**Dirty Weyl semimetals: stability, phase transition and quantum
criticality**

the presence of random quenched charge impurities. Using numerical analysis and

scaling theory we show that in the presence of sufficiently weak randomness (i)

Weyl semimetal remains stable, while (ii) the double-Weyl semimetal gives rise

to compressible diffusive metal where the mean density of states at vanishing

energy is finite. At stronger disorder, Weyl semimetal undergoes a quantum

phase transition and enter into a metallic phase. Mean density of states at

zero energy serves as the order parameter and displays single-parameter scaling

across such disorder driven phase transition. We numerically determine various

exponents at the critical point, which appear to be insensitive to the number

of Weyl pairs, and also extract the extent of the quantum critical regime at

finite energy.

**Asymptotically optimal neighbor sum distinguishing total colorings of
graphs**

\emph{value} of a vertex to be . The

smallest integer such that has a proper total -coloring whose values

form a proper coloring is the \emph{neighbor sum distinguishing total chromatic

number} . Pil\’sniak and Wo\’zniak (2013) conjectured that

for any simple graph with maximum degree

. In this paper, we prove that this bound to be asymptotically

correct by showing that . The main

idea of our argument relies on Przyby{\l}o’s proof (2014) for neighbor sum

distinguishing edge-coloring.

**Grand Lebesgue norm estimation for binary random variables, with
applications**

centered (shifted) indicator (Bernoulli’s, binary) random variable.

This norm is optimal for the centered and bounded random variables (r.v.).

Using this result we derive a very simple bilateral sharp exponential tail

estimates for sums of these variables, not necessary to be identical

distributed, under non-standard norming, and give some examples to show the

exactness of our estimates.

**Distributed Stochastic Variance Reduced Gradient Methods**

machines with each machine being able to access functions.

We design a distributed stochastic variance reduced gradient (DSVRG) algorithm

which, when the condition number of the problem is less than

and when the data is assumed to be randomly partitioned onto the machines,

simultaneously achieves the optimal parallel runtime, communication and rounds

of communication among all first order methods up to constant factors. DSVRG

and its extension DPPASVRG also outperform existing distributed algorithms in

terms of the rounds of communication as long as is not too large

compared to . For the regime when is relatively small, we propose a

distributed accelerated SVRG algorithm which further reduces the parallel

runtime.

**The proximal distance algorithm**

the ascent or descent property. The current survey emphasizes the role of the

MM principle in nonlinear programming. For smooth functions, one can construct

an adaptive interior point method based on scaled Bregmann barriers. This

algorithm does not follow the central path. For convex programming subject to

nonsmooth constraints, one can combine an exact penalty method with distance

majorization to create versatile algorithms that are effective even in discrete

optimization. These proximal distance algorithms are highly modular and reduce

to set projections and proximal mappings, both very well-understood techniques

in optimization. We illustrate the possibilities in linear programming, binary

piecewise-linear programming, nonnegative quadratic programming,

regression, matrix completion, and inverse sparse covariance estimation.

**Convergence to a self-normalized G-Brownian motion**

nontrivially generalizes the classical one. Its quadratic variation process is

also a continuous process with independent and stationary increments. We prove

a self-normalized functional central limit theorem for independent and

identically distributed random variables under the sub-linear expectation with

the limit process being a G-Browian motion self-normalized by its quadratic

variation. To prove the self-normalized central limit theorem, we also

establish a new Donsker’s invariance principle.

**Fully-online construction of suffix trees and DAWGs for multiple texts**

structures for multiple texts. Let T = {T_1, …, T_K} be a collection of

texts. By fully on-line, we mean that a new character can be appended to any

text in T at any time. This is a natural generalization of semi-online

construction of indexing data structures for multiple texts in which, after a

new character is appended to the kth text T_k, then its previous texts T_1,

…, T_{k-1} will remain static. Our fully online scenario arises when we index

multi-sensor data. We propose fully online algorithms which construct the

directed acyclic word graph (DAWG) and the generalized suffix tree (GST) for T

in O(N log \sigma) time and O(N) space, where N and \sigma denote the total

length of texts in T and the alphabet size, respectively.

**Different Volume Computation Methods of Graph Polytopes**

methods of the graph polytope associated with various type of finite simple

graphs. Among them, we obtained the recursive volume formula (RVF) that is

fundamental and most useful to compute the volume of the graph polytope for an

arbitrary finite simple graph.

**Focused Stochastic Local Search and the Lovász Local Lemma**

These are algorithms which search a state space probabilistically by repeatedly

selecting a constraint that is violated in the current state and moving to a

random nearby state which, hopefully, addresses the violation without

introducing many new ones. A large class of such algorithms arise from the

algorithmization of the Lov\’asz Local Lemma, a non-constructive tool for

proving the existence of satisfying states. Here we give tools that provide a

unified analysis of such algorithms and of many more, expressing them as

instances of a general framework.

variables V that satisfy a given propositional theory F. Model counting is an

essential tool in probabilistic reasoning. In this paper, we introduce the

problem of model counting projected on a subset P of original variables that we

call ‘priority’ variables. The task is to compute the number of assignments to

P such that there exists an extension to ‘non-priority’ variables V\P that

satisfies F. Projected model counting arises when some parts of the model are

irrelevant to the counts, in particular when we require additional variables to

model the problem we are counting in SAT. We discuss three different approaches

to projected model counting (two of which are novel), and compare their

performance on different benchmark problems.

To appear in 18th International Conference on Theory and Applications of

Satisfiability Testing, September 24-27, 2015, Austin, Texas, USA

**Robust estimation and inference for heavy tailed GARCH**

with possibly heavy tailed asymmetrically distributed errors, covering

processes with symmetric and asymmetric feedback like GARCH, Asymmetric GARCH,

VGARCH and Quadratic GARCH. The first estimator arises from negligibly trimming

QML criterion equations according to error extremes. The second imbeds

negligibly transformed errors into QML score equations for a Method of Moments

estimator. In this case, we exploit a sub-class of redescending transforms that

includes tail-trimming and functions popular in the robust estimation

literature, and we re-center the transformed errors to minimize small sample

bias. The negligible transforms allow both identification of the true parameter

and asymptotic normality. We present a consistent estimator of the covariance

matrix that permits classic inference without knowledge of the rate of

convergence. A simulation study shows both of our estimators trump existing

ones for sharpness and approximate normality including QML, Log-LAD, and two

types of non-Gaussian QML (Laplace and Power-Law). Finally, we apply the

tail-trimmed QML estimator to financial data.

**DMFT+Sigma approach to disordered Hubbard model**

treatment of both repulsive and attractive disordered Hubbard models. We

examine the general problem of metal-insulator transition and the phase diagram

in repulsive case, as well as BCS-BEC crossover region of attractive model,

demonstrating certain universality of single – electron properties under

disordering in both models. We also discuss and compare the results for the

density of states and dynamic conductivity in both repulsive and attractive

case and the generalized Anderson theorem behavior for superconducting critical

temperature in disordered attractive case. A brief discussion of Ginzburg –

Landau coefficients behavior under disordering in BCS-BEC crossover region is

also presented.

**Wilf’s “Snake Oil” Method Proves an Identity in The Motzkin Triangle**

proving a certain identity between the entries of the so-called Motzkin

Triangle, that arose in a recent study of enumeration of certain classes of

integer partitions. We also briefly illustrate how this method can be applied

to general `triangles’.

networks. The process fulfills fundamental mathematical and statistical

properties and can be easily constructed from the novel operation of random

rewiring. We derive basic properties of the model, including consistency under

subsampling, exchangeability, and the Feller property. A reversible sub-family

related to the Erd\H{o}s-R\'{e}nyi model arises as a special case.

**Modulus of continuity of some conditionally sub-Gaussian fields,
application to stable random fields**

series of conditionally sub-Gaussian random fields. This framework includes

both classical series representations of Gaussian fields and LePage series

representations of stable fields. We enlighten their anisotropic properties by

using an adapted quasi-metric instead of the classical Euclidean norm. We

specify our assumptions in the case of shot noise series where arrival times of

a Poisson process are involved. This allows us to state unified results for

harmonizable (multi)operator scaling stable random fields through their LePage

series representation, as well as to study sample path properties of their

multistable analogous.

**If $(A+A)/(A+A)$ is small then the ratio set is large**

for the size of the set $latex $\frac{A+A}{A+A}:=\left \{ \frac{a+b}{c+d} : a,b,c,d

\in A, c+d \neq 0 \right\},$latex $ for an arbitrary finite set of real numbers.

The main result is the bound

\left| \frac{A+A}{A+A} \right| \gg

\frac{|A|^{2+\frac{1}{15}}}{|A:A|^{\frac{1}{30}}\log |A|}, where

denotes the ratio set of . This improves on a result of Balog and the author

(arXiv:1402.5775), provided that the size of the ratio set is subquadratic in

. That is, we establish that the inequality \left| \frac{A+A}{A+A}

\right| \ll |A|^{2} \Rightarrow |A:A| \gg \frac{ |A|^2}{\log^{30}|A|} . This

extremal result answers a question similar to some conjectures in a recent

paper of the author and Zhelezov (arXiv:1410.1156).

**Interplay of insurance and financial risks in a discrete-time model with
strongly regular variation**

that contains two kinds of risk. The first kind is the insurance risk caused by

traditional insurance claims, and the second kind is the financial risk

resulting from investments. Its wealth process is described in a standard

discrete-time model in which, during each period, the insurance risk is

quantified as a real-valued random variable equal to the total amount of

claims less premiums, and the financial risk as a positive random variable

equal to the reciprocal of the stochastic accumulation factor. This risk model

builds an efficient platform for investigating the interplay of the two kinds

of risk. We focus on the ruin probability and the tail probability of the

aggregate risk amount. Assuming that every convex combination of the

distributions of and is of strongly regular variation, we derive some

precise asymptotic formulas for these probabilities with both finite and

infinite time horizons, all in the form of linear combinations of the tail

probabilities of and . Our treatment is unified in the sense that no

dominating relationship between and is required.

**Computation of Stackelberg Equilibria of Finite Sequential Games**

commit to: Player 1 (termed the leader) publicly commits to a strategy and

Player 2 (termed the follower) plays a best response to this strategy (ties are

broken in favor of the leader). We study Stackelberg equilibria in finite

sequential games (or extensive-form games) and provide new exact algorithms,

approximate algorithms, and hardness results for several classes of these

sequential games.

**Training recurrent networks online without backtracking**

systems such as recurrent neural networks. This algorithm works in an online,

memoryless setting, thus requiring no backpropagation through time, and is

scalable, avoiding the large computational and memory cost of maintaining the

full gradient of the current state with respect to the parameters.

The algorithm essentially maintains, at each time, a single search direction

in parameter space. The evolution of this search direction is partly stochastic

and is constructed in such a way to provide, at every time, an unbiased random

estimate of the gradient of the loss function with respect to the parameters.

Because the gradient estimate is unbiased, on average over time the parameter

is updated as it should.

The resulting gradient estimate can then be fed to a lightweight Kalman-like

filter to yield an improved algorithm. For recurrent neural networks, the

resulting algorithms scale linearly with the number of parameters.

Preliminary tests on a simple task show that the stochastic approximation of

the gradient introduced in the algorithm does not seem to introduce too much

noise in the trajectory, compared to maintaining the full gradient, and confirm

the good performance and scalability of the Kalman-like version of NoBackTrack.

**Belief and Truth in Hypothesised Behaviours**

learning, in which players maintain beliefs over a set of alternative

behaviours, or types. This idea has gained increasing interest in the AI

community, where it is used to control a single agent in a system composed of

multiple agents with unknown behaviours. The idea is to hypothesise a set of

types, each specifying a possible behaviour for the other agents, and to plan

our own actions with respect to those types which we believe are most likely,

based on the observed actions. The game theory literature studies this idea

primarily in the context of equilibrium attainment. In contrast, many AI

applications have a focus on task completion and payoff maximisation, which

renders the game theory literature on this subject of limited applicability.

With this perspective in mind, we identify and address a spectrum of questions

pertaining to belief and truth in hypothesised types. We formulate three basic

ways to incorporate evidence into posterior beliefs and show when the resulting

beliefs are correct, and when they may fail to be correct. Moreover, we

demonstrate that prior beliefs can have a significant impact on our ability to

maximise payoffs in the long-term, and that they can be computed automatically

with consistent performance effects. Furthermore, we analyse the conditions

under which we are able complete our task optimally, despite inaccuracies in

the hypothesised types. Finally, we show how the correctness of hypothesised

types can be ascertained during the interaction via an automated statistical

analysis.

two. We provide a necessary condition for the existence of a HIST in cubic

graphs. As one consequence, we answer affirmatively an open question on HISTs

by Albertson, Berman, Hutchinson and Thomassen.

probability distributions which increases in convex

order there exists a Markov martingale s.t.\ .

To establish the result, we observe that the set of martingale measures with

given marginals carries a natural compact Polish topology. Based on a

particular property of the martingale coupling associated to Root’s embedding

this allows for a relatively concise proof of Kellerer’s theorem.

We emphasize that many of our arguments are borrowed from Kellerer

\cite{Ke72}, Lowther \cite{Lo07}, and Hirsch-Roynette-Profeta-Yor

\cite{HiPr11,HiRo12}.

gamma, generalised gamma and mean zero normal random variables. In particular,

we obtain Stein characterisations for mixed products of these distributions,

which include the classical beta, gamma and normal characterisations as special

cases. These characterisations, lead us to closed form formulas, involving the

Meijer -function, for the probability density function and characteristic

function of the mixed product of independent beta, gamma and central normal

random variables.

**The Sharp Constant for the Burkholder-Davis-Gundy Inequality and
Non-Smooth Pasting**

Burkholder, Gundy \cite{BuGu70} and Davis \cite{Da70} for continuous

martingales. For the inequalities with we propose a connection of the

optimal constant with an ordinary integro-differential equation which

gives rise to a numerical method of finding this constant. Based on numerical

evidence we are able to calculate, for , the explicit value of the optimal

constant , namely . In the course of our analysis, we

find a remarkable appearance of “non-smooth pasting” for a solution of a

related ordinary integro-differential equation.

**Prime Factorization of the Kirchhoff Polynomial: Compact Enumeration of
Arborescences**

(arborescences) of a directed graph (digraph) of vertices. An

arborescence consisting of edges can be represented as

a monomial in variables . All

arborescences of a digraph then define the Kirchhoff

polynomial . We show how to

compute a compact representation of the Kirchhoff polynomial — its prime

factorization, and how it relates to combinatorial properties of digraphs such

as strong connectivity and vertex domination. In particular, we provide digraph

decomposition rules that correspond to factorization steps of the polynomial,

and also give necessary and sufficient primality conditions of the resulting

factors expressed by connectivity properties of the corresponding decomposed

components. Thereby, we obtain a linear time algorithm for decomposing a

digraph into components corresponding to factors of the initial polynomial, and

a guarantee that no finer factorization is possible. The decomposition serves

as a starting point for a recursive deletion-contraction algorithm, and also as

a preprocessing phase for iterative enumeration algorithms. Both approaches

produce a compressed output and retain some structural properties in the

resulting polynomial. This proves advantageous in practical applications such

as calculating steady states on digraphs governed by Laplacian dynamics, or

computing the greatest common divisor of Kirchhoff polynomials. Finally, we

initiate the study of a class of digraphs which allow for a practical

enumeration of arborescences. Using our decomposition rules we observe that

various digraphs from real-world applications fall into this class or are

structurally similar to it.

**Heavy Tailed Distributions in Finance: Reality or Myth? Amateurs
Viewpoint**

distributions in Financial problems is theoretically baseless and can lead to

significant misunderstandings. The reason for this the authors see in an

incorrect interpretation of the concept of the distributional tail. In

accordance with this, in applications it is necessary to use instead of the

distributional tail the “smearing” of its central part. keywords: heavy tailed

distributions, exponential tails, pre-limit theorems, Financial indexes

**Scaling up Greedy Equivalence Search for Continuous Variables**

algorithms that have been most widely or effectively used in scientific

problems have severe dimensionality constraints. However, implementation

improvements are possible that extend the feasible dimensionality of search

problems by several orders of magnitude. We describe optimizations for the

Greedy Equivalence Search (GES) that allow search on 50,000 variable problems

in 13 minutes for sparse models with 1000 samples, on a 4 processor 8G laptop

computer, and in 18 hours for sparse models with 1000 samples on 1,000,000

variables on a supercomputer node at the Pittsburgh Supercomputing Center with

40 processors and 384 G RAM, on data generated i.i.d. from a linear, Gaussian

model.

**Space-time max-stable models with spectral separability**

(re)insurance industry. Max-stable processes are ideally suited for the

modeling of the spatial extent of such extreme events, but it is often assumed

that there is no temporal dependence. Only a few papers have introduced

spatio-temporal max-stable models, extending the Smith, Schlather and

Brown-Resnick spatial processes. These models suffer from two major drawbacks:

time plays a similar role as space and the temporal dynamics is not explicit.

In order to overcome these defects, we introduce spatio-temporal max-stable

models where we partly decouple the influence of time and space in their

spectral representations. We introduce both continuous and discrete-time

versions. We then consider particular Markovian cases with a max-autoregressive

representation and discuss their properties. Finally, we briefly propose an

inference methodology which is tested through a simulation study.

**Local bilinear multiple-output quantile/depth regression**

and Bassett’s traditional single-output one, has been introduced in [Ann.

Statist. (2010) 38 635-669] for multiple-output location/linear regression

problems. The polyhedral contours provided by the empirical counterpart of that

concept, however, cannot adapt to unknown nonlinear and/or heteroskedastic

dependencies. This paper therefore introduces local constant and local linear

(actually, bilinear) versions of those contours, which both allow to

asymptotically recover the conditional halfspace depth contours that completely

characterize the response’s conditional distributions. Bahadur representation

and asymptotic normality results are established. Illustrations are provided

both on simulated and real data.

**Percolation and isoperimetry on transitive graphs**

isoperimetric dimension dim we have . In other words,

there exists a percolative phase for site percolation on . This gives a

partial answer to a question posed by Benjamini and Schramm in [BS96, Question

2].

**Local Clustering Coefficient in Generalized Preferential Attachment
Models**

attachment models. A general approach to preferential attachment was introduced

in earlier, where a wide class of models (PA-class) was defined in terms of

constraints that are sufficient for the study of the degree distribution and

the clustering coefficient. It was previously shown that the degree

distribution in all models of the PA-class follows a power law. Also, the

global clustering coefficient was analyzed and a lower bound for the average

local clustering coefficient was obtained. We expand the results by analyzing

the local clustering coefficient for the PA-class of models. Namely, we analyze

the behavior of C(d) which is the average local clustering for the vertices of

degree d.

**Duality and Nonlinear Graph Laplacians**

Laplacian system of equations in

iterations, where is a measure of nonlinearity, is the number of

variables, is the number of nonzero entries in the graph Laplacian ,

is the solution accuracy and neglects (non-leading)

logarithmic terms. This algorithm is a natural nonlinear extension of the one

by of Kelner et. al., which solves a linear Laplacian system of equations in

nearly linear time. Unlike the linear case, in the nonlinear case each

iteration takes time so the total running time is

. For sparse graphs where and

fixed this nonlinear algorithm is which

is slightly faster than standard methods for solving linear equations, which

require approximately time. Our analysis relies on the

construction of a nonlinear “energy function” and a nonlinear extension of the

duality analysis of Kelner et. al to the nonlinear case without any explicit

references to spectral analysis or electrical flows. These new insights and

results provide tools for more general extensions to spectral theory and

nonlinear applications.

**Equivalence of ensembles for large vehicle-sharing models**

constraints, asymptotic independence of the nodes in normal traffic phase is

proved at stationarity under mild assumptions, using a Local Limit Theorem. The

limiting distributions of the queues are explicit. In the Statistical Mechanics

terminology, the equivalence of ensembles – canonical and grand canonical – is

proved for specific marginals. The framework includes the case of networks with

two types of nodes: single server/finite capacity nodes and infinite

servers/infinite capacity nodes, that can be taken as basic models for

bike-sharing systems. The effect of local saturation is modeled by generalized

blocking and rerouting procedures, under which the stationary state is proved

to have product-form. The grand canonical approximation can then be used for

adjusting the total number of bikes and the capacities of the stations to the

expected demand.

**An Analytically Tractable Bayesian Approximation to Optimal Point
Process Filtering**

observations is in general intractable. Numerical sampling techniques are often

practically useful, but lead to limited conceptual insight about optimal

encoding/decoding strategies, which are of significant relevance to

Computational Neuroscience. We develop an analytically tractable Bayesian

approximation to optimal filtering based on point process observations, which

allows us to introduce distributional assumptions about sensory cell

properties, that greatly facilitates the analysis of optimal encoding in

situations deviating from common assumptions of uniform coding. The analytic

framework leads to insights which are difficult to obtain from numerical

algorithms, and is consistent with experiments about the distribution of tuning

curve centers. Interestingly, we find that the information gained from the

absence of spikes may be crucial to performance.

**Cluster duality and mirror symmetry for Grassmannians**

combinatorics of plabic graphs to exhibit a new aspect of mirror symmetry for

Grassmannians in terms of polytopes. For our A-model, we consider the

Grassmannian of (n-k)-planes in . The B-model is a Landau-Ginzburg

model consisting of a superpotential on the complement of a particular

anti-canonical divisor in a Langlands dual Grassmannian of k-planes

[MarshRietsch]. The superpotential has a simple expression in terms of

Pl\”ucker coordinates. From a given plabic graph G we obtain two coordinate

systems: using work of Postnikov and Talaska we have a positive chart in our

A-model, and using work of Scott we have a cluster chart on our B-model. To

each positive chart and choice of positive integer r, we associate a

Newton-Okounkov polytope , which is defined as the convex hull of a set

of integer lattice points. On the other hand, using the cluster chart and the

same positive integer r, we obtain a polytope — described in terms of

inequalities — by “tropicalizing” the superpotential restricted to the cluster

chart. Our main result is that the polytopes and coincide.

**Zero-Shot Domain Adaptation via Kernel Regression on the Grassmannian**

remains unchanged from training to testing. However, in practice \emph{domain

shift} often exists, where real-world factors such as lighting and sensor type

change between train and test, and classifiers do not generalise from source to

target domains. It is impractical to train separate models for all possible

situations because collecting and labelling the data is expensive. Domain

adaptation algorithms aim to ameliorate domain shift, allowing a model trained

on a source to perform well on a different target domain. However, even for the

setting of unsupervised domain adaptation, where the target domain is

unlabelled, collecting data for every possible target domain is still costly.

In this paper, we propose a new domain adaptation method that has no need to

access either data or labels of the target domain when it can be described by a

parametrised vector and there exits several related source domains within the

same parametric space. It greatly reduces the burden of data collection and

annotation, and our experiments show some promising results.

**Generalized Twisted Gabidulin Codes**

construct a new family of maximal rank distance codes as a set of q-polynomials

over GF(q^n), which includes the generalized Gabidulin codes and the twisted

Gabidulin codes. Their Delsarte duals and adjoint codes are investigated. We

also obtain necessary and sufficient conditions for the equivalence between two

members of our new family of MRD codes except for several special parameters.

**About the spectra of a real nonnegative matrix and its signings**

by replacing each entry of by its absolute value. Let be a nonnegative

real matrix, we call a \emph{signing} of every real matrix such that

. In this paper, we study the set of all signings

of such that where is a complex unit number.

Our work generalizes some results obtained in [1, 5, 8].

**Controlled complexity in trapped ions: from quantum Mattis glasses to
number partitioning**

information-processing is an outstanding goal of modern physics. A promising

route is quantum simulation which aims at implementing relevant and

computationally hard problems in controllable quantum systems. Here we consider

trapped ions which have proven very flexible for realizing the physics of

interacting spins. We demonstrate concretely that, with present day technology,

a spin model of the Mattis type can be obtained, that exhibits spin glass

phases. Remarkably, our method produces the glassy behaviour without the need

of any disorder potential, just by controlling the detuning of the spin-phonon

coupling. Applying a transverse field, the system can be used to benchmark

quantum annealing strategies which aim at reaching the ground state of the spin

glass starting from the paramagnetic phase. In the vicinity of a phonon

resonance, the problem maps onto number partitioning, and instances which are

difficult to address classically can be implemented.

structural benefits to the processes taking place within a network, such as

optimal information transmission and robustness. In this paper, we study a

model network of integrate-and-fire neurons that are subject to

activity-dependent synaptic plasticity. We find the learning rule that gives

rise to a small-world structure when the collective dynamics of the system

reaches a critical state which is characterised by power-law distributions of

activity clusters. Moreover, by analysing the motif profile of the networks, we

observe that bidirectional connectivity is impaired by the effects of this type

of plasticity.

**Optimally Confident UCB : Improved Regret for Finite-Armed Bandits**

simultaneously enjoys order-optimal problem-dependent regret and worst-case

regret. The algorithm is based on UCB, but with a carefully chosen confidence

parameter that optimally balances the risk of failing confidence intervals

against the cost of excessive optimism. A brief empirical evaluation suggests

the new algorithm is at least competitive with Thompson sampling.

**The success of complex networks at criticality**

subsequent spikes in the neighbourhood of the initial neuron. A successful

spike is that which trigger subsequent spikes giving rise to cascading

behaviour within the system. In this study we introduce a metric to assess the

success of spikes emitted by integrate-and-fire neurons arranged in complex

topologies and whose collective behaviour is undergoing a phase transition that

is identified by neuronal avalanches that become clusters of activation whose

distribution of sizes can be approximated by a power-law. In numerical

simulations we report that scale-free networks with the small-world property is

the structure in which neurons possess more successful spikes. As well, we

conclude both analytically and in numerical simulations that fully-connected

networks are structures in which neurons perform worse. Additionally, we study

how the small-world property affects spiking behaviour and its success in

scale-free networks.

**Robust Estimation in Stochastic Frontier Models**

integrating the idea of Basu et al. [1998, Biometrika 85, 549-559] into such

models. We verify that the suggested estimator is strongly consistent and

asymptotic normal under regularity conditions and investigate robust

properties. We use a simulation study to demonstrate that the estimator has

strong robust properties with little loss in asymptotic efficiency relative to

the maximum likelihood estimator. A real data analysis is performed for

illustrating the use of the estimator.

**Existence and estimates of moments for Lévy-type processes**

L\’evy-type processes. We discuss whether the existence of moments is a time

dependent distributional property, give sufficient conditions for the existence

of moments and prove estimates of fractional moments. Our results apply in

particular to SDEs and stable-like processes and can be used to prove

integrated heat kernel estimates for L\’evy-type processes.

**Offline Handwritten Signature Verification – Literature Review**

the last decades and still remains as an open research problem. This report

focuses on offline signature verification, characterized by the usage of static

(scanned) images of signatures, where the objective is to discriminate if a

given signature is genuine (produced by the claimed individual), or a forgery

(produced by an impostor). We present an overview of how the problem has been

handled by several researchers in the past few decades and the recent

advancements in the field.

**Combining losing games into a winning game**

illustration of what can be done is the so-called Parrondo’s paradox in the

Physics literature. This “paradox” is extended to regime switching random walks

in random environments. The paradoxical behavior of the resulting random walk

is explained by the effect of the random environment. Full characterization of

the asymptotic behavior is achieved in terms of the dimensions of some random

subspaces occurring in the famous Oseledec’s theorem. Basically, these models

have the same asymptotic behavior as simple random walks, in terms of

transience and recurrence.