id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
math/0209047 | Michel Henon | Michel Henon | A mechanical model for the transportation problem | 45 pages, 10 figures, 4 tables. This paper was written in 1992, but
not published (see Addendum for a brief history) | null | null | null | math.OC astro-ph cs.DM cs.NA math.NA | null | We describe a mechanical device which can be used as an analog computer to
solve the transportation problem. In practice this device is simulated by a
numerical algorithm. Tests show that this algorithm is 60 times faster than a
current subroutine (NAG library) for an average 1000 x 1000 problem. Its
performance is even better for degenerate problems in which the weights take
only a small number of integer values.
| [
{
"version": "v1",
"created": "Thu, 5 Sep 2002 09:46:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Henon",
"Michel",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
null,
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
math/0209267 | Boaz Tsaban | D. Garber, S. Kaplan, M. Teicher, B. Tsaban and U. Vishne | Length-based conjugacy search in the Braid group | Small updates | Contemporary Mathematics 418 (2006), 75--87 | null | null | math.GR cs.CR math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several key agreement protocols are based on the following "Generalized
Conjugacy Search Problem": Find, given elements b_1,...,b_n and
xb_1x^{-1},...,xb_nx^{-1} in a nonabelian group G, the conjugator x. In the
case of subgroups of the braid group B_N, Hughes and Tannenbaum suggested a
length-based approach to finding x. Since the introduction of this approach,
its effectiveness and successfulness were debated.
We introduce several effective realizations of this approach. In particular,
a new length function is defined on B_N which possesses significantly better
properties than the natural length associated to the Garside normal form. We
give experimental results concerning the success probability of this approach,
which suggest that very large computational power is required for this method
to successfully solve the Generalized Conjugacy Search Problem when its
parameters are as in existing protocols.
| [
{
"version": "v1",
"created": "Fri, 20 Sep 2002 14:19:51 GMT"
},
{
"version": "v2",
"created": "Sun, 13 Jun 2004 16:31:16 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Sep 2005 15:07:52 GMT"
},
{
"version": "v4",
"created": "Thu, 17 May 2007 20:26:13 GMT"
},
{
"version": "v5",
"created": "Sun, 31 Oct 2010 19:01:13 GMT"
}
] | 2010-11-02T00:00:00 | [
[
"Garber",
"D.",
""
],
[
"Kaplan",
"S.",
""
],
[
"Teicher",
"M.",
""
],
[
"Tsaban",
"B.",
""
],
[
"Vishne",
"U.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
math/0209316 | Thomas Zaslavsky | Konstantin Rybnikov (University of Massachusetts at Lowell and MSRI),
Thomas Zaslavsky (Binghamton University) | Cycle and Circle Tests of Balance in Gain Graphs: Forbidden Minors and
Their Groups | 19 pages, 3 figures. Format: Latex2e. Changes: minor. To appear in
Journal of Graph Theory | J. Graph Theory, 51 (2006), no. 1, 1--21. | null | null | math.CO cs.DM cs.DS | null | We examine two criteria for balance of a gain graph, one based on binary
cycles and one on circles. The graphs for which each criterion is valid depend
on the set of allowed gain groups. The binary cycle test is invalid, except for
forests, if any possible gain group has an element of odd order. Assuming all
groups are allowed, or all abelian groups, or merely the cyclic group of order
3, we characterize, both constructively and by forbidden minors, the graphs for
which the circle test is valid. It turns out that these three classes of groups
have the same set of forbidden minors. The exact reason for the importance of
the ternary cyclic group is not clear.
| [
{
"version": "v1",
"created": "Tue, 24 Sep 2002 04:24:53 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Sep 2003 06:35:59 GMT"
},
{
"version": "v3",
"created": "Thu, 25 Nov 2004 00:21:18 GMT"
}
] | 2010-01-24T00:00:00 | [
[
"Rybnikov",
"Konstantin",
"",
"University of Massachusetts at Lowell and MSRI"
],
[
"Zaslavsky",
"Thomas",
"",
"Binghamton University"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0209332 | Toby Ord | Toby Ord | Hypercomputation: computing more than the Turing machine | 57 pages, 9 figures | null | null | null | math.LO cs.OH math-ph math.MP | null | Due to common misconceptions about the Church-Turing thesis, it has been
widely assumed that the Turing machine provides an upper bound on what is
computable. This is not so. The new field of hypercomputation studies models of
computation that can compute more than the Turing machine and addresses their
implications. In this report, I survey much of the work that has been done on
hypercomputation, explaining how such non-classical models fit into the
classical theory of computation and comparing their relative powers. I also
examine the physical requirements for such machines to be constructible and the
kinds of hypercomputation that may be possible within the universe. Finally, I
show how the possibility of hypercomputation weakens the impact of Godel's
Incompleteness Theorem and Chaitin's discovery of 'randomness' within
arithmetic.
| [
{
"version": "v1",
"created": "Wed, 25 Sep 2002 18:07:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ord",
"Toby",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
math/0209407 | Vladimir Anashin | Vladimir Anashin (Faculty for the Information Security, Russian State
University for the Humanities) | Uniformly distributed sequences of p-adic integers, II | 55 pages, no figures, AMSTeX. To appear in Diskretnaya Mathematika
(Russian), English translation in Diskrete Mathematics (Plenum Publ.) | Diskret.Mat., vol. 14 (2002), no. 4. pp. 3--64 (Russian); Discrete
Math. Appl., vol. 12 (2002), no. 6, pp. 527--590 (English translation) | null | IISIS-02-09-01 | math.NT cs.IT math.DS math.IT | null | The paper describes ergodic (with respect to the Haar measure) functions in
the class of all functions, which are defined on (and take values in) the ring
of p-adic integers, and which satisfy (at least, locally) Lipschitz condition
with coefficient 1. Equiprobable (in particular, measure-preserving) functions
of this class are described also. In some cases (and especially for p=2) the
descriptions are given by explicit formulae. Some of the results may be viewed
as descriptions of ergodic isometric dynamical systems on p-adic unit disk. The
study was motivated by the problem of pseudorandom number generation for
computer simulation and cryptography. From this view the paper describes
nonlinear congruential pseudorandom generators modulo M which produce stricly
periodic uniformly distributed sequences modulo M with maximal possible period
length (i.e., exactly M). Both the state change function and the output
function of these generators could be, e.g., meromorphic functions (in
particular, polynomials with rational, but not necessarily integer
coefficients, or rational functions), or compositions of arithmetical
operations (like addition, multiplication, exponentiation, raising to integer
powers, including negative ones) with standard computer operations, such as
bitwise logical operations (XOR, OR, AND, etc.). The linear complexity of the
produced sequences is also studied.
| [
{
"version": "v1",
"created": "Mon, 30 Sep 2002 13:46:14 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Anashin",
"Vladimir",
"",
"Faculty for the Information Security, Russian State\n University for the Humanities"
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0210018 | Michael Farber | Michael Farber, Serge Tabachnikov and Sergey Yuzvinsky | Topological robotics: motion planning in projective spaces | 16 pages | null | null | null | math.AT cs.RO math.DG | null | We study an elementary problem of topological robotics: rotation of a line,
which is fixed by a revolving joint at a base point: one wants to bring the
line from its initial position to a final position by a continuous motion in
the space. The final goal is to construct an algorithm which will perform this
task once the initial and final positions are given.
Any such motion planning algorithm will have instabilities, which are caused
by topological reasons. A general approach to study instabilities of robot
motion was suggested recently by the first named author. With any
path-connected topological space X one associates a number TC(X), called the
topological complexity of X. This number is of fundamental importance for the
motion planning problem: TC(X) determines character of instabilities which have
all motion planning algorithms in X.
In the present paper we study the topological complexity of real projective
spaces. In particular we compute TC(RP^n) for all n<24. Our main result is that
(for n distinct from 1, 3, 7) the problem of calculating of TC(RP^n) is
equivalent to finding the smallest k such that RP^n can be immersed into the
Euclidean space R^{k-1}.
| [
{
"version": "v1",
"created": "Wed, 2 Oct 2002 09:13:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Farber",
"Michael",
""
],
[
"Tabachnikov",
"Serge",
""
],
[
"Yuzvinsky",
"Sergey",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
}
] |
math/0210052 | Konstantin Rybnikov | Konstantin Rybnikov, Thomas Zaslavsky | Criteria for Balance in Abelian Gain Graphs, with Applications to
Piecewise-Linear Geometry | Changes(28 Dec. 2004): revised title and abstract; shortened, mainly
by omitting inessentials; minor errors fixed. Changes (16 Jan. 2005):
ADDED--Appendix with detailes on some proofs and another counterexample with
picture, a few references. Minor typo and notation fixes. To appear in
Discrete & Comput. Geometry (without Appendix and extra references) | Discrete and Computational Geometry, 34 (2005), no. 2, 251-268. | null | null | math.CO cs.CG cs.DM cs.DS math.AT | null | A gain graph is a triple (G,h,H), where G is a connected graph with an
arbitrary, but fixed, orientation of edges, H is a group, and h is a
homomorphism from the free group on the edges of G to H. A gain graph is called
balanced if the h-image of each closed walk on G is the identity.
Consider a gain graph with abelian gain group having no odd torsion. If there
is a basis of the graph's binary cycle space each of whose members can be
lifted to a closed walk whose gain is the identity, then the gain graph is
balanced, provided that the graph is finite or the group has no nontrivial
infinitely 2-divisible elements. We apply this theorem to deduce a result on
the projective geometry of piecewise-linear realizations of cell-decompositions
of manifolds.
| [
{
"version": "v1",
"created": "Thu, 3 Oct 2002 16:33:59 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Sep 2003 22:30:04 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Sep 2003 00:35:21 GMT"
},
{
"version": "v4",
"created": "Tue, 28 Dec 2004 21:56:59 GMT"
},
{
"version": "v5",
"created": "Mon, 17 Jan 2005 04:46:14 GMT"
}
] | 2010-01-24T00:00:00 | [
[
"Rybnikov",
"Konstantin",
""
],
[
"Zaslavsky",
"Thomas",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
}
] |
math/0210115 | Michael Farber | Michael Farber and Sergey Yuzvinsky | Topological Robotics: Subspace Arrangements and Collision Free Motion
Planning | 11 pages | null | null | null | math.AT cs.RO math.DG | null | We study an elementary problem of the topological robotics: collective motion
of a set of $n$ distinct particles which one has to move from an initial
configuration to a final configuration, with the requirement that no collisions
occur in the process of motion. The ultimate goal is to construct an algorithm
which will perform this task once the initial and the final configurations are
given. This reduces to a topological problem of finding the topological
complexity TC(C_n(\R^m)) of the configutation space C_n(\R^m) of $n$ distinct
ordered particles in \R^m. We solve this problem for m=2 (the planar case) and
for all odd m, including the case m=3 (particles in the three-dimensional
space). We also study a more general motion planning problem in Euclidean space
with a hyperplane arrangement as obstacle.
| [
{
"version": "v1",
"created": "Tue, 8 Oct 2002 06:39:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Farber",
"Michael",
""
],
[
"Yuzvinsky",
"Sergey",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
}
] |
math/0210408 | David Joyner | David Joyner and Will Traves | Representations of finite groups on Riemann-Roch spaces | 24 pages, significant revision | null | null | null | math.AG cs.IT math.GR math.IT | null | We study the action of a finite group on the Riemann-Roch space of certain
divisors on a curve. If $G$ is a finite subgroup of the automorphism group of a
projective curve $X$ over an algebraically closed field and $D$ is a divisor on
$X$ left stable by $G$ then we show the irreducible constituents of the natural
representation of $G$ on the Riemann-Roch space $L(D)=L_X(D)$ are of dimension
$\leq d$, where $d$ is the size of the smallest $G$-orbit acting on $X$. We
give an example to show that this is, in general, sharp (i.e., that dimension
$d$ irreducible constituents can occur). Connections with coding theory, in
particular to permutation decoding of AG codes, are discussed in the last
section. Many examples are included.
| [
{
"version": "v1",
"created": "Sat, 26 Oct 2002 16:42:13 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Nov 2002 16:14:17 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Dec 2002 17:11:16 GMT"
},
{
"version": "v4",
"created": "Sun, 18 Apr 2004 15:24:11 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Joyner",
"David",
""
],
[
"Traves",
"Will",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0211040 | Gluesing-Luerssen | H. Gluesing-Luerssen and W. Schmale | On cyclic convolutional codes | 50 pages | null | null | null | math.RA cs.IT math.CO math.IT | null | We investigate the notion of cyclicity for convolutional codes as it has been
introduced by Piret and Roos in the seventies. Codes of this type are described
as submodules of the module of all vector polynomials in one variable with some
additional generalized cyclic structure but also as specific left ideals in a
skew polynomial ring. Extending a result of Piret, we show in a purely
algebraic setting that these ideals are always principal. This leads to the
notion of a generator polynomial just like for cyclic block codes. Similarly a
control polynomial can be introduced by considering the right annihilator
ideal. An algorithmic procedure is developed which produces unique reduced
generator and control polynomials. We also show how basic code properties and a
minimal generator matrix can be read off from these objects. A close link
between polynomial and vector description of the codes is provided by certain
generalized circulant matrices.
| [
{
"version": "v1",
"created": "Mon, 4 Nov 2002 09:10:54 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Gluesing-Luerssen",
"H.",
""
],
[
"Schmale",
"W.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0211107 | Massimo Giulietti | Massimo Giulietti | On Near-MDS Elliptic Codes | Latex 2e, 13 pages | null | null | null | math.AG cs.IT math.CO math.IT | null | The main conjecture on maximum distance separable (MDS) codes states that,
execpt for some special cases, the maximum length of a q-ary linear MDS code is
q+1. This conjecture does not hold true for near maximum distance separable
codes because of the existence of q-ary near MDS elliptic codes having length
bigger than q+1. An interesting related question is whether a near MDS elliptic
code can be extended to a longer near MDS code. Our results are some
non-extendability results and an alternative and simpler construction for
certain known near MDS elliptic codes.
| [
{
"version": "v1",
"created": "Wed, 6 Nov 2002 13:41:51 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Giulietti",
"Massimo",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0211156 | Bernd Fiedler | B. Fiedler | Ideal decompositions and computation of tensor normal forms | 16 pages | Seminaire Lotharingien de Combinatoire, 45 (2001) Article B45g.
http://www.mat.univie.ac.at/~slc/wpapers/s45fiedler.html | null | null | math.CO cs.SC math.DG | null | Symmetry properties of r-times covariant tensors T can be described by
certain linear subspaces W of the group ring K[S_r] of a symmetric group S_r.
If for a class of tensors T such a W is known, the elements of the orthogonal
subspace W^{\bot} of W within the dual space of K[S_r] yield linear identities
needed for a treatment of the term combination problem for the coordinates of
the T. We give the structure of these W for every situation which appears in
symbolic tensor calculations by computer. Characterizing idempotents of such W
can be determined by means of an ideal decomposition algorithm which works in
every semisimple ring up to an isomorphism. Furthermore, we use tools such as
the Littlewood-Richardson rule, plethysms and discrete Fourier transforms for
S_r to increase the efficience of calculations. All described methods were
implemented in a Mathematica package called PERMS.
| [
{
"version": "v1",
"created": "Sat, 9 Nov 2002 18:47:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fiedler",
"B.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
}
] |
math/0211267 | Kamil Kulesza | Kamil Kulesza, Zbigniew Kotulski, Joseph Pieprzyk | On alternative approach for verifiable secret sharing | This is poster that was presented on ESORICS2002 conference in
Zurich. It consists of 4 color pages, with proposal and flowcharts | null | null | null | math.CO cs.CR cs.DM | null | Secret sharing allows split/distributed control over the secret (e.g. master
key). Verifiable secret sharing (VSS) is the secret sharing extended by
verification capacity.
Usually verification comes at the price. We propose "free lunch", the
approach that allows to overcome this inconvenience.
| [
{
"version": "v1",
"created": "Mon, 18 Nov 2002 09:13:47 GMT"
}
] | 2016-09-07T00:00:00 | [
[
"Kulesza",
"Kamil",
""
],
[
"Kotulski",
"Zbigniew",
""
],
[
"Pieprzyk",
"Joseph",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0211269 | Kamil Kulesza | Kamil Kulesza, Zbigniew Kotulski | On ASGS framework: general requirements and an example of implementation | 8 pages paper with 9 pages appendixes. Keywords: cryptography, secret
sharing, data security, extended capabilities, extended key verification
protocol | null | null | null | math.CO cs.CR cs.DM cs.IT math.IT | null | In the paper we propose general framework for Automatic Secret Generation and
Sharing (ASGS) that should be independent of underlying secret sharing scheme.
ASGS allows to prevent the dealer from knowing the secret or even to eliminate
him at all. Two situations are discussed. First concerns simultaneous
generation and sharing of the random, prior nonexistent secret. Such a secret
remains unknown until it is reconstructed. Next, we propose the framework for
automatic sharing of a known secret. In this case the dealer does not know the
secret and the secret owner does not know the shares. We present opportunities
for joining ASGS with other extended capabilities, with special emphasize on
PVSS and proactive secret sharing. Finally, we illustrate framework with
practical implementation.
Keywords: cryptography, secret sharing, data security, extended capabilities,
extended key verification protocol
| [
{
"version": "v1",
"created": "Mon, 18 Nov 2002 09:50:31 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Nov 2002 14:53:47 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Kulesza",
"Kamil",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0211307 | Konstantinos Drakakis | Konstantinos Drakakis, Dragan Radulovic | On the multiresolution structure of Internet traffic traces | 57 pages, color figures. Figures are of low quality due to space
considerations | null | 10.1117/12.475274 | null | math.PR cs.NI | null | Internet traffic on a network link can be modeled as a stochastic process.
After detecting and quantifying the properties of this process, using
statistical tools, a series of mathematical models is developed, culminating in
one that is able to generate ``traffic'' that exhibits --as a key feature-- the
same difference in behavior for different time scales, as observed in real
traffic, and is moreover indistinguishable from real traffic by other
statistical tests as well. Tools inspired from the models are then used to
determine and calibrate the type of activity taking place in each of the time
scales. Surprisingly, the above procedure does not require any detailed
information originating from either the network dynamics, or the decomposition
of the total traffic into its constituent user connections, but rather only the
compliance of these connections to very weak conditions.
| [
{
"version": "v1",
"created": "Wed, 20 Nov 2002 01:21:14 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Feb 2003 20:05:18 GMT"
}
] | 2015-06-26T00:00:00 | [
[
"Drakakis",
"Konstantinos",
""
],
[
"Radulovic",
"Dragan",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
math/0211317 | Kamil Kulesza | Kamil Kulesza, Zbigniew Kotulski | On graph coloring check-digit method | 7 pages, paper sumitted to Applied Mathematics Letters (Elsevier) | null | null | null | math.CO cs.CR cs.DM cs.DS | null | We show a method how to convert any graph into the binary number and vice
versa. We derive upper bound for maximum number of graphs, that, have fixed
number of vertices and can be colored with n colors (n is any given number).
Proof for the result is outlined. Next, graph coloring based check-digit scheme
is proposed. We use quantitative result derived, to show, that feasibility of
the proposed scheme increases with size of the number which digits are checked,
and overall probability of digits errors.
| [
{
"version": "v1",
"created": "Wed, 20 Nov 2002 12:41:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kulesza",
"Kamil",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0211344 | Thorsten Theobald | R. Brandenberg (Technische Universitaet Muenchen), T. Theobald
(Technische Universitaet Muenchen) | Algebraic methods for computing smallest enclosing and circumscribing
cylinders of simplices | 4 figures | null | null | null | math.OC cs.CG | null | We provide an algebraic framework to compute smallest enclosing and smallest
circumscribing cylinders of simplices in Euclidean space $\E^n$. Explicitly,
the computation of a smallest enclosing cylinder in $\mathbb{E}^3$ is reduced
to the computation of a smallest circumscribing cylinder. We improve existing
polynomial formulations to compute the locally extreme circumscribing cylinders
in $\E^3$ and exhibit subclasses of simplices where the algebraic degrees can
be further reduced. Moreover, we generalize these efficient formulations to the
$n$-dimensional case and provide bounds on the number of local extrema. Using
elementary invariant theory, we prove structural results on the direction
vectors of any locally extreme circumscribing cylinder for regular simplices.
| [
{
"version": "v1",
"created": "Thu, 21 Nov 2002 15:57:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brandenberg",
"R.",
"",
"Technische Universitaet Muenchen"
],
[
"Theobald",
"T.",
"",
"Technische Universitaet Muenchen"
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
math/0212038 | Fernando Torres | Carlos Munuera and Fernando Torres | A Goppa-like bound on the trellis state complexity of algebraic
geometric codes | LaTeX, 13 pages, IEEE Trans. Inform. Theory: to appear, available at
http://www.ime.unicamp.br/~ftorres | null | null | null | math.AG cs.IT math.IT | null | For a linear code $\cC$ of length $n$ and dimension $k$, Wolf noticed that
the trellis state complexity $s(\cC)$ of $\cC$ is upper bounded by
$w(\cC):=\min(k,n-k)$. In this paper we point out some new lower bounds for
$s(\cC)$. In particular, if $\cC$ is an Algebraic Geometric code, then
$s(\cC)\geq w(\cC)-(g-a)$, where $g$ is the genus of the underlying curve and
$a$ is the abundance of the code.
| [
{
"version": "v1",
"created": "Tue, 3 Dec 2002 14:13:55 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Munuera",
"Carlos",
""
],
[
"Torres",
"Fernando",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0212044 | Frank Sottile | Frank Sottile | Toric ideals, real toric varieties, and the algebraic moment map | Corrected the discussion in the published version about the moment
map, and changed the title from "Toric ideals, real toric varieties, and the
moment map". This should be the definitive version | in Topics in Algebraic Geometry and Geometric Modeling, Contemp.
Math., 334, 2003., pp.225-240 | null | null | math.AG cs.CG | null | This is a tutorial on some aspects of toric varieties related to their
potential use in geometric modeling. We discuss projective toric varieties and
their ideals, as well as real toric varieties and the algebraic moment map. In
particular, we explain the relation between linear precision and the algebraic
moment map. This builds on the introduction to toric varieties by David Cox:
What is a Toric Variety? at http://www.cs.amherst.edu/~dac/lectures/tutorial.ps
| [
{
"version": "v1",
"created": "Tue, 3 Dec 2002 17:41:40 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2003 21:38:33 GMT"
},
{
"version": "v3",
"created": "Fri, 18 Apr 2008 18:05:27 GMT"
}
] | 2008-04-18T00:00:00 | [
[
"Sottile",
"Frank",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
math/0212212 | Jorge Cortes | J. Cortes, S. Martinez, T. Karatas, F. Bullo | Coverage control for mobile sensing networks | 13 pages; double column; 6 figures; submitted to IEEE Transactions on
Robotics and Automation | IEEE Transactions on Robotics and Automation 20 (2) (2004),
243-255 | null | null | math.OC cs.IT math.IT | null | This paper presents control and coordination algorithms for groups of
vehicles. The focus is on autonomous vehicle networks performing distributed
sensing tasks where each vehicle plays the role of a mobile tunable sensor. The
paper proposes gradient descent algorithms for a class of utility functions
which encode optimal coverage and sensing policies. The resulting closed-loop
behavior is adaptive, distributed, asynchronous, and verifiably correct.
| [
{
"version": "v1",
"created": "Mon, 16 Dec 2002 18:51:14 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Cortes",
"J.",
""
],
[
"Martinez",
"S.",
""
],
[
"Karatas",
"T.",
""
],
[
"Bullo",
"F.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0212278 | Bernd Fiedler | B. Fiedler | Determination of the structure of algebraic curvature tensors by means
of Young symmetrizers | 19 pages. To appear Seminaire Lotharingien de Combinatoire:
http://www.mat.univie.ac.at/~slc/ | Seminaire Lotharingien de Combinatoire, 48 (2003) Article B48d | null | null | math.CO cs.SC math.DG | null | For a positive definite fundamental tensor all known examples of Osserman
algebraic curvature tensors have a typical structure. They can be produced from
a metric tensor and a finite set of skew-symmetric matrices which fulfil
Clifford commutation relations. We show by means of Young symmetrizers and a
theorem of S. A. Fulling, R. C. King, B. G. Wybourne and C. J. Cummins that
every algebraic curvature tensor has a structure which is very similar to that
of the above Osserman curvature tensors. We verify our results by means of the
Littlewood-Richardson rule and plethysms. For certain symbolic calculations we
used the Mathematica packages MathTensor, Ricci and PERMS.
| [
{
"version": "v1",
"created": "Thu, 19 Dec 2002 20:26:42 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Dec 2002 18:25:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fiedler",
"B.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
}
] |
math/0301042 | Bernd Fiedler | B. Fiedler | On the symmetry classes of the first covariant derivatives of tensor
fields | 21 pages. Sent in to Seminaire Lotharingien de Combinatoire:
http://www.mat.univie.ac.at/~slc/ | Seminaire Lotharingien de Combinatoire, 49 (2003) Article B49f | null | null | math.CO cs.SC math.DG | null | We show that the symmetry classes of torsion-free covariant derivatives
$\nabla T$ of r-times covariant tensor fields T can be characterized by
Littlewood-Richardson products $\sigma [1]$ where $\sigma$ is a representation
of the symmetric group $S_r$ which is connected with the symmetry class of T.
If $\sigma = [\lambda]$ is irreducible then $\sigma [1]$ has a multiplicity
free reduction $[\lambda][1] = \sum [\mu]$ and all primitive idempotents
belonging to that sum can be calculated from a generating idempotent e of the
symmetry class of T by means of the irreducible characters or of a discrete
Fourier transform of $S_{r+1}$. We apply these facts to derivatives $\nabla S$,
$\nabla A$ of symmetric or alternating tensor fields. The symmetry classes of
the differences $\nabla S - sym(\nabla S)$ and $\nabla A - alt(\nabla A)$ are
characterized by Young frames (r, 1) and (2, 1^{r-1}), respectively. However,
while the symmetry class of $\nabla A - alt(\nabla A)$ can be generated by
Young symmetrizers of (2, 1^{r-1}), no Young symmetrizer of (r, 1) generates
the symmetry class of $\nabla S - sym(\nabla S)$. Furthermore we show in the
case r = 2 that $\nabla S - sym(\nabla S)$ and $\nabla A - alt(\nabla A)$ can
be applied in generator formulas of algebraic covariant derivative curvature
tensors. For certain symbolic calculations we used the Mathematica packages
Ricci and PERMS.
| [
{
"version": "v1",
"created": "Mon, 6 Jan 2003 16:28:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fiedler",
"B.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
}
] |
math/0301135 | Thomas Strohmer | Thomas Strohmer and Robert Heath | Grassmannian Frames with Applications to Coding and Communication | Submitted in June 2002 to Appl. Comp. Harm. Anal | null | null | null | math.FA cs.IT math.IT | null | For a given class ${\cal F}$ of uniform frames of fixed redundancy we define
a Grassmannian frame as one that minimizes the maximal correlation $|< f_k,f_l
>|$ among all frames $\{f_k\}_{k \in {\cal I}} \in {\cal F}$. We first analyze
finite-dimensional Grassmannian frames. Using links to packings in Grassmannian
spaces and antipodal spherical codes we derive bounds on the minimal achievable
correlation for Grassmannian frames. These bounds yield a simple condition
under which Grassmannian frames coincide with uniform tight frames. We exploit
connections to graph theory, equiangular line sets, and coding theory in order
to derive explicit constructions of Grassmannian frames. Our findings extend
recent results on uniform tight frames. We then introduce infinite-dimensional
Grassmannian frames and analyze their connection to uniform tight frames for
frames which are generated by group-like unitary systems. We derive an example
of a Grassmannian Gabor frame by using connections to sphere packing theory.
Finally we discuss the application of Grassmannian frames to wireless
communication and to multiple description coding.
| [
{
"version": "v1",
"created": "Mon, 13 Jan 2003 19:07:08 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Strohmer",
"Thomas",
""
],
[
"Heath",
"Robert",
""
]
] | [
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0301211 | N. Raghavendra | N. Raghavendra | Binary trees and fibred categories | 19 pages | null | null | null | math.CO cs.DM math.CT | null | We develop a purely set-theoretic formalism for binary trees and binary
graphs. We define a category of binary automata, and display it as a fibred
category over the category of binary graphs. We also relate the notion of
binary graphs to transition systems, which arise in the theory of concurrent
computing.
| [
{
"version": "v1",
"created": "Mon, 20 Jan 2003 06:46:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Raghavendra",
"N.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
math/0301268 | Kagan Tumer | David Wolpert, Kagan Tumer and Esfandiar Bandari | Improving Search Algorithms by Using Intelligent Coordinates | null | null | 10.1103/PhysRevE.69.017701 | null | math.OC cond-mat.stat-mech cs.MA nlin.AO | null | We consider the problem of designing a set of computational agents so that as
they all pursue their self-interests a global function G of the collective
system is optimized. Three factors govern the quality of such design. The first
relates to conventional exploration-exploitation search algorithms for finding
the maxima of such a global function, e.g., simulated annealing. Game-theoretic
algorithms instead are related to the second of those factors, and the third is
related to techniques from the field of machine learning. Here we demonstrate
how to exploit all three factors by modifying the search algorithm's
exploration stage so that rather than by random sampling, each coordinate of
the underlying search space is controlled by an associated
machine-learning-based ``player'' engaged in a non-cooperative game.
Experiments demonstrate that this modification improves SA by up to an order of
magnitude for bin-packing and for a model of an economic process run over an
underlying network. These experiments also reveal novel small worlds phenomena.
| [
{
"version": "v1",
"created": "Thu, 23 Jan 2003 20:22:02 GMT"
}
] | 2009-11-10T00:00:00 | [
[
"Wolpert",
"David",
""
],
[
"Tumer",
"Kagan",
""
],
[
"Bandari",
"Esfandiar",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
math/0301274 | Tien D. Kieu | Toby Ord and Tien D. Kieu | On the existence of a new family of Diophantine equations for $\bf
\Omega$ | null | Fundamenta Informaticae 56 (2003) 273--284 | null | null | math.NT cs.CC quant-ph | null | We show how to determine the $k$-th bit of Chaitin's algorithmically random
real number $\Omega$ by solving $k$ instances of the halting problem. From this
we then reduce the problem of determining the $k$-th bit of $\Omega$ to
determining whether a certain Diophantine equation with two parameters, $k$ and
$N$, has solutions for an odd or an even number of values of $N$. We also
demonstrate two further examples of $\Omega$ in number theory: an exponential
Diophantine equation with a parameter $k$ which has an odd number of solutions
iff the $k$-th bit of $\Omega$ is 1, and a polynomial of positive integer
variables and a parameter $k$ that takes on an odd number of positive values
iff the $k$-th bit of $\Omega$ is 1.
| [
{
"version": "v1",
"created": "Fri, 24 Jan 2003 06:27:50 GMT"
},
{
"version": "v2",
"created": "Sun, 26 Jan 2003 14:05:41 GMT"
},
{
"version": "v3",
"created": "Sun, 12 Oct 2003 06:36:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ord",
"Toby",
""
],
[
"Kieu",
"Tien D.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
math/0302043 | Markus Wessler | Andreas Klein and Markus Wessler | Extended visual cryptography systems | 10 pages | null | null | null | math.CO cs.IT math.IT | null | Visual cryptography schemes have been introduced in 1994 by Naor and Shamir.
Their idea was to encode a secret image into $n$ shadow images and to give
exactly one such shadow image to each member of a group $P$ of $n$ persons.
Whereas most work in recent years has been done concerning the problem of
qualified and forbidden subsets of $P$ or the question of contrast optimizing,
in this paper we study extended visual cryptography schemes, i.e. shared secret
systems where any subset of $P$ shares its own secret.
| [
{
"version": "v1",
"created": "Tue, 4 Feb 2003 15:19:12 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Klein",
"Andreas",
""
],
[
"Wessler",
"Markus",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0302132 | Iwan M. Duursma | I.M. Duursma, M. Greferath | Computing Symmetrized Weight Enumerators for Lifted Quadratic Residue
Codes | 9 pages | null | null | null | math.CO cs.IT math.IT | null | The paper describes a method to determine symmetrized weight enumerators of
$p^m$-linear codes based on the notion of a disjoint weight enumerator.
Symmetrized weight enumerators are given for the lifted quadratic residue codes
of length 24 modulo $2^m$ and modulo $3^m$, for any positive $m$.
| [
{
"version": "v1",
"created": "Wed, 12 Feb 2003 02:59:19 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Duursma",
"I. M.",
""
],
[
"Greferath",
"M.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0302154 | Iwan M. Duursma | I.M. Duursma | Twisted Klein curves modulo 2 | 14 pages | null | null | null | math.NT cs.IT math.AG math.IT | null | We give an explicit description of all 168 quartic curves over the field of
two elements that are isomorphic to the Klein curve over an algebraic
extension. Some of the curves have been known for their small class number,
others for attaining the maximal number of rational points.
| [
{
"version": "v1",
"created": "Thu, 13 Feb 2003 02:29:43 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Duursma",
"I. M.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0302172 | Iwan M. Duursma | I.M. Duursma | Results on zeta functions for codes | 12 pages | null | null | null | math.CO cs.IT math.IT math.NT | null | We give a new and short proof of the Mallows-Sloane upper bound for self-dual
codes. We formulate a version of Greene's theorem for normalized weight
enumerators. We relate normalized rank-generating polynomials to two-variable
zeta functions. And we show that a self-dual code has the Clifford property,
but that the same property does not hold in general for formally self-dual
codes.
| [
{
"version": "v1",
"created": "Fri, 14 Feb 2003 17:10:36 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Duursma",
"I. M.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
math/0302303 | Jeffrey Shallit | Narad Rampersad, Jeffrey Shallit, Ming-wei Wang | Cubefree binary words avoiding long squares | PLEASE NOTE: After this paper was prepared, we learned that all our
results appeared (albeit with different proofs) in a paper of F. M. Dekking,
On repetitions of blocks in binary sequences, J. Combin. Theory Ser. A 20
(1976), 292--299 | null | null | null | math.CO cs.DM | null | Entringer, Jackson, and Schatz conjectured in 1974 that every infinite
cubefree binary word contains arbitrarily long squares. In this paper we show
this conjecture is false: there exist infinite cubefree binary words avoiding
all squares xx with |x| >= 4, and the number 4 is best possible. However, the
Entringer-Jackson-Schatz conjecture is true if "cubefree" is replaced with
"overlap-free".
| [
{
"version": "v1",
"created": "Tue, 25 Feb 2003 13:56:28 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Apr 2003 18:37:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rampersad",
"Narad",
""
],
[
"Shallit",
"Jeffrey",
""
],
[
"Wang",
"Ming-wei",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0302315 | Ernie Croot | Ernie Croot | Memory Efficient Arithmetic | Difference between this version and last: Better notation, light
corrections, and more explanations | null | null | null | math.NT cs.DS | null | In this paper we give an algorithm for computing the mth base-b digit (m=1 is
the least significant digit) of an integer n (actually, it finds sharp
approximations to n/b^m mod 1), where n is defined as the last number in a
sequence of integers s1,s2,...,sL=n, where s1=0, s2=1, and each successive si
is either the sum, product, or difference of two previous sj's in the sequence.
In many cases, the algorithm will find this mth digit using far less memory
than it takes to write down all the base-b digits of n, while the number of bit
operations will grow only slighly worse than linear in the number of digits.
One consequence of this result is that the mth base-10 digit of 2^t can be
found using O(t^{2/3} log^C t) bits of storage (for some C>0), and O(t log^C t)
bit operations.
The algorithm is also highly parallelizable, and an M-fold reduction in
running time can be achieved using M processors, although the memory required
will then grow by a factor of M.
| [
{
"version": "v1",
"created": "Tue, 25 Feb 2003 19:42:25 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Feb 2003 22:52:29 GMT"
},
{
"version": "v3",
"created": "Thu, 20 Mar 2003 19:27:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Croot",
"Ernie",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0303104 | Fernando Torres | Carlos Munuera and Fernando Torres | Bounding the trellis state complexity of algebraic geometric codes | LaTeX, 14 pages, available at http://www.ime.unicamp.br/~ftorres | null | null | null | math.AG cs.IT math.IT | null | Let C be an algebraic geometric code of dimension k and length n constructed
on a curve X over $F_q$. Let s(C) be the state complexity of C and set
w(C):=min{k,n-k}, the Wolf upper bound on s(C). We introduce a numerical
function R that depends on the gonality sequence of X and show that s(C)\geq
w(C)-R(2g-2), where g is the genus of X. As a matter of fact, R(2g-2)\leq
g-(\gamma_2-2) with \gamma_2 being the gonality over F_q of X, and thus in
particular we have that s(C)\geq w(C)-g+\gamma_2-2.
| [
{
"version": "v1",
"created": "Sat, 8 Mar 2003 19:24:47 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Munuera",
"Carlos",
""
],
[
"Torres",
"Fernando",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0303254 | Joachim Rosenthal | Heide Gluesing-Luerssen, Joachim Rosenthal and Roxana Smarandache | Strongly MDS Convolutional Codes | 33 pages | null | null | null | math.RA cs.IT math.IT math.OC | null | MDS convolutional codes have the property that their free distance is maximal
among all codes of the same rate and the same degree. In this paper we
introduce a class of MDS convolutional codes whose column distances reach the
generalized Singleton bound at the earliest possible instant. We call these
codes strongly MDS convolutional codes. It is shown that these codes can decode
a maximum number of errors per time interval when compared with other
convolutional codes of the same rate and degree. These codes have also a
maximum or near maximum distance profile. A code has a maximum distance profile
if and only if the dual code has this property.
| [
{
"version": "v1",
"created": "Thu, 20 Mar 2003 16:00:53 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Gluesing-Luerssen",
"Heide",
""
],
[
"Rosenthal",
"Joachim",
""
],
[
"Smarandache",
"Roxana",
""
]
] | [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
math/0303386 | Ilya Kapovich | Ilya Kapovich, Paul Schupp and Vladimir Shpilrain | Generic properties of Whitehead's Algorithm and isomorphism rigidity of
random one-relator groups | final revised version, to appear in Pacific J. Math | null | null | null | math.GR cs.CC math.GT | null | We prove that Whitehead's algorithm for solving the automorphism problem in a
fixed free group $F_k$ has strongly linear time generic-case complexity. This
is done by showing that the ``hard'' part of the algorithm terminates in linear
time on an exponentially generic set of input pairs. We then apply these
results to one-relator groups. We obtain a Mostow-type isomorphism rigidity
result for random one-relator groups: If two such groups are isomorphic then
their Cayley graphs on the \emph{given generating sets} are isometric. Although
no nontrivial examples were previously known, we prove that one-relator groups
are generically \emph{complete} groups, that is, they have trivial center and
trivial outer automorphism group. We also prove that the stabilizers of generic
elements of $F_k$ in $Aut(F_k)$ are cyclic groups generated by inner
automorphisms and that $Aut(F_k)$-orbits are uniformly small in the sense of
their growth entropy. We further prove that the number $I_k(n)$ of
\emph{isomorphism types} of $k$-generator one-relator groups with defining
relators of length $n$ satisfies \[ \frac{c_1}{n} (2k-1)^n \le I_k(n)\le
\frac{c_2}{n} (2k-1)^n, \] where $c_1=c_1(k)>0, c_2=c_2(k)>0$ are some
constants independent of $n$. Thus $I_k(n)$ grows in essentially the same
manner as the number of cyclic words of length $n$.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2003 13:59:44 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Apr 2003 22:48:13 GMT"
},
{
"version": "v3",
"created": "Mon, 23 Jun 2003 03:13:38 GMT"
},
{
"version": "v4",
"created": "Fri, 27 Aug 2004 18:46:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kapovich",
"Ilya",
""
],
[
"Schupp",
"Paul",
""
],
[
"Shpilrain",
"Vladimir",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
}
] |
math/0304095 | Jeffrey Shallit | Juhani Karhumaki and Jeffrey Shallit | Polynomial versus Exponential Growth in Repetition-Free Binary Words | 12 pages | null | null | null | math.CO cs.DM | null | It is known that the number of overlap-free binary words of length n grows
polynomially, while the number of cubefree binary words grows exponentially. We
show that the dividing line between polynomial and exponential growth is 7/3.
More precisely, there are only polynomially many binary words of length n that
avoid 7/3-powers, but there are exponentially many binary words of length n
that avoid (7/3+)-powers. This answers an open question of Kobayashi from 1986.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2003 18:21:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karhumaki",
"Juhani",
""
],
[
"Shallit",
"Jeffrey",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0304100 | J. Maurice Rojas | J. Maurice Rojas | A Direct Ultrametric Approach to Additive Complexity and the Shub-Smale
Tau Conjecture | 9 pages, no figures. Submitted for publication | null | null | null | math.NT cs.CC | null | The Shub-Smale Tau Conjecture is a hypothesis relating the number of integral
roots of a polynomial f in one variable and the Straight-Line Program (SLP)
complexity of f. A consequence of the truth of this conjecture is that, for the
Blum-Shub-Smale model over the complex numbers, P differs from NP. We prove two
weak versions of the Tau Conjecture and in so doing show that the Tau
Conjecture follows from an even more plausible hypothesis.
Our results follow from a new p-adic analogue of earlier work relating real
algebraic geometry to additive complexity. For instance, we can show that a
nonzero univariate polynomial of additive complexity s can have no more than
15+s^3(s+1)(7.5)^s s! =O(e^{s\log s}) roots in the 2-adic rational numbers Q_2,
thus dramatically improving an earlier result of the author. This immediately
implies the same bound on the number of ordinary rational roots, whereas the
best previous upper bound via earlier techniques from real algebraic geometry
was a quantity in Omega((22.6)^{s^2}).
This paper presents another step in the author's program of establishing an
algorithmic arithmetic version of fewnomial theory.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2003 23:10:53 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Apr 2003 05:17:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rojas",
"J. Maurice",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/0304192 | Mireille Boutin | Mireille Boutin, Gregor Kemper | On reconstructing n-point configurations from the distribution of
distances or areas | 21 pages, latex | null | null | null | math.AC cs.CV cs.SC | null | One way to characterize configurations of points up to congruence is by
considering the distribution of all mutual distances between points. This paper
deals with the question if point configurations are uniquely determined by this
distribution. After giving some counterexamples, we prove that this is the case
for the vast majority of configurations. In the second part of the paper, the
distribution of areas of sub-triangles is used for characterizing point
configurations. Again it turns out that most configurations are reconstructible
from the distribution of areas, though there are counterexamples.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2003 10:01:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boutin",
"Mireille",
""
],
[
"Kemper",
"Gregor",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
math/0304283 | Alexei Miasnikov | Alexei D. Miasnikov, Alexei G. Myasnikov | Whitehead method and Genetic Algorithms | 29 pages, 7 figures | null | null | null | math.GR cs.NE cs.SC | null | In this paper we discuss a genetic version (GWA) of the Whitehead's
algorithm, which is one of the basic algorithms in combinatorial group theory.
It turns out that GWA is surprisingly fast and outperforms the standard
Whitehead's algorithm in free groups of rank >= 5. Experimenting with GWA we
collected an interesting numerical data that clarifies the time-complexity of
the Whitehead's Problem in general. These experiments led us to several
mathematical conjectures. If confirmed they will shed light on hidden
mechanisms of Whitehead Method and geometry of automorphic orbits in free
groups.
| [
{
"version": "v1",
"created": "Sun, 20 Apr 2003 16:24:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Miasnikov",
"Alexei D.",
""
],
[
"Myasnikov",
"Alexei G.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
math/0304292 | John B. Little | John B. Little | The Ubiquity of Order Domains for the Construction of Error Control
Codes | 21 pages; AMS-LaTeX. The statement of Theorem (3.3) in the original
version (renumbered to Theorem 2 in this version) omitted a necessary
hypothesis, which is now added in this version | Advances in Mathematics of Communications 1 (2007), 151-171 | null | null | math.AC cs.IT math.AG math.IT math.RA | null | The order domains are a class of commutative rings introduced by H{\o}holdt,
van Lint, and Pellikaan to simplify the theory of error control codes using
ideas from algebraic geometry. The definition is largely motivated by the
structures utilized in the Berlekamp-Massey-Sakata (BMS) decoding algorithm,
with Feng-Rao majority voting for unknown syndromes, applied to one-point
geometric Goppa codes constructed from curves. However, order domains are much
more general, and O'Sullivan has shown that the BMS algorithm can be applied to
decode all codes constructed from order domains by a suitable generalization of
Goppa's procedure for curves. In this article we will first discuss the
connection between order domains and valuations on function fields over a
finite field. Under some mild conditions, we will see that a general projective
variety over a finite field has projective models which can be used to
construct order domains and Goppa-type codes for which the BMS algorithm is
applicable. We will then give a slightly different interpretation of Geil and
Pellikaan's extrinsic characterization of order domains via the theory of
Gr\"obner bases, and show that their results are related to the existence of
toric deformations of varieties. To illustrate the potential usefulness of
these observations, we present a series of new explicit examples of order
domains associated to varieties with many rational points over finite fields:
Hermitian hypersurfaces, Grassmannians, and flag varieties.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2003 16:18:51 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Mar 2008 15:50:50 GMT"
}
] | 2008-03-24T00:00:00 | [
[
"Little",
"John B.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
math/0304305 | Alexei Miasnikov | Alexei D. Miasnikov, Alexei G. Myasnikov | Balanced presentations of the trivial group on two generators and the
Andrews-Curtis conjecture | 7 pages, no figures | In W.Kantor and A.Seress,editors, Groups and Computation III,
volume 23, (2001) 257-263, Berlin | null | null | math.GR cs.SC | null | The Andrews-Curtis conjecture states that every balanced presentation of the
trivial group can be reduced to the standard one by a sequence of the
elementary Nielsen transformations and conjugations. In this paper we describe
all balanced presentations of the trivial group on two generators and with the
total length of relators <= 12. We show that all these presentations satisfy
the Andrews-Curtis conjecture.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2003 21:01:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Miasnikov",
"Alexei D.",
""
],
[
"Myasnikov",
"Alexei G.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
math/0304306 | Alexei Miasnikov | Alexei D. Miasnikov | Genetic algorithms and the Andrews-Curtis conjecture | 19 pages | International Journal of Algebra and Computation, Vol. 9 No. 6,
(1999) 671-686 | null | null | math.GR cs.NE cs.SC | null | The Andrews-Curtis conjecture claims that every balanced presentation of the
trivial group can be transformed into the trivial presentation by a finite
sequence of "elementary transformations" which are Nielsen transformations
together with an arbitrary conjugation of a relator. It is believed that the
Andrews-Curtis conjecture is false; however, not so many possible
counterexamples are known. It is not a trivial matter to verify whether the
conjecture holds for a given balanced presentation or not. The purpose of this
paper is to describe some non-deterministic methods, called Genetic Algorithms,
designed to test the validity of the Andrews-Curtis conjecture. Using such
algorithm we have been able to prove that all known (to us) balanced
presentations of the trivial group where the total length of the relators is at
most 12 satisfy the conjecture. In particular, the Andrews-Curtis conjecture
holds for the presentation <x,y|x y x = y x y, x^2 = y^3> which was one of the
well known potential counterexamples.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2003 21:07:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Miasnikov",
"Alexei D.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
math/0304346 | Frank Sottile | G\'abor Megyesi (UMIST) and Frank Sottile (Texas A&M University) | The envelope of lines meeting a fixed line that are tangent to two
spheres | 24 pages, 13 .eps pictures | Discrete and Computational Geometry, 33, Number 4, (2005)
617--644. | null | null | math.AG cs.CG math.MG | null | We study the set of lines that meet a fixed line and are tangent to two
spheres and classify the configurations consisting of a single line and three
spheres for which there are infinitely many lines tangent to the three spheres
that also meet the given line. All such configurations are degenerate. The path
to this result involves the interplay of some beautiful and intricate geometry
of real surfaces in 3-space, complex algebraic geometry, explicit computation
and graphics.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2003 01:10:39 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Feb 2005 21:08:51 GMT"
}
] | 2010-03-29T00:00:00 | [
[
"Megyesi",
"Gábor",
"",
"UMIST"
],
[
"Sottile",
"Frank",
"",
"Texas A&M University"
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
math/0304476 | Jeffrey Shallit | Jeffrey Shallit | Simultaneous avoidance of large squares and fractional powers in
infinite binary words | null | null | null | null | math.CO cs.DM | null | In 1976, Dekking showed that there exists an infinite binary word that
contains neither squares yy with y >= 4 nor cubes xxx. We show that `cube' can
be replaced by any fractional power > 5/2. We also consider the analogous
problem where `4' is replaced by any integer. This results in an interesting
and subtle hierarchy.
| [
{
"version": "v1",
"created": "Tue, 29 Apr 2003 13:17:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shallit",
"Jeffrey",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0305121 | Marcus Hutter | Marcus Hutter | Robust Estimators under the Imprecise Dirichlet Model | 16 LaTeX pages | Proc. 3rd International Symposium on Imprecise Probabilities and
Their Application (ISIPTA-2003), pages 274-289 | null | IDSIA-03-03 | math.PR cs.IT cs.LG math.IT math.ST stat.TH | null | Walley's Imprecise Dirichlet Model (IDM) for categorical data overcomes
several fundamental problems which other approaches to uncertainty suffer from.
Yet, to be useful in practice, one needs efficient ways for computing the
imprecise=robust sets or intervals. The main objective of this work is to
derive exact, conservative, and approximate, robust and credible interval
estimates under the IDM for a large class of statistical estimators, including
the entropy and mutual information.
| [
{
"version": "v1",
"created": "Thu, 8 May 2003 17:11:45 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0305135 | Gluesing-Luerssen | Heide Gluesing-Luerssen and Wiland Schmale | Distance bounds for convolutional codes and some optimal codes | 22 pages | null | null | null | math.RA cs.IT math.IT math.OC | null | After a discussion of the Griesmer and Heller bound for the distance of a
convolutional code we present several codes with various parameters, over
various fields, and meeting the given distance bounds. Moreover, the Griesmer
bound is used for deriving a lower bound for the field size of an MDS
convolutional code and examples are presented showing that, in most cases, the
lower bound is tight. Most of the examples in this paper are cyclic
convolutional codes in a generalized sense as it has been introduced in the
seventies. A brief introduction to this promising type of cyclicity is given at
the end of the paper in order to make the examples more transparent.
| [
{
"version": "v1",
"created": "Fri, 9 May 2003 08:14:26 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Gluesing-Luerssen",
"Heide",
""
],
[
"Schmale",
"Wiland",
""
]
] | [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
math/0305308 | N. J. A. Sloane | Benoit Cloitre, N. J. A. Sloane, Matthew J. Vandermast | Numerical Analogues of Aronson's Sequence | 16 pages | J. Integer Sequences, 6 (2003), #03.2.2 | null | null | math.NT cs.IT math.IT | null | Aronson's sequence 1, 4, 11, 16, ... is defined by the English sentence ``t
is the first, fourth, eleventh, sixteenth, ... letter of this sentence.'' This
paper introduces some numerical analogues, such as: a(n) is taken to be the
smallest positive integer greater than a(n-1) which is consistent with the
condition ``n is a member of the sequence if and only if a(n) is odd.'' This
sequence can also be characterized by its ``square'', the sequence a^(2)(n) =
a(a(n)), which equals 2n+3 for n >= 1. There are many generalizations of this
sequence, some of which are new, while others throw new light on previously
known sequences.
| [
{
"version": "v1",
"created": "Wed, 21 May 2003 21:56:26 GMT"
}
] | 2014-09-17T00:00:00 | [
[
"Cloitre",
"Benoit",
""
],
[
"Sloane",
"N. J. A.",
""
],
[
"Vandermast",
"Matthew J.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0306081 | Jeffrey Shallit | Narad Rampersad, Jeffrey Shallit, and Ming-wei Wang | Avoiding large squares in infinite binary words | null | null | null | null | math.CO cs.DM | null | We consider three aspects of avoiding large squares in infinite binary words.
First, we construct an infinite binary word avoiding both cubes xxx and squares
yy with |y| >= 4; our construction is somewhat simpler than the original
construction of Dekking. Second, we construct an infinite binary word avoiding
all squares except 00, 11, and 0101; our construction is somewhat simpler than
the original construction of Fraenkel and Simpson. In both cases, we also show
how to modify our construction to obtain exponentially many words of length n
with the given avoidance properties. Finally, we answer an open question of
Prodinger and Urbanek from 1979 by demonstrating the existence of two infinite
binary words, each avoiding arbitrarily large squares, such that their perfect
shuffle has arbitrarily large squares.
| [
{
"version": "v1",
"created": "Wed, 4 Jun 2003 14:47:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rampersad",
"Narad",
""
],
[
"Shallit",
"Jeffrey",
""
],
[
"Wang",
"Ming-wei",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0306354 | Atsushi Kameyama | Atsushi Kameyama | Coding and tiling of Julia sets for subhyperbolic rational maps | 27 pages, 5 figures | null | null | null | math.DS cs.IT math.IT | null | Let $f:\hat{C}\to\hat{C}$ be a subhyperbolic rational map of degree $d$. We
construct a set of coding maps $Cod(f)=\{\pi_r:\Sigma\to J\}_r$ of the Julia
set $J$ by geometric coding trees, where the parameter $r$ ranges over mappings
from a certain tree to the Riemann sphere. Using the universal covering space
$\phi:\tilde S\to S$ for the corresponding orbifold, we lift the inverse of $f$
to an iterated function system $I=(g_i)_{i=1,2,...,d}$. For the purpose of
studying the structure of $Cod(f)$, we generalize Kenyon and Lagarias-Wang's
results : If the attractor $K$ of $I$ has positive measure, then $K$ tiles
$\phi^{-1}(J)$, and the multiplicity of $\pi_r$ is well-defined. Moreover, we
see that the equivalence relation induced by $\pi_r$ is described by a finite
directed graph, and give a necessary and sufficient condition for two coding
maps $\pi_r$ and $\pi_{r'}$ to be equal.
| [
{
"version": "v1",
"created": "Wed, 25 Jun 2003 06:53:54 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Kameyama",
"Atsushi",
""
]
] | [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0306395 | Francois Rodier | Francois Rodier | Sur la non-linearite des fonctions booleennes | null | null | 10.4064/aa115-1-1 | null | math.NT cs.IT math.IT | null | Boolean functions on the space $F_{2}^m$ are not only important in the theory
of error-correcting codes, but also in cryptography, where they occur in
private key systems. In these two cases, the nonlinearity of these function is
a main concept. In this article, I show that the spectral amplitude of boolean
functions, which is linked to their nonlinearity, is of the order of
$2^{m/2}\sqrt{m}$ in mean, whereas its range is bounded by $2^{m/2}$ and $2^m$.
Moreover I examine a conjecture of Patterson and Wiedemann saying that the
minimum of this spectral amplitude is as close as desired to $2^{m/2}$. I also
study a weaker conjecture about the moments of order 4 of their Fourier
transform. This article is inspired by works of Salem, Zygmund, Kahane and
others about the related problem of real polynomials with random coefficients.
| [
{
"version": "v1",
"created": "Fri, 27 Jun 2003 12:49:14 GMT"
}
] | 2015-06-26T00:00:00 | [
[
"Rodier",
"Francois",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0306401 | Frank Sottile | Herv\'e Br\"onnimann, Hazel Everett, Sylvain Lazard, Frank Sottile,
and Sue Whitesides | The number of transversals to line segments in R^3 | 9 pages, 7.eps pictures in color, abstract to apper in CCCG03 | Discrete and Computational Geometry, Volume 34, Number 3, (2005),
381--390. | null | null | math.MG cs.CG | null | We completely describe the structure of the connected components of
transversals to a collection of n line segments in R^3. We show that n>2
arbitrary line segments in R^3 admit 0, 1, ..., n or infinitely many line
transversals. In the latter case, the transversals form up to n connected
components.
| [
{
"version": "v1",
"created": "Fri, 27 Jun 2003 18:36:03 GMT"
}
] | 2010-03-29T00:00:00 | [
[
"Brönnimann",
"Hervé",
""
],
[
"Everett",
"Hazel",
""
],
[
"Lazard",
"Sylvain",
""
],
[
"Sottile",
"Frank",
""
],
[
"Whitesides",
"Sue",
""
]
] | [
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
math/0307064 | N. J. A. Sloane | N. J. A. Sloane, Thomas Wieder | The Number of Hierarchical Orderings | 7 pages | Order, 21 (2004), 83-89 | null | null | math.CO cs.IT math.IT | null | An ordered set-partition (or preferential arrangement) of n labeled elements
represents a single ``hierarchy''; these are enumerated by the ordered Bell
numbers. In this note we determine the number of ``hierarchical orderings'' or
``societies'', where the n elements are first partitioned into m <= n subsets
and a hierarchy is specified for each subset. We also consider the unlabeled
case, where the ordered Bell numbers are replaced by the composition numbers.
If there is only a single hierarchy, we show that the average rank of an
element is asymptotic to n/(4 log 2) in the labeled case and to n/4 in the
unlabeled case.
| [
{
"version": "v1",
"created": "Fri, 4 Jul 2003 16:02:58 GMT"
}
] | 2014-09-17T00:00:00 | [
[
"Sloane",
"N. J. A.",
""
],
[
"Wieder",
"Thomas",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0307196 | Ryan Hutchinson | R. Hutchinson, J. Rosenthal, R. Smarandache | Convolutional Codes with Maximum Distance Profile | 15 pages, submitted to Systems and Control Letters, corrected date | null | null | null | math.OC cs.IT math.IT math.RA | null | Maximum distance profile codes are characterized by the property that two
trajectories which start at the same state and proceed to a different state
will have the maximum possible distance from each other relative to any other
convolutional code of the same rate and degree.
In this paper we use methods from systems theory to characterize maximum
distance profile codes algebraically. Tha main result shows that maximum
distance profile codes form a generic set inside the variety which parametrizes
the set of convolutional codes of a fixed rate and a fixed degree.
| [
{
"version": "v1",
"created": "Mon, 14 Jul 2003 16:59:21 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Hutchinson",
"R.",
""
],
[
"Rosenthal",
"J.",
""
],
[
"Smarandache",
"R.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
math/0308046 | Noam D. Elkies | Noam D. Elkies | Still better nonlinear codes from modular curves | 10 pages | null | null | null | math.NT cs.IT math.AG math.IT | null | We give a new construction of nonlinear error-correcting codes over suitable
finite fields k from the geometry of modular curves with many rational points
over k, combining two recent improvements on Goppa's construction. The
resulting codes are asymptotically the best currently known.
| [
{
"version": "v1",
"created": "Tue, 5 Aug 2003 22:22:41 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Elkies",
"Noam D.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0308110 | Oliver Henkel | Oliver Henkel | Sphere packing bounds in the Grassmann and Stiefel manifolds | Replaced with final version, 11 pages | IEEE Transactions on Information Theory, vol 51, no 10, (2005),
3445-3456 | 10.1109/TIT.2005.855594 | null | math.MG cs.IT math.IT | null | Applying the Riemann geometric machinery of volume estimates in terms of
curvature, bounds for the minimal distance of packings/codes in the Grassmann
and Stiefel manifolds will be derived and analyzed. In the context of
space-time block codes this leads to a monotonically increasing minimal
distance lower bound as a function of the block length. This advocates large
block lengths for the code design.
| [
{
"version": "v1",
"created": "Tue, 12 Aug 2003 09:43:14 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Jun 2004 08:22:51 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Sep 2005 11:59:28 GMT"
},
{
"version": "v4",
"created": "Wed, 28 Sep 2005 07:10:48 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Henkel",
"Oliver",
""
]
] | [
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0308153 | J. G. Wolff | J Gerard Wolff | Mathematics and Logic as Information Compression by Multiple Alignment,
Unification and Search | null | null | null | null | math.GM cs.AI math.LO | null | This article introduces the conjecture that "mathematics, logic and related
disciplines may usefully be understood as information compression (IC) by
'multiple alignment', 'unification' and 'search' (ICMAUS)".
As a preparation for the two main sections of the article, concepts of
information and information compression are reviewed. Related areas of research
are also described including IC in brains and nervous systems, and IC in
relation to inductive inference, Minimum Length Encoding and probabilistic
reasoning. The ICMAUS concepts and a computer model in which they are embodied
are briefly described.
The first of the two main sections describes how many of the commonly-used
forms and structures in mathematics, logic and related disciplines (such as
theoretical linguistics and computer programming) may be seen as devices for
IC. In some cases, these forms and structures may be interpreted in terms of
the ICMAUS framework.
The second main section describes a selection of examples where processes of
calculation and inference in mathematics, logic and related disciplines may be
understood as IC. In many cases, these examples may be understood more
specifically in terms of the ICMAUS concepts.
| [
{
"version": "v1",
"created": "Fri, 15 Aug 2003 16:24:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolff",
"J Gerard",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
math/0309081 | Robert Ellis | Joshua N. Cooper, Robert B. Ellis, and Andrew B. Kahng | Asymmetric binary covering codes | 16 pages | J. Combin. Theory Ser. A 100 (2002), no. 2, 232--249 | null | null | math.CO cs.IT math.IT | null | An asymmetric binary covering code of length n and radius R is a subset C of
the n-cube Q_n such that every vector x in Q_n can be obtained from some vector
c in C by changing at most R 1's of c to 0's, where R is as small as possible.
K^+(n,R) is defined as the smallest size of such a code. We show K^+(n,R) is of
order 2^n/n^R for constant R, using an asymmetric sphere-covering bound and
probabilistic methods. We show K^+(n,n-R')=R'+1 for constant coradius R' iff
n>=R'(R'+1)/2. These two results are extended to near-constant R and R',
respectively. Various bounds on K^+ are given in terms of the total number of
0's or 1's in a minimal code. The dimension of a minimal asymmetric linear
binary code ([n,R]^+ code) is determined to be min(0,n-R). We conclude by
discussing open problems and techniques to compute explicit values for K^+,
giving a table of best known bounds.
| [
{
"version": "v1",
"created": "Thu, 4 Sep 2003 20:56:55 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Cooper",
"Joshua N.",
""
],
[
"Ellis",
"Robert B.",
""
],
[
"Kahng",
"Andrew B.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0309083 | Shmuel Onn | Shmuel Onn and Uriel G. Rothblum | Convex Combinatorial Optimization | null | Discrete and Computational Geometry, 32:549--566, 2004 | null | null | math.CO cs.DM math.OC | null | We introduce the convex combinatorial optimization problem, a far reaching
generalization of the standard linear combinatorial optimization problem. We
show that it is strongly polynomial time solvable over any edge-guaranteed
family, and discuss several applications.
| [
{
"version": "v1",
"created": "Fri, 5 Sep 2003 04:19:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Onn",
"Shmuel",
""
],
[
"Rothblum",
"Uriel G.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
math/0309120 | Nate Harvey | Nate Harvey, Yuval Peres (UC Berkeley) | An invariant of finitary codes with finite expected square root coding
length | 18 pages | null | null | null | math.PR cs.IT math.IT | null | Let $p$ and $q$ be probability vectors with the same entropy $h$. Denote by
$B(p)$ the Bernoulli shift indexed by $\Z$ with marginal distribution $p$.
Suppose that $\phi$ is a measure preserving homomorphism from $B(p)$ to $B(q)$.
We prove that if the coding length of $\phi$ has a finite 1/2 moment, then
$\sigma_p^2=\sigma_q^2$, where $\sigma_p^2=\sum_i p_i(-\log p_i-h)^2$ is the
{\dof informational variance} of $p$. In this result, which sharpens a theorem
of Parry (1979), the 1/2 moment cannot be replaced by a lower moment. On the
other hand, for any $\theta<1$, we exhibit probability vectors $p$ and $q$ that
are not permutations of each other, such that there exists a finitary
isomorphism $\Phi$ from $B(p)$ to $B(q)$ where the coding lengths of $\Phi$ and
of its inverse have a finite $\theta$ moment. We also present an extension to
ergodic Markov chains.
| [
{
"version": "v1",
"created": "Mon, 8 Sep 2003 19:36:11 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Harvey",
"Nate",
"",
"UC Berkeley"
],
[
"Peres",
"Yuval",
"",
"UC Berkeley"
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0309123 | Chris Lomont | Chris Lomont | Error Correcting Codes on Algebraic Surfaces | This is Chris Lomont's PhD thesis about error correcting codes from
algebriac surfaces | null | null | null | math.NT cs.IT math.AG math.IT | null | Error correcting codes are defined and important parameters for a code are
explained. Parameters of new codes constructed on algebraic surfaces are
studied. In particular, codes resulting from blowing up points in $\proj^2$ are
briefly studied, then codes resulting from ruled surfaces are covered. Codes
resulting from ruled surfaces over curves of genus 0 are completely analyzed,
and some codes are discovered that are better than direct product Reed Solomon
codes of similar length. Ruled surfaces over genus 1 curves are also studied,
but not all classes are completely analyzed. However, in this case a family of
codes are found that are comparable in performance to the direct product code
of a Reed Solomon code and a Goppa code. Some further work is done on surfaces
from higher genus curves, but there remains much work to be done in this
direction to understand fully the resulting codes. Codes resulting from blowing
points on surfaces are also studied, obtaining necessary parameters for
constructing infinite families of such codes.
Also included is a paper giving explicit formulas for curves with more
\field{q}-rational points than were previously known for certain combinations
of field size and genus. Some upper bounds are now known to be optimal from
these examples.
| [
{
"version": "v1",
"created": "Sun, 7 Sep 2003 00:07:48 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Lomont",
"Chris",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0309285 | Jeffrey D. Scargle | Brad Jackson, Jeffrey D. Scargle, David Barnes, Sundararajan Arabhi,
Alina Alt, Peter Gioumousis, Elyus Gwin, Paungkaew Sangtrakulcharoen, Linda
Tan, and Tun Tao Tsai | An Algorithm for Optimal Partitioning of Data on an Interval | 3 pages, 1 figure, submitted to IEEE Signal Processing Letters,
revised version with added references | null | 10.1109/LSP.2001.838216 | null | math.NA astro-ph cs.CE cs.DS cs.IT math.CO math.IT | null | Many signal processing problems can be solved by maximizing the fitness of a
segmented model over all possible partitions of the data interval. This letter
describes a simple but powerful algorithm that searches the exponentially large
space of partitions of $N$ data points in time $O(N^2)$. The algorithm is
guaranteed to find the exact global optimum, automatically determines the model
order (the number of segments), has a convenient real-time mode, can be
extended to higher dimensional data spaces, and solves a surprising variety of
problems in signal detection and characterization, density estimation, cluster
analysis and classification.
| [
{
"version": "v1",
"created": "Wed, 17 Sep 2003 18:27:00 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Apr 2004 22:37:35 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Jackson",
"Brad",
""
],
[
"Scargle",
"Jeffrey D.",
""
],
[
"Barnes",
"David",
""
],
[
"Arabhi",
"Sundararajan",
""
],
[
"Alt",
"Alina",
""
],
[
"Gioumousis",
"Peter",
""
],
[
"Gwin",
"Elyus",
""
],
[
"Sangtrakulcharoen",
"Paungkaew",
""
],
[
"Tan",
"Linda",
""
],
[
"Tsai",
"Tun Tao",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
null,
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0309347 | Shmuel Onn | Shmuel Onn | Nowhere-Zero Flow Polynomials | null | Journal of Combinatorial Theory Series A, 108:205--215, 2004 | null | null | math.CO cs.DM math.AC | null | In this article we introduce the flow polynomial of a digraph and use it to
study nowhere-zero flows from a commutative algebraic perspective. Using
Hilbert's Nullstellensatz, we establish a relation between nowhere-zero flows
and dual flows. For planar graphs this gives a relation between nowhere-zero
flows and flows of their planar duals. It also yields an appealing proof that
every bridgeless triangulated graph has a nowhere-zero four-flow.
| [
{
"version": "v1",
"created": "Sun, 21 Sep 2003 08:56:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Onn",
"Shmuel",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
math/0309389 | N. J. A. Sloane | J. C. Lagarias, N. J. A. Sloane | Approximate Squaring | 22 pages. Revised Nov 9, 2003: new theorems, including probabilistic
interpretation of results, also analogs for floor function (24 pages) | Experimental Math. 13 (2004), 113--128. | null | null | math.NT cs.IT math.IT | null | We study the ``approximate squaring'' map f(x) := x ceiling(x) and its
behavior when iterated. We conjecture that if f is repeatedly applied to a
rational number r = l/d > 1 then eventually an integer will be reached. We
prove this when d=2, and provide evidence that it is true in general by giving
an upper bound on the density of the ``exceptional set'' of numbers which fail
to reach an integer. We give similar results for a p-adic analogue of f, when
the exceptional set is nonempty, and for iterating the ``approximate
multiplication'' map f_r(x) := r ceiling(x) where r is a fixed rational number.
| [
{
"version": "v1",
"created": "Tue, 23 Sep 2003 19:49:45 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Dec 2003 00:08:49 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Lagarias",
"J. C.",
""
],
[
"Sloane",
"N. J. A.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0309425 | Michael E. Hoffman | Michael E. Hoffman | Algebraic Aspects of Multiple Zeta Values | 22 pages; for conference "Zeta Functions, Topology and Quantum
Physics" (Osaka 2003); revision corrects various typos | in Zeta Functions, Topology and Quantum Physics (T. Aoki et. al.,
eds.), Springer, 2005, pp. 51-74 | null | null | math.QA cs.IT math.IT math.NT | null | Multiple zeta values have been studied by a wide variety of methods. In this
article we summarize some of the results about them that can be obtained by an
algebraic approach. This involves "coding" the multiple zeta values by
monomials in two noncommuting variables x and y. Multiple zeta values can then
be thought of as defining a map \zeta: H^0 -> R, where H^0 is the graded
rational vector space generated by the "admissible words" of the noncommutative
polynomial algebra Q<x,y>. Now H^0 admits two (commutative) products making
\zeta a homomorphism: the shuffle product and the "harmonic" product. The
latter makes H^0 a subalgebra of the algebra QSym of quasi-symmetric functions.
We also discuss some results about multiple zeta values that can be stated in
terms of derivations and cyclic derivations of Q<x,y>, and define an action of
the Hopf algebra QSym on Q<x,y> that appears useful. Finally, we apply the
algebraic approach to finite partial sums of multiple zeta value series.
| [
{
"version": "v1",
"created": "Thu, 25 Sep 2003 22:08:05 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Aug 2004 16:27:51 GMT"
}
] | 2007-10-31T00:00:00 | [
[
"Hoffman",
"Michael E.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.QA",
"description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory",
"span": "(Quantum Algebra)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
math/0310020 | Bernd Fiedler | B. Fiedler | Generators of algebraic covariant derivative curvature tensors and Young
symmetrizers | 18 pages. Chapter for a book "Progress in Computer Science Research",
in preparation by Nova Science Publishers, Inc.:
http://www.novapublishers.com/ | In: Leading-Edge Computer Science, S. Shannon (ed.), Nova Science
Publishers, Inc. New York, 2006. pp. 219-239. ISBN: 1-59454-526-X | null | null | math.CO cs.SC math.DG | null | We show that the space of algebraic covariant derivative curvature tensors R'
is generated by Young symmetrized tensor products W*U or U*W, where W and U are
covariant tensors of order 2 and 3 whose symmetry classes are irreducible and
characterized by the following pairs of partitions: {(2),(3)}, {(2),(2 1)} or
{(1 1),(2 1)}. Each of the partitions (2), (3) and (1 1) describes exactly one
symmetry class, whereas the partition (2 1) characterizes an infinite set S of
irreducible symmetry classes. This set S contains exactly one symmetry class
S_0 whose elements U can not play the role of generators of tensors R'. The
tensors U of all other symmetry classes from S\{S_0} can be used as generators
for tensors R'. Foundation of our investigations is a theorem of S. A. Fulling,
R. C. King, B. G. Wybourne and C. J. Cummins about a Young symmetrizer that
generates the symmetry class of algebraic covariant derivative curvature
tensors. Furthermore we apply ideals and idempotents in group rings C[Sr], the
Littlewood-Richardson rule and discrete Fourier transforms for symmetric groups
Sr. For certain symbolic calculations we used the Mathematica packages Ricci
and PERMS.
| [
{
"version": "v1",
"created": "Thu, 2 Oct 2003 11:37:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fiedler",
"B.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
}
] |
math/0310109 | Dan Romik | Dan Romik | Shortest paths in the Tower of Hanoi graph and finite automata | 15 pages, 6 figures | null | null | null | math.CO cs.DM math.PR | null | We present efficient algorithms for constructing a shortest path between two
states in the Tower of Hanoi graph, and for computing the length of the
shortest path. The key element is a finite-state machine which decides, after
examining on the average only 63/38 of the largest discs, whether the largest
disc will be moved once or twice. This solves a problem raised by Andreas Hinz,
and results in a better understanding of how the shortest path is determined.
Our algorithm for computing the length of the shortest path is typically about
twice as fast as the existing algorithm. We also use our results to give a new
derivation of the average distance 466/885 between two random points on the
Sierpinski gasket of unit side.
| [
{
"version": "v1",
"created": "Wed, 8 Oct 2003 13:53:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Romik",
"Dan",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
math/0310144 | Jeffrey Shallit | Lucian Ilie, Jeffrey Shallit | A Generalization of Repetition Threshold | null | null | null | null | math.CO cs.DM | null | Brandenburg and (implicitly) Dejean introduced the concept of repetition
threshold: the smallest real number alpha such that there exists an infinite
word over a k-letter alphabet that avoids beta-powers for all beta>alpha. We
generalize this concept to include the lengths of the avoided words. We give
some conjectures supported by numerical evidence and prove one of these
conjectures.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2003 10:21:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ilie",
"Lucian",
""
],
[
"Shallit",
"Jeffrey",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0310148 | Jose-Angel Dominguez | J.A. Dominguez Perez, J.M. Mu\~noz Porras, G. Serrano Sotelo | Convolutional Codes of Goppa Type | 9 pages, submitted to AAECC | AAECC, 15 (2004), 51-61 | null | null | math.OC cs.IT math.AG math.IT | null | A new kind of Convolutional Codes generalizing Goppa Codes is proposed. This
provides a systematic method for constructing convolutional codes with prefixed
properties. In particular, examples of Maximum-Distance Separable (MDS)
convolutional codes are obtained.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2003 15:25:09 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Perez",
"J. A. Dominguez",
""
],
[
"Porras",
"J. M. Muñoz",
""
],
[
"Sotelo",
"G. Serrano",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0310149 | Jose-Angel Dominguez | J.M. Mu\~noz Porras, J.A. Dominguez Perez, J.I. Iglesias Curto, G.
Serrano Sotelo | Convolutional Goppa Codes | 8 pages, submitted to IEEE Trans. Inform. Theory | null | 10.1109/TIT.2005.860447 | null | math.OC cs.IT math.AG math.IT | null | We define Convolutional Goppa Codes over algebraic curves and construct their
corresponding dual codes. Examples over the projective line and over elliptic
curves are described, obtaining in particular some Maximum-Distance Separable
(MDS) convolutional codes.
| [
{
"version": "v1",
"created": "Fri, 10 Oct 2003 15:31:56 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Porras",
"J. M. Muñoz",
""
],
[
"Perez",
"J. A. Dominguez",
""
],
[
"Curto",
"J. I. Iglesias",
""
],
[
"Sotelo",
"G. Serrano",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0310175 | Ladislav J. Kohout | Ladislav J. Kohout | Defining Homomorphisms and Other Generalized Morphisms of Fuzzy
Relations in Monoidal Fuzzy Logics by Means of BK-Products | 13 pages, 4 figures, 4 tables. Invited and refereed paper presented
at JCIS 2003 - 7th Joint Conf. on Information Sciences (Subsection: 9th
Internat. Conf. on Fuzzy Theory and Technology), Cary, North Carolina, USA;
September 2003 | null | null | null | math.LO cs.LO math-ph math.MP math.QA | null | The present paper extends generalized morphisms of relations into the realm
of Monoidal Fuzzy Logics by first proving and then using relational
inequalities over pseudo-associative BK-products (compositions) of relations in
these logics.
In 1977 Bandler and Kohout introduced generalized homomorphism,
proteromorphism, amphimorphism, forward and backward compatibility of
relations, and non-associative and pseudo-associative products (compositions)
of relations into crisp (non-fuzzy Boolean) theory of relations. This was
generalized later by Kohout to relations based on fuzzy Basic Logic systems
(BL) of H\'ajek and also for relational systems based on left-continuous
t-norms.
The present paper is based on monoidal logics, hence it subsumes as special
cases the theories of generalized morphisms (etc.) based on the following
systems of logics: BL systems (which include the well known Goedel, product
logic systems; Lukasiewicz logic and its extension to MV-algebras related to
quantum logics), intuitionistic logics and linear logics.
| [
{
"version": "v1",
"created": "Sun, 12 Oct 2003 22:18:46 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Kohout",
"Ladislav J.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.QA",
"description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory",
"span": "(Quantum Algebra)"
}
] |
math/0310193 | MohammadTaghi Hajiaghayi | MohammadTaghi Hajiaghayi and Gregory B. Sorkin | The Satisfiability Threshold of Random 3-SAT Is at Least 3.52 | null | null | null | null | math.CO cs.DM math.PR | null | We prove that a random 3-SAT instance with clause-to-variable density less
than 3.52 is satisfiable with high probability. The proof comes through an
algorithm which selects (and sets) a variable depending on its degree and that
of its complement.
| [
{
"version": "v1",
"created": "Mon, 13 Oct 2003 20:30:49 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Oct 2003 01:45:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hajiaghayi",
"MohammadTaghi",
""
],
[
"Sorkin",
"Gregory B.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
math/0310232 | Sanatan Rai | Ashish Goel, Sanatan Rai, Bhaskar Krishnamachari | Monotone properties of random geometric graphs have sharp thresholds | Published at http://dx.doi.org/10.1214/105051605000000575 in the
Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute
of Mathematical Statistics (http://www.imstat.org) | Annals of Applied Probability 2005, Vol. 15, No. 4, 2535-2552 | 10.1214/105051605000000575 | IMS-AAP-AAP0122 | math.PR cond-mat.stat-mech cs.DM math.CO | null | Random geometric graphs result from taking $n$ uniformly distributed points
in the unit cube, $[0,1]^d$, and connecting two points if their Euclidean
distance is at most $r$, for some prescribed $r$. We show that monotone
properties for this class of graphs have sharp thresholds by reducing the
problem to bounding the bottleneck matching on two sets of $n$ points
distributed uniformly in $[0,1]^d$. We present upper bounds on the threshold
width, and show that our bound is sharp for $d=1$ and at most a sublogarithmic
factor away for $d\ge2$. Interestingly, the threshold width is much sharper for
random geometric graphs than for Bernoulli random graphs. Further, a random
geometric graph is shown to be a subgraph, with high probability, of another
independently drawn random geometric graph with a slightly larger radius; this
property is shown to have no analogue for Bernoulli random graphs.
| [
{
"version": "v1",
"created": "Wed, 15 Oct 2003 23:55:59 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Oct 2003 00:52:56 GMT"
},
{
"version": "v3",
"created": "Tue, 28 Oct 2003 19:59:40 GMT"
},
{
"version": "v4",
"created": "Fri, 24 Feb 2006 07:40:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goel",
"Ashish",
""
],
[
"Rai",
"Sanatan",
""
],
[
"Krishnamachari",
"Bhaskar",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0310385 | Joshua N. Cooper | Fan Chung and Joshua N. Cooper | De Bruijn Cycles for Covering Codes | 18 pages, 0 figures, submitted to RSA | null | null | null | math.CO cs.IT math.IT | null | A de Bruijn covering code is a q-ary string S so that every q-ary string is
at most R symbol changes from some n-word appearing consecutively in S. We
introduce these codes and prove that they can have length close to the smallest
possible covering code. The proof employs tools from field theory, probability,
and linear algebra. We also prove a number of ``spectral'' results on de Bruijn
covering codes. Included is a table of the best known bounds on the lengths of
small binary de Bruijn covering codes, up to R=11 and n=13, followed by several
open questions in this area.
| [
{
"version": "v1",
"created": "Fri, 24 Oct 2003 00:54:27 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Oct 2003 08:19:42 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Chung",
"Fan",
""
],
[
"Cooper",
"Joshua N.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0311004 | Mireille Boutin | Mireille Boutin, Gregor Kemper | Which Point Configurations are Determined by the Distribution of their
Pairwise Distances? | 10 pages | null | null | null | math.MG cs.CV math.AC math.AG | null | In a previous paper we showed that, for any $n \ge m+2$, most sets of $n$
points in $\RR^m$ are determined (up to rotations, reflections, translations
and relabeling of the points) by the distribution of their pairwise distances.
But there are some exceptional point configurations which are not
reconstructible from the distribution of distances in the above sense. In this
paper, we present a reconstructibility test with running time $O(n^{11})$. The
cases of orientation preserving rigid motions (rotations and translations) and
scalings are also discussed.
| [
{
"version": "v1",
"created": "Sun, 2 Nov 2003 01:16:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boutin",
"Mireille",
""
],
[
"Kemper",
"Gregor",
""
]
] | [
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
math/0311046 | Gabriele Nebe | Gabriele Nebe, E.M. Rains, N.J.A. Sloane | Codes and Invariant Theory | null | null | null | null | math.NT cs.IT math.IT | null | The main theorem in this paper is a far-reaching generalization of Gleason's
theorem on the weight enumerators of codes which applies to arbitrary-genus
weight enumerators of self-dual codes defined over a large class of finite
rings and modules. The proof of the theorem uses a categorical approach, and
will be the subject of a forthcoming book. However, the theorem can be stated
and applied without using category theory, and we illustrate it here by
applying it to generalized doubly-even codes over fields of characteristic 2,
doubly-even codes over the integers modulo a power of 2, and self-dual codes
over the noncommutative ring $\F_q + \F_q u$, where $u^2 = 0$..
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2003 20:20:57 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Nebe",
"Gabriele",
""
],
[
"Rains",
"E. M.",
""
],
[
"Sloane",
"N. J. A.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0311047 | Vladimir Shpilrain | Vladimir Shpilrain | Assessing security of some group based cryptosystems | 10 pages | null | null | null | math.GR cs.CC cs.CR | null | One of the possible generalizations of the discrete logarithm problem to
arbitrary groups is the so-called conjugacy search problem (sometimes
erroneously called just the conjugacy problem): given two elements a, b of a
group G and the information that a^x=b for some x \in G, find at least one
particular element x like that. Here a^x stands for xax^{-1}. The computational
difficulty of this problem in some particular groups has been used in several
group based cryptosystems. Recently, a few preprints have been in circulation
that suggested various "neighbourhood search" type heuristic attacks on the
conjugacy search problem. The goal of the present survey is to stress a
(probably well known) fact that these heuristic attacks alone are not a threat
to the security of a cryptosystem, and, more importantly, to suggest a more
credible approach to assessing security of group based cryptosystems. Such an
approach should be necessarily based on the concept of the average case
complexity (or expected running time) of an algorithm.
These arguments support the following conclusion: although it is generally
feasible to base the security of a cryptosystem on the difficulty of the
conjugacy search problem, the group G itself (the "platform") has to be chosen
very carefully. In particular, experimental as well as theoretical evidence
collected so far makes it appear likely that braid groups are not a good choice
for the platform. We also reflect on possible replacements.
| [
{
"version": "v1",
"created": "Tue, 4 Nov 2003 20:23:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shpilrain",
"Vladimir",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
math/0311129 | Henry K. Schenck | Leah Gold, John Little, Hal Schenck | Cayley-Bacharach and evaluation codes on complete intersections | 10 pages. v2: minor expository changes | J. Pure Applied Algebra 196 (2005) 91-99 | null | null | math.AG cs.IT math.AC math.IT | null | In recent work, J. Hansen uses cohomological methods to find a lower bound
for the minimum distance of an evaluation code determined by a reduced complete
intersection in the projective plane. In this paper, we generalize Hansen's
results from P^2 to P^m; we also show that the hypotheses in Hansen's work may
be weakened. The proof is succinct and follows by combining the
Cayley-Bacharach theorem and bounds on evaluation codes obtained from reduced
zero-schemes.
| [
{
"version": "v1",
"created": "Sun, 9 Nov 2003 20:27:56 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Feb 2005 23:17:29 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Gold",
"Leah",
""
],
[
"Little",
"John",
""
],
[
"Schenck",
"Hal",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0311228 | Francisco Santos | C. Cortes, C. I. Grima, F. Hurtado, A. Marquez, F. Santos, and J.
Valenzuela | Transforming triangulations on non planar-surfaces | 19 pages, 17 figures. This version has been accepted in the SIAM
Journal on Discrete Mathematics. Keywords: Graph of triangulations,
triangulations on surfaces, triangulations of polygons, edge flip | SIAM J. Discrete Math. 24:3 (2010), 821-840 | 10.1137/070697987 | null | math.MG cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider whether any two triangulations of a polygon or a point set on a
non-planar surface with a given metric can be transformed into each other by a
sequence of edge flips. The answer is negative in general with some remarkable
exceptions, such as polygons on the cylinder, and on the flat torus, and
certain configurations of points on the cylinder.
| [
{
"version": "v1",
"created": "Thu, 13 Nov 2003 20:25:14 GMT"
},
{
"version": "v2",
"created": "Fri, 21 May 2010 10:43:18 GMT"
}
] | 2010-08-02T00:00:00 | [
[
"Cortes",
"C.",
""
],
[
"Grima",
"C. I.",
""
],
[
"Hurtado",
"F.",
""
],
[
"Marquez",
"A.",
""
],
[
"Santos",
"F.",
""
],
[
"Valenzuela",
"J.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
math/0311289 | Gabriele Nebe | Gabriele Nebe, H.-G. Quebbemann, E. M. Rains, N. J. A. Sloane | Complete Weight Enumerators of Generalized Doubly-Even Self-Dual Codes | null | Finite Fields Applic. 10 (2004), 540-550 | null | null | math.NT cs.IT math.IT | null | For any q which is a power of 2 we describe a finite subgroup of the group of
invertible complex q by q matrices under which the complete weight enumerators
of generalized doubly-even self-dual codes over the field with q elements are
invariant.
An explicit description of the invariant ring and some applications to
extremality of such codes are obtained in the case q=4.
| [
{
"version": "v1",
"created": "Mon, 17 Nov 2003 16:55:33 GMT"
}
] | 2014-09-17T00:00:00 | [
[
"Nebe",
"Gabriele",
""
],
[
"Quebbemann",
"H. -G.",
""
],
[
"Rains",
"E. M.",
""
],
[
"Sloane",
"N. J. A.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0311319 | N. J. A. Sloane | A. R. Calderbank, N. J. A. Sloane | Modular and p-adic cyclic codes | 18 pages | Designs, Codes and Cryptography, Vol. 6 (1995), 21-35 | null | null | math.CO cs.IT math.IT | null | This paper presents some basic theorems giving the structure of cyclic codes
of length n over the ring of integers modulo p^a and over the p-adic numbers,
where p is a prime not dividing n. An especially interesting example is the
2-adic cyclic code of length 7 with generator polynomial X^3 + lambda X^2 +
(lambda - 1) X - 1, where lambda satisfies lambda^2 - lambda + 2 =0. This is
the 2-adic generalization of both the binary Hamming code and the quaternary
octacode (the latter being equivalent to the Nordstrom-Robinson code). Other
examples include the 2-adic Golay code of length 24 and the 3-adic Golay code
of length 12.
| [
{
"version": "v1",
"created": "Tue, 18 Nov 2003 21:35:21 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Calderbank",
"A. R.",
""
],
[
"Sloane",
"N. J. A.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0312092 | Gluesing-Luerssen | Heide Gluesing-Luerssen and Barbara Langfeld | On the Parameters of Convolutional Codes with Cyclic Structure | null | null | null | null | math.RA cs.IT math.CO math.IT | null | In this paper convolutional codes with cyclic structure will be investigated.
These codes can be understood as left principal ideals in a suitable
skew-polynomial ring. It has been shown in [3] that only certain combinations
of the parameters (field size, length, dimension, and Forney indices) can occur
for cyclic codes. We will investigate whether all these combinations can indeed
be realized by a suitable cyclic code and, if so, how to construct such a code.
A complete characterization and construction will be given for minimal cyclic
codes. It is derived from a detailed investigation of the units in the
skew-polynomial ring.
| [
{
"version": "v1",
"created": "Wed, 3 Dec 2003 19:34:56 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Gluesing-Luerssen",
"Heide",
""
],
[
"Langfeld",
"Barbara",
""
]
] | [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0312171 | Bernd Fiedler | Bernd Fiedler | Short formulas for algebraic covariant derivative curvature tensors via
Algebraic Combinatorics | 38 pages | null | null | null | math.CO cs.SC math.DG | null | We consider generators of algebraic covariant derivative curvature tensors R'
which can be constructed by a Young symmetrization of product tensors W*U or
U*W, where W and U are covariant tensors of order 2 and 3. W is a symmetric or
alternating tensor whereas U belongs to a class of the infinite set S of
irreducible symmetry classes characterized by the partition (2,1). Using
Computer Algebra we search for such generators whose coordinate representations
are polynomials with a minimal number of summands. For a generic choice of the
symmetry class of U we obtain lengths of 16 or 20 summands if W is symmetric or
skew-symmetric, respectively. In special cases these numbers can be reduced to
the minima 12 or 10. If these minima occur then U admits an index commutation
symmetry. Furthermore minimal lengths are possible if U is formed from
torsion-free covariant derivatives of symmetric or alternating 2-tensor fields.
Foundation of our investigations is a theorem of S. A. Fulling, R. C. King, B.
G. Wybourne and C. J. Cummins about a Young symmetrizer that generates the
symmetry class of algebraic covariant derivative curvature tensors. Furthermore
we apply ideals and idempotents in group rings C[S_r] and discrete Fourier
transforms for symmetric groups S_r. For symbolic calculations we used the
Mathematica packages Ricci and PERMS.
| [
{
"version": "v1",
"created": "Mon, 8 Dec 2003 19:31:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fiedler",
"Bernd",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
}
] |
math/0312397 | Andrzej Kwasniewski | A. K. Kwasniewski | On Simple Characterisations of Sheffer psi- polynomials and Related
Propositions of the Calculus of Sequences | null | Bull. Soc. Sci. Lett. Lodz Ser. Rech. Deform. 52, Ser. Rech.
Deform. 36 (2002) pp.45-65 | null | null | math.CO cs.DM | null | A calculus of sequences started in 1936 opened the way for future extensions
of umbral calculus in its finite operator form. Because of historically
established notation we call it the psi-calculus.It appears in parts to be
almost automatic extension of the standard classical finite operator calculus.
| [
{
"version": "v1",
"created": "Sat, 20 Dec 2003 23:21:51 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0312422 | Craig Antonio Pastro | C. A. Pastro | \Sigma\Pi-polycategories, additive linear logic, and process semantics | 175 pages, University of Calgary Master's thesis | null | null | Master's thesis, University of Calgary, 2004 | math.CT cs.LO math.LO | null | We present a process semantics for the purely additive fragment of linear
logic in which formulas denote protocols and (equivalence classes of) proofs
denote multi-channel concurrent processes. The polycategorical model induced by
this process semantics is shown to be equivalent to the free polycategory based
on the syntax (i.e., it is full and faithfully complete). This establishes that
the additive fragment of linear logic provides a semantics of concurrent
processes. Another property of this semantics is that it gives a canonical
representation of proofs in additive linear logic.
This arXived version omits Section 1.7.1: "Circuit diagrams for
polycategories" as the Xy-pic diagrams would not compile due to lack of memory.
For a complete version see "http://www.cpsc.ucalgary.ca/~pastroc/".
| [
{
"version": "v1",
"created": "Tue, 23 Dec 2003 03:29:19 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Apr 2004 22:29:28 GMT"
}
] | 2010-03-03T00:00:00 | [
[
"Pastro",
"C. A.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
math/0401045 | Guangyue Han | Guangyue Han, Joachim Rosenthal | Unitary Space Time Constellation Analysis: An Upper Bound for the
Diversity | 15 pages, 3 figures, submitted to IEEE trans. info | null | null | null | math.CO cs.IT math.IT | null | The diversity product and the diversity sum are two very important parameters
for a good-performing unitary space time constellation. A basic question is
what the maximal diversity product (or sum) is. In this paper we are going to
derive general upper bounds on the diversity sum and the diversity product for
unitary constellations of any dimension $n$ and any size $m$ using packing
techniques on the compact Lie group U(n).
| [
{
"version": "v1",
"created": "Tue, 6 Jan 2004 16:44:05 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Han",
"Guangyue",
""
],
[
"Rosenthal",
"Joachim",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0401083 | Andrzej Kwasniewski | A.K.Kwasniewski | On extended umbral calculus, oscillator-like algebras and Generalized
Clifford Algebra | null | Advances in Applied Clifford Algebras 11 No2 267-279 (2001) | null | null | math.QA cs.DM | null | Some quantum algebras build from deformed oscillator algebras may be
described in terms of a particular case of extended umbral calculus. We give
here an example of a specific relation between such certain quantum algebras
and generalized Clifford algebras also in the context of azimuthal quantization
of angular momentum which was interpreted afterwards as the finite dimensional
quantum mechanics .
| [
{
"version": "v1",
"created": "Thu, 8 Jan 2004 23:50:07 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.QA",
"description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory",
"span": "(Quantum Algebra)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0401157 | Guangyue Han | Guangyue Han | Generalized PSK in Space Time Coding | 22 pages, 3 figures, submitted to IEEE transactions on communicatons | null | 10.1109/TCOMM.2005.847166 | null | math.CO cs.IT math.IT math.OC | null | A wireless communication system using multiple antennas promises reliable
transmission under Rayleigh flat fading assumptions. Design criteria and
practical schemes have been presented for both coherent and non-coherent
communication channels. In this paper we generalize one dimensional phase shift
keying (PSK) signals and introduce space time constellations from generalized
phase shift keying (GPSK) signals based on the complex and real orthogonal
designs. The resulting space time constellations reallocate the energy for each
transmitting antenna and feature good diversity products, consequently their
performances are better than some of the existing comparable codes. Moreover
since the maximum likelihood (ML) decoding of our proposed codes can be
decomposed to one dimensional PSK signal demodulation, the ML decoding of our
codes can be implemented in a very efficient way.
| [
{
"version": "v1",
"created": "Wed, 14 Jan 2004 16:56:55 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Han",
"Guangyue",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
math/0401279 | Laura Rebollo-Neira | M. Andrle, L. Rebollo-Neira, E. Sagianos | Backward Optimized Orthogonal Matching Pursuit | Accpeted for publication in IEEE Signal Processing Letters- 15 pages | null | 10.1109/LSP.2004.833503 | null | math.GM cs.IT math.IT | null | A recursive approach for shrinking coefficients of an atomic decomposition is
proposed. The corresponding algorithm evolves so as to provide at each
iteration a) the orthogonal projection of a signal onto a reduced subspace and
b) the index of the coefficient to be disregarded in order to construct a
coarser approximation minimizing the norm of the residual error.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2004 19:01:34 GMT"
}
] | 2009-11-10T00:00:00 | [
[
"Andrle",
"M.",
""
],
[
"Rebollo-Neira",
"L.",
""
],
[
"Sagianos",
"E.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0402078 | Andrzej Kwasniewski | A. K. Kwasniewski | Towards psi-extension of Rota`s Finite Operator Calculus | 38 pages | Reports on Mathematical Physics Vol. 48 No 3 (2001) : 305-342 | 10.1016/S0034-4877(01)80092-6 | null | math.CO cs.DM | null | A class of extended umbral calculi in operator form is presented. Extensions
of all basic theorems of classical Finite Operator Calculus are shown to hold.
The impossibility of straightforward extending of quantum q-plane formulation
of the q-umbral caculus to the general psi-calculus case is demonstrated.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2004 13:02:30 GMT"
}
] | 2015-06-26T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0402125 | Andrzej Kwasniewski | A. K. Kwasniewski | Poisson, Dobinski, Rota and coherent states | 2 pages | Bulletin de la Societe des Sciences et des Lettres de
{\pounds}\'od\^e (54) Serie: Recherches sur les Deformations Vol. 45 (2004)
17-19 | null | null | math.CO cs.DM | null | New q- Dobinski formula might also be interpreted as the average of specific
q-powers of random variable X with the usual Poisson distribution.
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2004 15:23:54 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Feb 2004 21:42:07 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0402254 | Andrzej Kwasniewski | A. K.Kwasniewski | q-Poisson, q-Dobinski, q-Rota and q-coherent states | 4 pages | Proc. Jangjeon Math. Soc. Vol. 7 (2), 2004 pp. 95-98 | null | null | math.CO cs.DM | null | q- Dobinski formula may be interpreted as the average of powers of a random
variable X_q with the q- Poisson distribution.
| [
{
"version": "v1",
"created": "Mon, 16 Feb 2004 12:37:28 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Feb 2004 21:49:39 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0402291 | Andrzej Kwasniewski | A. K. Kwasniewski | Information on Combinatorial Interpretation of Fibonomial Coefficients | null | Bull. Soc. Sci. Lett. Lodz Ser. Rech. Deform. 53, Ser.
Rech.Deform. 42 (2002) pp.39-41 | null | null | math.CO cs.DM | null | Fibonomial coefficients count the number of specific finite birth
self-similar subposets of an infinite non-tree poset naturally related to the
Fibonacci tree of rabbits growth process.
| [
{
"version": "v1",
"created": "Wed, 18 Feb 2004 01:15:50 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0402344 | Andrzej Kwasniewski | A. K. Kwasniewski | More on combinatorial interpretation of the fibonomial coefficients | null | Bulletin de la Societe des Sciences et des Lettres de
{\pounds}\'od\^e (54) Serie: Recherches sur les Deformations Vol. 44 (2004)
23-38 | null | null | math.CO cs.DM | null | Combinatorial interpretation of the fibonomial coefficients as a number of
choices of specific finite subsets of an infinite partially ordered set of not
binomial type is proposed. This partially ordered set is here defined via
characteristic matrix of the corresponding partial order relation . Relevance
of the proposal to more general unification treatment is indicated.
| [
{
"version": "v1",
"created": "Mon, 23 Feb 2004 20:27:13 GMT"
},
{
"version": "v2",
"created": "Sun, 24 Oct 2004 20:38:05 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0402346 | Peter Saveliev | Peter Saveliev | Applications of Lefschetz numbers in control theory | The paper has been completely rewritten. 15 pages | null | null | null | math.OC cs.SY math.AT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop some applications of techniques of the Lefschetz coincidence
theory in control theory. The topics are existence of equilibria and their
robustness, controllability and its robustness.
| [
{
"version": "v1",
"created": "Sat, 21 Feb 2004 20:27:13 GMT"
},
{
"version": "v2",
"created": "Sun, 23 Jan 2005 20:36:20 GMT"
},
{
"version": "v3",
"created": "Thu, 14 Apr 2011 22:57:45 GMT"
}
] | 2011-04-18T00:00:00 | [
[
"Saveliev",
"Peter",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
}
] |
math/0403017 | Andrzej Kwasniewski | A.K.Kwasniewski | Combinatorial interpretation of the recurrence relation for fibonomial
coefficients | 12 pages, 5 figures | Bulletin de la Societe des Sciences et des Lettres de
{\pounds}\'od\^e (54) Serie: Recherches sur les Deformations Vol. 44 (2004)
pp. 23-38 | null | null | math.CO cs.DM | null | Combinatorial interpretation of the fibonomial coefficients recently proposed
by the present author results here in combinatorial interpretation of the
recurrence relation for fibonomial coefficients . The presentation is provided
with quite an exhaustive context where apart from plane grid coordinate system
used several figures illustrate the exposition of statements and the derivation
of the recurrence itself.
| [
{
"version": "v1",
"created": "Mon, 1 Mar 2004 02:36:51 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Mar 2004 01:50:43 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0403054 | Andrzej Kwasniewski | A. K. Kwasniewski | $\psi$-Poisson, $q$-Cigler, $\psi$-Dobinski, $\psi$-Rota and
$\psi$-coherent states | 6 pages | Proc. Jangjeon Math. Soc. Vol. 7 (2), 2004 pp. 95-98 | null | null | math.CO cs.DM | null | Cigler simple derivation of usual and extended Dobinski formula is recalled
and it is noted that both may be interpreted as averages of powers of random
variables with the corresponding usual or extended Poisson distributions. In
parallel more general formulas of extended operator umbral calculi origin are
revealed . The formulas encompass both earlier cases as very specific ones.
| [
{
"version": "v1",
"created": "Tue, 2 Mar 2004 20:29:20 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0403107 | Andrzej Kwasniewski | A. KL. Kwasniewski | Cauchy type identities and corresponding fermatian matrices via
non-comuting variables of extended finite operator calculus | 5 pages | Proc. Jangjeon Math. Soc. Vol 8 (2005) no. 2. pp.191-196 | null | null | math.CO cs.DM | null | New family of extended Cauchy type identities is found and related Fermat
type matrices are provided ready for applications in extended scope. This is
achieved due to the use specifically non-commuting variables of extended finite
operator calculus introduced by the author few years ago.
| [
{
"version": "v1",
"created": "Fri, 5 Mar 2004 09:57:32 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. KL.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0403123 | Andrzej Kwasniewski | A. K. Kwasniewski | Pascal like matrices - an accessible factory of one source identities
and resulting applications | 8 pages | Adv. Stud. Contemp. Math. 10 (2005) No. 2, pp. 111-120 | null | null | math.CO cs.DM | null | The extension of pascalian like matrices depending on a variable from any
field of zero characteristics are shown at work for the first time. Their
properties appear to be one source factory of identities and resulting foreseen
applications
| [
{
"version": "v1",
"created": "Sun, 7 Mar 2004 17:59:25 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0403139 | Andrzej Kwasniewski | A.K.Kwasniewski | First contact remarks on umbra difference calculus references streams | 10 pages | Bull. Soc. Sci. Lett. Lodz, 60, (2005) pp. 17-25 ArXiv:
math.CO/0403139 | null | null | math.CO cs.DM | null | The reference links to the modern classical umbral calculus before that known
as blissardian symbolic method are numerous. Rota founded and then extended
finite operator calculus has links to references which are plenty numerous. The
references via links to the difference q calculus umbra way treaded or without
even referring to umbra are giant numerous. These reference links now result in
counting in thousands the relevant papers .
The purpose of the present attempt is to offer one of the keys to enter the
world of those thousands of references.
| [
{
"version": "v1",
"created": "Mon, 8 Mar 2004 21:12:56 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0403548 | David Joyner | David Joyner and Salahoddin Shokranian | Remarks on codes from modular curves: MAGMA applications | 29 pages | Algebr. Geom. Topol. 12 (2012) 2259-2286 | 10.2140/agt.2012.12.2259 | null | math.NT cs.IT math.AG math.IT | null | Expository paper discussing AG or Goppa codes arising from curves, first from
an abstract general perspective then turning to concrete examples associated to
modular curves. We will try to explain these extremely technical ideas using a
special case at a level to a typical graduate student with some background in
modular forms, number theory, group theory, and algebraic geometry. Many
examples using MAGMA are included.
| [
{
"version": "v1",
"created": "Wed, 31 Mar 2004 18:19:37 GMT"
}
] | 2014-10-01T00:00:00 | [
[
"Joyner",
"David",
""
],
[
"Shokranian",
"Salahoddin",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.