adv

solidot此次改版内容包括服务器更新、编程语言、网站后台管理的优化、页面和操作流程的优化等。

信息流

  • We construct a 6D ${\cal N}=(1,0)$ superconformal field theory by coupling an ${\cal N}=(1, 0)$ tensor multiplet to an ${\cal N}=(1, 0)$ hypermultiplet. While the ${\cal N}=(1, 0)$ tensor multiplet is in the adjoint representation of the gauge group, the hypermultiplet can be in the fundamental representation or any other representation. If the hypermultiplet is also in the adjoint representation of the gauge group, the supersymmetry is enhanced to ${\cal N}=(2, 0)$, and the theory is identical to the $(2,0)$ theory of Lambert and Papageorgakis (LP). Upon dimension reduction, the $(1, 0)$ theory can be reduced to a general ${\cal N}=1$ supersymmetric Yang-Mills theory in 5D. We discuss briefly the possible applications of the theories to multi M5-branes.

    发表评论 查看更多 翻译此文

    收起

  •  

    2017: The Year AI Floated into the Cloud

    12-29 MIT Technology 1579

    As more AI gets done on remote servers, Google, Amazon, and Microsoft are dueling to see who reigns supreme (and makes the most money).

    发表评论 查看更多 翻译此文

    收起

  • In this paper we propose and prove some generalizations and sharpenings of certain inequalities of Wilker's and Shafer-Fink's type. Application of the Wu-Debntah theorem enabled us to prove some double sided inequalities.

    发表评论 查看更多 翻译此文

    收起

  • A new definition of random sets is proposed. It is based on the distance in measurable space and uses negative definite kernels for continuation from initial space to that of random sets. This approach has no connection to Hausdorff distance between sets. Key words: random sets; measurable space; negative definite kernels; Hilbert space isometries.

    发表评论 查看更多 翻译此文

    收起

  • The (driven) Rabi model, together with its two-mode, two-photon, and asymmetric generalizations, are exotic examples of quasi-exactly solvable models in that a corresponding 2nd order ordinary differential equation (ODE) ${\cal L}\psi=0$ with polynomial coefficients (i) is not Fuchsian one and (ii) the differential operator ${\cal L}$ comprises energy E dependent terms $\sim Ez d_z$, $Ez$, $E^2$. When recast into a Schr\"odinger equation (SE) form with the first derivative term being eliminated and the coefficient of $d_x^2$ set to one, such an equation is characterized by a nontrivially energy dependent potential. The concept of a gradation slicing is introduced to analyze polynomial solutions of such equations. It is shown that the ODE of all the above Rabi models are characterized by the same unique set of grading parameters. General necessary and sufficient conditions for the existence of a polynomial solution are formulated. Unlike standard eigenvalue problems, the condition that

    发表评论 查看更多 翻译此文

    收起

  • Nesterov's accelerated gradient (AG) method for minimizing a smooth strongly convex function $f$ is known to reduce $f({\bf x}_k)-f({\bf x}^*)$ by a factor of $\epsilon\in(0,1)$ after $k=O(\sqrt{L/\ell}\log(1/\epsilon))$ iterations, where $\ell,L$ are the two parameters of smooth strong convexity. Furthermore, it is known that this is the best possible complexity in the function-gradient oracle model of computation. Modulo a line search, the geometric descent (GD) method of Bubeck, Lee and Singh has the same bound for this class of functions. The method of linear conjugate gradients (CG) also satisfies the same complexity bound in the special case of strongly convex quadratic functions, but in this special case it can be faster than the AG and GD methods. Despite similarities in the algorithms and their asymptotic convergence rates, the conventional analysis of the running time of CG is mostly disjoint from that of AG and GD. The analyses of the AG and GD methods are also rather distin

    发表评论 查看更多 翻译此文

    收起

  • We give a de Finetti type representation for exchangeable random coalescent trees (formally described as semi-ultrametrics) in terms of sampling iid sequences from marked metric measure spaces. We apply this representation to define versions of tree-valued Fleming-Viot processes from a $\Xi$-lookdown model. As state spaces for these processes, we use, besides the space of isomorphy classes of metric measure spaces, also the space of isomorphy classes of marked metric measure spaces and a space of distance matrix distributions. This allows to include the case with dust in which the genealogical trees have isolated leaves.

    发表评论 查看更多 翻译此文

    收起

  • We propose a refinement of the Robertson-Schrodinger uncertainty principle (RSUP) using Wigner distributions. This new principle is stronger than the RSUP. In particular, and unlike the RSUP, which can be saturated by many phase space functions, the refined RSUP can be saturated by pure Gaussian Wigner functions only. Moreover, the new principle is technically as simple as the standard RSUP. In addition, it makes a direct connection with modern harmonic analysis, since it involves the Wigner transform and its symplectic Fourier transform, which is the radar ambiguity function. As a by-product of the refined RSUP, we derive inequalities involving the entropy and the covariance matrix of Wigner distributions. These inequalities refine the Shanon and the Hirschman inequalities for the Wigner distribution of a mixed quantum state $\rho$. We prove sharp estimates which critically depend on the purity of $\rho$ and which are saturated in the Gaussian case.

    发表评论 查看更多 翻译此文

    收起

  • For an $n$--dimensional local analytic differential system $\dot x=Ax+f(x)$ with $f(x)=O(|x|^2)$, the Poincar\'e nonintegrability theorem states that if the eigenvalues of $A$ are not resonant, the system does not have an analytic or a formal first integral in a neighborhood of the origin. This result was extended in 2003 to the case when $A$ admits one zero eigenvalue and the other are non--resonant: for $n=2$ the system has an analytic first integral at the origin if and only if the origin is a non--isolated singular point; for $n>2$ the system has a formal first integral at the origin if and only if the origin is not an isolated singular point. However, the question of \emph{whether the system has an analytic first integral at the origin provided that the origin is not an isolated singular point} remains open.

    发表评论 查看更多 翻译此文

    收起

  • We consider a probit model without covariates, but the latent Gaussian variables having compound symmetry covariance structure with a single parameter characterizing the common correlation. We study the parameter estimation problem under such one-parameter probit models. As a surprise, we demonstrate that the likelihood function does not yield consistent estimates for the correlation. We then formally prove the parameter's nonestimability by deriving a non-vanishing minimax lower bound. This counter-intuitive phenomenon provides an interesting insight that one bit information of the latent Gaussian variables is not sufficient to consistently recover their correlation. On the other hand, we further show that trinary data generated from the Gaussian variables can consistently estimate the correlation with parametric convergence rate. Hence we reveal a phase transition phenomenon regarding the discretization of latent Gaussian variables while preserving the estimability of the correlation

    发表评论 查看更多 翻译此文

    收起

  • In this paper, we will study the following PDE in $\mathbb{R}^N$ involving multiple Hardy-Sobolev critical exponents: $$ \begin{cases} \Delta u+\sum_{i=1}^{l}\lambda_i \frac{u^{2^*(s_i)-1}}{|x|^{s_i}}+u^{2^*-1}=0\;\hbox{in}\;\mathbb{R}^N, u\in D_{0}^{1,2}(\mathbb{R}^N), \end{cases} $$ where $0<s_1<s_2<\cdots<s_l<2, 2^\ast:=\frac{2N}{N-2}, \; 2^\ast(s):=\frac{2(N-s)}{N-2}$ and there exists some $k\in [1, l]$ such that $\lambda_i>0$ for $1\leq i\leq k$; $\lambda_i<0$ for $k+1\leq i\leq l$. We develop an interesting way to study this class of equations involving mixed sign parameters. We prove the existence and non-existence of the positive ground state solution. The regularity of the least-energy solution are also investigated.

    发表评论 查看更多 翻译此文

    收起

  • In this work we consider a class of nonlocal non-autonomous evolution problems, which arise in neuronal activity, \[ \begin{cases} \partial_t u(t,x) =- a(t)u(t,x) + b(t) \displaystyle\int_{\mathbb{R}^N} J(x,y)f(t,u(t,y))dy -h +S(t,x) ,\ t\geq\tau \in \mathbb{R},\ x \in \Omega, u(\tau,x)=u_\tau(x),\ x\in\Omega u(t,x)= 0,\ t\geq\tau,\ x \in\mathbb{R}^N\backslash\Omega. \end{cases} \] Under suitable assumptions on the nonlinearity $f: \mathbb{R} \times \mathbb{R} \to\mathbb{R}$ and constraints on the functions $J: \mathbb{R}^N \times \mathbb{R}^{N}\to \mathbb{R}$;\, $S: \mathbb{R} \times \mathbb{R}^{N}\to\mathbb{R}$ and $a,b:\mathbb{R} \to\mathbb{R}$, we study the assimptotic behavior of the evolution process, generated by this problem, in an appropriated Banach space.% and we present a brief discussion on the model with a biological interpretation. We prove results on existence, uniqueness and smoothness of the solutions and the existence of pullback attracts for the evolution process as

    发表评论 查看更多 翻译此文

    收起

  • We revisit the scattering result of Duyckaerts, Holmer, and Roudenko for the non-radial $\dot H^{1/2}$-critical focusing NLS. By proving an interaction Morawetz inequality, we give a simple proof of scattering below the ground state in dimensions $d\geq 3$ that avoids the use of concentration compactness.

    发表评论 查看更多 翻译此文

    收起

  • This work is a study of $p$-adic multiple zeta values at roots of unity ($p$MZV$\mu_{N}$'s), the $p$-adic periods of the crystalline pro-unipotent fundamental groupoid of $(\mathbb{P}^{1} - \{0,\mu_{N},\infty\})/ \mathbb{F}_{q}$. The main tool is new objects which we call $p$-adic pro-unipotent harmonic actions. In this part IV we define and study $p$-adic analogues of some elementary complex analytic functions which interpolate multiple zeta values at roots of unity such as the multiple zeta functions. The indices of $p$MZV$\mu_{N}$'s involve sequences of positive integers ; in this IV-1, by considering an operation which we call localization (inverting certain integration operators) in the pro-unipotent fundamental groupoid of $\mathbb{P}^{1} - \{0,\mu_{N},\infty\}$, and by using $p$-adic pro-unipotent harmonic actions, we extend the definition of $p$MZV$\mu_{N}$'s to indices for which these integers can be negative, and we study these generalized $p$MZV$\mu_{N}$'s.

    发表评论 查看更多 翻译此文

    收起

  • In this paper we extend analytic signal method to the functions in many dimensions. First it is shown how to obtain separate phase-shifted components and how combine them to obtain signal's envelope, instantaneous frequencies and phases in many dimensions. Second, we show that phase-shifted components may be obtained by positive frequency restriction of the Fourier transform defined in the algebra of commutative elliptic hypercomplex numbers. Finally we prove that for $d>2$ there is no corresponding Clifford-Fourier transform that allows to recover phase-shifted components correctly.

    发表评论 查看更多 翻译此文

    收起

  • An optimal control problem is considered for a stochastic differential equation containing a state-dependent regime switching, with a recursive cost functional. Due to the non-exponential discounting in the cost functional, the problem is time-inconsistent in general. Therefore, instead of finding a global optimal control (which is not possible), we look for a time-consistent (approximately) locally optimal equilibrium strategy. Such a strategy can be represented through the solution to a system of partial differential equations, called an equilibrium Hamilton-Jacob-Bellman (HJB, for short) equation which is constructed via a sequence of multi-person differential games. A verification theorem is proved and, under proper conditions, the well-posedness of the equilibrium HJB equation is established as well.

    发表评论 查看更多 翻译此文

    收起

  • This paper investigates reverse auctions that involve continuous values of different types of goods, general nonconvex constraints, and second stage costs. Our analysis seeks to design the payment rules and conditions under which coalitions of participants cannot influence the auction outcome in order to obtain higher collective utility. Under incentive-compatible bidding in the Vickrey-Clarke-Groves mechanism, coalition-proof outcomes are achieved if the submitted bids are convex and the constraint sets are of polymatroid-type. Unfortunately, these conditions do not capture the complexity of the general class of reverse auctions under consideration. By relaxing the property of incentive-compatibility, we investigate further payment rules that are coalition-proof, but without any extra conditions. Among coalition-proof mechanisms, we select the mechanism that minimizes the participants' abilities to benefit from strategic manipulations, in order to incentivize truthful bidding from the

    发表评论 查看更多 翻译此文

    收起

  • Identifying coordinate transformations that make strongly nonlinear dynamics approximately linear is a central challenge in modern dynamical systems. These transformations have the potential to enable prediction, estimation, and control of nonlinear systems using standard linear theory. The Koopman operator has emerged as a leading data-driven embedding, as eigenfunctions of this operator provide intrinsic coordinates that globally linearize the dynamics. However, identifying and representing these eigenfunctions has proven to be mathematically and computationally challenging. This work leverages the power of deep learning to discover representations of Koopman eigenfunctions from trajectory data of dynamical systems. Our network is parsimonious and interpretable by construction, embedding the dynamics on a low-dimensional manifold that is of the intrinsic rank of the dynamics and parameterized by the Koopman eigenfunctions. In particular, we identify nonlinear coordinates on which the

    发表评论 查看更多 翻译此文

    收起

  • Plus deals on Sonos speakers, Dell and Lenovo laptops, TurboTax, and more.

    发表评论 查看更多 翻译此文

    收起

  • The paper studies the locus in the rank 2 Higgs bundle moduli space corresponding to points which are critical for d of the Poisson commuting functions. These correspond to the Higgs field vanishing on a divisor of degree D. The degree D critical locus has an induced integrable system related to K(-D)-twisted Higgs bundles. Topological and differential-geometric properties of the critical loci are addressed.

    发表评论 查看更多 翻译此文

    收起

  • Let $\mathcal{T}$ be the group of smooth concordance classes of topologically slice knots, and $\{0\}\subset\cdots\subset \mathcal{T}_{n+1}\subset\mathcal{T}_{n}\subset \cdots\subset \mathcal{T}_{0}\subset \mathcal{T}$ be the bipolar filtration. In this paper, we show that a proper collection of the knots employed by Hedden, Kim, and Livingston to prove $\mathbb{Z}_2^{\infty} < \mathcal{T}$ can be used to see $\mathbb{Z}_2^{\infty} < \mathcal{T}_0/\mathcal{T}_1$.

    发表评论 查看更多 翻译此文

    收起

  • In this work we prove convergence of the finite difference scheme for equations of stationary states of a general class of the spatial segregation of reaction-diffusion systems with $m\geq 2$ components. More precisely, we show that the numerical solution $u_h^l$, given by the difference scheme, converges to the $l^{th}$ component $u_l,$ when the mesh size $h$ tends to zero, provided $u_l\in C^2(\Omega),$ for every $l=1,2,\dots,m.$ In particular, our proof provides convergence of a difference scheme for the multi-phase obstacle problem.

    发表评论 查看更多 翻译此文

    收起

  • This paper is devoted to a description of a general approach introduced by Agrachev and Sarychev in 2005 for studying some control problems for Navier-Stokes equations. The example of a 1D Burgers equation is used to illustrate the main ideas. We begin with a short discussion of the Cauchy problem and establish a continuity property for the resolving operator. We next turn to the property of approximate controllability and prove that it can be achieved by a two-dimensional external force. Finally, we investigate a stronger property, when the approximate controllability and the exact controllability of finite-dimensional functionals are proved simultaneously.

    发表评论 查看更多 翻译此文

    收起

  • Given a polynomial basis $\Psi_i$ which spans the polynomial vector space $\mathcal{P}$, this paper addresses the construction and use of the algebraic dual space $\mathcal{P}'$ and its canonical basis. Differentiation of dual variables will be discussed. The method will be applied to a Dirichlet and Neumann problem presented in \cite{CarstensenDemkowiczGopalakrishnan} and it is shown that the finite dimensional approximations satisfy $\phi^h = \mbox{div}\, \mathbf{q}^h$ on any grid. The dual method is also applied to a constrained minimization problem, which leads to a mixed finite element formulation. The discretization of the constraint and the Lagrange multiplier will be independent of the grid size, grid shape and the polynomial degree of the basis functions.

    发表评论 查看更多 翻译此文

    收起

  • A line field on a manifold is a smooth map which assigns a tangent line to all but a finite number of points of the manifold. As such, it can be seen as a generalization of vector fields. They model a number of geometric and physical properties, e.g. the principal curvature directions dynamics on surfaces or the stress flux in elasticity. We propose a discretization of a Morse-Smale line field on surfaces, extending Forman's construction for discrete vector fields. More general critical elements and their indices are defined from local matchings, for which Euler theorem and the characterization of homotopy type in terms of critical cells still hold.

    发表评论 查看更多 翻译此文

    收起

  • Let $S$ be the set of subsequences $(x_{n_k})$ of a given real sequence $(x_n)$ which preserve the set of statistical cluster points. It has been recently shown that $S$ is a set of full (Lebesgue) measure. Here, on the other hand, we prove that $S$ is meager if and only if there exists an ordinary limit point of $(x_n)$ which is not a statistical cluster point of $(x_n)$. This provides a non-analogue between measure and category.

    发表评论 查看更多 翻译此文

    收起

  • In this work, we propose constructions that correct duplications of multiple consecutive symbols. These errors are known as tandem duplications, where a sequence of symbols is repeated; respectively as palindromic duplications, where a sequence is repeated in reversed order. We compare the redundancies of these constructions with code size upper bounds that are obtained from sphere packing arguments. Proving that an upper bound on the code cardinality for tandem deletions is also an upper bound for inserting tandem duplications, we derive the bounds based on this special tandem deletion error as this results in tighter bounds. Our upper bounds on the cardinality directly imply lower bounds on the redundancy which we compare with the redundancy of the best known construction correcting arbitrary burst insertions. Our results indicate that the correction of palindromic duplications requires more redundancy than the correction of tandem duplications and both significantly less than arbitr

    发表评论 查看更多 翻译此文

    收起

  • We establish the limiting distribution of certain subsets of Farey sequences, i.e., sequences of primitive rational points, on expanding horospheres in covers $\Delta\backslash\mathrm{SL}(n+1,\mathbb{R})$ of $\mathrm{SL}(n+1,\mathbb{Z})\backslash\mathrm{SL}(n+1,\mathbb{R})$, where $\Delta$ is a finite index subgroup of $\mathrm{SL}(n+1,\mathbb{Z})$. These subsets can be obtained by projecting to the hyperplane $\{(x_1,\ldots,x_{n+1})\in\mathbb{R}^{n+1}:x_{n+1}=1\}$ sets of the form $\mathbf{A}=\bigcup_{j=1}^J\boldsymbol{a}_j\Delta$, where for all $j$, $\boldsymbol{a}_j$ is a primitive lattice point in $\mathbb{Z}^{n+1}$. Our method involves applying the equidistribution of expanding horospheres in quotients of $\mathrm{SL}(n+1,\mathbb{R})$ developed by Marklof and Str\"{o}mbergsson, and more precisely understanding how the full Farey sequence distributes in $\Delta\backslash\mathrm{SL}(n+1,\mathbb{R})$ when embedded on expanding horospheres as done in previous work by Marklof. For each

    发表评论 查看更多 翻译此文

    收起

  • In this note we observe that one can contact embed all contact 3-manifolds into a Stein fillable contact structure on the twisted $S^3$-bundle over $S^2$ and also into a unique overtwisted contact structure on $S^3\times S^2$. These results are proven using "spun embeddings" and Lefschetz fibrations.

    发表评论 查看更多 翻译此文

    收起

  • We construct pairs of elliptic curves over number fields with large intersection of projective torsion points.

    发表评论 查看更多 翻译此文

    收起

  • We prove Polterovich's conjecture concerning the growth of the number of nodal domains for eigenfunctions on a unit square domain, under the assumption that the eigenfunctions do not have any singular points.

    发表评论 查看更多 翻译此文

    收起

  • In this paper, we investigate the problem of beam alignment in millimeter wave (mmWave) systems, and design an optimal algorithm to reduce the overhead. Specifically, due to directional communications, the transmitter and receiver beams need to be aligned, which incurs high delay overhead since without a priori knowledge of the transmitter/receiver location, the search space spans the entire angular domain. This is further exacerbated under dynamic conditions (e.g., moving vehicles) where the access to the base station (access point) is highly dynamic with intermittent on-off periods, requiring more frequent beam alignment and signal training. To mitigate this issue, we consider an online stochastic optimization formulation where the goal is to maximize the directivity gain (i.e., received energy) of the beam alignment policy within a time period. We exploit the inherent correlation and unimodality properties of the model, and demonstrate that contextual information improves the perfor

    发表评论 查看更多 翻译此文

    收起

  • Physical-layer security for wireless networks has become an effective approach and recently drawn significant attention in the literature. In particular, the deployment and allocation of resources such as relays to assist the transmission have gained significant interest due to their ability to improve the secrecy rate of wireless networks. In this work, we examine relay selection criteria with arbitrary knowledge of the channels of the users and the eavesdroppers. We present alternative optimization criteria based on the signal-to-interference and the secrecy rate criteria that can be used for resource allocation and that do not require knowledge of the channels of the eavesdroppers and the interference. We then develop effective relay selection algorithms that can achieve a high secrecy rate performance without the need for the knowledge of the channels of the eavesdroppers and the interference. Simulation results show that the proposed criteria and algorithms achieve excellent perfo

    发表评论 查看更多 翻译此文

    收起

  • An economic interpretation of the Caputo derivatives of non-integer orders is proposed. The suggested economic interpretation of the fractional derivatives is based on a generalization of average and marginal values of economic indicators. We formulate an economic interpretation by using the concept of the T-indicator that allows us to describe economic processes with memory. The standard average and marginal values of indicator are special cases of the proposed T-indicator, when the order is equal to zero and one, respectively. The fractional derivatives are interpreted as economic characteristics (indicators) that are intermediate between the standard average and marginal values of indicators.

    发表评论 查看更多 翻译此文

    收起

  • This paper proposes a dynamic game-based maintenance scheduling mechanism for the asset owners of the natural gas grid and the power grid by using a bilevel approach. In the upper level, the asset owners of the natural gas grid and the power grid schedule maintenance to maximize their own revenues. This level is modeled as a dynamic game problem, which is solved by the backward induction algorithm. In the lower level, the independent system operator (ISO) dispatches the system to minimize the loss of power load and natural gas load in consideration of the system operating conditions under maintenance plans from the asset owners in the upper level. This is modeled as a mixed integer linear programming problem. For the model of the natural gas grid, a piecewise linear approximation associated with the big-M approach is used to transform the original nonlinear model into the mixed integer linear model. Numerical tests on a 6-bus system with a 4-node gas grid show the effectiveness of the

    发表评论 查看更多 翻译此文

    收起

  • An edge-colored graph $G$ is \emph{conflict-free connected} if, between each pair of distinct vertices, there exists a path containing a color used on exactly one of its edges. The \emph{conflict-free connection number} of a connected graph $G$, denoted by $cfc(G)$, is defined as the smallest number of colors that are required in order to make $G$ conflict-free connected. A coloring of vertices of a hypergraph $H=(\mathcal{V},\mathcal{E})$ is called \emph{conflict-free} if each hyperedge $e$ of $H$ has a vertex of unique color that does not get repeated in $e$. The smallest number of colors required for such a coloring is called the \emph{conflict-free chromatic number} of $H$, and is denoted by \emph{$\chi_{cf}(H)$}. In this paper, we study the conflict-free connection coloring of trees, which is also the conflict-free coloring of edge-path hypergraphs of trees. We first prove that for a tree $T$ of order $n$, $cfc(T)\geq cfc(P_n)=\lceil \log_{2} n\rceil$, and this completely confirms

    发表评论 查看更多 翻译此文

    收起

  • In this paper, we compare the radio propagation channels characteristics between 28 and 140 GHz bands based on the wideband (several GHz) and directional channel sounding in a shopping mall environment. The measurements and data processing are conducted in such a way to meet requirements for a fair comparison of large- and small- scale channel parameters between the two bands. Our results reveal that there is high spatial-temporal correlation between 28 and 140 GHz channels, similar numbers of strong multipath components, and only small variations in the large-scale parameters between the two bands. Furthermore, when including the weak paths there are higher total numbers of clusters and paths in 28 GHz as compared to those in 140 GHz bands. With these similarities, it would be very interesting to investigate the potentials of using 140 GHz band in the future mobile radio communications.

    发表评论 查看更多 翻译此文

    收起

  • We prove that the asymptotic of the bulk local statistics in models of random lozenge tilings is universal in the vicinity of straight boundaries of the tiled domains. The result applies to uniformly random lozenge tilings of large polygonal domains on triangular lattice and to the probability measures describing the decomposition in Gelfand-Tsetlin bases of tensor products of representations of unitary groups. In a weaker form our theorem also applies to random domino tilings.

    发表评论 查看更多 翻译此文

    收起

  •  

    Best Online Classes for Job Skills

    12-29 MIT Technology 977

    Codecademy, Coursera, edX, and Udacity reveal their most popular courses of 2017 and what they think will trend in 2018.

    发表评论 查看更多 翻译此文

    收起

  • The average nearest neighbor degree (ANND) of a node of degree $k$ is widely used to measure dependencies between degrees of neighbor nodes in a network. We formally analyze ANND in undirected random graphs when the graph size tends to infinity. The limiting behavior of ANND depends on the variance of the degree distribution. When the variance is finite, the ANND has a deterministic limit. When the variance is infinite, the ANND scales with the size of the graph, and we prove a corresponding central limit theorem in the configuration model (CM, a network with random connections). As ANND proved uninformative in the infinite variance scenario, we propose an alternative measure, the average nearest neighbor rank (ANNR). We prove that ANNR converges to a deterministic function whenever the degree distribution has finite mean. We then consider the erased configuration model (ECM), where self-loops and multiple edges are removed, and investigate the well-known `structural negative correlati

    发表评论 查看更多 翻译此文

    收起

  • We prove almost sharp decay estimates for the small data solutions and their derivatives of the Vlasov-Maxwell system in dimension $n \geq 4$. The smallness assumption concerns only certains weighted $L^1$ or $L^2$ norms of the initial data. In particular, no compact support assumption is required on the Vlasov or the Maxwell fields. The main ingredients of the proof are vector field methods for both the kinetic and the wave equations, null properties of the Vlasov-Maxwell system to control high velocities and a new decay estimate for the velocity average of the solution of the relativistic massive transport equation. We also consider the massless Vlasov-Maxwell system under a lower bound on the velocity support of the Vlasov field. As we prove in this paper, the velocity support of the Vlasov field needs to be initially bounded away from $0$. We compensate the weaker decay estimate on the velocity averages of the massless Vlasov field near the light cone by an extra null decomposition

    发表评论 查看更多 翻译此文

    收起

  • In multi-cast scenario, all desired users are divided into $K$ groups. Each group receives its own individual confidential message stream. Eavesdropper group aims to intercept $K$ confidential-message streams. To achieve a secure transmission, two secure schemes are proposed: maximum group receive power plus null-space (NS) projection (Max-GRP plus NSP) and leakage. The former obtains its precoding vector per group by maximizing its own group receive power subject to the orthogonal constraint, and its AN projection matrix consist of all bases of NS of all desired steering vectors from all groups. The latter attains its desired precoding vector per group by driving the current confidential message power to its group steering space and reducing its power leakage to eavesdropper group and other $K-1$ desired ones by maximizing signal to leakage and noise ratio (Max-SLNR). And its AN projection matrix is designed by forcing AN power into the eavesdropper steering space by viewing AN as a u

    发表评论 查看更多 翻译此文

    收起

  • In attempt to make amends for iPhone slow down "misunderstanding."

    发表评论 查看更多 翻译此文

    收起

  • Android applications, running on either Android itself or on Chrome OS, pause whenever they're not in focus. While this makes sense on a phone, this doesn't make a whole lot of sense on desktop machines such as Chromebooks. As such, Google is addressing this shortcoming with Parallel Tasks. With that in mind, the expected behavior of an open app is that it would remain active and running even when the user clicks to another window. Coming from Windows, Linux, or Mac OS, this is what users expect and it is a bit confusing unless you understand what is happening. Parallel tasks on Android allow the OS to keep everything running and open until you pause the activity or close the app down. Again, with Chrome OS, this is much easier to manage. Just click the "X" on the app and it is closed. Simple. Nothing groundbreaking in and of itself, obviously, but a hugely important 'feature' to have on a laptop or desktop.

    发表评论 查看更多 翻译此文

    收起

  • In this article, we prove that for any probability distribution $\mu$ on $\mathbb{N}$ one can construct a stationary version of the infinite-bin model --an interacting particle system introduced by Foss and Konstantopoulos-- with move distribution $\mu$. Using this result, we obtain a new formula for the speed of the front of infinite-bin models, as a series of positive terms. This implies that the growth rate $C(p)$ of the longest path in a Barak-Erd\H{o}s graph of parameter $p$ is analytic on $(0,1]$.

    发表评论 查看更多 翻译此文

    收起

  • In this paper, the $mn$-dimensional space of tensor-product polynomials of two variables, of degree at most $(m-1)+(n-1)$, is considered. A theory of two-variate polynomials is developed by establishing the algebra and basic algebraic properties with respect to the usual addition, scalar multiplication, and a newly defined algebraic operation in the considered space. Further, the existence of the considered space is established with respect to the matrix interpolation problem (MIP), $P(i,j)=a_{ij}$ for all $1 \leq i \leq m$, $1 \leq j \leq n$, corresponds to a given matrix $(a_{ij})_{m \times n}$ in the space of $m \times n$ order real matrices. The poisedness of the MIP is proved and three formulae are presented to construct the respective polynomial in the considered space. After that, using construction formulae, a polynomial map from the space of $m \times n$ order real matrices to the considered space is defined. Some properties of the polynomial map are investigated and some isom

    发表评论 查看更多 翻译此文

    收起

  • Alan Burdick listens back on a noisy year, picking ten of the most interesting sounds of 2017, from the world’s loudest fish to the highest-singing soprano.

    发表评论 查看更多 翻译此文

    收起

  • In this paper, we propose a novel joint caching and non-orthogonal multiple access (NOMA) scheme to facilitate advanced downlink transmission for next generation cellular networks. In addition to reaping the conventional advantages of caching and NOMA transmission, the proposed cache-aided NOMA scheme also exploits cached data for interference cancellation which is not possible with separate caching and NOMA transmission designs. Furthermore, as caching can help to reduce the residual interference power, several decoding orders are feasible at the receivers, and these decoding orders can be flexibly selected for performance optimization. We characterize the achievable rate region of cache-aided NOMA and investigate its benefits for minimizing the time required to complete video file delivery. Our simulation results reveal that, compared to several baseline schemes, the proposed cache-aided NOMA scheme significantly expands the achievable rate region for downlink transmission, which tra

    发表评论 查看更多 翻译此文

    收起

  • We consider marginal log-linear models for parameterizing distributions on multidimensional contingency tables. These models generalize ordinary log-linear and multivariate logistic models, besides several others. First, we obtain some characteristic properties of marginal log-linear parameters. Then we define collapsibility and strict collapsibility of these parameters in a general sense. Several necessary and sufficient conditions for collapsibility and strict collapsibility are derived using the technique of M\"{o}bius inversion. These include results for an arbitrary set of marginal log-linear parameters having some common effects. The connections of collapsibility and strict collapsibility to various forms of independence of the variables are discussed. Finally, we establish a result on the relationship between parameters with the same effect but different margins, and use it to demonstrate smoothness of marginal log-linear models under collapsibility conditions thereby obtaining

    发表评论 查看更多 翻译此文

    收起

  • A virtual link diagram is called normal if the associated abstract link diagram is checkerboard colorable, and a virtual link is normal if it has a normal diagram as a representative. Normal virtual links have some properties similar to classical links.In this paper, we introduce a method of converting a virtual link diagram to a normal virtual link diagram. We show that the normal virtual link diagrams obtained by this method from two equivalent virtual link diagrams are equivalent. We discuss the relationship between this method and some invariants of virtual links.

    发表评论 查看更多 翻译此文

    收起

  •  

    Coaxing Light From Graphene

    12-29 IEEE 949

    How a research institute near Barcelona exploits graphene’s potential in light-based technologies to advance 5G efforts

    发表评论 查看更多 翻译此文

    收起

  • Performances of cellular networks over {\kappa}-{\mu} shadowed fading with long-term shadowing has been studied in the existing literature. However, the impact of {\kappa}-{\mu} shadowed fading with instantaneous shadowing on performances of cellular networks is unknown. Therefore, this letter analyzes the downlink coverage probability of a Poisson network with double shadowed fading which is composed of a large-scale fading of lognormal distribution and {\kappa}-{\mu} shadowed fading with integer fading parameters. The closest base station association rule without shadowing is considered. For analytical tractability, the double shadowed fading is approximated as a weighted sum of {\kappa}-{\mu} shadowed distributions based on the Gaussian-Hermit quadrature. As a main theoretical result, a closed-form expression for the downlink coverage probability of a Poisson network under double shadowed fading for the desired signal and arbitrary fading for the interfering signals is successfully

    发表评论 查看更多 翻译此文

    收起

  • We investigate the existence of left-invariant closed G$_2$-structures on seven-dimensional non-solvable Lie groups, providing the first examples of this type. When the Lie algebra has trivial Levi decomposition, we show that such a structure exists only when the semisimple part is isomorphic to $\mathfrak{sl}(2,\mathbb{R})$ and the radical is unimodular and centerless. Moreover, we classify unimodular Lie algebras with non-trivial Levi decomposition admitting closed G$_2$-structures.

    发表评论 查看更多 翻译此文

    收起

  • Android Parallel Tasks makes Android apps work more like regular PC programs.

    发表评论 查看更多 翻译此文

    收起

  • In this paper, we aim to provide a systematic study of the relationship between Chernoff information and topological, as well as algebraic properties of the corresponding Gaussian tree graphs for the underlying graphical testing problems. We first show the relationship between Chernoff information and generalized eigenvalues of the associated covariance matrices. It is then proved that Chernoff information between two Gaussian trees sharing certain local subtree structures can be transformed into that of two smaller trees. Under our proposed grafting operations, bottleneck Gaussian trees, namely, Gaussian trees connected by one such operation, can thus be simplified into two 3-node Gaussian trees, whose topologies and edge weights are subject to the specifics of the operation. Thereafter, we provide a thorough study about how Chernoff information changes when small differences are accumulated into bigger ones via concatenated grafting operations. It is shown that the two Gaussian trees

    发表评论 查看更多 翻译此文

    收起

  • In 1885, Fedorov discovered that a convex domain can form a lattice tiling of the Euclidean plane if and only if it is a parallelogram or a centrally symmetric hexagon. It is known that there is no other convex domain which can form two-, three- or four-fold translative tiling in the Euclidean plane, but there are centrally symmetric convex octagons and decagons which can form five-fold translative tilings. This paper characterizes all the convex domains which can form five-fold translative tilings of the Euclidean plane.

    发表评论 查看更多 翻译此文

    收起

  • Following Semmes and Zinsmeister, we continue the study of Carleson measures and their invariance under pull-back and push-forward operators. We also study the analogous statements for vanishing Carleson measures. As an application, we show that some quotient space of the space of chord-arc curves has a natural complex structure.

    发表评论 查看更多 翻译此文

    收起

  • DC police used sonic cannon to direct crowd flow during Women's March

    发表评论 查看更多 翻译此文

    收起

  •  

    Computer latency: 1977-2017

    12-25 Hacker News 955

    Computer latency: 1977-2017

    发表评论 查看更多 翻译此文

    收起

  • Apple will be releasing the code of the operating system and applications of the Apple Lisa. Just wanted to let everyone know the sources to the OS and applications were recovered, I converted them to Unix end of line conventions and space for Pascal tabs after the files using Disk Image Chef, and they are with Apple for review. After that's done, the Computer History Museum will do a CHM blog post about the historical significance of the software and the code that is cleared for release by Apple will be made available in 2018. The only thing I saw that probably won't be able to be released is the American Heritage dictionary for the spell checker in LisaWrite. Merry Christmas everybody.

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader quotes Kotaku: He's been this way for over an hour, and as word's gotten out the audience has swelled to over 30,000... The Twitch stream opened a couple hours ago on an empty chair. A few minutes later Kaplan walked in and sat down. He's been there ever since, sometimes crossing his legs, sometimes uncrossing them, and always looking, watching, waiting. And lest anyone think the stream is somehow a small segment of footage on loop, there have been a few weird moments sprinkled throughout, including one where Jeff gets booped by an off camera boom mic. In the other, less action filled parts, you can feel time passing as the rate of Jeff blinking changes. Three different blinking speeds, we'll call them long stare, short stare, and turbo eye lash flicking, have taken shape in the stream like the ghosts of Christmas past, present, and future... It's boring to the point of being impossible to look away. It's actually the opposite of what this time of year's supposed t

    发表评论 查看更多 翻译此文

    收起

  • 2017 began with an AI named "Libratus" defeating four of the world's best poker players. Now the AI's creators reveal how exactly they did it. An anonymous reader quotes the Pittsburgh Tribune-Review: First, the AI made the game easier to understand. There are 10**161 potential outcomes in the game of poker -- that's a one followed by 161 zeros, potential outcomes in a game of poker. Libratus grouped similar hands, like a King-high flush and a Queen-high flush, and similar bet sizes to cut down that number. Libratus then created a detailed strategy for how it would play the early rounds of the game and a less-refined strategy for the final rounds. As the game nears the end, Libratus refined the second strategy based on how the game had gone. A third strategy was at work as well. In real-time, Libratus created another model based on how its play stacked up against the play of the humans. If the humans did something unexpected to Libratus, the AI accounted for it and built it into the s

    发表评论 查看更多 翻译此文

    收起

  • Bruce McCandless, First Astronaut to Fly Untethered in Space, Has Died

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader quotes Fortune: Call it a Christmas miracle -- albeit of a rather perverse sort. Theranos, the digraced medical-technology startup that infamously inflated the capabilities of its devices, has secured $100 million in new funding in the form of a loan. The loan, reported by the Wall Street Journal, will come from Fortress Investment Group. Fortress, whose other underdog bets include a private passenger rail line under construction in Florida, is set to be acquired by Japan's SoftBank. Theranos was reportedly on the verge of bankrutpcy... By the end of 2016, the company reportedly still had $200 million in cash on hand, but had sharply limited prospects for attracting more capital. It has since settled a major lawsuit with Walgreens, a former client, for an undisclosed but likely substantial sum. According to the Journal, the Fortress loan is expected to keep Theranos solvent through 2018. That will give the company more time for its ongoing effort to reboot as a

    发表评论 查看更多 翻译此文

    收起

  • Long-time Slashdot reader b0s0z0ku writes: China has turned Xinjiang, the Northwestern part of the country surrounding Urumqi, into one of the most advanced surveillance states in the world. Officially, the purpose is to prevent terrorism and control resistance to the government in one of the few parts of China where ethnic Chinese are a minority. From routine use of facial recognition cameras, to police checkpoints where people's cell phones randomly are checked for unauthorized software, to needing to swipe an ID card and be photographed to buy gasoline and other necessities, the level of technology — and control — is frightening and awe-inspiring.

    发表评论 查看更多 翻译此文

    收起

  •  

    Ars Technica’s best video games of 2017

    12-24 Ars Technica 968

    Narrowing down a ridiculously strong year for gaming to just 20 essential picks.

    发表评论 查看更多 翻译此文

    收起

  •  

    A New History of the Second World War

    12-24 THE NEW YORKER 976

    Joshua Rothman writes about “The Second World Wars: How the First Global Conflict Was Fought and Won,” by the historian Victor Davis Hanson.

    发表评论 查看更多 翻译此文

    收起

  • A Spare and Simple Life – Historic Environment Scotland

    发表评论 查看更多 翻译此文

    收起

  • Electric currency could trash cash (1999)

    发表评论 查看更多 翻译此文

    收起

  • Suren Enfiajyan writes: Red Hat worker and GNOME blogger Christian F.K. Schaller wrote why GNU/Linux failed to become a mainstream desktop OS... "My thesis is that there really isn't one reason, but rather a range of issues that all have contributed to holding the Linux Desktop back from reaching a bigger market. Also to put this into context, success here in my mind would be having something like 10% market share of desktop systems. That to me means we reached critical mass." He named the following reasons: - A fragmented market - Lack of special applications - Lack of big name applications - Lack of API and ABI stability - Apple's resurgence - Microsoft's aggressive response - Windows piracy - Red Hat mostly stayed away - Canonical's business model not working out - Lack of original device manufacturer support Then he ended with some optimism: "So anyone who has read my blog posts probably knows I am an optimist by nature. This isn't just some kind of genetic dispositio

    发表评论 查看更多 翻译此文

    收起

  • Axiom Beta – Digital cinema camera built around FOSS and open hardware

    发表评论 查看更多 翻译此文

    收起

  • The U.S. agency is going big on solving the spectrum management problem

    发表评论 查看更多 翻译此文

    收起

  •  

    Best Tech Books of 2017

    12-23 MIT Technology 937

    Our editors’ picks for the best books of 2017, and some they’re looking forward to.

    发表评论 查看更多 翻译此文

    收起

  • Customers say they would rather have replaced battery than bought a new phone.

    发表评论 查看更多 翻译此文

    收起

  • Plus deals on the Sonos Play:1, Amazon Echo, Dell laptops, and more.

    发表评论 查看更多 翻译此文

    收起

  • Many scientific and engineering challenges can be formulated as optimization problems which are constrained by partial differential equations (PDEs). These include inverse problems, control problems, and design problems. As a major challenge, the associated optimization procedures are inherently large-scale. To ensure computational tractability, the design of efficient and robust iterative methods becomes imperative. To meet this challenge, this paper introduces a fast and memory-efficient preconditioned iterative scheme for a class of distributed optimal control problems governed by convection-diffusion-reaction (CDR) equations. As an alternative to low-order discretizations and Schur-complement block preconditioners, the scheme combines a high-order spectral Galerkin method with an efficient preconditioner tailored specifically for the CDR application. The preconditioner is matrix-free and can be applied within linear complexity where the proportionality constant is small. Numerical

    发表评论 查看更多 翻译此文

    收起

  • Answering a question of Benjamini, we present an isometry-invariant random partition of the euclidean space R^3 into infinite connected indinstinguishable pieces, such that the adjacency graph defined on the pieces is the 3-regular infinite tree. Along the way, it is proved that any finitely generated amenable Cayley graph (or more generally, amenable unimodular random graph) can be represented in R^3 as an isometry-invariant random collection of polyhedral domains (tiles). A new technique is developed to prove indistinguishability for certain constructions, connecting this notion to factor of iid's.

    发表评论 查看更多 翻译此文

    收起

  • The main purpose of this paper is to establish, over Henselian valued fields $K$ with analytic structure, the closedness theorem to the effect that every projection with a projective fiber is a definably closed map. Here the ground field $K$ is assumed to be of equicharacteristic zero, possibly non algebraically closed.

    发表评论 查看更多 翻译此文

    收起

  • Presented is a method for efficient computation of the Hamilton-Jacobi (HJ) equation for time-optimal control problems using the generalized Hopf formula. Typically, numerical methods to solve the HJ equation rely on a discrete grid of the solution space and exhibit exponential scaling with dimension. The generalized Hopf formula avoids the use of grids and numerical gradients by formulating an unconstrained convex optimization problem. The solution at each point is completely independent, and allows a massively parallel implementation if solutions at multiple points are desired. This work presents a primal-dual method for efficient numeric solution and presents how the resulting optimal trajectory can be generated directly from the solution of the Hopf formula, without further optimization. Examples presented have execution times on the order of milliseconds and experiments show computation scales approximately polynomial in dimension with very small high-order coefficients.

    发表评论 查看更多 翻译此文

    收起

  • We compute the relations in the Cox ring of the moduli space $\overline{M}_{0,6}$. This gives a presentation of the Cox ring as a quotient of a polynomial ring with 40 generators by an ideal with 225 generators that come in 5 symmetry classes.

    发表评论 查看更多 翻译此文

    收起