We study the stability of three-dimensional incompressible Weyl semimetals in
the presence of random quenched charge impurities. Using numerical analysis and
scaling theory we show that in the presence of sufficiently weak randomness (i)
Weyl semimetal remains stable, while (ii) the double-Weyl semimetal gives rise
to compressible diffusive metal where the mean density of states at vanishing
energy is finite. At stronger disorder, Weyl semimetal undergoes a quantum
phase transition and enter into a metallic phase. Mean density of states at
zero energy serves as the order parameter and displays single-parameter scaling
across such disorder driven phase transition. We numerically determine various
exponents at the critical point, which appear to be insensitive to the number
of Weyl pairs, and also extract the extent of the quantum critical regime at
finite energy.
Given a proper total $k$-coloring $c$ of a graph $G$, we define the
\emph{value} of a vertex $v$ to be $c(v) + \sum_{uv \in E(G)} c(uv)$. The
smallest integer $k$ such that $G$ has a proper total $k$-coloring whose values
form a proper coloring is the \emph{neighbor sum distinguishing total chromatic
number} $\chi"_{\Sigma}(G)$. Pil\’sniak and Wo\’zniak (2013) conjectured that
$\chi"_{\Sigma}(G)\leq \Delta(G)+3$ for any simple graph with maximum degree
$\Delta(G)$. In this paper, we prove that this bound to be asymptotically
correct by showing that $\chi"_{\Sigma}(G)\leq \Delta(G)(1+o(1))$. The main
idea of our argument relies on Przyby{\l}o’s proof (2014) for neighbor sum
distinguishing edge-coloring.
We calculate the so-called Rademacher’s Grand Lebesgue Space norm for a
centered (shifted) indicator (Bernoulli’s, binary) random variable.
This norm is optimal for the centered and bounded random variables (r.v.).
Using this result we derive a very simple bilateral sharp exponential tail
estimates for sums of these variables, not necessary to be identical
distributed, under non-standard norming, and give some examples to show the
exactness of our estimates.
We study the problem of minimizing the average of $N$ convex functions using
$m$ machines with each machine being able to access $n=\frac{N}{m}$ functions.
We design a distributed stochastic variance reduced gradient (DSVRG) algorithm
which, when the condition number $\kappa$ of the problem is less than $n^{0.9}$
and when the data is assumed to be randomly partitioned onto the machines,
simultaneously achieves the optimal parallel runtime, communication and rounds
of communication among all first order methods up to constant factors. DSVRG
and its extension DPPASVRG also outperform existing distributed algorithms in
terms of the rounds of communication as long as $\kappa$ is not too large
compared to $n$. For the regime when $n$ is relatively small, we propose a
distributed accelerated SVRG algorithm which further reduces the parallel
runtime.
The MM principle is a device for creating optimization algorithms satisfying
the ascent or descent property. The current survey emphasizes the role of the
MM principle in nonlinear programming. For smooth functions, one can construct
an adaptive interior point method based on scaled Bregmann barriers. This
algorithm does not follow the central path. For convex programming subject to
nonsmooth constraints, one can combine an exact penalty method with distance
majorization to create versatile algorithms that are effective even in discrete
optimization. These proximal distance algorithms are highly modular and reduce
to set projections and proximal mappings, both very well-understood techniques
in optimization. We illustrate the possibilities in linear programming, binary
piecewise-linear programming, nonnegative quadratic programming, $\ell_0$
regression, matrix completion, and inverse sparse covariance estimation.
G-Brownian motion has a very rich and interesting new structure which
nontrivially generalizes the classical one. Its quadratic variation process is
also a continuous process with independent and stationary increments. We prove
a self-normalized functional central limit theorem for independent and
identically distributed random variables under the sub-linear expectation with
the limit process being a G-Browian motion self-normalized by its quadratic
variation. To prove the self-normalized central limit theorem, we also
establish a new Donsker’s invariance principle.
In this paper, we consider fully-online construction of indexing data
structures for multiple texts. Let T = {T_1, …, T_K} be a collection of
texts. By fully on-line, we mean that a new character can be appended to any
text in T at any time. This is a natural generalization of semi-online
construction of indexing data structures for multiple texts in which, after a
new character is appended to the kth text T_k, then its previous texts T_1,
…, T_{k-1} will remain static. Our fully online scenario arises when we index
multi-sensor data. We propose fully online algorithms which construct the
directed acyclic word graph (DAWG) and the generalized suffix tree (GST) for T
in O(N log \sigma) time and O(N) space, where N and \sigma denote the total
length of texts in T and the alphabet size, respectively.
The aim of this work is to introduce several different volume computation
methods of the graph polytope associated with various type of finite simple
graphs. Among them, we obtained the recursive volume formula (RVF) that is
fundamental and most useful to compute the volume of the graph polytope for an
arbitrary finite simple graph.
We develop tools for analyzing focused stochastic local search algorithms.
These are algorithms which search a state space probabilistically by repeatedly
selecting a constraint that is violated in the current state and moving to a
random nearby state which, hopefully, addresses the violation without
introducing many new ones. A large class of such algorithms arise from the
algorithmization of the Lov\’asz Local Lemma, a non-constructive tool for
proving the existence of satisfying states. Here we give tools that provide a
unified analysis of such algorithms and of many more, expressing them as
instances of a general framework.
Model counting is the task of computing the number of assignments to
variables V that satisfy a given propositional theory F. Model counting is an
essential tool in probabilistic reasoning. In this paper, we introduce the
problem of model counting projected on a subset P of original variables that we
call ‘priority’ variables. The task is to compute the number of assignments to
P such that there exists an extension to ‘non-priority’ variables V\P that
satisfies F. Projected model counting arises when some parts of the model are
irrelevant to the counts, in particular when we require additional variables to
model the problem we are counting in SAT. We discuss three different approaches
to projected model counting (two of which are novel), and compare their
performance on different benchmark problems.
To appear in 18th International Conference on Theory and Applications of
Satisfiability Testing, September 24-27, 2015, Austin, Texas, USA
We develop two new estimators for a general class of stationary GARCH models
with possibly heavy tailed asymmetrically distributed errors, covering
processes with symmetric and asymmetric feedback like GARCH, Asymmetric GARCH,
VGARCH and Quadratic GARCH. The first estimator arises from negligibly trimming
QML criterion equations according to error extremes. The second imbeds
negligibly transformed errors into QML score equations for a Method of Moments
estimator. In this case, we exploit a sub-class of redescending transforms that
includes tail-trimming and functions popular in the robust estimation
literature, and we re-center the transformed errors to minimize small sample
bias. The negligible transforms allow both identification of the true parameter
and asymptotic normality. We present a consistent estimator of the covariance
matrix that permits classic inference without knowledge of the rate of
convergence. A simulation study shows both of our estimators trump existing
ones for sharpness and approximate normality including QML, Log-LAD, and two
types of non-Gaussian QML (Laplace and Power-Law). Finally, we apply the
tail-trimmed QML estimator to financial data.
We briefly review the generalized dynamical mean-field theory DMFT+Sigma
treatment of both repulsive and attractive disordered Hubbard models. We
examine the general problem of metal-insulator transition and the phase diagram
in repulsive case, as well as BCS-BEC crossover region of attractive model,
demonstrating certain universality of single – electron properties under
disordering in both models. We also discuss and compare the results for the
density of states and dynamic conductivity in both repulsive and attractive
case and the generalized Anderson theorem behavior for superconducting critical
temperature in disordered attractive case. A brief discussion of Ginzburg –
Landau coefficients behavior under disordering in BCS-BEC crossover region is
also presented.
We give yet-another illustration of using Herb Wilf’s Snake Oil Method, by
proving a certain identity between the entries of the so-called Motzkin
Triangle, that arose in a recent study of enumeration of certain classes of
integer partitions. We also briefly illustrate how this method can be applied
to general `triangles’.
We introduce the exchangeable rewiring process for modeling time-varying
networks. The process fulfills fundamental mathematical and statistical
properties and can be easily constructed from the novel operation of random
rewiring. We derive basic properties of the model, including consistency under
subsampling, exchangeability, and the Feller property. A reversible sub-family
related to the Erd\H{o}s-R\'{e}nyi model arises as a special case.
In this paper, we study modulus of continuity and rate of convergence of
series of conditionally sub-Gaussian random fields. This framework includes
both classical series representations of Gaussian fields and LePage series
representations of stable fields. We enlighten their anisotropic properties by
specify our assumptions in the case of shot noise series where arrival times of
a Poisson process are involved. This allows us to state unified results for
harmonizable (multi)operator scaling stable random fields through their LePage
series representation, as well as to study sample path properties of their
multistable analogous.
In this paper, we consider the sum-product problem of obtaining lower bounds
for the size of the set $latex$\frac{A+A}{A+A}:=\left \{ \frac{a+b}{c+d} : a,b,c,d
\in A, c+d \neq 0 \right\},$latex$ for an arbitrary finite set $A$ of real numbers.
The main result is the bound
$A$\left| \frac{A+A}{A+A} \right| \gg
\frac{|A|^{2+\frac{1}{15}}}{|A:A|^{\frac{1}{30}}\log |A|},$A$ where $A:A$
denotes the ratio set of $A$. This improves on a result of Balog and the author
(arXiv:1402.5775), provided that the size of the ratio set is subquadratic in
$|A|$. That is, we establish that the inequality $|A|$\left| \frac{A+A}{A+A}
\right| \ll |A|^{2} \Rightarrow |A:A| \gg \frac{ |A|^2}{\log^{30}|A|} . $|A|$ This
extremal result answers a question similar to some conjectures in a recent
paper of the author and Zhelezov (arXiv:1410.1156).
Consider an insurance company exposed to a stochastic economic environment
that contains two kinds of risk. The first kind is the insurance risk caused by
traditional insurance claims, and the second kind is the financial risk
resulting from investments. Its wealth process is described in a standard
discrete-time model in which, during each period, the insurance risk is
quantified as a real-valued random variable $X$ equal to the total amount of
claims less premiums, and the financial risk as a positive random variable $Y$
equal to the reciprocal of the stochastic accumulation factor. This risk model
builds an efficient platform for investigating the interplay of the two kinds
of risk. We focus on the ruin probability and the tail probability of the
aggregate risk amount. Assuming that every convex combination of the
distributions of $X$ and $Y$ is of strongly regular variation, we derive some
precise asymptotic formulas for these probabilities with both finite and
infinite time horizons, all in the form of linear combinations of the tail
probabilities of $X$ and $Y$. Our treatment is unified in the sense that no
dominating relationship between $X$ and $Y$ is required.
The Stackelberg equilibrium solution concept describes optimal strategies to
commit to: Player 1 (termed the leader) publicly commits to a strategy and
Player 2 (termed the follower) plays a best response to this strategy (ties are
broken in favor of the leader). We study Stackelberg equilibria in finite
sequential games (or extensive-form games) and provide new exact algorithms,
approximate algorithms, and hardness results for several classes of these
sequential games.
We introduce the “NoBackTrack” algorithm to train the parameters of dynamical
systems such as recurrent neural networks. This algorithm works in an online,
memoryless setting, thus requiring no backpropagation through time, and is
scalable, avoiding the large computational and memory cost of maintaining the
full gradient of the current state with respect to the parameters.
The algorithm essentially maintains, at each time, a single search direction
in parameter space. The evolution of this search direction is partly stochastic
and is constructed in such a way to provide, at every time, an unbiased random
estimate of the gradient of the loss function with respect to the parameters.
Because the gradient estimate is unbiased, on average over time the parameter
is updated as it should.
The resulting gradient estimate can then be fed to a lightweight Kalman-like
filter to yield an improved algorithm. For recurrent neural networks, the
resulting algorithms scale linearly with the number of parameters.
Preliminary tests on a simple task show that the stochastic approximation of
the gradient introduced in the algorithm does not seem to introduce too much
noise in the trajectory, compared to maintaining the full gradient, and confirm
the good performance and scalability of the Kalman-like version of NoBackTrack.
There is a long history in game theory on the topic of Bayesian or “rational”
learning, in which players maintain beliefs over a set of alternative
behaviours, or types. This idea has gained increasing interest in the AI
community, where it is used to control a single agent in a system composed of
multiple agents with unknown behaviours. The idea is to hypothesise a set of
types, each specifying a possible behaviour for the other agents, and to plan
our own actions with respect to those types which we believe are most likely,
based on the observed actions. The game theory literature studies this idea
primarily in the context of equilibrium attainment. In contrast, many AI
applications have a focus on task completion and payoff maximisation, which
renders the game theory literature on this subject of limited applicability.
With this perspective in mind, we identify and address a spectrum of questions
pertaining to belief and truth in hypothesised types. We formulate three basic
ways to incorporate evidence into posterior beliefs and show when the resulting
beliefs are correct, and when they may fail to be correct. Moreover, we
demonstrate that prior beliefs can have a significant impact on our ability to
maximise payoffs in the long-term, and that they can be computed automatically
with consistent performance effects. Furthermore, we analyse the conditions
under which we are able complete our task optimally, despite inaccuracies in
the hypothesised types. Finally, we show how the correctness of hypothesised
types can be ascertained during the interaction via an automated statistical
analysis.
A HIST of a connected graph is a spanning tree without vertices of degree
two. We provide a necessary condition for the existence of a HIST in cubic
graphs. As one consequence, we answer affirmatively an open question on HISTs
by Albertson, Berman, Hutchinson and Thomassen.
We revisit Kellerer’s Theorem, that is, we show that for a family of real
probability distributions $(\mu_t)_{t\in [0,1]}$ which increases in convex
order there exists a Markov martingale $(S_t)_{t\in[0,1]}$ s.t.\ $S_t\sim \mu_t$.
To establish the result, we observe that the set of martingale measures with
given marginals carries a natural compact Polish topology. Based on a
particular property of the martingale coupling associated to Root’s embedding
this allows for a relatively concise proof of Kellerer’s theorem.
We emphasize that many of our arguments are borrowed from Kellerer
\cite{Ke72}, Lowther \cite{Lo07}, and Hirsch-Roynette-Profeta-Yor
\cite{HiPr11,HiRo12}.
In this paper, we extend Stein’s method to products of independent beta,
gamma, generalised gamma and mean zero normal random variables. In particular,
we obtain Stein characterisations for mixed products of these distributions,
which include the classical beta, gamma and normal characterisations as special
cases. These characterisations, lead us to closed form formulas, involving the
Meijer $G$-function, for the probability density function and characteristic
function of the mixed product of independent beta, gamma and central normal
random variables.
We revisit the celebrated family of BDG-inequalities introduced by
Burkholder, Gundy \cite{BuGu70} and Davis \cite{Da70} for continuous
martingales. For the inequalities $\mathbb{E}[\tau^{\frac{p}{2}}] \leq C_p \mathbb{E}[(B^*(\tau))^p]$ with $0 < p < 2$ we propose a connection of the
optimal constant $C_p$ with an ordinary integro-differential equation which
gives rise to a numerical method of finding this constant. Based on numerical
evidence we are able to calculate, for $p=1$, the explicit value of the optimal
constant $C_1$, namely $C_1 = 1,27267\dots$. In the course of our analysis, we
find a remarkable appearance of “non-smooth pasting” for a solution of a
related ordinary integro-differential equation.
We study the problem of enumerating all rooted directed spanning trees
(arborescences) of a directed graph (digraph) $G=(V,E)$ of $n$ vertices. An
arborescence $A$ consisting of edges $e_1,\ldots,e_{n-1}$ can be represented as
a monomial $e_1\cdot e_2 \cdots e_{n-1}$ in variables $e \in E$. All
arborescences $\mathsf{arb}(G)$ of a digraph then define the Kirchhoff
polynomial $\sum_{A \in \mathsf{arb}(G)} \prod_{e\in A} e$. We show how to
compute a compact representation of the Kirchhoff polynomial — its prime
factorization, and how it relates to combinatorial properties of digraphs such
as strong connectivity and vertex domination. In particular, we provide digraph
decomposition rules that correspond to factorization steps of the polynomial,
and also give necessary and sufficient primality conditions of the resulting
factors expressed by connectivity properties of the corresponding decomposed
components. Thereby, we obtain a linear time algorithm for decomposing a
digraph into components corresponding to factors of the initial polynomial, and
a guarantee that no finer factorization is possible. The decomposition serves
as a starting point for a recursive deletion-contraction algorithm, and also as
a preprocessing phase for iterative enumeration algorithms. Both approaches
produce a compressed output and retain some structural properties in the
resulting polynomial. This proves advantageous in practical applications such
as calculating steady states on digraphs governed by Laplacian dynamics, or
computing the greatest common divisor of Kirchhoff polynomials. Finally, we
initiate the study of a class of digraphs which allow for a practical
enumeration of arborescences. Using our decomposition rules we observe that
various digraphs from real-world applications fall into this class or are
structurally similar to it.
The purpose of this paper is to show that the use of heavy-tailed
distributions in Financial problems is theoretically baseless and can lead to
significant misunderstandings. The reason for this the authors see in an
incorrect interpretation of the concept of the distributional tail. In
accordance with this, in applications it is necessary to use instead of the
distributional tail the “smearing” of its central part. keywords: heavy tailed
distributions, exponential tails, pre-limit theorems, Financial indexes
As standardly implemented in R or in the Tetrad program, causal search
algorithms that have been most widely or effectively used in scientific
problems have severe dimensionality constraints. However, implementation
improvements are possible that extend the feasible dimensionality of search
problems by several orders of magnitude. We describe optimizations for the
Greedy Equivalence Search (GES) that allow search on 50,000 variable problems
in 13 minutes for sparse models with 1000 samples, on a 4 processor 8G laptop
computer, and in 18 hours for sparse models with 1000 samples on 1,000,000
variables on a supercomputer node at the Pittsburgh Supercomputing Center with
40 processors and 384 G RAM, on data generated i.i.d. from a linear, Gaussian
model.
Natural disasters may have considerable impact on society as well as on
(re)insurance industry. Max-stable processes are ideally suited for the
modeling of the spatial extent of such extreme events, but it is often assumed
that there is no temporal dependence. Only a few papers have introduced
spatio-temporal max-stable models, extending the Smith, Schlather and
Brown-Resnick spatial processes. These models suffer from two major drawbacks:
time plays a similar role as space and the temporal dynamics is not explicit.
In order to overcome these defects, we introduce spatio-temporal max-stable
models where we partly decouple the influence of time and space in their
spectral representations. We introduce both continuous and discrete-time
versions. We then consider particular Markovian cases with a max-autoregressive
representation and discuss their properties. Finally, we briefly propose an
inference methodology which is tested through a simulation study.
A new quantile regression concept, based on a directional version of Koenker
and Bassett’s traditional single-output one, has been introduced in [Ann.
Statist. (2010) 38 635-669] for multiple-output location/linear regression
problems. The polyhedral contours provided by the empirical counterpart of that
concept, however, cannot adapt to unknown nonlinear and/or heteroskedastic
dependencies. This paper therefore introduces local constant and local linear
(actually, bilinear) versions of those contours, which both allow to
asymptotically recover the conditional halfspace depth contours that completely
characterize the response’s conditional distributions. Bahadur representation
and asymptotic normality results are established. Illustrations are provided
both on simulated and real data.
We show that on every vertex-transitive graph $G$ of polynomial growth with
isoperimetric dimension dim$(G) > 1$ we have $p_c(G) < 1$. In other words,
there exists a percolative phase for site percolation on $G$. This gives a
partial answer to a question posed by Benjamini and Schramm in [BS96, Question
2].
In this paper, we analyze the local clustering coefficient of preferential
attachment models. A general approach to preferential attachment was introduced
in earlier, where a wide class of models (PA-class) was defined in terms of
constraints that are sufficient for the study of the degree distribution and
the clustering coefficient. It was previously shown that the degree
distribution in all models of the PA-class follows a power law. Also, the
global clustering coefficient was analyzed and a lower bound for the average
local clustering coefficient was obtained. We expand the results by analyzing
the local clustering coefficient for the PA-class of models. Namely, we analyze
the behavior of C(d) which is the average local clustering for the vertices of
degree d.
We present an iterative algorithm for solving a class of \\nonlinear
Laplacian system of equations in $\tilde{O}(k^2m \log(kn/\epsilon))$
iterations, where $k$ is a measure of nonlinearity, $n$ is the number of
variables, $m$ is the number of nonzero entries in the graph Laplacian $L$,
$\epsilon$ is the solution accuracy and $\tilde{O}()$ neglects (non-leading)
logarithmic terms. This algorithm is a natural nonlinear extension of the one
by of Kelner et. al., which solves a linear Laplacian system of equations in
nearly linear time. Unlike the linear case, in the nonlinear case each
iteration takes $\tilde{O}(n)$ time so the total running time is
$\tilde{O}(k^2mn \log(kn/\epsilon))$. For sparse graphs where $m = O(n)$ and
fixed $k$ this nonlinear algorithm is $\tilde{O}(n^2 \log(n/\epsilon))$ which
is slightly faster than standard methods for solving linear equations, which
require approximately $O(n^{2.38})$ time. Our analysis relies on the
construction of a nonlinear “energy function” and a nonlinear extension of the
duality analysis of Kelner et. al to the nonlinear case without any explicit
references to spectral analysis or electrical flows. These new insights and
results provide tools for more general extensions to spectral theory and
nonlinear applications.
For a class of large closed Jackson networks submitted to capacity
constraints, asymptotic independence of the nodes in normal traffic phase is
proved at stationarity under mild assumptions, using a Local Limit Theorem. The
limiting distributions of the queues are explicit. In the Statistical Mechanics
terminology, the equivalence of ensembles – canonical and grand canonical – is
proved for specific marginals. The framework includes the case of networks with
two types of nodes: single server/finite capacity nodes and infinite
servers/infinite capacity nodes, that can be taken as basic models for
bike-sharing systems. The effect of local saturation is modeled by generalized
blocking and rerouting procedures, under which the stationary state is proved
to have product-form. The grand canonical approximation can then be used for
adjusting the total number of bikes and the capacities of the stations to the
expected demand.
The process of dynamic state estimation (filtering) based on point process
observations is in general intractable. Numerical sampling techniques are often
encoding/decoding strategies, which are of significant relevance to
Computational Neuroscience. We develop an analytically tractable Bayesian
approximation to optimal filtering based on point process observations, which
allows us to introduce distributional assumptions about sensory cell
properties, that greatly facilitates the analysis of optimal encoding in
situations deviating from common assumptions of uniform coding. The analytic
framework leads to insights which are difficult to obtain from numerical
algorithms, and is consistent with experiments about the distribution of tuning
curve centers. Interestingly, we find that the information gained from the
absence of spikes may be crucial to performance.
In this article we use the cluster structure on the Grassmannian and the
combinatorics of plabic graphs to exhibit a new aspect of mirror symmetry for
Grassmannians in terms of polytopes. For our A-model, we consider the
Grassmannian of (n-k)-planes in $\mathbb C^n$. The B-model is a Landau-Ginzburg
model consisting of a superpotential $W_q$ on the complement of a particular
anti-canonical divisor in a Langlands dual Grassmannian of k-planes
[MarshRietsch]. The superpotential $W_q$ has a simple expression in terms of
Pl\”ucker coordinates. From a given plabic graph G we obtain two coordinate
systems: using work of Postnikov and Talaska we have a positive chart in our
A-model, and using work of Scott we have a cluster chart on our B-model. To
each positive chart and choice of positive integer r, we associate a
Newton-Okounkov polytope $NO_G^r$, which is defined as the convex hull of a set
of integer lattice points. On the other hand, using the cluster chart and the
same positive integer r, we obtain a polytope $Q_G^r$ — described in terms of
inequalities — by “tropicalizing” the superpotential restricted to the cluster
chart. Our main result is that the polytopes $NO_G^r$ and $Q_G^r$ coincide.
Most visual recognition methods implicitly assume the data distribution
remains unchanged from training to testing. However, in practice \emph{domain
shift} often exists, where real-world factors such as lighting and sensor type
change between train and test, and classifiers do not generalise from source to
target domains. It is impractical to train separate models for all possible
situations because collecting and labelling the data is expensive. Domain
adaptation algorithms aim to ameliorate domain shift, allowing a model trained
on a source to perform well on a different target domain. However, even for the
setting of unsupervised domain adaptation, where the target domain is
unlabelled, collecting data for every possible target domain is still costly.
In this paper, we propose a new domain adaptation method that has no need to
access either data or labels of the target domain when it can be described by a
parametrised vector and there exits several related source domains within the
same parametric space. It greatly reduces the burden of data collection and
annotation, and our experiments show some promising results.
Based on the twisted Gabidulin codes obtained recently by Sheekey, we
construct a new family of maximal rank distance codes as a set of q-polynomials
over GF(q^n), which includes the generalized Gabidulin codes and the twisted
Gabidulin codes. Their Delsarte duals and adjoint codes are investigated. We
also obtain necessary and sufficient conditions for the equivalence between two
members of our new family of MRD codes except for several special parameters.
For a real matrix $M$, we denote by $sp(M)$ the spectrum of $M$ and by $\left \vert M\right \vert$ its absolute value, that is the matrix obtained from $M$
by replacing each entry of $M$ by its absolute value. Let $A$ be a nonnegative
real matrix, we call a \emph{signing} of $A$ every real matrix $B$ such that
$\left \vert B\right \vert =A$. In this paper, we study the set of all signings
of $A$ such that $sp(B)=\alpha sp(A)$ where $\alpha$ is a complex unit number.
Our work generalizes some results obtained in [1, 5, 8].
Exploiting quantum properties to outperform classical ways of
information-processing is an outstanding goal of modern physics. A promising
route is quantum simulation which aims at implementing relevant and
computationally hard problems in controllable quantum systems. Here we consider
trapped ions which have proven very flexible for realizing the physics of
interacting spins. We demonstrate concretely that, with present day technology,
a spin model of the Mattis type can be obtained, that exhibits spin glass
phases. Remarkably, our method produces the glassy behaviour without the need
of any disorder potential, just by controlling the detuning of the spin-phonon
coupling. Applying a transverse field, the system can be used to benchmark
quantum annealing strategies which aim at reaching the ground state of the spin
glass starting from the paramagnetic phase. In the vicinity of a phonon
resonance, the problem maps onto number partitioning, and instances which are
difficult to address classically can be implemented.
The small-world property in the context of complex networks implies
structural benefits to the processes taking place within a network, such as
optimal information transmission and robustness. In this paper, we study a
model network of integrate-and-fire neurons that are subject to
activity-dependent synaptic plasticity. We find the learning rule that gives
rise to a small-world structure when the collective dynamics of the system
reaches a critical state which is characterised by power-law distributions of
activity clusters. Moreover, by analysing the motif profile of the networks, we
observe that bidirectional connectivity is impaired by the effects of this type
of plasticity.
I present the first algorithm for stochastic finite-armed bandits that
simultaneously enjoys order-optimal problem-dependent regret and worst-case
regret. The algorithm is based on UCB, but with a carefully chosen confidence
parameter that optimally balances the risk of failing confidence intervals
against the cost of excessive optimism. A brief empirical evaluation suggests
the new algorithm is at least competitive with Thompson sampling.
In spiking neural networks an action potential could in principle trigger
subsequent spikes in the neighbourhood of the initial neuron. A successful
spike is that which trigger subsequent spikes giving rise to cascading
behaviour within the system. In this study we introduce a metric to assess the
success of spikes emitted by integrate-and-fire neurons arranged in complex
topologies and whose collective behaviour is undergoing a phase transition that
is identified by neuronal avalanches that become clusters of activation whose
distribution of sizes can be approximated by a power-law. In numerical
simulations we report that scale-free networks with the small-world property is
the structure in which neurons possess more successful spikes. As well, we
conclude both analytically and in numerical simulations that fully-connected
networks are structures in which neurons perform worse. Additionally, we study
how the small-world property affects spiking behaviour and its success in
scale-free networks.
This study proposes a robust estimator for stochastic frontier models by
integrating the idea of Basu et al. [1998, Biometrika 85, 549-559] into such
models. We verify that the suggested estimator is strongly consistent and
asymptotic normal under regularity conditions and investigate robust
properties. We use a simulation study to demonstrate that the estimator has
strong robust properties with little loss in asymptotic efficiency relative to
the maximum likelihood estimator. A real data analysis is performed for
illustrating the use of the estimator.
In this paper, we establish the existence of moments and moment estimates for
L\’evy-type processes. We discuss whether the existence of moments is a time
dependent distributional property, give sufficient conditions for the existence
of moments and prove estimates of fractional moments. Our results apply in
particular to SDEs and stable-like processes and can be used to prove
integrated heat kernel estimates for L\’evy-type processes.
The area of Handwritten Signature Verification has been broadly researched in
the last decades and still remains as an open research problem. This report
focuses on offline signature verification, characterized by the usage of static
(scanned) images of signatures, where the objective is to discriminate if a
given signature is genuine (produced by the claimed individual), or a forgery
(produced by an impostor). We present an overview of how the problem has been
handled by several researchers in the past few decades and the recent