17,974 research outputs found

    The decomposition of the hypermetric cone into L-domains

    Get PDF
    The hypermetric cone \HYP_{n+1} is the parameter space of basic Delaunay polytopes in n-dimensional lattice. The cone \HYP_{n+1} is polyhedral; one way of seeing this is that modulo image by the covariance map \HYP_{n+1} is a finite union of L-domains, i.e., of parameter space of full Delaunay tessellations. In this paper, we study this partition of the hypermetric cone into L-domains. In particular, it is proved that the cone \HYP_{n+1} of hypermetrics on n+1 points contains exactly {1/2}n! principal L-domains. We give a detailed description of the decomposition of \HYP_{n+1} for n=2,3,4 and a computer result for n=5 (see Table \ref{TableDataHYPn}). Remarkable properties of the root system D4\mathsf{D}_4 are key for the decomposition of \HYP_5.Comment: 20 pages 2 figures, 2 table

    Data Imputation through the Identification of Local Anomalies

    Get PDF
    We introduce a comprehensive and statistical framework in a model free setting for a complete treatment of localized data corruptions due to severe noise sources, e.g., an occluder in the case of a visual recording. Within this framework, we propose i) a novel algorithm to efficiently separate, i.e., detect and localize, possible corruptions from a given suspicious data instance and ii) a Maximum A Posteriori (MAP) estimator to impute the corrupted data. As a generalization to Euclidean distance, we also propose a novel distance measure, which is based on the ranked deviations among the data attributes and empirically shown to be superior in separating the corruptions. Our algorithm first splits the suspicious instance into parts through a binary partitioning tree in the space of data attributes and iteratively tests those parts to detect local anomalies using the nominal statistics extracted from an uncorrupted (clean) reference data set. Once each part is labeled as anomalous vs normal, the corresponding binary patterns over this tree that characterize corruptions are identified and the affected attributes are imputed. Under a certain conditional independency structure assumed for the binary patterns, we analytically show that the false alarm rate of the introduced algorithm in detecting the corruptions is independent of the data and can be directly set without any parameter tuning. The proposed framework is tested over several well-known machine learning data sets with synthetically generated corruptions; and experimentally shown to produce remarkable improvements in terms of classification purposes with strong corruption separation capabilities. Our experiments also indicate that the proposed algorithms outperform the typical approaches and are robust to varying training phase conditions

    Edge contraction on dual ribbon graphs and 2D TQFT

    Full text link
    We present a new set of axioms for 2D TQFT formulated on the category of cell graphs with edge-contraction operations as morphisms. We construct a functor from this category to the endofunctor category consisting of Frobenius algebras. Edge-contraction operations correspond to natural transformations of endofunctors, which are compatible with the Frobenius algebra structure. Given a Frobenius algebra A, every cell graph determines an element of the symmetric tensor algebra defined over the dual space A*. We show that the edge-contraction axioms make this assignment depending only on the topological type of the cell graph, but not on the graph itself. Thus the functor generates the TQFT corresponding to A.Comment: accepted in Journal of Algebra (22 pages, 13 figures

    Compact Floor-Planning via Orderly Spanning Trees

    Full text link
    Floor-planning is a fundamental step in VLSI chip design. Based upon the concept of orderly spanning trees, we present a simple O(n)-time algorithm to construct a floor-plan for any n-node plane triangulation. In comparison with previous floor-planning algorithms in the literature, our solution is not only simpler in the algorithm itself, but also produces floor-plans which require fewer module types. An equally important aspect of our new algorithm lies in its ability to fit the floor-plan area in a rectangle of size (n-1)x(2n+1)/3. Lower bounds on the worst-case area for floor-planning any plane triangulation are also provided in the paper.Comment: 13 pages, 5 figures, An early version of this work was presented at 9th International Symposium on Graph Drawing (GD 2001), Vienna, Austria, September 2001. Accepted to Journal of Algorithms, 200

    On embeddings of CAT(0) cube complexes into products of trees

    Full text link
    We prove that the contact graph of a 2-dimensional CAT(0) cube complex X{\bf X} of maximum degree Δ\Delta can be coloured with at most ϵ(Δ)=MΔ26\epsilon(\Delta)=M\Delta^{26} colours, for a fixed constant MM. This implies that X{\bf X} (and the associated median graph) isometrically embeds in the Cartesian product of at most ϵ(Δ)\epsilon(\Delta) trees, and that the event structure whose domain is X{\bf X} admits a nice labeling with ϵ(Δ)\epsilon(\Delta) labels. On the other hand, we present an example of a 5-dimensional CAT(0) cube complex with uniformly bounded degrees of 0-cubes which cannot be embedded into a Cartesian product of a finite number of trees. This answers in the negative a question raised independently by F. Haglund, G. Niblo, M. Sageev, and the first author of this paper.Comment: Some small corrections; main change is a correction of the computation of the bounds in Theorem 1. Some figures repaire
    corecore