ZetaDimension 
Doty, David and Gu, Xiaoyang and Lutz, Jack H. and Mayordomo, Elvira and Moser, Philippe (2005) ZetaDimension. Working Paper. arXiv. 
Bounds on Query Convergence 
Pearlmutter, Barak A. (2005) Bounds on Query Convergence. Working Paper. arXiv. 
СМИ: Архивы Коля могут угрожать репутации правящей партии Германии 
В Германии разгорается спор о политическом наследии Гельмута Коля. На документы претендует вдова политика. Историки настаивают на свободном доступе ко всем источникам. Со своей стороны, канцлер Ангела Меркель хочет скрыть детали разрыва с патриархом германской политики, сообщает журнал Focus. В 1998 году из ведомства федерального канцлера в Бонне исчезли многочисленные документальные материалы. Партия ХДС проиграла парламентские выборы на волне скандала с «черными кассами» по финансированию предвыборной кампании. читайте также За провал на выборах партийцы возложили ответственность на Коля. Политик был смещен со всех постов после шестнадцати лет пребывания у власти. Ангела Меркель тогда инициировала радикальные перемены в партии, отмечает Tagesspiegel. В случае обнародования архивы эксканцлера могут представить правящую партию ХДС и ее руководство в невыгодном свете, тем более перед предстоящими в сентябре парламентскими выборами. Поэтому важно, кто будет распоряжаться массивом данных, полагают наблюдатели. Между тем в субботу в Европарламенте в Страсбурге состоялось прощание с Гельмутом Колем, скончавшимся 16 июня в своем доме в ЛюдвигсхафенОггерсхайме на 88м году жизни. До сих пор Евросоюз ни разу в своей истории не организовывал подобное мероприятие. читайте также По свидетельству второй жены эксканцлера Майке КольРихтер, еще при жизни политик определил место прощания и список ораторов на торжественной церемонии, которая должна была подчеркнуть общеевропейский характер его деяний. Гельмута Коля захоронят, согласно его завещанию, не в семейной усыпальнице рядом с женой и родителями в ЛюдвигсхафенФризенхайме, а в городе Шпайер в уютном и чистом парке имени Аденауэра вблизи небольшой церкви. Источник новости Запись СМИ: Архивы Коля могут угрожать репутации правящей партии Германии впервые появилась События дня  InfoRU.news. 
From phys.org: “Researchers refute textbook knowledge in molecular interactions” 
phys.org June 29, 2017 Repulsive ground state interaction E rep (solid lines) and the sum of repulsion and London attraction (E att) energy (broken lines) for argon and methane dimers on a perfectly reflecting surface. Credit: arXiv:1610.09275 [condmat.meshall] Van der Waals interactions between molecules are among the most important forces in biology, physics, and chemistry, […] 
Dwarf Galaxy near NGC 253 discovered 
On our last working days before Christmas we got an eMail from Michael Sidonio, telling us, that he has discovered a dwarf galaxy close to NGC 253. We congratulate Michael to his discovery and we are proud that Astronomik filters were used for this image! Please read more at IFLScience: or watch Michael Interview with "The Canberra Times":
Finaly you may read Michael original lines below!

Mosaic of the whole Milkyway with Astronomik filters 
In 2000 Axel Mellinger published his famous panorama of the whole milkyway. Until today it is worldwide well known in the scientific community and also well known for its worth in public astronomical education. At that time he used chemical film and a lens of 28mm focal length to gain the 51 frames necessary for the panorama. In 2009 Mellinger, by now Assistant Professor of Physics at Central Michigan University, repeated his project with modern CCDequipment. He used an SBIG STL 11000 camera and Astronomik RGBFilters Type 2c. He took each frame with a 50mm lens five times with each of the three filters and with three different exposure times (240s, 15s and 1/2s). In total he needed more then 3000 frames to produce his new panorama. By the use of his equipment and imaging technique he was able to create a final image in natural color with a considerably increased dynamic range. 
Nieuwsbriefartikelen  Erik Verlinde en zwaartekracht 
Op 1 april jl. schreef Martijn van Calmthout in De Volkskrant een artikel met de kop UvAhoogleraar komt met eigen, alternatieve theorie zwaartekracht en op 4 april publiceerde George van Hal op de website van de Nederlandstalige NewScientist het artikel Vooruitblik: nieuwe theorie Erik Verlinde ontmaskert 95 procent van het heelal. De opgewondenheid die van de koppen van deze twee Nederlandse wetenschapsjournalisten spat, heeft te maken met het feit dat de hoogleraar theoretische fysica aan de Universiteit van Amsterdam, prof.dr.ir. Erik Verlinde heeft aangekondigd dat er een dezer dagen een wetenschappelijk artikel van hem zal worden gepubliceerd. In het artikel zal hij uitleggen wat hij op 6 januari 2010 precies bedoelde in het inleidende artikel On the Horizon of Gravity and the Laws of Newton met zijn baanbrekende inzicht dat de zwaartekracht geen fundamentele kracht is maar een emergente kracht. Ofwel dat zwaartekracht  de aantrekkingskracht tussen twee massas  een fenomeen is dat wij als kracht ervaren maar in werkelijkheid het gevolg is van een ander onderliggend proces. Zwaartekracht ontstaat volgens Verlinde door veranderingen in informatiedichtheid. Terwijl ik deze column op mijn toetsenbord zit te tikken is het tweede helft mei en er is nog steeds niets vernomen van het aangekondigde artikel. De spanning loopt op, want in de wetenschappelijke wereld is er nogal verschillend  en soms bijna onwetenschappelijk fel gereageerd op de opzienbarende hypothese van Verlinde. De claims die Verlinde legt zijn ook niet misselijk. Hij stelt met zijn nieuwe kijk op de werkelijkheid niet alleen een verklaring te hebben voor de zwaartekracht, maar ook dat de geheimzinnige donkere materie die de totale zwaartekracht in het universum moet verklaren niet bestaat en dat de oerknal op de schop kan. Hij is van mening dat de vergelijkingen van Einstein onvoldoende rekening houden met de hoeveelheid informatie. In feite zet Verlinde de bestaande natuurkunde op zijn kop. Het zal nog wel even duren voordat wij weten of Verlinde geniaal of gek is. Persoonlijk ben ik als geïnteresseerde leek enorm gecharmeerd van zijn hypothese. Bij Verlinde draait alles om informatie en entropie, een begrip uit de tweede hoofdwet van de thermodynamica. Entropie is een maat voor het aantal mogelijke toestanden van een fysisch systeem zoals de moleculen in een hoeveelheid gas. Verlinde merkt in het interview met George van Hal op dat natuurkundigen moeite hebben met het beantwoorden van de vraag hoe het kan dat in het universum de hoeveelheid informatie gelijk blijft en tegelijkertijd de entropie toeneemt. Verlinde beweert dat de entropie gelijk is aan de totale hoeveelheid informatie en dat informatie de basis van alles vormt. Hij concludeert dat energie de snelheid is waarmee informatie wordt verwerkt en dat temperatuur de energie per hoeveelheid informatie is. De reden voor mijn intuïtieve sympathie voor en beheerste optimisme over de hypothese van Verlinde is tweeledig. Ten eerste bevindt de natuurkunde na het verwerken van de gevolgen van de algemene relativiteitstheorie en de kwantummechanica, zich al een tijdje in een onbehaaglijke positie. De natuurkunde en de astronomie worstelen met enkele noodgrepen zoals de hypothesen van donkere materie en donkere energie om aan waargenomen kosmologische fenomenen te kunnen rekenen, zonder die te kunnen verklaren. Ten tweede rukt het begrip informatie op verschillende plaatsen op. Informatie is lang beschouwd als een nietfysisch begrip. De Amerikaanse wiskundige en de grondlegger van de cybernetica Norbert Wiener (1894  1964) heeft eens gezegd: Information is information, not matter or energy. Maar die zienswijze is aan het veranderen. Met name door het formuleren van het holografisch principe door de Nederlandse Nobelprijswinnaar Gerard t Hooft op basis van de ideeën van de vorig jaar overleden theoretisch natuurkundige Jacob Bekenstein en door de weddenschap tussen Stephen Hawking, Kip Thorne en John Preskill over het antwoord op de vraag of in zwarte gaten informatie verloren gaat, de informatieparadox. Het besef groeit dat de rol van informatie fundamenteler is dan slechts een middel om materie, energie, deeltjes, krachten en interacties te beschrijven. Ook de kwantummechanica met nog onverklaarbare verschijnselen als kwantumverstrengeling (het instantaan uitwisselen van informatie tussen twee deeltjes over grote afstanden) maakt duidelijk dat er in de werkelijkheid een onderliggende proces is waar informatie een hoofdrol speelt. De Oostenrijkse kwantumnatuurkundige Anton Zeilinger heeft eens beweerd dat het operationeel onmogelijk is werkelijkheid en informatie te scheiden. Het idee groeit dat op de kleinst denkbare schaal, de Plancklengte van 1,6 10¯³⁵ m de werkelijkheid binair is, te beschrijven met enen en nullen. Informatie dus. Zelfs ruimte en tijd zouden daaruit voortkomen. Misschien ligt het nakende artikel van Erik Verlinde straks een tipje op van deze uitdagende sluier. 
JabRef 
JabRef to opensource’owy program, który pełni rolę menadżera odniesień bibliograficznych. Natywnie korzysta przy tym z formatu BibTeX, czyli standardowego formatu dla bibliografii tworzonych za pomocą LaTeXa. Poza tym obsługuje także format BibLaTeX. W programie możliwe jest formatowanie bibliografii przy użyciu rozmaitych stylów LaTeX/BibTeX/BibLaTeX, dzięki czemu stworzone w JabRef listy odniesień spełniają wszelkie standardy bibliograficzne. JabRef działa w maszynie wirtualnej Java, odpowiednie wersje programu zostały przygotowane dla systemów Windows, Mac OS X i Linuks. Warto dodać, że dostępna jest również wersja w postaci pliku JAR, która będzie działać właściwie w każdym systemie z zainstalowanym środowiskiem Java.
Główne możliwości JabRef:
• wyszukiwanie informacji o wpisach BibTeX w zewnętrznych bazach danych, pobieranie wpisów BibTeX z tych baz – wspierane są np. bazy arXiv, CiteseerX, Google Scholar, Medline, GVK, IEEEXplore, Springer,
• pełny tekst pracy, książki czy artykułu, który jest związany z wybranym odniesieniem bibliograficznym, może zostać automatycznie wyszukany w sieci, a następnie pobrany oraz połączony z odpowiednim wpisem BibTeX,
• zaawansowane wyszukiwanie danych w bibliografii,
• duże możliwości w zakresie klasyfikacji wpisów – grupowanie wpisów w oparciu o słowa kluczowe czy inne atrybuty,
• rozmaite funkcje tworzenia i edytowania pól BibTeX,
• integracja z programami zewnętrznymi – otwieranie dokumentów w przeglądarkach internetowych i przeglądarkach PDF, wprowadzanie odniesień do programów TeXstudio, LyX, Kile, LatexEditor, Emacs, Vim, WinEdt,
• możliwość automatycznej, konfigurowalnej generacji kluczy BibTeX z danych zawartych w dokumentach (np. przy wykorzystaniu informacji takich jak imię i nazwisko autora, tytuł oraz rok wydania pracy/książki),
• wsparcie dla metadanych XMP dostępnych w plikach PDF,
• import danych z różnych formatów  RIS, Medline/Pubmed (xml), Refer/Endnote, INSPEC, BibTeXML, CSA, ISI Web of Science, SilverPlatter, Scifinder, OVID, Biblioscape, Sixpack, JStor, RIS,
• eksport danych m.in. do formatów HTML, Docbook, BibTeXML, MODS, RTF, Refer/Endnote, oraz dokumentów OpenOffice i LibreOffice.
Interfejs graficzny JabRef jest wysoce konfigurowalny i intuicyjny w obsłudze. Program raczej będzie przydatny tylko dla użytkowników mających duże pojęcie o zasadach tworzenia profesjonalnych bibliografii. W pliku pomocy oraz w dokumentacji online można znaleźć zestaw szczegółowych instrukcji. Brakuje porad w polskiej wersji językowej, ale można je znaleźć w Internecie. 
New Working Paper: “Classic Papers: Déjà Vu, a Step Further in the Bibliometric Exploitation of Google Scholar” 
The following working paper was posted on arXiv in the past day. Title Classic Papers: Déjà Vu, a Step Further in the Bibliometric Exploitation of Google Scholar Authors Emilio Delgado LopezCozar Universidad de Granada (Spain) Alberto MartinMartin Universidad de Granada (Spain) Enrique OdunaMalea Universidad de Granada (Spain) Source via arXiv Report No: EC3 Working Papers […] 
DeepMind AI 关系推理超越人类：深度神经网络模块即插即用 
新智元编译
来源：deepmind.com；arXiv.org
译者：文强
【新智元导读】DeepMind 今天发表官博介绍了他们的两篇最新论文，称其都在理解“关系推理”这一挑战方面展示出了令人可喜的结果。一个是视觉互动网络 VIN，能够预测视觉场景中各个物体在未来几百步所处位置，另一个... 
Гравитационные волны могут скрывать в себе следы иных измерений 
http://jpegshare.net/images/e7/47/e7476a945c931e2e4bdfa12ec57e3caf.jpg
Всплески гравитационных волн, порождаемые сливающимися черными дырами или пульсарами, могут содержать в себе информацию по скрытым или "свернутым" измерениям Вселенной, заявляют ученые в статье, опубликованной в Journal of Cosmology and Astroparticle Physics. Написал elmorei на stellar.d3.ru / комментировать 
Dark Energy and Extending the Geodesic Equations of Motion: Connecting the Galactic and Cosmological Length Scales 
Дата и время публикации : 20100729T17:01:16Z Авторы публикации и институты : Achilles D. Speliotopoulos Ссылка на журнализдание: Ссылка на журнализдание не найденаКоментарии к cтатье: 25 pages. Accepted for publication in General Relativity and Gravitation. Paper contains the published version of the second half of arXiv:0711.3124v2 with corrections includedПервичная категория: astroph.CO Все категории : astroph.CO, grqc [...] 
目标检测之准确度篇再读Faster RCNN 
目标检测之准确度篇再读Faster RCNN 一. 源起于Faster 深度学习于目标检测的里程碑成果，来自于这篇论文： 也可以参考：【论文翻译】 虽然该文章前面已经讲过，但只给出了很小的篇幅，并没有作为独立的一篇展开，这里我们详细展开并讨论其 网络结构、应用领域 及 后续改进。 前面文章参考：【目标检测RCNN系列】 二. 网络结构 Faster RCNN的网络结构图如下： 用的还是之前的图，其实对于这张图只需要记住一点：RPN网络，这是本文的核心贡献，RPN通过深度网络实现了 Proposal 功能，相较于之前的 SS（Selective Search）方法 和 EdgeBoxes 方法有很大提升。 RPN 我们来看原论文的图：
三. 应用领域 对于目标检测的研究分为两个方向，精度和效率，一方面以 Faster RCNN为代表的RPN的方法在精度上不断刷新 mAP；另一方面，以SSD 和 YOLO v2 为代表的回归方法则是强调效率（或者说性价比），这两个方向在领域内都有着很大的应用场景。 Faster RCNN的代表特征是Region Proposal，通过 RPN 将检测分成两步，提供 Proposal 和 Location＋Class，Proposal 越准确，后面的复合Loss里 Class所占比例就越大，分类自然就更加准确。而回归方法没有 Proposal过程，通过 Location＋Class直接回归＋分类，反向传播误差在Location上面大范围回归，降低了分类占比，因此分类准确度不好保证，特别是对于小目标，检测精度比较差。 检测精度是算法最核心的价值，即使是以效率为主的 回归方法 也会强调准确性，Faster 方法目前所实现的效率通常是 每秒35帧（GPU版本），这在非实时系统里面实际上也是足够使用的，比如在 农业上对于病虫害的检测，在医疗领域对于图像的后处理等等。 实时系统的应用是更为广阔的市场，这也是为什么说目前有相当多的人持续投入研究，比如 ADAS、机器人、无人机等，这些领域对于 实时性、准确性、成本控制的要求 带来了不断刷新纪录的研究成果。 四. 后续改进 关于 Faster RCNN 的改进比较多，我们将随时关注，保持更新。
作者：linolzhang 发表于2017/7/2 23:31:36 原文链接
阅读：102 评论：0 查看评论

Climbing the Scholarly Publishing Mountain With SHERPA 
JISC announced its FAIR Programme (Focus on Access to Institutional Resources) in January of this year. The central objective of the Programme is to test ways of releasing institutionallyproduced content onto the web. FAIR describes its scope as: Read more about Climbing the Scholarly Publishing Mountain With SHERPA JISC announced its FAIR Programme (Focus on Access to Institutional Resources) in January of this year. The central objective of the Programme is to test ways of releasing institutionallyproduced content onto the web. FAIR describes its scope as: to support access to and sharing of institutional content within Higher Education (HE) and Further Education (FE) and to allow intelligence to be gathered about the technical, organisational and cultural challenges of these processes. This programme is part of a broader area of development to build an Information Environment for the UKs Distributed National Electronic Resource.(1) It specifically sought projects in the following areas:
Article Title: "Climbing the Scholarly Publishing Mountain with SHERPA" Author: John MacColl and Stephen Pinfield Publication Date: 10Oct2002 Publication: Ariadne Issue 33 Originating URL: http://www.ariadne.ac.uk/issue33/sherpa/intro.html Organisations:
Projects:Issue number:Article type:Buzz:
Authors:Date published: Thu, 10/10/2002 Issue 33 issue33_sherpa http://www.ariadne.ac.uk/issue33/sherpa/ This article has been published under copyright; please see our access terms and copyright guidance regarding use of content from this article. See also our explanations of how to cite Ariadne articles for examples of bibliographic format. 
ОНИ посылают СИГНАЛЫ! [Топ Сикрет] (feat. Артур Шарифов) 
Загадочный сигнал, пришедший из космоса, уже долгие годы заставляет ученых размышлять о существовании внеземных цивилизаций. Загадке пришел конец? Или нет? Канал Артура: https://www.youtube.com/channel/UCxtTXA5DU1bZHLLomu83zVw Подпишись https://vk.com/utopia_show если тебе нравится Утопия Шоу. А еще… Поддержи наш проект: https://vk.com/app5727453_96007970 Я в ВК https://vk.com/utopia_show Я в Инстаграм https://www.instagram.com/topatella Жизнь ютуб https://vk.com/zhyou Материалы: https://arxiv.org/ftp/arxiv/papers/1706/1706.03259.pdf http://www.natureworldnews.com/articles/38435/20170614/wowsignaldebunkedmysterioussignalwaslikelyaradioemissionfromacometandnotfromaliens.htm https://www.theguardian.com/science/acrosstheuniverse/2016/apr/14/alienwowsignalcouldbeexplainedafteralmost40years Решена 40летняя загадка странного… 
Astrônomos encontram, pela primeira vez, dois buracos negros supermassivos orbitando um ao outro 
Em uma grande descoberta, astrônomos observaram um par de buracos negros supermassivos orbitando um ao outro, a centenas de milhões de anosluz de distância. A descoberta é o resultado de mais de duas décadas de trabalho, e um feito incrível considerando as medições precisas necessárias. Compreender a natureza de tais interações nos dará uma maior compreensão de como as galáxias e o universo, evoluíram. "Durante muito tempo, temos olhado para o espaço para tentar encontrar um par destes buracos negros supermassivos orbitando como resultado de duas galáxias em fusão", diz Greg Taylor, um dos pesquisadores da Universidade do Novo México (UNM). "Mesmo que nós tenhamos teorizado que isso deve estar acontecendo, nunca ninguém tinha visto até agora." A equipe observou o par de buracos negros em uma galáxia, chamado 0402 + 379, cerca de 750 milhões de anos luz da Terra. De acordo com Karishma Bansal, o primeiro autor do artigo, também da UNM, a massa combinada destes buracos negros supermassivos é de cerca de 15 bilhões de vezes maior do que o nosso Sol, e seu período orbital é de cerca de 24.000 anos. Isto significa que mesmo que a equipe tenha observado esses buracos negros há mais de uma década, eles não foram capazes de detectar até mesmo a menor curvatura em sua órbita. "Se você imaginar um caracol no planeta recémdescoberto orbitando Proxima Centauri  4.243 anosluz de distância  se movendo em 1cm [0,4 polegadas] por segundo, é o movimento angular que estamos tratando aqui", explica Roger W. Romani, um dos pesquisadores da Universidade de Stanford. Os buracos negros são notoriamente difíceis de estudar porque não podem ser observados diretamente, mas só podem ser detectados a partir de seu efeito sobre a matéria nas proximidades. Assim, para encontrar a órbita desses buracos negros, a equipe UNM usou o Very Long Baseline Array (VLBA), que é composto de 10 radiotelescópios. Ao medir as várias frequências de sinais de rádio emitidas pelos buracos negros, a equipe foi então capaz de traçar sua trajetória. "Quando o Dr. Taylor me deu esses dados, eu estava no início de aprender a imagem e compreendêla", disse Bansal . "E, como eu aprendi nos dados que remontam a 2003, nós traçamos isso e determinamos que eles estão orbitando um ao outro. É muito emocionante." A realização técnica desta descoberta é um triunfo e irá melhorar muito a nossa compreensão desses objetos enigmáticos. Desde a teoria da relatividade geral de Einstein, os astrônomos se fascinaram pelos buracos negros supermassivos. Recentemente, houveram várias novas descobertas sobre buracos negros, mas ainda não conhecemos muito sobre eles. Continuar a observar a órbita e interação desses buracos negros irá revelar muito sobre onde nossa galáxia veio, qual o seu destino no futuro e o papel que os buracos negros desempenham neste processo. Atualmente, a galáxia de Andrômeda, que também contém um buraco negro supermassivo, é projetado para colidir com a nossa Via Láctea  tornando o evento que a equipe UNM está observando o potencial futuro da nossa galáxia em alguns bilhões de anos. "Os buracos negros supermassivos têm muita influência sobre as estrelas em torno deles e o crescimento e evolução da galáxia", diz Taylor. "Então, entender mais sobre eles e o que acontece quando eles se fundem uns com os outros pode ser importante para a nossa compreensão do universo." A equipe UNM vai voltarse para esses buracos negros em poucos anos para confirmar observações e melhorar suas projeções em torno de órbitas e trajetórias. Por agora, podemos apreciar o fato de que eles finalmente se mostraram em uma observação direta pela primeira vez e sem dúvida irão inspirar outros trabalhos pela frente no mundo científico mais amplo. O artigo foi publicado no The Astrophysical Journal com uma versão préimpressão disponível no arXiv. 
Grasp Pose Detection in Point Clouds. (arXiv:1706.09911v1 [cs.RO]) 
Authors: Andreas ten Pas, Marcus Gualtieri, Kate Saenko, Robert Platt Recently, a number of grasp detection methods have been proposed that can be used to localize robotic grasp configurations directly from sensor data without estimating object pose. The underlying idea is to treat grasp perception analogously to object detection in computer vision. These methods take as input a noisy and partially occluded RGBD image or point cloud and produce as output pose estimates of viable grasps, without assuming a known CAD model of the object. Although these methods generalize grasp knowledge to new objects well, they have not yet been demonstrated to be reliable enough for wide use. Many grasp detection methods achieve grasp success rates (grasp successes as a fraction of the total number of grasp attempts) between 75% and 95% for novel objects presented in isolation or in light clutter. Not only are these success rates too low for practical grasping applications, but the light clutter scenarios that are evaluated often do not reflect the realities of real world grasping. This paper proposes a number of innovations that together result in a significant improvement in grasp detection performance. The specific improvement in performance due to each of our contributions is quantitatively measured either in simulation or on robotic hardware. Ultimately, we report a series of robotic experiments that average a 93% endtoend grasp success rate for novel objects presented in dense clutter. 
Graph Convolutional Networks for Molecules. (arXiv:1706.09916v1 [cs.LG]) 
Authors: Zhenpeng Zhou Representation learning for molecules is important for molecular properties prediction, material design, drug screening, etc. In this work a graph convolutional network architecture for learning representations for molecules is presented. An operation for convolving kneighbourhood of a specific node in graph is defined, which is corresponding to kernel size of k in convolutional neural networks. Besides, A module of adaptive filtering is defined to find the sampling locations based on graph connections and node features. 
User Activity Detection in Massive Random Access: Compressed Sensing vs. Coded Slotted ALOHA. (arXiv:1706.09918v1 [cs.IT]) 
Authors: Veljko Boljanovic, Dejan Vukobratovic, Petar Popovski, Cedomir Stefanovic Machinetype communication services in mobile cel lular systems are currently evolving with an aim to efficiently address a massivescale user access to the system. One of the key problems in this respect is to efficiently identify active users in order to allocate them resources for the subsequent transmissions. In this paper, we examine two recently suggested approaches for user activity detection: compressedsensing (CS) and coded slotted ALOHA (CSA), and provide their comparison in terms of performance vs resource utilization. Our preliminary results show that CSbased approach is able to provide the target user activity detection performance with less overall system resource utilization. However, this comes at a price of lower energy efficiency per user, as compared to CSAbased approach. 
Achieving Spectrum Efficient Communication Under CrossTechnology Interference. (arXiv:1706.09922v1 [cs.NI]) 
Authors: Shuai Wang, Zhimeng Yin, Song Min Kim, Tian He In wireless communication, heterogeneous technologies such as WiFi, ZigBee and BlueTooth operate in the same ISM band.With the exponential growth in the number of wireless devices, the ISM band becomes more and more crowded. These heterogeneous devices have to compete with each other to access spectrum resources, generating crosstechnology interference (CTI). Since CTI may destroy wireless communication, this field is facing an urgent and challenging need to investigate spectrum efficiency under CTI. In this paper, we introduce a novel framework to address this problem from two aspects. On the one hand, from the perspective of each communication technology itself, we propose novel channel/link models to capture the channel/link status under CTI. On the other hand, we investigate spectrum efficiency from the perspective by taking all heterogeneous technologies as a whole and building crosstechnology communication among them. The capability of direct communication among heterogeneous devices brings great opportunities to harmoniously sharing the spectrum with collaboration rather than competition. 
Harmonic State Space Modeling of a ThreePhase Modular Multilevel Converter. (arXiv:1706.09925v1 [cs.SY]) 
Authors: Jing Lyu, Marta Molinas, Xu Cai This paper presents the harmonic state space (HSS) modeling of a threephase modular multilevel converter (MMC). MMC is a converter system with a typical multifrequency response due to its significant harmonics in the arm currents, capacitor voltages, and control signals. These internal harmonic dynamics can have a great influence on the operation characteristics of MMC. However, the conventional modeling methods commonly used in twolevel voltagesource converters (VSCs), where only the fundamentalfrequency dynamic is considered, will lead to an inaccurate model that cannot accurately reflect the real dynamic characteristics of MMC. Therefore, the HSS modeling method, in which harmonics of state variables, inputs, and outputs are posed separately in a statespace form, is introduced in this paper to model the MMC in order to capture all the harmonics and the frequency couplings. The steadystate and smallsignal dynamic HSS models of a threephase MMC are developed, respectively. The validity of the developed HSS model of a threephase MMC has been verified by the results from both the nonlinear time domain simulation model in MATLAB/Simulink and the laboratory prototype with 12 submodules per arm. 
Irregular Repetition Slotted ALOHA over the Rayleigh Block Fading Channel with Capture. (arXiv:1706.09927v1 [cs.IT]) 
Authors: Federico Clazzer, Enrico Paolini, Iacopo Mambelli, Cedomir Stefanovic Random access protocols relying on the transmission of packet replicas in multiple slots and exploiting interference cancellation at the receiver have been shown to achieve per formance competitive with that of orthogonal schemes. So far the optimization of the repetition degree profile, defining the probability for a user to transmit a given number of replicas, has mainly been performed targeting the collision channel model. In this paper the analysis is extended to a block fading channel model, also assuming capture effect at the receiver. Density evolution equations are developed for the new setting and, based on them, some repetition degree profiles are optimized and analyzed via Monte Carlo simulation in a finite frame length setting. The derived distributions are shown to achieve throughputs largely exceeding 1 [packet/slot]. 
A PseudoBayesian Approach to SignComputeResolve Slotted ALOHA. (arXiv:1706.09930v1 [cs.IT]) 
Authors: Jasper Goseling, Cedomir Stefanovic, Petar Popovski Access reservation based on slotted ALOHA is commonly used in wireless cellular access. In this paper we investigate its enhancement based on the use of physicallayer network coding and signature coding, whose main feature is enabling simultaneous resolution of up to K users contending for access, where K >= 1. We optimise the slot access probability such that the expected throughput is maximised. In particular, the slot access probability is chosen in line with an estimate of the number of users in the system that is obtained relying on the pseudoBayesian approach by Rivest, which we generalise for the case that K > 1. Under the assumption that this estimate reflects the actual number of users, we show that our approach achieves throughput 1 in the limit of large K. 
Scalable AsymptoticallyOptimal MultiRobot Motion Planning. (arXiv:1706.09932v1 [cs.MA]) 
Authors: Andrew Dobson, Kiril Solovey, Rahul Shome, Dan Halperin, Kostas E. Bekris Finding asymptoticallyoptimal paths in multirobot motion planning problems could be achieved, in principle, using samplingbased planners in the composite configuration space of all of the robots in the space. The dimensionality of this space increases with the number of robots, rendering this approach impractical. This work focuses on a scalable samplingbased planner for coupled multirobot problems that provides asymptotic optimality. It extends the dRRT approach, which proposed building roadmaps for each robot and searching an implicit roadmap in the composite configuration space. This work presents a new method, dRRT* , and develops theory for scalable convergence to optimal paths in multirobot problems. Simulated experiments indicate dRRT* converges to highquality paths while scaling to higher numbers of robots where the naive approach fails. Furthermore, dRRT* is applicable to highdimensional problems, such as planning for robot manipulators 
Robust Detection in LeakProne Population Protocols. (arXiv:1706.09937v1 [cs.DS]) 
Authors: Dan Alistarh, Bartłomiej Dudek, Adrian Kosowski, David Soloveichik, Przemysław Uznański In contrast to electronic computation, chemical computation is noisy and susceptible to a variety of sources of error, which has prevented the construction of robust complex systems. To be effective, chemical algorithms must be designed with an appropriate error model in mind. Here we consider the model of chemical reaction networks that preserve molecular count (population protocols), and ask whether computation can be made robust to a natural model of unintended "leak" reactions. Our definition of leak is motivated by both the particular spurious behavior seen when implementing chemical reaction networks with DNA strand displacement cascades, as well as the unavoidable side reactions in any implementation due to the basic laws of chemistry. We develop a new "Robust Detection" algorithm for the problem of fast (logarithmic time) single molecule detection, and prove that it is robust to this general model of leaks. Besides potential applications in single molecule detection, the errorcorrection ideas developed here might enable a new class of robustbydesign chemical algorithms. Our analysis is based on a nonstandard hybrid argument, combining ideas from discrete analysis of population protocols with classic Markov chain techniques. 
Community Detection on Euclidean Random Graphs. (arXiv:1706.09942v1 [math.PR]) 
Authors: Abishek Sankararaman, Francois Baccelli Motivated by applications in online social networks, we introduce and study the problem of Community Detection on a new class of sparse \emph{spatial} random graphs embedded in Euclidean space. Our random graph is the plantedpartition version of the classical random connection model studied in Stochastic Geometry. Roughly speaking, each node of our graph has an uniform i.i.d. $\{1,+1\}$ valued community label and a $\mathbb{R}^d$ valued location label given by the support of a homogeneous Poisson point process of intensity $\lambda$. Conditional on the labels, edges are drawn independently at random depending both on the Euclidean distance between the nodes and community labels on the nodes. The Community Detection problem consists in estimating the partition of nodes into communities, based on an observation of the random graph along with the spatial location labels on nodes. We show that for $d=1$, Community Detection is impossible for any parameters. For $d \geq 2$, we establish a phasetransition for this problem, based on the intensity $\lambda$ of the point process. We show that if the intensity $\lambda$ is small, then no algorithm for community detection can beat a random guess for the partitions. We show this by introducing and analyzing a new problem which we call `Information Flow from Infinity'. On the positive side, we give a novel algorithm that performs Community Detection as long as the intensity $\lambda$ is larger than a sufficiently high constant. Along the way, we establish a \emph{distinguishability} result which says one can always efficiently infer the existence of a partition given the graph and spatial locations even when one cannot identify the partition better than at random. This is a surprising new phenomenon not observed thus far in any nonspatial Erd\H{o}sR\'enyi based plantedpartition graph models. 
Minimizing Data Distortion of Periodically Reporting IoT Devices with Energy Harvesting. (arXiv:1706.09943v1 [cs.IT]) 
Authors: Chiara Pielli, Cedomir Stefanovic, Petar Popovski, Michele Zorzi Energy harvesting is a promising technology for the Internet of Things (IoT) towards the goal of selfsustainability of the involved devices. However, the intermittent and unreliable nature of the harvested energy demands an intelligent management of devices' operation in order to ensure a sustained performance of the IoT application. In this work, we address the problem of maximizing the quality of the reported data under the constraints of energy harvesting, energy consumption and communication channel impairments. Specifically, we propose an energyaware joint sourcechannel coding scheme that minimizes the expected data distortion, for realistic models of energy generation and of the energy spent by the device to process the data, when the communication is performed over a Rayleigh fading channel. The performance of the scheme is optimized by means of a Markov Decision Process framework. 
Reliable and Efficient Access for Alarminitiated and Regular M2M Traffic in IEEE 802.11ah Systems. (arXiv:1706.09948v1 [cs.IT]) 
Authors: German Corrales Madueno, Cedomir Stefanovic, Petar Popovski EEE 802.11ah is a novel WiFibased protocol, aiming to provide an access solution for the machinetomachine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M reporting regimes, which are periodic, ondemand We show that it is possible to both efficiently and reliably resolve all reporting stations in the cell, within the limits of the allowed deadlines. As a side result, we also provide a rationale for modeling the interarrival time in alarm events by using the Beta distribution, a model that is considered in the 3GPP standardization. 
Efficient, HighQuality Stack Rearrangement. (arXiv:1706.09949v1 [cs.RO]) 
Authors: Shuai D. Han, Nicholas M. Stiffler, Kostas E. Bekris, Jingjin Yu This work studies rearrangement problems involving the sorting of robots or objects in stacklike containers, which can be accessed only from one side. Two scenarios are considered: one where every robot or object needs to reach a particular stack, and a setting in which each robot has a distinct position within a stack. In both cases, the goal is to minimize the number of stack removals that need to be performed. Stack rearrangement is shown to be intimately connected to pebble motion problems, a useful abstraction in multirobot path planning. Through this connection, feasibility of stack rearrangement can be readily addressed. The paper continues to establish lower and upper bounds on optimality, which differ only by a logarithmic factor, in terms of stack removals. An algorithmic solution is then developed that produces suboptimal paths much quicker than a pebble motion solver. Furthermore, informed searchbased methods are proposed for finding highquality solutions. The efficiency and desirable scalability of the methods is demonstrated in simulation. 
Fast Processing of Large Graph Applications Using Asynchronous Architecture. (arXiv:1706.09953v1 [cs.AR]) 
Authors: Michel A. Kinsy, Rashmi S. Agrawal, Hien D. Nguyen Graph algorithms and techniques are increasingly being used in scientific and commercial applications to express relations and explore large data sets. Although conventional or commodity computer architectures, like CPU or GPU, can compute fairly well dense graph algorithms, they are often inadequate in processing large sparse graph applications. Memory access patterns, memory bandwidth requirements and onchip network communications in these applications do not fit in the conventional program execution flow. In this work, we propose and design a new architecture for fast processing of large graph applications. To leverage the lack of the spatial and temporal localities in these applications and to support scalable computational models, we design the architecture around two key concepts. (1) The architecture is a multicore processor of independently clocked processing elements. These elements communicate in a selftimed manner and use handshaking to perform synchronization, communication, and sequencing of operations. By being asynchronous, the operating speed at each processing element is determined by actual local latencies rather than global worstcase latencies. We create a specialized ISA to support these operations. (2) The application compilation and mapping process uses a graph clustering algorithm to optimize parallel computing of graph operations and load balancing. Through the clustering process, we make scalability an inherent property of the architecture where tasktoelement mapping can be done at the graph node level or at node cluster level. A prototyped version of the architecture outperforms a comparable CPU by 10~20x across all benchmarks and provides 2~5x better power efficiency when compared to a GPU. 
On Conceptually Simple Algorithms for Variants of Online Bipartite Matching. (arXiv:1706.09966v1 [cs.DS]) 
Authors: Allan Borodin, Denis Pankratov, Amirali SalehiAbari We present a series of results regarding conceptually simple algorithms for bipartite matching in various online and related models. We first consider a deterministic adversarial model. The best approximation ratio possible for a onepass deterministic online algorithm is $1/2$, which is achieved by any greedy algorithm. D\"urr et al. recently presented a $2$pass algorithm called CategoryAdvice that achieves approximation ratio $3/5$. We extend their algorithm to multiple passes. We prove the exact approximation ratio for the $k$pass CategoryAdvice algorithm for all $k \ge 1$, and show that the approximation ratio converges to the inverse of the golden ratio $2/(1+\sqrt{5}) \approx 0.618$ as $k$ goes to infinity. The convergence is extremely fast  the $5$pass CategoryAdvice algorithm is already within $0.01\%$ of the inverse of the golden ratio. We then consider a natural greedy algorithm in the online stochastic IID modelMinDegree. This algorithm is an online version of a wellknown and extensively studied offline algorithm MinGreedy. We show that MinDegree cannot achieve an approximation ratio better than $11/e$, which is guaranteed by any consistent greedy algorithm in the known IID model. Finally, following the work in Besser and Poloczek, we depart from an adversarial or stochastic ordering and investigate a natural randomized algorithm (MinRanking) in the priority model. Although the priority model allows the algorithm to choose the input ordering in a general but well defined way, this natural algorithm cannot obtain the approximation of the Ranking algorithm in the ROM model. 
The Authority of "Fair" in Machine Learning. (arXiv:1706.09976v1 [cs.CY]) 
Authors: Michael Skirpan, Micha Gorelick In this paper, we argue for the adoption of a normative definition of fairness within the machine learning community. After characterizing this definition, we review the current literature of Fair ML in light of its implications. We end by suggesting ways to incorporate a broader community and generate further debate around how to decide what is fair in ML. 
Phase Retrieval via Randomized Kaczmarz: Theoretical Guarantees. (arXiv:1706.09993v1 [math.NA]) 
Authors: Yan Shuo Tan, Roman Vershynin We consider the problem of phase retrieval, i.e. that of solving systems of quadratic equations. A simple variant of randomized Kaczmarz method was recently proposed for phase retrieval, and it was shown numerically to have a computational edge over stateoftheart Wirtinger flow methods. In this paper, we provide the first theoretical guarantee for the convergence of the randomized Kacmarz method for phase retrieval. We show that it is sufficient to have as many gaussian measurements as the dimension, up to a constant factor. Along the way, we introduce a sufficient condition on measurement sets for which the randomized Kaczmarz method is guaranteed to work. We show that gaussian measurements satisfy this property with high probability; this is proved using a chaining argument coupled with bounds on VC dimension and metric entropy. 
Canonical form of linear subspaces and coding invariants: the poset metric point of view. (arXiv:1706.09996v1 [cs.IT]) 
Authors: Jerry Anderson Pinheiro, Marcelo Firer In this work we introduce the concept of a subspace decomposition, subject to a partition of the coordinates. Considering metrics determined by partial orders in the set of coordinates, the so called poset metrics, we show the existence of maximal decompositions according to the metric. These decompositions turns to be an important tool to obtain the canonical form for codes over any poset metrics and to obtain bounds for important invariants such as the packing radius of a linear subspace. Furthermore, using maximal decompositions, we are able to reduce and optimize the full lookup table algorithm for the syndrome decoding process. 
Tight Load Balancing via Randomized Local Search. (arXiv:1706.09997v1 [cs.DC]) 
Authors: Petra Berenbrink, Peter Kling, Christopher Liaw, Abbas Mehrabian We consider the following ballsintobins process with $n$ bins and $m$ balls: each ball is equipped with a mutually independent exponential clock of rate 1. Whenever a ball's clock rings, the ball samples a random bin and moves there if the number of balls in the sampled bin is smaller than in its current bin. This simple process models a typical load balancing problem where users (balls) seek a selfish improvement of their assignment to resources (bins). From a game theoretic perspective, this is a randomized approach to the wellknown KoutsoupiasPapadimitriou model, while it is known as randomized local search (RLS) in load balancing literature. Up to now, the best bound on the expected time to reach perfect balance was $O\left({(\ln n)}^2+\ln(n)\cdot n^2/m\right)$ due to Ganesh, Lilienthal, Manjunath, Proutiere, and Simatos (Load balancing via random local search in closed and open systems, Queueing Systems, 2012). We improve this to an asymptotically tight $O\left(\ln(n)+n^2/m\right)$. Our analysis is based on the crucial observation that performing "destructive moves" (reversals of RLS moves) cannot decrease the balancing time. This allows us to simplify problem instances and to ignore "inconvenient moves" in the analysis. 
Hypothesis Testing For Densities and HighDimensional Multinomials: Sharp Local Minimax Rates. (arXiv:1706.10003v1 [math.ST]) 
Authors: Sivaraman Balakrishnan, Larry Wasserman We consider the goodnessoffit testing problem of distinguishing whether the data are drawn from a specified distribution, versus a composite alternative separated from the null in the total variation metric. In the discrete case, we consider goodnessoffit testing when the null distribution has a possibly growing or unbounded number of categories. In the continuous case, we consider testing a Lipschitz density, with possibly unbounded support, in the lowsmoothness regime where the Lipschitz parameter is not assumed to be constant. In contrast to existing results, we show that the minimax rate and critical testing radius in these settings depend strongly, and in a precise way, on the null distribution being tested and this motivates the study of the (local) minimax rate as a function of the null distribution. For multinomials the local minimax rate was recently studied in the work of Valiant and Valiant. We revisit and extend their results and develop two modifications to the chisquared test whose performance we characterize. For testing Lipschitz densities, we show that the usual binning tests are inadequate in the lowsmoothness regime and we design a spatially adaptive partitioning scheme that forms the basis for our locally minimax optimal tests. Furthermore, we provide the first local minimax lower bounds for this problem which yield a sharp characterization of the dependence of the critical radius on the null hypothesis being tested. In the lowsmoothness regime we also provide adaptive tests, that adapt to the unknown smoothness parameter. We illustrate our results with a variety of simulations that demonstrate the practical utility of our proposed tests. 
Automated Audio Captioning with Recurrent Neural Networks. (arXiv:1706.10006v1 [cs.SD]) 
Authors: Konstantinos Drossos, Sharath Adavanne, Tuomas Virtanen We present the first approach to automated audio captioning. We employ an encoderdecoder scheme with an alignment model in between. The input to the encoder is a sequence of log melband energies calculated from an audio file, while the output is a sequence of words, i.e. a caption. The encoder is a multilayered, bidirectional gated recurrent unit (GRU) and the decoder a multilayered GRU with a classification layer connected to the last GRU of the decoder. The classification layer and the alignment model are fully connected layers with shared weights between timesteps. The proposed method is evaluated using data drawn from a commercial sound effects library, ProSound Effects. The resulting captions were rated through metrics utilized in machine translation and image captioning fields. Results from metrics show that the proposed method can predict words appearing in the original caption, but not always correctly ordered. 
Pricing Identical Items. (arXiv:1706.10009v1 [cs.GT]) 
Authors: Alon Eden, Tomer Ezra, Michal Feldman Social goods are goods that grant value not only to their owners but also to the owners' surroundings, be it their families, friends or office mates. The benefit a nonowner derives from the good is affected by many factors, including the type of the good, its availability, and the social status of the nonowner. Depending on the magnitude of the benefit and on the price of the good, a potential buyer might stay away from purchasing the good, hoping to free ride on others' purchases. A revenuemaximizing seller who sells social goods must take these considerations into account when setting prices for the good. The literature on optimal pricing has advanced considerably over the last decade, but little is known about optimal pricing schemes for selling social goods. In this paper, we conduct a systematic study of revenuemaximizing pricing schemes for social goods: we introduce a Bayesian model for this scenario, and devise nearlyoptimal pricing schemes for various types of externalities, both for simultaneous sales and for sequential sales. 
FineGrained Reliability for V2V Communications around Suburban and Urban Intersections. (arXiv:1706.10011v1 [cs.IT]) 
Authors: Mouhamed Abdulla, Henk Wymeersch Safe transportation is a key usecase of the 5G/LTE Rel.15+ communications, where an endtoend reliability of 0.99999 is expected for a vehicletovehicle (V2V) transmission distance of 100200 m. Since communications reliability is related to roadsafety, it is crucial to verify the fulfillment of the performance, especially for accidentprone areas such as intersections. We derive closedform expressions for the V2V transmission reliability near suburban corners and urban intersections over finite interference regions. The analysis is based on plausible street configurations, traffic scenarios, and empiricallysupported channel propagation. We show the means by which the performance metric can serve as a preliminary design tool to meet a target reliability. We then apply meta distribution concepts to provide a careful dissection of V2V communications reliability. Contrary to existing work on infinite roads, when we consider finite road segments for practical deployment, finegrained reliability per realization exhibits bimodal behavior. Either performance for a certain vehicular traffic scenario is very reliable or extremely unreliable, but nowhere in relatively proximity to the average performance. In other words, standard SINRbased average performance metrics are analytically accurate but can be insufficient from a practical viewpoint. Investigating other safetycritical point process networks at the meta distributionlevel may reveal similar discrepancies. 
Improvement of training set structure in fusion data cleaning using TimeDomain Global Similarity method. (arXiv:1706.10018v1 [cs.LG]) 
Authors: Jian Liu, Ting Lan, Hong Qin Traditional data cleaning identifies dirty data by classifying original data sequences, which is a class$$imbalanced problem since the proportion of incorrect data is much less than the proportion of correct ones for most diagnostic systems in Magnetic Confinement Fusion (MCF) devices. When using machine learning algorithms to classify diagnostic data based on class$$imbalanced training set, most classifiers are biased towards the major class and show very poor classification rates on the minor class. By transforming the direct classification problem about original data sequences into a classification problem about the physical similarity between data sequences, the class$$balanced effect of Time$$Domain Global Similarity (TDGS) method on training set structure is investigated in this paper. Meanwhile, the impact of improved training set structure on data cleaning performance of TDGS method is demonstrated with an application example in EAST POlarimetry$$INTerferometry (POINT) system. 
Preferencebased performance measures for Time$$Domain Global Similarity method. (arXiv:1706.10020v1 [cs.LG]) 
Authors: Ting Lan, Jian Liu, Hong Qin For TimeDomain Global Similarity (TDGS) method, which transforms the data cleaning problem into a binary classification problem about the physical similarity between channels, directly adopting common performance measures could only guarantee the performance for physical similarity. Nevertheless, practical data cleaning tasks have preferences for the correctness of original data sequences. To obtain the general expressions of performance measures based on the preferences of tasks, the mapping relations between performance of TDGS method about physical similarity and correctness of data sequences are investigated by probability theory in this paper. Performance measures for TDGS method in several common data cleaning tasks are set. Cases when these preferencebased performance measures could be simplified are introduced. 
$\mathcal{P}$schemes and Deterministic Polynomial Factoring over Finite Fields. (arXiv:1706.10028v1 [cs.CC]) 
Authors: Zeyu Guo We introduce a family of mathematical objects called $\mathcal{P}$schemes, where $\mathcal{P}$ is a poset of subgroups of a finite group $G$. A $\mathcal{P}$scheme is a collection of partitions of the right coset spaces $H\backslash G$, indexed by $H\in\mathcal{P}$, that satisfies a list of axioms. These objects generalize the classical notion of association schemes as well as the notion of $m$schemes (Ivanyos et al. 2009). Based on $\mathcal{P}$schemes, we develop a unifying framework for the problem of deterministic factoring of univariate polynomials over finite fields under the generalized Riemann hypothesis (GRH). 
On the Solution of Linear Programming Problems in the Age of Big Data. (arXiv:1706.10030v1 [cs.DS]) 
Authors: Irina Sokolinskaya, Leonid B. Sokolinsky The Big Data phenomenon has spawned largescale linear programming problems. In many cases, these problems are nonstationary. In this paper, we describe a new scalable algorithm called NSLP for solving highdimensional, nonstationary linear programming problems on modern cluster computing systems. The algorithm consists of two phases: Quest and Targeting. The Quest phase calculates a solution of the system of inequalities defining the constraint system of the linear programming problem under the condition of dynamic changes in input data. To this end, the apparatus of Fejer mappings is used. The Targeting phase forms a special system of points having the shape of an ndimensional axisymmetric cross. The cross moves in the ndimensional space in such a way that the solution of the linear programming problem is located all the time in an "vicinity of the central point of the cross. 
Neural Sequence Model Training via $\alpha$divergence Minimization. (arXiv:1706.10031v1 [stat.ML]) 
Authors: Sotetsu Koyamada, Yuta Kikuchi, Atsunori Kanemura, Shinichi Maeda, Shin Ishii We propose a new neural sequence model training method in which the objective function is defined by $\alpha$divergence. We demonstrate that the objective function generalizes the maximumlikelihood (ML)based and reinforcement learning (RL)based objective functions as special cases (i.e., ML corresponds to $\alpha \to 0$ and RL to $\alpha \to1$). We also show that the gradient of the objective function can be considered a mixture of ML and RLbased objective gradients. The experimental results of a machine translation task show that minimizing the objective function with $\alpha > 0$ outperforms $\alpha \to 0$, which corresponds to MLbased methods. 
Investigating the potential of social network data for transport demand models. (arXiv:1706.10035v1 [cs.SI]) 
Authors: Michael A.B. van Eggermond, Haohui Chen, Alexander Erath, Manuel Cebrian Locationbased social network data offers the promise of collecting the data from a large base of users over a longer span of time at negligible cost. While several studies have applied social network data to activity and mobility analysis, a comparison with travel diaries and general statistics has been lacking. In this paper, we analysed georeferenced Twitter activities from a large number of users in Singapore and neighbouring countries. By combining this data, population statistics and travel diaries and applying clustering techniques, we addressed detection of activity locations, as well as spatial separation and transitions between these locations. Kernel density estimation performs best to detect activity locations due to the scattered nature of the twitter data; more activity locations are detected per user than reported in the travel survey. The descriptive analysis shows that determining home locations is more difficult than detecting work locations for most planning zones. Spatial separations between detected activity locations from Twitter data  as reported in a travel survey and captured by public transport smart card data  are mostly similarly distributed, but also show relevant differences for very short and very long distances. This also holds for the transitions between zones. Whether the differences between Twitter data and other data sources stem from differences in the population subsample, clustering methodology, or whether social networks are being used significantly more at specific locations must be determined by further research. Despite these shortcomings, locationbased social network data offers a promising data source for insights into activity locations and mobility patterns, especially for regions where travel survey data is not readily available. 
Providing Effective Realtime Feedback in Simulationbased Surgical Training. (arXiv:1706.10036v1 [cs.AI]) 
Authors: Xingjun Ma, Sudanthi Wijewickrema, Yun Zhou, Shuo Zhou, Stephen O'Leary, James Bailey Virtual reality simulation is becoming popular as a training platform in surgical education. However, one important aspect of simulationbased surgical training that has not received much attention is the provision of automated realtime performance feedback to support the learning process. Performance feedback is actionable advice that improves novice behaviour. In simulation, automated feedback is typically extracted from prediction models trained using data mining techniques. Existing techniques suffer from either low effectiveness or low efficiency resulting in their inability to be used in realtime. In this paper, we propose a random forest based method that finds a balance between effectiveness and efficiency. Experimental results in a temporal bone surgery simulation show that the proposed method is able to extract highly effective feedback at a high level of efficiency. 
A solution for secure use of Kibana and Elasticsearch in multiuser environment. (arXiv:1706.10040v1 [cs.CR]) 
Authors: Wataru Takase, Tomoaki Nakamura, Yoshiyuki Watase, Takashi Sasaki Monitoring is indispensable to check status, activities, or resource usage of IT services. A combination of Kibana and Elasticsearch is used for monitoring in many places such as KEK, CCIN2P3, CERN, and also nonHEP communities. Kibana provides a web interface for rich visualization, and Elasticsearch is a scalable distributed search engine. However, these tools do not support authentication and authorization features by default. In the case of single Kibana and Elasticsearch services shared among many users, any user who can access Kibana can retrieve other's information from Elasticsearch. In multiuser environment, in order to protect own data from others or share part of data among a group, finegrained access control is necessary. The CERN cloud service group had provided cloud utilization dashboard to each user by Elasticsearch and Kibana. They had deployed a homemade Elasticsearch plugin to restrict data access based on a user authenticated by the CERN Single Sign On system. It enabled each user to have a separated Kibana dashboard for cloud usage, and the user could not access to other's one. Based on the solution, we propose an alternative one which enables user/group based Elasticsearch access control and Kibana objects separation. It is more flexible and can be applied to not only the cloud service but also the other various situations. We confirmed our solution works fine in CCIN2P3. Moreover, a preproduction platform for CCIN2P3 has been under construction. We will describe our solution for the secure use of Kibana and Elasticsearch including integration of Kerberos authentication, development of a Kibana plugin which allows Kibana objects to be separated based on user/group, and contribution to Search Guard which is an Elasticsearch plugin enabling user/group based access control. We will also describe the effect on performance from using Search Guard. 
Hamiltonicity is Hard in Thin or Polygonal Grid Graphs, but Easy in Thin Polygonal Grid Graphs. (arXiv:1706.10046v1 [cs.CC]) 
Authors: Erik D. Demaine, Mikhail Rudoy In 2007, Arkin et al. initiated a systematic study of the complexity of the Hamiltonian cycle problem on square, triangular, or hexagonal grid graphs, restricted to polygonal, thin, superthin, degreebounded, or solid grid graphs. They solved many combinations of these problems, proving them either polynomially solvable or NPcomplete, but left three combinations open. In this paper, we prove two of these unsolved combinations to be NPcomplete: Hamiltonicity of Square Polygonal Grid Graphs and Hamiltonicity of Hexagonal Thin Grid Graphs. We also consider a new restriction, where the grid graph is both thin and polygonal, and prove that Hamiltonicity then becomes polynomially solvable for square, triangular, and hexagonal grid graphs. 
Power domination in maximal planar graphs. (arXiv:1706.10047v1 [cs.DM]) 
Authors: Paul Dorbec (LaBRI), Antonio González, Claire Pennarun (LaBRI) Power domination in graphs emerged from the problem of monitoring an electrical system by placing as few measurement devices in the system as possible. It corresponds to a variant of domination that includes the possibility of propagation. For measurement devices placed on a set S of vertices of a graph G, the set of monitored vertices is initially the set S together with all its neighbors. Then iteratively, whenever some monitored vertex v has a single neighbor u not yet monitored, u gets monitored. A set S is said to be a power dominating set of the graph G if all vertices of G eventually are monitored. The power domination number of a graph is the minimum size of a power dominating set. In this paper, we prove that any maximal planar graph of order n $\ge$ 6 admits a power dominating set of size at most (n2)/4 . 
Distributionbased bisimulation for labelled Markov processes. (arXiv:1706.10049v1 [cs.LO]) 
Authors: Pengfei Yang, David N. Jansen, Lijun Zhang In this paper we propose a (sub)distributionbased bisimulation for labelled Markov processes and compare it with earlier definitions of state and event bisimulation, which both only compare states. In contrast to those statebased bisimulations, our distribution bisimulation is weaker, but corresponds more closely to linear properties. We construct a logic and a metric to describe our distribution bisimulation and discuss linearity, continuity and compositional properties. 
The application of data mining techniques to support customer relationship management: the case of ethiopian revenue and customs authority. (arXiv:1706.10050v1 [cs.CY]) 
Authors: Belete Biazen Bezabeh The application of data mining technique has been widely applied in different business areas such as health, education and finance for the purpose of data analysis and then to support and maximizes the organizations customer satisfaction in an effort to increase loyalty and retain customers business over their lifetimes . The researchers primary objective, in this paper is to classify customers based on their common attributes since customer grouping is the main part of customer relationship management. In this study, different characteristics of the ERCA customers data were collected from the customs database called ASYCUDA. Once the customers data were collected, the necessary data preparation steps were conducted on it and finally a data set consisting of 46748 records was attained. The classification modeling was built by using J48 decision tree and multi layer perceptron ANN algorithms with 10fold crossvalidation and splitting (70% training and 30% testing) techniques. Among these models, a model which was built using J48 decision tree algorithm with default 10fold crossvalidation outperforms 99.95% of overall accuracy rate; while the classification accuracy of ANN is 99.71%. So decision tree has better accuracy than ANN for classifying ERCA customers data. 
A Deep Reinforcement Learning Framework for the Financial Portfolio Management Problem. (arXiv:1706.10059v1 [cs.AI]) 
Authors: Zhengyao Jiang, Dixing Xu, Jinjun Liang Financial portfolio management is the process of constant redistribution of a fund into different financial products. This paper presents a financialmodelfree Reinforcement Learning framework to provide a deep machine learning solution to the portfolio management problem. The framework consists of the Ensemble of Identical Independent Evaluators (EIIE) topology, a PortfolioVector Memory (PVM), an Online Stochastic Batch Learning (OSBL) scheme, and a fully exploiting and explicit reward function. This framework is realized in three instants in this work with a Convolutional Neural Network (CNN), a basic Recurrent Neural Network (RNN), and a Long ShortTerm Memory (LSTM). They are, along with a number of recently reviewed or published portfolioselection strategies, examined in three backtest experiments with a trading period of 30 minutes in a cryptocurrency market. Cryptocurrencies are electronic and decentralized alternatives to governmentissued money, with Bitcoin as the bestknown example of a cryptocurrency. All three instances of the framework monopolize the top three positions in all experiments, outdistancing other compared trading algorithms. Although with a high commission rate of 0.25% in the backtests, the framework is able to achieve at least 4fold returns in 30 days. 
Turned 70? It is time to start editing Wikipedia. (arXiv:1706.10060v1 [cs.HC]) 
Authors: Radoslaw Nielek, Marta Lutostanska, Wieslaw Kopec, Adam Wierzbicki Success of Wikipedia would not be possible without the contributions of millions of anonymous Internet users who edit articles, correct mistakes, add links or pictures. At the same time Wikipedia editors are currently overworked and there is always more tasks waiting to be completed than people willing to volunteer. The paper explores the possibility of involving the elderly in the Wikipedia editing process. Older adults were asked to complete various tasks on Wikipedia. Based on the observations made during these activities as well as indepth interviews, a list of recommendation has been crafted. It turned out that older adults are willing to contribute to Wikiepdia but substantial changes have to be made in the Wikipedia editor. 
Compaction of Church Numerals for HigherOrder Compression. (arXiv:1706.10061v1 [cs.DS]) 
Authors: Isamu Furuya, Takuya Kida We addressed the problem of compacting the Church numerals, which is useful for higherorder compression. We proposed a novel decomposition scheme for a natural number using tetration, which leads to the compact representation of $\lambda$terms equivalent to the Church numerals. For natural number $n$, we proved that the size of the lambda term obtained by our method is $O(({\text{slog}_{2} n})^{\log{n}/ \log{\log{n}}})$. We also quantitatively confirmed via experiments that in many cases, our method can produce shorter $\lambda$terms more than existing methods. 
Barankin Vector Locally Best Unbiased Estimates. (arXiv:1706.10062v1 [stat.ML]) 
Authors: Bruno CernuschiFrias The Barankin bound is generalized to the vector case in the mean square error sense. Necessary and sufficient conditions are obtained to achieve the lower bound. To obtain the result, a simple finite dimensional real vector valued generalization of the Riesz representation theorem for Hilbert spaces is given. The bound has the form of a linear matrix inequality where the covariances of any unbiased estimator, if these exist, are lower bounded by matrices depending only on the parametrized probability distributions. 
Emotions make cities live. Towards mapping emotions of older adults on urban space. (arXiv:1706.10063v1 [cs.CY]) 
Authors: Radoslaw Nielek, Miroslaw Ciastek, Wieslaw Kopec Understanding of interaction between people and urban spaces is crucial for inclusive decision making process. Smartphones and social media can be a rich source of behavioral and declarative data about urban space, but it threatens to exclude voice of older adults. The platform proposed in the paper attempts to address this issue. A universal tagging mechanism based on the Pluchik Wheel of Emotion is proposed. Usability of the platform was tested and prospect studies are proposed. 
semantify.it, a platform for creation, publication and distribution of semantic annotations. (arXiv:1706.10067v1 [cs.IR]) 
Authors: Elias Kärle, Umutcan Şimşek, Dieter Fensel The application of semantic technologies to content on the web is, in many regards, as important as urgent. Search engines, chatbots, intelligent personal assistants and other technologies increasingly rely on content published as semantic structured data. Yet the process of creating this kind of data is still complicated and the necessity of it is widely unknown. The semantify.it platform implements an approach to solve three of the most challenging question regarding the publication of structured semantic data, namely: a) what vocabulary to use, b) how to create annotation files and c) how to publish or integrate annotations within a website without programming. This paper presents the idea and the development of the semantify.it platform. It demonstrates, that the creation process of semantically annotated data must not be hard, shows use cases and pilot users of the created software and presents where the development of this platform or alike projects could go to in the future. 
Superpixelbased semantic segmentation trained by statistical process control. (arXiv:1706.10071v1 [cs.CV]) 
Authors: Hyojin Park, Jisoo Jeong, Youngjoon Yoo, Nojun Kwak Semantic segmentation, like other fields of computer vision, has seen a remarkable performance advance by the use of deep convolution neural networks. Many recent studies on this field upsample smaller feature maps into the original size of the image to label each pixel into one of semantic categories. However, considering that neighboring pixels are heavily dependent on each other, both learning and testing of these methods have a lot of redundant operations. To resolve this problem, the proposed network is trained and tested with only 0.37\% of total pixels by superpixelbased sampling and largely reduced the complexity of upsampling calculation. In doing so, scale and translation invariant features are constructed by making the hypercolumns using the feature maps obtained by pyramid module as well as the feature maps in convolution layers of the base network. Since the proposed method uses a very small number of sampled pixels, the endtoend learning of the entire network is difficult with a common learning rate for all the layers, which is caused by the small sampling ratio. In order to compensate for this, the learning rate after sampling is controlled by statistical process control (SPC) of gradients in each layer. The proposed method performs better than or equal to the conventional methods that use much more samples on Pascal Context, SUNRGBD dataset. 
On the Effects of Distributed Electric Vehicle Network Utility Maximization in Low Voltage Feeders. (arXiv:1706.10074v1 [cs.SY]) 
Authors: Jose Rivera, Hans Arno Jacobsen The fast charging of Electric Vehicles (EVs) in distribution networks requires realtime EV charging control to avoid the overloading of grid components. Recent studies have proposed congestion control protocols, which result from distributed optimization solutions of the Network Utility Maximization (NUM) problem. While the NUM formulation allows the definition of distributed computations with closed form solutions, its simple model does not account for many of the feeders operational constraints. This puts the resulting control algorithms effectiveness into question. In this paper, we investigate the impact of implementing such algorithms for congestion control in low voltage feeders. We review the latest NUM based algorithms for realtime EV charging control, and evaluate their behavior and impact on the comprehensive IEEE European Low Voltage Test Feeder. Our results show that the EV NUM problem can effectively capture the relevant operational constraints, as long as ampacity violations are the main bottleneck. Moreover, the results demonstrate an advantage of the primal NUM solution over the more conventional dual NUM solution in preventing a system overload. 
Chatbots as Conversational Recommender Systems in Urban Contexts. (arXiv:1706.10076v1 [cs.SI]) 
Authors: Pavel Kucherbaev, Achilleas Psyllidis, Alessandro Bozzon In this paper, we outline the vision of chatbots that facilitate the interaction between citizens and policymakers at the city scale. We report the results of a codesign session attended by more than 60 participants. We give an outlook of how some challenges associated with such chatbot systems could be addressed in the future. 
Novel Logical Method for Security Analysis of Electronic Payment Protocols. (arXiv:1706.10078v1 [cs.LO]) 
Authors: Yi Liu, Xingtong Liu, Lei Zhang, Jian Wang, Chaojing Tang Electronic payment protocols play a vital role in electronic commerce security, which is essential for secure operation of electronic commerce activities. Formal method is an effective way to verify the security of protocols. But current formal method lacks the description and analysis of timeliness in electronic payment protocols. In order to improve analysis ability, a novel approach to analyze security properties such as accountability, fairness and timeliness in electronic payment protocols is proposed in this paper. This approach extends an existing logical method by adding a concise time expression and analysis method. It enables to describe the event time, and extends the time characteristics of logical inference rules. We analyzed the Netbill protocol with the new approach and found that the fairness of the protocol is not satisfied, due to timeliness problem. The result illustrates the new approach is able to analyze the key properties of electronic payment protocols. Furthermore, the new approach can be introduced to analyze other time properties of cryptographic protocols. 
Persistence Diagrams with Linear Machine Learning Models. (arXiv:1706.10082v1 [math.AT]) 
Authors: Ippei Obayashi, Yasuaki Hiraoka Persistence diagrams have been widely recognized as a compact descriptor for characterizing multiscale topological features in data. When many datasets are available, statistical features embedded in those persistence diagrams can be extracted by applying machine learnings. In particular, the ability for explicitly analyzing the inverse in the original data space from those statistical features of persistence diagrams is significantly important for practical applications. In this paper, we propose a unified method for the inverse analysis by combining linear machine learning models with persistence images. The method is applied to point clouds and cubical sets, showing the ability of the statistical inverse analysis and its advantages. 
Tuning and optimization for a variety of manycore architectures without changing a single line of implementation code using the Alpaka library. (arXiv:1706.10086v1 [cs.DC]) 
Authors: Alexander Matthes, René Widera, Erik Zenker, Benjamin Worpitz, Axel Huebl, Michael Bussmann We present an analysis on optimizing performance of a single C++11 source code using the Alpaka hardware abstraction library. For this we use the general matrix multiplication (GEMM) algorithm in order to show that compilers can optimize Alpaka code effectively when tuning key parameters of the algorithm. We do not intend to rival existing, highly optimized DGEMM versions, but merely choose this example to prove that Alpaka allows for platformspecific tuning with a single source code. In addition we analyze the optimization potential available with vendorspecific compilers when confronted with the heavily templated abstractions of Alpaka. We specifically test the code for bleeding edge architectures such as Nvidia's Tesla P100, Intel's Knights Landing (KNL) and Haswell architecture as well as IBM's Power8 system. On some of these we are able to reach almost 50\% of the peak floating point operation performance using the aforementioned means. When adding compilerspecific #pragmas we are able to reach 5 TFLOPS/s on a P100 and over 1 TFLOPS/s on a KNL system. 
TimeSpace TradeOffs for LempelZiv Compressed Indexing. (arXiv:1706.10094v1 [cs.DS]) 
Authors: Philip Bille, Mikko Berggren Ettienne, Inge Li Gørtz, Hjalte Wedel Vildhøj Given a string $S$, the compressed indexing problem is to preprocess $S$ into a compressed representation that supports fast substring queries. The goal is to use little space relative to the compressed size of $S$ while supporting fast queries. We present a compressed index based on the LempelZiv 1977 compression scheme. Let $n$, and $z$ denote the size of the input string, and the compressed LZ77 string, respectively. We obtain the following timespace tradeoffs. Given a pattern string $P$ of length $m$, we can solve the problem in (i) $O(m + occ \log\log n)$ time using $O(z\log(n/z)\log\log z)$ space, or (ii) $O(m(1 + \frac{\log^\epsilon z}{\log(n/z)}) + occ(\log\log n + \log^\epsilon z))$ time using $O(z\log(n/z))$ space, for any $0 < \epsilon < 1$ In particular, (i) improves the leading term in the query time of the previous best solution from $O(m\lg m)$ to $O(m)$ at the cost of increasing the space by a factor $\log \log z$. Alternatively, (ii) matches the previous best space bound, but has a leading term in the query time of $O(m(1+\frac{\log^{\epsilon} z}{\log (n/z)}))$. However, for any polynomial compression ratio, i.e., $z = O(n^{1\delta})$, for constant $\delta > 0$, this becomes $O(m)$. Our index also supports extraction of any substring of length $\ell$ in $O(\ell + \lg(n/z))$ time. Technically, our results are obtained by novel extensions and combinations of existing data structures of independent interest, including a new batched variant of weak prefix search. 
Design Activism for Minimum Wage Crowd Work. (arXiv:1706.10097v1 [cs.HC]) 
Authors: Akash Mankar, Riddhi J. Shah, Matthew Lease Entrylevel crowd work is often reported to pay less than minimum wage. While this may be appropriate or even necessary, due to various legal, economic, and pragmatic factors, some Requesters and workers continue to question this status quo. To promote further discussion on the issue, we survey Requesters and workers whether they would support restricting tasks to require minimum wage pay. As a form of {\em design activism}, we confronted workers with this dilemma directly by posting a dummy Mechanical Turk task which told them that they could not work on it because it paid less than their {\em local} minimum wage, and we invited their feedback. Strikingly, for those workers expressing an opinion, twothirds of Indians favored the policy while twothirds of Americans opposed it. Though a majority of Requesters supported minimum wage pay, only 20\% would enforce it. To further empower Requesters, and to ensure that effort or ignorance are not barriers to change, we provide a simple public API to make it easy to find a worker's local minimum wage by his/her IP address. 
From Big Data to Big Displays: HighPerformance Visualization at Blue Brain. (arXiv:1706.10098v1 [cs.GR]) 
Authors: Stefan Eilemann, Marwan Abdellah, Nicolas Antille, Ahmet Bilgili, Grigory Chevtchenko, Raphael Dumusc, Cyrille Favreau, Juan Hernando, Daniel Nachbaur, Pawel Podhajski, Jafet Villafranca, Felix Schürmann Blue Brain has pushed highperformance visualization (HPV) to complement its HPC strategy since its inception in 2007. In 2011, this strategy has been accelerated to develop innovative visualization solutions through increased funding and strategic partnerships with other research institutions. We present the key elements of this HPV ecosystem, which integrates C++ visualization applications with novel collaborative display systems. We motivate how our strategy of transforming visualization engines into services enables a variety of use cases, not only for the integration with highfidelity displays, but also to build service oriented architectures, to link into web applications and to provide remote services to Python applications. 
Tableaux for Policy Synthesis for MDPs with PCTL* Constraints. (arXiv:1706.10102v1 [cs.LO]) 
Authors: Peter Baumgartner, Sylvie Thiébaux, Felipe Trevizan Markov decision processes (MDPs) are the standard formalism for modelling sequential decision making in stochastic environments. Policy synthesis addresses the problem of how to control or limit the decisions an agent makes so that a given specification is met. In this paper we consider PCTL*, the probabilistic counterpart of CTL*, as the specification language. Because in general the policy synthesis problem for PCTL* is undecidable, we restrict to policies whose execution history memory is finitely bounded a priori. Surprisingly, no algorithm for policy synthesis for this natural and expressive framework has been developed so far. We close this gap and describe a tableaubased algorithm that, given an MDP and a PCTL* specification, derives in a nondeterministic way a system of (possibly nonlinear) equalities and inequalities. The solutions of this system, if any, describe the desired (stochastic) policies. Our main result in this paper is the correctness of our method, i.e., soundness, completeness and termination. 
On Using Toeplitz and Circulant Matrices for JohnsonLindenstrauss Transforms. (arXiv:1706.10110v1 [math.FA]) 
Authors: Casper Benjamin Freksen, Kasper Green Larsen The JohnsonLindenstrauss lemma is one of the corner stone results in dimensionality reduction. It says that for any set of vectors $X \subset \mathbb{R}^n$, there exists a mapping $f : X \to \mathbb{R}^m$ such that $f(X)$ preserves all pairwise distances between vectors in $X$ to within $(1 \pm \varepsilon)$ if $m = O(\varepsilon^{2} \lg N)$. Much effort has gone into developing fast embedding algorithms, with the Fast JohnsonLindenstrauss transform of Ailon and Chazelle being one of the most wellknown techniques. The current fastest algorithm that yields the optimal $m = O(\varepsilon^{2}\lg N)$ dimensions has an embedding time of $O(n \lg N + \varepsilon^{2} \lg^3 N)$. An exciting approach towards improving this, due to Hinrichs and Vyb\'iral, is to use a random $m \times n$ Toeplitz matrix for the embedding. Using Fast Fourier Transform, the embedding of a vector can then be computed in $O(n \lg m)$ time. The big question is of course whether $m = O(\varepsilon^{2} \lg N)$ dimensions suffice for this technique. If so, this would end a decades long quest to obtain faster and faster JohnsonLindenstrauss transforms. The current best analysis of the embedding of Hinrichs and Vyb\'iral shows that $m = O(\varepsilon^{2}\lg^2 N)$ dimensions suffices. The main result of this paper, is a proof that this analysis unfortunately cannot be tightened any further, i.e., there exists a set of $N$ vectors requiring $m = \Omega(\varepsilon^{2} \lg^2 N)$ for the Toeplitz approach to work. 
On the Complexity of Polytopes in $LI(2)$. (arXiv:1706.10114v1 [cs.CC]) 
Authors: Komei Fukuda, May Szedlak In this paper we consider polytopes given by systems of $n$ inequalities in $d$ variables, where every inequality has at most two variables with nonzero coefficient. We denote this family by $LI(2)$. We show that despite of the easy algebraic structure, polytopes in $LI(2)$ can have high complexity. We construct a polytope in $LI(2)$, whose number of vertices is almost the number of vertices of the dual cyclic polytope, the difference is a multiplicative factor of depending on $d$ and in particular independent of $n$. Moreover we show that the dual cyclic polytope can not be realized in $LI(2)$. 
Restricted Causal Inference Algorithm. (arXiv:1706.10117v1 [cs.AI]) 
Authors: Mieczysław A. Kłopotek This paper proposes a new algorithm for recovery of belief network structure from data handling hidden variables. It consists essentially in an extension of the CI algorithm of Spirtes et al. by restricting the number of conditional dependencies checked up to k variables and in an extension of the original CI by additional steps transforming so called partial including path graph into a belief network. Its correctness is demonstrated. 
Navigate, Understand, Communicate: How Developers Locate Performance Bugs. (arXiv:1706.10118v1 [cs.SE]) 
Authors: Sebastian Baltes, Oliver Moseler, Fabian Beck, Stephan Diehl Background: Performance bugs can lead to severe issues regarding computation efficiency, power consumption, and user experience. Locating these bugs is a difficult task because developers have to judge for every costly operation whether runtime is consumed necessarily or unnecessarily. Objective: We wanted to investigate how developers, when locating performance bugs, navigate through the code, understand the program, and communicate the detected issues. Method: We performed a qualitative user study observing twelve developers trying to fix documented performance bugs in two open source projects. The developers worked with a profiling and analysis tool that visually depicts runtime information in a list representation and embedded into the source code view. Results: We identified typical navigation strategies developers used for pinpointing the bug, for instance, following method calls based on runtime consumption. The integration of visualization and code helped developers to understand the bug. Sketches visualizing data structures and algorithms turned out to be valuable for externalizing and communicating the comprehension process for complex bugs. Conclusion: Fixing a performance bug is a code comprehension and navigation problem. Flexible navigation features based on executed methods and a close integration of source code and performance information support the process. 
What Happens to Intentional Concepts in Requirements Engineering If Intentional States Cannot Be Known?. (arXiv:1706.10133v1 [cs.SE]) 
Authors: Ivan J. Jureta I assume in this paper that the proposition "I cannot know your intentional states" is true. I consider its consequences on the use of socalled "intentional concepts" for Requirements Engineering. I argue that if you take this proposition to be true, then intentional concepts (e.g., goal, belief, desire, intention, etc.) start to look less relevant (though not irrelevant), despite being the focus of significant research attention over the past three decades. I identify substantial problems that arise if you use instances of intentional concepts to reflect intentional states. I sketch an approach to address these problems. In it, intentional concepts have a less prominent role, while notions of time, uncertainty, prediction, observability, evidence, and learning are at the forefront. 
Evaluation of No Reference Bitstreambased Video Quality Assessment Methods. (arXiv:1706.10143v1 [cs.MM]) 
Authors: Tiantian He, Yankai Liu, Rong Xie, Xin Tang, Li Song Many different parametric models for video quality assessment have been proposed in the past few years. This paper presents a review of nine recent models which cover a wide range of methodologies and have been validated for estimating video quality due to different degradation factors. Each model is briefly described with key algorithms and relevant parametric formulas. The generalization capability of each model to estimate video quality in realapplication scenarios is evaluated and compared with other models, using a dataset created with video sequences from practical applications. These video sequences cover a wide range of possible realistic encoding parameters, labeled with mean opinion scores (MOS) via subjective test. The weakness and strength of each model are remarked. Finally, future work towards a more general parametric model that could apply for a wider range of applications is discussed. 
A ROS multiontology references services: OWL reasoners and application prototyping issues. (arXiv:1706.10151v1 [cs.RO]) 
Authors: Luca Buoncompagni, Alessio Capitanelli, Fulvio Mastrogiovanni The challenge of sharing and communicating information is crucial in complex humanrobot interaction (HRI) scenarios. Ontologies and symbolic reasoning are the stateoftheart approaches for a natural representation of knowledge, especially within the Semantic Web domain. In such a context, scripted paradigms have been adopted to achieve high expressiveness. Nevertheless, since symbolic reasoning is a high complexity problem, optimizing its performance requires a careful design of the knowledge. Specifically, a robot architecture requires the integration of several components implementing different behaviors and generating a series of beliefs. Most of the components are expected to access, manipulate, and reason upon a runtime generated semantic representation of knowledge grounding robot behaviors and perceptions through formal axioms, with soft realtime requirements. 
Parameterized Complexity of CSP for Infinite Constraint Languages. (arXiv:1706.10153v1 [cs.CC]) 
Authors: Ruhollah Majdoddin We study parameterized Constraint Satisfaction Problem (CSP) for infinite constraint languages. The parameters that we study are weight of the satisfying assignment, number of constraints, maximum number of appearances of a variable in the instance, and maximum number of appearances of a variable in each constraint. A dichotomy theorem is already known for finite constraint languages with parameter weight. We have general theorems that set some wellknown problems in FPT and some other in W[1]. 
Prepaid or Postpaid? That is the question. Novel Methods of Subscription Type Prediction in Mobile Phone Services. (arXiv:1706.10172v1 [cs.SI]) 
Authors: Yongjun Liao, Wei Du, Márton Karsai, Carlos Sarraute, Martin Minnoni, Eric Fleury In this paper we investigate the behavioural differences between mobile phone customers with prepaid and postpaid subscriptions. Our study reveals that (a) postpaid customers are more active in terms of service usage and (b) there are strong structural correlations in the mobile phone call network as connections between customers of the same subscription type are much more frequent than those between customers of different subscription types. Based on these observations we provide methods to detect the subscription type of customers by using information about their personal call statistics, and also their egocentric networks simultaneously. The key of our first approach is to cast this classification problem as a problem of graph labelling, which can be solved by maxflow mincut algorithms. Our experiments show that, by using both user attributes and relationships, the proposed graph labelling approach is able to achieve a classification accuracy of $\sim 87\%$, which outperforms by $\sim 7\%$ supervised learning methods using only user attributes. In our second problem we aim to infer the subscription type of customers of external operators. We propose via approximate methods to solve this problem by using node attributes, and a twoways indirect inference method based on observed homophilic structural correlations. Our results have straightforward applications in behavioural prediction and personal marketing. 
Statistical Analysis of Dice CAPTCHA Usability. (arXiv:1706.10177v1 [cs.AI]) 
Authors: Darko Brodić, Alessia Amelio, Ivo R. Draganov In this paper the elements of the CAPTCHA usability are analyzed. CAPTCHA, as a time progressive element in computer science, has been under constant interest of ordinary, professional as well as the scientific users of the Internet. The analysis is given based on the usability elements of CAPTCHA which are abbreviated as usercentric approach to the CAPTCHA. To demonstrate it, the specific type of Dice CAPTCHA is used in the experiment. The experiment is conducted on 190 Internet users with different demographic characteristics on laptop and tablet computers. The obtained results are statistically processed. At the end, the results are compared and conclusion of their use is drawn. 
Codebook Based Hybrid Precoding for Millimeter Wave Multiuser Systems. (arXiv:1706.10181v1 [cs.IT]) 
Authors: Shiwen He, Jiaheng Wang, Yongming Huang, Bjorn Ottersten, Wei Hong In millimeter wave (mmWave) systems, antenna architecture limitations make it difficult to apply conventional fully digital precoding techniques but call for low cost analog radiofrequency (RF) and digital baseband hybrid precoding methods. This paper investigates joint RFbaseband hybrid precoding for the downlink of multiuser multiantenna mmWave systems with a limited number of RF chains. Two performance measures, maximizing the spectral efficiency and the energy efficiency of the system, are considered. We propose a codebook based RF precoding design and obtain the channel state information via a beam sweep procedure. Via the codebook based design, the original system is transformed into a virtual multiuser downlink system with the RF chain constraint. Consequently, we are able to simplify the complicated hybrid precoding optimization problems to joint codeword selection and precoder design (JWSPD) problems. Then, we propose efficient methods to address the JWSPD problems and jointly optimize the RF and baseband precoders under the two performance measures. Finally, extensive numerical results are provided to validate the effectiveness of the proposed hybrid precoders. 
A reliabilitybased approach for influence maximization using the evidence theory. (arXiv:1706.10188v1 [cs.SI]) 
Authors: Siwar Jendoubi, Arnaud Martin The influence maximization is the problem of finding a set of social network users, called influencers, that can trigger a large cascade of propagation. Influencers are very beneficial to make a marketing campaign goes viral through social networks for example. In this paper, we propose an influence measure that combines many influence indicators. Besides, we consider the reliability of each influence indicator and we present a distancebased process that allows to estimate the reliability of each indicator. The proposed measure is defined under the framework of the theory of belief functions. Furthermore, the reliabilitybased influence measure is used with an influence maximization model to select a set of users that are able to maximize the influence in the network. Finally, we present a set of experiments on a dataset collected from Twitter. These experiments show the performance of the proposed solution in detecting social influencers with good quality. 
New Integer Linear Programming Models for the Vertex Coloring Problem. (arXiv:1706.10191v1 [cs.CG]) 
Authors: Adalat Jabrayilov, Petra Mutzel The vertex coloring problem asks for the minimum number of colors that can be assigned to the vertices of a given graph such that for all vertices v the color of v is different from the color of any of its neighbors. The problem is NPhard. Here, we introduce new integer linear programming formulations based on partial orderings. They have the advantage that they are as simple to work with as the classical assignment formulation, since they can be fed directly into a standard integer linear programming solver. We evaluate our new models using Gurobi and show that our new simple approach is a good alternative to the best stateoftheart approaches for the vertex coloring problem. In our computational experiments, we compare our formulations with the classical assignment formulation and the representatives formulation on a large set of benchmark graphs as well as randomly generated graphs of varying size and density. The evaluation shows that one of the new models dominates both formulations for sparse graphs, while the representatives formulation is the best for dense graphs. 
REPACRR: A Context and DensityAware Neural Information Retrieval Model. (arXiv:1706.10192v1 [cs.IR]) 
Authors: Kai Hui, Andrew Yates, Klaus Berberich, Gerard de Melo Adhoc retrieval models can benefit from considering different patterns in the interactions between a query and a document, effectively assessing the relevance of a document for a given user query. Factors to be considered in this interaction include (i) the matching of unigrams and ngrams, (ii) the proximity of the matched query terms, (iii) their position in the document, and (iv) how the different relevance signals are combined over different query terms. While previous work has successfully modeled some of these factors, not all aspects have been fully explored. In this work, we close this gap by proposing different neural components and incorporating them into a single architecture, leading to a novel neural IR model called REPACRR. Extensive comparisons with established models on TREC Web Track data confirm that the proposed model yields promising search results. 
More Tur\'anType Theorems for Triangles in Convex Point Sets. (arXiv:1706.10193v1 [math.CO]) 
Authors: Boris Aronov, Vida Dujmović, Pat Morin, Aurélien Ooms, Luís Fernando Schultz Xavier da Silveira We study the following family of problems: Given a set of $n$ points in convex position, what is the maximum number triangles one can create having these points as vertices while avoiding certain sets of forbidden configurations. As forbidden configurations we consider all 8 ways in which a pair of triangles in such a point set can interact. This leads to 256 extremal Tur\'antype questions. We give nearly tight (within a $\log n$ factor) bounds for 248 of these questions and show that the remaining 8 questions are all asymptotically equivalent to Stein's longstanding tripod packing problem. 
Agglomerative Clustering of Growing Squares. (arXiv:1706.10195v1 [cs.DS]) 
Authors: Thom Castermans, Bettina Speckmann, Frank Staals, Kevin Verbeek We study an agglomerative clustering problem motivated by interactive glyphs in geovisualization. Consider a set of disjoint square glyphs on an interactive map. When the user zooms out, the glyphs grow in size relative to the map, possibly with different speeds. When two glyphs intersect, we wish to replace them by a new glyph that captures the information of the intersecting glyphs. We present a fully dynamic kinetic data structure that maintains a set of $n$ disjoint growing squares. Our data structure uses $O(n (\log n \log\log n)^2)$ space, supports queries in worst case $O(\log^3 n)$ time, and updates in $O(\log^7 n)$ amortized time. This leads to an $O(n\alpha(n)\log^7 n)$ time algorithm to solve the agglomerative clustering problem. This is a significant improvement over the current best $O(n^2)$ time algorithms. 
Improving Speech Related Facial Action Unit Recognition by Audiovisual Information Fusion. (arXiv:1706.10197v1 [cs.CV]) 
Authors: Zibo Meng, Shizhong Han, Ping Liu, Yan Tong It is challenging to recognize facial action unit (AU) from spontaneous facial displays, especially when they are accompanied by speech. The major reason is that the information is extracted from a single source, i.e., the visual channel, in the current practice. However, facial activity is highly correlated with voice in natural human communications. Instead of solely improving visual observations, this paper presents a novel audiovisual fusion framework, which makes the best use of visual and acoustic cues in recognizing speechrelated facial AUs. In particular, a dynamic Bayesian network (DBN) is employed to explicitly model the semantic and dynamic physiological relationships between AUs and phonemes as well as measurement uncertainty. A pilot audiovisual AUcoded database has been collected to evaluate the proposed framework, which consists of a "clean" subset containing frontal faces under well controlled circumstances and a challenging subset with large head movements and occlusions. Experiments on this database have demonstrated that the proposed framework yields significant improvement in recognizing speechrelated AUs compared to the stateoftheart visualbased methods especially for those AUs whose visual observations are impaired during speech, and more importantly also outperforms featurelevel fusion methods by explicitly modeling and exploiting physiological relationships between AUs and phonemes. 
Modern Random Access for Satellite Communications. (arXiv:1706.10198v1 [cs.IT]) 
Authors: Federico Clazzer The present PhD dissertation focuses on modern random access (RA) techniques. In the first part an slot and frameasynchronous RA scheme adopting replicas, successive interference cancellation and combining techniques is presented and its performance analysed. The comparison of both slotsynchronous and asynchronous RA at higher layer, follows. Next, the optimization procedure, for slotsynchronous RA with irregular repetitions, is extended to the Rayleigh block fading channel. Finally, random access with multiple receivers is considered. 
RuleMining based classification: a benchmark study. (arXiv:1706.10199v1 [cs.LG]) 
Authors: Margaux Luck, Nicolas Pallet, Cecilia Damon This study proposed an exhaustive stable/reproducible rulemining algorithm combined to a classifier to generate both accurate and interpretable models. Our method first extracts rules (i.e., a conjunction of conditions about the values of a small number of input features) with our exhaustive rulemining algorithm, then constructs a new feature space based on the most relevant rules called "local features" and finally, builds a local predictive model by training a standard classifier on the new local feature space. This local feature space is easy interpretable by providing a humanunderstandable explanation under the explicit form of rules. Furthermore, our local predictive approach is as powerful as global classical ones like logistic regression (LR), support vector machine (SVM) and rules based methods like random forest (RF) and gradient boosted tree (GBT). 
Selfish Network Creation with NonUniform Edge Cost. (arXiv:1706.10200v1 [cs.GT]) 
Authors: Ankit Chauhan, Pascal Lenzner, Anna Melnichenko, Louise Molitor Network creation games investigate complex networks from a gametheoretic point of view. Based on the original model by Fabrikant et al. [PODC'03] many variants have been introduced. However, almost all versions have the drawback that edges are treated uniformly, i.e. every edge has the same cost and that this common parameter heavily influences the outcomes and the analysis of these games. We propose and analyze simple and natural parameterfree network creation games with nonuniform edge cost. Our models are inspired by social networks where the cost of forming a link is proportional to the popularity of the targeted node. Besides results on the complexity of computing a best response and on various properties of the sequential versions, we show that the most general version of our model has constant Price of Anarchy. To the best of our knowledge, this is the first proof of a constant Price of Anarchy for any network creation game. 
Joint Optimization of User Association, Data Delivery Rate and Precoding for CacheEnabled FRANs. (arXiv:1706.10203v1 [cs.IT]) 
Authors: Tung T. Vu, Duy T. Ngo, Lawrence Ong, Salman Durrani, Richard H. Middleton This paper considers the downlink of a cacheenabled fog radio access network (FRAN) with limited fronthaul capacity, where user association (UA), data delivery rate (DDR) and signal precoding are jointly optimized. We formulate a mixedinteger nonlinear programming problem in which the weighted difference of network throughput and total power consumption is maximized, subject to the predefined DDR requirements and the maximum transmit power at each eRRH. To address this challenging problem, we first apply the l0norm approximation and l1norm minimization techniques to deal with the UA. After this key step, we arrive at an approximated problem that only involves the joint optimization of DDR and precoding. By using the alternating descent method, we further decompose this problem into a convex subproblem for DDR allocation and a nonconvex subproblem for precoding design. While the former is globally solved by the interiorpoint method, the latter is solved by a specifically tailored successive convex quadratic programming method. Finally, we propose an iterative algorithm for the original joint optimization that is guaranteed to converge. Importantly, each iteration of the developed algorithm only involves solving simple convex problems. Numerical examples demonstrate that the proposed design significantly improves both throughput and power performances, especially in practical FRANs with limited fronthaul capacity. Compared to the sole precoder design for a given cache placement, our joint design is shown to improve the throughput by 50% while saving at least half of the total power consumption in the considered examples. 
Sums of Palindromes: an Approach via NestedWord Automata. (arXiv:1706.10206v1 [cs.FL]) 
Authors: Aayush Rajasekaran, Jeffrey Shallit, Tim Smith We prove, using a decision procedure based on nestedword automata, that every natural number is the sum of at most 9 natural numbers whose base2 representation is a palindrome. We consider some other variations on this problem, and prove similar results. We argue that heavily casebased proofs are a good signal that a decision procedure may help to automate the proof. 
Optimization Methods for Supervised Machine Learning: From Linear Models to Deep Learning. (arXiv:1706.10207v1 [stat.ML]) 
Authors: Frank E. Curtis, Katya Scheinberg The goal of this tutorial is to introduce key models, algorithms, and open questions related to the use of optimization methods for solving problems arising in machine learning. It is written with an INFORMS audience in mind, specifically those readers who are familiar with the basics of optimization algorithms, but less familiar with machine learning. We begin by deriving a formulation of a supervised learning problem and show how it leads to various optimization problems, depending on the context and underlying assumptions. We then discuss some of the distinctive features of these optimization problems, focusing on the examples of logistic regression and the training of deep neural networks. The latter half of the tutorial focuses on optimization algorithms, first for convex logistic regression, for which we discuss the use of firstorder methods, the stochastic gradient method, variance reducing stochastic methods, and secondorder methods. Finally, we discuss how these approaches can be employed to the training of deep neural networks, emphasizing the difficulties that arise from the complex, nonconvex structure of these models. 
On Fairness, Diversity and Randomness in Algorithmic Decision Making. (arXiv:1706.10208v1 [stat.ML]) 
Authors: Nina GrgićHlača, Muhammad Bilal Zafar, Krishna P. Gummadi, Adrian Weller Consider a binary decision making process where a single machine learning classifier replaces a multitude of humans. We raise questions about the resulting loss of diversity in the decision making process. We study the potential benefits of using random classifier ensembles instead of a single classifier in the context of fairnessaware learning and demonstrate various attractive properties: (i) an ensemble of fair classifiers is guaranteed to be fair, for several different measures of fairness, (ii) an ensemble of unfair classifiers can still achieve fair outcomes, and (iii) an ensemble of classifiers can achieve better accuracyfairness tradeoffs than a single classifier. Finally, we introduce notions of distributional fairness to characterize further potential benefits of random classifier ensembles. 
Storage, Communication, and Load Balancing Tradeoff in Distributed Cache Networks. (arXiv:1706.10209v1 [cs.IT]) 
Authors: Mahdi Jafari Siavoshani, Ali Pourmiri, Seyed Pooya Shariatpanahi We consider load balancing in a network of caching servers delivering contents to end users. Randomized load balancing via the socalled power of two choices is a wellknown approach in parallel and distributed systems. In this framework, we investigate the tension between storage resources, communication cost, and load balancing performance. To this end, we propose a randomized load balancing scheme which simultaneously considers cache size limitation and proximity in the server redirection process. In contrast to the classical power of two choices setup, since the memory limitation and the proximity constraint cause correlation in the server selection process, we may not benefit from the power of two choices. However, we prove that in certain regimes of problem parameters, our scheme results in the maximum load of order $\Theta(\log\log n)$ (here $n$ is the network size). This is an exponential improvement compared to the scheme which assigns each request to the nearest available replica. Interestingly, the extra communication cost incurred by our proposed scheme, compared to the nearest replica strategy, is small. Furthermore, our extensive simulations show that the tradeoff trend does not depend on the network topology and library popularity profile details. 
Formation of Stable Strategic Networks with Desired Topologies. (arXiv:1706.10215v1 [cs.SI]) 
Authors: Swapnil Dhamal, Y. Narahari Many realworld networks such as social networks consist of strategic agents. The topology of these networks often plays a crucial role in determining the ease and speed with which certain information driven tasks can be accomplished. Consequently, growing a stable network having a certain desired topology is of interest. Motivated by this, we study the following important problem: given a certain desired topology, under what conditions would best response link alteration strategies adopted by strategic agents, uniquely lead to formation of a stable network having the given topology. This problem is the inverse of the classical network formation problem where we are concerned with determining stable topologies, given the conditions on the network parameters. We study this interesting inverse problem by proposing (1) a recursive model of network formation and (2) a utility model that captures key determinants of network formation. Building upon these models, we explore relevant topologies such as star graph, complete graph, bipartite Turan graph, and multiple stars with interconnected centers. We derive a set of sufficient conditions under which these topologies uniquely emerge, study their social welfare properties, and investigate the effects of deviating from the derived conditions. 
SMC Faster RCNN: Toward a scenespecialized multiobject detector. (arXiv:1706.10217v1 [cs.CV]) 
Authors: Ala Mhalla, Thierry Chateau, Houda Maamatou, Sami Gazzah, Najoua Essoukri Ben Amara Generally, the performance of a generic detector decreases significantly when it is tested on a specific scene due to the large variation between the source training dataset and the samples from the target scene. To solve this problem, we propose a new formalism of transfer learning based on the theory of a Sequential Monte Carlo (SMC) filter to automatically specialize a scenespecific Faster RCNN detector. The suggested framework uses different strategies based on the SMC filter steps to approximate iteratively the target distribution as a set of samples in order to specialize the Faster RCNN detector towards a target scene. Moreover, we put forward a likelihood function that combines spatiotemporal information extracted from the target video sequence and the confidencescore given by the output layer of the Faster RCNN, to favor the selection of target samples associated with the right label. The effectiveness of the suggested framework is demonstrated through experiments on several public traffic datasets. Compared with the stateoftheart specialization frameworks, the proposed framework presents encouraging results for both single and multitraffic object detections. 
6thSense: A Contextaware Sensorbased Attack Detector for Smart Devices. (arXiv:1706.10220v1 [cs.CR]) 
Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac Sensors (e.g., light, gyroscope, accelerotmeter) and sensing enabled applications on a smart device make the applications more userfriendly and efficient. However, the current permissionbased sensor management systems of smart devices only focus on certain sensors and any App can get access to other sensors by just accessing the generic sensor API. In this way, attackers can exploit these sensors in numerous ways: they can extract or leak users' sensitive information, transfer malware, or record or steal sensitive information from other nearby devices. In this paper, we propose 6thSense, a contextaware intrusion detection system which enhances the security of smart devices by observing changes in sensor data for different tasks of users and creating a contextual model to distinguish benign and malicious behavior of sensors. 6thSense utilizes three different Machine Learningbased detection mechanisms (i.e., Markov Chain, Naive Bayes, and LMT) to detect malicious behavior associated with sensors. We implemented 6thSense on a sensorrich Android smart device (i.e., smartphone) and collected data from typical daily activities of 50 real users. Furthermore, we evaluated the performance of 6thSense against three sensorbased threats: (1) a malicious App that can be triggered via a sensor (e.g., light), (2) a malicious App that can leak information via a sensor, and (3) a malicious App that can steal data using sensors. Our extensive evaluations show that the 6thSense framework is an effective and practical approach to defeat growing sensorbased threats with an accuracy above 96% without compromising the normal functionality of the device. Moreover, our framework costs minimal overhead. 
Press F1 for help: participatory design for dealing with online and real life security of older adults. (arXiv:1706.10223v1 [cs.SI]) 
Authors: Bartłomiej Balcerzak, Wiesław Kopeć, Radosław Nielek, Sebastian Kruk, Kamil Warpechowski, Mateusz Wasik, Marek Węgrzyn In this paper we present the report on the design and development of a platform for the intergenerational exchange of favors. This platform was designed using participatory design approach during a 24hour hackathon by a team consisting of younger programmers and older adults. The findings of this report show that intergenerational cooperation in which the older adults serve as representatives of the end user, not only improves the design and development of the application, but also provides an effective method for designing and applying solutions aimed at improving the security of older adults while using online and mobile tools. 
Contracting a Planar Graph Efficiently. (arXiv:1706.10228v1 [cs.DS]) 
Authors: Jacob Holm, Giuseppe F. Italiano, Adam Karczmarz, Jakub Łącki, Eva Rotenberg, Piotr Sankowski We present a data structure that can maintain a simple planar graph under edge contractions in linear total time. The data structure supports adjacency queries and provides access to neighbor lists in $O(1)$ time. Moreover, it can report all the arising selfloops and parallel edges. By applying the data structure, we can achieve optimal running times for decremental bridge detection, 2edge connectivity, maximal 3edge connected components, and the problem of finding a unique perfect matching for a static planar graph. Furthermore, we improve the running times of algorithms for several planar graph problems, including decremental 2vertex and 3edge connectivity, and we show that using our data structure in a blackbox manner, one obtains conceptually simple optimal algorithms for computing MST and 5coloring in planar graphs. 
Improving Session Recommendation with Recurrent Neural Networks by Exploiting Dwell Time. (arXiv:1706.10231v1 [cs.IR]) 
Authors: Alexander Dallmann (1), Alexander Grimm (1), Christian Pölitz (1), Daniel Zoller (1), Andreas Hotho (1 and 2) ((1) University of Würzburg, (2) L3S Research Center) Recently, Recurrent Neural Networks (RNNs) have been applied to the task of sessionbased recommendation. These approaches use RNNs to predict the next item in a user session based on the previ ously visited items. While some approaches consider additional item properties, we argue that item dwell time can be used as an implicit measure of user interest to improve sessionbased item recommen dations. We propose an extension to existing RNN approaches that captures user dwell time in addition to the visited items and show that recommendation performance can be improved. Additionally, we investigate the usefulness of a single validation split for model selection in the case of minor improvements and find that in our case the best model is not selected and a foldlike study with different validation sets is necessary to ensure the selection of the best model. 
Probabilistic Active Learning of Functions in Structural Causal Models. (arXiv:1706.10234v1 [stat.ML]) 
Authors: Paul K. Rubenstein, Ilya Tolstikhin, Philipp Hennig, Bernhard Schoelkopf We consider the problem of learning the functions computing children from parents in a Structural Causal Model once the underlying causal graph has been identified. This is in some sense the second step after causal discovery. Taking a probabilistic approach to estimating these functions, we derive a natural myopic active learning scheme that identifies the intervention which is optimally informative about all of the unknown functions jointly, given previously observed data. We test the derived algorithms on simple examples, to demonstrate that they produce a structured exploration policy that significantly improves on unstructured baselines. 
Is it ethical to avoid error analysis?. (arXiv:1706.10237v1 [cs.CY]) 
Authors: Eva GarcíaMartín, Niklas Lavesson Machine learning algorithms tend to create more accurate models with the availability of large datasets. In some cases, highly accurate models can hide the presence of bias in the data. There are several studies published that tackle the development of discriminatoryaware machine learning algorithms. We center on the further evaluation of machine learning models by doing error analysis, to understand under what conditions the model is not working as expected. We focus on the ethical implications of avoiding error analysis, from a falsification of results and discrimination perspective. Finally, we show different ways to approach error analysis in noninterpretable machine learning algorithms such as deep learning. 
Towards Understanding Generalization of Deep Learning: Perspective of Loss Landscapes. (arXiv:1706.10239v1 [cs.LG]) 
Authors: Lei Wu, Zhanxing Zhu, Weinan E It is widely observed that deep learning models with learned parameters generalize well, even with much more model parameters than the number of training samples. We systematically investigate the underlying reasons why deep neural networks often generalize well, and reveal the difference between the minima (with the same training error) that generalize well and those they don't. We show that it is the characteristics the landscape of the loss function that explains the good generalization capability. For the landscape of loss function for deep networks, the volume of basin of attraction of good minima dominates over that of poor minima, which guarantees optimization methods with random initialization to converge to good minima. We theoretically justify our findings through analyzing 2layer neural networks; and show that the lowcomplexity solutions have a small norm of Hessian matrix with respect to model parameters. For deeper networks, extensive numerical evidence helps to support our arguments. 
Bridging the Gap between Probabilistic and Deterministic Models: A Simulation Study on a Variational Bayes Predictive Coding Recurrent Neural Network Model. (arXiv:1706.10240v1 [cs.AI]) 
Authors: Ahmadreza Ahmadi, Jun Tani The current paper proposes a novel variational Bayes predictive coding RNN model, which can learn to generate fluctuated temporal patterns from exemplars. The model learns to maximize the lower bound of the weighted sum of the regularization and reconstruction error terms. We examined how this weighting can affect development of different types of information processing while learning fluctuated temporal patterns. Simulation results show that strong weighting of the reconstruction term causes the development of deterministic chaos for imitating the randomness observed in target sequences, while strong weighting of the regularization term causes the development of stochastic dynamics imitating probabilistic processes observed in targets. Moreover, results indicate that the most generalized learning emerges between these two extremes. The paper concludes with implications in terms of the underlying neuronal mechanisms for autism spectrum disorder and for free action. 
A selectional autoencoder approach for document image binarization. (arXiv:1706.10241v1 [cs.CV]) 
Authors: Jorge CalvoZaragoza, AntonioJavier Gallego Binarization plays a key role in the automatic information retrieval from document images. This process is usually performed in the first stages of documents analysis systems, and serves as a basis for subsequent steps. Hence it has to be robust in order to allow the full analysis workflow to be successful. Several methods for document image binarization have been proposed so far, most of which are based on handcrafted image processing strategies. Recently, Convolutional Neural Networks have shown an amazing performance in many disparate duties related to computer vision. In this paper we discuss the use of a convolutional autoencoder devoted to learning an endtoend map from an input image of a fixed size to its selectional output, in which activations indicate whether the pixel must be classified as foreground or background. Once trained, documents can therefore be binarized by parsing them through the model and applying a threshold. Our approach has proven to outperform stateoftheart techniques in the wellknown DIBCO dataset (edition 2016). 
Line Hermitian Grassmann Codes and their Parameters. (arXiv:1706.10255v1 [math.CO]) 
Authors: Ilaria Cardinali, Luca Giuzzi In this paper we introduce and study line Hermitian Grassmann codes as those subcodes of the Grassmann codes associated to the $2$Grassmannian of a Hermitian polar space defined over a finite field of square order. In particular, we determine their parameters and characterize the words of minimum weight. 
How biased is your model? Concentration Inequalities, Information and Model Bias. (arXiv:1706.10260v1 [cs.IT]) 
Authors: Konstantinos Gourgoulias, Markos A. Katsoulakis, Luc ReyBellet, Jie Wang We derive tight and computable bounds on the bias of statistical estimators, or more generally of quantities of interest, when evaluated on a baseline model P rather than on the typically unknown true model Q. Our proposed method combines the scalable information inequality derived by P. Dupuis, K.Chowdhary, the authors and their collaborators together with classical concentration inequalities (such as Bennett's and HoeffdingAzuma inequalities). Our bounds are expressed in terms of the KullbackLeibler divergence R(QP) of model Q with respect to P and the moment generating function for the statistical estimator under P. Furthermore, concentration inequalities, i.e. bounds on moment generating functions, provide tight and computationally inexpensive model bias bounds for quantities of interest. Finally, they allow us to derive rigorous confidence bands for statistical estimators that account for model bias and are valid for an arbitrary amount of data. 
Coloropponent mechanisms for local hue encoding in a hierarchical framework. (arXiv:1706.10266v1 [cs.CV]) 
Authors: Paria Mehrani, Andrei Mouraviev, Oscar J. Avella Gonzalez, John K. Tsotsos Various aspects of color have been extensively studied in science and the arts for the simple reason that it conveys information and attracts attention. In perception, color plays an important role. It helps in tasks such as object recognition. In humans, color perception starts with cones in the retina. Studies in the primary visual cortex show opponent mechanisms for color representation. While singleopponent cells encode local hue, doubleopponent neurons are sensitive to color boundaries. This paper introduces a biologically plausible computational model for color representation. We present a hierarchical model of neurons that successfully encodes local hue. Our proposed model benefits from studies on the visual cortex and builds a network of singleopponent and hueselective neurons. We show that our model hueselective neurons, at the top layer of our network, can achieve the goal of local hue encoding by combining inputs from singleopponent cells, and that they resemble hueselective neurons in V4 of the primate visual system. Moreover, with a few examples, we present the possibility of spanning the infinite space of physical hues from the hueselective neurons in our model. 
Challenges to Keeping the Computer Industry Centered in the US. (arXiv:1706.10267v1 [cs.CY]) 
Authors: Thomas M. Conte, Erik P. Debenedictis, R. Stanley Williams, Mark D. Hill It is undeniable that the worldwide computer industry's center is the US, specifically in Silicon Valley. Much of the reason for the success of Silicon Valley had to do with Moore's Law: the observation by Intel cofounder Gordon Moore that the number of transistors on a microchip doubled at a rate of approximately every two years. According to the International Technology Roadmap for Semiconductors, Moore's Law will end in 2021. How can we rethink computing technology to restart the historic explosive performance growth? Since 2012, the IEEE Rebooting Computing Initiative (IEEE RCI) has been working with industry and the US government to find new computing approaches to answer this question. In parallel, the CCC has held a number of workshops addressing similar questions. This whitepaper summarizes some of the IEEE RCI and CCC findings. The challenge for the US is to lead this new era of computing. Our international competitors are not sitting still: China has invested significantly in a variety of approaches such as neuromorphic computing, chip fabrication facilities, computer architecture, and highperformance simulation and data analytics computing, for example. We must act now, otherwise, the center of the computer industry will move from Silicon Valley and likely move off shore entirely. 
SafetyNets: Verifiable Execution of Deep Neural Networks on an Untrusted Cloud. (arXiv:1706.10268v1 [cs.LG]) 
Authors: Zahra Ghodsi, Tianyu Gu, Siddharth Garg Inference using deep neural networks is often outsourced to the cloud since it is a computationally demanding task. However, this raises a fundamental issue of trust. How can a client be sure that the cloud has performed inference correctly? A lazy cloud provider might use a simpler but less accurate model to reduce its own computational load, or worse, maliciously modify the inference results sent to the client. We propose SafetyNets, a framework that enables an untrusted server (the cloud) to provide a client with a short mathematical proof of the correctness of inference tasks that they perform on behalf of the client. Specifically, SafetyNets develops and implements a specialized interactive proof (IP) protocol for verifiable execution of a class of deep neural networks, i.e., those that can be represented as arithmetic circuits. Our empirical results on three and fourlayer deep neural networks demonstrate the runtime costs of SafetyNets for both the client and server are low. SafetyNets detects any incorrect computations of the neural network by the untrusted server with high probability, while achieving stateoftheart accuracy on the MNIST digit recognition (99.4%) and TIMIT speech recognition tasks (75.22%). 
A formalization of convex polyhedra based on the simplex method. (arXiv:1706.10269v1 [cs.LO]) 
Authors: Xavier Allamigeon, Ricardo D. Katz We present a formalization of convex polyhedra in the proof assistant Coq. The cornerstone of our work is a complete implementation of the simplex method, together with the proof of its correctness and termination. This allows us to define the basic predicates over polyhedra in an effective way (i.e. as programs), and relate them with the corresponding usual logical counterparts. To this end, we make an extensive use of the Boolean reflection methodology. The benefit of this approach is that we can easily derive the proof of several essential results on polyhedra, such as Farkas Lemma, duality theorem of linear programming, and Minkowski Theorem. 
Lifelong Learning in Costly Feature Spaces. (arXiv:1706.10271v1 [cs.LG]) 
Authors: MariaFlorina Balcan, Avrim Blum, Vaishnavh Nagarajan An important longterm goal in machine learning systems is to build learning agents that, like humans, can learn many tasks over their lifetime, and moreover use information from these tasks to improve their ability to do so efficiently. In this work, our goal is to provide new theoretical insights into the potential of this paradigm. In particular, we propose a lifelong learning framework that adheres to a novel notion of resource efficiency that is critical in many realworld domains where feature evaluations are costly. That is, our learner aims to reuse information from previously learned related tasks to learn future tasks in a featureefficient manner. Furthermore, we consider novel combinatorial ways in which learning tasks can relate. Specifically, we design lifelong learning algorithms for two structurally different and widely used families of target functions: decision trees/lists and monomials/polynomials. We also provide strong featureefficiency guarantees for these algorithms; in fact, we show that in order to learn future targets, we need only slightly more feature evaluations per training example than what is needed to predict on an arbitrary example using those targets. We also provide algorithms with guarantees in an agnostic model where not all the targets are related to each other. Finally, we also provide lower bounds on the performance of a lifelong learner in these models, which are in fact tight under some conditions. 
A Model for Attribute Based RoleRole Assignment (ARRA). (arXiv:1706.10274v1 [cs.CR]) 
Authors: Jiwan Ninglekhu, Ram Krishnan Administrative Role Based Access Control (ARBAC) models specify how to manage userrole assignments (URA), permissionrole assignments (PRA), and rolerole assignments (RRA). Many approaches have been proposed in the literature for URA, PRA, and RRA. In this paper, we propose a model for attributebased rolerole assignment (ARRA), a novel way to unify prior RRA approaches. We leverage the idea that attributes of various RBAC entities such as admin users and regular roles can be used to administer RRA in a highly flexible manner. We demonstrate that ARRA can express and unify prior RRA models. 
Signal Reconstruction from Interferometric Measurements under Sensing Constraints. (arXiv:1706.10275v1 [cs.IT]) 
Authors: Davood Mardani, George K. Atia, Ayman F. Abouraddy This paper develops a unifying framework for signal reconstruction from interferometric measurements that is broadly applicable to various applications of interferometry. In this framework, the problem of signal reconstruction in interferometry amounts to one of basis analysis. Its applicability is shown to extend beyond conventional temporal interferometry, which leverages the relative delay between the two arms of an interferometer, to arbitrary degrees of freedom of the input signal. This allows for reconstruction of signals supported in other domains (e.g., spatial) with no modification to the underlying structure except for replacing the standard temporal delay with a generalized delay, that is, a practically realizable unitary transformation for which the basis elements are eigenfunctions. Under the proposed model, the interferometric measurements are shown to be linear in the basis coefficients, thereby enabling efficient and fast recovery of the desired information. While the corresponding linear transformation has only a limited number of degrees of freedom set by the structure of the interferometer giving rise to a highly constrained sensing structure, we show that the problem of signal recovery from such measurements can still be carried out compressively. This signifies significant reduction in sample complexity without introducing any additional randomization as is typically done in prior work leveraging compressive sensing techniques. We provide performance guarantees under constrained sensing by proving that the transformation satisfies sufficient conditions for successful reconstruction of sparse signals using concentration arguments. We showcase the effectiveness of the proposed approach using simulation results, as well as actual experimental results in the context of optical modal analysis of spatial beams. 
DataLair: Efficient Block Storage with Plausible Deniability against MultiSnapshot Adversaries. (arXiv:1706.10276v1 [cs.CR]) 
Authors: Anrin Chakraborti, Chen Chen, Radu Sion Sensitive information is present on our phones, disks, watches and computers. Its protection is essential. Plausible deniability of stored data allows individuals to deny that their device contains a piece of sensitive information. This constitutes a key tool in the fight against oppressive governments and censorship. Unfortunately, existing solutions, such as the now defunct TrueCrypt [5], can defend only against an adversary that can access a users device at most once (singlesnapshot adversary). Recent solutions have traded significant performance overheads for the ability to handle more powerful adversaries able to access the device at multiple points in time (multisnapshot adversary). In this paper we show that this sacrifice is not necessary. We introduce and build DataLair 1 , a practical plausible deniability mechanism. When compared with exist ing approaches, DataLair is two orders of magnitude faster for public data accesses, and 5 times faster for hidden data accesses. An important component in DataLair is a new writeonly ORAM construction which improves on the complexity of the state of the art writeonly ORAM by a factor of O(logN ), where N denotes the underlying storage disk size. 
Bolt: Accelerated Data Mining with Fast Vector Compression. (arXiv:1706.10283v1 [cs.PF]) 
Authors: Davis W Blalock, John V Guttag Vectors of data are at the heart of machine learning and data mining. Recently, vector quantization methods have shown great promise in reducing both the time and space costs of operating on vectors. We introduce a vector quantization algorithm that can compress vectors over 12x faster than existing techniques while also accelerating approximate vector operations such as distance and dot product computations by up to 10x. Because it can encode over 2GB of vectors per second, it makes vector quantization cheap enough to employ in many more circumstances. For example, using our technique to compute approximate dot products in a nested loop can multiply matrices faster than a stateoftheart BLAS implementation, even when our algorithm must first compress the matrices. In addition to showing the above speedups, we demonstrate that our approach can accelerate nearest neighbor search and maximum inner product search by over 100x compared to floating point operations and up to 10x compared to other vector quantization methods. Our approximate Euclidean distance and dot product computations are not only faster than those of related algorithms with slower encodings, but also faster than Hamming distance computations, which have direct hardware support on the tested platforms. We also assess the errors of our algorithm's approximate distances and dot products, and find that it is competitive with existing, slower vector quantization algorithms. 
Cache Oblivious Algorithms for Computing the Triplet Distance Between Trees. (arXiv:1706.10284v1 [cs.DS]) 
Authors: Gerth Stølting Brodal, Konstantinos Mampentzidis We study the problem of computing the triplet distance between two rooted unordered trees with $n$ labeled leafs. Introduced by Dobson 1975, the triplet distance is the number of leaf triples that induce different topologies in the two trees. The current theoretically best algorithm is an $\mathrm{O}(n \log n)$ time algorithm by Brodal et al. (SODA 2013). Recently Jansson et al. proposed a new algorithm that, while slower in theory, requiring $\mathrm{O}(n \log^3 n)$ time, in practice it outperforms the theoretically faster $\mathrm{O}(n \log n)$ algorithm. Both algorithms do not scale to external memory. We present two cache oblivious algorithms that combine the best of both worlds. The first algorithm is for the case when the two input trees are binary trees and the second a generalized algorithm for two input trees of arbitrary degree. Analyzed in the RAM model, both algorithms require $\mathrm{O}(n \log n)$ time, and in the cache oblivious model $\mathrm{O}(\frac{n}{B} \log_{2} \frac{n}{M})$ I/Os. Their relative simplicity and the fact that they scale to external memory makes them achieve the best practical performance. We note that these are the first algorithms that scale to external memory, both in theory and practice, for this problem. 
PhysiologyAware Rural Ambulance Routing. (arXiv:1706.10290v1 [cs.NI]) 
Authors: Mohammad Hosseini, Richard B. Berlin Jr., Lui Sha In emergency patient transport from rural medical facility to center tertiary hospital, realtime monitoring of the patient in the ambulance by a physician expert at the tertiary center is crucial. While telemetry healthcare services using mobile networks may enable remote realtime monitoring of transported patients, physiologic measures and tracking are at least as important and requires the existence of highfidelity communication coverage. However, the wireless networks along the roads especially in rural areas can range from 4G to lowspeed 2G, some parts with communication breakage. From a patient care perspective, transport during critical illness can make route selection patient state dependent. Prompt decisions with the relative advantage of a longer more secure bandwidth route versus a shorter, more rapid transport route but with less secure bandwidth must be made. The tradeoff between route selection and the quality of wireless communication is an important optimization problem which unfortunately has remained unaddressed by prior work. In this paper, we propose a novel physiologyaware route scheduling approach for emergency ambulance transport of rural patients with acute, high risk diseases in need of continuous remote monitoring. We mathematically model the problem into an NPhard graph theory problem, and approximate a solution based on a tradeoff between communication coverage and shortest path. We profile communication along two major routes in a large rural hospital settings in Illinois, and use the traces to manifest the concept. Further, we design our algorithms and run preliminary experiments for scalability analysis. We believe that our scheduling techniques can become a compelling aid that enables an alwaysconnected remote monitoring system in emergency patient transfer scenarios aimed to prevent morbidity and mortality with early diagnosis treatment. 
Convergence of the randomized Kaczmarz method for phase retrieval. (arXiv:1706.10291v1 [math.NA]) 
Authors: Halyun Jeong, C. Sinan Güntürk The classical Kaczmarz iteration and its randomized variants are popular tools for fast inversion of linear overdetermined systems. This method extends naturally to the setting of the phase retrieval problem via substituting at each iteration the phase of any measurement of the available approximate solution for the unknown phase of the measurement of the true solution. Despite the simplicity of the method, rigorous convergence guarantees that are available for the classical linear setting have not been established so far for the phase retrieval setting. In this short note, we provide a convergence result for the randomized Kaczmarz method for phase retrieval in $\mathbb{R}^d$. We show that with high probability a random measurement system of size $m \asymp d$ will be admissible for this method in the sense that convergence in the mean square sense is guaranteed with any prescribed probability. The convergence is exponential and comparable to the linear setting. 
Onions in the Crosshairs: When The Man really is out to get you. (arXiv:1706.10292v1 [cs.CR]) 
Authors: Aaron D. Jaggard, Paul Syverson We introduce and investigate *targeting adversaries* who selectively attack users of Tor or other securecommunication networks. We argue that attacks by such adversaries are more realistic and more significant threats to those most relying on Tor's protection than are attacks in prior analyses of Tor security. Previous research and Tor design decisions have focused on protecting against adversaries who are equally interested in any user of the network. Our adversaries selectively target userse.g., those who visit a particular website or chat on a particular private channeland essentially disregard Tor users other than these. We present a model of such adversaries and investigate three example cases where particular users might be targeted: a cabal conducting meetings using MTor, a published Tor multicast protocol; a cabal meeting on a private IRC channel; and users visiting a particular .onion website. In general for our adversaries, compromise is much faster and provides more feedback and possibilities for adaptation than do attacks examined in prior work. We also discuss selection of websites for targeting of their users based on the distribution across users of site activity. We describe adversaries both attempting to learn the size of a cabal meeting online or of a set of sufficiently active visitors to a targeted site and attempting to identify guards of each targeted user. We compare the threat of targeting adversaries versus previously considered adversaries, and we briefly sketch possible countermeasures for resisting targeting adversaries. 
Noisy Networks for Exploration. (arXiv:1706.10295v1 [cs.LG]) 
Authors: Meire Fortunato, Mohammad Gheshlaghi Azar, Bilal Piot, Jacob Menick, Ian Osband, Alex Graves, Vlad Mnih, Remi Munos, Demis Hassabis, Olivier Pietquin, Charles Blundell, Shane Legg We introduce NoisyNet, a deep reinforcement learning agent with parametric noise added to its weights, and show that the induced stochasticity of the agent's policy can be used to aid efficient exploration. The parameters of the noise are learned with gradient descent along with the remaining network weights. NoisyNet is straightforward to implement and adds little computational overhead. We find that replacing the conventional exploration heuristics for A3C, DQN and dueling agents (entropy reward and $\epsilon$greedy respectively) with NoisyNet yields substantially higher scores for a wide range of Atari games, in some cases advancing the agent from sub to superhuman performance. 
Exploring the Human Connectome Topology in Group Studies. (arXiv:1706.10297v1 [qbio.NC]) 
Authors: Johnson J.G. Keiriz, Liang Zhan, Morris Chukhman, Olu Ajilore, Alex D. Leow, Angus G. Forbes Visually comparing brain networks, or connectomes, is an essential task in the field of neuroscience. Especially relevant to the field of clinical neuroscience, group studies that examine differences between populations or changes over time within a population enable neuroscientists to reason about effective diagnoses and treatments for a range of neuropsychiatric disorders. In this paper, we specifically explore how visual analytics tools can be used to facilitate various clinical neuroscience tasks, in which observation and analysis of meaningful patterns in the connectome can support patient diagnosis and treatment. We conduct a survey of visualization tasks that enable clinical neuroscience activities, and further explore how existing connectome visualization tools support or fail to support these tasks. Based on our investigation of these tasks, we introduce a novel visualization tool, NeuroCave, to support group studies analyses. We discuss how our design decisions (the use of immersive visualization, the use of hierarchical clustering and dimensionality reduction techniques, and the choice of visual encodings) are motivated by these tasks. We evaluate NeuroCave through two use cases that illustrate the utility of interactive connectome visualization in clinical neuroscience contexts. In the first use case, we study sex differences using functional connectomes and discover hidden connectome patterns associated with wellknown cognitive differences in spatial and verbal abilities. In the second use case, we show how the utility of visualizing the brain in different topological space coupled with clustering information can reveal the brain's intrinsic structure. 
Elementary epistemological features of machine intelligence. (arXiv:0812.0885v4 [cs.AI] UPDATED) 
Authors: Marko Horvat Theoretical analysis of machine intelligence (MI) is useful for defining a common platform in both theoretical and applied artificial intelligence (AI). The goal of this paper is to set canonical definitions that can assist pragmatic research in both strong and weak AI. Described epistemological features of machine intelligence include relationship between intelligent behavior, intelligent and unintelligent machine characteristics, observable and unobservable entities and classification of intelligence. The paper also establishes algebraic definitions of efficiency and accuracy of MI tests as their quality measure. The last part of the paper addresses the learning process with respect to the traditional epistemology and the epistemology of MI described here. The proposed views on MI positively correlate to the Hegelian monistic epistemology and contribute towards amalgamating idealistic deliberations with the AI theory, particularly in a local frame of reference. 
Using TPA to count linear extensions. (arXiv:1010.4981v2 [math.PR] UPDATED) 
Authors: Jacqueline Banks, Scott Garrabrant, Mark L. Huber, Anne Perizzolo A linear extension of a poset $P$ is a permutation of the elements of the set that respects the partial order. Let $L(P)$ denote the number of linear extensions. It is a #P complete problem to determine $L(P)$ exactly for an arbitrary poset, and so randomized approximation algorithms that draw randomly from the set of linear extensions are used. In this work, the set of linear extensions is embedded in a larger state space with a continuous parameter ?. The introduction of a continuous parameter allows for the use of a more efficient method for approximating $L(P)$ called TPA. Our primary result is that it is possible to sample from this continuous embedding in time that as fast or faster than the best known methods for sampling uniformly from linear extensions. For a poset containing $n$ elements, this means we can approximate $L(P)$ to within a factor of $1 + \epsilon$ with probability at least $1  \delta$ using an expected number of random bits and comparisons in the poset which is at most $O(n^3(ln n)(ln L(P))\epsilon^{2}\ln \delta^{1}).$ 
Empirical entropy, minimax regret and minimax risk. (arXiv:1308.1147v2 [math.ST] UPDATED) 
Authors: Alexander Rakhlin, Karthik Sridharan, Alexandre B. Tsybakov We consider the random design regression model with square loss. We propose a method that aggregates empirical minimizers (ERM) over appropriately chosen random subsets and reduces to ERM in the extreme case, and we establish sharp oracle inequalities for its risk. We show that, under the $\varepsilon^{p}$ growth of the empirical $\varepsilon$entropy, the excess risk of the proposed method attains the rate $n^{2/(2+p)}$ for $p\in(0,2)$ and $n^{1/p}$ for $p>2$ where $n$ is the sample size. Furthermore, for $p\in(0,2)$, the excess risk rate matches the behavior of the minimax risk of function estimation in regression problems under the wellspecified model. This yields a conclusion that the rates of statistical estimation in wellspecified models (minimax risk) and in misspecified models (minimax regret) are equivalent in the regime $p\in(0,2)$. In other words, for $p\in(0,2)$ the problem of statistical learning enjoys the same minimax rate as the problem of statistical estimation. On the contrary, for $p>2$ we show that the rates of the minimax regret are, in general, slower than for the minimax risk. Our oracle inequalities also imply the $v\log(n/v)/n$ rates for VapnikChervonenkis type classes of dimension $v$ without the usual convexity assumption on the class; we show that these rates are optimal. Finally, for a slightly modified method, we derive a bound on the excess risk of $s$sparse convex aggregation improving that of Lounici [Math. Methods Statist. 16 (2007) 246259] and providing the optimal rate. 
Genetic Algorithm for Solving Simple Mathematical Equality Problem. (arXiv:1308.4675v2 [cs.NE] UPDATED) 
Authors: Denny Hermawanto This paper explains genetic algorithm for novice in this field. Basic philosophy of genetic algorithm and its flowchart are described. Step by step numerical computation of genetic algorithm for solving simple mathematical equality problem will be briefly explained 
Universal channel coding for general output alphabet. (arXiv:1502.02218v3 [cs.IT] UPDATED) 
Authors: Masahito Hayashi We propose two types of universal codes that are suited to two asymptotic regimes when the output alphabet is possibly continuous. The first class has the property that the error probability decays exponentially fast and we identify an explicit lower bound on the error exponent. The other class attains the epsiloncapacity the channel and we also identify the secondorder term in the asymptotic expansion. The proposed encoder is essentially based on the packing lemma of the method of types. For the decoder, we first derive a R\'enyirelativeentropy version of Clarke and Barron's formula the distance between the true distribution and the Bayesian mixture, which is of independent interest. The universal decoder is stated in terms of this formula and quantities used in the information spectrum method. The methods contained herein allow us to analyze universal codes for channels with continuous and discrete output alphabets in a unified manner, and to analyze their performances in terms of the exponential decay of the error probability and the secondorder coding rate. 
GWAT: The Geneva Affective Picture Database WordNet Annotation Tool. (arXiv:1505.07395v2 [cs.HC] UPDATED) 
Authors: Marko Horvat, Dujo Duvnjak, Davor Jug The Geneva Affective Picture Database WordNet Annotation Tool (GWAT) is a userfriendly web application for manual annotation of pictures in Geneva Affective Picture Database (GAPED) with WordNet. The annotation tool has an intuitive interface which can be efficiently used with very little technical training. A single picture may be labeled with many synsets allowing experts to describe semantics with different levels of detail. Noun, verb, adjective and adverb synsets can be keywordsearched and attached to a specific GAPED picture with their unique identification numbers. Changes are saved automatically in the tool's relational database. The attached synsets can be reviewed, changed or deleted later. Additionally, GAPED pictures may be browsed in the tool's user interface using simple commands where previously attached WordNet synsets are displayed alongside the pictures. Stored annotations can be exported from the tool's database to different data formats and used in 3rd party applications if needed. Since GAPED does not define keywords of individual pictures but only a general category of picture groups, GWAT represents a significant improvement towards development of comprehensive picture semantics. The tool was developed with open technologies WordNet API, Apache, PHP5 and MySQL. It is freely available for scientific and noncommercial use. 
Retrieval of multimedia stimuli with semantic and emotional cues: Suggestions from a controlled study. (arXiv:1505.07396v2 [cs.HC] UPDATED) 
Authors: Marko Horvat, Davor Kukolja, Dragutin Ivanec The ability to efficiently search pictures with annotated semantics and emotion is an important problem for HumanComputer Interaction with considerable interdisciplinary significance. Accuracy and speed of the multimedia retrieval process depends on the chosen metadata annotation model. The quality of such multifaceted retrieval is opposed to the potential complexity of data setup procedures and development of multimedia annotations. Additionally, a recent study has shown that databases of emotionally annotated multimedia are still being predominately searched manually which highlights the need to study this retrieval modality. To this regard we present a study with N = 75 participants aimed to evaluate the influence of keywords and dimensional emotions in manual retrieval of pictures. The study showed that if the multimedia database is comparatively small emotional annotations are sufficient to achieve a fast retrieval despite comparatively lesser overall accuracy. In a larger dataset semantic annotations became necessary for efficient retrieval although they contributed to a slower beginning of the search process. The experiment was performed in a controlled environment with a team of psychology experts. The results were statistically consistent with validates measures of the participants' perceptual speed. 
Comparing affective responses to standardized pictures and videos: A study report. (arXiv:1505.07398v2 [cs.HC] UPDATED) 
Authors: Marko Horvat, Davor Kukolja, Dragutin Ivanec Multimedia documents such as text, images, sounds or videos elicit emotional responses of different polarity and intensity in exposed human subjects. These stimuli are stored in affective multimedia databases. The problem of emotion processing is an important issue in HumanComputer Interaction and different interdisciplinary studies particularly those related to psychology and neuroscience. Accurate prediction of users' attention and emotion has many practical applications such as the development of affective computer interfaces, multifaceted search engines, videoondemand, Internet communication and video games. To this regard we present results of a study with N=10 participants to investigate the capability of standardized affective multimedia databases in stimulation of emotion. Each participant was exposed to picture and video stimuli with previously determined semantics and emotion. During exposure participants' physiological signals were recorded and estimated for emotion in an offline analysis. Participants reported their emotion states after each exposure session. The a posteriori and a priori emotion values were compared. The experiment showed, among other reported results, that carefully designed video sequences induce a stronger and more accurate emotional reaction than pictures. Individual participants' differences greatly influence the intensity and polarity of experienced emotion. 
Sparse Approximation via Generating Point Sets. (arXiv:1507.02574v2 [cs.CG] UPDATED) 
Authors: Avrim Blum, Sariel HarPeled, Benjamin Raichel $ \newcommand{\kalg}{{k_{\mathrm{alg}}}} \newcommand{\kopt}{{k_{\mathrm{opt}}}} \newcommand{\algset}{{T}} \renewcommand{\Re}{\mathbb{R}} \newcommand{\eps}{\varepsilon} \newcommand{\pth}[2][\!]{#1\left({#2}\right)} \newcommand{\npoints}{n} \newcommand{\ballD}{\mathsf{b}} \newcommand{\dataset}{{P}} $ For a set $\dataset$ of $\npoints$ points in the unit ball $\ballD \subseteq \Re^d$, consider the problem of finding a small subset $\algset \subseteq \dataset$ such that its convexhull $\eps$approximates the convexhull of the original set. We present an efficient algorithm to compute such a $\eps'$approximation of size $\kalg$, where $\eps'$ is function of $\eps$, and $\kalg$ is a function of the minimum size $\kopt$ of such an $\eps$approximation. Surprisingly, there is no dependency on the dimension $d$ in both bounds. Furthermore, every point of $\dataset$ can be $\eps$approximated by a convexcombination of points of $\algset$ that is $O(1/\eps^2)$sparse. Our result can be viewed as a method for sparse, convex autoencoding: approximately representing the data in a compact way using sparse combinations of a small subset $\algset$ of the original data. The new algorithm can be kernelized, and it preserves sparsity in the original input. 
Degree of recurrence of generic diffeomorphisms. (arXiv:1510.00723v2 [math.DS] UPDATED) 
Authors: PierreAntoine Guihéneuf We study the spatial discretizations of dynamical systems: can we recover some dynamical features of a system from numerical simulations? Here, we tackle this issue for the simplest algorithm possible: we compute long segments of orbits with a fixed number of digits. We show that for every $r>1$, the dynamics of the discretizations of a $C^r$ generic conservative diffeomorphism of the torus is very different from that observed in the $C^0$ regularity. The proof of our results involves in particular a localglobal formula for discretizations, as well as a study of the corresponding linear case, which uses ideas from the theory of quasicrystals. 
How Does the LowRank Matrix Decomposition Help Internal and External Learnings for SuperResolution. (arXiv:1604.01497v3 [cs.CV] UPDATED) 
Authors: Shuang Wang, Bo Yue, Xuefeng Liang, Peiyuan Ji, Licheng Jiao Wisely utilizing the internal and external learning methods is a new challenge in superresolution problem. To address this issue, we analyze the attributes of two methodologies and find two observations of their recovered details: 1) they are complementary in both feature space and image plane, 2) they distribute sparsely in the spatial space. These inspire us to propose a lowrank solution which effectively integrates two learning methods and then achieves a superior result. To fit this solution, the internal learning method and the external learning method are tailored to produce multiple preliminary results. Our theoretical analysis and experiment prove that the proposed lowrank solution does not require massive inputs to guarantee the performance, and thereby simplifying the design of two learning methods for the solution. Intensive experiments show the proposed solution improves the single learning method in both qualitative and quantitative assessments. Surprisingly, it shows more superior capability on noisy images and outperforms stateoftheart methods. 
An artificial neural network to find correlation patterns in an arbitrary number of variables. (arXiv:1606.06564v2 [cs.LG] UPDATED) 
Authors: Alessandro Fontana Methods to find correlation among variables are of interest to many disciplines, including statistics, machine learning, (big) data mining and neurosciences. Parameters that measure correlation between two variables are of limited utility when used with multiple variables. In this work, I propose a simple criterion to measure correlation among an arbitrary number of variables, based on a data set. The central idea is to i) design a function of the variables that can take different forms depending on a set of parameters, ii) calculate the difference between a statistics associated to the function computed on the data set and the same statistics computed on a randomised version of the data set, called "scrambled" data set, and iii) optimise the parameters to maximise this difference. Many such functions can be organised in layers, which can in turn be stacked one on top of the other, forming a neural network. The function parameters are searched with an enhanced genetic algortihm called POET and the resulting method is tested on a cancer gene data set. The method may have potential implications for some issues that affect the field of neural networks, such as overfitting, the need to process huge amounts of data for training and the presence of "adversarial examples". 
Intriguingly Simple and Efficient TimeDependent Routing in Road Networks. (arXiv:1606.06636v2 [cs.DS] UPDATED) 
Authors: Ben Strasser We study the earliest arrival problem in road networks with static timedependent functions as arc weights. We propose and evaluate the following simple algorithm: (1) average the travel time in k time windows, (2) compute a shortest timeindependent path within each window and mark the edges in these paths, and (3) compute a shortest timedependent path in the original graph restricted to the marked edges. Our experimental evaluation shows that this simple algorithm yields near optimal results on wellestablished benchmark instances. We additionally demonstrate that the error can be further reduced by additionally considering alternative routes at the expense of more marked edges. Finally, we show that the achieved subgraphs are small enough to be able to efficiently implement profile queries using a simple samplingbased approach. A highlight of our introduced algorithms is that they do not rely on linking and merging profile functions. 
Arbitrarily regularizable graphs. (arXiv:1608.06427v2 [cs.SI] UPDATED) 
Authors: Massimo Franceschet, Enrico Bozzo A graph is regularizable if it is possible to assign weights to its edges so that all nodes have the same degree. Weights can be positive, nonnegative or arbitrary as soon as the regularization degree is not null. Positive and nonnegative regularizable graphs have been thoroughly investigated in the literature. In this work, we propose and study arbitrarily regularizable graphs. In particular, we investigate necessary and sufficient regularization conditions on the topology of the graph and of the corresponding adjacency matrix. Moreover, we study the computational complexity of the regularization problem and characterize it as a linear programming model. 
The specific shapes of gender imbalance in scientific authorships: a network approach. (arXiv:1608.07224v2 [cs.SI] UPDATED) 
Authors: Tanya Araújo, Elsa Fontainha Gender differences in collaborative research have received little attention when compared with the growing importance that women hold in academia and research. Unsurprisingly, most of bibliometric databases have a strong lack of directly available information by gender. Although empiricalbased network approaches are often used in the study of research collaboration, the studies about the influence of gender dissimilarities on the resulting topological outcomes are still scarce. Here, networks of scientific subjects are used to characterize patterns that might be associated to five categories of authorships which were built based on gender. We find enough evidence that gender imbalance in scientific authorships brings a peculiar trait to the networks induced from papers published in Web of Science (WoS) indexed journals of Economics over the period 20102015 and having at least one author affiliated to a Portuguese institution. Our results show the emergence of a specific pattern when the network of cooccurring subjects is induced from a set of papers exclusively authored by men. Such a maleexclusive authorship condition is found to be the solely responsible for the emergence that particular shape in the network structure. This peculiar trait might facilitate future network analyses of research collaboration and interdisciplinarity. 
Robust Regression For Image Binarization Under Heavy Noises and Nonuniform Background. (arXiv:1609.08078v3 [cs.CV] UPDATED) 
Authors: Garret Vo, Chiwoo Park This paper presents a robust regression approach for image binarization under significant background variations and observation noises. The work is motivated by the need of identifying foreground regions in noisy microscopic image or degraded document images, where significant background variation and severe noise make the image binarization challenging. The proposed method first estimates the background of an input image, subtracts the estimated background from the input image, and apply a global thresholding to the subtracted outcome for getting a binary image. A robust regression approach was proposed to estimate the background intensity surface with minimal effects of foreground intensities and noises, and a global threshold selector was proposed on the basis of a model selection criterion in a sparse regression. The proposed approach was validated using 26 test images and the corresponding ground truths, and the outcomes of the proposed work were compared with those from nine existing image binarization methods. The approach was also combined with three stateoftheart morphological segmentation methods to show how the proposed approach can improve their image segmentation outcomes. 
Diminishable Parameterized Problems and Strict Polynomial Kernelization. (arXiv:1611.03739v2 [cs.CC] UPDATED) 
Authors: Henning Fernau, Till Fluschnik, Danny Hermelin, Andreas Krebs, Hendrik Molter, Rolf Niedermeier Kernelizationthe mathematical key concept for provably effective polynomialtime preprocessing of NPhard problemsplays a central role in parameterized complexity and has triggered an extensive line of research. This is in part due to a lower bounds framework that allows to exclude polynomialsize kernels under the assumption of NP $\not\subseteq$ coNP/poly. In this paper we consider a restricted yet natural variant of kernelization, namely strict kernelization, where one is not allowed to increase the parameter of the reduced instance (the kernel) by more than an additive constant. Building on earlier work of Chen, Flum, and M\"uller [Theory Comput. Syst. 2011] and developing a general and remarkably simple framework, we show that a variety of FPT problems does not admit strict polynomial kernels under the weaker assumption of P $\neq$ NP. In particular, we show that various (multicolored) graph problems and Turing machine computation problems do not admit strict polynomial kernels unless P = NP. To this end, a key concept we use are diminishable problems; these are parameterized problems that allow to decrease the parameter of the input instance by at least one in polynomial time, thereby outputting an equivalent problem instance. Finally, we show that relaxing the concept of strict kernels to kernels with a constantfactor increase of the parameter leads to a scenario in which we can prove for a number of problems that the framework is not applicable assuming that the (Strong) Exponential Time Hypothesis holds. 
Bottleneck Conditional Density Estimation. (arXiv:1611.08568v3 [stat.ML] UPDATED) 
Authors: Rui Shu, Hung H. Bui, Mohammad Ghavamzadeh We introduce a new framework for training deep generative models for highdimensional conditional density estimation. The Bottleneck Conditional Density Estimator (BCDE) is a variant of the conditional variational autoencoder (CVAE) that employs layer(s) of stochastic variables as the bottleneck between the input $x$ and target $y$, where both are highdimensional. Crucially, we propose a new hybrid training method that blends the conditional generative model with a joint generative model. Hybrid blending is the key to effective training of the BCDE, which avoids overfitting and provides a novel mechanism for leveraging unlabeled data. We show that our hybrid training procedure enables models to achieve competitive results in the MNIST quadrant prediction task in the fullysupervised setting, and sets new benchmarks in the semisupervised regime for MNIST, SVHN, and CelebA. 
Compressive Sensing for Millimeter Wave Antenna Array Diagnosis. (arXiv:1612.06345v3 [cs.IT] UPDATED) 
Authors: Mohammed E. Eltayeb, Tareq Y. AlNaffouri, Robert W. Heath Jr The radiation pattern of an antenna array depends on the excitation weights and the geometry of the array. Due to wind and atmospheric conditions, outdoor millimeter wave antenna elements are subject to full or partial blockages from a plethora of particles like dirt, salt, ice, and water droplets. Handheld devices are also subject to blockages from random finger placement and/or finger prints. These blockages cause absorption and scattering to the signal incident on the array, and change the array geometry. This distorts the farfield radiation pattern of the array leading to an increase in the sidelobe level and decrease in gain. This paper studies the effects of blockages on the farfield radiation pattern of linear arrays and proposes two array diagnosis techniques for millimeter wave antenna arrays. The proposed techniques jointly estimate the locations of the blocked antennas and the induced attenuation and phase shifts. Numerical results show that the proposed techniques provide satisfactory results in terms of fault detection with reduced number of measurements (diagnosis time) provided that the number of blockages is small compared to the array size. 
Extension by Conservation. Sikorski's Theorem. (arXiv:1612.07345v2 [cs.LO] UPDATED) 
Authors: Davide Rinaldi, Daniel Wessel Constructive meaning is given to the assertion that every finite Boolean algebra is an injective object in the category of distributive lattices. To this end, we employ Scott's notion of entailment relation, in which context we describe Sikorski's extension theorem for finite Boolean algebras and turn it into a syntactical conservation result. As a byproduct, we facilitate proofs of several related classical principles. 
Validation, comparison, and combination of algorithms for automatic detection of pulmonary nodules in computed tomography images: the LUNA16 challenge. (arXiv:1612.08012v3 [cs.CV] UPDATED) 
Authors: Arnaud Arindra Adiyoso Setio, Alberto Traverso, Thomas de Bel, Moira S.N. Berens, Cas van den Bogaard, Piergiorgio Cerello, Hao Chen, Qi Dou, Maria Evelina Fantacci, Bram Geurts, Robbert van der Gugten, Pheng Ann Heng, Bart Jansen, Michael M.J. de Kaste, Valentin Kotov, Jack YuHung Lin, Jeroen T.M.C. Manders, Alexander SónoraMengana, Juan Carlos GarcíaNaranjo, Evgenia Papavasileiou, Mathias Prokop, Marco Saletta, Cornelia M SchaeferProkop, Ernst T. Scholten, Luuk Scholten, Miranda M. Snoeren, Ernesto Lopez Torres, Jef Vandemeulebroucke, Nicole Walasek, Guido C.A. Zuidhof, Bram van Ginneken, Colin Jacobs Automatic detection of pulmonary nodules in thoracic computed tomography (CT) scans has been an active area of research for the last two decades. However, there have only been few studies that provide a comparative performance evaluation of different systems on a common database. We have therefore set up the LUNA16 challenge, an objective evaluation framework for automatic nodule detection algorithms using the largest publicly available reference database of chest CT scans, the LIDCIDRI data set. In LUNA16, participants develop their algorithm and upload their predictions on 888 CT scans in one of the two tracks: 1) the complete nodule detection track where a complete CAD system should be developed, or 2) the false positive reduction track where a provided set of nodule candidates should be classified. This paper describes the setup of LUNA16 and presents the results of the challenge so far. Moreover, the impact of combining individual systems on the detection performance was also investigated. It was observed that the leading solutions employed convolutional networks and used the provided set of nodule candidates. The combination of these solutions achieved an excellent sensitivity of over 95% at fewer than 1.0 false positives per scan. This highlights the potential of combining algorithms to improve the detection performance. Our observer study with four expert readers has shown that the best system detects nodules that were missed by expert readers who originally annotated the LIDCIDRI data. We released this set of additional nodules for further development of CAD systems. 
Fast Exact kMeans, kMedians and Bregman Divergence Clustering in 1D. (arXiv:1701.07204v3 [cs.DS] UPDATED) 
Authors: Allan Grønlund, Kasper Green Larsen, Alexander Mathiasen, Jesper Sindahl Nielsen, Stefan Schneider, Mingzhou Song The $k$Means clustering problem on $n$ points is NPHard for any dimension $d\ge 2$, however, for the 1D case there exist exact polynomial time algorithms. Previous literature reported an $O(kn^2)$ time dynamic programming algorithm that uses $O(kn)$ space. We present a new algorithm computing the optimal clustering in only $O(kn)$ time using linear space. For $k = \Omega(\lg n)$, we improve this even further to $n 2^{O(\sqrt{ \lg \lg n \lg k})}$ time. We generalize the new algorithm(s) to work for the absolute distance instead of squared distance and to work for any Bregman Divergence as well. 
Characterizations of idempotent discrete uninorms. (arXiv:1701.07253v2 [math.RA] UPDATED) 
Authors: Miguel Couceiro, Jimmy Devillet, JeanLuc Marichal In this paper we provide an axiomatic characterization of the idempotent discrete uninorms by means of three conditions only: conservativeness, symmetry, and nondecreasing monotonicity. We also provide an alternative characterization involving the bisymmetry property. Finally, we provide a graphical characterization of these operations in terms of their contour plots, and we mention a few open questions for further research. 
Representations of language in a model of visually grounded speech signal. (arXiv:1702.01991v3 [cs.CL] UPDATED) 
Authors: Grzegorz Chrupała, Lieke Gelderloos, Afra Alishahi We present a visually grounded model of speech perception which projects spoken utterances and images to a joint semantic space. We use a multilayer recurrent highway network to model the temporal nature of spoken speech, and show that it learns to extract both form and meaningbased linguistic knowledge from the input signal. We carry out an indepth analysis of the representations used by different components of the trained model and show that encoding of semantic aspects tends to become richer as we go up the hierarchy of layers, whereas encoding of formrelated aspects of the language input tends to initially increase and then plateau or decrease. 
Massive MIMO Pilot Decontamination and Channel Interpolation via Wideband Sparse Channel Estimation. (arXiv:1702.07207v2 [cs.IT] UPDATED) 
Authors: Saeid Haghighatshoar, Giuseppe Caire We consider a massive MIMO system based on Time Division Duplexing (TDD) and channel reciprocity, where the base stations (BSs) learn the channel vectors of their users via the pilots transmitted by the users in the uplink (UL). It is wellknown that, in the limit of very large number of BS antennas, the system performance is limited by pilot contamination, due to the fact that the same set of orthogonal pilots is reused in multiple cells. In this paper, we propose a lowcomplexity algorithm that uses the received UL wideband pilot snapshots in an observation window comprising several coherence blocks (CBs) to obtain an estimate of the angledelay Power Spread Function (PSF) of the received signal. This is generally given by the sum of the angledelay PSF of the desired user and the angledelay PSFs of the copilot users (CPUs), i.e., the users reusing the same pilot dimensions in other cells/sectors. We propose supervised and unsupervised clustering algorithms to decompose the estimated PSF and isolate the part corresponding to the desired user only. We use this decomposition to obtain an estimate of the covariance matrix of the user wideband channel vector, which we exploit to decontaminate the desired user channel estimate by applying Minimum Mean Squared Error (MMSE) smoothing filter, i.e., the optimal channel interpolator in the MMSE sense. We also propose an effective lowcomplexity approximation/implementation of this smoothing filter. We use numerical simulations to assess the performance of our proposed method, and compare it with other recently proposed schemes that use the same idea of separability of users in the angledelay domain. 
Algorithmic Chaining and the Role of Partial Feedback in Online Nonparametric Learning. (arXiv:1702.08211v2 [stat.ML] UPDATED) 
Authors: Nicolò CesaBianchi, Pierre Gaillard (SIERRA), Claudio Gentile, Sébastien Gerchinovitz (IMT) We investigate contextual online learning with nonparametric (Lipschitz) comparison classes under different assumptions on losses and feedback information. For full information feedback and Lipschitz losses, we design the first explicit algorithm achieving the minimax regret rate (up to log factors). In a partial feedback model motivated by secondprice auctions, we obtain algorithms for Lipschitz and semiLipschitz losses with regret bounds improving on the known bounds for standard bandit feedback. Our analysis combines novel results for contextual secondprice auctions with a novel algorithmic approach based on chaining. When the context space is Euclidean, our chaining approach is efficient and delivers an even better regret bound. 
An Optimization Framework with Flexible Inexact Inner Iterations for Nonconvex and Nonsmooth Programming. (arXiv:1702.08627v3 [cs.CV] UPDATED) 
Authors: Yiyang Wang, Risheng Liu, Xiaoliang Song, Zhixun Su In recent years, numerous vision and learning tasks have been (re)formulated as nonconvex and nonsmooth programmings(NNPs). Although some algorithms have been proposed for particular problems, designing fast and flexible optimization schemes with theoretical guarantee is a challenging task for general NNPs. It has been investigated that performing inexact inner iterations often benefit to special applications case by case, but their convergence behaviors are still unclear. Motivated by these practical experiences, this paper designs a novel algorithmic framework, named inexact proximal alternating direction method (IPAD) for solving general NNPs. We demonstrate that any numerical algorithms can be incorporated into IPAD for solving subproblems and the convergence of the resulting hybrid schemes can be consistently guaranteed by a series of simple error conditions. Beyond the guarantee in theory, numerical experiments on both synthesized and realworld data further demonstrate the superiority and flexibility of our IPAD framework for practical use. 
Attentive Recurrent Comparators. (arXiv:1703.00767v3 [cs.CV] UPDATED) 
Authors: Pranav Shyam, Shubham Gupta, Ambedkar Dukkipati Rapid learning requires flexible representations to quickly adopt to new evidence. We develop a novel class of models called Attentive Recurrent Comparators (ARCs) that form representations of objects by cycling through them and making observations. Using the representations extracted by ARCs, we develop a way of approximating a \textit{dynamic representation space} and use it for oneshot learning. In the task of oneshot classification on the Omniglot dataset, we achieve the state of the art performance with an error rate of 1.5\%. This represents the first superhuman result achieved for this task with a generic model that uses only pixel information. 
Foundations for a Probabilistic Event Calculus. (arXiv:1703.06815v2 [cs.AI] UPDATED) 
Authors: Fabio Aurelio D'Asaro, Antonis Bikakis, Luke Dickens, Rob Miller We present PEC, an Event Calculus (EC) style action language for reasoning about probabilistic causal and narrative information. It has an action language style syntax similar to that of the EC variant ModularE. Its semantics is given in terms of possible worlds which constitute possible evolutions of the domain, and builds on that of EFEC, an epistemic extension of EC. We also describe an ASP implementation of PEC and show the sense in which this is sound and complete. 
Querying Log Data with Metric Temporal Logic (Technical Report). (arXiv:1703.08982v2 [cs.LO] UPDATED) 
Authors: Sebastian Brandt, Elem Güzel Kalaycı, Vladislav Ryzhikov, Guohui Xiao, Michael Zakharyaschev We propose a novel framework for ontologybased access to temporal log data using a datalog extension datalogMTL of a Horn fragment of the metric temporal logic MTL. We show that datalogMTL is ExpSpacecomplete even with punctual intervals, in which case full MTL is known to be undecidable. We also prove that nonrecursive datalogMTL is PSpacecomplete for combined complexity and in AC0 for data complexity. We demonstrate by two realworld use cases that nonrecursive datalogMTL programs can express complex temporal concepts from typical user queries and thereby facilitate access to temporal log data. Our experiments with Siemens turbine data and MesoWest weather data show that datalogMTL ontologymediated queries are efficient and scale on large datasets of up to 8.3GB. 
Probabilistic Line Searches for Stochastic Optimization. (arXiv:1703.10034v2 [cs.LG] UPDATED) 
Authors: Maren Mahsereci, Philipp Hennig In deterministic optimization, line searches are a standard tool ensuring stability and efficiency. Where only stochastic gradients are available, no direct equivalent has so far been formulated, because uncertain gradients do not allow for a strict sequence of decisions collapsing the search space. We construct a probabilistic line search by combining the structure of existing deterministic methods with notions from Bayesian optimization. Our method retains a Gaussian process surrogate of the univariate optimization objective, and uses a probabilistic belief over the Wolfe conditions to monitor the descent. The algorithm has very low computational cost, and no usercontrolled parameters. Experiments show that it effectively removes the need to define a learning rate for stochastic gradient descent. 
Online and LinearTime Attention by Enforcing Monotonic Alignments. (arXiv:1704.00784v2 [cs.LG] UPDATED) 
Authors: Colin Raffel, MinhThang Luong, Peter J. Liu, Ron J. Weiss, Douglas Eck Recurrent neural network models with an attention mechanism have proven to be extremely effective on a wide variety of sequencetosequence problems. However, the fact that soft attention mechanisms perform a pass over the entire input sequence when producing each element in the output sequence precludes their use in online settings and results in a quadratic time complexity. Based on the insight that the alignment between input and output sequence elements is monotonic in many problems of interest, we propose an endtoend differentiable method for learning monotonic alignments which, at test time, enables computing attention online and in linear time. We validate our approach on sentence summarization, machine translation, and online speech recognition problems and achieve results competitive with existing sequencetosequence models. 
Deriving Probability Density Functions from Probabilistic Functional Programs. (arXiv:1704.00917v2 [cs.PL] UPDATED) 
Authors: Sooraj Bhat, Johannes Borgström, Andrew D. Gordon, Claudio Russo The probability density function of a probability distribution is a fundamental concept in probability theory and a key ingredient in various widely used machine learning methods. However, the necessary framework for compiling probabilistic functional programs to density functions has only recently been developed. In this work, we present a density compiler for a probabilistic language with failure and both discrete and continuous distributions, and provide a proof of its soundness. The compiler greatly reduces the development effort of domain experts, which we demonstrate by solving inference problems from various scientific applications, such as modelling the global carbon cycle, using a standard Markov chain Monte Carlo framework. 
TransNets: Learning to Transform for Recommendation. (arXiv:1704.02298v2 [cs.IR] UPDATED) 
Authors: Rose Catherine, William Cohen Recently, deep learning methods have been shown to improve the performance of recommender systems over traditional methods, especially when review text is available. For example, a recent model, DeepCoNN, uses neural nets to learn one latent representation for the text of all reviews written by a target user, and a second latent representation for the text of all reviews for a target item, and then combines these latent representations to obtain stateoftheart performance on recommendation tasks. We show that (unsurprisingly) much of the predictive value of review text comes from reviews of the target user for the target item. We then introduce a way in which this information can be used in recommendation, even when the target user's review for the target item is not available. Our model, called TransNets, extends the DeepCoNN model by introducing an additional latent layer representing the target usertarget item pair. We then regularize this layer, at training time, to be similar to another latent representation of the target user's review of the target item. We show that TransNets and extensions of it improve substantially over the previous stateoftheart. 
Precision Interfaces. (arXiv:1704.03022v2 [cs.DB] UPDATED) 
Authors: Haoci Zhang, Thibault Sellam, Eugene Wu Building interactive tools to support data analysis is hard because it is not always clear what to build and how to build it. To address this problem, we present Precision Interfaces, a semiautomatic system to generate taskspecific data analytics interfaces. Precision Interface can turn a log of executed programs into an interface, by identifying microvariations between the programs and mapping them to interface components. This paper focuses on SQL query logs, but we can generalize the approach to other languages. Our system operates in two steps: it first build an interaction graph, which describes how the queries can be transformed into each other. Then, it finds a set of UI components that covers a maximal number of transformations. To restrict the domain of changes to be detected, our system uses a domainspecific language, PILang. We give a full description of Precision Interface's components, showcase an early prototype on real program logs and discuss future research opportunities. 
Analytical study of the "masterworker" framework scalability on multiprocessors with distributed memory. (arXiv:1704.05816v7 [cs.DC] UPDATED) 
Authors: L.B. Sokolinsky The paper is devoted to an analytical study of the "masterworker" framework scalability on multiprocessors with distributed memory. A new model of parallel computations called BSF is proposed. The BSF model is based on BSP and SPMD models. The scope of BSF model is the computeintensive applications. The architecture of BSFcomputer is defined. The structure of BSFprogram is described. The Using this metric, the upper scalability bounds of BSF programs on distributed memory multiprocessors are evaluated. The formulas for estimating the parallel efficiency of BSF programs also proposed. 
PAFit: an R Package for Estimating Preferential Attachment and Node Fitness in Temporal Complex Networks. (arXiv:1704.06017v3 [physics.dataan] UPDATED) 
Authors: Thong Pham, Paul Sheridan, Hidetoshi Shimodaira Many realworld systems are profitably described as complex networks that grow over time. Preferential attachment and node fitness are two ubiquitous growth mechanisms that not only explain certain structural properties commonly observed in realworld systems, but are also tied to a number of applications in modeling and inference. In the node fitness mechanism, the probability a node acquires a new edge is proportional to a quantity called fitness that is assumed to be independent of the network structure. On the other hand, in the preferential attachment mechanism, this probability of acquiring new edges is proportional to a function of the current number of edges of the node. While this function is originally assumed to be the linear function, and hence fixed, in general it can be arbitrary, and thus is the target of estimation in realworld datasets. While there are standard statistical packages for estimating the structural properties of complex networks, there is no corresponding package when it comes to the estimation of preferential attachment and node fitness mechanisms. This paper introduces the R package PAFit, which implements wellestablished statistical methods for estimating preferential attachment and node fitness, as well as a number of functions for generating complex networks from these two mechanisms. The main computational part of the package is implemented in C++ with OpenMP to ensure good performance for largescale networks. In this paper, we first introduce the main functionalities of PAFit using simulated examples, and then use the package to analyze a collaboration network between scientists in the field of complex networks. 
An expressive completeness theorem for coalgebraic modal mucalculi. (arXiv:1704.08637v2 [cs.LO] UPDATED) 
Authors: Sebastian Enqvist, Fatemeh Seifan, Yde Venema Generalizing standard monadic secondorder logic for Kripke models, we introduce monadic secondorder logic interpreted over coalgebras for an arbitrary set functor. We then consider invariance under behavioral equivalence of MSOformulas. More specifically, we investigate whether the coalgebraic mucalculus is the bisimulationinvariant fragment of the monadic secondorder language for a given functor. Using automatatheoretic techniques and building on recent results by the third author, we show that in order to provide such a characterization result it suffices to find what we call an adequate uniform construction for the coalgebraic type functor. As direct applications of this result we obtain a partly new proof of the JaninWalukiewicz Theorem for the modal mucalculus, avoiding the use of syntactic normal forms, and bisimulation invariance results for the bag functor (graded modal logic) and all exponential polynomial functors (including the "game functor"). As a more involved application, involving additional nontrivial ideas, we also derive a characterization theorem for the monotone modal mucalculus, with respect to a natural monadic secondorder language for monotone neighborhood models. 
InfiniteDuration Bidding Games. (arXiv:1705.01433v2 [cs.LO] UPDATED) 
Authors: Guy Avni, Thomas A. Henzinger, Ventsislav Chonev Twoplayer games on graphs are widely studied in formal methods as they model the interaction between a system and its environment. The game is played by moving a token throughout a graph to produce an infinite path. There are several common modes to determine how the players move the token through the graph; e.g., in turnbased games the players alternate turns in moving the token. We study the {\em bidding} mode of moving the token, which, to the best of our knowledge, has never been studied in infiniteduration games. Both players have separate {\em budgets}, which sum up to $1$. In each turn, a bidding takes place. Both players submit bids simultaneously, and a bid is legal if it does not exceed the available budget. The winner of the bidding pays his bid to the other player and moves the token. For reachability objectives, repeated bidding games have been studied and are called {\em Richman games} \cite{LLPU96,LLPSU99}. There, a central question is the existence and computation of {\em threshold} budgets; namely, a value $t \in [0,1]$ such that if \PO's budget exceeds $t$, he can win the game, and if \PT's budget exceeds $1t$, he can win the game. We focus on parity games and meanpayoff games. We show the existence of threshold budgets in these games, and reduce the problem of finding them to Richman games. We also determine the strategycomplexity of an optimal strategy. Our most interesting result shows that memoryless strategies suffice for meanpayoff bidding games. 
Link Mining for Kernelbased CompoundProtein Interaction Predictions Using a Chemogenomics Approach. (arXiv:1705.01667v2 [qbio.QM] UPDATED) 
Authors: Masahito Ohue, Takuro Yamazaki, Tomohiro Ban, Yutaka Akiyama Virtual screening (VS) is widely used during computational drug discovery to reduce costs. Chemogenomicsbased virtual screening (CGBVS) can be used to predict new compoundprotein interactions (CPIs) from known CPI network data using several methods, including machine learning and data mining. Although CGBVS facilitates highly efficient and accurate CPI prediction, it has poor performance for prediction of new compounds for which CPIs are unknown. The pairwise kernel method (PKM) is a stateoftheart CGBVS method and shows high accuracy for prediction of new compounds. In this study, on the basis of link mining, we improved the PKM by combining link indicator kernel (LIK) and chemical similarity and evaluated the accuracy of these methods. The proposed method obtained an average area under the precisionrecall curve (AUPR) value of 0.562, which was higher than that achieved by the conventional Gaussian interaction profile (GIP) method (0.425), and the calculation time was only increased by a few percent. 
Inplace Parallel Super Scalar Samplesort (IPS$^4$o). (arXiv:1705.02257v2 [cs.DC] UPDATED) 
Authors: Michael Axtmann, Sascha Witt, Daniel Ferizovic, Peter Sanders We present a sorting algorithm that works inplace, executes in parallel, is cacheefficient, avoids branchmispredictions, and performs work O(n log n) for arbitrary inputs with high probability. The main algorithmic contributions are new ways to make distributionbased algorithms inplace: On the practical side, by using coarsegrained blockbased permutations, and on the theoretical side, we show how to eliminate the recursion stack. Extensive experiments show that our algorithm IPS$^4$o scales well on a variety of multicore machines. We outperform our closest inplace competitor by a factor of up to 3. Even as a sequential algorithm, we are up to 1.5 times faster than the closest sequential competitor, BlockQuicksort. 
Stable Architectures for Deep Neural Networks. (arXiv:1705.03341v2 [cs.LG] UPDATED) 
Authors: Eldad Haber, Lars Ruthotto Deep neural networks have become invaluable tools for supervised machine learning, e.g., classification of text or images. While often offering superior results over traditional techniques and successfully expressing complicated patterns in data, deep architectures are known to be challenging to design and train such that they generalize well to new data. Important issues with deep architectures are numerical instabilities in derivativebased learning algorithms commonly called exploding or vanishing gradients. In this paper we propose new forward propagation techniques inspired by systems of Ordinary Differential Equations (ODE) that overcome this challenge and lead to wellposed learning problems for arbitrarily deep networks. The backbone of our approach is our interpretation of deep learning as a parameter estimation problem of nonlinear dynamical systems. Given this formulation, we analyze stability and wellposedness of deep learning and use this new understanding to develop new network architectures. We relate the exploding and vanishing gradient phenomenon to the stability of the discrete ODE and present several strategies for stabilizing deep learning for very deep networks. While our new architectures restrict the solution space, several numerical experiments show their competitiveness with stateoftheart networks. 
PrivacyScore: Improving Privacy and Security via CrowdSourced Benchmarks of Websites. (arXiv:1705.05139v2 [cs.CR] UPDATED) 
Authors: Max Maass, Pascal Wichmann, Henning Pridöhl, Dominik Herrmann Website owners make conscious and unconscious decisions that affect their users, potentially exposing them to privacy and security risks in the process. In this paper we introduce PrivacyScore, an automated website scanning portal that allows anyone to benchmark security and privacy features of multiple websites. In contrast to existing projects, the checks implemented in PrivacyScore cover a wider range of potential privacy and security issues. Furthermore, users can control the ranking and analysis methodology. Therefore, PrivacyScore can also be used by data protection authorities to perform regularly scheduled compliance checks. In the long term we hope that the transparency resulting from the published benchmarks creates an incentive for website owners to improve their sites. The public availability of a first version of PrivacyScore was announced at the ENISA Annual Privacy Forum in June 2017. 
PrivacyScore: Analyse von Webseiten auf Sicherheits und Privatheitsprobleme  Konzept und rechtliche Zul\"assigkeit. (arXiv:1705.08889v2 [cs.CR] UPDATED) 
Authors: Max Maass, Anne Laubach, Dominik Herrmann PrivacyScore ist ein \"offentliches WebPortal, mit dem automatisiert \"uberpr\"uft werden kann, ob Webseiten g\"angige Mechanismen zum Schutz von Sicherheit und Privatheit korrekt implementieren. Im Gegensatz zu existierenden Diensten erm\"oglicht PrivacyScore, mehrere Webseiten in Benchmarks miteinander zu vergleichen, die Ergebnisse differenziert und im Zeitverlauf zu analysieren sowie nutzerdefinierte Kriterien f\"ur die Auswertung zu definieren. PrivacyScore verbessert dadurch nicht nur die Transparenz f\"ur Endanwender, sondern erleichtert auch die Arbeit der DatenschutzAufsichtsbeh\"orden. In diesem Beitrag stellen wir das Konzept des Dienstes vor und wir er\"ortern, unter welchen Umst\"anden das automatische Scannen und \"offentliche "Anprangern" von Schw\"achen aus rechtlicher Sicht zul\"assig ist.  This German article describes the technical and legal considerations surrounding PrivacyScore, a public web portal that allows automatic scans of websites for privacy and security problems. For an English article discussing the same system in more technical detail, but lacking the legal interpretation, see arXiv:1705.05139. 
Stochastic AssumeGuarantee Contracts for CyberPhysical System Design Under Probabilistic Requirements. (arXiv:1705.09316v2 [cs.SY] UPDATED) 
Authors: Jiwei Li, Pierluigi Nuzzo, Alberto SangiovanniVincentelli, Yugeng Xi, Dewei Li We develop an assumeguarantee contract framework for the design of cyberphysical systems, modeled as closedloop control systems, under probabilistic requirements. We use a variant of signal temporal logic, namely, Stochastic Signal Temporal Logic (StSTL) to specify system behaviors as well as contract assumptions and guarantees, thus enabling automatic reasoning about requirements of stochastic systems. Given a stochastic linear system representation and a set of requirements captured by bounded StSTL contracts, we propose algorithms that can check contract compatibility, consistency, and refinement, and generate a controller to guarantee that a contract is satisfied, following a stochastic model predictive control approach. Our algorithms leverage encodings of the verification and control synthesis tasks into mixed integer optimization problems, and conservative approximations of probabilistic constraints that produce both sound and tractable problem formulations. We illustrate the effectiveness of our approach on a few examples, including the design of embedded controllers for aircraft power distribution networks. 
Local Large Deviations: McMillian Theorem for multitype GaltonWatson Processes. (arXiv:1705.09967v2 [cs.IT] UPDATED) 
Authors: Kwabena DokuAmponsah In this article we prove a local large deviation principle (LLDP) for the critical multitype GaltonWatson process from spectral potential point. We define the socalled a spectral potential $U_{\skrik}(\,\cdot,\,\pi)$ for the GaltonWatson process, where $\pi$ is the normalized eigen vector corresponding to the leading \emph{PerronFrobenius eigen value } $\1$ of the transition matrix $\skria(\cdot,\,\cdot)$ defined from ${\skrik},$ the transition kernel. We show that the Kullback action or the deviation function, $J(\pi,\rho),$ with respect to an empirical offspring measure, $\rho,$ is the Legendre dual of $U_{\skrik}(\,\cdot,\,\pi).$ From the LLDP we deduce a conditional large deviation principle and a weak variant of the classical McMillian Theorem for the multitype GaltonWatson process. To be specific, given any empirical offspring measure $\varpi,$ we show that the number of critical multitype GaltonWatson processes on $n$ vertices is approximately $e^{n\langle \skrih_{\varpi},\,\pi\rangle},$ where $\skrih_{\varpi}$ is a suitably defined entropy. 
General Bounds for Incremental Maximization. (arXiv:1705.10253v2 [cs.DM] UPDATED) 
Authors: Aaron Bernstein, Yann Disser, Martin Groß We propose a theoretical framework to capture incremental solutions to cardinality constrained maximization problems. The defining characteristic of our framework is that the cardinality/support of the solution is bounded by a value $k\in\mathbb{N}$ that grows over time, and we allow the solution to be extended one element at a time. We investigate the bestpossible competitive ratio of such an incremental solution, i.e., the worst ratio over all $k$ between the incremental solution after $k$ steps and an optimum solution of cardinality $k$. We define a large class of problems that contains many important cardinality constrained maximization problems like maximum matching, knapsack, and packing/covering problems. We provide a general $2.618$competitive incremental algorithm for this class of problems, and show that no algorithm can have competitive ratio below $2.18$ in general. In the second part of the paper, we focus on the inherently incremental greedy algorithm that increases the objective value as much as possible in each step. This algorithm is known to be $1.58$competitive for submodular objective functions, but it has unbounded competitive ratio for the class of incremental problems mentioned above. We define a relaxed submodularity condition for the objective function, capturing problems like maximum (weighted) ($b$)matching and a variant of the maximum flow problem. We show that the greedy algorithm has competitive ratio (exactly) $2.313$ for the class of problems that satisfy this relaxed submodularity condition. Note that our upper bounds on the competitive ratios translate to approximation ratios for the underlying cardinality constrained problems. 
An ExpectationMaximization Algorithm for the Fractal Inverse Problem. (arXiv:1706.03149v2 [stat.ML] UPDATED) 
Authors: Peter Bloem, Steven de Rooij We present an ExpectationMaximization algorithm for the fractal inverse problem: the problem of fitting a fractal model to data. In our setting the fractals are Iterated Function Systems (IFS), with similitudes as the family of transformations. The data is a point cloud in ${\mathbb R}^H$ with arbitrary dimension $H$. Each IFS defines a probability distribution on ${\mathbb R}^H$, so that the fractal inverse problem can be cast as a problem of parameter estimation. We show that the algorithm reconstructs wellknown fractals from data, with the model converging to high precision parameters. We also show the utility of the model as an approximation for datasources outside the IFS model class. 
Attention Is All You Need. (arXiv:1706.03762v4 [cs.CL] UPDATED) 
Authors: Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Lukasz Kaiser, Illia Polosukhin The dominant sequence transduction models are based on complex recurrent or convolutional neural networks in an encoderdecoder configuration. The best performing models also connect the encoder and decoder through an attention mechanism. We propose a new simple network architecture, the Transformer, based solely on attention mechanisms, dispensing with recurrence and convolutions entirely. Experiments on two machine translation tasks show these models to be superior in quality while being more parallelizable and requiring significantly less time to train. Our model achieves 28.4 BLEU on the WMT 2014 EnglishtoGerman translation task, improving over the existing best results, including ensembles by over 2 BLEU. On the WMT 2014 EnglishtoFrench translation task, our model establishes a new singlemodel stateoftheart BLEU score of 41.0 after training for 3.5 days on eight GPUs, a small fraction of the training costs of the best models from the literature. We show that the Transformer generalizes well to other tasks by applying it successfully to English constituency parsing both with large and limited training data. 
The complexity of the Multiple Pattern Matching Problem for random strings. (arXiv:1706.04928v2 [cs.DS] UPDATED) 
Authors: Frédérique Bassino, Tsinjo Rakotoarimalala, Andrea Sportiello We generalise a multiple string pattern matching algorithm, recently proposed by Fredriksson and Grabowski [J. Discr. Alg. 7, 2009], to deal with arbitrary dictionaries on an alphabet of size $s$. If $r_m$ is the number of words of length $m$ in the dictionary, and $\phi(r) = \max_m \ln(s\, m\, r_m)/m$, the complexity rate for the string characters to be read by this algorithm is at most $\kappa_{{}_\textrm{UB}}\, \phi(r)$ for some constant $\kappa_{{}_\textrm{UB}}$. On the other side, we generalise the classical lower bound of Yao [SIAM J. Comput. 8, 1979], for the problem with a single pattern, to deal with arbitrary dictionaries, and determine it to be at least $\kappa_{{}_\textrm{LB}}\, \phi(r)$. This proves the optimality of the algorithm, improving and correcting previous claims. 
Integration of Satellites in 5G through LEO Constellations. (arXiv:1706.06013v2 [cs.NI] UPDATED) 
Authors: Oltjon Kodheli, Alessandro Guidotti, Alessandro VanelliCoralli The standardization of 5G systems is entering in its critical phase, with 3GPP that will publish the PHY standard by June 2017. In order to meet the demanding 5G requirements both in terms of large throughput and global connectivity, Satellite Communications provide a valuable resource to extend and complement terrestrial networks. In this context, we consider a heterogeneous architecture in which a LEO megaconstellation satellite system provides backhaul connectivity to terrestrial 5G Relay Nodes, which create an onground 5G network. Since large delays and Doppler shifts related to satellite channels pose severe challenges to terrestrialbased systems, in this paper we assess their impact on the future 5G PHY and MAC layer procedures. In addition, solutions are proposed for Random Access, waveform numerology, and HARQ procedures. 
Lumping of DegreeBased Mean Field and Pair Approximation Equations for MultiState Contact Processes. (arXiv:1706.06964v2 [cs.SI] UPDATED) 
Authors: Charalampos Kyriakopoulos, Gerrit Grossmann, Verena Wolf, Luca Bortolussi Contact processes form a large and highly interesting class of dynamic processes on networks, including epidemic and information spreading. While devising stochastic models of such processes is relatively easy, analyzing them is very challenging from a computational point of view, particularly for large networks appearing in real applications. One strategy to reduce the complexity of their analysis is to rely on approximations, often in terms of a set of differential equations capturing the evolution of a random node, distinguishing nodes with different topological contexts (i.e., different degrees of different neighborhoods), like degreebased mean field (DBMF), approximate master equation (AME), or pair approximation (PA). The number of differential equations so obtained is typically proportional to the maximum degree kmax of the network, which is much smaller than the size of the master equation of the underlying stochastic model, yet numerically solving these equations can still be problematic for large kmax. In this paper, we extend AME and PA, which has been proposed only for the binary state case, to a multistate setting and provide an aggregation procedure that clusters together nodes having similar degrees, treating those in the same cluster as indistinguishable, thus reducing the number of equations while preserving an accurate description of global observables of interest. We also provide an automatic way to build such equations and to identify a small number of degree clusters that give accurate results. The method is tested on several case studies, where it shows a high level of compression and a reduction of computational time of several orders of magnitude for large networks, with minimal loss in accuracy. 
$\mu$Nap: Practical MicroSleeps for 802.11 WLANs. (arXiv:1706.08312v2 [cs.NI] UPDATED) 
Authors: Arturo Azcorra, Iñaki Ucar, Francesco Gringoli, Albert Banchs, Pablo Serrano In this paper, we revisit the idea of putting interfaces to sleep during 'packet overhearing' (i.e., when there are ongoing transmissions addressed to other stations) from a practical standpoint. To this aim, we perform a robust experimental characterisation of the timing and consumption behaviour of a commercial 802.11 card. We design $\mu$Nap, a local standardcompliant energysaving mechanism that leverages microsleep opportunities inherent to the CSMA operation of 802.11 WLANs. This mechanism is backwards compatible and incrementally deployable, and takes into account the timing limitations of existing hardware, as well as practical CSMArelated issues (e.g., capture effect). According to the performance assessment carried out through tracebased simulation, the use of our scheme would result in a 57% reduction in the time spent in overhearing, thus leading to an energy saving of 15.8% of the activity time. 
Accelerating Science: A Computing Research Agenda. (arXiv:1604.02006v1 [cs.CY] CROSS LISTED) 
Authors: Vasant G. Honavar, Mark D. Hill, Katherine Yelick The emergence of "big data" offers unprecedented opportunities for not only accelerating scientific advances but also enabling new modes of discovery. Scientific progress in many disciplines is increasingly enabled by our ability to examine natural phenomena through the computational lens, i.e., using algorithmic or information processing abstractions of the underlying processes; and our ability to acquire, share, integrate and analyze disparate types of data. However, there is a huge gap between our ability to acquire, store, and process data and our ability to make effective use of the data to advance discovery. Despite successful automation of routine aspects of data management and analytics, most elements of the scientific process currently require considerable human expertise and effort. Accelerating science to keep pace with the rate of data acquisition and data processing calls for the development of algorithmic or information processing abstractions, coupled with formal methods and tools for modeling and simulation of natural processes as well as major innovations in cognitive tools for scientists, i.e., computational tools that leverage and extend the reach of human intellect, and partner with humans on a broad range of tasks in scientific discovery (e.g., identifying, prioritizing formulating questions, designing, prioritizing and executing experiments designed to answer a chosen question, drawing inferences and evaluating the results, and formulating new questions, in a closedloop fashion). This calls for concerted research agenda aimed at: Development, analysis, integration, sharing, and simulation of algorithmic or information processing abstractions of natural processes, coupled with formal methods and tools for their analyses and simulation; Innovations in cognitive tools that augment and extend human intellect and partner with humans in all aspects of science. 
#28 El gran negocio de las publicaciones cientïficas 
#26 Soy investigador desde hace 10 anyos y no hay trabajo que no haya subido a arXiv antes de mandarlo a publicar a las revistas. Y adem'as todos mis trabajos son puramente te'oricos... No te digo mi nombre porque no me apetece... pero te invito a buscar un trabajo de f'isica te'orica o de matem'aticas a partir de 1995 (arXiv se cre'o en 1991) que no est'e en arXiv publicado. Elige cualquier nombre de un f'isico te'orico de cualquier universidad de Espanya, por ejemplo, y comprueba si sus trabajos en arXiv » autor: wittten 
#26 El gran negocio de las publicaciones cientïficas 
#17 ArXiv y BioarXiv no arreglan el problema, porque luego tienes que seguir pasando "por caja". El negocio va a seguir igual porque el proceso de peer review pasa inequívocamente por las revistas. Y si todos los científicos del mundo se ponen de acuerdo y comienzan a publicar en ArXiv (que no va a pasar), las editoriales empezarán a apretar las tuercas, porque saben que ahí está su negocio. Esas plataformas no van a arreglar nada. » autor: Olaf_123 
#21 El gran negocio de las publicaciones cientïficas 
#20 Al contrario de lo que dices, es precisamente la gente con menos recursos la que se ve m'as respaldada por las publicaciones en abierto y deber'ia usarlas m'as... Los plagios existen y esto evita cualquier intento. De hecho, en arXiv tienen un sistema de an'alisis de c'odigo para identificar textos/c'odigos duplicados (incluso si es de los propios autores). Por ejemplo: » autor: wittten 
#20 El gran negocio de las publicaciones cientïficas 
#13 las tesis depositadas quizas no traten el temario que te interesa, mas si es un campo "nuevo" como la biologia sintetica o los biosensores. Ojala hubieran mas iniciativas tipo arxiv. » autor: kermithenson 
#17 El gran negocio de las publicaciones cientïficas 
#14 De verdad, pod'eis mirar #16? Es que ya hay soluciones... y la gente las usa... » autor: wittten 
#16 El gran negocio de las publicaciones cientïficas 
Para m'i el problema no son las revistas: el problema est'a en las manos de los cient'ificos. Las editoriales no son entidades sin 'animo de lucro. Algunas ramas cient'ificas (f'isica, matem'aticas, ...) ya se han organizado y dir'ia que m'as del 95% de los cient'ificos sube sus trabajos a arXiv: » autor: wittten 
#14 El gran negocio de las publicaciones cientïficas 
#3 No, no es tan simple como crear una wikipedia, por lo que voy a comentar a continuación. » autor: Olaf_123 
Astrônomos encontram, pela primeira vez, dois buracos negros supermassivos orbitando um ao outro 
Em uma grande descoberta, astrônomos observaram um par de buracos negros supermassivos orbitando um ao outro, a centenas de milhões de anosluz de distância. A descoberta é o resultado de mais de duas décadas de trabalho, e um feito incrível considerando as medições precisas necessárias. Compreender a natureza de tais interações nos dará uma maior compreensão de como as galáxias e o universo, evoluíram. "Durante muito tempo, temos olhado para o espaço para tentar encontrar um par destes buracos negros supermassivos orbitando como resultado de duas galáxias em fusão", diz Greg Taylor, um dos pesquisadores da Universidade do Novo México (UNM). "Mesmo que nós tenhamos teorizado que isso deve estar acontecendo, nunca ninguém tinha visto até agora." A equipe observou o par de buracos negros em uma galáxia, chamado 0402 + 379, cerca de 750 milhões de anos luz da Terra. De acordo com Karishma Bansal, o primeiro autor do artigo, também da UNM, a massa combinada destes buracos negros supermassivos é de cerca de 15 bilhões de vezes maior do que o nosso Sol, e seu período orbital é de cerca de 24.000 anos. Isto significa que mesmo que a equipe tenha observado esses buracos negros há mais de uma década, eles não foram capazes de detectar até mesmo a menor curvatura em sua órbita. "Se você imaginar um caracol no planeta recémdescoberto orbitando Proxima Centauri  4.243 anosluz de distância  se movendo em 1cm [0,4 polegadas] por segundo, é o movimento angular que estamos tratando aqui", explica Roger W. Romani, um dos pesquisadores da Universidade de Stanford. Os buracos negros são notoriamente difíceis de estudar porque não podem ser observados diretamente, mas só podem ser detectados a partir de seu efeito sobre a matéria nas proximidades. Assim, para encontrar a órbita desses buracos negros, a equipe UNM usou o Very Long Baseline Array (VLBA), que é composto de 10 radiotelescópios. Ao medir as várias frequências de sinais de rádio emitidas pelos buracos negros, a equipe foi então capaz de traçar sua trajetória. "Quando o Dr. Taylor me deu esses dados, eu estava no início de aprender a imagem e compreendêla", disse Bansal . "E, como eu aprendi nos dados que remontam a 2003, nós traçamos isso e determinamos que eles estão orbitando um ao outro. É muito emocionante." A realização técnica desta descoberta é um triunfo e irá melhorar muito a nossa compreensão desses objetos enigmáticos. Desde a teoria da relatividade geral de Einstein, os astrônomos se fascinaram pelos buracos negros supermassivos. Recentemente, houveram várias novas descobertas sobre buracos negros, mas ainda não conhecemos muito sobre eles. Continuar a observar a órbita e interação desses buracos negros irá revelar muito sobre onde nossa galáxia veio, qual o seu destino no futuro e o papel que os buracos negros desempenham neste processo. Atualmente, a galáxia de Andrômeda, que também contém um buraco negro supermassivo, é projetado para colidir com a nossa Via Láctea  tornando o evento que a equipe UNM está observando o potencial futuro da nossa galáxia em alguns bilhões de anos. "Os buracos negros supermassivos têm muita influência sobre as estrelas em torno deles e o crescimento e evolução da galáxia", diz Taylor. "Então, entender mais sobre eles e o que acontece quando eles se fundem uns com os outros pode ser importante para a nossa compreensão do universo." A equipe UNM vai voltarse para esses buracos negros em poucos anos para confirmar observações e melhorar suas projeções em torno de órbitas e trajetórias. Por agora, podemos apreciar o fato de que eles finalmente se mostraram em uma observação direta pela primeira vez e sem dúvida irão inspirar outros trabalhos pela frente no mundo científico mais amplo. O artigo foi publicado no The Astrophysical Journal com uma versão préimpressão disponível no arXiv. 
Milli Arxiv İdarəsi arxiv işi sahəsində yeniliklərini davam etdirir 
Milli Arxiv İdarəsi arxiv işi sahəsində müstəqil dövlətə məxsus qanunvericilik aktlarının təkmilləşdirilməsi və yeni normativ hüquqi aktların hazırlanması istiqamətində fəaliyyətini davam etdirir

Астроном из Гарварда рекомендовал экзопланету как инвестиции в недвижимость 
Американский астроном из Гарвардского университета рекомендует всем состоятельным людям инвестировать свои средства в экзопланету, где цены на недвижимость в ближайшие несколько миллиардов лет заметно вырастут. Статья ученого опубликована в журнале arXiv.org. 
Só me resta um conselho 
Muitas PME do sector transaccionável que nos últimos 10 anos descobriram a forma de subir na escala de valor, e de como fazer o bypass à competição pelo lowcost, vão sentir uma tentação tremenda pelo caminho mais fácil: O regresso da produção industrial à Europa vai voltar a colocar em cima da mesa a hipótese de apostar no lowcost. E o lowcost parece tão intuitivo, tão atraente... Só me resta um conselho, "Just because you can doesn't mean you should" 
Ученые назвали пригодную для инвестиций в недвижимость экзопланету 
Ученые из Гарвардского университета в США назвали пригодную для инвестиций в недвижимость экзопланету. Подробности исследования опубликованы на портале arXiv.org. 
Shifted Poisson structures and moduli spaces of complexes. (arXiv:1706.09965v1 [math.AG]) 
Authors: Zheng Hua, Alexander Polishchuk In this paper we study the moduli stack of complexes of vector bundles (with chain isomorphisms) over a smooth projective variety $X$ via derived algebraic geometry. We prove that if $X$ is a CalabiYau variety of dimension $d$ then this moduli stack has a $(1d)$shifted Poisson structure. In the case $d=1$, we construct a natural foliation of the moduli stack by $0$shifted symplectic substacks. We show that our construction recovers various known Poisson structures associated to complex elliptic curves, including the Poisson structure on Hilbert scheme of points on elliptic quantum projective planes studied by Nevins and Stafford, and the Poisson structures on the moduli spaces of stable triples over an elliptic curves considered by one of us. We also relate the latter Poisson structures to the semiclassical limits of the elliptic Sklyanin algebras studied by Feigin and Odesskii. 
Bases of standard modules for affine Lie algebras of type $C_\ell^{(1)}$. (arXiv:1706.10089v1 [math.QA]) 
Authors: Goran Trupčević FeiginStoyanovsky's type subspaces for affine Lie algebras of type $C_\ell^{(1)}$ have monomial bases with a nice combinatorial description. We describe bases of whole standard modules in terms of semiinfinite monomials obtained as "a limit of translations" of bases for FeiginStoyanovsky's type subspaces. 
A noncommutative catenoid. (arXiv:1706.10168v1 [math.QA]) 
Authors: Joakim Arnlind, Christoffer Holm A noncommutative algebra corresponding to the classical catenoid is introduced together with a differential calculus of derivations. We prove that there exists a unique metric and torsionfree connection that is compatible with the complex structure, and the curvature is explicitly calculated. A noncommutative analogue of the fact that the catenoid is a minimal surface is studied by constructing a Laplace operator from the connection and showing that the embedding coordinates are harmonic. Furthermore, an integral is defined and the total curvature is computed. Finally, classes of left and right modules are introduced together with constant curvature connections, and bimodule compatibility conditions are discussed in detail. 
Hopf images in locally compact quantum groups. (arXiv:1611.06225v2 [math.OA] UPDATED) 
Authors: Paweł Józiak, Paweł Kasprzak, Piotr M. Sołtan This manuscript is devoted to the study of the concept of a generating subset (a.k.a. Hopf image of a morphism) in the setting of locally compact quantum groups. The aim of this paper is to provide an accurate description of the Hopf image of a given morphism. We extend and unify the previously existing approaches for compact and discrete quantum groups and present some results that can shed light on some local perspective in the theory of quantum groups. In particular, we provide a characterization of fullness of Hopf image in the language of partial actions as well as in representationtheoretic terms in the spirit of representation $C^*$categories, extending some known results not only to the broader setting of noncompact quantum groups, but also encompassing a broader setting of generating subsets. 
Computing a categorical GromovWitten invariant. (arXiv:1706.09912v1 [math.AG]) 
Authors: Andrei Caldararu, Junwu Tu We compute the g=1, n=1 Bmodel GromovWitten invariant of an elliptic curve E directly from the derived category D(E). More precisely, we carry out the computation of the categorical GromovWitten invariant defined by Costello using as target a cyclic A_\infty model of D(E) described by Polishchuk. This is the first nontrivial computation of a positive genus categorical GromovWitten invariant, and the result agrees with the prediction of mirror symmetry: it matches the classical (noncategorical) GromovWitten invariants of a symplectic 2torus computed by Dijkgraaf. 
Boundedness of Log Canonical Surface Generalized Polarized Pairs. (arXiv:1706.09913v1 [math.AG]) 
Authors: Stefano Filipazzi In this paper, we study the behavior of the sets of volumes of the form $\mathrm{vol}(X,K_X+B+M)$, where $(X,B)$ is a log canonical pair, and $M$ is a nef $\mathbb{R}$divisor. After a first analysis of some general properties, we focus on the case when $M$ is $\mathbb{Q}$Cartier with given Cartier index, and $B$ has coefficients in a given DCC set. First, we show that such sets of volumes satisfy the DCC property in the case of surfaces. Once this is established, we show that surface pairs with given volume and for which $K_X+B+M$ is ample form a log bounded family. 
Diffusion Approximations for Load Balancing Mechanisms in Cloud Storage Systems. (arXiv:1706.09914v1 [math.PR]) 
Authors: Amarjit Budhiraja, Eric Friedlander In large storage systems, files are often coded across several servers to improve reliability and retrieval speed. We study load balancing under the Batch Sampling routing scheme for a network of $n$ servers storing a set of files using the Maximum Distance Separable (MDS) code (cf. Li, Ramamoorthy, and Srikant (2016)). Specifically, each file is stored in equally sized pieces across $L$ servers such that any $k$ pieces can reconstruct the original file. When a request for a file is received, the dispatcher routes the job into the $k$shortest queues among the $L$ for which the corresponding server contains a piece of the file being requested. We establish a law of large numbers and a central limit theorem as the system becomes large (i.e. $n\to\iy$). For the central limit theorem, the limit process take values in $\bfell_2$, the space of square summable sequences. Due to the large size of such systems, a direct analysis of the $n$server system is frequently intractable. The law of large numbers and diffusion approximations established in this work provide practical tools with which to perform such analysis. The Powerof$d$ routing scheme, also known as the supermarket model, is a special case of the model considered here. 
User Activity Detection in Massive Random Access: Compressed Sensing vs. Coded Slotted ALOHA. (arXiv:1706.09918v1 [cs.IT]) 
Authors: Veljko Boljanovic, Dejan Vukobratovic, Petar Popovski, Cedomir Stefanovic Machinetype communication services in mobile cel lular systems are currently evolving with an aim to efficiently address a massivescale user access to the system. One of the key problems in this respect is to efficiently identify active users in order to allocate them resources for the subsequent transmissions. In this paper, we examine two recently suggested approaches for user activity detection: compressedsensing (CS) and coded slotted ALOHA (CSA), and provide their comparison in terms of performance vs resource utilization. Our preliminary results show that CSbased approach is able to provide the target user activity detection performance with less overall system resource utilization. However, this comes at a price of lower energy efficiency per user, as compared to CSAbased approach. 
Positroids Induced by Rational Dyck Paths. (arXiv:1706.09921v1 [math.CO]) 
Authors: Felix Gotti A rational Dyck path of type $(m,d)$ is an increasing unitstep lattice path from $(0,0)$ to $(m,d) \in \mathbb{Z}^2$ that never goes above the diagonal line $y = (d/m)x$. On the other hand, a positroid of rank $d$ on the ground set $[d+m]$ is a special type of matroid coming from the totally nonnegative Grassmannian. In this paper we describe how to naturally assign a rank $d$ positroid on the ground set $[d+m]$, which we name rational Dyck positroid, to each rational Dyck path of type $(m,d)$. We show that such an assignment is onetoone. There are several families of combinatorial objects in onetoone correspondence with the set of positroids. Here we characterize some of these families for the positroids we produce, namely Grassmann necklaces, decorated permutations, Lediagrams, and moveequivalence classes of plabic graphs. Finally, we describe the matroid polytope of a given rational Dyck positroid. 
Deep factorisation of the stable process III: Radial excursion theory and the point of closest reach. (arXiv:1706.09924v1 [math.PR]) 
Authors: Andreas Kyprianou, Victor River, Weerapat Satitkanitkul In this paper, we continue our understanding of the stable process from the perspective of the theory of selfsimilar Markov processes in the spirit of the recent papers of Kyprianou (2016) and Kyprianou et al. (2017). In particular, we turn our attention to the case of $d$dimensional isotropic stable process, for $d\geq 2$. Using a completely new approach we consider the distribution of the point of closest reach. This leads us to a number of other substantial new results for this class of stable processes. We engage with a new radial excursion theory, never before used, from which we develop the classical BlumenthalGetoorRay identities for first entry/exit into a ball, cf. Blumenthal et al. (1961), to the setting of $n$tuple laws. We identify explicitly the stationary distribution of the stable process when reflected in its running radial supremum. Moreover, we provide a representation of the WienerHopf factorisation of the MAP that underlies the stable process through the LampertiKiu transform. 
Irregular Repetition Slotted ALOHA over the Rayleigh Block Fading Channel with Capture. (arXiv:1706.09927v1 [cs.IT]) 
Authors: Federico Clazzer, Enrico Paolini, Iacopo Mambelli, Cedomir Stefanovic Random access protocols relying on the transmission of packet replicas in multiple slots and exploiting interference cancellation at the receiver have been shown to achieve per formance competitive with that of orthogonal schemes. So far the optimization of the repetition degree profile, defining the probability for a user to transmit a given number of replicas, has mainly been performed targeting the collision channel model. In this paper the analysis is extended to a block fading channel model, also assuming capture effect at the receiver. Density evolution equations are developed for the new setting and, based on them, some repetition degree profiles are optimized and analyzed via Monte Carlo simulation in a finite frame length setting. The derived distributions are shown to achieve throughputs largely exceeding 1 [packet/slot]. 
A PseudoBayesian Approach to SignComputeResolve Slotted ALOHA. (arXiv:1706.09930v1 [cs.IT]) 
Authors: Jasper Goseling, Cedomir Stefanovic, Petar Popovski Access reservation based on slotted ALOHA is commonly used in wireless cellular access. In this paper we investigate its enhancement based on the use of physicallayer network coding and signature coding, whose main feature is enabling simultaneous resolution of up to K users contending for access, where K >= 1. We optimise the slot access probability such that the expected throughput is maximised. In particular, the slot access probability is chosen in line with an estimate of the number of users in the system that is obtained relying on the pseudoBayesian approach by Rivest, which we generalise for the case that K > 1. Under the assumption that this estimate reflects the actual number of users, we show that our approach achieves throughput 1 in the limit of large K. 
Vertical almosttoric systems. (arXiv:1706.09935v1 [math.SG]) 
Authors: Sonja Hohloch, Silvia Sabatini, Daniele Sepe, Margaret Symington This paper introduces vertical almosttoric systems, a generalization of semitoric systems (introduced by Vu Ngoc and classified by Pelayo and Vu Ngoc), that provides the language to develop surgeries on almosttoric systems in dimension 4. We prove that vertical almosttoric systems are natural building blocks of almosttoric systems. Moreover, we show that they enjoy many of the properties that their semitoric counterparts do. 
Quantum transfermatrices for the sausage model. (arXiv:1706.09941v1 [hepth]) 
Authors: Vladimir V. Bazhanov, Gleb A. Kotousov, Sergei L. Lukyanov In this work we revisit the problem of the quantization of the twodimensional O(3) nonlinear sigma model and its oneparameter integrable deformation  the sausage model. Our consideration is based on the socalled ODE/IQFT correspondence, a variant of the Quantum Inverse Scattering Method.The approach allowed us to explore the integrable structures underlying the quantum O(3)/sausage model. Among the obtained results is a system of nonlinear integral equations for the computation of the vacuum eigenvalues of the quantum transfermatrices. 
Community Detection on Euclidean Random Graphs. (arXiv:1706.09942v1 [math.PR]) 
Authors: Abishek Sankararaman, Francois Baccelli Motivated by applications in online social networks, we introduce and study the problem of Community Detection on a new class of sparse \emph{spatial} random graphs embedded in Euclidean space. Our random graph is the plantedpartition version of the classical random connection model studied in Stochastic Geometry. Roughly speaking, each node of our graph has an uniform i.i.d. $\{1,+1\}$ valued community label and a $\mathbb{R}^d$ valued location label given by the support of a homogeneous Poisson point process of intensity $\lambda$. Conditional on the labels, edges are drawn independently at random depending both on the Euclidean distance between the nodes and community labels on the nodes. The Community Detection problem consists in estimating the partition of nodes into communities, based on an observation of the random graph along with the spatial location labels on nodes. We show that for $d=1$, Community Detection is impossible for any parameters. For $d \geq 2$, we establish a phasetransition for this problem, based on the intensity $\lambda$ of the point process. We show that if the intensity $\lambda$ is small, then no algorithm for community detection can beat a random guess for the partitions. We show this by introducing and analyzing a new problem which we call `Information Flow from Infinity'. On the positive side, we give a novel algorithm that performs Community Detection as long as the intensity $\lambda$ is larger than a sufficiently high constant. Along the way, we establish a \emph{distinguishability} result which says one can always efficiently infer the existence of a partition given the graph and spatial locations even when one cannot identify the partition better than at random. This is a surprising new phenomenon not observed thus far in any nonspatial Erd\H{o}sR\'enyi based plantedpartition graph models. 
Minimizing Data Distortion of Periodically Reporting IoT Devices with Energy Harvesting. (arXiv:1706.09943v1 [cs.IT]) 
Authors: Chiara Pielli, Cedomir Stefanovic, Petar Popovski, Michele Zorzi Energy harvesting is a promising technology for the Internet of Things (IoT) towards the goal of selfsustainability of the involved devices. However, the intermittent and unreliable nature of the harvested energy demands an intelligent management of devices' operation in order to ensure a sustained performance of the IoT application. In this work, we address the problem of maximizing the quality of the reported data under the constraints of energy harvesting, energy consumption and communication channel impairments. Specifically, we propose an energyaware joint sourcechannel coding scheme that minimizes the expected data distortion, for realistic models of energy generation and of the energy spent by the device to process the data, when the communication is performed over a Rayleigh fading channel. The performance of the scheme is optimized by means of a Markov Decision Process framework. 
Reliable and Efficient Access for Alarminitiated and Regular M2M Traffic in IEEE 802.11ah Systems. (arXiv:1706.09948v1 [cs.IT]) 
Authors: German Corrales Madueno, Cedomir Stefanovic, Petar Popovski EEE 802.11ah is a novel WiFibased protocol, aiming to provide an access solution for the machinetomachine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M reporting regimes, which are periodic, ondemand We show that it is possible to both efficiently and reliably resolve all reporting stations in the cell, within the limits of the allowed deadlines. As a side result, we also provide a rationale for modeling the interarrival time in alarm events by using the Beta distribution, a model that is considered in the 3GPP standardization. 
Zero temperature limit for directed polymers and inviscid limit for stationary solutions of stochastic Burgers equation. (arXiv:1706.09950v1 [math.PR]) 
Authors: Yuri Bakhtin, Liying Li We consider a spacecontinuous and timediscrete polymer model for positive temperature and the associated zero temperature model of last passage percolation type. In our previous work, we constructed and studied infinitevolume polymer measures and onesided infinite minimizers for the associated variational principle, and used these objects for the study of global stationary solutions of the Burgers equation with positive or zero viscosity and random kick forcing, on the entire real line. In this paper, we prove that in the zero temperature limit, the infinitevolume polymer measures concentrate on the onesided minimizers and that the associated global solutions of the viscous Burgers equation with random kick forcing converge to the global solutions of the inviscid equation. 
A counterexample to the birational Torelli problem for CalabiYau 3folds. (arXiv:1706.09952v1 [math.AG]) 
Authors: John Christian Ottem, Jørgen Vold Rennemo The Grassmannian Gr(2,5) is embedded in $\Bbb{P}^9$ via the Pl\"ucker embedding. The intersection of two general PGL(10)translates of Gr(2,5) is a CalabiYau 3fold X, and the intersection of the projective duals of the two translates is another CalabiYau 3fold Y, deformation equivalent to X. Applying results of Kuznetsov and JiangLeungXie shows that X and Y are derived equivalent, which by a result of Addington implies that their third cohomology groups are isomorphic as polarised Hodge structures. We show that X and Y provide counterexamples to a certain "birational" Torelli statement for CalabiYau 3folds, namely, they are deformation equivalent, derived equivalent, and have isomorphic Hodge structures, but they are not birational. 
Dessins d'Enfants of Trigonal Curves. (arXiv:1706.09956v1 [math.AG]) 
Authors: Mehmet Emin Aktas In this paper, we focus on properties of dessins d'enfants associated to trigonal curves. Degtyarev studied dessins d'enfants to compute braid monodromies and fundamental groups of trigonal curves using their combinatorial data. We first classify all possible combinatorial data that can occur for trigonal curves of low degree, as well as bounds on the number of possibilities for all degree. We also study deformations of trigonal curves and corresponding deformations of their dessins. Of special interest to Degtyarev was the case when the dessins are maximal. We give a sufficient condition for a trigonal curve to be deformable to one that is maximal. 
Observables and Strong OneSided Chaos in the BoltzmannGrad Limit. (arXiv:1706.09961v1 [math.AP]) 
Authors: Ryan Denlinger Boltzmann's equation provides a microscopic model for the evolution of dilute classical gases. A fundamental problem in mathematical physics is to rigorously derive Boltzmann's equation starting from Newton's laws. In the 1970s, Oscar Lanford provided such a derivation, for the hard sphere interaction, on a small time interval. One of the subtleties of Lanford's original proof was that the strength of convergence proven at positive times was much weaker than that which had to be assumed at the initial time, which is at odds with the idea of propagation of chaos. Several authors have addressed this situation with various notions of strong onesided chaos, which is the true property which is propagated by the dynamics. We provide a new approach to the problem based on duality and the evolution of observables; the observables encode the detailed interaction and allow us to define a new notion of strong onesided chaos. 
A maximum entropy approach to Htheory: Statistical mechanics of hierarchical systems. (arXiv:1706.09963v1 [condmat.statmech]) 
Authors: Giovani L. Vasconcelos, Domingos S. P. Salazar, A. M. S. Macêdo A novel formalism, called Htheory, is applied to the problem of statistical equilibrium of a hierarchical complex system with multiple time and length scales. In this approach, the system is formally treated as being composed of a small subsystemrepresenting the region where the measurements are madein contact with a set of `nested heat reservoirs' corresponding to the hierarchical structure of the system. The probability distribution function (pdf) of the fluctuating temperatures at each reservoir, conditioned on the temperature of the reservoir above it, is determined from a maximum entropy principle subject to appropriate constraints that describe the thermal equilibrium properties of the system. The marginal temperature distribution of the innermost reservoir is obtained by integrating over the conditional distributions of all larger scales, and the resulting pdf is written in analytical form in terms of certain special transcendental functions, known as the Fox $H$functions. The distribution of states of the small subsystem is then computed by averaging the quasiequilibrium Boltzmann distribution over the temperature of the innermost reservoir. This distribution can also be written in terms of $H$functions. The general family of distributions reported here recovers, as particular cases, the stationary distributions recently obtained by Mac\^edo {\it et al.} [Phys.~Rev.~E {\bf 95}, 032315 (2017)] from a stochastic dynamical approach to the problem. 
A randomized Milstein method for stochastic differential equations with nondifferentiable drift coefficients. (arXiv:1706.09964v1 [math.NA]) 
Authors: Raphael Kruse, Yue Wu In this paper a driftrandomized Milstein method is introduced for the numerical solution of nonautonomous stochastic differential equations with nondifferentiable drift coefficient functions. Compared to standard Milsteintype methods we obtain higher order convergence rates in the $L^p(\Omega)$ and almost sure sense. An important ingredient in the error analysis are randomized quadrature rules for H\"older continuous stochastic processes. By this we avoid the use of standard arguments based on the It\=oTaylor expansion which are typically applied in error estimates of the classical Milstein method but require additional smoothness of the drift and diffusion coefficient functions. We also discuss the optimality of our convergence rates. Finally, the question of implementation is addressed in a numerical experiment. 
A crystallike structure on shifted tableaux. (arXiv:1706.09969v1 [math.CO]) 
Authors: Maria Gillespie, Jake Levinson, Kevin Purbhoo We introduce coplactic raising and lowering operators $E'_i$, $F'_i$, $E_i$, and $F_i$ on shifted skew semistandard tableaux. We show that the primed operators and unprimed operators each independently form type A Kashiwara crystals (but not Stembridge crystals) on the same underlying set and with the same weight functions. When taken together, the result is a new kind of `doubled crystal' structure that recovers the combinatorics of type B Schubert calculus: the highestweight elements of our crystals are precisely the shifted LittlewoodRichardson tableaux, and their generating functions are the (skew) Schur Q functions. 
A differential operator realisation approach for constructing Casimir operators of nonsemisimple Lie algebras. (arXiv:1706.09970v1 [mathph]) 
Authors: Fahad Alshammari, Phillip S. Isaac, Ian Marquette We introduce a search algorithm that utilises differential operator realisations to find polynomial Casimir operators of Lie algebras. To demonstrate the algorithm, we look at two classes of examples: (1) the model filiform Lie algebras and (2) the Schr\"odinger Lie algebras. We find that an abstract form of dimensional analysis assists us in our algorithm, and greatly reduces the complexity of the problem. 
The trivial lower bound for the girth of $S_n$. (arXiv:1706.09972v1 [math.GR]) 
Authors: Sean Eberhard Consider the Cayley graph of $S_n$ generated by a random pair of elements $x,y$. Conjecturally, the girth of this graph is $\Omega(n \log n)$ with probability tending to $1$ as $n\to\infty$. We show that it is at least $\Omega(n^{1/3})$. 
Global holomorphic functions in several noncommuting variables II. (arXiv:1706.09973v1 [math.FA]) 
Authors: Jim Agler, John E. McCarthy We give a new proof that bounded noncommutative functions on polynomial polyhedra can be represented by a realization formula, a generalization of the transfer function realization formula for bounded analytic functions on the unit disk. 
Topological ChernSimons/Matter Theories. (arXiv:1706.09977v1 [hepth]) 
Authors: Mina Aganagic, Kevin Costello, Jacob McNamara, Cumrun Vafa We propose a new partially topological theory in three dimensions which couples ChernSimons theory to matter. The 3manifolds needed for this construction admit transverse holomorphic foliation (THF). The theory depends only on the choice of such a structure, but not on a choice of metric and in this sense, it is topological. We argue that this theory arises in topological Amodel string theory on Lagrangian 3branes in the presence of additional parallel coisotropic 5branes. The theory obtained in this way is equivalent to an N=2 supersymmetric ChernSimons matter theory on the same 3manifold, which also only depends on the THF structure. The theory is a realization of a topological theory of class H, which allows splitting of a temporal direction from spatial directions. We briefly discuss potential condensed matter applications. 
Nonautonomous conformal graph directed Markov systems. (arXiv:1706.09978v1 [math.DS]) 
Authors: Jason Atnip In this paper we introduce and develop the theory of nonautonomous graph directed Markov systems which is a generalization of the theory of conformal graph directed Markov systems of Mauldin and Urba\'nski, first presented in their book, and the theory of nonautonomous conformal iterated function systems set forth by RempeGillen and Urba\'nski. We exhibit several large classes of functions for which Bowen's formula for Hausdorff dimension holds. In particular we consider weakly balanced finite systems, where we have some control over the growth of the derivatives, and ascending systems. Our results, particularly for ascending systems, generalize and go well beyond what is currently known for autonomous graph directed Markov systems and nonautonomous iterated function systems. We also provide an application to nonautonomous conformal dynamics by estimating the Hausdorff dimension of the Julia set of nonautonomous affine perturbations of an elliptic function from below. 
An Experimental View of Herman Rings for Dianalytic Maps of $\mathbb{RP}^2$. (arXiv:1706.09980v1 [math.DS]) 
Authors: Jane Hawkins, Michelle Randolph We provide an experimental study of the existence of Herman rings in a parametrized family of rational maps preserving antipodal points, and a discussion of their properties on $\mathbb{RP}^2$. We study analytic maps of the sphere that project to dianalytic maps on the nonorientable surface, $\mathbb{RP}^2$. They have a known form and we focus on a subset of degree $3$ dianalytic maps and explore their dynamical properties. In particular, we focus on maps for which the Fatou set has a Herman ring. We appeal to dynamical properties of particular maps to justify our assertion that these Fatou components are Herman rings and analyze the parameter space for this family of maps. 
Contact Topology and the Structure and Dynamics of Cholesterics. (arXiv:1706.09982v1 [condmat.soft]) 
Authors: Thomas Machon Using tools and concepts from contact topology we show that nonvanishing twist implies conservation of the layer structure in cholesteric liquid crystals. This leads to a number of additional topological invariants for cholesteric textures, such as layer numbers, that are not captured by traditional descriptions, characterises the nature and size of the chiral energy barriers between metastable configurations, and gives a geometric characterisation of cholesteric dynamics in any context, including active systems, those in confined geometries or under the influence of an external field. 
Motivic Measures through Waldhausen KTheories. (arXiv:1706.09983v1 [math.AG]) 
Authors: Anwar Alameddin In this paper we introduce the notion of a $cdp$functor to a Waldhausen category. We show that such functors admit extensions that satisfy the excision property, to which we associate EulerPoincar\'e characteristics that send the class of a proper scheme to the class of its image. As an application, we show that the Yoneda embedding gives rise to a monoidal properfibred Waldhausen category over Noetherian schemes of finite Krull dimensions, with canonical $cdp$functors to its fibres. 
The shape of quartic fields. (arXiv:1706.09987v1 [math.NT]) 
Authors: Robert Hough We use the method of Shintani, as developed by Taniguchi and Thorne, to prove the joint cuspidal equidistribution of the shape of quartic fields paired with the shape of its cubic resolvent, when the fields are ordered by discriminant. Our estimate saves a small power in the corresponding Weyl sums. 
Phase Retrieval via Randomized Kaczmarz: Theoretical Guarantees. (arXiv:1706.09993v1 [math.NA]) 
Authors: Yan Shuo Tan, Roman Vershynin We consider the problem of phase retrieval, i.e. that of solving systems of quadratic equations. A simple variant of randomized Kaczmarz method was recently proposed for phase retrieval, and it was shown numerically to have a computational edge over stateoftheart Wirtinger flow methods. In this paper, we provide the first theoretical guarantee for the convergence of the randomized Kacmarz method for phase retrieval. We show that it is sufficient to have as many gaussian measurements as the dimension, up to a constant factor. Along the way, we introduce a sufficient condition on measurement sets for which the randomized Kaczmarz method is guaranteed to work. We show that gaussian measurements satisfy this property with high probability; this is proved using a chaining argument coupled with bounds on VC dimension and metric entropy. 
Stochastic Dynamic Optimal Power Flow in Distribution Network with Distributed Renewable Energy and Battery Energy Storage. (arXiv:1706.09995v1 [math.OC]) 
Authors: Chenghui Tang, Jian Xu, Yuanzhang Sun, Siyang Liao, Deping Ke, Xiong Li The penetration of distributed renewable energy (DRE) greatly raises the risk of distribution network operation such as peak shaving and voltage stability. Battery energy storage (BES) has been widely accepted as the most potential application to cope with the challenge of high penetration of DRE. To cope with the uncertainties and variability of DRE, a stochastic dayahead dynamic optimal power flow (DOPF) and its algorithm are proposed. The overall economy is achieved by fully considering the DRE, BES, electricity purchasing and active power losses. The rainflow algorithmbased cycle counting method of BES is incorporated in the DOPF model to capture the cell degradation, greatly extending the expected BES lifetime and achieving a better economy. DRE scenarios are generated to consider the uncertainties and correlations based on the Copula theory. To solve the DOPF model, we propose a Lagrange relaxationbased algorithm, which has a significantly reduced complexity with respect to the existing techniques. For this reason, the proposed algorithm enables much more scenarios incorporated in the DOPF model and better captures the DRE uncertainties and correlations. Finally, numerical studies for the dayahead DOPF in the IEEE 123node test feeder are presented to demonstrate the merits of the proposed method. Results show that the actual BES life expectancy of the proposed model has increased to 4.89 times compared with the traditional ones. The problems caused by DRE are greatly alleviated by fully capturing the uncertainties and correlations with the proposed method. 
Canonical form of linear subspaces and coding invariants: the poset metric point of view. (arXiv:1706.09996v1 [cs.IT]) 
Authors: Jerry Anderson Pinheiro, Marcelo Firer In this work we introduce the concept of a subspace decomposition, subject to a partition of the coordinates. Considering metrics determined by partial orders in the set of coordinates, the so called poset metrics, we show the existence of maximal decompositions according to the metric. These decompositions turns to be an important tool to obtain the canonical form for codes over any poset metrics and to obtain bounds for important invariants such as the packing radius of a linear subspace. Furthermore, using maximal decompositions, we are able to reduce and optimize the full lookup table algorithm for the syndrome decoding process. 
Tight Load Balancing via Randomized Local Search. (arXiv:1706.09997v1 [cs.DC]) 
Authors: Petra Berenbrink, Peter Kling, Christopher Liaw, Abbas Mehrabian We consider the following ballsintobins process with $n$ bins and $m$ balls: each ball is equipped with a mutually independent exponential clock of rate 1. Whenever a ball's clock rings, the ball samples a random bin and moves there if the number of balls in the sampled bin is smaller than in its current bin. This simple process models a typical load balancing problem where users (balls) seek a selfish improvement of their assignment to resources (bins). From a game theoretic perspective, this is a randomized approach to the wellknown KoutsoupiasPapadimitriou model, while it is known as randomized local search (RLS) in load balancing literature. Up to now, the best bound on the expected time to reach perfect balance was $O\left({(\ln n)}^2+\ln(n)\cdot n^2/m\right)$ due to Ganesh, Lilienthal, Manjunath, Proutiere, and Simatos (Load balancing via random local search in closed and open systems, Queueing Systems, 2012). We improve this to an asymptotically tight $O\left(\ln(n)+n^2/m\right)$. Our analysis is based on the crucial observation that performing "destructive moves" (reversals of RLS moves) cannot decrease the balancing time. This allows us to simplify problem instances and to ignore "inconvenient moves" in the analysis. 
Dimension of a snowflake of a finite Euclidean subspace. (arXiv:1706.09998v1 [math.MG]) 
Authors: Vladimir Zolotov Let $X$ be an $n$point subset of a Euclidean space and $0 < a < 1$. The classical theorem of Schoenberg implies that the snowflake space $X^a$ can be isometrically embedded into Euclidean space. In the paper we show that points in the image such an embedding always are in general position. As application we prove the analogue of Schoenberg's result for quotients of Euclidean spaces by finite groups. 
A basis theorem for the degenerate affine oriented BrauerClifford supercategory. (arXiv:1706.09999v1 [math.RT]) 
Authors: Jonathan Comes, Jonathan R. Kujawa We introduce the oriented BrauerClifford and degenerate affine oriented BrauerClifford supercategories. These are diagrammatically defined monoidal supercategories which provide combinatorial models for certain natural monoidal supercategories of supermodules and endosuperfunctors, respectively, for the Lie superalgebras of type Q. Our main results are basis theorems for these diagram supercategories. We also discuss connections and applications to the representation theory of the Lie superalgebra of type Q. 
Embeddability of rightangled Artin groups on complements of trees. (arXiv:1706.10002v1 [math.GT]) 
Authors: EonKyung Lee, SangJin Lee For a finite simplicial graph $\Gamma$, let $A(\Gamma)$ denote the rightangled Artin group on $\Gamma$. Recently Kim and Koberda introduced the extension graph $\Gamma^e$ for $\Gamma$, and established the Extension Graph Theorem: for finite simplicial graphs $\Gamma_1$ and $\Gamma_2$ if $\Gamma_1$ embeds into $\Gamma_2^e$ as an induced subgraph then $A(\Gamma_1)$ embeds into $A(\Gamma_2)$. In this article we show that the converse of this theorem does not hold for the case $\Gamma_1$ is the complement of a tree and for the case $\Gamma_2$ is the complement of a path graph. 
Hypothesis Testing For Densities and HighDimensional Multinomials: Sharp Local Minimax Rates. (arXiv:1706.10003v1 [math.ST]) 
Authors: Sivaraman Balakrishnan, Larry Wasserman We consider the goodnessoffit testing problem of distinguishing whether the data are drawn from a specified distribution, versus a composite alternative separated from the null in the total variation metric. In the discrete case, we consider goodnessoffit testing when the null distribution has a possibly growing or unbounded number of categories. In the continuous case, we consider testing a Lipschitz density, with possibly unbounded support, in the lowsmoothness regime where the Lipschitz parameter is not assumed to be constant. In contrast to existing results, we show that the minimax rate and critical testing radius in these settings depend strongly, and in a precise way, on the null distribution being tested and this motivates the study of the (local) minimax rate as a function of the null distribution. For multinomials the local minimax rate was recently studied in the work of Valiant and Valiant. We revisit and extend their results and develop two modifications to the chisquared test whose performance we characterize. For testing Lipschitz densities, we show that the usual binning tests are inadequate in the lowsmoothness regime and we design a spatially adaptive partitioning scheme that forms the basis for our locally minimax optimal tests. Furthermore, we provide the first local minimax lower bounds for this problem which yield a sharp characterization of the dependence of the critical radius on the null hypothesis being tested. In the lowsmoothness regime we also provide adaptive tests, that adapt to the unknown smoothness parameter. We illustrate our results with a variety of simulations that demonstrate the practical utility of our proposed tests. 
IP$^{*}$sets in function field and mixing properties. (arXiv:1706.10010v1 [math.DS]) 
Authors: Dibyendu De, Pintu Debnath The ring of polynomial over a finite field $F_q[x]$ has received much attention, both from a combinatorial viewpoint as in regards to its action on measurable dynamical systems. In the case of $(\mathbb{Z},+)$ we know that the ideal generated by any nonzero element is an IP$^*$set. In the present article we first establish that the analogous result is true for $F_q[x]$. We further use this result to establish some mixing properties of the action of $(F_q[x],+)$. We shall also discuss on Khintchine's recurrence for the action of $(F_q[x]\setminus\{0\},\cdot)$. 
FineGrained Reliability for V2V Communications around Suburban and Urban Intersections. (arXiv:1706.10011v1 [cs.IT]) 
Authors: Mouhamed Abdulla, Henk Wymeersch Safe transportation is a key usecase of the 5G/LTE Rel.15+ communications, where an endtoend reliability of 0.99999 is expected for a vehicletovehicle (V2V) transmission distance of 100200 m. Since communications reliability is related to roadsafety, it is crucial to verify the fulfillment of the performance, especially for accidentprone areas such as intersections. We derive closedform expressions for the V2V transmission reliability near suburban corners and urban intersections over finite interference regions. The analysis is based on plausible street configurations, traffic scenarios, and empiricallysupported channel propagation. We show the means by which the performance metric can serve as a preliminary design tool to meet a target reliability. We then apply meta distribution concepts to provide a careful dissection of V2V communications reliability. Contrary to existing work on infinite roads, when we consider finite road segments for practical deployment, finegrained reliability per realization exhibits bimodal behavior. Either performance for a certain vehicular traffic scenario is very reliable or extremely unreliable, but nowhere in relatively proximity to the average performance. In other words, standard SINRbased average performance metrics are analytically accurate but can be insufficient from a practical viewpoint. Investigating other safetycritical point process networks at the meta distributionlevel may reveal similar discrepancies. 
The limit of vanishing viscosity for the incompressible 3D NavierStokes equations with helical symmetry. (arXiv:1706.10012v1 [math.AP]) 
Authors: Quansen Jiu, Milton C. Lopes Filho, Dongjuan Niu, Helena J. Nussenzveig Lopes In this paper, we are concerned with the vanishing viscosity problem for the threedimensional NavierStokes equations with helical symmetry, in the whole space. We choose viscositydependent initial $\bu_0^\nu$ with helical swirl, an analogue of the swirl component of axisymmetric flow, of magnitude $\mathcal{O}(\nu)$ in the $L^2$ norm; we assume $\bu_0^\nu \to \bu_0$ in $H^1$. The new ingredient in our analysis is a decomposition of helical vector fields, through which we obtain the required estimates. 
Schubert puzzles and integrability I: invariant trilinear forms. (arXiv:1706.10019v1 [math.CO]) 
Authors: Allen Knutson, Paul ZinnJustin The puzzle rules for computing Schubert calculus on $d$step flag manifolds, proven in [Knutson Tao 2003] for $1$step, in [Buch Kresch Purbhoo Tamvakis 2016] for $2$step, and conjectured in [Coskun Vakil 2009] for $3$step, lead to vector configurations (one vector for each puzzle edge label) that we recognize as the weights of some minuscule representations. The $R$matrices of those representations (which, for $2$step flag manifolds, involve triality of $D_4$) degenerate to give us puzzle formulae for two previously unsolved Schubert calculus problems: $K_T(2$step flag manifolds$)$ and $K(3$step flag manifolds$)$. The $K(3$step flag manifolds$)$ formula, which involves 151 new puzzle pieces, implies Buch's correction to the first author's 1999 conjecture for $H^*(3$step flag manifolds$)$. 
The comprehension construction. (arXiv:1706.10023v1 [math.CT]) 
Authors: Emily Riehl, Dominic Verity In this paper we construct an analogue of Lurie's "unstraightening" construction that we refer to as the "comprehension construction". Its input is a cocartesian fibration $p \colon E \to B$ between $\infty$categories together with a third $\infty$category $A$. The comprehension construction then defines a map from the quasicategory of functors from $A$ to $B$ to the large quasicategory of cocartesian fibrations over $A$ that acts on $f \colon A \to B$ by forming the pullback of $p$ along $f$. To illustrate the versatility of this construction, we define the covariant and contravariant Yoneda embeddings as special cases of the comprehension functor. We then prove that the homwise action of the comprehension functor coincides with an "external action" of the homspaces of $B$ on the fibres of $p$ and use this to prove that the Yoneda embedding is fully faithful, providing an explicit equivalence between a quasicategory and the homotopy coherent nerve of a Kancomplex enriched category. 
Matrix Method for Persistence Modules on Commutative Ladders of Finite Type. (arXiv:1706.10027v1 [math.RT]) 
Authors: Hideto Asashiba, Emerson G. Escolar, Yasuaki Hiraoka, Hiroshi Takeuchi The theory of persistence modules on the commutative ladders $CL_n(\tau)$ provides an extension of persistent homology. However, an efficient algorithm to compute the generalized persistence diagrams is still lacking. In this work, we view a persistence module $M$ on $CL_n(\tau)$ as a morphism between zigzag modules, which can be expressed in a block matrix form. For the representation finite case ($n\leq 4)$, we provide an algorithm that uses certain permissible row and column operations to compute a normal form of the block matrix. In this form an indecomposable decomposition of $M$, and thus its persistence diagram, is obtained. 
$\mathcal{P}$schemes and Deterministic Polynomial Factoring over Finite Fields. (arXiv:1706.10028v1 [cs.CC]) 
Authors: Zeyu Guo We introduce a family of mathematical objects called $\mathcal{P}$schemes, where $\mathcal{P}$ is a poset of subgroups of a finite group $G$. A $\mathcal{P}$scheme is a collection of partitions of the right coset spaces $H\backslash G$, indexed by $H\in\mathcal{P}$, that satisfies a list of axioms. These objects generalize the classical notion of association schemes as well as the notion of $m$schemes (Ivanyos et al. 2009). Based on $\mathcal{P}$schemes, we develop a unifying framework for the problem of deterministic factoring of univariate polynomials over finite fields under the generalized Riemann hypothesis (GRH). 
On the Solution of Linear Programming Problems in the Age of Big Data. (arXiv:1706.10030v1 [cs.DS]) 
Authors: Irina Sokolinskaya, Leonid B. Sokolinsky The Big Data phenomenon has spawned largescale linear programming problems. In many cases, these problems are nonstationary. In this paper, we describe a new scalable algorithm called NSLP for solving highdimensional, nonstationary linear programming problems on modern cluster computing systems. The algorithm consists of two phases: Quest and Targeting. The Quest phase calculates a solution of the system of inequalities defining the constraint system of the linear programming problem under the condition of dynamic changes in input data. To this end, the apparatus of Fejer mappings is used. The Targeting phase forms a special system of points having the shape of an ndimensional axisymmetric cross. The cross moves in the ndimensional space in such a way that the solution of the linear programming problem is located all the time in an "vicinity of the central point of the cross. 
Simple quasiabelian varieties. (arXiv:1706.10032v1 [math.CV]) 
Authors: Yukitaka Abe We define the geometric simpleness for toroidal groups. We give an example of quasiabelian variety which is geometrically simple, but not simple. We show that geometrically simple quasiabelian varieties have similar properties to those of simple abelian varieties. 
Asymptotic behaviour methods for the Heat Equation. Convergence to the Gaussian. (arXiv:1706.10034v1 [math.AP]) 
Authors: Juan Luis Vázquez In this expository work we discuss the asymptotic behaviour of the solutions of the classical heat equation posed in the whole Euclidean space. After an introductory review of the main facts on the existence and properties of solutions, we proceed with the proofs of convergence to the Gaussian fundamental solution, a result that holds for all integrable solutions, and represents in the PDE setting the Central Limit Theorem of probability. We present several methods of proof: first, the scaling method. Then several versions of the representation method. This is followed by the functional analysis approach that leads to the famous related equations, FokkerPlanck and OrnsteinUhlenbeck. The analysis of this connection is also given in rather complete form here. Finally, we present the Boltzmann entropy method, coming from kinetic equations. The different methods are interesting because of the possible extension to prove the asymptotic behaviour or stabilization analysis for more general equations, linear or nonlinear. It all depends a lot on the particular features, and only one or some of the methods work in each case. A mention of results for different equations is done in the last section. 
A toy Neumann analogue of the nodal line conjecture. (arXiv:1706.10037v1 [math.AP]) 
Authors: J. B. Kennedy We introduce an analogue of Payne's nodal line conjecture, which asserts that the nodal (zero) set of any eigenfunction associated with the second eigenvalue of the Dirichlet Laplacian on a bounded planar domain should reach the boundary of the domain. The assertion here is that any eigenfunction associated with the first nontrivial eigenvalue of the Neumann Laplacian on a domain $\Omega$ with rotational symmetry of order two (i.e., $x\in\Omega$ iff $x\in\Omega$) "should normally" be rotationally antisymmetric. We give both positive and negative results which highlight the heuristic similarity of this assertion to the nodal line conjecture, while demonstrating that the extra structure of the problem makes it easier to obtain stronger statements: it is true for all simply connected planar domains, while there is a counterexample domain homeomorphic to a disk with two holes. 
A new family of irreducible subgroups of the orthogonal algebraic groups. (arXiv:1706.10043v1 [math.RT]) 
Authors: Mikaël Cavallin, Donna M. Testerman Let $n\geq 3,$ and let $Y$ be a simply connected, simple algebraic group of type $D_{n+1}$ over an algebraically closed field $K.$ Also let $X$ be the subgroup of type $B_n$ of $Y,$ embedded in the usual way. In this paper, we correct an error in a proof of a theorem of Seitz, resulting in the discovery of a new family of triples $(X,Y,V),$ where $V$ denotes a finitedimensional, irreducible, rational $KY$module, on which $X$ acts irreducibly. We go on to investigate the impact of the existence of the new examples on the classification of the maximal closed connected subgroups of the classical algebraic groups. 
First hochschild cohomology group and stable equivalence classification of morita type of some tame symmetric algebras. (arXiv:1706.10044v1 [math.RT]) 
Authors: Rachel Taillefer (LMBP) We use the dimension and the Lie algebra structure of the first Hochschild cohomology group to distinguish some algebras of dihedral, semidihedral and quaternion type up to stable equivalence of Morita type. In particular, we complete the classification of algebras of dihedral type that was mostly determined by Zhou and Zimmermann. 
Selberg zeta function and hyperbolic eisenstein series. (arXiv:1706.10045v1 [math.SP]) 
Authors: Thérèse Falliero (LANLG) We study the product of Selberg Zeta function and hyperbolic Eisenstein series on a family of degenerating hyperbolic surfaces. 
On the honeycomb conjecture for Robin Laplacian eigenvalues. (arXiv:1706.10055v1 [math.OC]) 
Authors: Dorin Bucur, Ilaria Fragala We prove that the optimal cluster problem for the sum of the first Robin eigenvalue of the Laplacian, in the limit of a large number of convex cells, is asymptotically solved by (the Cheeger sets of) the honeycomb of regular hexagons. The same result is established for the Robin torsional rigidity. 
Barankin Vector Locally Best Unbiased Estimates. (arXiv:1706.10062v1 [stat.ML]) 
Authors: Bruno CernuschiFrias The Barankin bound is generalized to the vector case in the mean square error sense. Necessary and sufficient conditions are obtained to achieve the lower bound. To obtain the result, a simple finite dimensional real vector valued generalization of the Riesz representation theorem for Hilbert spaces is given. The bound has the form of a linear matrix inequality where the covariances of any unbiased estimator, if these exist, are lower bounded by matrices depending only on the parametrized probability distributions. 
Coverings for $4$dimensional almost complex manifolds with nondegenerate torsion. (arXiv:1706.10068v1 [math.DG]) 
Authors: Cristina Bozzetti, Costantino Medori An almost complex manifolds $(M^4,J)$ of real dimension 4 with nondegenerate torsion bundle admit a double absolute parallelism and it is provided the classification of homogeneous $(M^4,J)$ having an associated nonsolvable Lie algebra. We extend such a classification to the analysis of the manifolds having an associated solvable Lie algebra, uptocoverings. Moreover, for homogeneous $(M^4,J)$ we provide examples with connected and nonconnected double covering, thus proving that in general the double absolute parallelism is not the restriction of two absolute parallelisms. Furthermore, it is given the definition of a natural metric induced by the absolute parallelisms on $(M^4,J)$ and an example of an almost complex manifold with nondegenerate torsion endowed with that metric such that it becomes an almost K\"ahler manifold. 
Nonlinear Stability of Planar Vortex Patches in Bounded Domains. (arXiv:1706.10070v1 [math.AP]) 
Authors: Daomin Cao, Guodong Wang We prove nonlinear stability of planar vortex patches concentrating at a strict local minimum point of the Robin function in a bounded domain. These vortex patches are stationary solutions of the 2D incompressible Euler equations. This is achieved by showing that they are strict local maximizers of the kinetic energy among isovortical patches. 
Algebraic cycles and residues of degree eight $L$functions of $\mathrm{GSp}(4) \times \mathrm{GL}(2)$. (arXiv:1706.10073v1 [math.NT]) 
Authors: Francesco Lemma By embedding the product of two modular curves into the product of a Siegel threefold and of a modular curve, we construct a cohomology class whose nontriviality is equivalent to the existence of a pole for a degree eight automorphic $L$function, under mild local assumptions. We also prove a cohomological formula for noncritical residues of these $L$functions in the spirit of Beilinson conjecture. These results rely on the cohomological interpretation of an automorphic period integral and on the study of an integral representation of the $L$functions. 
Construction of BrauerSeveri Varieties. (arXiv:1706.10079v1 [math.NT]) 
Authors: Elisa Lorenzo Garcia In this paper we give an algorithm for computing equations of BrauerSeveri varieties over perfect fields of characteristic 0. As an example we show the equations of all BrauerSeveri surfaces defined over $\mathbb{Q}$. 
Persistence Diagrams with Linear Machine Learning Models. (arXiv:1706.10082v1 [math.AT]) 
Authors: Ippei Obayashi, Yasuaki Hiraoka Persistence diagrams have been widely recognized as a compact descriptor for characterizing multiscale topological features in data. When many datasets are available, statistical features embedded in those persistence diagrams can be extracted by applying machine learnings. In particular, the ability for explicitly analyzing the inverse in the original data space from those statistical features of persistence diagrams is significantly important for practical applications. In this paper, we propose a unified method for the inverse analysis by combining linear machine learning models with persistence images. The method is applied to point clouds and cubical sets, showing the ability of the statistical inverse analysis and its advantages. 
The Picard Group of BrauerSeveri Varieties. (arXiv:1706.10093v1 [math.NT]) 
Authors: Eslam Badr, Francesc Bars, Elisa Lorenzo Garcia In this note we provide explicit generators of the Picard groups of cyclic BrauerSeveri varieties defined over the base field. In particular, for all BrauerSeveri surfaces. To produce these generators we use the Twisting Theory for smooth plane curves. 
Holomorphic anomaly equations and the Igusa cusp form conjecture. (arXiv:1706.10100v1 [math.AG]) 
Authors: Georg Oberdieck, Aaron Pixton Let $S$ be a K3 surface and let $E$ be an elliptic curve. We solve the reduced GromovWitten theory of the CalabiYau threefold $S \times E$ for all curve classes which are primitive in the K3 factor. In particular, we deduce the Igusa cusp form conjecture. The proof relies on new results in the GromovWitten theory of elliptic curves and K3 surfaces. We show the generating series of GromovWitten classes of an elliptic curve are cyclevalued quasimodular forms and satisfy a holomorphic anomaly equation. The quasimodularity generalizes a result by Okounkov and Pandharipande, and the holomorphic anomaly equation proves a conjecture of Milanov, Ruan and Shen. We further conjecture quasimodularity and holomorphic anomaly equations for the cyclevalued GromovWitten theory of every elliptic fibration with section. The conjecture generalizes the holomorphic anomaly equations for ellliptic CalabiYau threefolds predicted by Bershadsky, Cecotti, Ooguri, and Vafa. We show a modified conjecture holds numerically for the reduced GromovWitten theory of K3 surfaces in primitive classes. 
Analytic continuation of local (un)stable manifolds with rigorous computer assisted error bounds. (arXiv:1706.10107v1 [math.DS]) 
Authors: William D. Kalies, Shane Kepley, J.D. Mireles James We develop a validated numerical procedure for continuation of local stable/unstable manifold patches attached to equilibrium solutions of ordinary differential equations. The procedure has two steps. First we compute an accurate high order Taylor expansion of the local invariant manifold. This expansion is valid in some neighborhood of the equilibrium. An important component of our method is that we obtain mathematically rigorous lower bounds on the size of this neighborhood, as well as validated aposteriori error bounds for the polynomial approximation. In the second step we use a rigorous numerical integrating scheme to propagate the boundary of the local stable/unstable manifold as long as possible, i.e.\ as long as the integrator yields validated error bounds below some desired tolerance. The procedure exploits adaptive remeshing strategies which track the growth/decay of the Taylor coefficients of the advected curve. In order to highlight the utility of the procedure we study the embedding of some two dimensional manifolds in the Lorenz system. 
On Using Toeplitz and Circulant Matrices for JohnsonLindenstrauss Transforms. (arXiv:1706.10110v1 [math.FA]) 
Authors: Casper Benjamin Freksen, Kasper Green Larsen The JohnsonLindenstrauss lemma is one of the corner stone results in dimensionality reduction. It says that for any set of vectors $X \subset \mathbb{R}^n$, there exists a mapping $f : X \to \mathbb{R}^m$ such that $f(X)$ preserves all pairwise distances between vectors in $X$ to within $(1 \pm \varepsilon)$ if $m = O(\varepsilon^{2} \lg N)$. Much effort has gone into developing fast embedding algorithms, with the Fast JohnsonLindenstrauss transform of Ailon and Chazelle being one of the most wellknown techniques. The current fastest algorithm that yields the optimal $m = O(\varepsilon^{2}\lg N)$ dimensions has an embedding time of $O(n \lg N + \varepsilon^{2} \lg^3 N)$. An exciting approach towards improving this, due to Hinrichs and Vyb\'iral, is to use a random $m \times n$ Toeplitz matrix for the embedding. Using Fast Fourier Transform, the embedding of a vector can then be computed in $O(n \lg m)$ time. The big question is of course whether $m = O(\varepsilon^{2} \lg N)$ dimensions suffice for this technique. If so, this would end a decades long quest to obtain faster and faster JohnsonLindenstrauss transforms. The current best analysis of the embedding of Hinrichs and Vyb\'iral shows that $m = O(\varepsilon^{2}\lg^2 N)$ dimensions suffices. The main result of this paper, is a proof that this analysis unfortunately cannot be tightened any further, i.e., there exists a set of $N$ vectors requiring $m = \Omega(\varepsilon^{2} \lg^2 N)$ for the Toeplitz approach to work. 
Real and Complex Integrals on Spheres and Balls. (arXiv:1706.10111v1 [math.CV]) 
Authors: H. Turgay Kaptanoğlu We evaluate integrals of certain polynomials over spheres and balls in real or complex spaces. We also promote the use of the Pochhammer symbol which gives the values of our integrals in compact forms. 
Semiimplicit EulerMaruyama approximation for noncolliding particle systems. (arXiv:1706.10119v1 [math.PR]) 
Authors: HoangLong Ngo, Dai Taguchi We introduce a semiimplicit EulerMaruyama approximation which preservers the noncolliding property for some class of noncolliding particle systems such as Dyson Brownian motions, DysonOrnsteinUhlenbeck processes and Brownian particles systems with nearest neighbour repulsion, and study its rates of convergence in both $L^p$norm and pathwise sense. 
Inconsistency of Template Estimation by Minimizing of the Variance/PreVariance in the Quotient Space. (arXiv:1706.10125v1 [math.ST]) 
Authors: Loïc Devilliers (ASCLEPIOS, UCA), Stéphanie Allassonnière (CRC), Alain Trouvé (CMLA), Xavier Pennec (ASCLEPIOS, UCA) We tackle the problem of template estimation when data have been randomly deformed under a group action in the presence of noise. In order to estimate the template, one often minimizes the variance when the influence of the transformations have been removed (computation of the Fr{\'e}chet mean in the quotient space). The consistency bias is defined as the distance (possibly zero) between the orbit of the template and the orbit of one element which minimizes the variance. In the first part, we restrict ourselves to isometric group action, in this case the Hilbertian distance is invariant under the group action. We establish an asymptotic behavior of the consistency bias which is linear with respect to the noise level. As a result the inconsistency is unavoidable as soon as the noise is enough. In practice, template estimation with a finite sample is often done with an algorithm called "maxmax". In the second part, also in the case of isometric group finite, we show the convergence of this algorithm to an empirical Karcher mean. Our numerical experiments show that the bias observed in practice can not be attributed to the small sample size or to a convergence problem but is indeed due to the previously studied inconsistency. In a third part, we also present some insights of the case of a non invariant distance with respect to the group action. We will see that the inconsistency still holds as soon as the noise level is large enough. Moreover we prove the inconsistency even when a regularization term is added. 
Tempered homogeneous spaces. (arXiv:1706.10131v1 [math.RT]) 
Authors: Yves Benoist, Toshiyuki Kobayashi Let $G$ be a semisimple real Lie group with finite center and $H$ a connected closed subgroup. We establish a geometric criterion which detects whether the representation of $G$ in $L^2(G/H)$ is tempered. 
Universal meanfield framework for SIS epidemics on networks, based on graph partitioning and the isoperimetric inequality. (arXiv:1706.10132v1 [physics.socph]) 
Authors: Karel Devriendt, Piet Van Mieghem We propose a new approximation framework that unifies and generalizes a number of existing meanfield approximation methods for the SIS epidemic model on complex networks. We derive the framework, which we call the Universal MeanField Framework (UMFF), as a set of approximations of the exact Markovian SIS equations. Our main novelty is that we describe the meanfield approximations from the perspective of the isoperimetric problem, an insight which results in bounds on the UMFF approximation error. These new bounds provide insight in the accuracy of existing meanfield methods, such as the widelyused NIntertwined MeanField Approximation (NIMFA) and Heterogeneous MeanField method (HMF). Additionally, the geometric perspective of the isoperimetric problem enables the UMFF approximation accuracy to be related to the regularity notions of Szemer\'edi's regularity lemma, which yields a prediction about the behavior of the SIS process on large graphs. 
Grouplike projections for locally compact quantum groups. (arXiv:1706.10138v1 [math.OA]) 
Authors: Paweł Kasprzak, Ramin Faal Let $\mathbb{G}$ be a locally compact quantum group. We give a 11 correspondence between grouplike projections in $L^1(\mathbb{G})$ preserved by the scaling group and idempotent states on the dual quantum group. As a byproduct we give a simple proof that normal integrable coideals in $L^1(\mathbb{G})$ which are preserved by the scaling group are in 11 correspondence with compact quantum subgroups of $\mathbb{G}$. 
A comment on Intersecting Families of Permutations. (arXiv:1706.10146v1 [math.CO]) 
Authors: Yuval Filmus Ellis, Friedgut and Pilpel proved that for large enough $n$, a $t$intersecting family of permutations contains at most $(nt)!$ permutations. Their main theorem also states that equality holds only for $t$cosets. We show that their proof of the characterization of extremal families is wrong. However, the characterization follows from a paper of Ellis, as mentioned already by Ellis, Friedgut and Pilpel. 
A note on weak solutions of conservation laws and energy/entropy conservation. (arXiv:1706.10154v1 [math.AP]) 
Authors: Piotr Gwiazda, Martin Michálek, Agnieszka ŚwierczewskaGwiazda A common feature of systems of conservation laws of continuum physics is that they are endowed with natural companion laws which are in such case most often related to the second law of thermodynamics. This observation easily generalizes to any symmetrizable system of conservation laws. They are endowed with nontrivial companion conservation laws, which are immediately satisfied by classical solutions. Not surprisingly, weak solutions may fail to satisfy companion laws, which are then often relaxed from equality to inequality and overtake a role of a physical admissibility condition for weak solutions. We want to answer the question what is a critical regularity of weak solutions to a general system of conservation laws to satisfy an associated companion law as an equality. An archetypal example of such result was derived for the incompressible Euler system by Constantin et al. ([8]) in the context of the seminal Onsager's conjecture. This general result can serve as a simple criterion to numerous systems of mathematical physics to prescribe the regularity of solutions needed for an appropriate companion law to be satisfied. 
Breaking ties in collective decision making. (arXiv:1706.10165v1 [math.CO]) 
Authors: Daniela Bubboloni, Michele Gori Many classical social preference (multiwinner social choice) correspondences are resolute only when two alternatives and an odd number of individuals are considered. Thus,they generally admit several resolute refinements, each of them naturally interpreted as a tiebreaking rule. In this paper we find out conditions which make a social preference (multiwinner social choice) correspondence admit a resolute refinement fulfilling suitable weak versions of the anonymity and neutrality principles, as well as reversal symmetry (immunity to the reversal bias). 
The Geometric structure of M\"obius spaces. (arXiv:1706.10166v1 [math.MG]) 
Authors: Merlin IncertiMedici Classically, a M\"obius structure is defined on a metric space $(X,d)$ by the crossratio $\frac{d(w,z)d(x,y)}{d(w,y)d(x,z)}$. With M\"obius structures appearing naturally in contexts where no natural metric is given  e.\,g. on the boundary of hyperbolic spaces  one may ask whether a M\"obius structure can be defined outside of the context of metric spaces. In this paper, we review a generalization of M\"obius structures due to Sergei Buyalo. We state that this generalized notion of M\"obius structures is compatible with the classical one, both geometrically and topologically and provide a more general proof on the topological compatibility. Having established this generalized notion of M\"obius spaces, we study some of its topological and geometric properties with an outlook towards metric completeness. 
Uncountable strongly surjective linear orders. (arXiv:1706.10171v1 [math.LO]) 
Authors: Dániel T. Soukup A linear order $L$ is strongly surjective if $L$ can be mapped onto any of its suborders in an order preserving way. We prove various results on the existence and nonexistence of uncountable strongly surjective linear orders answering questions of Camerlo, Carroy and Marcone. In particular, $\diamondsuit^+$ implies the existence of a lexicographically ordered Suslintree which is strongly surjective and minimal; every strongly surjective linear order must be an Aronszajn type under $2^{\aleph_0}<2^{\aleph_1}$ or in the Cohen and other canonical models (where $2^{\aleph_0}=2^{\aleph_1}$); finally, we prove that it is consistent with CH that there are no uncountable strongly surjective linear orders at all. We end the paper with a healthy list of open problems. 
Some remarks on the regularity time of Leray solutions to the NavierStokes equations. (arXiv:1706.10173v1 [math.AP]) 
Authors: Pablo Braz e Silva, Janaína P. Zingano, Paulo R. Zingano In this small note we strengthen the classic result about the regularity time t* of arbitrary Leray solutions to the (incompressible) NavierStokes equations in Rn (n = 3, 4), which have the form: t* <= K_{3} nu^{5}  u(.,0) _{L2}^{4} if n = 3, and t* <= K_{4} nu^{3}  u(.,0) _{L2}^{2} if n = 4 (in particular, by reducing the current best known values for the constants K_{3}, K_{4}). Some related results of clear interest are also included (derived) in our discussion. 
A Comparative Study of Limiting Strategies in Discontinuous Galerkin Schemes for the $M_1$ Model of Radiation Transport. (arXiv:1706.10174v1 [math.NA]) 
Authors: Prince Chidyagwai, Martin Frank, Florian Schneider, Benjamin Seibold The $M_1$ minimum entropy moment system is a system of hyperbolic balance laws that approximates the radiation transport equation, and has many desirable properties. Among them are symmetric hyperbolicity, entropy decay, moment realizability, and correct behavior in the diffusion and freestreaming limits. However, numerical difficulties arise when approximating the solution of the $M_1$ model by high order numerical schemes; namely maintaining the realizability of the numerical solution and controlling spurious oscillations. In this paper, we extend a previously constructed onedimensional realizability limiting strategy to 2D. In addition, we perform a numerical study of various combinations of the realizability limiter and the TVBM local slope limiter on a third order Discontinuous Galerkin (DG) scheme on both triangular and rectangular meshes. In several test cases, we demonstrate that in general, a combination of the realizability limiter and a TVBM limiter is necessary to obtain a robust and accurate numerical scheme. Our code is published so that all results can be reproduced by the reader. 
Lipschitz continuity of quasiconformal mappings and of the solutions to second order elliptic PDE with respect to the distance ratio metric. (arXiv:1706.10175v1 [math.CV]) 
Authors: Peijin Li, Saminthan Ponnusamy The main aim of this paper is to study the Lipschitz continuity of certain $(K, K')$quasiconformal mappings with respect to the distance ratio metric, and the Lipschitz continuity of the solution of a quasilinear differential equation with respect to the distance ratio metric. 
Codebook Based Hybrid Precoding for Millimeter Wave Multiuser Systems. (arXiv:1706.10181v1 [cs.IT]) 
Authors: Shiwen He, Jiaheng Wang, Yongming Huang, Bjorn Ottersten, Wei Hong In millimeter wave (mmWave) systems, antenna architecture limitations make it difficult to apply conventional fully digital precoding techniques but call for low cost analog radiofrequency (RF) and digital baseband hybrid precoding methods. This paper investigates joint RFbaseband hybrid precoding for the downlink of multiuser multiantenna mmWave systems with a limited number of RF chains. Two performance measures, maximizing the spectral efficiency and the energy efficiency of the system, are considered. We propose a codebook based RF precoding design and obtain the channel state information via a beam sweep procedure. Via the codebook based design, the original system is transformed into a virtual multiuser downlink system with the RF chain constraint. Consequently, we are able to simplify the complicated hybrid precoding optimization problems to joint codeword selection and precoder design (JWSPD) problems. Then, we propose efficient methods to address the JWSPD problems and jointly optimize the RF and baseband precoders under the two performance measures. Finally, extensive numerical results are provided to validate the effectiveness of the proposed hybrid precoders. 
Computational aspects of robust optimized certainty equivalents. (arXiv:1706.10186v1 [qfin.RM]) 
Authors: Daniel Bartl, Samuel Drapeau, Ludovic Tangpi Accounting for model uncertainty in risk management leads to infinite dimensional optimization problems which are both analytically and numerically untractable. In this article we study when this fact can be overcome for the socalled optimized certainty equivalent risk measure (OCE)  including the average valueatrisk as a special case. First we focus on the case where the set of possible distributions of a financial loss is given by the neighborhood of a given baseline distribution in the Wasserstein distance, or more generally, an optimaltransport distance. Here it turns out that the computation of the robust OCE reduces to a finite dimensional problem, which in some cases can even be solved explicitly. Further, we derive convex dual representations of the robust OCE for measurable claims without any assumptions on the set of distributions and finally give conditions on the latter set under which the robust average valueatrisk is a tail risk measure. 
More Tur\'anType Theorems for Triangles in Convex Point Sets. (arXiv:1706.10193v1 [math.CO]) 
Authors: Boris Aronov, Vida Dujmović, Pat Morin, Aurélien Ooms, Luís Fernando Schultz Xavier da Silveira We study the following family of problems: Given a set of $n$ points in convex position, what is the maximum number triangles one can create having these points as vertices while avoiding certain sets of forbidden configurations. As forbidden configurations we consider all 8 ways in which a pair of triangles in such a point set can interact. This leads to 256 extremal Tur\'antype questions. We give nearly tight (within a $\log n$ factor) bounds for 248 of these questions and show that the remaining 8 questions are all asymptotically equivalent to Stein's longstanding tripod packing problem. 
Modern Random Access for Satellite Communications. (arXiv:1706.10198v1 [cs.IT]) 
Authors: Federico Clazzer The present PhD dissertation focuses on modern random access (RA) techniques. In the first part an slot and frameasynchronous RA scheme adopting replicas, successive interference cancellation and combining techniques is presented and its performance analysed. The comparison of both slotsynchronous and asynchronous RA at higher layer, follows. Next, the optimization procedure, for slotsynchronous RA with irregular repetitions, is extended to the Rayleigh block fading channel. Finally, random access with multiple receivers is considered. 
Nonlinear CauchyRiemann Equations and Liouville Equation For Conformal Metrics. (arXiv:1706.10201v1 [nlin.SI]) 
Authors: Tuğçe Parlakgörür, Oktay K. Pashaev We introduce the Nonlinear CauchyRiemann equations as B\"{a}cklund transformations for several nonlinear and linear partial differential equations. From these equations we treat in details the Laplace and the Liouville equations by deriving general solution for the nonlinear Liouville equation. By M\"{o}bius transformation we relate solutions for the Poincare model of hyperbolic geometry, the Klein model in halfplane and the pseudosphere. Conformal form of the constant curvature metrics in these geometries, stereographic projections and special solutions are discussed. Then we introduce the hyperbolic analog of the Riemann sphere, which we call the Riemann pseudosphere. We identify point at infinity on this pseudosphere and show that it can be used in complex analysis as an alternative to usual Riemann sphere to extend the complex plane. Interpretation of symmetric and antipodal points on both, the Riemann sphere and the Riemann pseudosphere, are given. By M\"{o}bius transformation and homogenous coordinates, the most general solution of Liouville equation as discussed by Crowdy is derived. 
Joint Optimization of User Association, Data Delivery Rate and Precoding for CacheEnabled FRANs. (arXiv:1706.10203v1 [cs.IT]) 
Authors: Tung T. Vu, Duy T. Ngo, Lawrence Ong, Salman Durrani, Richard H. Middleton This paper considers the downlink of a cacheenabled fog radio access network (FRAN) with limited fronthaul capacity, where user association (UA), data delivery rate (DDR) and signal precoding are jointly optimized. We formulate a mixedinteger nonlinear programming problem in which the weighted difference of network throughput and total power consumption is maximized, subject to the predefined DDR requirements and the maximum transmit power at each eRRH. To address this challenging problem, we first apply the l0norm approximation and l1norm minimization techniques to deal with the UA. After this key step, we arrive at an approximated problem that only involves the joint optimization of DDR and precoding. By using the alternating descent method, we further decompose this problem into a convex subproblem for DDR allocation and a nonconvex subproblem for precoding design. While the former is globally solved by the interiorpoint method, the latter is solved by a specifically tailored successive convex quadratic programming method. Finally, we propose an iterative algorithm for the original joint optimization that is guaranteed to converge. Importantly, each iteration of the developed algorithm only involves solving simple convex problems. Numerical examples demonstrate that the proposed design significantly improves both throughput and power performances, especially in practical FRANs with limited fronthaul capacity. Compared to the sole precoder design for a given cache placement, our joint design is shown to improve the throughput by 50% while saving at least half of the total power consumption in the considered examples. 
Sums of Palindromes: an Approach via NestedWord Automata. (arXiv:1706.10206v1 [cs.FL]) 
Authors: Aayush Rajasekaran, Jeffrey Shallit, Tim Smith We prove, using a decision procedure based on nestedword automata, that every natural number is the sum of at most 9 natural numbers whose base2 representation is a palindrome. We consider some other variations on this problem, and prove similar results. We argue that heavily casebased proofs are a good signal that a decision procedure may help to automate the proof. 
Storage, Communication, and Load Balancing Tradeoff in Distributed Cache Networks. (arXiv:1706.10209v1 [cs.IT]) 
Authors: Mahdi Jafari Siavoshani, Ali Pourmiri, Seyed Pooya Shariatpanahi We consider load balancing in a network of caching servers delivering contents to end users. Randomized load balancing via the socalled power of two choices is a wellknown approach in parallel and distributed systems. In this framework, we investigate the tension between storage resources, communication cost, and load balancing performance. To this end, we propose a randomized load balancing scheme which simultaneously considers cache size limitation and proximity in the server redirection process. In contrast to the classical power of two choices setup, since the memory limitation and the proximity constraint cause correlation in the server selection process, we may not benefit from the power of two choices. However, we prove that in certain regimes of problem parameters, our scheme results in the maximum load of order $\Theta(\log\log n)$ (here $n$ is the network size). This is an exponential improvement compared to the scheme which assigns each request to the nearest available replica. Interestingly, the extra communication cost incurred by our proposed scheme, compared to the nearest replica strategy, is small. Furthermore, our extensive simulations show that the tradeoff trend does not depend on the network topology and library popularity profile details. 
On the GeilMatsumoto Bound and the Length of AG codes. (arXiv:1706.10214v1 [math.AG]) 
Authors: Maria BrasAmorós, Albert VicoOton The GeilMatsumoto bound conditions the number of rational places of a function field in terms of the Weierstrass semigroup of any of the places. Lewittes' bound preceded the GeilMatsumoto bound and it only considers the smallest generator of the numerical semigroup. It can be derived from the GeilMatsumoto bound and so it is weaker. However, for general semigroups the GeilMatsumoto bound does not have a closed formula and it may be hard to compute, while Lewittes' bound is very simple. We give a closed formula for the GeilMatsumoto bound for the case when the Weierstrass semigroup has two generators. We first find a solution to the membership problem for semigroups generated by two integers and then apply it to find the above formula. We also study the semigroups for which Lewittes's bound and the GeilMatsumoto bound coincide. We finally investigate on some simplifications for the computation of the GeilMatsumoto bound. 
Method of precision increase by averaging with application to numerical differentiation. (arXiv:1706.10219v1 [math.GM]) 
Authors: Andrej Liptaj If several independent algorithms for a computercalculated quantity exist, then one can expect their results (which differ because of numerical errors) to follow approximately Gaussian distribution. The mean of this distribution, interpreted as the value of the quantity of interest, can be determined with better precision than what is the precision provided by a single algorithm. Often, with lack of enough independent algorithms, one can proceed differently: many practical algorithms introduce a bias using a parameter, e.g. a small but finite number to compute a limit or a large but finite number (cutoff) to approximate infinity. One may vary such parameter of a single algorithm and interpret the resulting numbers as generated by several algorithms. A numerical evidence for the validity of this approach is shown for differentiation. 
Weakly intrusive lowrank approximation method for nonlinear parameterdependent equations. (arXiv:1706.10221v1 [math.NA]) 
Authors: Loic Giraldi, Anthony Nouy This paper presents a weakly intrusive strategy for computing a lowrank approximation of the solution of a system of nonlinear parameterdependent equations. The proposed strategy relies on a Newtonlike iterative solver which only requires evaluations of the residual of the parameterdependent equation and of a preconditioner (such as the differential of the residual) for instances of the parameters independently. The algorithm provides an approximation of the set of solutions associated with a possibly large number of instances of the parameters, with a computational complexity which can be orders of magnitude lower than when using the same Newtonlike solver for all instances of the parameters. The reduction of complexity requires efficient strategies for obtaining lowrank approximations of the residual, of the preconditioner, and of the increment at each iteration of the algorithm. For the approximation of the residual and the preconditioner, weakly intrusive variants of the empirical interpolation method are introduced, which require evaluations of entries of the residual and the preconditioner. Then, an approximation of the increment is obtained by using a greedy algorithm for lowrank approximation, and a lowrank approximation of the iterate is finally obtained by using a truncated singular value decomposition. When the preconditioner is the differential of the residual, the proposed algorithm is interpreted as an inexact Newton solver for which a detailed convergence analysis is provided. Numerical examples illustrate the efficiency of the method. 
A restriction isomorphism for zerocycles with coefficients in Milnor Ktheory. (arXiv:1706.10222v1 [math.AG]) 
Authors: Morten Lüders We prove a restriction isomorphism for zerocycles with coefficients in Milnor Ktheory for smooth projective schemes over excellent henselian discrete valuation rings. Furthermore we relate zerocycles with coefficients in Milnor Ktheory to \'etale cohomology and certain Kato complexes and deduce finiteness results for zerocycles with coefficients in Milnor Ktheory over local fields. 
Bayesian inference using intermediate distribution based on coarse multiscale model for time fractional diffusion equation. (arXiv:1706.10224v1 [math.NA]) 
Authors: Lijian Jiang, Na Ou In the paper, we present a strategy for accelerating posterior inference for unknown inputs in time fractional diffusion models. In many inference problems, the posterior may be concentrated in a small portion of the entire prior support. It will be much more efficient if we build and simulate a surrogate only over the significant region of the posterior. To this end, we construct a coarse model using Generalized Multiscale Finite Element Method (GMsFEM), and solve a leastsquares problem for the coarse model with a regularizing LevenbergMarquart algorithm. An intermediate distribution is built based on the approximate sampling distribution. For Bayesian inference, we use GMsFEM and leastsquares stochastic collocation method to obtain a reduced coarse model based on the intermediate distribution. To increase the sampling speed of Markov chain Monte Carlo, the DREAM$_\text{ZS}$ algorithm is used to explore the surrogate posterior density, which is based on the surrogate likelihood and the intermediate distribution. The proposed method with lower gPC order gives the approximate posterior as accurate as the the surrogate model directly based on the original prior. A few numerical examples for time fractional diffusion equations are carried out to demonstrate the performance of the proposed method with applications of the Bayesian inversion. 
Higher Order Tur\'an Inequalities for the Partition Function. (arXiv:1706.10245v1 [math.CO]) 
Authors: William Y.C. Chen, Dennis X.Q. Jia, Larry X.W. Wang The Tur\'{a}n inequalities and the higher order Tur\'{a}n inequalities arise in the study of Maclaurin coefficients of an entire function in the LaguerreP\'{o}lya class. A real sequence $\{a_{n}\}$ is said to satisfy the Tur\'{a}n inequalities if for $n\geq 1$, $a_n^2a_{n1}a_{n+1}\geq 0$. It is said to satisfy the higher order Tur\'{a}n inequalities if for $n\geq 1$, $4(a_{n}^2a_{n1}a_{n+1})(a_{n+1}^2a_{n}a_{n+2})(a_{n}a_{n+1}a_{n1}a_{n+2})^2\geq 0$. A sequence satisfying the Tur\'an inequalities is also called logconcave. For the partition function $p(n)$, DeSalvo and Pak showed that for $n>25$, the sequence $\{ p(n)\}_{n> 25}$ is logconcave, that is, $p(n)^2p(n1)p(n+1)>0$ for $n> 25$. It was conjectured by Chen that $p(n)$ satisfies the higher order Tur\'{a}n inequalities for $n\geq 95$. In this paper, we prove this conjecture by using the HardyRamanujanRademacher formula to derive an upper bound and a lower bound for $p(n+1)p(n1)/p(n)^2$. Consequently, for $n\geq 95$, the Jensen polynomials $g_{3,n1}(x)=p(n1)+3p(n)x+3p(n+1)x^2+p(n+2)x^3$ have only real zeros. We conjecture that for any positive integer $m\geq 4$ there exists an integer $N(m)$ such that for $n\geq N(m) $, the polynomials $\sum_{k=0}^m {m\choose k}p(n+k)x^k$ have only real zeros. This conjecture was independently posed by Ono. 
Uniquenss of Some Weak Solutions for 2D Viscous Primitive Equations. (arXiv:1706.10246v1 [math.AP]) 
Authors: Ning Ju First, a new sufficient condition for uniqueness of weak solutions is proved for the system of 2D viscous Primitive Equations. Second, global existence and uniqueness are established for several classes of weak solutions with partial initial regularity, including but not limited to those weak solutions with initial horizontal regularity, rather than vertical regularity. Our results and analyses for the problem with phys ical boundary conditions can be extended to those with other typical boundary conditions. Most of the results were not available before, even for the periodic case. 
Existence result for impulsive coupled systems on the halfline. (arXiv:1706.10248v1 [math.CA]) 
Authors: Feliz Minhós, Robert de Sousa This work considers a second order impulsive coupled system of differential equations with generalized jump conditions in halfline, which can depend on the impulses of the unknown functions and their first derivatives. The arguments apply the fixed point theory, Green's functions technique, L^11Carath\'eodory functions and sequences and Schauder's fixed point theorem. The method is based on Carath\'eodory concept of functions and sequences, together with the equiconvergence on infinity and on each impulsive moment, and it allows to consider coupled fully nonlinearities and very general impulsive functions. 
On collapsing CalabiYau fibrations. (arXiv:1706.10250v1 [math.DG]) 
Authors: Yang Li We develop some techniques to study the adiabatic limiting behaviour of CalabiYau metrics on the total space of a fibration, and obtain strong control near the singular fibres by imposing restrictions on the singularity types. We prove a uniform lower bound on the metric up to the singular fibre, under fairly general hypotheses. Assuming a result in pluripotential theory, we prove a uniform fibre diameter bound for a Lefschetz K3 fibred CalabiYau 3fold, which reduces the study of the collapsing metric to a locally noncollapsed situation, and we identify the GromovHausdorff limit of the rescaled neighbourhood of the singular fibre. 
Stein's method for normal approximation of linear statistics of betaensembles. (arXiv:1706.10251v1 [math.PR]) 
Authors: Gaultier Lambert, Michel Ledoux, Christian Webb We present a new approach based on Stein's method in order to prove a central limit theorem for linear statistics of onecut regular betaensembles. Compared with the previous proofs, our result requires less regularity on the potential and provides a rate of convergence in the quadradtic Kantorovich or Wasserstein 2 distance. This rate depends both on the regularity of the potential and the test function and we prove that it is optimal in the case of the Gaussian Unitary Ensemble for certain polynomial test functions. The method relies on a general Gaussian approximation result which we prove and is valid for a large class of Gibbs distributions. In the context of betaensembles, this leads to a multidimensional CLT for a sequence of linear statistics which are approximate eigenfunctions of the infinitesimal generator of Dyson Brownian motion once the various error terms are controlled using the rigidity results of Bourgade, Erdos, and Yau. 
Line Hermitian Grassmann Codes and their Parameters. (arXiv:1706.10255v1 [math.CO]) 
Authors: Ilaria Cardinali, Luca Giuzzi In this paper we introduce and study line Hermitian Grassmann codes as those subcodes of the Grassmann codes associated to the $2$Grassmannian of a Hermitian polar space defined over a finite field of square order. In particular, we determine their parameters and characterize the words of minimum weight. 
A faster dual algorithm for the Euclidean minimum covering ball problem. (arXiv:1706.10256v1 [math.OC]) 
Authors: Marta Cavaleiro, Farid Alizadeh Dearing and Zeck presented a dual algorithm for the problem of the minimum covering ball in $\mathbb{R}^n$. Each iteration of their algorithm has a computational complexity of at least $\mathcal O(n^3)$. In this paper we propose a modification to their algorithm that, together with an implementation that uses updates to the QR factorization of a suitable matrix, achieves a $\mathcal O(n^2)$ iteration. 
The cohomology of free loop spaces of homogeneous spaces. (arXiv:1706.10258v1 [math.AT]) 
Authors: Matthew Burfitt The free loops space $\Lambda X$ of a space $X$ has become an important object of study particularly in the case when $X$ is a manifold.The study of free loop spaces is motivated in particular by two main examples. The first is their relation to geometrically distinct periodic geodesics on a manifold, originally studied by Gromoll and Meyer in $1969$. More recently the study of string topology and in particular the ChasSullivan loop product has been an active area of research. A complete flag manifold is the quotient of a Lie group by its maximal torus and is one of the nicer examples of a homogeneous space. Both the cohomology and ChasSullivan product structure are understood for spaces $S^n$, $\mathbb{C}P^n$ and most simple Lie groups. Hence studying the topology of the free loops space on homogeneous space is a natural next step. In the thesis we compute the differentials in the integral LeraySerre spectral sequence associated to the free loops space fibrations in the cases of $SU(n+1)/T^n$ and $Sp(n)/T^n$. Study in detail the structure of the third page of the spectral sequence in the case of $SU(n)$ and give the module structure of $H^*(\Lambda(SU(3)/T^2);\mathbb{Z})$ and $H^*(\Lambda(Sp(2)/T^2);\mathbb{Z})$. 
Hilbert isometries and maximal deviation preserving maps on JBalgebras. (arXiv:1706.10259v1 [math.OA]) 
Authors: Mark Roelands, Marten Wortel In this paper we characterize the surjective linear variation norm isometries on JBalgebras. Variation norm isometries are precisely the maps that preserve the maximal deviation, the quantum analogue of the standard deviation, which plays an important role in quantum statistics. Consequently, we characterize the Hilbert's metric isometries on cones in JBalgebras. The results obtained rely on a variety of new geometric and Jordan algebraic techniques. 
How biased is your model? Concentration Inequalities, Information and Model Bias. (arXiv:1706.10260v1 [cs.IT]) 
Authors: Konstantinos Gourgoulias, Markos A. Katsoulakis, Luc ReyBellet, Jie Wang We derive tight and computable bounds on the bias of statistical estimators, or more generally of quantities of interest, when evaluated on a baseline model P rather than on the typically unknown true model Q. Our proposed method combines the scalable information inequality derived by P. Dupuis, K.Chowdhary, the authors and their collaborators together with classical concentration inequalities (such as Bennett's and HoeffdingAzuma inequalities). Our bounds are expressed in terms of the KullbackLeibler divergence R(QP) of model Q with respect to P and the moment generating function for the statistical estimator under P. Furthermore, concentration inequalities, i.e. bounds on moment generating functions, provide tight and computationally inexpensive model bias bounds for quantities of interest. Finally, they allow us to derive rigorous confidence bands for statistical estimators that account for model bias and are valid for an arbitrary amount of data. 
Nondegeneracy of Gauss curvature equation with negative conic singularity. (arXiv:1706.10264v1 [math.AP]) 
Authors: Juncheng Wei, Lei Zhang We study the Gauss curvature equation with negative singularities. For a local mean field type equation with only one negative index we prove a uniqueness property. For a global equation with one or two negative indexes we prove the nondegeneracy of the linearized equations. 
A formalization of convex polyhedra based on the simplex method. (arXiv:1706.10269v1 [cs.LO]) 
Authors: Xavier Allamigeon, Ricardo D. Katz We present a formalization of convex polyhedra in the proof assistant Coq. The cornerstone of our work is a complete implementation of the simplex method, together with the proof of its correctness and termination. This allows us to define the basic predicates over polyhedra in an effective way (i.e. as programs), and relate them with the corresponding usual logical counterparts. To this end, we make an extensive use of the Boolean reflection methodology. The benefit of this approach is that we can easily derive the proof of several essential results on polyhedra, such as Farkas Lemma, duality theorem of linear programming, and Minkowski Theorem. 
Signal Reconstruction from Interferometric Measurements under Sensing Constraints. (arXiv:1706.10275v1 [cs.IT]) 
Authors: Davood Mardani, George K. Atia, Ayman F. Abouraddy This paper develops a unifying framework for signal reconstruction from interferometric measurements that is broadly applicable to various applications of interferometry. In this framework, the problem of signal reconstruction in interferometry amounts to one of basis analysis. Its applicability is shown to extend beyond conventional temporal interferometry, which leverages the relative delay between the two arms of an interferometer, to arbitrary degrees of freedom of the input signal. This allows for reconstruction of signals supported in other domains (e.g., spatial) with no modification to the underlying structure except for replacing the standard temporal delay with a generalized delay, that is, a practically realizable unitary transformation for which the basis elements are eigenfunctions. Under the proposed model, the interferometric measurements are shown to be linear in the basis coefficients, thereby enabling efficient and fast recovery of the desired information. While the corresponding linear transformation has only a limited number of degrees of freedom set by the structure of the interferometer giving rise to a highly constrained sensing structure, we show that the problem of signal recovery from such measurements can still be carried out compressively. This signifies significant reduction in sample complexity without introducing any additional randomization as is typically done in prior work leveraging compressive sensing techniques. We provide performance guarantees under constrained sensing by proving that the transformation satisfies sufficient conditions for successful reconstruction of sparse signals using concentration arguments. We showcase the effectiveness of the proposed approach using simulation results, as well as actual experimental results in the context of optical modal analysis of spatial beams. 
Probabilistic estimation of the rank 1 cross approximation accuracy. (arXiv:1706.10285v1 [math.NA]) 
Authors: Alexander Osinsky In the construction of lowrank matrix approximation and maximum element search it is effective to use maxvol algorithm. Nevertheless, even in the case of rank 1 approximation the algorithm does not always converge to the maximum matrix element, and it is unclear how often close to the maximum element can be found. In this article it is shown that with a certain degree of randomness in the matrix and proper selection of the starting column, the algorithm with high probability in a few steps converges to an element, which module differs little from the maximum. It is also shown that with more severe restrictions on the error matrix no restrictions on the starting column need to be introduced. 
Convergence of the randomized Kaczmarz method for phase retrieval. (arXiv:1706.10291v1 [math.NA]) 
Authors: Halyun Jeong, C. Sinan Güntürk The classical Kaczmarz iteration and its randomized variants are popular tools for fast inversion of linear overdetermined systems. This method extends naturally to the setting of the phase retrieval problem via substituting at each iteration the phase of any measurement of the available approximate solution for the unknown phase of the measurement of the true solution. Despite the simplicity of the method, rigorous convergence guarantees that are available for the classical linear setting have not been established so far for the phase retrieval setting. In this short note, we provide a convergence result for the randomized Kaczmarz method for phase retrieval in $\mathbb{R}^d$. We show that with high probability a random measurement system of size $m \asymp d$ will be admissible for this method in the sense that convergence in the mean square sense is guaranteed with any prescribed probability. The convergence is exponential and comparable to the linear setting. 
On perfect powers that are sums of two Fibonacci numbers. (arXiv:1706.10294v1 [math.NT]) 
Authors: Florian Luca, Vandita Patel We study the equation $F_n + F_m = y^p$, where $F_n$ and $F_m$ are respectively the $n$th and $m$th Fibonacci numbers and $p \ge 2$. We find all solutions under the assumption $n \equiv m \pmod{2}$. 
Distribution of real algebraic integers. (arXiv:1706.10296v1 [math.NT]) 
Authors: Dzianis Kaliada In the paper, we study the asymptotic distribution of real algebraic integers of fixed degree as their na\"{\i}ve height tends to infinity. For an arbitrary interval $I \subset \mathbb{R}$ and sufficiently large $Q>0$, we obtain an asymptotic formula for the number of algebraic integers $\alpha\in I$ of fixed degree $n$ and na\"{\i}ve height $H(\alpha)\le Q$. In particular, we show that the real algebraic integers of degree $n$, with their height growing, tend to be distributed like the real algebraic numbers of degree $n1$. However, we reveal two symmetric "plateaux", where the distribution of real algebraic integers statistically resembles the rational integers. 
Using TPA to count linear extensions. (arXiv:1010.4981v2 [math.PR] UPDATED) 
Authors: Jacqueline Banks, Scott Garrabrant, Mark L. Huber, Anne Perizzolo A linear extension of a poset $P$ is a permutation of the elements of the set that respects the partial order. Let $L(P)$ denote the number of linear extensions. It is a #P complete problem to determine $L(P)$ exactly for an arbitrary poset, and so randomized approximation algorithms that draw randomly from the set of linear extensions are used. In this work, the set of linear extensions is embedded in a larger state space with a continuous parameter ?. The introduction of a continuous parameter allows for the use of a more efficient method for approximating $L(P)$ called TPA. Our primary result is that it is possible to sample from this continuous embedding in time that as fast or faster than the best known methods for sampling uniformly from linear extensions. For a poset containing $n$ elements, this means we can approximate $L(P)$ to within a factor of $1 + \epsilon$ with probability at least $1  \delta$ using an expected number of random bits and comparisons in the poset which is at most $O(n^3(ln n)(ln L(P))\epsilon^{2}\ln \delta^{1}).$ 
Mutation of torsion pairs in triangulated categories and its geometric realization. (arXiv:1105.3521v2 [math.RT] UPDATED) 
We introduce and study mutation of torsion pairs, as a generalization of mutation of cluster tilting objects, rigid objects and maximal rigid objects. It is proved that any mutation of a torsion pair is again a torsion pair. A geometric realization of mutation of torsion pairs in the cluster category of type $A_n$ or $A_{\infty}$ is given via rotation of Ptolemy diagrams. 
2dimensional algebras. Application to Jordan, Gassociative and Homassociative algebras. (arXiv:1205.1221v2 [math.RA] UPDATED) 
Authors: Elisabeth Remm, Michel Goze We classify, up to isomorphism, the 2dimensional algebras over a field K. We focuse also on the case of characteristic 2, identifying the matrices of GL(2,F_2) with the elements of the symmetric group S_3. The classification is then given by the study of the orbits of this group on a 3dimensional plane, viewed as a Fano plane. As applications, we establish classifications of Jordan algebras, algebras of Lie type or HomAssociative algebras. 
A quasistability result for dictatorships in $S_{n}$. (arXiv:1209.5557v8 [math.CO] UPDATED) 
Authors: David Ellis, Yuval Filmus, Ehud Friedgut We prove that Boolean functions on $S_{n}$ whose Fourier transform is highly concentrated on the first two irreducible representations of $S_n$, are close to being unions of cosets of pointstabilizers. We use this to give a natural proof of a stability result on intersecting families of permutations, originally conjectured by Cameron and Ku, and first proved by the first author. We also use it to prove a `quasistability' result for an edgeisoperimetric inequality in the transposition graph on $S_n$, namely that subsets of $S_n$ with small edgeboundary in the transposition graph are close to being unions of cosets of pointstabilizers. 
A stability result for balanced dictatorships in $S_{n}$. (arXiv:1210.3989v4 [math.CO] UPDATED) 
Authors: David Ellis, Yuval Filmus, Ehud Friedgut We prove that a balanced Boolean function on $S_{n}$ whose Fourier transform is highly concentrated on the first two irreducible representations of $S_{n}$, is close in structure to a dictatorship, a function which is determined by the image or preimage of a single element. As a corollary, we obtain a stability result concerning extremal isoperimetric sets in the Cayley graph on $S_{n}$ generated by the transpositions. Our proof works in the case where the expectation of the function is bounded away from $0$ and $1$. In contrast, [Ellis, D., Filmus, Y., Friedgut, E., A quasistability result for dictatorships in $S_{n}$, Combinatorica 35 (2015), pp. 573618] deals with Boolean functions of expectation O(1/n) whose Fourier transform is highly concentrated on the first two irreducible representations of $S_{n}$. These need not be close to dictatorships; rather, they must be close to a union of a constant number of cosets of pointstabilizers. 
Holomorphic curves in exploded manifolds: Kuranishi structure. (arXiv:1301.4748v4 [math.SG] UPDATED) 
Authors: Brett Parker This paper constructs a Kuranishi structure for the moduli stack of holomorphic curves in exploded manifolds. To avoid some technicalities of abstract Kuranishi structures, we embed our Kuranishi structure inside a moduli stack of curves. The construction also works for the moduli stack of holomorphic curves in any compact symplectic manifold. 
Empirical entropy, minimax regret and minimax risk. (arXiv:1308.1147v2 [math.ST] UPDATED) 
Authors: Alexander Rakhlin, Karthik Sridharan, Alexandre B. Tsybakov We consider the random design regression model with square loss. We propose a method that aggregates empirical minimizers (ERM) over appropriately chosen random subsets and reduces to ERM in the extreme case, and we establish sharp oracle inequalities for its risk. We show that, under the $\varepsilon^{p}$ growth of the empirical $\varepsilon$entropy, the excess risk of the proposed method attains the rate $n^{2/(2+p)}$ for $p\in(0,2)$ and $n^{1/p}$ for $p>2$ where $n$ is the sample size. Furthermore, for $p\in(0,2)$, the excess risk rate matches the behavior of the minimax risk of function estimation in regression problems under the wellspecified model. This yields a conclusion that the rates of statistical estimation in wellspecified models (minimax risk) and in misspecified models (minimax regret) are equivalent in the regime $p\in(0,2)$. In other words, for $p\in(0,2)$ the problem of statistical learning enjoys the same minimax rate as the problem of statistical estimation. On the contrary, for $p>2$ we show that the rates of the minimax regret are, in general, slower than for the minimax risk. Our oracle inequalities also imply the $v\log(n/v)/n$ rates for VapnikChervonenkis type classes of dimension $v$ without the usual convexity assumption on the class; we show that these rates are optimal. Finally, for a slightly modified method, we derive a bound on the excess risk of $s$sparse convex aggregation improving that of Lounici [Math. Methods Statist. 16 (2007) 246259] and providing the optimal rate. 
Elliptic K3 surfaces associated with the product of two elliptic curves: MordellWeil lattices and their fields of definition. (arXiv:1409.2931v3 [math.AG] UPDATED) 
Authors: Abhinav Kumar, Masato Kuwata To a pair of elliptic curves, one can naturally attach two K3 surfaces: the Kummer surface of their product and a double cover of it, called the Inose surface. They have prominently featured in many interesting constructions in algebraic geometry and number theory. There are several more associated elliptic K3 surfaces, obtained through base change of the Inose surface; these have been previously studied by Kuwata. We give an explicit description of the geometric MordellWeil groups of each of these elliptic surfaces in the generic case (when the elliptic curves are nonisogenous). In the nongeneric case, we describe a method to calculate explicitly a finite index subgroup of the MordellWeil group, which may be saturated to give the full group. Our methods rely on several interesting group actions, the use of rational elliptic surfaces, as well as connections to the geometry of low degree curves on cubic and quartic surfaces. We apply our techniques to compute the full MordellWeil group in several examples of arithmetic interest, arising from isogenous elliptic curves with complex multiplication, for which these K3 surfaces are singular. 
Smoothing of Limit Linear Series of Rank One on Saturated Metrized Complexes of Algebraic Curves. (arXiv:1411.2325v4 [math.AG] UPDATED) 
Authors: Ye Luo, Madhusudan Manjunath We investigate the smoothing problem of limit linear series of rank one on an enrichment of the notions of nodal curves and metrized complexes called saturated metrized complexes. We give a finitely verifiable full criterion for smoothability of a limit linear series of rank one on saturared metrized complexes, characterize the space of all such smoothings, and extend the criterion to metrized complexes. As applications, we prove that all limit linear series of rank one are smoothable on saturated metrized complexes corresponding to curves of compacttype, and prove an analogue for saturated metrized complexes of a theorem of Harris and Mumford on the characterization of nodal curves contained in a given gonality stratum. In addition, we give a full combinatorial criterion for smoothable limit linear series of rank one on saturated metrized complexes corresponding to nodal curves whose dual graphs are made of separate loops. 
Universal channel coding for general output alphabet. (arXiv:1502.02218v3 [cs.IT] UPDATED) 
Authors: Masahito Hayashi We propose two types of universal codes that are suited to two asymptotic regimes when the output alphabet is possibly continuous. The first class has the property that the error probability decays exponentially fast and we identify an explicit lower bound on the error exponent. The other class attains the epsiloncapacity the channel and we also identify the secondorder term in the asymptotic expansion. The proposed encoder is essentially based on the packing lemma of the method of types. For the decoder, we first derive a R\'enyirelativeentropy version of Clarke and Barron's formula the distance between the true distribution and the Bayesian mixture, which is of independent interest. The universal decoder is stated in terms of this formula and quantities used in the information spectrum method. The methods contained herein allow us to analyze universal codes for channels with continuous and discrete output alphabets in a unified manner, and to analyze their performances in terms of the exponential decay of the error probability and the secondorder coding rate. 
Random walks on weighted, oriented percolation clusters. (arXiv:1506.01879v3 [math.PR] UPDATED) 
Authors: Katja Miller We consider a weighted random walk on the backbone of an oriented percolation cluster. We determine necessary conditions on the weights for Brownian scaling limits under the annealed and the quenched law. This model is a random walk in dynamic random environment (RWDRE), where the environment is mixing, nonMarkovian and not elliptic. We provide a generalization of results obtained previously by Birkner et al. (2013). 
Dirichlet to Neumann operator for abelian YangMills gauge fields. (arXiv:1508.00449v4 [mathph] UPDATED) 
Authors: Homero G. DiazMarin We consider the Dirichlet to Neumann operator for abelian Yang Mills boundary conditions. We treat the case for spacetime manifolds with general smooth boundary components. The aim is constructing a complex structure for the symplectic space of boundary conditions of EulerLagrange solutions modulo gauge. Thus we prepare a suitable scenario for geometric quantization of abelian gauge fields following a symplectic reduction procedure in a Lagrangian setting. 
On the prosemisimple completion of the fundamental group of a smooth variety over a finite field. (arXiv:1509.06059v6 [math.NT] UPDATED) 
Authors: Vladimir Drinfeld Let $\Pi$ be the fundamental group of a smooth variety X over $F_p$. Given a nonArchimedean place $\lambda$ of the field of algebraic numbers which is prime to p, consider the $\lambda$adic prosemisimple completion of $\Pi$ as an object of the groupoid whose objects are prosemisimple groups and whose morphisms are isomorphisms up to conjugation by elements of the neutral connected component. We prove that this object does not depend on $\lambda$. If dim X=1 we also prove a crystalline generalization of this fact. We deduce this from the Langlands conjecture for function fields (proved by L. Lafforgue) and its crystalline analog (proved by T. Abe) using a reconstruction theorem in the spirit of KazhdanLarsenVarshavsky. We also formulate two related conjectures, each of which is a "reciprocity law" involving a sum over all $l$adic cohomology theories (including the crystalline theory for $l=p$). 
Degree of recurrence of generic diffeomorphisms. (arXiv:1510.00723v2 [math.DS] UPDATED) 
Authors: PierreAntoine Guihéneuf We study the spatial discretizations of dynamical systems: can we recover some dynamical features of a system from numerical simulations? Here, we tackle this issue for the simplest algorithm possible: we compute long segments of orbits with a fixed number of digits. We show that for every $r>1$, the dynamics of the discretizations of a $C^r$ generic conservative diffeomorphism of the torus is very different from that observed in the $C^0$ regularity. The proof of our results involves in particular a localglobal formula for discretizations, as well as a study of the corresponding linear case, which uses ideas from the theory of quasicrystals. 
Certain Abelian varieties bad at only one prime. (arXiv:1510.06249v3 [math.NT] UPDATED) 
Authors: Armand Brumer, Kenneth Kramer An abelian surface $A_{/{\mathbb Q}}$ of prime conductor $N$ is favorable if its 2division field $F$ is an ${\mathcal S}_5$extension with ramification index 5 over ${\mathbb Q}_2$. Let $A$ be favorable and let $B$ be any semistable abelian variety of dimension $2d$ and conductor $N^d$ such that $B[2]$ is filtered by copies of $A[2]$. We give a sufficient class field theoretic criterion on $F$ to guarantee that $B$ is isogenous to $A^d$. As expected from our paramodular conjecture, we conclude that there is one isogeny class of abelian surfaces for each conductor in $\{277, 349,461,797,971\}$. The general applicability of our criterion is discussed in the data section. 
Subdirectly irreducible medial quandles. (arXiv:1511.06529v2 [math.RA] UPDATED) 
Authors: Premysl Jedlicka, Agata Pilitowska, Anna ZamojskaDzienio We present a complete classification of all subdirectly irreducible medial quandles. We show that they fall within one of the four disjoint classes. In particular, in the finite case they are either connected (and therefore an Alexander quandle) or reductive. Moreover, we give an explicit description of all nonconnected subdirectly irreducible medial quandles. 
The pointlike limit for a NLS equation with concentrated nonlinearity in dimension three. (arXiv:1511.06731v2 [mathph] UPDATED) 
Authors: Claudio Cacciapuoti, Domenico Finco, Diego Noja, Alessandro Teta We consider a scaling limit of a nonlinear Schr\"odinger equation (NLS) with a nonlocal nonlinearity showing that it reproduces in the limit of cutoff removal a NLS equation with nonlinearity concentrated at a point. The regularized dynamics is described by the equation \begin{equation*} i\frac{\partial }{\partial t} \psi^\varepsilon(t)= \Delta \psi^\varepsilon(t) + g(\varepsilon,\mu,(\rho^\varepsilon,\psi^\varepsilon(t))^{2\mu}) (\rho^\varepsilon,\psi^\varepsilon(t)) \rho^\varepsilon \end{equation*} where $\rho^{\varepsilon} \to \delta_0$ weakly and the function $g$ embodies the nonlinearity and the scaling and has to be fine tuned in order to have a nontrivial limit dynamics. The limit dynamics is a nonlinear version of point interaction in dimension three and it has been previously studied in several papers as regards the wellposedness, blowup and asymptotic properties of solutions. Our result is the first justification of the model as the point limit of a regularized dynamics. 
Holomorphic curves in exploded manifolds: virtual fundamental class. (arXiv:1512.05823v2 [math.SG] UPDATED) 
Authors: Brett Parker We define GromovWitten invariants of exploded manifolds. The technical heart of this paper is a construction of a virtual fundamental class $[\mathcal K]$ of any Kuranishi category $\mathcal K$ (which is a simplified, more general version of an embedded Kuranishi structure.) We also show how to integrate differential forms over $[\mathcal K]$ to obtain numerical invariants, and push forward differential forms from $\mathcal K$ over suitable evaluation maps. We show that such invariants are independent of any choices, and are compatible with pullbacks, products, and tropical completion of Kuranishi categories. In the case of a compact symplectic manifold, this gives an alternative construction of GromovWitten invariants, including gravitational descendants. 
The Negative Cycle Vectors of Signed Complete Graphs. (arXiv:1512.09087v2 [math.CO] UPDATED) 
Authors: Alex Schaefer A signed graph is a graph where the edges are assigned labels of either "$+$" or "$$". The sign of a cycle in the graph is the product of the signs of its edges. We equip each signed complete graph with a vector whose entries are the number of negative $k$cycles for $k\in\{3,\dots,n\}$. These vectors generate an affine subspace of $\mathbb{R}^{n2}$. We prove that this subspace is all of $\mathbb{R}^{n2}$. 
Improved convergence rates for Lasserretype hierarchies of upper bounds for boxconstrained polynomial optimization. (arXiv:1603.03329v2 [math.OC] UPDATED) 
Authors: Etienne de Klerk, Roxana Hess, Monique Laurent We consider the problem of minimizing a given $n$variate polynomial $f$ over the hypercube $[1,1]^n$. An idea introduced by Lasserre, is to find a probability distribution on $[1,1]^n$ with polynomial density function $h$ (of given degree $r$) that minimizes the expectation $\int_{[1,1]^n} f(x)h(x)d\mu(x)$, where $d\mu(x)$ is a fixed, finite Borel measure supported on $[1,1]^n$. It is known that, for the Lebesgue measure $d\mu(x) = dx$, one may show an error bound $O(1/\sqrt{r})$ if $h$ is a sumofsquares density, and an $O(1/r)$ error bound if $h$ is the density of a beta distribution. In this paper, we show an error bound of $O(1/r^2)$, if $d\mu(x) = \left(\prod_{i=1}^n \sqrt{1x_i^2} \right)^{1}dx$ (the wellknown measure in the study of orthogonal polynomials), and $h$ has a Schm\"udgentype representation with respect to $[1,1]^n$, which is a more general condition than a sum of squares. The convergence rate analysis relies on the theory of polynomial kernels, and in particular on Jackson kernels. We also show that the resulting upper bounds may be computed as generalized eigenvalue problems, as is also the case for sumofsquares densities. 
Stochastic optimal control of McKeanVlasov equations with anticipating law. (arXiv:1604.03582v3 [math.OC] UPDATED) 
Authors: Nacira Agram In this paper, we generalise Pontryagin's stochastic maximum principle to controlled McKeanVlasov equations with anticipating law. The associated new type of delayed backward equations with implicit terminal condition is studied. 
Solutions of quasianalytic equations. (arXiv:1605.01425v2 [math.CV] UPDATED) 
Authors: Andre Belotto da Silva, Iwo Biborski, Edward Bierstone The article develops techniques for solving equations G(x,y)=0, where G(x,y)=G(x_1,...,x_n,y) is a function in a given quasianalytic class (for example, a quasianalytic DenjoyCarleman class, or the class of infinitely differentiable functions definable in a polynomiallybounded ominimal structure). We show that, if G(x,y)=0 has a formal power series solution y=H(x) at some point a, then H is the Taylor expansion at a of a quasianalytic solution y=h(x), where h(x) is allowed to have a certain controlled loss of regularity, depending on G. Several important questions on quasianalytic functions, concerning division, factorization, Weierstrass preparation, etc., fall into the framework of this problem (or are closely related), and are also discussed. 
Wellposed Bayesian inverse problems and heavytailed stable quasiBanach space priors. (arXiv:1605.05898v5 [math.PR] UPDATED) 
Authors: T. J. Sullivan This article extends the framework of Bayesian inverse problems in infinitedimensional parameter spaces, as advocated by Stuart (Acta Numer. 19:451559, 2010) and others, to the case of a heavytailed prior measure in the family of stable distributions, such as an infinitedimensional Cauchy distribution, for which polynomial moments are infinite or undefined. It is shown that analogues of the KarhunenLo\`eve expansion for squareintegrable random variables can be used to sample such measures on quasiBanach spaces. Furthermore, under weaker regularity assumptions than those used to date, the Bayesian posterior measure is shown to depend Lipschitz continuously in the Hellinger metric upon perturbations of the misfit function and observed data. 
A modification of the projective construction of quantum states for field theories. (arXiv:1605.06306v3 [mathph] UPDATED) 
Authors: Jerzy Kijowski, Andrzej Okolow The projective construction of quantum states for field theories may be flawedin some cases the construction may possibly lead to spaces of quantum states which are "too small" to be used in quantization of field theories. Here we present a slight modification of the construction which is free from this flaw. 
Sharp geometric requirements in the Wachspress interpolation error estimate. (arXiv:1606.04975v3 [math.NA] UPDATED) 
Authors: Gabriel Monzón Geometric conditions on general polygons are given in [9] in order to guarantee the error estimate for interpolants built from generalized barycentric coordinates, and the question about identifying sharp geometric restrictions in this setting is proposed. In this work, we address the question when the construction is made by using Wachspress coordinates. We basically show that the imposed conditions: bounded aspect ratio property (barp), maximum angle condition (MAC) and minimum edge length property (melp) are actually equivalent to [MAC,melp], and if any of these conditions is not satisfied, then there is no guarantee that the error estimate is valid. In this sense, MAC and melp can be regarded as sharp geometric requirements in the Wachspress interpolation error estimate. 
Gamblets for opening the complexitybottleneck of implicit schemes for hyperbolic and parabolic ODEs/PDEs with rough coefficients. (arXiv:1606.07686v2 [math.NA] UPDATED) 
Authors: Houman Owhadi, Lei Zhang Implicit schemes are popular methods for the integration of time dependent PDEs such as hyperbolic and parabolic PDEs. However the necessity to solve corresponding linear systems at each time step constitutes a complexity bottleneck in their application to PDEs with rough coefficients. We present a generalization of gamblets introduced in \cite{OwhadiMultigrid:2015} enabling the resolution of these implicit systems in nearlinear complexity and provide rigorous apriori error bounds on the resulting numerical approximations of hyperbolic and parabolic PDEs. These generalized gamblets induce a multiresolution decomposition of the solution space that is adapted to both the underlying (hyperbolic and parabolic) PDE (and the system of ODEs resulting from space discretization) and to the timesteps of the numerical scheme. 
Multiple reductions, foliations and the dynamics of cluster maps. (arXiv:1607.03664v2 [math.SG] UPDATED) 
Authors: Inês Cruz, Helena MenaMatos, M. Esmeralda SousaDias Presymplectic and Poisson reduction of cluster maps are described in terms of the "canonical" foliations of presymplectic and Poisson manifolds. This approach to reduction leads to a geometric description, in terms of foliations, of the dynamics of the original (not reduced) map. The case where multiple reductions exist (presymplectic/Poisson or presymplectic/Poisson/Poisson) is further explored and examples illustrating several features of this approach are presented, including a nontrivial one in dimension seven which is comprehensively treated. 
Poincar\'e series of compressed local Artinian rings with odd top socle degree. (arXiv:1607.05594v2 [math.AC] UPDATED) 
Authors: Andrew R. Kustin, Liana M. Sega, Adela Vraciu We define a notion of compressed local Artinian ring that does not require the ring to contain a field. Let $(R,\mathfrak m)$ be a compressed local Artinian ring with odd top socle degree $s$, at least five, and $\operatorname{socle}(R)\cap \mathfrak m^{s1}=\mathfrak m^s$. We prove that the Poincar\'e series of all finitely generated modules over $R$ are rational, sharing a common denominator, and that there is a Golod homomorphism from a complete intersection onto $R$. 
Hilbert and Thompson isometries on cones in JBalgebras. (arXiv:1609.03473v2 [math.MG] UPDATED) 
Authors: Bas Lemmens, Mark Roelands, Marten Wortel Hilbert's and Thompson's metric spaces on the interior of cones in JBalgebras are important examples of symmetric Finsler spaces. In this paper we characterize the Hilbert's metric isometries on the interiors of cones in JBWalgebras, and the Thompson's metric isometries on the interiors of cones in JBalgebras. These characterizations generalize work by Bosch\'e on the Hilbert and Thompson isometries on symmetric cones, and work by Hatori and Moln\'ar on the Thompson isometries on the cone of positive selfadjoint elements in a unital $C^*$algebra. To obtain the results we develop a variety of new geometric and Jordan algebraic techniques. 
Inner product formula for Yoshida lifts. (arXiv:1609.07669v2 [math.NT] UPDATED) 
Authors: MingLun Hsieh, Kenichi Namikawa We prove an explicit inner product formula for vectorvalued Yoshida lifts. As a consequence, we obtain the nonvanishing of Yoshida lifts. 
Energy conservation in the 3D Euler equations on $\mathbb{T}^2\times \mathbb{R}_+$. (arXiv:1611.00181v2 [math.AP] UPDATED) 
Authors: James C. Robinson, José L. Rodrigo, Jack W.D. Skipper The aim of this paper is to prove energy conservation for the incompressible Euler equations in a domain with boundary. We work in the domain $\mathbb{T}^2\times\mathbb{R}_+$, where the boundary is both flat and has finite measure. However, first we study the equations on domains without boundary (the whole space $\mathbb{R}^3$, the torus $\mathbb{T}^3$, and the hybrid space $\mathbb{T}^2\times\mathbb{R}$). We make use of some of the arguments of Duchon \& Robert ({\it Nonlinearity} {\bf 13} (2000) 249255) to prove energy conservation under the assumption that $u\in L^3(0,T;L^3(\mathbb{R}^3))$ and one of the two integral conditions \begin{equation*} \lim_{y\to 0}\frac{1}{y}\int^T_0\int_{\mathbb{R}^3} u(x+y)u(x)^3\,d x\,d t=0 \end{equation*} or \begin{equation*} \int_0^T\int_{\mathbb{R}^3}\int_{\mathbb{R}^3}\frac{u(x)u(y)^3}{xy^{4+\delta}}\,d x\,d y<\infty,\qquad\delta>0, \end{equation*} the second of which is equivalent to requiring $u\in L^3(0,T;W^{\alpha,3}(\mathbb{R}^3))$ for some $\alpha>1/3$. We then use the first of these two conditions to prove energy conservation for a weak solution $u$ on $D_+:=\mathbb{T}^2\times \mathbb{R}_+$: we extend $u$ a solution defined on the whole of $\mathbb{T}^2\times\mathbb{R}$ and then use the condition on this domain to prove energy conservation for a weak solution $u\in L^3(0,T;L^3(D_+))$ that satisfies \begin{equation*} \lim_{y\to 0} \frac{1}{y}\int^{T}_{0}\iint_{\mathbb{T}^2}\int^\infty_{y}u(t,x+y)u(t,x)^3 \,d x_3 \,d x_1 \,d x_2 \,d t=0, \end{equation*} and certain continuity conditions near the boundary $\partial D_+=\{x_3=0\}$. 
Local control on the geometry in 3D Ricci flow. (arXiv:1611.06137v2 [math.DG] UPDATED) 
Authors: Miles Simon, Peter M. Topping The geometry of a ball within a Riemannian manifold is coarsely controlled if it has a lower bound on its Ricci curvature and a positive lower bound on its volume. We prove that such coarse local geometric control must persist for a definite amount of time under threedimensional Ricci flow, and leads to local C/t decay of the full curvature tensor, irrespective of what is happening beyond the local region. As a byproduct, our results generalise the Pseudolocality theorem of Perelman and TianWang in this dimension by not requiring the Ricci curvature to be almostpositive, and not asking the volume growth to be almostEuclidean. 
Spin Chains and Gustafson's Integrals. (arXiv:1611.09593v2 [mathph] UPDATED) 
Authors: S.E. Derkachov, A.N. Manashov Gustafson's integrals are multidimensional generalizations of the classical MellinBarnes integrals. We show that some of these integrals arise from relations between matrix elements in Sklyanin's representation of Separated Variables in spin chain models. We also present several new integrals. 
Compressive Sensing for Millimeter Wave Antenna Array Diagnosis. (arXiv:1612.06345v3 [cs.IT] UPDATED) 
Authors: Mohammed E. Eltayeb, Tareq Y. AlNaffouri, Robert W. Heath Jr The radiation pattern of an antenna array depends on the excitation weights and the geometry of the array. Due to wind and atmospheric conditions, outdoor millimeter wave antenna elements are subject to full or partial blockages from a plethora of particles like dirt, salt, ice, and water droplets. Handheld devices are also subject to blockages from random finger placement and/or finger prints. These blockages cause absorption and scattering to the signal incident on the array, and change the array geometry. This distorts the farfield radiation pattern of the array leading to an increase in the sidelobe level and decrease in gain. This paper studies the effects of blockages on the farfield radiation pattern of linear arrays and proposes two array diagnosis techniques for millimeter wave antenna arrays. The proposed techniques jointly estimate the locations of the blocked antennas and the induced attenuation and phase shifts. Numerical results show that the proposed techniques provide satisfactory results in terms of fault detection with reduced number of measurements (diagnosis time) provided that the number of blockages is small compared to the array size. 
Spectra of large timelagged correlation matrices from Random Matrix Theory. (arXiv:1612.06552v2 [mathph] UPDATED) 
Authors: Maciej A. Nowak, Wojciech Tarnowski We analyze the spectral properties of large, timelagged correlation matrices using the tools of random matrix theory. We compare predictions of the onedimensional spectra, based on approaches already proposed in the literature. Employing the methods of free random variables and diagrammatic techniques, we solve a general random matrix problem, namely the spectrum of a matrix $\frac{1}{T}XAX^{\dagger}$, where $X$ is an $N\times T$ Gaussian random matrix and $A$ is \textit{any} $T\times T$, not necessarily symmetric (Hermitian) matrix. As a particular application, we present the spectral features of the large lagged correlation matrices as a function of the depth of the timelag. We also analyze the properties of left and right eigenvector correlations for the timelagged matrices. We positively verify our results by the numerical simulations. 
Brouwer and Cardinalities. (arXiv:1612.06606v2 [math.LO] UPDATED) 
Authors: Klaas Pieter Hart This paper discusses a paper by L. E. J. Brouwer on possible cardinalities of subsets of the continuum. 
YangBaxter deformations of $W_{2,4}\times T^{1,1}$ and the associated Tdual models. (arXiv:1612.08615v4 [hepth] UPDATED) 
Authors: Junichi Sakamoto, Kentaroh Yoshida Recently, for principal chiral models and symmetric coset sigma models, Hoare and Tseytlin proposed an interesting conjecture that the YangBaxter deformations with the homogeneous classical YangBaxter equation are equivalent to nonabelian Tdualities with topological terms. It is significant to examine this conjecture for nonsymmetric (i.e., nonintegrable) cases. Such an example is the $W_{2,4}\times T^{1,1}$ background. In this note, we study YangBaxter deformations of type IIB string theory defined on $W_{2,4}\times T^{1,1}$ and the associated Tdual models, and show that this conjecture is valid even for this case. Our result indicates that the conjecture would be valid beyond integrability. 
Birational geometry of foliations associated to simple derivations. (arXiv:1701.00790v2 [math.AG] UPDATED) 
Authors: Gael Cousin, Luis Gustavo Mendes, Ivan Pan We propose a study of the foliations of the projective plane induced by simple derivations of the polynomial ring in two indeterminates over the complex field. These correspond to foliations which have no invariant algebraic curve nor singularities in the complement of a line. We establish the position of these foliations in the birational classification of foliations and prove the finiteness of their birational symmetries. Most of the results apply to wider classes of foliations. 
On the nth row of the graded Betti table of an ndimensional toric variety. (arXiv:1701.01393v4 [math.AC] UPDATED) 
Authors: Alexander Lemmens We prove an explicit formula for the first nonzero entry in the nth row of the graded Betti table of an ndimensional projective toric variety associated to a normal polytope with at least one interior lattice point. This applies to Veronese embeddings of projective space where we prove a special case of a conjecture of Ein and Lazarsfeld. We also prove an explicit formula for the entire nth row when the interior of the polytope is onedimensional. All results are valid over an arbitrary field k. 
The independent set sequence of some families of trees. (arXiv:1701.02204v3 [math.CO] UPDATED) 
Authors: David Galvin, Justin Hilyard For a tree $T$, let $i_T(t)$ be the number of independent sets of size $t$ in $T$. It is an open question, raised by Alavi, Malde, Schwenk and Erd\H{o}s, whether the sequence $(i_T(t))_{t \geq 0}$ is always unimodal. Here we answer the question in the affirmative for some recursively defined families of trees, specifically paths with auxiliary trees dropped from the vertices in a periodic manner. In particular, extending a result of Wang and B.X. Zhu, we show unimodality of the independent set sequence of a path on $2n$ vertices with $\ell_1$ and $\ell_2$ pendant edges dropped alternately from the vertices of the path, $\ell_1, \ell_2$ arbitrary. We also show that the independent set sequence of any tree becomes unimodal if sufficiently many pendant edges are dropped from any single vertex, or if $k$ pendant edges are dropped from every vertex, for sufficiently large $k$. This in particular implies the unimodality of the independent set sequence of some nonperiodic caterpillars. 
Crossconnections of linear transformation semigroup. (arXiv:1701.06098v3 [math.RA] UPDATED) 
Authors: P. A. Azeef Muhammed Crossconnection theory developed by Nambooripad is the construction of a semigroup from its principal left (right) ideals using categories. We briefly describe the general crossconnection theory for regular semigroups and use it to study the {normal categories} arising from the semigroup $Sing(V)$ of singular linear transformations on an arbitrary vectorspace $V$ over a field $K$. There is an inbuilt notion of duality in the crossconnection theory, and we observe that it coincides with the conventional algebraic duality of vector spaces. We describe various crossconnections between these categories and show that although there are many crossconnections, upto isomorphism, we have only one semigroup arising from these categories. But if we restrict the categories suitably, we can construct some interesting subsemigroups of the {variant} of the linear transformation semigroup. 
Characterizations of idempotent discrete uninorms. (arXiv:1701.07253v2 [math.RA] UPDATED) 
Authors: Miguel Couceiro, Jimmy Devillet, JeanLuc Marichal In this paper we provide an axiomatic characterization of the idempotent discrete uninorms by means of three conditions only: conservativeness, symmetry, and nondecreasing monotonicity. We also provide an alternative characterization involving the bisymmetry property. Finally, we provide a graphical characterization of these operations in terms of their contour plots, and we mention a few open questions for further research. 
On highorder conservative finite element methods. (arXiv:1701.08855v2 [math.NA] UPDATED) 
Authors: Eduardo Abreu, Ciro Diaz, Juan Galvis, Marcus Sarkis A new highorder conservative finite element method for Darcy flow is presented. The key ingredient in the formulation is a volumetric, residualbased, based on Lagrange multipliers in order to impose conservation of mass that does not involve any mesh dependent parameters. We obtain a method with highorder convergence properties with locally conservative fluxes. Furthermore, our approach can be straightforwardly extended to three dimensions. It is also applicable to highly heterogeneous problems where highorder approximation is preferred. 
On a model of associative memory with huge storage capacity. (arXiv:1702.01929v2 [math.PR] UPDATED) 
Authors: Mete Demircigil, Judith Heusel, Matthias Löwe, Sven Upgang, Franck Vermet In [7] Krotov and Hopfield suggest a generalized version of the wellknown Hopfield model of associative memory. In their version they consider a polynomial interaction function and claim that this increases the storage capacity of the model. We prove this claim and take the "limit" as the degree of the polynomial becomes infinite, i.e. an exponential interaction function. With this interaction we prove that model has an exponential storage capacity in the number of neurons, yet the basins of attraction are almost as large as in the standard Hopfield model. 
Equivariant Morse theory for the normsquare of a moment map on a variety. (arXiv:1702.05223v2 [math.SG] UPDATED) 
Authors: Graeme Wilkin We show that the main theorem of Morse theory holds for a large class of functions on singular spaces. The function must satisfy certain conditions extending the usual requirements on a manifold that Condition C holds and the gradient flow around the critical sets is wellbehaved, and the singular space must satisfy a local deformation retract condition. We then show that these conditions are satisfied when the function is the normsquare of a moment map on an affine variety, and that the homotopy equivalence from this theorem is equivariant with respect to the associated Hamiltonian group action. An important special case of these results is that the main theorem of Morse theory holds for the norm square of a moment map on the space of representations of a finite quiver with relations. 
Massive MIMO Pilot Decontamination and Channel Interpolation via Wideband Sparse Channel Estimation. (arXiv:1702.07207v2 [cs.IT] UPDATED) 
Authors: Saeid Haghighatshoar, Giuseppe Caire We consider a massive MIMO system based on Time Division Duplexing (TDD) and channel reciprocity, where the base stations (BSs) learn the channel vectors of their users via the pilots transmitted by the users in the uplink (UL). It is wellknown that, in the limit of very large number of BS antennas, the system performance is limited by pilot contamination, due to the fact that the same set of orthogonal pilots is reused in multiple cells. In this paper, we propose a lowcomplexity algorithm that uses the received UL wideband pilot snapshots in an observation window comprising several coherence blocks (CBs) to obtain an estimate of the angledelay Power Spread Function (PSF) of the received signal. This is generally given by the sum of the angledelay PSF of the desired user and the angledelay PSFs of the copilot users (CPUs), i.e., the users reusing the same pilot dimensions in other cells/sectors. We propose supervised and unsupervised clustering algorithms to decompose the estimated PSF and isolate the part corresponding to the desired user only. We use this decomposition to obtain an estimate of the covariance matrix of the user wideband channel vector, which we exploit to decontaminate the desired user channel estimate by applying Minimum Mean Squared Error (MMSE) smoothing filter, i.e., the optimal channel interpolator in the MMSE sense. We also propose an effective lowcomplexity approximation/implementation of this smoothing filter. We use numerical simulations to assess the performance of our proposed method, and compare it with other recently proposed schemes that use the same idea of separability of users in the angledelay domain. 
Algorithmic Chaining and the Role of Partial Feedback in Online Nonparametric Learning. (arXiv:1702.08211v2 [stat.ML] UPDATED) 
Authors: Nicolò CesaBianchi, Pierre Gaillard (SIERRA), Claudio Gentile, Sébastien Gerchinovitz (IMT) We investigate contextual online learning with nonparametric (Lipschitz) comparison classes under different assumptions on losses and feedback information. For full information feedback and Lipschitz losses, we design the first explicit algorithm achieving the minimax regret rate (up to log factors). In a partial feedback model motivated by secondprice auctions, we obtain algorithms for Lipschitz and semiLipschitz losses with regret bounds improving on the known bounds for standard bandit feedback. Our analysis combines novel results for contextual secondprice auctions with a novel algorithmic approach based on chaining. When the context space is Euclidean, our chaining approach is efficient and delivers an even better regret bound. 
An Optimization Framework with Flexible Inexact Inner Iterations for Nonconvex and Nonsmooth Programming. (arXiv:1702.08627v3 [cs.CV] UPDATED) 
Authors: Yiyang Wang, Risheng Liu, Xiaoliang Song, Zhixun Su In recent years, numerous vision and learning tasks have been (re)formulated as nonconvex and nonsmooth programmings(NNPs). Although some algorithms have been proposed for particular problems, designing fast and flexible optimization schemes with theoretical guarantee is a challenging task for general NNPs. It has been investigated that performing inexact inner iterations often benefit to special applications case by case, but their convergence behaviors are still unclear. Motivated by these practical experiences, this paper designs a novel algorithmic framework, named inexact proximal alternating direction method (IPAD) for solving general NNPs. We demonstrate that any numerical algorithms can be incorporated into IPAD for solving subproblems and the convergence of the resulting hybrid schemes can be consistently guaranteed by a series of simple error conditions. Beyond the guarantee in theory, numerical experiments on both synthesized and realworld data further demonstrate the superiority and flexibility of our IPAD framework for practical use. 
Crossconnections and variants of the full transformation semigroup. (arXiv:1703.04139v2 [math.GR] UPDATED) 
Authors: P. A. Azeef Muhammed Crossconnection theory propounded by K. S. S. Nambooripad describes the ideal structure of a regular semigroup using the categories of principal left (right) ideals. A variant $\mathscr{T}_X^\theta$ of the full transformation semigroup $(\mathscr{T}_X,\cdot)$ for an arbitrary $\theta \in \mathscr{T}_X$ is the semigroup $\mathscr{T}_X^\theta= (\mathscr{T}_X,\ast)$ with the binary operation $\alpha \ast \beta = \alpha\cdot\theta\cdot\beta$ where $\alpha, \beta \in \mathscr{T}_X$. In this article, we describe the ideal structure of the regular part $Reg(\mathscr{T}_X^\theta)$ of the variant of the full transformation semigroup using crossconnections. We characterize the constituent categories of $Reg(\mathscr{T}_X^\theta)$ and describe how they are \emph{crossconnected} by a functor induced by the sandwich transformation $\theta$. This lead us to a structure theorem for the semigroup and give the representation of $Reg(\mathscr{T}_X^\theta)$ as a crossconnection semigroup. Using this, we give a description of the biordered set and the sandwich sets of the semigroup. 
ShiftCoupling of Random Rooted Graphs and Networks. (arXiv:1703.06619v3 [math.PR] UPDATED) 
Authors: Ali Khezeli In this paper, we present a result similar to the shiftcoupling result of Thorisson (1996) in the context of random graphs and networks. The result is that a given random rooted network can be obtained by changing the root of another given one if and only if the distributions of the two agree on the invariant sigmafield. Several applications of the result are presented for the case of unimodular networks. In particular, it is shown that the distribution of a unimodular network is uniquely determined by its restriction to the invariant sigmafiled. Also, the theorem is applied to the existence of an invariant transport kernel that balances between two given (discrete) measures on the vertices. An application is the existence of a so called extra head scheme for the Bernoulli process on an infinite unimodular graph. Moreover, a construction is presented for balancing transport kernels that is a generalization of the GaleShapley stable matching algorithm in bipartite graphs. Another application is on a general method that covers the situations where some vertices and edges are added to a unimodular network and then, to make it unimodular, the probability measure is biased and then a new root is selected. It is proved that this method provides all possible unimodularizations in these situations. Finally, analogous existing results for stationary point processes and unimodular networks are discussed in detail. 
On the stabilized symplectic embedding problem for ellipsoids. (arXiv:1703.07838v2 [math.SG] UPDATED) 
Authors: Dusa McDuff This note constructs sharp obstructions for stabilized symplectic embeddings of an ellipsoid into a ball, in the case when the initial fourdimensional ellipsoid has `eccentricity' of the form 3n1 for some integer n. 
Superintegrable models on riemannian surfaces of revolution with integrals of any integer degree (I). (arXiv:1703.10870v2 [mathph] UPDATED) 
Authors: Valent Galliano We present a family of superintegrable (SI) sytems living on a riemannian surface of revolution and which exhibits one linear integral and two integrals of any integer degree larger or equal to 2 in the momenta. When this degree is 2 one recovers a metric due to Koenigs. The local structure of these systems is under control of a linear ordinary differential equation of order n which is homogeneous for even integrals and weakly inhomogeneous for odd integrals. The form of the integrals is explicitly given in the socalled simple case (see definition 2). Some globally defined examples are worked out which live either in H2 or in R2. 
Common framework and quadratic Bethe equations for rational Gaudin magnets in arbitrarily oriented magnetic fields. (arXiv:1704.01873v2 [mathph] UPDATED) 
Authors: Alexandre Faribault, Hugo Tschirhart In this work we demonstrate a simple way to implement the quantum inverse scattering method to find eigenstates of spin1/2 XXX Gaudin magnets in an arbitrarily oriented magnetic field. The procedure differs vastly from the most natural approach which would be to simply orient the spin quantisation axis in the same direction as the magnetic field through an appropriate rotation. Instead, we define a modified realisation of the rational Gaudin algebra and use the quantum inverse scattering method which allows us, within a slightly modified implementation, to build an algebraic Bethe ansatz using the same unrotated reference state (pseudovacuum) for any external field. This common framework allows us to easily write determinant expressions for certain scalar products which would be highly nontrivial in the rotated system approach. 
Upper estimates of Christoffel function on convex domains. (arXiv:1704.03025v2 [math.CA] UPDATED) 
Authors: A. Prymak New upper bounds on the pointwise behaviour of Christoffel function on convex domains in ${\mathbb{R}}^d$ are obtained. These estimates are established by explicitly constructing the corresponding "needle"like algebraic polynomials having small integral norm on the domain, and are stated in terms of few easytomeasure geometric characteristics of the location of the point of interest in the domain. Sharpness of the results is shown and examples of applications are given. 
Limited range multilinear extrapolation with applications to the bilinear Hilbert transform. (arXiv:1704.06833v2 [math.CA] UPDATED) 
Authors: David CruzUribe, José María Martell We prove a limited range, offdiagonal extrapolation theorem that generalizes a number of results in the theory of Rubio de Francia extrapolation, and use this to prove a limited range, multilinear extrapolation theorem. We give two applications of this result to the bilinear Hilbert transform. First, we give sufficient conditions on a pair of weights $w_1,\,w_2$ for the bilinear Hilbert transform to satisfy weighted norm inequalities of the form \[ BH : L^{p_1}(w_1^{p_1}) \times L^{p_2}(w_2^{p_2}) \longrightarrow L^p(w^p), \] where $w=w_1w_2$ and $\frac{1}{p}=\frac{1}{p_1}+\frac{1}{p_2}<\frac{3}{2}$. This improves the recent results of Culiuc et al. by increasing the families of weights for which this inequality holds and by pushing the lower bound on $p$ from $1$ down to $\frac{2}{3}$, the critical index from the unweighted theory of the bilinear Hilbert transform. Second, as an easy consequence of our method we obtain that the bilinear Hilbert transform satisfies some vectorvalued inequalities with Muckenhoupt weights. This reproves and generalizes some of the vectorvalued estimates obtained by Benea and Muscalu in the unweighted case. We also generalize recent results of Carando, et al. on MarcinkiewiczZygmund estimates for multilinear Calder\'onZygmund operators. 
Singular MASAs in type III factors and Connes' Bicentralizer Property. (arXiv:1704.07255v3 [math.OA] UPDATED) 
Authors: Cyril Houdayer, Sorin Popa We show that any type ${\rm III_1}$ factor with separable predual satisfying Connes' Bicentralizer Property (CBP) has a singular maximal abelian $\ast$subalgebra that is the range of a normal conditional expectation. We also investigate stability properties of CBP under finite index extensions/restrictions of type ${\rm III_1}$ factors. 
On the existence of 4regular matchstick graphs. (arXiv:1705.00293v2 [math.CO] UPDATED) 
Authors: Mike Winkler, Peter Dinkelacker, Stefan Vogel A matchstick graph is a planar unitdistance graph. That is a graph drawn with straight edges in the plane such that the edges have unit length, and nonadjacent edges do not intersect. We call a matchstick graph 4regular if every vertex has only degree 4. Examples of 4regular matchstick graphs with less than 63 vertices are only known for 52, 54, 57 and 60 vertices. It is shown that for all number of vertices $\geq63$ at least one example of a 4regular matchstick graph exists. 
Stable Architectures for Deep Neural Networks. (arXiv:1705.03341v2 [cs.LG] UPDATED) 
Authors: Eldad Haber, Lars Ruthotto Deep neural networks have become invaluable tools for supervised machine learning, e.g., classification of text or images. While often offering superior results over traditional techniques and successfully expressing complicated patterns in data, deep architectures are known to be challenging to design and train such that they generalize well to new data. Important issues with deep architectures are numerical instabilities in derivativebased learning algorithms commonly called exploding or vanishing gradients. In this paper we propose new forward propagation techniques inspired by systems of Ordinary Differential Equations (ODE) that overcome this challenge and lead to wellposed learning problems for arbitrarily deep networks. The backbone of our approach is our interpretation of deep learning as a parameter estimation problem of nonlinear dynamical systems. Given this formulation, we analyze stability and wellposedness of deep learning and use this new understanding to develop new network architectures. We relate the exploding and vanishing gradient phenomenon to the stability of the discrete ODE and present several strategies for stabilizing deep learning for very deep networks. While our new architectures restrict the solution space, several numerical experiments show their competitiveness with stateoftheart networks. 
A cyclic cocycle and relative index theorems on partitioned manifolds. (arXiv:1705.03732v2 [math.DG] UPDATED) 
Authors: Tatsuki Seto In this paper, we extend Roe's cyclic $1$cocycle to relative settings. We also prove two relative index theorems for partitioned manifolds by using its cyclic cocycle, which are generalizations of index theorems on partitioned manifolds. One of these theorems is a variant of [M. KaramiA.H.S. SadeghM.E. Zadeh, arXiv:1411.6090, Theorem 3.3]. 
Semiequivelar maps on the torus are Archimedean. (arXiv:1705.05236v2 [math.CO] UPDATED) 
Authors: Basudeb Datta, Dipendu Maity If the facecycles at all the vertices in a map on a surface are of same type then the map is called semiequivelar. There are eleven types of Archimedean tilings on the plane. All the Archimedean tilings are semiequivelar maps. If a map $X$ on the torus is a quotient of an Archimedean tiling on the plane then the map $X$ is semiequivelar. We show that each semiequivelar map on the torus is a quotient of an Archimedean tiling on the plane. Vertextransitive maps are semiequivelar maps. We know that four types of semiequivelar maps on the torus are always vertextransitive and there are examples of other seven types of semiequivelar maps which are not vertextransitive. We show that the number of ${\rm Aut}(Y)$orbits of vertices for any semiequivelar map $Y$ on the torus is at most six. In fact, the number of orbits is at most three except one type of semiequivelar maps. Our bounds on the number of orbits are sharp. 
Partitions into thin sets or forgotten theorems of Kunugi and LusinNovikov. (arXiv:1705.06194v3 [math.HO] UPDATED) 
Authors: Edward Grzegorek, Iwo Labuda Let $f$ be a function from a metric space $Y$ to a separable metric space $X$. If $f$ has the Baire property, then it is continuous apart a 1st category set. In 1935, Kuratowski asked whether the separability requirement could be lifted. A full scale attack on the problem took place in the late seventies and early eighties. What was not known then, and what remains virtually unknown today, is the fact that the first impressive attempt to solve the Kuratowski problem, due to Kinjiro Kunugi and based on a theorem of Lusin and Novikov, took place already in 1936. Lusin's remarkable 1934 Comptes Rendus note soon forgotten, remained unnoticed to this day. We analyze both papers and bring the results to full light. 
On the Whittaker Plancherel Theorem for Real Reductive Groups. (arXiv:1705.06787v2 [math.RT] UPDATED) 
Authors: Nolan R. Wallach Van den Ban and Kuit have found a serious error in a key lemma in the proof of the Whittaker Plancherel theorem. One purpose of this article is to fix the aspects of the proof of the theorem that are affected by the error, thereby giving the first full proof of the theorem. The other is to give an exposition of the structure of proof of the Whittaker Plancherel theorem and, thereby, of the proof of HarishChandra Plancherel theorem. 
Selfinjective cellular algebras of polynomial growth representation type. (arXiv:1705.08048v2 [math.RT] UPDATED) 
Authors: Susumu Ariki, Ryoichi Kase, Kengo Miyamoto, Kentaro Wada We classify Morita equivalence classes of indecomposable selfinjective cellular algebras which have polynomial growth representation type, assuming that the base field has an odd characteristic. This assumption on the characteristic is for the cellularity to be a Morita invariant property. 
Convolution estimates and the number of disjoint partitions. (arXiv:1705.08529v2 [math.AP] UPDATED) 
Authors: Paata Ivanisvili Let $X$ be a finite collection of sets. We count the number of ways a disjoint union of $n1$ subsets in $X$ is a set in $X$, and estimate this number from above by $X^{c(n)}$ where $$ c(n)=\left(1\frac{(n1)\ln (n1)}{n\ln n} \right)^{1}. $$ This extends the recent result of KaneTao, corresponding to the case $n=3$ where $c(3)\approx 1.725$, to an arbitrary finite number of disjoint $n1$ partitions. 
Stopping time convergence for processes associated with Dirichlet forms. (arXiv:1705.09876v2 [math.PR] UPDATED) 
Authors: J.R. Baxter, M. Nielsen Hernandez Convergence is proved for solutions of Dirichlet problems in regions with many small excluded sets (holes), as the holes become smaller and more numerous. The problem is formulated in the context of Markov processes associated with general Dirichlet forms, for random and nonrandom excluded sets. Sufficient conditions are given under which the sequence of entrance times or hitting times of the excluded sets converges in the stable topology. Convergence in the stable topology is a strengthened form of convergence in distribution, introduced by Renyi. Stable convergence of the entrance times implies convergence of the solutions of the corresponding Dirichlet problems. Some additional results are given in a supplement on random center models. 
Local Large Deviations: McMillian Theorem for multitype GaltonWatson Processes. (arXiv:1705.09967v2 [cs.IT] UPDATED) 
Authors: Kwabena DokuAmponsah In this article we prove a local large deviation principle (LLDP) for the critical multitype GaltonWatson process from spectral potential point. We define the socalled a spectral potential $U_{\skrik}(\,\cdot,\,\pi)$ for the GaltonWatson process, where $\pi$ is the normalized eigen vector corresponding to the leading \emph{PerronFrobenius eigen value } $\1$ of the transition matrix $\skria(\cdot,\,\cdot)$ defined from ${\skrik},$ the transition kernel. We show that the Kullback action or the deviation function, $J(\pi,\rho),$ with respect to an empirical offspring measure, $\rho,$ is the Legendre dual of $U_{\skrik}(\,\cdot,\,\pi).$ From the LLDP we deduce a conditional large deviation principle and a weak variant of the classical McMillian Theorem for the multitype GaltonWatson process. To be specific, given any empirical offspring measure $\varpi,$ we show that the number of critical multitype GaltonWatson processes on $n$ vertices is approximately $e^{n\langle \skrih_{\varpi},\,\pi\rangle},$ where $\skrih_{\varpi}$ is a suitably defined entropy. 
Categorically closed topological groups. (arXiv:1705.10127v7 [math.GN] UPDATED) 
Authors: Taras Banakh Let $\mathcal C$ be a subcategory of the category of topologized semigroups and their partial continuous homomorphisms. An object $X$ of the category ${\mathcal C}$ is called ${\mathcal C}$closed if for each morphism $f:X\to Y$ of the category ${\mathcal C}$ the image $f(X)$ is closed in $Y$. In the paper we detect topological groups which are $\mathcal C$closed for the categories $\mathcal C$ whose objects are Hausdorff topological (semi)groups and whose morphisms are isomorphic topological embeddings, injective continuous homomorphisms, continuous homomorphisms, or partial continuous homomorphisms with closed domain. 
General Bounds for Incremental Maximization. (arXiv:1705.10253v2 [cs.DM] UPDATED) 
Authors: Aaron Bernstein, Yann Disser, Martin Groß We propose a theoretical framework to capture incremental solutions to cardinality constrained maximization problems. The defining characteristic of our framework is that the cardinality/support of the solution is bounded by a value $k\in\mathbb{N}$ that grows over time, and we allow the solution to be extended one element at a time. We investigate the bestpossible competitive ratio of such an incremental solution, i.e., the worst ratio over all $k$ between the incremental solution after $k$ steps and an optimum solution of cardinality $k$. We define a large class of problems that contains many important cardinality constrained maximization problems like maximum matching, knapsack, and packing/covering problems. We provide a general $2.618$competitive incremental algorithm for this class of problems, and show that no algorithm can have competitive ratio below $2.18$ in general. In the second part of the paper, we focus on the inherently incremental greedy algorithm that increases the objective value as much as possible in each step. This algorithm is known to be $1.58$competitive for submodular objective functions, but it has unbounded competitive ratio for the class of incremental problems mentioned above. We define a relaxed submodularity condition for the objective function, capturing problems like maximum (weighted) ($b$)matching and a variant of the maximum flow problem. We show that the greedy algorithm has competitive ratio (exactly) $2.313$ for the class of problems that satisfy this relaxed submodularity condition. Note that our upper bounds on the competitive ratios translate to approximation ratios for the underlying cardinality constrained problems. 
On the set of principal congruences in a distributive congruence lattice of an algebra. (arXiv:1705.10833v3 [math.RA] UPDATED) 
Authors: Gábor Czédli Let $Q$ be a subset of a finite distributive lattice $D$. An algebra $A$ represents the inclusion $Q\subseteq D$ by principal congruences if the congruence lattice of $A$ is isomorphic to $D$ and the ordered set of principal congruences of $A$ corresponds to $Q$ under this isomorphism. If there is such an algebra for every subset $Q$ containing $0$, $1$, and all joinirreducible elements of $D$, then $D$ is said to be fully (A1)representable. We prove that every fully (A1)representable finite distributive lattice is planar and it has at most one joinreducible coatom. Conversely, we prove that every finite planar distributive lattice with at most one joinreducible coatom is fully chainrepresentable in the sense of a recent paper of G. Gr\"atzer. Combining the results of this paper with another paper by the present author, it follows that every fully (A1)representable finite distributive lattice is "fully representable" even by principal congruences of finite lattices. Finally, we prove that every chainrepresentable inclusion $Q\subseteq D$ can be represented by the principal congruences of a finite (and quite small) algebra. 
Optimality conditions for minimizers at infinity in polynomial programming. (arXiv:1706.00234v2 [math.OC] UPDATED) 
Authors: TienSon Pham In this paper we study necessary optimality conditions for the optimization problem $$\textrm{infimum}f_0(x) \quad \textrm{ subject to } \quad x \in S,$$ where $f_0 \colon \mathbb{R}^n \rightarrow \mathbb{R}$ is a polynomial function and $S \subset \mathbb{R}^n$ is a set defined by polynomial inequalities. Assume that the problem is bounded below and has the MangasarianFromovitz property at infinity. We first show that if the problem does {\em not} have an optimal solution, then a version at infinity of the FritzJohn optimality conditions holds. From this we derive a version at infinity of the KarushKuhnTucker optimality conditions. As applications, we obtain a FrankWolfe type theorem which states that the optimal solution set of the problem is nonempty provided the objective function $f_0$ is convenient. Finally, in the unconstrained case, we show that the optimal value of the problem is the smallest critical value of some polynomial. All the results are presented in terms of the Newton polyhedra of the polynomials defining the problem. 
Algebras of generalised dihedral type. (arXiv:1706.00688v2 [math.RT] UPDATED) 
Authors: Karin Erdmann, Andrzej Skowroński We provide a complete classification of all algebras of generalised dihedral type. These are natural generalisations of algebras which occurred in the study of blocks with dihedral defect groups. We prove that these algebras are (up to socle equivalence) idempotent algebras of the biserial weighted surface algebras of triangulated surfaces with arbitrarily oriented triangles. 
An HMMELLAM scheme on generic polygonal meshes for miscible incompressible flows in porous media. (arXiv:1706.02452v2 [math.NA] UPDATED) 
Authors: Hanz Martin Cheng, Jerome Droniou We design a numerical approximation of a system of partial differential equations modelling the miscible displacement of a fluid by another in a porous medium. The advective part of the system is discretised using a characteristic method, and the diffusive parts by a finite volume method. The scheme is applicabile on generic (possibly nonconforming) meshes as encountered in applications. The main features of our work are the reconstruction of a Darcy velocity, from the discrete pressure fluxes, that enjoys a local consistency property, an analysis of implementation issues faced when tracking, via the characteristic method, distorted cells, and a new treatment of cells near the injection well that accounts better for the conservativity of the injected fluid. 
The DiracFrenkel Principle for Reduced Density Matrices, and the BogoliubovdeGennes Equations. (arXiv:1706.03082v2 [mathph] UPDATED) 
Authors: Niels Benedikter, Jérémy Sok, Jan Philip Solovej The derivation of effective evolution equations is central to the study of nonstationary quantum manybody sytems, and widely used in contexts such as superconductivity, nuclear physics, BoseEinstein condensation and quantum chemistry. We reformulate the DiracFrenkel approximation principle in terms of reduced density matrices, and apply it to fermionic and bosonic manybody systems. We obtain the BogoliubovdeGennes and HartreeFockBogoliubov equations, respectively. While we do not prove quantitative error estimates, our formulation does show that the approximation is optimal within the class of quasifree states. Furthermore, we prove wellposedness of the BogoliubovdeGennes equations in energy space and discuss conserved quantities. 
Calder\'ontype inequalities for affine frames. (arXiv:1706.06518v2 [math.FA] UPDATED) 
Authors: Davide Barbieri, Eugenio Hernández, Azita Mayeli We prove sharp upper and lower bounds for generalized Calder\'on's sums associated to frames on LCA groups generated by affine actions of cocompact subgroup translations and general measurable families of automorphisms. The proof makes use of techniques of analysis on metric spaces, and relies on a counting estimate of lattice points inside metric balls. We will deduce as special cases Calder\'ontype inequalities for families of expanding automorphisms as well as for LCAGabor systems. 
The gonality of complete intersection curves. (arXiv:1706.08169v2 [math.AG] UPDATED) 
Authors: James Hotchkiss, Brooke Ullery We show that for a general complete intersection curve $C$ in projective space (other than a few exceptions), any branched covering $C \to \mathbb{P}^1$ of minimum degree is obtained by projection from a linear space. We also prove a special case of one of the wellknown CayleyBacharach conjectures due to Eisenbud, Green, and Harris. 
Stability and Robust Regulation of Passive Linear Systems. (arXiv:1706.03224v1 [math.OC] CROSS LISTED) 
Authors: Lassi Paunonen We study the stability of coupled impedance passive regular linear systems under powerpreserving interconnections. We present new conditions for strong, exponential, and nonuniform stability of the closedloop system. We apply the stability results to the construction of passive error feedback controllers for robust output tracking and disturbance rejection for strongly stabilizable passive systems. In the case of nonsmooth reference and disturbance signals we present conditions for nonuniform rational and logarithmic rates of convergence of the output. The results are illustrated with examples on designing controllers for linear wave and heat equations, and on studying the stability of a system of coupled partial differential equations. 
Hamiltonian MC on discrete spaces 
Following a lively discussion with Akihiko Nishimura during a BNP11 poster session last Tuesday, I took the opportunity of the flight to Montréal to read through the arXived paper (written jointly with David Dunson and Jianfeng Liu). The issue is thus one of handling discrete valued parameters in Hamiltonian Monte Carlo. The basic “trick” in […] 
Ученые: Луна с начала зарождения обладала необычайной атмосферой 
Об этом говорится в статье, расположенной в электронной библиотеке arXiv.org, сообщает Лента.ру. Американские ученые отыскали намеки на то, что когдато на Луне была уникальная атмосфера, которую еще никто никогда не лицезрел. У нее была очень жестокая история жизни, схожая на «тяжелый металл», однако она, как и звездные группы, очень быстро распалась и завершила свое существование. К таким выводам пришли ученые из Центра космических полетов имени […] 
Second Paper: "Unifying Microscopic and Continuum Treatments of van der Waals and Casimir Interactions" 
My second paper has been published! It is in volume 118, issue 26 of Physical Review Letters, and an older preprint of it is available too for those who don't have access to academic journals (it has all of the same figures and ideas, though it is missing a few sentences of further explanation as well as a couple of new citations that were inserted for the final publication). As with my first paper, in the interest of explaining these ideas in a way that is easy to understand, I am using the ten hundred most used words in English (except for the two lines that came before this one), as put together from the XKCD Simple Writer. I will use numbers sometimes without completely writing them out, use words for certain names of things without explaining further, and explain less used words when they come up. Keep reading to see what comes next. Read more » 