Skip to main content

Showing 1–9 of 9 results for author: Dupont, B

.
  1. arXiv:2307.02701  [pdf

    cs.RO eess.SP

    Touch, press and stroke: a soft capacitive sensor skin

    Authors: Mirza S. Sarwar, Ryusuke Ishizaki, Kieran Morton, Claire Preston, Tan Nguyen, Xu Fan, Bertille Dupont, Leanna Hogarth, Takahide Yoshiike, Shahriar Mirabbasi, John D. W. Madden

    Abstract: Soft sensors that can discriminate shear and normal force could help provide machines the fine control desirable for safe and effective physical interactions with people. A capacitive sensor is made for this purpose, composed of patterned elastomer and containing both fixed and sliding pillars that allow the sensor to deform and buckle, much like skin itself. The sensor differentiates between simu… ▽ More

    Submitted 5 July, 2023; originally announced July 2023.

    Comments: 9 pages, 5 figures, submitted to Scientific Reports Nature

  2. arXiv:2107.07042  [pdf, other

    cs.LG cs.CV

    Classifying Component Function in Product Assemblies with Graph Neural Networks

    Authors: Vincenzo Ferrero, Kaveh Hassani, Daniele Grandi, Bryony DuPont

    Abstract: Function is defined as the ensemble of tasks that enable the product to complete the designed purpose. Functional tools, such as functional modeling, offer decision guidance in the early phase of product design, where explicit design decisions are yet to be made. Function-based design data is often sparse and grounded in individual interpretation. As such, function-based design tools can benefit f… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

  3. arXiv:2103.14760  [pdf, ps, other

    math.QA math.RT

    Categorification of infinite-dimensional $\mathfrak{sl}_2$-modules and braid group 2-actions I: tensor products

    Authors: Benjamin Dupont, Grégoire Naisse

    Abstract: This is the first part of a series of two papers aiming to construct a categorification of the braiding on tensor products of Verma modules, and in particular of the Lawrence--Krammer--Bigelow representations. \\ In this part, we categorify all tensor products of Verma modules and integrable modules for quantum $\mathfrak{sl_2}$. The categorification is given by derived categories of dg versions o… ▽ More

    Submitted 26 March, 2021; originally announced March 2021.

    Comments: v1, 81 pages (52 without Appendices and references)

    Report number: MPIM-Bonn-2021

  4. arXiv:2102.00276  [pdf, ps, other

    math.QA math.CT math.RT

    Super rewriting theory and nondegeneracy of odd categorified sl(2)

    Authors: Benjamin Dupont, Mark Ebert, Aaron D. Lauda

    Abstract: We develop the rewriting theory for monoidal supercategories and 2-supercategories. This extends the theory of higher-dimensional rewriting established for (linear) 2-categories to the super setting, providing a suite of tools for constructing bases and normal forms for 2-supercategories given by generators and relations. We then employ this newly developed theory to prove the non-degeneracy conje… ▽ More

    Submitted 30 January, 2021; originally announced February 2021.

    Comments: 58 pages, tikz diagrams

    MSC Class: 20G42; 17B37; 17A70; 68Q42

  5. arXiv:2004.14361  [pdf, ps, other

    math.CT

    Confluence of algebraic rewriting systems

    Authors: Cyrille Chenavier, Benjamin Dupont, Philippe Malbos

    Abstract: Convergent rewriting systems on algebraic structures give methods to solve decision problems, to prove coherence results, and to compute homological invariants. These methods are based on higher-dimensional extensions of the critical branching lemma that proves local confluence from confluence of the critical branchings. The analysis of local confluence of rewriting systems on algebraic structures… ▽ More

    Submitted 5 November, 2021; v1 submitted 29 April, 2020; originally announced April 2020.

    Comments: 29 pages

    MSC Class: 68Q42; 18C10

  6. arXiv:1907.09901  [pdf, ps, other

    math.RT math.CT math.QA

    Rewriting modulo isotopies in Khovanov-Lauda-Rouquier's categorification of quantum groups

    Authors: Benjamin Dupont

    Abstract: We study a presentation of Khovanov - Lauda - Rouquier's candidate $2$-categorification of a quantum group using algebraic rewriting methods. We use a computational approach based on rewriting modulo the isotopy axioms of its pivotal structure to compute a family of linear bases for all the vector spaces of $2$-cells in this $2$-category. We show that these bases correspond to Khovanov and Lauda's… ▽ More

    Submitted 23 July, 2019; originally announced July 2019.

  7. arXiv:1906.03904  [pdf, ps, other

    math.CT

    Rewriting modulo isotopies in pivotal linear $(2,2)$-categories

    Authors: Benjamin Dupont

    Abstract: In this paper, we study rewriting modulo a set of algebraic axioms in categories enriched in linear categories, called linear~$(2,2)$-categories. We introduce the structure of linear~$(3,2)$-polygraph modulo as a presentation of a linear~$(2,2)$-category by a rewriting system modulo algebraic axioms. We introduce a symbolic computation method in order to compute linear bases for the vector spaces… ▽ More

    Submitted 10 June, 2019; originally announced June 2019.

  8. arXiv:1810.08184  [pdf, ps, other

    math.CT

    Coherent confluence modulo relations and double groupoids

    Authors: Benjamin Dupont, Philippe Malbos

    Abstract: A coherent presentation of an n-category is a presentation by generators, relations and relations among relations. Confluent and terminating rewriting systems generate coherent presentations, whose relations among relations are defined by confluence diagrams of critical branchings. This article introduces a procedure to compute coherent presentations when the rewrite relations are defined modulo a… ▽ More

    Submitted 4 October, 2021; v1 submitted 18 October, 2018; originally announced October 2018.

    MSC Class: 68Q42; 18D05

  9. arXiv:1804.04080  [pdf, ps, other

    cs.CR

    Ransomware Payments in the Bitcoin Ecosystem

    Authors: Masarah Paquet-Clouston, Bernhard Haslhofer, Benoit Dupont

    Abstract: Ransomware can prevent a user from accessing a device and its files until a ransom is paid to the attacker, most frequently in Bitcoin. With over 500 known ransomware families, it has become one of the dominant cybercrime threats for law enforcement, security professionals and the public. However, a more comprehensive, evidence-based picture on the global direct financial impact of ransomware atta… ▽ More

    Submitted 11 April, 2018; originally announced April 2018.

    Comments: 17th Annual Workshop on the Economics of Information Security (WEIS)