-
Triangulated characterizations of singularities
Authors:
Pat Lank,
Sridhar Venkatesh
Abstract:
This work presents a range of triangulated characterizations for important classes of singularities such as derived splinters, rational singularities, and Du Bois singularities. An invariant called 'level' in a triangulated category can be used to measure the failure of a variety to have a prescribed singularity type. We provide explicit computations of this invariant for reduced Nagata schemes of…
▽ More
This work presents a range of triangulated characterizations for important classes of singularities such as derived splinters, rational singularities, and Du Bois singularities. An invariant called 'level' in a triangulated category can be used to measure the failure of a variety to have a prescribed singularity type. We provide explicit computations of this invariant for reduced Nagata schemes of Krull dimension one and for affine cones over smooth projective hypersurfaces. Furthermore, these computations are utilized to produce upper bounds for Rouquier dimension on the respective bounded derived categories.
△ Less
Submitted 10 May, 2024; v1 submitted 7 May, 2024;
originally announced May 2024.
-
The intersection cohomology Hodge module of toric varieties
Authors:
Hyunsuk Kim,
Sridhar Venkatesh
Abstract:
We study the Hodge filtration of the intersection cohomology Hodge module for toric varieties. More precisely, we study the cohomology sheaves of the graded de Rham complex of the intersection cohomology Hodge module and give a precise formula relating it with the stalks of the intersection cohomology as a constructible complex. The main idea is to use the Ishida complex in order to compute the hi…
▽ More
We study the Hodge filtration of the intersection cohomology Hodge module for toric varieties. More precisely, we study the cohomology sheaves of the graded de Rham complex of the intersection cohomology Hodge module and give a precise formula relating it with the stalks of the intersection cohomology as a constructible complex. The main idea is to use the Ishida complex in order to compute the higher direct images of the sheaf of reflexive differentials.
△ Less
Submitted 22 May, 2024; v1 submitted 6 April, 2024;
originally announced April 2024.
-
On Lengths of $\mathbb{F}_2[x,y,z]/(x^{d_1}, y^{d_2},z^{d_3}, x+y+z)$
Authors:
Fiona Han,
Jennifer Kenkel,
Daniel Li,
Sridhar Venkatesh,
Ashley Wiles
Abstract:
In this paper, we provide a formula for the vector space dimension of the ring $\mathbb{F}_2[x,y,z]/(x^{d_1}, y^{d_2},z^{d_3}, x+y+z)$ over $\mathbb{F}_2$ when $d_1,d_2,d_3$ all lie between successive powers of $2$. For general $d_1,d_2,d_3$, we provide a simple algorithm to calculate the vector space dimension of $\mathbb{F}_2[x,y,z]/(x^{d_1}, y^{d_2},z^{d_3}, x+y+z)$ by combining our formula wit…
▽ More
In this paper, we provide a formula for the vector space dimension of the ring $\mathbb{F}_2[x,y,z]/(x^{d_1}, y^{d_2},z^{d_3}, x+y+z)$ over $\mathbb{F}_2$ when $d_1,d_2,d_3$ all lie between successive powers of $2$. For general $d_1,d_2,d_3$, we provide a simple algorithm to calculate the vector space dimension of $\mathbb{F}_2[x,y,z]/(x^{d_1}, y^{d_2},z^{d_3}, x+y+z)$ by combining our formula with certain results of Chungsim Han (1992).
△ Less
Submitted 11 March, 2024; v1 submitted 28 June, 2023;
originally announced June 2023.
-
Local vanishing for toric varieties
Authors:
Wanchun Shen,
Sridhar Venkatesh,
Anh Duc Vo
Abstract:
Let $X$ be a toric variety. We establish vanishing (and non-vanishing) results for the sheaves $R^if_*Ω^p_{\tilde X}(\log E)$, where $f: \tilde{X} \to X$ is a strong log resolution of singularities with reduced exceptional divisor $E$. These extend the local vanishing theorem for toric varieties in [MOP20]. Our consideration of these sheaves is motivated by the notion of $k$-rational singularities…
▽ More
Let $X$ be a toric variety. We establish vanishing (and non-vanishing) results for the sheaves $R^if_*Ω^p_{\tilde X}(\log E)$, where $f: \tilde{X} \to X$ is a strong log resolution of singularities with reduced exceptional divisor $E$. These extend the local vanishing theorem for toric varieties in [MOP20]. Our consideration of these sheaves is motivated by the notion of $k$-rational singularities introduced by Friedman and Laza [FL22b]. In particular, our results lead to criteria for toric varieties to have $k$-rational singularities, as defined in [SVV23].
△ Less
Submitted 28 April, 2024; v1 submitted 16 June, 2023;
originally announced June 2023.
-
On $k$-Du Bois and $k$-rational singularities
Authors:
Wanchun Shen,
Sridhar Venkatesh,
Anh Duc Vo
Abstract:
We introduce new notions of $k$-Du Bois and $k$-rational singularities, extending the previous definitions in the case of local complete intersections (lci), to include natural examples outside of this setting. We study the stability of these notions under general hyperplane sections and show that varieties with $k$-rational singularities are $k$-Du Bois, extending previous results in [MP22b] and…
▽ More
We introduce new notions of $k$-Du Bois and $k$-rational singularities, extending the previous definitions in the case of local complete intersections (lci), to include natural examples outside of this setting. We study the stability of these notions under general hyperplane sections and show that varieties with $k$-rational singularities are $k$-Du Bois, extending previous results in [MP22b] and [FL22b] in the lci and the isolated singularities cases. In the process, we identify the aspects of the theory that depend only on the vanishing of higher cohomologies of Du Bois complexes (or related objects), and not on the behaviour of the Kähler differentials.
△ Less
Submitted 13 November, 2023; v1 submitted 6 June, 2023;
originally announced June 2023.
-
A Formal Power Series Approach to Multiplicative Dynamic Feedback Interconnection
Authors:
Kurusch Ebrahimi-Fard,
G. S. Venkatesh
Abstract:
The goal of the paper is multi-fold. First, an explicit formula is derived to compute the non-commutative generating series of a closed-loop system when a (multi-input, multi-output) plant, given in Chen--Fliess series description is in multiplicative output feedback interconnection with another system, also given as Chen--Fliess series. Furthermore, it is shown that the multiplicative dynamic out…
▽ More
The goal of the paper is multi-fold. First, an explicit formula is derived to compute the non-commutative generating series of a closed-loop system when a (multi-input, multi-output) plant, given in Chen--Fliess series description is in multiplicative output feedback interconnection with another system, also given as Chen--Fliess series. Furthermore, it is shown that the multiplicative dynamic output feedback connection has a natural interpretation as a transformation group acting on the plant. A computational framework for computing the generating series for multiplicative dynamic output feedback is devised utilizing the Hopf algebras of the coordinate functions corresponding to the shuffle group and the multiplicative feedback group. The pre--Lie algebra in multiplicative feedback is shown to be an example of Foissy's com-pre-Lie algebras indexed by matrices with certain structure.
△ Less
Submitted 23 October, 2023; v1 submitted 12 January, 2023;
originally announced January 2023.
-
Rabinowitz Fukaya categories and the categorical formal punctured neighborhood of infinity
Authors:
Sheel Ganatra,
Yuan Gao,
Sara Venkatesh
Abstract:
This paper constructs and studies the Rabinowitz (wrapped) Fukaya category, a categorical invariant of exact cylindrical Lagrangians in a Liouville manifold whose cohomological morphisms, ``Rabinowitz wrapped Floer homology groups" measure the failure of wrapped Floer cohomology to satisfy Poincare duality (and in particular vanish for any pair with at least one compact Lagrangian). Our main resul…
▽ More
This paper constructs and studies the Rabinowitz (wrapped) Fukaya category, a categorical invariant of exact cylindrical Lagrangians in a Liouville manifold whose cohomological morphisms, ``Rabinowitz wrapped Floer homology groups" measure the failure of wrapped Floer cohomology to satisfy Poincare duality (and in particular vanish for any pair with at least one compact Lagrangian). Our main result, answering a conjecture of Abouzaid, relates the Rabinowitz and usual wrapped Fukaya category by way of a general construction introduced by Efimov, the categorical formal punctured neighborhood of infinity. As an application, we show how Rabinowitz Fukaya categories can be fit into - and in particular often computed in terms of - mirror symmetry.
△ Less
Submitted 30 December, 2022;
originally announced December 2022.
-
A Formal Power Series Approach to Multiplicative Dynamic and Static Output Feedback
Authors:
G. S. Venkatesh
Abstract:
The goal of the paper is two-fold. The first of which is to derive an explicit formula to compute the generating series of a closed-loop system when a plant, given in a Chen-Fliess series description is in multiplicative output feedback connection with another system given in Chen-Fliess series description. Further, the objective extends in showing that the multiplicative dynamic output feedback c…
▽ More
The goal of the paper is two-fold. The first of which is to derive an explicit formula to compute the generating series of a closed-loop system when a plant, given in a Chen-Fliess series description is in multiplicative output feedback connection with another system given in Chen-Fliess series description. Further, the objective extends in showing that the multiplicative dynamic output feedback connection has a natural interpretation as a transformation group acting on the plant. The second of the two-part goal of this paper is same as the first part albeit when the Chen-Fliess series in the feedback is replaced by a memoryless map. The paper provides an explicit formula to compute the generating series of a closed-loop system in multiplicative static output feedback connection and shows that the static feedback has a natural interpretation as a transformation group acting on the plant.
△ Less
Submitted 17 July, 2022;
originally announced July 2022.
-
Regret Bounds for Expected Improvement Algorithms in Gaussian Process Bandit Optimization
Authors:
Hung Tran-The,
Sunil Gupta,
Santu Rana,
Svetha Venkatesh
Abstract:
The expected improvement (EI) algorithm is one of the most popular strategies for optimization under uncertainty due to its simplicity and efficiency. Despite its popularity, the theoretical aspects of this algorithm have not been properly analyzed. In particular, whether in the noisy setting, the EI strategy with a standard incumbent converges is still an open question of the Gaussian process ban…
▽ More
The expected improvement (EI) algorithm is one of the most popular strategies for optimization under uncertainty due to its simplicity and efficiency. Despite its popularity, the theoretical aspects of this algorithm have not been properly analyzed. In particular, whether in the noisy setting, the EI strategy with a standard incumbent converges is still an open question of the Gaussian process bandit optimization problem. We aim to answer this question by proposing a variant of EI with a standard incumbent defined via the GP predictive mean. We prove that our algorithm converges, and achieves a cumulative regret bound of $\mathcal O(γ_T\sqrt{T})$, where $γ_T$ is the maximum information gain between $T$ observations and the Gaussian process model. Based on this variant of EI, we further propose an algorithm called Improved GP-EI that converges faster than previous counterparts. In particular, our proposed variants of EI do not require the knowledge of the RKHS norm and the noise's sub-Gaussianity parameter as in previous works. Empirical validation in our paper demonstrates the effectiveness of our algorithms compared to several baselines.
△ Less
Submitted 15 March, 2022;
originally announced March 2022.
-
Representations of General Linear Groups in the Verlinde Category
Authors:
Siddharth Venkatesh
Abstract:
In this article, we construct affine group schemes $GL(X)$ where $X$ is any object in the Verlinde category in characteristic $p$ and classify their irreducible representations. We begin by showing that for a simple object $X$ of categorical dimension $i$, this representation category is semisimple and is equivalent to the connected component of the Verlinde category for $SL_{i}$. Subsequently, we…
▽ More
In this article, we construct affine group schemes $GL(X)$ where $X$ is any object in the Verlinde category in characteristic $p$ and classify their irreducible representations. We begin by showing that for a simple object $X$ of categorical dimension $i$, this representation category is semisimple and is equivalent to the connected component of the Verlinde category for $SL_{i}$. Subsequently, we use this along with a Verma module construction to classify irreducible representations of $GL(nL)$ for any simple object $L$ and any natural number $n$. Finally, parabolic induction allows us to classify irreducible representations of $GL(X)$ where $X$ is any object in the Verlinde Category.
△ Less
Submitted 7 March, 2022;
originally announced March 2022.
-
Periodic leaf-wise intersection points from Lagrangians
Authors:
Sara Venkatesh
Abstract:
We investigate leaf-wise intersection points on hypersurfaces of contact type in monotone symplectic manifolds. We show that monotone Floer-essential Lagrangians detect periodic leaf-wise intersection points in hypersurfaces of contact type whose Reeb flow is Zoll. Examples include the prequantization bundles appearing in monotone toric negative line bundles. Generalizing, we prove the existence o…
▽ More
We investigate leaf-wise intersection points on hypersurfaces of contact type in monotone symplectic manifolds. We show that monotone Floer-essential Lagrangians detect periodic leaf-wise intersection points in hypersurfaces of contact type whose Reeb flow is Zoll. Examples include the prequantization bundles appearing in monotone toric negative line bundles. Generalizing, we prove the existence of leaf-wise intersection points for certain annulus subbundles in weak+-monotone negative line bundles, not necessarily toric. The proofs combine reduced symplectic cohomology with the original methods employed by Albers-Frauenfelder to prove global existence results of this kind.
△ Less
Submitted 20 May, 2021;
originally announced May 2021.
-
The quantitative nature of reduced Floer theory
Authors:
Sara Venkatesh
Abstract:
We study the reduced symplectic cohomology of disk subbundles in negative symplectic line bundles. We show that this cohomology theory "sees" the spectrum of a quantum action on quantum cohomology. Precisely, quantum cohomology decomposes into generalized eigenspaces of the action of the first Chern class by quantum cup product. The reduced symplectic cohomology of a disk bundle of radius $R$ sees…
▽ More
We study the reduced symplectic cohomology of disk subbundles in negative symplectic line bundles. We show that this cohomology theory "sees" the spectrum of a quantum action on quantum cohomology. Precisely, quantum cohomology decomposes into generalized eigenspaces of the action of the first Chern class by quantum cup product. The reduced symplectic cohomology of a disk bundle of radius $R$ sees all eigenspaces whose eigenvalues have size less than $R$, up to rescaling by a fixed constant. Similarly, we show that the reduced symplectic cohomology of an annulus subbundle between radii $R_1$ and $R_2$ captures all eigenspaces whose eigenvalues have size between $R_1$ and $R_2$, up to a rescaling. We show how local closed-string mirror symmetry statements follow from these computations.
△ Less
Submitted 17 March, 2020;
originally announced March 2020.
-
Bayesian Optimization with Unknown Search Space
Authors:
Huong Ha,
Santu Rana,
Sunil Gupta,
Thanh Nguyen,
Hung Tran-The,
Svetha Venkatesh
Abstract:
Applying Bayesian optimization in problems wherein the search space is unknown is challenging. To address this problem, we propose a systematic volume expansion strategy for the Bayesian optimization. We devise a strategy to guarantee that in iterative expansions of the search space, our method can find a point whose function value within epsilon of the objective function maximum. Without the need…
▽ More
Applying Bayesian optimization in problems wherein the search space is unknown is challenging. To address this problem, we propose a systematic volume expansion strategy for the Bayesian optimization. We devise a strategy to guarantee that in iterative expansions of the search space, our method can find a point whose function value within epsilon of the objective function maximum. Without the need to specify any parameters, our algorithm automatically triggers a minimal expansion required iteratively. We derive analytic expressions for when to trigger the expansion and by how much to expand. We also provide theoretical analysis to show that our method achieves epsilon-accuracy after a finite number of iterations. We demonstrate our method on both benchmark test functions and machine learning hyper-parameter tuning tasks and demonstrate that our method outperforms baselines.
△ Less
Submitted 29 October, 2019;
originally announced October 2019.
-
Harish-Chandra pairs in the Verlinde category in positive characteristic
Authors:
Siddharth Venkatesh
Abstract:
In this article, we prove that the category of affine group schemes of finite type in the Verlinde category is equivalent to the category of Harish-Chandra pairs in the Verlinde category. Subsequently, we extend this equivalence to an equivalence between corresponding representation categories and then study some consequences of this equivalence to the representation theory of $GL(L)$, with $L$ a…
▽ More
In this article, we prove that the category of affine group schemes of finite type in the Verlinde category is equivalent to the category of Harish-Chandra pairs in the Verlinde category. Subsequently, we extend this equivalence to an equivalence between corresponding representation categories and then study some consequences of this equivalence to the representation theory of $GL(L)$, with $L$ a simple object in the Verlinde category.
△ Less
Submitted 7 March, 2022; v1 submitted 24 September, 2019;
originally announced September 2019.
-
Cost-aware Multi-objective Bayesian optimisation
Authors:
Majid Abdolshah,
Alistair Shilton,
Santu Rana,
Sunil Gupta,
Svetha Venkatesh
Abstract:
The notion of expense in Bayesian optimisation generally refers to the uniformly expensive cost of function evaluations over the whole search space. However, in some scenarios, the cost of evaluation for black-box objective functions is non-uniform since different inputs from search space may incur different costs for function evaluations. We introduce a cost-aware multi-objective Bayesian optimis…
▽ More
The notion of expense in Bayesian optimisation generally refers to the uniformly expensive cost of function evaluations over the whole search space. However, in some scenarios, the cost of evaluation for black-box objective functions is non-uniform since different inputs from search space may incur different costs for function evaluations. We introduce a cost-aware multi-objective Bayesian optimisation with non-uniform evaluation cost over objective functions by defining cost-aware constraints over the search space. The cost-aware constraints are a sorted tuple of indexes that demonstrate the ordering of dimensions of the search space based on the user's prior knowledge about their cost of usage. We formulate a new multi-objective Bayesian optimisation acquisition function with detailed analysis of the convergence that incorporates this cost-aware constraints while optimising the objective functions. We demonstrate our algorithm based on synthetic and real-world problems in hyperparameter tuning of neural networks and random forests.
△ Less
Submitted 8 September, 2019;
originally announced September 2019.
-
Rabinowitz Floer homology and mirror symmetry
Authors:
Sara Venkatesh
Abstract:
We define a quantitative invariant of Liouville cobordisms with monotone filling through an action-completed symplectic cohomology theory. We illustrate the non-trivial nature of this invariant by computing it for annulus subbundles of the tautological bundle over $\mathbb{C} P^1$ and give further conjectural computations based on mirror symmetry. We prove a non-vanishing result in the presence of…
▽ More
We define a quantitative invariant of Liouville cobordisms with monotone filling through an action-completed symplectic cohomology theory. We illustrate the non-trivial nature of this invariant by computing it for annulus subbundles of the tautological bundle over $\mathbb{C} P^1$ and give further conjectural computations based on mirror symmetry. We prove a non-vanishing result in the presence of Lagrangian submanifolds with non-vanishing Floer homology.
△ Less
Submitted 28 April, 2017;
originally announced May 2017.
-
Spread, then Target, and Advertise in Waves: Optimal Budget Allocation Across Advertising Channels
Authors:
Soheil Eshghi,
Victor M. Preciado,
Saswati Sarkar,
Santosh S. Venkatesh,
Qing Zhao,
Raissa D'Souza,
Ananthram Swami
Abstract:
We analyze optimal strategies for the allocation of a finite budget that can be invested in different advertising channels over time with the objective of influencing social opinions in a network of individuals. In our analysis, we consider both exogenous influence mechanisms, such as advertising campaigns, as well as endogenous mechanisms of social influence, such as word-of-mouth and peer-pressu…
▽ More
We analyze optimal strategies for the allocation of a finite budget that can be invested in different advertising channels over time with the objective of influencing social opinions in a network of individuals. In our analysis, we consider both exogenous influence mechanisms, such as advertising campaigns, as well as endogenous mechanisms of social influence, such as word-of-mouth and peer-pressure, which are modeled using diffusion dynamics.
We show that for a broad family of objective functions, the optimal influence strategy at every time uses all channels at either their maximum rate or not at all, i.e., a bang-bang strategy. Furthermore, we prove that the number of switches between these extremes is bounded above by a term that is typically much smaller than the number of agents. This means that the optimal influence strategy is to exert maximum effort in waves for every channel, and then cease effort and let the effects propagate. We also show that, at the beginning of the campaign, the total cost-adjusted reach of an exogenous advertising channel determines its relative value. In contrast, as we approach our investment horizon (e.g., election day), the optimal strategy is to invest in channels able to target individuals instead of broad-reaching channels. We demonstrate that the optimal influence strategies are easily computable in several practical cases, and explicitly characterize the optimal controls for the case of linear objective functions in closed form. Finally, we see that, in the canonical example of designing an election campaign, identifying late-deciders is a critical component in the optimal design.
△ Less
Submitted 23 July, 2018; v1 submitted 11 February, 2017;
originally announced February 2017.
-
Computations in symmetric fusion categories in characteristic p
Authors:
Pavel Etingof,
Victor Ostrik,
Siddharth Venkatesh
Abstract:
We study properties of symmetric fusion categories in characteristic $p$. In particular, we introduce the notion of a super Frobenius-Perron dimension of an object $X$ of such a category, and derive an explicit formula for the Verlinde fiber functor $F(X)$ of $X$ (defined by the second author) in terms of the usual and super Frobenius-Perron dimension of $X$. We also compute the decomposition of s…
▽ More
We study properties of symmetric fusion categories in characteristic $p$. In particular, we introduce the notion of a super Frobenius-Perron dimension of an object $X$ of such a category, and derive an explicit formula for the Verlinde fiber functor $F(X)$ of $X$ (defined by the second author) in terms of the usual and super Frobenius-Perron dimension of $X$. We also compute the decomposition of symmetric powers of objects of the Verlinde category, generalizing a classical formula of Cayley and Sylvester for invariants of binary forms. Finally, we show that the Verlinde fiber functor is unique, and classify braided fusion categories of rank two and triangular semisimple Hopf algebras in any characteristic.
△ Less
Submitted 6 February, 2016; v1 submitted 7 December, 2015;
originally announced December 2015.
-
Hilbert Basis Theorem and Finite Generation of Invariants in Symmetric Fusion Categories in Positive Characteristic
Authors:
Siddharth Venkatesh
Abstract:
In this paper, we conjecture an extension of the Hilbert basis theorem and the finite generation of invariants to commutative algebras in symmetric finite tensor categories over fields of positive characteristic. We prove the conjecture in the case of semisimple categories and more generally in the case of categories with fiber functors to the characteristic $p > 0$ Verlinde category of $SL_{2}$.…
▽ More
In this paper, we conjecture an extension of the Hilbert basis theorem and the finite generation of invariants to commutative algebras in symmetric finite tensor categories over fields of positive characteristic. We prove the conjecture in the case of semisimple categories and more generally in the case of categories with fiber functors to the characteristic $p > 0$ Verlinde category of $SL_{2}$. We also construct a symmetric finite tensor category $\sVec_{2}$ over fields of characteristic $2$ and show that it is a candidate for the category of supervector spaces in this characteristic. We further show that $\sVec_{2}$ does not fiber over the characteristic $2$ Verlinde category of $SL_{2}$ and then prove the conjecture for any category fibered over $\sVec_{2}$.
△ Less
Submitted 16 February, 2016; v1 submitted 17 July, 2015;
originally announced July 2015.
-
Visibility-Aware Optimal Contagion of Malware Epidemics
Authors:
Soheil Eshghi,
Saswati Sarkar,
Santosh S. Venkatesh
Abstract:
Recent innovations in the design of computer viruses have led to new trade-offs for the attacker. Multiple variants of a malware may spread at different rates and have different levels of visibility to the network. In this work we examine the optimal strategies for the attacker so as to trade off the extent of spread of the malware against the need for stealth. We show that in the mean-field deter…
▽ More
Recent innovations in the design of computer viruses have led to new trade-offs for the attacker. Multiple variants of a malware may spread at different rates and have different levels of visibility to the network. In this work we examine the optimal strategies for the attacker so as to trade off the extent of spread of the malware against the need for stealth. We show that in the mean-field deterministic regime, this spread-stealth trade-off is optimized by computationally simple single-threshold policies. Specifically, we show that only one variant of the malware is spread by the attacker at each time, as there exists a time up to which the attacker prioritizes maximizing the spread of the malware, and after which she prioritizes stealth.
△ Less
Submitted 30 October, 2016; v1 submitted 13 July, 2015;
originally announced July 2015.
-
Tree-based iterated local search for Markov random fields with applications in image analysis
Authors:
Truyen Tran,
Dinh Phung,
Svetha Venkatesh
Abstract:
The \emph{maximum a posteriori} (MAP) assignment for general structure Markov random fields (MRFs) is computationally intractable. In this paper, we exploit tree-based methods to efficiently address this problem. Our novel method, named Tree-based Iterated Local Search (T-ILS) takes advantage of the tractability of tree-structures embedded within MRFs to derive strong local search in an ILS framew…
▽ More
The \emph{maximum a posteriori} (MAP) assignment for general structure Markov random fields (MRFs) is computationally intractable. In this paper, we exploit tree-based methods to efficiently address this problem. Our novel method, named Tree-based Iterated Local Search (T-ILS) takes advantage of the tractability of tree-structures embedded within MRFs to derive strong local search in an ILS framework. The method efficiently explores exponentially large neighborhood and does so with limited memory without any requirement on the cost functions. We evaluate the T-ILS in a simulation of Ising model and two real-world problems in computer vision: stereo matching, image denoising. Experimental results demonstrate that our methods are competitive against state-of-the-art rivals with a significant computational gain.
△ Less
Submitted 22 July, 2014;
originally announced July 2014.
-
Optimal Energy-Aware Epidemic Routing in DTNs
Authors:
Soheil Eshghi,
MHR. Khouzani,
Saswati Sarkar,
Ness B. Shroff,
Santosh S. Venkatesh
Abstract:
In this work, we investigate the use of epidemic routing in energy constrained Delay Tolerant Networks (DTNs). In epidemic routing, messages are relayed by intermediate nodes at contact opportunities, i.e., when pairs of nodes come within the transmission range of each other. Each node needs to decide whether to forward its message upon contact with a new node based on its own residual energy leve…
▽ More
In this work, we investigate the use of epidemic routing in energy constrained Delay Tolerant Networks (DTNs). In epidemic routing, messages are relayed by intermediate nodes at contact opportunities, i.e., when pairs of nodes come within the transmission range of each other. Each node needs to decide whether to forward its message upon contact with a new node based on its own residual energy level and the age of that message. We mathematically characterize the fundamental trade-off between energy conservation and a measure of Quality of Service as a dynamic energy-dependent optimal control problem. We prove that in the mean-field regime, the optimal dynamic forwarding decisions follow simple threshold-based structures in which the forwarding threshold for each node depends on its current remaining energy. We then characterize the nature of this dependence. Our simulations reveal that the optimal dynamic policy significantly outperforms heuristics.
△ Less
Submitted 2 June, 2015; v1 submitted 6 March, 2014;
originally announced March 2014.
-
Optimal Patching in Clustered Malware Epidemics
Authors:
Soheil Eshghi,
MHR. Khouzani,
Saswati Sarkar,
Santosh S. Venkatesh
Abstract:
Studies on the propagation of malware in mobile networks have revealed that the spread of malware can be highly inhomogeneous. Platform diversity, contact list utilization by the malware, clustering in the network structure, etc. can also lead to differing spreading rates. In this paper, a general formal framework is proposed for leveraging such heterogeneity to derive optimal patching policies th…
▽ More
Studies on the propagation of malware in mobile networks have revealed that the spread of malware can be highly inhomogeneous. Platform diversity, contact list utilization by the malware, clustering in the network structure, etc. can also lead to differing spreading rates. In this paper, a general formal framework is proposed for leveraging such heterogeneity to derive optimal patching policies that attain the minimum aggregate cost due to the spread of malware and the surcharge of patching. Using Pontryagin's Maximum Principle for a stratified epidemic model, it is analytically proven that in the mean-field deterministic regime, optimal patch disseminations are simple single-threshold policies. Through numerical simulations, the behavior of optimal patching policies is investigated in sample topologies and their advantages are demonstrated.
△ Less
Submitted 6 March, 2014;
originally announced March 2014.
-
Semigroup Conjectures for Central Semidirect Product of R^n with R^m
Authors:
Kevin Lui,
Viorel Nitica,
Siddharth Venkatesh
Abstract:
In this paper we prove two new results about closed semigroups in the family of solvable groups H_{mn} that are semidirect products of R^m and R^n, and for which the structure homomorphism maps nontrivially into the center of Aut(R^n). The first result states that the closure of a semigroup generated by a set in H_{mn} that is not included in a maximal semigroup with nonempty interior is actually…
▽ More
In this paper we prove two new results about closed semigroups in the family of solvable groups H_{mn} that are semidirect products of R^m and R^n, and for which the structure homomorphism maps nontrivially into the center of Aut(R^n). The first result states that the closure of a semigroup generated by a set in H_{mn} that is not included in a maximal semigroup with nonempty interior is actually a group. The second result states that among the subsets of H_{mn} that are not included in a maximal proper semigroup, those that generate H_{mn} as a closed semigroup are dense. Results of this nature were obtained before only for extensions of nilpotent groups. Results of this nature were obtained before only for abelian and nilpotent Lie groups and their compact extensions. As an application of the technique developed in the paper, we find the minimal number of generators as a closed group and as a closed semigroup of H_{mn}.
△ Less
Submitted 29 December, 2013; v1 submitted 30 September, 2013;
originally announced September 2013.
-
Knot projections with a single multi-crossing
Authors:
Colin Adams,
Thomas Crawford,
Benjamin DeMeo,
Michael Landry,
Alex Tong Lin,
MurphyKate Montee,
Seojung Park,
Saraswathi Venkatesh,
Farrah Yhee
Abstract:
Introduced recently, an n-crossing is a singular point in a projection of a link at which n strands cross such that each strand travels straight through the crossing. We introduce the notion of an übercrossing projection, a knot projection with a single n-crossing. Such a projection is necessarily composed of a collection of loops emanating from the crossing. We prove the surprising fact that all…
▽ More
Introduced recently, an n-crossing is a singular point in a projection of a link at which n strands cross such that each strand travels straight through the crossing. We introduce the notion of an übercrossing projection, a knot projection with a single n-crossing. Such a projection is necessarily composed of a collection of loops emanating from the crossing. We prove the surprising fact that all knots have a special type of übercrossing projection, which we call a petal projection, in which no loops contain any others. The rigidity of this form allows all the information about the knot to be concentrated in a permutation corresponding to the levels at which the strands lie within the crossing. These ideas give rise to two new invariants for a knot K: the übercrossing number ü(K), and petal number p(K). These are the least number of loops in any übercrossing or petal projection of K, respectively. We relate ü(K) and p(K) to other knot invariants, and compute p(K) for several classes of knots, including all knots of nine or fewer crossings.
△ Less
Submitted 12 November, 2012; v1 submitted 28 August, 2012;
originally announced August 2012.