## 信息流

• In the sparse normal means model, convergence of the Bayesian posterior distribution associated to spike and slab prior distributions is considered. The key sparsity hyperparameter is calibrated via marginal maximum likelihood empirical Bayes. The plug-in posterior squared-$L^2$ norm is shown to converge at the minimax rate for the euclidean norm for appropriate choices of spike and slab distributions. Possible choices include standard spike and slab with heavy tailed slab, and the spike and slab LASSO of Rockov\'a and George with heavy tailed slab. Surprisingly, the popular Laplace slab is shown to lead to a suboptimal rate for the full empirical Bayes posterior. This provides a striking example where convergence of aspects of the empirical Bayes posterior does not entail convergence of the full empirical Bayes posterior itself.

收起

• The split control and user plane is key to the future heterogeneous cellular network (HCN), where the small cells are dedicated for the most data transmission while the macrocells are mainly responsible for the control signaling. Adapting to this technology, we propose a general and tractable framework of extra cell range expansion (CRE) by introducing an additional bias factor to enlarge the range of small cells flexibly for the extra offloaded macrousers in a two-tier HCN, where the macrocell and small cell users have different required data rates. Using stochastic geometry, we analyze the energy efficiency (EE) of the extra CRE with joint low power transmission and resource partitioning, where the coverages of EE and data rate are formulated theoretically. Numerical simulations verify that the proposed extra CRE can improve the EE performance of HCN, and also show that deploying more small cells can provide benefits for EE coverage, but the EE improvement becomes saturated if the sm

收起

• Coordinated multipoint (CoMP) joint transmission (JT) can save a great deal of energy especially for cell-edge users due to strengthened received signal, but at the cost of deploying and coordinating cooperative nodes, which degrades energy efficiency (EE), particularly when considerable amount of energy is consumed by nonideal hardware circuit. In this paper, we study energyefficient cooperation establishment, including cooperative nodes selection (CNS) and power allocation, to satisfy a required data rate in coherent JT-CoMP networks with non-ideal power amplifiers (PAs) and circuit power. The selection priority lemma is proved first, and then the formulated discrete combinatorial EE optimization is resolved by proposing node selection criterion and deriving closedform expressions of optimal transmission power. Therefore, an efficient algorithm is provided and its superiority is validated by Monte Carlo simulations, which also show the effects of non-ideal PA and the data rate demand

收起

• In this paper, we maximize the energy efficiency (EE) of full-duplex (FD) two-way relay (TWR) systems under non-ideal power amplifiers (PAs) and non-negligible transmission-dependent circuit power. We start with the case where only the relay operates full duplex and two timeslots are required for TWR. Then, we extend to the advanced case, where the relay and the two nodes all operate full duplex, and accomplish TWR in a single timeslot. In both cases, we establish the intrinsic connections between the optimal transmit powers and durations, based on which the original non-convex EE maximization can be convexified and optimally solved. Simulations show the superiority of FD-TWR in terms of EE, especially when traffic demand is high. The simulations also reveal that the maximum EE of FD-TWR is more sensitive to the PA efficiency, than it is to self-cancellation. The full FD design of FD-TWR is susceptible to traffic imbalance, while the design with only the relay operating in the FD mode

收起

•   12-31 Slashdot 5742

The CEO of Wireline -- a cloud application marketplace and serverless architecture platform -- is pushing for an open source development fund to help sustain projects, funded by an initial coin offering. "Developers like me know that there are a lot of weak spots in the modern internet," he writes on MarketWatch, suggesting more Equifax-sized data breaches may wait in our future. In fact, many companies are not fully aware of all of the software components they are using from the open-source community. And vulnerabilities can be left open for years, giving hackers opportunities to do their worst. Take, for instance, the Heartbleed bug of 2014... Among the known hacks: 4.5 million health-care records were compromised, 900 Canadians' social insurance numbers were stolen. It was deemed "catastrophic." And yet many servers today -- two years later! -- still carry the vulnerability, leaving whole caches of personal data exposed... [T]hose of us who are on the back end, stitching away, ofte

收起

•   12-31 Slashdot 5680

An anonymous reader quotes Fortune's new report on blockchain: Demand for the technology, best known for supporting bitcoin, is growing so much that it will be one of the largest users of capacity next year at about 60 data centers that IBM rents out to other companies around the globe. IBM was one of the first big companies to see blockchain's promise, contributing code to an open-source effort and encouraging startups to try the technology on its cloud for free. That a 106-year-old company like IBM is going all in on blockchain shows just how far the digital ledger has come since its early days underpinning bitcoin drug deals on the dark web. The market for blockchain-related products and services will reach $7.7 billion in 2022, up from$242 million last year, according to researcher Markets & Markets. That's creating new opportunities for some of the old warships of the technology world, companies like IBM and Microsoft Corp. that are making the transition to cloud services. A

收起

•   12-31 Hacker News 1474

A history of S_IFMT

收起

•   12-31 Ars Technica 5931

Arrest made after man dies in Kansas “swatting.”

收起

•   12-31 Hacker News 5692

Coming Soon:Machine-Checked Proofs in Everyday Software and Hardware Development

收起

•   12-31 Hacker News 5174

Brittleness comes from “One Thing”

收起

•   12-31 THE NEW YORKER 5103

Hannah Aizenman on poetry that was published in The New Yorker in 2017, including poems by Frank Bidart, Tracy K. Smith, Chana Bloch, John Ashbery, and more.

收起

•   12-30 Hacker News 5662

Are all BSDs created equally? A survey of BSD kernel vulnerabilities [video]

收起

•   12-30 Hacker News 5117

Bluetooth Low Energy WarDriving 101

收起

•   12-30 Ars Technica 5858

The ACLU of Minnesota calls the charges absurd and unconstitutional.

收起

•   12-30 Hacker News 5077

Creating believable crowds in Planet Coaster

收起

•   12-30 Hacker News 4939

Cleanup at the slaughterhouse

收起

•   12-30 MIT Technology 5820

The course of history is often hidden in government archives. Now statisticians have worked out how to extract the most significant events using data-mining techniques.

收起

• Combined, Disney and Lucasfilm's Star Wars: The Last Jedi, Rogue One: A Star Wars Story and Star Wars: The Force Awakens have surpassed $4.06 billion in ticket sales at the worldwide box office. That's more than what Disney paid to buy George Lucas' Star Wars franchise. From the Hollywood Reporter: While an interesting benchmark, it doesn't, of course, account for the hundreds of millions spent to produce and market the trio of films, or the fact that Disney splits box-office grosses with theater owners. Conversely, Disney has minted additional money from lucrative ancillary revenue streams, merchandising sales and theme park attractions. Opening in North America on Dec. 15, The Last Jedi zoomed past the$900 million mark on Thursday, finishing the day with $934.2 million globally, including$464.6 million domestically and $469.6 internationally (it doesn't land in China until Jan. 5). The sequel to The Force Awakens was directed by Rian Johnson, and has dominated the Christmas corrido 收起 • 12-30 Hacker News 4978 Ask HN: What was the best CS paper you read in 2017? 收起 • 12-30 Ars Technica 5769 Possibility of falling snow and ice closes public areas around Apple Store. 收起 • 12-30 Ars Technica 5144 Tech has been for the young, but a new book argues that’s about to change. 收起 • 12-30 Ars Technica 5858 How car buyers respond to economics can help craft policy. 收起 • 12-30 Ars Technica 5788 Collision at 300 feet reveals limits of "trusting the app." 收起 • 12-30 Slashdot 5534 An anonymous reader quotes a report from The Guardian: Britain's homes could be lit and powered by wind farms surrounding an artificial island deep out in the North Sea, under advanced plans by a Dutch energy network. The radical proposal envisages an island being built to act as a hub for vast offshore wind farms that would eclipse today's facilities in scale. Dogger Bank, 125km (78 miles) off the East Yorkshire coast, has been identified as a potentially windy and shallow site. The power hub would send electricity over a long-distance cable to the UK and Netherlands, and possibly later to Belgium, Germany, and Denmark. TenneT, the project's backer and Dutch equivalent of the UK's National Grid, recently shared early findings of a study that said its plan could be billions of euros cheaper than conventional wind farms and international power cables. The sci-fi-sounding proposal is sold as an innovative answer to industry's challenge of continuing to make offshore wind cheaper, as turb 收起 • schwit1 shares a report from The Daily Dot: A man was killed by police Thursday night in Wichita, Kansas, when officers responded to a false report of a hostage situation. The online gaming community is saying the dead man was the victim of a swatting prank, where trolls call in a fake emergency and force SWAT teams to descend on a target's house. If that's true, this would be the first reported swatting-related death. Wichita deputy police chief Troy Livingston told the Wichita Eagle that police were responding to a report that a man fighting with his parents had accidentally shot his dad in the head and was holding his mom, brother and sister hostage. When police arrived, "A male came to the front door," Livingston told the Eagle. "As he came to the front door, one of our officers discharged his weapon." The man at the door was identified by the Eagle as 28-year-old Andrew Finch. Finch's mother told reporters "he was not a gamer," but the online Call of Duty community claims his deat 收起 • We provide a number of extensions and further interpretations of the Parameterized-Background Data-Weak (PBDW) formulation, a real-time and in-situ Data Assimilation (DA) framework for physical systems modeled by parametrized Partial Differential Equations (PDEs), proposed in [Y Maday, AT Patera, JD Penn, M Yano, Int J Numer Meth Eng, 102(5), 933-965]. Given$M$noisy measurements of the state, PBDW seeks an approximation of the form$u^{\star} = z^{\star} + \eta^{\star}$, where the \emph{background}$z^{\star}$belongs to a$N$-dimensional \emph{background space} informed by a parameterized mathematical model, and the \emph{update}$\eta^{\star}$belongs to a$M$-dimensional \emph{update space} informed by the experimental observations. The contributions of the present work are threefold: first, we extend the adaptive formulation proposed in [T Taddei, M2AN, 51(5), 1827-1858] to general linear observation functionals, to effectively deal with noisy observations; second, we consider an 收起 • Fully localised solitary waves are travelling-wave solutions of the three-dimensional gravity-capillary water wave problem which decay to zero in every horizontal spatial direction. Their existence has been predicted on the basis of numerical simulations and model equations (in which context they are usually referred to as lumps'), and a mathematically rigorous existence theory for strong surface tension (Bond number$\beta$greater than$\frac{1}{3}$) has recently been given. In this article we present an existence theory for the physically more realistic case$0<\beta<\frac{1}{3}$. A classical variational principle for fully localised solitary waves is reduced to a locally equivalent variational principle featuring a perturbation of the functional associated with the Davey-Stewartson equation. A nontrivial critical point of the reduced functional is found by minimising it over its natural constraint set. 收起 • We extend the standard Bayesian multivariate Gaussian generative data classifier by considering a generalization of the conjugate, normal-Wishart prior distribution and by deriving the hyperparameters analytically via evidence maximization. The behaviour of the optimal hyperparameters is explored in the high-dimensional data regime. The classification accuracy of the resulting generalized model is competitive with state-of-the art Bayesian discriminant analysis methods, but without the usual computational burden of cross-validation. 收起 • We consider three problems about cities from Alcuin's_Propositiones ad acuendos juvenes_. These problems can be considered as the earliest packing problems difficult also for modern state-of-the-art packing algorithms. We discuss the Alcuin's solutions and give the known (to the author) best solutions to these problems. 收起 • We describe the freedom of choosing a square root in massive gravity from algebraic point of view. This contribution is based on the talk given by one of us (AG) at the Geometric Foudations of Gravity conference in Tartu in August 2017. 收起 • In this paper, we study an interference avoidance scenario in the presence of a smart interferer which can rapidly observe the transmit power of a backscatter wireless sensor network (WSN) and effectively interrupt backscatter signals. We consider a power control with a sub-channel allocation to avoid interference attacks and a time-switching ratio for backscattering and RF energy harvesting in backscatter WSNs. We formulate the problem based on a Stackelberg game theory and compute the optimal transmit power, time-switching ratio, and sub-channel allocation parameter to maximize a utility function against the smart interference. We propose two algorithms for the utility maximization using Lagrangian dual decomposition for the backscatter WSN and the smart interference to prove the existence of the Stackelberg equilibrium. Numerical results show that the proposed algorithms effectively maximize the utility, compared to that of the algorithm based on the Nash game, so as to overcome sma 收起 • We show that for any positive integer k, the k-th nonzero eigenvalue of the Laplace-Beltrami operator on the two-dimensional sphere endowed with a Riemannian metric of unit area, is maximized in the limit by a sequence of metrics converging to a union of k touching identical round spheres. This proves a conjecture posed by the second author in 2002 and yields a sharp isoperimetric inequality for all nonzero eigenvalues of the Laplacian on a sphere. Earlier, the result was known only for k=1 (J.Hersch, 1970), k=2 (N.Nadirashvili, 2002 and R.Petrides, 2014) and k=3 (N.Nadirashvili and Y.Sire, 2015). In particular, we argue that for any k>=2, the supremum of the k-th nonzero eigenvalue on a sphere of unit area is not attained in the class of Riemannin metrics which are smooth outsitde a finite set of conical singularities. The proof uses certain properties of harmonic maps between spheres, the key new ingredient being a bound on the harmonic degree of a harmonic map into a sphere obtai 收起 • We propose a new practical adaptive refinement strategy for$hp$-finite element approximations of elliptic problems. Following recent theoretical developments in polynomial-degree-robust a posteriori error analysis, we solve two types of discrete local problems on vertex-based patches. The first type involves the solution on each patch of a mixed finite element problem with homogeneous Neumann boundary conditions, which leads to an${\mathbf H}(\mathrm{div},\Omega)$-conforming equilibrated flux. This, in turn, yields a guaranteed upper bound on the error and serves to mark mesh vertices for refinement via D\"orfler's bulk-chasing criterion. The second type of local problems involves the solution, on patches associated with marked vertices only, of two separate primal finite element problems with homogeneous Dirichlet boundary conditions, which serve to decide between$h$-,$p$-, or$hp$-refinement. Altogether, we show that these ingredients lead to a computable guaranteed bound on the 收起 • In this article we use the combinatorial and geometric structure of manifolds with embedded cylinders in order to develop an adiabatic decomposition of the Hodge cohomology of these manifolds. We will on the one hand describe the adiabatic behaviour of spaces of harmonic forms by means of a certain \v{C}ech-de Rham complex and on the other hand generalise the Cappell-Lee-Miller splicing map to the case of a finite number of edges, thus combining the topological and the analytic viewpoint. In parts, this work is a generalisation of works of Cappell, Lee and Miller in which a single-edged graph is considered, but it is more specific since only the Gauss-Bonnet operator is studied. 收起 • We study the automorphism groups of countable homogeneous directed graphs (and some additional homogeneous structures) from the point of view of topological dynamics. We determine precisely which of these automorphism groups are amenable (in their natural topologies). For those which are amenable, we determine whether they are uniquely ergodic, leaving unsettled precisely one case (the "semi-generic" complete multipartite directed graph). We also consider the Hrushovski property. For most of our results we use the various techniques of [3], suitably generalized to a context in which the universal minimal flow is not necessarily the space of all orders. Negative results concerning amenability rely on constructions of the type considered in [26]. An additional class of structures (compositions) may be handled directly on the basis of very general principles. The starting point in all cases is the determination of the universal minimal flow for the automorphism group, which in the context 收起 • We present a self-contained development of the Weierstrass theory of those analytic functions (single-valued or multiform) which admit an algebraic addition theorem. We review the history of the theory and present detailed proofs of the major theorems. 收起 • We provide models that are as close as possible to being formal for a large class of compact manifolds that admit a transversely Kaehler structure, including Vaisman and quasi-Sasakian manifolds. As an application we are able to classify the corresponding nilmanifolds. 收起 • In this paper and upcoming ones, we initiate a systematic study of Bethe ansatz equations for integrable models by modern computational algebraic geometry. We show that algebraic geometry provides a natural mathematical language and powerful tools for understanding the structure of solution space of Bethe ansatz equations. In particular, we find novel efficient methods to count the number of solutions of Bethe ansatz equations based on Gr\"obner basis and quotient ring. We also develop analytical approach based on companion matrix to perform the sum of on-shell quantities over all physical solutions without solving Bethe ansatz equations explicitly. To demonstrate the power of our method, we revisit the completeness problem of Bethe ansatz of Heisenberg spin chain, and calculate the sum rules of OPE coefficients in planar$\mathcal{N}=4$super-Yang-Mills theory. 收起 • We consider a variational problem associated with the minimal speed of pulsating traveling waves of the equation$u_t=u_{xx}+b(x)(1-u)u$,$x\in{\mathbb R},\ t>0$, where the coefficient$b(x)$is nonnegative and periodic in$x\in{\mathbb R}$with a period$L>0$. It is known that there exists a quantity$c^*(b)>0$such that a pulsating traveling wave with the average speed$c>0$exists if and only if$c\geq c^*(b)$. The quantity$c^*(b)$is the so-called minimal speed of pulsating traveling waves. In this paper, we study the problem of maximizing$c^*(b)$by varying the coefficient$b(x)$under some constraints. We prove the existence of the maximizer under a certain assumption of the constraint and derive the Euler--Lagrange equation which the maximizer satisfies under$L^2$constraint$\int_0^L b(x)^2dx=\beta$. The limit problems of the solution of this Euler--Lagrange equation as$L\rightarrow0$and as$\beta\rightarrow0$are also considered. Moreover, we also consider the 收起 • We revisit the scattering result of Duyckaerts, Holmer, and Roudenko for the non-radial$\dot H^{1/2}$-critical focusing NLS. By proving an interaction Morawetz inequality, we give a simple proof of scattering below the ground state in dimensions$d\geq 3$that avoids the use of concentration compactness. 收起 • We present a novel approach to hybrid RANS/LES wall modeling based on function enrichment, which overcomes the common problem of the RANS-LES transition and enables coarse meshes near the boundary. While the concept of function enrichment as an efficient discretization technique for turbulent boundary layers has been proposed in an earlier article by Krank & Wall (J. Comput. Phys. 316 (2016) 94-116), the contribution of this work is a rigorous derivation of a new multiscale turbulence modeling approach and a corresponding discontinuous Galerkin discretization scheme. In the near-wall area, the Navier-Stokes equations are explicitly solved for an LES and a RANS component in one single equation. This is done by providing the Galerkin method with an independent set of shape functions for each of these two methods; the standard high-order polynomial basis resolves turbulent eddies where the mesh is sufficiently fine and the enrichment automatically computes the ensemble-averaged flow i 收起 • We describe a paradigm for multiscale modeling that combines the Mori-Zwanzig (MZ) formalism of Statistical Mechanics with the Variational Multiscale (VMS) method. The MZ-VMS approach leverages both VMS scale-separation projectors as well as phase-space projectors to provide a systematic modeling approach that is applicable to non-linear partial differential equations. Spectral as well as continuous and discontinuous finite element methods are considered. The framework leads to a formally closed equation in which the effect of the unresolved scales on the resolved scales is non-local in time and appears as a convolution or memory integral. The resulting non-Markovian system is used as a starting point for model development. We discover that unresolved scales lead to memory effects that are driven by an orthogonal projection of the coarse-scale residual and inter-element jumps. It is further shown that an MZ-based finite memory model is a variant of the well-known adjoint-stabilization 收起 • We consider the classic problem of network reliability. A network is given together with a source vertex, one or more target vertices and probabilities assigned to each of the edges. Each edge appears in the network with its associated probability and the problem is to determine the probability of having at least one source-to-target path. This problem is known to be NP-hard for general networks and has been solved for several special families. In this work we present a fixed-parameter algorithm based on treewidth, which is a measure of tree-likeness of graphs. The problem was already known to be solvable in linear time for bounded treewidth, however the known methods used complicated structures and were not easy to implement. We provide a significantly simpler and more intuitive algorithm that while remaining linear, is much easier to implement. 收起 • Analyzing the security of cryptosystems under attacks based on the malicious modification of memory registers is a research topic of high importance. This type of attacks may affect the randomness of the secret parameters by forcing a limited number of bits to a certain value which can be unknown to the attacker. In this context, we revisit the attack on DSA presented by Faug\ere, Goyet and Renault during the conference SAC 2012: we simplify their method and we provide a probabilistic approach in opposition to the heuristic proposed in the former to measure the limits of the attack. More precisely, the main problem is formulated as the search for a closest vector to a lattice, then we study the distribution of the vectors with bounded norms in a this family of lattices and we apply the result to predict the behavior of the attack. We validated this approach by computational experiments. 收起 • In this paper we study the complexity of constructing a hitting set for the closure of VP, the class of polynomials that can be infinitesimally approximated by polynomials that are computed by polynomial sized algebraic circuits, over the real or complex numbers. Specifically, we show that there is a PSPACE algorithm that given n,s,r in unary outputs a set of n-tuples over the rationals of size poly(n,s,r), with poly(n,s,r) bit complexity, that hits all n-variate polynomials of degree-r that are the limit of size-s algebraic circuits. Previously it was known that a random set of this size is a hitting set, but a construction that is certified to work was only known in EXPSPACE (or EXPH assuming the generalized Riemann hypothesis). As a corollary we get that a host of other algebraic problems such as Noether Normalization Lemma, can also be solved in PSPACE deterministically, where earlier only randomized algorithms and EXPSPACE algorithms (or EXPH assuming the generalized Riemann hypot 收起 • This work pioneers the systematic study and classification (up to Lie algebra automorphisms) of finite-dimensional coboundary Lie bialgebras through Grassmann algebras. Several mathematical structures on Lie algebras, e.g. Killing forms or root decompositions, are extended to the Grassmann algebras of Lie algebras. This simplifies the description of the procedures and tools appearing in the theory of Lie bialgebras and originates novel techniques for its study and classification up to Lie algebra automorphisms. As a particular case, the classification of real three-dimensional coboundary Lie bialgebras is retrieved. 收起 • \emph{Multiresolution mode decomposition} (MMD) is an adaptive tool to analyze a time series$f(t)=\sum_{k=1}^K f_k(t)$, where$f_k(t)$is a \emph{multiresolution intrinsic mode function} (MIMF) of the form \begin{eqnarray*} f_k(t)&=&\sum_{n=-N/2}^{N/2-1} a_{n,k}\cos(2\pi n\phi_k(t))s_{cn,k}(2\pi N_k\phi_k(t))\\&&+\sum_{n=-N/2}^{N/2-1}b_{n,k} \sin(2\pi n\phi_k(t))s_{sn,k}(2\pi N_k\phi_k(t)) \end{eqnarray*} with time-dependent amplitudes, frequencies, and waveforms. The multiresolution expansion coefficients$\{a_{n,k}\}$,$\{b_{n,k}\}$, and the shape function series$\{s_{cn,k}(t)\}$and$\{s_{sn,k}(t)\}$provide innovative features for adaptive time series analysis. The MMD aims at identifying these MIMF's (including their multiresolution expansion coefficients and shape functions series) from their superposition. This paper proposes a fast algorithm for solving the MMD problem based on recursive diffeomorphism-based spectral analysis (RDSA). RDSA admits highly efficie 收起 • We construct a 6D${\cal N}=(1,0)$superconformal field theory by coupling an${\cal N}=(1, 0)$tensor multiplet to an${\cal N}=(1, 0)$hypermultiplet. While the${\cal N}=(1, 0)$tensor multiplet is in the adjoint representation of the gauge group, the hypermultiplet can be in the fundamental representation or any other representation. If the hypermultiplet is also in the adjoint representation of the gauge group, the supersymmetry is enhanced to${\cal N}=(2, 0)$, and the theory is identical to the$(2,0)$theory of Lambert and Papageorgakis (LP). Upon dimension reduction, the$(1, 0)$theory can be reduced to a general${\cal N}=1$supersymmetric Yang-Mills theory in 5D. We discuss briefly the possible applications of the theories to multi M5-branes. 收起 • 12-29 MIT Technology 4816 As more AI gets done on remote servers, Google, Amazon, and Microsoft are dueling to see who reigns supreme (and makes the most money). 收起 • In this paper we propose and prove some generalizations and sharpenings of certain inequalities of Wilker's and Shafer-Fink's type. Application of the Wu-Debntah theorem enabled us to prove some double sided inequalities. 收起 • A new definition of random sets is proposed. It is based on the distance in measurable space and uses negative definite kernels for continuation from initial space to that of random sets. This approach has no connection to Hausdorff distance between sets. Key words: random sets; measurable space; negative definite kernels; Hilbert space isometries. 收起 • In this work we consider a class of nonlocal non-autonomous evolution problems, which arise in neuronal activity, $\begin{cases} \partial_t u(t,x) =- a(t)u(t,x) + b(t) \displaystyle\int_{\mathbb{R}^N} J(x,y)f(t,u(t,y))dy -h +S(t,x) ,\ t\geq\tau \in \mathbb{R},\ x \in \Omega, u(\tau,x)=u_\tau(x),\ x\in\Omega u(t,x)= 0,\ t\geq\tau,\ x \in\mathbb{R}^N\backslash\Omega. \end{cases}$ Under suitable assumptions on the nonlinearity$f: \mathbb{R} \times \mathbb{R} \to\mathbb{R}$and constraints on the functions$J: \mathbb{R}^N \times \mathbb{R}^{N}\to \mathbb{R}$;\,$S: \mathbb{R} \times \mathbb{R}^{N}\to\mathbb{R}$and$a,b:\mathbb{R} \to\mathbb{R}$, we study the assimptotic behavior of the evolution process, generated by this problem, in an appropriated Banach space.% and we present a brief discussion on the model with a biological interpretation. We prove results on existence, uniqueness and smoothness of the solutions and the existence of pullback attracts for the evolution process as 收起 • We provide a maximum entropy derivation of a new family of BFGS-like methods. Similar results are then derived for block BFGS methods. This also yields an independent proof of a result of Fletcher 1991 and its generalisation to the block case. 收起 • The (driven) Rabi model, together with its two-mode, two-photon, and asymmetric generalizations, are exotic examples of quasi-exactly solvable models in that a corresponding 2nd order ordinary differential equation (ODE)${\cal L}\psi=0$with polynomial coefficients (i) is not Fuchsian one and (ii) the differential operator${\cal L}$comprises energy E dependent terms$\sim Ez d_z$,$Ez$,$E^2$. When recast into a Schr\"odinger equation (SE) form with the first derivative term being eliminated and the coefficient of$d_x^2$set to one, such an equation is characterized by a nontrivially energy dependent potential. The concept of a gradation slicing is introduced to analyze polynomial solutions of such equations. It is shown that the ODE of all the above Rabi models are characterized by the same unique set of grading parameters. General necessary and sufficient conditions for the existence of a polynomial solution are formulated. Unlike standard eigenvalue problems, the condition that 收起 • Nesterov's accelerated gradient (AG) method for minimizing a smooth strongly convex function$f$is known to reduce$f({\bf x}_k)-f({\bf x}^*)$by a factor of$\epsilon\in(0,1)$after$k=O(\sqrt{L/\ell}\log(1/\epsilon))$iterations, where$\ell,L$are the two parameters of smooth strong convexity. Furthermore, it is known that this is the best possible complexity in the function-gradient oracle model of computation. Modulo a line search, the geometric descent (GD) method of Bubeck, Lee and Singh has the same bound for this class of functions. The method of linear conjugate gradients (CG) also satisfies the same complexity bound in the special case of strongly convex quadratic functions, but in this special case it can be faster than the AG and GD methods. Despite similarities in the algorithms and their asymptotic convergence rates, the conventional analysis of the running time of CG is mostly disjoint from that of AG and GD. The analyses of the AG and GD methods are also rather distin 收起 • We give a de Finetti type representation for exchangeable random coalescent trees (formally described as semi-ultrametrics) in terms of sampling iid sequences from marked metric measure spaces. We apply this representation to define versions of tree-valued Fleming-Viot processes from a$\Xi$-lookdown model. As state spaces for these processes, we use, besides the space of isomorphy classes of metric measure spaces, also the space of isomorphy classes of marked metric measure spaces and a space of distance matrix distributions. This allows to include the case with dust in which the genealogical trees have isolated leaves. 收起 • We propose a refinement of the Robertson-Schrodinger uncertainty principle (RSUP) using Wigner distributions. This new principle is stronger than the RSUP. In particular, and unlike the RSUP, which can be saturated by many phase space functions, the refined RSUP can be saturated by pure Gaussian Wigner functions only. Moreover, the new principle is technically as simple as the standard RSUP. In addition, it makes a direct connection with modern harmonic analysis, since it involves the Wigner transform and its symplectic Fourier transform, which is the radar ambiguity function. As a by-product of the refined RSUP, we derive inequalities involving the entropy and the covariance matrix of Wigner distributions. These inequalities refine the Shanon and the Hirschman inequalities for the Wigner distribution of a mixed quantum state$\rho$. We prove sharp estimates which critically depend on the purity of$\rho$and which are saturated in the Gaussian case. 收起 • For an$n$--dimensional local analytic differential system$\dot x=Ax+f(x)$with$f(x)=O(|x|^2)$, the Poincar\'e nonintegrability theorem states that if the eigenvalues of$A$are not resonant, the system does not have an analytic or a formal first integral in a neighborhood of the origin. This result was extended in 2003 to the case when$A$admits one zero eigenvalue and the other are non--resonant: for$n=2$the system has an analytic first integral at the origin if and only if the origin is a non--isolated singular point; for$n>2$the system has a formal first integral at the origin if and only if the origin is not an isolated singular point. However, the question of \emph{whether the system has an analytic first integral at the origin provided that the origin is not an isolated singular point} remains open. 收起 • We consider a probit model without covariates, but the latent Gaussian variables having compound symmetry covariance structure with a single parameter characterizing the common correlation. We study the parameter estimation problem under such one-parameter probit models. As a surprise, we demonstrate that the likelihood function does not yield consistent estimates for the correlation. We then formally prove the parameter's nonestimability by deriving a non-vanishing minimax lower bound. This counter-intuitive phenomenon provides an interesting insight that one bit information of the latent Gaussian variables is not sufficient to consistently recover their correlation. On the other hand, we further show that trinary data generated from the Gaussian variables can consistently estimate the correlation with parametric convergence rate. Hence we reveal a phase transition phenomenon regarding the discretization of latent Gaussian variables while preserving the estimability of the correlation 收起 • Let$\mathcal{T}$be the group of smooth concordance classes of topologically slice knots, and$\{0\}\subset\cdots\subset \mathcal{T}_{n+1}\subset\mathcal{T}_{n}\subset \cdots\subset \mathcal{T}_{0}\subset \mathcal{T}$be the bipolar filtration. In this paper, we show that a proper collection of the knots employed by Hedden, Kim, and Livingston to prove$\mathbb{Z}_2^{\infty} < \mathcal{T}$can be used to see$\mathbb{Z}_2^{\infty} < \mathcal{T}_0/\mathcal{T}_1$. 收起 • In this paper, we will study the following PDE in$\mathbb{R}^N$involving multiple Hardy-Sobolev critical exponents: $$\begin{cases} \Delta u+\sum_{i=1}^{l}\lambda_i \frac{u^{2^*(s_i)-1}}{|x|^{s_i}}+u^{2^*-1}=0\;\hbox{in}\;\mathbb{R}^N, u\in D_{0}^{1,2}(\mathbb{R}^N), \end{cases}$$ where$0<s_1<s_2<\cdots<s_l<2, 2^\ast:=\frac{2N}{N-2}, \; 2^\ast(s):=\frac{2(N-s)}{N-2}$and there exists some$k\in [1, l]$such that$\lambda_i>0$for$1\leq i\leq k$;$\lambda_i<0$for$k+1\leq i\leq l$. We develop an interesting way to study this class of equations involving mixed sign parameters. We prove the existence and non-existence of the positive ground state solution. The regularity of the least-energy solution are also investigated. 收起 • This work is a study of$p$-adic multiple zeta values at roots of unity ($p$MZV$\mu_{N}$'s), the$p$-adic periods of the crystalline pro-unipotent fundamental groupoid of$(\mathbb{P}^{1} - \{0,\mu_{N},\infty\})/ \mathbb{F}_{q}$. The main tool is new objects which we call$p$-adic pro-unipotent harmonic actions. In this part IV we define and study$p$-adic analogues of some elementary complex analytic functions which interpolate multiple zeta values at roots of unity such as the multiple zeta functions. The indices of$p$MZV$\mu_{N}$'s involve sequences of positive integers ; in this IV-1, by considering an operation which we call localization (inverting certain integration operators) in the pro-unipotent fundamental groupoid of$\mathbb{P}^{1} - \{0,\mu_{N},\infty\}$, and by using$p$-adic pro-unipotent harmonic actions, we extend the definition of$p$MZV$\mu_{N}$'s to indices for which these integers can be negative, and we study these generalized$p$MZV$\mu_{N}$'s. 收起 • In this paper we extend analytic signal method to the functions in many dimensions. First it is shown how to obtain separate phase-shifted components and how combine them to obtain signal's envelope, instantaneous frequencies and phases in many dimensions. Second, we show that phase-shifted components may be obtained by positive frequency restriction of the Fourier transform defined in the algebra of commutative elliptic hypercomplex numbers. Finally we prove that for$d>2$there is no corresponding Clifford-Fourier transform that allows to recover phase-shifted components correctly. 收起 • An optimal control problem is considered for a stochastic differential equation containing a state-dependent regime switching, with a recursive cost functional. Due to the non-exponential discounting in the cost functional, the problem is time-inconsistent in general. Therefore, instead of finding a global optimal control (which is not possible), we look for a time-consistent (approximately) locally optimal equilibrium strategy. Such a strategy can be represented through the solution to a system of partial differential equations, called an equilibrium Hamilton-Jacob-Bellman (HJB, for short) equation which is constructed via a sequence of multi-person differential games. A verification theorem is proved and, under proper conditions, the well-posedness of the equilibrium HJB equation is established as well. 收起 • A line field on a manifold is a smooth map which assigns a tangent line to all but a finite number of points of the manifold. As such, it can be seen as a generalization of vector fields. They model a number of geometric and physical properties, e.g. the principal curvature directions dynamics on surfaces or the stress flux in elasticity. We propose a discretization of a Morse-Smale line field on surfaces, extending Forman's construction for discrete vector fields. More general critical elements and their indices are defined from local matchings, for which Euler theorem and the characterization of homotopy type in terms of critical cells still hold. 收起 • This paper investigates reverse auctions that involve continuous values of different types of goods, general nonconvex constraints, and second stage costs. Our analysis seeks to design the payment rules and conditions under which coalitions of participants cannot influence the auction outcome in order to obtain higher collective utility. Under incentive-compatible bidding in the Vickrey-Clarke-Groves mechanism, coalition-proof outcomes are achieved if the submitted bids are convex and the constraint sets are of polymatroid-type. Unfortunately, these conditions do not capture the complexity of the general class of reverse auctions under consideration. By relaxing the property of incentive-compatibility, we investigate further payment rules that are coalition-proof, but without any extra conditions. Among coalition-proof mechanisms, we select the mechanism that minimizes the participants' abilities to benefit from strategic manipulations, in order to incentivize truthful bidding from the 收起 • Identifying coordinate transformations that make strongly nonlinear dynamics approximately linear is a central challenge in modern dynamical systems. These transformations have the potential to enable prediction, estimation, and control of nonlinear systems using standard linear theory. The Koopman operator has emerged as a leading data-driven embedding, as eigenfunctions of this operator provide intrinsic coordinates that globally linearize the dynamics. However, identifying and representing these eigenfunctions has proven to be mathematically and computationally challenging. This work leverages the power of deep learning to discover representations of Koopman eigenfunctions from trajectory data of dynamical systems. Our network is parsimonious and interpretable by construction, embedding the dynamics on a low-dimensional manifold that is of the intrinsic rank of the dynamics and parameterized by the Koopman eigenfunctions. In particular, we identify nonlinear coordinates on which the 收起 • 12-29 Ars Technica 5378 Plus deals on Sonos speakers, Dell and Lenovo laptops, TurboTax, and more. 收起 • The paper studies the locus in the rank 2 Higgs bundle moduli space corresponding to points which are critical for d of the Poisson commuting functions. These correspond to the Higgs field vanishing on a divisor of degree D. The degree D critical locus has an induced integrable system related to K(-D)-twisted Higgs bundles. Topological and differential-geometric properties of the critical loci are addressed. 收起 • In this work we prove convergence of the finite difference scheme for equations of stationary states of a general class of the spatial segregation of reaction-diffusion systems with$m\geq 2$components. More precisely, we show that the numerical solution$u_h^l$, given by the difference scheme, converges to the$l^{th}$component$u_l,$when the mesh size$h$tends to zero, provided$u_l\in C^2(\Omega),$for every$l=1,2,\dots,m.$In particular, our proof provides convergence of a difference scheme for the multi-phase obstacle problem. 收起 • This paper is devoted to a description of a general approach introduced by Agrachev and Sarychev in 2005 for studying some control problems for Navier-Stokes equations. The example of a 1D Burgers equation is used to illustrate the main ideas. We begin with a short discussion of the Cauchy problem and establish a continuity property for the resolving operator. We next turn to the property of approximate controllability and prove that it can be achieved by a two-dimensional external force. Finally, we investigate a stronger property, when the approximate controllability and the exact controllability of finite-dimensional functionals are proved simultaneously. 收起 • Given a polynomial basis$\Psi_i$which spans the polynomial vector space$\mathcal{P}$, this paper addresses the construction and use of the algebraic dual space$\mathcal{P}'$and its canonical basis. Differentiation of dual variables will be discussed. The method will be applied to a Dirichlet and Neumann problem presented in \cite{CarstensenDemkowiczGopalakrishnan} and it is shown that the finite dimensional approximations satisfy$\phi^h = \mbox{div}\, \mathbf{q}^h$on any grid. The dual method is also applied to a constrained minimization problem, which leads to a mixed finite element formulation. The discretization of the constraint and the Lagrange multiplier will be independent of the grid size, grid shape and the polynomial degree of the basis functions. 收起 • Let$S$be the set of subsequences$(x_{n_k})$of a given real sequence$(x_n)$which preserve the set of statistical cluster points. It has been recently shown that$S$is a set of full (Lebesgue) measure. Here, on the other hand, we prove that$S$is meager if and only if there exists an ordinary limit point of$(x_n)$which is not a statistical cluster point of$(x_n)$. This provides a non-analogue between measure and category. 收起 • In this work, we propose constructions that correct duplications of multiple consecutive symbols. These errors are known as tandem duplications, where a sequence of symbols is repeated; respectively as palindromic duplications, where a sequence is repeated in reversed order. We compare the redundancies of these constructions with code size upper bounds that are obtained from sphere packing arguments. Proving that an upper bound on the code cardinality for tandem deletions is also an upper bound for inserting tandem duplications, we derive the bounds based on this special tandem deletion error as this results in tighter bounds. Our upper bounds on the cardinality directly imply lower bounds on the redundancy which we compare with the redundancy of the best known construction correcting arbitrary burst insertions. Our results indicate that the correction of palindromic duplications requires more redundancy than the correction of tandem duplications and both significantly less than arbitr 收起 • We establish the limiting distribution of certain subsets of Farey sequences, i.e., sequences of primitive rational points, on expanding horospheres in covers$\Delta\backslash\mathrm{SL}(n+1,\mathbb{R})$of$\mathrm{SL}(n+1,\mathbb{Z})\backslash\mathrm{SL}(n+1,\mathbb{R})$, where$\Delta$is a finite index subgroup of$\mathrm{SL}(n+1,\mathbb{Z})$. These subsets can be obtained by projecting to the hyperplane$\{(x_1,\ldots,x_{n+1})\in\mathbb{R}^{n+1}:x_{n+1}=1\}$sets of the form$\mathbf{A}=\bigcup_{j=1}^J\boldsymbol{a}_j\Delta$, where for all$j$,$\boldsymbol{a}_j$is a primitive lattice point in$\mathbb{Z}^{n+1}$. Our method involves applying the equidistribution of expanding horospheres in quotients of$\mathrm{SL}(n+1,\mathbb{R})$developed by Marklof and Str\"{o}mbergsson, and more precisely understanding how the full Farey sequence distributes in$\Delta\backslash\mathrm{SL}(n+1,\mathbb{R})$when embedded on expanding horospheres as done in previous work by Marklof. For each 收起 • In this note we observe that one can contact embed all contact 3-manifolds into a Stein fillable contact structure on the twisted$S^3$-bundle over$S^2$and also into a unique overtwisted contact structure on$S^3\times S^2\$. These results are proven using "spun embeddings" and Lefschetz fibrations.

收起

• We construct pairs of elliptic curves over number fields with large intersection of projective torsion points.

收起

• We prove Polterovich's conjecture concerning the growth of the number of nodal domains for eigenfunctions on a unit square domain, under the assumption that the eigenfunctions do not have any singular points.

收起

• In this paper, we investigate the problem of beam alignment in millimeter wave (mmWave) systems, and design an optimal algorithm to reduce the overhead. Specifically, due to directional communications, the transmitter and receiver beams need to be aligned, which incurs high delay overhead since without a priori knowledge of the transmitter/receiver location, the search space spans the entire angular domain. This is further exacerbated under dynamic conditions (e.g., moving vehicles) where the access to the base station (access point) is highly dynamic with intermittent on-off periods, requiring more frequent beam alignment and signal training. To mitigate this issue, we consider an online stochastic optimization formulation where the goal is to maximize the directivity gain (i.e., received energy) of the beam alignment policy within a time period. We exploit the inherent correlation and unimodality properties of the model, and demonstrate that contextual information improves the perfor

收起

• Physical-layer security for wireless networks has become an effective approach and recently drawn significant attention in the literature. In particular, the deployment and allocation of resources such as relays to assist the transmission have gained significant interest due to their ability to improve the secrecy rate of wireless networks. In this work, we examine relay selection criteria with arbitrary knowledge of the channels of the users and the eavesdroppers. We present alternative optimization criteria based on the signal-to-interference and the secrecy rate criteria that can be used for resource allocation and that do not require knowledge of the channels of the eavesdroppers and the interference. We then develop effective relay selection algorithms that can achieve a high secrecy rate performance without the need for the knowledge of the channels of the eavesdroppers and the interference. Simulation results show that the proposed criteria and algorithms achieve excellent perfo

收起