-
Analysis of the Geometric Structure of Neural Networks and Neural ODEs via Morse Functions
Authors:
Christian Kuehn,
Sara-Viola Kuntz
Abstract:
Besides classical feed-forward neural networks, also neural ordinary differential equations (neural ODEs) gained particular interest in recent years. Neural ODEs can be interpreted as an infinite depth limit of feed-forward or residual neural networks. We study the input-output dynamics of finite and infinite depth neural networks with scalar output. In the finite depth case, the input is a state…
▽ More
Besides classical feed-forward neural networks, also neural ordinary differential equations (neural ODEs) gained particular interest in recent years. Neural ODEs can be interpreted as an infinite depth limit of feed-forward or residual neural networks. We study the input-output dynamics of finite and infinite depth neural networks with scalar output. In the finite depth case, the input is a state associated to a finite number of nodes, which maps under multiple non-linear transformations to the state of one output node. In analogy, a neural ODE maps a linear transformation of the input to a linear transformation of its time-$T$ map. We show that depending on the specific structure of the network, the input-output map has different properties regarding the existence and regularity of critical points. These properties can be characterized via Morse functions, which are scalar functions, where every critical point is non-degenerate. We prove that critical points cannot exist, if the dimension of the hidden layer is monotonically decreasing or the dimension of the phase space is smaller or equal to the input dimension. In the case that critical points exist, we classify their regularity depending on the specific architecture of the network. We show that each critical point is non-degenerate, if for finite depth neural networks the underlying graph has no bottleneck, and if for neural ODEs, the linear transformations used have full rank. For each type of architecture, the proven properties are comparable in the finite and in the infinite depth case. The established theorems allow us to formulate results on universal embedding, i.e.\ on the exact representation of maps by neural networks and neural ODEs. Our dynamical systems viewpoint on the geometric structure of the input-output map provides a fundamental understanding, why certain architectures perform better than others.
△ Less
Submitted 15 May, 2024;
originally announced May 2024.
-
Enabling Acoustic Audience Feedback in Large Virtual Events
Authors:
Tamay Aykut,
Markus Hofbauer,
Christopher Kuhn,
Eckehard Steinbach,
Bernd Girod
Abstract:
The COVID-19 pandemic shifted many events in our daily lives into the virtual domain. While virtual conference systems provide an alternative to physical meetings, larger events require a muted audience to avoid an accumulation of background noise and distorted audio. However, performing artists strongly rely on the feedback of their audience. We propose a concept for a virtual audience framework…
▽ More
The COVID-19 pandemic shifted many events in our daily lives into the virtual domain. While virtual conference systems provide an alternative to physical meetings, larger events require a muted audience to avoid an accumulation of background noise and distorted audio. However, performing artists strongly rely on the feedback of their audience. We propose a concept for a virtual audience framework which supports all participants with the ambience of a real audience. Audience feedback is collected locally, allowing users to express enthusiasm or discontent by selecting means such as clap**, whistling, booing, and laughter. This feedback is sent as abstract information to a virtual audience server. We broadcast the combined virtual audience feedback information to all participants, which can be synthesized as a single acoustic feedback by the client. The synthesis can be done by turning the collective audience feedback into a prompt that is fed to state-of-the-art models such as AudioGen. This way, each user hears a single acoustic feedback sound of the entire virtual event, without requiring to unmute or risk hearing distorted, unsynchronized feedback.
△ Less
Submitted 27 October, 2023;
originally announced October 2023.
-
Embedding Capabilities of Neural ODEs
Authors:
Christian Kuehn,
Sara-Viola Kuntz
Abstract:
A class of neural networks that gained particular interest in the last years are neural ordinary differential equations (neural ODEs). We study input-output relations of neural ODEs using dynamical systems theory and prove several results about the exact embedding of maps in different neural ODE architectures in low and high dimension. The embedding capability of a neural ODE architecture can be i…
▽ More
A class of neural networks that gained particular interest in the last years are neural ordinary differential equations (neural ODEs). We study input-output relations of neural ODEs using dynamical systems theory and prove several results about the exact embedding of maps in different neural ODE architectures in low and high dimension. The embedding capability of a neural ODE architecture can be increased by adding, for example, a linear layer, or augmenting the phase space. Yet, there is currently no systematic theory available and our work contributes towards this goal by develo** various embedding results as well as identifying situations, where no embedding is possible. The mathematical techniques used include as main components iterative functional equations, Morse functions and suspension flows, as well as several further ideas from analysis. Although practically, mainly universal approximation theorems are used, our geometric dynamical systems viewpoint on universal embedding provides a fundamental understanding, why certain neural ODE architectures perform better than others.
△ Less
Submitted 28 September, 2023; v1 submitted 2 August, 2023;
originally announced August 2023.
-
Panini -- Anonymous Anycast and an Instantiation
Authors:
Christoph Coijanovic,
Christiane Kuhn,
Thorsten Strufe
Abstract:
Anycast messaging (i.e., sending a message to an unspecified receiver) has long been neglected by the anonymous communication community. An anonymous anycast prevents senders from learning who the receiver of their message is, allowing for greater privacy in areas such as political activism and whistleblowing. While there have been some protocol ideas proposed, formal treatment of the problem is a…
▽ More
Anycast messaging (i.e., sending a message to an unspecified receiver) has long been neglected by the anonymous communication community. An anonymous anycast prevents senders from learning who the receiver of their message is, allowing for greater privacy in areas such as political activism and whistleblowing. While there have been some protocol ideas proposed, formal treatment of the problem is absent. Formal definitions of what constitutes anonymous anycast and privacy in this context are however a requirement for constructing protocols with provable guarantees. In this work, we define the anycast functionality and use a game-based approach to formalize its privacy and security goals. We further propose Panini, the first anonymous anycast protocol that only requires readily available infrastructure. We show that Panini allows the actual receiver of the anycast message to remain anonymous, even in the presence of an honest but curious sender. In an empirical evaluation, we find that Panini adds only minimal overhead over regular unicast: Sending a message anonymously to one of eight possible receivers results in an end-to-end latency of 0.76s.
△ Less
Submitted 26 September, 2023; v1 submitted 26 May, 2023;
originally announced May 2023.
-
Persistent synchronization of heterogeneous networks with time-dependent linear diffusive coupling
Authors:
Hildeberto Jardón-Kojakhmetov,
Christian Kuehn,
Iacopo P. Longo
Abstract:
We study synchronization for linearly coupled temporal networks of heterogeneous time-dependent nonlinear agents via the convergence of attracting trajectories of each node. The results are obtained by constructing and studying the stability of a suitable linear nonautonomous problem bounding the evolution of the synchronization errors. Both, the case of the entire network and only a cluster, are…
▽ More
We study synchronization for linearly coupled temporal networks of heterogeneous time-dependent nonlinear agents via the convergence of attracting trajectories of each node. The results are obtained by constructing and studying the stability of a suitable linear nonautonomous problem bounding the evolution of the synchronization errors. Both, the case of the entire network and only a cluster, are addressed and the persistence of the obtained synchronization against perturbation is also discussed. Furthermore, a sufficient condition for the existence of attracting trajectories of each node is given. In all cases, the considered dependence on time requires only local integrability, which is a very mild regularity assumption. Moreover, our results mainly depend on the network structure and its properties, and achieve synchronization up to a constant in finite time. Hence they are quite suitable for applications. The applicability of the results is showcased via several examples: coupled van-der-Pol/FitzHugh-Nagumo oscillators, weighted/signed opinion dynamics, and coupled Lorenz systems.
△ Less
Submitted 9 May, 2023;
originally announced May 2023.
-
Large-Scale Collaborative Writing: Technical Challenges and Recommendations
Authors:
Markus Hofbauer,
Christoph Bachhuber,
Christopher Kuhn,
Sebastian Schwarz,
Bart Kroon,
Eckehard Steinbach
Abstract:
Collaborative writing is essential for teams that create documents together. Creating documents in large-scale collaborations is a challenging task that requires an efficient workflow. The design of such a workflow has received comparatively little attention. Conventional solutions such as working on a single Microsoft Word document or a shared online document are still widely used. In this paper,…
▽ More
Collaborative writing is essential for teams that create documents together. Creating documents in large-scale collaborations is a challenging task that requires an efficient workflow. The design of such a workflow has received comparatively little attention. Conventional solutions such as working on a single Microsoft Word document or a shared online document are still widely used. In this paper, we propose a new workflow consisting of a combination of the lightweight markup language AsciiDoc together with the state-of-the-art version control system Git. The proposed process makes use of well-established workflows in the field of software development that have grown over decades. We present a detailed comparison of the proposed markup + Git workflow to Word and Word for the Web as the most prominent examples for conventional approaches.We argue that the proposed approach provides significant benefits regarding scalability, flexibility, and structuring of most collaborative writing tasks, both in academia and industry.
△ Less
Submitted 17 March, 2023;
originally announced March 2023.
-
Dynamic Simplex: Balancing Safety and Performance in Autonomous Cyber Physical Systems
Authors:
Baiting Luo,
Shreyas Ramakrishna,
Ava Pettet,
Christopher Kuhn,
Gabor Karsai,
Ayan Mukhopadhyay
Abstract:
Learning Enabled Components (LEC) have greatly assisted cyber-physical systems in achieving higher levels of autonomy. However, LEC's susceptibility to dynamic and uncertain operating conditions is a critical challenge for the safety of these systems. Redundant controller architectures have been widely adopted for safety assurance in such contexts. These architectures augment LEC "performant" cont…
▽ More
Learning Enabled Components (LEC) have greatly assisted cyber-physical systems in achieving higher levels of autonomy. However, LEC's susceptibility to dynamic and uncertain operating conditions is a critical challenge for the safety of these systems. Redundant controller architectures have been widely adopted for safety assurance in such contexts. These architectures augment LEC "performant" controllers that are difficult to verify with "safety" controllers and the decision logic to switch between them. While these architectures ensure safety, we point out two limitations. First, they are trained offline to learn a conservative policy of always selecting a controller that maintains the system's safety, which limits the system's adaptability to dynamic and non-stationary environments. Second, they do not support reverse switching from the safety controller to the performant controller, even when the threat to safety is no longer present. To address these limitations, we propose a dynamic simplex strategy with an online controller switching logic that allows two-way switching. We consider switching as a sequential decision-making problem and model it as a semi-Markov decision process. We leverage a combination of a myopic selector using surrogate models (for the forward switch) and a non-myopic planner (for the reverse switch) to balance safety and performance. We evaluate this approach using an autonomous vehicle case study in the CARLA simulator using different driving conditions, locations, and component failures. We show that the proposed approach results in fewer collisions and higher performance than state-of-the-art alternatives.
△ Less
Submitted 19 February, 2023;
originally announced February 2023.
-
ANTI-CARLA: An Adversarial Testing Framework for Autonomous Vehicles in CARLA
Authors:
Shreyas Ramakrishna,
Baiting Luo,
Christopher Kuhn,
Gabor Karsai,
Abhishek Dubey
Abstract:
Despite recent advances in autonomous driving systems, accidents such as the fatal Uber crash in 2018 show these systems are still susceptible to edge cases. Such systems must be thoroughly tested and validated before being deployed in the real world to avoid such events. Testing in open-world scenarios can be difficult, time-consuming, and expensive. These challenges can be addressed by using dri…
▽ More
Despite recent advances in autonomous driving systems, accidents such as the fatal Uber crash in 2018 show these systems are still susceptible to edge cases. Such systems must be thoroughly tested and validated before being deployed in the real world to avoid such events. Testing in open-world scenarios can be difficult, time-consuming, and expensive. These challenges can be addressed by using driving simulators such as CARLA instead. A key part of such tests is adversarial testing, in which the goal is to find scenarios that lead to failures of the given system. While several independent efforts in testing have been made, a well-established testing framework that enables adversarial testing has yet to be made available for CARLA. We therefore propose ANTI-CARLA, an automated testing framework in CARLA for simulating adversarial weather conditions (e.g., heavy rain) and sensor faults (e.g., camera occlusion) that fail the system. The operating conditions in which a given system should be tested are specified in a scenario description language. The framework offers an efficient search mechanism that searches for adversarial operating conditions that will fail the tested system. In this way, ANTI-CARLA extends the CARLA simulator with the capability of performing adversarial testing on any given driving pipeline. We use ANTI-CARLA to test the driving pipeline trained with Learning By Cheating (LBC) approach. The simulation results demonstrate that ANTI-CARLA can effectively and automatically find a range of failure cases despite LBC reaching an accuracy of 100% in the CARLA benchmark.
△ Less
Submitted 18 July, 2022;
originally announced August 2022.
-
The Danger of Small Anonymity Sets in Privacy-Preserving Payment Systems
Authors:
Christiane Kuhn,
Aniket Kate,
Thorsten Strufe
Abstract:
Unlike suggested during their early years of existence, Bitcoin and similar cryptocurrencies in fact offer significantly less privacy as compared to traditional banking. A myriad of privacy-enhancing extensions to those cryptocurrencies as well as several clean-slate privacy-protecting cryptocurrencies have been proposed in turn. To convey a better understanding of the protection of popular design…
▽ More
Unlike suggested during their early years of existence, Bitcoin and similar cryptocurrencies in fact offer significantly less privacy as compared to traditional banking. A myriad of privacy-enhancing extensions to those cryptocurrencies as well as several clean-slate privacy-protecting cryptocurrencies have been proposed in turn. To convey a better understanding of the protection of popular design decisions, we investigate expected anonymity set sizes in an initial simulation study. The large variation of expected transaction values yields soberingly small effective anonymity sets for protocols that leak transaction values. We hence examine the effect of preliminary, intuitive strategies for merging groups of payments into larger anonymity sets, for instance by choosing from pre-specified value classes. The results hold promise, as they indeed induce larger anonymity sets at comparatively low cost, depending on the corresponding strategy
△ Less
Submitted 20 April, 2022;
originally announced April 2022.
-
SoK on Performance Bounds in Anonymous Communication
Authors:
Christiane Kuhn,
Friederike Kitzing,
Thorsten Strufe
Abstract:
Communicating anonymously comes at a cost - and large communities have been in a constant tug-of-war between the development of faster protocols, and the improvement of security analyses. Thereby more intricate privacy goals emerged and more detailed bounds on the minimum overhead necessary to achieve them were proven. The entanglement of requirements, scenarios, and protocols complicates analysis…
▽ More
Communicating anonymously comes at a cost - and large communities have been in a constant tug-of-war between the development of faster protocols, and the improvement of security analyses. Thereby more intricate privacy goals emerged and more detailed bounds on the minimum overhead necessary to achieve them were proven. The entanglement of requirements, scenarios, and protocols complicates analysis, and the published results are hardly comparable, due to deviating, yet specific choices of assumptions and goals (some explicit, most implicit). In this paper, we systematize the field by harmonizing the models, comparing the proven performance bounds, and contextualizing these theoretical results in a broad set of proposed and implemented systems. By identifying inaccuracies, we demonstrate that the attacks, on which the results are based, indeed break much weaker privacy goals than postulated, and tighten the bounds along the way. We further show the equivalence of two seemingly alternative bounds. Finally, we argue how several assumptions and requirements of the papers likely are of limited applicability in reality and suggest relaxations for future work.
△ Less
Submitted 17 November, 2020;
originally announced November 2020.
-
Covid Notions: Towards Formal Definitions -- and Documented Understanding -- of Privacy Goals and Claimed Protection in Proximity-Tracing Services
Authors:
Christiane Kuhn,
Martin Beck,
Thorsten Strufe
Abstract:
The recent SARS-CoV-2 pandemic gave rise to management approaches using mobile apps for contact tracing. The corresponding apps track individuals and their interactions, to facilitate alerting users of potential infections well before they become infectious themselves. Naive implementation obviously jeopardizes the privacy of health conditions, location, activities, and social interaction of its u…
▽ More
The recent SARS-CoV-2 pandemic gave rise to management approaches using mobile apps for contact tracing. The corresponding apps track individuals and their interactions, to facilitate alerting users of potential infections well before they become infectious themselves. Naive implementation obviously jeopardizes the privacy of health conditions, location, activities, and social interaction of its users. A number of protocol designs for colocation tracking have already been developed, most of which claim to function in a privacy preserving manner. However, despite claims such as "GDPR compliance", "anonymity", "pseudonymity" or other forms of "privacy", the authors of these designs usually neglect to precisely define what they (aim to) protect. We make a first step towards formally defining the privacy notions of proximity tracing services, especially with regards to the health, (co-)location, and social interaction of their users. We also give a high-level intuition of which protection the most prominent proposals can and cannot achieve. This initial overview indicates that all proposals include some centralized services, and none protects identity and (co-)locations of infected users perfectly from both other users and the service provider.
△ Less
Submitted 16 April, 2020;
originally announced April 2020.
-
Predicting sparse circle maps from their dynamics
Authors:
Felix Krahmer,
Christian Kühn,
Nada Sissouno
Abstract:
The problem of identifying a dynamical system from its dynamics is of great importance for many applications. Recently it has been suggested to impose sparsity models for improved recovery performance. In this paper, we provide recovery guarantees for such a scenario. More precisely, we show that ergodic systems on the circle described by sparse trigonometric polynomials can be recovered from a nu…
▽ More
The problem of identifying a dynamical system from its dynamics is of great importance for many applications. Recently it has been suggested to impose sparsity models for improved recovery performance. In this paper, we provide recovery guarantees for such a scenario. More precisely, we show that ergodic systems on the circle described by sparse trigonometric polynomials can be recovered from a number of samples scaling near-linearly in the sparsity.
△ Less
Submitted 9 January, 2020; v1 submitted 14 November, 2019;
originally announced November 2019.
-
Breaking and (Partially) Fixing Provably Secure Onion Routing
Authors:
Christiane Kuhn,
Martin Beck,
Thorsten Strufe
Abstract:
After several years of research on onion routing, Camenisch and Lysyanskaya, in an attempt at rigorous analysis, defined an ideal functionality in the universal composability model, together with properties that protocols have to meet to achieve provable security. A whole family of systems based their security proofs on this work. However, analyzing HORNET and Sphinx, two instances from this famil…
▽ More
After several years of research on onion routing, Camenisch and Lysyanskaya, in an attempt at rigorous analysis, defined an ideal functionality in the universal composability model, together with properties that protocols have to meet to achieve provable security. A whole family of systems based their security proofs on this work. However, analyzing HORNET and Sphinx, two instances from this family, we show that this proof strategy is broken. We discover a previously unknown vulnerability that breaks anonymity completely, and explain a known one. Both should not exist if privacy is proven correctly. In this work, we analyze and fix the proof strategy used for this family of systems. After proving the efficacy of the ideal functionality, we show how the original properties are flawed and suggest improved, effective properties in their place. Finally, we discover another common mistake in the proofs. We demonstrate how to avoid it by showing our improved properties for one protocol, thus partially fixing the family of provably secure onion routing protocols.
△ Less
Submitted 30 October, 2019;
originally announced October 2019.
-
On Privacy Notions in Anonymous Communication
Authors:
Christiane Kuhn,
Martin Beck,
Stefan Schiffner,
Eduard Jorswieck,
Thorsten Strufe
Abstract:
Many anonymous communication networks (ACNs) with different privacy goals have been developed. However, there are no accepted formal definitions of privacy and ACNs often define their goals and adversary models ad hoc. However, for the understanding and comparison of different flavors of privacy, a common foundation is needed. In this paper, we introduce an analysis framework for ACNs that capture…
▽ More
Many anonymous communication networks (ACNs) with different privacy goals have been developed. However, there are no accepted formal definitions of privacy and ACNs often define their goals and adversary models ad hoc. However, for the understanding and comparison of different flavors of privacy, a common foundation is needed. In this paper, we introduce an analysis framework for ACNs that captures the notions and assumptions known from different analysis frameworks. Therefore, we formalize privacy goals as notions and identify their building blocks. For any pair of notions we prove whether one is strictly stronger, and, if so, which. Hence, we are able to present a complete hierarchy. Further, we show how to add practical assumptions, e.g. regarding the protocol model or user corruption as options to our notions. This way, we capture the notions and assumptions of, to the best of our knowledge, all existing analytical frameworks for ACNs and are able to revise inconsistencies between them. Thus, our new framework builds a common ground and allows for sharper analysis, since new combinations of assumptions are possible and the relations between the notions are known.
△ Less
Submitted 16 January, 2019; v1 submitted 13 December, 2018;
originally announced December 2018.
-
Efficient Gluing of Numerical Continuation and a Multiple Solution Method for Elliptic PDEs
Authors:
Christian Kuehn
Abstract:
Numerical continuation calculations for ordinary differential equations (ODEs) are, by now, an established tool for bifurcation analysis in dynamical systems theory as well as across almost all natural and engineering sciences. Although several excellent standard software packages are available for ODEs, there are - for good reasons - no standard numerical continuation toolboxes available for part…
▽ More
Numerical continuation calculations for ordinary differential equations (ODEs) are, by now, an established tool for bifurcation analysis in dynamical systems theory as well as across almost all natural and engineering sciences. Although several excellent standard software packages are available for ODEs, there are - for good reasons - no standard numerical continuation toolboxes available for partial differential equations (PDEs), which cover a broad range of different classes of PDEs automatically. A natural approach to this problem is to look for efficient gluing computation approaches, with independent components developed by researchers in numerical analysis, dynamical systems, scientific computing and mathematical modelling. In this paper, we shall study several elliptic PDEs (Lane-Emden-Fowler, Lane-Emden-Fowler with microscopic force, Caginalp) via the numerical continuation software pde2path and develop a gluing component to determine a set of starting solutions for the continuation by exploting the variational structures of the PDEs. In particular, we solve the initialization problem of numerical continuation for PDEs via a minimax algorithm to find multiple unstable solution. Furthermore, for the Caginalp system, we illustrate the efficient gluing link of pde2path to the underlying mesh generation and the FEM MatLab pdetoolbox. Even though the approach works efficiently due to the high-level programming language and without develo** any new algorithms, we still obtain interesting bifurcation diagrams and directly applicable conclusions about the three elliptic PDEs we study, in particular with respect to symmetry-breaking. In particular, we show for a modified Lane-Emden-Fowler equation with an asymmetric microscopic force, how a fully connected bifurcation diagram splits up into C-shaped isolas on which localized pattern deformation appears towards two different regimes.
△ Less
Submitted 18 October, 2014; v1 submitted 26 June, 2014;
originally announced June 2014.
-
Critical Transitions in Social Network Activity
Authors:
Christian Kuehn,
Erik A. Martens,
Daniel Romero
Abstract:
A large variety of complex systems in ecology, climate science, biomedicine and engineering have been observed to exhibit tip** points, where the internal dynamical state of the system abruptly changes. For example, such critical transitions may result in the sudden change of ecological environments and climate conditions. Data and models suggest that detectable warning signs may precede some of…
▽ More
A large variety of complex systems in ecology, climate science, biomedicine and engineering have been observed to exhibit tip** points, where the internal dynamical state of the system abruptly changes. For example, such critical transitions may result in the sudden change of ecological environments and climate conditions. Data and models suggest that detectable warning signs may precede some of these drastic events. This view is also corroborated by abstract mathematical theory for generic bifurcations in stochastic multi-scale systems. Whether the stochastic scaling laws used as warning signs are also present in social networks that anticipate a-priori {\it unknown} events in society is an exciting open problem, to which at present only highly speculative answers can be given. Here, we instead provide a first step towards tackling this formidable question by focusing on a-priori {\it known} events and analyzing a social network data set with a focus on classical variance and autocorrelation warning signs. Our results thus pertain to one absolutely fundamental question: Can the stochastic warning signs known from other areas also be detected in large-scale social network data? We answer this question affirmatively as we find that several a-priori known events are preceded by variance and autocorrelation growth. Our findings thus clearly establish the necessary starting point to further investigate the relation between abstract mathematical theory and various classes of critical transitions in social networks.
△ Less
Submitted 13 November, 2013; v1 submitted 31 July, 2013;
originally announced July 2013.
-
Complex Eigenvalues for Binary Subdivision Schemes
Authors:
Christian Kuehn
Abstract:
Convergence properties of binary stationary subdivision schemes for curves have been analyzed using the techniques of z-transforms and eigenanalysis. Eigenanalysis provides a way to determine derivative continuity at specific points based on the eigenvalues of a finite matrix. None of the well-known subdivision schemes for curves have complex eigenvalues. We prove when a convergent scheme with p…
▽ More
Convergence properties of binary stationary subdivision schemes for curves have been analyzed using the techniques of z-transforms and eigenanalysis. Eigenanalysis provides a way to determine derivative continuity at specific points based on the eigenvalues of a finite matrix. None of the well-known subdivision schemes for curves have complex eigenvalues. We prove when a convergent scheme with palindromic mask can have complex eigenvalues and that a lower limit for the size of the mask exists in this case. We find a scheme with complex eigenvalues achieving this lower bound. Furthermore we investigate this scheme numerically and explain from a geometric viewpoint why such a scheme has not yet been used in computer-aided geometric design.
△ Less
Submitted 21 January, 2008;
originally announced January 2008.