## 信息流

• We investigate the problem of covert and secret key generation over a discrete memoryless channel model with one way public discussion and in presence of an active warden who can arbitrarily vary its channel and tamper with the main channel when an information symbol is sent. In this scenario, we develop an adaptive protocol that is required to conceal not only the key but also whether a protocol is being implemented. Based on the adversary's actions, this protocol generates a key whose size depends on the adversary's actions. Moreover, for a passive adversary and for some models that we identify, we show that covert secret key generation is possible and characterize the covert secret key capacity in special cases; in particular, the covert secret key capacity is sometimes equal to the covert capacity of the channel, so that secrecy comes for free.

收起

• Deep neural networks have become state-of-the-art technology for a wide range of practical machine learning tasks such as image classification, handwritten digit recognition, speech recognition, or game intelligence. This paper develops the fundamental limits of learning in deep neural networks by characterizing what is possible if no constraints on the learning algorithm and the amount of training data are imposed. Concretely, we consider information-theoretically optimal approximation through deep neural networks with the guiding theme being a relation between the complexity of the function (class) to be approximated and the complexity of the approximating network in terms of connectivity and memory requirements for storing the network topology and the associated quantized weights. The theory we develop educes remarkable universality properties of deep networks. Specifically, deep networks are optimal approximants for vastly different function classes such as affine systems and Gabor

收起

• The first main result of this article is to prove the convergence of Lott's delocalized eta invariant holds for all invertible operators. Our second main result is to construct a pairing between delocalized cyclic cocycles of the group algebra of the fundamental group of a manifold and K-theoretic higher rho invariants of the manifold, when the fundamental group is hyperbolic. As an application, under the assumption of hyperbolicity of the fundamental group, we compute the delocalized part of the Connes-Chern character of Atiyah-Patodi-Singer type K-theoretic higher indices, for example, the higher index of a spin manifold with boundary where the boundary carries a positive scalar curvature metric. Our explicit formula for this delocalized Connes-Chern character is expressed in terms of our pairing of delocalized cyclic cocycles and higher rho invariants on the boundary of manifold.

收起

• This paper presents a finite difference quasi-Newton method for the minimization of noisy functions. The method takes advantage of the scalability and power of BFGS updating, and employs an adaptive procedure for choosing the differencing interval $h$ based on the noise estimation techniques of Hamming (2012) and Mor\'e and Wild (2011). This noise estimation procedure and the selection of $h$ are inexpensive but not always accurate, and to prevent failures the algorithm incorporates a recovery mechanism that takes appropriate action in the case when the line search procedure is unable to produce an acceptable point. A novel convergence analysis is presented that considers the effect of a noisy line search procedure. Numerical experiments comparing the method to a function interpolating trust region method are presented.

收起

•   01-08 Hacker News 1297

收起

• The class ${\sf IV}_2$ of $2$-nondegenerate constant Levi rank $1$ hypersurfaces $M^5 \subset \mathbb{C}^3$ is governed by Pocchiola's two primary invariants $W_0$ and $J_0$. Their vanishing characterizes equivalence of such a hypersurface $M^5$ to the tube $M_{\sf LC}^5$ over the real light cone in $\mathbb{R}^3$. When either $W_0 \not\equiv 0$ or $J_0 \not\equiv 0$, by normalization of certain two group parameters ${\sf c}$ and ${\sf e}$, an invariant coframe can be built on $M^5$, showing that the dimension of the CR automorphism group drops from $10$ to $5$. This paper constructs an explicit $\{e\}$-structure in case $W_0$ and $J_0$ do not necessarily vanish. Furthermore, Pocchiola's calculations hidden on a computer now appear in details, especially the determination of a secondary invariant $R$, expressed in terms of the first jet of $W_0$. All other secondary invariants of the $\{e\}$-structure are also expressed explicitly in terms of $W_0$ and $J_0$.

收起

• Distributed change-point detection has been a fundamental problem when performing real-time monitoring using sensor-networks. We propose a distributed detection algorithm, where each sensor only exchanges CUSUM statistic with their neighbors based on the average consensus scheme, and an alarm is raised when local consensus statistic exceeds a pre-specified global threshold. We provide theoretical performance bounds showing that the performance of the fully distributed scheme can match the centralized algorithms under some mild conditions. Numerical experiments demonstrate the good performance of the algorithm especially in detecting asynchronous changes.

收起

• Distributionally robust optimization (DRO) has been introduced for solving stochastic programs where the distribution of the random parameters is unknown and must be estimated by samples from that distribution. A key element of DRO is the construction of the ambiguity set, which is a set of distributions that covers the true distribution with a high probability. Assuming that the true distribution has a probability density function, we propose a class of ambiguity sets based on confidence bands of the true density function. The use of the confidence band enables us to take the prior knowledge of the shape of the underlying density function into consideration (e.g., unimodality or monotonicity). Using the confidence band constructed by density estimation techniques as the ambiguity set, we establish the convergence of the optimal value of DRO to that of the stochastic program as the sample size increases. However, the resulting DRO problem is computationally intractable, as it involves

收起

• We propose a family of stochastic volatility models that enable direct estimation of time-varying extreme event probabilities in time series with nonlinear dependence and power law tails. The models are a white noise process with conditionally log-Laplace stochastic volatility. In contrast to other, similar stochastic volatility formalisms, this process has an explicit, closed-form expression for its conditional probability density function, which enables straightforward estimation of dynamically changing extreme event probabilities. The process and volatility are conditionally Pareto-tailed, with tail exponent given by the reciprocal of the log-volatility's mean absolute innovation. These models thus can accommodate conditional power law-tail behavior ranging from very weakly non-Gaussian to Cauchy-like tails. Closed-form expressions for the models' conditional polynomial moments also allows for volatility modeling. We provide a straightforward, probabilistic method-of-moments estimat

收起

• We address dissipative soliton formation in modulated PT-symmetric continuous waveguide arrays composed from waveguides with amplifying and absorbing sections, whose density gradually increases (due to decreasing waveguide separation) either towards the center of the array or towards its edges. In such a structure the level of gain/loss at which PT-symmetry gets broken depends on the direction of increase of the waveguide density. Breakup of the PT-symmetry occurs when eigenvalues of modes localized in the region, where waveguide density is largest, collide and move into complex plane. In this regime of broken symmetry the inclusion of focusing Kerr-type nonlinearity of the material and weak two-photon absorption allows to arrest the growth of amplitude of amplified modes and may lead to the appearance of stable attractors either in the center or at the edge of the waveguide array, depending on the type of array modulation. Such solitons can be stable, they acquire specific triangular

收起

• We investigate the number of permutations that occur in random labellings of trees. This is a generalisation of the number of subpermutations occurring in a random permutation. It also generalises some recent results on the number of inversions in randomly labelled trees. We consider complete binary trees as well as random split trees a large class of random trees of logarithmic height introduced by Devroye in 1998. Split trees consist of nodes (bags) which can contain balls and are generated by a random trickle down process of balls through the nodes. For complete binary trees we show that asymptotically the cumulants of the number of occurrences of a fixed permutation in the random node labelling have explicit formulas. Our other main theorem is to show that for a random split tree, with high probability the cumulants of the number of occurrences are asymptotically an explicit parameter of the split tree. For the proof of the second theorem we show some results on the number of embed

收起

• We are interested in the Guivarc'h inequality for admissible random walks on finitely generated relatively hyperbolic groups, endowed with a word metric. We show that for random walks with finite super-exponential moment, if this inequality is an equality, then the Green distance is roughly similar to the word distance, generalizing results of Blach{\e}re, Ha{\"i}ssinsky and Mathieu for hyperbolic groups [4]. Our main application is for relatively hy-perbolic groups with respect to virtually abelian subgroups of rank at least 2. We show that for such groups, the Guivarc'h inequality with respect to a word distance and a finitely supported random walk is always strict.

收起

• We provide a rigorous, explicit formula for the vacuum relative entropy of a coherent state on wedge local von Neumann algebras associated with a free, neutral quantum field theory on the Minkowski spacetime of arbitrary spacetime dimension. The second derivative under a null translation turns out to be manifestly non-negative being proportional to an energy contribution on the boundary.

收起

• In this paper, we construct a complete n-dim Riemannian manifold with positive Ricci curvature, quadratically nonnegatively curved infinity and infinite topological type. This gives a negative answer to a conjecture by Jiping Sha and Zhongmin Shen in the case of n greater than or equal to 6.

收起

• This paper studies the existence of extremal problems for the Hardy-Littlewood-Sobolev inequalities on compact manifolds without boundary via Concentration-Compactness principle.

收起

• Polynomial generalizations of all 130 of the identities in Slater's list of identities of the Rogers-Ramanujan type are presented. Furthermore, duality relationships among many of the identities are derived. Some of the these polynomial identities were previously known but many are new. The author has implemented much of the finitization process in a Maple package which is available for free download from the author's website.

收起

• A dozen tantalizing tech projects debuting this year

收起

• This is a sequel to the authors' article [BKO]. We consider a hyperbolic knot $K$ in a closed 3-manifold $M$ and the cotangent bundle of its complement $M \setminus K$. We equip a hyperbolic metric $h$ with $M \setminus K$ and the induced kinetic energy Hamiltonian $H_h = \frac{1}{2} |p|_h^2$ and Sasakian almost complex structure $J_h$ with the cotangent bundle $T^*(M \setminus K)$. We consider the conormal $\nu^*T$ of a horo-torus $T$, i.e., the cusp cross-section given by a level set of the Busemann function in the cusp end and maps $u: (\Sigma, \partial \Sigma) \to (T^*(M \setminus K), \nu^*T)$ converging to a \emph{non-constant} Hamiltonian chord of $H_h$ at each puncture of $\Sigma$, a boundary-punctured open Riemann surface of genus zero with boundary. We prove that all non-constant Hamiltonian chords are transversal and of Morse index 0 relative to the horo-torus $T$. As a consequence, we prove that $\widetilde{\mathfrak m}^k = 0$ unless $k \neq 2$ and an $A_\infty$-algebra asso

收起

• The general theory developed by Ben Yaacov for metric structures provides Fra\"iss\'e limits which are approximately ultrahomogeneous. We show here that this result can be strengthened in the case of relational metric structures. We give an extra condition that guarantees exact ultrahomogenous limits. The condition is quite general. We apply it to stochastic processes, the class of diversities, and its subclass of $L_1$ diversities.

收起

• We explain how to encode the essential data of a PDE on jet bundle into a more intrinsic object called Pfaffian bundle. We provide motivations to study this new notion and show how prolongations, integrability and linearisations of PDEs generalise to this setting.

收起

• Peng and Zhong (Acta Math Sci {\bf37B(1)}:69--78, 2017) introduced and studied a new subclass of analytic functions as follows: \begin{equation*} \Omega:=\left\{f\in \mathcal{A}:\left|zf'(z)-f(z)\right|<\frac{1}{2}, z\in \Delta\right\}, \end{equation*} where $\mathcal{A}$ is the class of analytic and normalized functions and $\Delta$ is the open unit disc on the complex plane. The class $\Omega$ is a subclass of the starlike univalent functions. In this paper, we obtain some new results for the class $\Omega$ and improve some results that earlier obtained by Peng and Zhong.

收起

•   01-08 Hacker News 1756

Gauss's Principle of Least Constraint

收起

• We give two general transformations that allows certain quite general basic hypergeometric multi-sums of arbitrary depth (sums that involve an arbitrary sequence $\{g(k)\}$), to be reduced to an infinite $q$-product times a single basic hypergeometric sum. Various applications are given, including summation formulae for some $q$ orthogonal polynomials, and various multi-sums that are expressible as infinite products.

收起

• For an arbitrary prime number $p$, we propose an action for bosonic $p$-adic strings in curved target spacetime, and show that the vacuum Einstein equations of the target are a consequence of worldsheet scaling symmetry of the quantum $p$-adic strings, similar to the ordinary bosonic strings case. It turns out that certain $p$-adic automorphic forms are the plane wave modes of the bosonic fields on $p$-adic strings, and that the regularized normalization of these modes on the $p$-adic worldsheet presents peculiar features which reduce part of the computations to familiar setups in quantum field theory, while also exhibiting some new features that make loop diagrams much simpler. Assuming a certain product relation, we also observe that the adelic spectrum of the bosonic string corresponds to the nontrivial zeros of the Riemann Zeta function.

收起

• We argue against Foreman's proposal to settle the continuum hypothesis and other classical independent questions via the adoption of generic large cardinal axioms.

收起

• Let $f$ be the infinitesimal generator of a one-parameter semigroup $\left\{ F_{t}\right\} _{t\ge0}$ of holomorphic self-mappings of the open unit disk $\Delta$. In this paper we study properties of the family $R$ of resolvents $(I+rf)^{-1}:\Delta\to\Delta~ (r\ge0)$ in the spirit of geometric function theory. We discovered, in particular, that $R$ forms an inverse L\"owner chain of hyperbolically convex functions. Moreover, each element of $R$ satisfies the Noshiro-Warschawski condition and is a starlike function of order at least $\frac12$,. This, in turn, implies that each element of $R$ is also a holomorphic generator. We mention also quasiconformal extension of an element of $R.$ Finally we study the existence of repelling fixed points of this family.

收起

• We study a natural generalization of inverse systems of finite regular covering spaces. A limit of such a system is a fibration whose fibres are profinite topological groups. However, as shown in a previous paper (Conner-Herfort-Pavesic: Some anomalous examples of lifting spaces), there are many fibrations whose fibres are profinite groups, which are far from being inverse limits of coverings. We characterize profinite fibrations among a large class of fibrations and relate the profinite topology on the fundamental group of the base with the action of the fundamental group on the fibre, and develop a version of the Borel construction for fibrations whose fibres are profinite groups.

收起

• We classify global bifurcations in generic one-parameter local families of \vfs on $S^2$ with a parabolic cycle. The classification is quite different from the classical results presented in monographs on the bifurcation theory. As a by product we prove that generic families described above are structurally stable.

收起

•   01-08 Hacker News 3874

Google’s Project Soli radar is sensitive enough to count sheets of paper

收起

• Google Drive has a pretty bad spam problem, and it seems Google doesn't care. Spammers can share files that automatically appear in your Drive, and there's no way to stop it. From a report: Google Drive's sharing system is the problem. Since it doesn't offer any sharing acceptance, all files and folders shared with your account are automatically available to you in Drive -- they just show up. To make matters worse, if you only have "View" permission, you can't remove yourself from the share. It's a mess. And to make matters even worse, this is far from a new problem, but Google still hasn't done anything to fix it. Google got back to us with a statement saying that changes are coming to Drive's sharing features and they're"making it a priority." Here's the statement in full: "For the vast majority of users, the default sharing permissions in Drive work as intended. Unfortunately, this was not the case for this user and we sincerely apologize for her experience. In light of this issue

收起

•   01-07 MIT Technology 2918

Particles that produce electrical signals when bombarded with ultrasound could be a way to direct a cell-killing treatment directly to tumors.

收起

• Why is Grindr being sued by Matthew Herrick, an aspiring actor working in a restaurant in New York? "His former partner created fake profiles on the app to impersonate Herrick and then direct men to show up at Herrick's home and the restaurant where he worked asking for sex, sometimes more than a dozen times per day." But 14 police reports later, Herrick's lawsuit is now arguing that all tech companies should face greater accountability for what happens on their platforms, reports NBC News: His lawsuit alleges that the software developers who write code for Grindr have been negligent, producing an app that's defective in its design and that is "fundamentally unsafe" and "unreasonably dangerous" -- echoing language that's more typically used in lawsuits about, say, a faulty kitchen appliance or a defective car part. If successful, the lawsuit could bring about a significant legal change to the risks tech companies face for what happens on their platforms, adding to growing public and p

收起

• We investigate a parabolic-elliptic system for maps $(u,v)$ from a compact Riemann surface $M$ into a Lorentzian manifold $N\times{\mathbb{R}}$ with a warped product metric. That system turns the harmonic map type equations into a parabolic system, but keeps the $v$-equation as a nonlinear second order constraint along the flow. We prove a global existence result of the parabolic-elliptic system by assuming either some geometric conditions on the target Lorentzian manifold or small energy of the initial maps. The result implies the existence of a Lorentzian harmonic map in a given homotopy class with fixed boundary data.

收起

• This paper presents a non-linear stability analysis for dc-microgrids in both, interconnected mode and island operation with primary control. The proposed analysis is based on the fact that the dynamical model of the grid is a gradient system generated by a strongly convex function. The stability analysis is thus reduced to a series of convex optimization problems. The proposed method allows to: i) demonstrate the existence and uniqueness of the equilibrium ii) calculate this equilibrium numerically iii) give conditions for global stability using a Lyapunov function iv) estimate the attraction region. Previous works only address one of these aspects. Numeric calculations performed in cvx and simulations results in Matlab complement the analysis and demonstrate how to use this theoretical results in practical problems.

收起

• A simple robot that does almost nothing

收起

•   01-03 MIT Technology 3003

Radar that can spot stealth aircraft and other quantum innovations could give their militaries a strategic edge.

收起

•   12-31 Hacker News 3583

Critical step found in DNA repair, cellular aging (2017)

收起

• A novel linear combination representation aided time-domain smooth signal design is proposed by continuity-enhanced basis signals for the N-continuous orthogonal frequency division multiplexing (NC-OFDM) system. Compared to the conventional NC-OFDM, the proposed scheme is capable of reducing the interference and maintaining the same sidelobe suppression performance imposed with the aid of two groups of basis signals assisted by the linear combination form. Our performance results demonstrate that with a low complexity overhead, the proposed scheme is capable of improving the error performance in comparison to the conventional NC-OFDM, while maintaining the same sidelobe suppression as the conventional counterpart.

收起

• We study the Yamabe flow on compact Riemannian manifolds of dimensions greater than two with minimal boundary. Convergence to a metric with constant scalar curvature and minimal boundary is established in dimensions up to seven, and in any dimensions if the manifold is spin.

收起

• It is known that Hochschild cohomology groups are represented by crossed extensions of associative algebras. In this paper, we introduce crossed $n$-fold extensions of a Lie algebra $\mathfrak{g}$ by a module $M$, for $n \geq 2$. The equivalence classes of such extensions are represented by the $(n+1)$-th Chevalley-Eilenberg cohomology group $H^{n+1}_{CE} (\mathfrak{g}, M).$

收起

• We establish a duality for two factorization questions, one for general positive definite (p.d) kernels $K$, and the other for Gaussian processes, say $V$. The latter notion, for Gaussian processes is stated via Ito-integration. Our approach to factorization for p.d. kernels is intuitively motivated by matrix factorizations, but in infinite dimensions, subtle measure theoretic issues must be addressed. Consider a given p.d. kernel $K$, presented as a covariance kernel for a Gaussian process $V$. We then give an explicit duality for these two seemingly different notions of factorization, for p.d. kernel $K$, vs for Gaussian process $V$. Our result is in the form of an explicit correspondence. It states that the analytic data which determine the variety of factorizations for $K$ is the exact same as that which yield factorizations for $V$. Examples and applications are included: point-processes, sampling schemes, constructive discretization, graph-Laplacians, and boundary-value problems.

收起

•   12-21 Hacker News 4058

Coal plant sued for exposing Orlando communities to Polonium and carcinogens

收起

•   12-21 Hacker News 4286

Comma2k19 – A dataset of over 33 hours of commute in California's 280 highway

收起

•   12-21 TechCrunch 4113

Corel confirms it has acquired virtualization specialist Parallels

收起

•   12-21 Slashdot 2282

The FBI has shut down the domains of 15 high-profile distributed denial-of-service (DDoS) websites. "Several seizure warrants granted by a California federal judge went into effect Thursday, removing several of these 'border' or 'stresser' sites off the internet 'as part of coordinated law enforcement action taken against illegal DDoS-for-hire services,'" reports TechCrunch. "The orders were granted under federal seizure laws, and the domains were replaced with a federal notice." From the report: Prosecutors have charged three men, Matthew Gatrel and Juan Martinez in California and David Bukoski in Alaska, with operating the sites, according to affidavits filed in three U.S. federal courts, which were unsealed Thursday. The FBI had assistance from the U.K.'s National Crime Agency and the Dutch national police, and the Justice Department named several companies, including Cloudflare, Flashpoint and Google, for providing authorities with additional assistance. In all, several sites were

收起

•   12-21 TechCrunch 4147

FBI kicks some of the worst ‘DDoS for hire’ sites off the internet

收起

•   12-21 Hacker News 4117

Facebook Is Developing a Cryptocurrency for WhatsApp Transfers, Sources Say

收起

•   12-21 Slashdot 4153

Videos and pictures of children being subjected to sexual abuse are being openly shared on Facebook's WhatsApp on a vast scale, with the encrypted messaging service failing to curb the problem despite banning thousands of accounts every day. From a report: Without the necessary number of human moderators, the disturbing content is slipping by WhatsApp's automated systems. A report reviewed by TechCrunch from two Israeli NGOs details how third-party apps for discovering WhatsApp groups include "Adult" sections that offer invite links to join rings of users trading images of child exploitation. TechCrunch has reviewed materials showing many of these groups are currently active. TechCrunch's investigation shows that Facebook could do more to police WhatsApp and remove this kind of content. Even without technical solutions that would require a weakening of encryption, WhatsApp's moderators should have been able to find these groups and put a stop to them. Groups with names like "child po

收起

•   12-21 Hacker News 2242

收起

•   12-21 OSnews 3154

A former Microsoft intern has revealed details of a YouTube incident that has convinced some Edge browser engineers that Google added code to purposely break compatibility. In a post on Hacker News, Joshua Bakita, a former software engineering intern at Microsoft, lays out details and claims about an incident earlier this year. Microsoft has since announced the company is moving from the EdgeHTML rendering engine to the open source Chromium project for its Edge browser. Google disputes Bakita's claims, and says the YouTube blank div was merely a bug that was fixed after it was reported. "YouTube does not add code designed to defeat optimizations in other browsers, and works quickly to fix bugs when they're discovered," says a YouTube spokesperson in a statement to The Verge. "We regularly engage with other browser vendors through standards bodies, the Web Platform Tests project, the open-source Chromium project and more to improve browser interoperability." While we're unli

收起

•   12-21 MIT Technology 4148

Effective resource allocation plays a pivotal role for performance optimization in wireless networks. Unfortunately, typical resource allocation problems are mixed-integer nonlinear programming (MINLP) problems, which are NP-hard in general. Machine learning-based methods recently emerge as a disruptive way to obtain near-optimal performance for MINLP problems with affordable computational complexity. However, a key challenge is that these methods require huge amounts of training samples, which are difficult to obtain in practice. Furthermore, they suffer from severe performance deterioration when the network parameters change, which commonly happens and can be characterized as the task mismatch issue. In this paper, to address the sample complexity issue, instead of directly learning the input-output mapping of a particular resource allocation algorithm, we propose a Learning to Optimize framework for Resource Allocation, called LORA, that learns the pruning policy in the optimal bran

收起

•   12-20 Slashdot 2293

Last night, Elon Musk unveiled his vision of a high-speed tunnel system he believes could ease congestion and revolutionize how millions of commuters get around cities. CNBC reports: Musk, who founded the Boring Co. two years ago after complaining that traffic in Los Angeles was driving him "nuts," says the demonstration tunnel cost approximately 10 million to complete. Engineers and workers have been boring the 1.14-mile-long tunnel underneath one of the main streets in Hawthorne, California. One end of the tunnel starts in a parking lot owned by Musk's Space X. The other end of the demonstration tunnel is in a neighborhood about a mile away in Hawthorne. Tuesday afternoon, the Boring Co. gave reporters demonstration rides through the tunnel in modified Tesla Model X SUVs, going between 40 and 50 miles per hour. Engineers have attached deployable alignment wheels to the two front wheels of the Model X. Those alignment wheels stick out to the side of the main wheels and act as a bumpe 收起 • 12-20 Hacker News 3878 Estimating Value of Facebook by Paying Users to Stop Using It 收起 • 12-20 Ars Technica 3934 New York Times report may have misinterpreted what “access” means. 收起 • The extension of persistent homology to multi-parameter setups is an algorithmic challenge. Since most computation tasks scale badly with the size of the input complex, an important pre-processing step consists of simplifying the input while maintaining the homological information. We present an algorithm that drastically reduces the size of an input. Our approach is an extension of the chunk algorithm for persistent homology (Bauer et al., Topological Methods in Data Analysis and Visualization III, 2014). We show that our construction produces the smallest multi-filtered chain complex among all the complexes quasi-isomorphic to the input, improving on the guarantees of previous work in the context of discrete Morse theory. Our algorithm also offers an immediate parallelization scheme in shared memory. Already its sequential version compares favorably with existing simplification schemes, as we show by experimental evaluation. 收起 • We show that the already known results for a composition operator to have closed range on H2 (Cima, Thomson, and Wogen (1974), Zorboska (1994)) can be extended to Hp for p>0 . 收起 • In this paper the relation between the cluster integrable systems andq$-difference equations is extended beyond the Painlev\'e case. We consider the class of hyperelliptic curves when the Newton polygons contain only four boundary points. The corresponding cluster integrable Toda systems are presented, and their discrete automorphisms are identified with certain reductions of the Hirota difference equation. We also construct non-autonomous versions of these equations and find that their solutions are expressed in terms of 5d Nekrasov functions with the Chern-Simons contributions, while in the autonomous case these equations are solved in terms of the Riemann theta-functions. 收起 • The exceptional simple Lie algebras of types E7 and E8 are endowed with optimal$SL_2^n$-structures, and are thus described in terms of the corresponding coordinate algebras. These are nonassociative algebras which much resemble the so called code algebras. 收起 • We introduce the notion of a symplectic capacity relative to a coisotropic submanifold of a symplectic manifold, and we construct two examples of such capacities through modifications of the Hofer-Zehnder capacity. As a consequence, we obtain a non-squeezing theorem for symplectic embeddings relative to coisotropic constraints and existence results for leafwise chords on energy surfaces. 收起 • We provide the missing member of a family of four$q$-series identities related to the modulus 36, the other members having been found by Ramanujan and Slater. We examine combinatorial implications of the identities in this family, and of some of the identities we considered in "Identities of the Ramanujan-Slater type related to the moduli 18 and 24," [\emph{J. Math. Anal. Appl.} \textbf{344}/2 (2008) 765--777]. 收起 • We describe two inversion methods for the reconstruction of hard X-ray solar images. The methods are tested against experimental visibilities recorded by the Reuven Ramaty High Energy Solar Spectroscopic Imager (RHESSI) and synthetic visibilities based on the design of the Spectrometer/Telescope for Imaging X-rays (STIX). 收起 • We describe an algorithm to compute bases of antisymmetric vector-valued cusp forms with rational Fourier coefficients for the Weil representation associated to a finite quadratic module. The forms we construct always span all cusp forms in weight at least three. These formulas are useful for computing explicitly with theta lifts. 收起 • The aim of this paper is to develop a constraint algorithm for singular classical field theories in the framework of$k$-cosymplectic geometry. Since these field theories are singular, we need to introduce the notion of$k$-precosymplectic structure, which is a generalization of the$k$-cosymplectic structure. Next$k$-precosymplectic Hamiltonian systems are introduced in order to describe singular field theories, both in Lagrangian and Hamiltonian formalisms. Finally, we develop a constraint algorithm in order to find a submanifold where the existence of solutions of the field equations is ensured. The case of affine Lagrangians is studied as a relevant example. 收起 • We introduce the notion of a continuous Schauder frame for a Banach space. This is both a generalization of continuous frames and coherent states for Hilbert spaces and a generalization of unconditional Schauder frames for Banach spaces. As a natural example, we prove that any wavelet for$L_p(\R)$with$1<p<\infty$generates a continuous wavelet Schauder frame. Furthermore, we generalize the properties shrinking and boundedly complete to the continuous Schauder frame setting, and prove that many of the fundamental James theorems still hold in this general context. 收起 • We consider a class of "most non ergodic" particle systems and prove that for most of them ergodicity appears if only one particle of N has contact with external world, that is this particle collides with external particles in random time moments. 收起 • In Eikonal equations, rarefaction is a common phenomenon known to degrade the rate of convergence of numerical methods. The factoring' approach alleviates this difficulty by deriving a PDE for a new (locally smooth) variable while capturing the rarefaction-related singularity in a known (non-smooth) factor'. Previously this technique was successfully used to address rarefaction fans arising at point sources. In this paper we show how similar ideas can be used to factor the 2D rarefactions arising due to nonsmoothness of domain boundaries or discontinuities in PDE coefficients. Locations and orientations of such rarefaction fans are not known in advance and we construct a just-in-time factoring' method that identifies them dynamically. The resulting algorithm is a generalization of the Fast Marching Method originally introduced for the regular (unfactored) Eikonal equations. We show that our approach restores the first-order convergence and illustrate it using a range of maze navigat 收起 • We develop an approach to study Coulomb branch operators in 3D$\mathcal{N}=4$gauge theories and the associated quantization structure of their Coulomb branches. This structure is encoded in a one-dimensional TQFT subsector of the full 3D theory, which we describe by combining several techniques and ideas. The answer takes the form of an associative non-commutative star-product algebra on the Coulomb branch. For good' and ugly' theories (according to Gaiotto-Witten classification), we also have a trace map on this algebra, which allows to compute correlation functions and, in particular, guarantees that the star-product satisfies a truncation condition. This work extends previous work on Abelian theories to the non-Abelian case by quantifying the monopole bubbling that describes screening of GNO boundary conditions. In our approach, the monopole bubbling is determined from the algebraic consistency of the OPE. This also yields a physical proof of the Bullimore-Dimofte-Gaiotto abelia 收起 • This paper establishes the necessary and sufficient conditions for the reality of all the zeros in a polynomial sequence$\{P_i\}_{i=1}^{\infty}$generated by a three-term recurrence relation$P_i(x)+ Q_1(x)P_{i-1}(x) +Q_2(x) P_{i-2}(x)=0$with the standard initial conditions$P_{0}(x)=1, P_{-1}(x)=0,$where$Q_1(x)$and$Q_2(x)$are arbitrary real polynomials. 收起 • Two-dimensional rational CFT are characterised by an integer$\ell$, the number of zeroes of the Wronskian of the characters. For$\ell<6$there is a finite number of theories and most of these are classified. Recently it has been shown that for$\ell\ge 6$there are infinitely many admissible characters that could potentially describe CFT's. In this note we examine the$\ell=6$case, whose central charges lie between 24 and 32, and propose a classification method based on cosets of meromorphic CFT's. We illustrate the method using theories on Kervaire lattices with complete root systems. 收起 • We study derivative-free methods for policy optimization over the class of linear policies. We focus on characterizing the convergence rate of these methods when applied to linear-quadratic systems, and study various settings of driving noise and reward feedback. We show that these methods provably converge to within any pre-specified tolerance of the optimal policy with a number of zero-order evaluations that is an explicit polynomial of the error tolerance, dimension, and curvature properties of the problem. Our analysis reveals some interesting differences between the settings of additive driving noise and random initialization, as well as the settings of one-point and two-point reward feedback. Our theory is corroborated by extensive simulations of derivative-free methods on these systems. Along the way, we derive convergence rates for stochastic zero-order optimization algorithms when applied to a certain class of non-convex problems. 收起 • An amoeba is the image of a subvariety of an algebraic torus under the logarithmic moment map. We consider some qualitative aspects of amoebas, establishing some results and posing problems for further study. These problems include determining the dimension of an amoeba, describing an amoeba as a semi-algebraic set, and identifying varieties whose amoebas are a finite intersection of amoebas of hypersurfaces. We show that an amoeba that is not of full dimension is not such a finite intersection if its variety is nondegenerate and we describe amoebas of lines as explicit semi-algebraic sets. 收起 • We consider the highly nonlinear and ill posed inverse problem of determining some general expression$F(x,t,u,\nabla_xu)$appearing in the diffusion equation$\partial_tu-\Delta_x u+F(x,t,u,\nabla_xu)=0$on$\Omega\times(0,T)$, with$T>0$and$\Omega$a bounded open subset of$\mathbb R^n$,$n\geq2$, from measurements of solutions on the lateral boundary$\partial\Omega\times(0,T)$. We consider both linear and nonlinear expression of$F(x,t,\nabla_xu,u)$. In the linear case, the equation is a convection-diffusion equation and our inverse problem corresponds to the unique recovery, in some suitable sense, of a time evolving velocity field associated with the moving quantity as well as the density of the medium in some rough setting described by non-smooth coefficients on a Lipschitz domain. In the nonlinear case, we prove the recovery of more general quasilinear expression appearing in a non-linear parabolic equation. Our result give a positive answer to the unique recovery of a gen 收起 • We solve the differentiablity problem for the evolution map in Milnor's infinite dimensional setting. We first show that the evolution map of each$C^k$-semiregular Lie group admits a particular kind of sequentially continuity$-$called Mackey continuity$-$and then prove that this continuity property is strong enough to ensure differentiability of the evolution map. In particular, this drops any continuity presumptions made in this context so far. Remarkably, Mackey continuity rises directly from the regularity problem itself$-$which makes it particular among the continuity conditions traditionally considered. As a further application of the introduced notions, we discuss the strong Trotter property in the sequentially-, and the Mackey continuous context. 收起 • Let$A$be a finite dimensional algebra over a field$F$of characteristic zero. If$L$is a Lie algebra acting on$A$by derivations, then such an action determines an action of its universal enveloping algebra$U(L)$. In this case we say that$A$is an algebra with derivation or an$L$-algebra. Here we study the differential$L$-identities of$A$and the corresponding differential codimensions,$c_n^L (A)$, when$L$is a finite dimensional semisimple Lie algebra. We give a complete characterization of the corresponding ideal of differential identities in case the sequence$c_n^L (A)$,$n=1,2,\dots$, is polynomially bounded. Along the way we determine up to PI-equivalence the only finite dimensional$L$-algebra of almost polynomial growth. 收起 • It has been known for more than 40 years that there are posets with planar cover graphs and arbitrarily large dimension. Recently, Streib and Trotter proved that such posets must have large height. In fact, all known constructions of such posets have two large disjoint chains with all points in one chain incomparable with all points in the other. Gutowski and Krawczyk conjectured that this feature is necessary. More formally, they conjectured that for every$k\geq 1$, there is a constant$d$such that if$P$is a poset with a planar cover graph and$P$excludes$\mathbf{k}+\mathbf{k}$, then$\dim(P)\leq d$. We settle their conjecture in the affirmative. We also discuss possibilities of generalizing the result by relaxing the condition that the cover graph is planar. 收起 • In this paper we will consider, in the abstract setting of rigged Hilbert spaces, distribution valued functions and we will investigate, in particular, conditions for them to constitute a "continuous basis" for the smallest space$\mathcal D$of a rigged Hilbert space. This analysis requires suitable extensions of familiar notions as those of frame, Riesz basis and orthonormal basis. A motivation for this study comes from the Gel'fand-Maurin theorem which states, under certain conditions, the existence of a family of generalized eigenvectors of an essentially self-adjoint operator on a domain$\mathcal D$which acts like an orthonormal basis of the Hilbert space$\mathcal H\$. The corresponding object will be called here a {\em Gel'fand distribution basis}. The main results are obtained in terms of properties of a conveniently defined {\em synthesis operator}.

收起

•   12-20 MIT Technology 3913

And no, technology can’t fix the problem.

收起

• Dynamical transitions of the Acetabularia whorl formation caused by outside calcium concentration is carefully analyzed using a chemical reaction diffusion model on a thin annulus. Restricting ourselves with Turing instabilities, we found all three types of transition, continuous, catastrophic and random can occur under different parameter regimes. Detailed linear analysis and numerical investigations are also provided. The main tool used in the transition analysis is Ma \& Wang's dynamical transition theory including the center manifold reduction.

收起

• We compute cones of effective cycles on some blowups of projective spaces in general sets of lines.

收起

• The design of block codes for short information blocks (e.g., a thousand or less information bits) is an open research problem that is gaining relevance thanks to emerging applications in wireless communication networks. In this paper, we review some of the most promising code constructions targeting the short block regime, and we compare them with both finite-length performance bounds and classical error-correction coding schemes. The work addresses the use of both binary and high-order modulations over the additive white Gaussian noise channel. We will illustrate how to effectively approach the theoretical bounds with various performance versus decoding complexity tradeoffs.

收起