, which makes the efficient use of Fourier expansions in the current work possible for twophase flows with different densities and viscosities for the two fluids. The attractive feature of the presented method lies in that the twophase computations in the threedimensional space are transformed into a set of decoupled twodimensional computations in the planes of the nonhomogeneous directions. The overall scheme consists of solving a set of decoupled twodimensional equations for the flow and phasefield variables in these planes. The linear algebraic systems for these twodimensional equations have constant coefficient matrices that need to be computed only once and can be precomputed. We present ample numerical simulations for different cases to demonstrate the accuracy and capability of the presented method in simulating the class of twophase problems involving solid walls and moving contact lines. 
Improving resource elasticity in cloud computing thanks to modelfree control. (arXiv:1810.03702v1 [cs.DC]) Cache Translate Page 
Authors: Maria Bekcheva, Michel Fliess, Cédric Join, Alireza Moradi, Hugues Mounier In cloud computing management, the dynamic adaptation of computing resource allocations under timevarying workload is an active domain of investigation. Several control strategies were already proposed. Here the modelfree control setting and the corresponding "intelligent" controllers, which are most successful in many concrete engineering situations, are employed for the "horizontal elasticity." When compared to the commercial "AutoScaling" algorithms, our easily implementable approach, behaves better even with sharp workload fluctuations. This is confirmed by experiments on Amazon Web Services (AWS). 
Global Existence of Geometric Rough Flows. (arXiv:1810.03708v1 [math.DG]) Cache Translate Page 
Authors: Bruce K. Driver In this paper we consider rough differential equations on a smooth manifold $\left( M\right) .$ The main result of this paper gives sufficient conditions on the driving vectorfields so that the rough ODE's have global (in time) solutions. The sufficient conditions involve the existence of a complete Riemannian metric $\left( g\right) $ on $M$ such that the covariant derivatives of the driving fields and their commutators to a certain order (depending on the roughness of the driving path) are bounded. Many of the results of this paper are generalizations to manifolds of the fundamental results in \cite{Bailleul2015a}. 
Bounding the minimal number of generators of an Azumaya algebra. (arXiv:1810.03710v1 [math.RA]) Cache Translate Page 
Authors: Ben Williams A paper of U. First & Z. Reichstein proves that if $R$ is a commutative ring of dimension $d$, then any Azumaya algebra $A$ over $R$ can be generated as an algebra by $d+2$ elements, by constructing such a generating set, but they do not prove that this number of generators is required, or even that for an arbitrarily large $r$ that there exists an Azumaya algebra requiring $r$ generators. In this paper, for any given fixed $n\ge 2$, we produce examples of a base ring $R$ of dimension $d$ and an Azumaya algebra of degree $n$ over $R$ that requires $r(d,n) = \lfloor \frac{d}{2n2} \rfloor + 2$ generators. While $r(d,n) < d+2$ in general, we at least show that there is no uniform upper bound on the number of generators required for Azumaya algebras. The method of proof is to consider certain varieties $B^r_n$ that are universal varieties for degree$n$ Azumaya algebras equipped with a set of $r$ generators, and specifically we show that a natural map on Chow group $CH^{(r1)(n1)}_{PGL_n} \to CH^{(r1)(n1)}(B^r_n)$ fails to be injective, which is to say that the map fails to be injective in the first dimension in which it possibly could fail. This implies that for a sufficiently generic rank$n$ Azumaya algebra, there is a characteristic class obstruction to generation by $r$ elements. 
Exponential matrices. (arXiv:1810.03719v1 [math.RT]) Cache Translate Page 
Authors: Ryuji Tanimoto In this article, we introduce a notion of an exponential matrix, which is a polynomial matrix with exponential properties, and a notion of an equivalence relation of two exponential matrices, and then we initiate to study classifying exponential matrices in positive characteristic, up to equivalence. We classify exponential matrices of Heisenberg groups in positive characteristic, up to equivalence. We also classify exponential matrices of size fourbyfour in positive characteristic, up to equivalence. From these classifications, we obtain a classification of modular representations of elementary abelian $p$groups into Heisenberg groups, up to equivalence, and a classification of fourdimensional modular representations of elementary abelian $p$groups, up to equivalence. 
Optimal SteadyState Control for Linear TimeInvariant Systems. (arXiv:1810.03724v1 [math.OC]) Cache Translate Page 
Authors: Liam S. P. Lawrence, Zachary E. Nelson, Enrique Mallada, John W. SimpsonPorco We consider the problem of designing a feedback controller that guides the input and output of a linear timeinvariant system to a minimizer of a convex optimization problem. The system is subject to an unknown disturbance that determines the feasible set defined by the system equilibrium constraints. Our proposed design enforces the KarushKuhnTucker optimality conditions in steadystate without incorporating dual variables into the controller. We prove that the input and output variables achieve optimality in equilibrium and outline two procedures for designing controllers that stabilize the closedloop system. We explore key ideas through simple examples and simulations. 
Exotic Springer fibers for orbits corresponding to onerow bipartitions. (arXiv:1810.03731v1 [math.RT]) Cache Translate Page 
Authors: Neil Saunders, Arik Wilbert We study the geometry and topology of exotic Springer fibers for orbits corresponding to onerow bipartitions from an explicit, combinatorial point of view. This includes a detailed analysis of the structure of the irreducible components and their intersections as well as the construction of an explicit affine paving. Moreover, we compute the ring structure of cohomology by constructing a CWcomplex homotopy equivalent to the exotic Springer fiber. This homotopy equivalent space admits an action of the type C Weyl group inducing Kato's original exotic Springer representation on cohomology. Our results are described in terms of the diagrammatics of the twoboundary TemperleyLieb algebra. This provides a first step in generalizing the geometric versions of Khovanov's arc algebra to the exotic setting. 
Find the dimension that counts: Fast dimension estimation and Krylov PCA. (arXiv:1810.03733v1 [cs.NA]) Cache Translate Page 
Authors: Shashanka Ubaru, AbdKrim Seghouane, Yousef Saad High dimensional data and systems with many degrees of freedom are often characterized by covariance matrices. In this paper, we consider the problem of simultaneously estimating the dimension of the principal (dominant) subspace of these covariance matrices and obtaining an approximation to the subspace. This problem arises in the popular principal component analysis (PCA), and in many applications of machine learning, data analysis, signal and image processing, and others. We first present a novel method for estimating the dimension of the principal subspace. We then show how this method can be coupled with a Krylov subspace method to simultaneously estimate the dimension and obtain an approximation to the subspace. The dimension estimation is achieved at no additional cost. The proposed method operates on a model selection framework, where the novel selection criterion is derived based on random matrix perturbation theory ideas. We present theoretical analyses which (a) show that the proposed method achieves strong consistency (i.e., yields optimal solution as the number of datapoints $n\rightarrow \infty$), and (b) analyze conditions for exact dimension estimation in the finite $n$ case. Using recent results, we show that our algorithm also yields near optimal PCA. The proposed method avoids forming the sample covariance matrix (associated with the data) explicitly and computing the complete eigendecomposition. Therefore, the method is inexpensive, which is particularly advantageous in modern data applications where the covariance matrices can be very large. Numerical experiments illustrate the performance of the proposed method in various applications. 
Random polymers via orthogonal Whittaker and symplectic Schur functions. (arXiv:1810.03734v1 [math.PR]) Cache Translate Page 
Authors: Elia Bisi This thesis deals with some $(1+1)$dimensional lattice path models from the KPZ universality class: the directed random polymer with inversegamma weights (known as loggamma polymer) and its zero temperature degeneration, i.e. the last passage percolation model, with geometric or exponential waiting times. We consider three path geometries: pointtoline, pointtohalfline, and pointtoline with paths restricted to stay in a halfplane. Through exact formulas, we establish new connections between integrable probabilistic models and the ubiquitous Whittaker and Schur functions. More in detail, via the use of A. N. Kirillov's geometric RobinsonSchenstedKnuth (RSK) correspondence, we compute the Laplace transform of the polymer partition functions in the above geometries in terms of orthogonal Whittaker functions. In the case of the first two geometries we also provide multiple contour integral formulas. For the corresponding last passage percolation problems, we obtain new formulas in terms of symplectic Schur functions, both directly via RSK on polygonal arrays and via zero temperature limit from the loggamma polymer formulas. As scaling limits of the pointtoline and pointtohalfline models with exponential waiting times, we derive Sasamoto's Fredholm determinant formula for the GOE TracyWidom distribution, as well as the onepoint marginal distribution of the ${\rm Airy}_{2\to1}$ process. 
Null screen quasiconformal hypersurfaces in semiRiemannian manifolds and applications. (arXiv:1810.03735v1 [math.DG]) Cache Translate Page 
Authors: Matias Navarro, Oscar Palmas, Didier Solis We introduce a class of null hypersurfaces of a semiRiemannian manifold, namely, screen quasiconformal hypersurfaces, whose geometry may be studied through the geometry of its screen distribution. In particular, this notion allows us to extend some results of previous works to the case in which the sectional curvature of the ambient space is different from zero. As applications, we study umbilical, isoparametric and Einstein null hypersurfaces in Lorentzian space forms and provide several classification results. 
Sunflowers of Convex Open Sets. (arXiv:1810.03741v1 [math.CO]) Cache Translate Page 
Authors: R. Amzi Jeffs A sunflower is a collection of sets $\{U_1,\ldots, U_n\}$ such that the pairwise intersection $U_i\cap U_j$ is the same for all choices of distinct $i$ and $j$. We study sunflowers of convex open sets in $\mathbb R^d$, and provide a Hellytype theorem describing a certain "rigidity" that they possess. In particular we show that if $\{U_1,\ldots, U_{d+1}\}$ is a sunflower in $\mathbb R^d$, then any hyperplane that intersects all $U_i$ must also intersect $\bigcap_{i=1}^{d+1} U_i$. We use our results to describe a combinatorial code $\mathcal C_n$ for all $n\ge 2$ which is on the one hand minimally nonconvex, and on the other hand has no local obstructions. Along the way we further develop the theory of morphisms of codes, and establish results on the covering relation in the poset $\mathbb P_{\mathbf{Code}}$. 
Logarithmic Chow theory. (arXiv:1810.03746v1 [math.AG]) Cache Translate Page 
Authors: Lawrence Jack Barrott Log geometry was introduced by Kato based on ideas of Illusie and Fontaine, who expanded on it to control degenerations of varieties. This theory enhances a scheme with a sheaf of monoids over the structure sheaf. Many of the notions of algebraic geometry, such as smoothness and flatness, can be copied across to log geometry, as explained most vividly by Olsson. This led us to ask whether other geometric notions can be transferred to this setting. In this paper we describe a refined Chow theory for log varieties. This was motivated by the construction by Abramovich, Chen, Gross and Siebert of log GromovWitten invariants. This produces a dimension graded family of Abelian groups supporting a pushforward and pullback along proper and log flat morphisms respectively. 
Restricted percolation critical exponents in high dimensions. (arXiv:1810.03750v1 [math.PR]) Cache Translate Page 
Authors: Shirshendu Chatterjee, Jack Hanson Despite great progress in the study of critical percolation on $\mathbb{Z}^d$ for $d$ large, properties of critical clusters in highdimensional fractional spaces and boxes remain poorly understood, unlike the situation in two dimensions. Closely related models such as critical branching random walk give natural conjectures for the value of the relevant highdimensional critical exponents; see in particular the conjecture by KozmaNachmias that the probability that $0$ and $(n, n, n, \ldots)$ are connected within $[n,n]^d$ scales as $n^{22d}$. In this paper, we study the properties of critical clusters in highdimensional halfspaces and boxes. In halfspaces, we show that the probability of an open connection ("arm") from $0$ to the boundary of a sidelength $n$ box scales as $n^{3}$. We also find the scaling of the halfspace twopoint function (the probability of an open connection between two vertices) and the tail of the cluster size distribution. In boxes, we obtain the scaling of the twopoint function between vertices which are any macroscopic distance away from the boundary. 
The BrunnMinkowski inequality and a Minkowski problem for $\mathcal{A}$harmonic Green's function. (arXiv:1810.03752v1 [math.AP]) Cache Translate Page 
Authors: Murat Akman, John Lewis, Olli Saari, Andrew Vogel In this article we study two classical problems in convex geometry associated to $\mathcal{A}$harmonic PDEs, quasilinear elliptic PDEs whose structure is modeled on the $p$Laplace equation. Let $p$ be fixed with $2\leq n\leq p<\infty$. For a convex compact set $E$ in $\mathbb{R}^{n}$, we define and then prove the existence and uniqueness of the so called $\mathcal{A}$harmonic Green's function for the complement of $E$ with pole at infinity. We then define a quantity $\mbox{C}_{\mathcal{A}}(E)$ which can be seen as the behavior of this function near infinity. In the first part of this article, we prove that $\mbox{C}_{\mathcal{A}}(\cdot)$ satisfies the following BrunnMinkowski type inequality \[ \left[\mbox{C}_\mathcal{A} ( \lambda E_1 + (1\lambda) E_2 )\right]^{\frac{1}{pn}} \geq \lambda \, \left[\mbox{C}_\mathcal{A} ( E_1 )\right]^{\frac{1}{pn}} + (1\lambda) \left[\mbox{C}_\mathcal{A} (E_2 )\right]^{\frac{1}{pn}} \] when $n<p<\infty$, $0 \leq \lambda \leq 1$, and $E_1, E_2$ are nonempty convex compact sets in $\mathbb{R}^{n}$. We also show that $\mbox{C}_\mathcal{A}(\cdot)$ satisfies a similar inequality when $p=n$. Moreover, if equality holds in the either of these inequalities for some $E_1$ and $E_2$ then under certain regularity and structural assumptions on $\mathcal{A}$ we show that these two sets are homothetic. In the second part of this article we study a Minkowski type problem for a measure associated to the $\mathcal{A}$harmonic Green's function for the complement of a convex compact set $E$ when $n\leq p<\infty$. If $\mu_E$ denotes this measure, then we show that necessary and sufficient conditions for existence under this setting are exactly the same conditions as in the classical Minkowski problem. We also show that this problem has a unique solution up to translation. 
Coded EnergyEfficient BeamAlignment for MillimeterWave Networks. (arXiv:1810.03755v1 [cs.IT]) Cache Translate Page 
Authors: Muddassar Hussain, Nicolo Michelusi Millimeterwave communications rely on narrowbeam transmissions to cope with the strong signal attenuation at these frequencies, thus demanding precise alignment between transmitter and receiver. However, the beamalignment procedure may entail a huge overhead and its performance may be degraded by detection errors. This paper proposes a coded energyefficient beamalignment scheme, robust against detection errors. Specifically, the beamalignment sequence is designed such that the errorfree feedback sequences are generated from a codebook with the desired error correction capabilities. Therefore, in the presence of detection errors, the errorfree feedback sequences can be recovered with high probability. The assignment of beams to codewords is designed to optimize energy efficiency, and a waterfilling solution is proved. The numerical results with analog beams depict up to 4dB and 8dB gains over exhaustive and uncoded beamalignment schemes, respectively. 
Thermodynamic Formalism for Topological Markov Chains on Borel Standard Spaces. (arXiv:1810.03757v1 [math.DS]) Cache Translate Page 
Authors: L. Cioletti, E. A. Silva, M. Stadlbauer We develop a Thermodynamic Formalism for bounded continuous potentials defined on the sequence space $X\equiv E^{\mathbb{N}}$, where $E$ is a general Borel standard space. In particular, we introduce meaningful concepts of entropy and pressure for shifts acting on $X$ and obtain the existence of equilibrium states as additive probability measures for any bounded continuous potential. Furthermore, we establish convexity and other structural properties of the set of equilibrium states, prove a version of the PerronFrobeniusRuelle theorem under additional assumptions on the regularity of the potential and show that the YosidaHewitt decomposition of these equilibrium states do not have a purely additive part. We then apply our results to the construction of invariant measures of timehomogeneous Markov chains taking values on a general Borel standard space and obtain exponential asymptotic stability for a class of Markov operators. We also construct conformal measures for an infinite collection of interacting random paths which are associated to a potential depending on infinitely many coordinates. Under an additional differentiability hypothesis, we show how this process is related after a proper scaling limit to a certain infinite dimensional diffusion. 
Cubic Regularization with Momentum for Nonconvex Optimization. (arXiv:1810.03763v1 [math.OC]) Cache Translate Page 
Authors: Zhe Wang, Yi Zhou, Yingbin Liang, Guanghui Lan Momentum is a popular technique to accelerate the convergence in practical training, and its impact on convergence guarantee has been wellstudied for firstorder algorithms. However, such a successful acceleration technique has not yet been proposed for secondorder algorithms in nonconvex optimization.In this paper, we apply the momentum scheme to cubic regularized (CR) Newton's method and explore the potential for acceleration. Our numerical experiments on various nonconvex optimization problems demonstrate that the momentum scheme can substantially facilitate the convergence of cubic regularization, and perform even better than the Nesterov's acceleration scheme for CR. Theoretically, we prove that CR under momentum achieves the best possible convergence rate to a secondorder stationary point for nonconvex optimization. Moreover, we study the proposed algorithm for solving problems satisfying an error bound condition and establish a local quadratic convergence rate. Then, particularly for finitesum problems, we show that the proposed algorithm can allow computational inexactness that reduces the overall sample complexity without degrading the convergence rate. 
The existence of perfect codes in Doob graphs. (arXiv:1810.03772v1 [cs.IT]) Cache Translate Page 
Authors: Denis S. Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia) We solve the problem of existence of perfect codes in the Doob graph. It is shown that 1perfect codes in the Doob graph D(m,n) exist if and only if 6m+3n+1 is a power of 2; that is, if the size of a 1ball divides the number of vertices. 
The lifespan of solutions of semilinear wave equations with the scale invariant damping in one space dimension. (arXiv:1810.03780v1 [math.AP]) Cache Translate Page 
Authors: Masakazu Kato, Hiroyuki Takamura, Kyouhei Wakasa The critical constant of timedecaying damping in the scale invari ant case is recently conjectured. It also has been expected that the lifespan estimate is the same as associated semilinear heat equations if the constant is in "heatlike" domain. In this paper, we point out that this is not true if the total integral of the sum of initial position and speed vanishes. In such a case, we have a new type of the lifespan estimates which is closely related to the nondamped case in shifted space dimensions. 
Low dimensional nilpotent nLie algebras. (arXiv:1810.03782v1 [math.RA]) Cache Translate Page 
Authors: Mehdi Eshrati, Farshid Saeedi, Hamid Darabi In this paper, nilpotent nLie algebras of dimension n + 3 as well as nilpotent nLie algebras of class 2 and dimension n + 4 are classified. 
Local Uniqueness of The Density From Partial Boundary Data for Isotropic Elastodynamics. (arXiv:1810.03784v1 [math.AP]) Cache Translate Page 
Authors: Sombuddha Bhattacharyya We consider an inverse problem in elastodynamics arising in seismic imaging. We prove locally uniqueness of the density of a nonhomogeneous, isotropic elastic body from measurements taken on a part of the boundary. We measure the Dirichlet to Neumann map, only on a part of the boundary, corresponding to the isotropic elasticity equation of a 3dimensional object. In earlier works it has been shown that one can determine the sheer and compressional speeds on a neighborhood of the part of the boundary (accessible part) where the measurements have been taken. In this article we show that one can determine the density of the medium as well, on a neighborhood of the accessible part of the boundary. 
A counterexample for the conjecture of finite simple groups. (arXiv:1810.03786v1 [math.GR]) Cache Translate Page 
Authors: Wujie Shi In this note we provide some counterexamples for the conjectures of finite simple groups, one of the conjectures said "all finite simple groups $G$ can be determined using their orders $G$ and the number of elements of order $p$, where $p$ the largest prime divisor of $G$". 
Atomic decomposition of product Hardy spaces via wavelet bases on spaces of homogeneous type. (arXiv:1810.03788v1 [math.CA]) Cache Translate Page 
Authors: Yongsheng Han, Ji Li, M. Cristina Pereyra, Lesley A. Ward We provide an atomic decomposition of the product Hardy spaces $H^p(\widetilde{X})$ which were recently developed by Han, Li, and Ward in the setting of product spaces of homogeneous type $\widetilde{X} = X_1 \times X_2$. Here each factor $(X_i,d_i,\mu_i)$, for $i = 1$, $2$, is a space of homogeneous type in the sense of Coifman and Weiss. These Hardy spaces make use of the orthogonal wavelet bases of Auscher and Hyt\"onen and their underlying reference dyadic grids. However, no additional assumptions on the quasimetric or on the doubling measure for each factor space are made. To carry out this program, we introduce product $(p,q)$atoms on $\widetilde{X}$ and product atomic Hardy spaces $H^{p,q}_{{\rm at}}(\widetilde{X})$. As consequences of the atomic decomposition of $H^p(\widetilde{X})$, we show that for all $q > 1$ the product atomic Hardy spaces coincide with the product Hardy spaces, and we show that the product Hardy spaces are independent of the particular choices of both the wavelet bases and the reference dyadic grids. Likewise, the product Carleson measure spaces ${\rm CMO}^p(\widetilde{X})$, the bounded mean oscillation space ${\rm BMO}(\widetilde{X})$, and the vanishing mean oscillation space ${\rm VMO}(\widetilde{X})$, as defined by Han, Li, and Ward, are also independent of the particular choices of both wavelets and reference dyadic grids. 
OrliczBesov imbedding and globally $n$regular domains. (arXiv:1810.03796v1 [math.FA]) Cache Translate Page 
Authors: Hongyan Sun Denote by $ {\bf\dot B}^{\alpha,\phi}(\Omega)$ the OrliczBesov space, where $\alpha\in\mathbb{R}$, $\phi$ is a Young function and $\Omega\subset\mathbb{R}^n$ is a domain. For $\alpha\in(n,0)$ and optimal $\phi$, in this paper we characterize domains supporting the imbedding ${\bf\dot B}^{\alpha,\phi}(\Omega)$ into $ L^{n/\alpha}(\Omega)$ via globally $n$regular domains. This extends the known characterizations for domains supporting the Besov imbedding ${\bf\dot B} ^s_{pp}(\Omega)$ into $ L^{np/(nsp)}(\Omega)$ with $s\in(0,1)$ and $1\le p<n/s$. The proof of the imbedding ${\bf\dot B}^{\alpha,\phi}(\Omega)\to L^{n/\alpha}(\Omega)$ in globally $n$regular domains $\Omega$ relies on a geometric inequality involving $\phi$ and $\Omega$ , which extends a known geometric inequality of Caffarelli et al. 
An inverse problem for the magnetic Schr\"{o}dinger operator on Riemannian manifolds from partial boundary data. (arXiv:1810.03797v1 [math.AP]) Cache Translate Page 
Authors: Sombuddha Bhattacharyya We consider the inverse problem of recovering the magnetic and potential term of a magnetic Schr\"{o}dinger operator on certain compact Riemannian manifolds with boundary from partial Dirichlet and Neumann data on suitable subsets of the boundary. The uniqueness proof relies on proving a suitable Carleman estimate for functions which vanish only on a part of boundary and constructing complex geometric optics solutions which vanish on a part of the boundary. 
The characteristic classes and Weyl invariants of Spin geometry. (arXiv:1810.03799v1 [math.AT]) Cache Translate Page 
Authors: Haibao Duan Based on a pair of cohomology operations on so called $\delta2$formal spaces, we construct the integral cohomology rings of the classifying spaces of the Lie groups $Spin(n)$ and $Spin^{c}(n)$. As applications, we introduce characteristic classes for the reduced topological $K_{Spin}$ theory, determine the ring of integral Weyl invariants of the group $Spin(n)$, and generalize the classical Rokhlin Theorem. 
Geometry of the minimal spanning tree of a random $3$regular graph. (arXiv:1810.03802v1 [math.PR]) Cache Translate Page 
Authors: Louigi AddarioBerry, Sanchayan Sen The global structure of the minimal spanning tree (MST) is expected to be universal for a large class of underlying random discrete structures. But very little is known about the intrinsic geometry of MSTs of most standard models, and so far the scaling limit of the MST viewed as a metric measure space has only been identified in the case of the complete graph [4]. In this work, we show that the MST constructed by assigning i.i.d. continuous edgeweights to either the random (simple) $3$regular graph or the $3$regular configuration model on $n$ vertices, endowed with the tree distance scaled by $n^{1/3}$ and the uniform probability measure on the vertices, converges in distribution with respect to GromovHausdorffProkhorov topology to a random compact metric measure space. Further, this limiting space has the same law as the scaling limit of the MST of the complete graph identified in [4] up to a scaling factor of $6^{1/3}$. Our proof relies on a novel argument that uses a coupling between the $3$regular configuration model and the Erd\H{o}sR\'enyi random graph. The techniques of this paper can be used to establish the scaling limit of the MST in the setting of various different random graph models provided one additional technical condition is verified. 
A Dichotomy Theorem for FirstFit Chain Partitions. (arXiv:1810.03807v1 [math.CO]) Cache Translate Page 
Authors: Kevin G. Milans, Michael C. Wigal FirstFit is a greedy algorithm for partitioning the elements of a poset into chains. Let $\textrm{FF}(w,Q)$ be the maximum number of chains that FirstFit uses on a $Q$free poset of width $w$. A result due to Bosek, Krawczyk, and Matecki states that $\textrm{FF}(w,Q)$ is finite when $Q$ has width at most $2$. We describe a family of posets $\mathcal{Q}$ and show that the following dichotomy holds: if $Q\in\mathcal{Q}$, then $\textrm{FF}(w,Q) \le 2^{c(\log w)^2}$ for some constant $c$ depending only on $Q$, and if $Q\not\in\mathcal{Q}$, then $\textrm{FF}(w,Q) \ge 2^w  1$. 
Numerical study of ergodicity for the overdamped Generalized Langevin Equation with fractional noise. (arXiv:1810.03810v1 [math.NA]) Cache Translate Page 
The Generalized Langevin Equation, in history, arises as a natural fix for the rather traditional Langevin equation when the random force is no longer memoryless. It has been proved that with fractional Gaussian noise (fGn) mostly considered by biologists, the overdamped Generalized Langevin equation satisfying fluctuationdissipation theorem can be written as a fractional stochastic differential equation (FSDE). While the ergodicity is clear for linear forces, it remains less transparent for nonlinear forces. In this work, we present both a direct and a fast algorithm respectively to this FSDE model. The strong orders of convergence are proved for both schemes, where the role of the memory effects can be clearly observed. We verify the convergence theorems using linear forces, and then present the ergodicity study of the double well potentials in both 1D and 2D setups. 
On the Relationship between Energy Complexity and Other Boolean Function Measures. (arXiv:1810.03811v1 [cs.CC]) Cache Translate Page 
Authors: Xiaoming Sun, Yuan Sun, Kewen Wu, Zhiyu Xia In this work we investigate into energy complexity, a Boolean function measure related to circuit complexity. Given a circuit $\mathcal{C}$ over the standard basis $\{\vee_2,\wedge_2,\neg\}$, the energy complexity of $\mathcal{C}$, denoted by $\mathrm{EC}(\mathcal{C})$, is the maximum number of its activated inner gates over all inputs. The energy complexity of a Boolean function $f$, denoted by $\mathrm{EC}(f)$, is the minimum of $\mathrm{EC}(\mathcal{C})$ over all circuits $\mathcal{C}$ computing $f$. This concept has attracted lots of attention in literature. Recently, Denish, Otiv, and Sarma [COCOON'18] gave $\mathrm{EC}(f)$ an upper bound in terms of the decision tree complexity, $\mathrm{EC}(f)=O(\mathrm{D}(f)^3)$. They also showed that $\mathrm{EC}(f)\leq 3n1$, where $n$ is the input size. Recall that the minimum size of circuit to compute $f$ could be as large as $2^n/n$. We improve their upper bounds by showing that $\mathrm{EC}(f)\leq\min\{\frac12\mathrm{D}(f)^2+O(\mathrm{D}(f)),n+2\mathrm{D}(f)2\}$. For the lower bound, Denish, Otiv, and Sarma defined positive sensitivity, a complexity measure denoted by $\mathrm{psens}(f)$, and showed that $\mathrm{EC}(f)\ge\frac{1}{3}\mathrm{psens}(f)$. They asked whether $\mathrm{EC}(f)$ can also be lower bounded by a polynomial of $\mathrm{D}(f)$. In this paper we affirm it by proving $\mathrm{EC}(f)=\Omega(\sqrt{\mathrm{D}(f)})$. For nondegenerated functions with input size $n$, we give another lower bound $\mathrm{EC}(f)=\Omega(\log{n})$. All these three lower bounds are incomparable to each other. Besides, we also examine the energy complexity of $\mathtt{OR}$ functions and $\mathtt{ADDRESS}$ functions, which implies the tightness of our two lower bounds respectively. In addition, the former one answers another open question asking for a nontrivial lower bounds for the energy complexity of $\mathtt{OR}$ functions. 
SNAP: A semismooth Newton algorithm for pathwise optimization with optimal local convergence rate and oracle properties. (arXiv:1810.03814v1 [stat.ML]) Cache Translate Page 
Authors: Jian Huang, Yuling Jiao, Xiliang Lu, Yueyong Shi, Qinglong Yang We propose a semismooth Newton algorithm for pathwise optimization (SNAP) for the LASSO and Enet in sparse, highdimensional linear regression. SNAP is derived from a suitable formulation of the KKT conditions based on Newton derivatives. It solves the semismooth KKT equations efficiently by actively and continuously seeking the support of the regression coefficients along the solution path with warm start. At each knot in the path, SNAP converges locally superlinearly for the Enet criterion and achieves an optimal local convergence rate for the LASSO criterion, i.e., SNAP converges in one step at the cost of two matrixvector multiplication per iteration. Under certain regularity conditions on the design matrix and the minimum magnitude of the nonzero elements of the target regression coefficients, we show that SNAP hits a solution with the same signs as the regression coefficients and achieves a sharp estimation error bound in finite steps with high probability. The computational complexity of SNAP is shown to be the same as that of LARS and coordinate descent algorithms per iteration. Simulation studies and real data analysis support our theoretical results and demonstrate that SNAP is faster and accurate than LARS and coordinate descent algorithms. 
Feynman Integrals and Intersection Theory. (arXiv:1810.03818v1 [hepth]) Cache Translate Page 
Authors: Pierpaolo Mastrolia, Sebastian Mizera We introduce the tools of intersection theory to the study of Feynman integrals, which allows for a new way of projecting integrals onto a basis. In order to illustrate this technique, we consider Baikov representation of maximal cuts in arbitrary spacetime dimension. We introduce a minimal basis of differential forms with logarithmic singularities on the boundaries of the corresponding integration cycles. We give an algorithm for computing a basis decomposition of an arbitrary maximal cut using the socalled intersection numbers and describe two alternative ways of computing them. Furthermore, we show how to obtain Pfaffian systems of differential equations for the basis integrals using the same technique. All the steps are illustrated on the example of a twoloop nonplanar triangle diagram with a massive loop. 
Sufficient and Necessary Conditions for the Identifiability of the $Q$matrix. (arXiv:1810.03819v1 [math.ST]) Cache Translate Page 
Authors: Yuqi Gu, Gongjun Xu Restricted latent class models (RLCMs) have recently gained prominence in educational assessment, psychiatric evaluation, and medical diagnosis. Different from conventional latent class models, restrictions on RLCM model parameters are imposed by a design matrix to respect practitioners' scientific assumptions. The design matrix, called the $Q$matrix in cognitive diagnosis literature, is usually constructed by practitioners and domain experts, yet it is subjective and could be misspecified. To address this problem, researchers have proposed to estimate the design $Q$matrix from the data. On the other hand, the fundamental learnability issue of the $Q$matrix and model parameters remains underexplored and existing studies often impose stronger than needed or even impractical conditions. This paper proposes the sufficient and necessary conditions for the joint identifiability of the $Q$matrix and RLCM model parameters. The developed identifiability conditions only depend on the design matrix and therefore is easy to verify in practice. 
Serre weight conjectures for $p$adic unitary groups of rank 2. (arXiv:1810.03827v1 [math.NT]) Cache Translate Page 
Authors: Karol Koziol, Stefano Morra We prove a version of the weight part of Serre's conjecture for mod $p$ Galois representations attached to automorphic forms on rank 2 unitary groups which are nonsplit at $p$. More precisely, let $F/F^+$ denote a CM extension of a totally real field such that every place of $F^+$ above $p$ is unramified and inert in $F$, and let $\overline{r}: \textrm{Gal}(\overline{F^+}/F^+) \longrightarrow {}^C\mathbf{U}_2(\overline{\mathbb{F}}_p)$ be a Galois parameter valued in the $C$group of a rank 2 unitary group attached to $F/F^+$. We assume that $\overline{r}$ is semisimple and sufficiently generic at all places above $p$. Using base change techniques and (a strengthened version of) the TaylorWilesKisin conditions, we prove that the set of Serre weights in which $\overline{r}$ is modular agrees with the set of Serre weights predicted by GeeHerzigSavitt. 
An elliptic second main theorem. (arXiv:1810.03830v1 [math.CV]) Cache Translate Page 
Authors: Julien Duval We prove a second main theorem for elliptic projective planes. 
A Fourier extension based numerical integration scheme for fast and highorder approximation of convolutions with weakly singular kernels. (arXiv:1810.03835v1 [math.NA]) Cache Translate Page 
Authors: Akash Anand, Awanish Kumar Tiwari Computationally efficient numerical methods for highorder approximations of convolution integrals involving weakly singular kernels find many practical applications including those in the development of fast quadrature methods for numerical solution of integral equations. Most fast techniques in this direction utilize uniform grid discretizations of the integral that facilitate the use of FFT for $O(n\log n)$ computations on a grid of size $n$. In general, however, the resulting error converges slowly with increasing $n$ when the integrand does not have a smooth periodic extension. Such extensions, in fact, are often discontinuous and, therefore, their approximations by truncated Fourier series suffer from Gibb's oscillations. In this paper, we present and analyze an $O(n\log n)$ scheme, based on a Fourier extension approach for removing such unwanted oscillations, that not only converges with highorder but is also relatively simple to implement. We include a theoretical error analysis as well as a wide variety of numerical experiments to demonstrate its efficacy. 
Lipschitz regularity for orthotropic functionals with nonstandard growth conditions. (arXiv:1810.03837v1 [math.AP]) Cache Translate Page 
Authors: Pierre Bousquet, Lorenzo Brasco We consider a model convex functional with orthotropic structure and superquadratic nonstandard growth conditions. We prove that bounded local minimizers are locally Lipschitz, with no restrictions on the ratio between the highest and the lowest growth rate. 
A class of univalent functions with real coefficients. (arXiv:1810.03839v1 [math.CV]) Cache Translate Page 
Authors: Milutin Obradovic, Nikola Tuneski In this paper we study class $\mathcal{S}^+$ of univalent functions $f$ such that $\frac{z}{f(z)}$ has real and positive coefficients. For such functions we give estimates of the FeketeSzeg\H{o} functional and sharp estimates of their initial coefficients and logarithmic coefficients. Also, we present necessary and sufficient conditions for $f\in \mathcal{S}^+$ to be starlike of order $1/2$. 
Heights and periodic points for oneparameter families of H\'enon maps. (arXiv:1810.03841v1 [math.NT]) Cache Translate Page 
Authors: LiangChung Hsia, Shu Kawaguchi In this paper we study arithmetic properties of a oneparameter family ${\mathbf H}$ of H\'enon maps over the affine line. Given a family of initial points ${\mathbf P}$ satisfying a natural condition, we show the height function $h_{{\mathbf P}}$ associated to ${\mathbf H}$ and ${\mathbf P}$ is the restriction of the height function associated to a semipositive adelically metrized line bundle on projective line. We then show various local properties of $h_{{\mathbf P}}$. Next we consider the set $\Sigma({\mathbf P})$ consisting of periodic parameter values, and study when $\Sigma({\mathbf P})$ is an infinite set or not. We also study unlikely intersections of periodic parameter values. 
A Convex Optimization Approach to Dynamic Programming in Continuous State and Action Spaces. (arXiv:1810.03847v1 [math.OC]) Cache Translate Page 
Authors: Insoon Yang A convex optimizationbased method is proposed to numerically solve dynamic programs in continuous state and action spaces. This approach using a discretization of the state space has the following salient features. First, by introducing an auxiliary optimization variable that assigns the contribution of each grid point, it does not require an interpolation in solving an associated Bellman equation and constructing a control policy. Second, the proposed method allows us to solve the Bellman equation with a desired level of precision via convex programming in the case of linear systems and convex costs. We can also construct a control policy of which performance converges to the optimum as the grid resolution becomes finer in this case. Third, when a nonlinear controlaffine system is considered, the convex optimization approach provides an approximate control policy with a provable suboptimality bound. Fourth, for general cases, the proposed convex formulation of dynamic programming operators can be simply modified as a nonconvex bilevel program, in which the inner problem is a linear program, without losing convergence properties. From our convex methods and analyses, we observe that convexity in dynamic programming deserves attention as it can play a critical role in obtaining a tractable and convergent numerical solution. 
Sharp convergence of nonlinear functionals of a class of Gaussian random fields. (arXiv:1810.03850v1 [math.PR]) Cache Translate Page 
Authors: Weijun Xu We present a selfcontained proof of a uniform bound on multipoint correlations of trigonometric functions of a class of Gaussian random fields. It corresponds to a special case of the general situation considered in [HairerXu], but with improved estimates. As a consequence, we establish convergence of a class of Gaussian fields composite with more general functions. These bounds and convergences are useful ingredients to establish weak universalities of several singular stochastic PDEs. 
Hardy's Inequality for Laguerre Expansions of Hermite Type. (arXiv:1810.03859v1 [math.CA]) Cache Translate Page 
Authors: Paweł Plewa Hardy's inequality for Laguerre expansions of Hermite type with the index $\al\in(\{1/2\}\cup[1/2,\infty))^d$ is proved in the multidimensional setting with the exponent $3d/4$. We also obtain the sharp analogue of Hardy's inequality with $L^1$ norm replacing $H^1$ norm at the expense of increasing the exponent by an arbitrarily small value. 
Application of CheegerGromov theory to the $l^2$cohomology of harmonic Higgs bundles over covering of finite volume complete manifolds. (arXiv:1810.03863v1 [math.CV]) Cache Translate Page 
Authors: Pascal Dingoyan, Georg Schumacher We review and apply CheegerGromov theory on $l^2$cohomology of infinite coverings of complete manifolds with bounded curvature and finite volume. Applications focus on $l^2$cohomology of (pullback of) harmonic Higgs bundles on some covering of Zariski open sets of K\"ahler manifolds. The $l^2$Dolbeault to DeRham spectral sequence of these Higgs bundles is seen to degenerate at $E_2$. 
ContractionBased Sparsification in NearLinear Time. (arXiv:1810.03865v1 [math.CO]) Cache Translate Page 
Authors: OnHei Solomon Lo, Jens M. Schmidt, Mikkel Thorup Recently, Kawarabayashi and Thorup presented the first deterministic edgeconnectivity recognition algorithm in nearlinear time. A crucial step in their algorithm uses the existence of vertex subsets of a simple graph $G$ on $n$ vertices whose contractions leave a multigraph with $\tilde{O}(n/\delta)$ vertices and $\tilde{O}(n)$ edges that preserves all nontrivial mincuts of $G$. We show a very simple argument that improves this contractionbased sparsifier by eliminating the polylogarithmic factors, that is, we show a contractionbased sparsification that leaves $O(n/\delta)$ vertices and $O(n)$ edges, preserves all nontrivial mincuts and can be computed in nearlinear time $\tilde{O}(E(G))$. As consequence, every simple graph has $O((n/\delta)^2)$ nontrivial mincuts. Our approach allows to represent all nontrivial mincuts of a graph by a cactus representation, whose cactus graph has $O(n/\delta)$ vertices. Moreover, this cactus representation can be derived directly from the standard cactus representation of all mincuts in linear time. 
A subFinsler problem on the Cartan group. (arXiv:1810.03869v1 [math.DG]) Cache Translate Page 
Authors: A. Ardentov, E. Le Donne, Yu. Sachkov In this paper we study a subFinsler geometric problem on the freenilpotent group of rank 2 and step 3. Such a group is also called Cartan group and has a natural structure of Carnot group, which we metrize considering the $\ell_\infty$ norm on its first layer. We adopt the point of view of timeoptimal control theory. We characterize extremal curves via Pontryagin maximum principle. We describe abnormal and singular arcs, and construct the bangbang flow. 
E. Cartan's attempt at bridgebuilding between Einstein and the Cosserats  or how translational curvature became to be known as {\em torsion}. (arXiv:1810.03872v1 [math.HO]) Cache Translate Page 
Authors: Erhard Scholz \'Elie Cartan's "g\'en\'eralisation de la notion de courbure" (1922) arose from a creative evaluation of the geometrical structures underlying both, Einstein's theory of gravity and the Cosserat brothers generalized theory of elasticity. In both theories groups operating in the infinitesimal played a crucial role. To judge from his publications in 192224, Cartan developed his concept of generalized spaces with the dual context of general relativity and nonstandard elasticity in mind. In this context it seemed natural to express the translational curvature of his new spaces by a rotational quantity (via a kind of Grassmann dualization). So Cartan called his translational curvature "torsion" and coupled it to a hypothetical rotational momentum of matter several years before spin was encountered in quantum mechanics. 
Spinor field equations and the problem of prescribing mean curvature on $S^2$. (arXiv:1810.03874v1 [math.DG]) Cache Translate Page 
Authors: Tian Xu Let $\Sigma$ denote the class of positive smooth functions on $S^2$, we show that there exists a $C^1$dense subset $\mathscr{Q}$ of $\Sigma$ such that each $Q\in\mathscr{Q}$ can be prescribed as the mean curvature of a conformal isometric embedding $S^2\hookrightarrow\mathbb{R}^3$. 
Linear Codes Associated to Skewsymmetric Determinantal Varieties. (arXiv:1810.03878v1 [math.CO]) Cache Translate Page 
Authors: Peter Beelen, Prasant Singh In this article we consider linear codes coming from skewsymmetric determinantal varieties, which are defined by the vanishing of minors of a certain fixed size in the space of skewsymmetric matrices. In odd characteristic, the minimum distances of these codes are determined and a recursive formula for the weight of a general codeword in these codes is given. 
Finite orthogonal groups and periodicity of links. (arXiv:1810.03881v1 [math.GT]) Cache Translate Page 
Authors: Maciej Borodzik, Przemysław Grabowski, Adam Król, Maria Marchwicka For a prime number $q\neq 2$ and $r>0$ we study, whether there exists an isometry of order $q^r$ acting on a free $\mathbb{Z}_{p^k}$module equipped with a scalar product. We investigate, whether there exists such an isometry with no nonzero fixed points. Both questions are completely answered in this paper if $p\neq 2,q$. As an application we refine Naik's criterion for periodicity of links in $S^3$. The periodicity criterion we obtain is effectively computable and gives concrete restrictions for periodicity of lowcrossing knots. 
Fat and Thin Emergent Geometries of Hermitian OneMatrix Models. (arXiv:1810.03883v1 [mathph]) Cache Translate Page 
Authors: Jian Zhou We use genus zero free energy functions of Hermitian matrix models to define spectral curves and their special deformations. They are special plane curves defined by formal power series with integral coefficients generalizing the Catalan numbers. This is done in two different versions, depending on two different genus expansions, and these two versions are in some sense dual to each other. 
POD model order reduction with spaceadapted snapshots for incompressible flows. (arXiv:1810.03892v1 [math.NA]) Cache Translate Page 
Authors: Carmen Gräßle, Michael Hinze, Jens Lang, Sebastian Ullmann We consider model order reduction based on proper orthogonal decomposition (POD) for unsteady incompressible NavierStokes problems, assuming that the snapshots are given by spatially adapted finite element solutions. We propose two approaches of deriving stable PODGalerkin reducedorder models for this context. In the first approach, the pressure term and the continuity equation are eliminated by imposing a weak incompressibility constraint with respect to a pressure reference space. In the second approach, we derive an infsup stable velocitypressure reducedorder model by enriching the velocity reduced space with supremizers computed on a velocity reference space. For problems with inhomogeneous Dirichlet conditions, we show how suitable lifting functions can be obtained from standard adaptive finite element computations. We provide a numerical comparison of the considered methods for a regularized liddriven cavity problem. 
The Hforce sets of the graphs satisfying the condition of Ore's theorem. (arXiv:1810.03894v1 [math.CO]) Cache Translate Page 
Authors: Xinhong Zhang, Ruijuan Li Let $G$ be a Hamiltonian graph with $n$ vertices. A nonempty vertex set $X\subseteq V(G)$ is called a Hamiltonian cycle enforcing set (in short, an $H$force set) of $G$ if every $X$cycle of $G$ (i.e., a cycle of $G$ containing all vertices of $X$) is a Hamiltonian cycle. For the graph $G$, $h(G)$ is the smallest cardinality of an $H$force set of $G$ and call it the $H$force number of $G$. Ore's theorem states that the graph $G$ is Hamiltonian if $d(u)+d(v)\geq n$ for every pair of nonadjacent vertices $u,v$ of $G$. In this paper, we study the $H$force sets of the graphs satisfying the condition of Ore's theorem, show that the $H$force number of these graphs is possibly $n$, or $n2$, or $\frac{n}{2}$ and give a classification of these graphs due to the $H$force number. 
Integervalued Polynomials, Pr\"ufer Domains and the Sacked Bases Property. (arXiv:1810.03898v1 [math.AC]) Cache Translate Page 
Authors: Jacques Boulanger, JeanLuc Chabert To study the question of whether every twodimensional Pr\"ufer domain possesses the stacked bases property, we consider the particular case of the Pr\"ufer domains formed by integervalued polynomials. The description of the spectrum of the rings of integervalued polynomials on a subset of a rankone valuation domain enables us to prove that they all possess the stacked bases property. We also consider integervalued polynomials on rings of integers of number fields and we reduce in this case the study of the stacked bases property to questions concerning $2\times 2$matrices. 
On balayage and Bbalayage operators. (arXiv:1810.03899v1 [math.CV]) Cache Translate Page 
Authors: Maria Nowak, Paweł Sobolewski Here we consider the balayage operator in the setting of $H^p$ spaces and its Bergman space version (Bbalayage) introduced by H. Wulan, J. Yang and K. Zhu \cite{WYZ}, and extend some known results on these operators. 
A note on the (toric) Newton spectrum of a polynomial. (arXiv:1810.03901v1 [math.AG]) Cache Translate Page 
Authors: Antoine Douai We express the Newton spectrum of a polynomial in terms of twisted degrees of cohomology groups of toric varieties. We also define the toric Newton spectrum, which has a natural orbifold flavor. 
Packing chromatic vertexcritical graphs. (arXiv:1810.03904v1 [math.CO]) Cache Translate Page 
Authors: Sandi Klavžar, Douglas F. Rall The packing chromatic number $\chi_{\rho}(G)$ of a graph $G$ is the smallest integer $k$ such that the vertex set of $G$ can be partitioned into sets $V_i$, $i\in [k]$, where vertices in $V_i$ are pairwise at distance at least $i+1$. Packing chromatic vertexcritical graphs, $\chi_{\rho}$critical for short, are introduced as the graphs $G$ for which $\chi_{\rho}(Gx) < \chi_{\rho}(G)$ holds for every vertex $x$ of $G$. If $\chi_{\rho}(G) = k$, then $G$ is $k$$\chi_{\rho}$critical. It is shown that if $G$ is $\chi_{\rho}$critical, then the set $\{\chi_{\rho}(G)  \chi_{\rho}(Gx):\ x\in V(G)\}$ can be almost arbitrary. The $3$$\chi_{\rho}$critical graphs are characterized, and $4$$\chi_{\rho}$critical graphs are characterized in the case when they contain a cycle of length at least $5$ which is not congruent to $0$ modulo $4$. It is shown that for every integer $k\ge 2$ there exists a $k$$\chi_{\rho}$critical tree and that a $k$$\chi_{\rho}$critical caterpillar exists if and only if $k\le 7$. Cartesian products are also considered and in particular it is proved that if $G$ and $H$ are connected, vertextransitive graphs, and ${\rm diam(G)} + {\rm diam}(H) \le \chi_{\rho}(G)$, then $G\,\square\, H$ is $\chi_{\rho}$critical. 
Conjectures about Traffic Light Queues. (arXiv:1810.03906v1 [math.HO]) Cache Translate Page 
Authors: Steven Finch, Guy Louchard In discrete time, \ellblocks of red lights are separated by \ellblocks of green lights. Cars arrive at random. The maximum line length of idle cars is fully understood for \ell = 1, but only partially for 2 <= \ell <=3. 
On a class of solutions to the generalized derivative Schr\"odinger equations II. (arXiv:1810.03907v1 [math.AP]) Cache Translate Page 
Authors: Felipe Linares, Gustavo Ponce, Gleison N. Santos In this note we shall continue our study on the initial value problem associated for the generalized derivative Schr\"odinger (gDNLS) equation $$ \partial_tu=i\partial_x^2u + \mu\,u^{\alpha}\partial_x u, \hskip10pt x,t\in\mathbb{R}, \hskip5pt 0<\alpha \le 1\;\; {\rm and}\;\; \mu=1. $$ Inspiring by CazenaveNaumkin's works we shall establish the local wellposedness for a class of data of arbitrary size in an appropriate weighted Sobolev space, thus removing the size restriction on the data required in our previous work. The main new tool in the proof is the homogeneous and inhomogeneous versions of the Kato smoothing effect for the linear Schr\"odinger equation with lower order variable coefficients established by KenigPonceVega. 
Projections of SDEs onto Submanifolds. (arXiv:1810.03923v1 [math.PR]) Cache Translate Page 
Authors: John Armstrong, Damiano Brigo, Emilio Rossi Ferrucci In [AB16] the authors define three projections of $\mathbb R^d$valued stochastic differential equations (SDEs) onto submanifolds: the Stratonovich, It\^ovector and It\^ojet projections. In this paper, after a brief survey of SDEs on manifolds, we begin by giving these projections a natural, coordinatefree description, each in terms of a specific representation of manifoldvalued SDEs. We proceed by deriving formulae for the three projections in ambient $\mathbb R^d$coordinates. We use these to show that the It\^ovector and It\^ojet projections satisfy respectively a weak and meansquare optimality criterion "for small t": this is achieved by solving constrained optimisation problems. These results confirm, but do not rely on the approach taken in [AB16], which is formulated in terms of weak and strong It\^oTaylor expansions. In the final section we exhibit examples showing how the three projections can differ, and explore alternative notions of optimality. 
Critical weak$L^{p}$ differentiability of singular integrals. (arXiv:1810.03924v1 [math.FA]) Cache Translate Page 
Authors: Luigi Ambrosio, Augusto C. Ponce, Rémy Rodiac We establish that for every function $u \in L^1_\mathrm{loc}(\Omega)$ whose distributional Laplacian $\Delta u$ is a signed Borel measure in an open set $\Omega$ in $\mathbb{R}^{N}$, the distributional gradient $\nabla u$ is differentiable almost everywhere in $\Omega$ with respect to the weak$L^{\frac{N}{N1}}$ Marcinkiewicz norm. We show in addition that the absolutely continuous part of $\Delta u$ with respect to the Lebesgue measure equals zero almost everywhere on the level sets $\{u = \alpha\}$ and $\{\nabla u = e\}$, for every $\alpha \in \mathbb{R}$ and $e \in \mathbb{R}^N$. Our proofs rely on an adaptation of Calder\'on and Zygmund's singularintegral estimates inspired by subsequent work by Haj\l asz. 
Harbourne constants under ramified morphisms. (arXiv:1810.03926v1 [math.AG]) Cache Translate Page 
Authors: Piotr Pokora, Joaquim Roé We describe the effect of ramified morphisms on Harbourne constants of reduced effective divisors. With this goal, we introduce the pullback of a weighted cluster of infinitely near points under a dominant morphism between surfaces, and describe some of its basic properties. As an application, we describe configurations of curves with transversal intersections and $H$index arbitarily close to \(25/7\simeq 3.571\), smaller than any previously known result. 
Parallelizable Algorithms for Optimization Problems with Orthogonality Constraints. (arXiv:1810.03930v1 [math.OC]) Cache Translate Page 
Authors: Bin Gao, Xin Liu, Yaxiang Yuan To construct a parallel approach for solving optimization problems with orthogonality constraints is usually regarded as an extremely difficult mission, due to the low scalability of the orthonormalization procedure. However, such demand is particularly huge in some application areas such as materials computation. In this paper, we propose a proximal linearized augmented Lagrangian algorithm (PLAM) for solving optimization problems with orthogonality constraints. Unlike the classical augmented Lagrangian methods, in our algorithm, the prime variables are updated by minimizing a proximal linearized approximation of the augmented Lagrangian function, meanwhile the dual variables are updated by a closedform expression which holds at any firstorder stationary point. The orthonormalization procedure is only invoked once at the last step of the above mentioned algorithm if highprecision feasibility is needed. Consequently, the main parts of the proposed algorithm can be parallelized naturally. We establish global subsequence convergence, worstcase complexity and local convergence rate for PLAM under some mild assumptions. To reduce the sensitivity of the penalty parameter, we put forward a modification of PLAM, which is called parallelizable columnwise block minimization of PLAM (PCAL). Numerical experiments in serial illustrate that the novel updating rule for the Lagrangian multipliers significantly accelerates the convergence of PLAM and makes it comparable with the existent feasible solvers for optimization problems with orthogonality constraints, and the performance of PCAL does not highly rely on the choice of the penalty parameter. Numerical experiments under parallel environment demonstrate that PCAL attains good performance and high scalability in solving discretized KohnSham total energy minimization problems. 
Distinguishing infinite graphs with bounded degrees. (arXiv:1810.03932v1 [math.CO]) Cache Translate Page 
Authors: Florian Lehner, Monika Pilśniak, Marcin Stawiski Call a colouring of a graph distinguishing, if the only colour preserving automorphism is the identity. A conjecture of Tucker states that if every automorphism of a graph $G$ moves infinitely many vertices, then there is a distinguishing $2$colouring. We confirm this conjecture for graphs with maximum degree $\Delta \leq 5$. Furthermore, using similar techniques we show that if an infinite graph has maximum degree $\Delta \geq 3$, then it admits a distinguishing colouring with $\Delta  1$ colours. This bound is sharp. 
Existence and uniqueness of the pgeneralized modified error function. (arXiv:1810.03934v1 [math.CA]) Cache Translate Page 
Authors: Julieta Bollati, María F. Natale, José A. Semitiel, Domingo A. Tarzia In this paper, the pgeneralized modified error function is defined as the solution to a nonlinear ordinary differential problem of second order with a Robin type condition at $x=0$. Existence and uniqueness of a nonnegative analytic solution is proved by using a fixed point strategy. It is shown that the pgeneralized modified error function converges to the pmodified error function defined as the solution to a similar problem with a Dirichlet condition at x=0. In both problems, for p=1, the generalized modified error function and the modified error function, studied recently in literature, are recovered 
The spins homogeneous central spin model: exact spectrum and dynamics. (arXiv:1810.03937v1 [quantph]) Cache Translate Page 
Authors: Rafael I. Nepomechie, XiWen Guan We consider the problem of a central spin with arbitrary spin s that interacts pairwise and uniformly with a bath of N spins with s=1/2. We present two approaches for determining the exact spectrum of this model, one based on properties of SU(2), and the other based on integrability. We also analyze the exact time evolution of a spin coherent state, and compute the time evolution of various quantities of physical interest, including the entanglement entropy, spin polarization and Loschmidt echo. 
Gradient flows and Evolution Variational Inequalities in metric spaces. I: structural properties. (arXiv:1810.03939v1 [math.FA]) Cache Translate Page 
Authors: Matteo Muratori, Giuseppe Savaré This is the first of a series of papers devoted to a thorough analysis of the class of gradient flows in a metric space $(X,\mathsf{d})$ that can be characterized by Evolution Variational Inequalities. We present new results concerning the structural properties of solutions to the $\mathrm{EVI}$ formulation, such as contraction, regularity, asymptotic expansion, precise energy identity, stability, asymptotic behaviour and their link with the geodesic convexity of the driving functional. Under the crucial assumption of the existence of an $\mathrm{EVI}$ gradient flow, we will also prove two main results: the equivalence with the De Giorgi variational characterization of curves of maximal slope and the convergence of the Minimizing MovementJKO scheme to the $\mathrm{EVI}$ gradient flow, with an explicit and uniform error estimate of order $1/2$ with respect to the step size, independent of any geometric hypothesis (such as upper or lower curvature bounds) on $\mathsf{d}$. In order to avoid any compactness assumption, we will also introduce a suitable relaxation of the Minimizing Movement algorithm obtained by the Ekeland variational principle, and we will prove its uniform convergence as well. 
Hochschild cohomology ring for selfinjective algebras of tree class $E_6$. II. (arXiv:1810.03950v1 [math.KT]) Cache Translate Page 
Authors: Mariya Kachalova We describe the Hochschild cohomology ring for a family of selfinjective algebras of tree class $E_6$ in terms of generators and relations. Together with the results of the previous paper, this gives a complete description of the Hochschild cohomology ring for a selfinjective algebras of tree class $E_6$. 
Fractional Diffusion Maps. (arXiv:1810.03952v1 [math.CA]) Cache Translate Page 
Authors: Harbir Antil, Tyrus Berry, John Harlim In locally compact, separable metric measure spaces, heat kernels can be classified as either local (having exponential decay) or nonlocal (having polynomial decay). This dichotomy of heat kernels gives rise to operators that include (but are not restricted to) the generators of the classical Laplacian associated to Brownian processes as well as the fractional Laplacian associated with $\beta$stable L\'evy processes. Given embedded data that lie on or close to a compact Riemannian manifold, there is a practical difficulty in realizing this theory directly since these kernels are defined as functions of geodesic distance which is not directly accessible unless if the manifold (i.e., the embedding function or the Riemannian metric) is completely specified. This paper develops numerical methods to estimate the semigroups and generators corresponding to these heat kernels using embedded data that lie on or close to a compact Riemannian manifold (the estimators of the local kernels are restricted to Neumann functions for manifold with boundary). For local kernels, the method is basically a version of the diffusion maps algorithm which estimates the LaplaceBeltrami operator on compact Riemannian manifolds. For nonlocal heat kernels, the diffusion maps algorithm must be modified in order to estimate fractional Laplacian operators using polynomial decaying kernels. In this case, the graph distance is used to approximate the geodesic distance with appropriate error bounds. Numerical experiments supporting these theoretical results are presented. For manifolds with boundary, numerical results suggest that the proposed fractional diffusion maps framework implemented with nonlocal kernels approximates the regional fractional Laplacian. 
ParaHermitian Geometry, Dualities and Generalized Flux Backgrounds. (arXiv:1810.03953v1 [hepth]) Cache Translate Page 
Authors: Vincenzo E. Marotta, Richard J. Szabo We survey physical models which capture the main concepts of double field theory on paraHermitian manifolds. We show that the geometric theory of Lagrangian and Hamiltonian dynamical systems is an instance of paraKahler geometry which extends to a natural example of a Born geometry. The corresponding phase space geometry belongs to the family of natural almost paraKahler structures which we construct explicitly as deformations of the canonical paraKahler structure by nonlinear connections. We extend this framework to a class of nonLagrangian dynamical systems which naturally encodes the notion of fluxes in paraHermitian geometry. In this case we describe the emergence of fluxes in terms of weak integrability defined by the Dbracket, and we extend the construction to arbitrary cotangent bundles where we reproduce the standard generalized fluxes of double field theory. We also describe the paraHermitian geometry of Drinfel'd doubles, which gives an explicit illustration of the interplay between fluxes, Dbrackets and different polarizations. The leftinvariant paraHermitian structure on a Drinfel'd double in a Manin triple polarization descends to a doubled twisted torus, which we use to illustrate how changes of polarizations give rise to different fluxes and string backgrounds in paraHermitian geometry. 
Joining dessins together. (arXiv:1810.03960v1 [math.GR]) Cache Translate Page 
Authors: Gareth A. Jones An operation of joining coset diagrams for a given group, introduced by Higman and developed by Conder in connection with Hurwitz groups, is reinterpreted and generalised as a connected sum operation on dessins d'enfants of a given type. A number of examples are given. 
Intelligent Reflecting Surface Enhanced Wireless Network via Joint Active and Passive Beamforming. (arXiv:1810.03961v1 [cs.IT]) Cache Translate Page 
Authors: Qingqing Wu, Rui Zhang Intelligent reflecting surface (IRS) is envisioned to be a new and revolutionizing technology for achieving spectrum and energy efficient wireless communication networks costeffectively in the future. Specifically, an IRS consists of a large number of lowcost passive elements each reflecting the incident signal with a certain phase shift to collaboratively achieve beamforming and/or interference suppression at designated receivers. In this paper, we study an IRSaided multiuser multipleinput singleoutput (MISO) wireless system where one IRS is deployed to assist in the communication from a multi antenna access point (AP) to multiple singleantenna users. As such, each user receives the superposed signals from the AP as well as the IRS via its reflection. We aim to minimize the total transmit power at the AP by jointly optimizing the transmit beamforming by active antenna array at the AP and reflect beamforming by passive phase shifters at the IRS, subject to users' individual signaltointerferenceplusnoise ratio (SINR) constraints. However, the formulated problem is nonconvex and difficult to be solved optimally. 
A necessary and sufficient condition for the stability of linear Hamiltonian systems with periodic coefficients. (arXiv:1810.03971v1 [mathph]) Cache Translate Page 
Authors: Hong Qin Linear Hamiltonian systems with timedependent coefficients are of importance to nonlinear Hamiltonian systems, accelerator physics, plasma physics, and quantum physics. It is shown that the solution map of a linear Hamiltonian system with timedependent coefficients can be parameterized by an envelope matrix $w(t)$, which has a clear physical meaning and satisfies a nonlinear envelope matrix equation. It is proved that a linear Hamiltonian system with periodic coefficients is stable iff the envelope matrix equation admits a solution with periodic $\sqrt{w^{\dagger}w}$ and a suitable initial condition. The mathematical devices utilized in this theoretical development with significant physical implications are timedependent canonical transformations, normal forms for stable symplectic matrices, and horizontal polar decomposition of symplectic matrices. These tools systematically decompose the dynamics of linear Hamiltonian systems with timedependent coefficients, and are expected to be effective in other studies as well, such as those on quantum algorithms for classical Hamiltonian systems. 
Collective evolution of weights in wide neural networks. (arXiv:1810.03974v1 [cs.NE]) Cache Translate Page 
Authors: Dmitry Yarotsky We derive a nonlinear integrodifferential transport equation describing collective evolution of weights under gradient descent in largewidth neuralnetworklike models. We characterize stationary points of the evolution and analyze several scenarios where the transport equation can be solved approximately. We test our general method in the special case of linear freeknot splines, and find good agreement between theory and experiment in observations of global optima, stability of stationary points, and convergence rates. 
Explicit optimallength locally repairable codes of distance 5. (arXiv:1810.03980v1 [cs.IT]) Cache Translate Page 
Authors: Allison Beemer, Ryan Coatney, Venkatesan Guruswami, Hiram H. López, Fernando Piñero Locally repairable codes (LRCs) have received significant recent attention as a method of designing data storage systems robust to server failure. Optimal LRCs offer the ideal tradeoff between minimum distance and locality, a measure of the cost of repairing a single codeword symbol. For optimal LRCs with minimum distance greater than or equal to 5, block length is bounded by a polynomial function of alphabet size. In this paper, we give explicit constructions of optimallength (in terms of alphabet size), optimal LRCs with minimum distance equal to 5. 
(Di)graph decompositions and magic type labelings: a dual relation. (arXiv:1810.03994v1 [math.CO]) Cache Translate Page 
Authors: S. C. López, F. A. MuntanerBatle, M. Prabu A graph $G$ is called edgemagic if there is a bijective function $f$ from the set of vertices and edges to the set $\{1,2,\ldots,V(G)+E(G)\}$ such that the sum $f(x)+f(xy)+f(y)$ for any $xy$ in $E(G)$ is constant. Such a function is called an edgemagic labelling of G and the constant is called the valence of $f$. An edgemagic labelling with the extra property that $f(V(G))= \{1,2,\ldots,V(G)\}$ is called super edgemagic. In this paper, we establish a relationship between the valences of (super) edgemagic labelings of certain types of bipartite graphs and the existence of a particular type of decompositions of such graphs. 
Brezis pseudomonotonicity is strictly weaker than KyFan hemicontinuity. (arXiv:1810.03995v1 [math.FA]) Cache Translate Page 
Authors: Daniel Steck In 1968, H. Brezis introduced a notion of operator pseudomonotonicity which provides a unified approach to monotone and nonmonotone variational inequalities (VIs). A closely related notion is that of KyFan hemicontinuity, a continuity property which arises if the famous KyFan minimax inequality is applied to the VI framework. It is clear from the corresponding definitions that KyFan hemicontinuity implies Brezis pseudomonotonicity, but quite surprisingly, a recent publication by Sadeqi and Paydar (J. Optim. Theory Appl., 165(2):344358, 2015) claims the equivalence of the two properties. The purpose of the present note is to show that this equivalence is false; this is achieved by providing a concrete example of a nonlinear operator which is Brezis pseudomonotone but not KyFan hemicontinuous. 
The floatingbody problem: an integrodifferential equation without irregular frequencies. (arXiv:1810.03998v1 [mathph]) Cache Translate Page 
Authors: Nikolay Kuznetsov The linear boundary value problem under consideration describes timeharmonic motion of water in a horizontal threedimensional layer of constant depth in the presence of an obstacle adjacent to the upper side of the layer (floating body). This problem for a complexvalued harmonic function involves mixed boundary conditions and a radiation condition at infinity. Under rather general geometric assumptions the existence of a unique solution is proved for all values of the nonnegative problem's parameter related to the frequency of oscillations. The proof is based on the representation of solution as a sum of simple and doublelayer potentials with densities distributed over the obstacle's surface and reducing the problem to an indefinite integrodifferential equation. The latter is shown to be soluble for all continuous righthand side terms for which purpose S.~G. Krein's theorem is used. 
Strong geodetic number of complete bipartite graphs, crown graphs and hypercubes. (arXiv:1810.04004v1 [math.CO]) Cache Translate Page 
Authors: Valentin Gledel, Vesna Iršič The strong geodetic number, $\text{sg}(G),$ of a graph $G$ is the smallest number of vertices such that by fixing one geodesic between each pair of selected vertices, all vertices of the graph are covered. In this paper, the study of the strong geodetic number of complete bipartite graphs is continued. The formula for $\text{sg}(K_{n,m})$ is given, as well as a formula for the crown graphs $S_n^0$. Bounds on $\text{sg}(Q_n)$ are also discussed. 
Spatial moments for highdimensional critical contact process, oriented percolation and lattice trees. (arXiv:1810.04011v1 [math.PR]) Cache Translate Page 
Authors: Akira Sakai, Gordon Slade Recently, Holmes and Perkins identified conditions which ensure that for a class of critical lattice models the scaling limit of the range is the range of superBrownian motion. One of their conditions is an estimate on a spatial moment of order higher than four, which they verified for the sixth moment for spreadout lattice trees in dimensions $d>8$. Chen and Sakai have proved the required moment estimate for spreadout critical oriented percolation in dimensions $d+1>4+1$. We prove estimates on all moments for the spreadout critical contact process in dimensions $d>4$, which in particular fulfills the spatial moment condition of Holmes and Perkins. Our method of proof is relatively simple, and, as we show, it applies also to oriented percolation and lattice trees. 
Algorithmic construction of representations of finite solvable groups. (arXiv:1810.04015v1 [math.RT]) Cache Translate Page 
Authors: Soham Swadhin Pradhan The dominant theme of this thesis is the construction of matrix representations of finite solvable groups using a suitable system of generators. For a finite solvable group $G$ of order $N = p_{1}p_{2}\dots p_{n}$, where $p_{i}$'s are primes, there always exists a subnormal series: $\langle {e} \rangle = G_{o} < G_{1} < \dots < G_{n} = G$ such that $G_{i}/G_{i1}$ is isomorphic to a cyclic group of order $p_{i}$, $i = 1,2,\dots,n$. Associated with this series, there exists a system of generators consisting $n$ elements $x_{1}, x_{2}, \dots, x_{n}$ (say), such that $G_{i} = \langle x_{1}, x_{2}, \dots, x_{i} \rangle$, $i = 1,2,\dots,n$, which is called a "long system of generators". In terms of this system of generators and conjugacy class sum of $x_{i}$ in $G_{i}$, $i = 1,2, \dots, n$, we present an algorithm for constructing the irreducible matrix representations of $G$ over $\mathbb{C}$ within the group algebra $\mathbb{C}[G]$. This algorithmic construction needs the knowledge of primitive central idempotents, a well defined set of primitive (not necessarily central) idempotents and the "diagonal subalgebra" of $\mathbb{C}[G]$. In terms of this system of generators, we give simple expressions for the primitive central idempotents, a well defined system of primitive (not necessarily central) idempotents and a convenient set of generators of the "diagonal subalgebra" of $\mathbb{C}[G]$. For a finite abelian group, we present an algorithm for constructing the inequivalent irreducible matrix representations over a field of characteristic $0$ or prime to the order of the group and a systematic way of computing the primitive central idempotents of the group algebra. Besides that, we give simple expressions of the primitive central idempotents of the rational group algebra of a finite abelian group using a "long presentation" and it's Wedderburn decomposition. 
Rank growth of elliptic curves in nonabelian extensions. (arXiv:1810.04018v1 [math.NT]) Cache Translate Page 
Authors: Robert J. Lemke Oliver, Frank Thorne Given an elliptic curve $E/\mathbb{Q}$, it is a conjecture of Goldfeld that asymptotically half of its quadratic twists will have rank zero and half will have rank one. Nevertheless, higher rank twists do occur: subject to the parity conjecture, Gouv\^ea and Mazur constructed $X^{1/2\epsilon}$ twists by discriminants up to $X$ with rank at least two. For any $d\geq 3$, we build on their work to consider twists by degree $d$ $S_d$extensions of $\mathbb{Q}$ with discriminant up to $X$. We prove that there are at least $X^{c_d\epsilon}$ such twists with positive rank, where $c_d$ is a positive constant that tends to $1/4$ as $d\to\infty$. Moreover, subject to a suitable parity conjecture, we obtain the same result for twists with rank at least two. 
Boundedness of varieties of Fano type with alphainvariants and volumes bounded below. (arXiv:1810.04019v1 [math.AG]) Cache Translate Page 
Authors: Weichung Chen We show that fixed dimensional klt weak Fano pairs with alphainvariants and volumes bounded away from $0$ and the coefficients of the boundaries belong to the set of hyperstandard multiplicities $\Phi(\mathscr{R})$ associated to a fixed finite set $\mathscr{R}$ form a bounded family. We also show $\alpha(X,B)^{d1}\mathrm{vol}((K_X+B))$ are bounded from above for all klt weak Fano pairs $(X,B)$ of a fixed dimension $d$. 
Testing exchangeability with martingale for changepoint detection. (arXiv:1810.04022v1 [math.ST]) Cache Translate Page 
Authors: Liang Dai, MohamedRafik Bouguelia This work studies the exchangeability test for a random sequence through a martingale based approach. Its main contributions include: 1) an additive martingale is introduced, which is more amenable for designing exchangeability tests by exploiting the HoeffdingAzuma lemma; 2) different betting functions for constructing the additive martingale are studied. By choosing the underlying probability density function of pvalues as betting function, it can be shown that, when changepoint appears, a satisfying tradeoff between the smoothness and expected onestep increment of the martingale sequence can be obtained. An online algorithm based on Beta distribution parametrization for constructing this betting function is discussed as well. 
The DiskBased Origami Theorem and a Glimpse of Holography for Traversing Flows. (arXiv:1810.04023v1 [math.GT]) Cache Translate Page 
Authors: Gabriel Katz This paper describes a mechanism by which a traversally generic flow $v$ on a smooth connected manifold $X$ with boundary produces a compact $CW$complex $\mathcal T(v)$, which is homotopy equivalent to $X$ and such that $X$ embeds in $\mathcal T(v)\times \mathbf R$. The $CW$complex $\mathcal T(v)$ captures some residual information about the smooth structure on $X$ (such as the stable tangent bundle of $X$). Moreover, $\mathcal T(v)$ is obtained from a simplicial \emph{origami map} $O: D^n \to \mathcal T(v)$, whose source space is a disk $D^n \subset \partial X$ of dimension $n = \dim(X) 1$. The fibers of $O$ have the cardinality $(n+1)$ at most. The knowledge of the map $O$, together with the restriction to $D^n$ of a Lyapunov function $f:X \to \mathbf R$ for $v$, make it possible to reconstruct the topological type of the pair $(X, \mathcal F(v))$, were $\mathcal F(v)$ is the $1$foliation, generated by $v$. This fact motivates the use of "holography" in the title. 
On Characteristics of Hyperfields Obtained as Quotients of Finite Fields. (arXiv:1810.04035v1 [math.RA]) Cache Translate Page 
Authors: Antonio Frigo, Hahn Lheem, Dylan Liu Let $p$ be an odd prime. We show that there exists an explicit form for the characteristic of the hyperfield $\mathbb{F}_p/G$ where $G=1,2,3,4$. Finally, we prove a general form of the characteristic for hyperfields where $G$ is prime. 
Gr\"obner bases and dimension formulas for ternary partially associative operads. (arXiv:1810.04042v1 [math.RA]) Cache Translate Page 
Authors: Fatemeh Bagherzadeh, Murray Bremner Dotsenko and Vallette discovered an extension to nonsymmetric operads of Buchberger's algorithm for Gr\"obner bases of polynomial ideals. In the free nonsymmetric operad with one ternary operation $({\ast}{\ast}{\ast})$, we compute a Gr\"obner basis for the ideal generated by partial associativity $((abc)de) + (a(bcd)e) + (ab(cde)$. In the category of $\mathbb{Z}$graded vector spaces with Koszul signs, the (homological) degree of $({\ast}{\ast}{\ast})$ may be even or odd. We use the Gr\"obner bases to calculate the dimension formulas for these operads. 
Algebraic deformation quantization of Leibniz algebras. (arXiv:1810.04050v1 [math.AT]) Cache Translate Page 
Authors: Charles Alexandre, Martin Bordemann, Salim Riviere (LMJL), Friedrich Wagemann (LMJL) In this paper we focus on a certain selfdistributive multiplication on coalgebras, which leads to socalled rack bialgebra. We construct canonical rack bialgebras (some kind of enveloping algebras) for any Leibniz algebra. Our motivation is deformation quantization of Leibniz algebras in the sense of [6]. Namely, the canonical rack bialgebras we have constructed for any Leibniz algebra lead to a simple explicit formula of the rackstarproduct on the dual of a Leibniz algebra recently constructed by Dherin and Wagemann in [6]. We clarify this framework setting up a general deformation theory for rack bialgebras and show that the rackstarproduct turns out to be a deformation of the trivial rack bialgebra product. 
$p$filtrations of dual Weyl modules. (arXiv:1810.04052v1 [math.RT]) Cache Translate Page 
Authors: Henning Haahr Andersen Let $G$ be a semisimple algebraic group over a field of characteristic $p > 0$. We prove that the dual Weyl modules for $G$ all have $p$filtrations when $p$ is not too small. Moreover, we give applications of this theorem to $p^n$filtrations for $n > 1$, to modules containing the Steinberg module as a tensor factor, and to the Donkin conjecture on modules having $p$filtrations. 
Exact solution for a twophase Stefan problem with variable latent heat and a convective boundary condition at the fixed face. (arXiv:1810.04054v1 [mathph]) Cache Translate Page 
Authors: Julieta Bollati, Domingo A. Tarzia Recently it was obtained in [Tarzia, Thermal Sci. 21A (2017) 111] for the classical twophase Lam\'eClapeyronStefan problem an equivalence between the temperature and convective boundary conditions at the fixed face under a certain restriction. Motivated by this article we study the twophase Stefan problem for a semiinfinite material with a latent heat defined as a power function of the position and a convective boundary condition at the fixed face. An exact solution is constructed using Kummer functions in case that an inequality for the convective transfer coefficient is satisfied generalizing recent works for the corresponding onephase free boundary problem. We also consider the limit to our problem when that coefficient goes to infinity obtaining a new free boundary problem, which has been recently studied in [ZhouShiZhou, J. Engng. Math. (2017) DOI 10.1007/s106650179921y]. 
Testing hyperbolicity of real polynomials. (arXiv:1810.04055v1 [math.AG]) Cache Translate Page 
Authors: Papri Dey, Daniel Plaumann Hyperbolic polynomials are real multivariate polynomials with only real roots along a fixed pencil of lines. Testing whether a given polynomial is hyperbolic is a difficult task in general. We examine different ways of translating hyperbolicity into nonnegativity conditions, which can then be tested via sumofsquares relaxations. 
Finitesize corrections for the attractive meanfield monomerdimer model. (arXiv:1810.04057v1 [mathph]) Cache Translate Page 
Authors: Diego Alberici, Pierluigi Contucci, Rachele Luzi, Cecilia Vernia The finite volume correction for a meanfield monomerdimer system with an attractive interaction are computed for the pressure density, the monomer density and the susceptibility. The results are obtained by introducing a twodimensional integral representation for the partition function decoupling both the hardcore interaction and the attractive one. The nexttoleading terms for each of the mentioned quantities is explicitly derived as well as the value of their sign that is related to their monotonic convergence in the thermodynamic limit. 
Dynamic Optimization with Convergence Guarantees. (arXiv:1810.04059v1 [math.OC]) Cache Translate Page 
Authors: Martin P. Neuenhofen, Eric C. Kerrigan We present a novel direct transcription method to solve optimization problems subject to nonlinear differential and inequality constraints. In order to provide numerical convergence guarantees, it is sufficient for the functions that define the problem to satisfy boundedness and Lipschitz conditions. Our assumptions are the most general to date; we do not require uniqueness, differentiability or constraint qualifications to hold and we avoid the use of Lagrange multipliers. Our approach differs fundamentally from stateoftheart methods based on collocation. We follow a leastsquares approach to finding approximate solutions to the differential equations. The objective is augmented with the integral of a quadratic penalty on the differential equation residual and a logarithmic barrier for the inequality constraints, as well as a quadratic penalty on the point constraint residual. The resulting unconstrained infinitedimensional optimization problem is discretized using finite elements, while integrals are replaced by quadrature approximations if they cannot be evaluated analytically. Order of convergence results are derived, even if components of solutions are discontinuous. 
Simultaneous extension of two bounded operators between Hilbert spaces. (arXiv:1810.04062v1 [math.FA]) Cache Translate Page 
Authors: Marko S. Djikić, Jovana Nikolov Radenković The paper is concerned with the following question: if $A$ and $B$ are two bounded operators between Hilbert spaces $\mathcal{H}$ and $\mathcal{K}$, and $\mathcal{M}$ and $\mathcal{N}$ are two closed subspaces in $\mathcal{H}$, when will there exist a bounded operator $C:\mathcal{H}\to\mathcal{K}$ which coincides with $A$ on $\mathcal{M}$ and with $B$ on $\mathcal{N}$ simultaneously? Besides answering this and some related questions, we also wish to emphasize the role played by the class of socalled semiclosed operators and the unbounded MoorePenrose inverse in this work. Finally, we will relate our results to several wellknown concepts, such as the operator equation $XA=B$ and the theorem of Douglas, Halmos' two projections theorem, and Drazin's star partial order. 
A linear algorithm for computing Polynomial Dynamical System. (arXiv:1810.04069v1 [qbio.MN]) Cache Translate Page 
Authors: Ines AbdeljaouedTej, Alia BenKahla, Ghassen Haddad, Annick Valibouze Computation biology helps to understand all processes in organisms from interaction of molecules to complex functions of whole organs. Therefore, there is a need for mathematical methods and models that deliver logical explanations in a reasonable time. For the last few years there has been a growing interest in biological theory connected to finite fields: the algebraic modeling tools used up to now are based on Gr\"obner bases or Boolean group. Let $n$ variables representing gene products, changing over the time on $p$ values. A Polynomial dynamical system (PDS) is a function which has several components, each one is a polynom with $n$ variables and coefficient in the finite field $Z/pZ$ that model the evolution of gene products. We propose herein a method using algebraic separators, which are special polynomials abundantly studied in effective Galois theory. This approach avoids heavy calculations and provides a first Polynomial model in linear time. 
PrimalDual Reduced Basis Methods for Convex Minimization Variational Problems: Robust True Solution A Posteriori Error Certification and Adaptive Greedy Algorithms. (arXiv:1810.04073v1 [math.NA]) Cache Translate Page 
Authors: Shun Zhang The a posteriori error estimate and greedy algorithms play central roles in reduced basis method (RBM). A classic RBM uses residual error estimator. The error is estimated in some parameter independent genetic norm and an estimation of the stability constant is also needed. This type of error estimate is not robust with respect to the parameterdependent energy norm, and it measures only the difference between the RB solution and an unrealistic "truth" finite element solution. The choice of the RB error tolerance is often heuristic and will cause under or overcomputing. The finite element solutions for RB snapshots are often computed on a nonoptimal mesh, or only computed on a mesh which is good for some parameters in the RB parameter set but not for others. With the parametric reactiondiffusion and diffusion equations as examples, for a class of parametric convex minimization variational problems, we develop primaldual reduced basis methods (PDRBM) with robust true error certifications and adaptive greedy algorithms to overcome the shortcomings of the classic a posteriori error estimator and greedy algorithms in RBM. For convex minimization variational problems, the duality gap between the primal and dual functionals is a perfect a posteriori error estimator. This primal dual error estimator is robust with respect to the parameters of the problem, and it can be used for both the mesh refinements of finite element methods and the true RB error certification. We develop three versions of adaptive greedy algorithms to balance the finite element error, the exact reduced basis error, and the adaptive mesh refinements. Extensive numerical tests are performed to test the PDRBM for three greedy algorithms. 
MMStype problems for Johnson scheme. (arXiv:1810.04075v1 [math.CO]) Cache Translate Page 
Authors: I.Yu.Mogilnykh, K.V.Vorob'ev, A.A.Valyuzhenich In the current work we consider the minimization problems for the number of nonzero or negative values of vectors from the first and second eigenspaces of the Johnson scheme respectively. The topic is a meeting point for generalizations of the ManikamMikl\'{o}sSinghi conjecture proven by Blinovski and the minimum support problem for the eigenspaces of the Johnson graph, asymptotically solved by authors in a recent paper. 
Global wellposedness for fractional Hartree equation on modulation spaces and Fourier algebra. (arXiv:1810.04076v1 [math.AP]) Cache Translate Page 
Authors: Divyang G. Bhimani We study the Cauchy problem for fractional Schr\"odinger equation with cubic convolution nonlinearity ($i\partial_t u  (\Delta)^{\frac{\alpha}{2}}u\pm (K\ast u^2) u =0$) with Cauchy data in the modulation spaces $M^{p,q}(\mathbb R^{d}).$ For $K(x)= x^{\gamma}$ $ (0< \gamma< \text{min} \{\alpha, d/2\})$, we establish global wellposedness results in $M^{p,q}(\mathbb R^{d}) (1\leq p \leq 2, 1\leq q < 2d/ (d+\gamma))$ when $\alpha =2, d\geq 1$, and with radial Cauchy data when $d\geq 2, \frac{2d}{2d1}< \alpha < 2. $ Similar results are proven in Fourier algebra $\mathcal{F}L^1(\mathbb R^d) \cap L^2(\mathbb R^d).$ 
MoorePenrose Inverse of some Linear Maps on InfiniteDimensional Vector Spaces. (arXiv:1810.04082v1 [math.RA]) Cache Translate Page 
Authors: V. Cabezas Sánchez, F. Pablos Romo The aim of this work is to characterize linear maps of inner pro\duct infinitedimensional vector spaces where the MoorePenrose inverse exists. This MP inverse generalizes the wellknown MoorePenrose inverse of a matrix $A\in \text{Mat}_{n\times m} ({\mathbb C})$. Moreover, a method for the computation of the MP inverse of some endomorphisms on infinitedimensional vector spaces is given. As an application, we study the least norm solution of an infinite linear system from the MoorePenrose inverse offered. 
A note on O. Frolkina's paper "Pairwise disjoint Moebius bands in space". (arXiv:1810.04089v1 [math.GT]) Cache Translate Page 
Authors: Sergey A. Melikhov We note a simple algebraic proof of Frolkina's result that $\mathbb R^3$ does not contain uncountably many pairwise disjoint copies of the M\"obius band, and of a similar result in higher dimensions. 
Statistical Convergence of the EM Algorithm on Gaussian Mixture Models. (arXiv:1810.04090v1 [math.ST]) Cache Translate Page 
Authors: Ruofei Zhao, Yuanzhi Li, Yuekai Sun We study the convergence behavior of the Expectation Maximization (EM) algorithm on Gaussian mixture models with an arbitrary number of mixture components and mixing weights. We show that as long as the means of the components are separated by at least $\Omega(\sqrt{\min\{M,d\}})$, where $M$ is the number of components and $d$ is the dimension, the EM algorithm converges locally to the global optimum of the loglikelihood. Further, we show that the convergence rate is linear and characterize the size of the basin of attraction to the global optimum. 
On coupled systems of PDEs with unbounded coefficients. (arXiv:1810.04097v1 [math.AP]) Cache Translate Page 
Authors: Luciana Angiuli, Luca Lorenzi We study the Cauchy problem associated to parabolic systems of the form $D_t\boldsymbol{u}=\boldsymbol{\mathcal A}(t)\boldsymbol u$ in $C_b(\mathbb{R}^d;\mathbb{R}^m)$, the space of continuous and bounded functions $\boldsymbol{f}:\mathbb{R}^d\to\mathbb{R}^m$. Here $\boldsymbol{\mathcal A}(t)$ is a weakly coupled elliptic operator acting on vectorvalued functions, having diffusion and drift coefficients which change from equation to equation. We prove existence and uniqueness of the evolution operator $\boldsymbol{G}(t,s)$ which governs the problem in $C_b(\mathbb{R}^d;\mathbb{R}^m)$ proving its positivity. The compactness of $\boldsymbol{G}(t,s)$ in $C_b(\mathbb{R}^d;\mathbb{R}^m)$ and some of its consequences are also studied. Finally, we extend the evolution operator $\boldsymbol{G}(t,s)$ to the $L^p$ spaces related to the so called "evolution system of measures" and we provide conditions for the compactness of $\boldsymbol{G}(t,s)$ in this setting. 
The algebraic area of closed lattice random walks. (arXiv:1810.04098v1 [mathph]) Cache Translate Page 
Authors: Stephane Ouvry, Shuang Wu We propose a formula for the enumeration of closed lattice random walks of length $n$ enclosing a given algebraic area. The information is contained in the Kreft coefficients which encode, in the commensurate case, the Hofstadter secular equation for a quantum particle hopping on a lattice coupled to a perpendicular magnetic field. The algebraic area enumeration is possible because it is split in $2^{n/21}$ pieces, each tractable in terms of explicit combinatorial expressions. 
Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD. (arXiv:1810.04100v1 [math.OC]) Cache Translate Page 
Authors: Marten van Dijk, Lam M. Nguyen, Phuong Ha Nguyen, Dzung T. Phan We study Stochastic Gradient Descent (SGD) with diminishing step sizes for convex objective functions. We introduce a definitional framework and theory that defines and characterizes a core property, called curvature, of convex objective functions. In terms of curvature we can derive a new inequality that can be used to compute an optimal sequence of diminishing step sizes by solving a differential equation. Our exact solutions confirm known results in literature and allows us to fully characterize a new regularizer with its corresponding expected convergence rates. 
Mean values and moments of arithmetic functions over number fields. (arXiv:1810.04104v1 [math.NT]) Cache Translate Page 
Authors: Jaitra Chattopadhyay, Pranendu Darbar For an odd integer $d \geq 1$ and a finite Galois extension $K/\mathbb{Q}$ of degree $d$, G. L\"{u} and Z. Yang obtained in \cite{lu3} an asymptotic formula for the mean values of the divisor function for $K$ over square integers. In this article, we obtain the same for finitely many number fields of odd degree and pairwise coprime discriminants together with the moment of the error term arising here, following the method adopted by S. Shi in \cite{shi}. We also define the sum of divisor function over number fields and find the asymptotic behaviour of the summatory function of two number fields taken together. 
Performance of distributed algorithms for QoS in wireless ad hoc networks: arbitrary networks under the primary interference model, and line networks under the protocol interference model. (arXiv:1810.04109v1 [cs.IT]) Cache Translate Page 
Authors: Ashwin Ganesan Consider a wireless network where each communication link has a minimum bandwidth qualityofservice requirement. Certain pairs of wireless links interfere with each other due to being in the same vicinity, and this interference is modeled by a conflict graph. Given the conflict graph and link bandwidth requirements, the objective is to determine, using only localized information, whether the demands of all the links can be satisfied. At one extreme, each node knows the demands of only its neighbors; at the other extreme, there exists an optimal, centralized scheduler that has global information. The present work interpolates between these two extremes by quantitatively characterizing the tradeoff between the degree of decentralization and the performance of the distributed algorithm. This open problem is resolved for the primary interference model, and the following general result is obtained: if each node knows the demands of all links in a ball of radius $d$ centered at the node, then there is a distributed algorithm whose performance is away from that of an optimal, centralized algorithm by a factor of at most $(2d+3)/(2d+2)$. It is shown that for line networks under the protocol interference model, the row constraints are a factor of at most $3$ away from optimal. Both bounds are best possible. 
The Viterbi process, decayconvexity and parallelized maximum aposteriori estimation. (arXiv:1810.04115v1 [math.PR]) Cache Translate Page 
Authors: Nick Whiteley The Viterbi process is the limiting maximum aposteriori estimate of the unobserved path in a hidden Markov model as the length of the time horizon grows. The existence of such a process suggests that approximate estimation using optimization algorithms which process data segments in parallel may be accurate. For models on statespace $\mathbb{R}^{d}$ satisfying a new "decayconvexity" condition, we approach the existence of the Viterbi process through fixed points of ordinary differential equations in a certain infinite dimensional Hilbert space. Quantitative bounds on the distance to the Viterbi process show that approximate estimation via parallelization can indeed be accurate and scaleable to highdimensional problems because the rate of convergence to the Viterbi process does not necessarily depend on $d$. 
Convergence Analysis of a Generalized Full Approximation Storage Scheme for Convex Optimization Problems. (arXiv:1810.04116v1 [math.NA]) Cache Translate Page 
Authors: Long Chen, Xiaozhe Hu, Steven M. Wise Full Approximation Scheme (FAS) is a widely used multigrid method for nonlinear problems. In this paper, a new framework to analyze FAS for convex optimization problems is developed. FAS can be recast as an inexact version of nonlinear multigrid methods based on space decomposition and subspace correction. The local problem in each subspace can be simplified to be linear and one gradient decent iteration is enough to ensure a linear convergence of FAS. 
Bijections Between {\L}ukasiewicz Walks and Generalized Tandem Walks. (arXiv:1810.04117v1 [math.CO]) Cache Translate Page 
Authors: Frédéric Chyzak, Karen Yeats In this article, we study the enumeration by length of several walk models on the square lattice. We obtain bijections between walks in the upper halfplane returning to the $x$axis and walks in the quarter plane. A recent work by Bostan, Chyzak, and Mahboubi has given a bijection for models using small north, west, and southeast steps. We adapt and generalize it to a bijection between halfplane walks using those three steps in two colours and a quarterplane model over the symmetrized step set consisting of north, northwest, west, south, southeast, and east. We then generalize our bijections to certain models with large steps: for given $p\geq1$, a bijection is given between the halfplane and quarterplane models obtained by keeping the small southeast step and replacing the two steps north and west of length 1 by the $p+1$ steps of length $p$ in directions between north and west. This model is close to, but distinct from, the model of generalized tandem walks studied by BousquetM\'elou, Fusy, and Raschel. 
New Lower Bounds for the Estrada Index. (arXiv:1810.04120v1 [math.SP]) Cache Translate Page 
Authors: Juan L. Aguayo, Juan R. Carmona, Jonnathan Rodríguez Let $G$ be a graph on $n$ vertices and $\lambda_1,\lambda_2,\ldots,\lambda_n$ its eigenvalues. The Estrada index of $G$ is defined as $EE(G)=\sum_{i=1}^n e^{\lambda_i}.$ In this work, using a different demonstration technique, new lower bounds are obtained for the Estrada index, that depends on the number of vertices, the number of edges and the energy of the graph is given. Moreover, another lower bound for the Estrada index is obtained of an arbitrary Hermitian matrix are established. 
Multiscale Hydrophobic Lipid Dynamics Simulated by Efficient Integral Equation Methods. (arXiv:1810.04131v1 [math.NA]) Cache Translate Page 
Authors: SzuPei P. Fu, Rolf J. Ryham, Andreas Klöckner, Matt Wala, Shidong Jiang, YuanNan Young In this paper, we first develop a mathematical model for longrange, hydrophobic attraction between amphiphilic particles. The nonpairwise interactions follow from the first variation of a hydrophobic attraction domain functional. The variation yields a hydrophobic stress that is used to numerically calculate trajectories for a collection of twodimensional particles. The functional minimizer that accounts for hydrophobicity at molecularaqueous interfaces is a solution to a boundary value problem of the screened Laplace equation. We reformulate the boundary value problem as a secondkind integral equation (SKIE), discretize the SKIE using a Nystr\"om discretization and `Quadrature by Expansion' (QBX) and solve the resulting linear system iteratively using GMRES. We evaluate the required layer potentials using the `GIGAQBX' fast algorithm, a variant of the Fast Multipole Method (FMM), yielding the required particle interactions with asymptotically optimal cost. The entire scheme is adaptive, highorder, and capable of handling closetotouching geometry. The simulated particle systems exhibit a variety of multiscale behaviors over both time and length: Over short time scales, the numerical results show selfassembly for model lipid particles. For large system simulations, the particles form realistic configurations like micelles and bilayers. Over long time scales, the bilayer shapes emerging from the simulation appear to minimize a form of bending energy. 
Localizations and completions in motivic homotopy theory. (arXiv:1810.04134v1 [math.AG]) Cache Translate Page 
Authors: Lorenzo Mantovani Let $K$ be a perfect field and let $E$ be a homotopy commutative ring spectrum in the MorelVoevodsky stable motivic homotopy category $\mathcal{SH}(K)$. In this work we investigate the relation between the $E$homology localization and $E$nilpotent completion of a spectrum X. Under reasonable assumptions on $E$ and $X$ we show that these two operations coincide and can be expressed in terms of formal completions or localizations in the usual sense of commutative algebra. We deduce convergence criteria for the $E$based motivic AdamsNovikov spectral sequence. 
Taming Hamiltonian systems with balanced loss and gain via Lorentz interaction : General results and a case study with Landau Hamiltonian. (arXiv:1810.04137v1 [mathph]) Cache Translate Page 
Authors: Pijush K. Ghosh The kinetic energy term of Hamiltonian systems with balanced loss and gain is not semipositivedefinite, leading to instabilities at the classical as well quantum level. It is shown that an additional Lorentz interaction in the Hamiltonian allows the kinetic energy term to be semipositivedefinite and thereby, improving the stability properties of the system. Further, a consistent quantum theory admitting bound states may be obtained on the real line instead of Stoke wedges on the complex plane. The Landau Hamiltonian in presence of balanced loss and gain is considered for elucidating the general result. The kinetic energy term is semipositivedefinite provided the magnitude of the applied external magnetic field is greater than the magnitude of the `analogous magnetic field' due to the loss gain terms. It is shown that the classical particle moves on an elliptical orbit with a cyclotron frequency that is less than its value in absence of the lossgain terms. The quantum system share the properties of the standard Landau Hamiltonian, but, with the modified cyclotron frequency. It is shown that the Hall current has nonvanishing components along the direction of the external uniform electric field and to its transverse direction. 
Universal entanglement of typical states in constrained systems. (arXiv:1810.04157v1 [quantph]) Cache Translate Page 
Authors: Siddhardh C. Morampudi, Anushya Chandran, Chris R. Laumann Local constraints play an important role in the effective description of many quantum systems. Their impact on dynamics and entanglement thermalization are just beginning to be unravelled. We develop a large $N$ diagrammatic formalism to exactly evaluate the bipartite entanglement of random pure states in large constrained Hilbert spaces. The resulting entanglement spectra may be classified into `phases' depending on their singularities. Our closed solution for the spectra in the simplest class of constraints reveals a nontrivial phase diagram with a MarchenkoPastur (MP) phase which terminates in a critical point with new singularities. The much studied Rydbergblockaded/Fibonacci chain lies in the MP phase with a modified Page correction to the entanglement entropy, $\Delta S_1 = 0.513595\cdots$. Our results predict the entanglement of infinite temperature eigenstates in thermalizing constrained systems and provide a baseline for numerical studies. 
Andr\'{e}Quillen homology and complete intersection flat dimension. (arXiv:1307.0860v3 [math.AC] UPDATED) Cache Translate Page 
Authors: Tirdad Sharif We study the relation between the vanishing of Andr\'{e}Quillen homology and complete intersection flat dimension and we extend some of the existing results in the literature. 
A model structure on the category of diffeological spaces. (arXiv:1311.5668v7 [math.AT] UPDATED) Cache Translate Page 
Authors: Tadayuki Haraguchi, Kazuhisa Shimakawa We construct a model category structure on the category of diffeological spaces which is Quillen equivalent to the model structure on the category of topological spaces based on the notions of Serre fibrations and weak homotopy equivalences. 
LowMRank Tensor Completion and Robust Tensor PCA. (arXiv:1501.03689v4 [math.OC] UPDATED) Cache Translate Page 
Authors: Bo Jiang, Shiqian Ma, Shuzhong Zhang In this paper, we propose a new approach for solving lowrank tensor completion and robust tensor PCA. Our new approach is based on some new notions of (evenorder) tensor ranks, to be called the Mrank, the symmetric Mrank, and the strongly symmetric Mrank. We discuss the connections between these new tensor ranks and the CPrank and the symmetric CPrank of an evenorder tensor. We show that the Mrank provides a reliable approximation to the CPrank and it is much easier to compute than the CPrank. As a result, we propose to replace the CPrank by the Mrank in the lowCPrank tensor completion and robust tensor PCA. Numerical results suggest that our new approach based on the Mrank outperforms the existing lownrank approach for solving lowrank tensor completion and robust tensor PCA. 
From vertex operator algebras to conformal nets and back. (arXiv:1503.01260v4 [math.OA] UPDATED) Cache Translate Page 
Authors: Sebastiano Carpi, Yasuyuki Kawahigashi, Roberto Longo, Mihály Weiner We consider unitary simple vertex operator algebras whose vertex operators satisfy certain energy bounds and a strong form of locality and call them strongly local. We present a general procedure which associates to every strongly local vertex operator algebra V a conformal net A_V acting on the Hilbert space completion of V and prove that the isomorphism class of A_V does not depend on the choice of the scalar product on V. We show that the class of strongly local vertex operator algebras is closed under taking tensor products and unitary subalgebras and that, for every strongly local vertex operator algebra V, the map W\mapsto A_W gives a onetoone correspondence between the unitary subalgebras W of V and the covariant subnets of A_V. Many known examples of vertex operator algebras such as the unitary Virasoro vertex operator algebras, the unitary affine Lie algebras vertex operator algebras, the known c=1 unitary vertex operator algebras, the moonshine vertex operator algebra, together with their coset and orbifold subalgebras, turn out to be strongly local. We give various applications of our results. In particular we show that the even shorter Moonshine vertex operator algebra is strongly local and that the automorphism group of the corresponding conformal net is the Baby Monster group. We prove that a construction of Fredenhagen and J\"{o}rss gives back the strongly local vertex operator algebra V from the conformal net A_V and give conditions on a conformal net A implying that A= A_V for some strongly local vertex operator algebra V. 
Cohomology of $\frak {sl}(2)$ acting on the space of $n$ary differential operators on $\mathbb{R}$. (arXiv:1512.02847v3 [math.RT] UPDATED) Cache Translate Page 
Authors: Mabrouk Ben Ammar, Rabeb Sidaoui We consider the spaces $\mathcal{F}_\mu$ of polynomial $\mu$densities on the line as $\mathfrak{sl}(2)$modules and then we compute the cohomological spaces $\mathrm{H}^1_\mathrm{diff}(\mathfrak{sl}(2), \mathcal{D}_{\bar{\lambda},\mu})$, where $\mu\in \mathbb{R}$, $\bar{\lambda}=(\lambda_1,\dots,\lambda_n) \in\mathbb{R}^n$ and $\mathcal{D}_{\bar{\lambda},\mu}$ is the space of $n$ary differential operators from $\mathcal{F}_{\lambda_1}\otimes\cdots\otimes \mathcal{F}_{\lambda_n}$ to $\mathcal{F}_\mu$. 
Sentence Entailment in Compositional Distributional Semantics. (arXiv:1512.04419v2 [cs.CL] UPDATED) Cache Translate Page 
Authors: Esma Balkir, Dimitri Kartsaklis, Mehrnoosh Sadrzadeh Distributional semantic models provide vector representations for words by gathering cooccurrence frequencies from corpora of text. Compositional distributional models extend these from words to phrases and sentences. In categorical compositional distributional semantics, phrase and sentence representations are functions of their grammatical structure and representations of the words therein. In this setting, grammatical structures are formalised by morphisms of a compact closed category and meanings of words are formalised by objects of the same category. These can be instantiated in the form of vectors or density matrices. This paper concerns the applications of this model to phrase and sentence level entailment. We argue that entropybased distances of vectors and density matrices provide a good candidate to measure wordlevel entailment, show the advantage of density matrices over vectors for word level entailments, and prove that these distances extend compositionally from words to phrases and sentences. We exemplify our theoretical constructions on real data and a toy entailment dataset and provide preliminary experimental evidence. 
Rectifiability, interior approximation and Harmonic Measure. (arXiv:1601.08251v3 [math.CA] UPDATED) Cache Translate Page 
Authors: Murat Akman, Simon Bortz, Steve Hofmann, José Maria Martell We prove a structure theorem for any $n$rectifiable set $E\subset \mathbb{R}^{n+1}$, $n\ge 1$, satisfying a weak version of the lower ADR condition, and having locally finite $H^n$ ($n$dimensional Hausdorff) measure. Namely, that $H^n$almost all of $E$ can be covered by a countable union of boundaries of bounded Lipschitz domains contained in $\mathbb{R}^{n+1}\setminus E$. As a consequence, for harmonic measure in the complement of such a set $E$, we establish a nondegeneracy condition which amounts to saying that $H^n_E$ is "absolutely continuous" with respect to harmonic measure in the sense that any Borel subset of $E$ with strictly positive $H^n$ measure has strictly positive harmonic measure in some connected component of $\mathbb{R}^{n+1}\setminus E$. We also provide some counterexamples showing that our result for harmonic measure is optimal. Moreover, we show that if, in addition, a set $E$ as above is the boundary of a connected domain $\Omega \subset \mathbb{R}^{n+1}$ which satisfies an infinitesimal interior thickness condition, then $H^n_{\partial\Omega}$ is absolutely continuous (in the usual sense) with respect to harmonic measure for $\Omega$. Local versions of these results are also proved: if just some piece of the boundary is $n$rectifiable then we get the corresponding absolute continuity on that piece. As a consequence of this and recent results by AzzamHofmannMartellMayborodaMourgoglouTolsaVolberg, we can decompose the boundary of any open connected set satisfying the previous conditions in two disjoint pieces: one that is $n$rectifiable where Hausdorff measure is absolutely continuous with respect to harmonic measure and another purely $n$unrectifiable piece having vanishing harmonic measure. 
On branched covering representation of 4manifolds. (arXiv:1602.07459v5 [math.GT] UPDATED) Cache Translate Page 
Authors: Riccardo Piergallini, Daniele Zuddas We provide new branched covering representations for bounded and/or noncompact 4manifolds, which extend the known ones for closed 4manifolds. Assuming $M$ to be a connected oriented PL 4manifold, our main results are the following: (1) if $M$ is compact with (possibly empty) boundary, there exists a simple branched cover $p:M \to S^4  \mathop{\mathrm{Int}}(B^4_1 \cup \dots \cup B^4_n)$, where the $B^4_i$'s are disjoint PL 4balls, $n \geq 0$ is the number of boundary components of $M$; (2) if $M$ is open, there exists a simple branched cover $p : M \to S^4  \mathop{\mathrm{End}} M$, where $\mathop{\mathrm{End}} M$ is the end space of $M$ tamely embedded in $S^4$. In both cases, the degree $d(p)$ and the branching set $B_p$ of $p$ can be assumed to satisfy one of these conditions: (1) $d(p)=4$ and $B_p$ is a properly selftransversally immersed locally flat PL surface; (2) $d(p)=5$ and $B_p$ is a properly embedded locally flat PL surface. In the compact (resp. open) case, by relaxing the assumption on the degree we can have $B^4$ (resp. $R^4$) as the base of the covering. We also define the notion of branched covering between topological manifolds, which extends the usual one in the PL category. In this setting, as an interesting consequence of the above results, we prove that any closed oriented topological 4manifold is a 4fold branched covering of $S^4$. According to almostsmoothability of 4manifolds, this branched cover could be wild at a single point. 
On two cohomological Hall algebras. (arXiv:1604.01477v2 [math.RT] UPDATED) Cache Translate Page 
Authors: Yaping Yang, Gufang Zhao We compare two cohomological Hall algebras (CoHA). The first one is the preprojective CoHA introduced by the authors in arXiv:1407.7994 associated to each quiver Q, and each algebraic oriented cohomology theory A. It is defined as the Ahomology of the moduli of representations of the preprojective algebra of Q, generalizing the Ktheoretic Hall algebra of commuting varieties of SchiffmannVasserot. The other one is the critical CoHA defined by KontsevichSoibelman associated to each quiver with potentials. It is defined using the equivariant cohomology with compact support with coefficients in the sheaf of vanishing cycles. In the present paper, we show that the critical CoHA, for the quiver with potential of Ginzburg, is isomorphic to the preprojective CoHA as algebras. As applications, we obtain an algebra homomorphism from the positive part of the Yangian to the critical CoHA. 
Analysis of multiscale integrators for multiple attractors and irreversible Langevin samplers. (arXiv:1606.09539v4 [math.NA] UPDATED) Cache Translate Page 
Authors: Jianfeng Lu, Konstantinos Spiliopoulos We study multiscale integrator numerical schemes for a class of stiff stochastic differential equations (SDEs). We consider multiscale SDEs with potentially multiple attractors that behave as diffusions on graphs as the stiffness parameter goes to its limit. Classical numerical discretization schemes, such as the EulerMaruyama scheme, become unstable as the stiffness parameter converges to its limit and appropriate multiscale integrators can correct for this. We rigorously establish the convergence of the numerical method to the related diffusion on graph, identifying the appropriate choice of discretization parameters. Theoretical results are supplemented by numerical studies on the problem of the recently developing area of introducing irreversibility in Langevin samplers in order to accelerate convergence to equilibrium. 
A proof of the $4$variable Catalan polynomial of the Delta conjecture. (arXiv:1609.03497v2 [math.CO] UPDATED) Cache Translate Page 
Authors: Mike Zabrocki In The Delta Conjecture (arxiv:1509.07058), Haglund, Remmel and Wilson introduced a four variable $q,t,z,w$ Catalan polynomial, so named because the specialization of this polynomial at the values $(q,t,z,w) = (1,1,0,0)$ is equal to the Catalan number $\frac{1}{n+1}\binom{2n}{n}$. We prove the compositional version of this conjecture (which implies the noncompositional version) that states that the coefficient of $s_{r,1^{nr}}$ in the expression $\Delta_{h_\ell} \nabla C_\alpha$ is equal to a weighted sum over decorated Dyck paths. 
The symbolic defect of an ideal. (arXiv:1610.00176v3 [math.AC] UPDATED) Cache Translate Page 
Authors: Federico Galetto, Anthony V. Geramita, YongSu Shin, Adam Van Tuyl Let $I$ be a homogeneous ideal of $\Bbbk[x_0,\ldots,x_n]$. To compare $I^{(m)}$, the $m$th symbolic power of $I$, with $I^m$, the regular $m$th power, we introduce the $m$th symbolic defect of $I$, denoted $\operatorname{sdefect}(I,m)$. Precisely, $\operatorname{sdefect}(I,m)$ is the minimal number of generators of the $R$module $I^{(m)}/I^m$, or equivalently, the minimal number of generators one must add to $I^m$ to make $I^{(m)}$. In this paper, we take the first step towards understanding the symbolic defect by considering the case that $I$ is either the defining ideal of a star configuration or the ideal associated to a finite set of points in $\mathbb{P}^2$. We are specifically interested in identifying ideals $I$ with $\operatorname{sdefect}(I,2) = 1$. 
A Shrinking Target Problem with Target at Infinity in Rank One Homogeneous Spaces. (arXiv:1610.01870v3 [math.DS] UPDATED) Cache Translate Page 
Authors: Cheng Zheng In this paper, we give a definition of Diophantine points of type $\gamma$ for $\gamma\geq0$ in a homogeneous space $G/\Gamma$, and compute the Hausdorff dimension of the subset of points which are not Diophantine of type $\gamma$ when $G$ is a semisimple Lie group of real rank one. We also deduce a Jarn\'ikBesicovitch Theorem on Diophantine approximation in Heisenberg groups. 
Noncrossing chords of a polygon with forbidden positions. (arXiv:1611.03166v2 [math.CO] UPDATED) Cache Translate Page 
Authors: Dongyi Wei, Demin Zhang, Dong Zhang In this paper, we systematically study noncrossing chords of simple polygons in the plane. We first introduce the reduced Euler characteristic of a family of linesegments, and subsequently investigate the structure of the diagonals and epigonals of a polygon. Interestingly enough, the reduced Euler characteristic of a subfamily of diagonals and epigonals characterizes the geometric convexity of polygons. In particular, an alternative and complete answer is given for a problem proposed by G. C. Shephard. Meanwhile, we extend such research to noncrossing diagonals and epigonals with forbidden positions in some appropriate sense. We prove that the reduced Euler characteristic of diagonals with forbidden positions only depends on the information involving convex partitions by those forbidden diagonals, and it determines the shapes of polygons in a surprising way. Incidentally, some kinds of generalized Catalan's numbers naturally arise. 
An abstract theory of singular operators. (arXiv:1611.03808v4 [math.CA] UPDATED) Cache Translate Page 
Authors: Grigori A. Karagulyan We introduce a class of operators on abstract measure spaces, which unifies the Calder\'onZygmund operators on spaces of homogeneous type, the maximal functions and the martingale transforms. We prove that such operators can be dominated by simple sparse operators with a definite form of the domination constant. Applying these estimates, we improve several results obtained by different authors in recent years. 
Online detection of qualitative dynamical changes in nonlinear systems: the restingoscillation case. (arXiv:1611.05820v3 [math.OC] UPDATED) Cache Translate Page 
Authors: Ying Tang, Alessio Franci, Romain Postoyan Motivated by neuroscience applications, we introduce the concept of qualitative detection, that is, the problem of determining online the current qualitative dynamical behavior (e.g., resting, oscillating, bursting, spiking etc.) of a nonlinear system. The approach is thought for systems characterized by i) large parameter variability and redundancy, ii) a small number of possible robust, qualitatively different dynamical behaviors and, iii) the presence of sharply different characteristic timescales. These properties are omnipresent in neurosciences and hamper quantitative modeling and fitting of experimental data. As a result, novel control theoretical strategies are needed to face neuroscience challenges like online epileptic seizure detection. The proposed approach aims at detecting the current dynamical behavior of the system and whether a qualitative change is likely to occur without quantitatively fitting any model nor asymptotically estimating any parameter. We talk of qualitative detection. We rely on the qualitative properties of the system dynamics, extracted via singularity and singular perturbation theories, to design low dimensional qualitative detectors. We introduce this concept on a general class of singularly perturbed systems and then solve the problem for an analytically tractable class of twodimensional systems with a single unknown sigmoidal nonlinearity and two sharply separated timescales. Numerical results are provided to show the performance of the designed qualitative detector. 
Coded Computation over Heterogeneous Clusters. (arXiv:1701.05973v4 [cs.DC] UPDATED) Cache Translate Page 
Authors: Amirhossein Reisizadeh, Saurav Prakash, Ramtin Pedarsani, Amir Salman Avestimehr In largescale distributed computing clusters, such as Amazon EC2, there are several types of "system noise" that can result in major degradation of performance: bottlenecks due to limited communication bandwidth, latency due to straggler nodes, etc. On the other hand, these systems enjoy abundance of redundancy  a vast number of computing nodes and large storage capacity. There have been recent results that demonstrate the impact of coding for efficient utilization of computation and storage redundancy to alleviate the effect of stragglers and communication bottlenecks in homogeneous clusters. In this paper, we focus on general heterogeneous distributed computing clusters consisting of a variety of computing machines with different capabilities. We propose a coding framework for speeding up distributed computing in heterogeneous clusters by trading redundancy for reducing the latency of computation. In particular, we propose Heterogeneous Coded Matrix Multiplication (HCMM) algorithm for performing distributed matrix multiplication over heterogeneous clusters that is provably asymptotically optimal for a broad class of processing time distributions. Moreover, we show that HCMM is unboundedly faster than any uncoded scheme. To demonstrate practicality of HCMM, we carry out experiments over Amazon EC2 clusters where HCMM is found to be up to $61\%$, $46\%$ and $36\%$ respectively faster than three benchmark load allocation schemes  Uniform Uncoded, Loadbalanced Uncoded, and Uniform Coded. Additionally, we provide a generalization to the problem of optimal load allocation in heterogeneous settings, where we take into account the monetary costs associated with the clusters. We argue that HCMM is asymptotically optimal for budgetconstrained scenarios as well, and we develop a heuristic algorithm for (HCMM) load allocation for budgetlimited computation tasks. 
Error correction based on partial information. (arXiv:1701.06969v2 [cs.IT] UPDATED) Cache Translate Page 
Authors: Itzhak Tamo, Min Ye, Alexander Barg We consider the decoding of linear and array codes from errors when we are only allowed to download a part of the codeword. More specifically, suppose that we have encoded $k$ data symbols using an $(n,k)$ code with code length $n$ and dimension $k.$ During storage, some of the codeword coordinates might be corrupted by errors. We aim to recover the original data by reading the corrupted codeword with a limit on the transmitting bandwidth, namely, we can only download an $\alpha$ proportion of the corrupted codeword. For a given $\alpha,$ our objective is to design a code and a decoding scheme such that we can recover the original data from the largest possible number of errors. A naive scheme is to read $\alpha n$ coordinates of the codeword. This method used in conjunction with MDS codes guarantees recovery from any $\lfloor(\alpha nk)/2\rfloor$ errors. In this paper we show that we can instead read an $\alpha$ proportion from each of the codeword's coordinates. For a welldesigned MDS code, this method can guarantee recovery from $\lfloor (nk/\alpha)/2 \rfloor$ errors, which is $1/\alpha$ times more than the naive method, and is also the maximum number of errors that an $(n,k)$ code can correct by downloading only an $\alpha$ proportion of the codeword. We present two families of such optimal constructions and decoding schemes. One is a ReedSolomon code with evaluation points in a subfield and the other is based on Folded ReedSolomon codes. We further show that both code constructions attain asymptotically optimal list decoding radius when downloading only a part of the corrupted codeword. We also construct an ensemble of random codes that with high probability approaches the upper bound on the number of correctable errors when the decoder downloads an $\alpha$ proportion of the corrupted codeword. 
Periods of iterations of functions with restricted preimage sizes. (arXiv:1701.09148v3 [math.CO] UPDATED) Cache Translate Page 
Authors: Rodrigo S. V. Martins, Daniel Panario, Claudio Qureshi, Eric Schmutz We consider random mappings on n = kr nodes with preimage sizes restricted to a set of the form {0,k}, where k = k(r) is greater than 1. We prove that T, the least common multiple of the cycle lengths, and B= the product of the cycle lengths, are both asymptotically lognormal. The expected values of these random variables are also also estimated and compared with numerical results. This work is motivated, in part, by the use of these mappings as heuristic models for polynomials of the form x^k + a over the integers modulo p with p congruent to 1 mod k. 
Efficient Policy Learning. (arXiv:1702.02896v3 [math.ST] UPDATED) Cache Translate Page 
Authors: Susan Athey, Stefan Wager In many areas, practitioners seek to use observational data to learn a treatment assignment policy that satisfies applicationspecific constraints, such as budget, fairness, simplicity, or other functional form constraints. For example, policies may be restricted to take the form of decision trees based on a limted set of easily observable individual characteristics. We propose a new approach to this problem motivated by the theory of semiparametrically efficient estimation. Our approach can be used to optimize either binary treatments or infinitesimal nudges to continuous treatments, and can leverage observational data where causal effects are identified using a variety of strategies, including selectiononobservables and instrumental variables. Given a doubly robust estimator of the causal effect of assigning everyone to treatment, we develop an algorithm for choosing whom to treat, and establish strong guarantees for the asymptotic utilitarian regret of the resulting policy. 
Incompressible fluid problems on embedded surfaces: Modeling and variational formulations. (arXiv:1702.02989v3 [mathph] UPDATED) Cache Translate Page 
Authors: Thomas Jankuhn, Maxim A. Olshanskii, Arnold Reusken Governing equations of motion for a viscous incompressible material surface are derived from the balance laws of continuum mechanics. The surface is treated as a timedependent smooth orientable manifold of codimension one in an ambient Euclidian space. We use elementary tangential calculus to derive the governing equations in terms of exterior differential operators in Cartesian coordinates. The resulting equations can be seen as the NavierStokes equations posed on an evolving manifold. We consider a splitting of the surface NavierStokes system into coupled equations for the tangential and normal motions of the material surface. We then restrict ourselves to the case of a geometrically stationary manifold of codimension one embedded in $\Bbb{R}^n$. For this case, we present new wellposedness results for the simplified surface fluid model consisting of the surface Stokes equations. Finally, we propose and analyze several alternative variational formulations for this surface Stokes problem, including constrained and penalized formulations, which are convenient for Galerkin discretization methods. 
The Isostatic Conjecture. (arXiv:1702.08442v3 [math.MG] UPDATED) Cache Translate Page 
Authors: Robert Connelly, Steven J. Gortler, Evan Solomonides, Maria Yampolskaya We show that a jammed packing of disks with generic radii, in a generic container, is such that the minimal number of contacts occurs and there is only one dimension of equilibrium stresses. We also point out some connections to packings with different radii and results in the theory of circle packings whose graph forms a triangulation of a given topological surface. We also point out a counterexample, due to F. Nazarov, to a previous conjecture that that triangulated packings with fixed numbers of disks with fixed numbers of disks for each radius claiming that such packings were the most dense. 
Speyer's elegant topological proof for Kasteleyn's Theorem. (arXiv:1703.02366v2 [math.CO] UPDATED) Cache Translate Page 
Authors: Markus Fulmek The purpose of this note is to rephrase Speyer's elegant topological proof for Kasteleyn's Theorem in a simple graph theoretical manner. 
Branching processes with interactions: the subcritical cooperative regime. (arXiv:1704.04203v4 [math.PR] UPDATED) Cache Translate Page 
Authors: Adrián González Casanova, Juan Carlos Pardo, José Luis Perez In this paper, we introduce a particular family of processes with values on the nonnegative integers that model the dynamics of populations where individuals are allow to have different types of inter actions. The types of interactions that we consider include pairwise: competition, annihilation and cooperation; and interaction among several individuals that can be consider as catastrophes. We call such families of processes branching processes with interactions. In particular, we prove that a process in this class has a moment dual which turns out to be a jumpdiffusion that can be thought as the evolution of the frequency of a trait or phenotype. The aim of this paper is to study the long term behaviour of branching processes with interac tions under the assumption that the cooperation parameter satisfies a given condition that we called subcritical cooperative regime. The moment duality property is useful for our purposes. 
QuasiFrobeniussplitting and lifting of CalabiYau varieties in characteristic $p$. (arXiv:1704.05604v2 [math.AG] UPDATED) Cache Translate Page 
Authors: Fuetaro Yobuko Extending the notion of Frobeniussplitting, we prove that every finite height CalabiYau variety defined over an algebraically closed field of positive characteristic can be lifted to the ring of Witt vectors of length two. 
Binary de Bruijn Sequences via Zech's Logarithms. (arXiv:1705.03150v2 [cs.IT] UPDATED) Cache Translate Page 
Authors: Zuling Chang, Martianus Frederic Ezerman, Adamas Aqsa Fahreza, San Ling, Janusz Szmidt, Huaxiong Wang The cycle joining method and the crossjoin pairing are two main construction techniques for de Bruijn sequences. This work shows how to combine Zech's logarithms and each of the two techniques to efficiently construct binary de Bruijn sequences of large orders. A basic implementation is supplied as a proofofconcept. In the cycle joining method, the cycles are generated by an LFSR with a chosen period. We prove that determining Zech's logarithms is equivalent to identifying conjugate pairs shared by any pair of cycles. The approach quickly finds enough number of conjugate pairs between any two cycles to ensure the existence of trees containing all vertices in the adjacency graph of the LFSR. When the characteristic polynomial of the LFSR is a product of distinct irreducible polynomials, the approach via Zech's logarithms combines nicely with a recently proposed method to determine the conjugate pairs. This allows us to efficiently generate de Bruijn sequences with larger orders. Along the way, we establish new properties of Zech's logarithms. The characterization of conjugate pairs via Zech's logarithms as positional markings is then adapted into identifying crossjoin pairs in a de Bruijn sequence. We start from any de Bruijn sequence, although typically a modified $m$sequence for ease of generation, and demonstrate how to use Zech's logarithms to identify all crossjoin pairs in that sequence. The process can be repeated on each of the resulting sequences until a desired number of distinct sequences are produced. The computational process can be made more efficient by using a new analytic tool attributed to Fryers as well as prior algorithmic tools. 
Selective inference for effect modification via the lasso. (arXiv:1705.08020v3 [stat.ME] UPDATED) Cache Translate Page 
Authors: Qingyuan Zhao, Dylan S. Small, Ashkan Ertefaie Effect modification occurs when the effect of the treatment on an outcome varies according to the level of other covariates and often has important implications in decision making. When there are tens or hundreds of covariates, it becomes necessary to use the observed data to select a simpler model for effect modification and then make valid statistical inference. We propose a two stage procedure to solve this problem. First, we use Robinson's transformation to decouple the nuisance parameters from the treatment effect of interest and use machine learning algorithms to estimate the nuisance parameters. Next, after plugging in the estimates of the nuisance parameters, we use the Lasso to choose a lowcomplexity model for effect modification. Compared to a full model consisting of all the covariates, the selected model is much more interpretable. Compared to the univariate subgroup analyses, the selected model greatly reduces the number of false discoveries. We show that the conditional selective inference for the selected model is asymptotically valid given the rate assumptions in classical semiparametric regression. Extensive simulation studies are conducted to verify the asymptotic results and an epidemiological application is used to demonstrate the method. 
The Hurwitz Subgroups of $E_6(2)$. (arXiv:1706.07970v3 [math.GR] UPDATED) Cache Translate Page 
Authors: Emilio Pierro We prove that the exceptional group $E_6(2)$ is not a Hurwitz group. In the course of proving this, we complete the classification up to conjugacy of all Hurwitz subgroups of $E_6(2)$, in particular, those isomorphic to $L_2(8)$ and $L_3(2)$. 
BerryEsseen Theorem and Quantitative homogenization for the Random Conductance Model with degenerate Conductances. (arXiv:1706.09493v3 [math.PR] UPDATED) Cache Translate Page 
Authors: Sebastian Andres, Stefan Neukamm We study the random conductance model on the lattice $\mathbb{Z}^d$, i.e. we consider a linear, finitedifference, divergenceform operator with random coefficients and the associated random walk under random conductances. We allow the conductances to be unbounded and degenerate elliptic, but they need to satisfy a strong moment condition and a quantified ergodicity assumption in form of a spectral gap estimate. As a main result we obtain in dimension $d\geq 3$ quantitative central limit theorems for the random walk in form of a BerryEsseen estimate with speed $t^{\frac 1 5+\varepsilon}$ for $d\geq 4$ and $t^{\frac{1}{10}+\varepsilon}$ for $d=3$. Additionally, in the uniformly elliptic case in low dimensions $d=2,3$ we improve the rate in a quantitative BerryEsseen theorem recently obtained by Mourrat. As a central analytic ingredient, for $d\geq 3$ we establish nearoptimal decay estimates on the semigroup associated with the environment process. These estimates also play a central role in quantitative stochastic homogenization and extend some recent results by Gloria, Otto and the second author to the degenerate elliptic case. 
Branched coverings of $CP^2$ and other basic 4manifolds. (arXiv:1707.03667v3 [math.GT] UPDATED) Cache Translate Page 
Authors: Riccardo Piergallini, Daniele Zuddas We give necessary and sufficient conditions for a 4manifold to be a branched covering of $CP^2$, $S^2\times S^2$, $S^2 \mathbin{\tilde\times} S^2$ and $S^3 \times S^1$, which are expressed in terms of the Betti numbers and the intersection form of the 4manifold. 
Ribbon invariants I. (arXiv:1708.03876v12 [math.GT] UPDATED) Cache Translate Page 
Authors: Simeon Stefanov A nonnegative integer invariant, estimating from below the number of geometrically different critical points of a smooth function $f$ defined in the 2disk, $f:\mathbb{B}^{2}\rightarrow\mathbb{R}$, is considered. (We denote it by "$\gamma$".) It depends on combined $C^{0}+C^{1}$ type conditions on the boundary $\partial(\mathbb{B}^{2})=\mathbb{S}^{1}$, that we call "ribbons" here. It turns out to be an alternative to the degree of the gradient map and almost independent from it. Note that the computation of the degree does not guarantee multiple critical points, unlike the ribbon invariant $\gamma$. In fact, this invariant is counting the number of essential components of the critical set, rather than simply the number of critical points. Various estimates of $\gamma$ are established. Some other "ribbon type" invariants of geometrical nature are defined and investigated. All these invariants turn out to be more combinatorial, rather than algebraic, in nature. Algorithms for the calculation of the ribbon invariants are presented. Interconnections with some different areas, such as the theory of immersed curves in the plane or independent domination in graphs, as well as various geometric applications, are commented. The latter topics will be investigated in detail in Part II of the present article. At the end, different questions about $\gamma$ are asked. 
Zknotted triangulations. (arXiv:1708.04296v2 [math.CO] UPDATED) Cache Translate Page 
Authors: Mark Pankov, Adam Tyc Let $\Gamma$ be a connected simple finite graph embedded in a connected closed $2$dimen\sional surface. A zigzag is a closed path in $\Gamma$, where any two consequent edges lie on the same face and for any three consequent edges the face containing the first and second edges is distinct from the face which contains the second and third. The graph $\Gamma$ is $z$knotted if it contains a singe zigzag. Such graphs are closely connected to Gauss code problem and have nice homological properties. We show that every triangulation of a connected closed $2$dimensional surface admits a $z$knotted shredding. 
A novel approach to fractional calculus: utilizing fractional integrals and derivatives of the Dirac delta function. (arXiv:1708.06605v2 [math.CA] UPDATED) Cache Translate Page 
Authors: Evan Camrud While the definition of a fractional integral may be codified by Riemann and Liouville, an agreedupon fractional derivative has eluded discovery for many years. This is likely a result of integral definitions including numerous constants of integration in their results. An elimination of constants of integration opens the door to an operator that reconciles all known fractional derivatives and shows surprising results in areas unobserved before, including the appearance of the Riemann Zeta Function and fractional Laplace and Fourier Transforms. A new class of functions, known as Zero Functions and closely related to the Dirac Delta Function, are necessary for one to perform elementary operations of functions without using constants. The operator also allows for a generalization of the Volterra integral equation, and provides a method of solving for Riemann's "complimentary" function introduced during his research on fractional derivatives. 
Canonical GelfandZeitlin modules over orthogonal GelfandZeitlin algebras. (arXiv:1709.01553v3 [math.RT] UPDATED) Cache Translate Page 
Authors: Nick Early, Volodymyr Mazorchuk, Elizaveta Vishnyakova We prove that every orthogonal GelfandZeitlin algebra $U$ acts on its GelfandZeitlin subalgebra $\Gamma$. Considering the dual module, we show that every GelfandZeitlin character of $\Gamma$ is realizable in a $U$module. We observe that the GelfandZeitlin formulae can be rewritten using divided difference operators. It turns out that the action of the latter operators on $\Gamma$ gives rise to an explicit basis in a certain GelfandZeitlin submodule of the dual module mentioned above. This gives, generically, both in the case of regular and singular GelfandZeitlin characters, an explicit construction of simple modules which realize given GelfandZeitlin characters. 
Schurtype invariants of branched Gcovers of surfaces. (arXiv:1709.03182v3 [math.GT] UPDATED) Cache Translate Page 
Authors: Eric Samperton (UC Davis) Fix a finite group $G$ and a conjugacy invariant subset $C\subseteq G$. Let $\Sigma$ be an oriented surface, possibly with punctures. We consider the question of when two homomorphisms $\pi_1(\Sigma) \to G$ taking punctures into $C$ are equivalent up to an orientation preserving diffeomorphism of $\Sigma$. We provide an answer to this question in a stable range, meaning that $\Sigma$ has enough genus and enough punctures of every conjugacy type in $C$. If $C$ generates $G$, then we can assume $\Sigma$ has genus 0 (or any other constant). The main tool is a classifying space for (framed) $C$branched $G$covers, and related homology classes we call branched Schur invariants, since they take values in a torsor over a quotient of the Schur multiplier $H_2(G)$. We conclude with a brief discussion of applications to $(2+1)$dimensional $G$equivariant TQFT and symmetryenriched topological phases. 
The Shark Random Swim (L\'evy flight with memory). (arXiv:1710.05671v3 [math.PR] UPDATED) Cache Translate Page 
Authors: Silvia Businger The Elephant Random Walk (ERW), first introduced by Sch\"utz and Trimper (2004), is a onedimensional simple random walk on $ \mathbb{Z} $ having a memory about the whole past. We study the Shark Random Swim, a random walk whose steps are $ \alpha $stable distributed with memory about the whole past. In contrast with the ERW, the steps of the Shark Random Swim have a heavy tailed distribution. Our aim in this work is to study the impact of the heavy tailed step distributions on the asymptotic behavior of the random walk. We shall see that, as for the ERW, the asymptotic behavior of the Shark Random Swim depends on its memory parameter $ p $, and that a phase transition can be observed at the critical value $ p=\frac{1}{\alpha} $. 
On uncountable strongly concentrated sets of reals. (arXiv:1711.04262v3 [math.LO] UPDATED) Cache Translate Page 
Authors: Eilon Bilinsky We construct new models of $ZF$ with an uncountable set of reals that has a unique condensation point. This addresses a question by Sierpi\'{n}ski from 1918. 
The pressure function for infinite equilibrium measures. (arXiv:1711.05069v3 [math.DS] UPDATED) Cache Translate Page 
Authors: Henk Bruin, Dalia Terhesiu, Mike Todd Assume that $(X,f)$ is a dynamical system and $\phi:X \to [\infty, \infty)$ is a potential such that the $f$invariant measure $\mu_\phi$ equivalent to $\phi$conformal measure is infinite, but that there is an inducing scheme $F = f^\tau$ with a finite measure $\mu_{\bar\phi}$ and polynomial tails $\mu_{\bar\phi}(\tau \geq n) = O(n^{\beta})$, $\beta \in (0,1)$. We give conditions under which the pressure of $f$ for a perturbed potential $\phi+s\psi$ relates to the pressure of the induced system as $P(\phi+s\psi) = (C P(\overline{\phi+s\psi}))^{1/\beta} (1+o(1))$, together with estimates for the $o(1)$error term. This extends results from Sarig to the setting of infinite equilibrium states. We give several examples of such systems, thus improving on the results of Lopes for the PomeauManneville map with potential $\phi_t =  t\log f'$, as well as on the results by Bruin & Todd on countably piecewise linear unimodal Fibonacci maps. In addition, limit properties of the family of measures $\mu_{\phi+s\psi}$ as $s\to 0$ are studied and statistical properties (correlation coefficients and arcsine laws) under the limit measure are derived. 
EventTriggered Communication and Control of Networked Systems for MultiAgent Consensus. (arXiv:1712.00429v2 [math.OC] UPDATED) Cache Translate Page 
Authors: Cameron Nowzari, Eloy Garcia, Jorge Cortes This article provides an introduction to eventtriggered coordination for multiagent average consensus. We provide a comprehensive account of the motivations behind the use of eventtriggered strategies for consensus, the methods for algorithm synthesis, the technical challenges involved in establishing desirable properties of the resulting implementations, and their applications in distributed control. We pay special attention to the assumptions on the capabilities of the network agents and the resulting features of the algorithm execution, including the interconnection topology, the evaluation of triggers, and the role of imperfect information. The issues raised in our discussion transcend the specific consensus problem and are indeed characteristic of cooperative algorithms for networked systems that solve other coordination tasks. As our discussion progresses, we make these connections clear, highlighting general challenges and tools to address them widespread in the eventtriggered control of networked systems. 
Limiting Distributions of Translates of Divergent Diagonal Orbits. (arXiv:1712.00630v3 [math.DS] UPDATED) Cache Translate Page 
Authors: Uri Shapira, Cheng Zheng We define a natural topology on the collection of (equivalence classes up to scaling of) locally finite measures on a homogeneous space and prove that in this topology, pushforwards of certain infinite volume orbits equidistribute in the ambient space. As an application of our results we prove an asymptotic formula for the number of integral points in a ball on some varieties as the radius goes to infinity. 
Isolated types of finite rank: an abstract DixmierMoeglin equivalence. (arXiv:1712.00933v2 [math.LO] UPDATED) Cache Translate Page 
Authors: Omar León Sánchez, Rahim Moosa Suppose $T$ is totally transcendental and every minimal nonlocallymodular type is nonorthogonal to a nonisolated minimal type over the empty set. It is shown that a finite rank type $p=tp(a/A)$ is isolated if and only if $a$ is independent from $q(\mathcal U)$ over $Ab$ for every $b\in \operatorname{acl}(Aa)$ and $q\in S(Ab)$ nonisolated and minimal. This applies to the theory of differentially closed fields  where it is motivated by the differential DixmierMoeglin equivalence problem  and the theory of compact complex manifolds. 
Proof of a conjecture on induced subgraphs of Ramsey graphs. (arXiv:1712.05656v3 [math.CO] UPDATED) Cache Translate Page 
Authors: Matthew Kwan, Benny Sudakov An nvertex graph is called CRamsey if it has no clique or independent set of size C log n. All known constructions of Ramsey graphs involve randomness in an essential way, and there is an ongoing line of research towards showing that in fact all Ramsey graphs must obey certain "richness" properties characteristic of random graphs. More than 25 years ago, Erd\H{o}s, Faudree and S\'{o}s conjectured that in any CRamsey graph there are $\Omega\left(n^{5/2}\right)$ induced subgraphs, no pair of which have the same numbers of vertices and edges. Improving on earlier results of Alon, Balogh, Kostochka and Samotij, in this paper we prove this conjecture. 
Newtonian fluid flow in a thin porous medium with nonhomogeneous slip boundary conditions. (arXiv:1712.05998v2 [math.AP] UPDATED) Cache Translate Page 
Authors: María Anguiano, Francisco J. SuárezGrau We consider the Stokes system in a thin porous medium $\Omega_\varepsilon$ of thickness $\varepsilon$ which is perforated by periodically distributed solid cylinders of size $\varepsilon$. On the boundary of the cylinders we prescribe nonhomogeneous slip boundary conditions depending on a parameter $\gamma$. The aim is to give the asymptotic behavior of the velocity and the pressure of the fluid as $\varepsilon$ goes to zero. Using an adaptation of the unfolding method, we give, following the values of $\gamma$, different limit systems. 
Scattering fans. (arXiv:1712.06968v3 [math.CO] UPDATED) Cache Translate Page 
Authors: Nathan Reading Scattering diagrams arose in the context of mirror symmetry, DonaldsonThomas theory, and integrable systems. We show that a consistent scattering diagram with minimal support cuts the ambient space into a complete fan. A special class of scattering diagrams, the cluster scattering diagrams, are closely related to cluster algebras. We show that the cluster scattering fan associated to an exchange matrix $B$ refines the mutation fan for $B$ (a complete fan that encodes the geometry of mutations of $B$). We conjecture that, when $B$ is $n\times n$ for $n>2$, these two fans coincide if and only if $B$ is of finite mutation type. 
Connection probabilities in Poisson random graphs with uniformly bounded edges. (arXiv:1712.07016v3 [math.PR] UPDATED) Cache Translate Page 
Authors: Alessandra Faggionato, Hlafo Alfie Mimun We consider random graphs with uniformly bounded edges on a Poisson point process conditioned to contain the origin. In particular we focus on the random connection model, the Boolean model and MillerAbrahams random resistor network with lowerbounded conductances. The latter is relevant for the analysis of conductivity by Mott variable range hopping in strongly disordered systems. By using the method of randomized algorithms developed by DuminilCopin et al. we prove that in the subcritical phase the probability that the origin is connected to some point at distance $n$ decays exponentially in $n$, while in the supercritical phase the probability that the origin is connected to infinity is strictly positive and bounded from below by a term proportional to $ (\lambda\lambda_c)$, $\lambda$ being the density of the Poisson point process and $\lambda_c$ being the critical density. 
Secure Network Code for Adaptive and Active Attacks with NoRandomness in Intermediate Nodes. (arXiv:1712.09035v3 [cs.IT] UPDATED) Cache Translate Page 
Authors: Ning Cai, Masahito Hayashi We analyze the security for network code when the eavesdropper can contaminate the information on the attacked edges (active attack) and can choose the attacked edges adaptively (adaptive attack). We show that active and adaptive attacks cannot improve the performance of the eavesdropper when the code is linear. Further, we give an nonlinear example, in which an adaptive attack improves the performance of the eavesdropper. We derive the capacity for the unicast case and the capacity region for the multicast case or the multiple multicast case in several examples of relay networks, beyond the minimum cut theorem, when no additional random number is allowed as scramble variables in the intermediate nodes. 
Clustering in Block Markov Chains. (arXiv:1712.09232v2 [math.PR] UPDATED) Cache Translate Page 
Authors: Jaron Sanders, Alexandre Proutière, SeYoung Yun This paper considers cluster detection in Block Markov Chains (BMCs). These Markov chains are characterized by a block structure in their transition matrix. More precisely, the $n$ possible states are divided into a finite number of $K$ groups or clusters, such that states in the same cluster exhibit the same transition rates to other states. One observes a trajectory of the Markov chain, and the objective is to recover, from this observation only, the (initially unknown) clusters. In this paper we devise a clustering procedure that accurately, efficiently, and provably detects the clusters. We first derive a fundamental informationtheoretical lower bound on the detection error rate satisfied under any clustering algorithm. This bound identifies the parameters of the BMC, and trajectory lengths, for which it is possible to accurately detect the clusters. We next develop two clustering algorithms that can together accurately recover the cluster structure from the shortest possible trajectories, whenever the parameters allow detection. These algorithms thus reach the fundamental detectability limit, and are optimal in that sense. 
A Fast Algorithm for Multiresolution Mode Decomposition. (arXiv:1712.09338v2 [math.NA] UPDATED) Cache Translate Page 
Authors: Gao Tang, Haizhao Yang \emph{Multiresolution mode decomposition} (MMD) is an adaptive tool to analyze a time series $f(t)=\sum_{k=1}^K f_k(t)$, where $f_k(t)$ is a \emph{multiresolution intrinsic mode function} (MIMF) of the form \begin{eqnarray*} f_k(t)&=&\sum_{n=N/2}^{N/21} a_{n,k}\cos(2\pi n\phi_k(t))s_{cn,k}(2\pi N_k\phi_k(t))\\&&+\sum_{n=N/2}^{N/21}b_{n,k} \sin(2\pi n\phi_k(t))s_{sn,k}(2\pi N_k\phi_k(t)) \end{eqnarray*} with timedependent amplitudes, frequencies, and waveforms. The multiresolution expansion coefficients $\{a_{n,k}\}$, $\{b_{n,k}\}$, and the shape function series $\{s_{cn,k}(t)\}$ and $\{s_{sn,k}(t)\}$ provide innovative features for adaptive time series analysis. The MMD aims at identifying these MIMF's (including their multiresolution expansion coefficients and shape functions series) from their superposition. This paper proposes a fast algorithm for solving the MMD problem based on recursive diffeomorphismbased spectral analysis (RDSA). RDSA admits highly efficient numerical implementation via the nonuniform fast Fourier transform (NUFFT); its convergence and accuracy can be guaranteed theoretically. Numerical examples from synthetic data and natural phenomena are given to demonstrate the efficiency of the proposed method. 
Arboreal Cantor actions. (arXiv:1801.01440v2 [math.DS] UPDATED) Cache Translate Page 
Authors: Olga Lukina In this paper, we consider minimal equicontinuous actions of discrete countably generated groups on Cantor sets, obtained from the arboreal representations of absolute Galois groups of fields. In particular, we study the asymptotic discriminant of these actions. The asymptotic discriminant is an invariant obtained by restricting the action to a sequence of nested clopen sets, and studying the isotropies of the enveloping group actions in such restricted systems. An enveloping (Ellis) group of such an action is a profinite group. A large class of actions of profinite groups on Cantor sets is given by arboreal representations of absolute Galois groups of fields. We show how to associate to an arboreal representation an action of a discrete group, and give examples of arboreal representations with stable and wild asymptotic discriminant. 
Uniform Hausdorff dimension result for the inverse images of stable L\'evy processes. (arXiv:1801.03008v3 [math.PR] UPDATED) Cache Translate Page 
Authors: Renming Song, Yimin Xiao, Xiaochuan Yang We establish a uniform Hausdorff dimension result for the inverse image sets of realvalued strictly $\alpha$stable L\'evy processes with $1< \alpha\le 2$. This extends a theorem of Kaufman for Brownian motion. Our method is different from that of Kaufman and depends on covering principles for Markov processes. 
Throughput Maximization for UAVEnabled Wireless Powered Communication Networks. (arXiv:1801.04545v4 [cs.IT] UPDATED) Cache Translate Page 
Authors: Lifeng Xie, Jie Xu, Rui Zhang This paper studies an unmanned aerial vehicle (UAV)enabled wireless powered communication network (WPCN), in which a UAV is dispatched as a mobile access point (AP) to serve a set of ground users periodically. The UAV employs the radio frequency (RF) wireless power transfer (WPT) to charge the users in the downlink, and the users use the harvested RF energy to send independent information to the UAV in the uplink. Unlike the conventional WPCN with fixed APs, the UAVenabled WPCN can exploit the mobility of the UAV via trajectory design, jointly with the wireless resource allocation optimization, to maximize the system throughput. In particular, we aim to maximize the uplink common (minimum) throughput among all ground users over a finite UAV's flight period, subject to its maximum speed constraint and the users' energy neutrality constraints. The resulted problem is nonconvex and thus difficult to be solved optimally. To tackle this challenge, we first consider an ideal case without the UAV's maximum speed constraint, and obtain the optimal solution to the relaxed problem. The optimal solution shows that the UAV should successively hover above a finite number of ground locations for downlink WPT, as well as above each of the ground users for uplink communication. Next, we consider the general problem with the UAV's maximum speed constraint. Based on the above multilocationhovering solution, we first propose an efficient successive hoverandfly trajectory design, jointly with the downlink and uplink wireless resource allocation, and then propose a locally optimal solution by applying the techniques of alternating optimization and successive convex programming (SCP). Numerical results show that the proposed UAVenabled WPCN achieves significant throughput gains over the conventional WPCN with fixedlocation AP. 
Distributionally Robust Optimization for Sequential Decision Making. (arXiv:1801.04745v2 [cs.SY] UPDATED) Cache Translate Page 
Authors: Zhi Chen, Pengqian Yu, William B. Haskell The distributionally robust Markov Decision Process (MDP) approach asks for a distributionally robust policy that achieves the maximal expected total reward under the most adversarial distribution of uncertain parameters. In this paper, we study distributionally robust MDPs where ambiguity sets for the uncertain parameters are of a format that can easily incorporate in its description the uncertainty's generalized moment as well as statistical distance information. In this way, we generalize existing works on distributionally robust MDP with generalizedmomentbased and statisticaldistancebased ambiguity sets to incorporate information from the former class such as moments and dispersions to the latter class that critically depends on empirical observations of the uncertain parameters. We show that, under this format of ambiguity sets, the resulting distributionally robust MDP remains tractable under mild technical conditions. To be more specific, a distributionally robust policy can be constructed by solving a sequence of onestage convex optimization subproblems. 
On closed Lie ideals of certain tensor products of C*algebras II. (arXiv:1801.06705v3 [math.OA] UPDATED) Cache Translate Page 
Authors: Ved Prakash Gupta, Ranjana Jain, Bharat Talwar We identify all closed Lie ideals of $A \otimes^{\alpha} B$ and $B(H) \otimes^{\alpha} B(H)$, where $\otimes^{\alpha}$ is either the Haagerup tensor product, the Banach space projective tensor product or the operator space projective tensor product, $A$ is any simple C*algebra, $B$ is any C*algebra with one of them admitting no tracial states, and $H$ is an infinite dimensional separable Hilbert space. Further, generalizing a result of Marcoux, we also identify all closed Lie ideals of $A\otimes^{\min} B$, where $A$ is a simple C*algebra with at most one tracial state and $B$ is any commutative C*algebra. 
Parameter estimation for discretelyobserved linear birthanddeath processes. (arXiv:1802.05015v2 [math.ST] UPDATED) Cache Translate Page 
Authors: Anthony C. Davison, Sophie Hautphenne, Andrea Kraus Birthanddeath processes are widely used to model the development of biological populations. Although they are relatively simple models, their parameters can be challenging to estimate, because the likelihood can become numerically unstable when data arise from the most common sampling schemes, such as annual population censuses. Simple estimators may be based on an embedded GaltonWatson process, but this presupposes that the observation times are equispaced. We estimate the birth, death, and growth rates of a linear birthanddeath process whose population size is periodically observed via an embedded GaltonWatson process, and by maximizing a saddlepoint approximation to the likelihood. We show that a Gaussian approximation to the saddlepointbased likelihood connects the two approaches, we establish consistency and asymptotic normality of quasilikelihood estimators, compare our estimators on some numerical examples, and apply our results to census data for two endangered bird populations and the H1N1 influenza pandemic. 
Stochastic VarianceReduced Cubic Regularization for Nonconvex Optimization. (arXiv:1802.07372v2 [math.OC] UPDATED) Cache Translate Page 
Authors: Zhe Wang, Yi Zhou, Yingbin Liang, Guanghui Lan Cubic regularization (CR) is an optimization method with emerging popularity due to its capability to escape saddle points and converge to secondorder stationary solutions for nonconvex optimization. However, CR encounters a high sample complexity issue for finitesum problems with a large data size. %Various inexact variants of CR have been proposed to improve the sample complexity. In this paper, we propose a stochastic variancereduced cubicregularization (SVRC) method under random sampling, and study its convergence guarantee as well as sample complexity. We show that the iteration complexity of SVRC for achieving a secondorder stationary solution within $\epsilon$ accuracy is $O(\epsilon^{3/2})$, which matches the stateofart result on CR types of methods. Moreover, our proposed variance reduction scheme significantly reduces the periteration sample complexity. The resulting total Hessian sample complexity of our SVRC is ${\Oc}(N^{2/3} \epsilon^{3/2})$, which outperforms the stateofart result by a factor of $O(N^{2/15})$. We also study our SVRC under random sampling without replacement scheme, which yields a lower periteration sample complexity, and hence justifies its practical applicability. 
Critical yield numbers and limiting yield surfaces of particle arrays settling in a Bingham fluid. (arXiv:1802.07560v3 [math.OC] UPDATED) Cache Translate Page 
Authors: José A. Iglesias, Gwenael Mercier, Otmar Scherzer We consider the flow of multiple particles in a Bingham fluid in an antiplane shear flow configuration. The limiting situation in which the internal and applied forces balance and the fluid and particles stop flowing, that is, when the flow settles, is formulated as finding the optimal ratio between the total variation functional and a linear functional. The minimal value for this quotient is referred to as the critical yield number or, in analogy to Rayleigh quotients, generalized eigenvalue. This minimum value can in general only be attained by discontinuous, hence not physical, velocities. However, we prove that these generalized eigenfunctions, whose jumps we refer to as limiting yield surfaces, appear as rescaled limits of the physical velocities. Then, we show the existence of geometrically simple minimizers. Furthermore, a numerical method for the minimization is then considered. It is based on a nonlinear finite difference discretization, whose consistency is proven, and a standard primaldual descent scheme. Finally, numerical examples show a variety of geometric solutions exhibiting the properties discussed in the theoretical sections. 
Generic steady state bifurcations in monoid equivariant dynamics with applications in homogeneous coupled cell systems. (arXiv:1802.08490v3 [math.DS] UPDATED) Cache Translate Page 
Authors: Sören Schwenker We prove that steady state bifurcations in finitedimensional dynamical systems that are symmetric with respect to a monoid representation generically occur along an absolutely indecomposable subrepresentation. This is stated as a conjecture in B. Rink and J. Sanders, "Coupled cell networks and their hidden symmetries", SIAM J. Math. Anal., 46 (2014). It is a generalization of the wellknown fact that generic steady state bifurcations in equivariant dynamical systems occur along an absolutely irreducible subrepresentation if the symmetries form a group  finite or compact Lie. Our generalization also includes noncompact symmetry groups. The result has applications in bifurcation theory of homogeneous coupled cell networks as they can be embedded (under mild additional assumptions) into monoid equivariant systems. 
Divergent on average directions of Teichmuller geodesic flow. (arXiv:1803.00093v2 [math.DS] UPDATED) Cache Translate Page 
Authors: Paul Apisa, Howard Masur The set of directions from a quadratic differential that diverge on average under Teichmuller geodesic flow has Hausdorff dimension exactly equal to onehalf. 
The quantum determinant of the elliptic algebra $\mathcal{A}_{q,p}(\mathfrak{\widehat{gl}}_N)$. (arXiv:1803.00311v3 [math.QA] UPDATED) Cache Translate Page 
Authors: L. Frappat, D. Issing, E. Ragoucy We introduce the quantum determinant for the elliptic quantum algebra $\mathcal{A}_{q,p}(\mathfrak{\widehat{gl}}_N)$ and prove that it generates the center of this algebra. 
Robust Optimization for Electricity Generation. (arXiv:1803.06984v2 [math.OC] UPDATED) Cache Translate Page 
Authors: Chaithanya Bandi, Krishnamurthy Dvijotham, David Morton, Haoxiang Yang We consider a robust optimization problem in an electric power system under uncertain demand and availability of renewable energy resources. Solving the deterministic alternating current optimal power flow (ACOPF) problem has been considered challenging since the 1960s due to its nonconvexity. Linear approximation of the AC power flow system sees pervasive use, but does not guarantee a physically feasible system configuration. In recent years, various convex relaxation schemes for the ACOPF problem have been investigated, and under some assumptions, a physically feasible solution can be recovered. Based on these convex relaxation schemes, we construct a robust convex optimization problem with recourse to solve for optimal controllable injections (fossil fuel, nuclear, etc.) in electric power systems under uncertainty (renewable energy generation, demand fluctuation, etc.). We propose a cuttingplane method to solve this robust optimization problem, and we establish convergence and other desirable properties. Experimental results indicate that our robust convex relaxation of the ACOPF problem can provide a tight lower bound. 
A library of secondorder models for synchronous machines. (arXiv:1803.09707v3 [cs.SY] UPDATED) Cache Translate Page 
Authors: Olaoluwapo Ajala, Alejandro Dominguezgarcia, Peter Sauer, Daniel Liberzon This paper presents a library of secondorder models for synchronous machines that can be utilized in power system dynamic performance analysis and control design tasks. The models have a similar structure to the classical model in that they consist of two dynamic states, the power angle and the angular speed. However, unlike the classical model, the models find applications beyond first swing stability analysis; for example, they can also be utilized in transient stability studies. The models are developed through a systematic reduction of a nineteenthorder model, using singular perturbation techniques, and they are validated by comparing their voltage, frequency, and phase profiles with that of the highorder model and that of the classical model. 
Dissipative numerical schemes on Riemannian manifolds with applications to gradient flows. (arXiv:1804.08104v3 [math.NA] UPDATED) Cache Translate Page 
Authors: Elena Celledoni, Sølve Eidnes, Brynjulf Owren, Torbjørn Ringholm This paper concerns an extension of discrete gradient methods to finitedimensional Riemannian manifolds termed discrete Riemannian gradients, and their application to dissipative ordinary differential equations. This includes Riemannian gradient flow systems which occur naturally in optimization problems. The ItohAbe discrete gradient is formulated and applied to gradient systems, yielding a derivativefree optimization algorithm. The algorithm is tested on two eigenvalue problems and two problems from manifold valued imaging: InSAR denoising and DTI denoising. 
On the Ktheoretic classification of dynamically stable systems. (arXiv:1804.10111v2 [mathph] UPDATED) Cache Translate Page 
Authors: Giuseppe De Nittis, Kiyonori Gomi This paper deals with the construction of a suitable topological $K$theory capable of classifying topological phases of dynamically stable systems described by gapped $\eta$selfadjoint operators on a Krein space with indefinite metric $\eta$. 
Local Bmodel Yukawa couplings from Atwisted correlators. (arXiv:1805.02661v3 [hepth] UPDATED) Cache Translate Page 
Authors: Yoshinori Honma, Masahide Manabe Using the exact formula for the Atwisted correlation functions of the two dimensional $\mathcal{N}=(2,2)$ gauged linear sigma model, we reconsider the computation of the Bmodel Yukawa couplings of the local toric CalabiYau varieties. Our analysis is based on an exact result that has been evaluated from the supersymmetric localization technique and careful treatment of its application. We provide a detailed description of a procedure to investigate the local Bmodel Yukawa couplings and also test our prescription by comparing the results with known expressions evaluated from the local mirror symmetry approach. In particular, we find that the ambiguities of classical intersection numbers of a certain class of local toric CalabiYau varieties discovered previously can be interpreted as degrees of freedom of the twisted mass deformations. 
Joint Computation and Communication Cooperation for EnergyEfficient Mobile Edge Computing. (arXiv:1805.05906v2 [cs.IT] UPDATED) Cache Translate Page 
Authors: Xiaowen Cao, Feng Wang, Jie Xu, Rui Zhang, Shuguang Cui This paper proposes a novel user cooperation approach in both computation and communication for mobile edge computing (MEC) systems to improve the energy efficiency for latencyconstrained computation. We consider a basic threenode MEC system consisting of a user node, a helper node, and an access point (AP) node attached with an MEC server, in which the user has latencyconstrained and computationintensive tasks to be executed. We consider two different computation offloading models, namely the partial and binary offloading, respectively. Under this setup, we focus on a particular finite time block and develop an efficient fourslot transmission protocol to enable the joint computation and communication cooperation. Besides the local task computing over the whole block, the user can offload some computation tasks to the helper in the first slot, and the helper cooperatively computes these tasks in the remaining time; while in the second and third slots, the helper works as a cooperative relay to help the user offload some other tasks to the AP for remote execution in the fourth slot. For both cases with partial and binary offloading, we jointly optimize the computation and communication resources allocation at both the user and the helper (i.e., the time and transmit power allocations for offloading, and the CPU frequencies for computing), so as to minimize their total energy consumption while satisfying the user's computation latency constraint. Although the two problems are nonconvex in general, we propose efficient algorithms to solve them optimally. Numerical results show that the proposed joint computation and communication cooperation approach significantly improves the computation capacity and energy efficiency at the user and helper nodes, as compared to other benchmark schemes without such a joint design. 
EnergyEfficient Interactive BeamAlignment for MillimeterWave Networks. (arXiv:1805.06089v2 [cs.IT] UPDATED) Cache Translate Page 
Authors: Muddassar Hussain, Nicolo Michelusi Millimeterwave will be a key technology in nextgeneration wireless networks thanks to abundant bandwidth availability. However, the use of large antenna arrays with beamforming demands precise beamalignment between transmitter and receiver, and may entail huge overhead in mobile environments. This paper investigates the design of an optimal interactive beamalignment and data communication protocol, with the goal of minimizing power consumption under a minimum rate constraint. The base station selects beamalignment or data communication and the beam parameters, based on feedback from the userend. Based on the sectored antenna model and uniform prior on the angles of departure and arrival (AoD/AoA), the optimality of a fixedlength beamalignment phase followed by a data communication phase is demonstrated. Moreover, a decoupled fractional beamalignment method is shown to be optimal, which decouples over time the alignment of AoD and AoA, and iteratively scans a fraction of their region of uncertainty. A heuristic policy is proposed for nonuniform AoD/AoA prior with provable performance guarantees, and it is shown that the uniform prior is the worstcase scenario. The performance degradation due to detection errors is studied analytically and via simulation. The numerical results with analog beams depict up to 4dB, 7.5dB, and 14dB gains over a stateoftheart bisection method, conventional and interactive exhaustive search policies, respectively, and demonstrate that the sectored model provides valuable insights for beamalignment design. 
Geometry and Physics: An Overview. (arXiv:1805.06932v2 [math.HO] UPDATED) Cache Translate Page 
Authors: David R. Morrison We present some episodes from the history of interactions between geometry and physics over the past century. 
Implicit Probabilistic Integrators for ODEs. (arXiv:1805.07970v2 [stat.ME] UPDATED) Cache Translate Page 
Authors: Onur Teymur, Han Cheng Lie, Tim Sullivan, Ben Calderhead We introduce a family of implicit probabilistic integrators for initial value problems (IVPs), taking as a starting point the multistep AdamsMoulton method. The implicit construction allows for dynamic feedback from the forthcoming timestep, in contrast to previous probabilistic integrators, all of which are based on explicit methods. We begin with a concise survey of the rapidlyexpanding field of probabilistic ODE solvers. We then introduce our method, which builds on and adapts the work of Conrad et al. (2016) and Teymur et al. (2016), and provide a rigorous proof of its welldefinedness and convergence. We discuss the problem of the calibration of such integrators and suggest one approach. We give an illustrative example highlighting the effect of the use of probabilistic integrators  including our new method  in the setting of parameter inference within an inverse problem. 
Step Size Matters in Deep Learning. (arXiv:1805.08890v2 [cs.LG] UPDATED) Cache Translate Page 
Authors: Kamil Nar, S. Shankar Sastry Training a neural network with the gradient descent algorithm gives rise to a discretetime nonlinear dynamical system. Consequently, behaviors that are typically observed in these systems emerge during training, such as convergence to an orbit but not to a fixed point or dependence of convergence on the initialization. Step size of the algorithm plays a critical role in these behaviors: it determines the subset of the local optima that the algorithm can converge to, and it specifies the magnitude of the oscillations if the algorithm converges to an orbit. To elucidate the effects of the step size on training of neural networks, we study the gradient descent algorithm as a discretetime dynamical system, and by analyzing the Lyapunov stability of different solutions, we show the relationship between the step size of the algorithm and the solutions that can be obtained with this algorithm. The results provide an explanation for several phenomena observed in practice, including the deterioration in the training error with increased depth, the hardness of estimating linear mappings with large singular values, and the distinct performance of deep residual networks. 
Symmetry and rigidity for the hinged composite plate problem. (arXiv:1805.10216v2 [math.AP] UPDATED) Cache Translate Page 
Authors: Francesca Colasuonno, Eugenio Vecchi The composite plate problem is an eigenvalue optimization problem related to the fourth order operator $(\Delta)^2$. In this paper we continue the study started in [10], focusing on symmetry and rigidity issues in the case of the hinged composite plate problem, a specific situation that allows us to exploit classical techniques like the moving plane method. 
Voros Coefficients for the Hypergeometric Differential Equations and EynardOrantin's Topological Recursion  Part I : For the Weber Equation. (arXiv:1805.10945v3 [math.CA] UPDATED) Cache Translate Page 
Authors: Kohei Iwaki, Tatsuya Koike, Yumiko Takei We develop the theory of quantization of spectral curves via the topological recursion. We formulate a quantization scheme of spectral curves which is not necessarily admissible in the sense of Bouchard and Eynard. The main result of this paper and the second part [IKoT] establishes a relation between the Voros coefficients for the quantum curves and the free energy for spectral curves associated with the confluent family of Gauss hypergeometric differential equations. We focus on the Weber equation in this article, and generalize the result for the other members of the confluent family in the second part. We also find explicit formulas of free energy for those spectral curves in terms of the Bernoulli numbers. 
Momentum space approach to crossing symmetric CFT correlators. (arXiv:1805.11107v2 [hepth] UPDATED) Cache Translate Page 
Authors: Hiroshi Isono, Toshifumi Noumi, Gary Shiu We construct a crossing symmetric basis for conformal fourpoint functions in momentum space by requiring consistent factorization. Just as scattering amplitudes factorize when the intermediate particle is onshell, nonanalytic parts of conformal correlators enjoy a similar factorization in momentum space. Based on this property, Polyakov, in his pioneering 1974 work, introduced a basis for conformal correlators which manifestly satisfies the crossing symmetry. He then initiated the bootstrap program by requiring its consistency with the operator product expansion. This approach is complementary to the ordinary bootstrap program, which is based on the conformal block and requires the crossing symmetry as a consistency condition of the theory. Even though Polyakov's original bootstrap approach has been revisited recently, the crossing symmetric basis has not been constructed explicitly in momentum space. In this paper we complete the construction of the crossing symmetric basis for scalar fourpoint functions with an intermediate operator with a general spin, by using new analytic expressions for threepoint functions involving one tensor. Our new basis manifests the analytic properties of conformal correlators. Also the connected and disconnected correlators are manifestly separated, so that it will be useful for the study of large $N$ CFTs in particular. 
Inequalities for some integrals involving modified Bessel functions. (arXiv:1806.00524v2 [math.CA] UPDATED) Cache Translate Page 
Authors: Robert E. Gaunt Simple inequalities are established for some integrals involving the modified Bessel functions of the first and second kind. In most cases these inequalities are tight in certain limits. As a consequence, we deduce a tight double inequality, involving the modified Bessel function of the first kind, for a generalized hypergeometric function. We also present some open problems that arise from this research. 
Elliptic freefermion model with OS boundary and elliptic Pfaffians. (arXiv:1806.00933v2 [mathph] UPDATED) Cache Translate Page 
Authors: Kohei Motegi We introduce and study a class of partition functions of an elliptic freefermionic face model. We study the partition functions with a triangular boundary using the offdiagonal $K$matrix at the boundary (OS boundary), which was introduced by Kuperberg as a class of variants of the domain wall boundary partition functions. We find explicit forms of the partition functions with OS boundary using elliptic Pfaffians. We find two expressions based on two versions of Korepin's method, and we obtain an identity between two elliptic Pfaffians as a corollary. 
Kobayashi hyperbolicity of moduli spaces of minimal projective manifolds of general type (with the appendix by Dan Abramovich). (arXiv:1806.01666v5 [math.AG] UPDATED) Cache Translate Page 
Authors: Ya Deng In this work we first refine several results on the positivity of direct images by Koll\'ar and ViehwegZuo, along the lines of the fundamental work by ViehwegZuo as well as the recent breakthrough by CaoP\u{a}un on the Iitaka $C_{n,m}$ conjecture. We then apply those results to produce an abundant supply of "negatively twisted" Higgs bundles (socalled ViehwegZuo Higgs bundles in the present paper) on moduli spaces of polarized manifolds with a big and nef canonical sheaf, which refines previous results by ViehwegZuo and PopaTajiWu. These Higgs bundles are used to construct sufficiently many (possibly degenerate) Finsler metrics on those moduli spaces, whose holomorphic sectional curvatures are all bounded from above by a negative constant. In particular, we prove the Kobayashi hyperbolicity of base spaces of effectively parametrized families of minimal projective manifolds of general type. This generalizes previous work by ToYeung, in which they further assumed that the families are canonically polarized. 
Multiphoton supercoherent states. (arXiv:1806.02337v2 [quantph] UPDATED) Cache Translate Page 
Authors: Erik DíazBautista, David J Fernández C In this paper we are going to build the multiphoton supercoherent states for the supersymmetric harmonic oscillator as eigenstates of the $m$th power of a special form (but still with a free parameter) of the KornbluthZypman supersymmetric annihilation operator. They become expressed in terms of the multiphoton coherent states for the standard harmonic oscillator. The Heisenberg uncertainty relation and some statistical properties for these states will be studied. Since the multiphoton supercoherent states turn out to be periodic, then the associated geometric phases will be as well evaluated. 
$\mathbb{F}_p((X))$ is decidable as a module over the ring of additive polynomials. (arXiv:1806.03123v2 [math.LO] UPDATED) Cache Translate Page 
Authors: Gönenç Onay Let $p$ be a prime number, $K$ be the henselization of the rational functions over the finite field $\mathbb{F}_p$ and $R$ be the ring of additive polynomials over K. We show that the field of Laurent series over $\mathbb{F}_p$ is decidable seen as an Rmodule. Moreover, we provide a recursively enumerable axiom system (satisfied by $K$) in the language of $R$modules together with a unary predicate for the valuation ring, modulo which every positive primitive formula is equivalent to a universal formula. Consequently the $R$module theory of the field of Laurent series is modelcomplete in this language and admits $K$ as its prime model. 
Anchoring and Binning the Coordinate Bethe Ansatz. (arXiv:1806.07768v2 [hepth] UPDATED) Cache Translate Page 
Authors: Jarah Evslin The Coordinate Bethe Ansatz (CBA) expresses, as a sum over permutations, the matrix element of an XXX Heisenberg spin chain Hamiltonian eigenstate with a state with fixed spins. These matrix elements comprise the wave functions of the Hamiltonian eigenstates. However, as the complexity of the sum grows rapidly with the length N of the spin chain, the exact wave function in the continuum limit is too cumbersome to be exploited. In this note we provide an approximation to the CBA whose complexity does not directly depend upon N. This consists of two steps. First, we add an anchor to the argument of the exponential in the CBA. The anchor is a permutationdependent integral multiple of 2 pi. Once anchored, the distribution of these arguments simplifies, becoming approximately Gaussian. The wave function is given by the Fourier transform of this distribution and so the calculation of the wave function reduces to the calculation of the moments of the distribution. Second, we parametrize the permutation group as a map between integers and we bin these maps. The calculation of the moments then reduces to a combinatorial exercise on the partitioning into bins. As an example we consider the matrix element between the classical and quantum ground states. 
How should we (correctly) compare multiple graphs?. (arXiv:1807.03368v3 [cs.DM] UPDATED) Cache Translate Page 
Authors: Sam Safavi, Jose Bento Graphs are used in almost every scientific discipline to express relations among a set of objects. Algorithms that compare graphs, and output a closeness score, or a correspondence among their nodes, are thus extremely important. Despite the large amount of work done, many of the scalable algorithms to compare graphs do not produce closeness scores that satisfy the intuitive properties of metrics. This is problematic since nonmetrics are known to degrade the performance of algorithms such as distancebased clustering of graphs (Stratis et al. 2018). On the other hand, the use of metrics increases the performance of several machine learning tasks (Indyk et al. 1999, Clarkson et al. 1999, Angiulli et al. 2002 and Ackermann et al, 2010). In this paper, we introduce a new family of multidistances (a distance between more than two elements) that satisfies a generalization of the properties of metrics to multiple elements. In the context of comparing graphs, we are the first to show the existence of multidistances that simultaneously incorporate the useful property of alignment consistency (Nguyen et al. 2011), and a generalized metric property, and that can be computed via convex optimization. 
Rank of weighted digraphs with blocks. (arXiv:1807.04208v2 [cs.DM] UPDATED) Cache Translate Page 
Authors: Ranveer Singh, Swarup Kumar Panda, Naomi ShakedMonderer, Abraham Berman Let $G$ be a digraph and $r(G)$ be its rank. Many interesting results on the rank of an undirected graph appear in the literature, but not much information about the rank of a digraph is available. In this article, we study the rank of a digraph using the ranks of its blocks. In particular, we define classes of digraphs, namely $r_2$digraph, and $r_0$digraph, for which the rank can be exactly determined in terms of the ranks of subdigraphs of the blocks. Furthermore, the rank of directed trees, simple biblock graphs, and some simple block graphs are studied. 
Mean residual life processes and associated submartingales. (arXiv:1807.05932v4 [math.PR] UPDATED) Cache Translate Page 
Authors: AntoineMarie Bogso We use MadanYor's argument to construct associated submartingales to a class of twoparameter processes that are ordered by the increasing convex dominance. This class includes processes which have MTP$_2$ integrated survival functions. We prove that the integrated survival function of an integrable twoparameter process is MTP$_2$ if and only if it is TP$_2$ in each pair of arguments when the remaining argument is fixed. This result can not be deduced from known results since there are several twoparameter processes whose integrated survival functions do not have interval support. The MTP$_2$ property of certain MRL processes is useful to exhibit numerous other processes having the same property. 
Renormalisation and locality: branched zeta values. (arXiv:1807.07630v2 [mathph] UPDATED) Cache Translate Page 
Authors: Pierre Clavier, Li Guo, Sylvie Paycha, Bin Zhang Multivariate renormalisation techniques are implemented in order to build, study and then renormalise at the poles, branched zeta functions associated with trees. For this purpose, we first prove algebraic results and develop analytic tools, which we then combine to study branched zeta functions. The algebraic aspects concern universal properties for locality algebraic structures, some of which had been discussed in previous work; we "branch/ lift" to trees operators acting on the decoration set of trees, and factorise branched maps through words by means of universal properties for words which we prove in the locality setup. The analytic tools are multivariate meromorphic germs of pseudodifferential symbols with linear poles which generalise the meromorphic germs of functions with linear poles studied in previous work. Multivariate meromorphic germs of pseudodifferential symbols form a locality algebra on which we build various locality maps in the framework of locality structures. We first show that the finite part at infinity defines a locality character from the latter symbol valued meromorphic germs to the scalar valued ones. We further equip the locality algebra of germs of pseudodifferential symbols with locality RotaBaxter operators given by regularised sums and integrals. By means of the universal properties in the framework of locality structures we can lift RotaBaxter operators to trees, and use the lifted discrete sums in order to build and study renormalised branched zeta values associated with trees. By construction these renormalised branched zeta values factorise on mutually independent (for the locality relation) trees. 
Choreographies in the $n$vortex problem. (arXiv:1807.08212v2 [math.DS] UPDATED) Cache Translate Page 
Authors: Renato Calleja, Eusebius Doedel, Carlos GarcíaAzpeitia We consider the equations of motion of $n$ vortices of equal circulation in the plane, in a disk and on a sphere. The vortices form a polygonal equilibrium in a rotating frame of reference. We use numerical continuation in a boundary value setting to determine the Lyapunov families of periodic orbits that arise from the polygonal relative equilibrium. When the frequency of a Lyapunov orbit and the frequency of the rotating frame have a rational relationship then the orbit is also periodic in the inertial frame. A dense set of Lyapunov orbits, with frequencies satisfying a diophantine equation, corresponds to choreographies of the $n$ vortices. We include numerical results for all cases, for various values of $n$, and we provide key details on the computational approach. 
The bounded derived categories of the Tamari lattices are fractionally CalabiYau. (arXiv:1807.08503v2 [math.RT] UPDATED) Cache Translate Page 
Authors: Baptiste Rognerud We prove that the bounded derived category of the incidence algebra of the Tamari lattice is fractionally CalabiYau, giving a positive answer to a conjecture of Chapoton. The proof involves a combinatorial description of the Serre functor of this derived category on a sufficiently nice family of indecomposable objects. 
Spectrum of the second variation. (arXiv:1807.10527v2 [math.OC] UPDATED) Cache Translate Page 
Authors: Andrei Agrachev Second variation of a smooth optimal control problem at a regular extremal is a symmetric Fredholm operator. We study asymptotics of the spectrum of this operator and give an explicit expression for its determinant in terms of solutions of the Jacobi equation. In the case of the least action principle for the harmonic oscillator we obtain a classical Euler identity $\prod\limits_{n=1}^\infty\left(1\frac{x^2}{(\pi n)^2}\right)=\frac{\sin x}{x}$. General case may serve as a rich source of new nice identities. 
Combinatorial proofs of the NewtonGirard and ChapmanCostasSantos identities. (arXiv:1807.11749v2 [math.CO] UPDATED) Cache Translate Page 
Authors: Sajal Kumar Mukherjee, Sudip Bera In this paper we give combinatorial proofs of some well known identities and obtain some generalizations. We give a visual proof of a result of Chapman and CostasSantos regarding the determinant of sum of matrices. Also we find a new identity expressing permanent of sum of matrices. Besides, we give a graphical interpretation of NewtonGirard identity. 
Matched pairs of discrete dynamical systems. (arXiv:1809.00521v2 [mathph] UPDATED) Cache Translate Page 
Authors: Oğul Esen, Serkan Sütlü Matched pairs of Lie groupoids and Lie algebroids are studied. Discrete EulerLagrange equations are written for the matched pairs of Lie groupoids. As such, a geometric framework to couple two mutually interacting discrete systems in the Lie groupoid setting is obtained. We particularly exhibit matched pair dynamics on Lie groups as well. Two examples are provided. One is the discrete dynamics on the matched pair decomposition of the trivial groupoid. The other is the discrete dynamics on matched pair decomposition of the special linear group. 
A variant of Schwarzian mechanics. (arXiv:1809.00904v2 [hepth] UPDATED) Cache Translate Page 
Authors: Anton Galajinsky The Schwarzian derivative is invariant under SL(2,R)transformations and, as thus, any function of it can be used to determine the equation of motion or the Lagrangian density of a higher derivative SL(2,R)invariant 1d mechanics or the Schwarzian mechanics for short. In this note, we consider the simplest variant which results from setting the Schwarzian derivative to be equal to a dimensionful coupling constant. It is shown that the corresponding dynamical system in general undergoes stable evolution but for one fixed point solution which is only locally stable. Conserved charges associated with the SL(2,R)symmetry transformations are constructed and a Hamiltonian formulation reproducing them is proposed. An embedding of the Schwarzian mechanics into a larger dynamical system associated with the geodesics of a Brinkmannlike metric obeying the Einstein equations is constructed. 
Hidden Gibbs measures on shift spaces over countable alphabets. (arXiv:1809.05005v2 [math.DS] UPDATED) Cache Translate Page 
Authors: Godofredo Iommi, Camilo Lacalle, Yuki Yayama We study the thermodynamic formalism for particular types of subadditive sequences on a class of subshifts over countable alphabets. The subshifts we consider include factors of irreducible countable Markov shifts under certain conditions. We show the variational principle for topological pressure. We also study conditions for the existence and uniqueness of invariant ergodic Gibbs measures and the uniqueness of equilibrium states. As an application, we extend the theory of factors of (generalized) Gibbs measures on subshifts on finite alphabets to that on certain subshifts over countable alphabets. 
Underlay Drone Cell for Temporary Events: Impact of Drone Height and Aerial Channel Environments. (arXiv:1809.06699v2 [cs.IT] UPDATED) Cache Translate Page 
Authors: Xiaohui Zhou, Salman Durrani, Jing Guo, Halim Yanikomeroglu Providing seamless connection to a large number of devices is one of the biggest challenges for the Internet of Things (IoT) networks. Using a drone as an aerial base station (ABS) to provide coverage to devices or users on ground is envisaged as a promising solution for IoT networks. In this paper, we consider a communication network with an underlay ABS to provide coverage for a temporary event, such as a sporting event or a concert in a stadium. Using stochastic geometry, we propose a general analytical framework to compute the uplink and downlink coverage probabilities for both the aerial and the terrestrial cellular system. Our framework is valid for any aerial channel model for which the probabilistic functions of lineofsight (LOS) and nonlineofsight (NLOS) links are specified. The accuracy of the analytical results is verified by Monte Carlo simulations considering two commonly adopted aerial channel models. Our results show the nontrivial impact of the different aerial channel environments (i.e., suburban, urban, dense urban and highrise urban) on the uplink and downlink coverage probabilities and provide design guidelines for best ABS deployment height. 
Secondorder Guarantees of Distributed Gradient Algorithms. (arXiv:1809.08694v3 [math.OC] UPDATED) Cache Translate Page 
Authors: Amir Daneshmand, Gesualdo Scutari, Vyacheslav Kungurtsev We consider distributed smooth nonconvex unconstrained optimization over networks, modeled as a connected graph. We examine the behavior of distributed gradientbased algorithms near strict saddle points. Specifically, we establish that (i) the renowned Distributed Gradient Descent (DGD) algorithm likely converges to a neighborhood of a Secondorder Stationary (SoS) solution; and (ii) the more recent class of distributed algorithms based on gradient trackingimplementable also over digraphslikely converges to exact SoS solutions, thus avoiding (strict) saddlepoints. Furthermore, a convergence rate is provided for the latter class of algorithms. 
Statistics on integer partitions arising from seaweed algebras. (arXiv:1809.09271v2 [math.CO] UPDATED) Cache Translate Page 
Authors: Vincent Coll, Andrew Mayers, Nick Mayers Using the index theory of seaweed algebras, we explore various new integer partition statistics. We find relations to some wellknown varieties of integer partitions as well as a surprising periodicity result. 
Perturbation theory for the spectral decomposition of Hermitian matrices. (arXiv:1809.09480v2 [mathph] UPDATED) Cache Translate Page 
Authors: Marcus Carlsson Let A and E be Hermitian selfadjoint matrices, where A is fixed and E a small perturbation. We study how the eigenvalues and eigenvectors of A+E depend on E, with the aim of obtaining first order formulas (and when possible also second order) that are explicitly computable in terms of the spectral decomposition of A and the entries in E. In particular we provide explicit Frechet type differentiability results. We also study the analogous line perturbation A + tF where t varies, which leads to explicit Gateaux type differentiability results. 
Multilevel Optimal Transport: a Fast Approximation of Wasserstein1 distances. (arXiv:1810.00118v2 [stat.CO] UPDATED) Cache Translate Page 
Authors: Jialin Liu, Wotao Yin, Wuchen Li, Yat Tin Chow We propose a fast algorithm for the calculation of the Wasserstein1 distance, which is a particular type of optimal transport distance with homogeneous of degree one ground metric. Our algorithm is built on multilevel primaldual algorithms. Several numerical examples and complexity analysis are provided to demonstrate its computational speed. On some commonly used image examples of size $512\times512$, the proposed algorithm gives solutions within $0.5$ seconds on a single CPU, which is much faster than the stateoftheart algorithms. 
On the rationality of cycle integrals of meromorphic modular forms. (arXiv:1810.00612v2 [math.NT] UPDATED) Cache Translate Page 
Authors: Claudia AlfesNeumann, Kathrin Bringmann, Markus Schwagenscheidt We derive finite rational formulas for the traces of cycle integrals of certain meromorphic modular forms. Moreover, we prove the modularity of a completion of the generating function of such traces. The theoretical framework for these results is an extension of the Shintani theta lift to meromorphic modular forms of positive even weight. 
A framework for constructing sets without configurations. (arXiv:1810.01219v2 [math.CA] UPDATED) Cache Translate Page 
Authors: Robert Fraser We discuss a framework for constructing large subsets of $\mathbb{R}^n$ and $K^n$ for nonarchimedean local fields $K$. This framework is applied to obtain new estimates for the Hausdorff dimension of angleavoiding sets and to provide a counterexample to a limiting version of the Capset problem. 
Bright Solitons Sustained by LongRange Interactions in a System of Quantum Rotors. (arXiv:1810.02420v2 [nlin.PS] UPDATED) Cache Translate Page 
Authors: Ryan Plestid, D. H. J. O'Dell The Hamiltonian Mean Field (HMF) model, which may be interpreted as a quantum rotor model with infiniterange interactions, is the most widely used toy model with which to study longrange interactions (LRI). It has demonstrated a remarkable ability to capture generic or universal features of $any$ system with LRI. In this work we provide a classification of $all~possible$ stationary solutions to the HMF model's generalized GrossPitaevskii equation (GGPE). These solutions are expressible in terms of Mathieu functions and arise due to a competition between freeSchr\"odinger dispersion and a $non\text{}local$ nonlinearity. Upon a Galilean transformation these solutions can transformed to finite velocity solitary waves (bright solitons). In contrast to the typical GPE, there are an infinite tower of bright solitons that emerge, each with a different number of nodes. Our results suggest that LRI can support solitary waves in manner that is novel relative to the typical shortrange case. 
Tight Information Theoretic Converse Results for some Pliable Index Coding Problems. (arXiv:1810.02451v2 [cs.IT] UPDATED) Cache Translate Page 
Authors: Tang Liu, Daniela Tuninetti This paper studies the Pliable Index CODing problem (PICOD), which models contenttype distribution networks. In the PICOD$(t)$ problem there are $m$ messages, $n$ users and each user has a distinct message side information set, as in the classical Index Coding problem (IC). Differently from IC, where each user has a prespecified set of messages to decode, in the PICOD$(t)$ a user is "pliable" and is satisfied if it can decode any $t$ messages that are not in its side information set. The goal is to find a code with the shortest length that satisfies all the users. This flexibility in determining the desired message sets makes the PICOD$(t)$ behave quite differently compared to the IC, and its analysis challenging. This paper mainly focuses on the \emph{complete$S$} PICOD$(t)$ with $m$ messages, where the set $S\subset[m]$ contains the sizes of the side information sets, and the number of users is $n=\sum_{s\in S}\binom{m}{s}$, with no two users having the same side information set. Capacity results are shown for: (i) the \emph{consecutive} complete$S$ PICOD$(t)$, where $S=[s_{\min}:s_{\max}]$ for some $0 \leq s_{\min} \leq s_{\max} \leq mt$, and (ii) the \emph{complementconsecutive} complete$S$ PICOD$(t)$, where $S=[0:mt]\backslash[s_{\min}:s_{\max}]$, for some $0 < s_{\min} \leq s_{\max} < mt$. The novel converse proof is inspired by combinatorial design techniques and the key insight is to consider all messages that a user can eventually decode successfully, even those in excess of the $t$ required ones. This allows one to circumvent the need to consider all possible desired message set assignments at the users in order to find the one that leads to the shortest code length. In addition, tight converse results are also shown for those PICOD$(1)$ with circulararc network topology hypergraph. 
Schr\"odinger wave functional in quantum YangMills theory from precanonical quantization. (arXiv:1805.05279v2 [hepth] CROSS LISTED) Cache Translate Page 
Authors: Igor V. Kanatchikov (U. St Andrews) A relation between the precanonical quantization of pure YangMills fields and the functional Schr\"odinger representation in the temporal gauge is discussed. It is shown that the latter can be obtained from the former when the ultraviolet parameter $\varkappa$ introduced in precanonical quantization goes to infinity. In this limiting case, the Schr\"odinger wave functional can be expressed as the trace of the Volterra product integral of Cliffordalgebravalued precanonical wave functions restricted to a certain field configuration, and the canonical functional derivative Schr\"odinger equation together with the quantum Gau\ss\ constraint are derived from the Diraclike precanonical Schr\"odinger equation. 
Вебархивы как источники доказательств Cache Translate Page 
Заметка сотрудника Библиотеки Стенфордского университета дра Дэвида Розенталя (David Rosenthal – на фото, см. также https://www.lockss.org/contactus/dshr/ ) была опубликована на его блоге (DSHR's Blog) 25 сентября 2018 года. В своём недавнем посте «Блокчейн решит проблему обеспечения долговременной сохранности!» (Blockchain Solves Preservation! , https://blog.dshr.org/2018/09/blockchainsolvespreservation.html  перевод на русский язык здесь: https://rusrim.blogspot.com/2018/10/1.html  Н.Х.) я критиковал публикацию Джона Колломоссе и других авторов (John Collomosse et al) «Проект ARCHANGEL: Доверенные архивы электронных государственных документов» (ARCHANGEL: Trusted Archives of Digital Public Documents, см. https://arxiv.org/abs/1804.08342 , прямая ссылка на PDFфайл: https://arxiv.org/pdf/1804.08342.pdf ). По мнению авторов, проверка целостности путем использования хешей необходима, поскольку: «Целостность документов имеет фундаментальное значение для доверия общественности к архивам. Однако в настоящее время доверие основано на репутации учреждения – это доверие к «вывеске» централизованного авторитетного органа или учреждения, такого, например, как национальный государственный архиве или университет.»Но они также пишут, что: «… доказательства верности/подлинности контента (content evidence) в конечном итоге могут начать приниматься в суде подобно доказательствам на основе анализа ДНК, но достижение такого уровня доверия потребует больших усилий по объяснения общественности особенностей блокчейна на понятном людям языке,  включая, в частности, объяснение того, почему можно доверять криптографическим подтверждениям, характерным для DLTрешений.»По крайней мере в том, что касается работы судов, авторы ошибаются как в отношении «доверия к вывеске», так и в отношении того, как устанавливается доверие. Кирен МакКарти (Kieren McCarthy) в статье «По мнению судей американского апелляционного суда, материалы «Машины прошлого» (Wayback Machine) на сайте Archive.org является надлежащим доказательством» (Archive.org's Wayback Machine is legit legal evidence, US appeals court judges rule, https://www.theregister.co.uk/2018/09/04/wayback_machine_legit/ ) рассказывает о постепенном процессе, в рамках которого апелляционные суды США допускают представление в качестве доказательств вебстраниц, извлеченных с помощью решения Wayback Machine ( https://archive.org/web/ ) компании «ИнтернетАрхив» (Internet Archive): «В находящийся в НьюЙорке федеральный апелляционный суд Второго судебного округа США этим летом поступила просьба рассмотреть обращение итальянского компьютерного хакера, в котором тот требовал исключить из числа допустимых доказательств скриншоты управлявшихся им вебсайтов, устанавливавшие его причастность к вирусу и ботнету, за создание которых он был в конечном счете осужден. Прокуроры сделали скриншоты его вебстраниц, извлеченных из системы «Интернетархива», и использовали их в качестве доказательств в суде  и хакер хотел, чтобы суд отказал в признании этих материалов допустимыми доказательствами.Обратите внимание, что суд основывал своё решение о допустимости доказательств на показаниях свидетеля, лично знавшего процессы архива, а не вере в технологии широкой общественности. Заметьте также, что в ходе рассматривавшихся процессов действительно документировались хеши контента. Деревья хешей Меркла (Merkle trees) из этих хешей не формировались, поскольку такой подход при масштабах «ИнтернетАрхива» был бы слишком дорогостоящим. Мой комментарий: Согласно определению в Википедии (см. https://ru.wikipedia.org/wiki/Дерево_хешей ), "Хешдеревом или деревом Меркла называют полное двоичное дерево, в листовые вершины которого помещены хеши от блоков данных, а внутренние вершины содержат хеши от сложения значений в дочерних вершинах. Корневой узел дерева содержит хеш от всего набора данных, то есть хешдерево является однонаправленной хешфункцией." Третий судебный округ США пришёл к аналогичному выводу, пройдя по похожему пути: «Решение судей апелляционного суда отразило аналогичное решение, принятое ещё в 2011 Третьим судебным округом по делу «США против Бансала» (United States v. Bansal), где свидетель объяснил на основе «личных знаний», как работает система Wayback Machine и насколько она надежна. Суд решил, что данные показания являлись «достаточное доказательством» того, что его сохраненные в архиве вебстраницы были аутентичными. ...Правовая система постепенно укрепляет своё доверие к доказательной силе Wayback Machine, требуя личных показаний от людей, управляющих лежащими в основе работы этой системы процессами, и подвергая этих свидетелей перекрёстному допросу. Системы, на основе блокчейна должны будут пройти аналогичный процесс; и тем из них, в которых используются публичные блокчейны без ограничения доступа (public permissionless blockchains), будет сложно это сделать, поскольку в этом случае невозможно представить показания «людей, управляющих базовыми процессами». В случае решения ARCHANGEL, в котором предполагается использовать частный блокчейн с ограниченным доступом (permissioned), могут потребоваться свидетельские показания как от операторов сетевых узлов, так и от представителей архивов, генерирующих фиксируемые в блокчейнцепочке хеши. Простое доверие общественности не будет и не должно быть достаточным. Дэвид Розенталь (David Rosenthal) Мой комментарий: Российские суды тоже начинают сталкиваться со случаями представления материалов из вебархивов в качестве доказательств, и есть примеры, когда такие доказательства принимаются (см., например, https://rusrim.blogspot.com/2014/01/waybackmachine.html ). Источник: DSHR's Blog https://blog.dshr.org/2018/09/webarchivesasevidence.html 
Search for top quark partners with charge 5/3 in the samesign dilepton and singlelepton final states in protonproton collisions at $\sqrt{s} =$ 13 TeV Cache Translate Page 
arXiv:1810.03188 CMSB2G17014 CERNEP2018258 by: Sirunyan, Albert M (Yerevan Phys. Inst.) et al. Abstract: A search for the pair production of heavy fermionic partners of the top quark with charge 5/3 (X$_{5/3}$) is performed in protonproton collisions at a centerofmass energy of 13 TeV with the CMS detector at the CERN LHC. The data sample analyzed corresponds to an integrated luminosity of 35.9 fb$^{1}$. The X$_{5/3}$ quark is assumed always to decay into a top quark and a W boson. Both the righthanded and lefthanded X$_{5/3}$ couplings to the W boson are considered. Final states with either a pair of samesign leptons or a single lepton are studied. No significant excess of events is observed above the expected standard model background. Lower limits at 95% confidence level on the X$_{5/3}$ quark mass are set at 1.33 and 1.30 TeV respectively for the case of righthanded and lefthanded couplings to W bosons in a combination of the samesign dilepton and singlelepton final states. 
Distributions of PseudoRedshifts and Durations (Observed and Intrinsic) of Fermi GRBs Cache Translate Page 
arXiv:1810.04124 Astrophys.Space Sci. 363 (2018) 223 by: Zitouni, Hannachi Abstract: Ever since the insightful analysis of the durations of GRBs by [Kouveliotou:93], GRBs have most often been classified into two populations: "short bursts" (shorter than 2.0 seconds) and "long bursts" (longer than 2.0 seconds). However, recent works have suggested the existence of an intermediate population in the bursts observed by the Swift satellite. Moreover, some researchers have questioned the universality of the 2.0second dividing line between short and long bursts: some bursts may be short but actually result from collapsars, the physical mechanism behind normally long bursts, and some long ones may originate from mergers, the usual progenitors of short GRBs. In this work, we focus on GRBs detected by the Fermi satellite and study the distribution of their durations measured in the observer's reference frame and, for those with known redshifts, in the bursts' reference frames. However, there are relatively few bursts with measured redshifts, and this makes an accurate study difficult. To overcome this problem, we follow [Zhang:2018] and determine a "pseudoredshift" from the correlation relation between the luminosity $L_p$ and the energy $E_p$, both of which are calculated at the peak of the flux. Interestingly, we find that the uncertainties in the quantities observed and used in the determination of pseudoredshifts, do affect the precision of the individual results significantly, but they keep the distribution of pseudoredshifts very similar to that of the actual ones and thus allow us to use pseudoredshifts for our statistical study. We use the reduced chisquare and the maximization of the loglikelihood to statistically analyze the distribution of Fermi GRB durations. Both methods show that the distribution of the observed and the intrinsic bursts durations are better represented by two groups, rather than three. 
Simulations at the Dwarf Scale: From Violent Dwarfs at Cosmic Dawn and Cosmic Noon to Quiet Discs today Cache Translate Page 
arXiv:1810.04148 by: Ceverino, Daniel Abstract: Dwarf galaxies with stellar masses around 10^9 Msun can be explored at high and low redshifts and they give a glimpse of the different conditions of galaxy formation at different epochs. Using a large sample of about 300 zoomin cosmological hydrodynamical simulations of galaxy formation I will briefly describe the formation of dwarfs at this mass scale at 3 different epochs: cosmic dawn (Ceverino, Klessen, Glover 2018), cosmic noon (Ceverino, Primack, Dekel 2015), and today (Ceverino et al. 2017). I will describe the FirstLight simulations of first galaxies at redshifts 515. These first dwarfs have extremely high star formation efficiencies due to high gas fractions and high gas accretion rates. These simulations will make predictions that will be tested for the first time with the James Webb Space Telescope (JWST). At cosmic noon, z = 2, galaxy formation is still a very violent and dynamic process. The VELA simulations have generated a set of dispersiondominated dwarfs that show an elongated morphology due to their prolate darkmatter halos. Between z = 1 and 0, the AGORA simulation shows the formation of a lowmass disc due to slow gas accretion. The disc agrees with many local scaling relations, such as the stellarmasshalomass and the baryonic TullyFisher relation. 
The Feasibility of Magnetic Reconnection Powered Blazar Flares from Synchrotron SelfCompton Emission Cache Translate Page 
arXiv:1810.04139 by: Morris, Paul J. Abstract: Order of magnitude variability has been observed in the blazar subclass of Active Galactic Nuclei on minute timescales. Such fast high energy flares are often difficult to explain with conventional shock acceleration models due to the small size of the emitting region inferred by the light crossing time. Recent particleincell (PIC) simulations have shown that magnetic reconnection may offer a viable explanation. In this paper, we present a macroscopic emission model physically motivated by PIC simulations, where the energy for particle acceleration originates from the reconnecting magnetic field. We track the radial growth and relative velocity of a reconnecting plasmoid, modelling particle acceleration and radiative losses, which occur via synchrotron and synchrotron selfCompton (SSC) emission. We assume the reconnection layer consists of merging plasmoids, which grow as they merge. We use our model to successfully fit to the 2016 TeV flare of BL Lacertae, demonstrating that reconnection is able to produce TeV flares on the observed timescales. We find that the flaring light curve depends on the merge timescale and the magnetisation of the emitting plasma. However, the SEDs produced by our model are all synchrotrondominated, and observable reconnection plasmoids have radii comparable to the jet radius. We conclude that while reconnection powered SSC flares can produce flares on the correct timescale, the primary source of emission cannot be SSC and the size of plasmoids required may be implausibly large. 
Onset of magnetic reconnection in a collisionless, highbeta plasma Cache Translate Page 
arXiv:1810.04135 by: Alt, Andrew Abstract: In a magnetized, collisionless plasma, the magnetic moment of the constituent particles is an adiabatic invariant. An increase in the magneticfield strength in such a plasma thus leads to an increase in the thermal pressure perpendicular to the field lines. Above a $\beta$dependent threshold (where $\beta$ is the ratio of thermal to magnetic pressure), this pressure anisotropy drives the mirror instability, producing strong distortions in the field lines on ionLarmor scales. The impact of this instability on magnetic reconnection is investigated using a simple analytical model for the formation of a current sheet (CS) and the associated production of pressure anisotropy. The difficulty in maintaining an isotropic, Maxwellian particle distribution during the formation and subsequent thinning of a CS in a collisionless plasma, coupled with the low threshold for the mirror instability in a high$\beta$ plasma, imply that the geometry of reconnecting magnetic fields can differ radically from the standard Harrissheet profile often used in kinetic simulations of collisionless reconnection. As a result, depending on the rate of CS formation and the initial CS thickness, tearing modes whose growth rates and wavenumbers are boosted by this difference may disrupt the sheet before standard tearing modes are able to develop. A quantitative theory is developed to illustrate this process, which may find application in the tearingmediated disruption of kinetic magnetorotational "channel" modes. 
Secondary Radio and Xray Emissions from Galaxy Mergers Cache Translate Page 
arXiv:1810.04155 by: Yuan, Chengchao Abstract: Shocks arising in galaxy mergers could accelerate cosmicray (CR) ions to TeVPeV energies. While propagating in the intergalactic medium, these CRs can produce highenergy neutrinos, electronpositron pairs and gammarays. In the presence of intergalactic magnetic fields, the secondary pairs will radiate observable emissions through synchrotron radiation and inverse Compton scattering. In this paper, we demonstrate that these emissions can explain the radio and Xray fluxes of merging galaxies such as NGC 660 and NGC 3256. Using our model in combination with the observations, we can constrain the gas mass, shock velocity, magnetic field and the CR spectral index $s$ of these systems. For NGC 660 a singlezone model with a spectral index $2.1\lesssim s\lesssim2.2$ is able to reproduce simultaneously the radio and Xray observations, while a simple onezone scenario with $s\sim2$ can describe the radio and a large fraction of Xray observations of NGC 3256. Our work provides a useful approach for studying the dynamics and physical parameters of galaxy mergers, which can play an important part in future multimessenger studies of similar and related extragalactic sources. 
The long outburst of the black hole transient GRS 1716249 observed in the Xray and radio band Cache Translate Page 
arXiv:1810.03914 by: Bassi, T. Abstract: We present the spectral and timing analysis of Xray observations performed on the Galactic black hole transient GRS 1716249 during the 20162017 outburst. The source was almost continuously observed with the Neil Gehrels Swift Observatory from December 2016 until October 2017. The Xray hardness ratio and timing evolution indicate that the source approached the soft state three times during the outburst, even though it never reached the canonical soft spectral state. Thus, GRS 1716249 increases the number of black hole transients showing outbursts with "failed" state transition. During the softening events, XRT and BAT broadband spectral modeling, performed with thermal Comptonization plus a multicolor disc blackbody, showed a photon index (Gamma < 2) and an inner disc temperature (kTin = 0.20.5 keV) characteristic of the hard intermediate state. This is in agreement with the root mean square amplitude of the flux variability (rms > 10%). We find that, coherently with a scenario in which the disc moves closer to the compact object, the accretion disc inner radius decreases with the increase of the inner disc temperature, until a certain point when the temperature starts to increase at constant radius. This, in addition with the spectral analysis results, suggests that either the accretion disc reached the innermost stable circular orbit during the hard intermediate state or the hot accretion flow might recondensate in an inner minidisc. We report on the radio observations performed during the outburst finding that GRS 1716249 is located on the radioquiet "outlier" branch of the radio/Xray luminosity plane. 
Interplay and specific features of radiation mechanisms of electrons and positrons in crystalline undulators Cache Translate Page 
arXiv:1810.03852 by: Pavlov, Alexander V. Abstract: We predict peculiar changes in spectral distributions of radiation emitted by ultrarelativistic positrons and electrons in periodically bent crystals with variation of the bending amplitude. It is shown that the changes, being sensitive to the projectile energy, manifest themselves differently for negatively and positively charged projectiles. We demonstrate that the features observed are due to the interplay of different radiation mechanisms occurring in periodically bent crystals. The observations are important for design, practical realization and channeling experiments with periodically bent crystals as the key element of the novel light sources. The analysis presented is based on the grounds of accurate numerical simulations of the channeling process. 
Multiplexed readout of kinetic inductance bolometer arrays Cache Translate Page 
arXiv:1810.03848 by: Sipola, Hannu Abstract: Kinetic inductance bolometer (KIB) technology is a candidate for passive submillimeter wave and terahertz imaging systems. Its benefits include scalability into large 2D arrays and operation with intermediate cryogenics in the temperature range of 5  10 K. We have previously demonstrated basic figures of merit compatible with typical requirements in security screening applications, and demonstrated the scalability into large arrays in terms of device fabrication, optics integration, and cryogenics. In this article, we address the last missing ingredient, the readout. The concept, serial addressed frequency excitation (SAFE), is an alternative to full frequencydivision multiplexing at microwave frequencies conventionally used to read out kinetic inductance detectors. We introduce the concept, and analyze the criteria of the multiplexed readout avoiding the degradation of the signaltonoise ratio in the presence of a thermal antialias filter inherent to thermal detectors. We also present radiometric detection experiments demonstrating the noise properties. Furthermore, we present a practical scalable realization of a readout system integrated into a prototype imager with 8712 detectors, and demonstrate working progress by detection with up to 456 detectors. We also present practical detection experiments demonstrating the capacity of SAFE in concealed object detection. 
The XXL Survey: XXVII. The 3XLSS point source catalogue Cache Translate Page 
arXiv:1810.03929 by: Chiappetti, L. Abstract: We present the version of the point source catalogue of the XXL Survey that was used, in part, in the first series of XXL papers. In this paper we release, in our database in Milan and at CDS: (i) the Xray source catalogue with 26056 objects in two areas of 25 deg2; (ii) the associated multiwavelength catalogues with candidate counterparts of the Xray sources in the infrared, nearinfrared, optical, and ultraviolet (plus spectroscopic redshift when available); and (iii) a catalogue of spectroscopic redshifts recently obtained in the southern XXL area. We also present the basic properties of the Xray point sources and their counterparts. Other catalogues described in the second series of XXL papers will be released contextually, and will constitute the second XXL data release. 
The XXL Survey XX: The 365 cluster catalogue Cache Translate Page 
arXiv:1810.03849 by: Adami, C. Abstract: In the currently debated context of using clusters of galaxies as cosmological probes, the need for welldefined cluster samples is critical. The XXL Survey has been specifically designed to provide a well characterised sample of some 500 Xray detected clusters suitable for cosmological studies. The main goal of present article is to make public and describe the properties of the cluster catalogue in its present state, as well as of associated catalogues as superclusters and fossil groups. We release a sample containing 365 clusters in total. We give the details of the followup observations and explain the procedure adopted to validate the cluster spectroscopic redshifts. Considering the whole XXL cluster sample, we have provided two types of selection, both complete in a particular sense: one based on fluxmorphology criteria, and an alternative based on the [0.52] keV flux within one arcmin of the cluster centre. We have also provided Xray temperature measurements for 80$\%$ of the clusters having a flux larger than 9$\times$10$^{15}$$\rm \thinspace erg \, s^{1} \, cm^{2}$. Our cluster sample extends from z$\sim$0 to z$\sim$1.2, with one cluster at z$\sim$2. Clusters were identified through a mean number of six spectroscopically confirmed cluster members. Our updated luminosity function and luminositytemperature relation are compatible with our previous determinations based on the 100 brightest clusters, but show smaller uncertainties. We also present an enlarged list of superclusters and a sample of 18 possible fossil groups. This intermediate publication is the last before the final release of the complete XXL cluster catalogue when the ongoing C2 cluster spectroscopic followup is complete. It provides a unique inventory of mediummass clusters over a 50~\dd\ area out to z$\sim$1. 
Optical/Xray correlations during the V404 Cyg June 2015 outburst Cache Translate Page 
arXiv:1810.03870 by: AlfonsoGarzón, J. Abstract: We present a multiwavelength analysis of the simultaneous optical and Xray light curves of the microquasar V404 Cyg during the June 2015 outburst. We have performed a comprehensive analysis of all the INTEGRAL/IBIS, JEMX, and OMC observations during the brightest epoch of the outburst, along with complementary NuSTAR, AAVSO, and VSNET data, to examine the timing relationship between the simultaneous optical and Xray light curves, in order to understand the emission mechanisms and physical locations. We have identified all optical flares which have simultaneous Xray observations, and performed crosscorrelation analysis to estimate the time delays between the optical and soft and hard Xray emission. We have also compared the evolution of the optical and Xray emission with the hardnessratios. We have identified several types of behaviour during the outburst. On many occasions, the optical flares occur simultaneously with Xray flares, but at other times positive and negative time delays between the optical and Xray emission are measured. We conclude that the observed optical variability is driven by different physical mechanisms, including reprocessing of Xrays in the accretion disc and/or the companion star, interaction of the jet ejections with surrounding material or with previously ejected blobs, and synchrotron emission from the jet. 
Rprocess nucleosynthesis in common envelope jets supernovae Cache Translate Page 
arXiv:1810.03889 by: Grichener, Aldana Abstract: We study rprocess feasibility inside jets launched by a cold neutron star (NS) spirallingin inside the core of a giant star, and find that such common envelope jets supernova (CEJSN) events might be a significant source of heavy rprocess elements in the early Universe. We run the stellar evolution code MESA to follow the evolution of the low metalicity giant stars that swallow NSs during their late expansion phases and find that in many cases the NSs penetrate the core. The BondiHoyleLyttleton mass accretion rate onto a NS as it spiralsin inside the core is sufficiently high to obtain a neutron rich ejecta as required for the strong rprocess where the second and third rprocess elements are synthesized. Due to the small radius of the NS the accretion is through an accretion disk and the outflow is in jets (or bipolar disk winds). The rprocess nucleosynthesis takes place inside the jets. To account for the rprocess abundances in the Galaxy we require that one in ten cases of a NS entering the envelope of a giant star ends as a CEJSN rprocess event. 
Characterizing upward lightning with and without a terrestrial gammaray flash Cache Translate Page 
arXiv:1810.03853 by: Smith, D.M. Abstract: We compare two observations of gammarays before, during, and after lightning flashes initiated by upward leaders from a tower during lowaltitude winter thunderstorms on the western coast of Honshu, Japan. While the two leaders appear similar, one produced a terrestrial gammaray flash (TGF) so bright that it paralyzed the gammaray detectors while it was occurring, and could be observed only via the weaker flux of neutrons created in its wake, while the other produced no detectable TGF gammarays at all. The ratio between the indirectly derived gammaray fluence for the TGF and the 95% confidence gammaray upper limit for the gammaray quiet flash is a factor of $1\times10^7$. With the only two observations of this type providing such dramatically different results  a TGF probably as bright as those seen from space and a powerful upper limit  we recognize that weak, subluminous TGFs in this situation are probably not common, and we quantify this conclusion. While the gammaray quiet flash appeared to have a faster leader and more powerful initial continuous current pulse than the flash that produced a TGF, the TGFproducing flash occurred during a weak gammaray "glow", while the gammaray quiet flash did not, implying a higher electric field aloft when the TGF was produced. We suggest that the field in the highfield region approached by a leader may be more important for whether a TGF is produced than the characteristics of the leader itself. 
Upgrade of a lowtemperature scanning tunneling microscope for electronspin resonance Cache Translate Page 
arXiv:1810.03887 by: Natterer, Fabian D. Abstract: Electron spin resonance with a scanning tunneling microscope (ESRSTM) combines the high energy resolution of spin resonance spectroscopy with the atomic scale control and spatial resolution of STM. Here we describe the upgrade of a helium3 STM with a 2D vectorfield magnet ($B_z$ = 8.0 T, $B_x$ = 0.8 T) to an ESRSTM. The system is capable of delivering RF power to the tunnel junction at frequencies up to 30 GHz. We demonstrate magnetic field sweep ESR for the model system TiH/MgO/Ag(100) and find a magnetic moment of $(1.004 \pm 0.001)$ $\mu_B$. Our upgrade enables to toggle between a DC mode, where the STM is operated with the regular control electronics, and an ultrafastpulsed mode that uses an arbitrary waveform generator for pumpprobe spectroscopy or reading of spinstates. Both modes allow for simultaneous radiofrequency excitation, which we add via a resistive pickoff tee to the bias voltage path. The RF cabling from room temperature to the 350 mK stage has an average attenuation of 18 dB between 5 and 25 GHz. The cable segment between the 350 mK stage and the STM tip presently attenuates an additional $34_{3}^{+5}$ dB from 10 to 26 GHz and $38_{2}^{+3}$ dB between 20 and 30 GHz. We discuss our transmission losses and indicate ways to reduce this attenuation. We finally demonstrate how to synchronize the arrival times of RF and DC pulses coming from different paths to the STM junction, a prerequisite for future pulsed ESR experiments. 
How does the stellar wind influence the radio morphology of a supernova remnant? Cache Translate Page 
arXiv:1810.03777 by: Zhang, M.F. Abstract: We simulate the evolutions of the stellar wind and the supernova remnant (SNR) originating from a runaway massive star in an uniform Galactic environment based on the threedimensional magnetohydrodynamics models. Taking the stellar wind into consideration, we can explain the radio morphologies of many supernova remnants. The directions of the kinematic velocity of the progenitor, the magnetic field and the line of sight are the most important factors influencing the morphologies. If the velocity is perpendicular to the magnetic field, the simulation will give us two different unilateral SNRs and a bilateral symmetric SNR. If the velocity is parallel to the magnetic field, we can obtain a bilateral asymmetric SNR and a quasicircular SNR. Our simulations show the stellar wind plays a key role in the radio evolution of a SNR, which implies the Galactic global density and magnetic field distribution play a secondary role in shaping a SNR. 
An intrinsic link between longterm UV/optical variations and Xray loudness in quasars Cache Translate Page 
arXiv:1810.03776 by: Kang, Wenyong Abstract: Observations have shown that UV/optical variation amplitude of quasars depend on several physi cal parameters including luminosity, Eddington ratio, and likely also black hole mass. Identifying new factors which correlate with the variation is essential to probe the underlying physical processes. Combining ~ten years long quasar light curves from SDSS stripe 82 and Xray data from Stripe 82X, we build a sample of Xray detected quasars to investigate the relation between UV/optical variation amplitude ({\sigma}rms) and Xray loudness. We find that quasars with more intense Xray radiation (com pared to bolometric luminosity) are more variable in UV/optical. Such correlation remains highly significant after excluding the effect of other parameters including luminosity, black hole mass, Ed dington ratio, redshift, restframe wavelength (i.e., through partial correlation analyses). We further find the intrinsic link between Xray loudness and UV/optical variation is gradually more prominent on longer timescales (up to 10 years in the observed frame), but tends to disappear at timescales < 100 days. This suggests a slow and longterm underlying physical process. The Xray reprocessing paradigm, in which UV/optical variation is produced by a variable central Xray emission illuminating the accretion disk, is thus disfavored. The discovery points to an interesting scheme that both the Xray corona heating and UV/optical variation is quasars are closely associated with magnetic disc turbulence, and the innermost disc turbulence (where corona heating occurs) correlates with the slow turbulence at larger radii (where UV/optical emission is produced). 
Probing gas disc physics with LISA: simulations of an intermediate mass ratio inspiral in an accretion disc Cache Translate Page 
arXiv:1810.03623 by: Derdzinski, A. Abstract: The coalescence of a compact object with a $10^{4}10^{7} {\rm M_\odot}$ supermassive black hole (SMBH) produces mHz gravitational waves (GWs) detectable by the future Laser Interferometer Space Antenna (LISA). If such an inspiral occurs in the accretion disc of an active galactic nucleus (AGN), the gas torques imprint a small deviation in the GW waveform. Here we present twodimensional hydrodynamical simulations with the movingmesh code DISCO of a BH inspiraling at the GW rate in a binary system with a mass ratio $q\!=\!M_2/M_1\!=\!10^{3}$, embedded in an accretion disc. We assume a locally isothermal equation of state for the gas (with Mach number $\mathcal{M}=20$) and implement a standard $\alpha$prescription for its viscosity (with $\alpha = 0.03$). We find disc torques on the binary that are weaker than in previous semianalytic toy models, and are in the opposite direction: the gas disc slows down, rather than speeds up the inspiral. We compute the resulting deviations in the GW waveform, which scale linearly with the mass of the disc. The SNR of these deviations accumulates mostly at high frequencies, and becomes detectable in a 5year LISA observation if the total phase shift exceeds a few radians. We find that this occurs if the disc surface density exceeds $\Sigma_0 \gtrsim 10^{23}\rm g\,cm^{2}$, as may be the case in thin discs with nearEddington accretion rates. Since the characteristic imprint on the GW signal is strongly dependent on disc parameters, a LISA detection of an intermediate mass ratio inspiral would probe the physics of AGN discs and migration. 
The Berkeley Sample of StrippedEnvelope Supernovae Cache Translate Page 
arXiv:1810.03650 by: Shivvers, saac Abstract: We present the complete sample of strippedenvelope supernova (SN) spectra observed by the Lick Observatory Supernova Search (LOSS) collaboration over the last three decades: 888 spectra of 302 SNe, 652 published here for the first time, with 384 spectra (of 92 SNe) having photometricallydetermined phases. After correcting for redshift and Milky Way dust reddening and reevaluating the spectroscopic classifications for each SN, we construct mean spectra of the three major spectral subtypes (Types IIb, Ib, and Ic) binned by phase. We compare measures of line strengths and widths made from this sample to the results of previous efforts, confirming that O I {\lambda}7774 absorption is stronger and found at higher velocity in Type Ic SNe than in Types Ib or IIb SNe in the first 30 days after peak brightness, though the widths of nebular emission lines are consistent across subtypes. We also highlight newly available observations for a few rare subpopulations of interest. 
NonAdditive Viscous Dark Energy: A Bayesian Analysis Cache Translate Page 
arXiv:1810.03759 by: da Silva, W.J.C. Abstract: By assuming a fluid description for dark energy, we propose a phenomenological approach which takes into the account effects microscopic based on the nonadditive thermodynamics. These effects lead to a tiny perturbation in the perfect fluid which is the thermodynamics part of the standard model ($\Lambda$CDM model). The extra energymomentum arises from the microscopic correlations captured through the distribution function of the 4momentum of the volume element of the dark energy fluid. These correlations are taking into the account as a nonadditive effect which is also related to a mechanism called Nonextensive/Extensive correspondence. This mechanism provides a way to introduce a nonadditive bulk viscosity, which should be vanished in the additive limit, recovered, thus, the perfect fluid description. From the phenomenological standpoint, we motivate three models of bulk viscosity for dark energy and dark matter proposed recently, in the context of the nonadditive formulation. In order to test the model, we perform a Bayesian analysis based on the data of CMB Distance priors, Baryon Acoustic Oscillations Measurements, Cosmic Chronometers, and SNe Ia distance measurements. 
Predictions for the flux of highenergy cosmogenic neutrinos and the influence of the extragalactic magnetic field Cache Translate Page 
arXiv:1810.03769 by: Wittkowski, David Abstract: Cosmogenic neutrinos originate from interactions of cosmic rays propagating through the universe with cosmic background photons. Since both highenergy cosmic rays and cosmic background photons exist, the existence of highenergy cosmogenic neutrinos is almost certain. However, their flux has not been measured so far. Therefore, we calculated the flux of highenergy cosmogenic neutrinos arriving at the Earth on the basis of elaborate fourdimensional simulations that take into account three spatial degrees of freedom and the cosmological timeevolution of the universe. Our predictions for this neutrino flux are consistent with the recent upper limits obtained from largescale cosmicray experiments. We also show that the extragalactic magnetic field has a strong influence on the neutrino flux. The results of this work are important for the design of future neutrino observatories, since they allow to assess the detector volume that is necessary to detect highenergy cosmogenic neutrinos in the near future. An observation of such neutrinos would push multimessenger astronomy to hitherto unachieved energy scales. 
Characterization of color crosstalk of CCD detectors and its influence in multispectral quantitative phase imaging Cache Translate Page 
arXiv:1810.03697 by: Ahmad, Azeem Abstract: Multispectral quantitative phase imaging (QPI) is an emerging imaging modality for wavelength dependent studies of several biological and industrial specimens. Simultaneous multispectral QPI is generally performed with color CCD cameras. However, color CCD cameras are suffered from the color crosstalk issue, which needed to be explored. Here, we present a new approach for accurately measuring the color crosstalk of 2D area detectors, without needing prior information about camera specifications. Color crosstalk of two different cameras commonly used in QPI, single chip CCD (1CCD) and three chip CCD (3CCD), is systematically studied and compared using compact interference microscopy. The influence of color crosstalk on the fringe width and the visibility of the monochromatic constituents corresponding to three color channels of white light interferogram are studied both through simulations and experiments. It is observed that presence of color crosstalk changes the fringe width and visibility over the imaging field of view. This leads to an unwanted nonuniform background error in the multispectral phase imaging of the specimens. It is demonstrated that the color crosstalk of the detector is the key limiting factor for phase measurement accuracy of simultaneous multispectral QPI systems. 
On energy equipartition between cosmic rays and magnetic fields Cache Translate Page 
arXiv:1810.03683 by: Seta, Amit Abstract: Interpretations of synchrotron observations often assume a tight correlation between magnetic and cosmic ray energy densities. We examine this assumption using both testparticle simulations of cosmic rays and MHD simulations which include cosmic rays as a diffusive fluid. We find no spatial correlation between the cosmic rays and magnetic field energy densities at turbulent scales. Moreover, the cosmic ray number density and magnetic field energy density are statistically independent. Nevertheless, the cosmic ray spatial distribution is highly inhomogeneous, especially at low energies because the particles are trapped between random magnetic mirrors. These results can significantly change the interpretation of synchrotron observations and thus our understanding of the strength and structure of magnetic fields in the Milky Way and nearby spiral galaxies. 
Xray and multiepoch optical/UV investigations of BAL to nonBAL quasar transformations Cache Translate Page 
arXiv:1810.03625 by: Sameer Abstract: We report on an Xray and optical/UV study of eight Broad Absorption Line (BAL) to nonBAL transforming quasars at $z\,\approx\,$1.72.2 over 0.294.95 restframe years with at least three spectroscopic epochs for each quasar from the SDSS, BOSS, $Gemini$, and ARC 3.5m telescopes. New $Chandra$ observations obtained for these objects show their values of $\alpha_{\rm ox}$ and $\Delta{\alpha}_{\rm ox}$, as well as their spectral energy distributions, are consistent with those of nonBAL quasars. Moreover, our targets have Xray spectral shapes that are, on average, consistent with weakened absorption with an effective powerlaw photon index of $\Gamma_{\rm eff}\,=\,1.69^{+0.25}_{0.25}$. The newer $Gemini$ and ARC 3.5m spectra reveal that the BAL troughs have remained absent since the BOSS observations where the BAL disappearance was discovered. The Xray and optical/UV results in tandem are consistent with at least the Xray absorbing material moving out of the lineofsight, leaving an Xray unabsorbed nonBAL quasar. The UV absorber might have become more highly ionized (in a shieldinggas scenario) or also moved out of the lineofsight (in a windclumping scenario). 
No cores in dark matterdominated dwarf galaxies with bursty star formation histories Cache Translate Page 
arXiv:1810.03635 by: Bose, Sownak Abstract: Measurements of the rotation curves of dwarf galaxies are often interpreted as requiring a constant density core at the centre, at odds with the "cuspy" inner profiles predicted by $N$body simulations of cold dark matter (CDM) haloes. It has been suggested that this conflict could be resolved by fluctuations in the inner gravitational potential caused by the periodic removal of gas following bursts of star formation. Earlier work has suggested that core formation requires a bursty and extended star formation history (SFH). Here we investigate the structure of CDM haloes of dwarf galaxies ($M_{{\rm DM}} \sim 10^95\times10^{10}\,{\rm M}_\odot$) formed in the APOSTLE and Auriga cosmological hydrodynamic simulations. Our simulations have comparable or better resolution than others that make cores. Yet, we do not find evidence of core formation at any mass or any correlation between the inner slope of the DM density profile and temporal variations in the SFH. APOSTLE and Auriga dwarfs display a similar diversity in their cumulative SFHs to available data for Local Group dwarfs. Dwarfs in both simulations are DMdominated on all resolved scales at all times, likely limiting the ability of gas outflows to alter significantly the central density profiles of their haloes. We conclude that recurrent bursts of star formation are not sufficient to cause the formation of cores, and that other conditions must also be met for baryons to be able to modify the central DM cusp. 
Pesarrodona declara als Jutjats de Manresa per un delicte de desobediència greu Cache Translate Page 
El regidor confia que s'arxivi la causa i denuncia que és una venjança per la foto del nas de pallasso al departament de Governació 
[経済]1960年代のFRBにおける経済分析の変容 Cache Translate Page 
という論文をMostly Economicsが紹介している。論文の原題は「The transformation of economic analysis at the Federal Reserve during the 1960s」で、著者はリール大博士課程のJuan Acostaとセルジー・ポントワーズ大THEMA（Théorie Économique, Modélisation, Application）のBeatrice Cherrier*1。 以下はその要旨。
FRBにおいてPhDの勢力が伸長した歴史的過程については、ここで紹介したジャスティン・フォックスの記事も参照（論文でも参照されている）。また、こうした傾向への最近の反動はここで紹介した本を参照。 
What Do You Call a Moon's Moon? Cache Translate Page 
Two astronomers have asked a question for the ages: Can moons have moons? The delightful, if theoretical, answer is: Yes—yes, they can. As Gizmodo reports, this particular scientific inquiry began with a question from Juna Kollmeier’s son. Kollemeier, who works at the Observatories of the Carnegie Institution of Washington, recruited Sean Raymond, of the University of Bordeaux, to help her answer the question. In a paper posted on arXiv, they lay out their case that moons can have moons. The conditions have to be right—the primary moon has to be big enough and far away enough from the planet it’s orbiting for the smaller, secondary moon to survive. But, even given these caveats, they found that moons in our very own solar system could theoretically have their own smaller moons. Two of Saturn’s moons and one of Jupiter’s are candidates. So is our favorite moon—the Earth’s moon. There’s a serious scientific reason to investigate the presence or absence of moon’s moons: As Kollmeier and Raymond write, it can help give us clues about how planets and their moons were formed. But, all justification aside, there’s something inexplicably pleasing about what Atlas Obscura has taken to calling “recursive places.” Our favorites of these may be islands within islands, such as the subsubsubisland on Victoria Island, or Vulcan Point, which is an “island in the middle of a lake, in the middle of a volcano, in the middle of a bigger lake, in the middle of a bigger island.” There are also countrieswithincountries, such as many of the world’s micronations or Dahala Khagrabari, “a piece of India inside a piece of Bangladesh inside a piece of India inside a piece of Bangladesh.” Or how about a volcano in a volcano? There’s also something truly mindboggling about bodies of water within other bodies of water. (What? How?) But they exist: Here’s a lake under a sea, an underwater river, or a sea surrounded by… more sea. One of the great challenges of talking about recursive places is deciding what call them. The prefix “sub” can do a lot of work here: We can islands within islands “subislands,” and in the arXiv paper, Kollmeier and Raymond call a moon’s moon a “submoon.” But there are other options. New Scientist notes that “moonmoon” has been put forth as a name for a moon’s moon. For those of us who are less than fluent in meme culture: This is a reference to Moon Moon, sometimes described as the internet’s derpiest wolf. Moon Moon was born in 2013, from a werewolf name generator, and soon started frolicking across Tumblr and all other places memes can be found. So, a moon’s moon might be called a submoon or a moonmoon. But why let it stop there? Other suggestions include minimoon, secondorder moon, binary moons, and nested moons. Atlas staffers’ contributions: Metamoon? Moon squared? Moon2? And is there a way to standardize how we talk about recursive places in general? Because if a moon's moon is a moonmoon, shouldn't an island in an island be an islandisland? And a volcano in a volcano be a volcanovolcano? Personally, I am fan of adopting either the sub convention or the meta convention—submoons, subislands, subvolcanoes or metamoons, metaislands, metavolcanoes. But as in all things linguistic, the majority will rule: Whatever the most people decide to call these fascinating places, that's what will stick. 
Scientists claim we haven’t found alien life because we haven’t been looking hard enough Cache Translate Page 
If intelligent alien life exists somewhere in space it's abundantly clear that we haven't made meaningful contact with it yet. Various scientific bodies have devoted themselves to searching for signs of extraterrestrial intelligence and come up totally blank, but why?
The famous Fermi paradox, named for physicist Enrico Fermi, asks if life is indeed common or even notsuperrare in the universe, why haven't we seen evidence of it yet? After all, we've been gazing into space for a while now, listening with highpowered radio telescopes and sending out our own signals in a feeble attempt at alerting ET to our existence, right?
A new research effort attempts to put all this in perspective and arrives at a simple answer: We haven't found life because we're just not looking hard enough.
Researchers from Pennsylvania State University decided to attempt to quantify the amount of searching humans have actually done, comparing that effort with what we think we know about the size of the universe. Ultimately, the team arrived at the conclusion that efforts like SETI — the Search for Extraterrestrial Intelligence — are tiny drops in an absolutely massive bucket.
The researchers explain that mankind can only realistically search for alien communications out to a distance of around 30,000 light years with modern technology. That's a mere stone's throw in astronomical terms, and when you consider that the Milky Way — just one of countless galaxies that we can see — is 100,000 light years across, it's clear that we're really only just scratching the surface.
For added perspective, the team calculated how much of space we've actually taken the time to explore, comparing that to the area that we haven't even begun to search. As MIT Technology Review explains, if the entire search area is the size of Earth's oceans, humans have sporadically searched an area about the size of a hot tub.
Put simply, we may think we're doing a good job of keeping our eyes on the skies for evidence of alien civilizations, but in truth we're barely doing anything at all. 
Exploring LSTMs Cache Translate Page 
It turns out LSTMs are a fairly simple extension to neural networks, and they're behind a lot of the amazing achievements deep learning has made in the past few years. So I'll try to present them as intuitively as possible – in such a way that you could have discovered them yourself. But first, a picture: Aren't LSTMs beautiful? Let's go. (Note: if you're already familiar with neural networks and LSTMs, skip to the middle – the first half of this post is a tutorial.) Neural NetworksImagine we have a sequence of images from a movie, and we want to label each image with an activity (is this a fight?, are the characters talking?, are the characters eating?). How do we do this? One way is to ignore the sequential nature of the images, and build a perimage classifier that considers each image in isolation. For example, given enough images and labels:
This, then, is a deep neural network: it takes an image input, returns an activity output, and – just as we might learn to detect patterns in puppy behavior without knowing anything about dogs (after seeing enough corgis, we discover common characteristics like fluffy butts and drumstick legs; next, we learn advanced features like splooting) – in between it learns to represent images through hidden layers of representations. MathematicallyI assume people are familiar with basic neural networks already, but let's quickly review them.
In matrix notation: $$h = \phi(Wx)$$
$$y = Vh$$
where
Here's a pictorial view: (Note: to make the notation a little cleaner, I assume x and h each contain an extra bias neuron fixed at 1 for learning bias weights.) Remembering Information with RNNsIgnoring the sequential aspect of the movie images is pretty ML 101, though. If we see a scene of a beach, we should boost beach activities in future frames: an image of someone in the water should probably be labeled swimming, not bathing, and an image of someone lying with their eyes closed is probably suntanning. If we remember that Bob just arrived at a supermarket, then even without any distinctive supermarket features, an image of Bob holding a slab of bacon should probably be categorized as shopping instead of cooking. So what we'd like is to let our model track the state of the world:
This, then, is a recurrent neural network. Instead of simply taking an image and returning an activity, an RNN also maintains internal memories about the world (weights assigned to different pieces of information) to help perform its classifications. MathematicallySo let's add the notion of internal knowledge to our equations, which we can think of as pieces of information that the network maintains over time. But this is easy: we know that the hidden layers of neural networks already encode useful information about their inputs, so why not use these layers as the memory passed from one time step to the next? This gives us our RNN equations: $$h_t = \phi(Wx_t + Uh_{t1})$$
$$y_t = Vh_t$$
Note that the hidden state computed at time \(t\) (\(h_t\), our internal knowledge) is fed back at the next time step. (Also, I'll use concepts like hidden state, knowledge, memories, and beliefs to describe \(h_t\) interchangeably.) Longer Memories through LSTMsLet's think about how our model updates its knowledge of the world. So far, we've placed no constraints on this update, so its knowledge can change pretty chaotically: at one frame it thinks the characters are in the US, at the next frame it sees the characters eating sushi and thinks they're in Japan, and at the next frame it sees polar bears and thinks they're on Hydra Island. Or perhaps it has a wealth of information to suggest that Alice is an investment analyst, but decides she's a professional assassin after seeing her cook. This chaos means information quickly transforms and vanishes, and it's difficult for the model to keep a longterm memory. So what we'd like is for the network to learn how to update its beliefs (scenes without Bob shouldn't change Bobrelated information, scenes with Alice should focus on gathering details about her), in a way that its knowledge of the world evolves more gently. This is how we do it.
This, then, is an long shortterm memory network. Whereas an RNN can overwrite its memory at each time step in a fairly uncontrolled fashion, an LSTM transforms its memory in a very precise way: by using specific learning mechanisms for which pieces of information to remember, which to update, and which to pay attention to. This helps it keep track of information over longer periods of time. MathematicallyLet's describe the LSTM additions mathematically. At time \(t\), we receive a new input \(x_t\). We also have our longterm and working memories passed on from the previous time step, \(ltm_{t1}\) and \(wm_{t1}\) (both nlength vectors), which we want to update. We'll start with our longterm memory. First, we need to know which pieces of longterm memory to continue remembering and which to discard, so we want to use the new input and our working memory to learn a remember gate of n numbers between 0 and 1, each of which determines how much of a longterm memory element to keep. (A 1 means to keep it, a 0 means to forget it entirely.) Naturally, we can use a small neural network to learn this remember gate: $$remember_t = \sigma(W_r x_t + U_r wm_{t1}) $$
(Notice the similarity to our previous network equations; this is just a shallow neural network. Also, we use a sigmoid activation because we need numbers between 0 and 1.) Next, we need to compute the information we can learn from \(x_t\), i.e., a candidate addition to our longterm memory: $$ ltm'_t = \phi(W_l x_t + U_l wm_{t1}) $$
\(\phi\) is an activation function, commonly chosen to be \(tanh\). Before we add the candidate into our memory, though, we want to learn which parts of it are actually worth using and saving: $$save_t = \sigma(W_s x_t + U_s wm_{t1})$$
(Think of what happens when you read something on the web. While a news article might contain information about Hillary, you should ignore it if the source is Breitbart.) Let's now combine all these steps. After forgetting memories we don't think we'll ever need again and saving useful pieces of incoming information, we have our updated longterm memory: $$ltm_t = remember_t \circ ltm_{t1} + save_t \circ ltm'_t$$
where \(\circ\) denotes elementwise multiplication. Next, let's update our working memory. We want to learn how to focus our longterm memory into information that will be immediately useful. (Put differently, we want to learn what to move from an external hard drive onto our working laptop.) So we learn a focus/attention vector: $$focus_t = \sigma(W_f x_t + U_f wm_{t1})$$
Our working memory is then $$wm_t = focus_t \circ \phi(ltm_t)$$
In other words, we pay full attention to elements where the focus is 1, and ignore elements where the focus is 0. And we're done! Hopefully this made it into your longterm memory as well. To summarize, whereas a vanilla RNN uses one equation to update its hidden state/memory: $$h_t = \phi(Wx_t + Uh_{t1})$$
An LSTM uses several: $$ltm_t = remember_t \circ ltm_{t1} + save_t \circ ltm'_t$$
$$wm_t = focus_t \circ tanh(ltm_t)$$
where each memory/attention submechanism is just a mini brain of its own: $$remember_t = \sigma(W_r x_t+ U_r wm_{t1}) $$
$$save_t = \sigma(W_s x_t + U_s wm_{t1})$$
$$focus_t = \sigma(W_f x_t + U_f wm_{t1})$$
$$ ltm'_t = tanh(W_l x_t + U_l wm_{t1}) $$
(Note: the terminology and variable names I've been using are different from the usual literature. Here are the standard names, which I'll use interchangeably from now on:
SnorlaxI could have caught a hundred Pidgeys in the time it took me to write this post, so here's a cartoon. Neural NetworksRecurrent Neural NetworksLSTMsLearning to CodeLet's look at a few examples of what an LSTM can do. Following Andrej Karpathy's terrific post, I'll use characterlevel LSTM models that are fed sequences of characters and trained to predict the next character in the sequence. While this may seem a bit toyish, characterlevel models can actually be very useful, even on top of word models. For example:
So to start, I spun up an EC2 p2.xlarge spot instance, and trained a 3layer LSTM on the Apache Commons Lang codebase. Here's a program it generates after a few hours. While the code certainly isn't perfect, it's better than a lot of data scientists I know. And we can see that the LSTM has learned a lot of interesting (and correct!) coding behavior:
How does the model do this? Let's look at a few of the hidden states. Here's a neuron that seems to track the code's outer level of indentation: (As the LSTM moves through the sequence, its neurons fire at varying intensities. The picture represents one particular neuron, where each row is a sequence and characters are colorcoded according to the neuron's intensity; dark blue shades indicate large, positive activations, and dark red shades indicate very negative activations.) And here's a neuron that counts down the spaces between tabs: For kicks, here's the output of a different 3layer LSTM trained on TensorFlow's codebase: There are plenty of other fun examples floating around the web, so check them out if you want to see more. Investigating LSTM InternalsLet's dig a little deeper. We looked in the last section at examples of hidden states, but I wanted to play with LSTM cell states and their other memory mechanisms too. Do they fire when we expect, or are there surprising patterns? CountingTo investigate, let's start by teaching an LSTM to count. (Remember how the Java and Python LSTMs were able to generate proper indentation!) So I generated sequences of the form aaaaaXbbbbb
(N "a" characters, followed by a delimiter X, followed by N "b" characters, where 1 <= N <= 10), and trained a singlelayer LSTM with 10 hidden neurons. As expected, the LSTM learns perfectly within its training range – and can even generalize a few steps beyond it. (Although it starts to fail once we try to get it to count to 19.) aaaaaaaaaaaaaaaXbbbbbbbbbbbbbbb
aaaaaaaaaaaaaaaaXbbbbbbbbbbbbbbbb
aaaaaaaaaaaaaaaaaXbbbbbbbbbbbbbbbbb
aaaaaaaaaaaaaaaaaaXbbbbbbbbbbbbbbbbbb
aaaaaaaaaaaaaaaaaaaXbbbbbbbbbbbbbbbbbb # Here it begins to fail: the model is given 19 "a"s, but outputs only 18 "b"s.
We expect to find a hidden state neuron that counts the number of a's if we look at its internals. And we do: I built a small web app to play around with LSTMs, and Neuron #2 seems to be counting both the number of a's it's seen, as well as the number of b's. (Remember that cells are shaded according to the neuron's activation, from dark red [1] to dark blue [+1].) What about the cell state? It behaves similarly: One interesting thing is that the working memory looks like a "sharpened" version of the longterm memory. Does this hold true in general? It does. (This is exactly as we would expect, since the longterm memory gets squashed by the tanh activation function and the output gate limits what gets passed on.) For example, here is an overview of all 10 cell state nodes at once. We see plenty of lightcolored cells, representing values close to 0. In contrast, the 10 working memory neurons look much more focused. Neurons 1, 3, 5, and 7 are even zeroed out entirely over the first half of the sequence. Let's go back to Neuron #2. Here are the candidate memory and input gate. They're relatively constant over each half of the sequence – as if the neuron is calculating Finally, here's an overview of all of Neuron 2's internals: If you want to investigate the different counting neurons yourself, you can play around with the visualizer here. (Note: this is far from the only way an LSTM can learn to count, and I'm anthropomorphizing quite a bit here. But I think viewing the network's behavior is interesting and can help build better models – after all, many of the ideas in neural networks come from analogies to the human brain, and if we see unexpected behavior, we may be able to design more efficient learning mechanisms.) Count von CountLet's look at a slightly more complicated counter. This time, I generated sequences of the form aaXaXaaYbbbbb
(N a's with X's randomly sprinkled in, followed by a delimiter Y, followed by N b's). The LSTM still has to count the number of a's, but this time needs to ignore the X's as well. Here's the full LSTM. We expect to see a counting neuron, but one where the input gate is zero whenever it sees an X. And we do! Above is the cell state of Neuron 20. It increases until it hits the delimiter Y, and then decreases to the end of the sequence – just like it's calculating a If we look at its input gate, it is indeed ignoring the X's: Interestingly, though, the candidate memory fully activates on the irrelevant X's – which shows why the input gate is needed. (Although, if the input gate weren't part of the architecture, presumably the network would have presumably learned to ignore the X's some other way, at least for this simple example.) Let's also look at Neuron 10. This neuron is interesting as it only activates when reading the delimiter "Y" – and yet it still manages to encode the number of a's seen so far in the sequence. (It may be hard to tell from the picture, but when reading Y's belonging to sequences with the same number of a's, all the cell states have values either identical or within 0.1% of each other. You can see that Y's with fewer a's are lighter than those with more.) Perhaps some other neuron sees Neuron 10 slacking and helps a buddy out. Remembering StateNext, I wanted to look at how LSTMs remember state. I generated sequences of the form AxxxxxxYa
BxxxxxxYb
(i.e., an "A" or B", followed by 110 x's, then a delimiter "Y", ending with a lowercase version of the initial character). This way the network needs to remember whether it's in an "A" or "B" state. We expect to find a neuron that fires when remembering that the sequence started with an "A", and another neuron that fires when remembering that it started with a "B". We do. For example, here is an "A" neuron that activates when it reads an "A", and remembers until it needs to generate the final character. Notice that the input gate ignores all the "x" characters in between. Here is its "B" counterpart: One interesting point is that even though knowledge of the A vs. B state isn't needed until the network reads the "Y" delimiter, the hidden state fires throughout all the intermediate inputs anyways. This seems a bit "inefficient", but perhaps it's because the neurons are doing a bit of doubleduty in counting the number of x's as well. Copy TaskFinally, let's look at how an LSTM learns to copy information. (Recall that our Java LSTM was able to memorize and copy an Apache license.) (Note: if you think about how LSTMs work, remembering lots of individual, detailed pieces of information isn't something they're very good at. For example, you may have noticed that one major flaw of the LSTMgenerated code was that it often made use of undefined variables – the LSTMs couldn't remember which variables were in scope. This isn't surprising, since it's hard to use single cells to efficiently encode multivalued information like characters, and LSTMs don't have a natural mechanism to chain adjacent memories to form words. Memory networks and neural Turing machines are two extensions to neural networks that help fix this, by augmenting with external memory components. So while copying isn't something LSTMs do very efficiently, it's fun to see how they try anyways.) For this copy task, I trained a tiny 2layer LSTM on sequences of the form baaXbaa
abcXabc
(i.e., a 3character subsequence composed of a's, b's, and c's, followed by a delimiter "X", followed by the same subsequence). I wasn't sure what "copy neurons" would look like, so in order to find neurons that were memorizing parts of the initial subsequence, I looked at their hidden states when reading the delimiter X. Since the network needs to encode the initial subsequence, its states should exhibit different patterns depending on what they're learning. The graph below, for example, plots Neuron 5's hidden state when reading the "X" delimiter. The neuron is clearly able to distinguish sequences beginning with a "c" from those that don't. For another example, here is Neuron 20's hidden state when reading the "X". It looks like it picks out sequences beginning with a "b". Interestingly, if we look at Neuron 20's cell state, it almost seems to capture the entire 3character subsequence by itself (no small feat given its onedimensionality!): Here are Neuron 20's cell and hidden states, across the entire sequence. Notice that its hidden state is turned off over the entire initial subsequence (perhaps expected, since its memory only needs to be passively kept at that point). However, if we look more closely, the neuron actually seems to be firing whenever the next character is a "b". So rather than being a "the sequence started with a b" neuron, it appears to be a "the next character is a b" neuron. As far as I can tell, this pattern holds across the network – all the neurons seem to be predicting the next character, rather than memorizing characters at specific positions. For example, Neuron 5 seems to be a "next character is a c" predictor. I'm not sure if this is the default kind of behavior LSTMs learn when copying information, or what other copying mechanisms are available as well. States and GatesTo really hone in and understand the purpose of the different states and gates in an LSTM, let's repeat the previous section with a small pivot. Cell State and Hidden State (Memories)We originally described the cell state as a longterm memory, and the hidden state as a way to pull out and focus these memories when needed. So when a memory is currently irrelevant, we expect the hidden state to turn off – and that's exactly what happens for this sequence copying neuron. Forget GateThe forget gate discards information from the cell state (0 means to completely forget, 1 means to completely remember), so we expect it to fully activate when it needs to remember something exactly, and to turn off when information is never going to be needed again. That's what we see with this "A" memorizing neuron: the forget gate fires hard to remember that it's in an "A" state while it passes through the x's, and turns off once it's ready to generate the final "a". Input Gate (Save Gate)We described the job of the input gate (what I originally called the save gate) as deciding whether or not to save information from a new input. Thus, it should turn off at useless information. And that's what this selective counting neuron does: it counts the a's and b's, but ignores the irrelevant x's. What's amazing is that nowhere in our LSTM equations did we specify that this is how the input (save), forget (remember), and output (focus) gates should work. The network just learned what's best. ExtensionsNow let's recap how you could have discovered LSTMs by yourself. First, many of the problems we'd like to solve are sequential or temporal of some sort, so we should incorporate past learnings into our models. But we already know that the hidden layers of neural networks encode useful information, so why not use these hidden layers as the memories we pass from one time step to the next? And so we get RNNs. But we know from our own behavior that we don't keep track of knowledge willynilly; when we read a new article about politics, we don't immediately believe whatever it tells us and incorporate it into our beliefs of the world. We selectively decide what information to save, what information to discard, and what pieces of information to use to make decisions the next time we read the news. Thus, we want to learn how to gather, update, and apply information – and why not learn these things through their own mini neural networks? And so we get LSTMs. And now that we've gone through this process, we can come up with our own modifications.
Making Neural Nets Great AgainLet's look at one final example, using a 2layer LSTM trained on Trump's tweets. Despite the For example, here's a neuron that tracks its position within hashtags, URLs, and @mentions: Here's a proper noun detector (note that it's not simply firing at capitalized words): Here's an auxiliary verb + "to be" detector ("will be", "I've always been", "has never been"): Here's a quote attributor: There's even a MAGA and capitalization neuron: And here are some of the proclamations the LSTM generates (okay, one of these is a real tweet): Unfortunately, the LSTM merely learned to ramble like a madman. RecapThat's it. To summarize, here's what you've learned: Here's what you should save: And now it's time for that donut. Thanks to Chen Liang for some of the TensorFlow code I used, Ben Hamner and Kaggle for the Trump dataset, and, of course, Schmidhuber and Hochreiter for their original paper. If you want to explore the LSTMs yourself, feel free to play around! 