content
stringlengths
1
15.9M
\section{Introduction and overview} This paper develops a method for parsimoniously summarizing the shared dependence of many individual response variables upon a common set of predictor variables drawn at random. The focus is on multivariate Gaussian linear models where an analyst wants to find, among $p$ available pr...
\section{Introduction} \label{sec:intro} The main motivation behind all de Finetti type theorems is to reduce the study of permutation-invariant scenarios to that of i.i.d.~ones, which are often much easier to understand. In many information theoretic situations, the problem is posed in such a way that one almost direc...
\section{Introduction} \paragraph{Motivation} This paper deals with the question of why, and whether, a model of interacting strategic agents converges to equilibrium. We study this question in Fisher markets, under conditions where market equilibrium is unique and finding it is computationally tractable. Over the ye...
\section{Introduction} Despite centuries of study, many of the fundamentals of lightning physics are poorly-understood. Much recent study has been devoted to measurements such as return stroke peak currents (e.g. \citet{Schoene2010}) or impulsive charge moment changes (e.g. \citet{cummer2004lcm}), and such descriptive...
\section{Introduction} \label{sec:intro} The data from proton-proton (pp) collisions produced at the CERN LHC provide an excellent environment to investigate properties of the top quark, in the context of its production and decay, with unprecedented precision. Such measurements enable rigorous tests of the standard ...
\section{Introduction} It was recently shown that the replica trick \cite{EEandQFT} can be used to measure the R{\'e}nyi entropies for single subsystems of a lattice in a globally pure state \cite{RenyiMelko}. This allows the quantification of the entanglement across the cut but only if the state of the entire sys...
\section{Introduction} Despite the fact that the standard theory of gravity, general relativity (GR), is already around one century old, there has always been interest in finding viable modifications to it. In particular, the discovery of the late-time acceleration of our Universe \cite{Riess:1998cb,Perlmutter:1998np}...
\section{Introduction} Elkies, Kuperberg, Larsen and Propp in their paper \cite{diamond} introduced a new class of object which they called Aztec Diamonds. The Aztec Diamond of order $n$ (denoted by $\ad(n)$) is the union of all unit squares inside the contour $\abs{x}+\abs{y}=n+1$ (see Figure \ref{fig:diamond} for a...
\section*{References}} \DeclareMathOperator*{\argmin}{arg\,min} \newtheorem{definition}{Definition} \newtheorem{theorem}{Theorem} \title{Understanding Convolutional Neural Networks} \author{ Jayanth Koushik \\ Language Technologies Institute \\ Carnegie Mellon University \\ Pittsburgh, PA 1...
\section{Introduction} \label{sec:intro} A magician enters the room with a 32-card deck. He invites five volunteers to the stage and claims he will read their minds. Another volunteer is asked to cut the deck a few times and pass the top five cards to the volunteers, one for each. ``Now I need you to think about you...
\section{Introduction} Given a finite set $\{p_1,\ldots,p_k\}$ of prime numbers, let $p_{k+1}$ be a prime factor of $1+p_1\cdots p_k$. Then, as shown by Euclid, $p_{k+1}$ is necessarily distinct from $p_1,\ldots,p_k$. Iterating this procedure, we thus obtain an infinite sequence of distinct primes. For instance, beginn...
\section{Introduction} This paper forms part of a series by the authors \cites{GMV1,GMV3} concerning the structure theory of \emph{nilspaces}. Much of this is concerned with the approach of Szegedy \cite{S12} and Antol\'\i n Camarena and Szegedy \cite{CS12} to the inverse theorem for the Gowers norms, as well as wi...
\section{Introduction: big data, parallel processing and nested models} \label{s:intro} Serial computing has reached a plateau and parallel, distributed architectures are becoming widely available, from machines with a few cores to cloud computing with 1000s of machines. The combination of powerful nested models wi...
\section{{\bf Introduction}} \label{sect.a} Given a convex optimization problem possessing little more structure than having a known strictly-feasible point, we provide a simple transformation to an equivalent convex optimization problem which has only linear equations as constraints, and has Lipschitz-continuous ob...
\section{Introduction} \subsection{Background and Motivation} Derivatives and integrals of non-integer order, often referred to as \textit{fractional}, are natural extensions of the standard integer-order ones which enjoy certain favourable properties: they are linear operators, preserve analyticity, and have th...
\section{\label{sec1} Introduction} Diffusion advection processes in turbulent environments represent both experimentally and theoretically important topic of study in the field of fluid motion \cite{Yoshizawa,Biskamp,MoninBook,McComb,Shraiman}. In this respect, the so-called Prandtl number is frequently used to compa...
\section{Introduction} We consider a family of exact infinite-energy solutions of two three-dimensional (3D) fluid models with a damping term, the incompressible Euler equations \begin{equation} \label{dampede} \begin{cases} &\bfu_t+\bfu\cdot\nabla \bfu+\alpha \bfu=-\nabla p, \\ &\diver\bfu=0, \end{cases} ...
\section{Introduction} Understanding the nature of nonlinear interactions is at the core of the problem of turbulence. It has been known for quite some time that the transfer of energy between scales in a turbulent flow involves groups of three spatial modes, namely a {\it triad} $({\bf k}, {\bf p}, {\bf q})$ suc...
\section{Introduction}\label{s1} Given a real \emph{base} $q>1$ and a finite \emph{alphabet} $A\subset\mathbb R$ (having at least two elements), by an \emph{expansion} of a real number $x$ we mean a sequence $c=(c_i)\subset A$ satisfying the equality \begin{equation*} \pi_q(c)=\pi_q(c_i):=\sum_{i=1}^{\infty}\frac{c_i}...
\section{Background} The model describes an outbreak epidemic with host-vector population dynamics in a geographical region. The epidemic outbreak begins at time 0 in a small sub-region in which the epidemic disease is not yet present. The goal of the model is to aid understanding of how the introduction of a very smal...
\section{Introduction and overview} \label{intro} In the study of partial differential equations (PDEs), conserved integrals and local continuity equations have many important uses. They yield fundamental conserved quantities and constants of motion, which along with symmetries are an intrinsic coordinate-free aspec...
\section{Introduction} Unless otherwise stated, we shall use small letters such as $x$ to denote non-negative integers or set elements or functions, capital letters such as $X$ to denote sets, and calligraphic letters such as $\mathcal{F}$ to denote \emph{families} (that is, sets whose members are sets themselves). Th...
\section{INTRODUCTION} Over the past decades, robotic technologies and robot systems have been steadily becoming more sophisticated and complex. Programming of an advanced robot system such as the PR2 robot remains a challenging task. There are three long standing issues that still inhibit rapid advancement in robot so...
\section{Introduction} \subsection{The Boltzmann equation} We consider a 3-dimensional spatially homogeneous Boltzmann equation, which depicts the density $f_t(v)$ of particles in a gas, moving with velocity $v\in\mathbb{R}^3$ at time $t\geq 0$. The density $f_t(v)$ solves \begin{equation}}\def\eeq{\end{equation}\lab...
\section{Introduction} In this paper, we consider the problem of \textit{best arm identification} with a \textit{fixed budget $T$}, in the $K$-armed stochastic bandit setting. Given $K$ distributions (or arms) that take value in $[0,1]$, and given a fixed number of samples $T>0$ (or budget) that can be collected seque...
\section{Introduction} Quantum systems have dynamics that appear to be beyond the capacity of classical computers to simulate as the size of the system increases. However, a controlled quantum simulator may enable an understanding of such systems that eludes classical description, as the emulation of one system by ano...
\section{Introduction} Wireless sensor nodes are small computer devices with low production costs, equipped with a radio antenna and sensors capable of sensing one or more environmental parameters~\cite{Akyildiz2002}. As sensor nodes are designed to have low production costs, their computational and energy resources a...
\section{Introduction} Modern radio interferometric arrays deliver large volumes of data, in order to reach higher sensitivities yielding new science. To reach the full potential of such arrays, estimation of systematic errors in the data and correction for such errors (also called as calibration) is essential. This is...
\section{Introduction} The search for time-reversal violation (TV) has long been a subject of considerable experimental and theoretical interest. It is partially motivated by the need for CP-violation beyond that encoded in the Standard Model (SM) Cabibbo-Kobayashi-Maskawa (CKM) matrix to explain the cosmic baryon asy...
\section{Introduction} The \emph{boosting} approach to learning binary classifiers is to construct a weighted-majority ensemble of them by incrementally adding base classifiers(\cite{SF12}). This process is guided by a potential function that is an upper bound on the training error. The weights assigned to the train...
\section{Introduction} Matveev~\cite{matveev_2-3_connectivity_paper, matveev} and (independently) Piergallini~\cite{piergallini} show that the set of triangulations of a three-manifold is connected under 2-3 and 3-2 moves, as long as we ignore the small number of triangulations of manifolds that consist of only a sin...
\section{Introduction} The core concepts of computer security have remained mostly the same since they were developed and articulated in the 1970’s and late 1960’s, e.g., in the seminal papers on protection by Lampson and by Saltzer and Schroeder~\cite{Protection,SaltzerAndSchroeder}. However, since then, surprisingly...
\section{Introduction} Clusters of galaxies are the largest gravitationally bounded structures in the Universe and play a fundamental role in testing cosmological models, investigating the formation and growth of structures of the Universe and properties of dark matter (DM). The combination of different independent t...
\section{Introduction} The motivation behind this paper is a basic question, due to S.-S. Chern and J. K. Moser \cite{CM74}, which roughly asks if there are compact, strictly pseudoconvex CR manifolds of dimension three that do not possess (CR) umbilical points. The answer to the question, in this generality, is well ...
\section{Introduction}\label{sec:intro} Soil moisture is a key factor in climate systems, which has a significant impact on hydrological processes, runoff generations and drought developments. To understand its spatial variability and predict values at unsampled locations, Gaussian process models are widely used \citep...
\section{Introduction} Recent technological advances have made it possible to collect unprecedented amounts of data. However, extracting patterns of information from these high-dimensional massive datasets is often challenging. How do we automatically determine, among millions of measured features (variables), which ar...
\section{Introduction} \label{intro} Non-equilibrium dynamics of closed quantum systems has been a subject of intense theoretical and experimental research in recent years \cite{pol1,dziar1,dutta1,marcos1}. Such systems are known to show several interesting features which have no analogs in their equilibrium counterpa...
\section{Introduction} Stochastic searching~\cite{BLMV11} underlies many biological processes~\cite{BWV81,V07,M08}, animal foraging~\cite{C76,B91,OBE90,VBH99,BLMV06}, as well as operations to find missing persons or lost items~\cite{RS71,FS01,S09}. In these settings basic goals are to maximize the probability that th...
\section{Introduction} It has long been observed, in experiments and simulations, that scale-invariant statistics of grain boundary networks appear to be universal.~\cite{1986mullins,2012lazar} That is, the statistics of their long-term scale-invariant properties are largely independent of the initial conditions. This ...
\section{Preliminaries} In our work, we mainly focus on the learning problem in two stages, i.e., C-stage and E-stage with feature and instance evolution simultaneously. In C-stage, data are collected in mini-batch style. Assume that there are totally $T_1$ batches. In each batch, the features of each instance can be ...
\section{Introduction} Let $G$ be a totally disconnected locally compact group and $H$ a closed subgroup. A smooth, complex valued representation $(\pi,V)$ of $G$ is called $H$-distinguished if there exists a non-zero linear form $\ell$ on $V$ such that $\ell(\pi(h)v)=\ell(v)$ for all $h\in H$ and $v\in V$. If $\pi$...
\section{Introduction} How do molecules form? This has been recognized as one of the ten unsolved mysteries of Chemistry, enumerated in 2013 for the Year of Chemistry Celebration \cite{SciAm}. Indeed, a new entity emerges when two identical atoms meet. The reciprocal is also true: as a dimer approaches a catalyst's su...
\section{Introduction} Topological data analysis (TDA) has emerged as a useful tool to analyze underlying properties of data before any contextual modeling assumptions kick in. Generally speaking, TDA seeks to characterize the \emph{shape} of high dimensional data (viewed as a point-cloud in some metric space), by quan...
\section{Introduction} The Landau-Lifshitz equation was developed to model the behaviour of domain walls in magnetic regions within ferromagnetic structures \cite{Landau1935}. For example, the one-dimensional Landau-Lifshitz equation can be used to describe ferromagnetic nanowires, which are often found in memory stor...
\section{Introduction} Recall that an \emph{oriented graph} is a digraph obtained from a simple, undirected graph by giving each edge one of its two possible orientations. Recall, also, that if $G$ and $H$ are oriented graphs, then a \emph{homomorphism of $G$ to $H$} is a function $\phi$ from the vertices of $G$ to th...
\section{Introduction} Transportation, electrical and telecommunication networks, to name a few, have become fundamental for the proper functioning of the modern world. For that reason it has become of extreme importance that these systems remain operative. However these systems are prone to failure due to malfunction...
\section{Introduction} \label{sec:introduction} Mathematical models have always played an import role science. They are a key way of summarizing and exchanging complex information, evolve with the acquisition of new knowledge, and motivate starting points for future explorations. Driven in part by big data and e...
\section{Introduction} \label{sec:introduction} In this paper we will use the Euler-Maclaurin summation formula \cite{3,5} to obtain rapidly convergent series expansions for finite sums involving Stirling series \cite{1}. Our key tool will be the so called Weniger transformation \cite{1}.\newline \noindent For example...
\section{Introduction} \input{sections/introduction} \section{Background} \input{sections/background} \input{sections/problem_definition_and_algorithm} \section{Experimental Results} \input{sections/experimental_evaluation} \vspace{-0.5cm} \section{Conclusion} \input{sections/conclusion} \section{Acknowledgment} ...
\section{Introduction} The discovery of iron based superconductors in 2008 has stimulated much discussion\cite{GRStewart}. Their rich phase diagrams have suggested various bosonic fluctuations, such as spin, orbital and charge, possibly acting as a glue between electrons. Many theories have been proposed to explain th...
\section{Introduction} Emission of broad-line region (BLR) of active galactic nuclei (AGNs) is explained by models which propose continuous steady flows or presence a very large number of clouds which exhibit some bulk motion \citep[e.g.,][]{oster,netzerbook,Rees,Rees89}. In the early models for the BLRs, the clouds...
\section*{Supplementary material for: Suppressed magnetic circular dichroism and valley-selective magneto-absorption due to the effective mass anisotropy in bismuth} \subsection*{Pieter J. de Visser, Julien Levallois, Micha\"{e}l K. Tran, Jean-Marie Poumirol, Ievgeniia O. Nedoliuk, J\'{e}r\'{e}mie Teyssier, Ctirad Uh...
\section{Introduction and Motivation}\label{sec:introduction} The traditional methods for user identification systems rely on entering a username and a text password. One of the major vulnerabilities of this technique is the difficulty of remembering passwords. Therefore the users tend to pick short passwords or passw...
\section{Introduction} Resonance phenomena are prevalent in physics; see \textit{e.g.}\ Ref.~\cite{Prigogine96}. Quantum resonance, in particular, has been a central issue of quantum mechanics from the early days of its development~\cite{Gamow28,Eckart30,Bethe36,Siegert39,Hulthen42a,Hulthen42b,Jost51,Vogt54,Corinaldes...
\section{Observations of Reverberation Signatures}\label{sec:obs} We now consider the observational evidence for X-ray reverberation, focussing first on the evidence for reflection reverberation in Active Galactic Nuclei, before discussing the evidence for disc thermal reverberation in black hole X-ray binaries. \subs...
\section{Introduction} \label{sec:introd} The recent discovery of a boson with mass around 125 GeV by the ATLAS \cite{Aad:2012tfa,Aad:2013wqa,AtlasConf1,AtlasConf2}, CMS \cite{Chatrchyan:2012ufa,Chatrchyan:2013lba,CMSpas}, D\O~and CDF \cite{Aaltonen:2012qt,Aaltonen:2013kxa} collaborations is the first direct hint of t...
\section*{\Large\bf Supplementary Information} \begin{center} {\large \bf Chiral spin superfluidity and spontaneous spin Hall effect of interacting bosons} \end{center} \section{Details of the Bogoliubov analysis} \label{sec:BogDetails} In this section, we give the details of our Bogoliubov analysis. The groun...
\section{Introduction} In this work, we join and expand three threads of research in the analysis of modern finite element methods: polytope domain meshing, generalized barycentric coordinates, and families of finite-dimensional solution spaces characterized by finite element exterior calculus. It is well-known that...
\section{Introduction} That black holes have no hair is a long-standing dictum of classical general relativity \cite{nohair}, one whose content is highly contingent upon assumed conditions. Although the original no-hair theorems were more about limiting charges a black hole could carry, they have come to be taken m...
\section{Introduction}\label{introd} The modeling of fracture in materials leads naturally to functional spaces with discontinuities, in particular functions of bounded variation ($BV$) and of bounded deformation ($BD$). In variational models, the key ingredients are a volume term, corresponding to the stored energy a...
\section{Introduction}\label{sI} In recent years there has been a great deal of interest in spectral singularities in non-Hermitian systems, especially in $\mathcal{PT}$(parity-time) symmetric systems \cite{muga,ali-prl-09,zafar-ss,ali-th,ali-wg,longhi-ss}. Such singularities with diverging scattered amplitudes (in ref...
\section{Dimensional Reduction of Brans-Dicke Theory in Arbitrary Dimensions} \label{sec:1} The original motivation of the induced-matter theory (IMT)~\cite{ponce-wesson-92} was to achieve the unification of matter and geometry. Recently, the idea of the IMT has been employed for generalizing BD theory, as a fundamenta...
\section{Introduction} The problem of neutrino propagation and interactions in dense external environments is one of the most important issues of the present-day particle physics. Neutrinos play an important role in very complex and physically diverse processes as of core-collapse supernovae that provides fascina...
\section{Introduction} A set of integers, denoted by $S$, is called a \emph{sum-free set} if $% S\cap(S+S)=\emptyset$, where $S+S$ denotes the set of pairwise sums, i.e., $% S+S=\{x+y:x,y\in S\}$. Thus, for any sum-free set $S$, there do not exist $% x,y,z\in S$ for which $x+y=z$. It is natural to arrange the elements ...
\section{Conclusion and Discussion} \vspace*{0.3cm} \noindent {\it{\textbf{Discussion and Conclusions.}}} As pointed out in Ref.~\cite{BDFG2003}, the string theory seems unlikely to realize a large effective decay constant for the natural inflation model. A more general argument has been provided from the weak gravity ...
\section{Introduction} For modeling the kinetic energy of a non-relativistic spin-$\tfrac{1}{2}$ particle in the plane, moving under a magnetic field $B$ in the perpendicular direction to the plane, one uses the two-dimensional Pauli operator $$ H_{\bf A} := \big[{\boldsymbol \sigma}\cdot \big(- \ri \nabla- {...
\section{Introduction} \label{sec:introduction} A typical problem in extremal combinatorics has the following form: What is the largest size of a structure which does not contain any forbidden configurations? Once this extremal value is known, it is very natural to ask how many forbidden configurations one is guarant...
\section{Introduction} As a tool of the 21st century for solving theoretical, practical and mathematical problems in all scientific areas, the Heun's functions are a universal method for treatment of a vast variety of phenomena in complicated systems of different kinds: in solid state physics, crystalline material...
\section{INTRODUCTION} The idea that binary systems of massive stars without compact objects provide suitable environments for efficient particle acceleration and subsequent nonthermal emission has been thoroughly discussed in literature \citep[e.g.,][]{Pollock1987, White1994}. Electrons and protons are thought to be...
\section{INTRODUCTION} \label{introduction} Transition disks (TDs) are important for studying the advanced stages of protoplanetary disk evolution \citep[see, e.g.,][]{espaillat14}. TDs were originally identified as sources for which the spectral energy distribution (SED) demonstrated a lack of near-infrared exces...
\section{Introduction} We study the local H\"older regularity for viscosity solutions of possibly degenerate and singular non-local equations of the form \begin{equation* \operatorname{PV} \int_{\mathbb{R}^n}|u(x)-u(x+y)|^{p-2}(u(x)-u(x+y))K(x,y)\, dy = f(x), \end{equation*} where $f$ is bounded and $K(x,y)$ essential...
\section{Introduction}\label{sect:introduction} Birman and Menasco introduced arc-presentation of links in \cite{BM}, and Cromwell formulated it in \cite{C}. Dynnikov pointed out in \cite{D1} and \cite{D2} that Cromwell's argument in \cite{C} almost shows that any arc-presentation of a split link can be def...
\section{Conclusion} \label{sec:conclusion} This paper discusses the needs for adapting the way of using MDE techniques created for design time activities, to support the use of models at runtime. To this end, several requirements are described, and the {\em de facto} standard in the MDE community, {\em i.e.} the Ecli...
\section{Introduction} For explicit calculations of instationary solutions to hyperbolic conservation laws, the timestep is dictated by the CFL condition due to Courant, Friedrichs and Lewy \cite{CourantFriedrichsLewy1928}, which requires that the numerical speed of propagation should be at least as large as the phys...
\section{\texorpdfstring{B\"uhlmann, Meier and van de Geer.}{B\"uhlmann, Meier and van de Geer}}\label{secbuhl} We thank Professors B\"uhlmann, Meier and van de Geer for their extensive and detailed discussion---they raise many interesting points. Before addressing these, there are a few issues worth clarifying. ...
\section{Introduction}\label{sec:intro} Early large-scale, cosmological simulations of galaxy formation in the $\Lambda$CDM paradigm suggested that the spherically-averaged density profiles of dark matter halos follow a universal profile across a large dynamic range in mass \citep{navarro96}. Since then, higher resolu...
\section*{Supporting Information} \renewcommand{\thetable}{S.\arabic{table}} \subsection*{Example template messages used for direct solicitation of phylogenetic datasets} \subsubsection*{Undergraduate First Request} Dear Dr. $<$\verb!corresponding author!$>$, \medskip \noindent My name is $<$\verb!solicitor!$>$, an...
\section*{Introduction} The main goal of the paper is to present explicit formulae for all differentials $\delta_k$ of the Feigin-Fuchs-Rocha-Carridi-Wallach-resolution (\cite{FeFu}, \cite{RochWall}), a free resolution of a one-dimensional $L_1$-module ${\mathbb C}$. By $L_1$ we denote the positive part of the Witt ...
\section{Introduction} \label{Intro} The goal of this paper is to develop a new perspective on quantization, from which some intriguing phenomena in four-dimensional gauge theory may be naturally understood. Specifically, the phenomena that we wish to understand are the following. At low energies, an $\CN = 2$ super...
\section{Introduction} In 2007, Akutsu et al. \cite{Akutsu(2007)} propose the concept of {\it controllability} of {\it Boolean control networks} (BCNs), prove that determining the controllability of BCNs is {\bf NP}-hard\footnote{That is, there exists no polynomial time algorithm for determining the controllability of...
\section*{The UK financial mathematics M.Sc.} The last three decades have seen an unprecedented explosion of activity in a new sub-discipline of mathematics: {\it financial mathematics}. The emergence of this field of research and study has paralleled the manifold expansion of the financial services industry and, acc...
\section{Introduction} \label{sec:intro} Multiphase flows represent the cornerstone of many fields of science and technology ranging from micro-scale devices to the large scale cyclonic separators of industrial plants. In the context of micro/nano technologies, the transport of small particles or bubbles by a carrier...
\section{Introduction} NGC~7538 is a well studied optically visible H\,{\tiny II}\ region, located at a distance of 2.65~kpc \citep{moscadelli09}, surrounded by very massive star--forming complexes \citep{Minn75, Werner79, Read80, Rots81, Campbell84, Reid05}. NGC~7538 IRS~1--3 form a cluster of embedded massive pr...
\section{Introduction} \label{sec:introduction} \subsection*{Computability Theory} In computable analysis \cite{pourel,weihrauchd}, there has for a long time been an interest in how complicated the set of codes of some element in a suitable spaces may be. \name{Pour-El} and \name{Richards} \cite{pourel} observe...
\section{Introduction} \label{sec1} Over the past few decades there has been significant progress in the understanding of dissipative phenomena, both in classical and quantum mechanics. This has been particularly achieved through the realization that dissipative parameters such as the lifetime of an unstable partic...
\section{INTRODUCTION} Glitches are sudden increases in rotation rates of pulsars, with $\Delta\Omega/\Omega \sim10^{-9}-10^{-6}$, usually accompanied by jumps in the spin-down rate, $\Delta \dot \Omega /\dot \Omega \sim 10^{-4}-10^{-2}$ \citep{espinoza11,yu13}. These changes tend to relax fully or partially on long t...
\section{Introduction}\label{sec:introduction} In order to provide near real-time wide area monitoring and control of power systems, synchrophasor data from PMUs are provided from across the power system by electric utilities. Typically, the PMUs are designed to record up to 30 - 60 measurements/second, and phasor dat...
\section{Introduction} Cosmology has indeed undergone a dramatic change over the past couple of decades. The availability of high precision data regarding our universe and its indication towards an expanding universe with an accelerated rate invoked all sorts of modifications of Einstein's equations. That the acceler...
\section{Chernoff Bound for Limited Independence} \begin{lemma}[Chernoff Bound for Limited Independence] \label{LemmaChernoff} Let $X_1 \cdots X_\ell$ be $\delta$-almost $k$-wise independent random variables with $X_i \in \{0,1\}$ for all $i$. Set $X = \sum_i X_i$ and $\mu = \sum_i \mu_i = \sum_i \ex{X}{X_i}$, and sup...
\section{Introduction} \label{intro} Some of the most important discoveries in condensed matter physics over the last few decades have been about topological states of matter. Topological states are gapped states of matter that are not characterized by broken symmetries and local order parameters, but are still distinc...
\section{Introduction}\label{intro-sec} We consider the linear regression setup with high dimensional covariates where the number of covariates $p$ can be large relative to the sample size $n$. When $p > n$, the estimation problem is ill-posed without performing variable selection. A natural assumption to limit ...
\section*{Acknowledgements} \noindent We express our gratitude to our colleagues in the CERN accelerator departments for the excellent performance of the LHC. We thank the technical and administrative staff at the LHCb institutes. We acknowledge support from CERN and from the national agencies: CAPES, CNPq, FAPERJ an...
\section{Introduction} \subsection{Background of open quantum systems} Coupling between microscopic quantum mechanical systems and their environment is important in essentially every system where quantum mechanical behaviour is observed. No quantum system that has been measured in the laboratory is an ideal, perfectly...
\section{Introduction}\label{intro} In recent years, Heisenberg's uncertainty principle has received renewed attention and scrutiny. The principle is often loosely associated with three sets of ideas -- preparation uncertainty, joint measurement error trade-offs, and error-disturbance trade-offs. While the first of ...
\section{Introduction} The Graph Colouring Problem for Office Blocks was raised by BAE Systems at the 53rd European Study Group with Industry in 2005~\cite{AGG+05}. Consider an office complex with space rented by several independent organisations. It is likely that each organisation uses its own wireless network (WLA...
\section{Introduction} \label{intro} Since quantum mechanics principles are introduced into cryptography, quantum cryptography attracts more and more attention. Due to the characteristic of quantum unconditional security, many quantum cryptography protocols, such as quantum key distribution (QKD) [1-3], quantum direc...
\section{Introduction} \label{Introduction} Since the discovery of the late-time accelerated expansion of the Universe, there has been much effort into understanding the perplexing nature of the cosmic acceleration and of gravity itself. In a first direction, one can introduce the dark-energy concept, in the context ...
\section{Introduction} This paper is the continuation of the study in (\cite{CW3}) and (\cite{CW4}). In~\cite{CW3}, we developed a weak compactness theory for non-collapsed Ricci flows with bounded scalar curvature and bounded half-dimensional curvature integral. This weak compactness theory is applied in~\cite{CW4} ...
\section{Introduction}\label{sec1} We consider the long-standing problem of estimating the variance of the difference-in-means estimator as applied to a completely randomized experiment performed on a random sample of size $n$ selected without replacement from a population of size $N$ under a nonparametric model o...
\section{Introduction} In~\cite{Masina:2011aa,Masina:2011un, Masina:2012yd} we have proposed that Inflation in the Early Universe can be realized for a narrow band of values of the top quark and Higgs boson masses, for which the Standard Model (SM) Higgs potential develops a second local minimum~\cite{CERN-TH-2683, he...