Skip to main content

Showing 1–9 of 9 results for author: Jaksic, S

.
  1. arXiv:2405.10694  [pdf, ps, other

    math.FA

    On the iterates of the Laguerre operator

    Authors: Smiljana Jakšić, Stevan Pilipović, Nenad Teofanov, Đorđe Vučković

    Abstract: We use the iterates of the Laguerre operator to introduce Pilipović spaces on positive orthants. It is shown that such spaces coincide with $G-$type spaces $g_α^α(\mathbb{R}^d_+)$ and $G_α^α(\mathbb{R}^d_+)$, when $α> 1$, and $α\geq 1$, respectively. However, in contrast to $G$-type spaces, Pilipović spaces on positive orthants are nontrivial below the critical index $α= 1$. We also remark that th… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

    MSC Class: 46F05; 33C45

  2. arXiv:2210.08214  [pdf, ps, other

    math.PR math-ph math.FA

    The affine ensemble: determinantal point processes associated with the ax+b group

    Authors: Luis Daniel Abreu, Peter Balazs, Smiljana Jakšić

    Abstract: We introduce the affine ensemble, a class of determinantal point processes (DPP) in the half-plane C^+ associated with the ax+b (affine) group, depending on an admissible Hardy function ψ. We obtain the asymptotic behavior of the variance, the exact value of the asymptotic constant, and non-asymptotic upper and lower bounds for the variance on a compact set Ω contained in C^+. As a special case on… ▽ More

    Submitted 15 October, 2022; originally announced October 2022.

    Comments: 15 pages; J. Math. Soc. Japan, in press

  3. arXiv:2202.02404  [pdf, other

    cs.AI cs.LO cs.RO

    Model-Free Reinforcement Learning for Symbolic Automata-encoded Objectives

    Authors: Anand Balakrishnan, Stefan Jakšić, Edgar A. Aguilar, Dejan Ničković, Jyotirmoy V. Deshmukh

    Abstract: Reinforcement learning (RL) is a popular approach for robotic path planning in uncertain environments. However, the control policies trained for an RL agent crucially depend on user-defined, state-based reward functions. Poorly designed rewards can lead to policies that do get maximal rewards but fail to satisfy desired task objectives or are unsafe. There are several examples of the use of formal… ▽ More

    Submitted 24 February, 2022; v1 submitted 4 February, 2022; originally announced February 2022.

  4. arXiv:1802.03775  [pdf, other

    cs.LO

    An Algebraic Framework for Runtime Verification

    Authors: Stefan Jaksic, Ezio Bartocci, Radu Grosu, Dejan Nickovic

    Abstract: Runtime verification (RV) is a pragmatic and scalable, yet rigorous technique, to assess the correctness of complex systems, including cyber-physical systems (CPS). By measuring how robustly a CPS run satisfies a specification, RV allows in addition, to quantify the resiliency of a CPS to perturbations. In this paper we propose Algebraic Runtime Verification (ARV), a general, semantic framework fo… ▽ More

    Submitted 11 February, 2018; originally announced February 2018.

  5. arXiv:1602.04017  [pdf, ps, other

    math.FA

    $G$-type Spaces of Ultradistributions over $\mathbb{R}^d_+$ and the Weyl Pseudo-differential Operators with Radial Symbols

    Authors: Smiljana Jaksić, Stevan Pilipović, Bojan Prangoski

    Abstract: The first part of the paper is devoted to the $G$-type spaces i.e. the spaces $G^α_α(\mathbb R^d_+)$, $α\geq 1$ and their duals which can be described as analogous to the Gelfand-Shilov spaces and their duals but with completely new justification of obtained results. The Laguerre type expansions of the elements in $G^α_α(\mathbb R^d_+)$, $α\geq 1$ and their duals characterise these spaces through… ▽ More

    Submitted 12 February, 2016; originally announced February 2016.

  6. arXiv:1602.04008  [pdf, ps, other

    math.FA

    Extension theorem of Whitney type for $\mathcal S(\mathbb{R}_+^d)$ by the use of the Kernel Theorem

    Authors: Smiljana Jaksić, Bojan Prangoski

    Abstract: We study the expansions of the elements in $\mathcal S(\mathbb{R}_+^d)$ and $\mathcal{S}'(\mathbb{R}_+^d)$ with respect to the Laguerre orthonormal basis, extending the result of M. Guillemont-Teissier in the case $d=1$. As a consequence, we obtain the Schwartz kernel theorem for $\mathcal{S}(\mathbb{R}_+^d)$ and $\mathcal{S}'(\mathbb{R}_+^d)$ and the extension theorem of Whitney type for… ▽ More

    Submitted 12 February, 2016; originally announced February 2016.

  7. A Typed Model for Dynamic Authorizations

    Authors: Silvia Ghilezan, Svetlana Jakšić, Jovanka Pantović, Jorge A. Pérez, Hugo Torres Vieira

    Abstract: Security requirements in distributed software systems are inherently dynamic. In the case of authorization policies, resources are meant to be accessed only by authorized parties, but the authorization to access a resource may be dynamically granted/yielded. We describe ongoing work on a model for specifying communication and dynamic authorization handling. We build upon the pi-calculus so as to e… ▽ More

    Submitted 10 February, 2016; originally announced February 2016.

    Comments: In Proceedings PLACES 2015, arXiv:1602.03254

    Journal ref: EPTCS 203, 2016, pp. 73-84

  8. Precise subty** for synchronous multiparty sessions

    Authors: Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Svetlana Jakšić, Jovanka Pantović, Nobuko Yoshida

    Abstract: The notion of subty** has gained an important role both in theoretical and applicative domains: in lambda and concurrent calculi as well as in programming languages. The soundness and the completeness, together referred to as the preciseness of subty**, can be considered from two different points of view: operational and denotational. The former preciseness has been recently developed with r… ▽ More

    Submitted 10 February, 2016; originally announced February 2016.

    Comments: In Proceedings PLACES 2015, arXiv:1602.03254

    ACM Class: D.3.3; F.3.2

    Journal ref: EPTCS 203, 2016, pp. 29-43

  9. Dynamic Role Authorization in Multiparty Conversations

    Authors: Silvia Ghilezan, Svetlana Jakšić, Jovanka Pantović, Jorge A. Pérez, Hugo Torres Vieira

    Abstract: Protocol specifications often identify the roles involved in communications. In multiparty protocols that involve task delegation it is often useful to consider settings in which different sites may act on behalf of a single role. It is then crucial to control the roles that the different parties are authorized to represent, including the case in which role authorizations are determined only at ru… ▽ More

    Submitted 25 August, 2014; originally announced August 2014.

    Comments: In Proceedings BEAT 2014, arXiv:1408.5564

    ACM Class: D.3.1; F.3.2

    Journal ref: EPTCS 162, 2014, pp. 1-8