solidot此次改版内容包括服务器更新、编程语言、网站后台管理的优化、页面和操作流程的优化等。

信息流

• When approximating a function that depend on a parameter, one encounters many practical examples where linear interpolation or linear approximation with respect to the parameters prove ineffective. This is particularly true for responses from hyperbolic partial differential equations (PDEs) where linear low-dimensional bases are difficult to discover. We propose the use of displacement interpolation where the interpolation is done on the Lagrangian action of the optimal transport map between the function at nearby parameters, which allows an effective dimensionality reduction of hyperbolic phenomena.

收起

• Let $G_{\mathbb{R}}$ be a simple real linear Lie group with maximal compact subgroup $K_{\mathbb{R}}$ and assume that ${\rm rank}(G_\mathbb{R})={\rm rank}(K_\mathbb{R})$. For any representation $X$ of Gelfand-Kirillov dimension $\frac{1}{2} {\rm dim}(G_{\mathbb{R}}/K_{\mathbb{R}})$, we consider the polynomial on the dual of a compact Cartan subalgebra given by the dimension of the Dirac index of members of the coherent family containing $X$. Under a technical condition involving the Springer correspondence, we establish an explicit relationship between this polynomial and the multiplicities of the irreducible components occurring in the associated cycle of $X$. This relationship was conjectured in \cite{MehdiPandzicVogan15}.

收起

• This thesis is about the study of Diophantine equations involving binary recurrent sequences with arithmetic functions. Various Diophantine problems are investigated and new results are found out of this study. Firstly, we study several questions concerning the intersection between two classes of non-degenerate binary recurrence sequences and provide, whenever possible, effective bounds on the largest member of this intersection. Our main study concerns Diophantine equations of the form $\varphi(|au_n |)=|bv_m|,$ where $\varphi$ is the Euler totient function, $\{u_n\}_{n\geq 0}$ and $\{v_m\}_{m\geq 0}$ are two non-degenerate binary recurrence sequences and $a,b$ some positive integers. More precisely, we study problems involving members of the recurrent sequences being rep-digits, Lehmer numbers, whose Euler's function remain in the same sequence. We particularly study the case when $\{u_n\}_{n\geq 0}$ is the Fibonacci sequence $\{F_n\}_{n\geq 0}$, the Lucas sequences $\{L_n\}_{n\geq 0 收起 • 12-12 MIT Technology 945 Ingestible sensors could help doctors keep people from becoming addicted to prescription painkillers. 收起 • This paper studies the diffusion limit for a network of infinite-server queues operating under Markov modulation (meaning that the system's parameters depend on an autonomously evolving background process). In previous papers on (primarily single-node) queues with Markov modulation, two variants were distinguished: one in which the server speed is modulated, and one in which the service requirement is modulated (i.e., depends on the state of the background process upon arrival). The setup of the present paper, however, is more general, as we allow both the server speed and the service requirement to depend on the background process. For this model we derive a Functional Central Limit Theorem: we show that, after accelerating the arrival processes and the background process, a centered and normalized version of the network population vector converges to a multivariate Ornstein-Uhlenbeck process. The proof of this result relies on expressing the queueing process in terms of Poisson proce 收起 • The purpose of the present paper is to study the exceptional eigenvalues of the asymmetric quantum Rabi models (AQRM), specifically, to determine the degeneracy of the exceptional eigenstates. Exceptional eigenvalues are labelled by certain integers and are considered to be remains of the eigenvalues of the uncoupled bosonic mode (i.e. the quantum harmonic oscillator). There are two kind of exceptional eigenvalues of the Hamiltonian$H^{\epsilon}_{\text{Rabi}}$of the AQRM: the Juddian, associated with polynomial, or quasi-exact, eigensolutions, and the non-Juddian exceptional. Here,$H^{\epsilon}_{\text{Rabi}}$is defined by adding the fluctuation term$\epsilon \sigma_x$, with real$\epsilon$and$\sigma_x$being the Pauli matrix, to the Hamiltonian of the quantum Rabi model (QRM), breaking its$\mathbb{Z}_2$-symmetry. An eigenvalue which is not exceptional is called regular and is always non-degenerate. We describe the constraint relations for allowing the model to have exceptional 收起 • We pursue here the development of models for complex (viscoelastic) fluids in shallow free-surface gravity flows which was initiated by [Bouchut-Boyaval, M3AS (23) 2013] for 1D (translation invariant) cases. The models we propose are hyperbolic quasilinear systems that generalize Saint-Venant shallow-water equations to incompressible Maxwell fluids. The models are compatible with a formulation of the thermo-dynamics second principle. In comparison with Saint-Venant standard shallow-water model, the momentum balance includes extra-stresses associated with an elastic potential energy in addition to a hydrostatic pressure. The extra-stresses are determined by an additional tensor variable solution to a differential equation with various possible time rates. For the numerical evaluation of solutions to Cauchy problems, we also propose explicit schemes discretizing our generalized Saint-Venant systems with Finite-Volume approximations that are entropy-consistent (under a CFL constraint) in 收起 • We first propose a pedestrian review of the Coordinate Bethe Ansatz for the$\delta$-Bose gas on an infinite axis. The scalar product of Bethe states, briefly reviewed, provides the first keystone to compute a compact expression for the Matrix Elements of the Particle Number Operator as conjectured by V. Terras, the main result of the following reflection. 收起 • Intelligent transportation systems (ITSs) will be a major component of tomorrow's smart cities. However, realizing the true potential of ITSs requires ultra-low latency and reliable data analytics solutions that can combine, in real-time, a heterogeneous mix of data stemming from the ITS network and its environment. Such data analytics capabilities cannot be provided by conventional cloud-centric data processing techniques whose communication and computing latency can be high. Instead, edge-centric solutions that are tailored to the unique ITS environment must be developed. In this paper, an edge analytics architecture for ITSs is introduced in which data is processed at the vehicle or roadside smart sensor level in order to overcome the ITS latency and reliability challenges. With a higher capability of passengers' mobile devices and intra-vehicle processors, such a distributed edge computing architecture can leverage deep learning techniques for reliable mobile sensing in ITSs. In th 收起 • We prove that the category of Dedekind$\sigma$-complete Riesz spaces is an infinitary variety, and we provide an explicit equational axiomatization. In fact, we show that finitely many axioms suffice over the usual equational axiomatization of Riesz spaces. Our main result is that$\mathbb{R}$, regarded as a Dedekind$\sigma$-complete Riesz space, generates this category as a quasi-variety, and therefore as a variety. Analogous results are established for the categories of (i) Dedekind$\sigma$-complete Riesz spaces with a weak order unit, (ii) Dedekind$\sigma$-complete lattice-ordered groups, and (iii) Dedekind$\sigma$-complete lattice-ordered groups with a weak order unit. 收起 • The paper deals with topical issues of modern mathematical theory of dynamical chaos and its applications. At present, it is customary to assume that dynamical chaos in finitedimensional smooth systems can exist in three different forms. This is dissipative chaos, the mathematical image of which is a strange attractor; conservative chaos, for which the entire phase space is a large "chaotic sea" with randomly spaced elliptical islands inside it; and mixed dynamics, characterized by the principal inseparability in the phase space of attractors, repellers and conservative elements of dynamics. In the present paper (which opens a cycle of three our papers), elements of the theory of pseudo-hyperbolic attractors of multidimensional maps are presented. Such attractors, as well as hyperbolic ones, are genuine strange attractors, but they allow the existence of homoclinic tangencies. We give a mathematical definition of a pseudo-hyperbolic attractor for the case of multidimensional maps, from 收起 • 12-12 LWN 877 A very early alpha version of the Elisa music player has been released. "Elisa allows to browse music by album, artist or all tracks. The music is indexed using either a private indexer or an indexer using Baloo. The private one can be configured to scan music on chosen paths. The Baloo one is much faster because Baloo is providing all needed data from its own database. You can build and play your own playlist." 收起 • We consider the problem of reconstructing the paths of a set of points over time, where, at each of a finite set of moments in time the current positions of points in space are only accessible through some small number of their X-rays. This particular particle tracking problem, with applications, e.g., in plasma physics, is the basic problem in dynamic discrete tomography. We introduce and analyze various different algorithmic models. In particular, we determine the computational complexity of the problem (and various of its relatives) and derive algorithms that can be used in practice. As a byproduct we provide new results on constrained variants of min-cost flow and matching problems. 收起 • 12-11 MIT Technology 940 It is trying. But the cryptocurrency is bigger than any country, even the one where it has been most popular. 收起 • The days of copper interconnects are numbered and carbon nanomaterials are poised to take up the job 收起 • 12-11 THE NEW YORKER 986 Meitu’s apps are changing what it means to be beautiful in the most populous country on earth. 收起 • 12-11 OSnews 1048 I recently came across a challenge to print a holiday greeting card on a vintage computer, so I decided to make a card on a 1960s IBM 1401 mainframe. The IBM 1401 computer was a low-end business mainframe announced in 1959, and went on to become the most popular computer of the mid-1960s, with more than 10,000 systems in use. The 1401's rental price started at$2500 a month (about $20,000 in current dollars), a low price that made it possible for even a medium-sized business to have a computer for payroll, accounting, inventory, and many other tasks. Although the 1401 was an early all-transistorized computer, these weren't silicon transistors - the 1401 used germanium transistors, the technology before silicon. It used magnetic core memory for storage, holding 16,000 characters. Some people have access to the coolest stuff. 收起 • Net neutrality is just a piece of how the Internet is regulated 收起 • 12-04 Slashdot 1161 The Washington Post ran a technology column asking what happens "when the face-mapping tech that powers the iPhone X's cutesy 'Animoji' starts being used for creepier purposes." It's not just that the iPhone X scans 30,000 points on your face to make a 3D model. Though Apple stores that data securely on the phone, instead of sending it to its servers over the Internet, "Apple just started sharing your face with lots of apps." Although their columnist praises Apple's own commitment to privacy, "I also think Apple rushed into sharing face maps with app makers that may not share its commitment, and it isn't being paranoid enough about the minefield it just entered." "I think we should be quite worried," said Jay Stanley, a senior policy analyst at the American Civil Liberties Union. "The chances we are going to see mischief around facial data is pretty high -- if not today, then soon -- if not on Apple then on Android." Apple's face tech sets some good precedents -- and some bad ones... L 收起 • 12-04 Hacker News 1119 Receiving and Decoding Russian Meteor-M2 satellite images in real time 收起 • 12-04 THE NEW YORKER 1163 Venezuela’s President has outmaneuvered his opponents. Can he survive an economy in free fall? 收起 • 12-04 THE NEW YORKER 1117 He and I both dislike hills. We both wear expandable waistbands. We both provide running commentary on our gas levels. 收起 • 12-04 Hacker News 1205 Ffwd: delegation is (much) faster than you think 收起 • 12-04 Hacker News 1190 Etleap Is Hiring Senior Java Developers 收起 • 12-04 Hacker News 1193 Ask HN: In your company, how important is code quality vs. getting things done 收起 • 12-04 Hacker News 1208 An online flea market that pays people instantly for their used goods 收起 • An anonymous reader quote The Guardian: The most glitzy event on the scientific calendar took place on Sunday night when the Breakthrough Foundation gave away$22 million in prizes to dozens of physicists, biologists and mathematicians at a ceremony in Silicon Valley. The winners this year include five researchers who won $3 million each for their work on cell biology, plant science and neurodegenerative diseases, two mathematicians, and a team of 27 physicists who mapped the primordial light that warmed the universe moments after the big bang 13.8 billion years ago. Now in their sixth year, the Breakthrough prizes are backed by Yuri Milner, a Silicon Valley tech investor, Mark Zuckerberg of Facebook and his wife Priscilla Chan, Anne Wojcicki from the DNA testing company 23andMe, and Google's Sergey Brin. Launched by Milner in 2012, the awards aim to make rock stars of scientists and raise their profile in the public consciousness. The annual ceremony at Nasa's Ames Research Center in 收起 • 12-04 THE NEW YORKER 1221 New cartoons from the magazine. 收起 • 12-04 THE NEW YORKER 1163 An immersive and staggeringly charming retrospective of the photographer’s work showcases his easeful acceptance of the world. 收起 • 12-04 THE NEW YORKER 127 “It was a terrible kiss, shockingly bad; Margot had trouble believing that a grown man could possibly be so bad at kissing.” 收起 • 12-04 THE NEW YORKER 126 Françoise Mouly interviews the artist Tom Gauld about the inspiration behind “Holiday Track,” his illustration for the cover of the December 11, 2017, issue of The New Yorker. 收起 • 12-04 Hacker News 148 Titanic: Machine Learning from Disaster 收起 • 12-04 THE NEW YORKER 132 “The wild / declensions refuse to stay inside your wobbly brain.” 收起 • 12-04 Hacker News 130 The Trouble with Politicians Sharing Passwords 收起 • 12-04 THE NEW YORKER 144 Her essays emanated authority, but her fiction betrayed an aching sense of uncertainty. 收起 • 12-04 THE NEW YORKER 134 Webcasters promise transparency and objectivity, but not all views deserve equal time. 收起 • 12-02 MIT Technology 136 In this paper, we show that the non-symmetric convex polytope cannot be served as a window function to produce a Gabor orthonormal basis by any time-frequency sets. 收起 • 12-02 Slashdot 164 An anonymous reader shares an NPR report: More than 90 percent of California's crop workers were born in Mexico. But in recent years, fewer have migrated to the U.S., according to the U.S. Department of Labor. Researchers point to a number of causes: tighter border controls; higher prices charged by smugglers; well-paying construction jobs and a growing middle-class in Mexico that doesn't want to pick vegetables for Americans. As a result, the average farmworker is now 45 years old, according to federal government data. Harvesting U.S. crops has been left to an aging population of farmworkers whose health has suffered from decades of hard labor. Older workers have a greater chance of getting injured and of developing chronic illnesses, which can raise the cost of workers' compensation and health insurance. 收起 • 12-02 Hacker News 135 App with local notification will crash iOS Springboard on Dec. 2 收起 • 12-02 Ars Technica 134 Meanwhile, Leapforce has suddenly been acquired by competitor Appen. 收起 • 12-02 Ars Technica 129 Users will no longer be troubled by shady apps that hijack lock screens. 收起 • 12-02 Hacker News 137 Ask HN: Who is hiring? (December 2017) 收起 • 12-02 Ars Technica 128 After 37 years, Voyager has fired up its trajectory thrusters 收起 • 12-02 Slashdot 174 A memo from the Los Angeles office of the Immigration and Customs Enforcement bureau (ICE) says that the officials assess "with moderate confidence that Chinese-based company DJI Science and Technology is providing U.S. critical infrastructure and law enforcement data to the Chinese government." It also says that the information is based on "open source reporting and a reliable source within the unmanned aerial systems industry with first and secondhand access." Engadget reports: Part of the memo focuses on targets that the LA ICE office believes to be of interest to DJI. "DJI's criteria for selecting accounts to target appears to focus on the account holder's ability to disrupt critical infrastructure," it said. The memo goes on to say that DJI is particularly interested in infrastructure like railroads and utilities, companies that provide drinking water as well as weapon storage facilities. The LA ICE office concludes that it, "assesses with high confidence the critical infrastructu 收起 • 12-02 Ars Technica 142 This week, the scientists and engineers on the Voyager team did something very special. 收起 • 12-02 Quanta Magazine 148 Advances in number theory inspired by physics 收起 • 12-02 Ars Technica 146 AT&T: Your Internet service won't change after FCC eliminates net neutrality rules. 收起 • 12-02 MIT Technology 132 “Metalenses” created with photolithography could change the nature of imaging and optical processing. 收起 • 12-02 Ars Technica 132 Unnatural DNA used to encode unnatural proteins, all in otherwise normal cells. 收起 • 12-02 Slashdot 180 Not too long after Linus Torvalds wrote his own Unix kernel, which he called Linux, in the summer of 1991, a magazine was founded by enthusiasts to focus on the operating system. For more than two decades Linux Journal has been an authority magazine on all things Linux, often cited by mainstream outlets, but it is now shuttering doors. In a blog post, Linux Journal's Carlie Fairchild writes: It looks like we're at the end, folks. If all goes according to a plan we'd rather not have, the November issue of Linux Journal was our last. The simple fact is that we've run out of money, and options along with it. We never had a wealthy corporate parent or deep pockets of our own, and that made us an anomaly among publishers, from start to finish. While we got to be good at flying close to the ground for a long time, we lost what little elevation we had in November, when the scale finally tipped irrevocably to the negative. Thanks for all the fish. 收起 • 12-02 LWN 168 We were sad to encounter the announcement that Linux Journal will be shutting down. "The simple fact is that we’ve run out of money, and options along with it. We never had a wealthy corporate parent or deep pockets of our own, and that made us an anomaly among publishers, from start to finish. While we got to be good at flying close to the ground for a long time, we lost what little elevation we had in November, when the scale finally tipped irrevocably to the negative." Linux Journal was out there tracking what was happening in our community long before anybody else; it will be missed. 收起 • 12-02 Hacker News 133 German government wants ‘backdoor’ access to every digital device: report 收起 • Pulling off Xerox Parc's historical day of demos involved a borrowed airport refrigeration truck and an ax 收起 • 12-02 Slashdot 167 schwit1 shares a report from MIT Technology Review: Blockchain technology can eliminate the need for companies and other organizations to maintain centralized repositories of identifying information, and users can gain permanent control over who can access their data (hence "self-sovereign"), says Drummond Reed, chief trust officer at Evernym, a startup that's developing a blockchain network specifically for managing digital identities. Self-sovereign identity systems rely on public-key cryptography, the same kind that blockchain networks use to validate transactions. Although it's been around for decades, the technology has thus far proved difficult to implement for consumer applications. But the popularity of cryptocurrencies has inspired fresh commercial interest in making it more user-friendly. Public-key cryptography relies on pairs of keys, one public and one private, which are used to authenticate users and verify their encrypted transactions. Bitcoin users are represented on th 收起 • 12-02 Ars Technica 134 Following the Pharma Bro's conviction, prosecutors now want to seize his assets. 收起 • 12-02 Ars Technica 132 DOJ: We Want Martin Shkreli’s Enigma Machine, Wu-Tang Album, and$7.3M

收起

• AI analysis of cars in Street View images can accurately estimate income, race, education, and voting patterns

收起

•   12-02 THE NEW YORKER 132

Dept. of Zzzzs

收起

•   12-02 Ars Technica 125

In defending itself, Comcast falsely equates fast lanes with data cap exemptions.

收起

•   12-02 Ars Technica 129

Users with injected software are 15 percent more likely to experience crashes.

收起

•   12-02 Slashdot 149

hackingbear shares a report from Science Magazine: Results reported by a China-led space science mission provide a tantalizing hint -- but not firm evidence -- for dark matter. In its first 530 days of scientific observations, China's Dark Matter Particle Explorer (DAMPE) detected 1.5 million cosmic ray electrons and positrons above a certain energy threshold. When researchers plot of the number of particles against their energy, they saw hints of an anomalous break in the curve. Now, DAMPE has confirmed that deviation. "It may be evidence of dark matter," but the break in the curve "may be from some other cosmic ray source," says astrophysicist Chang Jin, who leads the collaboration at the Chinese Academy of Science's Purple Mountain Observatory in Nanjing. DAMPE's life span will be extended to 5 years given the excellent conditions of this Chinese spacecraft, then it can record over 10 billion cosmic events, allowing researchers to confirm if it is indeed dark matter. Perhaps more si

收起

•   12-02 Hacker News 136

Checklist for Python libraries APIs

收起

•   12-02 Ars Technica 136

Missteps on HTC Vive (literally and figuratively) are nothing compared to PSVR problems.

收起

•   12-02 Ars Technica 133

Trailer: Featuring interviews with Kraft, Liebergot, and other NASA pros who made it happen.

收起

•   12-02 Hacker News 127

Bucket Stream: Finding S3 Buckets by watching certificate transparency logs

收起

• This article demonstrates the electromagnetic simulation and optimization of a coaxial-microstrip transition for a material characterization measurement system, including the effect of the probes themselves, and an analysis of how surface roughness affects sensor performance.

收起

•   12-02 Hacker News 131

Borderline Personality Disorder: Treatment Resistance Reconsidered

收起

•   12-02 Slashdot 167

According to a PC Magazine report that uses data from Cellular Insights, the Qualcomm-powered iPhone X has better LTE performance than the Intel-powered model. From the report: There are three iPhone X models sold globally. Using lab equipment, Cellular Insights tested two of them: the Qualcomm-powered A1865, sold by Sprint, Verizon, and U.S. Cellular and in Australia, China, and India; and the Intel-powered A1901, sold by most other global carriers including AT&T and T-Mobile. (The third model, A1902, is only sold in Japan.) Here in the U.S., we anticipate that the SIM-free model sold directly by Apple will be the A1865, as that's the model that supports all four U.S. carriers. For this test, Cellular Insights looked at performance on LTE Band 4, which is used by every major U.S. carrier except Sprint, as well as in Canada and parts of Latin America. Cellular Insights attenuated an LTE signal from a strong -85dBm until the modems showed no performance. While both modems started ou

收起

• An anonymous reader quotes a report from Inverse: In the new paper, presented Thursday at the annual meeting of the Radiological Society of North America, a team of radiologists at Korea University report that smartphone addiction changes teenagers' brains. Using brain imaging, they argue that smartphone- and internet-addicted teenagers have imbalanced brain chemistry when compared to their peers who aren't addicted to smartphones or the internet. But scientists not involved with the study have some serious issues with their research. Perhaps the most important of these issues is the fact that "smartphone addiction" is not a scientifically established thing -- at least not yet. In the study, the team led by Dr. Hyung Suk Seo used "standardized internet and smartphone addiction tests to measure the severity of internet addiction" in nine boys and 10 girls, according to a statement. Then, they used MRS, a brain imaging technique that can identify particular brain chemicals, to examine th

收起

•   12-02 Slashdot 165

Well, now we know what paid for all those programmers cranking out the overhauled Firefox Quantum browser: a major infusion of new money. From a report: Mozilla, the nonprofit behind the open-source web browser, saw its 2016 revenue increase 24 percent to an all-time high of $520 million, it said Friday. Expenses grew too, but not as much, from$361 million to $337 million, so the organization's war chest is significantly bigger now. Mozilla, which now has about 1,200 employees, releases prior-year financial results in conjunction with tax filings. Most of Mozilla's money comes from partnerships with search engines like Google, Yahoo, DuckDuckGo, Baidu and Yandex. When you search through Firefox's address bar, those search engines show search ads alongside results and share a portion of the revenue to Mozilla. Mozilla in 2014 signed a major five-year deal with Yahoo to be the default search engine in the US, but canceled it only three years in and moved back to Google instead in Novemb 收起 • View this webinar to learn how 3D printing’s versatility has paved the way for medical advancements by Cardiovascuar Systems, Inc. (CSI). 收起 • We consider maximal almost disjoint families of vector subspaces of countable vector spaces, focusing on questions of their size and definability. We prove that the minimum infinite cardinality of such a family cannot be decided in ZFC and that the "spectrum" of cardinalities of mad families of subspaces can be made arbitrarily large, in analogy to results for mad families on$\omega\$. We apply the author's local Ramsey theory for vector spaces to give partial results concerning their definability.

收起

•   12-02 THE NEW YORKER 138

Namesake Dept.

收起

•   12-02 IEEE 137

收起

•   12-02 Hacker News 124

'Snoopers' charter' changes put forward

收起

•   12-02 Hacker News 122

Domogik: Take Control of Your Home

收起

•   12-02 Hacker News 120

My 20-Year Experience of Software Development Methodologies

收起

•   12-02 Slashdot 148

Even as more people than ever are tuning to Netflix, Hulu, Amazon Prime and other streaming services to look, piracy too continues to thrive, a research suggests. An anonymous reader shares a report: Intrigued by this interplay of legal and unauthorized viewing, researchers from Carnegie Mellon University and Universidade Catolica Portuguesa carried out an extensive study. They partnered with a major telco, which is not named, to analyze if BitTorrent downloading habits can be changed by offering legal alternatives. The researchers used a piracy-tracking firm to get a sample of thousands of BitTorrent pirates at the associated ISP. Half of them were offered a free 45-day subscription to a premium TV and movies package, allowing them to watch popular content on demand. To measure the effects of video-on-demand access on piracy, the researchers then monitored the legal viewing activity and BitTorrent transfers of the people who received the free offer, comparing it to a control group. Th

收起

•   12-02 Hacker News 117

The Never-Ending Foreclosure

收起

•   12-02 Ars Technica 121

"This is my Senator. He sold me out to telecom lobbyists."

收起