-
Asynchronous BFT Asset Transfer: Quasi-Anonymous, Light, and Consensus-Free
Authors:
Timothé Albouy,
Emmanuelle Anceaume,
Davide Frey,
Mathieu Gestin,
Arthur Rauch,
Michel Raynal,
François Taïani
Abstract:
This article introduces a new asynchronous Byzantine-tolerant asset transfer system (cryptocurrency) with three noteworthy properties: quasi-anonymity, lightness, and consensus-freedom. Quasi-anonymity means no information is leaked regarding the receivers and amounts of the asset transfers. Lightness means that the underlying cryptographic schemes are \textit{succinct}, and each process only stor…
▽ More
This article introduces a new asynchronous Byzantine-tolerant asset transfer system (cryptocurrency) with three noteworthy properties: quasi-anonymity, lightness, and consensus-freedom. Quasi-anonymity means no information is leaked regarding the receivers and amounts of the asset transfers. Lightness means that the underlying cryptographic schemes are \textit{succinct}, and each process only stores data polylogarithmic in the number of its own transfers.Consensus-freedom means the system does not rely on a total order of asset transfers. The proposed algorithm is the first asset transfer system that simultaneously fulfills all these properties in the presence of asynchrony and Byzantine processes. To obtain them, the paper adopts a modular approach combining a new distributed object called agreement proofs and well-known techniques such as vector commitments, universal accumulators, and zero-knowledge proofs. The paper also presents a new non-trivial universal accumulator implementation that does not need knowledge of the underlying accumulated set to generate (non-)membership proofs, which could benefit other crypto-based applications.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
Low-Cost Privacy-Aware Decentralized Learning
Authors:
Sayan Biswas,
Davide Frey,
Romaric Gaudel,
Anne-Marie Kermarrec,
Dimitri Lerévérend,
Rafael Pires,
Rishi Sharma,
François Taïani
Abstract:
This paper introduces ZIP-DL, a novel privacy-aware decentralized learning (DL) algorithm that exploits correlated noise to provide strong privacy protection against a local adversary while yielding efficient convergence guarantees for a low communication cost. The progressive neutralization of the added noise during the distributed aggregation process results in ZIP-DL fostering a high model accu…
▽ More
This paper introduces ZIP-DL, a novel privacy-aware decentralized learning (DL) algorithm that exploits correlated noise to provide strong privacy protection against a local adversary while yielding efficient convergence guarantees for a low communication cost. The progressive neutralization of the added noise during the distributed aggregation process results in ZIP-DL fostering a high model accuracy under privacy guarantees. ZIP-DL further uses a single communication round between each gradient descent, thus minimizing communication overhead. We provide theoretical guarantees for both convergence speed and privacy guarantees, thereby making ZIP-DL applicable to practical scenarios. Our extensive experimental study shows that ZIP-DL significantly outperforms the state-of-the-art in terms of vulnerability/accuracy trade-off. In particular, ZIP-DL (i) reduces the efficacy of linkability attacks by up to 52 percentage points compared to baseline DL, (ii) improves accuracy by up to 37 percent w.r.t. the state-of-the-art privacy-preserving mechanism operating under the same threat model as ours, when configured to provide the same protection against membership inference attacks, and (iii) reduces communication by up to 10.5x against the same competitor for the same level of protection.
△ Less
Submitted 25 June, 2024; v1 submitted 18 March, 2024;
originally announced March 2024.
-
Towards Optimal Communication Byzantine Reliable Broadcast under a Message Adversary
Authors:
Timothé Albouy,
Davide Frey,
Ran Gelles,
Carmit Hazay,
Michel Raynal,
Elad Michael Schiller,
Francois Taiani,
Vassilis Zikas
Abstract:
We address the problem of Reliable Broadcast in asynchronous message-passing systems with $n$ nodes, of which up to $t$ are malicious (faulty), in addition to a message adversary that can drop some of the messages sent by correct (non-faulty) nodes.
We present a Message-Adversary-Tolerant Byzantine Reliable Broadcast (MBRB) algorithm that communicates an almost optimal amount of $O(|m|+n^2κ)$ bi…
▽ More
We address the problem of Reliable Broadcast in asynchronous message-passing systems with $n$ nodes, of which up to $t$ are malicious (faulty), in addition to a message adversary that can drop some of the messages sent by correct (non-faulty) nodes.
We present a Message-Adversary-Tolerant Byzantine Reliable Broadcast (MBRB) algorithm that communicates an almost optimal amount of $O(|m|+n^2κ)$ bits per node, where $|m|$ represents the length of the application message and $κ=Ω(\log n)$ is a security parameter. This improves upon the state-of-the-art MBRB solution (Albouy, Frey, Raynal, and Taïani, SSS 2021), which incurs communication of $O(n|m|+n^2κ)$ bits per node.
Our solution sends at most $4n^2$ messages overall, which is asymptotically optimal. Reduced communication is achieved by employing coding techniques that replace the need for all nodes to (re-)broadcast the entire message~$m$. Instead, nodes forward authenticated fragments of the encoding of $m$ using an erasure-correcting code. Under the cryptographic assumptions of PKI and collision-resistant hash, and assuming $n > 3t + 2d$, where the adversary drops at most~$d$ messages per broadcast, our algorithm allows most of the correct nodes to reconstruct~$m$, despite missing fragments caused by the malicious nodes and the message adversary.
△ Less
Submitted 25 December, 2023;
originally announced December 2023.
-
Process-Commutative Distributed Objects: From Cryptocurrencies to Byzantine-Fault-Tolerant CRDTs
Authors:
Davide Frey,
Lucie Guillou,
Michel Raynal,
François Taïani
Abstract:
This paper explores the territory that lies between best-effort Byzantine-Fault-Tolerant Conflict-free Replicated Data Types (BFT CRDTs) and totally ordered distributed ledgers, such as those implemented by Blockchains. It formally characterizes a novel class of distributed objects that only requires a First In First Out (FIFO) order on the object operations from each process (taken individually).…
▽ More
This paper explores the territory that lies between best-effort Byzantine-Fault-Tolerant Conflict-free Replicated Data Types (BFT CRDTs) and totally ordered distributed ledgers, such as those implemented by Blockchains. It formally characterizes a novel class of distributed objects that only requires a First In First Out (FIFO) order on the object operations from each process (taken individually). The formalization leverages Mazurkiewicz traces to define legal sequences of operations and ensure both Strong Eventual Consistency (SEC) and Pipleline Consistency (PC). The paper presents a generic algorithm that implements this novel class of distributed objects both in a crash- and Byzantine setting. It also illustrates the practical interest of the proposed approach using four instances of this class of objects, namely money transfer, Petri nets, multi-sets, and concurrent work stealing dequeues.
△ Less
Submitted 8 March, 2024; v1 submitted 23 November, 2023;
originally announced November 2023.
-
Context Adaptive Cooperation
Authors:
Timothé Albouy,
Davide Frey,
Mathieu Gestin,
Michel Raynal,
François Taïani
Abstract:
Reliable broadcast and consensus are the two pillars that support a lot of non-trivial fault-tolerant distributed middleware and fault-tolerant distributed systems. While they have close definitions, they strongly differ in the underlying assumptions needed to implement each of them. Reliable broadcast can be implemented in asynchronous systems in the presence of crash or Byzantine failures while…
▽ More
Reliable broadcast and consensus are the two pillars that support a lot of non-trivial fault-tolerant distributed middleware and fault-tolerant distributed systems. While they have close definitions, they strongly differ in the underlying assumptions needed to implement each of them. Reliable broadcast can be implemented in asynchronous systems in the presence of crash or Byzantine failures while Consensus cannot. This key difference stems from the fact that consensus involves synchronization between multiple processes that concurrently propose values, while reliable broadcast simply involves delivering a message from a predefined sender. This paper strikes a balance between these two agreement abstractions in the presence of Byzantine failures. It proposes CAC, a novel agreement abstraction that enables multiple processes to broadcast messages simultaneously, while guaranteeing that (despite potential conflicts, asynchrony, and Byzantine behaviors) the non-faulty processes will agree on messages deliveries. We show that this novel abstraction can enable more efficient algorithms for a variety of applications (such as money transfer where several people can share a same account). This is obtained by focusing the need for synchronization only on the processes that actually need to synchronize.
△ Less
Submitted 15 November, 2023;
originally announced November 2023.
-
Modeling of Surface Damage at the Si/SiO$_2$-interface of Irradiated MOS-capacitors
Authors:
N. Akchurin,
G. Altopp,
B. Burkle,
W. D. Frey,
U. Heintz,
N. Hinton,
M. Hoeferkamp,
Y. Kazhykarim,
V. Kuryatkov,
T. Mengke,
T. Peltola,
S. Seidel,
E. Spencer,
M. Tripathi,
J. Voelker
Abstract:
Surface damage caused by ionizing radiation in SiO$_2$ passivated silicon particle detectors consists mainly of the accumulation of a positively charged layer along with trapped-oxide-charge and interface traps inside the oxide and close to the Si/SiO$_2$-interface. High density positive interface net charge can be detrimental to the operation of a multi-channel $n$-on-$p$ sensor since the inversi…
▽ More
Surface damage caused by ionizing radiation in SiO$_2$ passivated silicon particle detectors consists mainly of the accumulation of a positively charged layer along with trapped-oxide-charge and interface traps inside the oxide and close to the Si/SiO$_2$-interface. High density positive interface net charge can be detrimental to the operation of a multi-channel $n$-on-$p$ sensor since the inversion layer generated under the Si/SiO$_2$-interface can cause loss of position resolution by creating a conduction channel between the electrodes. In the investigation of the radiation-induced accumulation of oxide charge and interface traps, a capacitance-voltage characterization study of n/$γ$- and $γ$-irradiated Metal-Oxide-Semiconductor (MOS) capacitors showed that close agreement between measurement and simulation were possible when oxide charge density was complemented by both acceptor- and donor-type deep interface traps with densities comparable to the oxide charges. Corresponding inter-strip resistance simulations of a $n$-on-$p$ sensor with the tuned oxide charge density and interface traps show close agreement with experimental results. The beneficial impact of radiation-induced accumulation of deep interface traps on inter-electrode isolation may be considered in the optimization of the processing parameters of isolation implants on $n$-on-$p$ sensors for the extreme radiation environments.
△ Less
Submitted 1 August, 2023; v1 submitted 23 May, 2023;
originally announced May 2023.
-
From Single-Hospital to Multi-Centre Applications: Enhancing the Generalisability of Deep Learning Models for Adverse Event Prediction in the ICU
Authors:
Patrick Rockenschaub,
Adam Hilbert,
Tabea Kossen,
Falk von Dincklage,
Vince Istvan Madai,
Dietmar Frey
Abstract:
Deep learning (DL) can aid doctors in detecting worsening patient states early, affording them time to react and prevent bad outcomes. While DL-based early warning models usually work well in the hospitals they were trained for, they tend to be less reliable when applied at new hospitals. This makes it difficult to deploy them at scale. Using carefully harmonised intensive care data from four data…
▽ More
Deep learning (DL) can aid doctors in detecting worsening patient states early, affording them time to react and prevent bad outcomes. While DL-based early warning models usually work well in the hospitals they were trained for, they tend to be less reliable when applied at new hospitals. This makes it difficult to deploy them at scale. Using carefully harmonised intensive care data from four data sources across Europe and the US (totalling 334,812 stays), we systematically assessed the reliability of DL models for three common adverse events: death, acute kidney injury (AKI), and sepsis. We tested whether using more than one data source and/or explicitly optimising for generalisability during training improves model performance at new hospitals. We found that models achieved high AUROC for mortality (0.838-0.869), AKI (0.823-0.866), and sepsis (0.749-0.824) at the training hospital. As expected, performance dropped at new hospitals, sometimes by as much as -0.200. Using more than one data source for training mitigated the performance drop, with multi-source models performing roughly on par with the best single-source model. This suggests that as data from more hospitals become available for training, model robustness is likely to increase, lower-bounding robustness with the performance of the most applicable data source in the training data. Dedicated methods promoting generalisability did not noticeably improve performance in our experiments.
△ Less
Submitted 7 April, 2023; v1 submitted 27 March, 2023;
originally announced March 2023.
-
Good-case Early-Stop** Latency of Synchronous Byzantine Reliable Broadcast: The Deterministic Case (Extended Version)
Authors:
Timothé Albouy,
Davide Frey,
Michel Raynal,
François Taïani
Abstract:
This paper considers the good-case latency of Byzantine Reliable Broadcast (BRB), i.e., the time taken by correct processes to deliver a message when the initial sender is correct. This time plays a crucial role in the performance of practical distributed systems. Although significant strides have been made in recent years on this question, progress has mainly focused on either asynchronous or ran…
▽ More
This paper considers the good-case latency of Byzantine Reliable Broadcast (BRB), i.e., the time taken by correct processes to deliver a message when the initial sender is correct. This time plays a crucial role in the performance of practical distributed systems. Although significant strides have been made in recent years on this question, progress has mainly focused on either asynchronous or randomized algorithms. By contrast, the good-case latency of deterministic synchronous BRB under a majority of Byzantine faults has been little studied. In particular, it was not known whether a goodcase latency below the worst-case bound of t + 1 rounds could be obtained. This work answers this open question positively and proposes a deterministic synchronous Byzantine reliable broadcast that achieves a good-case latency of max(2, t + 3 -- c) rounds, where t is the upper bound on the number of Byzantine processes and c the number of effectively correct processes.
△ Less
Submitted 10 March, 2023; v1 submitted 9 March, 2023;
originally announced March 2023.
-
The Synchronization Power (Consensus Number) of Access-Control Objects: The Case of AllowList and DenyList
Authors:
Davide Frey,
Mathieu Gestin,
Michel Raynal
Abstract:
This article studies the synchronization power of AllowList and DenyList objects under the lens provided by Herlihy's consensus hierarchy. It specifies AllowList and DenyList as distributed objects and shows that while they can both be seen as specializations of a more general object type, they inherently have different synchronization properties. While the AllowList object does not require synchr…
▽ More
This article studies the synchronization power of AllowList and DenyList objects under the lens provided by Herlihy's consensus hierarchy. It specifies AllowList and DenyList as distributed objects and shows that while they can both be seen as specializations of a more general object type, they inherently have different synchronization properties. While the AllowList object does not require synchronization between participating processes, a DenyList object requires processes to reach consensus on a specific set of processes. These results are then applied to the analysis of anonymity-preserving systems that use AllowList and DenyList objects. First, a blind-signature-based e-voting is presented. Then DenyList and AllowList objects are used to determine the consensus number of a specific decentralized key management system. Finally, an anonymous money transfer protocol using the association of AllowList and DenyList objects is studied.
△ Less
Submitted 8 August, 2023; v1 submitted 13 February, 2023;
originally announced February 2023.
-
A portable and high intensity 24 keV neutron source based on $^{124}$Sb-$^{9}$Be photoneutrons and an iron filter
Authors:
A. Biekert,
C. Chang,
L. Chaplinsky,
C. W. Fink,
W. D. Frey,
M. Garcia-Sciveres,
W. Guo,
S. A. Hertel,
X. Li,
J. Lin,
M. Lisovenko,
R. Mahapatra,
D. N. McKinsey,
S. Mehrotra,
N. Mirabolfathi,
P. K. Patel,
B. Penning,
H. D. Pinckney,
M. Reed,
R. K. Romani,
B. Sadoulet,
R. J. Smith,
P. Sorensen,
B. Suerfu,
A. Suzuki
, et al. (5 additional authors not shown)
Abstract:
A portable monoenergetic 24 keV neutron source based on the $^{124}$Sb-$^9$Be photoneutron reaction and an iron filter has been constructed and characterized. The coincidence of the neutron energy from SbBe and the low interaction cross-section with iron (mean free path up to 29 cm) makes pure iron specially suited to shield against gamma rays from $^{124}$Sb decays while letting through the neutr…
▽ More
A portable monoenergetic 24 keV neutron source based on the $^{124}$Sb-$^9$Be photoneutron reaction and an iron filter has been constructed and characterized. The coincidence of the neutron energy from SbBe and the low interaction cross-section with iron (mean free path up to 29 cm) makes pure iron specially suited to shield against gamma rays from $^{124}$Sb decays while letting through the neutrons. To increase the $^{124}$Sb activity and thus the neutron flux, a $>$1 GBq $^{124}$Sb source was produced by irradiating a natural Sb metal pellet with a high flux of thermal neutrons in a nuclear reactor. The design of the source shielding structure makes for easy transportation and deployment. A hydrogen gas proportional counter is used to characterize the neutrons emitted by the source and a NaI detector is used for gamma background characterization. At the exit opening of the neutron beam, the characterization determined the neutron flux in the energy range 20-25 keV to be 5.36$\pm$0.20 neutrons per cm$^2$ per second and the total gamma flux to be 213$\pm$6 gammas per cm$^2$ per second (numbers scaled to 1 GBq activity of the $^{124}$Sb source). A liquid scintillator detector is demonstrated to be sensitive to neutrons with incident kinetic energies from 8 to 17 keV, so it can be paired with the source as a backing detector for neutron scattering calibration experiments. This photoneutron source provides a good tool for in-situ low energy nuclear recoil calibration for dark matter experiments and coherent elastic neutrino-nucleus scattering experiments.
△ Less
Submitted 7 February, 2023;
originally announced February 2023.
-
Asynchronous Byzantine Reliable Broadcast With a Message Adversary
Authors:
Timothé Albouy,
Davide Frey,
Michel Raynal,
François Taïani
Abstract:
This paper considers the problem of reliable broadcast in asynchronous authenticated systems, in which n processes communicate using signed messages and up to t processes may behave arbitrarily (Byzantine processes). In addition, for each message m broadcast by a correct (i.e., non-Byzantine) process, a message adversary may prevent up to d correct processes from receiving m. (This message adversa…
▽ More
This paper considers the problem of reliable broadcast in asynchronous authenticated systems, in which n processes communicate using signed messages and up to t processes may behave arbitrarily (Byzantine processes). In addition, for each message m broadcast by a correct (i.e., non-Byzantine) process, a message adversary may prevent up to d correct processes from receiving m. (This message adversary captures network failures such as transient disconnections, silent churn, or message losses.) Considering such a "double" adversarial context and assuming n > 3t + 2d, a reliable broadcast algorithm is presented. Interestingly, when there is no message adversary (i.e., d = 0), the algorithm terminates in two communication steps (so, in this case, this algorithm is optimal in terms of both Byzantine tolerance and time efficiency). It is then shown that the condition n > 3t + 2d is necessary for implementing reliable broadcast in the presence of both Byzantine processes and a message adversary (whether the underlying system is enriched with signatures or not).
△ Less
Submitted 20 May, 2022;
originally announced May 2022.
-
Co** with Byzantine Processes and a Message Adversary: Modularity Helps!
Authors:
Davide Frey,
Michel Raynal,
François Taïani,
Timothé Albouy
Abstract:
This paper explores how reliable broadcast can be implemented when facing a dual adversary that can both corrupt processes and remove messages.More precisely, we consider an asynchronous $n$-process message-passing systems in which up to $t_b$ processes are Byzantine and where, at the network level, for each message broadcast by a correct process, an adversary can prevent up to $t_m$ processes fro…
▽ More
This paper explores how reliable broadcast can be implemented when facing a dual adversary that can both corrupt processes and remove messages.More precisely, we consider an asynchronous $n$-process message-passing systems in which up to $t_b$ processes are Byzantine and where, at the network level, for each message broadcast by a correct process, an adversary can prevent up to $t_m$ processes from receiving it (the integer $t_m$ defines the power of the message adversary).So, differently from previous works, this work considers that not only computing entities can be faulty (Byzantine processes), but also that the network can lose messages.To this end, the paper first introduces a new basic communication abstraction denoted $k\ell$-cast, and studies its properties in this new bi-dimensional adversary context.Then, the paper deconstructs existing Byzantine-tolerant asynchronous broadcast algorithms and, with the help of the $k\ell$-cast communication abstraction, reconstructs versions of them that tolerate both Byzantine processes and message adversaries.Interestingly, these reconstructed algorithms are also more efficient than the Byzantine-tolerant-only algorithms from which they originate.The paper also shows that the condition $n>3t_b+2t_m$ is necessary and sufficient (with signatures) to design such reliable broadcast algorithms.
△ Less
Submitted 2 June, 2022; v1 submitted 28 April, 2022;
originally announced April 2022.
-
RAPTEE: Leveraging trusted execution environments for Byzantine-tolerant peer sampling services
Authors:
Matthieu Pigaglio,
Joachim Bruneau-Queyreix,
David Bromberg,
Davide Frey,
Etienne Rivière,
Laurent Réveillère
Abstract:
Peer sampling is a first-class abstraction used in distributed systems for overlay management and information dissemination. The goal of peer sampling is to continuously build and refresh a partial and local view of the full membership of a dynamic, large-scale distributed system. Malicious nodes under the control of an adversary may aim at being over-represented in the views of correct nodes, inc…
▽ More
Peer sampling is a first-class abstraction used in distributed systems for overlay management and information dissemination. The goal of peer sampling is to continuously build and refresh a partial and local view of the full membership of a dynamic, large-scale distributed system. Malicious nodes under the control of an adversary may aim at being over-represented in the views of correct nodes, increasing their impact on the proper operation of protocols built over peer sampling. State-of-the-art Byzantine resilient peer sampling protocols reduce this bias as long as Byzantines are not overly present. This paper studies the benefits brought to the resilience of peer sampling services when considering that a small portion of trusted nodes can run code whose authenticity and integrity can be assessed within a trusted execution environment, and specifically Intel's software guard extensions technology (SGX). We present RAPTEE, a protocol that builds and leverages trusted gossip-based communications to hamper an adversary's ability to increase its system-wide representation in the views of all nodes. We apply RAPTEE to BRAHMS, the most resilient peer sampling protocol to date. Experiments with 10,000 nodes show that with only 1% of SGX-capable devices, RAPTEE can reduce the proportion of Byzantine IDs in the view of honest nodes by up to 17% when the system contains 10% of Byzantine nodes. In addition, the security guarantees of RAPTEE hold even in the presence of a powerful attacker attempting to identify trusted nodes and injecting view-poisoned trusted nodes.
△ Less
Submitted 8 March, 2022;
originally announced March 2022.
-
Strichartz estimates for equations with structured Lipschitz coefficients
Authors:
Dorothee Frey,
Robert Schippa
Abstract:
Sharp Strichartz estimates are proved for Schrödinger and wave equations with Lipschitz coefficients satisfying additional structural assumptions. We use Phillips functional calculus as a substitute for Fourier inversion, which shows how dispersive properties are inherited from the constant coefficient case. Global Strichartz estimates follow provided that the derivatives of the coefficients are i…
▽ More
Sharp Strichartz estimates are proved for Schrödinger and wave equations with Lipschitz coefficients satisfying additional structural assumptions. We use Phillips functional calculus as a substitute for Fourier inversion, which shows how dispersive properties are inherited from the constant coefficient case. Global Strichartz estimates follow provided that the derivatives of the coefficients are integrable. The estimates extend to structured coefficients of bounded variations. As applications we derive Strichartz estimates with additional derivative loss for wave equations with Hölder-continuous coefficients and solve nonlinear Schrödinger equations. Finally, we record spectral multiplier estimates, which follow from the Strichartz estimates by well-known means.
△ Less
Submitted 14 May, 2023; v1 submitted 18 February, 2022;
originally announced February 2022.
-
Estimating Active Cases of COVID-19
Authors:
Javier Álvarez,
Carlos Baquero,
Elisa Cabana,
Jaya Prakash Champati,
Antonio Fernández Anta,
Davide Frey,
Augusto García-Agúndez,
Chryssis Georgiou,
Mathieu Goessens,
Harold Hernández,
Rosa Lillo,
Raquel Menezes,
Raúl Moreno,
Nicolas Nicolaou,
Oluwasegun Ojo,
Antonio Ortega,
Jesús Rufino,
Efstathios Stavrakis,
Govind Jeevan,
Christin Glorioso
Abstract:
Having accurate and timely data on confirmed active COVID-19 cases is challenging, since it depends on testing capacity and the availability of an appropriate infrastructure to perform tests and aggregate their results. In this paper, we propose methods to estimate the number of active cases of COVID-19 from the official data (of confirmed cases and fatalities) and from survey data. We show that t…
▽ More
Having accurate and timely data on confirmed active COVID-19 cases is challenging, since it depends on testing capacity and the availability of an appropriate infrastructure to perform tests and aggregate their results. In this paper, we propose methods to estimate the number of active cases of COVID-19 from the official data (of confirmed cases and fatalities) and from survey data. We show that the latter is a viable option in countries with reduced testing capacity or suboptimal infrastructures.
△ Less
Submitted 6 August, 2021;
originally announced August 2021.
-
Preparation and Characterization of Thin Arsenic Targets for Stacked-Target Experiments
Authors:
Andrew S. Voyles,
Morgan B. Fox,
Jonathan T. Morrell,
Michael P. Zach,
Evan K. Still,
Lee A. Bernstein,
Wesley D. Frey,
Burton J. Mehciz
Abstract:
Thin, uniform arsenic targets suitable for high-fidelity cross section measurements in stacked-target experiments were prepared by electrodeposition of arsenic on titanium backings from aqueous solutions. Electrolytic cells were constructed and capable of arsenic deposits ranging in mass from approximately 1$\unicode{x2013}$29 mg (0.32$\unicode{x2013}$7.2 mg/cm$^2$, 0.57$\unicode{x2013}$13 $μ$m).…
▽ More
Thin, uniform arsenic targets suitable for high-fidelity cross section measurements in stacked-target experiments were prepared by electrodeposition of arsenic on titanium backings from aqueous solutions. Electrolytic cells were constructed and capable of arsenic deposits ranging in mass from approximately 1$\unicode{x2013}$29 mg (0.32$\unicode{x2013}$7.2 mg/cm$^2$, 0.57$\unicode{x2013}$13 $μ$m). Examination of electrodeposit surface morphology by scanning electron microscopy and microanalysis was performed to investigate the uniformity of produced targets. Brief studies of plating growth dynamics and structural properties through cyclic voltammetry were also undertaken. Alternative target fabrication approaches by vapor deposition and electrodeposition from a deep eutectic solvent were additionally conducted. We further introduce a non-destructive characterization method for thin targets by neutron activation, which is independent of neutron flux shape, environmental factors, and source geometry, while correcting for any potential scatter or absorption effects.
△ Less
Submitted 15 February, 2024; v1 submitted 10 June, 2021;
originally announced June 2021.
-
$\scriptstyle{BASALT}$: A Rock-Solid Foundation for Epidemic Consensus Algorithms in Very Large, Very Open Networks
Authors:
Alex Auvolat,
Yérom-David Bromberg,
Davide Frey,
François Taïani
Abstract:
Recent works have proposed new Byzantine consensus algorithms for blockchains based on epidemics, a design which enables highly scalable performance at a low cost. These methods however critically depend on a secure random peer sampling service: a service that provides a stream of random network nodes where no attacking entity can become over-represented. To ensure this security property, current…
▽ More
Recent works have proposed new Byzantine consensus algorithms for blockchains based on epidemics, a design which enables highly scalable performance at a low cost. These methods however critically depend on a secure random peer sampling service: a service that provides a stream of random network nodes where no attacking entity can become over-represented. To ensure this security property, current epidemic platforms use a Proof-of-Stake system to select peer samples. However such a system limits the openness of the system as only nodes with significant stake can participate in the consensus, leading to an oligopoly situation. Moreover, this design introduces a complex interdependency between the consensus algorithm and the cryptocurrency built upon it. In this paper, we propose a radically different security design for the peer sampling service, based on the distribution of IP addresses to prevent Sybil attacks. We propose a new algorithm, $\scriptstyle{BASALT}$, that implements our design using a stubborn chaotic search to counter attackers' attempts at becoming over-represented. We show in theory and using Monte Carlo simulations that $\scriptstyle{BASALT}$ provides samples which are extremely close to the optimal distribution even in adversarial scenarios such as tentative Eclipse attacks. Live experiments on a production cryptocurrency platform confirm that the samples obtained using $\scriptstyle{BASALT}$ are equitably distributed amongst nodes, allowing for a system which is both open and where no single entity can gain excessive power.
△ Less
Submitted 8 February, 2021;
originally announced February 2021.
-
$L^p$ estimates for wave equations with specific $C^{0,1}$ coefficients
Authors:
Dorothee Frey,
Pierre Portal
Abstract:
Peral/Miyachi's celebrated theorem on fixed time $L^{p}$ estimates with loss of derivatives for the wave equation states that the operator $(I-Δ)^{- \fracα{2}}\exp(i \sqrt{-Δ})$ is bounded on $L^{p}(\mathbb{R}^{d})$ if and only if $α\geq s_{p}:=(d-1)|\frac{1}{p}-\frac{1}{2}|$. We extend this result to operators of the form…
▽ More
Peral/Miyachi's celebrated theorem on fixed time $L^{p}$ estimates with loss of derivatives for the wave equation states that the operator $(I-Δ)^{- \fracα{2}}\exp(i \sqrt{-Δ})$ is bounded on $L^{p}(\mathbb{R}^{d})$ if and only if $α\geq s_{p}:=(d-1)|\frac{1}{p}-\frac{1}{2}|$. We extend this result to operators of the form $\mathcal{L} = -\sum \limits _{j=1} ^{d} a_{j+d}\partial_{j}a_{j}\partial_{j}$, such that, for $j=1,...,d$, the functions $a_{j}$ and $a_{j+d}$ only depend on $x_{j}$, are bounded above and below, but are merely Lipschitz continuous. This is below the $C^{1,1}$ regularity that is known to be necessary in general for Strichartz estimates in dimension $d \geq 2$. Our proof is based on an approach to the boundedness of Fourier integral operators recently developed by Hassell, Rozendaal, and the second author. We construct a scale of adapted Hardy spaces on which $\exp(i\sqrt{ \mathcal{L}} )$ is bounded by lifting $L^{p}$ functions to the tent space $T^{p,2}(\mathbb{R}^{d})$, using a wave packet transform adapted to the Lipschitz metric induced by the coefficients $a_j$. The result then follows from Sobolev embedding properties of these spaces.
△ Less
Submitted 7 March, 2022; v1 submitted 16 October, 2020;
originally announced October 2020.
-
Anonymization of labeled TOF-MRA images for brain vessel segmentation using generative adversarial networks
Authors:
Tabea Kossen,
Pooja Subramaniam,
Vince I. Madai,
Anja Hennemuth,
Kristian Hildebrand,
Adam Hilbert,
Jan Sobesky,
Michelle Livne,
Ivana Galinovic,
Ahmed A. Khalil,
Jochen B. Fiebach,
Dietmar Frey
Abstract:
Anonymization and data sharing are crucial for privacy protection and acquisition of large datasets for medical image analysis. This is a big challenge, especially for neuroimaging. Here, the brain's unique structure allows for re-identification and thus requires non-conventional anonymization. Generative adversarial networks (GANs) have the potential to provide anonymous images while preserving p…
▽ More
Anonymization and data sharing are crucial for privacy protection and acquisition of large datasets for medical image analysis. This is a big challenge, especially for neuroimaging. Here, the brain's unique structure allows for re-identification and thus requires non-conventional anonymization. Generative adversarial networks (GANs) have the potential to provide anonymous images while preserving predictive properties. Analyzing brain vessel segmentation, we trained 3 GANs on time-of-flight (TOF) magnetic resonance angiography (MRA) patches for image-label generation: 1) Deep convolutional GAN, 2) Wasserstein-GAN with gradient penalty (WGAN-GP) and 3) WGAN-GP with spectral normalization (WGAN-GP-SN). The generated image-labels from each GAN were used to train a U-net for segmentation and tested on real data. Moreover, we applied our synthetic patches using transfer learning on a second dataset. For an increasing number of up to 15 patients we evaluated the model performance on real data with and without pre-training. The performance for all models was assessed by the Dice Similarity Coefficient (DSC) and the 95th percentile of the Hausdorff Distance (95HD). Comparing the 3 GANs, the U-net trained on synthetic data generated by the WGAN-GP-SN showed the highest performance to predict vessels (DSC/95HD 0.82/28.97) benchmarked by the U-net trained on real data (0.89/26.61). The transfer learning approach showed superior performance for the same GAN compared to no pre-training, especially for one patient only (0.91/25.68 vs. 0.85/27.36). In this work, synthetic image-label pairs retained generalizable information and showed good performance for vessel segmentation. Besides, we showed that synthetic patches can be used in a transfer learning approach with independent data. This paves the way to overcome the challenges of scarce data and anonymization in medical imaging.
△ Less
Submitted 16 November, 2020; v1 submitted 9 September, 2020;
originally announced September 2020.
-
On The Usage Of Average Hausdorff Distance For Segmentation Performance Assessment: Hidden Bias When Used For Ranking
Authors:
Orhun Utku Aydin,
Abdel Aziz Taha,
Adam Hilbert,
Ahmed A. Khalil,
Ivana Galinovic,
Jochen B. Fiebach,
Dietmar Frey,
Vince Istvan Madai
Abstract:
Average Hausdorff Distance (AVD) is a widely used performance measure to calculate the distance between two point sets. In medical image segmentation, AVD is used to compare ground truth images with segmentation results allowing their ranking. We identified, however, a ranking bias of AVD making it less suitable for segmentation ranking. To mitigate this bias, we present a modified calculation of…
▽ More
Average Hausdorff Distance (AVD) is a widely used performance measure to calculate the distance between two point sets. In medical image segmentation, AVD is used to compare ground truth images with segmentation results allowing their ranking. We identified, however, a ranking bias of AVD making it less suitable for segmentation ranking. To mitigate this bias, we present a modified calculation of AVD that we have coined balanced AVD (bAVD). To simulate segmentations for ranking, we manually created non-overlap** segmentation errors common in cerebral vessel segmentation as our use-case. Adding the created errors consecutively and randomly to the ground truth, we created sets of simulated segmentations with increasing number of errors. Each set of simulated segmentations was ranked using AVD and bAVD. We calculated the Kendall-rank-correlation-coefficient between the segmentation ranking and the number of errors in each simulated segmentation. The rankings produced by bAVD had a significantly higher average correlation (0.969) than those of AVD (0.847). In 200 total rankings, bAVD misranked 52 and AVD misranked 179 segmentations. Our proposed evaluation measure, bAVD, alleviates AVDs ranking bias making it more suitable for rankings and quality assessment of segmentations.
△ Less
Submitted 13 September, 2020; v1 submitted 31 August, 2020;
originally announced September 2020.
-
Money Transfer Made Simple: a Specification, a Generic Algorithm, and its Proof
Authors:
Alex Auvolat,
Davide Frey,
Michel Raynal,
François Taïani
Abstract:
It has recently been shown that, contrarily to a common belief, money transfer in the presence of faulty (Byzantine) processes does not require strong agreement such as consensus. This article goes one step further: namely, it first proposes a non-sequential specification of the money-transfer object, and then presents a generic algorithm based on a simple FIFO order between each pair of processes…
▽ More
It has recently been shown that, contrarily to a common belief, money transfer in the presence of faulty (Byzantine) processes does not require strong agreement such as consensus. This article goes one step further: namely, it first proposes a non-sequential specification of the money-transfer object, and then presents a generic algorithm based on a simple FIFO order between each pair of processes that implements it. The genericity dimension lies in the underlying reliable broadcast abstraction which must be suited to the appropriate failure model. Interestingly, whatever the failure model, the money transfer algorithm only requires adding a single sequence number to its messages as control information. Moreover, as a side effect of the proposed algorithm, it follows that money transfer is a weaker problem than the construction of a safe/regular/atomic read/write register in the asynchronous message-passing crash-prone model.
△ Less
Submitted 17 February, 2021; v1 submitted 18 June, 2020;
originally announced June 2020.
-
CoronaSurveys: Using Surveys with Indirect Reporting to Estimate the Incidence and Evolution of Epidemics
Authors:
Oluwasegun Ojo,
Augusto García-Agundez,
Benjamin Girault,
Harold Hernández,
Elisa Cabana,
Amanda García-García,
Payman Arabshahi,
Carlos Baquero,
Paolo Casari,
Ednaldo José Ferreira,
Davide Frey,
Chryssis Georgiou,
Mathieu Goessens,
Anna Ishchenko,
Ernesto Jiménez,
Oleksiy Kebkal,
Rosa Lillo,
Raquel Menezes,
Nicolas Nicolaou,
Antonio Ortega,
Paul Patras,
Julian C Roberts,
Efstathios Stavrakis,
Yuichi Tanaka,
Antonio Fernández Anta
Abstract:
The world is suffering from a pandemic called COVID-19, caused by the SARS-CoV-2 virus. National governments have problems evaluating the reach of the epidemic, due to having limited resources and tests at their disposal. This problem is especially acute in low and middle-income countries (LMICs). Hence, any simple, cheap and flexible means of evaluating the incidence and evolution of the epidemic…
▽ More
The world is suffering from a pandemic called COVID-19, caused by the SARS-CoV-2 virus. National governments have problems evaluating the reach of the epidemic, due to having limited resources and tests at their disposal. This problem is especially acute in low and middle-income countries (LMICs). Hence, any simple, cheap and flexible means of evaluating the incidence and evolution of the epidemic in a given country with a reasonable level of accuracy is useful. In this paper, we propose a technique based on (anonymous) surveys in which participants report on the health status of their contacts. This indirect reporting technique, known in the literature as network scale-up method, preserves the privacy of the participants and their contacts, and collects information from a larger fraction of the population (as compared to individual surveys). This technique has been deployed in the CoronaSurveys project, which has been collecting reports for the COVID-19 pandemic for more than two months. Results obtained by CoronaSurveys show the power and flexibility of the approach, suggesting that it could be an inexpensive and powerful tool for LMICs.
△ Less
Submitted 26 June, 2020; v1 submitted 24 May, 2020;
originally announced May 2020.
-
Charge Collection and Electrical Characterization of Neutron Irradiated Silicon Pad Detectors for the CMS High Granularity Calorimeter
Authors:
N. Akchurin,
P. Almeida,
G. Altopp,
M. Alyari,
T. Bergauer,
E. Brondolin,
B. Burkle,
W. D. Frey,
Z. Gecse,
U. Heintz,
N. Hinton,
V. Kuryatkov,
R. Lipton,
M. Mannelli,
T. Mengke,
P. Paulitsch,
T. Peltola,
F. Pitters,
E. Sicking,
E. Spencer,
M. Tripathi,
M. Vicente Barreto Pinto,
J. Voelker,
Z. Wang,
R. Yohay
Abstract:
The replacement of the existing endcap calorimeter in the Compact Muon Solenoid (CMS) detector for the high-luminosity LHC (HL-LHC), scheduled for 2027, will be a high granularity calorimeter. It will provide detailed position, energy, and timing information on electromagnetic and hadronic showers in the immense pileup of the HL-LHC. The High Granularity Calorimeter (HGCAL) will use 120-, 200-, an…
▽ More
The replacement of the existing endcap calorimeter in the Compact Muon Solenoid (CMS) detector for the high-luminosity LHC (HL-LHC), scheduled for 2027, will be a high granularity calorimeter. It will provide detailed position, energy, and timing information on electromagnetic and hadronic showers in the immense pileup of the HL-LHC. The High Granularity Calorimeter (HGCAL) will use 120-, 200-, and 300-$μ\textrm{m}$ thick silicon (Si) pad sensors as the main active material and will sustain 1-MeV neutron equivalent fluences up to about $10^{16}~\textrm{n}_\textrm{eq}\textrm{cm}^{-2}$. In order to address the performance degradation of the Si detectors caused by the intense radiation environment, irradiation campaigns of test diode samples from 8-inch and 6-inch wafers were performed in two reactors. Characterization of the electrical and charge collection properties after irradiation involved both bulk polarities for the three sensor thicknesses. Since the Si sensors will be operated at -30 $^\circ$C to reduce increasing bulk leakage current with fluence, the charge collection investigation of 30 irradiated samples was carried out with the infrared-TCT setup at -30 $^\circ$C. TCAD simulation results at the lower fluences are in close agreement with the experimental results and provide predictions of sensor performance for the lower fluence regions not covered by the experimental study. All investigated sensors display 60$\%$ or higher charge collection efficiency at their respective highest lifetime fluences when operated at 800 V, and display above 90$\%$ at the lowest fluence, at 600 V. The collected charge close to the fluence of $10^{16}~\textrm{n}_\textrm{eq}\textrm{cm}^{-2}$ exceeds 1 fC at voltages beyond 800 V.
△ Less
Submitted 4 August, 2020; v1 submitted 16 May, 2020;
originally announced May 2020.
-
6D SCFTs and the Classification of Homomorphisms $Γ_{ADE} \rightarrow E_8$
Authors:
Darrin D. Frey,
Tom Rudelius
Abstract:
We elucidate the correspondence between a particular class of superconformal field theories in six dimensions and homomorphisms from discrete subgroups of $SU(2)$ into $E_8$, as predicted from string dualities. We show how this match works for homomorphisms from the binary icosahedral group $SL(2,5)$ into $E_8$, correcting previous errors in both the mathematics and physics literature. We use this…
▽ More
We elucidate the correspondence between a particular class of superconformal field theories in six dimensions and homomorphisms from discrete subgroups of $SU(2)$ into $E_8$, as predicted from string dualities. We show how this match works for homomorphisms from the binary icosahedral group $SL(2,5)$ into $E_8$, correcting previous errors in both the mathematics and physics literature. We use this correspondence to list the homomorphisms from binary dihedral groups, the binary tetrahedral group, and the binary octahedral group into $E_8$--a novel mathematical result. The partial ordering specified by renormalization group flows suggests an ordering on these homomorphisms similar to the known ordering of nilpotent orbits of a simple Lie algebra dictated by the Hasse diagram.
△ Less
Submitted 23 August, 2020; v1 submitted 12 November, 2018;
originally announced November 2018.
-
Dietcoin: shortcutting the Bitcoin verification process for your smartphone
Authors:
Davide Frey,
Marc X. Makkes,
Pierre-Louis Roman,
François Taïani,
Spyros Voulgaris
Abstract:
Blockchains have a storage scalability issue. Their size is not bounded and they grow indefinitely as time passes. As of August 2017, the Bitcoin blockchain is about 120 GiB big while it was only 75 GiB in August 2016. To benefit from Bitcoin full security model, a bootstrap** node has to download and verify the entirety of the 120 GiB. This poses a challenge for low-resource devices such as sma…
▽ More
Blockchains have a storage scalability issue. Their size is not bounded and they grow indefinitely as time passes. As of August 2017, the Bitcoin blockchain is about 120 GiB big while it was only 75 GiB in August 2016. To benefit from Bitcoin full security model, a bootstrap** node has to download and verify the entirety of the 120 GiB. This poses a challenge for low-resource devices such as smartphones. Thankfully, an alternative exists for such devices which consists of downloading and verifying just the header of each block. This partial block verification enables devices to reduce their bandwidth requirements from 120 GiB to 35 MiB. However, this drastic decrease comes with a safety cost implied by a partial block verification. In this work, we enable low-resource devices to fully verify subchains of blocks without having to pay the onerous price of a full chain download and verification; a few additional MiB of bandwidth suffice. To do so, we propose the design of diet nodes that can securely query full nodes for shards of the UTXO set, which is needed to perform full block verification and can otherwise only be built by sequentially parsing the chain.
△ Less
Submitted 28 March, 2018;
originally announced March 2018.
-
Weak and strong type $A_1$-$A_\infty$ estimates for sparsely dominated operators
Authors:
Dorothee Frey,
Zoe Nieraeth
Abstract:
We consider operators $T$ satisfying a sparse domination property \[ |\langle Tf,g\rangle|\leq c\sum_{Q\in\mathscr{S}}\langle f\rangle_{p_0,Q}\langle g\rangle_{q_0',Q}|Q| \] with averaging exponents $1\leq p_0<q_0\leq\infty$.
We prove weighted strong type boundedness for $p_0<p<q_0$ and use new techniques to prove weighted weak type $(p_0,p_0)$ boundedness with quantitative mixed $A_1$-…
▽ More
We consider operators $T$ satisfying a sparse domination property \[ |\langle Tf,g\rangle|\leq c\sum_{Q\in\mathscr{S}}\langle f\rangle_{p_0,Q}\langle g\rangle_{q_0',Q}|Q| \] with averaging exponents $1\leq p_0<q_0\leq\infty$.
We prove weighted strong type boundedness for $p_0<p<q_0$ and use new techniques to prove weighted weak type $(p_0,p_0)$ boundedness with quantitative mixed $A_1$-$A_\infty$ estimates, generalizing results of Lerner, Ombrosi, and Pérez and Hytönen and Pérez. Even in the case $p_0=1$ we improve upon their results as we do not make use of a Hörmander condition of the operator $T$. Moreover, we also establish a dual weak type $(q_0',q_0')$ estimate.
In a last part, we give a result on the optimality of the weighted strong type bounds including those previously obtained by Bernicot, Frey, and Petermichl.
△ Less
Submitted 9 August, 2021; v1 submitted 17 July, 2017;
originally announced July 2017.
-
An argumentative agent-based model of scientific inquiry
Authors:
Annemarie Borg,
Daniel Frey,
Dunja Šešelja,
Christian Straßer
Abstract:
In this paper we present an agent-based model (ABM) of scientific inquiry aimed at investigating how different social networks impact the efficiency of scientists in acquiring knowledge. As such, the ABM is a computational tool for tackling issues in the domain of scientific methodology and science policy. In contrast to existing ABMs of science, our model aims to represent the argumentative dynam…
▽ More
In this paper we present an agent-based model (ABM) of scientific inquiry aimed at investigating how different social networks impact the efficiency of scientists in acquiring knowledge. As such, the ABM is a computational tool for tackling issues in the domain of scientific methodology and science policy. In contrast to existing ABMs of science, our model aims to represent the argumentative dynamics that underlies scientific practice. To this end we employ abstract argumentation theory as the core design feature of the model. This helps to avoid a number of problematic idealizations which are present in other ABMs of science and which impede their relevance for actual scientific practice.
△ Less
Submitted 13 December, 2016;
originally announced December 2016.
-
Sobolev algebra through a "carré du champ" identity
Authors:
Frederic Bernicot,
Dorothee Frey
Abstract:
We consider abstract Sobolev spaces of Bessel-type associated with an operator. In this work, we pursue the study of algebra properties of such functional spaces through the corresponding semigroup. As a follow-up of [4], we show that under the extra property of a "carré du champ identity" , this algebra property holds in a wider range than previously shown.
We consider abstract Sobolev spaces of Bessel-type associated with an operator. In this work, we pursue the study of algebra properties of such functional spaces through the corresponding semigroup. As a follow-up of [4], we show that under the extra property of a "carré du champ identity" , this algebra property holds in a wider range than previously shown.
△ Less
Submitted 1 December, 2016;
originally announced December 2016.
-
Optimal Collision/Conflict-free Distance-2 Coloring in Synchronous Broadcast/Receive Tree Networks
Authors:
Davide Frey,
Hicham Lakhlef,
Michel Raynal
Abstract:
This article is on message-passing systems where communication is (a) synchronous and (b) based on the "broadcast/receive" pair of communication operations. "Synchronous" means that time is discrete and appears as a sequence of time slots (or rounds) such that each message is received in the very same round in which it is sent. "Broadcast/receive" means that during a round a process can either bro…
▽ More
This article is on message-passing systems where communication is (a) synchronous and (b) based on the "broadcast/receive" pair of communication operations. "Synchronous" means that time is discrete and appears as a sequence of time slots (or rounds) such that each message is received in the very same round in which it is sent. "Broadcast/receive" means that during a round a process can either broadcast a message to its neighbors or receive a message from one of them. In such a communication model, no two neighbors of the same process, nor a process and any of its neighbors, must be allowed to broadcast during the same time slot (thereby preventing message collisions in the first case, and message conflicts in the second case). From a graph theory point of view, the allocation of slots to processes is know as the distance-2 coloring problem: a color must be associated with each process (defining the time slots in which it will be allowed to broadcast) in such a way that any two processes at distance at most 2 obtain different colors, while the total number of colors is "as small as possible". The paper presents a parallel message-passing distance-2 coloring algorithm suited to trees, whose roots are dynamically defined. This algorithm, which is itself collision-free and conflict-free, uses $Δ+ 1$ colors where $Δ$ is the maximal degree of the graph (hence the algorithm is color-optimal). It does not require all processes to have different initial identities, and its time complexity is $O(d Δ)$, where d is the depth of the tree. As far as we know, this is the first distributed distance-2 coloring algorithm designed for the broadcast/receive round-based communication model, which owns all the previous properties.
△ Less
Submitted 13 January, 2016;
originally announced January 2016.
-
Sharp weighted norm estimates beyond Calderón-Zygmund theory
Authors:
Frédéric Bernicot,
Dorothee Frey,
Stefanie Petermichl
Abstract:
We dominate non-integral singular operators by adapted sparse operators and derive optimal norm estimates in weighted spaces. Our assumptions on the operators are minimal and our result applies to an array of situations, whose prototype are Riesz transforms / multipliers or paraproducts associated with a second order elliptic operator. It also applies to such operators whose unweighted continuity…
▽ More
We dominate non-integral singular operators by adapted sparse operators and derive optimal norm estimates in weighted spaces. Our assumptions on the operators are minimal and our result applies to an array of situations, whose prototype are Riesz transforms / multipliers or paraproducts associated with a second order elliptic operator. It also applies to such operators whose unweighted continuity is restricted to Lebesgue spaces with certain ranges of exponents $(p_0,q_0)$ where $1\le p_0<2<q_0\le \infty$. The norm estimates obtained are powers $α$ of the characteristic used by Auscher and Martell. The critical exponent in this case is $\mathfrak{p}=1+\frac{p_0}{q'_0}$. We prove $α=\frac1{p-p_0}$ when $p_0<p\le \mathfrak{p}$ and $α= \frac{q_0-1}{q_0-p}$ when $\mathfrak{p}\le p<q_0$. In particular, we are able to obtain the sharp $A_2$ estimates for non-integral singular operators which do not fit into the class of Calderón-Zygmund operators. These results are new even in the Euclidean space and are the first ones for operators whose kernel does not satisfy any regularity estimate.
△ Less
Submitted 4 October, 2015;
originally announced October 2015.
-
Space-time paraproducts for paracontrolled calculus, 3d-PAM and multiplicative Burgers equations
Authors:
I. Bailleul,
F. Bernicot,
D. Frey
Abstract:
We sharpen in this work the tools of paracontrolled calculus in order to provide a complete analysis of the parabolic Anderson model equation and Burgers system with multiplicative noise, in a $3$-dimensional Riemannian setting, in either bounded or unbounded domains. With that aim in mind, we introduce a pair of intertwined space-time paraproducts on parabolic Hölder spaces, with good continuity,…
▽ More
We sharpen in this work the tools of paracontrolled calculus in order to provide a complete analysis of the parabolic Anderson model equation and Burgers system with multiplicative noise, in a $3$-dimensional Riemannian setting, in either bounded or unbounded domains. With that aim in mind, we introduce a pair of intertwined space-time paraproducts on parabolic Hölder spaces, with good continuity, that happens to be pivotal and provides one of the building blocks of higher order paracontrolled calculus.
△ Less
Submitted 25 April, 2017; v1 submitted 29 June, 2015;
originally announced June 2015.
-
Sobolev algebras through heat kernel estimates
Authors:
Frédéric Bernicot,
Thierry Coulhon,
Dorothee Frey
Abstract:
On a doubling metric measure space $(M,d,μ)$ endowed with a "carré du champ", let $\mathcal{L}$ be the associated Markov generator and $\dot L^{p}_α(M,\mathcal{L},μ)$ the corresponding homogeneous Sobolev space of order $0<α<1$ in $L^p$, $1<p<+\infty$, with norm $\left\|\mathcal{L}^{α/2}f\right\|_p$. We give sufficient conditions on the heat semigroup $(e^{-t\mathcal{L}})_{t>0}$ for the spaces…
▽ More
On a doubling metric measure space $(M,d,μ)$ endowed with a "carré du champ", let $\mathcal{L}$ be the associated Markov generator and $\dot L^{p}_α(M,\mathcal{L},μ)$ the corresponding homogeneous Sobolev space of order $0<α<1$ in $L^p$, $1<p<+\infty$, with norm $\left\|\mathcal{L}^{α/2}f\right\|_p$. We give sufficient conditions on the heat semigroup $(e^{-t\mathcal{L}})_{t>0}$ for the spaces $\dot L^{p}_α(M,\mathcal{L},μ) \cap L^\infty(M,μ)$ to be algebras for the pointwise product. Two approaches are developed, one using paraproducts (relying on extrapolation to prove their boundedness) and a second one through geometrical square functionals (relying on sharp estimates involving oscillations). A chain rule and a paralinearisation result are also given. In comparison with previous results ([29,11]), the main improvements consist in the fact that we neither require any Poincaré inequalities nor $L^p$-boundedness of Riesz transforms, but only $L^p$-boundedness of the gradient of the semigroup. As a consequence, in the range $p\in(1,2]$, the Sobolev algebra property is shown under Gaussian upper estimates of the heat kernel only.
△ Less
Submitted 6 May, 2015;
originally announced May 2015.
-
Riesz transforms through reverse Hölder and Poincaré inequalities
Authors:
Frédéric Bernicot,
Dorothee Frey
Abstract:
We study the boundedness of Riesz transforms in $L^p$ for $p>2$ on a doubling metric measure space endowed with a gradient operator and an injective, $ω$-accretive operator $L$ satisfying Davies-Gaffney estimates. If $L$ is non-negative self-adjoint, we show that under a reverse Hölder inequality, the Riesz transform is always bounded on $L^p$ for $p$ in some interval $[2,2+\varepsilon)$, and that…
▽ More
We study the boundedness of Riesz transforms in $L^p$ for $p>2$ on a doubling metric measure space endowed with a gradient operator and an injective, $ω$-accretive operator $L$ satisfying Davies-Gaffney estimates. If $L$ is non-negative self-adjoint, we show that under a reverse Hölder inequality, the Riesz transform is always bounded on $L^p$ for $p$ in some interval $[2,2+\varepsilon)$, and that $L^p$ gradient estimates for the semigroup imply boundedness of the Riesz transform in $L^q$ for $q \in [2,p)$. This improves results of \cite{ACDH} and \cite{AC}, where the stronger assumption of a Poincaré inequality and the assumption $e^{-tL}(1)=1$ were made. The Poincaré inequality assumption is also weakened in the setting of a sectorial operator $L$. In the last section, we study elliptic perturbations of Riesz transforms.
△ Less
Submitted 9 March, 2015;
originally announced March 2015.
-
On well-posedness of parabolic equations of Navier-Stokes type with BMO^{-1}(\R^n) data
Authors:
Pascal Auscher,
Dorothee Frey
Abstract:
We develop a strategy making extensive use of tent spaces to study parabolic equa-tions with quadratic nonlinearities as for the Navier-Stokes system. We begin with a new proof of the well-known result of Koch and Tataru on the well-posedness of Navier-Stokes equations in \R^n with small initial data in BMO^{-1}(\R^n). We then study another model where neither pointwise kernel bounds nor self-adjo…
▽ More
We develop a strategy making extensive use of tent spaces to study parabolic equa-tions with quadratic nonlinearities as for the Navier-Stokes system. We begin with a new proof of the well-known result of Koch and Tataru on the well-posedness of Navier-Stokes equations in \R^n with small initial data in BMO^{-1}(\R^n). We then study another model where neither pointwise kernel bounds nor self-adjointness are available.
△ Less
Submitted 14 April, 2015; v1 submitted 29 December, 2014;
originally announced December 2014.
-
Conical square function estimates and functional calculi for perturbed Hodge-Dirac operators in L^p
Authors:
Dorothee Frey,
Alan McIntosh,
Pierre Portal
Abstract:
Perturbed Hodge-Dirac operators and their holomorphic functional calculi, as investigated in the papers by Axelsson, Keith and the second author, provided insight into the solution of the Kato square-root problem for elliptic operators in $L^2$ spaces, and allowed for an extension of these estimates to other systems with applications to non-smooth boundary value problems. In this paper, we determi…
▽ More
Perturbed Hodge-Dirac operators and their holomorphic functional calculi, as investigated in the papers by Axelsson, Keith and the second author, provided insight into the solution of the Kato square-root problem for elliptic operators in $L^2$ spaces, and allowed for an extension of these estimates to other systems with applications to non-smooth boundary value problems. In this paper, we determine conditions under which such operators satisfy conical square function estimates in a range of $L^p$ spaces, thus allowing us to apply the theory of Hardy spaces associated with an operator, to prove that they have a bounded holomorphic functional calculus in those $L^p$ spaces. We also obtain functional calculi results for restrictions to certain subspaces, for a larger range of $p$. This provides a framework for obtaining $L^p$ results on perturbed Hodge Laplacians, generalising known Riesz transform bounds for an elliptic operator $L$ with bounded measurable coefficients, one Sobolev exponent below the Hodge exponent, and $L^p$ bounds on the square-root of $L$ by the gradient, two Sobolev exponents below the Hodge exponent. Our proof shows that the heart of the harmonic analysis in $L^2$ extends to $L^p$ for all $p \in (1,\infty)$, while the restrictions in $p$ come from the operator-theoretic part of the $L^2$ proof. In the course of our work, we obtain some results of independent interest about singular integral operators on tent spaces, and about the relationship between conical and vertical square functions.
△ Less
Submitted 3 March, 2015; v1 submitted 17 July, 2014;
originally announced July 2014.
-
Gaussian heat kernel bounds through elliptic Moser iteration
Authors:
Frédéric Bernicot,
Thierry Coulhon,
Dorothee Frey
Abstract:
On a doubling metric measure space endowed with a "carré du champ", we consider $L^p$ estimates $(G_p)$ of the gradient of the heat semigroup and scale-invariant $L^p$ Poincaré inequalities $(P_p)$. We show that the combination of $(G_p)$ and $(P_p)$ for $p\ge 2$ always implies two-sided Gaussian heat kernel bounds. The case $p=2$ is a famous theorem of Saloff-Coste, of which we give a shorter pro…
▽ More
On a doubling metric measure space endowed with a "carré du champ", we consider $L^p$ estimates $(G_p)$ of the gradient of the heat semigroup and scale-invariant $L^p$ Poincaré inequalities $(P_p)$. We show that the combination of $(G_p)$ and $(P_p)$ for $p\ge 2$ always implies two-sided Gaussian heat kernel bounds. The case $p=2$ is a famous theorem of Saloff-Coste, of which we give a shorter proof, without parabolic Moser iteration. We also give a more direct proof of the main result in \cite{HS}. This relies in particular on a new notion of $L^p$ Hölder regularity for a semigroup and on a characterization of $(P_2)$ in terms of harmonic functions.
△ Less
Submitted 6 March, 2015; v1 submitted 15 July, 2014;
originally announced July 2014.
-
A new proof for Koch and Tataru's result on the well-posedness of Navier-Stokes equations in $BMO^{-1}$
Authors:
Pascal Auscher,
Dorothee Frey
Abstract:
We give a new proof of a well-known result of Koch and Tataru on the well-posedness of Navier-Stokes equations in $\R^n$ with small initial data in $BMO^{-1}(\R^n)$. The proof is formulated operator theoretically and does not make use of self-adjointness of the Laplacian.
We give a new proof of a well-known result of Koch and Tataru on the well-posedness of Navier-Stokes equations in $\R^n$ with small initial data in $BMO^{-1}(\R^n)$. The proof is formulated operator theoretically and does not make use of self-adjointness of the Laplacian.
△ Less
Submitted 14 October, 2013;
originally announced October 2013.
-
Pseudodifferential operators associated with a semigroup of operators
Authors:
Frederic Bernicot,
Dorothee Frey
Abstract:
Related to a semigroup of operators on a metric measure space, we define and study pseudodifferential operators (including the setting of Riemannian manifold, fractals, graphs ...). Boundedness on $L^p$ for pseudodifferential operators of order 0 are proved. Mainly, we focus on symbols belonging to the class $S^0_{1,δ}$ for $δ\in[0,1)$. For the limit class $S^0_{1,1}$, we describe some results by…
▽ More
Related to a semigroup of operators on a metric measure space, we define and study pseudodifferential operators (including the setting of Riemannian manifold, fractals, graphs ...). Boundedness on $L^p$ for pseudodifferential operators of order 0 are proved. Mainly, we focus on symbols belonging to the class $S^0_{1,δ}$ for $δ\in[0,1)$. For the limit class $S^0_{1,1}$, we describe some results by restricting our attention to the case of a sub-Laplacian operator on a Riemannian manifold.
△ Less
Submitted 11 December, 2012;
originally announced December 2012.
-
Paraproducts via $H^\infty$-functional calculus
Authors:
Dorothee Frey
Abstract:
Let $X$ be a space of homogeneous type and let $L$ be a sectorial operator with bounded holomorphic functional calculus on $L^2(X)$. We assume that the semigroup $\{e^{-tL}\}_{t>0}$ satisfies Davies-Gaffney estimates. In this paper, we introduce a new type of paraproduct operators that is constructed via certain approximations of the identity associated to $L$. We show various boundedness properti…
▽ More
Let $X$ be a space of homogeneous type and let $L$ be a sectorial operator with bounded holomorphic functional calculus on $L^2(X)$. We assume that the semigroup $\{e^{-tL}\}_{t>0}$ satisfies Davies-Gaffney estimates. In this paper, we introduce a new type of paraproduct operators that is constructed via certain approximations of the identity associated to $L$. We show various boundedness properties on $L^p(X)$ and the recently developed Hardy and BMO spaces $H^p_L(X)$ and $BMO_L(X)$. In generalization of standard paraproducts constructed via convolution operators, we show $L^2(X)$ off-diagonal estimates as a substitute for Calderón-Zygmund kernel estimates. As an application, we study differentiability properties of paraproducts in terms of fractional powers of the operator $L$. The results of this paper are fundamental for the proof of a T(1)-Theorem for operators beyond Calderón-Zygmund theory, which will be the subject of a forthcoming paper.
△ Less
Submitted 21 July, 2011;
originally announced July 2011.
-
A T(1)-Theorem for non-integral operators
Authors:
Dorothee Frey,
Peer Christian Kunstmann
Abstract:
Let $X$ be a space of homogeneous type and let $L$ be a sectorial operator with bounded holomorphic functional calculus on $L^2(X)$. We assume that the semigroup $\{e^{-tL}\}_{t>0}$ satisfies Davies-Gaffney estimates. Associated to $L$ are certain approximations of the identity. We call an operator $T$ a non-integral operator if compositions involving $T$ and these approximations satisfy certain w…
▽ More
Let $X$ be a space of homogeneous type and let $L$ be a sectorial operator with bounded holomorphic functional calculus on $L^2(X)$. We assume that the semigroup $\{e^{-tL}\}_{t>0}$ satisfies Davies-Gaffney estimates. Associated to $L$ are certain approximations of the identity. We call an operator $T$ a non-integral operator if compositions involving $T$ and these approximations satisfy certain weighted norm estimates. The Davies-Gaffney and the weighted norm estimates are together a substitute for the usual kernel estimates on $T$ in Calderón-Zygmund theory. In this paper, we show, under the additional assumption that a vertical Littlewood-Paley-Stein square function associated to $L$ is bounded on $L^2(X)$, that a non-integral operator $T$ is bounded on $L^2(X)$ if and only if $T(1) \in BMO_L(X)$ and $T^{\ast}(1) \in BMO_{L^{\ast}}(X)$. Here, $BMO_L(X)$ and $BMO_{L^{\ast}}(X)$ denote the recently defined $BMO(X)$ spaces associated to $L$ that generalize the space $BMO(X)$ of John and Nirenberg. Generalizing a recent result due to F. Bernicot, we show a second version of a T(1)-Theorem under weaker off-diagonal estimates, which gives a positive answer to a question raised by him. As an application, we prove $L^2(X)$-boundedness of a paraproduct operator associated to $L$. We moreover study criterions for a $T(b)$-Theorem to be valid.
△ Less
Submitted 21 July, 2011;
originally announced July 2011.