8,986 research outputs found
The Ones Who Walk Away From the Ocean
When a mermaid mysteriously appears on the shore of a Northern island, the town\u27s children become enthralled with the newfound mythic creature, while the adults become wary and untrusting
Veering triangulations admit strict angle structures
Agol recently introduced the concept of a veering taut triangulation, which
is a taut triangulation with some extra combinatorial structure. We define the
weaker notion of a "veering triangulation" and use it to show that all veering
triangulations admit strict angle structures. We also answer a question of
Agol, giving an example of a veering taut triangulation that is not layered.Comment: 15 pages, 9 figure
Autocorrelation of Random Matrix Polynomials
We calculate the autocorrelation functions (or shifted moments) of the
characteristic polynomials of matrices drawn uniformly with respect to Haar
measure from the groups U(N), O(2N) and USp(2N). In each case the result can be
expressed in three equivalent forms: as a determinant sum (and hence in terms
of symmetric polynomials), as a combinatorial sum, and as a multiple contour
integral. These formulae are analogous to those previously obtained for the
Gaussian ensembles of Random Matrix Theory, but in this case are identities for
any size of matrix, rather than large-matrix asymptotic approximations. They
also mirror exactly autocorrelation formulae conjectured to hold for
L-functions in a companion paper. This then provides further evidence in
support of the connection between Random Matrix Theory and the theory of
L-functions
Entanglements in Quiescent and Sheared Polymer Melts
We visualize entanglements in polymer melts using molecular dynamics
simulation. A bead at an entanglement interacts persistently for long times
with the non-bonded beads (those excluding the adjacent ones in the same
chain). The interaction energy of each bead with the non-bonded beads is
averaged over a time interval much longer than microscopic times but
shorter than the onset time of tube constraints . Entanglements
can then be detected as hot spots consisting of several beads with relatively
large values of the time-averaged interaction energy. We next apply a shear
flow with rate much faster than the entangle motion. With increasing strain the
chains take zigzag shapes and a half of the hot spots become bent. The chains
are first stretched as a network but, as the bends approach the chain ends,
disentanglements subsequently occur, leading to stress overshoot observed
experimentally.Comment: 19 pages, 11 figure
Learning Incoherent Subspaces: Classification via Incoherent Dictionary Learning
In this article we present the supervised iterative projections and rotations (s-ipr) algorithm, a method for learning discriminative incoherent subspaces from data. We derive s-ipr as a supervised extension of our previously proposed iterative projections and rotations (ipr) algorithm for incoherent dictionary learning, and we employ it to learn incoherent sub-spaces that model signals belonging to different classes. We test our method as a feature transform for supervised classification, first by visualising transformed features from a synthetic dataset and from the ‘iris’ dataset, then by using the resulting features in a classification experiment
Dynamic multilateral markets
We study dynamic multilateral markets, in which players' payoffs result from intra-coalitional bargaining. The latter is modeled as the ultimatum game with exogenous (time-invariant) recognition probabilities and unanimity acceptance rule. Players in agreeing coalitions leave the market and are replaced by their replicas, which keeps the pool of market participants constant over time. In this infinite game, we establish payoff uniqueness of stationary equilibria and the emergence of endogenous cooperation structures when traders experience some degree of (heterogeneous) bargaining frictions. When we focus on market games with different player types, we derive, under mild conditions, an explicit formula for each type's equilibrium payoff as the market frictions vanish
Conditioned place preference and locomotor activity in response to methylphenidate, amphetamine and cocaine in mice lacking dopamine D4 receptors
Methylphenidate (MP) and amphetamine (AMPH) are the most frequently prescribed medications for the treatment of attention-deficit/hyperactivity disorder (ADHD). Both drugs are believed to derive their therapeutic benefit by virtue of their dopamine (DA)-enhancing effects, yet an explanation for the observation that some patients with ADHD respond well to one medication but not to the other remains elusive. The dopaminergic effects of MP and AMPH are also thought to underlie their reinforcing properties and ultimately their abuse. Polymorphisms in the human gene that codes for the DA D4 receptor (D4R) have been repeatedly associated with ADHD and may correlate with the therapeutic as well as the reinforcing effects of responses to these psychostimulant medications. Conditioned place preference (CPP) for MP, AMPH and cocaine were evaluated in wild-type (WT) mice and their genetically engineered littermates, congenic on the C57Bl/6J background, that completely lack D4Rs (knockout or KO). In addition, the locomotor activity in these mice during the conditioning phase of CPP was tested in the CPP chambers. D4 receptor KO and WT mice showed CPP and increased locomotor activity in response to each of the three psychostimulants tested. D4R differentially modulates the CPP responses to MP, AMPH and cocaine. While the D4R genotype affected CPP responses to MP (high dose only) and AMPH (low dose only) it had no effects on cocaine. Inasmuch as CPP is considered an indicator of sensitivity to reinforcing responses to drugs these data suggest a significant but limited role of D4Rs in modulating conditioning responses to MP and AMPH. In the locomotor test, D4 receptor KO mice displayed attenuated increases in AMPH-induced locomotor activity whereas responses to cocaine and MP did not differ. These results suggest distinct mechanisms for D4 receptor modulation of the reinforcing (perhaps via attenuating dopaminergic signalling) and locomotor properties of these stimulant drugs. Thus, individuals with D4 receptor polymorphisms might show enhanced reinforcing responses to MP and AMPH and attenuated locomotor response to AMPH.Fil: Thanos, P. K.. NIAAA Intramural Program; Estados Unidos. Brookhaven National Laboratory; Estados Unidos. Universidad de Buenos Aires; ArgentinaFil: Bermeo, C.. Brookhaven National Laboratory; Estados UnidosFil: Rubinstein, Marcelo. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentina. Universidad de Buenos Aires; ArgentinaFil: Suchland, K. L.. Oregon Health & Science University; Estados UnidosFil: Wang, G. J.. Brookhaven National Laboratory; Estados UnidosFil: Grandy, David K.. Oregon Health & Science University; Estados UnidosFil: Volkow, N. D.. NIAAA Intramural Program; Estados Unido
Exploiting Machine Learning to Subvert Your Spam Filter
Using statistical machine learning for making security decisions introduces new vulnerabilities in large scale systems. This paper shows how an adversary can exploit statistical machine learning, as used in the SpamBayes spam filter, to render it useless—even if the adversary’s access is limited to only 1 % of the training messages. We further demonstrate a new class of focused attacks that successfully prevent victims from receiving specific email messages. Finally, we introduce two new types of defenses against these attacks.
Near-Optimal Evasion of Convex-Inducing Classifiers
Classifiers are often used to detect miscreant activities. We study how an
adversary can efficiently query a classifier to elicit information that allows
the adversary to evade detection at near-minimal cost. We generalize results of
Lowd and Meek (2005) to convex-inducing classifiers. We present algorithms that
construct undetected instances of near-minimal cost using only polynomially
many queries in the dimension of the space and without reverse engineering the
decision boundary.Comment: 8 pages; to appear at AISTATS'201
Tighter Relations Between Sensitivity and Other Complexity Measures
Sensitivity conjecture is a longstanding and fundamental open problem in the
area of complexity measures of Boolean functions and decision tree complexity.
The conjecture postulates that the maximum sensitivity of a Boolean function is
polynomially related to other major complexity measures. Despite much attention
to the problem and major advances in analysis of Boolean functions in the past
decade, the problem remains wide open with no positive result toward the
conjecture since the work of Kenyon and Kutin from 2004.
In this work, we present new upper bounds for various complexity measures in
terms of sensitivity improving the bounds provided by Kenyon and Kutin.
Specifically, we show that deg(f)^{1-o(1)}=O(2^{s(f)}) and C(f) < 2^{s(f)-1}
s(f); these in turn imply various corollaries regarding the relation between
sensitivity and other complexity measures, such as block sensitivity, via known
results. The gap between sensitivity and other complexity measures remains
exponential but these results are the first improvement for this difficult
problem that has been achieved in a decade.Comment: This is the merged form of arXiv submission 1306.4466 with another
work. Appeared in ICALP 2014, 14 page
- …
