3,176 research outputs found

    Secondary terms in the number of vanishings of quadratic twists of elliptic curve L-functions

    Get PDF
    We examine the number of vanishings of quadratic twists of the L-function associated to an elliptic curve. Applying a conjecture for the full asymptotics of the moments of critical L-values we obtain a conjecture for the first two terms in the ratio of the number of vanishings of twists sorted according to arithmetic progressions.Comment: 16 pages, many figure

    Discretisation for odd quadratic twists

    Get PDF
    The discretisation problem for even quadratic twists is almost understood, with the main question now being how the arithmetic Delaunay heuristic interacts with the analytic random matrix theory prediction. The situation for odd quadratic twists is much more mysterious, as the height of a point enters the picture, which does not necessarily take integral values (as does the order of the Shafarevich-Tate group). We discuss a couple of models and present data on this question.Comment: To appear in the Proceedings of the INI Workshop on Random Matrix Theory and Elliptic Curve

    Random Matrix Theory and the Fourier Coefficients of Half-Integral Weight Forms

    Full text link
    Conjectured links between the distribution of values taken by the characteristic polynomials of random orthogonal matrices and that for certain families of L-functions at the centre of the critical strip are used to motivate a series of conjectures concerning the value-distribution of the Fourier coefficients of half-integral weight modular forms related to these L-functions. Our conjectures may be viewed as being analogous to the Sato-Tate conjecture for integral weight modular forms. Numerical evidence is presented in support of them.Comment: 28 pages, 8 figure

    Autocorrelation of Random Matrix Polynomials

    Full text link
    We calculate the autocorrelation functions (or shifted moments) of the characteristic polynomials of matrices drawn uniformly with respect to Haar measure from the groups U(N), O(2N) and USp(2N). In each case the result can be expressed in three equivalent forms: as a determinant sum (and hence in terms of symmetric polynomials), as a combinatorial sum, and as a multiple contour integral. These formulae are analogous to those previously obtained for the Gaussian ensembles of Random Matrix Theory, but in this case are identities for any size of matrix, rather than large-matrix asymptotic approximations. They also mirror exactly autocorrelation formulae conjectured to hold for L-functions in a companion paper. This then provides further evidence in support of the connection between Random Matrix Theory and the theory of L-functions

    Mining Frequent Graph Patterns with Differential Privacy

    Full text link
    Discovering frequent graph patterns in a graph database offers valuable information in a variety of applications. However, if the graph dataset contains sensitive data of individuals such as mobile phone-call graphs and web-click graphs, releasing discovered frequent patterns may present a threat to the privacy of individuals. {\em Differential privacy} has recently emerged as the {\em de facto} standard for private data analysis due to its provable privacy guarantee. In this paper we propose the first differentially private algorithm for mining frequent graph patterns. We first show that previous techniques on differentially private discovery of frequent {\em itemsets} cannot apply in mining frequent graph patterns due to the inherent complexity of handling structural information in graphs. We then address this challenge by proposing a Markov Chain Monte Carlo (MCMC) sampling based algorithm. Unlike previous work on frequent itemset mining, our techniques do not rely on the output of a non-private mining algorithm. Instead, we observe that both frequent graph pattern mining and the guarantee of differential privacy can be unified into an MCMC sampling framework. In addition, we establish the privacy and utility guarantee of our algorithm and propose an efficient neighboring pattern counting technique as well. Experimental results show that the proposed algorithm is able to output frequent patterns with good precision
    corecore