adv

致长期以来一直关注solidot的海内外朋友,请点击这里查看。

信息流

  • Chinese-designed "Dhyana" x86 processors based on AMD's Zen microarchitecture are beginning to surface from Chinese chip producer Hygon. The processors come as the fruit of AMD's x86 IP licensing agreements with its China-based partners and break the decades-long stranglehold on x86 held by the triumvirate of Intel, AMD and VIA Technologies. Details are also emerging that outline how AMD has managed to stay within the boundaries of the x86 licensing agreements but still allow Chinese-controlled interests to design and sell processors based on the Zen design. Even though I doubt this will have any meaningful impact on competition, it's always good to see new x86 manufacturers. The licensing situation around x86 always feels impenetrable and mysterious to me, almost as if it was specifically designed and set up to divide up the x86 market, a huge cash cow for several decades now. With ARM use being on the rise and the architecture even making its first inroads into laptops, serve

    发表评论 查看更多 翻译此文

    收起

  • Processors using licensed x86 IP could have implications for trade war, national security.

    发表评论 查看更多 翻译此文

    收起

  • Meanwhile, a Chinese firm hopes to build a large battery factory in eastern Germany.

    发表评论 查看更多 翻译此文

    收起

  •  

    Chrome developer tools to master

    07-10 Hacker News 17

    Chrome developer tools to master

    发表评论 查看更多 翻译此文

    收起

  •  

    Citus Data Is Hiring a Support Engineer

    07-10 Hacker News 19

    Citus Data Is Hiring a Support Engineer

    发表评论 查看更多 翻译此文

    收起

  • From a report: It is the most exacting of surgical skills: tying a knot deep inside a patient's abdomen, pivoting long graspers through keyhole incisions with no direct view of the thread. Trainee surgeons typically require 60 to 80 hours of practice, but in a mock-up operating theatre outside Cambridge, a non-medic with just a few hours of experience is expertly wielding a hook-shaped needle -- in this case stitching a square of pink sponge rather than an artery or appendix. The feat is performed with the assistance of Versius, the world's smallest surgical robot, which could be used in NHS operating theatres for the first time later this year if approved for clinical use. Versius is one of a handful of advanced surgical robots that are predicted to transform the way operations are performed by allowing tens or hundreds of thousands more surgeries each year to be carried out as keyhole procedures. The Versius robot cuts down the time required to learn to tie a surgical knot from more

    发表评论 查看更多 翻译此文

    收起

  • Timehop Security Incident, July 4th, 2018

    发表评论 查看更多 翻译此文

    收起

  • Vim Cheat Sheat for Programmers by Michael Pohoreski

    发表评论 查看更多 翻译此文

    收起

  •  

    The tech behind the Thailand cave rescue

    07-09 MIT Technology 20

    We generalize Kato's adiabatic theorem to nonunitary dynamics. This enables us to unify two strong coupling limits: one driven by fast oscillations under a Hamiltonian, and the other driven by strong damping under a Lindbladian. We discuss the case where both mechanisms are present and provide nonperturbative error bounds. We also analyze the links with the quantum Zeno effect and dynamics.

    发表评论 查看更多 翻译此文

    收起

  • Towards an optical FPGA – Programmable silicon photonic circuits [pdf]

    发表评论 查看更多 翻译此文

    收起

  • We generalize Kato's adiabatic theorem to nonunitary dynamics. This enables us to unify two strong coupling limits: one driven by fast oscillations under a Hamiltonian, and the other driven by strong damping under a Lindbladian. We discuss the case where both mechanisms are present and provide nonperturbative error bounds. We also analyze the links with the quantum Zeno effect and dynamics.

    发表评论 查看更多 翻译此文

    收起

  •  

    Watsi is hiring a Director of Product

    07-09 Hacker News 16

    Watsi is hiring a Director of Product

    发表评论 查看更多 翻译此文

    收起

  • When evolution's path leads to a dead end

    发表评论 查看更多 翻译此文

    收起

  • How the evolution of intelligent electronic sensors is creating a revolution for IoT and Industrial IoT.

    发表评论 查看更多 翻译此文

    收起

  • Wordmesh: Using t-SNE and word2vec to generate clustered wordclouds

    发表评论 查看更多 翻译此文

    收起

  •  

    [$] IR decoding with BPF

    07-09 LWN 17

    In the 4.18 kernel, a new feature was merged to allow infrared (IR) decoding to be done using BPF. Infrared remotes use many different encodings; if a decoder were to be written for each, we would end up with hundreds of decoders in the kernel. So, currently, the kernel only supports the most widely used protocols. Alternatively, the lirc daemon can be run to decode IR. Decoding IR can usually be expressed in a few lines of code, so a more lightweight solution without many kernel-to-userspace context switches would be preferable. This article will explain how IR messages are encoded, the structure of a BPF program, and how a BPF program can maintain state between invocations. It concludes with a look at the steps that are taken to end up with a button event, such as a volume-up key event.

    发表评论 查看更多 翻译此文

    收起

  • A man who paves India's roads with old plastic

    发表评论 查看更多 翻译此文

    收起

  • Historic Tale Construction Kit – Bayeux

    发表评论 查看更多 翻译此文

    收起

  •  

    Alan Smithee

    07-09 Hacker News 3

    Alan Smithee

    发表评论 查看更多 翻译此文

    收起

  • Dexter Filkins writes on the Assad regime’s attacks in and around Dara’a, in southern Syria, which is displacing hundreds of thousands of civilians, and which the U.S.’s persistent reluctance to involve itself in the Syrian war has allowed.

    发表评论 查看更多 翻译此文

    收起

  •  

    Why Mastercard Doesn't Use OAuth 2.0

    07-08 Hacker News 22

    Why Mastercard Doesn't Use OAuth 2.0

    发表评论 查看更多 翻译此文

    收起

  • CNET reported this week that a musician, who plays guitar and has lots of viewers on YouTube, received an unusual email from the company alleging that he had copied a tune he wrote himself two years ago. From the report: But last month, Paul Davids says he got a rather unusual email from YouTube. The Content ID system had flagged a tune he wrote himself, two years ago, for infringing on someone's else's newer video. Someone who, it seems, stole his backing track to create a new track of his own. [...] "Someone took my track, made their own track, uploaded it to Spotify, YouTube, whatever, and I get a copyright infringement notice? Wait, what?" said Davids. The story has a happy ending -- Davids used YouTube's appeals system to quickly work things out, and let the other artist keep on using his tune. (Davids tracked him down on Facebook Messenger, and the guy apparently admitted he'd downloaded 'a couple of guitar licks' on YouTube.) But it's weird to think YouTube would flag an old vid

    发表评论 查看更多 翻译此文

    收起

  •  

    Natural nuclear fission reactor

    07-08 Hacker News 20

    Natural nuclear fission reactor

    发表评论 查看更多 翻译此文

    收起

  • So Long TNT, There's a New Explosive in Town

    发表评论 查看更多 翻译此文

    收起

  • Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes

    发表评论 查看更多 翻译此文

    收起

  •  

    The State of Rust on Haiku

    07-07 Hacker News 23

    The State of Rust on Haiku

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader quotes a report from Engadget: If you're familiar with the phrase "that's a terrible idea, let's do it" then you might be one of the British MPs who think that the UK should do its own version of FOSTA-SESTA. That's exactly what Labour MP Sarah Champion has done by leading a debate this week for the creation of laws to criminalize websites used by sex workers in the UK -- under the rubric of fighting trafficking, of course. A self-appointed group of MPs (the "All-Party Parliamentary Group on Prostitution and the Global Sex Trade") fronted by Ms. Champion made a call to ban "prostitution websites" during a Wednesday House of Commons debate. Conflating sex work with trafficking just like their American counterparts, they claim websites where workers advertise and screen clients "directly and knowingly" profit from sex trafficking.

    发表评论 查看更多 翻译此文

    收起

  • A recently discovered hole in Valve's API allowed observers to generate extremely precise and publicly accessible data for the total number of players for thousands of Steam games. While Valve has now closed this inadvertent data leak, Ars can still provide the data it revealed as a historical record of the aggregate popularity of a large portion of the Steam library. From the report: The new data derivation method, as ably explained in a Medium post from The End Is Nigh developer Tyler Glaiel, centers on the percentage of players who have accomplished developer-defined Achievements associated with many games on the service. On the Steam web site, that data appears rounded to two decimal places. In the Steam API, however, the Achievement percentages were, until recently, provided to an extremely precise 16 decimal places. This added precision means that many Achievement percentages can only be factored into specific whole numbers. (This is useful since each game's player count must be

    发表评论 查看更多 翻译此文

    收起

  • Valve plugged the hole, but important data has already escaped.

    发表评论 查看更多 翻译此文

    收起

  • Your weekly selection of awesome robot videos

    发表评论 查看更多 翻译此文

    收起

  • Brian Phillips on the 2018 World Cup quarterfinal game between France and Uruguay.

    发表评论 查看更多 翻译此文

    收起

  •  

    Writing Iterators in Julia 0.7

    07-07 Hacker News 27

    Writing Iterators in Julia 0.7

    发表评论 查看更多 翻译此文

    收起

  •  

    Yes, Amazon Is Tracking People

    07-07 Hacker News 25

    Yes, Amazon Is Tracking People

    发表评论 查看更多 翻译此文

    收起

  • Stylish also stored search results and, by default, a unique identifier.

    发表评论 查看更多 翻译此文

    收起

  • $10K/successful Referral – Smarking (YC W15) Is Hiring Sr. Back End Eng in SF

    发表评论 查看更多 翻译此文

    收起

  • A website where opinions/posts don't get to the top based on likes from others

    发表评论 查看更多 翻译此文

    收起

  •  

    Amiga 600 FPGA Conversion

    07-07 Hacker News 25

    Amiga 600 FPGA Conversion

    发表评论 查看更多 翻译此文

    收起

  • An AI system for editing music in videos

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader quotes a report from the BBC: Professor Veena Sahajwalla's mine in Australia produces gold, silver and copper -- and there isn't a pick-axe in sight. Her "urban mine" at the University of New South Wales (UNSW) is extracting these materials not from rock, but from electronic gadgets. The Sydney-based expert in materials science reckons her operation will become efficient enough to be making a profit within a couple of years. "Economic modeling shows the cost of around $500,000 Australian dollars for a micro-factory pays off in two to three years, and can generate revenue and create jobs," she says. "That means there are environmental, social and economic benefits." In fact, research indicates that such facilities can actually be far more profitable than traditional mining. According to a study published recently in the journal Environmental Science & Technology, a typical cathode-ray tube TV contains about 450g of copper and 227g of aluminum, as well as around 5

    发表评论 查看更多 翻译此文

    收起

  • GlobaLeaks – The Open-Source Whistleblowing Software

    发表评论 查看更多 翻译此文

    收起

  • Kenya will reportedly use Alphabet's system of internet balloons to connect its rural population to the web. The balloons, known as Project Loon, were developed by Alphabet's X, the company's innovation lab. It was recently used by U.S. telecom operators to provide connectivity to people in Puerto Rico after a hurricane last year. Reuters reports: Joe Mucheru, the information, communication and technology minister, told Reuters on Wednesday that project representatives were holding talks with local telecom operators on the deployment of the technology. "The Loon team are still working out contracts and hopefully once that is done, we can be able to see almost every part of the country covered," he said. With more than 45 million people, Kenya's major cities and towns are covered by operator networks, but vast swathes of rural Kenya are not covered. "Loon is another technology that is being introduced that the licensed operators hopefully can be able to use," Mucheru said, adding it wou

    发表评论 查看更多 翻译此文

    收起

  • MacOS Mojave removes subpixel anti-aliasing

    发表评论 查看更多 翻译此文

    收起

  • Post Office owes $3.5M for using wrong Statue of Liberty on a stamp

    发表评论 查看更多 翻译此文

    收起

  • Research shows the difference between emotional and informational support

    发表评论 查看更多 翻译此文

    收起

  •  

    Spiders float using electric fields

    07-07 Hacker News 22

    Spiders float using electric fields

    发表评论 查看更多 翻译此文

    收起

  • Slashdot reader Dave Knott brings news: Steve Ditko, the legendary comics artist best known for co-creating Spider-Man and Doctor Strange, has died at age 90. No cause of death was announced. Neil Gaiman posted on Twitter, "I know I'm a different person because he was in the world." Entertainment Weekly reports: Ditko's most enduring characters were created during his tenure at Marvel Comics, where he worked alongside editor-in-chief Stan Lee to develop the look of Spider-Man in 1961. Jack Kirby had previously taken a swing at the webslinger, but Lee was unconvinced by that artist's interpretation of the now-iconic character. When Spider-Man -- whose red-and-blue costume, Spidey senses, and web-shooters all came directly from Ditko -- first appeared within the pages of Amazing Fantasy No. 15, the friendly neighborhood superhero proved a surprisingly massive hit for Marvel Comics, paving the way for a solo comic series titled The Amazing Spider-Man. Ditko's influence on Spider-Man w

    发表评论 查看更多 翻译此文

    收起

  • The failed quest to bring smells to the internet

    发表评论 查看更多 翻译此文

    收起

  •  

    An extensive ZFS setup on MacOS

    07-07 Hacker News 19

    An extensive ZFS setup on MacOS

    发表评论 查看更多 翻译此文

    收起

  • Interfacing with native methods on Graal VM

    发表评论 查看更多 翻译此文

    收起

  • MacOS Mojave removes subpixel anti-aliasing, making non-retina displays blurry

    发表评论 查看更多 翻译此文

    收起

  • Show HN: Upcall – Triggered Human Phone Calls

    发表评论 查看更多 翻译此文

    收起

  •  

    Slack client for Commodore 64 (2016)

    07-07 Hacker News 21

    Slack client for Commodore 64 (2016)

    发表评论 查看更多 翻译此文

    收起

  • The Bay Area’s tech boom in historical and social context

    发表评论 查看更多 翻译此文

    收起

  • This week’s most thought-provoking papers from the Physics arXiv.

    发表评论 查看更多 翻译此文

    收起

  • Michael Schulman on “Whitney,” a new documentary about the singer Whitney Houston, directed by Kevin Macdonald.

    发表评论 查看更多 翻译此文

    收起

  • The Neutral Theory in Light of Natural Selection

    发表评论 查看更多 翻译此文

    收起

  • According to The Washington Post, Twitter has suspended 70 million accounts in the past two months as part of a crackdown on malicious activity on its platform. "The rate of suspensions for May and June is reportedly twice the company's October 2017 suspension rate," reports The Verge. From the report: In a blog post last month, Twitter said it had been working to improve its safety policies, and that its "systems identified and challenged more than 9.9 million potentially spammy or automated accounts per week." The Post reports that the change in enforcement could cause a decline in users for the company's second quarter, although a Twitter executive told the publication that many of the accounts rarely tweeted, and would therefore not dramatically impact the company's active user count. A Twitter spokesperson said in a statement to The Verge that the company noted in its first-quarter shareholder letter this year that âoeongoing information quality effortsâ had negatively i

    发表评论 查看更多 翻译此文

    收起

  •  

    Welcome to Zucktown!

    07-07 THE NEW YORKER 19

    Max Cohn humorously imagines an I.R.L. version of Facebook.

    发表评论 查看更多 翻译此文

    收起

  • Slashdot reader yeokm1 recently installed Linux on a 1993 PC. But in a new blog post he lists every keyboard he's owned over the last 12 years -- to explain why he's now typing on a 5.3-pound Model M keyboard from 1987 that's older than he is, "with its legendary buckling-spring switch." It'll probably last me the decades to the day that keyboards should become obsolete... It is sad that with all the advancements in computing, the one piece of equipment that we use the most to interact with our computers has regressed technologically in the name of costs. We don't usually expect to be using 30-year-old hardware on a daily productive basis but the IBM Model M keyboard is that exception. Today, I don't really care about fancy features like great aesthetics, RGB backlights, media keys and extra USB ports. I just need something that gives me great tactile feedback, be durable, enable me to easily swap keys to fit my Programmer Dvorak layout. The Model M fits my needs perfectly. "Really c

    发表评论 查看更多 翻译此文

    收起

  •  

    52-hertz whale

    07-07 Hacker News 21

    52-hertz whale

    发表评论 查看更多 翻译此文

    收起

  • We study $(\sigma,\tau)$-derivations of a group ring $RG$ of a finite group $G$ over an integral domain $R$ with $1$. As an application we extend a well known result on derivation of an integral group ring $\Bbb{Z}G$ to $(\sigma,\tau)$-derivation on it for a finite group $G$ with some conditions on $\sigma$ and $\tau$. In the process of the extension, a generalization of an application of Skolem-Noether Theorem to derivation on a finite dimensional central simple algebra has also been given for the $(\sigma,\tau)$-derivation case.

    发表评论 查看更多 翻译此文

    收起

  • The $P$-partition generating function of a (naturally labeled) poset $P$ is a quasisymmetric function enumerating order-preserving maps from $P$ to $\mathbb{Z}^+$. Using the Hopf algebra of posets, we give necessary conditions for two posets to have the same generating function. In particular, we show that they must have the same number of antichains of each size, as well as the same shape (as defined by Greene). We also discuss which shapes guarantee uniqueness of the $P$-partition generating function and give a method of constructing pairs of non-isomorphic posets with the same generating function.

    发表评论 查看更多 翻译此文

    收起

  • Reduced Rank Extrapolation (RRE) is a polynomial type method used to accelerate the convergence of sequences of vectors $\{\xx_m\}$. It is applied successfully in different disciplines of science and engineering in the solution of large and sparse systems of linear and nonlinear equations of very large dimension. If $\sss$ is the solution to the system of equations $\xx=\ff(\xx)$, first, a vector sequence $\{\xx_m\}$ is generated via the fixed-point iterative scheme $\xx_{m+1}=\ff(\xx_m)$, $m=0,1,\ldots,$ and next, RRE is applied to this sequence to accelerate its convergence. RRE produces approximations $\sss_{n,k}$ to $\sss$ that are of the form $\sss_{n,k}=\sum^k_{i=0}\gamma_i\xx_{n+i}$ for some scalars $\gamma_i$ depending (nonlinearly) on $\xx_n, \xx_{n+1},\ldots,\xx_{n+k+1}$ and satisfying $\sum^k_{i=0}\gamma_i=1$. The convergence properties of RRE when applied in conjunction with linear $\ff(\xx)$ have been analyzed in different publications. In this work, we discuss the converg

    发表评论 查看更多 翻译此文

    收起

  • We devise and evaluate numerically a Hybrid High-Order (HHO) method for incremental associative plasticity with small deformations. The HHO method uses as discrete unknowns piecewise polynomials of order $k\ge1$ on the mesh skeleton, together with cell-based polynomials that can be eliminated locally by static condensation. The HHO method supports polyhedral meshes with non-matching interfaces, is free of volumetric-locking and the integration of the behavior law is performed only at cell-based quadrature nodes. Moreover, the principle of virtual work is satisfied locally with equilibrated tractions. Various two- and three-dimensional test cases from the literature are presented including comparison against known solutions and against results obtained with an industrial software using conforming and mixed finite elements.

    发表评论 查看更多 翻译此文

    收起

  • Neural network decoding algorithms are recently introduced by Nachmani et al. to decode high-density parity-check (HDPC) codes. In contrast with iterative decoding algorithms such as sum-product or min-sum algorithms in which the weight of each edge is set to $1$, in the neural network decoding algorithms, the weight of every edge depends on its impact in the transmitted codeword. In this paper, we provide a novel \emph{feed-forward neural network lattice decoding algorithm} suitable to decode lattices constructed based on Construction A, whose underlying codes have HDPC matrices. We first establish the concept of feed-forward neural network for HDPC codes and improve their decoding algorithms compared to Nachmani et al. We then apply our proposed decoder for a Construction A lattice with HDPC underlying code, for which the well-known iterative decoding algorithms show poor performances. The main advantage of our proposed algorithm is that instead of assigning and training weights for

    发表评论 查看更多 翻译此文

    收起

  • For source sequences of length L symbols we proposed to use a more realistic value to the usual benchmark of number of code letters by source letters. Our idea is based on a quantifier of information fluctuation of a source, F(U), which corresponds to the second central moment of the random variable that measures the information content of a source symbol. An alternative interpretation of typical sequences is additionally provided through this approach.

    发表评论 查看更多 翻译此文

    收起

  • A posteriori error analysis is a technique to quantify the error in particular simulations of a numerical approximation method. In this article, we use such an approach to analyze how various error components propagate in certain moving boundary problems. We study quasi-steady state simulations where slowly moving boundaries remain in mechanical equilibrium with a surrounding fluid. Such problems can be numerically approximated with the Method of Regularized Stokelets(MRS), a popular method used for studying viscous fluid-structure interactions, especially in biological applications. Our approach to monitoring the regularization error of the MRS is novel, along with the derivation of linearized adjoint equations to the governing equations of the MRS with a elastic elements. Our main numerical results provide a clear illustration of how the error evolves over time in several MRS simulations.

    发表评论 查看更多 翻译此文

    收起

  • This paper considers solving convex quadratic programs (QPs) in a real-time setting using a regularized and smoothed Fischer-Burmeister method (FBRS). The Fischer-Burmeister function is used to map the optimality conditions of the quadratic program to a nonlinear system of equations which is solved using Newton's method. Regularization and smoothing are applied to improve the practical performance of the algorithm and a merit function is used to globalize convergence. FBRS is simple to code, easy to warmstart, robust to early termination, and has attractive theoretical properties, making it appealing for real-time and embedded applications. Numerical experiments using several predictive control examples show that the proposed method is competitive with other state of the art solvers.

    发表评论 查看更多 翻译此文

    收起

  • The column-and-constraint generation (CCG) method was introduced by \citet{Zeng2013} for solving two-stage adaptive optimization. We found that the CCG method is quite scalable, but sometimes, and in some applications often, produces infeasible first-stage solutions, even though the problem is feasible. In this research, we extend the CCG method in a way that (a) maintains scalability and (b) always produces feasible first-stage decisions if they exist. We compare our method to several recently proposed methods and find that it reaches high accuracies faster and solves significantly larger problems.

    发表评论 查看更多 翻译此文

    收起

  • Bayesian optimization is an approach to optimizing objective functions that take a long time (minutes or hours) to evaluate. It is best-suited for optimization over continuous domains of less than 20 dimensions, and tolerates stochastic noise in function evaluations. It builds a surrogate for the objective and quantifies the uncertainty in that surrogate using a Bayesian machine learning technique, Gaussian process regression, and then uses an acquisition function defined from this surrogate to decide where to sample. In this tutorial, we describe how Bayesian optimization works, including Gaussian process regression and three common acquisition functions: expected improvement, entropy search, and knowledge gradient. We then discuss more advanced techniques, including running multiple function evaluations in parallel, multi-fidelity and multi-information source optimization, expensive-to-evaluate constraints, random environmental conditions, multi-task Bayesian optimization, and the in

    发表评论 查看更多 翻译此文

    收起

  • We give a combinatorial construction of an ordered semiring A, and show that it can be identified with a certain subquotient of the semiring of p-local Bousfield classes, containing almost all of the classes that have previously been named and studied. This is a convenient way to encapsulate most of the known results about Bousfield classes.

    发表评论 查看更多 翻译此文

    收起

  • In this article we define the first Dirichlet eigenvalue for the fractional $g-$Laplacian and we prove diverse properties on it, including isolation, positivity of its eigenfunctions and its behaviour as $s\to 1^+$. In the second part of this manuscript we prove some modular and norm Hardy inequalities in fractional Orlicz-Sobolev spaces, which provide for lower bounds of eigenvalues in certain configurations.

    发表评论 查看更多 翻译此文

    收起

  • We develop a general, functional calculus approach to approximation of $C_0$-semigroups on Banach spaces by bounded completely monotone functions of their generators. The approach comprises most of well-known approximation formulas, yields optimal convergence rates, and sometimes even leads to sharp constants. In an important particular case when semigroups are holomorphic, we are able to significantly improve our results for general semigroups. Moreover, we present several second order approximation formulas with rates, which in such a general form appear in the literature for the first time.

    发表评论 查看更多 翻译此文

    收起

  • We study stochastic Amari-type neural field equations, which are mean-field models for neural activity in the cortex. We prove that under certain assumptions on the coupling kernel, the neural field model can be viewed as a gradient flow in a nonlocal Hilbert space. This makes all gradient-flow methods available for the analysis, which could previously not be used, as it was not known, whether a rigorous gradient flow formulation exists. We show that the equation is well-posed in the nonlocal Hilbert space in the sense that solutions starting in this space also remain in it for all times and space-time regularity results hold for the case of spatially correlated noise. Uniqueness of invariant measures and ergodic properties for the associated Feller semigroups are also discussed.

    发表评论 查看更多 翻译此文

    收起

  • A high-order finite difference numerical scheme is developed for the ideal magnetohydrodynamic equations based on an alternative flux formulation of the weighted essentially non-oscillatory (WENO) scheme. It computes a high-order numerical flux by a Taylor expansion in space, with the lowest-order term solved from a Riemann solver and the higher-order terms constructed from physical fluxes by limited central differences. The scheme coupled with several Riemann solvers, including a Lax-Friedrichs solver and HLL-type solvers, is developed on general curvilinear meshes in two dimensions and verified on a number of benchmark problems. In particular, a HLLD solver on Cartesian meshes is extended to curvilinear meshes with proper modifications. A numerical boundary condition for the perfect electrical conductor (PEC) boundary is derived for general geometry and verified through a bow shock flow. Numerical results also confirm the advantages of using low dissipative Riemann solvers in the cur

    发表评论 查看更多 翻译此文

    收起

  • We consider the following distributed service model: jobs with unit mean, general distribution, and independent processing times arrive as a renewal process of rate $\lambda n$, with $0<\lambda<1$, and are immediately dispatched to one of several queues associated with $n$ identical servers with unit processing rate. We assume that the dispatching decisions are made by a central dispatcher endowed with a finite memory, and with the ability to exchange messages with the servers. We study the fundamental resource requirements (memory bits and message exchange rate), in order to drive the expected queueing delay in steady-state of a typical job to zero, as $n$ increases. We develop a novel approach to show that, within a certain broad class of "symmetric" policies, every dispatching policy with a message rate of the order of $n$, and with a memory of the order of $\log n$ bits, results in an expected queueing delay which is bounded away from zero, uniformly as $n\to\infty$.

    发表评论 查看更多 翻译此文

    收起

  • Gunningham [G] constructed an extended topological quantum field theory (TQFT) to obtain a closed formula for all spin Hurwitz numbers. In this note, we use the gluing theorem in [LP2] to re-prove the Gunningham's formula. We also describe a TQFT formalism naturally induced from the gluing theorem.

    发表评论 查看更多 翻译此文

    收起

  • The goal of this note is to study the smallest conic singular value of a matrix from a Lagrangian duality viewpoint and provide an efficient method for its computation.

    发表评论 查看更多 翻译此文

    收起

  • The purpose of this note is to record a consequence, for general metric spaces, of a recent result of David Bate. We prove the following fact: Let $X$ be a compact metric space of topological dimension $n$. Suppose that the $n$-dimensional Hausdorff measure of $X$, $\mathcal H^n(X)$, is finite. Suppose further that the lower n-density of the measure $\mathcal H^n$ is positive, $\mathcal H^n$-almost everywhere in $X$. Then $X$ contains an $n$-rectifiable subset of positive $\mathcal H^n$-measure. Moreover, the assumption on the lower density is unnecessary if one uses recently announced results of Cs\"ornyei-Jones.

    发表评论 查看更多 翻译此文

    收起

  • A perturbational vector duality approach for objective functions $f\colon X\to \bar{L}^0$ is developed, where $X$ is a Banach space and $\bar{L}^0$ is the space of extended real valued functions on a measure space, which extends the perturbational approach from the scalar case. The corresponding strong duality statement is proved under a closedness type regularity condition. Optimality conditions and a Moreau-Rockafellar type formula are provided. The results are specialized for constrained and unconstrained problems. Examples of integral operators and risk measures are discussed.

    发表评论 查看更多 翻译此文

    收起