-
Concerning the stability of exponential systems and Fourier matrices
Authors:
Oleg Asipchuk,
Laura De Carli,
Weilin Li
Abstract:
Fourier matrices naturally appear in many applications and their stability is closely tied to performance guarantees of algorithms. The starting point of this article is a result that characterizes properties of an exponential system on a union of cubes in $\mathbb{R}^d$ in terms of a general class of Fourier matrices and their extreme singular values. This relationship is flexible in the sense th…
▽ More
Fourier matrices naturally appear in many applications and their stability is closely tied to performance guarantees of algorithms. The starting point of this article is a result that characterizes properties of an exponential system on a union of cubes in $\mathbb{R}^d$ in terms of a general class of Fourier matrices and their extreme singular values. This relationship is flexible in the sense that it holds for any dimension $d$, for many types of exponential systems (Riesz bases, Riesz sequences, or frames) and for Fourier matrices with an arbitrary number of rows and columns. From there, we prove new stability results for Fourier matrices by exploiting this connection and using powerful stability theorems for exponential systems. This paper provides a systematic exploration of this connection and suggests some natural open questions.
△ Less
Submitted 28 April, 2024; v1 submitted 8 April, 2024;
originally announced April 2024.
-
Approximating the divisor functions
Authors:
Andrew Echezabal,
Laura De Carli,
Maurizio Laporta
Abstract:
We exploit the properties of a sequence of functions that approximate the divisor functions and combine them with an analytical formula of a delta-like sequence to give a new proof of a theorem of Gronwall on the asymptotic of the divisor functions.
We exploit the properties of a sequence of functions that approximate the divisor functions and combine them with an analytical formula of a delta-like sequence to give a new proof of a theorem of Gronwall on the asymptotic of the divisor functions.
△ Less
Submitted 30 June, 2023;
originally announced June 2023.
-
Minerva: A File-Based Ransomware Detector
Authors:
Dorjan Hitaj,
Giulio Pagnotta,
Fabio De Gaspari,
Lorenzo De Carli,
Luigi V. Mancini
Abstract:
Ransomware attacks have caused billions of dollars in damages in recent years, and are expected to cause billions more in the future. Consequently, significant effort has been devoted to ransomware detection and mitigation. Behavioral-based ransomware detection approaches have garnered considerable attention recently. These behavioral detectors typically rely on process-based behavioral profiles t…
▽ More
Ransomware attacks have caused billions of dollars in damages in recent years, and are expected to cause billions more in the future. Consequently, significant effort has been devoted to ransomware detection and mitigation. Behavioral-based ransomware detection approaches have garnered considerable attention recently. These behavioral detectors typically rely on process-based behavioral profiles to identify malicious behaviors. However, with an increasing body of literature highlighting the vulnerability of such approaches to evasion attacks, a comprehensive solution to the ransomware problem remains elusive. This paper presents Minerva, a novel robust approach to ransomware detection. Minerva is engineered to be robust by design against evasion attacks, with architectural and feature selection choices informed by their resilience to adversarial manipulation. We conduct a comprehensive analysis of Minerva across a diverse spectrum of ransomware types, encompassing unseen ransomware as well as variants designed specifically to evade Minerva. Our evaluation showcases the ability of Minerva to accurately identify ransomware, generalize to unseen threats, and withstand evasion attacks. Furthermore, Minerva achieves remarkably low detection times, enabling the adoption of data loss prevention techniques with near-zero overhead.
△ Less
Submitted 16 April, 2024; v1 submitted 26 January, 2023;
originally announced January 2023.
-
Lp simulation for measures
Authors:
Laura De Carli,
Eli Liflyand
Abstract:
Being motivated by general interest as well as by certain concrete problems of Fourier Analysis, we construct analogs of the Lp spaces for measures. It turns out that most of standard properties of the usual Lp spaces for functions are extended to the measure setting. We illustrate the obtained results by examples and apply them to obtain a version of the uncertainty principle and an integrability…
▽ More
Being motivated by general interest as well as by certain concrete problems of Fourier Analysis, we construct analogs of the Lp spaces for measures. It turns out that most of standard properties of the usual Lp spaces for functions are extended to the measure setting. We illustrate the obtained results by examples and apply them to obtain a version of the uncertainty principle and an integrability result for the Fourier transform of a function of bounded variation.
△ Less
Submitted 8 January, 2023;
originally announced January 2023.
-
Applications of Lax-Milgram theorem to problems in frame theory
Authors:
Laura De Carli,
Pierluigi Vellucci
Abstract:
We apply Lax-Milgram theorem to characterize scalable and piecewise scalable frame in finite and infinite-dimensional Hilbert spaces. We also introduce a method for approximating the inverse frame operator using finite-dimensional linear algebra which, to the best of our knowledge, is new in the literature.
We apply Lax-Milgram theorem to characterize scalable and piecewise scalable frame in finite and infinite-dimensional Hilbert spaces. We also introduce a method for approximating the inverse frame operator using finite-dimensional linear algebra which, to the best of our knowledge, is new in the literature.
△ Less
Submitted 2 December, 2022;
originally announced December 2022.
-
Remarks on scalable frames
Authors:
Peter G. Casazza,
Laura De Carli,
Tin T. Tran
Abstract:
This paper investigates scalable frame in ${\mathbb R}^n$. We define the reduced diagram matrix of a frame and use it to classify scalability of the frame under some conditions. We give a new approach to the scaling problem by breaking the problem into two smaller ones, each of which is easily solved, giving a simple way to check scaling. Finally, we study the scalability of dual frames.
This paper investigates scalable frame in ${\mathbb R}^n$. We define the reduced diagram matrix of a frame and use it to classify scalability of the frame under some conditions. We give a new approach to the scaling problem by breaking the problem into two smaller ones, each of which is easily solved, giving a simple way to check scaling. Finally, we study the scalability of dual frames.
△ Less
Submitted 20 November, 2022;
originally announced November 2022.
-
Piecewise scalable frames
Authors:
Peter G. Casazza,
Laura De Carli,
Tin T. Tran
Abstract:
In this paper we define "piecewise scalable frames". This new scaling process allows us to alter many frames to Parseval frames which is impossible by the previous standard scaling. We give necessary and sufficient conditions for a frame to be piecewise scalable. We show that piecewise scalability is preserved under unitary transformations. Unlike standard scaling, we show that all frames in…
▽ More
In this paper we define "piecewise scalable frames". This new scaling process allows us to alter many frames to Parseval frames which is impossible by the previous standard scaling. We give necessary and sufficient conditions for a frame to be piecewise scalable. We show that piecewise scalability is preserved under unitary transformations. Unlike standard scaling, we show that all frames in $\RR^2$ and $\RR^3$ are piecewise scalable. We also show that if the frame vectors are close to each other, then they might not be piecewise scalable. Several properties of scaling constants are also presented.
△ Less
Submitted 23 March, 2022;
originally announced March 2022.
-
Reliable Detection of Compressed and Encrypted Data
Authors:
Fabio De Gaspari,
Dorjan Hitaj,
Giulio Pagnotta,
Lorenzo De Carli,
Luigi V. Mancini
Abstract:
Several cybersecurity domains, such as ransomware detection, forensics and data analysis, require methods to reliably identify encrypted data fragments. Typically, current approaches employ statistics derived from byte-level distribution, such as entropy estimation, to identify encrypted fragments. However, modern content types use compression techniques which alter data distribution pushing it cl…
▽ More
Several cybersecurity domains, such as ransomware detection, forensics and data analysis, require methods to reliably identify encrypted data fragments. Typically, current approaches employ statistics derived from byte-level distribution, such as entropy estimation, to identify encrypted fragments. However, modern content types use compression techniques which alter data distribution pushing it closer to the uniform distribution. The result is that current approaches exhibit unreliable encryption detection performance when compressed data appears in the dataset. Furthermore, proposed approaches are typically evaluated over few data types and fragment sizes, making it hard to assess their practical applicability. This paper compares existing statistical tests on a large, standardized dataset and shows that current approaches consistently fail to distinguish encrypted and compressed data on both small and large fragment sizes. We address these shortcomings and design EnCoD, a learning-based classifier which can reliably distinguish compressed and encrypted data. We evaluate EnCoD on a dataset of 16 different file types and fragment sizes ranging from 512B to 8KB. Our results highlight that EnCoD outperforms current approaches by a wide margin, with accuracy ranging from ~82 for 512B fragments up to ~92 for 8KB data fragments. Moreover, EnCoD can pinpoint the exact format of a given data fragment, rather than performing only binary classification like previous approaches.
△ Less
Submitted 31 March, 2021;
originally announced March 2021.
-
EnCoD: Distinguishing Compressed and Encrypted File Fragments
Authors:
Fabio De Gaspari,
Dorjan Hitaj,
Giulio Pagnotta,
Lorenzo De Carli,
Luigi V. Mancini
Abstract:
Reliable identification of encrypted file fragments is a requirement for several security applications, including ransomware detection, digital forensics, and traffic analysis. A popular approach consists of estimating high entropy as a proxy for randomness. However, many modern content types (e.g. office documents, media files, etc.) are highly compressed for storage and transmission efficiency.…
▽ More
Reliable identification of encrypted file fragments is a requirement for several security applications, including ransomware detection, digital forensics, and traffic analysis. A popular approach consists of estimating high entropy as a proxy for randomness. However, many modern content types (e.g. office documents, media files, etc.) are highly compressed for storage and transmission efficiency. Compression algorithms also output high-entropy data, thus reducing the accuracy of entropy-based encryption detectors. Over the years, a variety of approaches have been proposed to distinguish encrypted file fragments from high-entropy compressed fragments. However, these approaches are typically only evaluated over a few, select data types and fragment sizes, which makes a fair assessment of their practical applicability impossible. This paper aims to close this gap by comparing existing statistical tests on a large, standardized dataset. Our results show that current approaches cannot reliably tell apart encryption and compression, even for large fragment sizes. To address this issue, we design EnCoD, a learning-based classifier which can reliably distinguish compressed and encrypted data, starting with fragments as small as 512 bytes. We evaluate EnCoD against current approaches over a large dataset of different data types, showing that it outperforms current state-of-the-art for most considered fragment sizes and data types.
△ Less
Submitted 15 October, 2020;
originally announced October 2020.
-
SpellBound: Defending Against Package Typosquatting
Authors:
Matthew Taylor,
Ruturaj K. Vaidya,
Drew Davidson,
Lorenzo De Carli,
Vaibhav Rastogi
Abstract:
Package managers for software repositories based on a single programming language are very common. Examples include npm (JavaScript), and PyPI (Python). These tools encourage code reuse, making it trivial for developers to import external packages. Unfortunately, repositories' size and the ease with which packages can be published facilitates the practice of typosquatting: the uploading of a packa…
▽ More
Package managers for software repositories based on a single programming language are very common. Examples include npm (JavaScript), and PyPI (Python). These tools encourage code reuse, making it trivial for developers to import external packages. Unfortunately, repositories' size and the ease with which packages can be published facilitates the practice of typosquatting: the uploading of a package with name similar to that of a highly popular package, typically with the aim of capturing some of the popular package's installs. Typosquatting has serious negative implications, resulting in developers importing malicious packages, or -- as we show -- code clones which do not incorporate recent security updates. In order to tackle this problem, we present SpellBound, a tool for identifying and reporting potentially erroneous imports to developers. SpellBound implements a novel typosquatting detection technique, based on an in-depth analysis of npm and PyPI. Our technique leverages a model of lexical similarity between names, and further incorporates the notion of package popularity. This approach flags cases where unknown/scarcely used packages would be installed in place of popular ones with similar names, before installation occurs. We evaluated SpellBound on both npm and PyPI, with encouraging results: SpellBound flags typosquatting cases while generating limited warnings (0.5% of total package installs), and low overhead (only 2.5% of package install time). Furthermore, SpellBound allowed us to confirm known cases of typosquatting and discover one high-profile, unknown case of typosquatting that resulted in a package takedown by the npm security team.
△ Less
Submitted 6 March, 2020;
originally announced March 2020.
-
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
Authors:
Fabio De Gaspari,
Dorjan Hitaj,
Giulio Pagnotta,
Lorenzo De Carli,
Luigi V. Mancini
Abstract:
Recent progress in machine learning has generated promising results in behavioral malware detection. Behavioral modeling identifies malicious processes via features derived by their runtime behavior. Behavioral features hold great promise as they are intrinsically related to the functioning of each malware, and are therefore considered difficult to evade. Indeed, while a significant amount of resu…
▽ More
Recent progress in machine learning has generated promising results in behavioral malware detection. Behavioral modeling identifies malicious processes via features derived by their runtime behavior. Behavioral features hold great promise as they are intrinsically related to the functioning of each malware, and are therefore considered difficult to evade. Indeed, while a significant amount of results exists on evasion of static malware features, evasion of dynamic features has seen limited work. This paper thoroughly examines the robustness of behavioral malware detectors to evasion, focusing particularly on anti-ransomware evasion. We choose ransomware as its behavior tends to differ significantly from that of benign processes, making it a low-hanging fruit for behavioral detection (and a difficult candidate for evasion). Our analysis identifies a set of novel attacks that distribute the overall malware workload across a small set of cooperating processes to avoid the generation of significant behavioral features. Our most effective attack decreases the accuracy of a state-of-the-art classifier from 98.6% to 0% using only 18 cooperating processes. Furthermore, we show our attacks to be effective against commercial ransomware detectors even in a black-box setting.
△ Less
Submitted 6 November, 2019;
originally announced November 2019.
-
Security Issues in Language-based Software Ecosystems
Authors:
Ruturaj K. Vaidya,
Lorenzo De Carli,
Drew Davidson,
Vaibhav Rastogi
Abstract:
Language-based ecosystems (LBE), i.e., software ecosystems based on a single programming language, are very common. Examples include the npm ecosystem for JavaScript, and PyPI for Python. These environments encourage code reuse between packages, and incorporate utilities - package managers - for automatically resolving dependencies. However, the same aspects that make these systems popular - ease…
▽ More
Language-based ecosystems (LBE), i.e., software ecosystems based on a single programming language, are very common. Examples include the npm ecosystem for JavaScript, and PyPI for Python. These environments encourage code reuse between packages, and incorporate utilities - package managers - for automatically resolving dependencies. However, the same aspects that make these systems popular - ease of publishing code and importing external code - also create novel security issues, which have so far seen little study.
We present an a systematic study of security issues that plague LBEs. These issues are inherent to the ways these ecosystems work and cannot be resolved by fixing software vulnerabilities in either the packages or the utilities, e.g., package manager tools, that build these ecosystems. We systematically characterize recent security attacks from various aspects, including attack strategies, vectors, and goals. Our characterization and in-depth analysis of npm and PyPI ecosystems, which represent the largest LBEs, covering nearly one million packages indicates that these ecosystems make an opportune environment for attackers to incorporate stealthy attacks.
Overall, we argue that (i) fully automated detection of malicious packages is likely to be unfeasible; however (ii) tools and metrics that help developers assess the risk of including external dependencies would go a long way toward preventing attacks.
△ Less
Submitted 30 November, 2021; v1 submitted 6 March, 2019;
originally announced March 2019.
-
Riesz bases from orthonormal bases by replacement
Authors:
Laura De Carli,
Julian Edward
Abstract:
Given an orthonormal basis
$ {\mathcal V}=
\{v_j\} _{j\in N}$ in a separable Hilbert space $H$ and a set of unit vectors
$ {\mathcal B}=\{w_j\}_{j\in N}$, we consider the sets $ {\mathcal B}_N$ obtained by replacing the vectors $v_1, ...,\, v_N$ with vectors $w_1,\, ...,\, w_N$. We show necessary and sufficient conditions that ensure that the sets $ {\mathcal B}_N$ are Riesz bases of $H$ and…
▽ More
Given an orthonormal basis
$ {\mathcal V}=
\{v_j\} _{j\in N}$ in a separable Hilbert space $H$ and a set of unit vectors
$ {\mathcal B}=\{w_j\}_{j\in N}$, we consider the sets $ {\mathcal B}_N$ obtained by replacing the vectors $v_1, ...,\, v_N$ with vectors $w_1,\, ...,\, w_N$. We show necessary and sufficient conditions that ensure that the sets $ {\mathcal B}_N$ are Riesz bases of $H$ and we estimate the frame constants of the $ {\mathcal B}_N$. Then, we prove conditions that ensure that $ {\mathcal B}$ is a Riesz basis. Applications to the construction of exponential bases on domains of $ R^d$ are also presented.
△ Less
Submitted 29 April, 2018;
originally announced April 2018.
-
Weighted gradient inequalities and unique continuation problems
Authors:
laura De Carli,
Dmitry Gorbachev,
Sergey Tikhonov
Abstract:
We use Pitt inequalities for the Fourier transform to prove the following weighted gradient inequality $$ \|e^{-τ\ell(\cdot)} u^{\frac 1q} f\|_q\leq c_τ\| e^{-τ\ell(\cdot)} v^{\frac 1p}\, \nabla f\|_p, \quad f\in C^\infty_0( R^n). $$ This inequality is a Carleman-type estimate that yields unique continuation results for solutions of first order differential equations and systems.
We use Pitt inequalities for the Fourier transform to prove the following weighted gradient inequality $$ \|e^{-τ\ell(\cdot)} u^{\frac 1q} f\|_q\leq c_τ\| e^{-τ\ell(\cdot)} v^{\frac 1p}\, \nabla f\|_p, \quad f\in C^\infty_0( R^n). $$ This inequality is a Carleman-type estimate that yields unique continuation results for solutions of first order differential equations and systems.
△ Less
Submitted 10 April, 2018;
originally announced April 2018.
-
Three problems on exponential bases
Authors:
Laura De Carli,
Alberto Mizrahi,
Alexander Tepper
Abstract:
We consider three special and significant cases of the following problem. Let D be a (possibly unbounded) set of finite Lebesgue measure in R^d. Find conditions on D for which the standard exponential basis on the unit cube of R^d is a frame, a Riesz sequence, or a Riesz basis on L^2(D).
We consider three special and significant cases of the following problem. Let D be a (possibly unbounded) set of finite Lebesgue measure in R^d. Find conditions on D for which the standard exponential basis on the unit cube of R^d is a frame, a Riesz sequence, or a Riesz basis on L^2(D).
△ Less
Submitted 10 April, 2018; v1 submitted 15 October, 2017;
originally announced October 2017.
-
p-Riesz bases in quasi shift invariant spaces
Authors:
Laura De Carli,
Pierluigi Vellucci
Abstract:
Let $ 1\leq p< \infty$ and let $ψ\in L^{p}(\R^d)$. We study $p-$Riesz bases of quasi shift invariant spaces $V^p(ψ;Y)$.
Let $ 1\leq p< \infty$ and let $ψ\in L^{p}(\R^d)$. We study $p-$Riesz bases of quasi shift invariant spaces $V^p(ψ;Y)$.
△ Less
Submitted 2 October, 2017;
originally announced October 2017.
-
Exponential bases on triangular domains
Authors:
Laura De Carli,
Alberto Mizrahi
Abstract:
We construct explicit exponential bases on triangles in R^2 and on infinite unions of segments on the real line.
We construct explicit exponential bases on triangles in R^2 and on infinite unions of segments on the real line.
△ Less
Submitted 16 September, 2016; v1 submitted 30 August, 2016;
originally announced August 2016.
-
Stability results for Gabor frames and the p-order hold models
Authors:
Laura De Carli,
Pierluigi Vellucci
Abstract:
We prove stability results for a class of Gabor frames in $ L^2(\R)$. We consider window functions in the Sobolev spaces $H^1_0(\R)$ and B-splines of order $p\ge 1$. Our results can be used to describe the effect of the timing jitters in the $p$-order hold models of signal reconstruction.
We prove stability results for a class of Gabor frames in $ L^2(\R)$. We consider window functions in the Sobolev spaces $H^1_0(\R)$ and B-splines of order $p\ge 1$. Our results can be used to describe the effect of the timing jitters in the $p$-order hold models of signal reconstruction.
△ Less
Submitted 2 October, 2017; v1 submitted 5 May, 2016;
originally announced May 2016.
-
Towards Least Privilege Containers with Cimplifier
Authors:
Vaibhav Rastogi,
Drew Davidson,
Lorenzo De Carli,
Somesh Jha,
Patrick McDaniel
Abstract:
Application containers, such as Docker containers, have recently gained popularity as a solution for agile and seamless deployment of applications. These light-weight virtualization environments run applications that are packed together with their resources and configuration information, and thus can be deployed across various software platforms. However, these software ecosystems are not conduciv…
▽ More
Application containers, such as Docker containers, have recently gained popularity as a solution for agile and seamless deployment of applications. These light-weight virtualization environments run applications that are packed together with their resources and configuration information, and thus can be deployed across various software platforms. However, these software ecosystems are not conducive to the true and tried security principles of privilege separation (PS) and principle of least privilege (PLP). We propose algorithms and a tool Cimplifier, which address these concerns in the context of containers. Specifically, given a container our tool partitions them into simpler containers, which are only provided enough resources to perform their functionality. As part our solution, we develop techniques for analyzing resource usage, for performing partitioning, and gluing the containers together to preserve functionality. Our evaluation on real-world containers demonstrates that Cimplifier can preserve the original functionality, leads to reduction in image size of 58-95%, and processes even large containers in under thirty seconds.
△ Less
Submitted 26 February, 2016;
originally announced February 2016.
-
Exponential bases on multi-rectangles in $\mathbb{R}^d$
Authors:
Laura De Carli
Abstract:
We construct explicit exponential bases on finite unions of disjoint rectangles of $\mathbb{R}^d$ with rational vertices.
We construct explicit exponential bases on finite unions of disjoint rectangles of $\mathbb{R}^d$ with rational vertices.
△ Less
Submitted 4 September, 2016; v1 submitted 7 December, 2015;
originally announced December 2015.
-
Pitt inequalities and restriction theorems for the Fourier transform
Authors:
Laura De Carli,
Dmitriy Gorbachev,
Sergey Tikhonov
Abstract:
We prove new Pitt inequalities for the Fourier transforms with radial and non-radial weights using weighted restriction inequalities for the Fourier transform on the sphere. We also prove new Riemann-Lebesgue estimates and versions of the uncertainty principle for the Fourier transform.
We prove new Pitt inequalities for the Fourier transforms with radial and non-radial weights using weighted restriction inequalities for the Fourier transform on the sphere. We also prove new Riemann-Lebesgue estimates and versions of the uncertainty principle for the Fourier transform.
△ Less
Submitted 3 September, 2015;
originally announced September 2015.
-
One-parameter groups of operators and discrete Hilbert transforms
Authors:
Laura De Carli,
Gohin Shaikh Samad
Abstract:
We show that the discrete Hilbert transform and the discrete Kak-Hilbert transform are infinitesimal generator of one-parameter groups of operators
We show that the discrete Hilbert transform and the discrete Kak-Hilbert transform are infinitesimal generator of one-parameter groups of operators
△ Less
Submitted 5 May, 2016; v1 submitted 10 June, 2015;
originally announced June 2015.
-
Stability of exponential bases on d- dimensional domains
Authors:
Laura De Carli,
Santosh Pathak
Abstract:
We find explicit stability bounds for exponential Riesz bases on domains of R^d. Our results generalize Kadec theorem and other stability theorems in the literature.
We find explicit stability bounds for exponential Riesz bases on domains of R^d. Our results generalize Kadec theorem and other stability theorems in the literature.
△ Less
Submitted 21 September, 2014; v1 submitted 10 March, 2014;
originally announced March 2014.
-
Minimal potential results for the Schrodinger equation in a slab
Authors:
Laura De Carli,
Steve Hudson,
Xiaosheng Li
Abstract:
Consider the Schrodinger equation -Δu =(k+V) u in an infinite slab S= \R^{n-1}x (0,1), where V is a bounded potential supported on a set D of finite measure. We prove necessary conditions for the existence of nontrivial admissible solutions. These conditions involve the sup. of |V|, the measure of D, and the distance of k from the "special set" {π^2 m^2, m positive integer}. In many cases, these i…
▽ More
Consider the Schrodinger equation -Δu =(k+V) u in an infinite slab S= \R^{n-1}x (0,1), where V is a bounded potential supported on a set D of finite measure. We prove necessary conditions for the existence of nontrivial admissible solutions. These conditions involve the sup. of |V|, the measure of D, and the distance of k from the "special set" {π^2 m^2, m positive integer}. In many cases, these inequalities are sharp.
△ Less
Submitted 1 September, 2013;
originally announced September 2013.
-
Split functions, Fourier transforms and multipliers
Authors:
Laura De Carli,
Steve Hudson
Abstract:
We study the effect of a splitting operator S_t on the L^p norm of the Fourier transform of a function f and on the operator norm of a Fourier multiplier m. Most of our results assume p is an even integer, and are often stronger when f or m has compact support.
We study the effect of a splitting operator S_t on the L^p norm of the Fourier transform of a function f and on the operator norm of a Fourier multiplier m. Most of our results assume p is an even integer, and are often stronger when f or m has compact support.
△ Less
Submitted 1 September, 2013;
originally announced September 2013.
-
Parseval frames with n+1 vectors in R^n
Authors:
Laura De Carli,
Zhongyuan Hu
Abstract:
We construct a Parseval frame with $n+1$ vectors in $\R^n$ that contains a given vector. We also provide a characterization of unit-norm frames that can be scaled to a Parseval frame.
We construct a Parseval frame with $n+1$ vectors in $\R^n$ that contains a given vector. We also provide a characterization of unit-norm frames that can be scaled to a Parseval frame.
△ Less
Submitted 14 September, 2013; v1 submitted 14 August, 2013;
originally announced August 2013.
-
Minimal support results for Schrödinger equations
Authors:
Laura De Carli,
Julian Edward,
Steve Hudson,
Mark Leckband
Abstract:
We consider a number of linear and non-linear boundary value problems involving generalized Schrödinger equations. The model case is $-Δu=Vu$ for $u\in W_0^{1,2}(D)$ with $D$ a bounded domain in ${\bf R^n}$. We use the Sobolev embedding theorem, and in some cases the Moser-Trudinger inequality and the Hardy-Sobolev inequality, to derive necessary conditions for the existence of nontrivial solution…
▽ More
We consider a number of linear and non-linear boundary value problems involving generalized Schrödinger equations. The model case is $-Δu=Vu$ for $u\in W_0^{1,2}(D)$ with $D$ a bounded domain in ${\bf R^n}$. We use the Sobolev embedding theorem, and in some cases the Moser-Trudinger inequality and the Hardy-Sobolev inequality, to derive necessary conditions for the existence of nontrivial solutions. These conditions usually involve a lower bound for a product of powers of the norm of $V$, the measure of $D$, and a sharp Sobolev constant. In most cases, these inequalities are best possible.
△ Less
Submitted 18 February, 2013;
originally announced February 2013.
-
Exponential bases on two dimensional trapezoids
Authors:
Laura De Carli,
Anudeep Kumar
Abstract:
We discuss existence and stability of Riesz bases of exponential type of L^2(T) for special domains T called trapezoids.
We construct exponential bases on L^2(T) when T is a finite union of rectangles with the same height. We also generalize our main theorems in dimension d\ge 3.
We discuss existence and stability of Riesz bases of exponential type of L^2(T) for special domains T called trapezoids.
We construct exponential bases on L^2(T) when T is a finite union of rectangles with the same height. We also generalize our main theorems in dimension d\ge 3.
△ Less
Submitted 18 June, 2013; v1 submitted 19 August, 2012;
originally announced August 2012.