-
Products of $p$-Adic Valuation Trees
Authors:
Dillon Snyder
Abstract:
The study of prime divisibility plays a crucial role in number theory. The $p$-adic valuation of a number is the highest power of a prime, $p$, that divides that number. Using this valuation, we construct $p$-adic valuation trees to visually represent the valuations of a sequence. We investigate how nodes split on trees generated by linear functions with rational coefficients, as well as those for…
▽ More
The study of prime divisibility plays a crucial role in number theory. The $p$-adic valuation of a number is the highest power of a prime, $p$, that divides that number. Using this valuation, we construct $p$-adic valuation trees to visually represent the valuations of a sequence. We investigate how nodes split on trees generated by linear functions with rational coefficients, as well as those formed from a product of linear or lower degree polynomials. We describe the infinite branches of these polynomial trees and the valuations of their terminating nodes.
△ Less
Submitted 22 August, 2023;
originally announced August 2023.
-
Generating Adversarial Disturbances for Controller Verification
Authors:
Udaya Ghai,
David Snyder,
Anirudha Majumdar,
Elad Hazan
Abstract:
We consider the problem of generating maximally adversarial disturbances for a given controller assuming only blackbox access to it. We propose an online learning approach to this problem that \emph{adaptively} generates disturbances based on control inputs chosen by the controller. The goal of the disturbance generator is to minimize \emph{regret} versus a benchmark disturbance-generating policy…
▽ More
We consider the problem of generating maximally adversarial disturbances for a given controller assuming only blackbox access to it. We propose an online learning approach to this problem that \emph{adaptively} generates disturbances based on control inputs chosen by the controller. The goal of the disturbance generator is to minimize \emph{regret} versus a benchmark disturbance-generating policy class, i.e., to maximize the cost incurred by the controller as well as possible compared to the best possible disturbance generator \emph{in hindsight} (chosen from a benchmark policy class). In the setting where the dynamics are linear and the costs are quadratic, we formulate our problem as an online trust region (OTR) problem with memory and present a new online learning algorithm (\emph{MOTR}) for this problem. We prove that this method competes with the best disturbance generator in hindsight (chosen from a rich class of benchmark policies that includes linear-dynamical disturbance generating policies). We demonstrate our approach on two simulated examples: (i) synthetically generated linear systems, and (ii) generating wind disturbances for the popular PX4 controller in the AirSim simulator. On these examples, we demonstrate that our approach outperforms several baseline approaches, including $H_{\infty}$ disturbance generation and gradient-based methods.
△ Less
Submitted 31 January, 2022; v1 submitted 11 December, 2020;
originally announced December 2020.
-
On the Relation of Schatten Norms and the Thompson Metric
Authors:
David A. Snyder
Abstract:
The Thompson metric provides key geometric insights in the study or non-linear matrix equations and in many optimization problems. However, knowing that an approximate solution is within d_T units of the actual solution in the Thompson metric provides little insight into how good the approximation is as a matrix or vector approximation. That is, bounding the Thompson metric between an approximate…
▽ More
The Thompson metric provides key geometric insights in the study or non-linear matrix equations and in many optimization problems. However, knowing that an approximate solution is within d_T units of the actual solution in the Thompson metric provides little insight into how good the approximation is as a matrix or vector approximation. That is, bounding the Thompson metric between an approximate and accurate solution to a problem does not provide obvious bounds either for the spectral or the Frobenius norm, both Schatten norms, of the difference between the approximation and accurate solution. This paper reports an upper bound on the Schatten norm of X - Y related to both the Thompson metric between X and Y and the maximum of their Schatten norms. This paper reports a similar but slightly tighter bound for the Frobenius norm of X - Y.
△ Less
Submitted 10 August, 2016;
originally announced August 2016.
-
Knots as processes: a new kind of invariant
Authors:
L. G. Meredith,
David F. Snyder
Abstract:
We exhibit an encoding of knots into processes in the π-calculus such that knots are ambient isotopic if and only their encodings are weakly bisimilar.
We exhibit an encoding of knots into processes in the π-calculus such that knots are ambient isotopic if and only their encodings are weakly bisimilar.
△ Less
Submitted 10 September, 2010;
originally announced September 2010.