-
Improving the distance reduction step in the von Neumann algorithm
Authors:
C. H. Jeffrey Pang
Abstract:
A known first order method to find a feasible solution to a conic problem is an adapted von Neumann algorithm. We improve the distance reduction step there by projecting onto the convex hull of previously generated points using a primal active set quadratic programming (QP) algorithm. The convergence theory is improved when the QPs are as large as possible. For problems in R^2, we analyze our alg…
▽ More
A known first order method to find a feasible solution to a conic problem is an adapted von Neumann algorithm. We improve the distance reduction step there by projecting onto the convex hull of previously generated points using a primal active set quadratic programming (QP) algorithm. The convergence theory is improved when the QPs are as large as possible. For problems in R^2, we analyze our algorithm by epigraphs and the monotonicity of subdifferentials. Logically, the larger the set to project onto, the better the performance per iteration, and this is indeed seen in our numerical experiments.
△ Less
Submitted 14 August, 2014;
originally announced August 2014.
-
Location Prediction: Communities Speak Louder than Friends
Authors:
Jun Pang,
Yang Zhang
Abstract:
Humans are social animals, they interact with different communities of friends to conduct different activities. The literature shows that human mobility is constrained by their social relations. In this paper, we investigate the social impact of a person's communities on his mobility, instead of all friends from his online social networks. This study can be particularly useful, as certain social b…
▽ More
Humans are social animals, they interact with different communities of friends to conduct different activities. The literature shows that human mobility is constrained by their social relations. In this paper, we investigate the social impact of a person's communities on his mobility, instead of all friends from his online social networks. This study can be particularly useful, as certain social behaviors are influenced by specific communities but not all friends. To achieve our goal, we first develop a measure to characterize a person's social diversity, which we term `community entropy'. Through analysis of two real-life datasets, we demonstrate that a person's mobility is influenced only by a small fraction of his communities and the influence depends on the social contexts of the communities. We then exploit machine learning techniques to predict users' future movement based on their communities' information. Extensive experiments demonstrate the prediction's effectiveness.
△ Less
Submitted 1 April, 2016; v1 submitted 6 August, 2014;
originally announced August 2014.
-
Cluster Statistics and Quasisoliton Dynamics in Microscopic Car-following Models
Authors:
Bo Yang,
Xihua Xu,
John Z. F. Pang,
Christopher Monterola
Abstract:
Using the optimal velocity (OV) model as an example, we show that in the non-linear regime there is an emergent quantity that gives the extremum headways in the cluster formation, as well as the coexistence curve separating the absolute stable phase from the metastable phase. This emergent quantity is independent of the density of the traffic lane, and determines an intrinsic scale that characteri…
▽ More
Using the optimal velocity (OV) model as an example, we show that in the non-linear regime there is an emergent quantity that gives the extremum headways in the cluster formation, as well as the coexistence curve separating the absolute stable phase from the metastable phase. This emergent quantity is independent of the density of the traffic lane, and determines an intrinsic scale that characterizes the dynamics of localized quasisoliton structures given by the time derivative of the headways. The intrinsic scale is analogous to the "charge" of quasisolitons that controls the strength of interaction between multiple clusters, leading to non-trivial cluster statistics from random perturbations to initial uniform traffic. The cluster statistics depend both on the charge and the density of the traffic lane; the relationship is qualitatively universal for general car-following models.
△ Less
Submitted 10 May, 2016; v1 submitted 2 July, 2014;
originally announced July 2014.
-
Accelerating the alternating projection algorithm for the case of affine subspaces using supporting hyperplanes
Authors:
C. H. Jeffrey Pang
Abstract:
The von Neumann-Halperin method of alternating projections converges strongly to the projection of a given point onto the intersection of finitely many closed affine subspaces. We propose acceleration schemes making use of two ideas: Firstly, each projection onto an affine subspace identifies a hyperplane of codimension 1 containing the intersection, and secondly, it is easy to project onto a fini…
▽ More
The von Neumann-Halperin method of alternating projections converges strongly to the projection of a given point onto the intersection of finitely many closed affine subspaces. We propose acceleration schemes making use of two ideas: Firstly, each projection onto an affine subspace identifies a hyperplane of codimension 1 containing the intersection, and secondly, it is easy to project onto a finite intersection of such hyperplanes. We give conditions for which our accelerations converge strongly. Finally, we perform numerical experiments to show that these accelerations perform well for a matrix model updating problem.
△ Less
Submitted 16 July, 2014; v1 submitted 16 June, 2014;
originally announced June 2014.
-
Improved analysis of algorithms based on supporting halfspaces and quadratic programming for the convex intersection and feasibility problems
Authors:
C. H. Jeffrey Pang
Abstract:
This paper improves the algorithms based on supporting halfspaces and quadratic programming for convex set intersection problems in our earlier paper in several directions. First, we give conditions so that much smaller quadratic programs (QPs) and approximate projections arising from partially solving the QPs are sufficient for multiple-term superlinear convergence for nonsmooth problems. Second,…
▽ More
This paper improves the algorithms based on supporting halfspaces and quadratic programming for convex set intersection problems in our earlier paper in several directions. First, we give conditions so that much smaller quadratic programs (QPs) and approximate projections arising from partially solving the QPs are sufficient for multiple-term superlinear convergence for nonsmooth problems. Second, we identify additional regularity, which we call the second order supporting hyperplane property (SOSH), that gives multiple-term quadratic convergence. Third, we show that these fast convergence results carry over for the convex inequality problem. Fourth, we show that infeasibility can be detected in finitely many operations. Lastly, we explain how we can use the dual active set QP algorithm of Goldfarb and Idnani to get useful iterates by solving the QPs partially, overcoming the problem of solving large QPs in our algorithms.
△ Less
Submitted 16 June, 2014;
originally announced June 2014.
-
Parallel Successive Convex Approximation for Nonsmooth Nonconvex Optimization
Authors:
Meisam Razaviyayn,
Mingyi Hong,
Zhi-Quan Luo,
Jong-Shi Pang
Abstract:
Consider the problem of minimizing the sum of a smooth (possibly non-convex) and a convex (possibly nonsmooth) function involving a large number of variables. A popular approach to solve this problem is the block coordinate descent (BCD) method whereby at each iteration only one variable block is updated while the remaining variables are held fixed. With the recent advances in the developments of…
▽ More
Consider the problem of minimizing the sum of a smooth (possibly non-convex) and a convex (possibly nonsmooth) function involving a large number of variables. A popular approach to solve this problem is the block coordinate descent (BCD) method whereby at each iteration only one variable block is updated while the remaining variables are held fixed. With the recent advances in the developments of the multi-core parallel processing technology, it is desirable to parallelize the BCD method by allowing multiple blocks to be updated simultaneously at each iteration of the algorithm. In this work, we propose an inexact parallel BCD approach where at each iteration, a subset of the variables is updated in parallel by minimizing convex approximations of the original objective function. We investigate the convergence of this parallel BCD method for both randomized and cyclic variable selection rules. We analyze the asymptotic and non-asymptotic convergence behavior of the algorithm for both convex and non-convex objective functions. The numerical experiments suggest that for a special case of Lasso minimization problem, the cyclic block selection rule can outperform the randomized rule.
△ Less
Submitted 31 October, 2014; v1 submitted 13 June, 2014;
originally announced June 2014.
-
Finitely convergent algorithm for nonconvex inequality problems
Authors:
C. H. Jeffrey Pang
Abstract:
We extend Fukushima's result on the finite convergence of an algorithm for the global convex feasibility problem to the local nonconvex case.
We extend Fukushima's result on the finite convergence of an algorithm for the global convex feasibility problem to the local nonconvex case.
△ Less
Submitted 31 July, 2014; v1 submitted 28 May, 2014;
originally announced May 2014.
-
Proceedings Third International Workshop on Engineering Safety and Security Systems
Authors:
Jun Pang,
Yang Liu
Abstract:
The International Workshop on Engineering Safety and Security Systems (ESSS) aims at contributing to the challenge of constructing reliable and secure systems. The workshop covers areas such as formal specification, type checking, model checking, program analysis/transformation, model-based testing and model-driven software construction. The workshop will bring together researchers and industry R&…
▽ More
The International Workshop on Engineering Safety and Security Systems (ESSS) aims at contributing to the challenge of constructing reliable and secure systems. The workshop covers areas such as formal specification, type checking, model checking, program analysis/transformation, model-based testing and model-driven software construction. The workshop will bring together researchers and industry R&D expertise together to exchange their knowledge, discuss their research findings, and explore potential collaborations. The main theme of the workshop is methods and techniques for constructing large reliable and secure systems. The goal of the workshop is to establish a platform for the exchange of ideas, discussion, cross-fertilization, inspiration, co-operation, and dissemination.
△ Less
Submitted 3 May, 2014;
originally announced May 2014.
-
Stateful Security Protocol Verification
Authors:
Li Li,
Jun Pang,
Yang Liu,
Jun Sun,
** Song Dong
Abstract:
A long-standing research problem in security protocol design is how to efficiently verify security protocols with tamper-resistant global states. In this paper, we address this problem by first proposing a protocol specification framework, which explicitly represents protocol execution states and state transformations. Secondly, we develop an algorithm for verifying security properties by utilizin…
▽ More
A long-standing research problem in security protocol design is how to efficiently verify security protocols with tamper-resistant global states. In this paper, we address this problem by first proposing a protocol specification framework, which explicitly represents protocol execution states and state transformations. Secondly, we develop an algorithm for verifying security properties by utilizing the key ingredients of the first-order reasoning for reachability analysis, while tracking state transformation and checking the validity of newly generated states. Our verification algorithm is proven to be (partially) correct, if it terminates. We have implemented the proposed framework and verification algorithms in a tool named SSPA, and evaluate it using a number of stateful security protocols. The experimental results show that our approach is not only feasible but also practically efficient. In particular, we have found a security flaw on the digital envelope protocol, which could not be detected by existing security protocol verifiers.
△ Less
Submitted 10 March, 2014;
originally announced March 2014.
-
Phonon Density of States and Anharmonicity of UO2
Authors:
Judy W. L. Pang,
Aleksandr Chernatynskiy,
Bennett C. Larson,
William J. L. Buyers,
Douglas L. Abernathy,
Kenneth J. McClellan,
Simon R. Phillpot
Abstract:
Phonon density of states (PDOS) measurements have been performed on polycrystalline UO2 at 295 and 1200 K using time-of-flight inelastic neutron scattering to investigate the impact of anharmonicity on the vibrational spectra and to benchmark ab initio PDOS simulations performed on this strongly correlated Mott-insulator. Time-of-flight PDOS measurements include anharmonic linewidth broadening inh…
▽ More
Phonon density of states (PDOS) measurements have been performed on polycrystalline UO2 at 295 and 1200 K using time-of-flight inelastic neutron scattering to investigate the impact of anharmonicity on the vibrational spectra and to benchmark ab initio PDOS simulations performed on this strongly correlated Mott-insulator. Time-of-flight PDOS measurements include anharmonic linewidth broadening inherently and the factor of ~ 7 enhancement of the oxygen spectrum relative to the uranium component by the neutron weighting increases sensitivity to the oxygen-dominated optical phonon modes. The first-principles simulations of quasi-harmonic PDOS spectra were neutron-weighted and anharmonicity was introduced in an approximate way by convolution with wavevector-weighted averages over our previously measured phonon linewidths for UO2 that are provided in numerical form. Comparisons between the PDOS measurements and the simulations show reasonable agreement overall, but they also reveal important areas of disagreement for both high and low temperatures. The discrepancies stem largely from an ~ 10 meV compression in the overall bandwidth (energy range) of the oxygen-dominated optical phonons in the simulations. A similar linewidth-convoluted comparison performed with the PDOS spectrum of Dolling et al. obtained by shell-model fitting to their historical phonon dispersion measurements shows excellent agreement with the time-of-flight PDOS measurements reported here. In contrast, we show by comparisons of spectra in linewidth-convoluted form that recent first-principles simulations for UO2 fail to account for the PDOS spectrum determined from the measurements of Dolling et al. These results demonstrate PDOS measurements to be stringent tests for ab initio simulations of phonon physics in UO2 and they indicate further the need for advances in theory to address lattice dynamics of UO2.
△ Less
Submitted 14 March, 2014; v1 submitted 8 January, 2014;
originally announced January 2014.
-
Kinetic equations for massive Dirac fermions in electromagnetic field with non-Abelian Berry phase
Authors:
Jiunn-Wei Chen,
**-yi Pang,
Shi Pu,
Qun Wang
Abstract:
We derive a semi-classical effective action and the kinetic equation for massive Dirac fermions in electromagnetic fields. The non-Abelian Berry phase structure emerges from two helicity states of massive fermions with positive energy. The classical spin emerges as a vector in SU(2) helicity space. The continuity equations for the fermion number and the classical spin are derived. The fermion numb…
▽ More
We derive a semi-classical effective action and the kinetic equation for massive Dirac fermions in electromagnetic fields. The non-Abelian Berry phase structure emerges from two helicity states of massive fermions with positive energy. The classical spin emerges as a vector in SU(2) helicity space. The continuity equations for the fermion number and the classical spin are derived. The fermion number is conserved while the spin charge is not conserved by anomaly. Previous results about the coefficients of the chiral magnetic effect for the fermion and axial currents in the chiral limit can be reproduced after including the anti-fermion contributions. This provides an example for the emerging spin and non-Abelian Berry phase of Dirac fermions arising from the fermion mass.
△ Less
Submitted 16 April, 2014; v1 submitted 6 December, 2013;
originally announced December 2013.
-
Higher Spin Currents in the Holographic N=1 Coset Minimal Model
Authors:
Changhyun Ahn,
**sub Paeng
Abstract:
In the N=1 supersymmetric coset minimal model based on (B_N^{(1)} \oplus D_N^{(1)}, D_N^{(1)}) at level (k,1) studied recently, the standard N=1 super stress tensor of spins (3/2,2) is reviewed. By considering the stress tensor in the coset (B_N^{(1)}, D_N^{(1)}) at level k, the higher spin-2' Casimir current was obtained previously. By acting the above spin-3/2 current on the higher spin-2' Casim…
▽ More
In the N=1 supersymmetric coset minimal model based on (B_N^{(1)} \oplus D_N^{(1)}, D_N^{(1)}) at level (k,1) studied recently, the standard N=1 super stress tensor of spins (3/2,2) is reviewed. By considering the stress tensor in the coset (B_N^{(1)}, D_N^{(1)}) at level k, the higher spin-2' Casimir current was obtained previously. By acting the above spin-3/2 current on the higher spin-2' Casimir current, its superpartner, the higher spin-5/2 current, can be generated and combined as the first higher spin supercurrent with spins (2', 5/2). By calculating the operator product expansions (OPE) between the higher spin supercurrent and itself, the next higher spin supercurrent can be generated with spins (7/2,4). Moreover, the other higher spin supercurrent with spins (4',9/2) can be generated by calculating the OPE between the first higher spin supercurrent with spins (2', 5/2) and the second higher spin supercurrent with spins (7/2,4). Finally, the higher spin supercurrent, (11/2,6), can be extracted from the right hand side of OPE between the higher spin supercurrents, (2', 5/2) and (4', 9/2).
△ Less
Submitted 12 December, 2013; v1 submitted 23 October, 2013;
originally announced October 2013.
-
Space-Time Topology in Teleportation-Based Quantum Computation
Authors:
Yong Zhang,
**glong Pang
Abstract:
We study the construction of both universal quantum computation and multi-partite entangled states in the topological diagrammatical approach to quantum teleportation. Our results show that the teleportation-based quantum circuit model admits a space-time topological interpretation which makes the construction of both quantum gates and four-partite entangled states more intuitive and simpler. Our…
▽ More
We study the construction of both universal quantum computation and multi-partite entangled states in the topological diagrammatical approach to quantum teleportation. Our results show that the teleportation-based quantum circuit model admits a space-time topological interpretation which makes the construction of both quantum gates and four-partite entangled states more intuitive and simpler. Our results state a deeper link between the space-time non-locality and the quantum non-locality which are the two-fold character of the topological diagrammatical representation.
△ Less
Submitted 9 October, 2013; v1 submitted 4 September, 2013;
originally announced September 2013.
-
A New Distributed DC-Programming Method and its Applications
Authors:
Alberth Alvarado,
Gesualdo Scutari,
Jong-Shi Pang
Abstract:
We propose a novel decomposition framework for the distributed optimization of Difference Convex (DC)-type nonseparable sum-utility functions subject to coupling convex constraints. A major contribution of the paper is to develop for the first time a class of (inexact) best-response-like algorithms with provable convergence, where a suitably convexified version of the original DC program is iterat…
▽ More
We propose a novel decomposition framework for the distributed optimization of Difference Convex (DC)-type nonseparable sum-utility functions subject to coupling convex constraints. A major contribution of the paper is to develop for the first time a class of (inexact) best-response-like algorithms with provable convergence, where a suitably convexified version of the original DC program is iteratively solved. The main feature of the proposed successive convex approximation method is its decomposability structure across the users, which leads naturally to distributed algorithms in the primal and/or dual domain. The proposed framework is applicable to a variety of multiuser DC problems in different areas, ranging from signal processing, to communications and networking. As a case study, in the second part of the paper we focus on two examples, namely: i) a novel resource allocation problem in the emerging area of cooperative physical layer security; ii) and the renowned sum-rate maximization of MIMO Cognitive Radio networks. Our contribution in this context is to devise a class of easy-to-implement distributed algorithms with provable convergence to stationary solution of such problems. Numerical results show that the proposed distributed schemes reach performance close to (and sometimes better than) that of centralized methods.
△ Less
Submitted 20 September, 2013; v1 submitted 15 August, 2013;
originally announced August 2013.
-
Set intersection problems: Integrating projection and quadratic programming algorithms
Authors:
C. H. Jeffrey Pang
Abstract:
Abstract. The Set Intersection Problem (SIP) is the problem of finding a point in the intersection of convex sets. This problem is typically solved by the method of alternating projections. To accelerate the convergence, the idea of using Quadratic Programming (QP) to project a point onto the intersection of halfspaces generated by the projection process was discussed in earlier papers. This paper…
▽ More
Abstract. The Set Intersection Problem (SIP) is the problem of finding a point in the intersection of convex sets. This problem is typically solved by the method of alternating projections. To accelerate the convergence, the idea of using Quadratic Programming (QP) to project a point onto the intersection of halfspaces generated by the projection process was discussed in earlier papers. This paper looks at how one can integrate projection algorithms together with an active set QP algorithm. As a byproduct of our analysis, we show how to accelerate an SIP algorithm involving box constraints, and how to extend a version of the Algebraic Reconstruction Technique (ART) while preserving finite convergence. Lastly, the warmstart property of active set QP algorithms is a valuable property for the problem of projecting onto the intersection of convex sets.
△ Less
Submitted 15 February, 2015; v1 submitted 28 June, 2013;
originally announced July 2013.
-
A New Access Control Scheme for Facebook-style Social Networks
Authors:
Jun Pang,
Yang Zhang
Abstract:
The popularity of online social networks (OSNs) makes the protection of users' private information an important but scientifically challenging problem. In the literature, relationship-based access control schemes have been proposed to address this problem. However, with the dynamic developments of OSNs, we identify new access control requirements which cannot be fully captured by the current schem…
▽ More
The popularity of online social networks (OSNs) makes the protection of users' private information an important but scientifically challenging problem. In the literature, relationship-based access control schemes have been proposed to address this problem. However, with the dynamic developments of OSNs, we identify new access control requirements which cannot be fully captured by the current schemes. In this paper, we focus on public information in OSNs and treat it as a new dimension which users can use to regulate access to their resources. We define a new OSN model containing users and their relationships as well as public information. Based on this model, we introduce a variant of hybrid logic for formulating access control policies. We exploit a type of category information and relationship hierarchy to further extend our logic for its usage in practice. In the end, we propose a few solutions to address the problem of information reliability in OSNs, and formally model collaborative access control in our access control scheme.
△ Less
Submitted 1 April, 2016; v1 submitted 9 April, 2013;
originally announced April 2013.
-
Lattice dynamics in mono- and few-layer sheets of WS2 and WSe2
Authors:
Weijie Zhao,
Zohreh Ghorannevis,
Amara Kiran Kumar,
**g Ren Pang,
Minglin Toh,
Xin Zhang,
Christian Kloc,
** Heng Tan,
Goki Eda
Abstract:
Thickness is one of the fundamental parameters that define the electronic, optical, and thermal properties of two-dimensional (2D) crystals. Phonons in molybdenum disulfide (MoS2) were recently found to exhibit unique thickness dependence due to interplay between short and long range interactions. Here we report Raman spectra of atomically thin sheets of WS2 and WSe2 in the mono- to few-layer thic…
▽ More
Thickness is one of the fundamental parameters that define the electronic, optical, and thermal properties of two-dimensional (2D) crystals. Phonons in molybdenum disulfide (MoS2) were recently found to exhibit unique thickness dependence due to interplay between short and long range interactions. Here we report Raman spectra of atomically thin sheets of WS2 and WSe2 in the mono- to few-layer thickness regime. We show that, similar to the case of MoS2, the characteristic and modes exhibit stiffening and softening with increasing number of layers, respectively, with a small shift of less than 3 cm-1 due to large mass of the atoms. Thickness dependence is also observed in a series of multiphonon bands arising from overtone, combination, and zone edge phonons, whose intensity exhibit significant enhancement in excitonic resonance conditions. Some of these multiphonon peaks are found to be absent only in monolayers. These features provide a unique fingerprint and rapid identification for monolayer flakes.
△ Less
Submitted 4 September, 2013; v1 submitted 3 April, 2013;
originally announced April 2013.
-
Decomposition by Partial Linearization: Parallel Optimization of Multi-Agent Systems
Authors:
Gesualdo Scutari,
Francisco Facchinei,
Peiran Song,
Daniel P. Palomar,
Jong-Shi Pang
Abstract:
We propose a novel decomposition framework for the distributed optimization of general nonconvex sum-utility functions arising naturally in the system design of wireless multiuser interfering systems. Our main contributions are: i) the development of the first class of (inexact) Jacobi best-response algorithms with provable convergence, where all the users simultaneously and iteratively solve a su…
▽ More
We propose a novel decomposition framework for the distributed optimization of general nonconvex sum-utility functions arising naturally in the system design of wireless multiuser interfering systems. Our main contributions are: i) the development of the first class of (inexact) Jacobi best-response algorithms with provable convergence, where all the users simultaneously and iteratively solve a suitably convexified version of the original sum-utility optimization problem; ii) the derivation of a general dynamic pricing mechanism that provides a unified view of existing pricing schemes that are based, instead, on heuristics; and iii) a framework that can be easily particularized to well-known applications, giving rise to very efficient practical (Jacobi or Gauss-Seidel) algorithms that outperform existing adhoc methods proposed for very specific problems. Interestingly, our framework contains as special cases well-known gradient algorithms for nonconvex sum-utility problems, and many blockcoordinate descent schemes for convex functions.
△ Less
Submitted 19 September, 2013; v1 submitted 4 February, 2013;
originally announced February 2013.
-
The OPEs of Spin-4 Casimir Currents in the Holographic SO(N) Coset Minimal Models
Authors:
Changhyun Ahn,
**sub Paeng
Abstract:
We compute the operator product expansion (OPE) between the spin-4 current and itself in the WD_4 coset minimal model with SO(8) current algebra. The right hand side of this OPE contains the spin-6 Casimir current which is also a generator of WD_4 coset minimal model. Based on this N=8 result, we generalize the above OPE for the general N(in the WD_{N/2} coset minimal model) by using two N-general…
▽ More
We compute the operator product expansion (OPE) between the spin-4 current and itself in the WD_4 coset minimal model with SO(8) current algebra. The right hand side of this OPE contains the spin-6 Casimir current which is also a generator of WD_4 coset minimal model. Based on this N=8 result, we generalize the above OPE for the general N(in the WD_{N/2} coset minimal model) by using two N-generalized coupling constants initiated by Hornfeck sometime ago: the simplest OPE for the lowest higher spin currents. We also analyze the similar OPE in the WB_3(and WB_{(N-1)/2}) coset minimal model with SO(7) current algebra. The large N 't Hooft limits are discussed. Our results in two dimensional conformal field theory provide the asymptotic symmetry, at the quantum level, of the higher spin AdS_3 gravity found by Chen et al.
△ Less
Submitted 4 March, 2013; v1 submitted 2 January, 2013;
originally announced January 2013.
-
Set intersection problems: Supporting hyperplanes and quadratic programming
Authors:
C. H. Jeffrey Pang
Abstract:
We study how the supporting hyperplanes produced by the projection process can complement the method of alternating projections and its variants for the convex set intersection problem. For the problem of finding the closest point in the intersection of closed convex sets, we propose an algorithm that, like Dykstra's algorithm, converges strongly in a Hilbert space. Moreover, this algorithm conver…
▽ More
We study how the supporting hyperplanes produced by the projection process can complement the method of alternating projections and its variants for the convex set intersection problem. For the problem of finding the closest point in the intersection of closed convex sets, we propose an algorithm that, like Dykstra's algorithm, converges strongly in a Hilbert space. Moreover, this algorithm converges in finitely many iterations when the closed convex sets are cones in $\mathbb{R}^{n}$ satisfying an alignment condition. Next, we propose modifications of the alternating projection algorithm, and prove its convergence. The algorithm converges superlinearly in $\mathbb{R}^{n}$ under some nice conditions. Under a conical condition, the convergence can be finite. Lastly, we discuss the case where the intersection of the sets is empty.
△ Less
Submitted 31 December, 2012;
originally announced December 2012.
-
Joint Sensing and Power Allocation in Nonconvex Cognitive Radio Games: Nash Equilibria and Distributed Algorithms
Authors:
Gesualdo Scutari,
Jong-Shi Pang
Abstract:
In this paper, we propose a novel class of Nash problems for Cognitive Radio (CR) networks, modeled as Gaussian frequency-selective interference channels, wherein each secondary user (SU) competes against the others to maximize his own opportunistic throughput by choosing jointly the sensing duration, the detection thresholds, and the vector power allocation. The proposed general formulation allow…
▽ More
In this paper, we propose a novel class of Nash problems for Cognitive Radio (CR) networks, modeled as Gaussian frequency-selective interference channels, wherein each secondary user (SU) competes against the others to maximize his own opportunistic throughput by choosing jointly the sensing duration, the detection thresholds, and the vector power allocation. The proposed general formulation allows to accommodate several (transmit) power and (deterministic/probabilistic) interference constraints, such as constraints on the maximum individual and/or aggregate (probabilistic) interference tolerable at the primary receivers. To keep the optimization as decentralized as possible, global (coupling) interference constraints are imposed by penalizing each SU with a set of time-varying prices based upon his contribution to the total interference; the prices are thus additional variable to optimize. The resulting players' optimization problems are nonconvex; moreover, there are possibly price clearing conditions associated with the global constraints to be satisfied by the solution. All this makes the analysis of the proposed games a challenging task; none of classical results in the game theory literature can be successfully applied. The main contribution of this paper is to develop a novel optimization-based theory for studying the proposed nonconvex games; we provide a comprehensive analysis of the existence and uniqueness of a standard Nash equilibrium, devise alternative best-response based algorithms, and establish their convergence.
△ Less
Submitted 27 December, 2012;
originally announced December 2012.
-
Real and Complex Monotone Communication Games
Authors:
Gesualdo Scutari,
Francisco Facchinei,
Jong-Shi Pang,
Daniel P. Palomar
Abstract:
Noncooperative game-theoretic tools have been increasingly used to study many important resource allocation problems in communications, networking, smart grids, and portfolio optimization. In this paper, we consider a general class of convex Nash Equilibrium Problems (NEPs), where each player aims to solve an arbitrary smooth convex optimization problem. Differently from most of current works, we…
▽ More
Noncooperative game-theoretic tools have been increasingly used to study many important resource allocation problems in communications, networking, smart grids, and portfolio optimization. In this paper, we consider a general class of convex Nash Equilibrium Problems (NEPs), where each player aims to solve an arbitrary smooth convex optimization problem. Differently from most of current works, we do not assume any specific structure for the players' problems, and we allow the optimization variables of the players to be matrices in the complex domain. Our main contribution is the design of a novel class of distributed (asynchronous) best-response- algorithms suitable for solving the proposed NEPs, even in the presence of multiple solutions. The new methods, whose convergence analysis is based on Variational Inequality (VI) techniques, can select, among all the equilibria of a game, those that optimize a given performance criterion, at the cost of limited signaling among the players. This is a major departure from existing best-response algorithms, whose convergence conditions imply the uniqueness of the NE. Some of our results hinge on the use of VI problems directly in the complex domain; the study of these new kind of VIs also represents a noteworthy innovative contribution. We then apply the developed methods to solve some new generalizations of SISO and MIMO games in cognitive radios and femtocell systems, showing a considerable performance improvement over classical pure noncooperative schemes.
△ Less
Submitted 14 December, 2013; v1 submitted 26 December, 2012;
originally announced December 2012.
-
Joint Sensing and Power Allocation in Nonconvex Cognitive Radio Games: Quasi-Nash Equilibria
Authors:
Jong-Shi Pang,
Gesualdo Scutari
Abstract:
In this paper, we propose a novel class of Nash problems for Cognitive Radio (CR) networks composed of multiple primary users (PUs) and secondary users (SUs) wherein each SU (player) competes against the others to maximize his own opportunistic throughput by choosing jointly the sensing duration, the detection thresholds, and the vector power allocation over a multichannel link. In addition to pow…
▽ More
In this paper, we propose a novel class of Nash problems for Cognitive Radio (CR) networks composed of multiple primary users (PUs) and secondary users (SUs) wherein each SU (player) competes against the others to maximize his own opportunistic throughput by choosing jointly the sensing duration, the detection thresholds, and the vector power allocation over a multichannel link. In addition to power budget constraints, several (deterministic or probabilistic) interference constraints can be accommodated in the proposed general formulation, such as constraints on the maximum individual/aggregate (probabilistic) interference tolerable from the PUs. To keep the optimization as decentralized as possible, global interference constraints, when present, are imposed via pricing; the prices are thus additional variables to be optimized. The resulting players' optimization problems are nonconvex and there are price clearance conditions associated with the nonconvex global interference constraints to be satisfied by the equilibria of the game, which make the analysis of the proposed game a challenging task; none of classical results in the game theory literature can be successfully applied. To deal with the nonconvexity of the game, we introduce a relaxed equilibrium concept, the Quasi-Nash Equilibrium (QNE), and study its main properties, performance, and connection with local Nash equilibria. Quite interestingly, the proposed game theoretical formulations yield a considerable performance improvement with respect to current centralized and decentralized designs of CR systems, which validates the concept of QNE.
△ Less
Submitted 26 December, 2012;
originally announced December 2012.
-
Some principles for mountain pass algorithms, and the parallel distance
Authors:
Justin T. Brereton,
C. H. Jeffrey Pang
Abstract:
The problem of computing saddle points is important in certain problems in numerical partial differential equations and computational chemistry, and is often solved numerically by a minimization problem over a set of mountain passes. We point out that a good global mountain pass algorithm should have good local and global properties. Next, we define the parallel distance, and show that the square…
▽ More
The problem of computing saddle points is important in certain problems in numerical partial differential equations and computational chemistry, and is often solved numerically by a minimization problem over a set of mountain passes. We point out that a good global mountain pass algorithm should have good local and global properties. Next, we define the parallel distance, and show that the square of the parallel distance has a quadratic property. We show how to design algorithms for the mountain pass problem based on perturbing parameters of the parallel distance, and that methods based on the parallel distance have midrange local and global properties.
△ Less
Submitted 19 November, 2012;
originally announced November 2012.
-
Pairing fluctuation effects in a strongly coupled color superfluid/superconductor
Authors:
**yi Pang,
**cheng Wang,
Lianyi He
Abstract:
We investigate the effects of pairing fluctuations in fermionic superfluids/superconductors where pairing occurs among three species (colors) of fermions. Such color superfluids/superconductors can be realized in three-component atomic Fermi gases and in dense quark matter. The superfluidity/superconductivity is characterized by a three-component order parameter which denotes the pairing among the…
▽ More
We investigate the effects of pairing fluctuations in fermionic superfluids/superconductors where pairing occurs among three species (colors) of fermions. Such color superfluids/superconductors can be realized in three-component atomic Fermi gases and in dense quark matter. The superfluidity/superconductivity is characterized by a three-component order parameter which denotes the pairing among the three colors of fermions. Due to the SU$(3)$ symmetry of the Hamiltonian, one color does not participate pairing. This branch of fermionic excitation is gapless in the naive BCS mean-field description. In this paper, we adopt a pairing-fluctuation theory to investigate the pairing fluctuation effects on the unpaired color in strongly coupled atomic color superfluids and quark color superconductors. At low temperature, a large pairing gap of the paired colors suppresses the pairing fluctuation effects for the unpaired color, and the spectral density of the unpaired color shows a single Fermi-liquid peak, which indicates the naive mean-field picture remains valid. As the temperature is increased, the spectral density of the unpaired color generally exhibits a three-peak structure: the Fermi-liquid peak remains but get suppressed, and two pseudogap-like peaks appears. At and above the superfluid transition temperature, the Fermi-liquid peak disappears completely and the all three colors exhibits pseudogap-like spectral density. The coexistence of Fermi liquid and pseudogap behavior is generic for both atomic color superfluids and quark color superconductors.
△ Less
Submitted 17 September, 2013; v1 submitted 6 November, 2012;
originally announced November 2012.
-
Subdifferential analysis of differential inclusions via discretization
Authors:
C. H. Jeffrey Pang
Abstract:
The framework of differential inclusions encompasses modern optimal control and the calculus of variations. Necessary optimality conditions in the literature identify potentially optimal paths, but do not show how to perturb paths to optimality. We first look at the corresponding discretized inclusions, estimating the subdifferential dependence of the optimal value in terms of the endpoints of the…
▽ More
The framework of differential inclusions encompasses modern optimal control and the calculus of variations. Necessary optimality conditions in the literature identify potentially optimal paths, but do not show how to perturb paths to optimality. We first look at the corresponding discretized inclusions, estimating the subdifferential dependence of the optimal value in terms of the endpoints of the feasible paths. Our approach is to first estimate the coderivative of the reachable map. The discretized (nonsmooth) Euler-Lagrange and transversality conditions follow as a corollary. We obtain corresponding results for differential inclusions by passing discretized inclusions to the limit.
△ Less
Submitted 27 April, 2012; v1 submitted 9 December, 2011;
originally announced December 2011.
-
Some recent progress on quark pairings in dense quark and nuclear matter
Authors:
**-yi Pang,
**-cheng Wang,
Qun Wang
Abstract:
We give a brief overview on some recent progress in quark pairings in dense quark/nuclear matter mostly developed in the past five years. We focus on following aspects in particular: the BCS-BEC crossover in the CSC phase, the baryon formation and dissociation in dense quark/nuclear matter, the Ginzburg-Landau theory for three-flavor dense matter with $U_{A}$(1) anomaly, and the collective and Nam…
▽ More
We give a brief overview on some recent progress in quark pairings in dense quark/nuclear matter mostly developed in the past five years. We focus on following aspects in particular: the BCS-BEC crossover in the CSC phase, the baryon formation and dissociation in dense quark/nuclear matter, the Ginzburg-Landau theory for three-flavor dense matter with $U_{A}$(1) anomaly, and the collective and Nambu-Goldstone modes for the spin-one CSC.
△ Less
Submitted 14 September, 2011;
originally announced September 2011.
-
A Study of the PDGF Signaling Pathway with PRISM
Authors:
Qixia Yuan,
Jun Pang,
Sjouke Mauw,
Panuwat Trairatphisan,
Monique Wiesinger,
Thomas Sauter
Abstract:
In this paper, we apply the probabilistic model checker PRISM to the analysis of a biological system -- the Platelet-Derived Growth Factor (PDGF) signaling pathway, demonstrating in detail how this pathway can be analyzed in PRISM. We show that quantitative verification can yield a better understanding of the PDGF signaling pathway.
In this paper, we apply the probabilistic model checker PRISM to the analysis of a biological system -- the Platelet-Derived Growth Factor (PDGF) signaling pathway, demonstrating in detail how this pathway can be analyzed in PRISM. We show that quantitative verification can yield a better understanding of the PDGF signaling pathway.
△ Less
Submitted 7 September, 2011;
originally announced September 2011.
-
A Group Signature Based Electronic Toll Pricing System
Authors:
Xihui Chen,
Gabriele Lenzini,
Sjouke Mauw,
Jun Pang
Abstract:
With the prevalence and development of GNSS technologies, location-based vehicle services (LBVS) have experienced a rapid growth in recent years. However, location is a sensitive and private piece of information, so the design and development of such services just take the clients' privacy concerns into account. In this paper, we propose a new electronic toll pricing system based on group signatur…
▽ More
With the prevalence and development of GNSS technologies, location-based vehicle services (LBVS) have experienced a rapid growth in recent years. However, location is a sensitive and private piece of information, so the design and development of such services just take the clients' privacy concerns into account. In this paper, we propose a new electronic toll pricing system based on group signatures, which provides a strong guarantee for the clients' anonymity within groups. Our system achieves a balance between privacy and the communication overhead imposed upon the users.
△ Less
Submitted 3 September, 2011; v1 submitted 2 August, 2011;
originally announced August 2011.
-
Finding saddle points of mountain pass type with quadratic models on affine spaces
Authors:
C. H. Jeffrey Pang
Abstract:
The problem of computing saddle points is important in certain problems in numerical partial differential equations and computational chemistry, and is often solved numerically by a minimization problem over a set of mountain passes. We propose an algorithm to find saddle points of mountain pass type to find the bottlenecks of optimal mountain passes. The key step is to minimize the distance betwe…
▽ More
The problem of computing saddle points is important in certain problems in numerical partial differential equations and computational chemistry, and is often solved numerically by a minimization problem over a set of mountain passes. We propose an algorithm to find saddle points of mountain pass type to find the bottlenecks of optimal mountain passes. The key step is to minimize the distance between level sets by using quadratic models on affine spaces similar to the strategy in the conjugate gradient algorithm. We discuss parameter choices, convergence results, and how to augment the algorithm to a path based method. Finally, we perform numerical experiments to test the convergence of our algorithm.
△ Less
Submitted 19 November, 2012; v1 submitted 21 July, 2011;
originally announced July 2011.
-
Towards New Membrane Flow from de Wit-Nicolai Construction
Authors:
Changhyun Ahn,
**sub Paeng,
Kyungsung Woo
Abstract:
The internal 4-form field strengths with 7-dimensional indices have been constructed by de Wit and Nicolai in 1986. They are determined by the following six quantities: the 56-bein of 4-dimensional N=8 gauged supergravity, the Killing vectors on the round seven-sphere, the covariant derivative acting on these Killing vectors, the warp factor, the field strengths with 4-dimensional indices and the…
▽ More
The internal 4-form field strengths with 7-dimensional indices have been constructed by de Wit and Nicolai in 1986. They are determined by the following six quantities: the 56-bein of 4-dimensional N=8 gauged supergravity, the Killing vectors on the round seven-sphere, the covariant derivative acting on these Killing vectors, the warp factor, the field strengths with 4-dimensional indices and the 7-dimensional metric.
In this paper, by projecting out the remaining mixed 4-form field strengths in an SU(8) tensor that appears in the variation of spin 1/2 fermionic sector, we also write down them explicitly in terms of some of the above quantities. For the known critical points, the N=8 SO(8) point and the nonsupersymmetric SO(7)^{+} point, we reproduce the corresponding 11-dimensional uplifts by computing the full nonlinear expressions. Moreover, we find out the 11-dimensional lift of the nonsupersymmetric SO(7)^{+} invariant flow. We decode their implicit formula for the first time and the present work will provide how to obtain the new supersymmetric or nonsupersymmetric membrane flows in 11-dimensions.
△ Less
Submitted 15 March, 2012; v1 submitted 4 July, 2011;
originally announced July 2011.
-
Characterizing generalized derivatives of set-valued maps: Extending the tangential and normal approaches
Authors:
C. H. Jeffrey Pang
Abstract:
For a set-valued map, we characterize, in terms of its (unconvexified or convexified) graphical derivatives near the point of interest, positively homogeneous maps that are generalized derivatives in the sense of [20]. This result generalizes the Aubin criterion in [9]. A second characterization of these generalized derivatives is easier to check in practice, especially in the finite dimensional c…
▽ More
For a set-valued map, we characterize, in terms of its (unconvexified or convexified) graphical derivatives near the point of interest, positively homogeneous maps that are generalized derivatives in the sense of [20]. This result generalizes the Aubin criterion in [9]. A second characterization of these generalized derivatives is easier to check in practice, especially in the finite dimensional case. Finally, the third characterization in terms of limiting normal cones and coderivatives generalizes the Mordukhovich criterion in the finite dimensional case. The convexified coderivative has a bijective relationship with the set of possible generalized derivatives. We conclude by illustrating a few applications of our result.
△ Less
Submitted 19 November, 2012; v1 submitted 12 June, 2011;
originally announced June 2011.
-
An Algorithm for Probabilistic Alternating Simulation
Authors:
Chenyi Zhang,
Jun Pang
Abstract:
In probabilistic game structures, probabilistic alternating simulation (PA-simulation) relations preserve formulas defined in probabilistic alternating-time temporal logic with respect to the behaviour of a subset of players. We propose a partition based algorithm for computing the largest PA-simulation, which is to our knowledge the first such algorithm that works in polynomial time, by extending…
▽ More
In probabilistic game structures, probabilistic alternating simulation (PA-simulation) relations preserve formulas defined in probabilistic alternating-time temporal logic with respect to the behaviour of a subset of players. We propose a partition based algorithm for computing the largest PA-simulation, which is to our knowledge the first such algorithm that works in polynomial time, by extending the generalised coarsest partition problem (GCPP) in a game-based setting with mixed strategies. The algorithm has higher complexities than those in the literature for non-probabilistic simulation and probabilistic simulation without mixed actions, but slightly improves the existing result for computing probabilistic simulation with respect to mixed actions.
△ Less
Submitted 8 June, 2012; v1 submitted 10 June, 2011;
originally announced June 2011.
-
Spin-one color superconductors: collective modes and effective Lagrangian
Authors:
**-yi Pang,
Tomas Brauner,
Qun Wang
Abstract:
We investigate the collective excitations in spin-one color superconductors. We classify the Nambu--Goldstone modes by the pattern of spontaneous symmetry breaking, and then use the Ginzburg--Landau theory to derive their dispersion relations. These soft modes play an important role for the low-energy dynamics of the system such as the transport phenomena and hence are relevant for late-stage evol…
▽ More
We investigate the collective excitations in spin-one color superconductors. We classify the Nambu--Goldstone modes by the pattern of spontaneous symmetry breaking, and then use the Ginzburg--Landau theory to derive their dispersion relations. These soft modes play an important role for the low-energy dynamics of the system such as the transport phenomena and hence are relevant for late-stage evolution of neutron stars. In the case of the color-spin-locking phase, we use a functional technique to obtain the low-energy effective action for the physical Nambu--Goldstone bosons that survive after gauging the color symmetry.
△ Less
Submitted 10 October, 2010;
originally announced October 2010.
-
First order dependence on uncertainty sets in robust optimization
Authors:
C. H. Jeffrey Pang
Abstract:
We show that a first order problem can approximate solutions of a robust optimization problem when the uncertainty set is scaled, and explore further properties of this first order problem.
We show that a first order problem can approximate solutions of a robust optimization problem when the uncertainty set is scaled, and explore further properties of this first order problem.
△ Less
Submitted 9 June, 2010;
originally announced June 2010.
-
Asynchronous Bounded Expected Delay Networks
Authors:
Rena Bakhshi,
Jörg Endrullis,
Wan Fokkink,
Jun Pang
Abstract:
The commonly used asynchronous bounded delay (ABD) network models assume a fixed bound on message delay. We propose a probabilistic network model, called asynchronous bounded expected delay (ABE) model. Instead of a strict bound, the ABE model requires only a bound on the expected message delay. While the conditions of ABD networks restrict the set of possible executions, in ABE networks all async…
▽ More
The commonly used asynchronous bounded delay (ABD) network models assume a fixed bound on message delay. We propose a probabilistic network model, called asynchronous bounded expected delay (ABE) model. Instead of a strict bound, the ABE model requires only a bound on the expected message delay. While the conditions of ABD networks restrict the set of possible executions, in ABE networks all asynchronous executions are possible, but executions with extremely long delays are less probable. In contrast to ABD networks, ABE networks cannot be synchronised efficiently. At the example of an election algorithm, we show that the minimal assumptions of ABE networks are sufficient for the development of efficient algorithms. For anonymous, unidirectional ABE rings of known size N we devise a probabilistic leader election algorithm having average message and time complexity O(N).
△ Less
Submitted 7 June, 2011; v1 submitted 10 March, 2010;
originally announced March 2010.
-
On Probabilistic Alternating Simulations
Authors:
Chenyi Zhang,
Jun Pang
Abstract:
This paper presents simulation-based relations for probabilistic game structures. The first relation is called probabilistic alternating simulation, and the second called probabilistic alternating forward simulation, following the naming convention of Segala and Lynch. We study these relations with respect to the preservation of properties specified in probabilistic alternating-time temporal log…
▽ More
This paper presents simulation-based relations for probabilistic game structures. The first relation is called probabilistic alternating simulation, and the second called probabilistic alternating forward simulation, following the naming convention of Segala and Lynch. We study these relations with respect to the preservation of properties specified in probabilistic alternating-time temporal logic.
△ Less
Submitted 3 March, 2010;
originally announced March 2010.
-
Level set methods for finding saddle points of general Morse index
Authors:
C. H. Jeffrey Pang
Abstract:
For a real valued function, a point is critical if its derivatives are zero, and a critical point is a saddle point if it is not a local extrema. In this paper, we study algorithms to find saddle points of general Morse index. Our approach is motivated by the multidimensional mountain pass theorem, and extends our earlier work on methods (based on studying the level sets) to find saddle points o…
▽ More
For a real valued function, a point is critical if its derivatives are zero, and a critical point is a saddle point if it is not a local extrema. In this paper, we study algorithms to find saddle points of general Morse index. Our approach is motivated by the multidimensional mountain pass theorem, and extends our earlier work on methods (based on studying the level sets) to find saddle points of mountain pass type. We prove the convergence of our algorithms in the nonsmooth case, and the local superlinear convergence of another algorithm in the smooth finite dimensional case.
△ Less
Submitted 6 January, 2010;
originally announced January 2010.
-
How to Work with Honest but Curious Judges? (Preliminary Report)
Authors:
Jun Pang,
Chenyi Zhang
Abstract:
The three-judges protocol, recently advocated by Mclver and Morgan as an example of stepwise refinement of security protocols, studies how to securely compute the majority function to reach a final verdict without revealing each individual judge's decision. We extend their protocol in two different ways for an arbitrary number of 2n+1 judges. The first generalisation is inherently centralised, i…
▽ More
The three-judges protocol, recently advocated by Mclver and Morgan as an example of stepwise refinement of security protocols, studies how to securely compute the majority function to reach a final verdict without revealing each individual judge's decision. We extend their protocol in two different ways for an arbitrary number of 2n+1 judges. The first generalisation is inherently centralised, in the sense that it requires a judge as a leader who collects information from others, computes the majority function, and announces the final result. A different approach can be obtained by slightly modifying the well-known dining cryptographers protocol, however it reveals the number of votes rather than the final verdict. We define a notion of conditional anonymity in order to analyse these two solutions. Both of them have been checked in the model checker MCMAS.
△ Less
Submitted 21 October, 2009;
originally announced October 2009.
-
Symmetry breaking patterns and collective modes of spin-one color superconductors
Authors:
Tomas Brauner,
**-yi Pang,
Qun Wang
Abstract:
Spin-one color superconductor is a viable candidate phase of dense matter in the interiors of compact stars. Its low-energy excitations will influence the transport properties of such matter and thus have impact on late-stage evolution of neutron stars. It also provides a good example of spontaneous symmetry breaking with rich breaking patterns. In this contribution, we reanalyze the phase diagr…
▽ More
Spin-one color superconductor is a viable candidate phase of dense matter in the interiors of compact stars. Its low-energy excitations will influence the transport properties of such matter and thus have impact on late-stage evolution of neutron stars. It also provides a good example of spontaneous symmetry breaking with rich breaking patterns. In this contribution, we reanalyze the phase diagram of a spin-one color superconductor and point out that a part of it is occupied by noninert states, which have been neglected in literature so far. We classify the collective Nambu--Goldstone modes, which are essential to the transport phenomena.
△ Less
Submitted 23 September, 2009;
originally announced September 2009.
-
Generalized differentiation with positively homogeneous maps: Applications in set-valued analysis and metric regularity
Authors:
C. H. Jeffrey Pang
Abstract:
We propose a new concept of generalized differentiation of set-valued maps that captures the first order information. This concept encompasses the standard notions of Frechet differentiability, strict differentiability, calmness and Lipschitz continuity in single-valued maps, and the Aubin property and Lipschitz continuity in set-valued maps. We present calculus rules, sharpen the relationship bet…
▽ More
We propose a new concept of generalized differentiation of set-valued maps that captures the first order information. This concept encompasses the standard notions of Frechet differentiability, strict differentiability, calmness and Lipschitz continuity in single-valued maps, and the Aubin property and Lipschitz continuity in set-valued maps. We present calculus rules, sharpen the relationship between the Aubin property and coderivatives, and study how metric regularity and open covering can be refined to have a directional property similar to our concept of generalized differentiation. Finally, we discuss the relationship between the robust form of generalization differentiation and its one sided counterpart.
△ Less
Submitted 30 December, 2010; v1 submitted 31 July, 2009;
originally announced July 2009.
-
Level set methods for finding critical points of mountain pass type
Authors:
Adrian S. Lewis,
C. H. Jeffrey Pang
Abstract:
Computing mountain passes is a standard way of finding critical points. We describe a numerical method for finding critical points that is convergent in the nonsmooth case and locally superlinearly convergent in the smooth finite dimensional case. We apply these techniques to describe a strategy for the Wilkinson problem of calculating the distance of a matrix to a closest matrix with repeated eig…
▽ More
Computing mountain passes is a standard way of finding critical points. We describe a numerical method for finding critical points that is convergent in the nonsmooth case and locally superlinearly convergent in the smooth finite dimensional case. We apply these techniques to describe a strategy for the Wilkinson problem of calculating the distance of a matrix to a closest matrix with repeated eigenvalues. Finally, we relate critical points of mountain pass type to nonsmooth and metric critical point theory.
△ Less
Submitted 20 June, 2010; v1 submitted 24 June, 2009;
originally announced June 2009.
-
Continuity of set-valued maps revisited in the light of tame geometry
Authors:
Aris Daniilidis,
C. H. Jeffrey Pang
Abstract:
Continuity of set-valued maps is hereby revisited: after recalling some basic concepts of variational analysis and a short description of the State-of-the-Art, we obtain as by-product two Sard type results concerning local minima of scalar and vector valued functions. Our main result though, is inscribed in the framework of tame geometry, stating that a closed-valued semialgebraic set-valued map…
▽ More
Continuity of set-valued maps is hereby revisited: after recalling some basic concepts of variational analysis and a short description of the State-of-the-Art, we obtain as by-product two Sard type results concerning local minima of scalar and vector valued functions. Our main result though, is inscribed in the framework of tame geometry, stating that a closed-valued semialgebraic set-valued map is almost everywhere continuous (in both topological and measure-theoretic sense). The result, depending on stratification techniques, holds true in a more general setting of o-minimal (or tame) set-valued maps. Some applications are briefly discussed at the end.
△ Less
Submitted 4 May, 2009;
originally announced May 2009.
-
Lipschitz behavior of the robust regularization
Authors:
Adrian S. Lewis,
C. H. Jeffrey Pang
Abstract:
To minimize or upper-bound the value of a function "robustly", we might instead minimize or upper-bound the "epsilon-robust regularization", defined as the map from a point to the maximum value of the function within an epsilon-radius. This regularization may be easy to compute: convex quadratics lead to semidefinite-representable regularizations, for example, and the spectral radius of a matrix…
▽ More
To minimize or upper-bound the value of a function "robustly", we might instead minimize or upper-bound the "epsilon-robust regularization", defined as the map from a point to the maximum value of the function within an epsilon-radius. This regularization may be easy to compute: convex quadratics lead to semidefinite-representable regularizations, for example, and the spectral radius of a matrix leads to pseudospectral computations. For favorable classes of functions, we show that the robust regularization is Lipschitz around any given point, for all small epsilon > 0, even if the original function is nonlipschitz (like the spectral radius). One such favorable class consists of the semi-algebraic functions. Such functions have graphs that are finite unions of sets defined by finitely-many polynomial inequalities, and are commonly encountered in applications.
△ Less
Submitted 1 October, 2008;
originally announced October 2008.
-
Distributed Power Allocation with Rate Constraints in Gaussian Parallel Interference Channels
Authors:
Jong-Shi Pang,
Gesualdo Scutari,
Francisco Facchinei,
Chaoxiong Wang
Abstract:
This paper considers the minimization of transmit power in Gaussian parallel interference channels, subject to a rate constraint for each user. To derive decentralized solutions that do not require any cooperation among the users, we formulate this power control problem as a (generalized) Nash equilibrium game. We obtain sufficient conditions that guarantee the existence and nonemptiness of the…
▽ More
This paper considers the minimization of transmit power in Gaussian parallel interference channels, subject to a rate constraint for each user. To derive decentralized solutions that do not require any cooperation among the users, we formulate this power control problem as a (generalized) Nash equilibrium game. We obtain sufficient conditions that guarantee the existence and nonemptiness of the solution set to our problem. Then, to compute the solutions of the game, we propose two distributed algorithms based on the single user waterfilling solution: The \emph{sequential} and the \emph{simultaneous} iterative waterfilling algorithms, wherein the users update their own strategies sequentially and simultaneously, respectively. We derive a unified set of sufficient conditions that guarantee the uniqueness of the solution and global convergence of both algorithms. Our results are applicable to all practical distributed multipoint-to-multipoint interference systems, either wired or wireless, where a quality of service in terms of information rate must be guaranteed for each link.
△ Less
Submitted 18 January, 2008; v1 submitted 28 February, 2007;
originally announced February 2007.
-
On the Global Minimization of the Value-at-Risk
Authors:
Jong-Shi Pang,
Sven Leyffer
Abstract:
In this paper, we consider the nonconvex minimization problem of the value-at-risk (VaR) that arises from financial risk analysis. By considering this problem as a special linear program with linear complementarity constraints (a bilevel linear program to be more precise), we develop upper and lower bounds for the minimum VaR and show how the combined bounding procedures can be used to compute t…
▽ More
In this paper, we consider the nonconvex minimization problem of the value-at-risk (VaR) that arises from financial risk analysis. By considering this problem as a special linear program with linear complementarity constraints (a bilevel linear program to be more precise), we develop upper and lower bounds for the minimum VaR and show how the combined bounding procedures can be used to compute the latter value to global optimality. A numerical example is provided to illustrate the methodology.
△ Less
Submitted 7 January, 2004;
originally announced January 2004.
-
Three-Dimensional SCFTs, Supersymmetric Domain Wall and Renormalization Group Flow
Authors:
Changhyun Ahn,
**sub Paeng
Abstract:
By analyzing SU(3)xU(1) invariant stationary point, studied earlier by Nicolai and Warner, of gauged N=8 supergravity, we find that the deformation of S^7 gives rise to nontrivial renormalization group flow in a three-dimensional boundary super conformal field theory from N=8, SO(8) invariant UV fixed point to N=2, SU(3)xU(1) invariant IR fixed point. By explicitly constructing 28-beins u, v fie…
▽ More
By analyzing SU(3)xU(1) invariant stationary point, studied earlier by Nicolai and Warner, of gauged N=8 supergravity, we find that the deformation of S^7 gives rise to nontrivial renormalization group flow in a three-dimensional boundary super conformal field theory from N=8, SO(8) invariant UV fixed point to N=2, SU(3)xU(1) invariant IR fixed point. By explicitly constructing 28-beins u, v fields, that are an element of fundamental 56-dimensional representation of E_7, in terms of scalar and pseudo-scalar fields of gauged N=8 supergravity, we get A_1, A_2 tensors. Then we identify one of the eigenvalues of A_1 tensor with ``superpotential'' of de Wit-Nicolai scalar potential and discuss four-dimensional supergravity description of renormalization group flow, i.e. the BPS domain wall solutions which are equivalent to vanishing of variation of spin 1/2, 3/2 fields in the supersymmetry preserving bosonic background of gauged N=8 supergravity. A numerical analysis of the steepest descent equations interpolating two critical points is given.
△ Less
Submitted 6 December, 2000; v1 submitted 8 August, 2000;
originally announced August 2000.