13 research outputs found

    The dual equivalence of equations and coequations for automata

    Get PDF
    Because of the isomorphism (X x A) -> X = X -> (A -> X), the transition structure t: X -> (A -> X) of a deterministic automaton with state set X and with inputs from an alphabet A can be viewed both as an algebra and as a coalgebra. Here we will use this algebra-coalgebra duality of automata as a common perspective for the study of equations and coequations. Equations are sets of pairs of words (v,w) tha

    Some results on the generalized star-height problem

    Get PDF
    We prove some results related to the generalized star-height problem. In this problem, as opposed to the restricted star-height problem, complementation is considered as a basic operator. We first show that the class of languages of star-height ? n is closed under certain operations (left and right quotients, inverse alphabetic morphisms, injective star-free substitutions). It is known that languages recognized by a commutative group are of star-height 1. We extend this result to nilpotent groups of class 2 and to the groups that divide a semidirect product of a commutative group by (Z/2Z)n. In the same direction, we show that one of the languages that was conjectured to be of star height 2 during the past ten years, is in fact of star height 1. Next we show that if a rational language L is recognized by a monoid of the variety generated by wreath products of the form M o (G o N), where M and N are aperiodic monoids, and G is a commutative group, then L is of star-height ? 1. Finally we show that every rational language is the inverse image, under some morphism between free monoids, of a language of (restricted) star-height 1

    Achieving Maximum Distance Separable Private Information Retrieval Capacity With Linear Codes

    Get PDF
    We propose three private information retrieval (PIR) protocols for distributed storage systems (DSSs) where data is stored using an arbitrary linear code. The first two protocols, named Protocol 1 and Protocol 2, achieve privacy for the scenario with noncolluding nodes. Protocol 1 requires a file size that is exponential in the number of files in the system, while Protocol 2 requires a file size that is independent of the number of files and is hence simpler. We prove that, for certain linear codes, Protocol 1 achieves the maximum distance separable (MDS) PIR capacity, i.e., the maximum PIR rate (the ratio of the amount of retrieved stored data per unit of downloaded data) for a DSS that uses an MDS code to store any given (finite and infinite) number of files, and Protocol 2 achieves the asymptotic MDS-PIR capacity (with infinitely large number of files in the DSS). In particular, we provide a necessary and a sufficient condition for a code to achieve the MDS-PIR capacity with Protocols 1 and 2 and prove that cyclic codes, Reed-Muller (RM) codes, and a class of distance-optimal local reconstruction codes achieve both the finite MDS-PIR capacity (i.e., with any given number of files) and the asymptotic MDS-PIR capacity with Protocols 1 and 2, respectively. Furthermore, we present a third protocol, Protocol 3, for the scenario with multiple colluding nodes, which can be seen as an improvement of a protocol recently introduced by Freij-Hollanti et al.. Similar to the noncolluding case, we provide a necessary and a sufficient condition to achieve the maximum possible PIR rate of Protocol 3. Moreover, we provide a particular class of codes that is suitable for this protocol and show that RM codes achieve the maximum possible PIR rate for the protocol. For all three protocols, we present an algorithm to optimize their PIR rates.Comment: This work is the extension of the work done in arXiv:1612.07084v2. The current version introduces further refinement to the manuscript. Current version will appear in the IEEE Transactions on Information Theor

    Hadwiger Integration of Definable Functions

    Get PDF
    This thesis denes and classies valuations on denable functionals. The intrinsicvolumes are valuations on tame subsets of R^n, and by easy extension, valuations on functionals on R^n with nitely many level sets, each a tame subset of R^n. We extend these valuations, which we call Hadwiger integrals, to denable functionals on R^n, and present some important properties of the valuations. With the appropriate topologies on the set of denable functionals, we obtain dual classication theorems for general valuations on such functionals. We also explore integral transforms, convergence results, and applications of the Hadwiger integrals

    The algebra of flows in graphs

    Get PDF
    We define a contravariant functor K from the category of finite graphs and graph morphisms to the category of finitely generated graded abelian groups and homomorphisms. For a graph X, an abelian group B, and a nonnegative integer j, an element of Hom(K^j(X),B) is a coherent family of B-valued flows on the set of all graphs obtained by contracting some (j-1)-set of edges of X; in particular, Hom(K^1(X),R) is the familiar (real) ``cycle-space'' of X. We show that K(X) is torsion-free and that its Poincare polynomial is the specialization t^{n-k}T_X(1/t,1+t) of the Tutte polynomial of X (here X has n vertices and k components). Functoriality of K induces a functorial coalgebra structure on K(X); dualizing, for any ring B we obtain a functorial B-algebra structure on Hom(K(X),B). When B is commutative we present this algebra as a quotient of a divided power algebra, leading to some interesting inequalities on the coefficients of the above Poincare polynomial. We also provide a formula for the theta function of the lattice of integer-valued flows in X, and conclude with ten open problems.Comment: 31 pages, 1 figur

    The SSL Interplay: Augmentations, Inductive Bias, and Generalization

    Full text link
    Self-supervised learning (SSL) has emerged as a powerful framework to learn representations from raw data without supervision. Yet in practice, engineers face issues such as instability in tuning optimizers and collapse of representations during training. Such challenges motivate the need for a theory to shed light on the complex interplay between the choice of data augmentation, network architecture, and training algorithm. We study such an interplay with a precise analysis of generalization performance on both pretraining and downstream tasks in a theory friendly setup, and highlight several insights for SSL practitioners that arise from our theory

    Moment equations for the mixed formulation of the Hodge Laplacian with stochastic loading term

    Get PDF
    We study the mixed formulation of the stochastic Hodge-Laplace problem defined on an n-dimensional domain D (n≥1), with random forcing term. In particular, we focus on the magnetostatic problem and on the Darcy problem in the three-dimensional case. We derive and analyse the moment equations, that is, the deterministic equations solved by the mth moment (m≥1) of the unique stochastic solution of the stochastic problem. We find stable tensor product finite element discretizations, both full and sparse, and provide optimal order-of-convergence estimates. In particular, we prove the inf-sup condition for sparse tensor product finite element space

    Cyclic Sieving Phenomenon of Promotion on Rectangular Tableaux

    Get PDF
    Cyclic sieving phenomenon (CSP) is a generalization by Reiner, Stanton, White of Stembridge's q=-1 phenomenon. When CSP is exhibited, orbits of a cyclic action on combinatorial objects show a nice structure and their sizes can be encoded by one polynomial. In this thesis we study various proofs of a very interesting cyclic sieving phenomenon, that jeu-de-taquin promotion on rectangular Young tableaux exhibits CSP. The first proof was obtained by Rhoades, who used Kazhdan-Lusztig representation. Purbhoo's proof uses Wronski map to equate tableaux with points in the fibre of the map. Finally, we consider Petersen, Pylyavskyy, Rhoades's proof on 2 and 3 row tableaux by bijecting the promotion of tableaux to rotation of webs. This thesis also propose a combinatorial approach to prove the CSP for square tableaux. A variation of jeu-de-taquin move yields a way to count square tableaux which has minimal orbit under promotion. These tableaux are then in bijection to permutations. We consider how this can be generalized

    Moment equations for the mixed formulation of the Hodge Laplacian with stochastic loading term

    Get PDF
    We study the mixed formulation of the stochastic Hodge-Laplace problem dened on a nn-dimensional domain D(n≥1)D (n ≥ 1), with random forcing term. In particular, we focus on the magnetostatic problem and on the Darcy problem in the three dimensional case. We derive and analyze the moment equations, that is the deterministic equations solved by the m−thm-th moment (m≥1(m ≥ 1) of the unique stochastic solution of the stochastic problem. We find stable tensor product finite element discretizations, both full and sparse, and provide optimal order of convergence estimates. In particular, we prove the inf-sup condition for sparse tensor product finite element spaces

    Graphs of Polytopes

    Get PDF
    The graph of a polytope is the graph whose vertex set is the set of vertices of the polytope, and whose edge set is the set of edges of the polytope. Several problems concerning graphs of polytopes are discussed. The primary result is a set of bounds (Theorem 39) on the maximal size of an anticlique (sometimes called a coclique, stable set, or independent set) of the graph of a polytope based on its dimension and number of vertices. Two results concerning properties preserved by certain operations on polytopes are presented. The first is that the Gale diagram of a join of polytopes is the direct sum of the Gale diagrams of the polytopes and dually, that the Gale diagram of a direct sum of polytopes is the join of their Gale diagrams (Theorem 23). The second is that if two polytopes satisfy a weakened form of Gale's evenness condition, then so does their product (Theorem 32). It is shown, by other means, that, with only two exceptions, the complete bipartite graphs are never graphs of polytopes (Theorem 47). The techniques developed throughout are then used to show that the complete 3-partite graph K_{1,n,m} is the graph of a polytope if and only if K_{n,m} is the graph of a polytope (Theorem 49). It is then shown that K_{2,2,3} and K_{2,2,4} are never graphs of polytopes. A conjecture is then stated as to precisely when a complete multipartite graph is the graph of a polytope. Finally, a section is devoted to results concerning the dimensions for which the graph of a crosspolytope is the graph of a polytope
    corecore