id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
math/0404076 | Shmuel Kaplan | D. Garber, S. Kaplan, M. Teicher, B. Tsaban and U. Vishne | Probabilistic Solutions of Equations in the Braid Group | Small updates | Advances in Applied Mathematics 35 (2005), 323--334 | 10.1016/j.aam.2005.03.002 | null | math.GR cs.CR math.GT | null | Given a system of equations in a "random" finitely generated subgroup of the
braid group, we show how to find a small ordered list of elements in the
subgroup, which contains a solution to the equations with a significant
probability. Moreover, with a significant probability, the solution will be the
first in the list. This gives a probabilistic solution to: The conjugacy
problem, the group membership problem, the shortest representation of an
element, and other combinatorial group-theoretic problems in random subgroups
of the braid group.
We use a memory-based extension of the standard length-based approach, which
in principle can be applied to any group admitting an efficient, reasonably
behaving length function.
| [
{
"version": "v1",
"created": "Mon, 5 Apr 2004 06:07:09 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jun 2004 05:46:43 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Sep 2005 15:12:32 GMT"
},
{
"version": "v4",
"created": "Thu, 17 May 2007 20:17:27 GMT"
}
] | 2010-08-02T00:00:00 | [
[
"Garber",
"D.",
""
],
[
"Kaplan",
"S.",
""
],
[
"Teicher",
"M.",
""
],
[
"Tsaban",
"B.",
""
],
[
"Vishne",
"U.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
}
] |
math/0404158 | Ewa Krot | Ewa Krot | A note on mobiusien function and mobiusien inversion formula of
fibonacci cobweb poset | 6 pages | Bulletin de la Societe des Sciences et des Lettres de Lodz (54),
Serie: Recherches sur les Deformations Vol. 44 (2004), 39-44 | null | null | math.CO cs.DM | null | The explicit formula for mobiusien function of fibonacci cobweb poset P is
given for the first time by the use of definition of P in plane grid coordinate
system.
| [
{
"version": "v1",
"created": "Wed, 7 Apr 2004 10:23:38 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Apr 2004 07:37:14 GMT"
}
] | 2008-02-15T00:00:00 | [
[
"Krot",
"Ewa",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0404325 | Alexander Vardy | Tao Jiang and Alexander Vardy | Asymptotic Improvement of the Gilbert-Varshamov Bound on the Size of
Binary Codes | 10 pages, 3 figures; to appear in the IEEE Transactions on
Information Theory, submitted August 12, 2003, revised March 28, 2004 | IEEE TRANSACTIONS ON INFORMATION THEORY, vol. 50, No. 8, pp.
1655-1664, August 2004
(http://www.ieeexplore.ieee.org/iel5/18/29198/01317112.pdf) | 10.1109/TIT.2004.831751 | null | math.CO cs.IT math.AC math.IT | null | Given positive integers $n$ and $d$, let $A_2(n,d)$ denote the maximum size
of a binary code of length $n$ and minimum distance $d$. The well-known
Gilbert-Varshamov bound asserts that $A_2(n,d) \geq 2^n/V(n,d-1)$, where
$V(n,d) = \sum_{i=0}^{d} {n \choose i}$ is the volume of a Hamming sphere of
radius $d$. We show that, in fact, there exists a positive constant $c$ such
that $$ A_2(n,d) \geq c \frac{2^n}{V(n,d-1)} \log_2 V(n,d-1) $$ whenever $d/n
\le 0.499$. The result follows by recasting the Gilbert- Varshamov bound into a
graph-theoretic framework and using the fact that the corresponding graph is
locally sparse. Generalizations and extensions of this result are briefly
discussed.
| [
{
"version": "v1",
"created": "Mon, 19 Apr 2004 02:18:47 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Jiang",
"Tao",
""
],
[
"Vardy",
"Alexander",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0405082 | Cheng Qi | Qi Cheng and Daqing Wan | On the List and Bounded Distance Decodibility of the Reed-Solomon Codes | null | null | null | null | math.NT cs.IT math.IT | null | In this paper show that the list and bounded-distance decoding problems of
certain bounds for the Reed-Solomon code are at least as hard as the discrete
logarithm problem over finite fields.
| [
{
"version": "v1",
"created": "Wed, 5 May 2004 17:36:43 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Cheng",
"Qi",
""
],
[
"Wan",
"Daqing",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0405577 | Andrzej Kwasniewski | A.K.Kwasniewski | On $\psi$-basic bernoulli-wardian polynomials | null | Bulletin de la Societe des Sciences et des Lettres de
{\pounds}\'od\^e (54) Serie: Recherches sur les Deformations Vol. 45 (2004)
5-10 | null | null | math.CO cs.DM | null | The wardian solution of any $\psi$-difference linear nonhomogeneous equation
is found in the framework of the generalized finite operator calculus .
Specifications to $q$-calculus case and the new one fibonomial calculus case
are made explicit.
| [
{
"version": "v1",
"created": "Sun, 30 May 2004 00:32:47 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0405578 | Andrzej Kwasniewski | A.K.Kwasniewski | $\psi$-Appell polynomials` solutions of an umbral difference
nonhomogeneous equation | null | Bulletin de la Societe des Sciences et des Lettres de
{\pounds}\'od\^e (54) Serie: Recherches sur les Deformations Vol. 45 (2004)
11-15 | null | null | math.CO cs.DM | null | One discovers why the solution of generalized umbral calculus difference
nonhomogeneous equation in the form recently proposed by the author extends
here now to generalized appellian delta operator and corresponding polynomials
case almost automatically. The reason for that is just the proper framework of
the generalized finite operator calculus recently being developed by the
present author.
| [
{
"version": "v1",
"created": "Sun, 30 May 2004 00:55:52 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Nov 2004 05:02:24 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0405591 | Andrzej Kwasniewski | A.K.Kwasniewski | Fibonacci q-gaussian sequences | 5 pages, 2 figures | Advanced Studies in Contemporary Mathematics vol. 8 (2004) No2
pp.121-124 | null | null | math.CO cs.DM | null | The summation formula within pascalian triangle resulting in the fibonacci
sequence is extended to the $q$-binomial coefficients $q$-gaussian triangles.
| [
{
"version": "v1",
"created": "Mon, 31 May 2004 09:08:05 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0406006 | Andrzej Kwasniewski | A.K.Kwasniewski | Fibonomial cumulative connection constants | affiliated to The Internet Gian-Carlo Polish Seminar:
http://ii.uwb.edu.pl/akk/sem/sem_rota.htm | Bulletin of the ICA vol. 44 (2005) 81-92 | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this note we present examples of cumulative connection constants included
new fibonomial ones. All examples posses combinatorial interpretation.
| [
{
"version": "v1",
"created": "Tue, 1 Jun 2004 00:59:23 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jan 2009 08:30:46 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Jan 2009 04:54:01 GMT"
},
{
"version": "v4",
"created": "Wed, 11 Feb 2009 05:31:48 GMT"
},
{
"version": "v5",
"created": "Thu, 12 Feb 2009 20:11:55 GMT"
},
{
"version": "v6",
"created": "Fri, 20 Feb 2009 02:26:21 GMT"
}
] | 2009-02-20T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0406077 | Peter Grunwald | Peter Grunwald | A tutorial introduction to the minimum description length principle | 80 pages 5 figures Report with 2 chapters | null | null | null | math.ST cs.IT cs.LG math.IT stat.TH | null | This tutorial provides an overview of and introduction to Rissanen's Minimum
Description Length (MDL) Principle. The first chapter provides a conceptual,
entirely non-technical introduction to the subject. It serves as a basis for
the technical introduction given in the second chapter, in which all the ideas
of the first chapter are made mathematically precise. The main ideas are
discussed in great conceptual and technical detail. This tutorial is an
extended version of the first two chapters of the collection "Advances in
Minimum Description Length: Theory and Application" (edited by P.Grunwald, I.J.
Myung and M. Pitt, to be published by the MIT Press, Spring 2005).
| [
{
"version": "v1",
"created": "Fri, 4 Jun 2004 09:11:18 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Grunwald",
"Peter",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0406094 | Pr Philippe Chassaing | Philippe Chassaing, Regine Marchand | Merging costs for the additive Marcus-Lushnikov process, and Union-Find
algorithms | 28 pages, 1 figure | null | null | null | math.PR cs.DS math.CO | null | Starting with a monodisperse configuration with $n$ size-1 particles, an
additive Marcus-Lushnikov process evolves until it reaches its final state (a
unique particle with mass $n$). At each of the $n-1$ steps of its evolution, a
merging cost is incurred, that depends on the sizes of the two particles
involved, and on an independent random factor. This paper deals with the
asymptotic behaviour of the cumulated costs up to the $k$th clustering, under
various regimes for $(n,k)$, with applications to the study of Union--Find
algorithms.
| [
{
"version": "v1",
"created": "Sat, 5 Jun 2004 19:20:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chassaing",
"Philippe",
""
],
[
"Marchand",
"Regine",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0406140 | Pierre Leroux | Andrei Gagarin, Gilbert Labelle and Pierre Leroux (LaCIM, Universite
du Quebec a Montreal) | The structure and labelled enumeration of K_{3,3}-subdivision-free
projective-planar graphs | Revised version. 20 pages. To appear in Pure Mathematics and
Applications - Algebra and Theoretical Computer Science | Pure Math. Appl. 16 (2005), no. 3, pp. 267-286 | null | null | math.CO cs.DM | null | We consider the class F of 2-connected non-planar K_{3,3}-subdivision-free
graphs that are embeddable in the projective plane. We show that these graphs
admit a unique decomposition as a graph K_5 (the core) where the edges are
replaced by two-pole networks constructed from 2-connected planar graphs. A
method to enumerate these graphs in the labelled case is described. Moreover,
we enumerate the homeomorphically irreducible graphs in F and homeomorphically
irreducible 2-connected planar graphs. Particular use is made of two-pole
directed series-parallel networks. We also show that the number m of edges of
graphs in F with n vertices satisfies the bound m <=3n-6, for n >= 6.
| [
{
"version": "v1",
"created": "Tue, 8 Jun 2004 04:22:43 GMT"
},
{
"version": "v2",
"created": "Mon, 2 May 2005 02:49:12 GMT"
},
{
"version": "v3",
"created": "Tue, 3 May 2005 01:18:51 GMT"
},
{
"version": "v4",
"created": "Sat, 19 Nov 2005 02:44:04 GMT"
},
{
"version": "v5",
"created": "Tue, 20 Jun 2006 19:34:49 GMT"
}
] | 2010-12-23T00:00:00 | [
[
"Gagarin",
"Andrei",
"",
"LaCIM, Universite\n du Quebec a Montreal"
],
[
"Labelle",
"Gilbert",
"",
"LaCIM, Universite\n du Quebec a Montreal"
],
[
"Leroux",
"Pierre",
"",
"LaCIM, Universite\n du Quebec a Montreal"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0406221 | Peter Grunwald | Peter Grunwald and John Langford | Suboptimal behaviour of Bayes and MDL in classification under
misspecification | This is a slightly longer version of our paper at the COLT
(Computational Learning Theory) 2004 Conference, containing two extra pages
of discussion of the main results | null | null | null | math.ST cs.IT cs.LG math.IT stat.TH | null | We show that forms of Bayesian and MDL inference that are often applied to
classification problems can be *inconsistent*. This means there exists a
learning problem such that for all amounts of data the generalization errors of
the MDL classifier and the Bayes classifier relative to the Bayesian posterior
both remain bounded away from the smallest achievable generalization error.
| [
{
"version": "v1",
"created": "Thu, 10 Jun 2004 16:36:54 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Grunwald",
"Peter",
""
],
[
"Langford",
"John",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0406258 | Andrzej Kwasniewski | A.K.Kwasniewski | The logarithmic fibbinomial formula | 1 figure | Adv. Stud. Contemp. Math. v.9 No.1 (2004) 19-26 | null | null | math.CO cs.DM | null | Roman logarithmic binomial formula analogue has been found . It is presented
here also for the case of fibonomial coefficients which recently have been
given a combinatorial interpretation by the present author.
| [
{
"version": "v1",
"created": "Sun, 13 Jun 2004 17:24:54 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0406353 | Manor Mendel | Yair Bartal, Nathan Linial, Manor Mendel, Assaf Naor | On metric Ramsey-type phenomena | 67 pages, published version | Ann. of Math. (2) 162 (2005), no. 2, 643--709 | 10.4007/annals.2005.162.643 | null | math.MG cs.DS | null | The main question studied in this article may be viewed as a nonlinear
analogue of Dvoretzky's theorem in Banach space theory or as part of Ramsey
theory in combinatorics. Given a finite metric space on n points, we seek its
subspace of largest cardinality which can be embedded with a given distortion
in Hilbert space. We provide nearly tight upper and lower bounds on the
cardinality of this subspace in terms of n and the desired distortion. Our main
theorem states that for any epsilon>0, every n point metric space contains a
subset of size at least n^{1-\epsilon} which is embeddable in Hilbert space
with O(\frac{\log(1/\epsilon)}{\epsilon}) distortion. The bound on the
distortion is tight up to the log(1/\epsilon) factor. We further include a
comprehensive study of various other aspects of this problem.
| [
{
"version": "v1",
"created": "Thu, 17 Jun 2004 20:01:40 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Jun 2007 02:52:34 GMT"
}
] | 2012-11-15T00:00:00 | [
[
"Bartal",
"Yair",
""
],
[
"Linial",
"Nathan",
""
],
[
"Mendel",
"Manor",
""
],
[
"Naor",
"Assaf",
""
]
] | [
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0406416 | Michael Yampolsky | Mark Braverman, Michael Yampolsky | Non-computable Julia sets | Updated version, to appear in JAMS | null | null | null | math.DS cs.CC | null | We show that under the definition of computability which is natural from the
point of view of applications, there exist non-computable quadratic Julia sets.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 2004 13:33:48 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Dec 2005 17:04:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Braverman",
"Mark",
""
],
[
"Yampolsky",
"Michael",
""
]
] | [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/0408122 | Konstantin Rybnikov | Robert Erdahl, Andrei Ordine, and Konstantin Rybnikov | Perfect Delaunay Polytopes and Perfect Inhomogeneous Forms | Release 3: 25 pages, 4 diagrams. A number of errors in notation,
terminology, citations, and cross-references have been fixed. Note that in
all diagrams kappa should read as k. A reduced 10 page version of this
article will apear in the proceedings of the 2003 Voronoi Conference held in
Kiev in September of 2003 | null | null | null | math.NT cs.CC cs.CG math.MG quant-ph | null | A lattice Delaunay polytope D is called perfect if it has the property that
there is a unique circumscribing ellipsoid with interior free of lattice
points, and with the surface containing only those lattice points that are the
vertices of D. An inhomogeneous quadratic form is called perfect if it is
determined by such a circumscribing ''empty ellipsoid'' uniquely up to a scale
factor. Perfect inhomogeneous forms are associated with perfect Delaunay
polytopes in much the way that perfect homogeneous forms are associated with
perfect point lattices. We have been able to construct some infinite sequences
of perfect Delaunay polytopes, one perfect polytope in each successive
dimension starting at some initial dimension; we have been able to construct an
infinite number of such infinite sequences. Perfect Delaunay polytopes are
intimately related to the theory of Delaunay polytopes, and to Voronoi's theory
of lattice types.
| [
{
"version": "v1",
"created": "Mon, 9 Aug 2004 20:34:25 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Feb 2005 03:00:23 GMT"
},
{
"version": "v3",
"created": "Sun, 6 Mar 2005 05:35:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Erdahl",
"Robert",
""
],
[
"Ordine",
"Andrei",
""
],
[
"Rybnikov",
"Konstantin",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
math/0408146 | Dr Frederic Dambreville | Frederic Dambreville (DGA/CTA/DT/GIP) | Learning a Machine for the Decision in a Partially Observable Markov
Universe | Writing date : July 30 2004 Submitted to the European Journal of
Operation Research | null | null | null | math.GM cs.AI cs.LG | null | In this paper, we are interested in optimal decisions in a partially
observable Markov universe. Our viewpoint departs from the dynamic programming
viewpoint: we are directly approximating an optimal strategic tree depending on
the observation. This approximation is made by means of a parameterized
probabilistic law. In this paper, a particular family of hidden Markov models,
with input and output, is considered as a learning framework. A method for
optimizing the parameters of these HMMs is proposed and applied. This
optimization method is based on the cross-entropic principle.
| [
{
"version": "v1",
"created": "Wed, 11 Aug 2004 06:38:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dambreville",
"Frederic",
"",
"DGA/CTA/DT/GIP"
]
] | [
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
math/0408365 | Vadim E. Levit | Vadim E. Levit and Yulia Kempner | Quasi-concave functions on antimatroids | 7 pages | null | null | null | math.CO cs.DM | null | In this paper we consider quasi-concave set functions defined on
antimatroids. There are many equivalent axiomatizations of antimatroids, that
may be separated into two categories: antimatroids defined as set systems and
antimatroids defined as languages. An algorthmic characterization of
antimatroids, that considers them as set systems, was given in (Kempner, Levit
2003). This characterization is based on the idea of optimization using set
functions defined as minimum values of linkages between a set and the elements
from the set complement. Such set functions are quasi-concave. Their behavior
on antimatroids was studied in (Kempner, Muchnik 2003), where they were applied
to constraint clustering. In this work we investigate a duality between
quasi-concave set functions and linkage functions. Our main finding is that
quasi-concave set functions on an antimatroid may be represented as minimum
values of some monotone linkage functions.
| [
{
"version": "v1",
"created": "Thu, 26 Aug 2004 12:52:05 GMT"
}
] | 2011-01-25T00:00:00 | [
[
"Levit",
"Vadim E.",
""
],
[
"Kempner",
"Yulia",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0409429 | Sebastian Roch | S. Roch | Bounding Fastest Mixing | 20 pages | null | null | null | math.PR cs.DM math.CO math.ST stat.TH | null | In a series of recent works, Boyd, Diaconis, and their co-authors have
introduced a semidefinite programming approach for computing the fastest mixing
Markov chain on a graph of allowed transitions, given a target stationary
distribution. In this paper, we show that standard mixing-time analysis
techniques--variational characterizations, conductance, canonical paths--can be
used to give simple, nontrivial lower and upper bounds on the fastest mixing
time. To test the applicability of this idea, we consider several detailed
examples including the Glauber dynamics of the Ising model--and get sharp
bounds.
| [
{
"version": "v1",
"created": "Wed, 22 Sep 2004 12:32:25 GMT"
}
] | 2011-09-07T00:00:00 | [
[
"Roch",
"S.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0409548 | Moshe Zakai | Moshe Zakai | On mutual information, likelihood-ratios and estimation error for the
additive Gaussian channel | 21 pages, to appear in the IEEE Transactions on Information Theory | IEEE Trans. on Information Theory, Vol. 51(9), pp. 3017-3024,
Sept. 2005 | 10.1109/TIT.2005.853297 | null | math.PR cs.IT math.IT math.ST stat.TH | null | This paper considers the model of an arbitrary distributed signal x observed
through an added independent white Gaussian noise w, y=x+w. New relations
between the minimal mean square error of the non-causal estimator and the
likelihood ratio between y and \omega are derived. This is followed by an
extended version of a recently derived relation between the mutual information
I(x;y) and the minimal mean square error. These results are applied to derive
infinite dimensional versions of the Fisher information and the de Bruijn
identity. The derivation of the results is based on the Malliavin calculus.
| [
{
"version": "v1",
"created": "Tue, 28 Sep 2004 12:04:54 GMT"
},
{
"version": "v2",
"created": "Mon, 16 May 2005 07:33:22 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Zakai",
"Moshe",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0410068 | Vladimir Shpilrain | Vladimir Shpilrain and Gabriel Zapata | Combinatorial group theory and public key cryptography | 12 pages | null | null | null | math.GR cs.CR | null | After some excitement generated by recently suggested public key exchange
protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent
opinion now that the conjugacy search problem is unlikely to provide sufficient
level of security if a braid group is used as the platform. In this paper we
address the following questions: (1) whether choosing a different group, or a
class of groups, can remedy the situation; (2) whether some other "hard"
problem from combinatorial group theory can be used, instead of the conjugacy
search problem, in a public key exchange protocol. Another question that we
address here, although somewhat vague, is likely to become a focus of the
future research in public key cryptography based on symbolic computation: (3)
whether one can efficiently disguise an element of a given group (or a
semigroup) by using defining relations.
| [
{
"version": "v1",
"created": "Mon, 4 Oct 2004 23:02:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shpilrain",
"Vladimir",
""
],
[
"Zapata",
"Gabriel",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
math/0410282 | David B. Wilson | Itai Benjamini, Oded Schramm, David B. Wilson | Balanced Boolean functions that can be evaluated so that every input bit
is unlikely to be read | 11 pages | Proc. 37th ACM Symposium on Theory of Computing (STOC), pages
244--250, 2005 | 10.1145/1060590.1060627 | null | math.PR cs.CC | null | A Boolean function of n bits is balanced if it takes the value 1 with
probability 1/2. We exhibit a balanced Boolean function with a randomized
evaluation procedure (with probability 0 of making a mistake) so that on
uniformly random inputs, no input bit is read with probability more than
Theta(n^{-1/2} sqrt{log n}). We give a balanced monotone Boolean function for
which the corresponding probability is Theta(n^{-1/3} log n). We then show that
for any randomized algorithm for evaluating a balanced Boolean function, when
the input bits are uniformly random, there is some input bit that is read with
probability at least Theta(n^{-1/2}). For balanced monotone Boolean functions,
there is some input bit that is read with probability at least Theta(n^{-1/3}).
| [
{
"version": "v1",
"created": "Tue, 12 Oct 2004 00:09:35 GMT"
}
] | 2012-06-21T00:00:00 | [
[
"Benjamini",
"Itai",
""
],
[
"Schramm",
"Oded",
""
],
[
"Wilson",
"David B.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/0410317 | Heide Gluesing-Luerssen | Heide Gluesing-Luerssen, Wiland Schmale | On doubly-cyclic convolutional codes | null | null | null | null | math.RA cs.IT math.IT | null | Cyclicity of a convolutional code (CC) is relying on a nontrivial
automorphism of the algebra F[x]/(x^n-1), where F is a finite field. If this
automorphism itself has certain specific cyclicity properties one is lead to
the class of doubly-cyclic CC's. Within this large class Reed-Solomon and BCH
convolutional codes can be defined. After constructing doubly-cyclic CC's,
basic properties are derived on the basis of which distance properties of
Reed-Solomon convolutional codes are investigated.This shows that some of them
are optimal or near optimal with respect to distance and performance.
| [
{
"version": "v1",
"created": "Wed, 13 Oct 2004 13:42:07 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Gluesing-Luerssen",
"Heide",
""
],
[
"Schmale",
"Wiland",
""
]
] | [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0410550 | Ewa Krot | Ewa Krot | Further developements in finite fibonomial calculus | 13 pages | null | null | null | math.CO cs.DM | null | Primary definitions, notation and general observations of finite fibonomial
operator calculus (ffoc) are presented. Kwasniewski's combinatorial
interpretation of fibonomial coefficients by the use of fibonacci cobweb poset
is given. Some elements of incidence algebra of fibonacci cobweb poset are
defined.
| [
{
"version": "v1",
"created": "Tue, 26 Oct 2004 10:37:43 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Oct 2004 08:01:59 GMT"
}
] | 2008-02-15T00:00:00 | [
[
"Krot",
"Ewa",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0410574 | Igor Podlubny | Igor Podlubny | A note on comparison of scientific impact expressed by the number of
citations in different fields of science | 5 pages, 1 table | Scientometrics, Vol.64, no.1, July 2005, pp.95-99. Journal ISSN:
0138-9130 (Paper) 1588-2861 (Online) | 10.1007/s11192-005-0240-0 | null | math.ST cs.GL physics.soc-ph stat.TH | null | Citation distributions for 1992, 1994, 1996, 1997, 1999, and 2001, which were
published in the 2004 report of the National Science Foundation, USA, are
analyzed. It is shown that the ratio of the total number of citations of any
two broad fields of science remains close to constant over the analyzed years.
Based on this observation, normalization of total numbers of citations with
respect to the number of citations in mathematics is suggested as a tool for
comparing scientific impact expressed by the number of citations in different
fields of science.
| [
{
"version": "v1",
"created": "Wed, 27 Oct 2004 16:02:30 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Feb 2005 16:31:50 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Podlubny",
"Igor",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0410580 | Michael Yampolsky | I. Binder, M. Braverman, M. Yampolsky | Filled Julia sets with empty interior are computable | This is an expanded version, to appear in J. FoCM | null | null | null | math.DS cs.CC | null | We show that if a polynomial filled Julia set has empty interior, then it is
computable.
| [
{
"version": "v1",
"created": "Wed, 27 Oct 2004 19:53:18 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Feb 2005 15:46:20 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Jun 2006 15:59:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Binder",
"I.",
""
],
[
"Braverman",
"M.",
""
],
[
"Yampolsky",
"M.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/0410593 | Henrik B\"a\"arnhielm | Henrik B\"a\"arnhielm | The Schreier-Sims algorithm for matrix groups | The author's MSc thesis. Uses AMS-LaTeX and algorithm2e.sty. For the
associated source code, see http://matrixss.sourceforge.net/ | null | null | null | math.GR cs.DS | null | This is the report of a project with the aim to make a new implementation of
the Schreier-Sims algorithm in GAP, specialized for matrix groups. The standard
Schreier-Sims algorithm is described in some detail, followed by descriptions
of the probabilistic Schreier-Sims algorithm and the Schreier-Todd-Coxeter-Sims
algorithm. Then we discuss our implementation and some optimisations, and
finally we report on the performance of our implementation, as compared to the
existing implementation in GAP, and we give benchmark results. The conclusion
is that our implementation in some cases is faster and consumes much less
memory.
| [
{
"version": "v1",
"created": "Thu, 28 Oct 2004 01:28:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bäärnhielm",
"Henrik",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0411002 | Andrzej Kwasniewski | A. K. Kwasniewski | On umbral extensions of Stirling numbers and Dobinski-like formulas | 40 pages | Adv. Stud. Contemp. Math., Vol 12, no. 1, (2006) 73-100 | null | null | math.CO cs.DM | null | Umbral extensions of the stirling numbers of the second kind are considered
and the resulting dobinski-like various formulas including new ones are
presented. These extensions naturally encompass the two well known
q-extensions. The further consecutive umbral extensions q-stirling numbers are
therefore realized here in a two-fold way. The fact that the umbral q-extended
dobinski formula may also be interpreted as the average of powers of random
variable with the q-poisson distribution singles out the q-extensions which
appear to be a kind of singular point in the domain of umbral extensions as
expressed by corresponding two observations. Other relevant possibilities are
tackled with the paper`s closing down questions and suggestions with respect to
other already existing extensions while a brief limited survey of these other
type extensions is being delivered. There the newton interpolation formula and
divided differences appear helpful and inevitable along with umbra symbolic
language in describing properties of general exponential polynomials of
touchard and their possible generalizations. Exponential structures or
algebraically equivalent prefabs with their exponential formula appear to be
also naturally relevant.
| [
{
"version": "v1",
"created": "Sun, 31 Oct 2004 23:58:19 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Nov 2004 23:08:33 GMT"
},
{
"version": "v3",
"created": "Tue, 10 May 2005 04:13:38 GMT"
},
{
"version": "v4",
"created": "Wed, 3 Aug 2005 02:41:35 GMT"
},
{
"version": "v5",
"created": "Thu, 20 Oct 2005 02:12:47 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0411007 | Ewa Krot | Ewa Krot | The First Ascent into the Incidence Algebra of the Fibonacci Cobweb
Poset | 7 pages | Advanced Studies in Conterporary Mathematics 11 (2005), No. 2,
179-184 | null | null | math.CO cs.DM | null | The explicite formulas for m\"{o}biusien function and some other important
elements of the incidence algebra are delivered. For that to do one uses
kwa\'sniewski's construction of his fibonacci cobweb poset in the plane grid
coordinate system.
| [
{
"version": "v1",
"created": "Sun, 31 Oct 2004 12:46:51 GMT"
}
] | 2016-09-07T00:00:00 | [
[
"Krot",
"Ewa",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0411056 | Bernd Fiedler | Bernd Fiedler | Generators of algebraic curvature tensors based on a (2,1)-symmetry | 16 pages | null | null | null | math.DG cs.SC math.CO | null | We consider generators of algebraic curvature tensors R which can be
constructed by a Young symmetrization of product tensors U*w or w*U, where U
and w are covariant tensors of order 3 and 1. We assume that U belongs to a
class of the infinite set S of irreducible symmetry classes characterized by
the partition (2,1). We show that the set S contains exactly one symmetry class
S_0 whose elements U can not play the role of generators of tensors R. The
tensors U of all other symmetry classes from S\{S_0} can be used as generators
for tensors R. Using Computer Algebra we search for such generators whose
coordinate representations are polynomials with a minimal number of summands.
For a generic choice of the symmetry class of U we obtain lengths of 8
summands. In special cases these numbers can be reduced to the minimum 4. If
this minimum occurs then U admits an index commutation symmetry. Furthermore
minimal lengths are possible if U is formed from torsion-free covariant
derivatives of alternating 2-tensor fields. We apply ideals and idempotents of
group rings C[S_r] of symmetric groups S_r, Young symmetrizers, discrete
Fourier transforms and Littlewood-Richardson products. For symbolic
calculations we used the Mathematica packages Ricci and PERMS.
| [
{
"version": "v1",
"created": "Tue, 2 Nov 2004 23:05:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fiedler",
"Bernd",
""
]
] | [
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0411107 | J. Maurice Rojas | Frederic Bihan, J. Maurice Rojas, Casey E. Stella | First Steps in Algorithmic Fewnomial Theory | 25 pages, 5 figures. MAJOR revision of earlier version: (1) Frederic
Bihan is a new co-author, (2) Theorem 1 is strengthened with a much sharper
complexity threshold, (3) bounds on connected components from Theorem 2 are
dramatically sharpened, (4) Theorem 3 strengthened considerably, (5)
Corollary 1 removed, but theorem of Karpinski+Shparlinski on univariate
discriminants is inserted, to clarify complexity comparisons | null | null | null | math.AG cs.CC math.AC | null | Fewnomial theory began with explicit bounds -- solely in terms of the number
of variables and monomial terms -- on the number of real roots of systems of
polynomial equations. Here we take the next logical step of investigating the
corresponding existence problem: Let FEAS_R denote the problem of deciding
whether a given system of multivariate polynomial equations with integer
coefficients has a real root or not. We describe a phase-transition for when m
is large enough to make FEAS_R be NP-hard, when restricted to inputs consisting
of a single n-variate polynomial with exactly m monomial terms: polynomial-time
for m<=n+2 (for any fixed n) and NP-hardness for m<=n+n^{epsilon} (for n
varying and any fixed epsilon>0). Because of important connections between
FEAS_R and A-discriminants, we then study some new families of A-discriminants
whose signs can be decided within polynomial-time. (A-discriminants contain all
known resultants as special cases, and the latter objects are central in
algorithmic algebraic geometry.) Baker's Theorem from diophantine approximation
arises as a key tool. Along the way, we also derive new quantitative bounds on
the real zero sets of n-variate (n+2)-nomials.
| [
{
"version": "v1",
"created": "Fri, 5 Nov 2004 01:05:15 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Nov 2004 06:59:36 GMT"
},
{
"version": "v3",
"created": "Mon, 14 Feb 2005 05:13:44 GMT"
},
{
"version": "v4",
"created": "Sat, 19 Feb 2005 00:19:52 GMT"
},
{
"version": "v5",
"created": "Tue, 15 Mar 2005 08:51:25 GMT"
},
{
"version": "v6",
"created": "Mon, 23 Jan 2006 18:33:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bihan",
"Frederic",
""
],
[
"Rojas",
"J. Maurice",
""
],
[
"Stella",
"Casey E.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
math/0411128 | Cyril Banderier | Cyril Banderier (LIPN), Sylviane Schwer (LIPN) | Why Delannoy numbers? | Presented to the conference "Lattice Paths Combinatorics and Discrete
Distributions" (Athens, June 5-7, 2002) and to appear in the Journal of
Statistical Planning and Inferences | Journal of Statistical Planning and Inference 135, 1 (11/2005)
40-54 | 10.1016/j.jspi.2005.02.004 | null | math.CO cs.DS cs.GT math.HO math.PR math.ST q-bio.GN stat.TH | null | This article is not a research paper, but a little note on the history of
combinatorics: We present here a tentative short biography of Henri Delannoy,
and a survey of his most notable works. This answers to the question raised in
the title, as these works are related to lattice paths enumeration, to the
so-called Delannoy numbers, and were the first general way to solve Ballot-like
problems. These numbers appear in probabilistic game theory, alignments of DNA
sequences, tiling problems, temporal representation models, analysis of
algorithms and combinatorial structures.
| [
{
"version": "v1",
"created": "Sat, 6 Nov 2004 07:40:07 GMT"
}
] | 2014-04-22T00:00:00 | [
[
"Banderier",
"Cyril",
"",
"LIPN"
],
[
"Schwer",
"Sylviane",
"",
"LIPN"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.HO",
"description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics",
"span": "(History and Overview)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0411138 | Cyril Banderier | Cyril Banderier (LIPN), Jean-Marie Le Bars (LIPN, GREYC), Vlady
Ravelomanana (LIPN) | Generating Functions For Kernels of Digraphs (Enumeration & Asymptotics
for Nim Games) | Presented (as a poster) to the conference Formal Power Series and
Algebraic Combinatorics (Vancouver, 2004), electronic proceedings | Proceedings of FPSAC'04 (2004) 91-105 | null | null | math.CO cs.DM cs.DS cs.GT math.PR | null | In this article, we study directed graphs (digraphs) with a coloring
constraint due to Von Neumann and related to Nim-type games. This is equivalent
to the notion of kernels of digraphs, which appears in numerous fields of
research such as game theory, complexity theory, artificial intelligence
(default logic, argumentation in multi-agent systems), 0-1 laws in monadic
second order logic, combinatorics (perfect graphs)... Kernels of digraphs lead
to numerous difficult questions (in the sense of NP-completeness,
#P-completeness). However, we show here that it is possible to use a generating
function approach to get new informations: we use technique of symbolic and
analytic combinatorics (generating functions and their singularities) in order
to get exact and asymptotic results, e.g. for the existence of a kernel in a
circuit or in a unicircuit digraph. This is a first step toward a
generatingfunctionology treatment of kernels, while using, e.g., an approach "a
la Wright". Our method could be applied to more general "local coloring
constraints" in decomposable combinatorial structures.
| [
{
"version": "v1",
"created": "Sat, 6 Nov 2004 20:33:39 GMT"
}
] | 2012-02-06T00:00:00 | [
[
"Banderier",
"Cyril",
"",
"LIPN"
],
[
"Bars",
"Jean-Marie Le",
"",
"LIPN, GREYC"
],
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
math/0411145 | Andrzej Kwasniewski | A.K.Kwasniewski | Information on some recent applications of umbral extensions to discrete
mathematics | 14 pages | Review Bulletin of Calcutta Mathematical Society Vol. 13 (2005)
1-10 | null | null | math.CO cs.DM | null | At the first part of the paper we show how specific umbral extensions of the
Stirling numbers of the second kind result in new type of Dobinski-like
formulas. In the second part among others one recovers how and why Ward
solution of uncountable family of extended difference calculus nonhomogeneous
equations extends to Ward-Appell polynomials case . Illustrative specifications
to q-calculus case and fibonomial calculus case are made explicit due to the
usage of the so called upside down notation for objects of extended finite
operator calculus .
| [
{
"version": "v1",
"created": "Sun, 7 Nov 2004 07:05:37 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Sep 2005 14:12:33 GMT"
}
] | 2016-09-07T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0411239 | Vadim E. Levit | Vadim E. Levit and Eugen Mandrescu | Very well-covered graphs with log-concave independence polynomials | 8 pages, 4 figures | null | null | null | math.CO cs.DM | null | If for any $k$ the $k$-th coefficient of a polynomial $I(G;x)$ is equal to
the number of stable sets of cardinality $k$ in the graph $G$, then it is
called the independence polynomial of $G$ (Gutman and Harary, 1983). Alavi,
Malde, Schwenk and Erdos (1987) conjectured that $I(G;x)$ is unimodal, whenever
$G$ is a forest, while Brown, Dilcher and Nowakowski (2000) conjectured that
$I(G;x)$ is unimodal for any well-covered graph G. Michael and Traves (2003)
showed that the assertion is false for well-covered graphs with $a(G)$ > 3
($a(G)$ is the size of a maximum stable set of the graph $G$), while for very
well-covered graphs the conjecture is still open. In this paper we give support
to both conjectures by demonstrating that if $a(G)$ < 4, or $G$ belongs to
${K_{1,n}, P_{n}: n > 0}$, then $I(G*;x)$ is log-concave, and, hence, unimodal
(where $G*$ is the very well-covered graph obtained from $G$ by appending a
single pendant edge to each vertex).
| [
{
"version": "v1",
"created": "Wed, 10 Nov 2004 18:13:58 GMT"
}
] | 2011-01-25T00:00:00 | [
[
"Levit",
"Vadim E.",
""
],
[
"Mandrescu",
"Eugen",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0411250 | Cyril Banderier | Cyril Banderier (LIPN, ALGO UR-R), Philippe Flajolet (ALGO UR-R),
Daniele Gardy (PRISM), Mireille Bousquet-Melou (LABRI), Alain Denise (LRI),
Dominique Gouyou-Beauchamps (LRI) | Generating functions for generating trees | This article corresponds, up to minor typo corrections, to the
article submitted to Discrete Mathematics (Elsevier) in Nov. 1999, and
published in its vol. 246(1-3), March 2002, pp. 29-55 | Discrete Mathematics 246 (1-3) (2002) 29-55 | 10.1016/S0012-365X(01)00250-3 | null | math.CO cs.DM cs.DS | null | Certain families of combinatorial objects admit recursive descriptions in
terms of generating trees: each node of the tree corresponds to an object, and
the branch leading to the node encodes the choices made in the construction of
the object. Generating trees lead to a fast computation of enumeration
sequences (sometimes, to explicit formulae as well) and provide efficient
random generation algorithms. We investigate the links between the structural
properties of the rewriting rules defining such trees and the rationality,
algebraicity, or transcendence of the corresponding generating function.
| [
{
"version": "v1",
"created": "Thu, 11 Nov 2004 09:19:47 GMT"
}
] | 2014-04-22T00:00:00 | [
[
"Banderier",
"Cyril",
"",
"LIPN, ALGO UR-R"
],
[
"Flajolet",
"Philippe",
"",
"ALGO UR-R"
],
[
"Gardy",
"Daniele",
"",
"PRISM"
],
[
"Bousquet-Melou",
"Mireille",
"",
"LABRI"
],
[
"Denise",
"Alain",
"",
"LRI"
],
[
"Gouyou-Beauchamps",
"Dominique",
"",
"LRI"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0411356 | Pierre Leroux | Andrei Gagarin, Gilbert Labelle, Pierre Leroux (LaCIM, Universite du
Quebec a Montreal) | Characterization and enumeration of toroidal K_{3,3}-subdivision-free
graphs | 18 pages, 7 figures and 4 tables | Discrete Math. 307 (2007), no. 23, pp. 2993-3005 | 10.1016/j.disc.2007.03.083 | null | math.CO cs.DM | null | We describe the structure of 2-connected non-planar toroidal graphs with no
K_{3,3}-subdivisions, using an appropriate substitution of planar networks into
the edges of certain graphs called toroidal cores. The structural result is
based on a refinement of the algorithmic results for graphs containing a fixed
K_5-subdivision in [A. Gagarin and W. Kocay, "Embedding graphs containing
K_5-subdivisions'', Ars Combin. 64 (2002), 33-49]. It allows to recognize these
graphs in linear-time and makes possible to enumerate labelled 2-connected
toroidal graphs containing no K_{3,3}-subdivisions and having minimum vertex
degree two or three by using an approach similar to [A. Gagarin, G. Labelle,
and P. Leroux, "Counting labelled projective-planar graphs without a
K_{3,3}-subdivision", submitted, arXiv:math.CO/0406140, (2004)].
| [
{
"version": "v1",
"created": "Tue, 16 Nov 2004 20:56:19 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Gagarin",
"Andrei",
"",
"LaCIM, Universite du\n Quebec a Montreal"
],
[
"Labelle",
"Gilbert",
"",
"LaCIM, Universite du\n Quebec a Montreal"
],
[
"Leroux",
"Pierre",
"",
"LaCIM, Universite du\n Quebec a Montreal"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0411378 | Stephen D. Miller | David Jao, Stephen D. Miller, Ramarathnam Venkatesan | Do All Elliptic Curves of the Same Order Have the Same Difficulty of
Discrete Log? | 26 pages, revised, to appear in Advances in Cryptology -- Asiacrypt
2005 | Advances in Cryptology -- Asiacrypt 2005, LNCS 3788, pp. 21-40. | 10.1007/11593447_2 | null | math.NT cs.CC cs.CR math.AG math.CO | null | The aim of this paper is to justify the common cryptographic practice of
selecting elliptic curves using their order as the primary criterion. We can
formalize this issue by asking whether the discrete log problem (DLOG) has the
same difficulty for all curves over a given finite field with the same order.
We prove that this is essentially true by showing polynomial time random
reducibility of DLOG among such curves, assuming the Generalized Riemann
Hypothesis (GRH). We do so by constructing certain expander graphs, similar to
Ramanujan graphs, with elliptic curves as nodes and low degree isogenies as
edges.
The result is obtained from the rapid mixing of random walks on this graph.
Our proof works only for curves with (nearly) the same endomorphism rings.
Without this technical restriction such a DLOG equivalence might be false;
however, in practice the restriction may be moot, because all known polynomial
time techniques for constructing equal order curves produce only curves with
nearly equal endomorphism rings.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 17:50:05 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Aug 2005 21:47:10 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Sep 2005 12:29:18 GMT"
}
] | 2016-09-07T00:00:00 | [
[
"Jao",
"David",
""
],
[
"Miller",
"Stephen D.",
""
],
[
"Venkatesan",
"Ramarathnam",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0411488 | Andrei Gagarin | Andrei Gagarin, Wendy Myrvold, and John Chambers | The obstructions for toroidal graphs with no $K_{3,3}$'s | 10 pages, 7 figures, revised version with additional details | Discrete Math. 309 (2009), no. 11, pp. 3625-3631 | 10.1016/j.disc.2007.12.075 | null | math.CO cs.DM | null | Forbidden minors and subdivisions for toroidal graphs are numerous. We
consider the toroidal graphs with no $K_{3,3}$-subdivisions that coincide with
the toroidal graphs with no $K_{3,3}$-minors. These graphs admit a unique
decomposition into planar components and have short lists of obstructions. We
provide the complete lists of four forbidden minors and eleven forbidden
subdivisions for the toroidal graphs with no $K_{3,3}$'s and prove that the
lists are sufficient.
| [
{
"version": "v1",
"created": "Mon, 22 Nov 2004 20:33:28 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Sep 2005 21:59:31 GMT"
}
] | 2010-12-22T00:00:00 | [
[
"Gagarin",
"Andrei",
""
],
[
"Myrvold",
"Wendy",
""
],
[
"Chambers",
"John",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0411515 | Marcus Hutter | Marcus Hutter | Fast Non-Parametric Bayesian Inference on Infinite Trees | 8 twocolumn pages, 3 figures | Proc. 10th International Conf. on Artificial Intelligence and
Statistics (AISTATS-2005) 144-151 | null | IDSIA-24-04 | math.ST cs.LG math.PR stat.TH | null | Given i.i.d. data from an unknown distribution, we consider the problem of
predicting future items. An adaptive way to estimate the probability density is
to recursively subdivide the domain to an appropriate data-dependent
granularity. A Bayesian would assign a data-independent prior probability to
"subdivide", which leads to a prior over infinite(ly many) trees. We derive an
exact, fast, and simple inference algorithm for such a prior, for the data
evidence, the predictive distribution, the effective model dimension, and other
quantities.
| [
{
"version": "v1",
"created": "Tue, 23 Nov 2004 16:39:07 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0411644 | Vladimir Shpilrain | Vladimir Shpilrain and Alexander Ushakov | The conjugacy search problem in public key cryptography: unnecessary and
insufficient | 4 pages | null | null | null | math.GR cs.CR | null | The conjugacy search problem in a group G is the problem of recovering an x
in G from given g in G and h=x^{-1}gx. This problem is in the core of several
recently suggested public key exchange protocols, most notably the one due to
Anshel, Anshel, and Goldfeld, and the one due to Ko, Lee at al.
In this note, we make two observations that seem to have eluded most people's
attention. The first observation is that solving the conjugacy search problem
is not necessary for an adversary to get the common secret key in the Ko-Lee
protocol. It is sufficient to solve an apparently easier problem of finding x,
y in G such that h=ygx for given g, h in G.
Another observation is that solving the conjugacy search problem is not
sufficient for an adversary to get the common secret key in the
Anshel-Anshel-Goldfeld protocol.
| [
{
"version": "v1",
"created": "Mon, 29 Nov 2004 21:46:13 GMT"
}
] | 2016-09-07T00:00:00 | [
[
"Shpilrain",
"Vladimir",
""
],
[
"Ushakov",
"Alexander",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
math/0412233 | Andrzej Kwasniewski | A.K.Kwasniewski, E.Borak | Extended finite operator calculus as an example of algebraization of
analysis | 25 pages | null | null | null | math.CO cs.DM | null | A wardian calculus of sequences started almost seventy years ago constitutes
the general scheme for extensions of the classical umbral operator calculus
considered by many afterwards . At the same time this calculus is an example of
the algebraization of the analysis here restricted to the algebra of formal
series. This is a review article based on the recent first author
contributions. As the survey article it is supplemented by the short indicatory
glossaries of notation and terms used by prominent contributors to the domain.
| [
{
"version": "v1",
"created": "Mon, 13 Dec 2004 02:12:08 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
],
[
"Borak",
"E.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0501388 | J. Maurice Rojas | J. Maurice Rojas | Efficiently Detecting Torsion Points and Subtori | 21 pages, no figures. Final version, with additional commentary and
references. Also fixes a gap in Theorems 2 (now Theorem 1.3) regarding
translated subtori | null | null | null | math.AG cs.CC math.NT | null | Suppose X is the complex zero set of a finite collection of polynomials in
Z[x_1,...,x_n]. We show that deciding whether X contains a point all of whose
coordinates are d_th roots of unity can be done within NP^NP (relative to the
sparse encoding), under a plausible assumption on primes in arithmetic
progression. In particular, our hypothesis can still hold even under certain
failures of the Generalized Riemann Hypothesis, such as the presence of
Siegel-Landau zeroes. Furthermore, we give a similar (but UNconditional)
complexity upper bound for n=1. Finally, letting T be any algebraic subgroup of
(C^*)^n we show that deciding whether X contains T is coNP-complete (relative
to an even more efficient encoding),unconditionally. We thus obtain new
non-trivial families of multivariate polynomial systems where deciding the
existence of complex roots can be done unconditionally in the polynomial
hierarchy -- a family of complexity classes lying between PSPACE and P,
intimately connected with the P=?NP Problem. We also discuss a connection to
Laurent's solution of Chabauty's Conjecture from arithmetic geometry.
| [
{
"version": "v1",
"created": "Sun, 23 Jan 2005 07:43:28 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Nov 2005 02:28:39 GMT"
},
{
"version": "v3",
"created": "Mon, 18 Sep 2006 05:38:53 GMT"
},
{
"version": "v4",
"created": "Fri, 7 Sep 2007 16:06:25 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Rojas",
"J. Maurice",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
math/0502024 | Keye Martin | Keye Martin | The maximum entropy state | 15 pages | null | null | null | math.PR cs.LO math-ph math.MP quant-ph | null | We give an algorithm for calculating the maximum entropy state as the least
fixed point of a Scott continuous mapping on the domain of classical states in
their Bayesian order.
| [
{
"version": "v1",
"created": "Tue, 1 Feb 2005 17:46:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Martin",
"Keye",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
math/0502172 | Jean-Guillaume Dumas | Jean-Guillaume Luc Dumas (LJK), Aude Rondepierre (MIP) | An hybrid system approach to nonlinear optimal control problems | null | null | null | null | math.OC cs.SC | null | We consider a nonlinear ordinary differential equation and want to control
its behavior so that it reaches a target by minimizing a cost function. Our
approach is to use hybrid systems to solve this problem: the complex dynamic is
replaced by piecewise affine approximations which allow an analytical
resolution. The sequence of affine models then forms a sequence of states of a
hybrid automaton. Given a sequence of states, we introduce an hybrid
approximation of the nonlinear controllable domain and propose a new algorithm
computing a controllable, piecewise convex approximation. The same way the
nonlinear optimal control problem is replaced by an hybrid piecewise affine
one. Stating a hybrid maximum principle suitable to our hybrid model, we deduce
the global structure of the hybrid optimal control steering the system to the
target.
| [
{
"version": "v1",
"created": "Tue, 8 Feb 2005 20:49:45 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Jan 2006 09:33:17 GMT"
},
{
"version": "v3",
"created": "Mon, 7 Jan 2008 14:09:33 GMT"
}
] | 2008-01-07T00:00:00 | [
[
"Dumas",
"Jean-Guillaume Luc",
"",
"LJK"
],
[
"Rondepierre",
"Aude",
"",
"MIP"
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
math/0502232 | Svante Janson | Svante Janson | Individual displacements in hashing with coalesced chains | 17 pages | null | null | U.U.D.M. 2005:4 | math.PR cs.DS | null | We study the asymptotic distribution of the displacements in hashing with
coalesced chains, for both late-insertion and early-insertion. Asymptotic
formulas for means and variances follow. The method uses Poissonization and
some stochastic calculus.
| [
{
"version": "v1",
"created": "Fri, 11 Feb 2005 09:28:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Janson",
"Svante",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0502315 | Marcus Hutter | Jan Poland and Marcus Hutter | Strong Asymptotic Assertions for Discrete MDL in Regression and
Classification | 6 two-column pages | Proc. 14th Dutch-Belgium Conf. on Machine Learning (Benelearn
2005) 67-72 | null | IDSIA-02-05 | math.ST cs.AI cs.IT cs.LG math.IT math.PR stat.TH | null | We study the properties of the MDL (or maximum penalized complexity)
estimator for Regression and Classification, where the underlying model class
is countable. We show in particular a finite bound on the Hellinger losses
under the only assumption that there is a "true" model contained in the class.
This implies almost sure convergence of the predictive distribution to the true
one at a fast rate. It corresponds to Solomonoff's central theorem of universal
induction, however with a bound that is exponentially larger.
| [
{
"version": "v1",
"created": "Tue, 15 Feb 2005 16:26:36 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Poland",
"Jan",
""
],
[
"Hutter",
"Marcus",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0502327 | Terence C. Tao | Emmanuel Candes, Terence Tao | Decoding by Linear Programming | 22 pages, 4 figures, submitted | null | null | null | math.MG cs.CR | null | This paper considers the classical error correcting problem which is
frequently discussed in coding theory. We wish to recover an input vector $f
\in \R^n$ from corrupted measurements $y = A f + e$. Here, $A$ is an $m$ by $n$
(coding) matrix and $e$ is an arbitrary and unknown vector of errors. Is it
possible to recover $f$ exactly from the data $y$? We prove that under suitable
conditions on the coding matrix $A$, the input $f$ is the unique solution to
the $\ell_1$-minimization problem ($\|x\|_{\ell_1} := \sum_i |x_i|$) $$ \min_{g
\in \R^n} \| y - Ag \|_{\ell_1} $$ provided that the support of the vector of
errors is not too large, $\|e\|_{\ell_0} := |\{i : e_i \neq 0\}| \le \rho \cdot
m$ for some $\rho > 0$. In short, $f$ can be recovered exactly by solving a
simple convex optimization problem (which one can recast as a linear program).
In addition, numerical experiments suggest that this recovery procedure works
unreasonably well; $f$ is recovered exactly even in situations where a
significant fraction of the output is corrupted.
| [
{
"version": "v1",
"created": "Tue, 15 Feb 2005 21:12:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Candes",
"Emmanuel",
""
],
[
"Tao",
"Terence",
""
]
] | [
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
math/0502354 | Michael Yampolsky | I. Binder, M. Braverman, M. Yampolsky | On computational complexity of Siegel Julia sets | Updated version, to appear in Commun. Math. Phys | null | 10.1007/s00220-006-1546-3 | null | math.DS cs.CC | null | It has been previously shown by two of the authors that some polynomial Julia
sets are algorithmically impossible to draw with arbitrary magnification. On
the other hand, for a large class of examples the problem of drawing a picture
has polynomial complexity. In this paper we demonstrate the existence of
computable quadratic Julia sets whose computational complexity is arbitrarily
high.
| [
{
"version": "v1",
"created": "Wed, 16 Feb 2005 15:53:36 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Nov 2005 18:03:00 GMT"
}
] | 2009-11-11T00:00:00 | [
[
"Binder",
"I.",
""
],
[
"Braverman",
"M.",
""
],
[
"Yampolsky",
"M.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/0503210 | Ewa Krot | Ewa Krot | An Introduction to Finite Fibonomial Calculus | 16 pages | CEJM, 2(5) 2004, 754-766 | null | null | math.CO cs.DM | null | This is an indicatory presentation of main definitions and theorems of
fibonomial calculus which is a special case of psi-extented rota's finite
operator calculus.
| [
{
"version": "v1",
"created": "Fri, 11 Mar 2005 12:54:29 GMT"
}
] | 2008-02-15T00:00:00 | [
[
"Krot",
"Ewa",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0503286 | Andrzej Kwasniewski | A.K.Kwasniewski | Cobweb posets as noncommutative prefabs | 11 pages, 5 figures | Adv. Stud. Contemp. Math. vol. 14 (1) 2007. pp. 37-47 | null | null | math.CO cs.DM | null | A class of new type graded infinite posets with minimal element are
considered. These so called cobweb posets introduced recently by the present
author provide a wide range of new noncommutative prefab combinatorial schema
with characteristic graded subposets as primes. The schema are defined here via
relaxing commutativity and associativity requirements imposed on the
composition of prefabs by the fathers of this fertile concept. The construction
and the very first basic properties of cobweb prefabs are pointed out in what
follows. An another single valued commutative amd associative composision is
also considered.
| [
{
"version": "v1",
"created": "Tue, 15 Mar 2005 04:26:45 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Mar 2005 05:26:54 GMT"
},
{
"version": "v3",
"created": "Wed, 11 May 2005 03:34:00 GMT"
},
{
"version": "v4",
"created": "Sun, 25 Sep 2005 23:40:37 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0503295 | Ewa Krot | Ewa Krot | Characterization of the Fibonacci Cobweb Poset as oDAG | 5 pages, 1 figure | null | null | null | math.CO cs.DM | null | The characterization of fibonacci cobweb poset as d.a.g. and o.d.a.g. is
given. The dim 2 poset such that its hasse diagram coincide with digraf of
fibonacci cobweb poset is constructed.
| [
{
"version": "v1",
"created": "Tue, 15 Mar 2005 11:52:45 GMT"
}
] | 2008-02-09T00:00:00 | [
[
"Krot",
"Ewa",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0503453 | Amilcar Sernadas | P. Mateus and A. Sernadas (CLC, Dep Math, IST, Lisbon, Portugal) | Weakly complete axiomatization of exogenous quantum propositional logic | 28 pages | null | 10.1016/j.ic.2006.02.001 | null | math.LO cs.LO quant-ph | null | A weakly complete finitary axiomatization for EQPL (exogenous quantum
propositional logic) is presented. The proof is carried out using a non trivial
extension of the Fagin-Halpern-Megiddo technique together with three Henkin
style completions.
| [
{
"version": "v1",
"created": "Tue, 22 Mar 2005 14:36:13 GMT"
}
] | 2016-01-14T00:00:00 | [
[
"Mateus",
"P.",
"",
"CLC, Dep Math, IST, Lisbon, Portugal"
],
[
"Sernadas",
"A.",
"",
"CLC, Dep Math, IST, Lisbon, Portugal"
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
math/0503503 | Elchanan Mossel | Elchanan Mossel and Ryan O'Donnell and Krzysztof Oleszkiewicz | Noise stability of functions with low influences: invariance and
optimality | null | null | null | null | math.PR cs.CC math.CO | null | In this paper we study functions with low influences on product probability
spaces. The analysis of boolean functions with low influences has become a
central problem in discrete Fourier analysis. It is motivated by fundamental
questions arising from the construction of probabilistically checkable proofs
in theoretical computer science and from problems in the theory of social
choice in economics.
We prove an invariance principle for multilinear polynomials with low
influences and bounded degree; it shows that under mild conditions the
distribution of such polynomials is essentially invariant for all product
spaces. Ours is one of the very few known non-linear invariance principles. It
has the advantage that its proof is simple and that the error bounds are
explicit. We also show that the assumption of bounded degree can be eliminated
if the polynomials are slightly ``smoothed''; this extension is essential for
our applications to ``noise stability''-type problems.
In particular, as applications of the invariance principle we prove two
conjectures: the ``Majority Is Stablest'' conjecture from theoretical computer
science, which was the original motivation for this work, and the ``It Ain't
Over Till It's Over'' conjecture from social choice theory.
| [
{
"version": "v1",
"created": "Wed, 23 Mar 2005 18:54:38 GMT"
},
{
"version": "v2",
"created": "Mon, 23 May 2005 23:54:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mossel",
"Elchanan",
""
],
[
"O'Donnell",
"Ryan",
""
],
[
"Oleszkiewicz",
"Krzysztof",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0504037 | Robin Houston | Robin Houston, Dominic Hughes and Andrea Schalk | Modelling Linear Logic Without Units (Preliminary Results) | 23 pages | null | null | null | math.CT cs.LO math.LO | null | We describe a notion of categorical model for unitless fragments of
(multiplicative) linear logic. The basic definition uses promonoidal
categories, and we also give an equivalent elementary axiomatisation.
| [
{
"version": "v1",
"created": "Sun, 3 Apr 2005 09:55:06 GMT"
}
] | 2013-05-13T00:00:00 | [
[
"Houston",
"Robin",
""
],
[
"Hughes",
"Dominic",
""
],
[
"Schalk",
"Andrea",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
math/0504378 | Sebastian Roch | S. Roch | A Short Proof that Phylogenetic Tree Reconstruction by Maximum
Likelihood is Hard | 6 pages; Corrected typos and notational problem | null | null | null | math.PR cs.CC cs.CE math.ST q-bio.PE stat.TH | null | Maximum likelihood is one of the most widely used techniques to infer
evolutionary histories. Although it is thought to be intractable, a proof of
its hardness has been lacking. Here, we give a short proof that computing the
maximum likelihood tree is NP-hard by exploiting a connection between
likelihood and parsimony observed by Tuffley and Steel.
| [
{
"version": "v1",
"created": "Tue, 19 Apr 2005 08:36:17 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Sep 2005 01:50:57 GMT"
}
] | 2011-09-30T00:00:00 | [
[
"Roch",
"S.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0504522 | Lars Eirik Danielsen | Lars Eirik Danielsen (1), Matthew G. Parker (1) ((1) University of
Bergen) | On the Classification of All Self-Dual Additive Codes over GF(4) of
Length up to 12 | 18 pages, 4 figures | Journal of Combinatorial Theory, Series A 113(7), pp. 1351-1367,
2006 | 10.1016/j.jcta.2005.12.004 | null | math.CO cs.IT math.IT | null | We consider additive codes over GF(4) that are self-dual with respect to the
Hermitian trace inner product. Such codes have a well-known interpretation as
quantum codes and correspond to isotropic systems. It has also been shown that
these codes can be represented as graphs, and that two codes are equivalent if
and only if the corresponding graphs are equivalent with respect to local
complementation and graph isomorphism. We use these facts to classify all codes
of length up to 12, where previously only all codes of length up to 9 were
known. We also classify all extremal Type II codes of length 14. Finally, we
find that the smallest Type I and Type II codes with trivial automorphism group
have length 9 and 12, respectively.
| [
{
"version": "v1",
"created": "Mon, 25 Apr 2005 16:06:16 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Nov 2005 16:07:57 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Jan 2006 09:07:03 GMT"
},
{
"version": "v4",
"created": "Fri, 17 Feb 2006 11:22:44 GMT"
}
] | 2008-01-09T00:00:00 | [
[
"Danielsen",
"Lars Eirik",
""
],
[
"Parker",
"Matthew G.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0505418 | Erik Palmgren | Erik Palmgren | Internalising modified realisability in constructive type theory | 7 pages | Logical Methods in Computer Science, Volume 1, Issue 2 (October 5,
2005) lmcs:2266 | 10.2168/LMCS-1(2:2)2005 | null | math.LO cs.LO | null | A modified realisability interpretation of infinitary logic is formalised and
proved sound in constructive type theory (CTT). The logic considered subsumes
first order logic. The interpretation makes it possible to extract programs
with simplified types and to incorporate and reason about them in CTT.
| [
{
"version": "v1",
"created": "Thu, 19 May 2005 14:43:41 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Oct 2005 11:40:59 GMT"
},
{
"version": "v3",
"created": "Wed, 5 Oct 2005 11:37:04 GMT"
}
] | 2017-01-11T00:00:00 | [
[
"Palmgren",
"Erik",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
math/0505487 | Vladimir Shpilrain | Vladimir Shpilrain and Alexander Ushakov | Thompson's group and public key cryptography | 14 pages | null | null | null | math.GR cs.CR | null | Recently, several public key exchange protocols based on symbolic computation
in non-commutative (semi)groups were proposed as a more efficient alternative
to well established protocols based on numeric computation. Notably, the
protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al. exploited the
conjugacy search problem in groups, which is a ramification of the discrete
logarithm problem. However, it is a prevalent opinion now that the conjugacy
search problem alone is unlikely to provide sufficient level of security no
matter what particular group is chosen as a platform.
In this paper we employ another problem (we call it the decomposition
problem), which is more general than the conjugacy search problem, and we
suggest to use R. Thompson's group as a platform. This group is well known in
many areas of mathematics, including algebra, geometry, and analysis. It also
has several properties that make it fit for cryptographic purposes. In
particular, we show here that the word problem in Thompson's group is solvable
in almost linear time.
| [
{
"version": "v1",
"created": "Tue, 24 May 2005 01:25:27 GMT"
}
] | 2016-09-07T00:00:00 | [
[
"Shpilrain",
"Vladimir",
""
],
[
"Ushakov",
"Alexander",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
math/0505617 | Michael Yampolsky | Ilia Binder, Mark Braverman, Michael Yampolsky | On computational complexity of Riemann mapping | null | null | null | null | math.CV cs.CC | null | In this paper we consider the computational complexity of uniformizing a
domain with a given computable boundary. We give nontrivial upper and lower
bounds in two settings: when the approximation of boundary is given either as a
list of pixels, or by a Turing Machine.
| [
{
"version": "v1",
"created": "Fri, 27 May 2005 20:17:03 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Feb 2007 10:04:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Binder",
"Ilia",
""
],
[
"Braverman",
"Mark",
""
],
[
"Yampolsky",
"Michael",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CV",
"description": "Holomorphic functions, automorphic group actions and forms, pseudoconvexity, complex geometry, analytic spaces, analytic sheaves",
"span": "(Complex Variables)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/0506082 | Naoto Morikawa | Naoto Morikawa | Discrete differential geometry of proteins: a new method for encoding
three-dimensional structures of proteins | 10 pages, 6 figures, 3 tables. Submitted | null | null | null | math.CO cs.DM math.MG q-bio.GN | null | In nature the three-dimensional structure of a protein is encoded in the
corresponding gene. In this paper we describe a new method for encoding the
three-dimensional structure of a protein into a binary sequence. The feature of
the method is the correspondence between protein-folding and ``integration''. A
protein is approximated by a folded tetrahedron sequence. And the binary code
of a protein is obtained as the ``second derivative'' of the shape of the
folded tetrahedron sequence. With this method at hand, we can extract static
structural information of a protein from its gene. And we can describe the
distribution of three-dimensional structures of proteins without any subjective
hierarchical classification.
| [
{
"version": "v1",
"created": "Sun, 5 Jun 2005 03:01:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Morikawa",
"Naoto",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
}
] |
math/0506180 | Marie-Annick Guillemer | Dimitri Grigoriev (IRMAR), Ilia Ponomarenko | Constructions in public-key cryptography over matrix groups | null | null | null | 2005-19 | math.GR cs.CR math-ph math.MP | null | The purpose of the paper is to give new key agreement protocols (a
multi-party extension of the protocol due to Anshel-Anshel-Goldfeld and a
generalization of the Diffie-Hellman protocol from abelian to solvable groups)
and a new homomorphic public-key cryptosystem. They rely on difficulty of the
conjugacy and membership problems for subgroups of a given group. To support
these and other known cryptographic schemes we present a general technique to
produce a family of instances being matrix groups (over finite commutative
rings) which play a role for these schemes similar to the groups $Z\_n^*$ in
the existing cryptographic constructions like RSA or discrete logarithm.
| [
{
"version": "v1",
"created": "Fri, 10 Jun 2005 12:30:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grigoriev",
"Dimitri",
"",
"IRMAR"
],
[
"Ponomarenko",
"Ilia",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
math/0506475 | Radhakrishnan Srinivasan | Radhakrishnan Srinivasan, H. P. Raghunandan | Foundations of real analysis and computability theory in
non-Aristotelian finitary logic | An error corrected in the equation of Remark 9. Other comments of
Version 2: 25 pages, nine references added, typos corrected. Appendix B,
giving details of the formal systems, has been added. Substantially improved
presentation with more details, especially in Sec. 4 on real analysis, which
can be read more or less independently of other sections | null | null | null | math.LO cs.LO math.GM | null | This paper outlines new paradigms for real analysis and computability theory
in the recently proposed non-Aristotelian finitary logic (NAFL). Constructive
real analysis in NAFL (NRA) is accomplished by a translation of diagrammatic
concepts from Euclidean geometry into an extension (NPAR) of the NAFL version
of Peano Arithmetic (NPA). Such a translation is possible because NPA proves
the existence of every infinite proper class of natural numbers that is
definable in the language of NPA. Infinite sets are not permitted in NPAR and
quantification over proper classes is banned; hence Cantor's diagonal argument
cannot be legally formulated in NRA, and there is no `cardinality' for any
collection (`super-class') of real numbers. Many of the useful aspects of
classical real analysis, such as, the calculus of Newton and Leibniz, are
justifiable in NRA. But the paradoxes, such as, Zeno's paradoxes of motion and
the Banach-Tarski paradox, are resolved because NRA admits only closed
super-classes of real numbers; in particular, open/semi-open intervals of real
numbers are not permitted. The NAFL version of computability theory (NCT)
rejects Turing's argument for the undecidability of the halting problem and
permits hypercomputation. Important potential applications of NCT are in the
areas of quantum and autonomic computing.
| [
{
"version": "v1",
"created": "Thu, 23 Jun 2005 13:05:27 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Sep 2005 07:44:24 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Sep 2005 10:53:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Srinivasan",
"Radhakrishnan",
""
],
[
"Raghunandan",
"H. P.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
}
] |
math/0506538 | Dominique Rossin | Anne Micheli (LIAFA), Dominique Rossin (LIAFA) | Edit Distance between Unlabeled Ordered Trees | Algorithmique et Combinatoire | null | null | null | math.CO cs.DM | null | There exists a bijection between one stack sortable permutations
--permutations which avoid the pattern 231-- and planar trees. We define an
edit distance between permutations which is coherent with the standard edit
distance between trees. This one-to-one correspondence yields a polynomial
algorithm for the subpermutation problem for $(231)$ avoiding permutations.
Moreover, we obtain the generating function of the edit distance between
ordered trees and some special ones. For the general case we show that the mean
edit distance between a planar tree and all other planar trees is at least
$n/ln(n)$. Some results can be extended to labeled trees considering colored
Dyck paths or equivalently colored one stack sortable permutations.
| [
{
"version": "v1",
"created": "Mon, 27 Jun 2005 11:51:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Micheli",
"Anne",
"",
"LIAFA"
],
[
"Rossin",
"Dominique",
"",
"LIAFA"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0506553 | Giorgi Japaridze | Giorgi Japaridze | Introduction to Cirquent Calculus and Abstract Resource Semantics | To appear in Journal of Logic and Computation | Journal of Logic and Computation 16 (2006), pp. 489-532 | 10.1093/logcom/exl005 | null | math.LO cs.LO | null | This paper introduces a refinement of the sequent calculus approach called
cirquent calculus. While in Gentzen-style proof trees sibling (or cousin, etc.)
sequents are disjoint sequences of formulas, in cirquent calculus they are
permitted to share elements. Explicitly allowing or disallowing shared
resources and thus taking to a more subtle level the resource-awareness
intuitions underlying substructural logics, cirquent calculus offers much
greater flexibility and power than sequent calculus does. A need for
substantially new deductive tools came with the birth of computability logic
(see http://www.cis.upenn.edu/~giorgi/cl.html) - the semantically constructed
formal theory of computational resources, which has stubbornly resisted any
axiomatization attempts within the framework of traditional syntactic
approaches. Cirquent calculus breaks the ice. Removing contraction from the
full collection of its rules yields a sound and complete system for the basic
fragment CL5 of computability logic. Doing the same in sequent calculus, on the
other hand, throws out the baby with the bath water, resulting in the strictly
weaker affine logic. An implied claim of computability logic is that it is CL5
rather than affine logic that adequately materializes the resource philosophy
traditionally associated with the latter. To strengthen this claim, the paper
further introduces an abstract resource semantics and shows the soundness and
completeness of CL5 with respect to it.
| [
{
"version": "v1",
"created": "Mon, 27 Jun 2005 19:45:06 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Jul 2005 19:06:20 GMT"
},
{
"version": "v3",
"created": "Fri, 23 Dec 2005 15:19:47 GMT"
}
] | 2011-04-15T00:00:00 | [
[
"Japaridze",
"Giorgi",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
math/0507032 | Gerard Henry Edmond Duchamp | G\'erard Henry Edmond Duchamp (LIPN), Jean-Gabriel Luque (IGM),
Marianne Deboysson-Flouret (LIH) | Transitive Hall sets | null | null | null | null | math.CO cs.DM | null | We give the definition of Lazard and Hall sets in the context of transitive
factorizations of free monoids. The equivalence of the two properties is
proved. This allows to build new effective bases of free partially commutative
Lie algebras. The commutation graphs for which such sets exist are completely
characterized and we explicit, in this context, the classical PBW rewriting
process.
| [
{
"version": "v1",
"created": "Sat, 2 Jul 2005 05:46:50 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Duchamp",
"Gérard Henry Edmond",
"",
"LIPN"
],
[
"Luque",
"Jean-Gabriel",
"",
"IGM"
],
[
"Deboysson-Flouret",
"Marianne",
"",
"LIH"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0507041 | Boaz Tsaban | W. Charles Holland and Boaz Tsaban | The conjugacy problem and related problems in lattice-ordered groups | Small updates | International Journal of Algebra and Computation 15 (2005),
395-404 | 10.1142/S0218196705002232 | null | math.GR cs.CC math.GN | null | We study, from a constructive computational point of view, the techniques
used to solve the conjugacy problem in the "generic" lattice-ordered group
Aut(R) of order automorphisms of the real line. We use these techniques in
order to show that for each choice of parameters f,g in Aut(R), the equation
xfx=g is effectively solvable in Aut(R).
| [
{
"version": "v1",
"created": "Mon, 4 Jul 2005 14:28:39 GMT"
},
{
"version": "v2",
"created": "Thu, 17 May 2007 20:15:33 GMT"
}
] | 2010-08-02T00:00:00 | [
[
"Holland",
"W. Charles",
""
],
[
"Tsaban",
"Boaz",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.GN",
"description": "Continuum theory, point-set topology, spaces with algebraic structure, foundations, dimension theory, local and global properties",
"span": "(General Topology)"
}
] |
math/0507235 | Guangyue Han | Guangyue Han, Brian Marcus | Analyticity of Entropy Rate of Hidden Markov Chains | The title has been changed. The new main theorem now combines the old
main theorem and the remark following the old main theorem. A new section is
added as an introduction to complex analysis. General principle and an
example to determine the domain of analyticity of entropy rate have been
added. Relaxed conditions for analyticity of entropy rate and the
corresponding examples are added. The section about binary markov chain
corrupted by binary symmetric noise is taken out (to be part of another
paper) | null | null | null | math.PR cs.IT math.IT | null | We prove that under mild positivity assumptions the entropy rate of a hidden
Markov chain varies analytically as a function of the underlying Markov chain
parameters. A general principle to determine the domain of analyticity is
stated. An example is given to estimate the radius of convergence for the
entropy rate. We then show that the positivity assumptions can be relaxed, and
examples are given for the relaxed conditions. We study a special class of
hidden Markov chains in more detail: binary hidden Markov chains with an
unambiguous symbol, and we give necessary and sufficient conditions for
analyticity of the entropy rate for this case. Finally, we show that under the
positivity assumptions the hidden Markov chain {\em itself} varies
analytically, in a strong sense, as a function of the underlying Markov chain
parameters.
| [
{
"version": "v1",
"created": "Tue, 12 Jul 2005 14:24:10 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Sep 2005 23:44:28 GMT"
},
{
"version": "v3",
"created": "Tue, 15 Nov 2005 20:21:44 GMT"
},
{
"version": "v4",
"created": "Mon, 3 Apr 2006 21:15:13 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Han",
"Guangyue",
""
],
[
"Marcus",
"Brian",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0507410 | Bernd Fiedler | Bernd Fiedler | Methods for the construction of generators of algebraic curvature
tensors | 11 pages | null | null | null | math.CO cs.SC math.DG | null | We demonstrate the use of several tools from Algebraic Combinatorics such as
Young tableaux, symmetry operators, the Littlewood-Richardson rule and discrete
Fourier transforms of symmetric groups in investigations of algebraic curvature
tensors.
| [
{
"version": "v1",
"created": "Wed, 20 Jul 2005 16:18:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fiedler",
"Bernd",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
}
] |
math/0508171 | Pavel Chebotarev | Pavel Chebotarev and Rafig Agaev | Matrices of Forests and the Analysis of Digraphs | 18 pages | null | null | null | math.CO cs.CV cs.NI | null | The matrices of spanning rooted forests are studied as a tool for analysing
the structure of digraphs and measuring their characteristics. The problems of
revealing the basis bicomponents, measuring vertex proximity, and ranking from
preference relations / sports competitions are considered. It is shown that the
vertex accessibility measure based on spanning forests has a number of
desirable properties. An interpretation for the normalized matrix of
out-forests in terms of information dissemination is given.
Keywords: Laplacian matrix, spanning forest, matrix-forest theorem, proximity
measure, bicomponent, ranking, incomplete tournament, paired comparisons
| [
{
"version": "v1",
"created": "Tue, 9 Aug 2005 20:11:27 GMT"
},
{
"version": "v2",
"created": "Sat, 4 Feb 2006 12:10:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chebotarev",
"Pavel",
""
],
[
"Agaev",
"Rafig",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
math/0508183 | Pavel Chebotarev | P. Yu. Chebotarev and E. V. Shamis | On a Duality between Metrics and $\Sigma$-Proximities | 5 pages | Automation and Remote Control 59 (1998) 608--612 | null | null | math.MG cs.DS math.CO | null | : In studies of discrete structures, functions are frequently used that
express proximity, but are not metrics. We consider a class of such functions
that is characterized by a normalization condition and an inequality that plays
the same role as the triangle inequality does for metrics. We show that the
introduced functions, named $\Sigma$-proximities, are in a definite sense dual
to metrics: there exists a natural one-to-one correspondence between metrics
and $\Sigma$-proximities defined on the same finite set; in contrast to
metrics, $\Sigma$-proximities measure {\it comparative} proximity; the closer
the objects, the greater the $\Sigma$-proximity; diagonal entries of the
$\Sigma$-proximity matrix characterize the ``centrality'' of elements. The
results are extended to arbitrary infinite sets.
| [
{
"version": "v1",
"created": "Wed, 10 Aug 2005 14:25:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chebotarev",
"P. Yu.",
""
],
[
"Shamis",
"E. V.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0508199 | Pavel Chebotarev | Pavel Chebotarev | Extending Utility Representations of Partial Orders | 15 pages | In: Constructing and Applying Objective Functions. Lecture Notes
in Economics and Math. Systems, Vol.510, Springer, 2002, P. 63-74 | 10.1007/978-3-642-56038-5_4 | null | math.OC cs.DS math.FA | null | The problem is considered as to whether a monotone function defined on a
subset P of a Euclidean space can be strictly monotonically extended to the
whole space. It is proved that this is the case if and only if the function is
{\em separably increasing}. Explicit formulas are given for a class of
extensions which involves an arbitrary bounded increasing function. Similar
results are obtained for monotone functions that represent strict partial
orders on arbitrary abstract sets X. The special case where P is a Pareto
subset is considered.
| [
{
"version": "v1",
"created": "Thu, 11 Aug 2005 12:51:11 GMT"
}
] | 2022-10-21T00:00:00 | [
[
"Chebotarev",
"Pavel",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
}
] |
math/0508212 | Howard Kleiman | Howard Kleiman | The Symmetric Traveling Salesman Problem | A new theorem has been added | null | null | null | math.CO cs.DS | null | Let M be an nXn symetric matrix, n, even, T, an upper bound for T_OPT, an
optimal tour, sigma_T, the smaller-valued perfect matching obtained from
alternate edges of T expressed as a product of 2-cycles. Applying the modified
Floyd-Warshall algorithm to (sigma_T)^-1M^-, we construct acceptable and
2-circuit cycles some sets of which may yield circuits that can be patched into
tours. We obtain necessary and sufficient conditions for a set, S, of cycles to
yield circuits that may be patched into a tour.Assume that the following
(Condition A)is valid: If (sigma_T)s = T*, |T*|<T, then all cycles of s have
values less than |T| - |sigma_T|.Let SFWOPT),S(OPT)be the respective sets of
cycles yielding T_FWOPT, T_OPT. Given Condition(A), using F-W, we can always
obtain S(FWOPT). Using Condition A but not F-W, S_OPT is always obtainable from
a subset of the cycles obtained.
| [
{
"version": "v1",
"created": "Thu, 11 Aug 2005 22:08:27 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Aug 2005 16:51:16 GMT"
},
{
"version": "v3",
"created": "Sat, 27 Aug 2005 19:53:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kleiman",
"Howard",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0508319 | Ronald Ortner | Ronald Ortner | Combinations and Mixtures of Optimal Policies in Unichain Markov
Decision Processes are Optimal | 9 pages | null | null | null | math.CO cs.DM cs.LG math.OC math.PR | null | We show that combinations of optimal (stationary) policies in unichain Markov
decision processes are optimal. That is, let M be a unichain Markov decision
process with state space S, action space A and policies \pi_j^*: S -> A (1\leq
j\leq n) with optimal average infinite horizon reward. Then any combination \pi
of these policies, where for each state i in S there is a j such that
\pi(i)=\pi_j^*(i), is optimal as well. Furthermore, we prove that any mixture
of optimal policies, where at each visit in a state i an arbitrary action
\pi_j^*(i) of an optimal policy is chosen, yields optimal average reward, too.
| [
{
"version": "v1",
"created": "Wed, 17 Aug 2005 10:13:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ortner",
"Ronald",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
math/0508320 | Ronald Ortner | Ronald Ortner | Embeddability of Arrangements of Pseudocircles into the Sphere | 13 pages | null | null | null | math.CO cs.CG math.GT | null | An arrangement of pseudocircles is a finite set of oriented closed Jordan
curves each two of which cross each other in exactly two points. To describe
the combinatorial structure of arrangements on closed orientable surfaces, in
(Linhart, Ortner 2004) so-called *intersection schemes* were introduced.
Building up on results about the latter, we first clarify the notion of
embedding of an arrangement. Once this is done it is shown how the
embeddability of an arrangement depends on the embeddability of its
subarrangements. The main result presented is that an arrangement of
pseudocircles can be embedded into the sphere if and only if all of its
subarrangements of four pseudocircles are embeddable into the sphere as well.
| [
{
"version": "v1",
"created": "Wed, 17 Aug 2005 10:30:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ortner",
"Ronald",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
}
] |
math/0508350 | Olga Holtz | James Demmel, Ioana Dumitriu, Olga Holtz | Toward accurate polynomial evaluation in rounded arithmetic | 54 pages, 6 figures; refereed version; to appear in Foundations of
Computational Mathematics: Santander 2005, Cambridge University Press, March
2006 | in Foundations of Computational Mathematics: Santander 2005 (L.
Pardo et al, eds.) Cambridge University Press, 2006, pp. 36-105 | null | null | math.NA cs.CC | null | Given a multivariate real (or complex) polynomial $p$ and a domain $\cal D$,
we would like to decide whether an algorithm exists to evaluate $p(x)$
accurately for all $x \in {\cal D}$ using rounded real (or complex) arithmetic.
Here ``accurately'' means with relative error less than 1, i.e., with some
correct leading digits. The answer depends on the model of rounded arithmetic:
We assume that for any arithmetic operator $op(a,b)$, for example $a+b$ or $a
\cdot b$, its computed value is $op(a,b) \cdot (1 + \delta)$, where $| \delta
|$ is bounded by some constant $\epsilon$ where $0 < \epsilon \ll 1$, but
$\delta$ is otherwise arbitrary. This model is the traditional one used to
analyze the accuracy of floating point algorithms.Our ultimate goal is to
establish a decision procedure that, for any $p$ and $\cal D$, either exhibits
an accurate algorithm or proves that none exists. In contrast to the case where
numbers are stored and manipulated as finite bit strings (e.g., as floating
point numbers or rational numbers) we show that some polynomials $p$ are
impossible to evaluate accurately. The existence of an accurate algorithm will
depend not just on $p$ and $\cal D$, but on which arithmetic operators and
which constants are are available and whether branching is permitted. Toward
this goal, we present necessary conditions on $p$ for it to be accurately
evaluable on open real or complex domains ${\cal D}$. We also give sufficient
conditions, and describe progress toward a complete decision procedure. We do
present a complete decision procedure for homogeneous polynomials $p$ with
integer coefficients, ${\cal D} = \C^n$, and using only the arithmetic
operations $+$, $-$ and $\cdot$.
| [
{
"version": "v1",
"created": "Thu, 18 Aug 2005 17:17:20 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Jan 2006 19:55:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demmel",
"James",
""
],
[
"Dumitriu",
"Ioana",
""
],
[
"Holtz",
"Olga",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/0508533 | Anatoli Manita | Anatoli Manita and Francois Simonot | On the cascade rollback synchronization | 24 pages, 4 figures | null | null | null | math.PR cs.DC | null | We consider a cascade model of $N$ different processors performing a
distributed parallel simulation. The main goal of the study is to show that the
long-time dynamics of the system has a cluster behavior. To attack this problem
we combine two methods: stochastic comparison and Foster-Lyapunov functions.
| [
{
"version": "v1",
"created": "Fri, 26 Aug 2005 11:19:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Manita",
"Anatoli",
""
],
[
"Simonot",
"Francois",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
math/0509004 | Pierre Leroux | Andrei Gagarin, Gilbert Labelle, Pierre Leroux (LaCIM, Universite du
Quebec a Montreal) | Counting unlabelled toroidal graphs with no K33-subdivisions | 25 pages (some corrections), 4 figures (one figure added), 3 tables | Adv. in Appl. Math. 39 (2007), no. 1, pp. 51-75 | 10.1016/j.aam.2006.05.006 | null | math.CO cs.DM | null | We provide a description of unlabelled enumeration techniques, with complete
proofs, for graphs that can be canonically obtained by substituting 2-pole
networks for the edges of core graphs. Using structure theorems for toroidal
and projective-planar graphs containing no K33-subdivisions, we apply these
techniques to obtain their unlabelled enumeration.
| [
{
"version": "v1",
"created": "Thu, 1 Sep 2005 02:30:02 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Sep 2006 01:51:13 GMT"
}
] | 2008-05-06T00:00:00 | [
[
"Gagarin",
"Andrei",
"",
"LaCIM, Universite du\n Quebec a Montreal"
],
[
"Labelle",
"Gilbert",
"",
"LaCIM, Universite du\n Quebec a Montreal"
],
[
"Leroux",
"Pierre",
"",
"LaCIM, Universite du\n Quebec a Montreal"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0509248 | Frederic Dambreville | Frederic Dambreville (DGA/CEP/GIP/SRO) | Deterministic modal Bayesian Logic: derive the Bayesian within the modal
logic T | The revised version of "Definition of a Deterministic Bayesian
Logic". The formalism, proofs, and models have been enhanced and simplified | null | null | null | math.LO cs.LO math.PR | null | In this paper a conditional logic is defined and studied. This conditional
logic, DmBL, is constructed as close as possible to the Bayesian and is
unrestricted, that is one is able to use any operator without restriction. A
notion of logical independence is also defined within the logic itself. This
logic is shown to be non trivial and is not reduced to classical propositions.
A model is constructed for the logic. Completeness results are proved. It is
shown that any unconditioned probability can be extended to the whole logic
DmBL. The Bayesian is then recovered from the probabilistic DmBL. At last, it
is shown why DmBL is compliant with Lewis triviality.
| [
{
"version": "v1",
"created": "Mon, 12 Sep 2005 06:11:18 GMT"
}
] | 2016-09-07T00:00:00 | [
[
"Dambreville",
"Frederic",
"",
"DGA/CEP/GIP/SRO"
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
math/0509325 | Denis Krotov | Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia) | On $Z_{2^k}$-Dual Binary Codes | English: 10pp, Russian: 14pp; V.1 title: Z_{2^k}-duality,
Z_{2^k}-linear Hadamard codes, and co-Z_{2^k}-linear 1-perfect codes; V.2:
revised; V.3: minor revision, references updated, Russian translation added | IEEE Trans. Inf. Theory 53(4) 2007, 1532-1537 | 10.1109/TIT.2007.892787 | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new generalization of the Gray map is introduced. The new generalization
$\Phi: Z_{2^k}^n \to Z_{2}^{2^{k-1}n}$ is connected with the known generalized
Gray map $\phi$ in the following way: if we take two dual linear
$Z_{2^k}$-codes and construct binary codes from them using the generalizations
$\phi$ and $\Phi$ of the Gray map, then the weight enumerators of the binary
codes obtained will satisfy the MacWilliams identity. The classes of
$Z_{2^k}$-linear Hadamard codes and co-$Z_{2^k}$-linear extended 1-perfect
codes are described, where co-$Z_{2^k}$-linearity means that the code can be
obtained from a linear $Z_{2^k}$-code with the help of the new generalized Gray
map. Keywords: Gray map, Hadamard codes, MacWilliams identity, perfect codes,
$Z_{2^k}$-linearity
| [
{
"version": "v1",
"created": "Wed, 14 Sep 2005 20:06:11 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Jan 2007 13:10:15 GMT"
},
{
"version": "v3",
"created": "Mon, 5 Oct 2009 16:55:04 GMT"
}
] | 2009-10-05T00:00:00 | [
[
"Krotov",
"Denis",
"",
"Sobolev Institute of Mathematics, Novosibirsk, Russia"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0509358 | Denis Krotov | Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia) | On decomposability of 4-ary distance 2 MDS codes, double-codes, and
n-quasigroups of order 4 | 19 pages. V2: revised, general case q=2t is added. Submitted to
Discr. Math | Discrete Math. 308(15) 2008, 3322-3334 | 10.1016/j.disc.2007.06.038 | null | math.CO cs.IT math.IT | null | A subset $S$ of $\{0,1,...,2t-1\}^n$ is called a $t$-fold MDS code if every
line in each of $n$ base directions contains exactly $t$ elements of $S$. The
adjacency graph of a $t$-fold MDS code is not connected if and only if the
characteristic function of the code is the repetition-free sum of the
characteristic functions of $t$-fold MDS codes of smaller lengths.
In the case $t=2$, the theory has the following application. The union of two
disjoint $(n,4^{n-1},2)$ MDS codes in $\{0,1,2,3\}^n$ is a double-MDS-code. If
the adjacency graph of the double-MDS-code is not connected, then the
double-code can be decomposed into double-MDS-codes of smaller lengths. If the
graph has more than two connected components, then the MDS codes are also
decomposable. The result has an interpretation as a test for reducibility of
$n$-quasigroups of order 4. Keywords: MDS codes, n-quasigroups,
decomposability, reducibility, frequency hypercubes, latin hypercubes
| [
{
"version": "v1",
"created": "Thu, 15 Sep 2005 18:10:46 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jan 2007 09:07:29 GMT"
}
] | 2008-05-14T00:00:00 | [
[
"Krotov",
"Denis",
"",
"Sobolev Institute of Mathematics, Novosibirsk, Russia"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0509478 | David Wood | Prosenjit Bose, Jurek Czyzowicz, Zhicheng Gao, Pat Morin, David R.
Wood | Simultaneous Diagonal Flips in Plane Triangulations | A short version of this paper will be presented at SODA 2006 | J. Graph Theory 54(4):307-330, 2007 | 10.1002/jgt.20214 | null | math.CO cs.CG | null | Simultaneous diagonal flips in plane triangulations are investigated. It is
proved that every $n$-vertex triangulation with at least six vertices has a
simultaneous flip into a 4-connected triangulation, and that it can be computed
in O(n) time. It follows that every triangulation has a simultaneous flip into
a Hamiltonian triangulation. This result is used to prove that for any two
$n$-vertex triangulations, there exists a sequence of $O(\log n)$ simultaneous
flips to transform one into the other. The total number of edges flipped in
this sequence is O(n). The maximum size of a simultaneous flip is then studied.
It is proved that every triangulation has a simultaneous flip of at least
${1/3}(n-2)$ edges. On the other hand, every simultaneous flip has at most
$n-2$ edges, and there exist triangulations with a maximum simultaneous flip of
${6/7}(n-2)$ edges.
| [
{
"version": "v1",
"created": "Wed, 21 Sep 2005 12:45:55 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Apr 2006 10:17:53 GMT"
}
] | 2008-09-09T00:00:00 | [
[
"Bose",
"Prosenjit",
""
],
[
"Czyzowicz",
"Jurek",
""
],
[
"Gao",
"Zhicheng",
""
],
[
"Morin",
"Pat",
""
],
[
"Wood",
"David R.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
math/0509523 | Shujun Li Dr. | Shujun Li | Permutation Polynomials modulo m | 21 pages, with 2 open problems | null | null | null | math.NT cs.CR | null | This paper mainly studies problems about so called "permutation polynomials
modulo $m$", polynomials with integer coefficients that can induce bijections
over Z_m={0,...,m-1}. The necessary and sufficient conditions of permutation
polynomials are given, and the number of all permutation polynomials of given
degree and the number induced bijections are estimated. A method is proposed to
determine all equivalent polynomials from the induced polynomial function,
which can be used to determine all equivalent polynomials that induce a given
bijection. A few problems have not been solved yet in this paper and left for
open study.
Note: After finishing the first draft, we noticed that some results obtained
in this paper can be proved in other ways (see Remark 2). In this case, this
work gives different and independent proofs of related results.
| [
{
"version": "v1",
"created": "Thu, 22 Sep 2005 16:36:56 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Sep 2005 22:02:21 GMT"
},
{
"version": "v3",
"created": "Tue, 11 Oct 2005 17:41:24 GMT"
},
{
"version": "v4",
"created": "Thu, 13 Oct 2005 15:49:58 GMT"
},
{
"version": "v5",
"created": "Mon, 14 Nov 2005 16:02:48 GMT"
},
{
"version": "v6",
"created": "Thu, 1 Dec 2005 10:57:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Shujun",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
math/0509575 | Elchanan Mossel | Constantinos Daskalakis, Elchanan Mossel, Sebastien Roch | Evolutionary Trees and the Ising Model on the Bethe Lattice: a Proof of
Steel's Conjecture | Second major revision. Updated proofs and statements | null | null | null | math.PR cs.CE cs.DS math.CA math.CO math.ST q-bio.PE stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A major task of evolutionary biology is the reconstruction of phylogenetic
trees from molecular data. The evolutionary model is given by a Markov chain on
a tree. Given samples from the leaves of the Markov chain, the goal is to
reconstruct the leaf-labelled tree.
It is well known that in order to reconstruct a tree on $n$ leaves, sample
sequences of length $\Omega(\log n)$ are needed. It was conjectured by M. Steel
that for the CFN/Ising evolutionary model, if the mutation probability on all
edges of the tree is less than $p^{\ast} = (\sqrt{2}-1)/2^{3/2}$, then the tree
can be recovered from sequences of length $O(\log n)$. The value $p^{\ast}$ is
given by the transition point for the extremality of the free Gibbs measure for
the Ising model on the binary tree. Steel's conjecture was proven by the second
author in the special case where the tree is "balanced." The second author also
proved that if all edges have mutation probability larger than $p^{\ast}$ then
the length needed is $n^{\Omega(1)}$. Here we show that Steel's conjecture
holds true for general trees by giving a reconstruction algorithm that recovers
the tree from $O(\log n)$-length sequences when the mutation probabilities are
discretized and less than $p^\ast$. Our proof and results demonstrate that
extremality of the free Gibbs measure on the infinite binary tree, which has
been studied before in probability, statistical physics and computer science,
determines how distinguishable are Gibbs measures on finite binary trees.
| [
{
"version": "v1",
"created": "Fri, 23 Sep 2005 20:22:09 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Feb 2008 00:07:32 GMT"
},
{
"version": "v3",
"created": "Tue, 28 Jul 2009 03:26:35 GMT"
}
] | 2011-09-30T00:00:00 | [
[
"Daskalakis",
"Constantinos",
""
],
[
"Mossel",
"Elchanan",
""
],
[
"Roch",
"Sebastien",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0509620 | Denis Krotov | Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia) | On diameter perfect constant-weight ternary codes | 15 pages, 2 figures; presented at 2004 Com2MaC Conference on
Association Schemes, Codes and Designs; submitted to Discrete Mathematics | Discrete Math. 308(14) 2008, 3104-3114 | 10.1016/j.disc.2007.08.037 | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | From cosets of binary Hamming codes we construct diameter perfect
constant-weight ternary codes with weight $n-1$ (where $n$ is the code length)
and distances 3 and 5. The class of distance 5 codes has parameters unknown
before. Keywords: constant-weight codes, ternary codes, perfect codes, diameter
perfect codes, perfect matchings, Preparata codes
| [
{
"version": "v1",
"created": "Tue, 27 Sep 2005 06:39:20 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Aug 2009 17:06:26 GMT"
}
] | 2009-08-03T00:00:00 | [
[
"Krotov",
"Denis",
"",
"Sobolev Institute of Mathematics, Novosibirsk, Russia"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0510013 | David Chua | David B. Chua, Eric D. Kolaczyk and Mark Crovella | Network Kriging | 16 pages, 9 figures, single-spaced | null | null | null | math.ST cs.NI stat.TH | null | Network service providers and customers are often concerned with aggregate
performance measures that span multiple network paths. Unfortunately, forming
such network-wide measures can be difficult, due to the issues of scale
involved. In particular, the number of paths grows too rapidly with the number
of endpoints to make exhaustive measurement practical. As a result, it is of
interest to explore the feasibility of methods that dramatically reduce the
number of paths measured in such situations while maintaining acceptable
accuracy.
We cast the problem as one of statistical prediction--in the spirit of the
so-called `kriging' problem in spatial statistics--and show that end-to-end
network properties may be accurately predicted in many cases using a
surprisingly small set of carefully chosen paths. More precisely, we formulate
a general framework for the prediction problem, propose a class of linear
predictors for standard quantities of interest (e.g., averages, totals,
differences) and show that linear algebraic methods of subset selection may be
used to effectively choose which paths to measure. We characterize the
performance of the resulting methods, both analytically and numerically. The
success of our methods derives from the low effective rank of routing matrices
as encountered in practice, which appears to be a new observation in its own
right with potentially broad implications on network measurement generally.
| [
{
"version": "v1",
"created": "Sun, 2 Oct 2005 00:18:37 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Oct 2005 02:16:32 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Chua",
"David B.",
""
],
[
"Kolaczyk",
"Eric D.",
""
],
[
"Crovella",
"Mark",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0510027 | Andrzej Kwasniewski | A. K. Kwasniewski | Prefab posets` Whitney numbers | 8 pages, 5 figures | Bull. Soc. Sci. Lett. Lodz, vol 60, (2005). 25-33 | null | null | math.CO cs.DM | null | We introduce a natural partial order in structurally natural finite subsets
the cobweb prefabs sets recently constructed by the present author. Whitney
numbers of the second kind of the corresponding subposet which constitute
Stirling-like numbers` triangular array are then calculated and the explicit
formula for them is provided. Next - in the second construction - we endow the
set sums of prefabiants with such an another partial order that their their
bell like numbers include fibonacci triad sequences introduced recently by the
present author in order to extend famous relation between binomial newton
coefficients and fibonacci numbers onto the infinity of their relatives among
which there are also the fibonacci triad sequences and binomial-like
coefficients (incidence coefficients included).
| [
{
"version": "v1",
"created": "Mon, 3 Oct 2005 04:00:33 GMT"
}
] | 2008-02-11T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0510263 | David Eppstein | David Eppstein | Cubic Partial Cubes from Simplicial Arrangements | 11 pages, 10 figures | Electronic J. Combinatorics 13(1, R79):1\^a?"14, Sep 2006 | null | null | math.CO cs.CG math.MG | null | We show how to construct a cubic partial cube from any simplicial arrangement
of lines or pseudolines in the projective plane. As a consequence, we find nine
new infinite families of cubic partial cubes as well as many sporadic examples.
| [
{
"version": "v1",
"created": "Wed, 12 Oct 2005 21:49:04 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Eppstein",
"David",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
math/0510264 | Luca Trevisan | Alex Samorodnitsky and Luca Trevisan | Gowers Uniformity, Influence of Variables, and PCPs | null | null | null | null | math.CO cs.CC | null | Gowers introduced, for d\geq 1, the notion of dimension-d uniformity U^d(f)
of a function f: G -> \C, where G is a finite abelian group and \C are the
complex numbers. Roughly speaking, if U^d(f) is small, then f has certain
"pseudorandomness" properties.
We prove the following property of functions with large U^d(f). Write G=G_1 x
>... x G_n as a product of groups. If a bounded balanced function f:G_1 x ... x
G_n -> \C is such that U^{d} (f) > epsilon, then one of the coordinates of f
has influence at least epsilon/2^{O(d)}.
The Gowers inner product of a collection of functions is a related notion of
pseudorandomness. We prove that if a collection of bounded functions has large
Gowers inner product, and at least one function in the collection is balanced,
then there is a variable that has high influence for at least four of the
functions in the collection.
Finally, we relate the acceptance probability of the "hypergraph long-code
test" proposed by Samorodnitsky and Trevisan to the Gowers inner product of the
functions being tested and we deduce applications to the construction of
Probabilistically Checkable Proofs and to hardness of approximation.
| [
{
"version": "v1",
"created": "Wed, 12 Oct 2005 21:53:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Samorodnitsky",
"Alex",
""
],
[
"Trevisan",
"Luca",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/0510276 | Peter Grunwald | Richard D. Gill (Leiden University), Peter D. Grunwald (CWI Amsterdam) | An algorithmic and a geometric characterization of Coarsening At Random | 16 pages; accepted in this form for publication by Annals of
Statistics | The Annals of Statistics 2008, Vol. 36, No. 5, 2409-2422 | 10.1214/07-AOS532 | See also 0811.0683 (duplicate submission) | math.ST cs.AI stat.ME stat.TH | null | We show that the class of conditional distributions satisfying the coarsening
at Random (CAR) property for discrete data has a simple and robust algorithmic
description based on randomized uniform multicovers: combinatorial objects
generalizing the notion of partition of a set. However, the complexity of a
given CAR mechanism can be large: the maximal "height" of the needed
multicovers can be exponential in the number of points in the sample space. The
results stem from a geometric interpretation of the set of CAR distributions as
a convex polytope and a characterization of its extreme points. The hierarchy
of CAR models defined in this way could be useful in parsimonious statistical
modelling of CAR mechanisms, though the results also raise doubts in applied
work as to the meaningfulness of the CAR assumption in its full generality.
| [
{
"version": "v1",
"created": "Thu, 13 Oct 2005 12:03:06 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Sep 2006 14:40:29 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Sep 2007 14:07:20 GMT"
}
] | 2023-05-30T00:00:00 | [
[
"Gill",
"Richard D.",
"",
"Leiden University"
],
[
"Grunwald",
"Peter D.",
"",
"CWI Amsterdam"
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0510304 | Bernd Fiedler | Bernd Fiedler | Stationary or static space-times and Young tableaux | 11 pages | J.Phys.Conf.Ser.30:152-162,2006 | 10.1088/1742-6596/30/1/018 | null | math.DG cs.SC gr-qc math.CO | null | Algebraic curvature tensors possess generators which can be formed from
symmetric or alternating tensors S, A or tensors \theta with an irreducible
(2,1)-symmetry. In differential geometry examples of curvature formulas are
known which contain generators on the basis of S or A realized by
differentiable tensor fields in a natural way. We show that certain curvature
formulas for stationary or static space-times contain such differentiable
realizations of generators based on \theta. The tensor \theta is connected with
the timelike Killing vector field of the space-time. \theta lies in a special
symmetry class from the infinite family of irreducible (2,1)-symmetry classes.
We determine characteristics of this class. In particular, this class allows a
maximal reduction of the length of the curvature formulas. We use a projection
formalism by Vladimirov, Young symmetrizers and Littlewood-Richardson products.
Computer calculations were carried out by means of the packages Ricci and
PERMS.
| [
{
"version": "v1",
"created": "Fri, 14 Oct 2005 16:28:48 GMT"
}
] | 2014-11-18T00:00:00 | [
[
"Fiedler",
"Bernd",
""
]
] | [
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Physics",
"code": "gr-qc",
"description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.",
"span": "(General Relativity and Quantum Cosmology)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0510520 | Alicia Dickenstein | Eduardo Cattani and Alicia Dickenstein | Counting Solutions to Binomial Complete Intersections | Several minor improvements. Final version to appear in the J. of
Complexity | null | null | null | math.AC cs.CC math.CO | null | We study the problem of counting the total number of affine solutions of a
system of n binomials in n variables over an algebraically closed field of
characteristic zero. We show that we may decide in polynomial time if that
number is finite. We give a combinatorial formula for computing the total
number of affine solutions (with or without multiplicity) from which we deduce
that this counting problem is #P-complete. We discuss special cases in which
this formula may be computed in polynomial time; in particular, this is true
for generic exponent vectors.
| [
{
"version": "v1",
"created": "Tue, 25 Oct 2005 02:23:18 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2006 02:05:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cattani",
"Eduardo",
""
],
[
"Dickenstein",
"Alicia",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0510521 | Martin Wainwright | XuanLong Nguyen, Martin J. Wainwright, Michael I. Jordan | On surrogate loss functions and $f$-divergences | Published in at http://dx.doi.org/10.1214/08-AOS595 the Annals of
Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical
Statistics (http://www.imstat.org) | Annals of Statistics 2009, Vol. 37, No. 2, 876-904 | 10.1214/08-AOS595 | IMS-AOS-AOS595 | math.ST cs.IT math.IT stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of binary classification is to estimate a discriminant function
$\gamma$ from observations of covariate vectors and corresponding binary
labels. We consider an elaboration of this problem in which the covariates are
not available directly but are transformed by a dimensionality-reducing
quantizer $Q$. We present conditions on loss functions such that empirical risk
minimization yields Bayes consistency when both the discriminant function and
the quantizer are estimated. These conditions are stated in terms of a general
correspondence between loss functions and a class of functionals known as
Ali-Silvey or $f$-divergence functionals. Whereas this correspondence was
established by Blackwell [Proc. 2nd Berkeley Symp. Probab. Statist. 1 (1951)
93--102. Univ. California Press, Berkeley] for the 0--1 loss, we extend the
correspondence to the broader class of surrogate loss functions that play a key
role in the general theory of Bayes consistency for binary classification. Our
result makes it possible to pick out the (strict) subset of surrogate loss
functions that yield Bayes consistency for joint estimation of the discriminant
function and the quantizer.
| [
{
"version": "v1",
"created": "Tue, 25 Oct 2005 03:41:43 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Apr 2009 12:07:26 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Nguyen",
"XuanLong",
""
],
[
"Wainwright",
"Martin J.",
""
],
[
"Jordan",
"Michael I.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0510573 | Hossein Zare | Shmuel Friedland, Mostafa Kaveh, Amir Niknejad, Hossein Zare | Fast Monte-Carlo Low Rank Approximations for Matrices | null | null | null | null | math.NA cs.DS | null | In many applications, it is of interest to approximate data, given by mxn
matrix A, by a matrix B of at most rank k, which is much smaller than m and n.
The best approximation is given by singular value decomposition, which is too
time consuming for very large m and n. We present here a Monte Carlo algorithm
for iteratively computing a k-rank approximation to the data consisting of mxn
matrix A. Each iteration involves the reading of O(k) of columns or rows of A.
The complexity of our algorithm is O(kmn). Our algorithm, distinguished from
other known algorithms, guarantees that each iteration is a better k-rank
approximation than the previous iteration. We believe that this algorithm will
have many applications in data mining, data storage and data analysis.
| [
{
"version": "v1",
"created": "Wed, 26 Oct 2005 18:41:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Friedland",
"Shmuel",
""
],
[
"Kaveh",
"Mostafa",
""
],
[
"Niknejad",
"Amir",
""
],
[
"Zare",
"Hossein",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0511343 | Sonny Ben-Shimon | Sonny Ben-Shimon and Michael Krivelevich | Random regular graphs of non-constant degree: Concentration of the
chromatic number | 18 pages | Discrete Mathematics, 309(12):4149--4161, 2009 | 10.1016/j.disc.2008.12.014 | null | math.CO cs.DM math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we show that with high probability the chromatic number of a
graph sampled from the random regular graph model $\Gnd$ for $d=o(n^{1/5})$ is
concentrated in two consecutive values, thus extending a previous result of
Achlioptas and Moore. This concentration phenomena is very similar to that of
the binomial random graph model $\Gnp$ with $p=\frac{d}{n}$. Our proof is
largely based on ideas of Alon and Krivelevich who proved this two-point
concentration result for $\Gnp$ for $p=n^{-\delta}$ where $\delta>1/2$. The
main tool used to derive such a result is a careful analysis of the
distribution of edges in $\Gnd$, relying both on the switching technique and on
bounding the probability of exponentially small events in the configuration
model.
| [
{
"version": "v1",
"created": "Mon, 14 Nov 2005 12:36:59 GMT"
},
{
"version": "v2",
"created": "Sun, 30 Sep 2007 22:39:04 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Oct 2007 16:12:14 GMT"
},
{
"version": "v4",
"created": "Mon, 6 Oct 2008 13:01:08 GMT"
},
{
"version": "v5",
"created": "Wed, 17 Dec 2008 22:23:45 GMT"
}
] | 2009-07-22T00:00:00 | [
[
"Ben-Shimon",
"Sonny",
""
],
[
"Krivelevich",
"Michael",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
math/0512110 | Paul Taylor | Paul Taylor | Computably Based Locally Compact Spaces | 70pp, LaTeX2e, uses diagrams.sty; Accepted for "Logical Methods in
Computer Science" LMCS-2004-19; see http://www.cs.man.ac.uk/~pt/ASD for
related papers. ACM-class: F.4.1 | Logical Methods in Computer Science, Volume 2, Issue 1 (March 7,
2006) lmcs:2255 | 10.2168/LMCS-2(1:1)2006 | null | math.GN cs.LO math.CT | null | ASD (Abstract Stone Duality) is a re-axiomatisation of general topology in
which the topology on a space is treated, not as an infinitary lattice, but as
an exponential object of the same category as the original space, with an
associated lambda-calculus. In this paper, this is shown to be equivalent to a
notion of computable basis for locally compact sober spaces or locales,
involving a family of open subspaces and accompanying family of compact ones.
This generalises Smyth's effectively given domains and Jung's strong proximity
lattices. Part of the data for a basis is the inclusion relation of compact
subspaces within open ones, which is formulated in locale theory as the
way-below relation on a continuous lattice. The finitary properties of this
relation are characterised here, including the Wilker condition for the cover
of a compact space by two open ones. The real line is used as a running
example, being closely related to Scott's domain of intervals. ASD does not use
the category of sets, but the full subcategory of overt discrete objects plays
this role; it is an arithmetic universe (pretopos with lists). In particular,
we use this subcategory to translate computable bases for classical spaces into
objects in the ASD calculus.
| [
{
"version": "v1",
"created": "Mon, 5 Dec 2005 22:31:32 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Mar 2006 16:52:50 GMT"
},
{
"version": "v3",
"created": "Mon, 6 Mar 2006 15:45:12 GMT"
},
{
"version": "v4",
"created": "Tue, 7 Mar 2006 11:16:13 GMT"
}
] | 2019-03-14T00:00:00 | [
[
"Taylor",
"Paul",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GN",
"description": "Continuum theory, point-set topology, spaces with algebraic structure, foundations, dimension theory, local and global properties",
"span": "(General Topology)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
math/0512140 | Vladimir Shpilrain | Vladimir Shpilrain and Alexander Ushakov | A new key exchange protocol based on the decomposition problem | 7 pages | null | null | null | math.GR cs.CR | null | In this paper we present a new key establishment protocol based on the
decomposition problem in non-commutative groups which is: given two elements
$w, w_1$ of the platform group $G$ and two subgroups $A, B \subseteq G$ (not
necessarily distinct), find elements $a \in A, b \in B$ such that $w_1 = a w
b$. Here we introduce two new ideas that improve the security of key
establishment protocols based on the decomposition problem. In particular, we
conceal (i.e., do not publish explicitly) one of the subgroups $A, B$, thus
introducing an additional computationally hard problem for the adversary,
namely, finding the centralizer of a given finitely generated subgroup.
| [
{
"version": "v1",
"created": "Tue, 6 Dec 2005 22:00:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shpilrain",
"Vladimir",
""
],
[
"Ushakov",
"Alexander",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
math/0512263 | Enrico De Micheli | Enrico De Micheli, Giovanni Alberto Viano | Metric and probabilistic information associated with Fredholm integral
equations of the first kind | 19 pages | J. Integral Equations Appl. 14 (2002), 283-310 | null | null | math.CA cs.IT math.IT | null | The problem of evaluating the information associated with Fredholm integral
equations of the first kind, when the integral operator is self-adjoint and
compact, is considered here. The data function is assumed to be perturbed
gently by an additive noise so that it still belongs to the range of the
operator. First we estimate upper and lower bounds for the epsilon-capacity
(and then for the metric information), and explicit computations in some
specific cases are given; then the problem is reformulated from a probabilistic
viewpoint and use is made of the probabilistic information theory. The results
obtained by these two approaches are then compared.
| [
{
"version": "v1",
"created": "Tue, 13 Dec 2005 12:13:48 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"De Micheli",
"Enrico",
""
],
[
"Viano",
"Giovanni Alberto",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0512578 | Andrzej Kwasniewski | A. K. Kwasniewski | On cobweb posets and their combinatorially admissible sequences | 16 pages, 9 figures, affiliated to The Internet Gian Carlo Rota
Polish Seminar: 16 pages, 9 figures, affiliated to The Internet Gian Carlo
Rota Polish Seminar http://ii.uwb.edu.pl/akk/sem/sem_rota.htm | Adv. Studies Contemp. Math. Vol. 18 No 1, 2009 17-32 | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The main purpose of this article is to pose three problems which are easy to
be formulated in an elementary way. These problems which are specifically
important also for the new class of partially ordered sets seem to be not yet
solved.
| [
{
"version": "v1",
"created": "Mon, 26 Dec 2005 20:12:57 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Aug 2007 14:55:08 GMT"
},
{
"version": "v3",
"created": "Fri, 24 Aug 2007 09:53:46 GMT"
},
{
"version": "v4",
"created": "Sun, 21 Oct 2007 15:02:09 GMT"
},
{
"version": "v5",
"created": "Mon, 19 Jan 2009 21:47:32 GMT"
}
] | 2009-01-19T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0601487 | David Freeman | David Freeman | Constructing pairing-friendly elliptic curves with embedding degree 10 | null | null | null | null | math.NT cs.CR | null | We present a general framework for constructing families of elliptic curves
of prime order with prescribed embedding degree. We demonstrate this method by
constructing curves with embedding degree k = 10, which solves an open problem
posed by Boneh, Lynn, and Shacham. We show that our framework incorporates
existing constructions for k = 3, 4, 6, and 12, and we give evidence that the
method is unlikely to produce infinite families of curves with embedding degree
k > 12.
| [
{
"version": "v1",
"created": "Fri, 20 Jan 2006 06:03:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Freeman",
"David",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.