Zeta-Dimension    
Doty, David and Gu, Xiaoyang and Lutz, Jack H. and Mayordomo, Elvira and Moser, Philippe (2005) Zeta-Dimension. Working Paper. arXiv.
           Bounds on Query Convergence    
Pearlmutter, Barak A. (2005) Bounds on Query Convergence. Working Paper. arXiv.
          СМИ: Архивы Коля могут угрожать репутации правящей партии Германии   

В Германии разгорается спор о политическом наследии Гельмута Коля. На документы претендует вдова политика. Историки настаивают на свободном доступе ко всем источникам. Со своей стороны, канцлер Ангела Меркель хочет скрыть детали разрыва с патриархом германской политики, сообщает журнал Focus. В 1998 году из ведомства федерального канцлера в Бонне исчезли многочисленные документальные материалы. Партия ХДС проиграла парламентские выборы на волне скандала с «черными кассами» по финансированию предвыборной кампании. читайте также За провал на выборах партийцы возложили ответственность на Коля. Политик был смещен со всех постов после шестнадцати лет пребывания у власти. Ангела Меркель тогда инициировала радикальные перемены в партии, отмечает Tagesspiegel. В случае обнародования архивы экс-канцлера могут представить правящую партию ХДС и ее руководство в невыгодном свете, тем более перед предстоящими в сентябре парламентскими выборами. Поэтому важно, кто будет распоряжаться массивом данных, полагают наблюдатели. Между тем в субботу в Европарламенте в Страсбурге состоялось прощание с Гельмутом Колем, скончавшимся 16 июня в своем доме в Людвигсхафен-Оггерсхайме на 88-м году жизни. До сих пор Евросоюз ни разу в своей истории не организовывал подобное мероприятие. читайте также По свидетельству второй жены экс-канцлера Майке Коль-Рихтер, еще при жизни политик определил место прощания и список ораторов на торжественной церемонии, которая должна была подчеркнуть общеевропейский характер его деяний. Гельмута Коля захоронят, согласно его завещанию, не в семейной усыпальнице рядом с женой и родителями в Людвигсхафен-Фризенхайме, а в городе Шпайер в уютном и чистом парке имени Аденауэра вблизи небольшой церкви. Источник новости

Запись СМИ: Архивы Коля могут угрожать репутации правящей партии Германии впервые появилась События дня - InfoRU.news.


          From phys.org: “Researchers refute textbook knowledge in molecular interactions”   
phys.org June 29, 2017 Repulsive ground state interaction E rep (solid lines) and the sum of repulsion and London attraction (E att) energy (broken lines) for argon and methane dimers on a perfectly reflecting surface. Credit: arXiv:1610.09275 [cond-mat.mes-hall] Van der Waals interactions between molecules are among the most important forces in biology, physics, and chemistry, […]
          Dwarf Galaxy near NGC 253 discovered   

On our last working days before Christmas we got an eMail from Michael Sidonio, telling us, that he has discovered a dwarf galaxy close to NGC 253.

We congratulate Michael to his discovery and we are proud that Astronomik filters were used for this image!

Please read more at IFL-Science:
http://www.iflscience.com/space/nearby-galaxy-discovered-backyard-telescope

or watch Michael Interview with "The Canberra Times":
http://www.canberratimes.com.au/act-news/former-strongman-michael-sidonio-discovers-new-galaxy-20160105-gm04iz.html

 

Finaly you may read Michael original lines below!

....
As part of a professional team lead by Aaron J. Romanowsky and David Martinez-Delgardo, this is my first involvement in a scientific discovery and my first scientific paper too.


The paper was accepted for publication in the Monthly Notices of The Royal Astronomical Society just today (dec 22th 2015) and I am pretty excited.

The paper has been in the review process for a while and under embargo until now but Subaru will do a press release, there will be a story in New Scientist shortly and it will be published by Oxford University Press soon.  

The galaxy, in this case a Dwarf Spheroidal, was first discovered in a deep image I captured of NGC 253 using my AG12and Astronomik filters. This was then subsequently followed up by deep exposures by the CHART 32 team with their 32" F7corrected Cassegrain telescope at Cerro Tololo and then finally the Suprime-Cam on the 8m Subaru telescope was used, in sub arc sec seeing, to resolve stars and confirm the discovery and galaxy classification.

So to discover something so faint and so close to such a well researched galaxy like NGC 253 is extra special and the new galaxy is called NGC 253-dw2

The last line of the abstract is very encouraging too: "We also note the continued efficacy of small telescopes for making big discoveries"

Anyway, if you are interested you can read the abstract and then download the paper (top right corner of the page under DOWNLOAD) here: http://arxiv.org/abs/1512.03815

And you can see my deepdiscovery image here: http://www.pbase.com/strongmanmike2002/image/162148414/original 

Is that cool or is that cool..?

Oh and here is my latest image from Terroux Observatory using the new Deep Sky RGB and 6nm Ha and OIII filters J

http://www.pbase.com/strongmanmike2002/image/162116083/original

Cheersand FröhlicheWeihnachten!

Michael Sidonio

www.pbase.com/strongmanmike2002


          Mosaic of the whole Milkyway with Astronomik filters   
In 2000 Axel Mellinger published his famous panorama of the whole milkyway. Until today it is worldwide well known in the scientific community and also well known for its worth in public astronomical education. At that time he used chemical film and a lens of 28mm focal length to gain the 51 frames necessary for the panorama.
In 2009 Mellinger, by now Assistant Professor of Physics at Central Michigan University, repeated his project with modern CCD-equipment. He used an SBIG STL 11000 camera and Astronomik RGB-Filters Type 2c. He took each frame with a 50mm lens five times with each of the three filters and with three different exposure times (240s, 15s and 1/2s). In total he needed more then 3000 frames to produce his new panorama. By the use of his equipment and imaging technique he was able to create a final image in natural color with a considerably increased dynamic range.

          Nieuwsbrief-artikelen - Erik Verlinde en zwaartekracht   
Op 1 april jl. schreef Martijn van Calmthout in De Volkskrant een artikel met de kop UvA-hoogleraar komt met eigen, alternatieve theorie zwaartekracht en op 4 april publiceerde George van Hal op de website van de Nederlandstalige NewScientist het artikel Vooruitblik: nieuwe theorie Erik Verlinde ontmaskert 95 procent van het heelal. De opgewondenheid die van de koppen van deze twee Nederlandse wetenschapsjournalisten spat, heeft te maken met het feit dat de hoogleraar theoretische fysica aan de Universiteit van Amsterdam, prof.dr.ir. Erik Verlinde heeft aangekondigd dat er een dezer dagen een wetenschappelijk artikel van hem zal worden gepubliceerd. In het artikel zal hij uitleggen wat hij op 6 januari 2010 precies bedoelde in het inleidende artikel On the Horizon of Gravity and the Laws of Newton met zijn baanbrekende inzicht dat de zwaartekracht geen fundamentele kracht is maar een emergente kracht. Ofwel dat zwaartekracht - de aantrekkingskracht tussen twee massas - een fenomeen is dat wij als kracht ervaren maar in werkelijkheid het gevolg is van een ander onderliggend proces. Zwaartekracht ontstaat volgens Verlinde door veranderingen in informatiedichtheid.
 
Terwijl ik deze column op mijn toetsenbord zit te tikken is het tweede helft mei en er is nog steeds niets vernomen van het aangekondigde artikel. De spanning loopt op, want in de wetenschappelijke wereld is er nogal verschillend - en soms bijna onwetenschappelijk fel  -gereageerd op de opzienbarende hypothese van Verlinde. De claims die Verlinde legt zijn ook niet misselijk. Hij stelt met zijn nieuwe kijk op de werkelijkheid niet alleen een verklaring te hebben voor de zwaartekracht, maar ook dat de geheimzinnige donkere materie die de totale zwaartekracht in het universum moet verklaren niet bestaat en dat de oerknal op de schop kan. Hij is van mening dat de vergelijkingen van Einstein onvoldoende rekening houden met de hoeveelheid informatie. In feite zet Verlinde de bestaande natuurkunde op zijn kop.
 
Het zal nog wel even duren voordat wij weten of Verlinde geniaal of gek is. Persoonlijk ben ik als geïnteresseerde leek enorm gecharmeerd van zijn hypothese. Bij Verlinde draait alles om informatie en entropie, een begrip uit de tweede hoofdwet van de thermodynamica. Entropie is een maat voor het aantal mogelijke toestanden van een fysisch systeem zoals de moleculen in een hoeveelheid gas. Verlinde merkt in het interview met George van Hal op dat natuurkundigen moeite hebben met het beantwoorden van de vraag hoe het kan dat in het universum de hoeveelheid informatie gelijk blijft en tegelijkertijd de entropie toeneemt. Verlinde beweert dat de entropie gelijk is aan de totale hoeveelheid informatie en dat informatie de basis van alles vormt. Hij concludeert dat energie de snelheid is waarmee informatie wordt verwerkt en dat temperatuur de energie per hoeveelheid informatie is.
 
De reden voor mijn intuïtieve sympathie voor en beheerste optimisme over de hypothese van Verlinde is tweeledig. Ten eerste bevindt de natuurkunde na het verwerken van de gevolgen van de algemene relativiteitstheorie en de kwantummechanica, zich al een tijdje in een onbehaaglijke positie. De natuurkunde en de astronomie worstelen met enkele noodgrepen zoals de hypothesen van donkere materie en donkere energie om aan waargenomen kosmologische fenomenen  te kunnen rekenen, zonder die te kunnen verklaren. Ten tweede rukt het begrip informatie op verschillende plaatsen op. Informatie is lang beschouwd als een niet-fysisch begrip. De Amerikaanse wiskundige en de grondlegger van de cybernetica Norbert Wiener (1894 - 1964) heeft eens gezegd: Information is information, not matter or energy.
 
Maar die zienswijze is aan het veranderen. Met name door het formuleren van het holografisch principe door de Nederlandse Nobelprijswinnaar Gerard t Hooft op basis van de ideeën van de vorig jaar overleden theoretisch natuurkundige Jacob Bekenstein en door de weddenschap tussen Stephen Hawking, Kip Thorne en John Preskill over het antwoord op de vraag of in zwarte gaten informatie verloren gaat, de informatieparadox. Het besef groeit dat de rol van informatie fundamenteler is dan slechts een middel om materie, energie, deeltjes, krachten en interacties te beschrijven. Ook de kwantummechanica met nog onverklaarbare verschijnselen als kwantumverstrengeling (het instantaan uitwisselen van informatie tussen twee deeltjes over grote afstanden) maakt duidelijk dat er in de werkelijkheid een onderliggende proces is waar informatie een hoofdrol speelt.
 
De Oostenrijkse kwantumnatuurkundige Anton Zeilinger heeft eens beweerd dat het operationeel onmogelijk is werkelijkheid en informatie te scheiden. Het idee groeit dat op de kleinst denkbare schaal, de Plancklengte van 1,6 10¯³⁵ m  de werkelijkheid binair is, te beschrijven met enen en nullen. Informatie dus. Zelfs ruimte en tijd zouden daaruit voortkomen. Misschien ligt het nakende artikel van Erik Verlinde straks een tipje op van deze uitdagende sluier.
          JabRef   
JabRef to opensource’owy program, który pełni rolę menadżera odniesień bibliograficznych. Natywnie korzysta przy tym z formatu BibTeX, czyli standardowego formatu dla bibliografii tworzonych za pomocą LaTeXa. Poza tym obsługuje także format BibLaTeX. W programie możliwe jest formatowanie bibliografii przy użyciu rozmaitych stylów LaTeX/BibTeX/BibLaTeX, dzięki czemu stworzone w JabRef listy odniesień spełniają wszelkie standardy bibliograficzne. JabRef działa w maszynie wirtualnej Java, odpowiednie wersje programu zostały przygotowane dla systemów Windows, Mac OS X i Linuks. Warto dodać, że dostępna jest również wersja w postaci pliku JAR, która będzie działać właściwie w każdym systemie z zainstalowanym środowiskiem Java. Główne możliwości JabRef: • wyszukiwanie informacji o wpisach BibTeX w zewnętrznych bazach danych, pobieranie wpisów BibTeX z tych baz – wspierane są np. bazy arXiv, CiteseerX, Google Scholar, Medline, GVK, IEEEXplore, Springer, • pełny tekst pracy, książki czy artykułu, który jest związany z wybranym odniesieniem bibliograficznym, może zostać automatycznie wyszukany w sieci, a następnie pobrany oraz połączony z odpowiednim wpisem BibTeX, • zaawansowane wyszukiwanie danych w bibliografii, • duże możliwości w zakresie klasyfikacji wpisów – grupowanie wpisów w oparciu o słowa kluczowe czy inne atrybuty, • rozmaite funkcje tworzenia i edytowania pól BibTeX, • integracja z programami zewnętrznymi – otwieranie dokumentów w przeglądarkach internetowych i przeglądarkach PDF, wprowadzanie odniesień do programów TeXstudio, LyX, Kile, LatexEditor, Emacs, Vim, WinEdt, • możliwość automatycznej, konfigurowalnej generacji kluczy BibTeX z danych zawartych w dokumentach (np. przy wykorzystaniu informacji takich jak imię i nazwisko autora, tytuł oraz rok wydania pracy/książki), • wsparcie dla metadanych XMP dostępnych w plikach PDF, • import danych z różnych formatów - RIS, Medline/Pubmed (xml), Refer/Endnote, INSPEC, BibTeXML, CSA, ISI Web of Science, SilverPlatter, Scifinder, OVID, Biblioscape, Sixpack, JStor, RIS, • eksport danych m.in. do formatów HTML, Docbook, BibTeXML, MODS, RTF, Refer/Endnote, oraz dokumentów OpenOffice i LibreOffice. Interfejs graficzny JabRef jest wysoce konfigurowalny i intuicyjny w obsłudze. Program raczej będzie przydatny tylko dla użytkowników mających duże pojęcie o zasadach tworzenia profesjonalnych bibliografii. W pliku pomocy oraz w dokumentacji online można znaleźć zestaw szczegółowych instrukcji. Brakuje porad w polskiej wersji językowej, ale można je znaleźć w Internecie.
          New Working Paper: “Classic Papers: Déjà Vu, a Step Further in the Bibliometric Exploitation of Google Scholar”   
The following working paper was posted on arXiv in the past day. Title Classic Papers: Déjà Vu, a Step Further in the Bibliometric Exploitation of Google Scholar Authors Emilio Delgado Lopez-Cozar Universidad de Granada (Spain) Alberto Martin-Martin Universidad de Granada (Spain) Enrique Oduna-Malea Universidad de Granada (Spain) Source via arXiv Report No: EC3 Working Papers […]
          DeepMind AI 关系推理超越人类:深度神经网络模块即插即用   
新智元编译 来源:deepmind.com;arXiv.org 译者:文强   【新智元导读】DeepMind 今天发表官博介绍了他们的两篇最新论文,称其都在理解“关系推理”这一挑战方面展示出了令人可喜的结果。一个是视觉互动网络 VIN,能够预测视觉场景中各个物体在未来几百步所处位置,另一个...
          Гравитационные волны могут скрывать в себе следы иных измерений   

http://jpegshare.net/images/e7/47/e7476a945c931e2e4bdfa12ec57e3caf.jpg

Всплески гравитационных волн, порождаемые сливающимися черными дырами или пульсарами, могут содержать в себе информацию по скрытым или "свернутым" измерениям Вселенной, заявляют ученые в статье, опубликованной в Journal of Cosmology and Astroparticle Physics.

"По сравнению с другими фундаментальными силами, такими как электромагнетизм, к примеру, гравитация очень слабо воздействует на материю. Причиной этой слабости может быть то, что она взаимодействует не только с тремя "видимыми" измерениями и временем, а гораздо большим их числом", — заявил Дэвид Эндриот (David Andriot) из Института гравитационной физики в Потсдаме (Германия).

Сегодня у ученых нет единого мнения о том, является наша Вселенная четырехмерной или в ней гораздо больше измерений, часть из которых мы не видим по разным причинам. Существование этих измерений, как надеются физики, поможет "примирить" теорию относительности и квантовую физику и создать теорию квантовой гравитации, объясняющую, что происходит внутри черных дыр.

К примеру, теория суперструн постулирует, что Вселенная изначально родилась десятимерной и обладала одним временным и девятью пространственными измерениями. Часть сторонников этой теории считают, что "лишние" шесть измерений схлопнулись и замкнулись сами на себя. Другие физики полагают, что наша четырехмерная Вселенная является лишь частью многомерной мультивселенной (мультиверса), а остальные шесть измерений мы не можем увидеть и изучить.

Эндриот и его коллега Густаво Гомез (Gustavo Gomez) заявляют, что следы этих измерений, потенциальных параллельных Вселенных и мультиверса могут скрываться в том, как "эйнштейновские" волны распространяются от их источника к детекторам LIGO и другим гравитационным обсерваториям на Земле.

Гомез и Эндриот попытались выяснить, так ли это на самом деле, просчитав, как будут выглядеть гравитационные волны в "эйнштейновской" четырехмерной и суперструнной десятимерной Вселенной и сравнив их между собой.

Как показали эти расчеты, дополнительные измерения действительно должны влиять на поведение и структуру колебаний пространства–времени, серьезно меняя два их свойства – гравитационные волны из "многомерной" Вселенной будут обладать необычной поляризацией, а их сила в высокочастотной части спектра, превышающей тысячу герц, будет аномально высокой.

Пока оба этих эффекта измерить затруднительно в том числе и потому, что LIGO просто не может наблюдать за столь высокочастотными колебаниями. В свою очередь, ученые не смогут измерить поляризацию гравитационных волн до ввода в строй главного "конкурента" американской обсерватории, европейского детектора VIRGO, который начнет работу в конце августа этого года, когда работа LIGO будет в очередной остановлена.

Как отмечают исследователи, их теория может быть проверена только в конце 2018 года или в начале 2019–го, когда обе гравитационные обсерватории будут работать одновременно. Тогда, надеются Эндриот и Гомез, мы впервые сможем узнать, существуют ли другие измерения и связанные с ними параллельные миры или объединяющая их мультивселенная.

Источник — https://ria.ru/science/20170629/1497507983.html

Написал elmorei на stellar.d3.ru / комментировать


          Dark Energy and Extending the Geodesic Equations of Motion: Connecting the Galactic and Cosmological Length Scales   
Дата и время публикации : 2010-07-29T17:01:16Z Авторы публикации и институты : Achilles D. Speliotopoulos Ссылка на журнал-издание: Ссылка на журнал-издание не найденаКоментарии к cтатье: 25 pages. Accepted for publication in General Relativity and Gravitation. Paper contains the published version of the second half of arXiv:0711.3124v2 with corrections includedПервичная категория: astro-ph.CO Все категории : astro-ph.CO, gr-qc [...]
          目标检测之准确度篇-再读Faster R-CNN   

目标检测之准确度篇-再读Faster R-CNN

一. 源起于Faster

       深度学习于目标检测的里程碑成果,来自于这篇论文:

       Ren, Shaoqing, et al. “Faster R-CNN: Towards real-time object detection with region proposal networks.” Advances in Neural Information Processing Systems. 2015.

       也可以参考:【论文翻译

       虽然该文章前面已经讲过,但只给出了很小的篇幅,并没有作为独立的一篇展开,这里我们详细展开并讨论其 网络结构、应用领域 及 后续改进。

       前面文章参考:【目标检测-RCNN系列


二. 网络结构

       Faster RCNN的网络结构图如下:

        

       用的还是之前的图,其实对于这张图只需要记住一点:RPN网络,这是本文的核心贡献,RPN通过深度网络实现了 Proposal 功能,相较于之前的 SS(Selective Search)方法 和 EdgeBoxes 方法有很大提升。

       RPN 我们来看原论文的图:

        

三. 应用领域

       对于目标检测的研究分为两个方向,精度和效率,一方面以 Faster R-CNN为代表的RPN的方法在精度上不断刷新 mAP;另一方面,以SSD 和 YOLO v2 为代表的回归方法则是强调效率(或者说性价比),这两个方向在领域内都有着很大的应用场景。

       Faster RCNN的代表特征是Region Proposal,通过 RPN 将检测分成两步,提供 Proposal 和 Location+Class,Proposal 越准确,后面的复合Loss里 Class所占比例就越大,分类自然就更加准确。而回归方法没有 Proposal过程,通过 Location+Class直接回归+分类,反向传播误差在Location上面大范围回归,降低了分类占比,因此分类准确度不好保证,特别是对于小目标,检测精度比较差。

       检测精度是算法最核心的价值,即使是以效率为主的 回归方法 也会强调准确性,Faster 方法目前所实现的效率通常是 每秒3-5帧(GPU版本),这在非实时系统里面实际上也是足够使用的,比如在 农业上对于病虫害的检测,在医疗领域对于图像的后处理等等。

       实时系统的应用是更为广阔的市场,这也是为什么说目前有相当多的人持续投入研究,比如 ADAS、机器人、无人机等,这些领域对于 实时性、准确性、成本控制的要求 带来了不断刷新纪录的研究成果。

      

四. 后续改进

       关于 Faster RCNN 的改进比较多,我们将随时关注,保持更新。


作者:linolzhang 发表于2017/7/2 23:31:36 原文链接
阅读:102 评论:0 查看评论

          Climbing the Scholarly Publishing Mountain With SHERPA   

John MacColl and Stephen Pinfield explore the SHERPA project, which is concentrating on making e-prints available online.

 

JISC announced its FAIR Programme (Focus on Access to Institutional Resources) in January of this year. The central objective of the Programme is to test ways of releasing institutionally-produced content onto the web. FAIR describes its scope as: Read more about Climbing the Scholarly Publishing Mountain With SHERPA

JISC announced its FAIR Programme (Focus on Access to Institutional Resources) in January of this year. The central objective of the Programme is to test ways of releasing institutionally-produced content onto the web. FAIR describes its scope as: “to support access to and sharing of institutional content within Higher Education (HE) and Further Education (FE) and to allow intelligence to be gathered about the technical, organisational and cultural challenges of these processes.… This programme is part of a broader area of development to build an Information Environment for the UK’s Distributed National Electronic Resource.”(1) It specifically sought projects in the following areas:

· Support for disclosure of institutional assets including institutional e-print archives and other types of collections through the use of the OAI (Open Archives Initiative) protocol.
· Support for the harvesting of the metadata disclosed through this protocol into services which can be provided to the community on a national basis. These services may be based around subject areas or other groupings of relevance for learning and research.
· Support for disclosure of institutional assets through the use of other relevant protocols, for example Z39.50 and RSS.
· Exploration of the deposit of institutional collections with a community archive or to augment existing collections which have proven learning, teaching or research value.
· Experiments with the embedding of JISC collections and services in local institutional portals and how well they can be presented in conjunction with institutionally managed assets.
· Studies into the related issues and challenges of institutional asset disclosure and deposit, including collections management, IPR, technical, organisational, educational, cultural and digital preservation challenges.
FAIR awarded funding to 14 projects in five ‘clusters’: museums and images, e-prints, e-theses, intellectual property rights, and institutional portals (details are given in the Appendix). The Open Archives Initiative lay very firmly behind FAIR, as the call document says: “This programme is inspired by the vision of the Open Archives Initiative (OAI) (http://www.openarchives.org), that digital resources can be shared between organisations based on a simple mechanism allowing metadata about those resources to be harvested into services.… The model can clearly be extended to include…. learning objects, images, video clips, finding aids, etc. The vision here is of a complex web of resources built by groups with a long term stake in the future of those resources, but made available through service providers to the whole community of learning.”(2) The SHERPA project(3) represents the response to this vision of a number of major research libraries. It is concentrating on making ‘e-prints’ (electronic copies of research papers) available online. The bid was put together under the auspices of CURL (the Consortium of University Research Libraries) which is also contributing to the project funding. The project is being hosted by the University of Nottingham. The research library perspective The starting point of SHERPA is the view that the current system of research publication is not working. In this system the research community (predominantly universities) generates research output in the form of papers, which it then gives away free of charge to commercial publishers, who in turn sell it back to the research community at high prices. And the research community does not just give away its services as authors, but also as referees, editors and editorial board members, all mostly free of charge. Ironically, this is a system that does not ultimately work out in favour of researchers. As authors, the potential impact their research output may make is limited in this system since commercial publishers will normally shield their work behind ‘toll gates’ (journal subscriptions or article pay-per-view charges). As readers of the literature, they are prevented by these toll gates from gaining easy access to all of the publications in their field. Even libraries in large well-funded universities cannot afford subscriptions to anywhere near all peer-reviewed journals(4). Academic libraries are then placed in a difficult position. Journals account for a large proportion of most academic library budgets. And this proportion is growing. Over the last 15 years journal prices have risen by about 10% a year at a time when library budgets have grown by no more than 2 or 3%. Libraries have often had to divert money from other budgets to maintain subscriptions or simply cancel titles. In most cases, they have done both. Many library managers have, as a result, become increasingly frustrated by the system, and those in research universities more than most. It is, after all, these institutions, more than others, who are generating the research output, which they are having to buy back in large quantities and at high prices in order to support ongoing research. Librarians who are buying these publications on behalf of their institutions have been leading voices in saying ‘we cannot go on like this’. One possible solution is ‘self archiving’. Authors can make their own research output freely available outside the confines of commercial journals. Until recently, the best way of doing this was simply mounting it on a web site. However, this is not a particularly attractive prospect. It requires those carrying out literature searches to go to the web sites of individuals and research groups in potentially hundreds of different locations. Either that or rely on standard web search engines. Neither of these could give reliable comprehensive access. The Open Archives Initiative(5) Protocol for Metadata Harvesting (OAI-PMH) is a technical development which addresses this problem. Through the use of a ‘lowest common denominator’ metadata format (unqualified Dublin Core), it allows those producing metadata for all types of digital objects to ‘expose’ their metadata on the internet. The metadata can then be automatically harvested, collected together and made available in a searchable form. The real potential of the protocol lies in its support for interoperability. It is a tool for building union catalogues from a potentially vast range of different collections, and it therefore exploits the ubiquity of the internet to make virtually possible what is physically impossible. E-prints, whether ‘pre-prints’ (which have not yet been peer-reviewed), or ‘post-prints’ (which have), can be deposited and described by the authors themselves or perhaps third parties and made easily available to users. Through the OAI-PMH the metadata created can contribute to a vast worldwide network of resources which can be easily searched. Of course, the ‘invisible college’ has always operated like this in any case (albeit in a limited way). Researchers do in some cases make free copies of their research available to their peers – via conferences, and on web sites. An interesting variant of this is the culture of working papers produced by academic staff belonging to particular institutions. However, this is an exclusive method of communication. Senior researchers in any discipline will know which institutions across the world have the strongest departments, or those with research interests which match their own – but what about junior researchers, or researchers in interdisciplinary areas? They may miss out on accessing this research. The potential impact of the research is then still limited. Making searchable metadata about these papers easily available would be a big step forward in addressing this problem. Benefits of OAI-PMH to institutions and their libraries With a system of OAI-compliant archiving, e-print repositories could replicate content only otherwise available commercially. Making content freely accessible in this way has the potential to improve scholarly communication (by lowering impact and access barriers) but it also has the potential to save institutions and their libraries money. Freeing-up access to the research literature and ensuring it is easily searchable will mean that commercial publishers have to pare down their profit margins and concentrate on adding value in order to retain customers. But of course, it is likely to take a long time before there is a critical mass of content available. This is a massive mountain to be climbed. In some disciplines real progress has already been made. The case of the high-energy physicists who have been using arXiv.org(6) for more than a decade is well-known, but few other disciplines have yet shown an interest in organising themselves around a centralised discipline-specific repository in this way. One suggested means of redressing this is to put the emphasis on repositories at the institutional level instead of the disciplinary. That is what the SHERPA project – located within the e-prints cluster of the FAIR Programme – will seek to test in the UK. If the impetus comes from within the university, with institutional support mechanisms in place to permit the growth of an institutional repository, then the current unevenness in the disciplinary spread of the free corpus may be reduced(7). Over time, the argument goes, a snowball effect will operate within institutions, and at a national – and international – level, so that a multi-disciplinary free collection of research literature can be built. The institutional library service is in many ways the natural co-ordinator of this activity, performing the role of infrastructure provider. As part of the SHERPA project, a number of CURL libraries will begin to take on this role. Six open access e-print repositories will be funded within the project: at the Universities of Edinburgh, Glasgow, Oxford and Nottingham, together with a shared archive within the ‘White Rose’ partnership of York, Leeds and Sheffield, and one at the British Library for the research outputs of ‘non-aligned’ researchers. They will use the open source eprints.org(8) software produced by the University of Southampton. The project will investigate the technical and managerial aspects of running these repositories. After the initial work is complete, it is hoped that other institutions will be able to come on board. SHERPA will be setting up OAI-compliant e-print repositories but it will not (in the first instance at least) be creating aggregated search services. This will be done by others, including new projects funded as part of FAIR. One such project, e-prints UK, will be working in partnership with SHERPA to achieve the best ways of creating metadata so that it can be effectively harvested. One of the key elements of OAI is this separation between repositories (‘Data Providers’) and search services (‘Service Providers’). FAIR gives us an opportunity to try this model out within real organisations. With this experience SHERPA hopes to be in a good position to advise others on setting up these kinds of services from scratch for themselves. In the short term, the biggest challenge of all is not a technical or managerial one but a cultural one. We need to convince academics that they must also join the expedition. Librarians should now take on the role of change advocates. SHERPA will aim to contribute to this advocacy. Major advocacy campaigns will be mounted in CURL institutions supporting the institutional archive agenda. It is also hoped to contribute to the wider campaign beyond these institutions as well. SHERPA will, for example, put materials used and lessons learned into the public domain. It hopes to be one of the growing number of voices in the academic community arguing for change. Quality content One of the key ways of winning over researchers is by demonstrating that e-print repositories can provide access to the quality literature. There are widely held views that free literature on the web is normally of poor quality and that open access repositories are not an appropriate medium for publishing peer-reviewed research. For this reason SHERPA aims to concentrate on collecting refereed content. It will not reject other forms of papers, but it will seek post-prints as its first priority. Authors will be encouraged to post their work on their institutional repository as well as having it published in journals. Having a good proportion of refereed articles searchable within the SHERPA corpus will help to demonstrate the viability of the approach. Another reason to focus on refereed material is that it is likely that this will define which items in the SHERPA collections are selected for digital preservation. While a pre-print which an author never intends to submit for peer review may still be worth preserving, generally the approach will be to preserve articles once they are in their final form – and this is most easily witnessed by their appearance in the journal literature. The approach taken by SHERPA will then be to collect papers which have been (or will be) also published in the peer-reviewed literature. For these reasons, SHERPA is keen to engage publisher support for the project. The very choice of the name, indeed, is designed to convey this. ‘Securing a Hybrid Environment for Research Preservation and Access’. This particular ‘hybrid environment’ is one in which a free corpus of research literature can exist alongside a commercial one, and is not necessarily in conflict with it. As the example of high energy physics shows, open access e-print archives do not necessarily kill journals. Journals may however have to change their roles, possibly focusing on managing the peer-review process and adding value to the basic content (both of which of course cost money) rather than being sole distributors of content. The SHERPA project wants to work alongside publishers to investigate how the field of scholarly communication may take shape in the future. Copyright A key issue here is copyright. It is common for commercial publishers to require authors to sign over copyright to them before they will publish an article. In some cases, this will give the publisher exclusive publication rights and the author will not be able to self archive the paper. The idea that authors should continue to submit their work to journals but also post their work on e-print repositories runs into problems here. How can projects like SHERPA deal with this? Firstly, it should be recognised that not all publishers require copyright sign-over. A good number of publishers allow authors to keep copyright. Since authors (to a certain extent) have the choice about where they place their papers, advocates of self-archiving can encourage authors to place their papers with publishers of this sort and thus retain copyright. Where copyright sign-over is required by publishers, the author is sometimes still permitted to distribute a paper for non-commercial purposes outside the confines of the journal. Some publishers have copyright agreements which explicitly allow the posting of e-prints. Once again, authors can be encouraged to submit papers to these publishers. One thing that SHERPA will aim to do will be to examine the copyright agreements of different publishers and publicise what their agreements will and will not allow. Where exclusive rights are normally expected to be signed over, a number of possible strategies may be adopted. Firstly, SHERPA intends to help authors to negotiate with publishers in order to allow them to self archive. One possible way in which this may be done is to produce a standard ‘back licence’ document that can be appended by authors to publisher copyright agreements. Such a back licence might state that the author is signing the publisher’s own licence but subject to the terms of the back licence, and the back licence in turn allows the author to retain the right to self archive the work in a non-commercial repository. In other cases, SHERPA hopes to negotiate directly with publishers to persuade them to grant the project a blanket waiver which allows articles to be posted on SHERPA archives at least for the duration of the project. This may not be as difficult as it might at first appear. The editor-in-chief of an Elsevier journal in informatics, one of the professors of informatics at the University of Edinburgh, recently pursued Elsevier over its policy regarding e-prints. He received a reply in the Bulletin of the European Association for Theoretical Computer Science for October 2001, in an article entitled ‘Recent Elsevier Science Publishing Policies’, which stated ‘… the exclusive distribution rights obtained by Elsevier Science refer to the article as published, bearing our logo and having exactly the same appearance as it has in the journal. Authors retain the right to keep preprints of their articles on their homepages (and/or relevant preprint servers) and to update their content, for example to take account of errors discovered during the editorial process, provided these do not mimic the appearance of the published version. They are encouraged to include a link to Elsevier Science’s online version of the paper to give readers easy access to the definitive version.’(9) This is an interesting departure for Elsevier and perhaps indicates that some publishers are keen to investigate these issues further. Even where there is no interest, things can be done. SHERPA will also investigate ways in which the Harnad-Oppenheim strategy(10) can be employed effectively and appropriately. Digital preservation The SHERPA project is also keen to pursue another objective. The CURL Directors, in considering the potential of the Open Archives Initiative, were very interested in the archiving dimension. They wanted a project which would ‘put the archiving into Open Archives’. The reason for this is that, as we move into an electronic-journal-dominated future for research, there are real concerns emerging about the preservation of digital material. Who should take responsibility for the preservation of the academic record? This has traditionally been a research library activity. Peter Hirtle, writing in D-Lib in April 2001, stated: “an OAI system that complied with the OAIS reference model, and which offered assurances of long-term accessibility, reliability, and integrity, would be a real benefit to scholarship.”(11) OAIS is the Open Archival Information System(12) (a completely different standard from OAI-PMH), which emerged in 1999 from work done in NASA on designing a reference model for preserving space data. The model was seized upon by the digital preservation world generally, and used within the JISC-funded CURL Exemplars in Digital Archives (CEDARS) project(13). CURL therefore had a strong interest in implementing an OAIS-based digital preservation project, having initiated the successful work in OAIS model development undertaken by the CEDARS project since 1998. We expect that SHERPA will also be engaged in digital preservation activity for the contents of its archives later in the project, and are talking to funding agencies and various partners about the prospects for this. Conclusion The current structure of scholarly communication may have made some sense in a paper-based world. However, in a digital world it is looking increasingly anomalous. Where there is a need for the rapid and wide dissemination of content to the research community, it is found wanting. It is also extremely expensive for the very research community it is trying to serve. The development of institutional repositories is one possible response to the current problems. SHERPA is one project which hopes to go some way in testing out this model. There are key technical, managerial, and cultural issues which need tackling urgently. As the project begins to do this it will disseminate the lessons learned to the wider community in the hope that others will begin the process as well. SHERPA is, of course, just one project within a larger programme. FAIR is just one programme within a larger set of international developments. But it is hoped that FAIR projects, along with others working in this area, can begin to generate some kind of momentum which will enable us to improve the way in which scholarship is carried out in the future. Appendix: FAIR projects Museums and Images Cluster (4 projects)
· Petrie Museum, University College London - Accessing the Virtual Museum
· Fitzwilliam Museum, University of Cambridge; Archaeology Data Service, University of York - Harvesting the Fitzwilliam
· AHDS Executive, King’s College London; Theatre Museum, V&A; Courtald Institute of Art, University of London; Visual Arts Data Service, University of Surrey; Performing Arts Data Service, University of Glasgow - Partial Deposit
· ILRT, University of Bristol; University of Cambridge - BioBank
E-Prints Cluster (4 projects)
· CURL (University of Nottingham; University of Edinburgh; University of Glasgow; Universities of Leeds, Sheffield and York (‘White Rose’ partnership); University of Oxford; British Library) - SHERPA (Securing a Hybrid Environment for Research Preservation and Access)
· RDN, King’s College London; University of Southampton; UKOLN, University of Bath; UMIST; University of Bath; University of Strathclyde; University of Leeds; ILRT, University of Bristol; Heriot Watt University; University of Birmingham; Manchester Metropolitan University; University of Oxford; University of Nottingham; OCLC - E-prints UK
· University of Strathclyde; University of St. Andrews; Napier University; Glasgow Colleges Group - Harvesting Institutional Resources in Scotland Testbed
· University of Southampton - Targeting Academic Research for Deposit and dISclosure
E-Theses Cluster (3 projects)
· Robert Gordon University; University of Aberdeen; Cranfield University; University of London; British Library - Electronic Theses
· University of Edinburgh - Theses Alive!
· University of Glasgow - DAEDALUS
Intellectual Property Rights Cluster (1 project)
· Loughborough University; Birkbeck College, University of London; University of Greenwich; University of Southampton - Machine-readable rights metadata
Institutional Portals Cluster (2 projects)
· University of Hull; RDN, King’s College London; UKOLN, University of Bath - Presenting natiOnal Resources To Audiences Locally
· Norton Radstock College, Bristol; City of Bath College; City of Bristol College; Filton College, Bristol; Weston College, Weston-super-Mare; Western College Consortium, Bristol - FAIR Enough
Author Details John MacColl is Sub-Librarian (Online Services) and Director of SELLIC at the University of Edinburgh. Stephen Pinfield is Assistant Director of Information Services at the University of Nottingham and Director of SHERPA. Both are members of the CURL Task Force for Scholarly Communication. References
(1) http://www.jisc.ac.uk/pub02/c01_02.html
(2) http://www.jisc.ac.uk/pub02/c01_02.html
(3) http://www.sherpa.ac.uk
(4) See Stevan Harnad, ‘The self-archiving initiative’ Nature: webdebates. <http://www.nature.com/nature/debates/e-access/Articles/harnad.html>
(5) See http://www.openarchives.org
(6) http://www.arxiv.org
(7) See Raym Crow The case for institutional repositories: a SPARC position paper. Washington, DC: SPARC, 2002. Release 1.0. <http://www.arl.org/sparc/IR/ir.html>
(8) http://www.eprints.org
(9) Arjen Sevenster ‘Recent Elsevier Science publishing policies’. Bulletin of the European Association for Theoretical Computer Science 75, October 2001, 301-303
(10) Stevan Harnad, ‘For whom the gate tolls? How and why to free the refereed research literature online through author/institution self-archiving, now’, Section 6. <http://www.cogsci.soton.ac.uk/~harnad/Tp/resolution.htm#Harnad/Oppenheim>
(11) Peter Hirtle, ‘Editorial: OAI and OAIS: What’s in a name?’ D-Lib Magazine 7, 4, April 2001 <http://www.dlib.org/dlib/april01/04editorial.html>
(12) See Consultative Committee for Space Data Systems Reference model for an open archival information system (OAIS), 1999 <www.ccds.org/documents/p2/CCSDS-650.0-R-1.pdf>
(13) http://www.leeds.ac.uk/cedars/
Article Title: "Climbing the Scholarly Publishing Mountain with SHERPA" Author: John MacColl and Stephen Pinfield Publication Date: 10-Oct-2002 Publication: Ariadne Issue 33 Originating URL: http://www.ariadne.ac.uk/issue33/sherpa/intro.html

Issue number:

Article type:

Date published: 
Thu, 10/10/2002
Issue 33
issue33_sherpa
http://www.ariadne.ac.uk/issue33/sherpa/

This article has been published under copyright; please see our access terms and copyright guidance regarding use of content from this article. See also our explanations of how to cite Ariadne articles for examples of bibliographic format.


          ОНИ посылают СИГНАЛЫ! [Топ Сикрет] (feat. Артур Шарифов)   
Загадочный сигнал, пришедший из космоса, уже долгие годы заставляет ученых размышлять о существовании внеземных цивилизаций. Загадке пришел конец? Или нет? Канал Артура: https://www.youtube.com/channel/UCxtTXA5DU1bZHLLomu83zVw Подпишись https://vk.com/utopia_show если тебе нравится Утопия Шоу. А еще… Поддержи наш проект: https://vk.com/app5727453_-96007970 Я в ВК https://vk.com/utopia_show Я в Инстаграм https://www.instagram.com/topatella Жизнь ютуб https://vk.com/zhyou Материалы: https://arxiv.org/ftp/arxiv/papers/1706/1706.03259.pdf http://www.natureworldnews.com/articles/38435/20170614/wow-signal-debunked-mysterious-signal-was-likely-a-radio-emission-from-a-comet-and-not-from-aliens.htm https://www.theguardian.com/science/across-the-universe/2016/apr/14/alien-wow-signal-could-be-explained-after-almost-40-years Решена 40-летняя загадка странного…
          Astrônomos encontram, pela primeira vez, dois buracos negros supermassivos orbitando um ao outro   
Em uma grande descoberta, astrônomos observaram um par de buracos negros supermassivos orbitando um ao outro, a centenas de milhões de anos-luz de distância.

A descoberta é o resultado de mais de duas décadas de trabalho, e um feito incrível considerando as medições precisas necessárias. Compreender a natureza de tais interações nos dará uma maior compreensão de como as galáxias e o universo, evoluíram.
"Durante muito tempo, temos olhado para o espaço para tentar encontrar um par destes buracos negros supermassivos orbitando como resultado de duas galáxias em fusão", diz Greg Taylor, um dos pesquisadores da Universidade do Novo México (UNM).
"Mesmo que nós tenhamos teorizado que isso deve estar acontecendo, nunca ninguém tinha visto até agora."
A equipe observou o par de buracos negros em uma galáxia, chamado 0402 + 379, cerca de 750 milhões de anos luz da Terra.

De acordo com Karishma Bansal, o primeiro autor do artigo, também da UNM, a massa combinada destes buracos negros supermassivos é de cerca de 15 bilhões de vezes maior do que o nosso Sol, e seu período orbital é de cerca de 24.000 anos.

Isto significa que mesmo que a equipe tenha observado esses buracos negros há mais de uma década, eles não foram capazes de detectar até mesmo a menor curvatura em sua órbita.

"Se você imaginar um caracol no planeta recém-descoberto orbitando Proxima Centauri - 4.243 anos-luz de distância - se movendo em 1cm [0,4 polegadas] por segundo, é o movimento angular que estamos tratando aqui", explica Roger W. Romani, um dos pesquisadores da Universidade de Stanford.

Os buracos negros são notoriamente difíceis de estudar porque não podem ser observados diretamente, mas só podem ser detectados a partir de seu efeito sobre a matéria nas proximidades.

Assim, para encontrar a órbita desses buracos negros, a equipe UNM usou o Very Long Baseline Array (VLBA), que é composto de 10 radiotelescópios. Ao medir as várias frequências de sinais de rádio emitidas pelos buracos negros, a equipe foi então capaz de traçar sua trajetória.

"Quando o Dr. Taylor me deu esses dados, eu estava no início de aprender a imagem e compreendê-la", disse Bansal .

"E, como eu aprendi nos dados que remontam a 2003, nós traçamos isso e determinamos que eles estão orbitando um ao outro. É muito emocionante." A realização técnica desta descoberta é um triunfo e irá melhorar muito a nossa compreensão desses objetos enigmáticos.

Desde a teoria da relatividade geral de Einstein, os astrônomos se fascinaram pelos buracos negros supermassivos. Recentemente, houveram várias novas descobertas sobre buracos negros, mas ainda não conhecemos muito sobre eles. 

Continuar a observar a órbita e interação desses buracos negros irá revelar muito sobre onde nossa galáxia veio, qual o seu destino no futuro e o papel que os buracos negros desempenham neste processo.

Atualmente, a galáxia de Andrômeda, que também contém um buraco negro supermassivo, é projetado para colidir com a nossa Via Láctea - tornando o evento que a equipe UNM está observando o potencial futuro da nossa galáxia em alguns bilhões de anos.

"Os buracos negros supermassivos têm muita influência sobre as estrelas em torno deles e o crescimento e evolução da galáxia", diz Taylor

"Então, entender mais sobre eles e o que acontece quando eles se fundem uns com os outros pode ser importante para a nossa compreensão do universo."

A equipe UNM vai voltar-se para esses buracos negros em poucos anos para confirmar observações e melhorar suas projeções em torno de órbitas e trajetórias.

Por agora, podemos apreciar o fato de que eles finalmente se mostraram em uma observação direta pela primeira vez e sem dúvida irão inspirar outros trabalhos pela frente no mundo científico mais amplo.

O artigo foi publicado no The Astrophysical Journal com uma versão pré-impressão disponível no arXiv.

          Grasp Pose Detection in Point Clouds. (arXiv:1706.09911v1 [cs.RO])   

Authors: Andreas ten Pas, Marcus Gualtieri, Kate Saenko, Robert Platt

Recently, a number of grasp detection methods have been proposed that can be used to localize robotic grasp configurations directly from sensor data without estimating object pose. The underlying idea is to treat grasp perception analogously to object detection in computer vision. These methods take as input a noisy and partially occluded RGBD image or point cloud and produce as output pose estimates of viable grasps, without assuming a known CAD model of the object. Although these methods generalize grasp knowledge to new objects well, they have not yet been demonstrated to be reliable enough for wide use. Many grasp detection methods achieve grasp success rates (grasp successes as a fraction of the total number of grasp attempts) between 75% and 95% for novel objects presented in isolation or in light clutter. Not only are these success rates too low for practical grasping applications, but the light clutter scenarios that are evaluated often do not reflect the realities of real world grasping. This paper proposes a number of innovations that together result in a significant improvement in grasp detection performance. The specific improvement in performance due to each of our contributions is quantitatively measured either in simulation or on robotic hardware. Ultimately, we report a series of robotic experiments that average a 93% end-to-end grasp success rate for novel objects presented in dense clutter.


          Graph Convolutional Networks for Molecules. (arXiv:1706.09916v1 [cs.LG])   

Authors: Zhenpeng Zhou

Representation learning for molecules is important for molecular properties prediction, material design, drug screening, etc. In this work a graph convolutional network architecture for learning representations for molecules is presented. An operation for convolving k-neighbourhood of a specific node in graph is defined, which is corresponding to kernel size of k in convolutional neural networks. Besides, A module of adaptive filtering is defined to find the sampling locations based on graph connections and node features.


          User Activity Detection in Massive Random Access: Compressed Sensing vs. Coded Slotted ALOHA. (arXiv:1706.09918v1 [cs.IT])   

Authors: Veljko Boljanovic, Dejan Vukobratovic, Petar Popovski, Cedomir Stefanovic

Machine-type communication services in mobile cel- lular systems are currently evolving with an aim to efficiently address a massive-scale user access to the system. One of the key problems in this respect is to efficiently identify active users in order to allocate them resources for the subsequent transmissions. In this paper, we examine two recently suggested approaches for user activity detection: compressed-sensing (CS) and coded slotted ALOHA (CSA), and provide their comparison in terms of performance vs resource utilization. Our preliminary results show that CS-based approach is able to provide the target user activity detection performance with less overall system resource utilization. However, this comes at a price of lower energy- efficiency per user, as compared to CSA-based approach.


          Achieving Spectrum Efficient Communication Under Cross-Technology Interference. (arXiv:1706.09922v1 [cs.NI])   

Authors: Shuai Wang, Zhimeng Yin, Song Min Kim, Tian He

In wireless communication, heterogeneous technologies such as WiFi, ZigBee and BlueTooth operate in the same ISM band.With the exponential growth in the number of wireless devices, the ISM band becomes more and more crowded. These heterogeneous devices have to compete with each other to access spectrum resources, generating cross-technology interference (CTI). Since CTI may destroy wireless communication, this field is facing an urgent and challenging need to investigate spectrum efficiency under CTI. In this paper, we introduce a novel framework to address this problem from two aspects. On the one hand, from the perspective of each communication technology itself, we propose novel channel/link models to capture the channel/link status under CTI. On the other hand, we investigate spectrum efficiency from the perspective by taking all heterogeneous technologies as a whole and building crosstechnology communication among them. The capability of direct communication among heterogeneous devices brings great opportunities to harmoniously sharing the spectrum with collaboration rather than competition.


          Harmonic State Space Modeling of a Three-Phase Modular Multilevel Converter. (arXiv:1706.09925v1 [cs.SY])   

Authors: Jing Lyu, Marta Molinas, Xu Cai

This paper presents the harmonic state space (HSS) modeling of a three-phase modular multilevel converter (MMC). MMC is a converter system with a typical multi-frequency response due to its significant harmonics in the arm currents, capacitor voltages, and control signals. These internal harmonic dynamics can have a great influence on the operation characteristics of MMC. However, the conventional modeling methods commonly used in two-level voltage-source converters (VSCs), where only the fundamental-frequency dynamic is considered, will lead to an inaccurate model that cannot accurately reflect the real dynamic characteristics of MMC. Therefore, the HSS modeling method, in which harmonics of state variables, inputs, and outputs are posed separately in a state-space form, is introduced in this paper to model the MMC in order to capture all the harmonics and the frequency couplings. The steady-state and small-signal dynamic HSS models of a three-phase MMC are developed, respectively. The validity of the developed HSS model of a three-phase MMC has been verified by the results from both the nonlinear time domain simulation model in MATLAB/Simulink and the laboratory prototype with 12 submodules per arm.


          Irregular Repetition Slotted ALOHA over the Rayleigh Block Fading Channel with Capture. (arXiv:1706.09927v1 [cs.IT])   

Authors: Federico Clazzer, Enrico Paolini, Iacopo Mambelli, Cedomir Stefanovic

Random access protocols relying on the transmission of packet replicas in multiple slots and exploiting interference cancellation at the receiver have been shown to achieve per- formance competitive with that of orthogonal schemes. So far the optimization of the repetition degree profile, defining the probability for a user to transmit a given number of replicas, has mainly been performed targeting the collision channel model. In this paper the analysis is extended to a block fading channel model, also assuming capture effect at the receiver. Density evolution equations are developed for the new setting and, based on them, some repetition degree profiles are optimized and analyzed via Monte Carlo simulation in a finite frame length setting. The derived distributions are shown to achieve throughputs largely exceeding 1 [packet/slot].


          A Pseudo-Bayesian Approach to Sign-Compute-Resolve Slotted ALOHA. (arXiv:1706.09930v1 [cs.IT])   

Authors: Jasper Goseling, Cedomir Stefanovic, Petar Popovski

Access reservation based on slotted ALOHA is commonly used in wireless cellular access. In this paper we investigate its enhancement based on the use of physical-layer network coding and signature coding, whose main feature is enabling simultaneous resolution of up to K users contending for access, where K >= 1. We optimise the slot access probability such that the expected throughput is maximised. In particular, the slot access probability is chosen in line with an estimate of the number of users in the system that is obtained relying on the pseudo-Bayesian approach by Rivest, which we generalise for the case that K > 1. Under the assumption that this estimate reflects the actual number of users, we show that our approach achieves throughput 1 in the limit of large K.


          Scalable Asymptotically-Optimal Multi-Robot Motion Planning. (arXiv:1706.09932v1 [cs.MA])   

Authors: Andrew Dobson, Kiril Solovey, Rahul Shome, Dan Halperin, Kostas E. Bekris

Finding asymptotically-optimal paths in multi-robot motion planning problems could be achieved, in principle, using sampling-based planners in the composite configuration space of all of the robots in the space. The dimensionality of this space increases with the number of robots, rendering this approach impractical. This work focuses on a scalable sampling-based planner for coupled multi-robot problems that provides asymptotic optimality. It extends the dRRT approach, which proposed building roadmaps for each robot and searching an implicit roadmap in the composite configuration space. This work presents a new method, dRRT* , and develops theory for scalable convergence to optimal paths in multi-robot problems. Simulated experiments indicate dRRT* converges to high-quality paths while scaling to higher numbers of robots where the naive approach fails. Furthermore, dRRT* is applicable to high-dimensional problems, such as planning for robot manipulators


          Robust Detection in Leak-Prone Population Protocols. (arXiv:1706.09937v1 [cs.DS])   

Authors: Dan Alistarh, Bartłomiej Dudek, Adrian Kosowski, David Soloveichik, Przemysław Uznański

In contrast to electronic computation, chemical computation is noisy and susceptible to a variety of sources of error, which has prevented the construction of robust complex systems. To be effective, chemical algorithms must be designed with an appropriate error model in mind. Here we consider the model of chemical reaction networks that preserve molecular count (population protocols), and ask whether computation can be made robust to a natural model of unintended "leak" reactions. Our definition of leak is motivated by both the particular spurious behavior seen when implementing chemical reaction networks with DNA strand displacement cascades, as well as the unavoidable side reactions in any implementation due to the basic laws of chemistry. We develop a new "Robust Detection" algorithm for the problem of fast (logarithmic time) single molecule detection, and prove that it is robust to this general model of leaks. Besides potential applications in single molecule detection, the error-correction ideas developed here might enable a new class of robust-by-design chemical algorithms. Our analysis is based on a non-standard hybrid argument, combining ideas from discrete analysis of population protocols with classic Markov chain techniques.


          Community Detection on Euclidean Random Graphs. (arXiv:1706.09942v1 [math.PR])   

Authors: Abishek Sankararaman, Francois Baccelli

Motivated by applications in online social networks, we introduce and study the problem of Community Detection on a new class of sparse \emph{spatial} random graphs embedded in Euclidean space. Our random graph is the planted-partition version of the classical random connection model studied in Stochastic Geometry. Roughly speaking, each node of our graph has an uniform i.i.d. $\{-1,+1\}$ valued community label and a $\mathbb{R}^d$ valued location label given by the support of a homogeneous Poisson point process of intensity $\lambda$. Conditional on the labels, edges are drawn independently at random depending both on the Euclidean distance between the nodes and community labels on the nodes.

The Community Detection problem consists in estimating the partition of nodes into communities, based on an observation of the random graph along with the spatial location labels on nodes. We show that for $d=1$, Community Detection is impossible for any parameters. For $d \geq 2$, we establish a phase-transition for this problem, based on the intensity $\lambda$ of the point process. We show that if the intensity $\lambda$ is small, then no algorithm for community detection can beat a random guess for the partitions. We show this by introducing and analyzing a new problem which we call `Information Flow from Infinity'. On the positive side, we give a novel algorithm that performs Community Detection as long as the intensity $\lambda$ is larger than a sufficiently high constant. Along the way, we establish a \emph{distinguishability} result which says one can always efficiently infer the existence of a partition given the graph and spatial locations even when one cannot identify the partition better than at random. This is a surprising new phenomenon not observed thus far in any non-spatial Erd\H{o}s-R\'enyi based planted-partition graph models.


          Minimizing Data Distortion of Periodically Reporting IoT Devices with Energy Harvesting. (arXiv:1706.09943v1 [cs.IT])   

Authors: Chiara Pielli, Cedomir Stefanovic, Petar Popovski, Michele Zorzi

Energy harvesting is a promising technology for the Internet of Things (IoT) towards the goal of self-sustainability of the involved devices. However, the intermittent and unreliable nature of the harvested energy demands an intelligent management of devices' operation in order to ensure a sustained performance of the IoT application. In this work, we address the problem of maximizing the quality of the reported data under the constraints of energy harvesting, energy consumption and communication channel impairments. Specifically, we propose an energy-aware joint source-channel coding scheme that minimizes the expected data distortion, for realistic models of energy generation and of the energy spent by the device to process the data, when the communication is performed over a Rayleigh fading channel. The performance of the scheme is optimized by means of a Markov Decision Process framework.


          Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems. (arXiv:1706.09948v1 [cs.IT])   

Authors: German Corrales Madueno, Cedomir Stefanovic, Petar Popovski

EEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M reporting regimes, which are periodic, on-demand We show that it is possible to both efficiently and reliably resolve all reporting stations in the cell, within the limits of the allowed deadlines. As a side result, we also provide a rationale for modeling the inter-arrival time in alarm events by using the Beta distribution, a model that is considered in the 3GPP standardization.


          Efficient, High-Quality Stack Rearrangement. (arXiv:1706.09949v1 [cs.RO])   

Authors: Shuai D. Han, Nicholas M. Stiffler, Kostas E. Bekris, Jingjin Yu

This work studies rearrangement problems involving the sorting of robots or objects in stack-like containers, which can be accessed only from one side. Two scenarios are considered: one where every robot or object needs to reach a particular stack, and a setting in which each robot has a distinct position within a stack. In both cases, the goal is to minimize the number of stack removals that need to be performed. Stack rearrangement is shown to be intimately connected to pebble motion problems, a useful abstraction in multi-robot path planning. Through this connection, feasibility of stack rearrangement can be readily addressed. The paper continues to establish lower and upper bounds on optimality, which differ only by a logarithmic factor, in terms of stack removals. An algorithmic solution is then developed that produces suboptimal paths much quicker than a pebble motion solver. Furthermore, informed search-based methods are proposed for finding high-quality solutions. The efficiency and desirable scalability of the methods is demonstrated in simulation.


          Fast Processing of Large Graph Applications Using Asynchronous Architecture. (arXiv:1706.09953v1 [cs.AR])   

Authors: Michel A. Kinsy, Rashmi S. Agrawal, Hien D. Nguyen

Graph algorithms and techniques are increasingly being used in scientific and commercial applications to express relations and explore large data sets. Although conventional or commodity computer architectures, like CPU or GPU, can compute fairly well dense graph algorithms, they are often inadequate in processing large sparse graph applications. Memory access patterns, memory bandwidth requirements and on-chip network communications in these applications do not fit in the conventional program execution flow. In this work, we propose and design a new architecture for fast processing of large graph applications. To leverage the lack of the spatial and temporal localities in these applications and to support scalable computational models, we design the architecture around two key concepts. (1) The architecture is a multicore processor of independently clocked processing elements. These elements communicate in a self-timed manner and use handshaking to perform synchronization, communication, and sequencing of operations. By being asynchronous, the operating speed at each processing element is determined by actual local latencies rather than global worst-case latencies. We create a specialized ISA to support these operations. (2) The application compilation and mapping process uses a graph clustering algorithm to optimize parallel computing of graph operations and load balancing. Through the clustering process, we make scalability an inherent property of the architecture where task-to-element mapping can be done at the graph node level or at node cluster level. A prototyped version of the architecture outperforms a comparable CPU by 10~20x across all benchmarks and provides 2~5x better power efficiency when compared to a GPU.


          On Conceptually Simple Algorithms for Variants of Online Bipartite Matching. (arXiv:1706.09966v1 [cs.DS])   

Authors: Allan Borodin, Denis Pankratov, Amirali Salehi-Abari

We present a series of results regarding conceptually simple algorithms for bipartite matching in various online and related models. We first consider a deterministic adversarial model. The best approximation ratio possible for a one-pass deterministic online algorithm is $1/2$, which is achieved by any greedy algorithm. D\"urr et al. recently presented a $2$-pass algorithm called Category-Advice that achieves approximation ratio $3/5$. We extend their algorithm to multiple passes. We prove the exact approximation ratio for the $k$-pass Category-Advice algorithm for all $k \ge 1$, and show that the approximation ratio converges to the inverse of the golden ratio $2/(1+\sqrt{5}) \approx 0.618$ as $k$ goes to infinity. The convergence is extremely fast --- the $5$-pass Category-Advice algorithm is already within $0.01\%$ of the inverse of the golden ratio.

We then consider a natural greedy algorithm in the online stochastic IID model---MinDegree. This algorithm is an online version of a well-known and extensively studied offline algorithm MinGreedy. We show that MinDegree cannot achieve an approximation ratio better than $1-1/e$, which is guaranteed by any consistent greedy algorithm in the known IID model.

Finally, following the work in Besser and Poloczek, we depart from an adversarial or stochastic ordering and investigate a natural randomized algorithm (MinRanking) in the priority model. Although the priority model allows the algorithm to choose the input ordering in a general but well defined way, this natural algorithm cannot obtain the approximation of the Ranking algorithm in the ROM model.


          The Authority of "Fair" in Machine Learning. (arXiv:1706.09976v1 [cs.CY])   

Authors: Michael Skirpan, Micha Gorelick

In this paper, we argue for the adoption of a normative definition of fairness within the machine learning community. After characterizing this definition, we review the current literature of Fair ML in light of its implications. We end by suggesting ways to incorporate a broader community and generate further debate around how to decide what is fair in ML.


          Phase Retrieval via Randomized Kaczmarz: Theoretical Guarantees. (arXiv:1706.09993v1 [math.NA])   

Authors: Yan Shuo Tan, Roman Vershynin

We consider the problem of phase retrieval, i.e. that of solving systems of quadratic equations. A simple variant of randomized Kaczmarz method was recently proposed for phase retrieval, and it was shown numerically to have a computational edge over state-of-the-art Wirtinger flow methods. In this paper, we provide the first theoretical guarantee for the convergence of the randomized Kacmarz method for phase retrieval. We show that it is sufficient to have as many gaussian measurements as the dimension, up to a constant factor. Along the way, we introduce a sufficient condition on measurement sets for which the randomized Kaczmarz method is guaranteed to work. We show that gaussian measurements satisfy this property with high probability; this is proved using a chaining argument coupled with bounds on VC dimension and metric entropy.


          Canonical form of linear subspaces and coding invariants: the poset metric point of view. (arXiv:1706.09996v1 [cs.IT])   

Authors: Jerry Anderson Pinheiro, Marcelo Firer

In this work we introduce the concept of a sub-space decomposition, subject to a partition of the coordinates. Considering metrics determined by partial orders in the set of coordinates, the so called poset metrics, we show the existence of maximal decompositions according to the metric. These decompositions turns to be an important tool to obtain the canonical form for codes over any poset metrics and to obtain bounds for important invariants such as the packing radius of a linear subspace. Furthermore, using maximal decompositions, we are able to reduce and optimize the full lookup table algorithm for the syndrome decoding process.


          Tight Load Balancing via Randomized Local Search. (arXiv:1706.09997v1 [cs.DC])   

Authors: Petra Berenbrink, Peter Kling, Christopher Liaw, Abbas Mehrabian

We consider the following balls-into-bins process with $n$ bins and $m$ balls: each ball is equipped with a mutually independent exponential clock of rate 1. Whenever a ball's clock rings, the ball samples a random bin and moves there if the number of balls in the sampled bin is smaller than in its current bin. This simple process models a typical load balancing problem where users (balls) seek a selfish improvement of their assignment to resources (bins). From a game theoretic perspective, this is a randomized approach to the well-known Koutsoupias-Papadimitriou model, while it is known as randomized local search (RLS) in load balancing literature. Up to now, the best bound on the expected time to reach perfect balance was $O\left({(\ln n)}^2+\ln(n)\cdot n^2/m\right)$ due to Ganesh, Lilienthal, Manjunath, Proutiere, and Simatos (Load balancing via random local search in closed and open systems, Queueing Systems, 2012). We improve this to an asymptotically tight $O\left(\ln(n)+n^2/m\right)$. Our analysis is based on the crucial observation that performing "destructive moves" (reversals of RLS moves) cannot decrease the balancing time. This allows us to simplify problem instances and to ignore "inconvenient moves" in the analysis.


          Hypothesis Testing For Densities and High-Dimensional Multinomials: Sharp Local Minimax Rates. (arXiv:1706.10003v1 [math.ST])   

Authors: Sivaraman Balakrishnan, Larry Wasserman

We consider the goodness-of-fit testing problem of distinguishing whether the data are drawn from a specified distribution, versus a composite alternative separated from the null in the total variation metric. In the discrete case, we consider goodness-of-fit testing when the null distribution has a possibly growing or unbounded number of categories. In the continuous case, we consider testing a Lipschitz density, with possibly unbounded support, in the low-smoothness regime where the Lipschitz parameter is not assumed to be constant. In contrast to existing results, we show that the minimax rate and critical testing radius in these settings depend strongly, and in a precise way, on the null distribution being tested and this motivates the study of the (local) minimax rate as a function of the null distribution. For multinomials the local minimax rate was recently studied in the work of Valiant and Valiant. We re-visit and extend their results and develop two modifications to the chi-squared test whose performance we characterize. For testing Lipschitz densities, we show that the usual binning tests are inadequate in the low-smoothness regime and we design a spatially adaptive partitioning scheme that forms the basis for our locally minimax optimal tests. Furthermore, we provide the first local minimax lower bounds for this problem which yield a sharp characterization of the dependence of the critical radius on the null hypothesis being tested. In the low-smoothness regime we also provide adaptive tests, that adapt to the unknown smoothness parameter. We illustrate our results with a variety of simulations that demonstrate the practical utility of our proposed tests.


          Automated Audio Captioning with Recurrent Neural Networks. (arXiv:1706.10006v1 [cs.SD])   

Authors: Konstantinos Drossos, Sharath Adavanne, Tuomas Virtanen

We present the first approach to automated audio captioning. We employ an encoder-decoder scheme with an alignment model in between. The input to the encoder is a sequence of log mel-band energies calculated from an audio file, while the output is a sequence of words, i.e. a caption. The encoder is a multi-layered, bi-directional gated recurrent unit (GRU) and the decoder a multi-layered GRU with a classification layer connected to the last GRU of the decoder. The classification layer and the alignment model are fully connected layers with shared weights between timesteps. The proposed method is evaluated using data drawn from a commercial sound effects library, ProSound Effects. The resulting captions were rated through metrics utilized in machine translation and image captioning fields. Results from metrics show that the proposed method can predict words appearing in the original caption, but not always correctly ordered.


          Pricing Identical Items. (arXiv:1706.10009v1 [cs.GT])   

Authors: Alon Eden, Tomer Ezra, Michal Feldman

Social goods are goods that grant value not only to their owners but also to the owners' surroundings, be it their families, friends or office mates. The benefit a non-owner derives from the good is affected by many factors, including the type of the good, its availability, and the social status of the non-owner. Depending on the magnitude of the benefit and on the price of the good, a potential buyer might stay away from purchasing the good, hoping to free ride on others' purchases. A revenue-maximizing seller who sells social goods must take these considerations into account when setting prices for the good. The literature on optimal pricing has advanced considerably over the last decade, but little is known about optimal pricing schemes for selling social goods. In this paper, we conduct a systematic study of revenue-maximizing pricing schemes for social goods: we introduce a Bayesian model for this scenario, and devise nearly-optimal pricing schemes for various types of externalities, both for simultaneous sales and for sequential sales.


          Fine-Grained Reliability for V2V Communications around Suburban and Urban Intersections. (arXiv:1706.10011v1 [cs.IT])   

Authors: Mouhamed Abdulla, Henk Wymeersch

Safe transportation is a key use-case of the 5G/LTE Rel.15+ communications, where an end-to-end reliability of 0.99999 is expected for a vehicle-to-vehicle (V2V) transmission distance of 100-200 m. Since communications reliability is related to road-safety, it is crucial to verify the fulfillment of the performance, especially for accident-prone areas such as intersections. We derive closed-form expressions for the V2V transmission reliability near suburban corners and urban intersections over finite interference regions. The analysis is based on plausible street configurations, traffic scenarios, and empirically-supported channel propagation. We show the means by which the performance metric can serve as a preliminary design tool to meet a target reliability. We then apply meta distribution concepts to provide a careful dissection of V2V communications reliability. Contrary to existing work on infinite roads, when we consider finite road segments for practical deployment, fine-grained reliability per realization exhibits bimodal behavior. Either performance for a certain vehicular traffic scenario is very reliable or extremely unreliable, but nowhere in relatively proximity to the average performance. In other words, standard SINR-based average performance metrics are analytically accurate but can be insufficient from a practical viewpoint. Investigating other safety-critical point process networks at the meta distribution-level may reveal similar discrepancies.


          Improvement of training set structure in fusion data cleaning using Time-Domain Global Similarity method. (arXiv:1706.10018v1 [cs.LG])   

Authors: Jian Liu, Ting Lan, Hong Qin

Traditional data cleaning identifies dirty data by classifying original data sequences, which is a class$-$imbalanced problem since the proportion of incorrect data is much less than the proportion of correct ones for most diagnostic systems in Magnetic Confinement Fusion (MCF) devices. When using machine learning algorithms to classify diagnostic data based on class$-$imbalanced training set, most classifiers are biased towards the major class and show very poor classification rates on the minor class. By transforming the direct classification problem about original data sequences into a classification problem about the physical similarity between data sequences, the class$-$balanced effect of Time$-$Domain Global Similarity (TDGS) method on training set structure is investigated in this paper. Meanwhile, the impact of improved training set structure on data cleaning performance of TDGS method is demonstrated with an application example in EAST POlarimetry$-$INTerferometry (POINT) system.


          Preference-based performance measures for Time$-$Domain Global Similarity method. (arXiv:1706.10020v1 [cs.LG])   

Authors: Ting Lan, Jian Liu, Hong Qin

For Time-Domain Global Similarity (TDGS) method, which transforms the data cleaning problem into a binary classification problem about the physical similarity between channels, directly adopting common performance measures could only guarantee the performance for physical similarity. Nevertheless, practical data cleaning tasks have preferences for the correctness of original data sequences. To obtain the general expressions of performance measures based on the preferences of tasks, the mapping relations between performance of TDGS method about physical similarity and correctness of data sequences are investigated by probability theory in this paper. Performance measures for TDGS method in several common data cleaning tasks are set. Cases when these preference-based performance measures could be simplified are introduced.


          $\mathcal{P}$-schemes and Deterministic Polynomial Factoring over Finite Fields. (arXiv:1706.10028v1 [cs.CC])   

Authors: Zeyu Guo

We introduce a family of mathematical objects called $\mathcal{P}$-schemes, where $\mathcal{P}$ is a poset of subgroups of a finite group $G$. A $\mathcal{P}$-scheme is a collection of partitions of the right coset spaces $H\backslash G$, indexed by $H\in\mathcal{P}$, that satisfies a list of axioms. These objects generalize the classical notion of association schemes as well as the notion of $m$-schemes (Ivanyos et al. 2009).

Based on $\mathcal{P}$-schemes, we develop a unifying framework for the problem of deterministic factoring of univariate polynomials over finite fields under the generalized Riemann hypothesis (GRH).


          On the Solution of Linear Programming Problems in the Age of Big Data. (arXiv:1706.10030v1 [cs.DS])   

Authors: Irina Sokolinskaya, Leonid B. Sokolinsky

The Big Data phenomenon has spawned large-scale linear programming problems. In many cases, these problems are non-stationary. In this paper, we describe a new scalable algorithm called NSLP for solving high-dimensional, non-stationary linear programming problems on modern cluster computing systems. The algorithm consists of two phases: Quest and Targeting. The Quest phase calculates a solution of the system of inequalities defining the constraint system of the linear programming problem under the condition of dynamic changes in input data. To this end, the apparatus of Fejer mappings is used. The Targeting phase forms a special system of points having the shape of an n-dimensional axisymmetric cross. The cross moves in the n-dimensional space in such a way that the solution of the linear programming problem is located all the time in an "-vicinity of the central point of the cross.


          Neural Sequence Model Training via $\alpha$-divergence Minimization. (arXiv:1706.10031v1 [stat.ML])   

Authors: Sotetsu Koyamada, Yuta Kikuchi, Atsunori Kanemura, Shin-ichi Maeda, Shin Ishii

We propose a new neural sequence model training method in which the objective function is defined by $\alpha$-divergence. We demonstrate that the objective function generalizes the maximum-likelihood (ML)-based and reinforcement learning (RL)-based objective functions as special cases (i.e., ML corresponds to $\alpha \to 0$ and RL to $\alpha \to1$). We also show that the gradient of the objective function can be considered a mixture of ML- and RL-based objective gradients. The experimental results of a machine translation task show that minimizing the objective function with $\alpha > 0$ outperforms $\alpha \to 0$, which corresponds to ML-based methods.


          Investigating the potential of social network data for transport demand models. (arXiv:1706.10035v1 [cs.SI])   

Authors: Michael A.B. van Eggermond, Haohui Chen, Alexander Erath, Manuel Cebrian

Location-based social network data offers the promise of collecting the data from a large base of users over a longer span of time at negligible cost. While several studies have applied social network data to activity and mobility analysis, a comparison with travel diaries and general statistics has been lacking. In this paper, we analysed geo-referenced Twitter activities from a large number of users in Singapore and neighbouring countries. By combining this data, population statistics and travel diaries and applying clustering techniques, we addressed detection of activity locations, as well as spatial separation and transitions between these locations. Kernel density estimation performs best to detect activity locations due to the scattered nature of the twitter data; more activity locations are detected per user than reported in the travel survey. The descriptive analysis shows that determining home locations is more difficult than detecting work locations for most planning zones. Spatial separations between detected activity locations from Twitter data - as reported in a travel survey and captured by public transport smart card data - are mostly similarly distributed, but also show relevant differences for very short and very long distances. This also holds for the transitions between zones. Whether the differences between Twitter data and other data sources stem from differences in the population sub-sample, clustering methodology, or whether social networks are being used significantly more at specific locations must be determined by further research. Despite these shortcomings, location-based social network data offers a promising data source for insights into activity locations and mobility patterns, especially for regions where travel survey data is not readily available.


          Providing Effective Real-time Feedback in Simulation-based Surgical Training. (arXiv:1706.10036v1 [cs.AI])   

Authors: Xingjun Ma, Sudanthi Wijewickrema, Yun Zhou, Shuo Zhou, Stephen O'Leary, James Bailey

Virtual reality simulation is becoming popular as a training platform in surgical education. However, one important aspect of simulation-based surgical training that has not received much attention is the provision of automated real-time performance feedback to support the learning process. Performance feedback is actionable advice that improves novice behaviour. In simulation, automated feedback is typically extracted from prediction models trained using data mining techniques. Existing techniques suffer from either low effectiveness or low efficiency resulting in their inability to be used in real-time. In this paper, we propose a random forest based method that finds a balance between effectiveness and efficiency. Experimental results in a temporal bone surgery simulation show that the proposed method is able to extract highly effective feedback at a high level of efficiency.


          A solution for secure use of Kibana and Elasticsearch in multi-user environment. (arXiv:1706.10040v1 [cs.CR])   

Authors: Wataru Takase, Tomoaki Nakamura, Yoshiyuki Watase, Takashi Sasaki

Monitoring is indispensable to check status, activities, or resource usage of IT services. A combination of Kibana and Elasticsearch is used for monitoring in many places such as KEK, CC-IN2P3, CERN, and also non-HEP communities. Kibana provides a web interface for rich visualization, and Elasticsearch is a scalable distributed search engine. However, these tools do not support authentication and authorization features by default. In the case of single Kibana and Elasticsearch services shared among many users, any user who can access Kibana can retrieve other's information from Elasticsearch. In multi-user environment, in order to protect own data from others or share part of data among a group, fine-grained access control is necessary.

The CERN cloud service group had provided cloud utilization dashboard to each user by Elasticsearch and Kibana. They had deployed a homemade Elasticsearch plugin to restrict data access based on a user authenticated by the CERN Single Sign On system. It enabled each user to have a separated Kibana dashboard for cloud usage, and the user could not access to other's one. Based on the solution, we propose an alternative one which enables user/group based Elasticsearch access control and Kibana objects separation. It is more flexible and can be applied to not only the cloud service but also the other various situations. We confirmed our solution works fine in CC-IN2P3. Moreover, a pre-production platform for CC-IN2P3 has been under construction.

We will describe our solution for the secure use of Kibana and Elasticsearch including integration of Kerberos authentication, development of a Kibana plugin which allows Kibana objects to be separated based on user/group, and contribution to Search Guard which is an Elasticsearch plugin enabling user/group based access control. We will also describe the effect on performance from using Search Guard.


          Hamiltonicity is Hard in Thin or Polygonal Grid Graphs, but Easy in Thin Polygonal Grid Graphs. (arXiv:1706.10046v1 [cs.CC])   

Authors: Erik D. Demaine, Mikhail Rudoy

In 2007, Arkin et al. initiated a systematic study of the complexity of the Hamiltonian cycle problem on square, triangular, or hexagonal grid graphs, restricted to polygonal, thin, superthin, degree-bounded, or solid grid graphs. They solved many combinations of these problems, proving them either polynomially solvable or NP-complete, but left three combinations open. In this paper, we prove two of these unsolved combinations to be NP-complete: Hamiltonicity of Square Polygonal Grid Graphs and Hamiltonicity of Hexagonal Thin Grid Graphs. We also consider a new restriction, where the grid graph is both thin and polygonal, and prove that Hamiltonicity then becomes polynomially solvable for square, triangular, and hexagonal grid graphs.


          Power domination in maximal planar graphs. (arXiv:1706.10047v1 [cs.DM])   

Authors: Paul Dorbec (LaBRI), Antonio González, Claire Pennarun (LaBRI)

Power domination in graphs emerged from the problem of monitoring an electrical system by placing as few measurement devices in the system as possible. It corresponds to a variant of domination that includes the possibility of propagation. For measurement devices placed on a set S of vertices of a graph G, the set of monitored vertices is initially the set S together with all its neighbors. Then iteratively, whenever some monitored vertex v has a single neighbor u not yet monitored, u gets monitored. A set S is said to be a power dominating set of the graph G if all vertices of G eventually are monitored. The power domination number of a graph is the minimum size of a power dominating set. In this paper, we prove that any maximal planar graph of order n $\ge$ 6 admits a power dominating set of size at most (n--2)/4 .


          Distribution-based bisimulation for labelled Markov processes. (arXiv:1706.10049v1 [cs.LO])   

Authors: Pengfei Yang, David N. Jansen, Lijun Zhang

In this paper we propose a (sub)distribution-based bisimulation for labelled Markov processes and compare it with earlier definitions of state and event bisimulation, which both only compare states. In contrast to those state-based bisimulations, our distribution bisimulation is weaker, but corresponds more closely to linear properties. We construct a logic and a metric to describe our distribution bisimulation and discuss linearity, continuity and compositional properties.


          The application of data mining techniques to support customer relationship management: the case of ethiopian revenue and customs authority. (arXiv:1706.10050v1 [cs.CY])   

Authors: Belete Biazen Bezabeh

The application of data mining technique has been widely applied in different business areas such as health, education and finance for the purpose of data analysis and then to support and maximizes the organizations customer satisfaction in an effort to increase loyalty and retain customers business over their lifetimes . The researchers primary objective, in this paper is to classify customers based on their common attributes since customer grouping is the main part of customer relationship management. In this study, different characteristics of the ERCA customers data were collected from the customs database called ASYCUDA. Once the customers data were collected, the necessary data preparation steps were conducted on it and finally a data set consisting of 46748 records was attained. The classification modeling was built by using J48 decision tree and multi layer perceptron ANN algorithms with 10-fold cross-validation and splitting (70% training and 30% testing) techniques. Among these models, a model which was built using J48 decision tree algorithm with default 10-fold cross-validation outperforms 99.95% of overall accuracy rate; while the classification accuracy of ANN is 99.71%. So decision tree has better accuracy than ANN for classifying ERCA customers data.


          A Deep Reinforcement Learning Framework for the Financial Portfolio Management Problem. (arXiv:1706.10059v1 [cs.AI])   

Authors: Zhengyao Jiang, Dixing Xu, Jinjun Liang

Financial portfolio management is the process of constant redistribution of a fund into different financial products. This paper presents a financial-model-free Reinforcement Learning framework to provide a deep machine learning solution to the portfolio management problem. The framework consists of the Ensemble of Identical Independent Evaluators (EIIE) topology, a Portfolio-Vector Memory (PVM), an Online Stochastic Batch Learning (OSBL) scheme, and a fully exploiting and explicit reward function. This framework is realized in three instants in this work with a Convolutional Neural Network (CNN), a basic Recurrent Neural Network (RNN), and a Long Short-Term Memory (LSTM). They are, along with a number of recently reviewed or published portfolio-selection strategies, examined in three back-test experiments with a trading period of 30 minutes in a cryptocurrency market. Cryptocurrencies are electronic and decentralized alternatives to government-issued money, with Bitcoin as the best-known example of a cryptocurrency. All three instances of the framework monopolize the top three positions in all experiments, outdistancing other compared trading algorithms. Although with a high commission rate of 0.25% in the backtests, the framework is able to achieve at least 4-fold returns in 30 days.


          Turned 70? It is time to start editing Wikipedia. (arXiv:1706.10060v1 [cs.HC])   

Authors: Radoslaw Nielek, Marta Lutostanska, Wieslaw Kopec, Adam Wierzbicki

Success of Wikipedia would not be possible without the contributions of millions of anonymous Internet users who edit articles, correct mistakes, add links or pictures. At the same time Wikipedia editors are currently overworked and there is always more tasks waiting to be completed than people willing to volunteer. The paper explores the possibility of involving the elderly in the Wikipedia editing process. Older adults were asked to complete various tasks on Wikipedia. Based on the observations made during these activities as well as in-depth interviews, a list of recommendation has been crafted. It turned out that older adults are willing to contribute to Wikiepdia but substantial changes have to be made in the Wikipedia editor.


          Compaction of Church Numerals for Higher-Order Compression. (arXiv:1706.10061v1 [cs.DS])   

Authors: Isamu Furuya, Takuya Kida

We addressed the problem of compacting the Church numerals, which is useful for higher-order compression. We proposed a novel decomposition scheme for a natural number using tetration, which leads to the compact representation of $\lambda$-terms equivalent to the Church numerals. For natural number $n$, we proved that the size of the lambda term obtained by our method is $O(({\text{slog}_{2} n})^{\log{n}/ \log{\log{n}}})$. We also quantitatively confirmed via experiments that in many cases, our method can produce shorter $\lambda$-terms more than existing methods.


          Barankin Vector Locally Best Unbiased Estimates. (arXiv:1706.10062v1 [stat.ML])   

Authors: Bruno Cernuschi-Frias

The Barankin bound is generalized to the vector case in the mean square error sense. Necessary and sufficient conditions are obtained to achieve the lower bound. To obtain the result, a simple finite dimensional real vector valued generalization of the Riesz representation theorem for Hilbert spaces is given. The bound has the form of a linear matrix inequality where the covariances of any unbiased estimator, if these exist, are lower bounded by matrices depending only on the parametrized probability distributions.


          Emotions make cities live. Towards mapping emotions of older adults on urban space. (arXiv:1706.10063v1 [cs.CY])   

Authors: Radoslaw Nielek, Miroslaw Ciastek, Wieslaw Kopec

Understanding of interaction between people and urban spaces is crucial for inclusive decision making process. Smartphones and social media can be a rich source of behavioral and declarative data about urban space, but it threatens to exclude voice of older adults. The platform proposed in the paper attempts to address this issue. A universal tagging mechanism based on the Pluchik Wheel of Emotion is proposed. Usability of the platform was tested and prospect studies are proposed.


          semantify.it, a platform for creation, publication and distribution of semantic annotations. (arXiv:1706.10067v1 [cs.IR])   

Authors: Elias Kärle, Umutcan Şimşek, Dieter Fensel

The application of semantic technologies to content on the web is, in many regards, as important as urgent. Search engines, chatbots, intelligent personal assistants and other technologies increasingly rely on content published as semantic structured data. Yet the process of creating this kind of data is still complicated and the necessity of it is widely unknown. The semantify.it platform implements an approach to solve three of the most challenging question regarding the publication of structured semantic data, namely: a) what vocabulary to use, b) how to create annotation files and c) how to publish or integrate annotations within a website without programming. This paper presents the idea and the development of the semantify.it platform. It demonstrates, that the creation process of semantically annotated data must not be hard, shows use cases and pilot users of the created software and presents where the development of this platform or alike projects could go to in the future.


          Superpixel-based semantic segmentation trained by statistical process control. (arXiv:1706.10071v1 [cs.CV])   

Authors: Hyojin Park, Jisoo Jeong, Youngjoon Yoo, Nojun Kwak

Semantic segmentation, like other fields of computer vision, has seen a remarkable performance advance by the use of deep convolution neural networks. Many recent studies on this field upsample smaller feature maps into the original size of the image to label each pixel into one of semantic categories. However, considering that neighboring pixels are heavily dependent on each other, both learning and testing of these methods have a lot of redundant operations. To resolve this problem, the proposed network is trained and tested with only 0.37\% of total pixels by superpixel-based sampling and largely reduced the complexity of upsampling calculation. In doing so, scale and translation invariant features are constructed by making the hypercolumns using the feature maps obtained by pyramid module as well as the feature maps in convolution layers of the base network. Since the proposed method uses a very small number of sampled pixels, the end-to-end learning of the entire network is difficult with a common learning rate for all the layers, which is caused by the small sampling ratio. In order to compensate for this, the learning rate after sampling is controlled by statistical process control (SPC) of gradients in each layer. The proposed method performs better than or equal to the conventional methods that use much more samples on Pascal Context, SUN-RGBD dataset.


          On the Effects of Distributed Electric Vehicle Network Utility Maximization in Low Voltage Feeders. (arXiv:1706.10074v1 [cs.SY])   

Authors: Jose Rivera, Hans Arno Jacobsen

The fast charging of Electric Vehicles (EVs) in distribution networks requires real-time EV charging control to avoid the overloading of grid components. Recent studies have proposed congestion control protocols, which result from distributed optimization solutions of the Network Utility Maximization (NUM) problem. While the NUM formulation allows the definition of distributed computations with closed form solutions, its simple model does not account for many of the feeders operational constraints. This puts the resulting control algorithms effectiveness into question. In this paper, we investigate the impact of implementing such algorithms for congestion control in low voltage feeders. We review the latest NUM based algorithms for real-time EV charging control, and evaluate their behavior and impact on the comprehensive IEEE European Low Voltage Test Feeder. Our results show that the EV NUM problem can effectively capture the relevant operational constraints, as long as ampacity violations are the main bottleneck. Moreover, the results demonstrate an advantage of the primal NUM solution over the more conventional dual NUM solution in preventing a system overload.


          Chatbots as Conversational Recommender Systems in Urban Contexts. (arXiv:1706.10076v1 [cs.SI])   

Authors: Pavel Kucherbaev, Achilleas Psyllidis, Alessandro Bozzon

In this paper, we outline the vision of chatbots that facilitate the interaction between citizens and policy-makers at the city scale. We report the results of a co-design session attended by more than 60 participants. We give an outlook of how some challenges associated with such chatbot systems could be addressed in the future.


          Novel Logical Method for Security Analysis of Electronic Payment Protocols. (arXiv:1706.10078v1 [cs.LO])   

Authors: Yi Liu, Xingtong Liu, Lei Zhang, Jian Wang, Chaojing Tang

Electronic payment protocols play a vital role in electronic commerce security, which is essential for secure operation of electronic commerce activities. Formal method is an effective way to verify the security of protocols. But current formal method lacks the description and analysis of timeliness in electronic payment protocols. In order to improve analysis ability, a novel approach to analyze security properties such as accountability, fairness and timeliness in electronic payment protocols is proposed in this paper. This approach extends an existing logical method by adding a concise time expression and analysis method. It enables to describe the event time, and extends the time characteristics of logical inference rules. We analyzed the Netbill protocol with the new approach and found that the fairness of the protocol is not satisfied, due to timeliness problem. The result illustrates the new approach is able to analyze the key properties of electronic payment protocols. Furthermore, the new approach can be introduced to analyze other time properties of cryptographic protocols.


          Persistence Diagrams with Linear Machine Learning Models. (arXiv:1706.10082v1 [math.AT])   

Authors: Ippei Obayashi, Yasuaki Hiraoka

Persistence diagrams have been widely recognized as a compact descriptor for characterizing multiscale topological features in data. When many datasets are available, statistical features embedded in those persistence diagrams can be extracted by applying machine learnings. In particular, the ability for explicitly analyzing the inverse in the original data space from those statistical features of persistence diagrams is significantly important for practical applications. In this paper, we propose a unified method for the inverse analysis by combining linear machine learning models with persistence images. The method is applied to point clouds and cubical sets, showing the ability of the statistical inverse analysis and its advantages.


          Tuning and optimization for a variety of many-core architectures without changing a single line of implementation code using the Alpaka library. (arXiv:1706.10086v1 [cs.DC])   

Authors: Alexander Matthes, René Widera, Erik Zenker, Benjamin Worpitz, Axel Huebl, Michael Bussmann

We present an analysis on optimizing performance of a single C++11 source code using the Alpaka hardware abstraction library. For this we use the general matrix multiplication (GEMM) algorithm in order to show that compilers can optimize Alpaka code effectively when tuning key parameters of the algorithm. We do not intend to rival existing, highly optimized DGEMM versions, but merely choose this example to prove that Alpaka allows for platform-specific tuning with a single source code. In addition we analyze the optimization potential available with vendor-specific compilers when confronted with the heavily templated abstractions of Alpaka. We specifically test the code for bleeding edge architectures such as Nvidia's Tesla P100, Intel's Knights Landing (KNL) and Haswell architecture as well as IBM's Power8 system. On some of these we are able to reach almost 50\% of the peak floating point operation performance using the aforementioned means. When adding compiler-specific #pragmas we are able to reach 5 TFLOPS/s on a P100 and over 1 TFLOPS/s on a KNL system.


          Time-Space Trade-Offs for Lempel-Ziv Compressed Indexing. (arXiv:1706.10094v1 [cs.DS])   

Authors: Philip Bille, Mikko Berggren Ettienne, Inge Li Gørtz, Hjalte Wedel Vildhøj

Given a string $S$, the compressed indexing problem is to preprocess $S$ into a compressed representation that supports fast substring queries. The goal is to use little space relative to the compressed size of $S$ while supporting fast queries. We present a compressed index based on the Lempel-Ziv 1977 compression scheme. Let $n$, and $z$ denote the size of the input string, and the compressed LZ77 string, respectively. We obtain the following time-space trade-offs. Given a pattern string $P$ of length $m$, we can solve the problem in (i) $O(m + occ \log\log n)$ time using $O(z\log(n/z)\log\log z)$ space, or (ii) $O(m(1 + \frac{\log^\epsilon z}{\log(n/z)}) + occ(\log\log n + \log^\epsilon z))$ time using $O(z\log(n/z))$ space, for any $0 < \epsilon < 1$ In particular, (i) improves the leading term in the query time of the previous best solution from $O(m\lg m)$ to $O(m)$ at the cost of increasing the space by a factor $\log \log z$. Alternatively, (ii) matches the previous best space bound, but has a leading term in the query time of $O(m(1+\frac{\log^{\epsilon} z}{\log (n/z)}))$. However, for any polynomial compression ratio, i.e., $z = O(n^{1-\delta})$, for constant $\delta > 0$, this becomes $O(m)$. Our index also supports extraction of any substring of length $\ell$ in $O(\ell + \lg(n/z))$ time. Technically, our results are obtained by novel extensions and combinations of existing data structures of independent interest, including a new batched variant of weak prefix search.


          Design Activism for Minimum Wage Crowd Work. (arXiv:1706.10097v1 [cs.HC])   

Authors: Akash Mankar, Riddhi J. Shah, Matthew Lease

Entry-level crowd work is often reported to pay less than minimum wage. While this may be appropriate or even necessary, due to various legal, economic, and pragmatic factors, some Requesters and workers continue to question this status quo. To promote further discussion on the issue, we survey Requesters and workers whether they would support restricting tasks to require minimum wage pay. As a form of {\em design activism}, we confronted workers with this dilemma directly by posting a dummy Mechanical Turk task which told them that they could not work on it because it paid less than their {\em local} minimum wage, and we invited their feedback. Strikingly, for those workers expressing an opinion, two-thirds of Indians favored the policy while two-thirds of Americans opposed it. Though a majority of Requesters supported minimum wage pay, only 20\% would enforce it. To further empower Requesters, and to ensure that effort or ignorance are not barriers to change, we provide a simple public API to make it easy to find a worker's local minimum wage by his/her IP address.


          From Big Data to Big Displays: High-Performance Visualization at Blue Brain. (arXiv:1706.10098v1 [cs.GR])   

Authors: Stefan Eilemann, Marwan Abdellah, Nicolas Antille, Ahmet Bilgili, Grigory Chevtchenko, Raphael Dumusc, Cyrille Favreau, Juan Hernando, Daniel Nachbaur, Pawel Podhajski, Jafet Villafranca, Felix Schürmann

Blue Brain has pushed high-performance visualization (HPV) to complement its HPC strategy since its inception in 2007. In 2011, this strategy has been accelerated to develop innovative visualization solutions through increased funding and strategic partnerships with other research institutions.

We present the key elements of this HPV ecosystem, which integrates C++ visualization applications with novel collaborative display systems. We motivate how our strategy of transforming visualization engines into services enables a variety of use cases, not only for the integration with high-fidelity displays, but also to build service oriented architectures, to link into web applications and to provide remote services to Python applications.


          Tableaux for Policy Synthesis for MDPs with PCTL* Constraints. (arXiv:1706.10102v1 [cs.LO])   

Authors: Peter Baumgartner, Sylvie Thiébaux, Felipe Trevizan

Markov decision processes (MDPs) are the standard formalism for modelling sequential decision making in stochastic environments. Policy synthesis addresses the problem of how to control or limit the decisions an agent makes so that a given specification is met. In this paper we consider PCTL*, the probabilistic counterpart of CTL*, as the specification language. Because in general the policy synthesis problem for PCTL* is undecidable, we restrict to policies whose execution history memory is finitely bounded a priori.

Surprisingly, no algorithm for policy synthesis for this natural and expressive framework has been developed so far. We close this gap and describe a tableau-based algorithm that, given an MDP and a PCTL* specification, derives in a non-deterministic way a system of (possibly nonlinear) equalities and inequalities. The solutions of this system, if any, describe the desired (stochastic) policies.

Our main result in this paper is the correctness of our method, i.e., soundness, completeness and termination.


          On Using Toeplitz and Circulant Matrices for Johnson-Lindenstrauss Transforms. (arXiv:1706.10110v1 [math.FA])   

Authors: Casper Benjamin Freksen, Kasper Green Larsen

The Johnson-Lindenstrauss lemma is one of the corner stone results in dimensionality reduction. It says that for any set of vectors $X \subset \mathbb{R}^n$, there exists a mapping $f : X \to \mathbb{R}^m$ such that $f(X)$ preserves all pairwise distances between vectors in $X$ to within $(1 \pm \varepsilon)$ if $m = O(\varepsilon^{-2} \lg N)$. Much effort has gone into developing fast embedding algorithms, with the Fast Johnson-Lindenstrauss transform of Ailon and Chazelle being one of the most well-known techniques. The current fastest algorithm that yields the optimal $m = O(\varepsilon^{-2}\lg N)$ dimensions has an embedding time of $O(n \lg N + \varepsilon^{-2} \lg^3 N)$. An exciting approach towards improving this, due to Hinrichs and Vyb\'iral, is to use a random $m \times n$ Toeplitz matrix for the embedding. Using Fast Fourier Transform, the embedding of a vector can then be computed in $O(n \lg m)$ time. The big question is of course whether $m = O(\varepsilon^{-2} \lg N)$ dimensions suffice for this technique. If so, this would end a decades long quest to obtain faster and faster Johnson-Lindenstrauss transforms. The current best analysis of the embedding of Hinrichs and Vyb\'iral shows that $m = O(\varepsilon^{-2}\lg^2 N)$ dimensions suffices. The main result of this paper, is a proof that this analysis unfortunately cannot be tightened any further, i.e., there exists a set of $N$ vectors requiring $m = \Omega(\varepsilon^{-2} \lg^2 N)$ for the Toeplitz approach to work.


          On the Complexity of Polytopes in $LI(2)$. (arXiv:1706.10114v1 [cs.CC])   

Authors: Komei Fukuda, May Szedlak

In this paper we consider polytopes given by systems of $n$ inequalities in $d$ variables, where every inequality has at most two variables with nonzero coefficient. We denote this family by $LI(2)$. We show that despite of the easy algebraic structure, polytopes in $LI(2)$ can have high complexity. We construct a polytope in $LI(2)$, whose number of vertices is almost the number of vertices of the dual cyclic polytope, the difference is a multiplicative factor of depending on $d$ and in particular independent of $n$. Moreover we show that the dual cyclic polytope can not be realized in $LI(2)$.


          Restricted Causal Inference Algorithm. (arXiv:1706.10117v1 [cs.AI])   

Authors: Mieczysław A. Kłopotek

This paper proposes a new algorithm for recovery of belief network structure from data handling hidden variables. It consists essentially in an extension of the CI algorithm of Spirtes et al. by restricting the number of conditional dependencies checked up to k variables and in an extension of the original CI by additional steps transforming so called partial including path graph into a belief network. Its correctness is demonstrated.


          Navigate, Understand, Communicate: How Developers Locate Performance Bugs. (arXiv:1706.10118v1 [cs.SE])   

Authors: Sebastian Baltes, Oliver Moseler, Fabian Beck, Stephan Diehl

Background: Performance bugs can lead to severe issues regarding computation efficiency, power consumption, and user experience. Locating these bugs is a difficult task because developers have to judge for every costly operation whether runtime is consumed necessarily or unnecessarily. Objective: We wanted to investigate how developers, when locating performance bugs, navigate through the code, understand the program, and communicate the detected issues. Method: We performed a qualitative user study observing twelve developers trying to fix documented performance bugs in two open source projects. The developers worked with a profiling and analysis tool that visually depicts runtime information in a list representation and embedded into the source code view. Results: We identified typical navigation strategies developers used for pinpointing the bug, for instance, following method calls based on runtime consumption. The integration of visualization and code helped developers to understand the bug. Sketches visualizing data structures and algorithms turned out to be valuable for externalizing and communicating the comprehension process for complex bugs. Conclusion: Fixing a performance bug is a code comprehension and navigation problem. Flexible navigation features based on executed methods and a close integration of source code and performance information support the process.


          What Happens to Intentional Concepts in Requirements Engineering If Intentional States Cannot Be Known?. (arXiv:1706.10133v1 [cs.SE])   

Authors: Ivan J. Jureta

I assume in this paper that the proposition "I cannot know your intentional states" is true. I consider its consequences on the use of so-called "intentional concepts" for Requirements Engineering. I argue that if you take this proposition to be true, then intentional concepts (e.g., goal, belief, desire, intention, etc.) start to look less relevant (though not irrelevant), despite being the focus of significant research attention over the past three decades. I identify substantial problems that arise if you use instances of intentional concepts to reflect intentional states. I sketch an approach to address these problems. In it, intentional concepts have a less prominent role, while notions of time, uncertainty, prediction, observability, evidence, and learning are at the forefront.


          Evaluation of No Reference Bitstream-based Video Quality Assessment Methods. (arXiv:1706.10143v1 [cs.MM])   

Authors: Tiantian He, Yankai Liu, Rong Xie, Xin Tang, Li Song

Many different parametric models for video quality assessment have been proposed in the past few years. This paper presents a review of nine recent models which cover a wide range of methodologies and have been validated for estimating video quality due to different degradation factors. Each model is briefly described with key algorithms and relevant parametric formulas. The generalization capability of each model to estimate video quality in real-application scenarios is evaluated and compared with other models, using a dataset created with video sequences from practical applications. These video sequences cover a wide range of possible realistic encoding parameters, labeled with mean opinion scores (MOS) via subjective test. The weakness and strength of each model are remarked. Finally, future work towards a more general parametric model that could apply for a wider range of applications is discussed.


          A ROS multi-ontology references services: OWL reasoners and application prototyping issues. (arXiv:1706.10151v1 [cs.RO])   

Authors: Luca Buoncompagni, Alessio Capitanelli, Fulvio Mastrogiovanni

The challenge of sharing and communicating information is crucial in complex human-robot interaction (HRI) scenarios. Ontologies and symbolic reasoning are the state-of-the-art approaches for a natural representation of knowledge, especially within the Semantic Web domain. In such a context, scripted paradigms have been adopted to achieve high expressiveness. Nevertheless, since symbolic reasoning is a high complexity problem, optimizing its performance requires a careful design of the knowledge. Specifically, a robot architecture requires the integration of several components implementing different behaviors and generating a series of beliefs. Most of the components are expected to access, manipulate, and reason upon a run-time generated semantic representation of knowledge grounding robot behaviors and perceptions through formal axioms, with soft real-time requirements.


          Parameterized Complexity of CSP for Infinite Constraint Languages. (arXiv:1706.10153v1 [cs.CC])   

Authors: Ruhollah Majdoddin

We study parameterized Constraint Satisfaction Problem (CSP) for infinite constraint languages. The parameters that we study are weight of the satisfying assignment, number of constraints, maximum number of appearances of a variable in the instance, and maximum number of appearances of a variable in each constraint. A dichotomy theorem is already known for finite constraint languages with parameter weight. We have general theorems that set some well-known problems in FPT and some other in W[1].


          Prepaid or Postpaid? That is the question. Novel Methods of Subscription Type Prediction in Mobile Phone Services. (arXiv:1706.10172v1 [cs.SI])   

Authors: Yongjun Liao, Wei Du, Márton Karsai, Carlos Sarraute, Martin Minnoni, Eric Fleury

In this paper we investigate the behavioural differences between mobile phone customers with prepaid and postpaid subscriptions. Our study reveals that (a) postpaid customers are more active in terms of service usage and (b) there are strong structural correlations in the mobile phone call network as connections between customers of the same subscription type are much more frequent than those between customers of different subscription types. Based on these observations we provide methods to detect the subscription type of customers by using information about their personal call statistics, and also their egocentric networks simultaneously. The key of our first approach is to cast this classification problem as a problem of graph labelling, which can be solved by max-flow min-cut algorithms. Our experiments show that, by using both user attributes and relationships, the proposed graph labelling approach is able to achieve a classification accuracy of $\sim 87\%$, which outperforms by $\sim 7\%$ supervised learning methods using only user attributes. In our second problem we aim to infer the subscription type of customers of external operators. We propose via approximate methods to solve this problem by using node attributes, and a two-ways indirect inference method based on observed homophilic structural correlations. Our results have straightforward applications in behavioural prediction and personal marketing.


          Statistical Analysis of Dice CAPTCHA Usability. (arXiv:1706.10177v1 [cs.AI])   

Authors: Darko Brodić, Alessia Amelio, Ivo R. Draganov

In this paper the elements of the CAPTCHA usability are analyzed. CAPTCHA, as a time progressive element in computer science, has been under constant interest of ordinary, professional as well as the scientific users of the Internet. The analysis is given based on the usability elements of CAPTCHA which are abbreviated as user-centric approach to the CAPTCHA. To demonstrate it, the specific type of Dice CAPTCHA is used in the experiment. The experiment is conducted on 190 Internet users with different demographic characteristics on laptop and tablet computers. The obtained results are statistically processed. At the end, the results are compared and conclusion of their use is drawn.


          Codebook Based Hybrid Precoding for Millimeter Wave Multiuser Systems. (arXiv:1706.10181v1 [cs.IT])   

Authors: Shiwen He, Jiaheng Wang, Yongming Huang, Bjorn Ottersten, Wei Hong

In millimeter wave (mmWave) systems, antenna architecture limitations make it difficult to apply conventional fully digital precoding techniques but call for low cost analog radio-frequency (RF) and digital baseband hybrid precoding methods. This paper investigates joint RF-baseband hybrid precoding for the downlink of multiuser multi-antenna mmWave systems with a limited number of RF chains. Two performance measures, maximizing the spectral efficiency and the energy efficiency of the system, are considered. We propose a codebook based RF precoding design and obtain the channel state information via a beam sweep procedure. Via the codebook based design, the original system is transformed into a virtual multiuser downlink system with the RF chain constraint. Consequently, we are able to simplify the complicated hybrid precoding optimization problems to joint codeword selection and precoder design (JWSPD) problems. Then, we propose efficient methods to address the JWSPD problems and jointly optimize the RF and baseband precoders under the two performance measures. Finally, extensive numerical results are provided to validate the effectiveness of the proposed hybrid precoders.


          A reliability-based approach for influence maximization using the evidence theory. (arXiv:1706.10188v1 [cs.SI])   

Authors: Siwar Jendoubi, Arnaud Martin

The influence maximization is the problem of finding a set of social network users, called influencers, that can trigger a large cascade of propagation. Influencers are very beneficial to make a marketing campaign goes viral through social networks for example. In this paper, we propose an influence measure that combines many influence indicators. Besides, we consider the reliability of each influence indicator and we present a distance-based process that allows to estimate the reliability of each indicator. The proposed measure is defined under the framework of the theory of belief functions. Furthermore, the reliability-based influence measure is used with an influence maximization model to select a set of users that are able to maximize the influence in the network. Finally, we present a set of experiments on a dataset collected from Twitter. These experiments show the performance of the proposed solution in detecting social influencers with good quality.


          New Integer Linear Programming Models for the Vertex Coloring Problem. (arXiv:1706.10191v1 [cs.CG])   

Authors: Adalat Jabrayilov, Petra Mutzel

The vertex coloring problem asks for the minimum number of colors that can be assigned to the vertices of a given graph such that for all vertices v the color of v is different from the color of any of its neighbors. The problem is NP-hard. Here, we introduce new integer linear programming formulations based on partial orderings. They have the advantage that they are as simple to work with as the classical assignment formulation, since they can be fed directly into a standard integer linear programming solver. We evaluate our new models using Gurobi and show that our new simple approach is a good alternative to the best state-of-the-art approaches for the vertex coloring problem. In our computational experiments, we compare our formulations with the classical assignment formulation and the representatives formulation on a large set of benchmark graphs as well as randomly generated graphs of varying size and density. The evaluation shows that one of the new models dominates both formulations for sparse graphs, while the representatives formulation is the best for dense graphs.


          RE-PACRR: A Context and Density-Aware Neural Information Retrieval Model. (arXiv:1706.10192v1 [cs.IR])   

Authors: Kai Hui, Andrew Yates, Klaus Berberich, Gerard de Melo

Ad-hoc retrieval models can benefit from considering different patterns in the interactions between a query and a document, effectively assessing the relevance of a document for a given user query. Factors to be considered in this interaction include (i) the matching of unigrams and ngrams, (ii) the proximity of the matched query terms, (iii) their position in the document, and (iv) how the different relevance signals are combined over different query terms. While previous work has successfully modeled some of these factors, not all aspects have been fully explored. In this work, we close this gap by proposing different neural components and incorporating them into a single architecture, leading to a novel neural IR model called RE-PACRR. Extensive comparisons with established models on TREC Web Track data confirm that the proposed model yields promising search results.


          More Tur\'an-Type Theorems for Triangles in Convex Point Sets. (arXiv:1706.10193v1 [math.CO])   

Authors: Boris Aronov, Vida Dujmović, Pat Morin, Aurélien Ooms, Luís Fernando Schultz Xavier da Silveira

We study the following family of problems: Given a set of $n$ points in convex position, what is the maximum number triangles one can create having these points as vertices while avoiding certain sets of forbidden configurations. As forbidden configurations we consider all 8 ways in which a pair of triangles in such a point set can interact. This leads to 256 extremal Tur\'an-type questions. We give nearly tight (within a $\log n$ factor) bounds for 248 of these questions and show that the remaining 8 questions are all asymptotically equivalent to Stein's longstanding tripod packing problem.


          Agglomerative Clustering of Growing Squares. (arXiv:1706.10195v1 [cs.DS])   

Authors: Thom Castermans, Bettina Speckmann, Frank Staals, Kevin Verbeek

We study an agglomerative clustering problem motivated by interactive glyphs in geo-visualization. Consider a set of disjoint square glyphs on an interactive map. When the user zooms out, the glyphs grow in size relative to the map, possibly with different speeds. When two glyphs intersect, we wish to replace them by a new glyph that captures the information of the intersecting glyphs.

We present a fully dynamic kinetic data structure that maintains a set of $n$ disjoint growing squares. Our data structure uses $O(n (\log n \log\log n)^2)$ space, supports queries in worst case $O(\log^3 n)$ time, and updates in $O(\log^7 n)$ amortized time. This leads to an $O(n\alpha(n)\log^7 n)$ time algorithm to solve the agglomerative clustering problem. This is a significant improvement over the current best $O(n^2)$ time algorithms.


          Improving Speech Related Facial Action Unit Recognition by Audiovisual Information Fusion. (arXiv:1706.10197v1 [cs.CV])   

Authors: Zibo Meng, Shizhong Han, Ping Liu, Yan Tong

It is challenging to recognize facial action unit (AU) from spontaneous facial displays, especially when they are accompanied by speech. The major reason is that the information is extracted from a single source, i.e., the visual channel, in the current practice. However, facial activity is highly correlated with voice in natural human communications.

Instead of solely improving visual observations, this paper presents a novel audiovisual fusion framework, which makes the best use of visual and acoustic cues in recognizing speech-related facial AUs. In particular, a dynamic Bayesian network (DBN) is employed to explicitly model the semantic and dynamic physiological relationships between AUs and phonemes as well as measurement uncertainty. A pilot audiovisual AU-coded database has been collected to evaluate the proposed framework, which consists of a "clean" subset containing frontal faces under well controlled circumstances and a challenging subset with large head movements and occlusions. Experiments on this database have demonstrated that the proposed framework yields significant improvement in recognizing speech-related AUs compared to the state-of-the-art visual-based methods especially for those AUs whose visual observations are impaired during speech, and more importantly also outperforms feature-level fusion methods by explicitly modeling and exploiting physiological relationships between AUs and phonemes.


          Modern Random Access for Satellite Communications. (arXiv:1706.10198v1 [cs.IT])   

Authors: Federico Clazzer

The present PhD dissertation focuses on modern random access (RA) techniques. In the first part an slot- and frame-asynchronous RA scheme adopting replicas, successive interference cancellation and combining techniques is presented and its performance analysed. The comparison of both slot-synchronous and asynchronous RA at higher layer, follows. Next, the optimization procedure, for slot-synchronous RA with irregular repetitions, is extended to the Rayleigh block fading channel. Finally, random access with multiple receivers is considered.


          Rule-Mining based classification: a benchmark study. (arXiv:1706.10199v1 [cs.LG])   

Authors: Margaux Luck, Nicolas Pallet, Cecilia Damon

This study proposed an exhaustive stable/reproducible rule-mining algorithm combined to a classifier to generate both accurate and interpretable models. Our method first extracts rules (i.e., a conjunction of conditions about the values of a small number of input features) with our exhaustive rule-mining algorithm, then constructs a new feature space based on the most relevant rules called "local features" and finally, builds a local predictive model by training a standard classifier on the new local feature space. This local feature space is easy interpretable by providing a human-understandable explanation under the explicit form of rules. Furthermore, our local predictive approach is as powerful as global classical ones like logistic regression (LR), support vector machine (SVM) and rules based methods like random forest (RF) and gradient boosted tree (GBT).


          Selfish Network Creation with Non-Uniform Edge Cost. (arXiv:1706.10200v1 [cs.GT])   

Authors: Ankit Chauhan, Pascal Lenzner, Anna Melnichenko, Louise Molitor

Network creation games investigate complex networks from a game-theoretic point of view. Based on the original model by Fabrikant et al. [PODC'03] many variants have been introduced. However, almost all versions have the drawback that edges are treated uniformly, i.e. every edge has the same cost and that this common parameter heavily influences the outcomes and the analysis of these games.

We propose and analyze simple and natural parameter-free network creation games with non-uniform edge cost. Our models are inspired by social networks where the cost of forming a link is proportional to the popularity of the targeted node. Besides results on the complexity of computing a best response and on various properties of the sequential versions, we show that the most general version of our model has constant Price of Anarchy. To the best of our knowledge, this is the first proof of a constant Price of Anarchy for any network creation game.


          Joint Optimization of User Association, Data Delivery Rate and Precoding for Cache-Enabled F-RANs. (arXiv:1706.10203v1 [cs.IT])   

Authors: Tung T. Vu, Duy T. Ngo, Lawrence Ong, Salman Durrani, Richard H. Middleton

This paper considers the downlink of a cache-enabled fog radio access network (F-RAN) with limited fronthaul capacity, where user association (UA), data delivery rate (DDR) and signal precoding are jointly optimized. We formulate a mixed-integer nonlinear programming problem in which the weighted difference of network throughput and total power consumption is maximized, subject to the predefined DDR requirements and the maximum transmit power at each eRRH. To address this challenging problem, we first apply the l0-norm approximation and l1-norm minimization techniques to deal with the UA. After this key step, we arrive at an approximated problem that only involves the joint optimization of DDR and precoding. By using the alternating descent method, we further decompose this problem into a convex subproblem for DDR allocation and a nonconvex subproblem for precoding design. While the former is globally solved by the interior-point method, the latter is solved by a specifically tailored successive convex quadratic programming method. Finally, we propose an iterative algorithm for the original joint optimization that is guaranteed to converge. Importantly, each iteration of the developed algorithm only involves solving simple convex problems. Numerical examples demonstrate that the proposed design significantly improves both throughput and power performances, especially in practical F-RANs with limited fronthaul capacity. Compared to the sole precoder design for a given cache placement, our joint design is shown to improve the throughput by 50% while saving at least half of the total power consumption in the considered examples.


          Sums of Palindromes: an Approach via Nested-Word Automata. (arXiv:1706.10206v1 [cs.FL])   

Authors: Aayush Rajasekaran, Jeffrey Shallit, Tim Smith

We prove, using a decision procedure based on nested-word automata, that every natural number is the sum of at most 9 natural numbers whose base-2 representation is a palindrome. We consider some other variations on this problem, and prove similar results. We argue that heavily case-based proofs are a good signal that a decision procedure may help to automate the proof.


          Optimization Methods for Supervised Machine Learning: From Linear Models to Deep Learning. (arXiv:1706.10207v1 [stat.ML])   

Authors: Frank E. Curtis, Katya Scheinberg

The goal of this tutorial is to introduce key models, algorithms, and open questions related to the use of optimization methods for solving problems arising in machine learning. It is written with an INFORMS audience in mind, specifically those readers who are familiar with the basics of optimization algorithms, but less familiar with machine learning. We begin by deriving a formulation of a supervised learning problem and show how it leads to various optimization problems, depending on the context and underlying assumptions. We then discuss some of the distinctive features of these optimization problems, focusing on the examples of logistic regression and the training of deep neural networks. The latter half of the tutorial focuses on optimization algorithms, first for convex logistic regression, for which we discuss the use of first-order methods, the stochastic gradient method, variance reducing stochastic methods, and second-order methods. Finally, we discuss how these approaches can be employed to the training of deep neural networks, emphasizing the difficulties that arise from the complex, nonconvex structure of these models.


          On Fairness, Diversity and Randomness in Algorithmic Decision Making. (arXiv:1706.10208v1 [stat.ML])   

Authors: Nina Grgić-Hlača, Muhammad Bilal Zafar, Krishna P. Gummadi, Adrian Weller

Consider a binary decision making process where a single machine learning classifier replaces a multitude of humans. We raise questions about the resulting loss of diversity in the decision making process. We study the potential benefits of using random classifier ensembles instead of a single classifier in the context of fairness-aware learning and demonstrate various attractive properties: (i) an ensemble of fair classifiers is guaranteed to be fair, for several different measures of fairness, (ii) an ensemble of unfair classifiers can still achieve fair outcomes, and (iii) an ensemble of classifiers can achieve better accuracy-fairness trade-offs than a single classifier. Finally, we introduce notions of distributional fairness to characterize further potential benefits of random classifier ensembles.


          Storage, Communication, and Load Balancing Trade-off in Distributed Cache Networks. (arXiv:1706.10209v1 [cs.IT])   

Authors: Mahdi Jafari Siavoshani, Ali Pourmiri, Seyed Pooya Shariatpanahi

We consider load balancing in a network of caching servers delivering contents to end users. Randomized load balancing via the so-called power of two choices is a well-known approach in parallel and distributed systems. In this framework, we investigate the tension between storage resources, communication cost, and load balancing performance. To this end, we propose a randomized load balancing scheme which simultaneously considers cache size limitation and proximity in the server redirection process.

In contrast to the classical power of two choices setup, since the memory limitation and the proximity constraint cause correlation in the server selection process, we may not benefit from the power of two choices. However, we prove that in certain regimes of problem parameters, our scheme results in the maximum load of order $\Theta(\log\log n)$ (here $n$ is the network size). This is an exponential improvement compared to the scheme which assigns each request to the nearest available replica. Interestingly, the extra communication cost incurred by our proposed scheme, compared to the nearest replica strategy, is small. Furthermore, our extensive simulations show that the trade-off trend does not depend on the network topology and library popularity profile details.


          Formation of Stable Strategic Networks with Desired Topologies. (arXiv:1706.10215v1 [cs.SI])   

Authors: Swapnil Dhamal, Y. Narahari

Many real-world networks such as social networks consist of strategic agents. The topology of these networks often plays a crucial role in determining the ease and speed with which certain information driven tasks can be accomplished. Consequently, growing a stable network having a certain desired topology is of interest. Motivated by this, we study the following important problem: given a certain desired topology, under what conditions would best response link alteration strategies adopted by strategic agents, uniquely lead to formation of a stable network having the given topology. This problem is the inverse of the classical network formation problem where we are concerned with determining stable topologies, given the conditions on the network parameters. We study this interesting inverse problem by proposing (1) a recursive model of network formation and (2) a utility model that captures key determinants of network formation. Building upon these models, we explore relevant topologies such as star graph, complete graph, bipartite Turan graph, and multiple stars with interconnected centers. We derive a set of sufficient conditions under which these topologies uniquely emerge, study their social welfare properties, and investigate the effects of deviating from the derived conditions.


          SMC Faster R-CNN: Toward a scene-specialized multi-object detector. (arXiv:1706.10217v1 [cs.CV])   

Authors: Ala Mhalla, Thierry Chateau, Houda Maamatou, Sami Gazzah, Najoua Essoukri Ben Amara

Generally, the performance of a generic detector decreases significantly when it is tested on a specific scene due to the large variation between the source training dataset and the samples from the target scene. To solve this problem, we propose a new formalism of transfer learning based on the theory of a Sequential Monte Carlo (SMC) filter to automatically specialize a scene-specific Faster R-CNN detector. The suggested framework uses different strategies based on the SMC filter steps to approximate iteratively the target distribution as a set of samples in order to specialize the Faster R-CNN detector towards a target scene. Moreover, we put forward a likelihood function that combines spatio-temporal information extracted from the target video sequence and the confidence-score given by the output layer of the Faster R-CNN, to favor the selection of target samples associated with the right label. The effectiveness of the suggested framework is demonstrated through experiments on several public traffic datasets. Compared with the state-of-the-art specialization frameworks, the proposed framework presents encouraging results for both single and multi-traffic object detections.


          6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices. (arXiv:1706.10220v1 [cs.CR])   

Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac

Sensors (e.g., light, gyroscope, accelerotmeter) and sensing enabled applications on a smart device make the applications more user-friendly and efficient. However, the current permission-based sensor management systems of smart devices only focus on certain sensors and any App can get access to other sensors by just accessing the generic sensor API. In this way, attackers can exploit these sensors in numerous ways: they can extract or leak users' sensitive information, transfer malware, or record or steal sensitive information from other nearby devices. In this paper, we propose 6thSense, a context-aware intrusion detection system which enhances the security of smart devices by observing changes in sensor data for different tasks of users and creating a contextual model to distinguish benign and malicious behavior of sensors. 6thSense utilizes three different Machine Learning-based detection mechanisms (i.e., Markov Chain, Naive Bayes, and LMT) to detect malicious behavior associated with sensors. We implemented 6thSense on a sensor-rich Android smart device (i.e., smartphone) and collected data from typical daily activities of 50 real users. Furthermore, we evaluated the performance of 6thSense against three sensor-based threats: (1) a malicious App that can be triggered via a sensor (e.g., light), (2) a malicious App that can leak information via a sensor, and (3) a malicious App that can steal data using sensors. Our extensive evaluations show that the 6thSense framework is an effective and practical approach to defeat growing sensor-based threats with an accuracy above 96% without compromising the normal functionality of the device. Moreover, our framework costs minimal overhead.


          Press F1 for help: participatory design for dealing with on-line and real life security of older adults. (arXiv:1706.10223v1 [cs.SI])   

Authors: Bartłomiej Balcerzak, Wiesław Kopeć, Radosław Nielek, Sebastian Kruk, Kamil Warpechowski, Mateusz Wasik, Marek Węgrzyn

In this paper we present the report on the design and development of a platform for the inter-generational exchange of favors. This platform was designed using participatory design approach during a 24-hour hackathon by a team consisting of younger programmers and older adults. The findings of this report show that inter-generational cooperation in which the older adults serve as representatives of the end user, not only improves the design and development of the application, but also provides an effective method for designing and applying solutions aimed at improving the security of older adults while using online and mobile tools.


          Contracting a Planar Graph Efficiently. (arXiv:1706.10228v1 [cs.DS])   

Authors: Jacob Holm, Giuseppe F. Italiano, Adam Karczmarz, Jakub Łącki, Eva Rotenberg, Piotr Sankowski

We present a data structure that can maintain a simple planar graph under edge contractions in linear total time. The data structure supports adjacency queries and provides access to neighbor lists in $O(1)$ time. Moreover, it can report all the arising self-loops and parallel edges.

By applying the data structure, we can achieve optimal running times for decremental bridge detection, 2-edge connectivity, maximal 3-edge connected components, and the problem of finding a unique perfect matching for a static planar graph. Furthermore, we improve the running times of algorithms for several planar graph problems, including decremental 2-vertex and 3-edge connectivity, and we show that using our data structure in a black-box manner, one obtains conceptually simple optimal algorithms for computing MST and 5-coloring in planar graphs.


          Improving Session Recommendation with Recurrent Neural Networks by Exploiting Dwell Time. (arXiv:1706.10231v1 [cs.IR])   

Authors: Alexander Dallmann (1), Alexander Grimm (1), Christian Pölitz (1), Daniel Zoller (1), Andreas Hotho (1 and 2) ((1) University of Würzburg, (2) L3S Research Center)

Recently, Recurrent Neural Networks (RNNs) have been applied to the task of session-based recommendation. These approaches use RNNs to predict the next item in a user session based on the previ- ously visited items. While some approaches consider additional item properties, we argue that item dwell time can be used as an implicit measure of user interest to improve session-based item recommen- dations. We propose an extension to existing RNN approaches that captures user dwell time in addition to the visited items and show that recommendation performance can be improved. Additionally, we investigate the usefulness of a single validation split for model selection in the case of minor improvements and find that in our case the best model is not selected and a fold-like study with different validation sets is necessary to ensure the selection of the best model.


          Probabilistic Active Learning of Functions in Structural Causal Models. (arXiv:1706.10234v1 [stat.ML])   

Authors: Paul K. Rubenstein, Ilya Tolstikhin, Philipp Hennig, Bernhard Schoelkopf

We consider the problem of learning the functions computing children from parents in a Structural Causal Model once the underlying causal graph has been identified. This is in some sense the second step after causal discovery. Taking a probabilistic approach to estimating these functions, we derive a natural myopic active learning scheme that identifies the intervention which is optimally informative about all of the unknown functions jointly, given previously observed data. We test the derived algorithms on simple examples, to demonstrate that they produce a structured exploration policy that significantly improves on unstructured base-lines.


          Is it ethical to avoid error analysis?. (arXiv:1706.10237v1 [cs.CY])   

Authors: Eva García-Martín, Niklas Lavesson

Machine learning algorithms tend to create more accurate models with the availability of large datasets. In some cases, highly accurate models can hide the presence of bias in the data. There are several studies published that tackle the development of discriminatory-aware machine learning algorithms. We center on the further evaluation of machine learning models by doing error analysis, to understand under what conditions the model is not working as expected. We focus on the ethical implications of avoiding error analysis, from a falsification of results and discrimination perspective. Finally, we show different ways to approach error analysis in non-interpretable machine learning algorithms such as deep learning.


          Towards Understanding Generalization of Deep Learning: Perspective of Loss Landscapes. (arXiv:1706.10239v1 [cs.LG])   

Authors: Lei Wu, Zhanxing Zhu, Weinan E

It is widely observed that deep learning models with learned parameters generalize well, even with much more model parameters than the number of training samples. We systematically investigate the underlying reasons why deep neural networks often generalize well, and reveal the difference between the minima (with the same training error) that generalize well and those they don't. We show that it is the characteristics the landscape of the loss function that explains the good generalization capability. For the landscape of loss function for deep networks, the volume of basin of attraction of good minima dominates over that of poor minima, which guarantees optimization methods with random initialization to converge to good minima. We theoretically justify our findings through analyzing 2-layer neural networks; and show that the low-complexity solutions have a small norm of Hessian matrix with respect to model parameters. For deeper networks, extensive numerical evidence helps to support our arguments.


          Bridging the Gap between Probabilistic and Deterministic Models: A Simulation Study on a Variational Bayes Predictive Coding Recurrent Neural Network Model. (arXiv:1706.10240v1 [cs.AI])   

Authors: Ahmadreza Ahmadi, Jun Tani

The current paper proposes a novel variational Bayes predictive coding RNN model, which can learn to generate fluctuated temporal patterns from exemplars. The model learns to maximize the lower bound of the weighted sum of the regularization and reconstruction error terms. We examined how this weighting can affect development of different types of information processing while learning fluctuated temporal patterns. Simulation results show that strong weighting of the reconstruction term causes the development of deterministic chaos for imitating the randomness observed in target sequences, while strong weighting of the regularization term causes the development of stochastic dynamics imitating probabilistic processes observed in targets. Moreover, results indicate that the most generalized learning emerges between these two extremes. The paper concludes with implications in terms of the underlying neuronal mechanisms for autism spectrum disorder and for free action.


          A selectional auto-encoder approach for document image binarization. (arXiv:1706.10241v1 [cs.CV])   

Authors: Jorge Calvo-Zaragoza, Antonio-Javier Gallego

Binarization plays a key role in the automatic information retrieval from document images. This process is usually performed in the first stages of documents analysis systems, and serves as a basis for subsequent steps. Hence it has to be robust in order to allow the full analysis workflow to be successful. Several methods for document image binarization have been proposed so far, most of which are based on hand-crafted image processing strategies. Recently, Convolutional Neural Networks have shown an amazing performance in many disparate duties related to computer vision. In this paper we discuss the use of a convolutional auto-encoder devoted to learning an end-to-end map from an input image of a fixed size to its selectional output, in which activations indicate whether the pixel must be classified as foreground or background. Once trained, documents can therefore be binarized by parsing them through the model and applying a threshold. Our approach has proven to outperform state-of-the-art techniques in the well-known DIBCO dataset (edition 2016).


          Line Hermitian Grassmann Codes and their Parameters. (arXiv:1706.10255v1 [math.CO])   

Authors: Ilaria Cardinali, Luca Giuzzi

In this paper we introduce and study line Hermitian Grassmann codes as those subcodes of the Grassmann codes associated to the $2$-Grassmannian of a Hermitian polar space defined over a finite field of square order.

In particular, we determine their parameters and characterize the words of minimum weight.


          How biased is your model? Concentration Inequalities, Information and Model Bias. (arXiv:1706.10260v1 [cs.IT])   

Authors: Konstantinos Gourgoulias, Markos A. Katsoulakis, Luc Rey-Bellet, Jie Wang

We derive tight and computable bounds on the bias of statistical estimators, or more generally of quantities of interest, when evaluated on a baseline model P rather than on the typically unknown true model Q. Our proposed method combines the scalable information inequality derived by P. Dupuis, K.Chowdhary, the authors and their collaborators together with classical concentration inequalities (such as Bennett's and Hoeffding-Azuma inequalities). Our bounds are expressed in terms of the Kullback-Leibler divergence R(Q||P) of model Q with respect to P and the moment generating function for the statistical estimator under P. Furthermore, concentration inequalities, i.e. bounds on moment generating functions, provide tight and computationally inexpensive model bias bounds for quantities of interest. Finally, they allow us to derive rigorous confidence bands for statistical estimators that account for model bias and are valid for an arbitrary amount of data.


          Color-opponent mechanisms for local hue encoding in a hierarchical framework. (arXiv:1706.10266v1 [cs.CV])   

Authors: Paria Mehrani, Andrei Mouraviev, Oscar J. Avella Gonzalez, John K. Tsotsos

Various aspects of color have been extensively studied in science and the arts for the simple reason that it conveys information and attracts attention. In perception, color plays an important role. It helps in tasks such as object recognition. In humans, color perception starts with cones in the retina. Studies in the primary visual cortex show opponent mechanisms for color representation. While single-opponent cells encode local hue, double-opponent neurons are sensitive to color boundaries. This paper introduces a biologically plausible computational model for color representation. We present a hierarchical model of neurons that successfully encodes local hue. Our proposed model benefits from studies on the visual cortex and builds a network of single-opponent and hue-selective neurons. We show that our model hue-selective neurons, at the top layer of our network, can achieve the goal of local hue encoding by combining inputs from single-opponent cells, and that they resemble hue-selective neurons in V4 of the primate visual system. Moreover, with a few examples, we present the possibility of spanning the infinite space of physical hues from the hue-selective neurons in our model.


          Challenges to Keeping the Computer Industry Centered in the US. (arXiv:1706.10267v1 [cs.CY])   

Authors: Thomas M. Conte, Erik P. Debenedictis, R. Stanley Williams, Mark D. Hill

It is undeniable that the worldwide computer industry's center is the US, specifically in Silicon Valley. Much of the reason for the success of Silicon Valley had to do with Moore's Law: the observation by Intel co-founder Gordon Moore that the number of transistors on a microchip doubled at a rate of approximately every two years. According to the International Technology Roadmap for Semiconductors, Moore's Law will end in 2021. How can we rethink computing technology to restart the historic explosive performance growth? Since 2012, the IEEE Rebooting Computing Initiative (IEEE RCI) has been working with industry and the US government to find new computing approaches to answer this question. In parallel, the CCC has held a number of workshops addressing similar questions. This whitepaper summarizes some of the IEEE RCI and CCC findings. The challenge for the US is to lead this new era of computing. Our international competitors are not sitting still: China has invested significantly in a variety of approaches such as neuromorphic computing, chip fabrication facilities, computer architecture, and high-performance simulation and data analytics computing, for example. We must act now, otherwise, the center of the computer industry will move from Silicon Valley and likely move off shore entirely.


          SafetyNets: Verifiable Execution of Deep Neural Networks on an Untrusted Cloud. (arXiv:1706.10268v1 [cs.LG])   

Authors: Zahra Ghodsi, Tianyu Gu, Siddharth Garg

Inference using deep neural networks is often outsourced to the cloud since it is a computationally demanding task. However, this raises a fundamental issue of trust. How can a client be sure that the cloud has performed inference correctly? A lazy cloud provider might use a simpler but less accurate model to reduce its own computational load, or worse, maliciously modify the inference results sent to the client. We propose SafetyNets, a framework that enables an untrusted server (the cloud) to provide a client with a short mathematical proof of the correctness of inference tasks that they perform on behalf of the client. Specifically, SafetyNets develops and implements a specialized interactive proof (IP) protocol for verifiable execution of a class of deep neural networks, i.e., those that can be represented as arithmetic circuits. Our empirical results on three- and four-layer deep neural networks demonstrate the run-time costs of SafetyNets for both the client and server are low. SafetyNets detects any incorrect computations of the neural network by the untrusted server with high probability, while achieving state-of-the-art accuracy on the MNIST digit recognition (99.4%) and TIMIT speech recognition tasks (75.22%).


          A formalization of convex polyhedra based on the simplex method. (arXiv:1706.10269v1 [cs.LO])   

Authors: Xavier Allamigeon, Ricardo D. Katz

We present a formalization of convex polyhedra in the proof assistant Coq. The cornerstone of our work is a complete implementation of the simplex method, together with the proof of its correctness and termination. This allows us to define the basic predicates over polyhedra in an effective way (i.e. as programs), and relate them with the corresponding usual logical counterparts. To this end, we make an extensive use of the Boolean reflection methodology. The benefit of this approach is that we can easily derive the proof of several essential results on polyhedra, such as Farkas Lemma, duality theorem of linear programming, and Minkowski Theorem.


          Lifelong Learning in Costly Feature Spaces. (arXiv:1706.10271v1 [cs.LG])   

Authors: Maria-Florina Balcan, Avrim Blum, Vaishnavh Nagarajan

An important long-term goal in machine learning systems is to build learning agents that, like humans, can learn many tasks over their lifetime, and moreover use information from these tasks to improve their ability to do so efficiently. In this work, our goal is to provide new theoretical insights into the potential of this paradigm. In particular, we propose a lifelong learning framework that adheres to a novel notion of resource efficiency that is critical in many real-world domains where feature evaluations are costly. That is, our learner aims to reuse information from previously learned related tasks to learn future tasks in a feature-efficient manner. Furthermore, we consider novel combinatorial ways in which learning tasks can relate. Specifically, we design lifelong learning algorithms for two structurally different and widely used families of target functions: decision trees/lists and monomials/polynomials. We also provide strong feature-efficiency guarantees for these algorithms; in fact, we show that in order to learn future targets, we need only slightly more feature evaluations per training example than what is needed to predict on an arbitrary example using those targets. We also provide algorithms with guarantees in an agnostic model where not all the targets are related to each other. Finally, we also provide lower bounds on the performance of a lifelong learner in these models, which are in fact tight under some conditions.


          A Model for Attribute Based Role-Role Assignment (ARRA). (arXiv:1706.10274v1 [cs.CR])   

Authors: Jiwan Ninglekhu, Ram Krishnan

Administrative Role Based Access Control (ARBAC) models specify how to manage user-role assignments (URA), permission-role assignments (PRA), and role-role assignments (RRA). Many approaches have been proposed in the literature for URA, PRA, and RRA. In this paper, we propose a model for attribute-based role-role assignment (ARRA), a novel way to unify prior RRA approaches. We leverage the idea that attributes of various RBAC entities such as admin users and regular roles can be used to administer RRA in a highly flexible manner. We demonstrate that ARRA can express and unify prior RRA models.


          Signal Reconstruction from Interferometric Measurements under Sensing Constraints. (arXiv:1706.10275v1 [cs.IT])   

Authors: Davood Mardani, George K. Atia, Ayman F. Abouraddy

This paper develops a unifying framework for signal reconstruction from interferometric measurements that is broadly applicable to various applications of interferometry. In this framework, the problem of signal reconstruction in interferometry amounts to one of basis analysis. Its applicability is shown to extend beyond conventional temporal interferometry, which leverages the relative delay between the two arms of an interferometer, to arbitrary degrees of freedom of the input signal. This allows for reconstruction of signals supported in other domains (e.g., spatial) with no modification to the underlying structure except for replacing the standard temporal delay with a generalized delay, that is, a practically realizable unitary transformation for which the basis elements are eigenfunctions. Under the proposed model, the interferometric measurements are shown to be linear in the basis coefficients, thereby enabling efficient and fast recovery of the desired information. While the corresponding linear transformation has only a limited number of degrees of freedom set by the structure of the interferometer giving rise to a highly constrained sensing structure, we show that the problem of signal recovery from such measurements can still be carried out compressively. This signifies significant reduction in sample complexity without introducing any additional randomization as is typically done in prior work leveraging compressive sensing techniques. We provide performance guarantees under constrained sensing by proving that the transformation satisfies sufficient conditions for successful reconstruction of sparse signals using concentration arguments. We showcase the effectiveness of the proposed approach using simulation results, as well as actual experimental results in the context of optical modal analysis of spatial beams.


          DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries. (arXiv:1706.10276v1 [cs.CR])   

Authors: Anrin Chakraborti, Chen Chen, Radu Sion

Sensitive information is present on our phones, disks, watches and computers. Its protection is essential. Plausible deniability of stored data allows individuals to deny that their device contains a piece of sensitive information. This constitutes a key tool in the fight against oppressive governments and censorship. Unfortunately, existing solutions, such as the now defunct TrueCrypt [5], can defend only against an adversary that can access a users device at most once (single-snapshot adversary). Recent solutions have traded significant performance overheads for the ability to handle more powerful adversaries able to access the device at multiple points in time (multi-snapshot adversary). In this paper we show that this sacrifice is not necessary. We introduce and build DataLair 1 , a practical plausible deniability mechanism. When compared with exist- ing approaches, DataLair is two orders of magnitude faster for public data accesses, and 5 times faster for hidden data accesses. An important component in DataLair is a new write-only ORAM construction which improves on the complexity of the state of the art write-only ORAM by a factor of O(logN ), where N denotes the underlying storage disk size.


          Bolt: Accelerated Data Mining with Fast Vector Compression. (arXiv:1706.10283v1 [cs.PF])   

Authors: Davis W Blalock, John V Guttag

Vectors of data are at the heart of machine learning and data mining. Recently, vector quantization methods have shown great promise in reducing both the time and space costs of operating on vectors. We introduce a vector quantization algorithm that can compress vectors over 12x faster than existing techniques while also accelerating approximate vector operations such as distance and dot product computations by up to 10x. Because it can encode over 2GB of vectors per second, it makes vector quantization cheap enough to employ in many more circumstances. For example, using our technique to compute approximate dot products in a nested loop can multiply matrices faster than a state-of-the-art BLAS implementation, even when our algorithm must first compress the matrices.

In addition to showing the above speedups, we demonstrate that our approach can accelerate nearest neighbor search and maximum inner product search by over 100x compared to floating point operations and up to 10x compared to other vector quantization methods. Our approximate Euclidean distance and dot product computations are not only faster than those of related algorithms with slower encodings, but also faster than Hamming distance computations, which have direct hardware support on the tested platforms. We also assess the errors of our algorithm's approximate distances and dot products, and find that it is competitive with existing, slower vector quantization algorithms.


          Cache Oblivious Algorithms for Computing the Triplet Distance Between Trees. (arXiv:1706.10284v1 [cs.DS])   

Authors: Gerth Stølting Brodal, Konstantinos Mampentzidis

We study the problem of computing the triplet distance between two rooted unordered trees with $n$ labeled leafs. Introduced by Dobson 1975, the triplet distance is the number of leaf triples that induce different topologies in the two trees. The current theoretically best algorithm is an $\mathrm{O}(n \log n)$ time algorithm by Brodal et al. (SODA 2013). Recently Jansson et al. proposed a new algorithm that, while slower in theory, requiring $\mathrm{O}(n \log^3 n)$ time, in practice it outperforms the theoretically faster $\mathrm{O}(n \log n)$ algorithm. Both algorithms do not scale to external memory. We present two cache oblivious algorithms that combine the best of both worlds. The first algorithm is for the case when the two input trees are binary trees and the second a generalized algorithm for two input trees of arbitrary degree. Analyzed in the RAM model, both algorithms require $\mathrm{O}(n \log n)$ time, and in the cache oblivious model $\mathrm{O}(\frac{n}{B} \log_{2} \frac{n}{M})$ I/Os. Their relative simplicity and the fact that they scale to external memory makes them achieve the best practical performance. We note that these are the first algorithms that scale to external memory, both in theory and practice, for this problem.


          Physiology-Aware Rural Ambulance Routing. (arXiv:1706.10290v1 [cs.NI])   

Authors: Mohammad Hosseini, Richard B. Berlin Jr., Lui Sha

In emergency patient transport from rural medical facility to center tertiary hospital, real-time monitoring of the patient in the ambulance by a physician expert at the tertiary center is crucial. While telemetry healthcare services using mobile networks may enable remote real-time monitoring of transported patients, physiologic measures and tracking are at least as important and requires the existence of high-fidelity communication coverage. However, the wireless networks along the roads especially in rural areas can range from 4G to low-speed 2G, some parts with communication breakage. From a patient care perspective, transport during critical illness can make route selection patient state dependent. Prompt decisions with the relative advantage of a longer more secure bandwidth route versus a shorter, more rapid transport route but with less secure bandwidth must be made. The trade-off between route selection and the quality of wireless communication is an important optimization problem which unfortunately has remained unaddressed by prior work.

In this paper, we propose a novel physiology-aware route scheduling approach for emergency ambulance transport of rural patients with acute, high risk diseases in need of continuous remote monitoring. We mathematically model the problem into an NP-hard graph theory problem, and approximate a solution based on a trade-off between communication coverage and shortest path. We profile communication along two major routes in a large rural hospital settings in Illinois, and use the traces to manifest the concept. Further, we design our algorithms and run preliminary experiments for scalability analysis. We believe that our scheduling techniques can become a compelling aid that enables an always-connected remote monitoring system in emergency patient transfer scenarios aimed to prevent morbidity and mortality with early diagnosis treatment.


          Convergence of the randomized Kaczmarz method for phase retrieval. (arXiv:1706.10291v1 [math.NA])   

Authors: Halyun Jeong, C. Sinan Güntürk

The classical Kaczmarz iteration and its randomized variants are popular tools for fast inversion of linear overdetermined systems. This method extends naturally to the setting of the phase retrieval problem via substituting at each iteration the phase of any measurement of the available approximate solution for the unknown phase of the measurement of the true solution. Despite the simplicity of the method, rigorous convergence guarantees that are available for the classical linear setting have not been established so far for the phase retrieval setting. In this short note, we provide a convergence result for the randomized Kaczmarz method for phase retrieval in $\mathbb{R}^d$. We show that with high probability a random measurement system of size $m \asymp d$ will be admissible for this method in the sense that convergence in the mean square sense is guaranteed with any prescribed probability. The convergence is exponential and comparable to the linear setting.


          Onions in the Crosshairs: When The Man really is out to get you. (arXiv:1706.10292v1 [cs.CR])   

Authors: Aaron D. Jaggard, Paul Syverson

We introduce and investigate *targeting adversaries* who selectively attack users of Tor or other secure-communication networks. We argue that attacks by such adversaries are more realistic and more significant threats to those most relying on Tor's protection than are attacks in prior analyses of Tor security. Previous research and Tor design decisions have focused on protecting against adversaries who are equally interested in any user of the network. Our adversaries selectively target users---e.g., those who visit a particular website or chat on a particular private channel---and essentially disregard Tor users other than these. We present a model of such adversaries and investigate three example cases where particular users might be targeted: a cabal conducting meetings using MTor, a published Tor multicast protocol; a cabal meeting on a private IRC channel; and users visiting a particular .onion website. In general for our adversaries, compromise is much faster and provides more feedback and possibilities for adaptation than do attacks examined in prior work. We also discuss selection of websites for targeting of their users based on the distribution across users of site activity. We describe adversaries both attempting to learn the size of a cabal meeting online or of a set of sufficiently active visitors to a targeted site and attempting to identify guards of each targeted user. We compare the threat of targeting adversaries versus previously considered adversaries, and we briefly sketch possible countermeasures for resisting targeting adversaries.


          Noisy Networks for Exploration. (arXiv:1706.10295v1 [cs.LG])   

Authors: Meire Fortunato, Mohammad Gheshlaghi Azar, Bilal Piot, Jacob Menick, Ian Osband, Alex Graves, Vlad Mnih, Remi Munos, Demis Hassabis, Olivier Pietquin, Charles Blundell, Shane Legg

We introduce NoisyNet, a deep reinforcement learning agent with parametric noise added to its weights, and show that the induced stochasticity of the agent's policy can be used to aid efficient exploration. The parameters of the noise are learned with gradient descent along with the remaining network weights. NoisyNet is straightforward to implement and adds little computational overhead. We find that replacing the conventional exploration heuristics for A3C, DQN and dueling agents (entropy reward and $\epsilon$-greedy respectively) with NoisyNet yields substantially higher scores for a wide range of Atari games, in some cases advancing the agent from sub to super-human performance.


          Exploring the Human Connectome Topology in Group Studies. (arXiv:1706.10297v1 [q-bio.NC])   

Authors: Johnson J.G. Keiriz, Liang Zhan, Morris Chukhman, Olu Ajilore, Alex D. Leow, Angus G. Forbes

Visually comparing brain networks, or connectomes, is an essential task in the field of neuroscience. Especially relevant to the field of clinical neuroscience, group studies that examine differences between populations or changes over time within a population enable neuroscientists to reason about effective diagnoses and treatments for a range of neuropsychiatric disorders. In this paper, we specifically explore how visual analytics tools can be used to facilitate various clinical neuroscience tasks, in which observation and analysis of meaningful patterns in the connectome can support patient diagnosis and treatment. We conduct a survey of visualization tasks that enable clinical neuroscience activities, and further explore how existing connectome visualization tools support or fail to support these tasks. Based on our investigation of these tasks, we introduce a novel visualization tool, NeuroCave, to support group studies analyses. We discuss how our design decisions (the use of immersive visualization, the use of hierarchical clustering and dimensionality reduction techniques, and the choice of visual encodings) are motivated by these tasks. We evaluate NeuroCave through two use cases that illustrate the utility of interactive connectome visualization in clinical neuroscience contexts. In the first use case, we study sex differences using functional connectomes and discover hidden connectome patterns associated with well-known cognitive differences in spatial and verbal abilities. In the second use case, we show how the utility of visualizing the brain in different topological space coupled with clustering information can reveal the brain's intrinsic structure.


          Elementary epistemological features of machine intelligence. (arXiv:0812.0885v4 [cs.AI] UPDATED)   

Authors: Marko Horvat

Theoretical analysis of machine intelligence (MI) is useful for defining a common platform in both theoretical and applied artificial intelligence (AI). The goal of this paper is to set canonical definitions that can assist pragmatic research in both strong and weak AI. Described epistemological features of machine intelligence include relationship between intelligent behavior, intelligent and unintelligent machine characteristics, observable and unobservable entities and classification of intelligence. The paper also establishes algebraic definitions of efficiency and accuracy of MI tests as their quality measure. The last part of the paper addresses the learning process with respect to the traditional epistemology and the epistemology of MI described here. The proposed views on MI positively correlate to the Hegelian monistic epistemology and contribute towards amalgamating idealistic deliberations with the AI theory, particularly in a local frame of reference.


          Using TPA to count linear extensions. (arXiv:1010.4981v2 [math.PR] UPDATED)   

Authors: Jacqueline Banks, Scott Garrabrant, Mark L. Huber, Anne Perizzolo

A linear extension of a poset $P$ is a permutation of the elements of the set that respects the partial order. Let $L(P)$ denote the number of linear extensions. It is a #P complete problem to determine $L(P)$ exactly for an arbitrary poset, and so randomized approximation algorithms that draw randomly from the set of linear extensions are used. In this work, the set of linear extensions is embedded in a larger state space with a continuous parameter ?. The introduction of a continuous parameter allows for the use of a more efficient method for approximating $L(P)$ called TPA. Our primary result is that it is possible to sample from this continuous embedding in time that as fast or faster than the best known methods for sampling uniformly from linear extensions. For a poset containing $n$ elements, this means we can approximate $L(P)$ to within a factor of $1 + \epsilon$ with probability at least $1 - \delta$ using an expected number of random bits and comparisons in the poset which is at most $O(n^3(ln n)(ln L(P))\epsilon^{-2}\ln \delta^{-1}).$


          Empirical entropy, minimax regret and minimax risk. (arXiv:1308.1147v2 [math.ST] UPDATED)   

Authors: Alexander Rakhlin, Karthik Sridharan, Alexandre B. Tsybakov

We consider the random design regression model with square loss. We propose a method that aggregates empirical minimizers (ERM) over appropriately chosen random subsets and reduces to ERM in the extreme case, and we establish sharp oracle inequalities for its risk. We show that, under the $\varepsilon^{-p}$ growth of the empirical $\varepsilon$-entropy, the excess risk of the proposed method attains the rate $n^{-2/(2+p)}$ for $p\in(0,2)$ and $n^{-1/p}$ for $p>2$ where $n$ is the sample size. Furthermore, for $p\in(0,2)$, the excess risk rate matches the behavior of the minimax risk of function estimation in regression problems under the well-specified model. This yields a conclusion that the rates of statistical estimation in well-specified models (minimax risk) and in misspecified models (minimax regret) are equivalent in the regime $p\in(0,2)$. In other words, for $p\in(0,2)$ the problem of statistical learning enjoys the same minimax rate as the problem of statistical estimation. On the contrary, for $p>2$ we show that the rates of the minimax regret are, in general, slower than for the minimax risk. Our oracle inequalities also imply the $v\log(n/v)/n$ rates for Vapnik--Chervonenkis type classes of dimension $v$ without the usual convexity assumption on the class; we show that these rates are optimal. Finally, for a slightly modified method, we derive a bound on the excess risk of $s$-sparse convex aggregation improving that of Lounici [Math. Methods Statist. 16 (2007) 246--259] and providing the optimal rate.


          Genetic Algorithm for Solving Simple Mathematical Equality Problem. (arXiv:1308.4675v2 [cs.NE] UPDATED)   

Authors: Denny Hermawanto

This paper explains genetic algorithm for novice in this field. Basic philosophy of genetic algorithm and its flowchart are described. Step by step numerical computation of genetic algorithm for solving simple mathematical equality problem will be briefly explained


          Universal channel coding for general output alphabet. (arXiv:1502.02218v3 [cs.IT] UPDATED)   

Authors: Masahito Hayashi

We propose two types of universal codes that are suited to two asymptotic regimes when the output alphabet is possibly continuous. The first class has the property that the error probability decays exponentially fast and we identify an explicit lower bound on the error exponent. The other class attains the epsilon-capacity the channel and we also identify the second-order term in the asymptotic expansion. The proposed encoder is essentially based on the packing lemma of the method of types. For the decoder, we first derive a R\'enyi-relative-entropy version of Clarke and Barron's formula the distance between the true distribution and the Bayesian mixture, which is of independent interest. The universal decoder is stated in terms of this formula and quantities used in the information spectrum method. The methods contained herein allow us to analyze universal codes for channels with continuous and discrete output alphabets in a unified manner, and to analyze their performances in terms of the exponential decay of the error probability and the second-order coding rate.


          GWAT: The Geneva Affective Picture Database WordNet Annotation Tool. (arXiv:1505.07395v2 [cs.HC] UPDATED)   

Authors: Marko Horvat, Dujo Duvnjak, Davor Jug

The Geneva Affective Picture Database WordNet Annotation Tool (GWAT) is a user-friendly web application for manual annotation of pictures in Geneva Affective Picture Database (GAPED) with WordNet. The annotation tool has an intuitive interface which can be efficiently used with very little technical training. A single picture may be labeled with many synsets allowing experts to describe semantics with different levels of detail. Noun, verb, adjective and adverb synsets can be keyword-searched and attached to a specific GAPED picture with their unique identification numbers. Changes are saved automatically in the tool's relational database. The attached synsets can be reviewed, changed or deleted later. Additionally, GAPED pictures may be browsed in the tool's user interface using simple commands where previously attached WordNet synsets are displayed alongside the pictures. Stored annotations can be exported from the tool's database to different data formats and used in 3rd party applications if needed. Since GAPED does not define keywords of individual pictures but only a general category of picture groups, GWAT represents a significant improvement towards development of comprehensive picture semantics. The tool was developed with open technologies WordNet API, Apache, PHP5 and MySQL. It is freely available for scientific and non-commercial use.


          Retrieval of multimedia stimuli with semantic and emotional cues: Suggestions from a controlled study. (arXiv:1505.07396v2 [cs.HC] UPDATED)   

Authors: Marko Horvat, Davor Kukolja, Dragutin Ivanec

The ability to efficiently search pictures with annotated semantics and emotion is an important problem for Human-Computer Interaction with considerable interdisciplinary significance. Accuracy and speed of the multimedia retrieval process depends on the chosen metadata annotation model. The quality of such multifaceted retrieval is opposed to the potential complexity of data setup procedures and development of multimedia annotations. Additionally, a recent study has shown that databases of emotionally annotated multimedia are still being predominately searched manually which highlights the need to study this retrieval modality. To this regard we present a study with N = 75 participants aimed to evaluate the influence of keywords and dimensional emotions in manual retrieval of pictures. The study showed that if the multimedia database is comparatively small emotional annotations are sufficient to achieve a fast retrieval despite comparatively lesser overall accuracy. In a larger dataset semantic annotations became necessary for efficient retrieval although they contributed to a slower beginning of the search process. The experiment was performed in a controlled environment with a team of psychology experts. The results were statistically consistent with validates measures of the participants' perceptual speed.


          Comparing affective responses to standardized pictures and videos: A study report. (arXiv:1505.07398v2 [cs.HC] UPDATED)   

Authors: Marko Horvat, Davor Kukolja, Dragutin Ivanec

Multimedia documents such as text, images, sounds or videos elicit emotional responses of different polarity and intensity in exposed human subjects. These stimuli are stored in affective multimedia databases. The problem of emotion processing is an important issue in Human-Computer Interaction and different interdisciplinary studies particularly those related to psychology and neuroscience. Accurate prediction of users' attention and emotion has many practical applications such as the development of affective computer interfaces, multifaceted search engines, video-on-demand, Internet communication and video games. To this regard we present results of a study with N=10 participants to investigate the capability of standardized affective multimedia databases in stimulation of emotion. Each participant was exposed to picture and video stimuli with previously determined semantics and emotion. During exposure participants' physiological signals were recorded and estimated for emotion in an off-line analysis. Participants reported their emotion states after each exposure session. The a posteriori and a priori emotion values were compared. The experiment showed, among other reported results, that carefully designed video sequences induce a stronger and more accurate emotional reaction than pictures. Individual participants' differences greatly influence the intensity and polarity of experienced emotion.


          Sparse Approximation via Generating Point Sets. (arXiv:1507.02574v2 [cs.CG] UPDATED)   

Authors: Avrim Blum, Sariel Har-Peled, Benjamin Raichel

$ \newcommand{\kalg}{{k_{\mathrm{alg}}}}

\newcommand{\kopt}{{k_{\mathrm{opt}}}}

\newcommand{\algset}{{T}} \renewcommand{\Re}{\mathbb{R}}

\newcommand{\eps}{\varepsilon} \newcommand{\pth}[2][\!]{#1\left({#2}\right)} \newcommand{\npoints}{n} \newcommand{\ballD}{\mathsf{b}} \newcommand{\dataset}{{P}} $ For a set $\dataset$ of $\npoints$ points in the unit ball $\ballD \subseteq \Re^d$, consider the problem of finding a small subset $\algset \subseteq \dataset$ such that its convex-hull $\eps$-approximates the convex-hull of the original set. We present an efficient algorithm to compute such a $\eps'$-approximation of size $\kalg$, where $\eps'$ is function of $\eps$, and $\kalg$ is a function of the minimum size $\kopt$ of such an $\eps$-approximation. Surprisingly, there is no dependency on the dimension $d$ in both bounds. Furthermore, every point of $\dataset$ can be $\eps$-approximated by a convex-combination of points of $\algset$ that is $O(1/\eps^2)$-sparse.

Our result can be viewed as a method for sparse, convex autoencoding: approximately representing the data in a compact way using sparse combinations of a small subset $\algset$ of the original data. The new algorithm can be kernelized, and it preserves sparsity in the original input.


          Degree of recurrence of generic diffeomorphisms. (arXiv:1510.00723v2 [math.DS] UPDATED)   

Authors: Pierre-Antoine Guihéneuf

We study the spatial discretizations of dynamical systems: can we recover some dynamical features of a system from numerical simulations? Here, we tackle this issue for the simplest algorithm possible: we compute long segments of orbits with a fixed number of digits. We show that for every $r>1$, the dynamics of the discretizations of a $C^r$ generic conservative diffeomorphism of the torus is very different from that observed in the $C^0$ regularity. The proof of our results involves in particular a local-global formula for discretizations, as well as a study of the corresponding linear case, which uses ideas from the theory of quasicrystals.


          How Does the Low-Rank Matrix Decomposition Help Internal and External Learnings for Super-Resolution. (arXiv:1604.01497v3 [cs.CV] UPDATED)   

Authors: Shuang Wang, Bo Yue, Xuefeng Liang, Peiyuan Ji, Licheng Jiao

Wisely utilizing the internal and external learning methods is a new challenge in super-resolution problem. To address this issue, we analyze the attributes of two methodologies and find two observations of their recovered details: 1) they are complementary in both feature space and image plane, 2) they distribute sparsely in the spatial space. These inspire us to propose a low-rank solution which effectively integrates two learning methods and then achieves a superior result. To fit this solution, the internal learning method and the external learning method are tailored to produce multiple preliminary results. Our theoretical analysis and experiment prove that the proposed low-rank solution does not require massive inputs to guarantee the performance, and thereby simplifying the design of two learning methods for the solution. Intensive experiments show the proposed solution improves the single learning method in both qualitative and quantitative assessments. Surprisingly, it shows more superior capability on noisy images and outperforms state-of-the-art methods.


          An artificial neural network to find correlation patterns in an arbitrary number of variables. (arXiv:1606.06564v2 [cs.LG] UPDATED)   

Authors: Alessandro Fontana

Methods to find correlation among variables are of interest to many disciplines, including statistics, machine learning, (big) data mining and neurosciences. Parameters that measure correlation between two variables are of limited utility when used with multiple variables. In this work, I propose a simple criterion to measure correlation among an arbitrary number of variables, based on a data set. The central idea is to i) design a function of the variables that can take different forms depending on a set of parameters, ii) calculate the difference between a statistics associated to the function computed on the data set and the same statistics computed on a randomised version of the data set, called "scrambled" data set, and iii) optimise the parameters to maximise this difference. Many such functions can be organised in layers, which can in turn be stacked one on top of the other, forming a neural network. The function parameters are searched with an enhanced genetic algortihm called POET and the resulting method is tested on a cancer gene data set. The method may have potential implications for some issues that affect the field of neural networks, such as overfitting, the need to process huge amounts of data for training and the presence of "adversarial examples".


          Intriguingly Simple and Efficient Time-Dependent Routing in Road Networks. (arXiv:1606.06636v2 [cs.DS] UPDATED)   

Authors: Ben Strasser

We study the earliest arrival problem in road networks with static time-dependent functions as arc weights. We propose and evaluate the following simple algorithm: (1) average the travel time in k time windows, (2) compute a shortest time-independent path within each window and mark the edges in these paths, and (3) compute a shortest time-dependent path in the original graph restricted to the marked edges. Our experimental evaluation shows that this simple algorithm yields near optimal results on well-established benchmark instances. We additionally demonstrate that the error can be further reduced by additionally considering alternative routes at the expense of more marked edges. Finally, we show that the achieved subgraphs are small enough to be able to efficiently implement profile queries using a simple sampling-based approach. A highlight of our introduced algorithms is that they do not rely on linking and merging profile functions.


          Arbitrarily regularizable graphs. (arXiv:1608.06427v2 [cs.SI] UPDATED)   

Authors: Massimo Franceschet, Enrico Bozzo

A graph is regularizable if it is possible to assign weights to its edges so that all nodes have the same degree. Weights can be positive, nonnegative or arbitrary as soon as the regularization degree is not null. Positive and nonnegative regularizable graphs have been thoroughly investigated in the literature. In this work, we propose and study arbitrarily regularizable graphs. In particular, we investigate necessary and sufficient regularization conditions on the topology of the graph and of the corresponding adjacency matrix. Moreover, we study the computational complexity of the regularization problem and characterize it as a linear programming model.


          The specific shapes of gender imbalance in scientific authorships: a network approach. (arXiv:1608.07224v2 [cs.SI] UPDATED)   

Authors: Tanya Araújo, Elsa Fontainha

Gender differences in collaborative research have received little attention when compared with the growing importance that women hold in academia and research. Unsurprisingly, most of bibliometric databases have a strong lack of directly available information by gender. Although empirical-based network approaches are often used in the study of research collaboration, the studies about the influence of gender dissimilarities on the resulting topological outcomes are still scarce. Here, networks of scientific subjects are used to characterize patterns that might be associated to five categories of authorships which were built based on gender. We find enough evidence that gender imbalance in scientific authorships brings a peculiar trait to the networks induced from papers published in Web of Science (WoS) indexed journals of Economics over the period 2010-2015 and having at least one author affiliated to a Portuguese institution. Our results show the emergence of a specific pattern when the network of co-occurring subjects is induced from a set of papers exclusively authored by men. Such a male-exclusive authorship condition is found to be the solely responsible for the emergence that particular shape in the network structure. This peculiar trait might facilitate future network analyses of research collaboration and interdisciplinarity.


          Robust Regression For Image Binarization Under Heavy Noises and Nonuniform Background. (arXiv:1609.08078v3 [cs.CV] UPDATED)   

Authors: Garret Vo, Chiwoo Park

This paper presents a robust regression approach for image binarization under significant background variations and observation noises. The work is motivated by the need of identifying foreground regions in noisy microscopic image or degraded document images, where significant background variation and severe noise make the image binarization challenging. The proposed method first estimates the background of an input image, subtracts the estimated background from the input image, and apply a global thresholding to the subtracted outcome for getting a binary image. A robust regression approach was proposed to estimate the background intensity surface with minimal effects of foreground intensities and noises, and a global threshold selector was proposed on the basis of a model selection criterion in a sparse regression. The proposed approach was validated using 26 test images and the corresponding ground truths, and the outcomes of the proposed work were compared with those from nine existing image binarization methods. The approach was also combined with three state-of-the-art morphological segmentation methods to show how the proposed approach can improve their image segmentation outcomes.


          Diminishable Parameterized Problems and Strict Polynomial Kernelization. (arXiv:1611.03739v2 [cs.CC] UPDATED)   

Authors: Henning Fernau, Till Fluschnik, Danny Hermelin, Andreas Krebs, Hendrik Molter, Rolf Niedermeier

Kernelization---the mathematical key concept for provably effective polynomial-time preprocessing of NP-hard problems---plays a central role in parameterized complexity and has triggered an extensive line of research. This is in part due to a lower bounds framework that allows to exclude polynomial-size kernels under the assumption of NP $\not\subseteq$ coNP/poly. In this paper we consider a restricted yet natural variant of kernelization, namely strict kernelization, where one is not allowed to increase the parameter of the reduced instance (the kernel) by more than an additive constant.

Building on earlier work of Chen, Flum, and M\"uller [Theory Comput. Syst. 2011] and developing a general and remarkably simple framework, we show that a variety of FPT problems does not admit strict polynomial kernels under the weaker assumption of P $\neq$ NP. In particular, we show that various (multicolored) graph problems and Turing machine computation problems do not admit strict polynomial kernels unless P = NP. To this end, a key concept we use are diminishable problems; these are parameterized problems that allow to decrease the parameter of the input instance by at least one in polynomial time, thereby outputting an equivalent problem instance. Finally, we show that relaxing the concept of strict kernels to kernels with a constant-factor increase of the parameter leads to a scenario in which we can prove for a number of problems that the framework is not applicable assuming that the (Strong) Exponential Time Hypothesis holds.


          Bottleneck Conditional Density Estimation. (arXiv:1611.08568v3 [stat.ML] UPDATED)   

Authors: Rui Shu, Hung H. Bui, Mohammad Ghavamzadeh

We introduce a new framework for training deep generative models for high-dimensional conditional density estimation. The Bottleneck Conditional Density Estimator (BCDE) is a variant of the conditional variational autoencoder (CVAE) that employs layer(s) of stochastic variables as the bottleneck between the input $x$ and target $y$, where both are high-dimensional. Crucially, we propose a new hybrid training method that blends the conditional generative model with a joint generative model. Hybrid blending is the key to effective training of the BCDE, which avoids overfitting and provides a novel mechanism for leveraging unlabeled data. We show that our hybrid training procedure enables models to achieve competitive results in the MNIST quadrant prediction task in the fully-supervised setting, and sets new benchmarks in the semi-supervised regime for MNIST, SVHN, and CelebA.


          Compressive Sensing for Millimeter Wave Antenna Array Diagnosis. (arXiv:1612.06345v3 [cs.IT] UPDATED)   

Authors: Mohammed E. Eltayeb, Tareq Y. Al-Naffouri, Robert W. Heath Jr

The radiation pattern of an antenna array depends on the excitation weights and the geometry of the array. Due to wind and atmospheric conditions, outdoor millimeter wave antenna elements are subject to full or partial blockages from a plethora of particles like dirt, salt, ice, and water droplets. Handheld devices are also subject to blockages from random finger placement and/or finger prints. These blockages cause absorption and scattering to the signal incident on the array, and change the array geometry. This distorts the far-field radiation pattern of the array leading to an increase in the sidelobe level and decrease in gain. This paper studies the effects of blockages on the far-field radiation pattern of linear arrays and proposes two array diagnosis techniques for millimeter wave antenna arrays. The proposed techniques jointly estimate the locations of the blocked antennas and the induced attenuation and phase shifts. Numerical results show that the proposed techniques provide satisfactory results in terms of fault detection with reduced number of measurements (diagnosis time) provided that the number of blockages is small compared to the array size.


          Extension by Conservation. Sikorski's Theorem. (arXiv:1612.07345v2 [cs.LO] UPDATED)   

Authors: Davide Rinaldi, Daniel Wessel

Constructive meaning is given to the assertion that every finite Boolean algebra is an injective object in the category of distributive lattices. To this end, we employ Scott's notion of entailment relation, in which context we describe Sikorski's extension theorem for finite Boolean algebras and turn it into a syntactical conservation result. As a by-product, we facilitate proofs of several related classical principles.


          Validation, comparison, and combination of algorithms for automatic detection of pulmonary nodules in computed tomography images: the LUNA16 challenge. (arXiv:1612.08012v3 [cs.CV] UPDATED)   

Authors: Arnaud Arindra Adiyoso Setio, Alberto Traverso, Thomas de Bel, Moira S.N. Berens, Cas van den Bogaard, Piergiorgio Cerello, Hao Chen, Qi Dou, Maria Evelina Fantacci, Bram Geurts, Robbert van der Gugten, Pheng Ann Heng, Bart Jansen, Michael M.J. de Kaste, Valentin Kotov, Jack Yu-Hung Lin, Jeroen T.M.C. Manders, Alexander Sónora-Mengana, Juan Carlos García-Naranjo, Evgenia Papavasileiou, Mathias Prokop, Marco Saletta, Cornelia M Schaefer-Prokop, Ernst T. Scholten, Luuk Scholten, Miranda M. Snoeren, Ernesto Lopez Torres, Jef Vandemeulebroucke, Nicole Walasek, Guido C.A. Zuidhof, Bram van Ginneken, Colin Jacobs

Automatic detection of pulmonary nodules in thoracic computed tomography (CT) scans has been an active area of research for the last two decades. However, there have only been few studies that provide a comparative performance evaluation of different systems on a common database. We have therefore set up the LUNA16 challenge, an objective evaluation framework for automatic nodule detection algorithms using the largest publicly available reference database of chest CT scans, the LIDC-IDRI data set. In LUNA16, participants develop their algorithm and upload their predictions on 888 CT scans in one of the two tracks: 1) the complete nodule detection track where a complete CAD system should be developed, or 2) the false positive reduction track where a provided set of nodule candidates should be classified. This paper describes the setup of LUNA16 and presents the results of the challenge so far. Moreover, the impact of combining individual systems on the detection performance was also investigated. It was observed that the leading solutions employed convolutional networks and used the provided set of nodule candidates. The combination of these solutions achieved an excellent sensitivity of over 95% at fewer than 1.0 false positives per scan. This highlights the potential of combining algorithms to improve the detection performance. Our observer study with four expert readers has shown that the best system detects nodules that were missed by expert readers who originally annotated the LIDC-IDRI data. We released this set of additional nodules for further development of CAD systems.


          Fast Exact k-Means, k-Medians and Bregman Divergence Clustering in 1D. (arXiv:1701.07204v3 [cs.DS] UPDATED)   

Authors: Allan Grønlund, Kasper Green Larsen, Alexander Mathiasen, Jesper Sindahl Nielsen, Stefan Schneider, Mingzhou Song

The $k$-Means clustering problem on $n$ points is NP-Hard for any dimension $d\ge 2$, however, for the 1D case there exist exact polynomial time algorithms. Previous literature reported an $O(kn^2)$ time dynamic programming algorithm that uses $O(kn)$ space. We present a new algorithm computing the optimal clustering in only $O(kn)$ time using linear space. For $k = \Omega(\lg n)$, we improve this even further to $n 2^{O(\sqrt{ \lg \lg n \lg k})}$ time. We generalize the new algorithm(s) to work for the absolute distance instead of squared distance and to work for any Bregman Divergence as well.


          Characterizations of idempotent discrete uninorms. (arXiv:1701.07253v2 [math.RA] UPDATED)   

Authors: Miguel Couceiro, Jimmy Devillet, Jean-Luc Marichal

In this paper we provide an axiomatic characterization of the idempotent discrete uninorms by means of three conditions only: conservativeness, symmetry, and nondecreasing monotonicity. We also provide an alternative characterization involving the bisymmetry property. Finally, we provide a graphical characterization of these operations in terms of their contour plots, and we mention a few open questions for further research.


          Representations of language in a model of visually grounded speech signal. (arXiv:1702.01991v3 [cs.CL] UPDATED)   

Authors: Grzegorz Chrupała, Lieke Gelderloos, Afra Alishahi

We present a visually grounded model of speech perception which projects spoken utterances and images to a joint semantic space. We use a multi-layer recurrent highway network to model the temporal nature of spoken speech, and show that it learns to extract both form and meaning-based linguistic knowledge from the input signal. We carry out an in-depth analysis of the representations used by different components of the trained model and show that encoding of semantic aspects tends to become richer as we go up the hierarchy of layers, whereas encoding of form-related aspects of the language input tends to initially increase and then plateau or decrease.


          Massive MIMO Pilot Decontamination and Channel Interpolation via Wideband Sparse Channel Estimation. (arXiv:1702.07207v2 [cs.IT] UPDATED)   

Authors: Saeid Haghighatshoar, Giuseppe Caire

We consider a massive MIMO system based on Time Division Duplexing (TDD) and channel reciprocity, where the base stations (BSs) learn the channel vectors of their users via the pilots transmitted by the users in the uplink (UL). It is well-known that, in the limit of very large number of BS antennas, the system performance is limited by pilot contamination, due to the fact that the same set of orthogonal pilots is reused in multiple cells. In this paper, we propose a low-complexity algorithm that uses the received UL wideband pilot snapshots in an observation window comprising several coherence blocks (CBs) to obtain an estimate of the angle-delay Power Spread Function (PSF) of the received signal. This is generally given by the sum of the angle-delay PSF of the desired user and the angle-delay PSFs of the copilot users (CPUs), i.e., the users re-using the same pilot dimensions in other cells/sectors. We propose supervised and unsupervised clustering algorithms to decompose the estimated PSF and isolate the part corresponding to the desired user only. We use this decomposition to obtain an estimate of the covariance matrix of the user wideband channel vector, which we exploit to decontaminate the desired user channel estimate by applying Minimum Mean Squared Error (MMSE) smoothing filter, i.e., the optimal channel interpolator in the MMSE sense. We also propose an effective low-complexity approximation/implementation of this smoothing filter. We use numerical simulations to assess the performance of our proposed method, and compare it with other recently proposed schemes that use the same idea of separability of users in the angle-delay domain.


          Algorithmic Chaining and the Role of Partial Feedback in Online Nonparametric Learning. (arXiv:1702.08211v2 [stat.ML] UPDATED)   

Authors: Nicolò Cesa-Bianchi, Pierre Gaillard (SIERRA), Claudio Gentile, Sébastien Gerchinovitz (IMT)

We investigate contextual online learning with nonparametric (Lipschitz) comparison classes under different assumptions on losses and feedback information. For full information feedback and Lipschitz losses, we design the first explicit algorithm achieving the minimax regret rate (up to log factors). In a partial feedback model motivated by second-price auctions, we obtain algorithms for Lipschitz and semi-Lipschitz losses with regret bounds improving on the known bounds for standard bandit feedback. Our analysis combines novel results for contextual second-price auctions with a novel algorithmic approach based on chaining. When the context space is Euclidean, our chaining approach is efficient and delivers an even better regret bound.


          An Optimization Framework with Flexible Inexact Inner Iterations for Nonconvex and Nonsmooth Programming. (arXiv:1702.08627v3 [cs.CV] UPDATED)   

Authors: Yiyang Wang, Risheng Liu, Xiaoliang Song, Zhixun Su

In recent years, numerous vision and learning tasks have been (re)formulated as nonconvex and nonsmooth programmings(NNPs). Although some algorithms have been proposed for particular problems, designing fast and flexible optimization schemes with theoretical guarantee is a challenging task for general NNPs. It has been investigated that performing inexact inner iterations often benefit to special applications case by case, but their convergence behaviors are still unclear. Motivated by these practical experiences, this paper designs a novel algorithmic framework, named inexact proximal alternating direction method (IPAD) for solving general NNPs. We demonstrate that any numerical algorithms can be incorporated into IPAD for solving subproblems and the convergence of the resulting hybrid schemes can be consistently guaranteed by a series of simple error conditions. Beyond the guarantee in theory, numerical experiments on both synthesized and real-world data further demonstrate the superiority and flexibility of our IPAD framework for practical use.


          Attentive Recurrent Comparators. (arXiv:1703.00767v3 [cs.CV] UPDATED)   

Authors: Pranav Shyam, Shubham Gupta, Ambedkar Dukkipati

Rapid learning requires flexible representations to quickly adopt to new evidence. We develop a novel class of models called Attentive Recurrent Comparators (ARCs) that form representations of objects by cycling through them and making observations. Using the representations extracted by ARCs, we develop a way of approximating a \textit{dynamic representation space} and use it for one-shot learning. In the task of one-shot classification on the Omniglot dataset, we achieve the state of the art performance with an error rate of 1.5\%. This represents the first super-human result achieved for this task with a generic model that uses only pixel information.


          Foundations for a Probabilistic Event Calculus. (arXiv:1703.06815v2 [cs.AI] UPDATED)   

Authors: Fabio Aurelio D'Asaro, Antonis Bikakis, Luke Dickens, Rob Miller

We present PEC, an Event Calculus (EC) style action language for reasoning about probabilistic causal and narrative information. It has an action language style syntax similar to that of the EC variant Modular-E. Its semantics is given in terms of possible worlds which constitute possible evolutions of the domain, and builds on that of EFEC, an epistemic extension of EC. We also describe an ASP implementation of PEC and show the sense in which this is sound and complete.


          Querying Log Data with Metric Temporal Logic (Technical Report). (arXiv:1703.08982v2 [cs.LO] UPDATED)   

Authors: Sebastian Brandt, Elem Güzel Kalaycı, Vladislav Ryzhikov, Guohui Xiao, Michael Zakharyaschev

We propose a novel framework for ontology-based access to temporal log data using a datalog extension datalogMTL of a Horn fragment of the metric temporal logic MTL. We show that datalogMTL is ExpSpace-complete even with punctual intervals, in which case full MTL is known to be undecidable. We also prove that nonrecursive datalogMTL is PSpace-complete for combined complexity and in AC0 for data complexity. We demonstrate by two real-world use cases that nonrecursive datalogMTL programs can express complex temporal concepts from typical user queries and thereby facilitate access to temporal log data. Our experiments with Siemens turbine data and MesoWest weather data show that datalogMTL ontology-mediated queries are efficient and scale on large datasets of up to 8.3GB.


          Probabilistic Line Searches for Stochastic Optimization. (arXiv:1703.10034v2 [cs.LG] UPDATED)   

Authors: Maren Mahsereci, Philipp Hennig

In deterministic optimization, line searches are a standard tool ensuring stability and efficiency. Where only stochastic gradients are available, no direct equivalent has so far been formulated, because uncertain gradients do not allow for a strict sequence of decisions collapsing the search space. We construct a probabilistic line search by combining the structure of existing deterministic methods with notions from Bayesian optimization. Our method retains a Gaussian process surrogate of the univariate optimization objective, and uses a probabilistic belief over the Wolfe conditions to monitor the descent. The algorithm has very low computational cost, and no user-controlled parameters. Experiments show that it effectively removes the need to define a learning rate for stochastic gradient descent.


          Online and Linear-Time Attention by Enforcing Monotonic Alignments. (arXiv:1704.00784v2 [cs.LG] UPDATED)   

Authors: Colin Raffel, Minh-Thang Luong, Peter J. Liu, Ron J. Weiss, Douglas Eck

Recurrent neural network models with an attention mechanism have proven to be extremely effective on a wide variety of sequence-to-sequence problems. However, the fact that soft attention mechanisms perform a pass over the entire input sequence when producing each element in the output sequence precludes their use in online settings and results in a quadratic time complexity. Based on the insight that the alignment between input and output sequence elements is monotonic in many problems of interest, we propose an end-to-end differentiable method for learning monotonic alignments which, at test time, enables computing attention online and in linear time. We validate our approach on sentence summarization, machine translation, and online speech recognition problems and achieve results competitive with existing sequence-to-sequence models.


          Deriving Probability Density Functions from Probabilistic Functional Programs. (arXiv:1704.00917v2 [cs.PL] UPDATED)   

Authors: Sooraj Bhat, Johannes Borgström, Andrew D. Gordon, Claudio Russo

The probability density function of a probability distribution is a fundamental concept in probability theory and a key ingredient in various widely used machine learning methods. However, the necessary framework for compiling probabilistic functional programs to density functions has only recently been developed. In this work, we present a density compiler for a probabilistic language with failure and both discrete and continuous distributions, and provide a proof of its soundness. The compiler greatly reduces the development effort of domain experts, which we demonstrate by solving inference problems from various scientific applications, such as modelling the global carbon cycle, using a standard Markov chain Monte Carlo framework.


          TransNets: Learning to Transform for Recommendation. (arXiv:1704.02298v2 [cs.IR] UPDATED)   

Authors: Rose Catherine, William Cohen

Recently, deep learning methods have been shown to improve the performance of recommender systems over traditional methods, especially when review text is available. For example, a recent model, DeepCoNN, uses neural nets to learn one latent representation for the text of all reviews written by a target user, and a second latent representation for the text of all reviews for a target item, and then combines these latent representations to obtain state-of-the-art performance on recommendation tasks. We show that (unsurprisingly) much of the predictive value of review text comes from reviews of the target user for the target item. We then introduce a way in which this information can be used in recommendation, even when the target user's review for the target item is not available. Our model, called TransNets, extends the DeepCoNN model by introducing an additional latent layer representing the target user-target item pair. We then regularize this layer, at training time, to be similar to another latent representation of the target user's review of the target item. We show that TransNets and extensions of it improve substantially over the previous state-of-the-art.


          Precision Interfaces. (arXiv:1704.03022v2 [cs.DB] UPDATED)   

Authors: Haoci Zhang, Thibault Sellam, Eugene Wu

Building interactive tools to support data analysis is hard because it is not always clear what to build and how to build it. To address this problem, we present Precision Interfaces, a semi-automatic system to generate task-specific data analytics interfaces. Precision Interface can turn a log of executed programs into an interface, by identifying micro-variations between the programs and mapping them to interface components. This paper focuses on SQL query logs, but we can generalize the approach to other languages. Our system operates in two steps: it first build an interaction graph, which describes how the queries can be transformed into each other. Then, it finds a set of UI components that covers a maximal number of transformations. To restrict the domain of changes to be detected, our system uses a domain-specific language, PILang. We give a full description of Precision Interface's components, showcase an early prototype on real program logs and discuss future research opportunities.


          Analytical study of the "master-worker" framework scalability on multiprocessors with distributed memory. (arXiv:1704.05816v7 [cs.DC] UPDATED)   

Authors: L.B. Sokolinsky

The paper is devoted to an analytical study of the "master-worker" framework scalability on multiprocessors with distributed memory. A new model of parallel computations called BSF is proposed. The BSF model is based on BSP and SPMD models. The scope of BSF model is the compute-intensive applications. The architecture of BSF-computer is defined. The structure of BSF-program is described. The Using this metric, the upper scalability bounds of BSF programs on distributed memory multiprocessors are evaluated. The formulas for estimating the parallel efficiency of BSF programs also proposed.


          PAFit: an R Package for Estimating Preferential Attachment and Node Fitness in Temporal Complex Networks. (arXiv:1704.06017v3 [physics.data-an] UPDATED)   

Authors: Thong Pham, Paul Sheridan, Hidetoshi Shimodaira

Many real-world systems are profitably described as complex networks that grow over time. Preferential attachment and node fitness are two ubiquitous growth mechanisms that not only explain certain structural properties commonly observed in real-world systems, but are also tied to a number of applications in modeling and inference. In the node fitness mechanism, the probability a node acquires a new edge is proportional to a quantity called fitness that is assumed to be independent of the network structure. On the other hand, in the preferential attachment mechanism, this probability of acquiring new edges is proportional to a function of the current number of edges of the node. While this function is originally assumed to be the linear function, and hence fixed, in general it can be arbitrary, and thus is the target of estimation in real-world datasets. While there are standard statistical packages for estimating the structural properties of complex networks, there is no corresponding package when it comes to the estimation of preferential attachment and node fitness mechanisms. This paper introduces the R package PAFit, which implements well-established statistical methods for estimating preferential attachment and node fitness, as well as a number of functions for generating complex networks from these two mechanisms. The main computational part of the package is implemented in C++ with OpenMP to ensure good performance for large-scale networks. In this paper, we first introduce the main functionalities of PAFit using simulated examples, and then use the package to analyze a collaboration network between scientists in the field of complex networks.


          An expressive completeness theorem for coalgebraic modal mu-calculi. (arXiv:1704.08637v2 [cs.LO] UPDATED)   

Authors: Sebastian Enqvist, Fatemeh Seifan, Yde Venema

Generalizing standard monadic second-order logic for Kripke models, we introduce monadic second-order logic interpreted over coalgebras for an arbitrary set functor. We then consider invariance under behavioral equivalence of MSO-formulas. More specifically, we investigate whether the coalgebraic mu-calculus is the bisimulation-invariant fragment of the monadic second-order language for a given functor. Using automatatheoretic techniques and building on recent results by the third author, we show that in order to provide such a characterization result it suffices to find what we call an adequate uniform construction for the coalgebraic type functor. As direct applications of this result we obtain a partly new proof of the Janin-Walukiewicz Theorem for the modal mu-calculus, avoiding the use of syntactic normal forms, and bisimulation invariance results for the bag functor (graded modal logic) and all exponential polynomial functors (including the "game functor"). As a more involved application, involving additional non-trivial ideas, we also derive a characterization theorem for the monotone modal mu-calculus, with respect to a natural monadic second-order language for monotone neighborhood models.


          Infinite-Duration Bidding Games. (arXiv:1705.01433v2 [cs.LO] UPDATED)   

Authors: Guy Avni, Thomas A. Henzinger, Ventsislav Chonev

Two-player games on graphs are widely studied in formal methods as they model the interaction between a system and its environment. The game is played by moving a token throughout a graph to produce an infinite path. There are several common modes to determine how the players move the token through the graph; e.g., in turn-based games the players alternate turns in moving the token. We study the {\em bidding} mode of moving the token, which, to the best of our knowledge, has never been studied in infinite-duration games. Both players have separate {\em budgets}, which sum up to $1$. In each turn, a bidding takes place. Both players submit bids simultaneously, and a bid is legal if it does not exceed the available budget. The winner of the bidding pays his bid to the other player and moves the token. For reachability objectives, repeated bidding games have been studied and are called {\em Richman games} \cite{LLPU96,LLPSU99}. There, a central question is the existence and computation of {\em threshold} budgets; namely, a value $t \in [0,1]$ such that if \PO's budget exceeds $t$, he can win the game, and if \PT's budget exceeds $1-t$, he can win the game. We focus on parity games and mean-payoff games. We show the existence of threshold budgets in these games, and reduce the problem of finding them to Richman games. We also determine the strategy-complexity of an optimal strategy. Our most interesting result shows that memoryless strategies suffice for mean-payoff bidding games.


          Link Mining for Kernel-based Compound-Protein Interaction Predictions Using a Chemogenomics Approach. (arXiv:1705.01667v2 [q-bio.QM] UPDATED)   

Authors: Masahito Ohue, Takuro Yamazaki, Tomohiro Ban, Yutaka Akiyama

Virtual screening (VS) is widely used during computational drug discovery to reduce costs. Chemogenomics-based virtual screening (CGBVS) can be used to predict new compound-protein interactions (CPIs) from known CPI network data using several methods, including machine learning and data mining. Although CGBVS facilitates highly efficient and accurate CPI prediction, it has poor performance for prediction of new compounds for which CPIs are unknown. The pairwise kernel method (PKM) is a state-of-the-art CGBVS method and shows high accuracy for prediction of new compounds. In this study, on the basis of link mining, we improved the PKM by combining link indicator kernel (LIK) and chemical similarity and evaluated the accuracy of these methods. The proposed method obtained an average area under the precision-recall curve (AUPR) value of 0.562, which was higher than that achieved by the conventional Gaussian interaction profile (GIP) method (0.425), and the calculation time was only increased by a few percent.


          In-place Parallel Super Scalar Samplesort (IPS$^4$o). (arXiv:1705.02257v2 [cs.DC] UPDATED)   

Authors: Michael Axtmann, Sascha Witt, Daniel Ferizovic, Peter Sanders

We present a sorting algorithm that works in-place, executes in parallel, is cache-efficient, avoids branch-mispredictions, and performs work O(n log n) for arbitrary inputs with high probability. The main algorithmic contributions are new ways to make distribution-based algorithms in-place: On the practical side, by using coarse-grained block-based permutations, and on the theoretical side, we show how to eliminate the recursion stack. Extensive experiments show that our algorithm IPS$^4$o scales well on a variety of multi-core machines. We outperform our closest in-place competitor by a factor of up to 3. Even as a sequential algorithm, we are up to 1.5 times faster than the closest sequential competitor, BlockQuicksort.


          Stable Architectures for Deep Neural Networks. (arXiv:1705.03341v2 [cs.LG] UPDATED)   

Authors: Eldad Haber, Lars Ruthotto

Deep neural networks have become invaluable tools for supervised machine learning, e.g., classification of text or images. While often offering superior results over traditional techniques and successfully expressing complicated patterns in data, deep architectures are known to be challenging to design and train such that they generalize well to new data. Important issues with deep architectures are numerical instabilities in derivative-based learning algorithms commonly called exploding or vanishing gradients. In this paper we propose new forward propagation techniques inspired by systems of Ordinary Differential Equations (ODE) that overcome this challenge and lead to well-posed learning problems for arbitrarily deep networks.

The backbone of our approach is our interpretation of deep learning as a parameter estimation problem of nonlinear dynamical systems. Given this formulation, we analyze stability and well-posedness of deep learning and use this new understanding to develop new network architectures. We relate the exploding and vanishing gradient phenomenon to the stability of the discrete ODE and present several strategies for stabilizing deep learning for very deep networks. While our new architectures restrict the solution space, several numerical experiments show their competitiveness with state-of-the-art networks.


          PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites. (arXiv:1705.05139v2 [cs.CR] UPDATED)   

Authors: Max Maass, Pascal Wichmann, Henning Pridöhl, Dominik Herrmann

Website owners make conscious and unconscious decisions that affect their users, potentially exposing them to privacy and security risks in the process. In this paper we introduce PrivacyScore, an automated website scanning portal that allows anyone to benchmark security and privacy features of multiple websites. In contrast to existing projects, the checks implemented in PrivacyScore cover a wider range of potential privacy and security issues. Furthermore, users can control the ranking and analysis methodology. Therefore, PrivacyScore can also be used by data protection authorities to perform regularly scheduled compliance checks. In the long term we hope that the transparency resulting from the published benchmarks creates an incentive for website owners to improve their sites. The public availability of a first version of PrivacyScore was announced at the ENISA Annual Privacy Forum in June 2017.


          PrivacyScore: Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme -- Konzept und rechtliche Zul\"assigkeit. (arXiv:1705.08889v2 [cs.CR] UPDATED)   

Authors: Max Maass, Anne Laubach, Dominik Herrmann

PrivacyScore ist ein \"offentliches Web-Portal, mit dem automatisiert \"uberpr\"uft werden kann, ob Webseiten g\"angige Mechanismen zum Schutz von Sicherheit und Privatheit korrekt implementieren. Im Gegensatz zu existierenden Diensten erm\"oglicht PrivacyScore, mehrere Webseiten in Benchmarks miteinander zu vergleichen, die Ergebnisse differenziert und im Zeitverlauf zu analysieren sowie nutzerdefinierte Kriterien f\"ur die Auswertung zu definieren. PrivacyScore verbessert dadurch nicht nur die Transparenz f\"ur Endanwender, sondern erleichtert auch die Arbeit der Datenschutz-Aufsichtsbeh\"orden. In diesem Beitrag stellen wir das Konzept des Dienstes vor und wir er\"ortern, unter welchen Umst\"anden das automatische Scannen und \"offentliche "Anprangern" von Schw\"achen aus rechtlicher Sicht zul\"assig ist.

--

This German article describes the technical and legal considerations surrounding PrivacyScore, a public web portal that allows automatic scans of websites for privacy and security problems. For an English article discussing the same system in more technical detail, but lacking the legal interpretation, see arXiv:1705.05139.


          Stochastic Assume-Guarantee Contracts for Cyber-Physical System Design Under Probabilistic Requirements. (arXiv:1705.09316v2 [cs.SY] UPDATED)   

Authors: Jiwei Li, Pierluigi Nuzzo, Alberto Sangiovanni-Vincentelli, Yugeng Xi, Dewei Li

We develop an assume-guarantee contract framework for the design of cyber-physical systems, modeled as closed-loop control systems, under probabilistic requirements. We use a variant of signal temporal logic, namely, Stochastic Signal Temporal Logic (StSTL) to specify system behaviors as well as contract assumptions and guarantees, thus enabling automatic reasoning about requirements of stochastic systems. Given a stochastic linear system representation and a set of requirements captured by bounded StSTL contracts, we propose algorithms that can check contract compatibility, consistency, and refinement, and generate a controller to guarantee that a contract is satisfied, following a stochastic model predictive control approach. Our algorithms leverage encodings of the verification and control synthesis tasks into mixed integer optimization problems, and conservative approximations of probabilistic constraints that produce both sound and tractable problem formulations. We illustrate the effectiveness of our approach on a few examples, including the design of embedded controllers for aircraft power distribution networks.


          Local Large Deviations: McMillian Theorem for multitype Galton-Watson Processes. (arXiv:1705.09967v2 [cs.IT] UPDATED)   

Authors: Kwabena Doku-Amponsah

In this article we prove a local large deviation principle (LLDP) for the critical multitype Galton-Watson process from spectral potential point. We define the so-called a spectral potential $U_{\skrik}(\,\cdot,\,\pi)$ for the Galton-Watson process, where $\pi$ is the normalized eigen vector corresponding to the leading \emph{Perron-Frobenius eigen value } $\1$ of the transition matrix $\skria(\cdot,\,\cdot)$ defined from ${\skrik},$ the transition kernel. We show that the Kullback action or the deviation function, $J(\pi,\rho),$ with respect to an empirical offspring measure, $\rho,$ is the Legendre dual of $U_{\skrik}(\,\cdot,\,\pi).$ From the LLDP we deduce a conditional large deviation principle and a weak variant of the classical McMillian Theorem for the multitype Galton-Watson process. To be specific, given any empirical offspring measure $\varpi,$ we show that the number of critical multitype Galton-Watson processes on $n$ vertices is approximately $e^{n\langle \skrih_{\varpi},\,\pi\rangle},$ where $\skrih_{\varpi}$ is a suitably defined entropy.


          General Bounds for Incremental Maximization. (arXiv:1705.10253v2 [cs.DM] UPDATED)   

Authors: Aaron Bernstein, Yann Disser, Martin Groß

We propose a theoretical framework to capture incremental solutions to cardinality constrained maximization problems. The defining characteristic of our framework is that the cardinality/support of the solution is bounded by a value $k\in\mathbb{N}$ that grows over time, and we allow the solution to be extended one element at a time. We investigate the best-possible competitive ratio of such an incremental solution, i.e., the worst ratio over all $k$ between the incremental solution after $k$ steps and an optimum solution of cardinality $k$. We define a large class of problems that contains many important cardinality constrained maximization problems like maximum matching, knapsack, and packing/covering problems. We provide a general $2.618$-competitive incremental algorithm for this class of problems, and show that no algorithm can have competitive ratio below $2.18$ in general.

In the second part of the paper, we focus on the inherently incremental greedy algorithm that increases the objective value as much as possible in each step. This algorithm is known to be $1.58$-competitive for submodular objective functions, but it has unbounded competitive ratio for the class of incremental problems mentioned above. We define a relaxed submodularity condition for the objective function, capturing problems like maximum (weighted) ($b$-)matching and a variant of the maximum flow problem. We show that the greedy algorithm has competitive ratio (exactly) $2.313$ for the class of problems that satisfy this relaxed submodularity condition.

Note that our upper bounds on the competitive ratios translate to approximation ratios for the underlying cardinality constrained problems.


          An Expectation-Maximization Algorithm for the Fractal Inverse Problem. (arXiv:1706.03149v2 [stat.ML] UPDATED)   

Authors: Peter Bloem, Steven de Rooij

We present an Expectation-Maximization algorithm for the fractal inverse problem: the problem of fitting a fractal model to data. In our setting the fractals are Iterated Function Systems (IFS), with similitudes as the family of transformations. The data is a point cloud in ${\mathbb R}^H$ with arbitrary dimension $H$. Each IFS defines a probability distribution on ${\mathbb R}^H$, so that the fractal inverse problem can be cast as a problem of parameter estimation. We show that the algorithm reconstructs well-known fractals from data, with the model converging to high precision parameters. We also show the utility of the model as an approximation for datasources outside the IFS model class.


          Attention Is All You Need. (arXiv:1706.03762v4 [cs.CL] UPDATED)   

Authors: Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Lukasz Kaiser, Illia Polosukhin

The dominant sequence transduction models are based on complex recurrent or convolutional neural networks in an encoder-decoder configuration. The best performing models also connect the encoder and decoder through an attention mechanism. We propose a new simple network architecture, the Transformer, based solely on attention mechanisms, dispensing with recurrence and convolutions entirely. Experiments on two machine translation tasks show these models to be superior in quality while being more parallelizable and requiring significantly less time to train. Our model achieves 28.4 BLEU on the WMT 2014 English-to-German translation task, improving over the existing best results, including ensembles by over 2 BLEU. On the WMT 2014 English-to-French translation task, our model establishes a new single-model state-of-the-art BLEU score of 41.0 after training for 3.5 days on eight GPUs, a small fraction of the training costs of the best models from the literature. We show that the Transformer generalizes well to other tasks by applying it successfully to English constituency parsing both with large and limited training data.


          The complexity of the Multiple Pattern Matching Problem for random strings. (arXiv:1706.04928v2 [cs.DS] UPDATED)   

Authors: Frédérique Bassino, Tsinjo Rakotoarimalala, Andrea Sportiello

We generalise a multiple string pattern matching algorithm, recently proposed by Fredriksson and Grabowski [J. Discr. Alg. 7, 2009], to deal with arbitrary dictionaries on an alphabet of size $s$. If $r_m$ is the number of words of length $m$ in the dictionary, and $\phi(r) = \max_m \ln(s\, m\, r_m)/m$, the complexity rate for the string characters to be read by this algorithm is at most $\kappa_{{}_\textrm{UB}}\, \phi(r)$ for some constant $\kappa_{{}_\textrm{UB}}$. On the other side, we generalise the classical lower bound of Yao [SIAM J. Comput. 8, 1979], for the problem with a single pattern, to deal with arbitrary dictionaries, and determine it to be at least $\kappa_{{}_\textrm{LB}}\, \phi(r)$. This proves the optimality of the algorithm, improving and correcting previous claims.


          Integration of Satellites in 5G through LEO Constellations. (arXiv:1706.06013v2 [cs.NI] UPDATED)   

Authors: Oltjon Kodheli, Alessandro Guidotti, Alessandro Vanelli-Coralli

The standardization of 5G systems is entering in its critical phase, with 3GPP that will publish the PHY standard by June 2017. In order to meet the demanding 5G requirements both in terms of large throughput and global connectivity, Satellite Communications provide a valuable resource to extend and complement terrestrial networks. In this context, we consider a heterogeneous architecture in which a LEO mega-constellation satellite system provides backhaul connectivity to terrestrial 5G Relay Nodes, which create an on-ground 5G network. Since large delays and Doppler shifts related to satellite channels pose severe challenges to terrestrial-based systems, in this paper we assess their impact on the future 5G PHY and MAC layer procedures. In addition, solutions are proposed for Random Access, waveform numerology, and HARQ procedures.


          Lumping of Degree-Based Mean Field and Pair Approximation Equations for Multi-State Contact Processes. (arXiv:1706.06964v2 [cs.SI] UPDATED)   

Authors: Charalampos Kyriakopoulos, Gerrit Grossmann, Verena Wolf, Luca Bortolussi

Contact processes form a large and highly interesting class of dynamic processes on networks, including epidemic and information spreading. While devising stochastic models of such processes is relatively easy, analyzing them is very challenging from a computational point of view, particularly for large networks appearing in real applications. One strategy to reduce the complexity of their analysis is to rely on approximations, often in terms of a set of differential equations capturing the evolution of a random node, distinguishing nodes with different topological contexts (i.e., different degrees of different neighborhoods), like degree-based mean field (DBMF), approximate master equation (AME), or pair approximation (PA). The number of differential equations so obtained is typically proportional to the maximum degree kmax of the network, which is much smaller than the size of the master equation of the underlying stochastic model, yet numerically solving these equations can still be problematic for large kmax. In this paper, we extend AME and PA, which has been proposed only for the binary state case, to a multi-state setting and provide an aggregation procedure that clusters together nodes having similar degrees, treating those in the same cluster as indistinguishable, thus reducing the number of equations while preserving an accurate description of global observables of interest. We also provide an automatic way to build such equations and to identify a small number of degree clusters that give accurate results. The method is tested on several case studies, where it shows a high level of compression and a reduction of computational time of several orders of magnitude for large networks, with minimal loss in accuracy.


          $\mu$Nap: Practical Micro-Sleeps for 802.11 WLANs. (arXiv:1706.08312v2 [cs.NI] UPDATED)   

Authors: Arturo Azcorra, Iñaki Ucar, Francesco Gringoli, Albert Banchs, Pablo Serrano

In this paper, we revisit the idea of putting interfaces to sleep during 'packet overhearing' (i.e., when there are ongoing transmissions addressed to other stations) from a practical standpoint. To this aim, we perform a robust experimental characterisation of the timing and consumption behaviour of a commercial 802.11 card. We design $\mu$Nap, a local standard-compliant energy-saving mechanism that leverages micro-sleep opportunities inherent to the CSMA operation of 802.11 WLANs. This mechanism is backwards compatible and incrementally deployable, and takes into account the timing limitations of existing hardware, as well as practical CSMA-related issues (e.g., capture effect). According to the performance assessment carried out through trace-based simulation, the use of our scheme would result in a 57% reduction in the time spent in overhearing, thus leading to an energy saving of 15.8% of the activity time.


          Accelerating Science: A Computing Research Agenda. (arXiv:1604.02006v1 [cs.CY] CROSS LISTED)   

Authors: Vasant G. Honavar, Mark D. Hill, Katherine Yelick

The emergence of "big data" offers unprecedented opportunities for not only accelerating scientific advances but also enabling new modes of discovery. Scientific progress in many disciplines is increasingly enabled by our ability to examine natural phenomena through the computational lens, i.e., using algorithmic or information processing abstractions of the underlying processes; and our ability to acquire, share, integrate and analyze disparate types of data. However, there is a huge gap between our ability to acquire, store, and process data and our ability to make effective use of the data to advance discovery. Despite successful automation of routine aspects of data management and analytics, most elements of the scientific process currently require considerable human expertise and effort. Accelerating science to keep pace with the rate of data acquisition and data processing calls for the development of algorithmic or information processing abstractions, coupled with formal methods and tools for modeling and simulation of natural processes as well as major innovations in cognitive tools for scientists, i.e., computational tools that leverage and extend the reach of human intellect, and partner with humans on a broad range of tasks in scientific discovery (e.g., identifying, prioritizing formulating questions, designing, prioritizing and executing experiments designed to answer a chosen question, drawing inferences and evaluating the results, and formulating new questions, in a closed-loop fashion). This calls for concerted research agenda aimed at: Development, analysis, integration, sharing, and simulation of algorithmic or information processing abstractions of natural processes, coupled with formal methods and tools for their analyses and simulation; Innovations in cognitive tools that augment and extend human intellect and partner with humans in all aspects of science.


          #28 El gran negocio de las publicaciones cientïficas   

#26 Soy investigador desde hace 10 anyos y no hay trabajo que no haya subido a arXiv antes de mandarlo a publicar a las revistas. Y adem'as todos mis trabajos son puramente te'oricos... No te digo mi nombre porque no me apetece... pero te invito a buscar un trabajo de f'isica te'orica o de matem'aticas a partir de 1995 (arXiv se cre'o en 1991) que no est'e en arXiv publicado. Elige cualquier nombre de un f'isico te'orico de cualquier universidad de Espanya, por ejemplo, y comprueba si sus trabajos en arXiv :-)

Creo que enfocas mal el problema: son los cient'ificos los que tienen que luchar contra esto... las editoriales ya se ir'an adaptando, igual que hacen con la prensa escrita.

» autor: wittten


          #26 El gran negocio de las publicaciones cientïficas   

#17 ArXiv y BioarXiv no arreglan el problema, porque luego tienes que seguir pasando "por caja". El negocio va a seguir igual porque el proceso de peer review pasa inequívocamente por las revistas. Y si todos los científicos del mundo se ponen de acuerdo y comienzan a publicar en ArXiv (que no va a pasar), las editoriales empezarán a apretar las tuercas, porque saben que ahí está su negocio. Esas plataformas no van a arreglar nada.

Respecto al "miedito" del que hablas, te invito a invertir dos años de trabajo en algo y luego dejarlo colgado ahí a la buena de dios. Si es experimental vale, pero si es teórico o computacional ya te digo yo que no lo subes tan alegremente. El mundo de la investigación es bastante competitivo.

» autor: Olaf_123


          #21 El gran negocio de las publicaciones cientïficas   

#20 Al contrario de lo que dices, es precisamente la gente con menos recursos la que se ve m'as respaldada por las publicaciones en abierto y deber'ia usarlas m'as... Los plagios existen y esto evita cualquier intento. De hecho, en arXiv tienen un sistema de an'alisis de c'odigo para identificar textos/c'odigos duplicados (incluso si es de los propios autores). Por ejemplo:

arxiv.org/abs/1705.01585

Y para Plos One, parece que BioRxiv es completamente v'alido (de hecho parece que tienen un sistema para enviar el art'iculo directamente a la revista desde BioRxiv):
en.wikipedia.org/wiki/BioRxiv#bioRxiv_to_Journals

» autor: wittten


          #20 El gran negocio de las publicaciones cientïficas   

#13 las tesis depositadas quizas no traten el temario que te interesa, mas si es un campo "nuevo" como la biologia sintetica o los biosensores. Ojala hubieran mas iniciativas tipo arxiv.
La gente famosa a nivel internacional publica en abierto porque su estatus se lo permite, no todo vale para un plos one. Ademas, lo mas probable es que tengan otras publicaciones el mismo año en nature.

Ahora, desde europa, dicen que premiaran los articulos en abierto. Incluso creo que han dado un horizon para que algun centro gestione el meollo

» autor: kermithenson


          #17 El gran negocio de las publicaciones cientïficas   

#14 De verdad, pod'eis mirar #16? Es que ya hay soluciones... y la gente las usa...

Si el problema sigue as'i es por culpa de los cient'ificos, que tienen miedito a subir sus trabajos a servidores como arXiv o BiorXiv antes de mandarlos a las revistas.... Luego todo el proceso es igual, incluso los art'iculos se pueden sustituir por las versiones que se van a publicar (las aceptadas, que no las publicadas).

» autor: wittten


          #16 El gran negocio de las publicaciones cientïficas   

Para m'i el problema no son las revistas: el problema est'a en las manos de los cient'ificos. Las editoriales no son entidades sin 'animo de lucro. Algunas ramas cient'ificas (f'isica, matem'aticas, ...) ya se han organizado y dir'ia que m'as del 95% de los cient'ificos sube sus trabajos a arXiv:

www.arXiv.org

Esto evita, entre otras cosas, el plagio que puede ocurrir si un art'iculo es rechazado por el revisor, y 'este se beneficia del trabajo revisado. Por supuesto, todo est'a abierto. Despu'es de subirlo a arXiv se env'ia a la revista sin problema alguno y, al menos en f'isica, las revistas no ponen problemas.

Adem'as, existe el an'alogo para temas de biolog'ia:

www.biorxiv.org/

En su entrada en wikipedia (en.wikipedia.org/wiki/BioRxiv#bioRxiv_to_Journals) se puede ver que hay decenas de revistas que permiten subir los resultados a BioRxiv y luego mandarlos a la revista.

Adem'as, en

en.wikipedia.org/wiki/List_of_academic_journals_by_preprint_policy

aparece un cat'alogo sobre qu'e revistas son compatibles con estos servidores. Se puede ver que Nature, Science, o New England Journal of Medicine tambi'en admiten estas cosas.

As'i que no, me niego a aceptar que la culpa es de las revistas. La culpa es de los cient'ificos, que no nos involucramos demasiado en este tema y seguimos al rebanyo. Espero que la tendencia vaya cambiando.

» autor: wittten


          #14 El gran negocio de las publicaciones cientïficas   

#3 No, no es tan simple como crear una wikipedia, por lo que voy a comentar a continuación.

A diferencia de lo que ocurre con los artículos de wikipedia (que carecen de revisión y sólo exigen una cita que los sustente), los artículos científicos contienen conocimiento novedoso (es decir, nunca antes publicado) y además deben estar revisados por pares, es decir, por otros individuos expertos en el campo. Esto genera un efecto que convierte a la editorial en necesaria, ya que es la encargada (a través de sus editores) de enviar los artículos a los revisores, que son otros científicos (a priori especializados en el campo que trata la revista). Una plataforma online no basta, ya que lo que se colgase ahí, al no estar revisado, no resultaría fidedigno. De hecho, esa plataforma existe (se llama ArXiv), pero no sirve para solucionar el problema, porque si un artículo sólo está publicado ahí, no sabes si te lo puedes creer.

La solución al problema podrían ser las revistas open access. Ya existen algunas, como las de la serie PLoS. Lo que pasa es que en estos casos lo que sucede es que uno tiene que pagar de antemano para publicar su artículo. Es decir, te cuesta X euros (normalmente entre 1000 y 5000 euros por artículo) que tu artículo aparezca en la revista, suponiendo que sea aceptado (si no lo aceptan no se paga). Otras revistas no son open access per sé, pero permiten pagar un extra (importe similar) para hacer que el artículo sea de acceso abierto. De este modo, elijas lo que elijas, las revistas ganan.

Uno podría pensar que bastaría con que se creasen revistas públicas financiadas por los gobiernos, de modo que el proceso de edición y revisión estuviese pagado, pero que hubiese un coste "justo" en ello y que luego el acceso fuese libre (que para algo la ciencia se financia con dinero público, mayormente). Y hasta cierto punto esto podría ser una solución. El problema está en el prestigio. Las revistas científicas tienen un valor asociado que se llama índice de impacto, que mide la cantidad de atención (en forma de citas en otros artículos) que reciben los artículos publicados en ellas. El índice de impacto es lo que hace que los científicos se den de bofetadas por publicar en esas revistas, incluso sin tener beneficio económico alguno por hacerlo. Un científico que logra colocar un artículo en, por ejemplo, Nature, tiene grandes posibilidades de darle un empujón muy grande a su carrera. Y hay que tener en cuenta que la ciencia es extremadamente competitiva: hay cada vez más gente dentro, y los recursos no escalan a la misma velocidad. Así que si te dedicas a moverte a revistas alternativas, de esas que no hacen negocio pero que tampoco son conocidas por nadie, lo único que vas a conseguir es desaparecer del mapa, salvo que ya seas un premio nobel.

¿La solución? No es sencilla, y probablemente requiera de una nueva legislación, que obligue a las revistas científicas a reconocer económicamente la labor de los autores. La idea no es tan rara, de hecho lo normal en cualquier otro ámbito editorial es que la empresa que publica un trabajo (ya sea una novela, un artículo, un ensayo, o lo que sea) pague un porcentaje de los beneficios a su autor. Eso o directamente que los gobiernos se pongan serios y cierren de un portazo el negocio de las editoriales científicas (que no creo que ocurra). A día de hoy, las convocatorias europeas de proyectos están empezando a exigir que cualquier trabajo financiado con sus fondos se publique en modo acceso abierto. Esto no acaba con el negocio de las editoriales, pero al menos garantiza que el trabajo científico esté accesible para todo el mundo.

» autor: Olaf_123


          Astrônomos encontram, pela primeira vez, dois buracos negros supermassivos orbitando um ao outro   
Em uma grande descoberta, astrônomos observaram um par de buracos negros supermassivos orbitando um ao outro, a centenas de milhões de anos-luz de distância.

A descoberta é o resultado de mais de duas décadas de trabalho, e um feito incrível considerando as medições precisas necessárias. Compreender a natureza de tais interações nos dará uma maior compreensão de como as galáxias e o universo, evoluíram.
"Durante muito tempo, temos olhado para o espaço para tentar encontrar um par destes buracos negros supermassivos orbitando como resultado de duas galáxias em fusão", diz Greg Taylor, um dos pesquisadores da Universidade do Novo México (UNM).
"Mesmo que nós tenhamos teorizado que isso deve estar acontecendo, nunca ninguém tinha visto até agora."
A equipe observou o par de buracos negros em uma galáxia, chamado 0402 + 379, cerca de 750 milhões de anos luz da Terra.

De acordo com Karishma Bansal, o primeiro autor do artigo, também da UNM, a massa combinada destes buracos negros supermassivos é de cerca de 15 bilhões de vezes maior do que o nosso Sol, e seu período orbital é de cerca de 24.000 anos.

Isto significa que mesmo que a equipe tenha observado esses buracos negros há mais de uma década, eles não foram capazes de detectar até mesmo a menor curvatura em sua órbita.

"Se você imaginar um caracol no planeta recém-descoberto orbitando Proxima Centauri - 4.243 anos-luz de distância - se movendo em 1cm [0,4 polegadas] por segundo, é o movimento angular que estamos tratando aqui", explica Roger W. Romani, um dos pesquisadores da Universidade de Stanford.

Os buracos negros são notoriamente difíceis de estudar porque não podem ser observados diretamente, mas só podem ser detectados a partir de seu efeito sobre a matéria nas proximidades.

Assim, para encontrar a órbita desses buracos negros, a equipe UNM usou o Very Long Baseline Array (VLBA), que é composto de 10 radiotelescópios. Ao medir as várias frequências de sinais de rádio emitidas pelos buracos negros, a equipe foi então capaz de traçar sua trajetória.

"Quando o Dr. Taylor me deu esses dados, eu estava no início de aprender a imagem e compreendê-la", disse Bansal .

"E, como eu aprendi nos dados que remontam a 2003, nós traçamos isso e determinamos que eles estão orbitando um ao outro. É muito emocionante." A realização técnica desta descoberta é um triunfo e irá melhorar muito a nossa compreensão desses objetos enigmáticos.

Desde a teoria da relatividade geral de Einstein, os astrônomos se fascinaram pelos buracos negros supermassivos. Recentemente, houveram várias novas descobertas sobre buracos negros, mas ainda não conhecemos muito sobre eles. 

Continuar a observar a órbita e interação desses buracos negros irá revelar muito sobre onde nossa galáxia veio, qual o seu destino no futuro e o papel que os buracos negros desempenham neste processo.

Atualmente, a galáxia de Andrômeda, que também contém um buraco negro supermassivo, é projetado para colidir com a nossa Via Láctea - tornando o evento que a equipe UNM está observando o potencial futuro da nossa galáxia em alguns bilhões de anos.

"Os buracos negros supermassivos têm muita influência sobre as estrelas em torno deles e o crescimento e evolução da galáxia", diz Taylor

"Então, entender mais sobre eles e o que acontece quando eles se fundem uns com os outros pode ser importante para a nossa compreensão do universo."

A equipe UNM vai voltar-se para esses buracos negros em poucos anos para confirmar observações e melhorar suas projeções em torno de órbitas e trajetórias.

Por agora, podemos apreciar o fato de que eles finalmente se mostraram em uma observação direta pela primeira vez e sem dúvida irão inspirar outros trabalhos pela frente no mundo científico mais amplo.

O artigo foi publicado no The Astrophysical Journal com uma versão pré-impressão disponível no arXiv.

          Milli Arxiv İdarəsi arxiv işi sahəsində  yeniliklərini davam etdirir   
Milli Arxiv İdarəsi arxiv işi sahəsində müstəqil dövlətə məxsus qanunvericilik aktlarının təkmilləşdirilməsi və yeni normativ hüquqi aktların hazırlanması istiqamətində fəaliyyətini davam etdirir
          Астроном из Гарварда рекомендовал экзопланету как инвестиции в недвижимость   
Американский астроном из Гарвардского университета рекомендует всем состоятельным людям инвестировать свои средства в экзопланету, где цены на недвижимость в ближайшие несколько миллиардов лет заметно вырастут. Статья ученого опубликована в журнале arXiv.org.
          Só me resta um conselho   
Muitas PME do sector transaccionável que nos últimos 10 anos descobriram a forma de subir na escala de valor, e de como fazer o by-pass à competição pelo low-cost, vão sentir uma tentação tremenda pelo caminho mais fácil:

O regresso da produção industrial à Europa vai voltar a colocar em cima da mesa a hipótese de apostar no low-cost. E o low-cost parece tão intuitivo, tão atraente...

Só me resta um conselho, "Just because you can doesn't mean you should"


          Ученые назвали пригодную для инвестиций в недвижимость экзопланету   
Ученые из Гарвардского университета в США назвали пригодную для инвестиций в недвижимость экзопланету. Подробности исследования опубликованы на портале arXiv.org. 
          Shifted Poisson structures and moduli spaces of complexes. (arXiv:1706.09965v1 [math.AG])   

Authors: Zheng Hua, Alexander Polishchuk

In this paper we study the moduli stack of complexes of vector bundles (with chain isomorphisms) over a smooth projective variety $X$ via derived algebraic geometry. We prove that if $X$ is a Calabi-Yau variety of dimension $d$ then this moduli stack has a $(1-d)$-shifted Poisson structure. In the case $d=1$, we construct a natural foliation of the moduli stack by $0$-shifted symplectic substacks. We show that our construction recovers various known Poisson structures associated to complex elliptic curves, including the Poisson structure on Hilbert scheme of points on elliptic quantum projective planes studied by Nevins and Stafford, and the Poisson structures on the moduli spaces of stable triples over an elliptic curves considered by one of us. We also relate the latter Poisson structures to the semi-classical limits of the elliptic Sklyanin algebras studied by Feigin and Odesskii.


          Bases of standard modules for affine Lie algebras of type $C_\ell^{(1)}$. (arXiv:1706.10089v1 [math.QA])   

Authors: Goran Trupčević

Feigin-Stoyanovsky's type subspaces for affine Lie algebras of type $C_\ell^{(1)}$ have monomial bases with a nice combinatorial description. We describe bases of whole standard modules in terms of semi-infinite monomials obtained as "a limit of translations" of bases for Feigin-Stoyanovsky's type subspaces.


          A noncommutative catenoid. (arXiv:1706.10168v1 [math.QA])   

Authors: Joakim Arnlind, Christoffer Holm

A noncommutative algebra corresponding to the classical catenoid is introduced together with a differential calculus of derivations. We prove that there exists a unique metric and torsion-free connection that is compatible with the complex structure, and the curvature is explicitly calculated. A noncommutative analogue of the fact that the catenoid is a minimal surface is studied by constructing a Laplace operator from the connection and showing that the embedding coordinates are harmonic. Furthermore, an integral is defined and the total curvature is computed. Finally, classes of left and right modules are introduced together with constant curvature connections, and bimodule compatibility conditions are discussed in detail.


          Hopf images in locally compact quantum groups. (arXiv:1611.06225v2 [math.OA] UPDATED)   

Authors: Paweł Józiak, Paweł Kasprzak, Piotr M. Sołtan

This manuscript is devoted to the study of the concept of a generating subset (a.k.a. Hopf image of a morphism) in the setting of locally compact quantum groups. The aim of this paper is to provide an accurate description of the Hopf image of a given morphism. We extend and unify the previously existing approaches for compact and discrete quantum groups and present some results that can shed light on some local perspective in the theory of quantum groups. In particular, we provide a characterization of fullness of Hopf image in the language of partial actions as well as in representation-theoretic terms in the spirit of representation $C^*$-categories, extending some known results not only to the broader setting of non-compact quantum groups, but also encompassing a broader setting of generating subsets.


          Computing a categorical Gromov-Witten invariant. (arXiv:1706.09912v1 [math.AG])   

Authors: Andrei Caldararu, Junwu Tu

We compute the g=1, n=1 B-model Gromov-Witten invariant of an elliptic curve E directly from the derived category D(E). More precisely, we carry out the computation of the categorical Gromov-Witten invariant defined by Costello using as target a cyclic A_\infty model of D(E) described by Polishchuk.

This is the first non-trivial computation of a positive genus categorical Gromov-Witten invariant, and the result agrees with the prediction of mirror symmetry: it matches the classical (non-categorical) Gromov-Witten invariants of a symplectic 2-torus computed by Dijkgraaf.


          Boundedness of Log Canonical Surface Generalized Polarized Pairs. (arXiv:1706.09913v1 [math.AG])   

Authors: Stefano Filipazzi

In this paper, we study the behavior of the sets of volumes of the form $\mathrm{vol}(X,K_X+B+M)$, where $(X,B)$ is a log canonical pair, and $M$ is a nef $\mathbb{R}$-divisor. After a first analysis of some general properties, we focus on the case when $M$ is $\mathbb{Q}$-Cartier with given Cartier index, and $B$ has coefficients in a given DCC set. First, we show that such sets of volumes satisfy the DCC property in the case of surfaces. Once this is established, we show that surface pairs with given volume and for which $K_X+B+M$ is ample form a log bounded family.


          Diffusion Approximations for Load Balancing Mechanisms in Cloud Storage Systems. (arXiv:1706.09914v1 [math.PR])   

Authors: Amarjit Budhiraja, Eric Friedlander

In large storage systems, files are often coded across several servers to improve reliability and retrieval speed. We study load balancing under the Batch Sampling routing scheme for a network of $n$ servers storing a set of files using the Maximum Distance Separable (MDS) code (cf. Li, Ramamoorthy, and Srikant (2016)). Specifically, each file is stored in equally sized pieces across $L$ servers such that any $k$ pieces can reconstruct the original file. When a request for a file is received, the dispatcher routes the job into the $k$-shortest queues among the $L$ for which the corresponding server contains a piece of the file being requested. We establish a law of large numbers and a central limit theorem as the system becomes large (i.e. $n\to\iy$). For the central limit theorem, the limit process take values in $\bfell_2$, the space of square summable sequences. Due to the large size of such systems, a direct analysis of the $n$-server system is frequently intractable. The law of large numbers and diffusion approximations established in this work provide practical tools with which to perform such analysis. The Power-of-$d$ routing scheme, also known as the supermarket model, is a special case of the model considered here.


          User Activity Detection in Massive Random Access: Compressed Sensing vs. Coded Slotted ALOHA. (arXiv:1706.09918v1 [cs.IT])   

Authors: Veljko Boljanovic, Dejan Vukobratovic, Petar Popovski, Cedomir Stefanovic

Machine-type communication services in mobile cel- lular systems are currently evolving with an aim to efficiently address a massive-scale user access to the system. One of the key problems in this respect is to efficiently identify active users in order to allocate them resources for the subsequent transmissions. In this paper, we examine two recently suggested approaches for user activity detection: compressed-sensing (CS) and coded slotted ALOHA (CSA), and provide their comparison in terms of performance vs resource utilization. Our preliminary results show that CS-based approach is able to provide the target user activity detection performance with less overall system resource utilization. However, this comes at a price of lower energy- efficiency per user, as compared to CSA-based approach.


          Positroids Induced by Rational Dyck Paths. (arXiv:1706.09921v1 [math.CO])   

Authors: Felix Gotti

A rational Dyck path of type $(m,d)$ is an increasing unit-step lattice path from $(0,0)$ to $(m,d) \in \mathbb{Z}^2$ that never goes above the diagonal line $y = (d/m)x$. On the other hand, a positroid of rank $d$ on the ground set $[d+m]$ is a special type of matroid coming from the totally nonnegative Grassmannian. In this paper we describe how to naturally assign a rank $d$ positroid on the ground set $[d+m]$, which we name rational Dyck positroid, to each rational Dyck path of type $(m,d)$. We show that such an assignment is one-to-one. There are several families of combinatorial objects in one-to-one correspondence with the set of positroids. Here we characterize some of these families for the positroids we produce, namely Grassmann necklaces, decorated permutations, Le-diagrams, and move-equivalence classes of plabic graphs. Finally, we describe the matroid polytope of a given rational Dyck positroid.


          Deep factorisation of the stable process III: Radial excursion theory and the point of closest reach. (arXiv:1706.09924v1 [math.PR])   

Authors: Andreas Kyprianou, Victor River, Weerapat Satitkanitkul

In this paper, we continue our understanding of the stable process from the perspective of the theory of self-similar Markov processes in the spirit of the recent papers of Kyprianou (2016) and Kyprianou et al. (2017). In particular, we turn our attention to the case of $d$-dimensional isotropic stable process, for $d\geq 2$. Using a completely new approach we consider the distribution of the point of closest reach. This leads us to a number of other substantial new results for this class of stable processes. We engage with a new radial excursion theory, never before used, from which we develop the classical Blumenthal--Getoor--Ray identities for first entry/exit into a ball, cf. Blumenthal et al. (1961), to the setting of $n$-tuple laws. We identify explicitly the stationary distribution of the stable process when reflected in its running radial supremum. Moreover, we provide a representation of the Wiener--Hopf factorisation of the MAP that underlies the stable process through the Lamperti--Kiu transform.


          Irregular Repetition Slotted ALOHA over the Rayleigh Block Fading Channel with Capture. (arXiv:1706.09927v1 [cs.IT])   

Authors: Federico Clazzer, Enrico Paolini, Iacopo Mambelli, Cedomir Stefanovic

Random access protocols relying on the transmission of packet replicas in multiple slots and exploiting interference cancellation at the receiver have been shown to achieve per- formance competitive with that of orthogonal schemes. So far the optimization of the repetition degree profile, defining the probability for a user to transmit a given number of replicas, has mainly been performed targeting the collision channel model. In this paper the analysis is extended to a block fading channel model, also assuming capture effect at the receiver. Density evolution equations are developed for the new setting and, based on them, some repetition degree profiles are optimized and analyzed via Monte Carlo simulation in a finite frame length setting. The derived distributions are shown to achieve throughputs largely exceeding 1 [packet/slot].


          A Pseudo-Bayesian Approach to Sign-Compute-Resolve Slotted ALOHA. (arXiv:1706.09930v1 [cs.IT])   

Authors: Jasper Goseling, Cedomir Stefanovic, Petar Popovski

Access reservation based on slotted ALOHA is commonly used in wireless cellular access. In this paper we investigate its enhancement based on the use of physical-layer network coding and signature coding, whose main feature is enabling simultaneous resolution of up to K users contending for access, where K >= 1. We optimise the slot access probability such that the expected throughput is maximised. In particular, the slot access probability is chosen in line with an estimate of the number of users in the system that is obtained relying on the pseudo-Bayesian approach by Rivest, which we generalise for the case that K > 1. Under the assumption that this estimate reflects the actual number of users, we show that our approach achieves throughput 1 in the limit of large K.


          Vertical almost-toric systems. (arXiv:1706.09935v1 [math.SG])   

Authors: Sonja Hohloch, Silvia Sabatini, Daniele Sepe, Margaret Symington

This paper introduces vertical almost-toric systems, a generalization of semi-toric systems (introduced by Vu Ngoc and classified by Pelayo and Vu Ngoc), that provides the language to develop surgeries on almost-toric systems in dimension 4. We prove that vertical almost-toric systems are natural building blocks of almost-toric systems. Moreover, we show that they enjoy many of the properties that their semi-toric counterparts do.


          Quantum transfer-matrices for the sausage model. (arXiv:1706.09941v1 [hep-th])   

Authors: Vladimir V. Bazhanov, Gleb A. Kotousov, Sergei L. Lukyanov

In this work we revisit the problem of the quantization of the two-dimensional O(3) non-linear sigma model and its one-parameter integrable deformation -- the sausage model. Our consideration is based on the so-called ODE/IQFT correspondence, a variant of the Quantum Inverse Scattering Method.The approach allowed us to explore the integrable structures underlying the quantum O(3)/sausage model. Among the obtained results is a system of non-linear integral equations for the computation of the vacuum eigenvalues of the quantum transfer-matrices.


          Community Detection on Euclidean Random Graphs. (arXiv:1706.09942v1 [math.PR])   

Authors: Abishek Sankararaman, Francois Baccelli

Motivated by applications in online social networks, we introduce and study the problem of Community Detection on a new class of sparse \emph{spatial} random graphs embedded in Euclidean space. Our random graph is the planted-partition version of the classical random connection model studied in Stochastic Geometry. Roughly speaking, each node of our graph has an uniform i.i.d. $\{-1,+1\}$ valued community label and a $\mathbb{R}^d$ valued location label given by the support of a homogeneous Poisson point process of intensity $\lambda$. Conditional on the labels, edges are drawn independently at random depending both on the Euclidean distance between the nodes and community labels on the nodes.

The Community Detection problem consists in estimating the partition of nodes into communities, based on an observation of the random graph along with the spatial location labels on nodes. We show that for $d=1$, Community Detection is impossible for any parameters. For $d \geq 2$, we establish a phase-transition for this problem, based on the intensity $\lambda$ of the point process. We show that if the intensity $\lambda$ is small, then no algorithm for community detection can beat a random guess for the partitions. We show this by introducing and analyzing a new problem which we call `Information Flow from Infinity'. On the positive side, we give a novel algorithm that performs Community Detection as long as the intensity $\lambda$ is larger than a sufficiently high constant. Along the way, we establish a \emph{distinguishability} result which says one can always efficiently infer the existence of a partition given the graph and spatial locations even when one cannot identify the partition better than at random. This is a surprising new phenomenon not observed thus far in any non-spatial Erd\H{o}s-R\'enyi based planted-partition graph models.


          Minimizing Data Distortion of Periodically Reporting IoT Devices with Energy Harvesting. (arXiv:1706.09943v1 [cs.IT])   

Authors: Chiara Pielli, Cedomir Stefanovic, Petar Popovski, Michele Zorzi

Energy harvesting is a promising technology for the Internet of Things (IoT) towards the goal of self-sustainability of the involved devices. However, the intermittent and unreliable nature of the harvested energy demands an intelligent management of devices' operation in order to ensure a sustained performance of the IoT application. In this work, we address the problem of maximizing the quality of the reported data under the constraints of energy harvesting, energy consumption and communication channel impairments. Specifically, we propose an energy-aware joint source-channel coding scheme that minimizes the expected data distortion, for realistic models of energy generation and of the energy spent by the device to process the data, when the communication is performed over a Rayleigh fading channel. The performance of the scheme is optimized by means of a Markov Decision Process framework.


          Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems. (arXiv:1706.09948v1 [cs.IT])   

Authors: German Corrales Madueno, Cedomir Stefanovic, Petar Popovski

EEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M reporting regimes, which are periodic, on-demand We show that it is possible to both efficiently and reliably resolve all reporting stations in the cell, within the limits of the allowed deadlines. As a side result, we also provide a rationale for modeling the inter-arrival time in alarm events by using the Beta distribution, a model that is considered in the 3GPP standardization.


          Zero temperature limit for directed polymers and inviscid limit for stationary solutions of stochastic Burgers equation. (arXiv:1706.09950v1 [math.PR])   

Authors: Yuri Bakhtin, Liying Li

We consider a space-continuous and time-discrete polymer model for positive temperature and the associated zero temperature model of last passage percolation type. In our previous work, we constructed and studied infinite-volume polymer measures and one-sided infinite minimizers for the associated variational principle, and used these objects for the study of global stationary solutions of the Burgers equation with positive or zero viscosity and random kick forcing, on the entire real line.

In this paper, we prove that in the zero temperature limit, the infinite-volume polymer measures concentrate on the one-sided minimizers and that the associated global solutions of the viscous Burgers equation with random kick forcing converge to the global solutions of the inviscid equation.


          A counterexample to the birational Torelli problem for Calabi-Yau 3-folds. (arXiv:1706.09952v1 [math.AG])   

Authors: John Christian Ottem, Jørgen Vold Rennemo

The Grassmannian Gr(2,5) is embedded in $\Bbb{P}^9$ via the Pl\"ucker embedding. The intersection of two general PGL(10)-translates of Gr(2,5) is a Calabi-Yau 3-fold X, and the intersection of the projective duals of the two translates is another Calabi-Yau 3-fold Y, deformation equivalent to X. Applying results of Kuznetsov and Jiang-Leung-Xie shows that X and Y are derived equivalent, which by a result of Addington implies that their third cohomology groups are isomorphic as polarised Hodge structures. We show that X and Y provide counterexamples to a certain "birational" Torelli statement for Calabi-Yau 3-folds, namely, they are deformation equivalent, derived equivalent, and have isomorphic Hodge structures, but they are not birational.


          Dessins d'Enfants of Trigonal Curves. (arXiv:1706.09956v1 [math.AG])   

Authors: Mehmet Emin Aktas

In this paper, we focus on properties of dessins d'enfants associated to trigonal curves. Degtyarev studied dessins d'enfants to compute braid monodromies and fundamental groups of trigonal curves using their combinatorial data. We first classify all possible combinatorial data that can occur for trigonal curves of low degree, as well as bounds on the number of possibilities for all degree. We also study deformations of trigonal curves and corresponding deformations of their dessins. Of special interest to Degtyarev was the case when the dessins are maximal. We give a sufficient condition for a trigonal curve to be deformable to one that is maximal.


          Observables and Strong One-Sided Chaos in the Boltzmann-Grad Limit. (arXiv:1706.09961v1 [math.AP])   

Authors: Ryan Denlinger

Boltzmann's equation provides a microscopic model for the evolution of dilute classical gases. A fundamental problem in mathematical physics is to rigorously derive Boltzmann's equation starting from Newton's laws. In the 1970s, Oscar Lanford provided such a derivation, for the hard sphere interaction, on a small time interval. One of the subtleties of Lanford's original proof was that the strength of convergence proven at positive times was much weaker than that which had to be assumed at the initial time, which is at odds with the idea of propagation of chaos. Several authors have addressed this situation with various notions of strong one-sided chaos, which is the true property which is propagated by the dynamics. We provide a new approach to the problem based on duality and the evolution of observables; the observables encode the detailed interaction and allow us to define a new notion of strong one-sided chaos.


          A maximum entropy approach to H-theory: Statistical mechanics of hierarchical systems. (arXiv:1706.09963v1 [cond-mat.stat-mech])   

Authors: Giovani L. Vasconcelos, Domingos S. P. Salazar, A. M. S. Macêdo

A novel formalism, called H-theory, is applied to the problem of statistical equilibrium of a hierarchical complex system with multiple time and length scales. In this approach, the system is formally treated as being composed of a small subsystem---representing the region where the measurements are made---in contact with a set of `nested heat reservoirs' corresponding to the hierarchical structure of the system. The probability distribution function (pdf) of the fluctuating temperatures at each reservoir, conditioned on the temperature of the reservoir above it, is determined from a maximum entropy principle subject to appropriate constraints that describe the thermal equilibrium properties of the system. The marginal temperature distribution of the innermost reservoir is obtained by integrating over the conditional distributions of all larger scales, and the resulting pdf is written in analytical form in terms of certain special transcendental functions, known as the Fox $H$-functions. The distribution of states of the small subsystem is then computed by averaging the quasi-equilibrium Boltzmann distribution over the temperature of the innermost reservoir. This distribution can also be written in terms of $H$-functions. The general family of distributions reported here recovers, as particular cases, the stationary distributions recently obtained by Mac\^edo {\it et al.} [Phys.~Rev.~E {\bf 95}, 032315 (2017)] from a stochastic dynamical approach to the problem.


          A randomized Milstein method for stochastic differential equations with non-differentiable drift coefficients. (arXiv:1706.09964v1 [math.NA])   

Authors: Raphael Kruse, Yue Wu

In this paper a drift-randomized Milstein method is introduced for the numerical solution of non-autonomous stochastic differential equations with non-differentiable drift coefficient functions. Compared to standard Milstein-type methods we obtain higher order convergence rates in the $L^p(\Omega)$ and almost sure sense. An important ingredient in the error analysis are randomized quadrature rules for H\"older continuous stochastic processes. By this we avoid the use of standard arguments based on the It\=o-Taylor expansion which are typically applied in error estimates of the classical Milstein method but require additional smoothness of the drift and diffusion coefficient functions. We also discuss the optimality of our convergence rates. Finally, the question of implementation is addressed in a numerical experiment.


          A crystal-like structure on shifted tableaux. (arXiv:1706.09969v1 [math.CO])   

Authors: Maria Gillespie, Jake Levinson, Kevin Purbhoo

We introduce coplactic raising and lowering operators $E'_i$, $F'_i$, $E_i$, and $F_i$ on shifted skew semistandard tableaux. We show that the primed operators and unprimed operators each independently form type A Kashiwara crystals (but not Stembridge crystals) on the same underlying set and with the same weight functions. When taken together, the result is a new kind of `doubled crystal' structure that recovers the combinatorics of type B Schubert calculus: the highest-weight elements of our crystals are precisely the shifted Littlewood-Richardson tableaux, and their generating functions are the (skew) Schur Q functions.


          A differential operator realisation approach for constructing Casimir operators of non-semisimple Lie algebras. (arXiv:1706.09970v1 [math-ph])   

Authors: Fahad Alshammari, Phillip S. Isaac, Ian Marquette

We introduce a search algorithm that utilises differential operator realisations to find polynomial Casimir operators of Lie algebras. To demonstrate the algorithm, we look at two classes of examples: (1) the model filiform Lie algebras and (2) the Schr\"odinger Lie algebras. We find that an abstract form of dimensional analysis assists us in our algorithm, and greatly reduces the complexity of the problem.


          The trivial lower bound for the girth of $S_n$. (arXiv:1706.09972v1 [math.GR])   

Authors: Sean Eberhard

Consider the Cayley graph of $S_n$ generated by a random pair of elements $x,y$. Conjecturally, the girth of this graph is $\Omega(n \log n)$ with probability tending to $1$ as $n\to\infty$. We show that it is at least $\Omega(n^{1/3})$.


          Global holomorphic functions in several non-commuting variables II. (arXiv:1706.09973v1 [math.FA])   

Authors: Jim Agler, John E. McCarthy

We give a new proof that bounded non-commutative functions on polynomial polyhedra can be represented by a realization formula, a generalization of the transfer function realization formula for bounded analytic functions on the unit disk.


          Topological Chern-Simons/Matter Theories. (arXiv:1706.09977v1 [hep-th])   

Authors: Mina Aganagic, Kevin Costello, Jacob McNamara, Cumrun Vafa

We propose a new partially topological theory in three dimensions which couples Chern-Simons theory to matter. The 3-manifolds needed for this construction admit transverse holomorphic foliation (THF). The theory depends only on the choice of such a structure, but not on a choice of metric and in this sense, it is topological. We argue that this theory arises in topological A-model string theory on Lagrangian 3-branes in the presence of additional parallel coisotropic 5-branes. The theory obtained in this way is equivalent to an N=2 supersymmetric Chern-Simons matter theory on the same 3-manifold, which also only depends on the THF structure. The theory is a realization of a topological theory of class H, which allows splitting of a temporal direction from spatial directions. We briefly discuss potential condensed matter applications.


          Non-autonomous conformal graph directed Markov systems. (arXiv:1706.09978v1 [math.DS])   

Authors: Jason Atnip

In this paper we introduce and develop the theory of non-autonomous graph directed Markov systems which is a generalization of the theory of conformal graph directed Markov systems of Mauldin and Urba\'nski, first presented in their book, and the theory of non-autonomous conformal iterated function systems set forth by Rempe-Gillen and Urba\'nski. We exhibit several large classes of functions for which Bowen's formula for Hausdorff dimension holds. In particular we consider weakly balanced finite systems, where we have some control over the growth of the derivatives, and ascending systems. Our results, particularly for ascending systems, generalize and go well beyond what is currently known for autonomous graph directed Markov systems and non-autonomous iterated function systems. We also provide an application to non-autonomous conformal dynamics by estimating the Hausdorff dimension of the Julia set of non-autonomous affine perturbations of an elliptic function from below.


          An Experimental View of Herman Rings for Dianalytic Maps of $\mathbb{RP}^2$. (arXiv:1706.09980v1 [math.DS])   

Authors: Jane Hawkins, Michelle Randolph

We provide an experimental study of the existence of Herman rings in a parametrized family of rational maps preserving antipodal points, and a discussion of their properties on $\mathbb{RP}^2$. We study analytic maps of the sphere that project to dianalytic maps on the nonorientable surface, $\mathbb{RP}^2$. They have a known form and we focus on a subset of degree $3$ dianalytic maps and explore their dynamical properties. In particular, we focus on maps for which the Fatou set has a Herman ring. We appeal to dynamical properties of particular maps to justify our assertion that these Fatou components are Herman rings and analyze the parameter space for this family of maps.


          Contact Topology and the Structure and Dynamics of Cholesterics. (arXiv:1706.09982v1 [cond-mat.soft])   

Authors: Thomas Machon

Using tools and concepts from contact topology we show that non-vanishing twist implies conservation of the layer structure in cholesteric liquid crystals. This leads to a number of additional topological invariants for cholesteric textures, such as layer numbers, that are not captured by traditional descriptions, characterises the nature and size of the chiral energy barriers between metastable configurations, and gives a geometric characterisation of cholesteric dynamics in any context, including active systems, those in confined geometries or under the influence of an external field.


          Motivic Measures through Waldhausen K-Theories. (arXiv:1706.09983v1 [math.AG])   

Authors: Anwar Alameddin

In this paper we introduce the notion of a $cdp$-functor to a Waldhausen category. We show that such functors admit extensions that satisfy the excision property, to which we associate Euler-Poincar\'e characteristics that send the class of a proper scheme to the class of its image. As an application, we show that the Yoneda embedding gives rise to a monoidal proper-fibred Waldhausen category over Noetherian schemes of finite Krull dimensions, with canonical $cdp$-functors to its fibres.


          The shape of quartic fields. (arXiv:1706.09987v1 [math.NT])   

Authors: Robert Hough

We use the method of Shintani, as developed by Taniguchi and Thorne, to prove the joint cuspidal equidistribution of the shape of quartic fields paired with the shape of its cubic resolvent, when the fields are ordered by discriminant. Our estimate saves a small power in the corresponding Weyl sums.


          Phase Retrieval via Randomized Kaczmarz: Theoretical Guarantees. (arXiv:1706.09993v1 [math.NA])   

Authors: Yan Shuo Tan, Roman Vershynin

We consider the problem of phase retrieval, i.e. that of solving systems of quadratic equations. A simple variant of randomized Kaczmarz method was recently proposed for phase retrieval, and it was shown numerically to have a computational edge over state-of-the-art Wirtinger flow methods. In this paper, we provide the first theoretical guarantee for the convergence of the randomized Kacmarz method for phase retrieval. We show that it is sufficient to have as many gaussian measurements as the dimension, up to a constant factor. Along the way, we introduce a sufficient condition on measurement sets for which the randomized Kaczmarz method is guaranteed to work. We show that gaussian measurements satisfy this property with high probability; this is proved using a chaining argument coupled with bounds on VC dimension and metric entropy.


          Stochastic Dynamic Optimal Power Flow in Distribution Network with Distributed Renewable Energy and Battery Energy Storage. (arXiv:1706.09995v1 [math.OC])   

Authors: Chenghui Tang, Jian Xu, Yuanzhang Sun, Siyang Liao, Deping Ke, Xiong Li

The penetration of distributed renewable energy (DRE) greatly raises the risk of distribution network operation such as peak shaving and voltage stability. Battery energy storage (BES) has been widely accepted as the most potential application to cope with the challenge of high penetration of DRE. To cope with the uncertainties and variability of DRE, a stochastic day-ahead dynamic optimal power flow (DOPF) and its algorithm are proposed. The overall economy is achieved by fully considering the DRE, BES, electricity purchasing and active power losses. The rainflow algorithm-based cycle counting method of BES is incorporated in the DOPF model to capture the cell degradation, greatly extending the expected BES lifetime and achieving a better economy. DRE scenarios are generated to consider the uncertainties and correlations based on the Copula theory. To solve the DOPF model, we propose a Lagrange relaxation-based algorithm, which has a significantly reduced complexity with respect to the existing techniques. For this reason, the proposed algorithm enables much more scenarios incorporated in the DOPF model and better captures the DRE uncertainties and correlations. Finally, numerical studies for the day-ahead DOPF in the IEEE 123-node test feeder are presented to demonstrate the merits of the proposed method. Results show that the actual BES life expectancy of the proposed model has increased to 4.89 times compared with the traditional ones. The problems caused by DRE are greatly alleviated by fully capturing the uncertainties and correlations with the proposed method.


          Canonical form of linear subspaces and coding invariants: the poset metric point of view. (arXiv:1706.09996v1 [cs.IT])   

Authors: Jerry Anderson Pinheiro, Marcelo Firer

In this work we introduce the concept of a sub-space decomposition, subject to a partition of the coordinates. Considering metrics determined by partial orders in the set of coordinates, the so called poset metrics, we show the existence of maximal decompositions according to the metric. These decompositions turns to be an important tool to obtain the canonical form for codes over any poset metrics and to obtain bounds for important invariants such as the packing radius of a linear subspace. Furthermore, using maximal decompositions, we are able to reduce and optimize the full lookup table algorithm for the syndrome decoding process.


          Tight Load Balancing via Randomized Local Search. (arXiv:1706.09997v1 [cs.DC])   

Authors: Petra Berenbrink, Peter Kling, Christopher Liaw, Abbas Mehrabian

We consider the following balls-into-bins process with $n$ bins and $m$ balls: each ball is equipped with a mutually independent exponential clock of rate 1. Whenever a ball's clock rings, the ball samples a random bin and moves there if the number of balls in the sampled bin is smaller than in its current bin. This simple process models a typical load balancing problem where users (balls) seek a selfish improvement of their assignment to resources (bins). From a game theoretic perspective, this is a randomized approach to the well-known Koutsoupias-Papadimitriou model, while it is known as randomized local search (RLS) in load balancing literature. Up to now, the best bound on the expected time to reach perfect balance was $O\left({(\ln n)}^2+\ln(n)\cdot n^2/m\right)$ due to Ganesh, Lilienthal, Manjunath, Proutiere, and Simatos (Load balancing via random local search in closed and open systems, Queueing Systems, 2012). We improve this to an asymptotically tight $O\left(\ln(n)+n^2/m\right)$. Our analysis is based on the crucial observation that performing "destructive moves" (reversals of RLS moves) cannot decrease the balancing time. This allows us to simplify problem instances and to ignore "inconvenient moves" in the analysis.


          Dimension of a snowflake of a finite Euclidean subspace. (arXiv:1706.09998v1 [math.MG])   

Authors: Vladimir Zolotov

Let $X$ be an $n$-point subset of a Euclidean space and $0 < a < 1$. The classical theorem of Schoenberg implies that the snowflake space $X^a$ can be isometrically embedded into Euclidean space. In the paper we show that points in the image such an embedding always are in general position. As application we prove the analogue of Schoenberg's result for quotients of Euclidean spaces by finite groups.


          A basis theorem for the degenerate affine oriented Brauer-Clifford supercategory. (arXiv:1706.09999v1 [math.RT])   

Authors: Jonathan Comes, Jonathan R. Kujawa

We introduce the oriented Brauer-Clifford and degenerate affine oriented Brauer-Clifford supercategories. These are diagrammatically defined monoidal supercategories which provide combinatorial models for certain natural monoidal supercategories of supermodules and endosuperfunctors, respectively, for the Lie superalgebras of type Q. Our main results are basis theorems for these diagram supercategories. We also discuss connections and applications to the representation theory of the Lie superalgebra of type Q.


          Embeddability of right-angled Artin groups on complements of trees. (arXiv:1706.10002v1 [math.GT])   

Authors: Eon-Kyung Lee, Sang-Jin Lee

For a finite simplicial graph $\Gamma$, let $A(\Gamma)$ denote the right-angled Artin group on $\Gamma$. Recently Kim and Koberda introduced the extension graph $\Gamma^e$ for $\Gamma$, and established the Extension Graph Theorem: for finite simplicial graphs $\Gamma_1$ and $\Gamma_2$ if $\Gamma_1$ embeds into $\Gamma_2^e$ as an induced subgraph then $A(\Gamma_1)$ embeds into $A(\Gamma_2)$. In this article we show that the converse of this theorem does not hold for the case $\Gamma_1$ is the complement of a tree and for the case $\Gamma_2$ is the complement of a path graph.


          Hypothesis Testing For Densities and High-Dimensional Multinomials: Sharp Local Minimax Rates. (arXiv:1706.10003v1 [math.ST])   

Authors: Sivaraman Balakrishnan, Larry Wasserman

We consider the goodness-of-fit testing problem of distinguishing whether the data are drawn from a specified distribution, versus a composite alternative separated from the null in the total variation metric. In the discrete case, we consider goodness-of-fit testing when the null distribution has a possibly growing or unbounded number of categories. In the continuous case, we consider testing a Lipschitz density, with possibly unbounded support, in the low-smoothness regime where the Lipschitz parameter is not assumed to be constant. In contrast to existing results, we show that the minimax rate and critical testing radius in these settings depend strongly, and in a precise way, on the null distribution being tested and this motivates the study of the (local) minimax rate as a function of the null distribution. For multinomials the local minimax rate was recently studied in the work of Valiant and Valiant. We re-visit and extend their results and develop two modifications to the chi-squared test whose performance we characterize. For testing Lipschitz densities, we show that the usual binning tests are inadequate in the low-smoothness regime and we design a spatially adaptive partitioning scheme that forms the basis for our locally minimax optimal tests. Furthermore, we provide the first local minimax lower bounds for this problem which yield a sharp characterization of the dependence of the critical radius on the null hypothesis being tested. In the low-smoothness regime we also provide adaptive tests, that adapt to the unknown smoothness parameter. We illustrate our results with a variety of simulations that demonstrate the practical utility of our proposed tests.


          IP$^{*}$-sets in function field and mixing properties. (arXiv:1706.10010v1 [math.DS])   

Authors: Dibyendu De, Pintu Debnath

The ring of polynomial over a finite field $F_q[x]$ has received much attention, both from a combinatorial viewpoint as in regards to its action on measurable dynamical systems. In the case of $(\mathbb{Z},+)$ we know that the ideal generated by any nonzero element is an IP$^*$-set. In the present article we first establish that the analogous result is true for $F_q[x]$. We further use this result to establish some mixing properties of the action of $(F_q[x],+)$. We shall also discuss on Khintchine's recurrence for the action of $(F_q[x]\setminus\{0\},\cdot)$.


          Fine-Grained Reliability for V2V Communications around Suburban and Urban Intersections. (arXiv:1706.10011v1 [cs.IT])   

Authors: Mouhamed Abdulla, Henk Wymeersch

Safe transportation is a key use-case of the 5G/LTE Rel.15+ communications, where an end-to-end reliability of 0.99999 is expected for a vehicle-to-vehicle (V2V) transmission distance of 100-200 m. Since communications reliability is related to road-safety, it is crucial to verify the fulfillment of the performance, especially for accident-prone areas such as intersections. We derive closed-form expressions for the V2V transmission reliability near suburban corners and urban intersections over finite interference regions. The analysis is based on plausible street configurations, traffic scenarios, and empirically-supported channel propagation. We show the means by which the performance metric can serve as a preliminary design tool to meet a target reliability. We then apply meta distribution concepts to provide a careful dissection of V2V communications reliability. Contrary to existing work on infinite roads, when we consider finite road segments for practical deployment, fine-grained reliability per realization exhibits bimodal behavior. Either performance for a certain vehicular traffic scenario is very reliable or extremely unreliable, but nowhere in relatively proximity to the average performance. In other words, standard SINR-based average performance metrics are analytically accurate but can be insufficient from a practical viewpoint. Investigating other safety-critical point process networks at the meta distribution-level may reveal similar discrepancies.


          The limit of vanishing viscosity for the incompressible 3D Navier-Stokes equations with helical symmetry. (arXiv:1706.10012v1 [math.AP])   

Authors: Quansen Jiu, Milton C. Lopes Filho, Dongjuan Niu, Helena J. Nussenzveig Lopes

In this paper, we are concerned with the vanishing viscosity problem for the three-dimensional Navier-Stokes equations with helical symmetry, in the whole space. We choose viscosity-dependent initial $\bu_0^\nu$ with helical swirl, an analogue of the swirl component of axisymmetric flow, of magnitude $\mathcal{O}(\nu)$ in the $L^2$ norm; we assume $\bu_0^\nu \to \bu_0$ in $H^1$. The new ingredient in our analysis is a decomposition of helical vector fields, through which we obtain the required estimates.


          Schubert puzzles and integrability I: invariant trilinear forms. (arXiv:1706.10019v1 [math.CO])   

Authors: Allen Knutson, Paul Zinn-Justin

The puzzle rules for computing Schubert calculus on $d$-step flag manifolds, proven in [Knutson Tao 2003] for $1$-step, in [Buch Kresch Purbhoo Tamvakis 2016] for $2$-step, and conjectured in [Coskun Vakil 2009] for $3$-step, lead to vector configurations (one vector for each puzzle edge label) that we recognize as the weights of some minuscule representations. The $R$-matrices of those representations (which, for $2$-step flag manifolds, involve triality of $D_4$) degenerate to give us puzzle formulae for two previously unsolved Schubert calculus problems: $K_T(2$-step flag manifolds$)$ and $K(3$-step flag manifolds$)$. The $K(3$-step flag manifolds$)$ formula, which involves 151 new puzzle pieces, implies Buch's correction to the first author's 1999 conjecture for $H^*(3$-step flag manifolds$)$.


          The comprehension construction. (arXiv:1706.10023v1 [math.CT])   

Authors: Emily Riehl, Dominic Verity

In this paper we construct an analogue of Lurie's "unstraightening" construction that we refer to as the "comprehension construction". Its input is a cocartesian fibration $p \colon E \to B$ between $\infty$-categories together with a third $\infty$-category $A$. The comprehension construction then defines a map from the quasi-category of functors from $A$ to $B$ to the large quasi-category of cocartesian fibrations over $A$ that acts on $f \colon A \to B$ by forming the pullback of $p$ along $f$. To illustrate the versatility of this construction, we define the covariant and contravariant Yoneda embeddings as special cases of the comprehension functor. We then prove that the hom-wise action of the comprehension functor coincides with an "external action" of the hom-spaces of $B$ on the fibres of $p$ and use this to prove that the Yoneda embedding is fully faithful, providing an explicit equivalence between a quasi-category and the homotopy coherent nerve of a Kan-complex enriched category.


          Matrix Method for Persistence Modules on Commutative Ladders of Finite Type. (arXiv:1706.10027v1 [math.RT])   

Authors: Hideto Asashiba, Emerson G. Escolar, Yasuaki Hiraoka, Hiroshi Takeuchi

The theory of persistence modules on the commutative ladders $CL_n(\tau)$ provides an extension of persistent homology. However, an efficient algorithm to compute the generalized persistence diagrams is still lacking. In this work, we view a persistence module $M$ on $CL_n(\tau)$ as a morphism between zigzag modules, which can be expressed in a block matrix form. For the representation finite case ($n\leq 4)$, we provide an algorithm that uses certain permissible row and column operations to compute a normal form of the block matrix. In this form an indecomposable decomposition of $M$, and thus its persistence diagram, is obtained.


          $\mathcal{P}$-schemes and Deterministic Polynomial Factoring over Finite Fields. (arXiv:1706.10028v1 [cs.CC])   

Authors: Zeyu Guo

We introduce a family of mathematical objects called $\mathcal{P}$-schemes, where $\mathcal{P}$ is a poset of subgroups of a finite group $G$. A $\mathcal{P}$-scheme is a collection of partitions of the right coset spaces $H\backslash G$, indexed by $H\in\mathcal{P}$, that satisfies a list of axioms. These objects generalize the classical notion of association schemes as well as the notion of $m$-schemes (Ivanyos et al. 2009).

Based on $\mathcal{P}$-schemes, we develop a unifying framework for the problem of deterministic factoring of univariate polynomials over finite fields under the generalized Riemann hypothesis (GRH).


          On the Solution of Linear Programming Problems in the Age of Big Data. (arXiv:1706.10030v1 [cs.DS])   

Authors: Irina Sokolinskaya, Leonid B. Sokolinsky

The Big Data phenomenon has spawned large-scale linear programming problems. In many cases, these problems are non-stationary. In this paper, we describe a new scalable algorithm called NSLP for solving high-dimensional, non-stationary linear programming problems on modern cluster computing systems. The algorithm consists of two phases: Quest and Targeting. The Quest phase calculates a solution of the system of inequalities defining the constraint system of the linear programming problem under the condition of dynamic changes in input data. To this end, the apparatus of Fejer mappings is used. The Targeting phase forms a special system of points having the shape of an n-dimensional axisymmetric cross. The cross moves in the n-dimensional space in such a way that the solution of the linear programming problem is located all the time in an "-vicinity of the central point of the cross.


          Simple quasi-abelian varieties. (arXiv:1706.10032v1 [math.CV])   

Authors: Yukitaka Abe

We define the geometric simpleness for toroidal groups. We give an example of quasi-abelian variety which is geometrically simple, but not simple. We show that geometrically simple quasi-abelian varieties have similar properties to those of simple abelian varieties.


          Asymptotic behaviour methods for the Heat Equation. Convergence to the Gaussian. (arXiv:1706.10034v1 [math.AP])   

Authors: Juan Luis Vázquez

In this expository work we discuss the asymptotic behaviour of the solutions of the classical heat equation posed in the whole Euclidean space.

After an introductory review of the main facts on the existence and properties of solutions, we proceed with the proofs of convergence to the Gaussian fundamental solution, a result that holds for all integrable solutions, and represents in the PDE setting the Central Limit Theorem of probability. We present several methods of proof: first, the scaling method. Then several versions of the representation method. This is followed by the functional analysis approach that leads to the famous related equations, Fokker-Planck and Ornstein-Uhlenbeck. The analysis of this connection is also given in rather complete form here. Finally, we present the Boltzmann entropy method, coming from kinetic equations.

The different methods are interesting because of the possible extension to prove the asymptotic behaviour or stabilization analysis for more general equations, linear or nonlinear. It all depends a lot on the particular features, and only one or some of the methods work in each case. A mention of results for different equations is done in the last section.


          A toy Neumann analogue of the nodal line conjecture. (arXiv:1706.10037v1 [math.AP])   

Authors: J. B. Kennedy

We introduce an analogue of Payne's nodal line conjecture, which asserts that the nodal (zero) set of any eigenfunction associated with the second eigenvalue of the Dirichlet Laplacian on a bounded planar domain should reach the boundary of the domain. The assertion here is that any eigenfunction associated with the first nontrivial eigenvalue of the Neumann Laplacian on a domain $\Omega$ with rotational symmetry of order two (i.e., $x\in\Omega$ iff $-x\in\Omega$) "should normally" be rotationally antisymmetric. We give both positive and negative results which highlight the heuristic similarity of this assertion to the nodal line conjecture, while demonstrating that the extra structure of the problem makes it easier to obtain stronger statements: it is true for all simply connected planar domains, while there is a counterexample domain homeomorphic to a disk with two holes.


          A new family of irreducible subgroups of the orthogonal algebraic groups. (arXiv:1706.10043v1 [math.RT])   

Authors: Mikaël Cavallin, Donna M. Testerman

Let $n\geq 3,$ and let $Y$ be a simply connected, simple algebraic group of type $D_{n+1}$ over an algebraically closed field $K.$ Also let $X$ be the subgroup of type $B_n$ of $Y,$ embedded in the usual way. In this paper, we correct an error in a proof of a theorem of Seitz, resulting in the discovery of a new family of triples $(X,Y,V),$ where $V$ denotes a finite-dimensional, irreducible, rational $KY$-module, on which $X$ acts irreducibly. We go on to investigate the impact of the existence of the new examples on the classification of the maximal closed connected subgroups of the classical algebraic groups.


          First hochschild cohomology group and stable equivalence classification of morita type of some tame symmetric algebras. (arXiv:1706.10044v1 [math.RT])   

Authors: Rachel Taillefer (LMBP)

We use the dimension and the Lie algebra structure of the first Hochschild cohomology group to distinguish some algebras of dihedral, semi-dihedral and quaternion type up to stable equivalence of Morita type. In particular, we complete the classification of algebras of dihedral type that was mostly determined by Zhou and Zimmermann.


          Selberg zeta function and hyperbolic eisenstein series. (arXiv:1706.10045v1 [math.SP])   

Authors: Thérèse Falliero (LANLG)

We study the product of Selberg Zeta function and hyperbolic Eisenstein series on a family of degenerating hyperbolic surfaces.


          On the honeycomb conjecture for Robin Laplacian eigenvalues. (arXiv:1706.10055v1 [math.OC])   

Authors: Dorin Bucur, Ilaria Fragala

We prove that the optimal cluster problem for the sum of the first Robin eigenvalue of the Laplacian, in the limit of a large number of convex cells, is asymptotically solved by (the Cheeger sets of) the honeycomb of regular hexagons. The same result is established for the Robin torsional rigidity.


          Barankin Vector Locally Best Unbiased Estimates. (arXiv:1706.10062v1 [stat.ML])   

Authors: Bruno Cernuschi-Frias

The Barankin bound is generalized to the vector case in the mean square error sense. Necessary and sufficient conditions are obtained to achieve the lower bound. To obtain the result, a simple finite dimensional real vector valued generalization of the Riesz representation theorem for Hilbert spaces is given. The bound has the form of a linear matrix inequality where the covariances of any unbiased estimator, if these exist, are lower bounded by matrices depending only on the parametrized probability distributions.


          Coverings for $4$-dimensional almost complex manifolds with non-degenerate torsion. (arXiv:1706.10068v1 [math.DG])   

Authors: Cristina Bozzetti, Costantino Medori

An almost complex manifolds $(M^4,J)$ of real dimension 4 with non-degenerate torsion bundle admit a double absolute parallelism and it is provided the classification of homogeneous $(M^4,J)$ having an associated non-solvable Lie algebra. We extend such a classification to the analysis of the manifolds having an associated solvable Lie algebra, up-to-coverings. Moreover, for homogeneous $(M^4,J)$ we provide examples with connected and non-connected double covering, thus proving that in general the double absolute parallelism is not the restriction of two absolute parallelisms. Furthermore, it is given the definition of a natural metric induced by the absolute parallelisms on $(M^4,J)$ and an example of an almost complex manifold with non-degenerate torsion endowed with that metric such that it becomes an almost K\"ahler manifold.


          Nonlinear Stability of Planar Vortex Patches in Bounded Domains. (arXiv:1706.10070v1 [math.AP])   

Authors: Daomin Cao, Guodong Wang

We prove nonlinear stability of planar vortex patches concentrating at a strict local minimum point of the Robin function in a bounded domain. These vortex patches are stationary solutions of the 2-D incompressible Euler equations. This is achieved by showing that they are strict local maximizers of the kinetic energy among isovortical patches.


          Algebraic cycles and residues of degree eight $L$-functions of $\mathrm{GSp}(4) \times \mathrm{GL}(2)$. (arXiv:1706.10073v1 [math.NT])   

Authors: Francesco Lemma

By embedding the product of two modular curves into the product of a Siegel threefold and of a modular curve, we construct a cohomology class whose non-triviality is equivalent to the existence of a pole for a degree eight automorphic $L$-function, under mild local assumptions. We also prove a cohomological formula for non-critical residues of these $L$-functions in the spirit of Beilinson conjecture. These results rely on the cohomological interpretation of an automorphic period integral and on the study of an integral representation of the $L$-functions.


          Construction of Brauer-Severi Varieties. (arXiv:1706.10079v1 [math.NT])   

Authors: Elisa Lorenzo Garcia

In this paper we give an algorithm for computing equations of Brauer-Severi varieties over perfect fields of characteristic 0. As an example we show the equations of all Brauer-Severi surfaces defined over $\mathbb{Q}$.


          Persistence Diagrams with Linear Machine Learning Models. (arXiv:1706.10082v1 [math.AT])   

Authors: Ippei Obayashi, Yasuaki Hiraoka

Persistence diagrams have been widely recognized as a compact descriptor for characterizing multiscale topological features in data. When many datasets are available, statistical features embedded in those persistence diagrams can be extracted by applying machine learnings. In particular, the ability for explicitly analyzing the inverse in the original data space from those statistical features of persistence diagrams is significantly important for practical applications. In this paper, we propose a unified method for the inverse analysis by combining linear machine learning models with persistence images. The method is applied to point clouds and cubical sets, showing the ability of the statistical inverse analysis and its advantages.


          The Picard Group of Brauer-Severi Varieties. (arXiv:1706.10093v1 [math.NT])   

Authors: Eslam Badr, Francesc Bars, Elisa Lorenzo Garcia

In this note we provide explicit generators of the Picard groups of cyclic Brauer-Severi varieties defined over the base field. In particular, for all Brauer-Severi surfaces. To produce these generators we use the Twisting Theory for smooth plane curves.


          Holomorphic anomaly equations and the Igusa cusp form conjecture. (arXiv:1706.10100v1 [math.AG])   

Authors: Georg Oberdieck, Aaron Pixton

Let $S$ be a K3 surface and let $E$ be an elliptic curve. We solve the reduced Gromov--Witten theory of the Calabi--Yau threefold $S \times E$ for all curve classes which are primitive in the K3 factor. In particular, we deduce the Igusa cusp form conjecture.

The proof relies on new results in the Gromov--Witten theory of elliptic curves and K3 surfaces. We show the generating series of Gromov-Witten classes of an elliptic curve are cycle-valued quasimodular forms and satisfy a holomorphic anomaly equation. The quasimodularity generalizes a result by Okounkov and Pandharipande, and the holomorphic anomaly equation proves a conjecture of Milanov, Ruan and Shen. We further conjecture quasimodularity and holomorphic anomaly equations for the cycle-valued Gromov-Witten theory of every elliptic fibration with section. The conjecture generalizes the holomorphic anomaly equations for ellliptic Calabi--Yau threefolds predicted by Bershadsky, Cecotti, Ooguri, and Vafa. We show a modified conjecture holds numerically for the reduced Gromov-Witten theory of K3 surfaces in primitive classes.


          Analytic continuation of local (un)stable manifolds with rigorous computer assisted error bounds. (arXiv:1706.10107v1 [math.DS])   

Authors: William D. Kalies, Shane Kepley, J.D. Mireles James

We develop a validated numerical procedure for continuation of local stable/unstable manifold patches attached to equilibrium solutions of ordinary differential equations. The procedure has two steps. First we compute an accurate high order Taylor expansion of the local invariant manifold. This expansion is valid in some neighborhood of the equilibrium. An important component of our method is that we obtain mathematically rigorous lower bounds on the size of this neighborhood, as well as validated a-posteriori error bounds for the polynomial approximation. In the second step we use a rigorous numerical integrating scheme to propagate the boundary of the local stable/unstable manifold as long as possible, i.e.\ as long as the integrator yields validated error bounds below some desired tolerance. The procedure exploits adaptive remeshing strategies which track the growth/decay of the Taylor coefficients of the advected curve. In order to highlight the utility of the procedure we study the embedding of some two dimensional manifolds in the Lorenz system.


          On Using Toeplitz and Circulant Matrices for Johnson-Lindenstrauss Transforms. (arXiv:1706.10110v1 [math.FA])   

Authors: Casper Benjamin Freksen, Kasper Green Larsen

The Johnson-Lindenstrauss lemma is one of the corner stone results in dimensionality reduction. It says that for any set of vectors $X \subset \mathbb{R}^n$, there exists a mapping $f : X \to \mathbb{R}^m$ such that $f(X)$ preserves all pairwise distances between vectors in $X$ to within $(1 \pm \varepsilon)$ if $m = O(\varepsilon^{-2} \lg N)$. Much effort has gone into developing fast embedding algorithms, with the Fast Johnson-Lindenstrauss transform of Ailon and Chazelle being one of the most well-known techniques. The current fastest algorithm that yields the optimal $m = O(\varepsilon^{-2}\lg N)$ dimensions has an embedding time of $O(n \lg N + \varepsilon^{-2} \lg^3 N)$. An exciting approach towards improving this, due to Hinrichs and Vyb\'iral, is to use a random $m \times n$ Toeplitz matrix for the embedding. Using Fast Fourier Transform, the embedding of a vector can then be computed in $O(n \lg m)$ time. The big question is of course whether $m = O(\varepsilon^{-2} \lg N)$ dimensions suffice for this technique. If so, this would end a decades long quest to obtain faster and faster Johnson-Lindenstrauss transforms. The current best analysis of the embedding of Hinrichs and Vyb\'iral shows that $m = O(\varepsilon^{-2}\lg^2 N)$ dimensions suffices. The main result of this paper, is a proof that this analysis unfortunately cannot be tightened any further, i.e., there exists a set of $N$ vectors requiring $m = \Omega(\varepsilon^{-2} \lg^2 N)$ for the Toeplitz approach to work.


          Real and Complex Integrals on Spheres and Balls. (arXiv:1706.10111v1 [math.CV])   

Authors: H. Turgay Kaptanoğlu

We evaluate integrals of certain polynomials over spheres and balls in real or complex spaces. We also promote the use of the Pochhammer symbol which gives the values of our integrals in compact forms.


          Semi-implicit Euler-Maruyama approximation for non-colliding particle systems. (arXiv:1706.10119v1 [math.PR])   

Authors: Hoang-Long Ngo, Dai Taguchi

We introduce a semi-implicit Euler-Maruyama approximation which preservers the non-colliding property for some class of non-colliding particle systems such as Dyson Brownian motions, Dyson-Ornstein-Uhlenbeck processes and Brownian particles systems with nearest neighbour repulsion, and study its rates of convergence in both $L^p$-norm and path-wise sense.


          Inconsistency of Template Estimation by Minimizing of the Variance/Pre-Variance in the Quotient Space. (arXiv:1706.10125v1 [math.ST])   

Authors: Loïc Devilliers (ASCLEPIOS, UCA), Stéphanie Allassonnière (CRC), Alain Trouvé (CMLA), Xavier Pennec (ASCLEPIOS, UCA)

We tackle the problem of template estimation when data have been randomly deformed under a group action in the presence of noise. In order to estimate the template, one often minimizes the variance when the influence of the transformations have been removed (computation of the Fr{\'e}chet mean in the quotient space). The consistency bias is defined as the distance (possibly zero) between the orbit of the template and the orbit of one element which minimizes the variance. In the first part, we restrict ourselves to isometric group action, in this case the Hilbertian distance is invariant under the group action. We establish an asymptotic behavior of the consistency bias which is linear with respect to the noise level. As a result the inconsistency is unavoidable as soon as the noise is enough. In practice, template estimation with a finite sample is often done with an algorithm called "max-max". In the second part, also in the case of isometric group finite, we show the convergence of this algorithm to an empirical Karcher mean. Our numerical experiments show that the bias observed in practice can not be attributed to the small sample size or to a convergence problem but is indeed due to the previously studied inconsistency. In a third part, we also present some insights of the case of a non invariant distance with respect to the group action. We will see that the inconsistency still holds as soon as the noise level is large enough. Moreover we prove the inconsistency even when a regularization term is added.


          Tempered homogeneous spaces. (arXiv:1706.10131v1 [math.RT])   

Authors: Yves Benoist, Toshiyuki Kobayashi

Let $G$ be a semisimple real Lie group with finite center and $H$ a connected closed subgroup.

We establish a geometric criterion which detects whether the representation of $G$ in $L^2(G/H)$ is tempered.


          Universal mean-field framework for SIS epidemics on networks, based on graph partitioning and the isoperimetric inequality. (arXiv:1706.10132v1 [physics.soc-ph])   

Authors: Karel Devriendt, Piet Van Mieghem

We propose a new approximation framework that unifies and generalizes a number of existing mean-field approximation methods for the SIS epidemic model on complex networks. We derive the framework, which we call the Universal Mean-Field Framework (UMFF), as a set of approximations of the exact Markovian SIS equations. Our main novelty is that we describe the mean-field approximations from the perspective of the isoperimetric problem, an insight which results in bounds on the UMFF approximation error. These new bounds provide insight in the accuracy of existing mean-field methods, such as the widely-used N-Intertwined Mean-Field Approximation (NIMFA) and Heterogeneous Mean-Field method (HMF). Additionally, the geometric perspective of the isoperimetric problem enables the UMFF approximation accuracy to be related to the regularity notions of Szemer\'edi's regularity lemma, which yields a prediction about the behavior of the SIS process on large graphs.


          Group-like projections for locally compact quantum groups. (arXiv:1706.10138v1 [math.OA])   

Authors: Paweł Kasprzak, Ramin Faal

Let $\mathbb{G}$ be a locally compact quantum group. We give a 1-1 correspondence between group-like projections in $L^1(\mathbb{G})$ preserved by the scaling group and idempotent states on the dual quantum group. As a byproduct we give a simple proof that normal integrable coideals in $L^1(\mathbb{G})$ which are preserved by the scaling group are in 1-1 correspondence with compact quantum subgroups of $\mathbb{G}$.


          A comment on Intersecting Families of Permutations. (arXiv:1706.10146v1 [math.CO])   

Authors: Yuval Filmus

Ellis, Friedgut and Pilpel proved that for large enough $n$, a $t$-intersecting family of permutations contains at most $(n-t)!$ permutations. Their main theorem also states that equality holds only for $t$-cosets. We show that their proof of the characterization of extremal families is wrong. However, the characterization follows from a paper of Ellis, as mentioned already by Ellis, Friedgut and Pilpel.


          A note on weak solutions of conservation laws and energy/entropy conservation. (arXiv:1706.10154v1 [math.AP])   

Authors: Piotr Gwiazda, Martin Michálek, Agnieszka Świerczewska-Gwiazda

A common feature of systems of conservation laws of continuum physics is that they are endowed with natural companion laws which are in such case most often related to the second law of thermodynamics. This observation easily generalizes to any symmetrizable system of conservation laws. They are endowed with nontrivial companion conservation laws, which are immediately satisfied by classical solutions. Not surprisingly, weak solutions may fail to satisfy companion laws, which are then often relaxed from equality to inequality and overtake a role of a physical admissibility condition for weak solutions. We want to answer the question what is a critical regularity of weak solutions to a general system of conservation laws to satisfy an associated companion law as an equality. An archetypal example of such result was derived for the incompressible Euler system by Constantin et al. ([8]) in the context of the seminal Onsager's conjecture. This general result can serve as a simple criterion to numerous systems of mathematical physics to prescribe the regularity of solutions needed for an appropriate companion law to be satisfied.


          Breaking ties in collective decision making. (arXiv:1706.10165v1 [math.CO])   

Authors: Daniela Bubboloni, Michele Gori

Many classical social preference (multiwinner social choice) correspondences are resolute only when two alternatives and an odd number of individuals are considered. Thus,they generally admit several resolute refinements, each of them naturally interpreted as a tie-breaking rule. In this paper we find out conditions which make a social preference (multiwinner social choice) correspondence admit a resolute refinement fulfilling suitable weak versions of the anonymity and neutrality principles, as well as reversal symmetry (immunity to the reversal bias).


          The Geometric structure of M\"obius spaces. (arXiv:1706.10166v1 [math.MG])   

Authors: Merlin Incerti-Medici

Classically, a M\"obius structure is defined on a metric space $(X,d)$ by the cross-ratio $\frac{d(w,z)d(x,y)}{d(w,y)d(x,z)}$. With M\"obius structures appearing naturally in contexts where no natural metric is given -- e.\,g. on the boundary of hyperbolic spaces -- one may ask whether a M\"obius structure can be defined outside of the context of metric spaces.

In this paper, we review a generalization of M\"obius structures due to Sergei Buyalo. We state that this generalized notion of M\"obius structures is compatible with the classical one, both geometrically and topologically and provide a more general proof on the topological compatibility. Having established this generalized notion of M\"obius spaces, we study some of its topological and geometric properties with an outlook towards metric completeness.


          Uncountable strongly surjective linear orders. (arXiv:1706.10171v1 [math.LO])   

Authors: Dániel T. Soukup

A linear order $L$ is strongly surjective if $L$ can be mapped onto any of its suborders in an order preserving way. We prove various results on the existence and non-existence of uncountable strongly surjective linear orders answering questions of Camerlo, Carroy and Marcone. In particular, $\diamondsuit^+$ implies the existence of a lexicographically ordered Suslin-tree which is strongly surjective and minimal; every strongly surjective linear order must be an Aronszajn type under $2^{\aleph_0}<2^{\aleph_1}$ or in the Cohen and other canonical models (where $2^{\aleph_0}=2^{\aleph_1}$); finally, we prove that it is consistent with CH that there are no uncountable strongly surjective linear orders at all. We end the paper with a healthy list of open problems.


          Some remarks on the regularity time of Leray solutions to the Navier-Stokes equations. (arXiv:1706.10173v1 [math.AP])   

Authors: Pablo Braz e Silva, Janaína P. Zingano, Paulo R. Zingano

In this small note we strengthen the classic result about the regularity time t* of arbitrary Leray solutions to the (incompressible) Navier-Stokes equations in Rn (n = 3, 4), which have the form: t* <= K_{3} nu^{-5} || u(.,0) ||_{L2}^{4} if n = 3, and t* <= K_{4} nu^{-3} || u(.,0) ||_{L2}^{2} if n = 4 (in particular, by reducing the current best known values for the constants K_{3}, K_{4}). Some related results of clear interest are also included (derived) in our discussion.


          A Comparative Study of Limiting Strategies in Discontinuous Galerkin Schemes for the $M_1$ Model of Radiation Transport. (arXiv:1706.10174v1 [math.NA])   

Authors: Prince Chidyagwai, Martin Frank, Florian Schneider, Benjamin Seibold

The $M_1$ minimum entropy moment system is a system of hyperbolic balance laws that approximates the radiation transport equation, and has many desirable properties. Among them are symmetric hyperbolicity, entropy decay, moment realizability, and correct behavior in the diffusion and free-streaming limits. However, numerical difficulties arise when approximating the solution of the $M_1$ model by high order numerical schemes; namely maintaining the realizability of the numerical solution and controlling spurious oscillations. In this paper, we extend a previously constructed one-dimensional realizability limiting strategy to 2D. In addition, we perform a numerical study of various combinations of the realizability limiter and the TVBM local slope limiter on a third order Discontinuous Galerkin (DG) scheme on both triangular and rectangular meshes. In several test cases, we demonstrate that in general, a combination of the realizability limiter and a TVBM limiter is necessary to obtain a robust and accurate numerical scheme. Our code is published so that all results can be reproduced by the reader.


          Lipschitz continuity of quasiconformal mappings and of the solutions to second order elliptic PDE with respect to the distance ratio metric. (arXiv:1706.10175v1 [math.CV])   

Authors: Peijin Li, Saminthan Ponnusamy

The main aim of this paper is to study the Lipschitz continuity of certain $(K, K')$-quasiconformal mappings with respect to the distance ratio metric, and the Lipschitz continuity of the solution of a quasilinear differential equation with respect to the distance ratio metric.


          Codebook Based Hybrid Precoding for Millimeter Wave Multiuser Systems. (arXiv:1706.10181v1 [cs.IT])   

Authors: Shiwen He, Jiaheng Wang, Yongming Huang, Bjorn Ottersten, Wei Hong

In millimeter wave (mmWave) systems, antenna architecture limitations make it difficult to apply conventional fully digital precoding techniques but call for low cost analog radio-frequency (RF) and digital baseband hybrid precoding methods. This paper investigates joint RF-baseband hybrid precoding for the downlink of multiuser multi-antenna mmWave systems with a limited number of RF chains. Two performance measures, maximizing the spectral efficiency and the energy efficiency of the system, are considered. We propose a codebook based RF precoding design and obtain the channel state information via a beam sweep procedure. Via the codebook based design, the original system is transformed into a virtual multiuser downlink system with the RF chain constraint. Consequently, we are able to simplify the complicated hybrid precoding optimization problems to joint codeword selection and precoder design (JWSPD) problems. Then, we propose efficient methods to address the JWSPD problems and jointly optimize the RF and baseband precoders under the two performance measures. Finally, extensive numerical results are provided to validate the effectiveness of the proposed hybrid precoders.


          Computational aspects of robust optimized certainty equivalents. (arXiv:1706.10186v1 [q-fin.RM])   

Authors: Daniel Bartl, Samuel Drapeau, Ludovic Tangpi

Accounting for model uncertainty in risk management leads to infinite dimensional optimization problems which are both analytically and numerically untractable. In this article we study when this fact can be overcome for the so-called optimized certainty equivalent risk measure (OCE) - including the average value-at-risk as a special case. First we focus on the case where the set of possible distributions of a financial loss is given by the neighborhood of a given baseline distribution in the Wasserstein distance, or more generally, an optimal-transport distance. Here it turns out that the computation of the robust OCE reduces to a finite dimensional problem, which in some cases can even be solved explicitly. Further, we derive convex dual representations of the robust OCE for measurable claims without any assumptions on the set of distributions and finally give conditions on the latter set under which the robust average value-at-risk is a tail risk measure.


          More Tur\'an-Type Theorems for Triangles in Convex Point Sets. (arXiv:1706.10193v1 [math.CO])   

Authors: Boris Aronov, Vida Dujmović, Pat Morin, Aurélien Ooms, Luís Fernando Schultz Xavier da Silveira

We study the following family of problems: Given a set of $n$ points in convex position, what is the maximum number triangles one can create having these points as vertices while avoiding certain sets of forbidden configurations. As forbidden configurations we consider all 8 ways in which a pair of triangles in such a point set can interact. This leads to 256 extremal Tur\'an-type questions. We give nearly tight (within a $\log n$ factor) bounds for 248 of these questions and show that the remaining 8 questions are all asymptotically equivalent to Stein's longstanding tripod packing problem.


          Modern Random Access for Satellite Communications. (arXiv:1706.10198v1 [cs.IT])   

Authors: Federico Clazzer

The present PhD dissertation focuses on modern random access (RA) techniques. In the first part an slot- and frame-asynchronous RA scheme adopting replicas, successive interference cancellation and combining techniques is presented and its performance analysed. The comparison of both slot-synchronous and asynchronous RA at higher layer, follows. Next, the optimization procedure, for slot-synchronous RA with irregular repetitions, is extended to the Rayleigh block fading channel. Finally, random access with multiple receivers is considered.


          Nonlinear Cauchy-Riemann Equations and Liouville Equation For Conformal Metrics. (arXiv:1706.10201v1 [nlin.SI])   

Authors: Tuğçe Parlakgörür, Oktay K. Pashaev

We introduce the Nonlinear Cauchy-Riemann equations as B\"{a}cklund transformations for several nonlinear and linear partial differential equations. From these equations we treat in details the Laplace and the Liouville equations by deriving general solution for the nonlinear Liouville equation. By M\"{o}bius transformation we relate solutions for the Poincare model of hyperbolic geometry, the Klein model in half-plane and the pseudo-sphere. Conformal form of the constant curvature metrics in these geometries, stereographic projections and special solutions are discussed. Then we introduce the hyperbolic analog of the Riemann sphere, which we call the Riemann pseudosphere. We identify point at infinity on this pseudosphere and show that it can be used in complex analysis as an alternative to usual Riemann sphere to extend the complex plane. Interpretation of symmetric and antipodal points on both, the Riemann sphere and the Riemann pseudo-sphere, are given. By M\"{o}bius transformation and homogenous coordinates, the most general solution of Liouville equation as discussed by Crowdy is derived.


          Joint Optimization of User Association, Data Delivery Rate and Precoding for Cache-Enabled F-RANs. (arXiv:1706.10203v1 [cs.IT])   

Authors: Tung T. Vu, Duy T. Ngo, Lawrence Ong, Salman Durrani, Richard H. Middleton

This paper considers the downlink of a cache-enabled fog radio access network (F-RAN) with limited fronthaul capacity, where user association (UA), data delivery rate (DDR) and signal precoding are jointly optimized. We formulate a mixed-integer nonlinear programming problem in which the weighted difference of network throughput and total power consumption is maximized, subject to the predefined DDR requirements and the maximum transmit power at each eRRH. To address this challenging problem, we first apply the l0-norm approximation and l1-norm minimization techniques to deal with the UA. After this key step, we arrive at an approximated problem that only involves the joint optimization of DDR and precoding. By using the alternating descent method, we further decompose this problem into a convex subproblem for DDR allocation and a nonconvex subproblem for precoding design. While the former is globally solved by the interior-point method, the latter is solved by a specifically tailored successive convex quadratic programming method. Finally, we propose an iterative algorithm for the original joint optimization that is guaranteed to converge. Importantly, each iteration of the developed algorithm only involves solving simple convex problems. Numerical examples demonstrate that the proposed design significantly improves both throughput and power performances, especially in practical F-RANs with limited fronthaul capacity. Compared to the sole precoder design for a given cache placement, our joint design is shown to improve the throughput by 50% while saving at least half of the total power consumption in the considered examples.


          Sums of Palindromes: an Approach via Nested-Word Automata. (arXiv:1706.10206v1 [cs.FL])   

Authors: Aayush Rajasekaran, Jeffrey Shallit, Tim Smith

We prove, using a decision procedure based on nested-word automata, that every natural number is the sum of at most 9 natural numbers whose base-2 representation is a palindrome. We consider some other variations on this problem, and prove similar results. We argue that heavily case-based proofs are a good signal that a decision procedure may help to automate the proof.


          Storage, Communication, and Load Balancing Trade-off in Distributed Cache Networks. (arXiv:1706.10209v1 [cs.IT])   

Authors: Mahdi Jafari Siavoshani, Ali Pourmiri, Seyed Pooya Shariatpanahi

We consider load balancing in a network of caching servers delivering contents to end users. Randomized load balancing via the so-called power of two choices is a well-known approach in parallel and distributed systems. In this framework, we investigate the tension between storage resources, communication cost, and load balancing performance. To this end, we propose a randomized load balancing scheme which simultaneously considers cache size limitation and proximity in the server redirection process.

In contrast to the classical power of two choices setup, since the memory limitation and the proximity constraint cause correlation in the server selection process, we may not benefit from the power of two choices. However, we prove that in certain regimes of problem parameters, our scheme results in the maximum load of order $\Theta(\log\log n)$ (here $n$ is the network size). This is an exponential improvement compared to the scheme which assigns each request to the nearest available replica. Interestingly, the extra communication cost incurred by our proposed scheme, compared to the nearest replica strategy, is small. Furthermore, our extensive simulations show that the trade-off trend does not depend on the network topology and library popularity profile details.


          On the Geil-Matsumoto Bound and the Length of AG codes. (arXiv:1706.10214v1 [math.AG])   

Authors: Maria Bras-Amorós, Albert Vico-Oton

The Geil-Matsumoto bound conditions the number of rational places of a function field in terms of the Weierstrass semigroup of any of the places. Lewittes' bound preceded the Geil-Matsumoto bound and it only considers the smallest generator of the numerical semigroup. It can be derived from the Geil-Matsumoto bound and so it is weaker. However, for general semigroups the Geil-Matsumoto bound does not have a closed formula and it may be hard to compute, while Lewittes' bound is very simple. We give a closed formula for the Geil-Matsumoto bound for the case when the Weierstrass semigroup has two generators. We first find a solution to the membership problem for semigroups generated by two integers and then apply it to find the above formula. We also study the semigroups for which Lewittes's bound and the Geil-Matsumoto bound coincide. We finally investigate on some simplifications for the computation of the Geil-Matsumoto bound.


          Method of precision increase by averaging with application to numerical differentiation. (arXiv:1706.10219v1 [math.GM])   

Authors: Andrej Liptaj

If several independent algorithms for a computer-calculated quantity exist, then one can expect their results (which differ because of numerical errors) to follow approximately Gaussian distribution. The mean of this distribution, interpreted as the value of the quantity of interest, can be determined with better precision than what is the precision provided by a single algorithm. Often, with lack of enough independent algorithms, one can proceed differently: many practical algorithms introduce a bias using a parameter, e.g. a small but finite number to compute a limit or a large but finite number (cutoff) to approximate infinity. One may vary such parameter of a single algorithm and interpret the resulting numbers as generated by several algorithms. A numerical evidence for the validity of this approach is shown for differentiation.


          Weakly intrusive low-rank approximation method for nonlinear parameter-dependent equations. (arXiv:1706.10221v1 [math.NA])   

Authors: Loic Giraldi, Anthony Nouy

This paper presents a weakly intrusive strategy for computing a low-rank approximation of the solution of a system of nonlinear parameter-dependent equations. The proposed strategy relies on a Newton-like iterative solver which only requires evaluations of the residual of the parameter-dependent equation and of a preconditioner (such as the differential of the residual) for instances of the parameters independently. The algorithm provides an approximation of the set of solutions associated with a possibly large number of instances of the parameters, with a computational complexity which can be orders of magnitude lower than when using the same Newton-like solver for all instances of the parameters. The reduction of complexity requires efficient strategies for obtaining low-rank approximations of the residual, of the preconditioner, and of the increment at each iteration of the algorithm. For the approximation of the residual and the preconditioner, weakly intrusive variants of the empirical interpolation method are introduced, which require evaluations of entries of the residual and the preconditioner. Then, an approximation of the increment is obtained by using a greedy algorithm for low-rank approximation, and a low-rank approximation of the iterate is finally obtained by using a truncated singular value decomposition. When the preconditioner is the differential of the residual, the proposed algorithm is interpreted as an inexact Newton solver for which a detailed convergence analysis is provided. Numerical examples illustrate the efficiency of the method.


          A restriction isomorphism for zero-cycles with coefficients in Milnor K-theory. (arXiv:1706.10222v1 [math.AG])   

Authors: Morten Lüders

We prove a restriction isomorphism for zero-cycles with coefficients in Milnor K-theory for smooth projective schemes over excellent henselian discrete valuation rings. Furthermore we relate zero-cycles with coefficients in Milnor K-theory to \'etale cohomology and certain Kato complexes and deduce finiteness results for zero-cycles with coefficients in Milnor K-theory over local fields.


          Bayesian inference using intermediate distribution based on coarse multiscale model for time fractional diffusion equation. (arXiv:1706.10224v1 [math.NA])   

Authors: Lijian Jiang, Na Ou

In the paper, we present a strategy for accelerating posterior inference for unknown inputs in time fractional diffusion models. In many inference problems, the posterior may be concentrated in a small portion of the entire prior support. It will be much more efficient if we build and simulate a surrogate only over the significant region of the posterior. To this end, we construct a coarse model using Generalized Multiscale Finite Element Method (GMsFEM), and solve a least-squares problem for the coarse model with a regularizing Levenberg-Marquart algorithm. An intermediate distribution is built based on the approximate sampling distribution. For Bayesian inference, we use GMsFEM and least-squares stochastic collocation method to obtain a reduced coarse model based on the intermediate distribution. To increase the sampling speed of Markov chain Monte Carlo, the DREAM$_\text{ZS}$ algorithm is used to explore the surrogate posterior density, which is based on the surrogate likelihood and the intermediate distribution. The proposed method with lower gPC order gives the approximate posterior as accurate as the the surrogate model directly based on the original prior.

A few numerical examples for time fractional diffusion equations are carried out to demonstrate the performance of the proposed method with applications of the Bayesian inversion.


          Higher Order Tur\'an Inequalities for the Partition Function. (arXiv:1706.10245v1 [math.CO])   

Authors: William Y.C. Chen, Dennis X.Q. Jia, Larry X.W. Wang

The Tur\'{a}n inequalities and the higher order Tur\'{a}n inequalities arise in the study of Maclaurin coefficients of an entire function in the Laguerre-P\'{o}lya class. A real sequence $\{a_{n}\}$ is said to satisfy the Tur\'{a}n inequalities if for $n\geq 1$, $a_n^2-a_{n-1}a_{n+1}\geq 0$. It is said to satisfy the higher order Tur\'{a}n inequalities if for $n\geq 1$, $4(a_{n}^2-a_{n-1}a_{n+1})(a_{n+1}^2-a_{n}a_{n+2})-(a_{n}a_{n+1}-a_{n-1}a_{n+2})^2\geq 0$. A sequence satisfying the Tur\'an inequalities is also called log-concave. For the partition function $p(n)$, DeSalvo and Pak showed that for $n>25$, the sequence $\{ p(n)\}_{n> 25}$ is log-concave, that is, $p(n)^2-p(n-1)p(n+1)>0$ for $n> 25$. It was conjectured by Chen that $p(n)$ satisfies the higher order Tur\'{a}n inequalities for $n\geq 95$. In this paper, we prove this conjecture by using the Hardy-Ramanujan-Rademacher formula to derive an upper bound and a lower bound for $p(n+1)p(n-1)/p(n)^2$. Consequently, for $n\geq 95$, the Jensen polynomials $g_{3,n-1}(x)=p(n-1)+3p(n)x+3p(n+1)x^2+p(n+2)x^3$ have only real zeros. We conjecture that for any positive integer $m\geq 4$ there exists an integer $N(m)$ such that for $n\geq N(m) $, the polynomials $\sum_{k=0}^m {m\choose k}p(n+k)x^k$ have only real zeros. This conjecture was independently posed by Ono.


          Uniquenss of Some Weak Solutions for 2D Viscous Primitive Equations. (arXiv:1706.10246v1 [math.AP])   

Authors: Ning Ju

First, a new sufficient condition for uniqueness of weak solutions is proved for the system of 2D viscous Primitive Equations. Second, global existence and uniqueness are established for several classes of weak solutions with partial initial regularity, including but not limited to those weak solutions with initial horizontal regularity, rather than vertical regularity. Our results and analyses for the problem with phys- ical boundary conditions can be extended to those with other typical boundary conditions. Most of the results were not available before, even for the periodic case.


          Existence result for impulsive coupled systems on the half-line. (arXiv:1706.10248v1 [math.CA])   

Authors: Feliz Minhós, Robert de Sousa

This work considers a second order impulsive coupled system of differential equations with generalized jump conditions in half-line, which can depend on the impulses of the unknown functions and their first derivatives. The arguments apply the fixed point theory, Green's functions technique, L^11-Carath\'eodory functions and sequences and Schauder's fixed point theorem. The method is based on Carath\'eodory concept of functions and sequences, together with the equiconvergence on infinity and on each impulsive moment, and it allows to consider coupled fully nonlinearities and very general impulsive functions.


          On collapsing Calabi-Yau fibrations. (arXiv:1706.10250v1 [math.DG])   

Authors: Yang Li

We develop some techniques to study the adiabatic limiting behaviour of Calabi-Yau metrics on the total space of a fibration, and obtain strong control near the singular fibres by imposing restrictions on the singularity types. We prove a uniform lower bound on the metric up to the singular fibre, under fairly general hypotheses. Assuming a result in pluripotential theory, we prove a uniform fibre diameter bound for a Lefschetz K3 fibred Calabi-Yau 3-fold, which reduces the study of the collapsing metric to a locally non-collapsed situation, and we identify the Gromov-Hausdorff limit of the rescaled neighbourhood of the singular fibre.


          Stein's method for normal approximation of linear statistics of beta-ensembles. (arXiv:1706.10251v1 [math.PR])   

Authors: Gaultier Lambert, Michel Ledoux, Christian Webb

We present a new approach based on Stein's method in order to prove a central limit theorem for linear statistics of one-cut regular beta-ensembles. Compared with the previous proofs, our result requires less regularity on the potential and provides a rate of convergence in the quadradtic Kantorovich or Wasserstein 2 distance. This rate depends both on the regularity of the potential and the test function and we prove that it is optimal in the case of the Gaussian Unitary Ensemble for certain polynomial test functions. The method relies on a general Gaussian approximation result which we prove and is valid for a large class of Gibbs distributions. In the context of beta-ensembles, this leads to a multidimensional CLT for a sequence of linear statistics which are approximate eigenfunctions of the infinitesimal generator of Dyson Brownian motion once the various error terms are controlled using the rigidity results of Bourgade, Erdos, and Yau.


          Line Hermitian Grassmann Codes and their Parameters. (arXiv:1706.10255v1 [math.CO])   

Authors: Ilaria Cardinali, Luca Giuzzi

In this paper we introduce and study line Hermitian Grassmann codes as those subcodes of the Grassmann codes associated to the $2$-Grassmannian of a Hermitian polar space defined over a finite field of square order.

In particular, we determine their parameters and characterize the words of minimum weight.


          A faster dual algorithm for the Euclidean minimum covering ball problem. (arXiv:1706.10256v1 [math.OC])   

Authors: Marta Cavaleiro, Farid Alizadeh

Dearing and Zeck presented a dual algorithm for the problem of the minimum covering ball in $\mathbb{R}^n$. Each iteration of their algorithm has a computational complexity of at least $\mathcal O(n^3)$. In this paper we propose a modification to their algorithm that, together with an implementation that uses updates to the QR factorization of a suitable matrix, achieves a $\mathcal O(n^2)$ iteration.


          The cohomology of free loop spaces of homogeneous spaces. (arXiv:1706.10258v1 [math.AT])   

Authors: Matthew Burfitt

The free loops space $\Lambda X$ of a space $X$ has become an important object of study particularly in the case when $X$ is a manifold.The study of free loop spaces is motivated in particular by two main examples. The first is their relation to geometrically distinct periodic geodesics on a manifold, originally studied by Gromoll and Meyer in $1969$. More recently the study of string topology and in particular the Chas-Sullivan loop product has been an active area of research.

A complete flag manifold is the quotient of a Lie group by its maximal torus and is one of the nicer examples of a homogeneous space. Both the cohomology and Chas-Sullivan product structure are understood for spaces $S^n$, $\mathbb{C}P^n$ and most simple Lie groups. Hence studying the topology of the free loops space on homogeneous space is a natural next step.

In the thesis we compute the differentials in the integral Leray-Serre spectral sequence associated to the free loops space fibrations in the cases of $SU(n+1)/T^n$ and $Sp(n)/T^n$. Study in detail the structure of the third page of the spectral sequence in the case of $SU(n)$ and give the module structure of $H^*(\Lambda(SU(3)/T^2);\mathbb{Z})$ and $H^*(\Lambda(Sp(2)/T^2);\mathbb{Z})$.


          Hilbert isometries and maximal deviation preserving maps on JB-algebras. (arXiv:1706.10259v1 [math.OA])   

Authors: Mark Roelands, Marten Wortel

In this paper we characterize the surjective linear variation norm isometries on JB-algebras. Variation norm isometries are precisely the maps that preserve the maximal deviation, the quantum analogue of the standard deviation, which plays an important role in quantum statistics. Consequently, we characterize the Hilbert's metric isometries on cones in JB-algebras. The results obtained rely on a variety of new geometric and Jordan algebraic techniques.


          How biased is your model? Concentration Inequalities, Information and Model Bias. (arXiv:1706.10260v1 [cs.IT])   

Authors: Konstantinos Gourgoulias, Markos A. Katsoulakis, Luc Rey-Bellet, Jie Wang

We derive tight and computable bounds on the bias of statistical estimators, or more generally of quantities of interest, when evaluated on a baseline model P rather than on the typically unknown true model Q. Our proposed method combines the scalable information inequality derived by P. Dupuis, K.Chowdhary, the authors and their collaborators together with classical concentration inequalities (such as Bennett's and Hoeffding-Azuma inequalities). Our bounds are expressed in terms of the Kullback-Leibler divergence R(Q||P) of model Q with respect to P and the moment generating function for the statistical estimator under P. Furthermore, concentration inequalities, i.e. bounds on moment generating functions, provide tight and computationally inexpensive model bias bounds for quantities of interest. Finally, they allow us to derive rigorous confidence bands for statistical estimators that account for model bias and are valid for an arbitrary amount of data.


          Non-degeneracy of Gauss curvature equation with negative conic singularity. (arXiv:1706.10264v1 [math.AP])   

Authors: Juncheng Wei, Lei Zhang

We study the Gauss curvature equation with negative singularities. For a local mean field type equation with only one negative index we prove a uniqueness property. For a global equation with one or two negative indexes we prove the non-degeneracy of the linearized equations.


          A formalization of convex polyhedra based on the simplex method. (arXiv:1706.10269v1 [cs.LO])   

Authors: Xavier Allamigeon, Ricardo D. Katz

We present a formalization of convex polyhedra in the proof assistant Coq. The cornerstone of our work is a complete implementation of the simplex method, together with the proof of its correctness and termination. This allows us to define the basic predicates over polyhedra in an effective way (i.e. as programs), and relate them with the corresponding usual logical counterparts. To this end, we make an extensive use of the Boolean reflection methodology. The benefit of this approach is that we can easily derive the proof of several essential results on polyhedra, such as Farkas Lemma, duality theorem of linear programming, and Minkowski Theorem.


          Signal Reconstruction from Interferometric Measurements under Sensing Constraints. (arXiv:1706.10275v1 [cs.IT])   

Authors: Davood Mardani, George K. Atia, Ayman F. Abouraddy

This paper develops a unifying framework for signal reconstruction from interferometric measurements that is broadly applicable to various applications of interferometry. In this framework, the problem of signal reconstruction in interferometry amounts to one of basis analysis. Its applicability is shown to extend beyond conventional temporal interferometry, which leverages the relative delay between the two arms of an interferometer, to arbitrary degrees of freedom of the input signal. This allows for reconstruction of signals supported in other domains (e.g., spatial) with no modification to the underlying structure except for replacing the standard temporal delay with a generalized delay, that is, a practically realizable unitary transformation for which the basis elements are eigenfunctions. Under the proposed model, the interferometric measurements are shown to be linear in the basis coefficients, thereby enabling efficient and fast recovery of the desired information. While the corresponding linear transformation has only a limited number of degrees of freedom set by the structure of the interferometer giving rise to a highly constrained sensing structure, we show that the problem of signal recovery from such measurements can still be carried out compressively. This signifies significant reduction in sample complexity without introducing any additional randomization as is typically done in prior work leveraging compressive sensing techniques. We provide performance guarantees under constrained sensing by proving that the transformation satisfies sufficient conditions for successful reconstruction of sparse signals using concentration arguments. We showcase the effectiveness of the proposed approach using simulation results, as well as actual experimental results in the context of optical modal analysis of spatial beams.


          Probabilistic estimation of the rank 1 cross approximation accuracy. (arXiv:1706.10285v1 [math.NA])   

Authors: Alexander Osinsky

In the construction of low-rank matrix approximation and maximum element search it is effective to use maxvol algorithm. Nevertheless, even in the case of rank 1 approximation the algorithm does not always converge to the maximum matrix element, and it is unclear how often close to the maximum element can be found. In this article it is shown that with a certain degree of randomness in the matrix and proper selection of the starting column, the algorithm with high probability in a few steps converges to an element, which module differs little from the maximum. It is also shown that with more severe restrictions on the error matrix no restrictions on the starting column need to be introduced.


          Convergence of the randomized Kaczmarz method for phase retrieval. (arXiv:1706.10291v1 [math.NA])   

Authors: Halyun Jeong, C. Sinan Güntürk

The classical Kaczmarz iteration and its randomized variants are popular tools for fast inversion of linear overdetermined systems. This method extends naturally to the setting of the phase retrieval problem via substituting at each iteration the phase of any measurement of the available approximate solution for the unknown phase of the measurement of the true solution. Despite the simplicity of the method, rigorous convergence guarantees that are available for the classical linear setting have not been established so far for the phase retrieval setting. In this short note, we provide a convergence result for the randomized Kaczmarz method for phase retrieval in $\mathbb{R}^d$. We show that with high probability a random measurement system of size $m \asymp d$ will be admissible for this method in the sense that convergence in the mean square sense is guaranteed with any prescribed probability. The convergence is exponential and comparable to the linear setting.


          On perfect powers that are sums of two Fibonacci numbers. (arXiv:1706.10294v1 [math.NT])   

Authors: Florian Luca, Vandita Patel

We study the equation $F_n + F_m = y^p$, where $F_n$ and $F_m$ are respectively the $n$-th and $m$-th Fibonacci numbers and $p \ge 2$. We find all solutions under the assumption $n \equiv m \pmod{2}$.


          Distribution of real algebraic integers. (arXiv:1706.10296v1 [math.NT])   

Authors: Dzianis Kaliada

In the paper, we study the asymptotic distribution of real algebraic integers of fixed degree as their na\"{\i}ve height tends to infinity. For an arbitrary interval $I \subset \mathbb{R}$ and sufficiently large $Q>0$, we obtain an asymptotic formula for the number of algebraic integers $\alpha\in I$ of fixed degree $n$ and na\"{\i}ve height $H(\alpha)\le Q$. In particular, we show that the real algebraic integers of degree $n$, with their height growing, tend to be distributed like the real algebraic numbers of degree $n-1$. However, we reveal two symmetric "plateaux", where the distribution of real algebraic integers statistically resembles the rational integers.


          Using TPA to count linear extensions. (arXiv:1010.4981v2 [math.PR] UPDATED)   

Authors: Jacqueline Banks, Scott Garrabrant, Mark L. Huber, Anne Perizzolo

A linear extension of a poset $P$ is a permutation of the elements of the set that respects the partial order. Let $L(P)$ denote the number of linear extensions. It is a #P complete problem to determine $L(P)$ exactly for an arbitrary poset, and so randomized approximation algorithms that draw randomly from the set of linear extensions are used. In this work, the set of linear extensions is embedded in a larger state space with a continuous parameter ?. The introduction of a continuous parameter allows for the use of a more efficient method for approximating $L(P)$ called TPA. Our primary result is that it is possible to sample from this continuous embedding in time that as fast or faster than the best known methods for sampling uniformly from linear extensions. For a poset containing $n$ elements, this means we can approximate $L(P)$ to within a factor of $1 + \epsilon$ with probability at least $1 - \delta$ using an expected number of random bits and comparisons in the poset which is at most $O(n^3(ln n)(ln L(P))\epsilon^{-2}\ln \delta^{-1}).$


          Mutation of torsion pairs in triangulated categories and its geometric realization. (arXiv:1105.3521v2 [math.RT] UPDATED)   

Authors: Yu Zhou, Bin Zhu

We introduce and study mutation of torsion pairs, as a generalization of mutation of cluster tilting objects, rigid objects and maximal rigid objects. It is proved that any mutation of a torsion pair is again a torsion pair. A geometric realization of mutation of torsion pairs in the cluster category of type $A_n$ or $A_{\infty}$ is given via rotation of Ptolemy diagrams.


          2-dimensional algebras. Application to Jordan, G-associative and Hom-associative algebras. (arXiv:1205.1221v2 [math.RA] UPDATED)   

Authors: Elisabeth Remm, Michel Goze

We classify, up to isomorphism, the 2-dimensional algebras over a field K. We focuse also on the case of characteristic 2, identifying the matrices of GL(2,F_2) with the elements of the symmetric group S_3. The classification is then given by the study of the orbits of this group on a 3-dimensional plane, viewed as a Fano plane. As applications, we establish classifications of Jordan algebras, algebras of Lie type or Hom-Associative algebras.


          A quasi-stability result for dictatorships in $S_{n}$. (arXiv:1209.5557v8 [math.CO] UPDATED)   

Authors: David Ellis, Yuval Filmus, Ehud Friedgut

We prove that Boolean functions on $S_{n}$ whose Fourier transform is highly concentrated on the first two irreducible representations of $S_n$, are close to being unions of cosets of point-stabilizers. We use this to give a natural proof of a stability result on intersecting families of permutations, originally conjectured by Cameron and Ku, and first proved by the first author. We also use it to prove a `quasi-stability' result for an edge-isoperimetric inequality in the transposition graph on $S_n$, namely that subsets of $S_n$ with small edge-boundary in the transposition graph are close to being unions of cosets of point-stabilizers.


          A stability result for balanced dictatorships in $S_{n}$. (arXiv:1210.3989v4 [math.CO] UPDATED)   

Authors: David Ellis, Yuval Filmus, Ehud Friedgut

We prove that a balanced Boolean function on $S_{n}$ whose Fourier transform is highly concentrated on the first two irreducible representations of $S_{n}$, is close in structure to a dictatorship, a function which is determined by the image or pre-image of a single element. As a corollary, we obtain a stability result concerning extremal isoperimetric sets in the Cayley graph on $S_{n}$ generated by the transpositions. Our proof works in the case where the expectation of the function is bounded away from $0$ and $1$. In contrast, [Ellis, D., Filmus, Y., Friedgut, E., A quasi-stability result for dictatorships in $S_{n}$, Combinatorica 35 (2015), pp. 573-618] deals with Boolean functions of expectation O(1/n) whose Fourier transform is highly concentrated on the first two irreducible representations of $S_{n}$. These need not be close to dictatorships; rather, they must be close to a union of a constant number of cosets of point-stabilizers.


          Holomorphic curves in exploded manifolds: Kuranishi structure. (arXiv:1301.4748v4 [math.SG] UPDATED)   

Authors: Brett Parker

This paper constructs a Kuranishi structure for the moduli stack of holomorphic curves in exploded manifolds. To avoid some technicalities of abstract Kuranishi structures, we embed our Kuranishi structure inside a moduli stack of curves. The construction also works for the moduli stack of holomorphic curves in any compact symplectic manifold.


          Empirical entropy, minimax regret and minimax risk. (arXiv:1308.1147v2 [math.ST] UPDATED)   

Authors: Alexander Rakhlin, Karthik Sridharan, Alexandre B. Tsybakov

We consider the random design regression model with square loss. We propose a method that aggregates empirical minimizers (ERM) over appropriately chosen random subsets and reduces to ERM in the extreme case, and we establish sharp oracle inequalities for its risk. We show that, under the $\varepsilon^{-p}$ growth of the empirical $\varepsilon$-entropy, the excess risk of the proposed method attains the rate $n^{-2/(2+p)}$ for $p\in(0,2)$ and $n^{-1/p}$ for $p>2$ where $n$ is the sample size. Furthermore, for $p\in(0,2)$, the excess risk rate matches the behavior of the minimax risk of function estimation in regression problems under the well-specified model. This yields a conclusion that the rates of statistical estimation in well-specified models (minimax risk) and in misspecified models (minimax regret) are equivalent in the regime $p\in(0,2)$. In other words, for $p\in(0,2)$ the problem of statistical learning enjoys the same minimax rate as the problem of statistical estimation. On the contrary, for $p>2$ we show that the rates of the minimax regret are, in general, slower than for the minimax risk. Our oracle inequalities also imply the $v\log(n/v)/n$ rates for Vapnik--Chervonenkis type classes of dimension $v$ without the usual convexity assumption on the class; we show that these rates are optimal. Finally, for a slightly modified method, we derive a bound on the excess risk of $s$-sparse convex aggregation improving that of Lounici [Math. Methods Statist. 16 (2007) 246--259] and providing the optimal rate.


          Elliptic K3 surfaces associated with the product of two elliptic curves: Mordell-Weil lattices and their fields of definition. (arXiv:1409.2931v3 [math.AG] UPDATED)   

Authors: Abhinav Kumar, Masato Kuwata

To a pair of elliptic curves, one can naturally attach two K3 surfaces: the Kummer surface of their product and a double cover of it, called the Inose surface. They have prominently featured in many interesting constructions in algebraic geometry and number theory. There are several more associated elliptic K3 surfaces, obtained through base change of the Inose surface; these have been previously studied by Kuwata. We give an explicit description of the geometric Mordell-Weil groups of each of these elliptic surfaces in the generic case (when the elliptic curves are non-isogenous). In the non-generic case, we describe a method to calculate explicitly a finite index subgroup of the Mordell-Weil group, which may be saturated to give the full group. Our methods rely on several interesting group actions, the use of rational elliptic surfaces, as well as connections to the geometry of low degree curves on cubic and quartic surfaces. We apply our techniques to compute the full Mordell-Weil group in several examples of arithmetic interest, arising from isogenous elliptic curves with complex multiplication, for which these K3 surfaces are singular.


          Smoothing of Limit Linear Series of Rank One on Saturated Metrized Complexes of Algebraic Curves. (arXiv:1411.2325v4 [math.AG] UPDATED)   

Authors: Ye Luo, Madhusudan Manjunath

We investigate the smoothing problem of limit linear series of rank one on an enrichment of the notions of nodal curves and metrized complexes called saturated metrized complexes. We give a finitely verifiable full criterion for smoothability of a limit linear series of rank one on saturared metrized complexes, characterize the space of all such smoothings, and extend the criterion to metrized complexes. As applications, we prove that all limit linear series of rank one are smoothable on saturated metrized complexes corresponding to curves of compact-type, and prove an analogue for saturated metrized complexes of a theorem of Harris and Mumford on the characterization of nodal curves contained in a given gonality stratum. In addition, we give a full combinatorial criterion for smoothable limit linear series of rank one on saturated metrized complexes corresponding to nodal curves whose dual graphs are made of separate loops.


          Universal channel coding for general output alphabet. (arXiv:1502.02218v3 [cs.IT] UPDATED)   

Authors: Masahito Hayashi

We propose two types of universal codes that are suited to two asymptotic regimes when the output alphabet is possibly continuous. The first class has the property that the error probability decays exponentially fast and we identify an explicit lower bound on the error exponent. The other class attains the epsilon-capacity the channel and we also identify the second-order term in the asymptotic expansion. The proposed encoder is essentially based on the packing lemma of the method of types. For the decoder, we first derive a R\'enyi-relative-entropy version of Clarke and Barron's formula the distance between the true distribution and the Bayesian mixture, which is of independent interest. The universal decoder is stated in terms of this formula and quantities used in the information spectrum method. The methods contained herein allow us to analyze universal codes for channels with continuous and discrete output alphabets in a unified manner, and to analyze their performances in terms of the exponential decay of the error probability and the second-order coding rate.


          Random walks on weighted, oriented percolation clusters. (arXiv:1506.01879v3 [math.PR] UPDATED)   

Authors: Katja Miller

We consider a weighted random walk on the backbone of an oriented percolation cluster. We determine necessary conditions on the weights for Brownian scaling limits under the annealed and the quenched law. This model is a random walk in dynamic random environment (RWDRE), where the environment is mixing, non-Markovian and not elliptic. We provide a generalization of results obtained previously by Birkner et al. (2013).


          Dirichlet to Neumann operator for abelian Yang-Mills gauge fields. (arXiv:1508.00449v4 [math-ph] UPDATED)   

Authors: Homero G. Diaz-Marin

We consider the Dirichlet to Neumann operator for abelian Yang- Mills boundary conditions. We treat the case for space-time manifolds with general smooth boundary components. The aim is constructing a complex structure for the symplectic space of boundary conditions of Euler-Lagrange solutions modulo gauge. Thus we prepare a suitable scenario for geometric quantization of abelian gauge fields following a symplectic reduction procedure in a Lagrangian setting.


          On the pro-semisimple completion of the fundamental group of a smooth variety over a finite field. (arXiv:1509.06059v6 [math.NT] UPDATED)   

Authors: Vladimir Drinfeld

Let $\Pi$ be the fundamental group of a smooth variety X over $F_p$. Given a non-Archimedean place $\lambda$ of the field of algebraic numbers which is prime to p, consider the $\lambda$-adic pro-semisimple completion of $\Pi$ as an object of the groupoid whose objects are pro-semisimple groups and whose morphisms are isomorphisms up to conjugation by elements of the neutral connected component. We prove that this object does not depend on $\lambda$. If dim X=1 we also prove a crystalline generalization of this fact.

We deduce this from the Langlands conjecture for function fields (proved by L. Lafforgue) and its crystalline analog (proved by T. Abe) using a reconstruction theorem in the spirit of Kazhdan-Larsen-Varshavsky.

We also formulate two related conjectures, each of which is a "reciprocity law" involving a sum over all $l$-adic cohomology theories (including the crystalline theory for $l=p$).


          Degree of recurrence of generic diffeomorphisms. (arXiv:1510.00723v2 [math.DS] UPDATED)   

Authors: Pierre-Antoine Guihéneuf

We study the spatial discretizations of dynamical systems: can we recover some dynamical features of a system from numerical simulations? Here, we tackle this issue for the simplest algorithm possible: we compute long segments of orbits with a fixed number of digits. We show that for every $r>1$, the dynamics of the discretizations of a $C^r$ generic conservative diffeomorphism of the torus is very different from that observed in the $C^0$ regularity. The proof of our results involves in particular a local-global formula for discretizations, as well as a study of the corresponding linear case, which uses ideas from the theory of quasicrystals.


          Certain Abelian varieties bad at only one prime. (arXiv:1510.06249v3 [math.NT] UPDATED)   

Authors: Armand Brumer, Kenneth Kramer

An abelian surface $A_{/{\mathbb Q}}$ of prime conductor $N$ is favorable if its 2-division field $F$ is an ${\mathcal S}_5$-extension with ramification index 5 over ${\mathbb Q}_2$. Let $A$ be favorable and let $B$ be any semistable abelian variety of dimension $2d$ and conductor $N^d$ such that $B[2]$ is filtered by copies of $A[2]$. We give a sufficient class field theoretic criterion on $F$ to guarantee that $B$ is isogenous to $A^d$.

As expected from our paramodular conjecture, we conclude that there is one isogeny class of abelian surfaces for each conductor in $\{277, 349,461,797,971\}$. The general applicability of our criterion is discussed in the data section.


          Subdirectly irreducible medial quandles. (arXiv:1511.06529v2 [math.RA] UPDATED)   

Authors: Premysl Jedlicka, Agata Pilitowska, Anna Zamojska-Dzienio

We present a complete classification of all subdirectly irreducible medial quandles. We show that they fall within one of the four disjoint classes. In particular, in the finite case they are either connected (and therefore an Alexander quandle) or reductive. Moreover, we give an explicit description of all non-connected subdirectly irreducible medial quandles.


          The point-like limit for a NLS equation with concentrated nonlinearity in dimension three. (arXiv:1511.06731v2 [math-ph] UPDATED)   

Authors: Claudio Cacciapuoti, Domenico Finco, Diego Noja, Alessandro Teta

We consider a scaling limit of a nonlinear Schr\"odinger equation (NLS) with a nonlocal nonlinearity showing that it reproduces in the limit of cutoff removal a NLS equation with nonlinearity concentrated at a point. The regularized dynamics is described by the equation \begin{equation*} i\frac{\partial }{\partial t} \psi^\varepsilon(t)= -\Delta \psi^\varepsilon(t) + g(\varepsilon,\mu,|(\rho^\varepsilon,\psi^\varepsilon(t))|^{2\mu}) (\rho^\varepsilon,\psi^\varepsilon(t)) \rho^\varepsilon \end{equation*} where $\rho^{\varepsilon} \to \delta_0$ weakly and the function $g$ embodies the nonlinearity and the scaling and has to be fine tuned in order to have a nontrivial limit dynamics. The limit dynamics is a nonlinear version of point interaction in dimension three and it has been previously studied in several papers as regards the well-posedness, blow-up and asymptotic properties of solutions. Our result is the first justification of the model as the point limit of a regularized dynamics.


          Holomorphic curves in exploded manifolds: virtual fundamental class. (arXiv:1512.05823v2 [math.SG] UPDATED)   

Authors: Brett Parker

We define Gromov--Witten invariants of exploded manifolds. The technical heart of this paper is a construction of a virtual fundamental class $[\mathcal K]$ of any Kuranishi category $\mathcal K$ (which is a simplified, more general version of an embedded Kuranishi structure.) We also show how to integrate differential forms over $[\mathcal K]$ to obtain numerical invariants, and push forward differential forms from $\mathcal K$ over suitable evaluation maps. We show that such invariants are independent of any choices, and are compatible with pullbacks, products, and tropical completion of Kuranishi categories.

In the case of a compact symplectic manifold, this gives an alternative construction of Gromov--Witten invariants, including gravitational descendants.


          The Negative Cycle Vectors of Signed Complete Graphs. (arXiv:1512.09087v2 [math.CO] UPDATED)   

Authors: Alex Schaefer

A signed graph is a graph where the edges are assigned labels of either "$+$" or "$-$". The sign of a cycle in the graph is the product of the signs of its edges. We equip each signed complete graph with a vector whose entries are the number of negative $k$-cycles for $k\in\{3,\dots,n\}$. These vectors generate an affine subspace of $\mathbb{R}^{n-2}$. We prove that this subspace is all of $\mathbb{R}^{n-2}$.


          Improved convergence rates for Lasserre-type hierarchies of upper bounds for box-constrained polynomial optimization. (arXiv:1603.03329v2 [math.OC] UPDATED)   

Authors: Etienne de Klerk, Roxana Hess, Monique Laurent

We consider the problem of minimizing a given $n$-variate polynomial $f$ over the hypercube $[-1,1]^n$. An idea introduced by Lasserre, is to find a probability distribution on $[-1,1]^n$ with polynomial density function $h$ (of given degree $r$) that minimizes the expectation $\int_{[-1,1]^n} f(x)h(x)d\mu(x)$, where $d\mu(x)$ is a fixed, finite Borel measure supported on $[-1,1]^n$. It is known that, for the Lebesgue measure $d\mu(x) = dx$, one may show an error bound $O(1/\sqrt{r})$ if $h$ is a sum-of-squares density, and an $O(1/r)$ error bound if $h$ is the density of a beta distribution. In this paper, we show an error bound of $O(1/r^2)$, if $d\mu(x) = \left(\prod_{i=1}^n \sqrt{1-x_i^2} \right)^{-1}dx$ (the well-known measure in the study of orthogonal polynomials), and $h$ has a Schm\"udgen-type representation with respect to $[-1,1]^n$, which is a more general condition than a sum of squares. The convergence rate analysis relies on the theory of polynomial kernels, and in particular on Jackson kernels. We also show that the resulting upper bounds may be computed as generalized eigenvalue problems, as is also the case for sum-of-squares densities.


          Stochastic optimal control of McKean-Vlasov equations with anticipating law. (arXiv:1604.03582v3 [math.OC] UPDATED)   

Authors: Nacira Agram

In this paper, we generalise Pontryagin's stochastic maximum principle to controlled McKean-Vlasov equations with anticipating law. The associated new type of delayed backward equations with implicit terminal condition is studied.


          Solutions of quasianalytic equations. (arXiv:1605.01425v2 [math.CV] UPDATED)   

Authors: Andre Belotto da Silva, Iwo Biborski, Edward Bierstone

The article develops techniques for solving equations G(x,y)=0, where G(x,y)=G(x_1,...,x_n,y) is a function in a given quasianalytic class (for example, a quasianalytic Denjoy-Carleman class, or the class of infinitely differentiable functions definable in a polynomially-bounded o-minimal structure). We show that, if G(x,y)=0 has a formal power series solution y=H(x) at some point a, then H is the Taylor expansion at a of a quasianalytic solution y=h(x), where h(x) is allowed to have a certain controlled loss of regularity, depending on G. Several important questions on quasianalytic functions, concerning division, factorization, Weierstrass preparation, etc., fall into the framework of this problem (or are closely related), and are also discussed.


          Well-posed Bayesian inverse problems and heavy-tailed stable quasi-Banach space priors. (arXiv:1605.05898v5 [math.PR] UPDATED)   

Authors: T. J. Sullivan

This article extends the framework of Bayesian inverse problems in infinite-dimensional parameter spaces, as advocated by Stuart (Acta Numer. 19:451--559, 2010) and others, to the case of a heavy-tailed prior measure in the family of stable distributions, such as an infinite-dimensional Cauchy distribution, for which polynomial moments are infinite or undefined. It is shown that analogues of the Karhunen--Lo\`eve expansion for square-integrable random variables can be used to sample such measures on quasi-Banach spaces. Furthermore, under weaker regularity assumptions than those used to date, the Bayesian posterior measure is shown to depend Lipschitz continuously in the Hellinger metric upon perturbations of the misfit function and observed data.


          A modification of the projective construction of quantum states for field theories. (arXiv:1605.06306v3 [math-ph] UPDATED)   

Authors: Jerzy Kijowski, Andrzej Okolow

The projective construction of quantum states for field theories may be flawed--in some cases the construction may possibly lead to spaces of quantum states which are "too small" to be used in quantization of field theories. Here we present a slight modification of the construction which is free from this flaw.


          Sharp geometric requirements in the Wachspress interpolation error estimate. (arXiv:1606.04975v3 [math.NA] UPDATED)   

Authors: Gabriel Monzón

Geometric conditions on general polygons are given in [9] in order to guarantee the error estimate for interpolants built from generalized barycentric coordinates, and the question about identifying sharp geometric restrictions in this setting is proposed. In this work, we address the question when the construction is made by using Wachspress coordinates. We basically show that the imposed conditions: bounded aspect ratio property (barp), maximum angle condition (MAC) and minimum edge length property (melp) are actually equivalent to [MAC,melp], and if any of these conditions is not satisfied, then there is no guarantee that the error estimate is valid. In this sense, MAC and melp can be regarded as sharp geometric requirements in the Wachspress interpolation error estimate.


          Gamblets for opening the complexity-bottleneck of implicit schemes for hyperbolic and parabolic ODEs/PDEs with rough coefficients. (arXiv:1606.07686v2 [math.NA] UPDATED)   

Authors: Houman Owhadi, Lei Zhang

Implicit schemes are popular methods for the integration of time dependent PDEs such as hyperbolic and parabolic PDEs. However the necessity to solve corresponding linear systems at each time step constitutes a complexity bottleneck in their application to PDEs with rough coefficients. We present a generalization of gamblets introduced in \cite{OwhadiMultigrid:2015} enabling the resolution of these implicit systems in near-linear complexity and provide rigorous a-priori error bounds on the resulting numerical approximations of hyperbolic and parabolic PDEs. These generalized gamblets induce a multiresolution decomposition of the solution space that is adapted to both the underlying (hyperbolic and parabolic) PDE (and the system of ODEs resulting from space discretization) and to the time-steps of the numerical scheme.


          Multiple reductions, foliations and the dynamics of cluster maps. (arXiv:1607.03664v2 [math.SG] UPDATED)   

Authors: Inês Cruz, Helena Mena-Matos, M. Esmeralda Sousa-Dias

Presymplectic and Poisson reduction of cluster maps are described in terms of the "canonical" foliations of presymplectic and Poisson manifolds. This approach to reduction leads to a geometric description, in terms of foliations, of the dynamics of the original (not reduced) map. The case where multiple reductions exist (presymplectic/Poisson or presymplectic/Poisson/Poisson) is further explored and examples illustrating several features of this approach are presented, including a nontrivial one in dimension seven which is comprehensively treated.


          Poincar\'e series of compressed local Artinian rings with odd top socle degree. (arXiv:1607.05594v2 [math.AC] UPDATED)   

Authors: Andrew R. Kustin, Liana M. Sega, Adela Vraciu

We define a notion of compressed local Artinian ring that does not require the ring to contain a field. Let $(R,\mathfrak m)$ be a compressed local Artinian ring with odd top socle degree $s$, at least five, and $\operatorname{socle}(R)\cap \mathfrak m^{s-1}=\mathfrak m^s$. We prove that the Poincar\'e series of all finitely generated modules over $R$ are rational, sharing a common denominator, and that there is a Golod homomorphism from a complete intersection onto $R$.


          Hilbert and Thompson isometries on cones in JB-algebras. (arXiv:1609.03473v2 [math.MG] UPDATED)   

Authors: Bas Lemmens, Mark Roelands, Marten Wortel

Hilbert's and Thompson's metric spaces on the interior of cones in JB-algebras are important examples of symmetric Finsler spaces. In this paper we characterize the Hilbert's metric isometries on the interiors of cones in JBW-algebras, and the Thompson's metric isometries on the interiors of cones in JB-algebras. These characterizations generalize work by Bosch\'e on the Hilbert and Thompson isometries on symmetric cones, and work by Hatori and Moln\'ar on the Thompson isometries on the cone of positive self-adjoint elements in a unital $C^*$-algebra. To obtain the results we develop a variety of new geometric and Jordan algebraic techniques.


          Inner product formula for Yoshida lifts. (arXiv:1609.07669v2 [math.NT] UPDATED)   

Authors: Ming-Lun Hsieh, Kenichi Namikawa

We prove an explicit inner product formula for vector-valued Yoshida lifts. As a consequence, we obtain the non-vanishing of Yoshida lifts.


          Energy conservation in the 3D Euler equations on $\mathbb{T}^2\times \mathbb{R}_+$. (arXiv:1611.00181v2 [math.AP] UPDATED)   

Authors: James C. Robinson, José L. Rodrigo, Jack W.D. Skipper

The aim of this paper is to prove energy conservation for the incompressible Euler equations in a domain with boundary. We work in the domain $\mathbb{T}^2\times\mathbb{R}_+$, where the boundary is both flat and has finite measure.

However, first we study the equations on domains without boundary (the whole space $\mathbb{R}^3$, the torus $\mathbb{T}^3$, and the hybrid space $\mathbb{T}^2\times\mathbb{R}$). We make use of some of the arguments of Duchon \& Robert ({\it Nonlinearity} {\bf 13} (2000) 249--255) to prove energy conservation under the assumption that $u\in L^3(0,T;L^3(\mathbb{R}^3))$ and one of the two integral conditions \begin{equation*} \lim_{|y|\to 0}\frac{1}{|y|}\int^T_0\int_{\mathbb{R}^3} |u(x+y)-u(x)|^3\,d x\,d t=0 \end{equation*} or \begin{equation*}

\int_0^T\int_{\mathbb{R}^3}\int_{\mathbb{R}^3}\frac{|u(x)-u(y)|^3}{|x-y|^{4+\delta}}\,d x\,d y<\infty,\qquad\delta>0, \end{equation*} the second of which is equivalent to requiring $u\in L^3(0,T;W^{\alpha,3}(\mathbb{R}^3))$ for some $\alpha>1/3$.

We then use the first of these two conditions to prove energy conservation for a weak solution $u$ on $D_+:=\mathbb{T}^2\times \mathbb{R}_+$: we extend $u$ a solution defined on the whole of $\mathbb{T}^2\times\mathbb{R}$ and then use the condition on this domain to prove energy conservation for a weak solution $u\in L^3(0,T;L^3(D_+))$ that satisfies \begin{equation*} \lim_{|y|\to 0} \frac{1}{|y|}\int^{T}_{0}\iint_{\mathbb{T}^2}\int^\infty_{|y|}|u(t,x+y)-u(t,x)|^3 \,d x_3 \,d x_1 \,d x_2 \,d t=0, \end{equation*} and certain continuity conditions near the boundary $\partial D_+=\{x_3=0\}$.


          Local control on the geometry in 3D Ricci flow. (arXiv:1611.06137v2 [math.DG] UPDATED)   

Authors: Miles Simon, Peter M. Topping

The geometry of a ball within a Riemannian manifold is coarsely controlled if it has a lower bound on its Ricci curvature and a positive lower bound on its volume. We prove that such coarse local geometric control must persist for a definite amount of time under three-dimensional Ricci flow, and leads to local C/t decay of the full curvature tensor, irrespective of what is happening beyond the local region.

As a by-product, our results generalise the Pseudolocality theorem of Perelman and Tian-Wang in this dimension by not requiring the Ricci curvature to be almost-positive, and not asking the volume growth to be almost-Euclidean.


          Spin Chains and Gustafson's Integrals. (arXiv:1611.09593v2 [math-ph] UPDATED)   

Authors: S.E. Derkachov, A.N. Manashov

Gustafson's integrals are multidimensional generalizations of the classical Mellin-Barnes integrals. We show that some of these integrals arise from relations between matrix elements in Sklyanin's representation of Separated Variables in spin chain models. We also present several new integrals.


          Compressive Sensing for Millimeter Wave Antenna Array Diagnosis. (arXiv:1612.06345v3 [cs.IT] UPDATED)   

Authors: Mohammed E. Eltayeb, Tareq Y. Al-Naffouri, Robert W. Heath Jr

The radiation pattern of an antenna array depends on the excitation weights and the geometry of the array. Due to wind and atmospheric conditions, outdoor millimeter wave antenna elements are subject to full or partial blockages from a plethora of particles like dirt, salt, ice, and water droplets. Handheld devices are also subject to blockages from random finger placement and/or finger prints. These blockages cause absorption and scattering to the signal incident on the array, and change the array geometry. This distorts the far-field radiation pattern of the array leading to an increase in the sidelobe level and decrease in gain. This paper studies the effects of blockages on the far-field radiation pattern of linear arrays and proposes two array diagnosis techniques for millimeter wave antenna arrays. The proposed techniques jointly estimate the locations of the blocked antennas and the induced attenuation and phase shifts. Numerical results show that the proposed techniques provide satisfactory results in terms of fault detection with reduced number of measurements (diagnosis time) provided that the number of blockages is small compared to the array size.


          Spectra of large time-lagged correlation matrices from Random Matrix Theory. (arXiv:1612.06552v2 [math-ph] UPDATED)   

Authors: Maciej A. Nowak, Wojciech Tarnowski

We analyze the spectral properties of large, time-lagged correlation matrices using the tools of random matrix theory. We compare predictions of the one-dimensional spectra, based on approaches already proposed in the literature. Employing the methods of free random variables and diagrammatic techniques, we solve a general random matrix problem, namely the spectrum of a matrix $\frac{1}{T}XAX^{\dagger}$, where $X$ is an $N\times T$ Gaussian random matrix and $A$ is \textit{any} $T\times T$, not necessarily symmetric (Hermitian) matrix. As a particular application, we present the spectral features of the large lagged correlation matrices as a function of the depth of the time-lag. We also analyze the properties of left and right eigenvector correlations for the time-lagged matrices. We positively verify our results by the numerical simulations.


          Brouwer and Cardinalities. (arXiv:1612.06606v2 [math.LO] UPDATED)   

Authors: Klaas Pieter Hart

This paper discusses a paper by L. E. J. Brouwer on possible cardinalities of subsets of the continuum.


          Yang-Baxter deformations of $W_{2,4}\times T^{1,1}$ and the associated T-dual models. (arXiv:1612.08615v4 [hep-th] UPDATED)   

Authors: Jun-ichi Sakamoto, Kentaroh Yoshida

Recently, for principal chiral models and symmetric coset sigma models, Hoare and Tseytlin proposed an interesting conjecture that the Yang-Baxter deformations with the homogeneous classical Yang-Baxter equation are equivalent to non-abelian T-dualities with topological terms. It is significant to examine this conjecture for non-symmetric (i.e., non-integrable) cases. Such an example is the $W_{2,4}\times T^{1,1}$ background. In this note, we study Yang-Baxter deformations of type IIB string theory defined on $W_{2,4}\times T^{1,1}$ and the associated T-dual models, and show that this conjecture is valid even for this case. Our result indicates that the conjecture would be valid beyond integrability.


          Birational geometry of foliations associated to simple derivations. (arXiv:1701.00790v2 [math.AG] UPDATED)   

Authors: Gael Cousin, Luis Gustavo Mendes, Ivan Pan

We propose a study of the foliations of the projective plane induced by simple derivations of the polynomial ring in two indeterminates over the complex field. These correspond to foliations which have no invariant algebraic curve nor singularities in the complement of a line. We establish the position of these foliations in the birational classification of foliations and prove the finiteness of their birational symmetries. Most of the results apply to wider classes of foliations.


          On the n-th row of the graded Betti table of an n-dimensional toric variety. (arXiv:1701.01393v4 [math.AC] UPDATED)   

Authors: Alexander Lemmens

We prove an explicit formula for the first non-zero entry in the n-th row of the graded Betti table of an n-dimensional projective toric variety associated to a normal polytope with at least one interior lattice point. This applies to Veronese embeddings of projective space where we prove a special case of a conjecture of Ein and Lazarsfeld. We also prove an explicit formula for the entire n-th row when the interior of the polytope is one-dimensional. All results are valid over an arbitrary field k.


          The independent set sequence of some families of trees. (arXiv:1701.02204v3 [math.CO] UPDATED)   

Authors: David Galvin, Justin Hilyard

For a tree $T$, let $i_T(t)$ be the number of independent sets of size $t$ in $T$. It is an open question, raised by Alavi, Malde, Schwenk and Erd\H{o}s, whether the sequence $(i_T(t))_{t \geq 0}$ is always unimodal. Here we answer the question in the affirmative for some recursively defined families of trees, specifically paths with auxiliary trees dropped from the vertices in a periodic manner. In particular, extending a result of Wang and B.-X. Zhu, we show unimodality of the independent set sequence of a path on $2n$ vertices with $\ell_1$ and $\ell_2$ pendant edges dropped alternately from the vertices of the path, $\ell_1, \ell_2$ arbitrary.

We also show that the independent set sequence of any tree becomes unimodal if sufficiently many pendant edges are dropped from any single vertex, or if $k$ pendant edges are dropped from every vertex, for sufficiently large $k$. This in particular implies the unimodality of the independent set sequence of some non-periodic caterpillars.


          Cross-connections of linear transformation semigroup. (arXiv:1701.06098v3 [math.RA] UPDATED)   

Authors: P. A. Azeef Muhammed

Cross-connection theory developed by Nambooripad is the construction of a semigroup from its principal left (right) ideals using categories. We briefly describe the general cross-connection theory for regular semigroups and use it to study the {normal categories} arising from the semigroup $Sing(V)$ of singular linear transformations on an arbitrary vectorspace $V$ over a field $K$. There is an inbuilt notion of duality in the cross-connection theory, and we observe that it coincides with the conventional algebraic duality of vector spaces. We describe various cross-connections between these categories and show that although there are many cross-connections, upto isomorphism, we have only one semigroup arising from these categories. But if we restrict the categories suitably, we can construct some interesting subsemigroups of the {variant} of the linear transformation semigroup.


          Characterizations of idempotent discrete uninorms. (arXiv:1701.07253v2 [math.RA] UPDATED)   

Authors: Miguel Couceiro, Jimmy Devillet, Jean-Luc Marichal

In this paper we provide an axiomatic characterization of the idempotent discrete uninorms by means of three conditions only: conservativeness, symmetry, and nondecreasing monotonicity. We also provide an alternative characterization involving the bisymmetry property. Finally, we provide a graphical characterization of these operations in terms of their contour plots, and we mention a few open questions for further research.


          On high-order conservative finite element methods. (arXiv:1701.08855v2 [math.NA] UPDATED)   

Authors: Eduardo Abreu, Ciro Diaz, Juan Galvis, Marcus Sarkis

A new high-order conservative finite element method for Darcy flow is presented. The key ingredient in the formulation is a volumetric, residual-based, based on Lagrange multipliers in order to impose conservation of mass that does not involve any mesh dependent parameters. We obtain a method with high-order convergence properties with locally conservative fluxes. Furthermore, our approach can be straightforwardly extended to three dimensions. It is also applicable to highly heterogeneous problems where high-order approximation is preferred.


          On a model of associative memory with huge storage capacity. (arXiv:1702.01929v2 [math.PR] UPDATED)   

Authors: Mete Demircigil, Judith Heusel, Matthias Löwe, Sven Upgang, Franck Vermet

In [7] Krotov and Hopfield suggest a generalized version of the well-known Hopfield model of associative memory. In their version they consider a polynomial interaction function and claim that this increases the storage capacity of the model. We prove this claim and take the "limit" as the degree of the polynomial becomes infinite, i.e. an exponential interaction function. With this interaction we prove that model has an exponential storage capacity in the number of neurons, yet the basins of attraction are almost as large as in the standard Hopfield model.


          Equivariant Morse theory for the norm-square of a moment map on a variety. (arXiv:1702.05223v2 [math.SG] UPDATED)   

Authors: Graeme Wilkin

We show that the main theorem of Morse theory holds for a large class of functions on singular spaces. The function must satisfy certain conditions extending the usual requirements on a manifold that Condition C holds and the gradient flow around the critical sets is well-behaved, and the singular space must satisfy a local deformation retract condition. We then show that these conditions are satisfied when the function is the norm-square of a moment map on an affine variety, and that the homotopy equivalence from this theorem is equivariant with respect to the associated Hamiltonian group action. An important special case of these results is that the main theorem of Morse theory holds for the norm square of a moment map on the space of representations of a finite quiver with relations.


          Massive MIMO Pilot Decontamination and Channel Interpolation via Wideband Sparse Channel Estimation. (arXiv:1702.07207v2 [cs.IT] UPDATED)   

Authors: Saeid Haghighatshoar, Giuseppe Caire

We consider a massive MIMO system based on Time Division Duplexing (TDD) and channel reciprocity, where the base stations (BSs) learn the channel vectors of their users via the pilots transmitted by the users in the uplink (UL). It is well-known that, in the limit of very large number of BS antennas, the system performance is limited by pilot contamination, due to the fact that the same set of orthogonal pilots is reused in multiple cells. In this paper, we propose a low-complexity algorithm that uses the received UL wideband pilot snapshots in an observation window comprising several coherence blocks (CBs) to obtain an estimate of the angle-delay Power Spread Function (PSF) of the received signal. This is generally given by the sum of the angle-delay PSF of the desired user and the angle-delay PSFs of the copilot users (CPUs), i.e., the users re-using the same pilot dimensions in other cells/sectors. We propose supervised and unsupervised clustering algorithms to decompose the estimated PSF and isolate the part corresponding to the desired user only. We use this decomposition to obtain an estimate of the covariance matrix of the user wideband channel vector, which we exploit to decontaminate the desired user channel estimate by applying Minimum Mean Squared Error (MMSE) smoothing filter, i.e., the optimal channel interpolator in the MMSE sense. We also propose an effective low-complexity approximation/implementation of this smoothing filter. We use numerical simulations to assess the performance of our proposed method, and compare it with other recently proposed schemes that use the same idea of separability of users in the angle-delay domain.


          Algorithmic Chaining and the Role of Partial Feedback in Online Nonparametric Learning. (arXiv:1702.08211v2 [stat.ML] UPDATED)   

Authors: Nicolò Cesa-Bianchi, Pierre Gaillard (SIERRA), Claudio Gentile, Sébastien Gerchinovitz (IMT)

We investigate contextual online learning with nonparametric (Lipschitz) comparison classes under different assumptions on losses and feedback information. For full information feedback and Lipschitz losses, we design the first explicit algorithm achieving the minimax regret rate (up to log factors). In a partial feedback model motivated by second-price auctions, we obtain algorithms for Lipschitz and semi-Lipschitz losses with regret bounds improving on the known bounds for standard bandit feedback. Our analysis combines novel results for contextual second-price auctions with a novel algorithmic approach based on chaining. When the context space is Euclidean, our chaining approach is efficient and delivers an even better regret bound.


          An Optimization Framework with Flexible Inexact Inner Iterations for Nonconvex and Nonsmooth Programming. (arXiv:1702.08627v3 [cs.CV] UPDATED)   

Authors: Yiyang Wang, Risheng Liu, Xiaoliang Song, Zhixun Su

In recent years, numerous vision and learning tasks have been (re)formulated as nonconvex and nonsmooth programmings(NNPs). Although some algorithms have been proposed for particular problems, designing fast and flexible optimization schemes with theoretical guarantee is a challenging task for general NNPs. It has been investigated that performing inexact inner iterations often benefit to special applications case by case, but their convergence behaviors are still unclear. Motivated by these practical experiences, this paper designs a novel algorithmic framework, named inexact proximal alternating direction method (IPAD) for solving general NNPs. We demonstrate that any numerical algorithms can be incorporated into IPAD for solving subproblems and the convergence of the resulting hybrid schemes can be consistently guaranteed by a series of simple error conditions. Beyond the guarantee in theory, numerical experiments on both synthesized and real-world data further demonstrate the superiority and flexibility of our IPAD framework for practical use.


          Cross-connections and variants of the full transformation semigroup. (arXiv:1703.04139v2 [math.GR] UPDATED)   

Authors: P. A. Azeef Muhammed

Cross-connection theory propounded by K. S. S. Nambooripad describes the ideal structure of a regular semigroup using the categories of principal left (right) ideals. A variant $\mathscr{T}_X^\theta$ of the full transformation semigroup $(\mathscr{T}_X,\cdot)$ for an arbitrary $\theta \in \mathscr{T}_X$ is the semigroup $\mathscr{T}_X^\theta= (\mathscr{T}_X,\ast)$ with the binary operation $\alpha \ast \beta = \alpha\cdot\theta\cdot\beta$ where $\alpha, \beta \in \mathscr{T}_X$. In this article, we describe the ideal structure of the regular part $Reg(\mathscr{T}_X^\theta)$ of the variant of the full transformation semigroup using cross-connections. We characterize the constituent categories of $Reg(\mathscr{T}_X^\theta)$ and describe how they are \emph{cross-connected} by a functor induced by the sandwich transformation $\theta$. This lead us to a structure theorem for the semigroup and give the representation of $Reg(\mathscr{T}_X^\theta)$ as a cross-connection semigroup. Using this, we give a description of the biordered set and the sandwich sets of the semigroup.


          Shift-Coupling of Random Rooted Graphs and Networks. (arXiv:1703.06619v3 [math.PR] UPDATED)   

Authors: Ali Khezeli

In this paper, we present a result similar to the shift-coupling result of Thorisson (1996) in the context of random graphs and networks. The result is that a given random rooted network can be obtained by changing the root of another given one if and only if the distributions of the two agree on the invariant sigma-field. Several applications of the result are presented for the case of unimodular networks. In particular, it is shown that the distribution of a unimodular network is uniquely determined by its restriction to the invariant sigma-filed. Also, the theorem is applied to the existence of an invariant transport kernel that balances between two given (discrete) measures on the vertices. An application is the existence of a so called extra head scheme for the Bernoulli process on an infinite unimodular graph. Moreover, a construction is presented for balancing transport kernels that is a generalization of the Gale-Shapley stable matching algorithm in bipartite graphs. Another application is on a general method that covers the situations where some vertices and edges are added to a unimodular network and then, to make it unimodular, the probability measure is biased and then a new root is selected. It is proved that this method provides all possible unimodularizations in these situations. Finally, analogous existing results for stationary point processes and unimodular networks are discussed in detail.


          On the stabilized symplectic embedding problem for ellipsoids. (arXiv:1703.07838v2 [math.SG] UPDATED)   

Authors: Dusa McDuff

This note constructs sharp obstructions for stabilized symplectic embeddings of an ellipsoid into a ball, in the case when the initial four-dimensional ellipsoid has `eccentricity' of the form 3n-1 for some integer n.


          Superintegrable models on riemannian surfaces of revolution with integrals of any integer degree (I). (arXiv:1703.10870v2 [math-ph] UPDATED)   

Authors: Valent Galliano

We present a family of superintegrable (SI) sytems living on a riemannian surface of revolution and which exhibits one linear integral and two integrals of any integer degree larger or equal to 2 in the momenta. When this degree is 2 one recovers a metric due to Koenigs. The local structure of these systems is under control of a linear ordinary differential equation of order n which is homogeneous for even integrals and weakly inhomogeneous for odd integrals. The form of the integrals is explicitly given in the so-called simple case (see definition 2). Some globally defined examples are worked out which live either in H2 or in R2.


          Common framework and quadratic Bethe equations for rational Gaudin magnets in arbitrarily oriented magnetic fields. (arXiv:1704.01873v2 [math-ph] UPDATED)   

Authors: Alexandre Faribault, Hugo Tschirhart

In this work we demonstrate a simple way to implement the quantum inverse scattering method to find eigenstates of spin-1/2 XXX Gaudin magnets in an arbitrarily oriented magnetic field. The procedure differs vastly from the most natural approach which would be to simply orient the spin quantisation axis in the same direction as the magnetic field through an appropriate rotation. Instead, we define a modified realisation of the rational Gaudin algebra and use the quantum inverse scattering method which allows us, within a slightly modified implementation, to build an algebraic Bethe ansatz using the same unrotated reference state (pseudovacuum) for any external field. This common framework allows us to easily write determinant expressions for certain scalar products which would be highly non-trivial in the rotated system approach.


          Upper estimates of Christoffel function on convex domains. (arXiv:1704.03025v2 [math.CA] UPDATED)   

Authors: A. Prymak

New upper bounds on the pointwise behaviour of Christoffel function on convex domains in ${\mathbb{R}}^d$ are obtained. These estimates are established by explicitly constructing the corresponding "needle"-like algebraic polynomials having small integral norm on the domain, and are stated in terms of few easy-to-measure geometric characteristics of the location of the point of interest in the domain. Sharpness of the results is shown and examples of applications are given.


          Limited range multilinear extrapolation with applications to the bilinear Hilbert transform. (arXiv:1704.06833v2 [math.CA] UPDATED)   

Authors: David Cruz-Uribe, José María Martell

We prove a limited range, off-diagonal extrapolation theorem that generalizes a number of results in the theory of Rubio de Francia extrapolation, and use this to prove a limited range, multilinear extrapolation theorem. We give two applications of this result to the bilinear Hilbert transform. First, we give sufficient conditions on a pair of weights $w_1,\,w_2$ for the bilinear Hilbert transform to satisfy weighted norm inequalities of the form \[ BH : L^{p_1}(w_1^{p_1}) \times L^{p_2}(w_2^{p_2}) \longrightarrow L^p(w^p), \] where $w=w_1w_2$ and $\frac{1}{p}=\frac{1}{p_1}+\frac{1}{p_2}<\frac{3}{2}$. This improves the recent results of Culiuc et al. by increasing the families of weights for which this inequality holds and by pushing the lower bound on $p$ from $1$ down to $\frac{2}{3}$, the critical index from the unweighted theory of the bilinear Hilbert transform. Second, as an easy consequence of our method we obtain that the bilinear Hilbert transform satisfies some vector-valued inequalities with Muckenhoupt weights. This reproves and generalizes some of the vector-valued estimates obtained by Benea and Muscalu in the unweighted case. We also generalize recent results of Carando, et al. on Marcinkiewicz-Zygmund estimates for multilinear Calder\'on-Zygmund operators.


          Singular MASAs in type III factors and Connes' Bicentralizer Property. (arXiv:1704.07255v3 [math.OA] UPDATED)   

Authors: Cyril Houdayer, Sorin Popa

We show that any type ${\rm III_1}$ factor with separable predual satisfying Connes' Bicentralizer Property (CBP) has a singular maximal abelian $\ast$-subalgebra that is the range of a normal conditional expectation. We also investigate stability properties of CBP under finite index extensions/restrictions of type ${\rm III_1}$ factors.


          On the existence of 4-regular matchstick graphs. (arXiv:1705.00293v2 [math.CO] UPDATED)   

Authors: Mike Winkler, Peter Dinkelacker, Stefan Vogel

A matchstick graph is a planar unit-distance graph. That is a graph drawn with straight edges in the plane such that the edges have unit length, and non-adjacent edges do not intersect. We call a matchstick graph 4-regular if every vertex has only degree 4. Examples of 4-regular matchstick graphs with less than 63 vertices are only known for 52, 54, 57 and 60 vertices. It is shown that for all number of vertices $\geq63$ at least one example of a 4-regular matchstick graph exists.


          Stable Architectures for Deep Neural Networks. (arXiv:1705.03341v2 [cs.LG] UPDATED)   

Authors: Eldad Haber, Lars Ruthotto

Deep neural networks have become invaluable tools for supervised machine learning, e.g., classification of text or images. While often offering superior results over traditional techniques and successfully expressing complicated patterns in data, deep architectures are known to be challenging to design and train such that they generalize well to new data. Important issues with deep architectures are numerical instabilities in derivative-based learning algorithms commonly called exploding or vanishing gradients. In this paper we propose new forward propagation techniques inspired by systems of Ordinary Differential Equations (ODE) that overcome this challenge and lead to well-posed learning problems for arbitrarily deep networks.

The backbone of our approach is our interpretation of deep learning as a parameter estimation problem of nonlinear dynamical systems. Given this formulation, we analyze stability and well-posedness of deep learning and use this new understanding to develop new network architectures. We relate the exploding and vanishing gradient phenomenon to the stability of the discrete ODE and present several strategies for stabilizing deep learning for very deep networks. While our new architectures restrict the solution space, several numerical experiments show their competitiveness with state-of-the-art networks.


          A cyclic cocycle and relative index theorems on partitioned manifolds. (arXiv:1705.03732v2 [math.DG] UPDATED)   

Authors: Tatsuki Seto

In this paper, we extend Roe's cyclic $1$-cocycle to relative settings. We also prove two relative index theorems for partitioned manifolds by using its cyclic cocycle, which are generalizations of index theorems on partitioned manifolds. One of these theorems is a variant of [M. Karami-A.H.S. Sadegh-M.E. Zadeh, arXiv:1411.6090, Theorem 3.3].


          Semi-equivelar maps on the torus are Archimedean. (arXiv:1705.05236v2 [math.CO] UPDATED)   

Authors: Basudeb Datta, Dipendu Maity

If the face-cycles at all the vertices in a map on a surface are of same type then the map is called semi-equivelar. There are eleven types of Archimedean tilings on the plane. All the Archimedean tilings are semi-equivelar maps. If a map $X$ on the torus is a quotient of an Archimedean tiling on the plane then the map $X$ is semi-equivelar. We show that each semi-equivelar map on the torus is a quotient of an Archimedean tiling on the plane.

Vertex-transitive maps are semi-equivelar maps. We know that four types of semi-equivelar maps on the torus are always vertex-transitive and there are examples of other seven types of semi-equivelar maps which are not vertex-transitive. We show that the number of ${\rm Aut}(Y)$-orbits of vertices for any semi-equivelar map $Y$ on the torus is at most six. In fact, the number of orbits is at most three except one type of semi-equivelar maps. Our bounds on the number of orbits are sharp.


          Partitions into thin sets or forgotten theorems of Kunugi and Lusin-Novikov. (arXiv:1705.06194v3 [math.HO] UPDATED)   

Authors: Edward Grzegorek, Iwo Labuda

Let $f$ be a function from a metric space $Y$ to a separable metric space $X$. If $f$ has the Baire property, then it is continuous apart a 1st category set. In 1935, Kuratowski asked whether the separability requirement could be lifted. A full scale attack on the problem took place in the late seventies and early eighties. What was not known then, and what remains virtually unknown today, is the fact that the first impressive attempt to solve the Kuratowski problem, due to Kinjiro Kunugi and based on a theorem of Lusin and Novikov, took place already in 1936. Lusin's remarkable 1934 Comptes Rendus note soon forgotten, remained unnoticed to this day. We analyze both papers and bring the results to full light.


          On the Whittaker Plancherel Theorem for Real Reductive Groups. (arXiv:1705.06787v2 [math.RT] UPDATED)   

Authors: Nolan R. Wallach

Van den Ban and Kuit have found a serious error in a key lemma in the proof of the Whittaker Plancherel theorem. One purpose of this article is to fix the aspects of the proof of the theorem that are affected by the error, thereby giving the first full proof of the theorem. The other is to give an exposition of the structure of proof of the Whittaker Plancherel theorem and, thereby, of the proof of Harish-Chandra Plancherel theorem.


          Self-injective cellular algebras of polynomial growth representation type. (arXiv:1705.08048v2 [math.RT] UPDATED)   

Authors: Susumu Ariki, Ryoichi Kase, Kengo Miyamoto, Kentaro Wada

We classify Morita equivalence classes of indecomposable self-injective cellular algebras which have polynomial growth representation type, assuming that the base field has an odd characteristic. This assumption on the characteristic is for the cellularity to be a Morita invariant property.


          Convolution estimates and the number of disjoint partitions. (arXiv:1705.08529v2 [math.AP] UPDATED)   

Authors: Paata Ivanisvili

Let $X$ be a finite collection of sets. We count the number of ways a disjoint union of $n-1$ subsets in $X$ is a set in $X$, and estimate this number from above by $|X|^{c(n)}$ where $$ c(n)=\left(1-\frac{(n-1)\ln (n-1)}{n\ln n} \right)^{-1}. $$ This extends the recent result of Kane-Tao, corresponding to the case $n=3$ where $c(3)\approx 1.725$, to an arbitrary finite number of disjoint $n-1$ partitions.


          Stopping time convergence for processes associated with Dirichlet forms. (arXiv:1705.09876v2 [math.PR] UPDATED)   

Authors: J.R. Baxter, M. Nielsen Hernandez

Convergence is proved for solutions of Dirichlet problems in regions with many small excluded sets (holes), as the holes become smaller and more numerous. The problem is formulated in the context of Markov processes associated with general Dirichlet forms, for random and nonrandom excluded sets. Sufficient conditions are given under which the sequence of entrance times or hitting times of the excluded sets converges in the stable topology. Convergence in the stable topology is a strengthened form of convergence in distribution, introduced by Renyi. Stable convergence of the entrance times implies convergence of the solutions of the corresponding Dirichlet problems. Some additional results are given in a supplement on random center models.


          Local Large Deviations: McMillian Theorem for multitype Galton-Watson Processes. (arXiv:1705.09967v2 [cs.IT] UPDATED)   

Authors: Kwabena Doku-Amponsah

In this article we prove a local large deviation principle (LLDP) for the critical multitype Galton-Watson process from spectral potential point. We define the so-called a spectral potential $U_{\skrik}(\,\cdot,\,\pi)$ for the Galton-Watson process, where $\pi$ is the normalized eigen vector corresponding to the leading \emph{Perron-Frobenius eigen value } $\1$ of the transition matrix $\skria(\cdot,\,\cdot)$ defined from ${\skrik},$ the transition kernel. We show that the Kullback action or the deviation function, $J(\pi,\rho),$ with respect to an empirical offspring measure, $\rho,$ is the Legendre dual of $U_{\skrik}(\,\cdot,\,\pi).$ From the LLDP we deduce a conditional large deviation principle and a weak variant of the classical McMillian Theorem for the multitype Galton-Watson process. To be specific, given any empirical offspring measure $\varpi,$ we show that the number of critical multitype Galton-Watson processes on $n$ vertices is approximately $e^{n\langle \skrih_{\varpi},\,\pi\rangle},$ where $\skrih_{\varpi}$ is a suitably defined entropy.


          Categorically closed topological groups. (arXiv:1705.10127v7 [math.GN] UPDATED)   

Authors: Taras Banakh

Let $\mathcal C$ be a subcategory of the category of topologized semigroups and their partial continuous homomorphisms. An object $X$ of the category ${\mathcal C}$ is called ${\mathcal C}$-closed if for each morphism $f:X\to Y$ of the category ${\mathcal C}$ the image $f(X)$ is closed in $Y$. In the paper we detect topological groups which are $\mathcal C$-closed for the categories $\mathcal C$ whose objects are Hausdorff topological (semi)groups and whose morphisms are isomorphic topological embeddings, injective continuous homomorphisms, continuous homomorphisms, or partial continuous homomorphisms with closed domain.


          General Bounds for Incremental Maximization. (arXiv:1705.10253v2 [cs.DM] UPDATED)   

Authors: Aaron Bernstein, Yann Disser, Martin Groß

We propose a theoretical framework to capture incremental solutions to cardinality constrained maximization problems. The defining characteristic of our framework is that the cardinality/support of the solution is bounded by a value $k\in\mathbb{N}$ that grows over time, and we allow the solution to be extended one element at a time. We investigate the best-possible competitive ratio of such an incremental solution, i.e., the worst ratio over all $k$ between the incremental solution after $k$ steps and an optimum solution of cardinality $k$. We define a large class of problems that contains many important cardinality constrained maximization problems like maximum matching, knapsack, and packing/covering problems. We provide a general $2.618$-competitive incremental algorithm for this class of problems, and show that no algorithm can have competitive ratio below $2.18$ in general.

In the second part of the paper, we focus on the inherently incremental greedy algorithm that increases the objective value as much as possible in each step. This algorithm is known to be $1.58$-competitive for submodular objective functions, but it has unbounded competitive ratio for the class of incremental problems mentioned above. We define a relaxed submodularity condition for the objective function, capturing problems like maximum (weighted) ($b$-)matching and a variant of the maximum flow problem. We show that the greedy algorithm has competitive ratio (exactly) $2.313$ for the class of problems that satisfy this relaxed submodularity condition.

Note that our upper bounds on the competitive ratios translate to approximation ratios for the underlying cardinality constrained problems.


          On the set of principal congruences in a distributive congruence lattice of an algebra. (arXiv:1705.10833v3 [math.RA] UPDATED)   

Authors: Gábor Czédli

Let $Q$ be a subset of a finite distributive lattice $D$. An algebra $A$ represents the inclusion $Q\subseteq D$ by principal congruences if the congruence lattice of $A$ is isomorphic to $D$ and the ordered set of principal congruences of $A$ corresponds to $Q$ under this isomorphism. If there is such an algebra for every subset $Q$ containing $0$, $1$, and all join-irreducible elements of $D$, then $D$ is said to be fully (A1)-representable. We prove that every fully (A1)-representable finite distributive lattice is planar and it has at most one join-reducible coatom. Conversely, we prove that every finite planar distributive lattice with at most one join-reducible coatom is fully chain-representable in the sense of a recent paper of G. Gr\"atzer. Combining the results of this paper with another paper by the present author, it follows that every fully (A1)-representable finite distributive lattice is "fully representable" even by principal congruences of finite lattices. Finally, we prove that every chain-representable inclusion $Q\subseteq D$ can be represented by the principal congruences of a finite (and quite small) algebra.


          Optimality conditions for minimizers at infinity in polynomial programming. (arXiv:1706.00234v2 [math.OC] UPDATED)   

Authors: Tien-Son Pham

In this paper we study necessary optimality conditions for the optimization problem $$\textrm{infimum}f_0(x) \quad \textrm{ subject to } \quad x \in S,$$ where $f_0 \colon \mathbb{R}^n \rightarrow \mathbb{R}$ is a polynomial function and $S \subset \mathbb{R}^n$ is a set defined by polynomial inequalities. Assume that the problem is bounded below and has the Mangasarian--Fromovitz property at infinity. We first show that if the problem does {\em not} have an optimal solution, then a version at infinity of the Fritz-John optimality conditions holds. From this we derive a version at infinity of the Karush--Kuhn--Tucker optimality conditions. As applications, we obtain a Frank--Wolfe type theorem which states that the optimal solution set of the problem is nonempty provided the objective function $f_0$ is convenient. Finally, in the unconstrained case, we show that the optimal value of the problem is the smallest critical value of some polynomial. All the results are presented in terms of the Newton polyhedra of the polynomials defining the problem.


          Algebras of generalised dihedral type. (arXiv:1706.00688v2 [math.RT] UPDATED)   

Authors: Karin Erdmann, Andrzej Skowroński

We provide a complete classification of all algebras of generalised dihedral type. These are natural generalisations of algebras which occurred in the study of blocks with dihedral defect groups. We prove that these algebras are (up to socle equivalence) idempotent algebras of the biserial weighted surface algebras of triangulated surfaces with arbitrarily oriented triangles.


          An HMM--ELLAM scheme on generic polygonal meshes for miscible incompressible flows in porous media. (arXiv:1706.02452v2 [math.NA] UPDATED)   

Authors: Hanz Martin Cheng, Jerome Droniou

We design a numerical approximation of a system of partial differential equations modelling the miscible displacement of a fluid by another in a porous medium. The advective part of the system is discretised using a characteristic method, and the diffusive parts by a finite volume method. The scheme is applicabile on generic (possibly non-conforming) meshes as encountered in applications. The main features of our work are the reconstruction of a Darcy velocity, from the discrete pressure fluxes, that enjoys a local consistency property, an analysis of implementation issues faced when tracking, via the characteristic method, distorted cells, and a new treatment of cells near the injection well that accounts better for the conservativity of the injected fluid.


          The Dirac-Frenkel Principle for Reduced Density Matrices, and the Bogoliubov-de-Gennes Equations. (arXiv:1706.03082v2 [math-ph] UPDATED)   

Authors: Niels Benedikter, Jérémy Sok, Jan Philip Solovej

The derivation of effective evolution equations is central to the study of non-stationary quantum many-body sytems, and widely used in contexts such as superconductivity, nuclear physics, Bose-Einstein condensation and quantum chemistry. We reformulate the Dirac-Frenkel approximation principle in terms of reduced density matrices, and apply it to fermionic and bosonic many-body systems. We obtain the Bogoliubov-de-Gennes and Hartree-Fock-Bogoliubov equations, respectively. While we do not prove quantitative error estimates, our formulation does show that the approximation is optimal within the class of quasifree states. Furthermore, we prove well-posedness of the Bogoliubov-de-Gennes equations in energy space and discuss conserved quantities.


          Calder\'on-type inequalities for affine frames. (arXiv:1706.06518v2 [math.FA] UPDATED)   

Authors: Davide Barbieri, Eugenio Hernández, Azita Mayeli

We prove sharp upper and lower bounds for generalized Calder\'on's sums associated to frames on LCA groups generated by affine actions of cocompact subgroup translations and general measurable families of automorphisms. The proof makes use of techniques of analysis on metric spaces, and relies on a counting estimate of lattice points inside metric balls. We will deduce as special cases Calder\'on-type inequalities for families of expanding automorphisms as well as for LCA-Gabor systems.


          The gonality of complete intersection curves. (arXiv:1706.08169v2 [math.AG] UPDATED)   

Authors: James Hotchkiss, Brooke Ullery

We show that for a general complete intersection curve $C$ in projective space (other than a few exceptions), any branched covering $C \to \mathbb{P}^1$ of minimum degree is obtained by projection from a linear space. We also prove a special case of one of the well-known Cayley-Bacharach conjectures due to Eisenbud, Green, and Harris.


          Stability and Robust Regulation of Passive Linear Systems. (arXiv:1706.03224v1 [math.OC] CROSS LISTED)   

Authors: Lassi Paunonen

We study the stability of coupled impedance passive regular linear systems under power-preserving interconnections. We present new conditions for strong, exponential, and non-uniform stability of the closed-loop system. We apply the stability results to the construction of passive error feedback controllers for robust output tracking and disturbance rejection for strongly stabilizable passive systems. In the case of nonsmooth reference and disturbance signals we present conditions for non-uniform rational and logarithmic rates of convergence of the output. The results are illustrated with examples on designing controllers for linear wave and heat equations, and on studying the stability of a system of coupled partial differential equations.


          Hamiltonian MC on discrete spaces   
Following a lively discussion with Akihiko Nishimura during a BNP11 poster session last Tuesday, I took the opportunity of the flight to Montréal to read through the arXived paper (written jointly with David Dunson and Jianfeng Liu). The issue is thus one of handling discrete valued parameters in Hamiltonian Monte Carlo. The basic “trick” in […]
          Ученые: Луна с начала зарождения обладала необычайной атмосферой   
Об этом говорится в статье, расположенной в электронной библиотеке arXiv.org, сообщает Лента.ру. Американские ученые отыскали намеки на то, что когда-то на Луне была уникальная атмосфера, которую еще никто никогда не лицезрел. У нее была очень жестокая история жизни, схожая на «тяжелый металл», однако она, как и звездные группы, очень быстро распалась и завершила свое существование. К таким выводам пришли ученые из Центра космических полетов имени […]
          Second Paper: "Unifying Microscopic and Continuum Treatments of van der Waals and Casimir Interactions"   
My second paper has been published! It is in volume 118, issue 26 of Physical Review Letters, and an older preprint of it is available too for those who don't have access to academic journals (it has all of the same figures and ideas, though it is missing a few sentences of further explanation as well as a couple of new citations that were inserted for the final publication). As with my first paper, in the interest of explaining these ideas in a way that is easy to understand, I am using the ten hundred most used words in English (except for the two lines that came before this one), as put together from the XKCD Simple Writer. I will use numbers sometimes without completely writing them out, use words for certain names of things without explaining further, and explain less used words when they come up. Keep reading to see what comes next.

Read more »