id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
math/0404076
Shmuel Kaplan
D. Garber, S. Kaplan, M. Teicher, B. Tsaban and U. Vishne
Probabilistic Solutions of Equations in the Braid Group
Small updates
Advances in Applied Mathematics 35 (2005), 323--334
10.1016/j.aam.2005.03.002
null
math.GR cs.CR math.GT
null
Given a system of equations in a "random" finitely generated subgroup of the braid group, we show how to find a small ordered list of elements in the subgroup, which contains a solution to the equations with a significant probability. Moreover, with a significant probability, the solution will be the first in the list. This gives a probabilistic solution to: The conjugacy problem, the group membership problem, the shortest representation of an element, and other combinatorial group-theoretic problems in random subgroups of the braid group. We use a memory-based extension of the standard length-based approach, which in principle can be applied to any group admitting an efficient, reasonably behaving length function.
[ { "version": "v1", "created": "Mon, 5 Apr 2004 06:07:09 GMT" }, { "version": "v2", "created": "Mon, 14 Jun 2004 05:46:43 GMT" }, { "version": "v3", "created": "Mon, 19 Sep 2005 15:12:32 GMT" }, { "version": "v4", "created": "Thu, 17 May 2007 20:17:27 GMT" } ]
2010-08-02T00:00:00
[ [ "Garber", "D.", "" ], [ "Kaplan", "S.", "" ], [ "Teicher", "M.", "" ], [ "Tsaban", "B.", "" ], [ "Vishne", "U.", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.GT", "description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures", "span": "(Geometric Topology)" } ]
math/0404158
Ewa Krot
Ewa Krot
A note on mobiusien function and mobiusien inversion formula of fibonacci cobweb poset
6 pages
Bulletin de la Societe des Sciences et des Lettres de Lodz (54), Serie: Recherches sur les Deformations Vol. 44 (2004), 39-44
null
null
math.CO cs.DM
null
The explicit formula for mobiusien function of fibonacci cobweb poset P is given for the first time by the use of definition of P in plane grid coordinate system.
[ { "version": "v1", "created": "Wed, 7 Apr 2004 10:23:38 GMT" }, { "version": "v2", "created": "Wed, 28 Apr 2004 07:37:14 GMT" } ]
2008-02-15T00:00:00
[ [ "Krot", "Ewa", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0404325
Alexander Vardy
Tao Jiang and Alexander Vardy
Asymptotic Improvement of the Gilbert-Varshamov Bound on the Size of Binary Codes
10 pages, 3 figures; to appear in the IEEE Transactions on Information Theory, submitted August 12, 2003, revised March 28, 2004
IEEE TRANSACTIONS ON INFORMATION THEORY, vol. 50, No. 8, pp. 1655-1664, August 2004 (http://www.ieeexplore.ieee.org/iel5/18/29198/01317112.pdf)
10.1109/TIT.2004.831751
null
math.CO cs.IT math.AC math.IT
null
Given positive integers $n$ and $d$, let $A_2(n,d)$ denote the maximum size of a binary code of length $n$ and minimum distance $d$. The well-known Gilbert-Varshamov bound asserts that $A_2(n,d) \geq 2^n/V(n,d-1)$, where $V(n,d) = \sum_{i=0}^{d} {n \choose i}$ is the volume of a Hamming sphere of radius $d$. We show that, in fact, there exists a positive constant $c$ such that $$ A_2(n,d) \geq c \frac{2^n}{V(n,d-1)} \log_2 V(n,d-1) $$ whenever $d/n \le 0.499$. The result follows by recasting the Gilbert- Varshamov bound into a graph-theoretic framework and using the fact that the corresponding graph is locally sparse. Generalizations and extensions of this result are briefly discussed.
[ { "version": "v1", "created": "Mon, 19 Apr 2004 02:18:47 GMT" } ]
2007-07-16T00:00:00
[ [ "Jiang", "Tao", "" ], [ "Vardy", "Alexander", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/0405082
Cheng Qi
Qi Cheng and Daqing Wan
On the List and Bounded Distance Decodibility of the Reed-Solomon Codes
null
null
null
null
math.NT cs.IT math.IT
null
In this paper show that the list and bounded-distance decoding problems of certain bounds for the Reed-Solomon code are at least as hard as the discrete logarithm problem over finite fields.
[ { "version": "v1", "created": "Wed, 5 May 2004 17:36:43 GMT" } ]
2007-07-16T00:00:00
[ [ "Cheng", "Qi", "" ], [ "Wan", "Daqing", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/0405577
Andrzej Kwasniewski
A.K.Kwasniewski
On $\psi$-basic bernoulli-wardian polynomials
null
Bulletin de la Societe des Sciences et des Lettres de {\pounds}\'od\^e (54) Serie: Recherches sur les Deformations Vol. 45 (2004) 5-10
null
null
math.CO cs.DM
null
The wardian solution of any $\psi$-difference linear nonhomogeneous equation is found in the framework of the generalized finite operator calculus . Specifications to $q$-calculus case and the new one fibonomial calculus case are made explicit.
[ { "version": "v1", "created": "Sun, 30 May 2004 00:32:47 GMT" } ]
2008-02-11T00:00:00
[ [ "Kwasniewski", "A. K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0405578
Andrzej Kwasniewski
A.K.Kwasniewski
$\psi$-Appell polynomials` solutions of an umbral difference nonhomogeneous equation
null
Bulletin de la Societe des Sciences et des Lettres de {\pounds}\'od\^e (54) Serie: Recherches sur les Deformations Vol. 45 (2004) 11-15
null
null
math.CO cs.DM
null
One discovers why the solution of generalized umbral calculus difference nonhomogeneous equation in the form recently proposed by the author extends here now to generalized appellian delta operator and corresponding polynomials case almost automatically. The reason for that is just the proper framework of the generalized finite operator calculus recently being developed by the present author.
[ { "version": "v1", "created": "Sun, 30 May 2004 00:55:52 GMT" }, { "version": "v2", "created": "Sat, 13 Nov 2004 05:02:24 GMT" } ]
2008-02-11T00:00:00
[ [ "Kwasniewski", "A. K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0405591
Andrzej Kwasniewski
A.K.Kwasniewski
Fibonacci q-gaussian sequences
5 pages, 2 figures
Advanced Studies in Contemporary Mathematics vol. 8 (2004) No2 pp.121-124
null
null
math.CO cs.DM
null
The summation formula within pascalian triangle resulting in the fibonacci sequence is extended to the $q$-binomial coefficients $q$-gaussian triangles.
[ { "version": "v1", "created": "Mon, 31 May 2004 09:08:05 GMT" } ]
2008-02-11T00:00:00
[ [ "Kwasniewski", "A. K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0406006
Andrzej Kwasniewski
A.K.Kwasniewski
Fibonomial cumulative connection constants
affiliated to The Internet Gian-Carlo Polish Seminar: http://ii.uwb.edu.pl/akk/sem/sem_rota.htm
Bulletin of the ICA vol. 44 (2005) 81-92
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note we present examples of cumulative connection constants included new fibonomial ones. All examples posses combinatorial interpretation.
[ { "version": "v1", "created": "Tue, 1 Jun 2004 00:59:23 GMT" }, { "version": "v2", "created": "Tue, 27 Jan 2009 08:30:46 GMT" }, { "version": "v3", "created": "Thu, 29 Jan 2009 04:54:01 GMT" }, { "version": "v4", "created": "Wed, 11 Feb 2009 05:31:48 GMT" }, { "version": "v5", "created": "Thu, 12 Feb 2009 20:11:55 GMT" }, { "version": "v6", "created": "Fri, 20 Feb 2009 02:26:21 GMT" } ]
2009-02-20T00:00:00
[ [ "Kwasniewski", "A. K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0406077
Peter Grunwald
Peter Grunwald
A tutorial introduction to the minimum description length principle
80 pages 5 figures Report with 2 chapters
null
null
null
math.ST cs.IT cs.LG math.IT stat.TH
null
This tutorial provides an overview of and introduction to Rissanen's Minimum Description Length (MDL) Principle. The first chapter provides a conceptual, entirely non-technical introduction to the subject. It serves as a basis for the technical introduction given in the second chapter, in which all the ideas of the first chapter are made mathematically precise. The main ideas are discussed in great conceptual and technical detail. This tutorial is an extended version of the first two chapters of the collection "Advances in Minimum Description Length: Theory and Application" (edited by P.Grunwald, I.J. Myung and M. Pitt, to be published by the MIT Press, Spring 2005).
[ { "version": "v1", "created": "Fri, 4 Jun 2004 09:11:18 GMT" } ]
2007-07-16T00:00:00
[ [ "Grunwald", "Peter", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0406094
Pr Philippe Chassaing
Philippe Chassaing, Regine Marchand
Merging costs for the additive Marcus-Lushnikov process, and Union-Find algorithms
28 pages, 1 figure
null
null
null
math.PR cs.DS math.CO
null
Starting with a monodisperse configuration with $n$ size-1 particles, an additive Marcus-Lushnikov process evolves until it reaches its final state (a unique particle with mass $n$). At each of the $n-1$ steps of its evolution, a merging cost is incurred, that depends on the sizes of the two particles involved, and on an independent random factor. This paper deals with the asymptotic behaviour of the cumulated costs up to the $k$th clustering, under various regimes for $(n,k)$, with applications to the study of Union--Find algorithms.
[ { "version": "v1", "created": "Sat, 5 Jun 2004 19:20:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Chassaing", "Philippe", "" ], [ "Marchand", "Regine", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0406140
Pierre Leroux
Andrei Gagarin, Gilbert Labelle and Pierre Leroux (LaCIM, Universite du Quebec a Montreal)
The structure and labelled enumeration of K_{3,3}-subdivision-free projective-planar graphs
Revised version. 20 pages. To appear in Pure Mathematics and Applications - Algebra and Theoretical Computer Science
Pure Math. Appl. 16 (2005), no. 3, pp. 267-286
null
null
math.CO cs.DM
null
We consider the class F of 2-connected non-planar K_{3,3}-subdivision-free graphs that are embeddable in the projective plane. We show that these graphs admit a unique decomposition as a graph K_5 (the core) where the edges are replaced by two-pole networks constructed from 2-connected planar graphs. A method to enumerate these graphs in the labelled case is described. Moreover, we enumerate the homeomorphically irreducible graphs in F and homeomorphically irreducible 2-connected planar graphs. Particular use is made of two-pole directed series-parallel networks. We also show that the number m of edges of graphs in F with n vertices satisfies the bound m <=3n-6, for n >= 6.
[ { "version": "v1", "created": "Tue, 8 Jun 2004 04:22:43 GMT" }, { "version": "v2", "created": "Mon, 2 May 2005 02:49:12 GMT" }, { "version": "v3", "created": "Tue, 3 May 2005 01:18:51 GMT" }, { "version": "v4", "created": "Sat, 19 Nov 2005 02:44:04 GMT" }, { "version": "v5", "created": "Tue, 20 Jun 2006 19:34:49 GMT" } ]
2010-12-23T00:00:00
[ [ "Gagarin", "Andrei", "", "LaCIM, Universite\n du Quebec a Montreal" ], [ "Labelle", "Gilbert", "", "LaCIM, Universite\n du Quebec a Montreal" ], [ "Leroux", "Pierre", "", "LaCIM, Universite\n du Quebec a Montreal" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0406221
Peter Grunwald
Peter Grunwald and John Langford
Suboptimal behaviour of Bayes and MDL in classification under misspecification
This is a slightly longer version of our paper at the COLT (Computational Learning Theory) 2004 Conference, containing two extra pages of discussion of the main results
null
null
null
math.ST cs.IT cs.LG math.IT stat.TH
null
We show that forms of Bayesian and MDL inference that are often applied to classification problems can be *inconsistent*. This means there exists a learning problem such that for all amounts of data the generalization errors of the MDL classifier and the Bayes classifier relative to the Bayesian posterior both remain bounded away from the smallest achievable generalization error.
[ { "version": "v1", "created": "Thu, 10 Jun 2004 16:36:54 GMT" } ]
2007-07-16T00:00:00
[ [ "Grunwald", "Peter", "" ], [ "Langford", "John", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0406258
Andrzej Kwasniewski
A.K.Kwasniewski
The logarithmic fibbinomial formula
1 figure
Adv. Stud. Contemp. Math. v.9 No.1 (2004) 19-26
null
null
math.CO cs.DM
null
Roman logarithmic binomial formula analogue has been found . It is presented here also for the case of fibonomial coefficients which recently have been given a combinatorial interpretation by the present author.
[ { "version": "v1", "created": "Sun, 13 Jun 2004 17:24:54 GMT" } ]
2008-02-11T00:00:00
[ [ "Kwasniewski", "A. K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0406353
Manor Mendel
Yair Bartal, Nathan Linial, Manor Mendel, Assaf Naor
On metric Ramsey-type phenomena
67 pages, published version
Ann. of Math. (2) 162 (2005), no. 2, 643--709
10.4007/annals.2005.162.643
null
math.MG cs.DS
null
The main question studied in this article may be viewed as a nonlinear analogue of Dvoretzky's theorem in Banach space theory or as part of Ramsey theory in combinatorics. Given a finite metric space on n points, we seek its subspace of largest cardinality which can be embedded with a given distortion in Hilbert space. We provide nearly tight upper and lower bounds on the cardinality of this subspace in terms of n and the desired distortion. Our main theorem states that for any epsilon>0, every n point metric space contains a subset of size at least n^{1-\epsilon} which is embeddable in Hilbert space with O(\frac{\log(1/\epsilon)}{\epsilon}) distortion. The bound on the distortion is tight up to the log(1/\epsilon) factor. We further include a comprehensive study of various other aspects of this problem.
[ { "version": "v1", "created": "Thu, 17 Jun 2004 20:01:40 GMT" }, { "version": "v2", "created": "Thu, 21 Jun 2007 02:52:34 GMT" } ]
2012-11-15T00:00:00
[ [ "Bartal", "Yair", "" ], [ "Linial", "Nathan", "" ], [ "Mendel", "Manor", "" ], [ "Naor", "Assaf", "" ] ]
[ { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/0406416
Michael Yampolsky
Mark Braverman, Michael Yampolsky
Non-computable Julia sets
Updated version, to appear in JAMS
null
null
null
math.DS cs.CC
null
We show that under the definition of computability which is natural from the point of view of applications, there exist non-computable quadratic Julia sets.
[ { "version": "v1", "created": "Tue, 22 Jun 2004 13:33:48 GMT" }, { "version": "v2", "created": "Tue, 6 Dec 2005 17:04:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Braverman", "Mark", "" ], [ "Yampolsky", "Michael", "" ] ]
[ { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/0408122
Konstantin Rybnikov
Robert Erdahl, Andrei Ordine, and Konstantin Rybnikov
Perfect Delaunay Polytopes and Perfect Inhomogeneous Forms
Release 3: 25 pages, 4 diagrams. A number of errors in notation, terminology, citations, and cross-references have been fixed. Note that in all diagrams kappa should read as k. A reduced 10 page version of this article will apear in the proceedings of the 2003 Voronoi Conference held in Kiev in September of 2003
null
null
null
math.NT cs.CC cs.CG math.MG quant-ph
null
A lattice Delaunay polytope D is called perfect if it has the property that there is a unique circumscribing ellipsoid with interior free of lattice points, and with the surface containing only those lattice points that are the vertices of D. An inhomogeneous quadratic form is called perfect if it is determined by such a circumscribing ''empty ellipsoid'' uniquely up to a scale factor. Perfect inhomogeneous forms are associated with perfect Delaunay polytopes in much the way that perfect homogeneous forms are associated with perfect point lattices. We have been able to construct some infinite sequences of perfect Delaunay polytopes, one perfect polytope in each successive dimension starting at some initial dimension; we have been able to construct an infinite number of such infinite sequences. Perfect Delaunay polytopes are intimately related to the theory of Delaunay polytopes, and to Voronoi's theory of lattice types.
[ { "version": "v1", "created": "Mon, 9 Aug 2004 20:34:25 GMT" }, { "version": "v2", "created": "Fri, 18 Feb 2005 03:00:23 GMT" }, { "version": "v3", "created": "Sun, 6 Mar 2005 05:35:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Erdahl", "Robert", "" ], [ "Ordine", "Andrei", "" ], [ "Rybnikov", "Konstantin", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
math/0408146
Dr Frederic Dambreville
Frederic Dambreville (DGA/CTA/DT/GIP)
Learning a Machine for the Decision in a Partially Observable Markov Universe
Writing date : July 30 2004 Submitted to the European Journal of Operation Research
null
null
null
math.GM cs.AI cs.LG
null
In this paper, we are interested in optimal decisions in a partially observable Markov universe. Our viewpoint departs from the dynamic programming viewpoint: we are directly approximating an optimal strategic tree depending on the observation. This approximation is made by means of a parameterized probabilistic law. In this paper, a particular family of hidden Markov models, with input and output, is considered as a learning framework. A method for optimizing the parameters of these HMMs is proposed and applied. This optimization method is based on the cross-entropic principle.
[ { "version": "v1", "created": "Wed, 11 Aug 2004 06:38:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Dambreville", "Frederic", "", "DGA/CTA/DT/GIP" ] ]
[ { "class": "Mathematics", "code": "math.GM", "description": "Mathematical material of general interest, topics not covered elsewhere", "span": "(General Mathematics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
math/0408365
Vadim E. Levit
Vadim E. Levit and Yulia Kempner
Quasi-concave functions on antimatroids
7 pages
null
null
null
math.CO cs.DM
null
In this paper we consider quasi-concave set functions defined on antimatroids. There are many equivalent axiomatizations of antimatroids, that may be separated into two categories: antimatroids defined as set systems and antimatroids defined as languages. An algorthmic characterization of antimatroids, that considers them as set systems, was given in (Kempner, Levit 2003). This characterization is based on the idea of optimization using set functions defined as minimum values of linkages between a set and the elements from the set complement. Such set functions are quasi-concave. Their behavior on antimatroids was studied in (Kempner, Muchnik 2003), where they were applied to constraint clustering. In this work we investigate a duality between quasi-concave set functions and linkage functions. Our main finding is that quasi-concave set functions on an antimatroid may be represented as minimum values of some monotone linkage functions.
[ { "version": "v1", "created": "Thu, 26 Aug 2004 12:52:05 GMT" } ]
2011-01-25T00:00:00
[ [ "Levit", "Vadim E.", "" ], [ "Kempner", "Yulia", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0409429
Sebastian Roch
S. Roch
Bounding Fastest Mixing
20 pages
null
null
null
math.PR cs.DM math.CO math.ST stat.TH
null
In a series of recent works, Boyd, Diaconis, and their co-authors have introduced a semidefinite programming approach for computing the fastest mixing Markov chain on a graph of allowed transitions, given a target stationary distribution. In this paper, we show that standard mixing-time analysis techniques--variational characterizations, conductance, canonical paths--can be used to give simple, nontrivial lower and upper bounds on the fastest mixing time. To test the applicability of this idea, we consider several detailed examples including the Glauber dynamics of the Ising model--and get sharp bounds.
[ { "version": "v1", "created": "Wed, 22 Sep 2004 12:32:25 GMT" } ]
2011-09-07T00:00:00
[ [ "Roch", "S.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0409548
Moshe Zakai
Moshe Zakai
On mutual information, likelihood-ratios and estimation error for the additive Gaussian channel
21 pages, to appear in the IEEE Transactions on Information Theory
IEEE Trans. on Information Theory, Vol. 51(9), pp. 3017-3024, Sept. 2005
10.1109/TIT.2005.853297
null
math.PR cs.IT math.IT math.ST stat.TH
null
This paper considers the model of an arbitrary distributed signal x observed through an added independent white Gaussian noise w, y=x+w. New relations between the minimal mean square error of the non-causal estimator and the likelihood ratio between y and \omega are derived. This is followed by an extended version of a recently derived relation between the mutual information I(x;y) and the minimal mean square error. These results are applied to derive infinite dimensional versions of the Fisher information and the de Bruijn identity. The derivation of the results is based on the Malliavin calculus.
[ { "version": "v1", "created": "Tue, 28 Sep 2004 12:04:54 GMT" }, { "version": "v2", "created": "Mon, 16 May 2005 07:33:22 GMT" } ]
2016-11-18T00:00:00
[ [ "Zakai", "Moshe", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0410068
Vladimir Shpilrain
Vladimir Shpilrain and Gabriel Zapata
Combinatorial group theory and public key cryptography
12 pages
null
null
null
math.GR cs.CR
null
After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that the conjugacy search problem is unlikely to provide sufficient level of security if a braid group is used as the platform. In this paper we address the following questions: (1) whether choosing a different group, or a class of groups, can remedy the situation; (2) whether some other "hard" problem from combinatorial group theory can be used, instead of the conjugacy search problem, in a public key exchange protocol. Another question that we address here, although somewhat vague, is likely to become a focus of the future research in public key cryptography based on symbolic computation: (3) whether one can efficiently disguise an element of a given group (or a semigroup) by using defining relations.
[ { "version": "v1", "created": "Mon, 4 Oct 2004 23:02:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Shpilrain", "Vladimir", "" ], [ "Zapata", "Gabriel", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
math/0410282
David B. Wilson
Itai Benjamini, Oded Schramm, David B. Wilson
Balanced Boolean functions that can be evaluated so that every input bit is unlikely to be read
11 pages
Proc. 37th ACM Symposium on Theory of Computing (STOC), pages 244--250, 2005
10.1145/1060590.1060627
null
math.PR cs.CC
null
A Boolean function of n bits is balanced if it takes the value 1 with probability 1/2. We exhibit a balanced Boolean function with a randomized evaluation procedure (with probability 0 of making a mistake) so that on uniformly random inputs, no input bit is read with probability more than Theta(n^{-1/2} sqrt{log n}). We give a balanced monotone Boolean function for which the corresponding probability is Theta(n^{-1/3} log n). We then show that for any randomized algorithm for evaluating a balanced Boolean function, when the input bits are uniformly random, there is some input bit that is read with probability at least Theta(n^{-1/2}). For balanced monotone Boolean functions, there is some input bit that is read with probability at least Theta(n^{-1/3}).
[ { "version": "v1", "created": "Tue, 12 Oct 2004 00:09:35 GMT" } ]
2012-06-21T00:00:00
[ [ "Benjamini", "Itai", "" ], [ "Schramm", "Oded", "" ], [ "Wilson", "David B.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/0410317
Heide Gluesing-Luerssen
Heide Gluesing-Luerssen, Wiland Schmale
On doubly-cyclic convolutional codes
null
null
null
null
math.RA cs.IT math.IT
null
Cyclicity of a convolutional code (CC) is relying on a nontrivial automorphism of the algebra F[x]/(x^n-1), where F is a finite field. If this automorphism itself has certain specific cyclicity properties one is lead to the class of doubly-cyclic CC's. Within this large class Reed-Solomon and BCH convolutional codes can be defined. After constructing doubly-cyclic CC's, basic properties are derived on the basis of which distance properties of Reed-Solomon convolutional codes are investigated.This shows that some of them are optimal or near optimal with respect to distance and performance.
[ { "version": "v1", "created": "Wed, 13 Oct 2004 13:42:07 GMT" } ]
2007-07-16T00:00:00
[ [ "Gluesing-Luerssen", "Heide", "" ], [ "Schmale", "Wiland", "" ] ]
[ { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/0410550
Ewa Krot
Ewa Krot
Further developements in finite fibonomial calculus
13 pages
null
null
null
math.CO cs.DM
null
Primary definitions, notation and general observations of finite fibonomial operator calculus (ffoc) are presented. Kwasniewski's combinatorial interpretation of fibonomial coefficients by the use of fibonacci cobweb poset is given. Some elements of incidence algebra of fibonacci cobweb poset are defined.
[ { "version": "v1", "created": "Tue, 26 Oct 2004 10:37:43 GMT" }, { "version": "v2", "created": "Wed, 27 Oct 2004 08:01:59 GMT" } ]
2008-02-15T00:00:00
[ [ "Krot", "Ewa", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0410574
Igor Podlubny
Igor Podlubny
A note on comparison of scientific impact expressed by the number of citations in different fields of science
5 pages, 1 table
Scientometrics, Vol.64, no.1, July 2005, pp.95-99. Journal ISSN: 0138-9130 (Paper) 1588-2861 (Online)
10.1007/s11192-005-0240-0
null
math.ST cs.GL physics.soc-ph stat.TH
null
Citation distributions for 1992, 1994, 1996, 1997, 1999, and 2001, which were published in the 2004 report of the National Science Foundation, USA, are analyzed. It is shown that the ratio of the total number of citations of any two broad fields of science remains close to constant over the analyzed years. Based on this observation, normalization of total numbers of citations with respect to the number of citations in mathematics is suggested as a tool for comparing scientific impact expressed by the number of citations in different fields of science.
[ { "version": "v1", "created": "Wed, 27 Oct 2004 16:02:30 GMT" }, { "version": "v2", "created": "Mon, 21 Feb 2005 16:31:50 GMT" } ]
2007-06-13T00:00:00
[ [ "Podlubny", "Igor", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0410580
Michael Yampolsky
I. Binder, M. Braverman, M. Yampolsky
Filled Julia sets with empty interior are computable
This is an expanded version, to appear in J. FoCM
null
null
null
math.DS cs.CC
null
We show that if a polynomial filled Julia set has empty interior, then it is computable.
[ { "version": "v1", "created": "Wed, 27 Oct 2004 19:53:18 GMT" }, { "version": "v2", "created": "Wed, 16 Feb 2005 15:46:20 GMT" }, { "version": "v3", "created": "Tue, 27 Jun 2006 15:59:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Binder", "I.", "" ], [ "Braverman", "M.", "" ], [ "Yampolsky", "M.", "" ] ]
[ { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/0410593
Henrik B\"a\"arnhielm
Henrik B\"a\"arnhielm
The Schreier-Sims algorithm for matrix groups
The author's MSc thesis. Uses AMS-LaTeX and algorithm2e.sty. For the associated source code, see http://matrixss.sourceforge.net/
null
null
null
math.GR cs.DS
null
This is the report of a project with the aim to make a new implementation of the Schreier-Sims algorithm in GAP, specialized for matrix groups. The standard Schreier-Sims algorithm is described in some detail, followed by descriptions of the probabilistic Schreier-Sims algorithm and the Schreier-Todd-Coxeter-Sims algorithm. Then we discuss our implementation and some optimisations, and finally we report on the performance of our implementation, as compared to the existing implementation in GAP, and we give benchmark results. The conclusion is that our implementation in some cases is faster and consumes much less memory.
[ { "version": "v1", "created": "Thu, 28 Oct 2004 01:28:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Bäärnhielm", "Henrik", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/0411002
Andrzej Kwasniewski
A. K. Kwasniewski
On umbral extensions of Stirling numbers and Dobinski-like formulas
40 pages
Adv. Stud. Contemp. Math., Vol 12, no. 1, (2006) 73-100
null
null
math.CO cs.DM
null
Umbral extensions of the stirling numbers of the second kind are considered and the resulting dobinski-like various formulas including new ones are presented. These extensions naturally encompass the two well known q-extensions. The further consecutive umbral extensions q-stirling numbers are therefore realized here in a two-fold way. The fact that the umbral q-extended dobinski formula may also be interpreted as the average of powers of random variable with the q-poisson distribution singles out the q-extensions which appear to be a kind of singular point in the domain of umbral extensions as expressed by corresponding two observations. Other relevant possibilities are tackled with the paper`s closing down questions and suggestions with respect to other already existing extensions while a brief limited survey of these other type extensions is being delivered. There the newton interpolation formula and divided differences appear helpful and inevitable along with umbra symbolic language in describing properties of general exponential polynomials of touchard and their possible generalizations. Exponential structures or algebraically equivalent prefabs with their exponential formula appear to be also naturally relevant.
[ { "version": "v1", "created": "Sun, 31 Oct 2004 23:58:19 GMT" }, { "version": "v2", "created": "Fri, 5 Nov 2004 23:08:33 GMT" }, { "version": "v3", "created": "Tue, 10 May 2005 04:13:38 GMT" }, { "version": "v4", "created": "Wed, 3 Aug 2005 02:41:35 GMT" }, { "version": "v5", "created": "Thu, 20 Oct 2005 02:12:47 GMT" } ]
2008-02-11T00:00:00
[ [ "Kwasniewski", "A. K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0411007
Ewa Krot
Ewa Krot
The First Ascent into the Incidence Algebra of the Fibonacci Cobweb Poset
7 pages
Advanced Studies in Conterporary Mathematics 11 (2005), No. 2, 179-184
null
null
math.CO cs.DM
null
The explicite formulas for m\"{o}biusien function and some other important elements of the incidence algebra are delivered. For that to do one uses kwa\'sniewski's construction of his fibonacci cobweb poset in the plane grid coordinate system.
[ { "version": "v1", "created": "Sun, 31 Oct 2004 12:46:51 GMT" } ]
2016-09-07T00:00:00
[ [ "Krot", "Ewa", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0411056
Bernd Fiedler
Bernd Fiedler
Generators of algebraic curvature tensors based on a (2,1)-symmetry
16 pages
null
null
null
math.DG cs.SC math.CO
null
We consider generators of algebraic curvature tensors R which can be constructed by a Young symmetrization of product tensors U*w or w*U, where U and w are covariant tensors of order 3 and 1. We assume that U belongs to a class of the infinite set S of irreducible symmetry classes characterized by the partition (2,1). We show that the set S contains exactly one symmetry class S_0 whose elements U can not play the role of generators of tensors R. The tensors U of all other symmetry classes from S\{S_0} can be used as generators for tensors R. Using Computer Algebra we search for such generators whose coordinate representations are polynomials with a minimal number of summands. For a generic choice of the symmetry class of U we obtain lengths of 8 summands. In special cases these numbers can be reduced to the minimum 4. If this minimum occurs then U admits an index commutation symmetry. Furthermore minimal lengths are possible if U is formed from torsion-free covariant derivatives of alternating 2-tensor fields. We apply ideals and idempotents of group rings C[S_r] of symmetric groups S_r, Young symmetrizers, discrete Fourier transforms and Littlewood-Richardson products. For symbolic calculations we used the Mathematica packages Ricci and PERMS.
[ { "version": "v1", "created": "Tue, 2 Nov 2004 23:05:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Fiedler", "Bernd", "" ] ]
[ { "class": "Mathematics", "code": "math.DG", "description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis", "span": "(Differential Geometry)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0411107
J. Maurice Rojas
Frederic Bihan, J. Maurice Rojas, Casey E. Stella
First Steps in Algorithmic Fewnomial Theory
25 pages, 5 figures. MAJOR revision of earlier version: (1) Frederic Bihan is a new co-author, (2) Theorem 1 is strengthened with a much sharper complexity threshold, (3) bounds on connected components from Theorem 2 are dramatically sharpened, (4) Theorem 3 strengthened considerably, (5) Corollary 1 removed, but theorem of Karpinski+Shparlinski on univariate discriminants is inserted, to clarify complexity comparisons
null
null
null
math.AG cs.CC math.AC
null
Fewnomial theory began with explicit bounds -- solely in terms of the number of variables and monomial terms -- on the number of real roots of systems of polynomial equations. Here we take the next logical step of investigating the corresponding existence problem: Let FEAS_R denote the problem of deciding whether a given system of multivariate polynomial equations with integer coefficients has a real root or not. We describe a phase-transition for when m is large enough to make FEAS_R be NP-hard, when restricted to inputs consisting of a single n-variate polynomial with exactly m monomial terms: polynomial-time for m<=n+2 (for any fixed n) and NP-hardness for m<=n+n^{epsilon} (for n varying and any fixed epsilon>0). Because of important connections between FEAS_R and A-discriminants, we then study some new families of A-discriminants whose signs can be decided within polynomial-time. (A-discriminants contain all known resultants as special cases, and the latter objects are central in algorithmic algebraic geometry.) Baker's Theorem from diophantine approximation arises as a key tool. Along the way, we also derive new quantitative bounds on the real zero sets of n-variate (n+2)-nomials.
[ { "version": "v1", "created": "Fri, 5 Nov 2004 01:05:15 GMT" }, { "version": "v2", "created": "Mon, 8 Nov 2004 06:59:36 GMT" }, { "version": "v3", "created": "Mon, 14 Feb 2005 05:13:44 GMT" }, { "version": "v4", "created": "Sat, 19 Feb 2005 00:19:52 GMT" }, { "version": "v5", "created": "Tue, 15 Mar 2005 08:51:25 GMT" }, { "version": "v6", "created": "Mon, 23 Jan 2006 18:33:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Bihan", "Frederic", "" ], [ "Rojas", "J. Maurice", "" ], [ "Stella", "Casey E.", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" } ]
math/0411128
Cyril Banderier
Cyril Banderier (LIPN), Sylviane Schwer (LIPN)
Why Delannoy numbers?
Presented to the conference "Lattice Paths Combinatorics and Discrete Distributions" (Athens, June 5-7, 2002) and to appear in the Journal of Statistical Planning and Inferences
Journal of Statistical Planning and Inference 135, 1 (11/2005) 40-54
10.1016/j.jspi.2005.02.004
null
math.CO cs.DS cs.GT math.HO math.PR math.ST q-bio.GN stat.TH
null
This article is not a research paper, but a little note on the history of combinatorics: We present here a tentative short biography of Henri Delannoy, and a survey of his most notable works. This answers to the question raised in the title, as these works are related to lattice paths enumeration, to the so-called Delannoy numbers, and were the first general way to solve Ballot-like problems. These numbers appear in probabilistic game theory, alignments of DNA sequences, tiling problems, temporal representation models, analysis of algorithms and combinatorial structures.
[ { "version": "v1", "created": "Sat, 6 Nov 2004 07:40:07 GMT" } ]
2014-04-22T00:00:00
[ [ "Banderier", "Cyril", "", "LIPN" ], [ "Schwer", "Sylviane", "", "LIPN" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.HO", "description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics", "span": "(History and Overview)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0411138
Cyril Banderier
Cyril Banderier (LIPN), Jean-Marie Le Bars (LIPN, GREYC), Vlady Ravelomanana (LIPN)
Generating Functions For Kernels of Digraphs (Enumeration & Asymptotics for Nim Games)
Presented (as a poster) to the conference Formal Power Series and Algebraic Combinatorics (Vancouver, 2004), electronic proceedings
Proceedings of FPSAC'04 (2004) 91-105
null
null
math.CO cs.DM cs.DS cs.GT math.PR
null
In this article, we study directed graphs (digraphs) with a coloring constraint due to Von Neumann and related to Nim-type games. This is equivalent to the notion of kernels of digraphs, which appears in numerous fields of research such as game theory, complexity theory, artificial intelligence (default logic, argumentation in multi-agent systems), 0-1 laws in monadic second order logic, combinatorics (perfect graphs)... Kernels of digraphs lead to numerous difficult questions (in the sense of NP-completeness, #P-completeness). However, we show here that it is possible to use a generating function approach to get new informations: we use technique of symbolic and analytic combinatorics (generating functions and their singularities) in order to get exact and asymptotic results, e.g. for the existence of a kernel in a circuit or in a unicircuit digraph. This is a first step toward a generatingfunctionology treatment of kernels, while using, e.g., an approach "a la Wright". Our method could be applied to more general "local coloring constraints" in decomposable combinatorial structures.
[ { "version": "v1", "created": "Sat, 6 Nov 2004 20:33:39 GMT" } ]
2012-02-06T00:00:00
[ [ "Banderier", "Cyril", "", "LIPN" ], [ "Bars", "Jean-Marie Le", "", "LIPN, GREYC" ], [ "Ravelomanana", "Vlady", "", "LIPN" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
math/0411145
Andrzej Kwasniewski
A.K.Kwasniewski
Information on some recent applications of umbral extensions to discrete mathematics
14 pages
Review Bulletin of Calcutta Mathematical Society Vol. 13 (2005) 1-10
null
null
math.CO cs.DM
null
At the first part of the paper we show how specific umbral extensions of the Stirling numbers of the second kind result in new type of Dobinski-like formulas. In the second part among others one recovers how and why Ward solution of uncountable family of extended difference calculus nonhomogeneous equations extends to Ward-Appell polynomials case . Illustrative specifications to q-calculus case and fibonomial calculus case are made explicit due to the usage of the so called upside down notation for objects of extended finite operator calculus .
[ { "version": "v1", "created": "Sun, 7 Nov 2004 07:05:37 GMT" }, { "version": "v2", "created": "Wed, 21 Sep 2005 14:12:33 GMT" } ]
2016-09-07T00:00:00
[ [ "Kwasniewski", "A. K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0411239
Vadim E. Levit
Vadim E. Levit and Eugen Mandrescu
Very well-covered graphs with log-concave independence polynomials
8 pages, 4 figures
null
null
null
math.CO cs.DM
null
If for any $k$ the $k$-th coefficient of a polynomial $I(G;x)$ is equal to the number of stable sets of cardinality $k$ in the graph $G$, then it is called the independence polynomial of $G$ (Gutman and Harary, 1983). Alavi, Malde, Schwenk and Erdos (1987) conjectured that $I(G;x)$ is unimodal, whenever $G$ is a forest, while Brown, Dilcher and Nowakowski (2000) conjectured that $I(G;x)$ is unimodal for any well-covered graph G. Michael and Traves (2003) showed that the assertion is false for well-covered graphs with $a(G)$ > 3 ($a(G)$ is the size of a maximum stable set of the graph $G$), while for very well-covered graphs the conjecture is still open. In this paper we give support to both conjectures by demonstrating that if $a(G)$ < 4, or $G$ belongs to ${K_{1,n}, P_{n}: n > 0}$, then $I(G*;x)$ is log-concave, and, hence, unimodal (where $G*$ is the very well-covered graph obtained from $G$ by appending a single pendant edge to each vertex).
[ { "version": "v1", "created": "Wed, 10 Nov 2004 18:13:58 GMT" } ]
2011-01-25T00:00:00
[ [ "Levit", "Vadim E.", "" ], [ "Mandrescu", "Eugen", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0411250
Cyril Banderier
Cyril Banderier (LIPN, ALGO UR-R), Philippe Flajolet (ALGO UR-R), Daniele Gardy (PRISM), Mireille Bousquet-Melou (LABRI), Alain Denise (LRI), Dominique Gouyou-Beauchamps (LRI)
Generating functions for generating trees
This article corresponds, up to minor typo corrections, to the article submitted to Discrete Mathematics (Elsevier) in Nov. 1999, and published in its vol. 246(1-3), March 2002, pp. 29-55
Discrete Mathematics 246 (1-3) (2002) 29-55
10.1016/S0012-365X(01)00250-3
null
math.CO cs.DM cs.DS
null
Certain families of combinatorial objects admit recursive descriptions in terms of generating trees: each node of the tree corresponds to an object, and the branch leading to the node encodes the choices made in the construction of the object. Generating trees lead to a fast computation of enumeration sequences (sometimes, to explicit formulae as well) and provide efficient random generation algorithms. We investigate the links between the structural properties of the rewriting rules defining such trees and the rationality, algebraicity, or transcendence of the corresponding generating function.
[ { "version": "v1", "created": "Thu, 11 Nov 2004 09:19:47 GMT" } ]
2014-04-22T00:00:00
[ [ "Banderier", "Cyril", "", "LIPN, ALGO UR-R" ], [ "Flajolet", "Philippe", "", "ALGO UR-R" ], [ "Gardy", "Daniele", "", "PRISM" ], [ "Bousquet-Melou", "Mireille", "", "LABRI" ], [ "Denise", "Alain", "", "LRI" ], [ "Gouyou-Beauchamps", "Dominique", "", "LRI" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/0411356
Pierre Leroux
Andrei Gagarin, Gilbert Labelle, Pierre Leroux (LaCIM, Universite du Quebec a Montreal)
Characterization and enumeration of toroidal K_{3,3}-subdivision-free graphs
18 pages, 7 figures and 4 tables
Discrete Math. 307 (2007), no. 23, pp. 2993-3005
10.1016/j.disc.2007.03.083
null
math.CO cs.DM
null
We describe the structure of 2-connected non-planar toroidal graphs with no K_{3,3}-subdivisions, using an appropriate substitution of planar networks into the edges of certain graphs called toroidal cores. The structural result is based on a refinement of the algorithmic results for graphs containing a fixed K_5-subdivision in [A. Gagarin and W. Kocay, "Embedding graphs containing K_5-subdivisions'', Ars Combin. 64 (2002), 33-49]. It allows to recognize these graphs in linear-time and makes possible to enumerate labelled 2-connected toroidal graphs containing no K_{3,3}-subdivisions and having minimum vertex degree two or three by using an approach similar to [A. Gagarin, G. Labelle, and P. Leroux, "Counting labelled projective-planar graphs without a K_{3,3}-subdivision", submitted, arXiv:math.CO/0406140, (2004)].
[ { "version": "v1", "created": "Tue, 16 Nov 2004 20:56:19 GMT" } ]
2008-05-06T00:00:00
[ [ "Gagarin", "Andrei", "", "LaCIM, Universite du\n Quebec a Montreal" ], [ "Labelle", "Gilbert", "", "LaCIM, Universite du\n Quebec a Montreal" ], [ "Leroux", "Pierre", "", "LaCIM, Universite du\n Quebec a Montreal" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0411378
Stephen D. Miller
David Jao, Stephen D. Miller, Ramarathnam Venkatesan
Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?
26 pages, revised, to appear in Advances in Cryptology -- Asiacrypt 2005
Advances in Cryptology -- Asiacrypt 2005, LNCS 3788, pp. 21-40.
10.1007/11593447_2
null
math.NT cs.CC cs.CR math.AG math.CO
null
The aim of this paper is to justify the common cryptographic practice of selecting elliptic curves using their order as the primary criterion. We can formalize this issue by asking whether the discrete log problem (DLOG) has the same difficulty for all curves over a given finite field with the same order. We prove that this is essentially true by showing polynomial time random reducibility of DLOG among such curves, assuming the Generalized Riemann Hypothesis (GRH). We do so by constructing certain expander graphs, similar to Ramanujan graphs, with elliptic curves as nodes and low degree isogenies as edges. The result is obtained from the rapid mixing of random walks on this graph. Our proof works only for curves with (nearly) the same endomorphism rings. Without this technical restriction such a DLOG equivalence might be false; however, in practice the restriction may be moot, because all known polynomial time techniques for constructing equal order curves produce only curves with nearly equal endomorphism rings.
[ { "version": "v1", "created": "Wed, 17 Nov 2004 17:50:05 GMT" }, { "version": "v2", "created": "Wed, 31 Aug 2005 21:47:10 GMT" }, { "version": "v3", "created": "Fri, 2 Sep 2005 12:29:18 GMT" } ]
2016-09-07T00:00:00
[ [ "Jao", "David", "" ], [ "Miller", "Stephen D.", "" ], [ "Venkatesan", "Ramarathnam", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0411488
Andrei Gagarin
Andrei Gagarin, Wendy Myrvold, and John Chambers
The obstructions for toroidal graphs with no $K_{3,3}$'s
10 pages, 7 figures, revised version with additional details
Discrete Math. 309 (2009), no. 11, pp. 3625-3631
10.1016/j.disc.2007.12.075
null
math.CO cs.DM
null
Forbidden minors and subdivisions for toroidal graphs are numerous. We consider the toroidal graphs with no $K_{3,3}$-subdivisions that coincide with the toroidal graphs with no $K_{3,3}$-minors. These graphs admit a unique decomposition into planar components and have short lists of obstructions. We provide the complete lists of four forbidden minors and eleven forbidden subdivisions for the toroidal graphs with no $K_{3,3}$'s and prove that the lists are sufficient.
[ { "version": "v1", "created": "Mon, 22 Nov 2004 20:33:28 GMT" }, { "version": "v2", "created": "Wed, 28 Sep 2005 21:59:31 GMT" } ]
2010-12-22T00:00:00
[ [ "Gagarin", "Andrei", "" ], [ "Myrvold", "Wendy", "" ], [ "Chambers", "John", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0411515
Marcus Hutter
Marcus Hutter
Fast Non-Parametric Bayesian Inference on Infinite Trees
8 twocolumn pages, 3 figures
Proc. 10th International Conf. on Artificial Intelligence and Statistics (AISTATS-2005) 144-151
null
IDSIA-24-04
math.ST cs.LG math.PR stat.TH
null
Given i.i.d. data from an unknown distribution, we consider the problem of predicting future items. An adaptive way to estimate the probability density is to recursively subdivide the domain to an appropriate data-dependent granularity. A Bayesian would assign a data-independent prior probability to "subdivide", which leads to a prior over infinite(ly many) trees. We derive an exact, fast, and simple inference algorithm for such a prior, for the data evidence, the predictive distribution, the effective model dimension, and other quantities.
[ { "version": "v1", "created": "Tue, 23 Nov 2004 16:39:07 GMT" } ]
2007-06-13T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0411644
Vladimir Shpilrain
Vladimir Shpilrain and Alexander Ushakov
The conjugacy search problem in public key cryptography: unnecessary and insufficient
4 pages
null
null
null
math.GR cs.CR
null
The conjugacy search problem in a group G is the problem of recovering an x in G from given g in G and h=x^{-1}gx. This problem is in the core of several recently suggested public key exchange protocols, most notably the one due to Anshel, Anshel, and Goldfeld, and the one due to Ko, Lee at al. In this note, we make two observations that seem to have eluded most people's attention. The first observation is that solving the conjugacy search problem is not necessary for an adversary to get the common secret key in the Ko-Lee protocol. It is sufficient to solve an apparently easier problem of finding x, y in G such that h=ygx for given g, h in G. Another observation is that solving the conjugacy search problem is not sufficient for an adversary to get the common secret key in the Anshel-Anshel-Goldfeld protocol.
[ { "version": "v1", "created": "Mon, 29 Nov 2004 21:46:13 GMT" } ]
2016-09-07T00:00:00
[ [ "Shpilrain", "Vladimir", "" ], [ "Ushakov", "Alexander", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
math/0412233
Andrzej Kwasniewski
A.K.Kwasniewski, E.Borak
Extended finite operator calculus as an example of algebraization of analysis
25 pages
null
null
null
math.CO cs.DM
null
A wardian calculus of sequences started almost seventy years ago constitutes the general scheme for extensions of the classical umbral operator calculus considered by many afterwards . At the same time this calculus is an example of the algebraization of the analysis here restricted to the algebra of formal series. This is a review article based on the recent first author contributions. As the survey article it is supplemented by the short indicatory glossaries of notation and terms used by prominent contributors to the domain.
[ { "version": "v1", "created": "Mon, 13 Dec 2004 02:12:08 GMT" } ]
2008-02-11T00:00:00
[ [ "Kwasniewski", "A. K.", "" ], [ "Borak", "E.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0501388
J. Maurice Rojas
J. Maurice Rojas
Efficiently Detecting Torsion Points and Subtori
21 pages, no figures. Final version, with additional commentary and references. Also fixes a gap in Theorems 2 (now Theorem 1.3) regarding translated subtori
null
null
null
math.AG cs.CC math.NT
null
Suppose X is the complex zero set of a finite collection of polynomials in Z[x_1,...,x_n]. We show that deciding whether X contains a point all of whose coordinates are d_th roots of unity can be done within NP^NP (relative to the sparse encoding), under a plausible assumption on primes in arithmetic progression. In particular, our hypothesis can still hold even under certain failures of the Generalized Riemann Hypothesis, such as the presence of Siegel-Landau zeroes. Furthermore, we give a similar (but UNconditional) complexity upper bound for n=1. Finally, letting T be any algebraic subgroup of (C^*)^n we show that deciding whether X contains T is coNP-complete (relative to an even more efficient encoding),unconditionally. We thus obtain new non-trivial families of multivariate polynomial systems where deciding the existence of complex roots can be done unconditionally in the polynomial hierarchy -- a family of complexity classes lying between PSPACE and P, intimately connected with the P=?NP Problem. We also discuss a connection to Laurent's solution of Chabauty's Conjecture from arithmetic geometry.
[ { "version": "v1", "created": "Sun, 23 Jan 2005 07:43:28 GMT" }, { "version": "v2", "created": "Wed, 9 Nov 2005 02:28:39 GMT" }, { "version": "v3", "created": "Mon, 18 Sep 2006 05:38:53 GMT" }, { "version": "v4", "created": "Fri, 7 Sep 2007 16:06:25 GMT" } ]
2011-11-10T00:00:00
[ [ "Rojas", "J. Maurice", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
math/0502024
Keye Martin
Keye Martin
The maximum entropy state
15 pages
null
null
null
math.PR cs.LO math-ph math.MP quant-ph
null
We give an algorithm for calculating the maximum entropy state as the least fixed point of a Scott continuous mapping on the domain of classical states in their Bayesian order.
[ { "version": "v1", "created": "Tue, 1 Feb 2005 17:46:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Martin", "Keye", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
math/0502172
Jean-Guillaume Dumas
Jean-Guillaume Luc Dumas (LJK), Aude Rondepierre (MIP)
An hybrid system approach to nonlinear optimal control problems
null
null
null
null
math.OC cs.SC
null
We consider a nonlinear ordinary differential equation and want to control its behavior so that it reaches a target by minimizing a cost function. Our approach is to use hybrid systems to solve this problem: the complex dynamic is replaced by piecewise affine approximations which allow an analytical resolution. The sequence of affine models then forms a sequence of states of a hybrid automaton. Given a sequence of states, we introduce an hybrid approximation of the nonlinear controllable domain and propose a new algorithm computing a controllable, piecewise convex approximation. The same way the nonlinear optimal control problem is replaced by an hybrid piecewise affine one. Stating a hybrid maximum principle suitable to our hybrid model, we deduce the global structure of the hybrid optimal control steering the system to the target.
[ { "version": "v1", "created": "Tue, 8 Feb 2005 20:49:45 GMT" }, { "version": "v2", "created": "Thu, 5 Jan 2006 09:33:17 GMT" }, { "version": "v3", "created": "Mon, 7 Jan 2008 14:09:33 GMT" } ]
2008-01-07T00:00:00
[ [ "Dumas", "Jean-Guillaume Luc", "", "LJK" ], [ "Rondepierre", "Aude", "", "MIP" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
math/0502232
Svante Janson
Svante Janson
Individual displacements in hashing with coalesced chains
17 pages
null
null
U.U.D.M. 2005:4
math.PR cs.DS
null
We study the asymptotic distribution of the displacements in hashing with coalesced chains, for both late-insertion and early-insertion. Asymptotic formulas for means and variances follow. The method uses Poissonization and some stochastic calculus.
[ { "version": "v1", "created": "Fri, 11 Feb 2005 09:28:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Janson", "Svante", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/0502315
Marcus Hutter
Jan Poland and Marcus Hutter
Strong Asymptotic Assertions for Discrete MDL in Regression and Classification
6 two-column pages
Proc. 14th Dutch-Belgium Conf. on Machine Learning (Benelearn 2005) 67-72
null
IDSIA-02-05
math.ST cs.AI cs.IT cs.LG math.IT math.PR stat.TH
null
We study the properties of the MDL (or maximum penalized complexity) estimator for Regression and Classification, where the underlying model class is countable. We show in particular a finite bound on the Hellinger losses under the only assumption that there is a "true" model contained in the class. This implies almost sure convergence of the predictive distribution to the true one at a fast rate. It corresponds to Solomonoff's central theorem of universal induction, however with a bound that is exponentially larger.
[ { "version": "v1", "created": "Tue, 15 Feb 2005 16:26:36 GMT" } ]
2007-07-16T00:00:00
[ [ "Poland", "Jan", "" ], [ "Hutter", "Marcus", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0502327
Terence C. Tao
Emmanuel Candes, Terence Tao
Decoding by Linear Programming
22 pages, 4 figures, submitted
null
null
null
math.MG cs.CR
null
This paper considers the classical error correcting problem which is frequently discussed in coding theory. We wish to recover an input vector $f \in \R^n$ from corrupted measurements $y = A f + e$. Here, $A$ is an $m$ by $n$ (coding) matrix and $e$ is an arbitrary and unknown vector of errors. Is it possible to recover $f$ exactly from the data $y$? We prove that under suitable conditions on the coding matrix $A$, the input $f$ is the unique solution to the $\ell_1$-minimization problem ($\|x\|_{\ell_1} := \sum_i |x_i|$) $$ \min_{g \in \R^n} \| y - Ag \|_{\ell_1} $$ provided that the support of the vector of errors is not too large, $\|e\|_{\ell_0} := |\{i : e_i \neq 0\}| \le \rho \cdot m$ for some $\rho > 0$. In short, $f$ can be recovered exactly by solving a simple convex optimization problem (which one can recast as a linear program). In addition, numerical experiments suggest that this recovery procedure works unreasonably well; $f$ is recovered exactly even in situations where a significant fraction of the output is corrupted.
[ { "version": "v1", "created": "Tue, 15 Feb 2005 21:12:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Candes", "Emmanuel", "" ], [ "Tao", "Terence", "" ] ]
[ { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
math/0502354
Michael Yampolsky
I. Binder, M. Braverman, M. Yampolsky
On computational complexity of Siegel Julia sets
Updated version, to appear in Commun. Math. Phys
null
10.1007/s00220-006-1546-3
null
math.DS cs.CC
null
It has been previously shown by two of the authors that some polynomial Julia sets are algorithmically impossible to draw with arbitrary magnification. On the other hand, for a large class of examples the problem of drawing a picture has polynomial complexity. In this paper we demonstrate the existence of computable quadratic Julia sets whose computational complexity is arbitrarily high.
[ { "version": "v1", "created": "Wed, 16 Feb 2005 15:53:36 GMT" }, { "version": "v2", "created": "Mon, 7 Nov 2005 18:03:00 GMT" } ]
2009-11-11T00:00:00
[ [ "Binder", "I.", "" ], [ "Braverman", "M.", "" ], [ "Yampolsky", "M.", "" ] ]
[ { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/0503210
Ewa Krot
Ewa Krot
An Introduction to Finite Fibonomial Calculus
16 pages
CEJM, 2(5) 2004, 754-766
null
null
math.CO cs.DM
null
This is an indicatory presentation of main definitions and theorems of fibonomial calculus which is a special case of psi-extented rota's finite operator calculus.
[ { "version": "v1", "created": "Fri, 11 Mar 2005 12:54:29 GMT" } ]
2008-02-15T00:00:00
[ [ "Krot", "Ewa", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0503286
Andrzej Kwasniewski
A.K.Kwasniewski
Cobweb posets as noncommutative prefabs
11 pages, 5 figures
Adv. Stud. Contemp. Math. vol. 14 (1) 2007. pp. 37-47
null
null
math.CO cs.DM
null
A class of new type graded infinite posets with minimal element are considered. These so called cobweb posets introduced recently by the present author provide a wide range of new noncommutative prefab combinatorial schema with characteristic graded subposets as primes. The schema are defined here via relaxing commutativity and associativity requirements imposed on the composition of prefabs by the fathers of this fertile concept. The construction and the very first basic properties of cobweb prefabs are pointed out in what follows. An another single valued commutative amd associative composision is also considered.
[ { "version": "v1", "created": "Tue, 15 Mar 2005 04:26:45 GMT" }, { "version": "v2", "created": "Mon, 21 Mar 2005 05:26:54 GMT" }, { "version": "v3", "created": "Wed, 11 May 2005 03:34:00 GMT" }, { "version": "v4", "created": "Sun, 25 Sep 2005 23:40:37 GMT" } ]
2008-02-11T00:00:00
[ [ "Kwasniewski", "A. K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0503295
Ewa Krot
Ewa Krot
Characterization of the Fibonacci Cobweb Poset as oDAG
5 pages, 1 figure
null
null
null
math.CO cs.DM
null
The characterization of fibonacci cobweb poset as d.a.g. and o.d.a.g. is given. The dim 2 poset such that its hasse diagram coincide with digraf of fibonacci cobweb poset is constructed.
[ { "version": "v1", "created": "Tue, 15 Mar 2005 11:52:45 GMT" } ]
2008-02-09T00:00:00
[ [ "Krot", "Ewa", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0503453
Amilcar Sernadas
P. Mateus and A. Sernadas (CLC, Dep Math, IST, Lisbon, Portugal)
Weakly complete axiomatization of exogenous quantum propositional logic
28 pages
null
10.1016/j.ic.2006.02.001
null
math.LO cs.LO quant-ph
null
A weakly complete finitary axiomatization for EQPL (exogenous quantum propositional logic) is presented. The proof is carried out using a non trivial extension of the Fagin-Halpern-Megiddo technique together with three Henkin style completions.
[ { "version": "v1", "created": "Tue, 22 Mar 2005 14:36:13 GMT" } ]
2016-01-14T00:00:00
[ [ "Mateus", "P.", "", "CLC, Dep Math, IST, Lisbon, Portugal" ], [ "Sernadas", "A.", "", "CLC, Dep Math, IST, Lisbon, Portugal" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
math/0503503
Elchanan Mossel
Elchanan Mossel and Ryan O'Donnell and Krzysztof Oleszkiewicz
Noise stability of functions with low influences: invariance and optimality
null
null
null
null
math.PR cs.CC math.CO
null
In this paper we study functions with low influences on product probability spaces. The analysis of boolean functions with low influences has become a central problem in discrete Fourier analysis. It is motivated by fundamental questions arising from the construction of probabilistically checkable proofs in theoretical computer science and from problems in the theory of social choice in economics. We prove an invariance principle for multilinear polynomials with low influences and bounded degree; it shows that under mild conditions the distribution of such polynomials is essentially invariant for all product spaces. Ours is one of the very few known non-linear invariance principles. It has the advantage that its proof is simple and that the error bounds are explicit. We also show that the assumption of bounded degree can be eliminated if the polynomials are slightly ``smoothed''; this extension is essential for our applications to ``noise stability''-type problems. In particular, as applications of the invariance principle we prove two conjectures: the ``Majority Is Stablest'' conjecture from theoretical computer science, which was the original motivation for this work, and the ``It Ain't Over Till It's Over'' conjecture from social choice theory.
[ { "version": "v1", "created": "Wed, 23 Mar 2005 18:54:38 GMT" }, { "version": "v2", "created": "Mon, 23 May 2005 23:54:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Mossel", "Elchanan", "" ], [ "O'Donnell", "Ryan", "" ], [ "Oleszkiewicz", "Krzysztof", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0504037
Robin Houston
Robin Houston, Dominic Hughes and Andrea Schalk
Modelling Linear Logic Without Units (Preliminary Results)
23 pages
null
null
null
math.CT cs.LO math.LO
null
We describe a notion of categorical model for unitless fragments of (multiplicative) linear logic. The basic definition uses promonoidal categories, and we also give an equivalent elementary axiomatisation.
[ { "version": "v1", "created": "Sun, 3 Apr 2005 09:55:06 GMT" } ]
2013-05-13T00:00:00
[ [ "Houston", "Robin", "" ], [ "Hughes", "Dominic", "" ], [ "Schalk", "Andrea", "" ] ]
[ { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
math/0504378
Sebastian Roch
S. Roch
A Short Proof that Phylogenetic Tree Reconstruction by Maximum Likelihood is Hard
6 pages; Corrected typos and notational problem
null
null
null
math.PR cs.CC cs.CE math.ST q-bio.PE stat.TH
null
Maximum likelihood is one of the most widely used techniques to infer evolutionary histories. Although it is thought to be intractable, a proof of its hardness has been lacking. Here, we give a short proof that computing the maximum likelihood tree is NP-hard by exploiting a connection between likelihood and parsimony observed by Tuffley and Steel.
[ { "version": "v1", "created": "Tue, 19 Apr 2005 08:36:17 GMT" }, { "version": "v2", "created": "Wed, 28 Sep 2005 01:50:57 GMT" } ]
2011-09-30T00:00:00
[ [ "Roch", "S.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0504522
Lars Eirik Danielsen
Lars Eirik Danielsen (1), Matthew G. Parker (1) ((1) University of Bergen)
On the Classification of All Self-Dual Additive Codes over GF(4) of Length up to 12
18 pages, 4 figures
Journal of Combinatorial Theory, Series A 113(7), pp. 1351-1367, 2006
10.1016/j.jcta.2005.12.004
null
math.CO cs.IT math.IT
null
We consider additive codes over GF(4) that are self-dual with respect to the Hermitian trace inner product. Such codes have a well-known interpretation as quantum codes and correspond to isotropic systems. It has also been shown that these codes can be represented as graphs, and that two codes are equivalent if and only if the corresponding graphs are equivalent with respect to local complementation and graph isomorphism. We use these facts to classify all codes of length up to 12, where previously only all codes of length up to 9 were known. We also classify all extremal Type II codes of length 14. Finally, we find that the smallest Type I and Type II codes with trivial automorphism group have length 9 and 12, respectively.
[ { "version": "v1", "created": "Mon, 25 Apr 2005 16:06:16 GMT" }, { "version": "v2", "created": "Wed, 2 Nov 2005 16:07:57 GMT" }, { "version": "v3", "created": "Thu, 12 Jan 2006 09:07:03 GMT" }, { "version": "v4", "created": "Fri, 17 Feb 2006 11:22:44 GMT" } ]
2008-01-09T00:00:00
[ [ "Danielsen", "Lars Eirik", "" ], [ "Parker", "Matthew G.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/0505418
Erik Palmgren
Erik Palmgren
Internalising modified realisability in constructive type theory
7 pages
Logical Methods in Computer Science, Volume 1, Issue 2 (October 5, 2005) lmcs:2266
10.2168/LMCS-1(2:2)2005
null
math.LO cs.LO
null
A modified realisability interpretation of infinitary logic is formalised and proved sound in constructive type theory (CTT). The logic considered subsumes first order logic. The interpretation makes it possible to extract programs with simplified types and to incorporate and reason about them in CTT.
[ { "version": "v1", "created": "Thu, 19 May 2005 14:43:41 GMT" }, { "version": "v2", "created": "Tue, 4 Oct 2005 11:40:59 GMT" }, { "version": "v3", "created": "Wed, 5 Oct 2005 11:37:04 GMT" } ]
2017-01-11T00:00:00
[ [ "Palmgren", "Erik", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
math/0505487
Vladimir Shpilrain
Vladimir Shpilrain and Alexander Ushakov
Thompson's group and public key cryptography
14 pages
null
null
null
math.GR cs.CR
null
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established protocols based on numeric computation. Notably, the protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al. exploited the conjugacy search problem in groups, which is a ramification of the discrete logarithm problem. However, it is a prevalent opinion now that the conjugacy search problem alone is unlikely to provide sufficient level of security no matter what particular group is chosen as a platform. In this paper we employ another problem (we call it the decomposition problem), which is more general than the conjugacy search problem, and we suggest to use R. Thompson's group as a platform. This group is well known in many areas of mathematics, including algebra, geometry, and analysis. It also has several properties that make it fit for cryptographic purposes. In particular, we show here that the word problem in Thompson's group is solvable in almost linear time.
[ { "version": "v1", "created": "Tue, 24 May 2005 01:25:27 GMT" } ]
2016-09-07T00:00:00
[ [ "Shpilrain", "Vladimir", "" ], [ "Ushakov", "Alexander", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
math/0505617
Michael Yampolsky
Ilia Binder, Mark Braverman, Michael Yampolsky
On computational complexity of Riemann mapping
null
null
null
null
math.CV cs.CC
null
In this paper we consider the computational complexity of uniformizing a domain with a given computable boundary. We give nontrivial upper and lower bounds in two settings: when the approximation of boundary is given either as a list of pixels, or by a Turing Machine.
[ { "version": "v1", "created": "Fri, 27 May 2005 20:17:03 GMT" }, { "version": "v2", "created": "Mon, 5 Feb 2007 10:04:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Binder", "Ilia", "" ], [ "Braverman", "Mark", "" ], [ "Yampolsky", "Michael", "" ] ]
[ { "class": "Mathematics", "code": "math.CV", "description": "Holomorphic functions, automorphic group actions and forms, pseudoconvexity, complex geometry, analytic spaces, analytic sheaves", "span": "(Complex Variables)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/0506082
Naoto Morikawa
Naoto Morikawa
Discrete differential geometry of proteins: a new method for encoding three-dimensional structures of proteins
10 pages, 6 figures, 3 tables. Submitted
null
null
null
math.CO cs.DM math.MG q-bio.GN
null
In nature the three-dimensional structure of a protein is encoded in the corresponding gene. In this paper we describe a new method for encoding the three-dimensional structure of a protein into a binary sequence. The feature of the method is the correspondence between protein-folding and ``integration''. A protein is approximated by a folded tetrahedron sequence. And the binary code of a protein is obtained as the ``second derivative'' of the shape of the folded tetrahedron sequence. With this method at hand, we can extract static structural information of a protein from its gene. And we can describe the distribution of three-dimensional structures of proteins without any subjective hierarchical classification.
[ { "version": "v1", "created": "Sun, 5 Jun 2005 03:01:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Morikawa", "Naoto", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" } ]
math/0506180
Marie-Annick Guillemer
Dimitri Grigoriev (IRMAR), Ilia Ponomarenko
Constructions in public-key cryptography over matrix groups
null
null
null
2005-19
math.GR cs.CR math-ph math.MP
null
The purpose of the paper is to give new key agreement protocols (a multi-party extension of the protocol due to Anshel-Anshel-Goldfeld and a generalization of the Diffie-Hellman protocol from abelian to solvable groups) and a new homomorphic public-key cryptosystem. They rely on difficulty of the conjugacy and membership problems for subgroups of a given group. To support these and other known cryptographic schemes we present a general technique to produce a family of instances being matrix groups (over finite commutative rings) which play a role for these schemes similar to the groups $Z\_n^*$ in the existing cryptographic constructions like RSA or discrete logarithm.
[ { "version": "v1", "created": "Fri, 10 Jun 2005 12:30:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Grigoriev", "Dimitri", "", "IRMAR" ], [ "Ponomarenko", "Ilia", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
math/0506475
Radhakrishnan Srinivasan
Radhakrishnan Srinivasan, H. P. Raghunandan
Foundations of real analysis and computability theory in non-Aristotelian finitary logic
An error corrected in the equation of Remark 9. Other comments of Version 2: 25 pages, nine references added, typos corrected. Appendix B, giving details of the formal systems, has been added. Substantially improved presentation with more details, especially in Sec. 4 on real analysis, which can be read more or less independently of other sections
null
null
null
math.LO cs.LO math.GM
null
This paper outlines new paradigms for real analysis and computability theory in the recently proposed non-Aristotelian finitary logic (NAFL). Constructive real analysis in NAFL (NRA) is accomplished by a translation of diagrammatic concepts from Euclidean geometry into an extension (NPAR) of the NAFL version of Peano Arithmetic (NPA). Such a translation is possible because NPA proves the existence of every infinite proper class of natural numbers that is definable in the language of NPA. Infinite sets are not permitted in NPAR and quantification over proper classes is banned; hence Cantor's diagonal argument cannot be legally formulated in NRA, and there is no `cardinality' for any collection (`super-class') of real numbers. Many of the useful aspects of classical real analysis, such as, the calculus of Newton and Leibniz, are justifiable in NRA. But the paradoxes, such as, Zeno's paradoxes of motion and the Banach-Tarski paradox, are resolved because NRA admits only closed super-classes of real numbers; in particular, open/semi-open intervals of real numbers are not permitted. The NAFL version of computability theory (NCT) rejects Turing's argument for the undecidability of the halting problem and permits hypercomputation. Important potential applications of NCT are in the areas of quantum and autonomic computing.
[ { "version": "v1", "created": "Thu, 23 Jun 2005 13:05:27 GMT" }, { "version": "v2", "created": "Wed, 28 Sep 2005 07:44:24 GMT" }, { "version": "v3", "created": "Thu, 29 Sep 2005 10:53:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Srinivasan", "Radhakrishnan", "" ], [ "Raghunandan", "H. P.", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.GM", "description": "Mathematical material of general interest, topics not covered elsewhere", "span": "(General Mathematics)" } ]
math/0506538
Dominique Rossin
Anne Micheli (LIAFA), Dominique Rossin (LIAFA)
Edit Distance between Unlabeled Ordered Trees
Algorithmique et Combinatoire
null
null
null
math.CO cs.DM
null
There exists a bijection between one stack sortable permutations --permutations which avoid the pattern 231-- and planar trees. We define an edit distance between permutations which is coherent with the standard edit distance between trees. This one-to-one correspondence yields a polynomial algorithm for the subpermutation problem for $(231)$ avoiding permutations. Moreover, we obtain the generating function of the edit distance between ordered trees and some special ones. For the general case we show that the mean edit distance between a planar tree and all other planar trees is at least $n/ln(n)$. Some results can be extended to labeled trees considering colored Dyck paths or equivalently colored one stack sortable permutations.
[ { "version": "v1", "created": "Mon, 27 Jun 2005 11:51:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Micheli", "Anne", "", "LIAFA" ], [ "Rossin", "Dominique", "", "LIAFA" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0506553
Giorgi Japaridze
Giorgi Japaridze
Introduction to Cirquent Calculus and Abstract Resource Semantics
To appear in Journal of Logic and Computation
Journal of Logic and Computation 16 (2006), pp. 489-532
10.1093/logcom/exl005
null
math.LO cs.LO
null
This paper introduces a refinement of the sequent calculus approach called cirquent calculus. While in Gentzen-style proof trees sibling (or cousin, etc.) sequents are disjoint sequences of formulas, in cirquent calculus they are permitted to share elements. Explicitly allowing or disallowing shared resources and thus taking to a more subtle level the resource-awareness intuitions underlying substructural logics, cirquent calculus offers much greater flexibility and power than sequent calculus does. A need for substantially new deductive tools came with the birth of computability logic (see http://www.cis.upenn.edu/~giorgi/cl.html) - the semantically constructed formal theory of computational resources, which has stubbornly resisted any axiomatization attempts within the framework of traditional syntactic approaches. Cirquent calculus breaks the ice. Removing contraction from the full collection of its rules yields a sound and complete system for the basic fragment CL5 of computability logic. Doing the same in sequent calculus, on the other hand, throws out the baby with the bath water, resulting in the strictly weaker affine logic. An implied claim of computability logic is that it is CL5 rather than affine logic that adequately materializes the resource philosophy traditionally associated with the latter. To strengthen this claim, the paper further introduces an abstract resource semantics and shows the soundness and completeness of CL5 with respect to it.
[ { "version": "v1", "created": "Mon, 27 Jun 2005 19:45:06 GMT" }, { "version": "v2", "created": "Tue, 19 Jul 2005 19:06:20 GMT" }, { "version": "v3", "created": "Fri, 23 Dec 2005 15:19:47 GMT" } ]
2011-04-15T00:00:00
[ [ "Japaridze", "Giorgi", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
math/0507032
Gerard Henry Edmond Duchamp
G\'erard Henry Edmond Duchamp (LIPN), Jean-Gabriel Luque (IGM), Marianne Deboysson-Flouret (LIH)
Transitive Hall sets
null
null
null
null
math.CO cs.DM
null
We give the definition of Lazard and Hall sets in the context of transitive factorizations of free monoids. The equivalence of the two properties is proved. This allows to build new effective bases of free partially commutative Lie algebras. The commutation graphs for which such sets exist are completely characterized and we explicit, in this context, the classical PBW rewriting process.
[ { "version": "v1", "created": "Sat, 2 Jul 2005 05:46:50 GMT" } ]
2016-08-16T00:00:00
[ [ "Duchamp", "Gérard Henry Edmond", "", "LIPN" ], [ "Luque", "Jean-Gabriel", "", "IGM" ], [ "Deboysson-Flouret", "Marianne", "", "LIH" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0507041
Boaz Tsaban
W. Charles Holland and Boaz Tsaban
The conjugacy problem and related problems in lattice-ordered groups
Small updates
International Journal of Algebra and Computation 15 (2005), 395-404
10.1142/S0218196705002232
null
math.GR cs.CC math.GN
null
We study, from a constructive computational point of view, the techniques used to solve the conjugacy problem in the "generic" lattice-ordered group Aut(R) of order automorphisms of the real line. We use these techniques in order to show that for each choice of parameters f,g in Aut(R), the equation xfx=g is effectively solvable in Aut(R).
[ { "version": "v1", "created": "Mon, 4 Jul 2005 14:28:39 GMT" }, { "version": "v2", "created": "Thu, 17 May 2007 20:15:33 GMT" } ]
2010-08-02T00:00:00
[ [ "Holland", "W. Charles", "" ], [ "Tsaban", "Boaz", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.GN", "description": "Continuum theory, point-set topology, spaces with algebraic structure, foundations, dimension theory, local and global properties", "span": "(General Topology)" } ]
math/0507235
Guangyue Han
Guangyue Han, Brian Marcus
Analyticity of Entropy Rate of Hidden Markov Chains
The title has been changed. The new main theorem now combines the old main theorem and the remark following the old main theorem. A new section is added as an introduction to complex analysis. General principle and an example to determine the domain of analyticity of entropy rate have been added. Relaxed conditions for analyticity of entropy rate and the corresponding examples are added. The section about binary markov chain corrupted by binary symmetric noise is taken out (to be part of another paper)
null
null
null
math.PR cs.IT math.IT
null
We prove that under mild positivity assumptions the entropy rate of a hidden Markov chain varies analytically as a function of the underlying Markov chain parameters. A general principle to determine the domain of analyticity is stated. An example is given to estimate the radius of convergence for the entropy rate. We then show that the positivity assumptions can be relaxed, and examples are given for the relaxed conditions. We study a special class of hidden Markov chains in more detail: binary hidden Markov chains with an unambiguous symbol, and we give necessary and sufficient conditions for analyticity of the entropy rate for this case. Finally, we show that under the positivity assumptions the hidden Markov chain {\em itself} varies analytically, in a strong sense, as a function of the underlying Markov chain parameters.
[ { "version": "v1", "created": "Tue, 12 Jul 2005 14:24:10 GMT" }, { "version": "v2", "created": "Mon, 26 Sep 2005 23:44:28 GMT" }, { "version": "v3", "created": "Tue, 15 Nov 2005 20:21:44 GMT" }, { "version": "v4", "created": "Mon, 3 Apr 2006 21:15:13 GMT" } ]
2007-07-13T00:00:00
[ [ "Han", "Guangyue", "" ], [ "Marcus", "Brian", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/0507410
Bernd Fiedler
Bernd Fiedler
Methods for the construction of generators of algebraic curvature tensors
11 pages
null
null
null
math.CO cs.SC math.DG
null
We demonstrate the use of several tools from Algebraic Combinatorics such as Young tableaux, symmetry operators, the Littlewood-Richardson rule and discrete Fourier transforms of symmetric groups in investigations of algebraic curvature tensors.
[ { "version": "v1", "created": "Wed, 20 Jul 2005 16:18:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Fiedler", "Bernd", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.DG", "description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis", "span": "(Differential Geometry)" } ]
math/0508171
Pavel Chebotarev
Pavel Chebotarev and Rafig Agaev
Matrices of Forests and the Analysis of Digraphs
18 pages
null
null
null
math.CO cs.CV cs.NI
null
The matrices of spanning rooted forests are studied as a tool for analysing the structure of digraphs and measuring their characteristics. The problems of revealing the basis bicomponents, measuring vertex proximity, and ranking from preference relations / sports competitions are considered. It is shown that the vertex accessibility measure based on spanning forests has a number of desirable properties. An interpretation for the normalized matrix of out-forests in terms of information dissemination is given. Keywords: Laplacian matrix, spanning forest, matrix-forest theorem, proximity measure, bicomponent, ranking, incomplete tournament, paired comparisons
[ { "version": "v1", "created": "Tue, 9 Aug 2005 20:11:27 GMT" }, { "version": "v2", "created": "Sat, 4 Feb 2006 12:10:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Chebotarev", "Pavel", "" ], [ "Agaev", "Rafig", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
math/0508183
Pavel Chebotarev
P. Yu. Chebotarev and E. V. Shamis
On a Duality between Metrics and $\Sigma$-Proximities
5 pages
Automation and Remote Control 59 (1998) 608--612
null
null
math.MG cs.DS math.CO
null
: In studies of discrete structures, functions are frequently used that express proximity, but are not metrics. We consider a class of such functions that is characterized by a normalization condition and an inequality that plays the same role as the triangle inequality does for metrics. We show that the introduced functions, named $\Sigma$-proximities, are in a definite sense dual to metrics: there exists a natural one-to-one correspondence between metrics and $\Sigma$-proximities defined on the same finite set; in contrast to metrics, $\Sigma$-proximities measure {\it comparative} proximity; the closer the objects, the greater the $\Sigma$-proximity; diagonal entries of the $\Sigma$-proximity matrix characterize the ``centrality'' of elements. The results are extended to arbitrary infinite sets.
[ { "version": "v1", "created": "Wed, 10 Aug 2005 14:25:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Chebotarev", "P. Yu.", "" ], [ "Shamis", "E. V.", "" ] ]
[ { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0508199
Pavel Chebotarev
Pavel Chebotarev
Extending Utility Representations of Partial Orders
15 pages
In: Constructing and Applying Objective Functions. Lecture Notes in Economics and Math. Systems, Vol.510, Springer, 2002, P. 63-74
10.1007/978-3-642-56038-5_4
null
math.OC cs.DS math.FA
null
The problem is considered as to whether a monotone function defined on a subset P of a Euclidean space can be strictly monotonically extended to the whole space. It is proved that this is the case if and only if the function is {\em separably increasing}. Explicit formulas are given for a class of extensions which involves an arbitrary bounded increasing function. Similar results are obtained for monotone functions that represent strict partial orders on arbitrary abstract sets X. The special case where P is a Pareto subset is considered.
[ { "version": "v1", "created": "Thu, 11 Aug 2005 12:51:11 GMT" } ]
2022-10-21T00:00:00
[ [ "Chebotarev", "Pavel", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" } ]
math/0508212
Howard Kleiman
Howard Kleiman
The Symmetric Traveling Salesman Problem
A new theorem has been added
null
null
null
math.CO cs.DS
null
Let M be an nXn symetric matrix, n, even, T, an upper bound for T_OPT, an optimal tour, sigma_T, the smaller-valued perfect matching obtained from alternate edges of T expressed as a product of 2-cycles. Applying the modified Floyd-Warshall algorithm to (sigma_T)^-1M^-, we construct acceptable and 2-circuit cycles some sets of which may yield circuits that can be patched into tours. We obtain necessary and sufficient conditions for a set, S, of cycles to yield circuits that may be patched into a tour.Assume that the following (Condition A)is valid: If (sigma_T)s = T*, |T*|<T, then all cycles of s have values less than |T| - |sigma_T|.Let SFWOPT),S(OPT)be the respective sets of cycles yielding T_FWOPT, T_OPT. Given Condition(A), using F-W, we can always obtain S(FWOPT). Using Condition A but not F-W, S_OPT is always obtainable from a subset of the cycles obtained.
[ { "version": "v1", "created": "Thu, 11 Aug 2005 22:08:27 GMT" }, { "version": "v2", "created": "Thu, 25 Aug 2005 16:51:16 GMT" }, { "version": "v3", "created": "Sat, 27 Aug 2005 19:53:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Kleiman", "Howard", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/0508319
Ronald Ortner
Ronald Ortner
Combinations and Mixtures of Optimal Policies in Unichain Markov Decision Processes are Optimal
9 pages
null
null
null
math.CO cs.DM cs.LG math.OC math.PR
null
We show that combinations of optimal (stationary) policies in unichain Markov decision processes are optimal. That is, let M be a unichain Markov decision process with state space S, action space A and policies \pi_j^*: S -> A (1\leq j\leq n) with optimal average infinite horizon reward. Then any combination \pi of these policies, where for each state i in S there is a j such that \pi(i)=\pi_j^*(i), is optimal as well. Furthermore, we prove that any mixture of optimal policies, where at each visit in a state i an arbitrary action \pi_j^*(i) of an optimal policy is chosen, yields optimal average reward, too.
[ { "version": "v1", "created": "Wed, 17 Aug 2005 10:13:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Ortner", "Ronald", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
math/0508320
Ronald Ortner
Ronald Ortner
Embeddability of Arrangements of Pseudocircles into the Sphere
13 pages
null
null
null
math.CO cs.CG math.GT
null
An arrangement of pseudocircles is a finite set of oriented closed Jordan curves each two of which cross each other in exactly two points. To describe the combinatorial structure of arrangements on closed orientable surfaces, in (Linhart, Ortner 2004) so-called *intersection schemes* were introduced. Building up on results about the latter, we first clarify the notion of embedding of an arrangement. Once this is done it is shown how the embeddability of an arrangement depends on the embeddability of its subarrangements. The main result presented is that an arrangement of pseudocircles can be embedded into the sphere if and only if all of its subarrangements of four pseudocircles are embeddable into the sphere as well.
[ { "version": "v1", "created": "Wed, 17 Aug 2005 10:30:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Ortner", "Ronald", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.GT", "description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures", "span": "(Geometric Topology)" } ]
math/0508350
Olga Holtz
James Demmel, Ioana Dumitriu, Olga Holtz
Toward accurate polynomial evaluation in rounded arithmetic
54 pages, 6 figures; refereed version; to appear in Foundations of Computational Mathematics: Santander 2005, Cambridge University Press, March 2006
in Foundations of Computational Mathematics: Santander 2005 (L. Pardo et al, eds.) Cambridge University Press, 2006, pp. 36-105
null
null
math.NA cs.CC
null
Given a multivariate real (or complex) polynomial $p$ and a domain $\cal D$, we would like to decide whether an algorithm exists to evaluate $p(x)$ accurately for all $x \in {\cal D}$ using rounded real (or complex) arithmetic. Here ``accurately'' means with relative error less than 1, i.e., with some correct leading digits. The answer depends on the model of rounded arithmetic: We assume that for any arithmetic operator $op(a,b)$, for example $a+b$ or $a \cdot b$, its computed value is $op(a,b) \cdot (1 + \delta)$, where $| \delta |$ is bounded by some constant $\epsilon$ where $0 < \epsilon \ll 1$, but $\delta$ is otherwise arbitrary. This model is the traditional one used to analyze the accuracy of floating point algorithms.Our ultimate goal is to establish a decision procedure that, for any $p$ and $\cal D$, either exhibits an accurate algorithm or proves that none exists. In contrast to the case where numbers are stored and manipulated as finite bit strings (e.g., as floating point numbers or rational numbers) we show that some polynomials $p$ are impossible to evaluate accurately. The existence of an accurate algorithm will depend not just on $p$ and $\cal D$, but on which arithmetic operators and which constants are are available and whether branching is permitted. Toward this goal, we present necessary conditions on $p$ for it to be accurately evaluable on open real or complex domains ${\cal D}$. We also give sufficient conditions, and describe progress toward a complete decision procedure. We do present a complete decision procedure for homogeneous polynomials $p$ with integer coefficients, ${\cal D} = \C^n$, and using only the arithmetic operations $+$, $-$ and $\cdot$.
[ { "version": "v1", "created": "Thu, 18 Aug 2005 17:17:20 GMT" }, { "version": "v2", "created": "Wed, 18 Jan 2006 19:55:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Demmel", "James", "" ], [ "Dumitriu", "Ioana", "" ], [ "Holtz", "Olga", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/0508533
Anatoli Manita
Anatoli Manita and Francois Simonot
On the cascade rollback synchronization
24 pages, 4 figures
null
null
null
math.PR cs.DC
null
We consider a cascade model of $N$ different processors performing a distributed parallel simulation. The main goal of the study is to show that the long-time dynamics of the system has a cluster behavior. To attack this problem we combine two methods: stochastic comparison and Foster-Lyapunov functions.
[ { "version": "v1", "created": "Fri, 26 Aug 2005 11:19:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Manita", "Anatoli", "" ], [ "Simonot", "Francois", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
math/0509004
Pierre Leroux
Andrei Gagarin, Gilbert Labelle, Pierre Leroux (LaCIM, Universite du Quebec a Montreal)
Counting unlabelled toroidal graphs with no K33-subdivisions
25 pages (some corrections), 4 figures (one figure added), 3 tables
Adv. in Appl. Math. 39 (2007), no. 1, pp. 51-75
10.1016/j.aam.2006.05.006
null
math.CO cs.DM
null
We provide a description of unlabelled enumeration techniques, with complete proofs, for graphs that can be canonically obtained by substituting 2-pole networks for the edges of core graphs. Using structure theorems for toroidal and projective-planar graphs containing no K33-subdivisions, we apply these techniques to obtain their unlabelled enumeration.
[ { "version": "v1", "created": "Thu, 1 Sep 2005 02:30:02 GMT" }, { "version": "v2", "created": "Mon, 25 Sep 2006 01:51:13 GMT" } ]
2008-05-06T00:00:00
[ [ "Gagarin", "Andrei", "", "LaCIM, Universite du\n Quebec a Montreal" ], [ "Labelle", "Gilbert", "", "LaCIM, Universite du\n Quebec a Montreal" ], [ "Leroux", "Pierre", "", "LaCIM, Universite du\n Quebec a Montreal" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0509248
Frederic Dambreville
Frederic Dambreville (DGA/CEP/GIP/SRO)
Deterministic modal Bayesian Logic: derive the Bayesian within the modal logic T
The revised version of "Definition of a Deterministic Bayesian Logic". The formalism, proofs, and models have been enhanced and simplified
null
null
null
math.LO cs.LO math.PR
null
In this paper a conditional logic is defined and studied. This conditional logic, DmBL, is constructed as close as possible to the Bayesian and is unrestricted, that is one is able to use any operator without restriction. A notion of logical independence is also defined within the logic itself. This logic is shown to be non trivial and is not reduced to classical propositions. A model is constructed for the logic. Completeness results are proved. It is shown that any unconditioned probability can be extended to the whole logic DmBL. The Bayesian is then recovered from the probabilistic DmBL. At last, it is shown why DmBL is compliant with Lewis triviality.
[ { "version": "v1", "created": "Mon, 12 Sep 2005 06:11:18 GMT" } ]
2016-09-07T00:00:00
[ [ "Dambreville", "Frederic", "", "DGA/CEP/GIP/SRO" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
math/0509325
Denis Krotov
Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia)
On $Z_{2^k}$-Dual Binary Codes
English: 10pp, Russian: 14pp; V.1 title: Z_{2^k}-duality, Z_{2^k}-linear Hadamard codes, and co-Z_{2^k}-linear 1-perfect codes; V.2: revised; V.3: minor revision, references updated, Russian translation added
IEEE Trans. Inf. Theory 53(4) 2007, 1532-1537
10.1109/TIT.2007.892787
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new generalization of the Gray map is introduced. The new generalization $\Phi: Z_{2^k}^n \to Z_{2}^{2^{k-1}n}$ is connected with the known generalized Gray map $\phi$ in the following way: if we take two dual linear $Z_{2^k}$-codes and construct binary codes from them using the generalizations $\phi$ and $\Phi$ of the Gray map, then the weight enumerators of the binary codes obtained will satisfy the MacWilliams identity. The classes of $Z_{2^k}$-linear Hadamard codes and co-$Z_{2^k}$-linear extended 1-perfect codes are described, where co-$Z_{2^k}$-linearity means that the code can be obtained from a linear $Z_{2^k}$-code with the help of the new generalized Gray map. Keywords: Gray map, Hadamard codes, MacWilliams identity, perfect codes, $Z_{2^k}$-linearity
[ { "version": "v1", "created": "Wed, 14 Sep 2005 20:06:11 GMT" }, { "version": "v2", "created": "Sun, 7 Jan 2007 13:10:15 GMT" }, { "version": "v3", "created": "Mon, 5 Oct 2009 16:55:04 GMT" } ]
2009-10-05T00:00:00
[ [ "Krotov", "Denis", "", "Sobolev Institute of Mathematics, Novosibirsk, Russia" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/0509358
Denis Krotov
Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia)
On decomposability of 4-ary distance 2 MDS codes, double-codes, and n-quasigroups of order 4
19 pages. V2: revised, general case q=2t is added. Submitted to Discr. Math
Discrete Math. 308(15) 2008, 3322-3334
10.1016/j.disc.2007.06.038
null
math.CO cs.IT math.IT
null
A subset $S$ of $\{0,1,...,2t-1\}^n$ is called a $t$-fold MDS code if every line in each of $n$ base directions contains exactly $t$ elements of $S$. The adjacency graph of a $t$-fold MDS code is not connected if and only if the characteristic function of the code is the repetition-free sum of the characteristic functions of $t$-fold MDS codes of smaller lengths. In the case $t=2$, the theory has the following application. The union of two disjoint $(n,4^{n-1},2)$ MDS codes in $\{0,1,2,3\}^n$ is a double-MDS-code. If the adjacency graph of the double-MDS-code is not connected, then the double-code can be decomposed into double-MDS-codes of smaller lengths. If the graph has more than two connected components, then the MDS codes are also decomposable. The result has an interpretation as a test for reducibility of $n$-quasigroups of order 4. Keywords: MDS codes, n-quasigroups, decomposability, reducibility, frequency hypercubes, latin hypercubes
[ { "version": "v1", "created": "Thu, 15 Sep 2005 18:10:46 GMT" }, { "version": "v2", "created": "Thu, 18 Jan 2007 09:07:29 GMT" } ]
2008-05-14T00:00:00
[ [ "Krotov", "Denis", "", "Sobolev Institute of Mathematics, Novosibirsk, Russia" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/0509478
David Wood
Prosenjit Bose, Jurek Czyzowicz, Zhicheng Gao, Pat Morin, David R. Wood
Simultaneous Diagonal Flips in Plane Triangulations
A short version of this paper will be presented at SODA 2006
J. Graph Theory 54(4):307-330, 2007
10.1002/jgt.20214
null
math.CO cs.CG
null
Simultaneous diagonal flips in plane triangulations are investigated. It is proved that every $n$-vertex triangulation with at least six vertices has a simultaneous flip into a 4-connected triangulation, and that it can be computed in O(n) time. It follows that every triangulation has a simultaneous flip into a Hamiltonian triangulation. This result is used to prove that for any two $n$-vertex triangulations, there exists a sequence of $O(\log n)$ simultaneous flips to transform one into the other. The total number of edges flipped in this sequence is O(n). The maximum size of a simultaneous flip is then studied. It is proved that every triangulation has a simultaneous flip of at least ${1/3}(n-2)$ edges. On the other hand, every simultaneous flip has at most $n-2$ edges, and there exist triangulations with a maximum simultaneous flip of ${6/7}(n-2)$ edges.
[ { "version": "v1", "created": "Wed, 21 Sep 2005 12:45:55 GMT" }, { "version": "v2", "created": "Wed, 26 Apr 2006 10:17:53 GMT" } ]
2008-09-09T00:00:00
[ [ "Bose", "Prosenjit", "" ], [ "Czyzowicz", "Jurek", "" ], [ "Gao", "Zhicheng", "" ], [ "Morin", "Pat", "" ], [ "Wood", "David R.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
math/0509523
Shujun Li Dr.
Shujun Li
Permutation Polynomials modulo m
21 pages, with 2 open problems
null
null
null
math.NT cs.CR
null
This paper mainly studies problems about so called "permutation polynomials modulo $m$", polynomials with integer coefficients that can induce bijections over Z_m={0,...,m-1}. The necessary and sufficient conditions of permutation polynomials are given, and the number of all permutation polynomials of given degree and the number induced bijections are estimated. A method is proposed to determine all equivalent polynomials from the induced polynomial function, which can be used to determine all equivalent polynomials that induce a given bijection. A few problems have not been solved yet in this paper and left for open study. Note: After finishing the first draft, we noticed that some results obtained in this paper can be proved in other ways (see Remark 2). In this case, this work gives different and independent proofs of related results.
[ { "version": "v1", "created": "Thu, 22 Sep 2005 16:36:56 GMT" }, { "version": "v2", "created": "Fri, 23 Sep 2005 22:02:21 GMT" }, { "version": "v3", "created": "Tue, 11 Oct 2005 17:41:24 GMT" }, { "version": "v4", "created": "Thu, 13 Oct 2005 15:49:58 GMT" }, { "version": "v5", "created": "Mon, 14 Nov 2005 16:02:48 GMT" }, { "version": "v6", "created": "Thu, 1 Dec 2005 10:57:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Shujun", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
math/0509575
Elchanan Mossel
Constantinos Daskalakis, Elchanan Mossel, Sebastien Roch
Evolutionary Trees and the Ising Model on the Bethe Lattice: a Proof of Steel's Conjecture
Second major revision. Updated proofs and statements
null
null
null
math.PR cs.CE cs.DS math.CA math.CO math.ST q-bio.PE stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A major task of evolutionary biology is the reconstruction of phylogenetic trees from molecular data. The evolutionary model is given by a Markov chain on a tree. Given samples from the leaves of the Markov chain, the goal is to reconstruct the leaf-labelled tree. It is well known that in order to reconstruct a tree on $n$ leaves, sample sequences of length $\Omega(\log n)$ are needed. It was conjectured by M. Steel that for the CFN/Ising evolutionary model, if the mutation probability on all edges of the tree is less than $p^{\ast} = (\sqrt{2}-1)/2^{3/2}$, then the tree can be recovered from sequences of length $O(\log n)$. The value $p^{\ast}$ is given by the transition point for the extremality of the free Gibbs measure for the Ising model on the binary tree. Steel's conjecture was proven by the second author in the special case where the tree is "balanced." The second author also proved that if all edges have mutation probability larger than $p^{\ast}$ then the length needed is $n^{\Omega(1)}$. Here we show that Steel's conjecture holds true for general trees by giving a reconstruction algorithm that recovers the tree from $O(\log n)$-length sequences when the mutation probabilities are discretized and less than $p^\ast$. Our proof and results demonstrate that extremality of the free Gibbs measure on the infinite binary tree, which has been studied before in probability, statistical physics and computer science, determines how distinguishable are Gibbs measures on finite binary trees.
[ { "version": "v1", "created": "Fri, 23 Sep 2005 20:22:09 GMT" }, { "version": "v2", "created": "Wed, 6 Feb 2008 00:07:32 GMT" }, { "version": "v3", "created": "Tue, 28 Jul 2009 03:26:35 GMT" } ]
2011-09-30T00:00:00
[ [ "Daskalakis", "Constantinos", "" ], [ "Mossel", "Elchanan", "" ], [ "Roch", "Sebastien", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0509620
Denis Krotov
Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia)
On diameter perfect constant-weight ternary codes
15 pages, 2 figures; presented at 2004 Com2MaC Conference on Association Schemes, Codes and Designs; submitted to Discrete Mathematics
Discrete Math. 308(14) 2008, 3104-3114
10.1016/j.disc.2007.08.037
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
From cosets of binary Hamming codes we construct diameter perfect constant-weight ternary codes with weight $n-1$ (where $n$ is the code length) and distances 3 and 5. The class of distance 5 codes has parameters unknown before. Keywords: constant-weight codes, ternary codes, perfect codes, diameter perfect codes, perfect matchings, Preparata codes
[ { "version": "v1", "created": "Tue, 27 Sep 2005 06:39:20 GMT" }, { "version": "v2", "created": "Mon, 3 Aug 2009 17:06:26 GMT" } ]
2009-08-03T00:00:00
[ [ "Krotov", "Denis", "", "Sobolev Institute of Mathematics, Novosibirsk, Russia" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/0510013
David Chua
David B. Chua, Eric D. Kolaczyk and Mark Crovella
Network Kriging
16 pages, 9 figures, single-spaced
null
null
null
math.ST cs.NI stat.TH
null
Network service providers and customers are often concerned with aggregate performance measures that span multiple network paths. Unfortunately, forming such network-wide measures can be difficult, due to the issues of scale involved. In particular, the number of paths grows too rapidly with the number of endpoints to make exhaustive measurement practical. As a result, it is of interest to explore the feasibility of methods that dramatically reduce the number of paths measured in such situations while maintaining acceptable accuracy. We cast the problem as one of statistical prediction--in the spirit of the so-called `kriging' problem in spatial statistics--and show that end-to-end network properties may be accurately predicted in many cases using a surprisingly small set of carefully chosen paths. More precisely, we formulate a general framework for the prediction problem, propose a class of linear predictors for standard quantities of interest (e.g., averages, totals, differences) and show that linear algebraic methods of subset selection may be used to effectively choose which paths to measure. We characterize the performance of the resulting methods, both analytically and numerically. The success of our methods derives from the low effective rank of routing matrices as encountered in practice, which appears to be a new observation in its own right with potentially broad implications on network measurement generally.
[ { "version": "v1", "created": "Sun, 2 Oct 2005 00:18:37 GMT" }, { "version": "v2", "created": "Tue, 4 Oct 2005 02:16:32 GMT" } ]
2007-06-13T00:00:00
[ [ "Chua", "David B.", "" ], [ "Kolaczyk", "Eric D.", "" ], [ "Crovella", "Mark", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0510027
Andrzej Kwasniewski
A. K. Kwasniewski
Prefab posets` Whitney numbers
8 pages, 5 figures
Bull. Soc. Sci. Lett. Lodz, vol 60, (2005). 25-33
null
null
math.CO cs.DM
null
We introduce a natural partial order in structurally natural finite subsets the cobweb prefabs sets recently constructed by the present author. Whitney numbers of the second kind of the corresponding subposet which constitute Stirling-like numbers` triangular array are then calculated and the explicit formula for them is provided. Next - in the second construction - we endow the set sums of prefabiants with such an another partial order that their their bell like numbers include fibonacci triad sequences introduced recently by the present author in order to extend famous relation between binomial newton coefficients and fibonacci numbers onto the infinity of their relatives among which there are also the fibonacci triad sequences and binomial-like coefficients (incidence coefficients included).
[ { "version": "v1", "created": "Mon, 3 Oct 2005 04:00:33 GMT" } ]
2008-02-11T00:00:00
[ [ "Kwasniewski", "A. K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0510263
David Eppstein
David Eppstein
Cubic Partial Cubes from Simplicial Arrangements
11 pages, 10 figures
Electronic J. Combinatorics 13(1, R79):1\^a?"14, Sep 2006
null
null
math.CO cs.CG math.MG
null
We show how to construct a cubic partial cube from any simplicial arrangement of lines or pseudolines in the projective plane. As a consequence, we find nine new infinite families of cubic partial cubes as well as many sporadic examples.
[ { "version": "v1", "created": "Wed, 12 Oct 2005 21:49:04 GMT" } ]
2007-06-13T00:00:00
[ [ "Eppstein", "David", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
math/0510264
Luca Trevisan
Alex Samorodnitsky and Luca Trevisan
Gowers Uniformity, Influence of Variables, and PCPs
null
null
null
null
math.CO cs.CC
null
Gowers introduced, for d\geq 1, the notion of dimension-d uniformity U^d(f) of a function f: G -> \C, where G is a finite abelian group and \C are the complex numbers. Roughly speaking, if U^d(f) is small, then f has certain "pseudorandomness" properties. We prove the following property of functions with large U^d(f). Write G=G_1 x >... x G_n as a product of groups. If a bounded balanced function f:G_1 x ... x G_n -> \C is such that U^{d} (f) > epsilon, then one of the coordinates of f has influence at least epsilon/2^{O(d)}. The Gowers inner product of a collection of functions is a related notion of pseudorandomness. We prove that if a collection of bounded functions has large Gowers inner product, and at least one function in the collection is balanced, then there is a variable that has high influence for at least four of the functions in the collection. Finally, we relate the acceptance probability of the "hypergraph long-code test" proposed by Samorodnitsky and Trevisan to the Gowers inner product of the functions being tested and we deduce applications to the construction of Probabilistically Checkable Proofs and to hardness of approximation.
[ { "version": "v1", "created": "Wed, 12 Oct 2005 21:53:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Samorodnitsky", "Alex", "" ], [ "Trevisan", "Luca", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/0510276
Peter Grunwald
Richard D. Gill (Leiden University), Peter D. Grunwald (CWI Amsterdam)
An algorithmic and a geometric characterization of Coarsening At Random
16 pages; accepted in this form for publication by Annals of Statistics
The Annals of Statistics 2008, Vol. 36, No. 5, 2409-2422
10.1214/07-AOS532
See also 0811.0683 (duplicate submission)
math.ST cs.AI stat.ME stat.TH
null
We show that the class of conditional distributions satisfying the coarsening at Random (CAR) property for discrete data has a simple and robust algorithmic description based on randomized uniform multicovers: combinatorial objects generalizing the notion of partition of a set. However, the complexity of a given CAR mechanism can be large: the maximal "height" of the needed multicovers can be exponential in the number of points in the sample space. The results stem from a geometric interpretation of the set of CAR distributions as a convex polytope and a characterization of its extreme points. The hierarchy of CAR models defined in this way could be useful in parsimonious statistical modelling of CAR mechanisms, though the results also raise doubts in applied work as to the meaningfulness of the CAR assumption in its full generality.
[ { "version": "v1", "created": "Thu, 13 Oct 2005 12:03:06 GMT" }, { "version": "v2", "created": "Tue, 19 Sep 2006 14:40:29 GMT" }, { "version": "v3", "created": "Thu, 13 Sep 2007 14:07:20 GMT" } ]
2023-05-30T00:00:00
[ [ "Gill", "Richard D.", "", "Leiden University" ], [ "Grunwald", "Peter D.", "", "CWI Amsterdam" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0510304
Bernd Fiedler
Bernd Fiedler
Stationary or static space-times and Young tableaux
11 pages
J.Phys.Conf.Ser.30:152-162,2006
10.1088/1742-6596/30/1/018
null
math.DG cs.SC gr-qc math.CO
null
Algebraic curvature tensors possess generators which can be formed from symmetric or alternating tensors S, A or tensors \theta with an irreducible (2,1)-symmetry. In differential geometry examples of curvature formulas are known which contain generators on the basis of S or A realized by differentiable tensor fields in a natural way. We show that certain curvature formulas for stationary or static space-times contain such differentiable realizations of generators based on \theta. The tensor \theta is connected with the timelike Killing vector field of the space-time. \theta lies in a special symmetry class from the infinite family of irreducible (2,1)-symmetry classes. We determine characteristics of this class. In particular, this class allows a maximal reduction of the length of the curvature formulas. We use a projection formalism by Vladimirov, Young symmetrizers and Littlewood-Richardson products. Computer calculations were carried out by means of the packages Ricci and PERMS.
[ { "version": "v1", "created": "Fri, 14 Oct 2005 16:28:48 GMT" } ]
2014-11-18T00:00:00
[ [ "Fiedler", "Bernd", "" ] ]
[ { "class": "Mathematics", "code": "math.DG", "description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis", "span": "(Differential Geometry)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Physics", "code": "gr-qc", "description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.", "span": "(General Relativity and Quantum Cosmology)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0510520
Alicia Dickenstein
Eduardo Cattani and Alicia Dickenstein
Counting Solutions to Binomial Complete Intersections
Several minor improvements. Final version to appear in the J. of Complexity
null
null
null
math.AC cs.CC math.CO
null
We study the problem of counting the total number of affine solutions of a system of n binomials in n variables over an algebraically closed field of characteristic zero. We show that we may decide in polynomial time if that number is finite. We give a combinatorial formula for computing the total number of affine solutions (with or without multiplicity) from which we deduce that this counting problem is #P-complete. We discuss special cases in which this formula may be computed in polynomial time; in particular, this is true for generic exponent vectors.
[ { "version": "v1", "created": "Tue, 25 Oct 2005 02:23:18 GMT" }, { "version": "v2", "created": "Thu, 27 Apr 2006 02:05:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Cattani", "Eduardo", "" ], [ "Dickenstein", "Alicia", "" ] ]
[ { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0510521
Martin Wainwright
XuanLong Nguyen, Martin J. Wainwright, Michael I. Jordan
On surrogate loss functions and $f$-divergences
Published in at http://dx.doi.org/10.1214/08-AOS595 the Annals of Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Statistics 2009, Vol. 37, No. 2, 876-904
10.1214/08-AOS595
IMS-AOS-AOS595
math.ST cs.IT math.IT stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of binary classification is to estimate a discriminant function $\gamma$ from observations of covariate vectors and corresponding binary labels. We consider an elaboration of this problem in which the covariates are not available directly but are transformed by a dimensionality-reducing quantizer $Q$. We present conditions on loss functions such that empirical risk minimization yields Bayes consistency when both the discriminant function and the quantizer are estimated. These conditions are stated in terms of a general correspondence between loss functions and a class of functionals known as Ali-Silvey or $f$-divergence functionals. Whereas this correspondence was established by Blackwell [Proc. 2nd Berkeley Symp. Probab. Statist. 1 (1951) 93--102. Univ. California Press, Berkeley] for the 0--1 loss, we extend the correspondence to the broader class of surrogate loss functions that play a key role in the general theory of Bayes consistency for binary classification. Our result makes it possible to pick out the (strict) subset of surrogate loss functions that yield Bayes consistency for joint estimation of the discriminant function and the quantizer.
[ { "version": "v1", "created": "Tue, 25 Oct 2005 03:41:43 GMT" }, { "version": "v2", "created": "Wed, 1 Apr 2009 12:07:26 GMT" } ]
2009-09-29T00:00:00
[ [ "Nguyen", "XuanLong", "" ], [ "Wainwright", "Martin J.", "" ], [ "Jordan", "Michael I.", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0510573
Hossein Zare
Shmuel Friedland, Mostafa Kaveh, Amir Niknejad, Hossein Zare
Fast Monte-Carlo Low Rank Approximations for Matrices
null
null
null
null
math.NA cs.DS
null
In many applications, it is of interest to approximate data, given by mxn matrix A, by a matrix B of at most rank k, which is much smaller than m and n. The best approximation is given by singular value decomposition, which is too time consuming for very large m and n. We present here a Monte Carlo algorithm for iteratively computing a k-rank approximation to the data consisting of mxn matrix A. Each iteration involves the reading of O(k) of columns or rows of A. The complexity of our algorithm is O(kmn). Our algorithm, distinguished from other known algorithms, guarantees that each iteration is a better k-rank approximation than the previous iteration. We believe that this algorithm will have many applications in data mining, data storage and data analysis.
[ { "version": "v1", "created": "Wed, 26 Oct 2005 18:41:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedland", "Shmuel", "" ], [ "Kaveh", "Mostafa", "" ], [ "Niknejad", "Amir", "" ], [ "Zare", "Hossein", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/0511343
Sonny Ben-Shimon
Sonny Ben-Shimon and Michael Krivelevich
Random regular graphs of non-constant degree: Concentration of the chromatic number
18 pages
Discrete Mathematics, 309(12):4149--4161, 2009
10.1016/j.disc.2008.12.014
null
math.CO cs.DM math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we show that with high probability the chromatic number of a graph sampled from the random regular graph model $\Gnd$ for $d=o(n^{1/5})$ is concentrated in two consecutive values, thus extending a previous result of Achlioptas and Moore. This concentration phenomena is very similar to that of the binomial random graph model $\Gnp$ with $p=\frac{d}{n}$. Our proof is largely based on ideas of Alon and Krivelevich who proved this two-point concentration result for $\Gnp$ for $p=n^{-\delta}$ where $\delta>1/2$. The main tool used to derive such a result is a careful analysis of the distribution of edges in $\Gnd$, relying both on the switching technique and on bounding the probability of exponentially small events in the configuration model.
[ { "version": "v1", "created": "Mon, 14 Nov 2005 12:36:59 GMT" }, { "version": "v2", "created": "Sun, 30 Sep 2007 22:39:04 GMT" }, { "version": "v3", "created": "Tue, 2 Oct 2007 16:12:14 GMT" }, { "version": "v4", "created": "Mon, 6 Oct 2008 13:01:08 GMT" }, { "version": "v5", "created": "Wed, 17 Dec 2008 22:23:45 GMT" } ]
2009-07-22T00:00:00
[ [ "Ben-Shimon", "Sonny", "" ], [ "Krivelevich", "Michael", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
math/0512110
Paul Taylor
Paul Taylor
Computably Based Locally Compact Spaces
70pp, LaTeX2e, uses diagrams.sty; Accepted for "Logical Methods in Computer Science" LMCS-2004-19; see http://www.cs.man.ac.uk/~pt/ASD for related papers. ACM-class: F.4.1
Logical Methods in Computer Science, Volume 2, Issue 1 (March 7, 2006) lmcs:2255
10.2168/LMCS-2(1:1)2006
null
math.GN cs.LO math.CT
null
ASD (Abstract Stone Duality) is a re-axiomatisation of general topology in which the topology on a space is treated, not as an infinitary lattice, but as an exponential object of the same category as the original space, with an associated lambda-calculus. In this paper, this is shown to be equivalent to a notion of computable basis for locally compact sober spaces or locales, involving a family of open subspaces and accompanying family of compact ones. This generalises Smyth's effectively given domains and Jung's strong proximity lattices. Part of the data for a basis is the inclusion relation of compact subspaces within open ones, which is formulated in locale theory as the way-below relation on a continuous lattice. The finitary properties of this relation are characterised here, including the Wilker condition for the cover of a compact space by two open ones. The real line is used as a running example, being closely related to Scott's domain of intervals. ASD does not use the category of sets, but the full subcategory of overt discrete objects plays this role; it is an arithmetic universe (pretopos with lists). In particular, we use this subcategory to translate computable bases for classical spaces into objects in the ASD calculus.
[ { "version": "v1", "created": "Mon, 5 Dec 2005 22:31:32 GMT" }, { "version": "v2", "created": "Fri, 3 Mar 2006 16:52:50 GMT" }, { "version": "v3", "created": "Mon, 6 Mar 2006 15:45:12 GMT" }, { "version": "v4", "created": "Tue, 7 Mar 2006 11:16:13 GMT" } ]
2019-03-14T00:00:00
[ [ "Taylor", "Paul", "" ] ]
[ { "class": "Mathematics", "code": "math.GN", "description": "Continuum theory, point-set topology, spaces with algebraic structure, foundations, dimension theory, local and global properties", "span": "(General Topology)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
math/0512140
Vladimir Shpilrain
Vladimir Shpilrain and Alexander Ushakov
A new key exchange protocol based on the decomposition problem
7 pages
null
null
null
math.GR cs.CR
null
In this paper we present a new key establishment protocol based on the decomposition problem in non-commutative groups which is: given two elements $w, w_1$ of the platform group $G$ and two subgroups $A, B \subseteq G$ (not necessarily distinct), find elements $a \in A, b \in B$ such that $w_1 = a w b$. Here we introduce two new ideas that improve the security of key establishment protocols based on the decomposition problem. In particular, we conceal (i.e., do not publish explicitly) one of the subgroups $A, B$, thus introducing an additional computationally hard problem for the adversary, namely, finding the centralizer of a given finitely generated subgroup.
[ { "version": "v1", "created": "Tue, 6 Dec 2005 22:00:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Shpilrain", "Vladimir", "" ], [ "Ushakov", "Alexander", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
math/0512263
Enrico De Micheli
Enrico De Micheli, Giovanni Alberto Viano
Metric and probabilistic information associated with Fredholm integral equations of the first kind
19 pages
J. Integral Equations Appl. 14 (2002), 283-310
null
null
math.CA cs.IT math.IT
null
The problem of evaluating the information associated with Fredholm integral equations of the first kind, when the integral operator is self-adjoint and compact, is considered here. The data function is assumed to be perturbed gently by an additive noise so that it still belongs to the range of the operator. First we estimate upper and lower bounds for the epsilon-capacity (and then for the metric information), and explicit computations in some specific cases are given; then the problem is reformulated from a probabilistic viewpoint and use is made of the probabilistic information theory. The results obtained by these two approaches are then compared.
[ { "version": "v1", "created": "Tue, 13 Dec 2005 12:13:48 GMT" } ]
2007-07-16T00:00:00
[ [ "De Micheli", "Enrico", "" ], [ "Viano", "Giovanni Alberto", "" ] ]
[ { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/0512578
Andrzej Kwasniewski
A. K. Kwasniewski
On cobweb posets and their combinatorially admissible sequences
16 pages, 9 figures, affiliated to The Internet Gian Carlo Rota Polish Seminar: 16 pages, 9 figures, affiliated to The Internet Gian Carlo Rota Polish Seminar http://ii.uwb.edu.pl/akk/sem/sem_rota.htm
Adv. Studies Contemp. Math. Vol. 18 No 1, 2009 17-32
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main purpose of this article is to pose three problems which are easy to be formulated in an elementary way. These problems which are specifically important also for the new class of partially ordered sets seem to be not yet solved.
[ { "version": "v1", "created": "Mon, 26 Dec 2005 20:12:57 GMT" }, { "version": "v2", "created": "Wed, 15 Aug 2007 14:55:08 GMT" }, { "version": "v3", "created": "Fri, 24 Aug 2007 09:53:46 GMT" }, { "version": "v4", "created": "Sun, 21 Oct 2007 15:02:09 GMT" }, { "version": "v5", "created": "Mon, 19 Jan 2009 21:47:32 GMT" } ]
2009-01-19T00:00:00
[ [ "Kwasniewski", "A. K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0601487
David Freeman
David Freeman
Constructing pairing-friendly elliptic curves with embedding degree 10
null
null
null
null
math.NT cs.CR
null
We present a general framework for constructing families of elliptic curves of prime order with prescribed embedding degree. We demonstrate this method by constructing curves with embedding degree k = 10, which solves an open problem posed by Boneh, Lynn, and Shacham. We show that our framework incorporates existing constructions for k = 3, 4, 6, and 12, and we give evidence that the method is unlikely to produce infinite families of curves with embedding degree k > 12.
[ { "version": "v1", "created": "Fri, 20 Jan 2006 06:03:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Freeman", "David", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]