17,974 research outputs found
The decomposition of the hypermetric cone into L-domains
The hypermetric cone \HYP_{n+1} is the parameter space of basic Delaunay
polytopes in n-dimensional lattice. The cone \HYP_{n+1} is polyhedral; one
way of seeing this is that modulo image by the covariance map \HYP_{n+1} is a
finite union of L-domains, i.e., of parameter space of full Delaunay
tessellations.
In this paper, we study this partition of the hypermetric cone into
L-domains. In particular, it is proved that the cone \HYP_{n+1} of
hypermetrics on n+1 points contains exactly {1/2}n! principal L-domains. We
give a detailed description of the decomposition of \HYP_{n+1} for n=2,3,4
and a computer result for n=5 (see Table \ref{TableDataHYPn}). Remarkable
properties of the root system are key for the decomposition of
\HYP_5.Comment: 20 pages 2 figures, 2 table
Data Imputation through the Identification of Local Anomalies
We introduce a comprehensive and statistical framework in a model free
setting for a complete treatment of localized data corruptions due to severe
noise sources, e.g., an occluder in the case of a visual recording. Within this
framework, we propose i) a novel algorithm to efficiently separate, i.e.,
detect and localize, possible corruptions from a given suspicious data instance
and ii) a Maximum A Posteriori (MAP) estimator to impute the corrupted data. As
a generalization to Euclidean distance, we also propose a novel distance
measure, which is based on the ranked deviations among the data attributes and
empirically shown to be superior in separating the corruptions. Our algorithm
first splits the suspicious instance into parts through a binary partitioning
tree in the space of data attributes and iteratively tests those parts to
detect local anomalies using the nominal statistics extracted from an
uncorrupted (clean) reference data set. Once each part is labeled as anomalous
vs normal, the corresponding binary patterns over this tree that characterize
corruptions are identified and the affected attributes are imputed. Under a
certain conditional independency structure assumed for the binary patterns, we
analytically show that the false alarm rate of the introduced algorithm in
detecting the corruptions is independent of the data and can be directly set
without any parameter tuning. The proposed framework is tested over several
well-known machine learning data sets with synthetically generated corruptions;
and experimentally shown to produce remarkable improvements in terms of
classification purposes with strong corruption separation capabilities. Our
experiments also indicate that the proposed algorithms outperform the typical
approaches and are robust to varying training phase conditions
Edge contraction on dual ribbon graphs and 2D TQFT
We present a new set of axioms for 2D TQFT formulated on the category of cell
graphs with edge-contraction operations as morphisms. We construct a functor
from this category to the endofunctor category consisting of Frobenius
algebras. Edge-contraction operations correspond to natural transformations of
endofunctors, which are compatible with the Frobenius algebra structure. Given
a Frobenius algebra A, every cell graph determines an element of the symmetric
tensor algebra defined over the dual space A*. We show that the
edge-contraction axioms make this assignment depending only on the topological
type of the cell graph, but not on the graph itself. Thus the functor generates
the TQFT corresponding to A.Comment: accepted in Journal of Algebra (22 pages, 13 figures
Compact Floor-Planning via Orderly Spanning Trees
Floor-planning is a fundamental step in VLSI chip design. Based upon the
concept of orderly spanning trees, we present a simple O(n)-time algorithm to
construct a floor-plan for any n-node plane triangulation. In comparison with
previous floor-planning algorithms in the literature, our solution is not only
simpler in the algorithm itself, but also produces floor-plans which require
fewer module types. An equally important aspect of our new algorithm lies in
its ability to fit the floor-plan area in a rectangle of size (n-1)x(2n+1)/3.
Lower bounds on the worst-case area for floor-planning any plane triangulation
are also provided in the paper.Comment: 13 pages, 5 figures, An early version of this work was presented at
9th International Symposium on Graph Drawing (GD 2001), Vienna, Austria,
September 2001. Accepted to Journal of Algorithms, 200
On embeddings of CAT(0) cube complexes into products of trees
We prove that the contact graph of a 2-dimensional CAT(0) cube complex of maximum degree can be coloured with at most
colours, for a fixed constant . This implies
that (and the associated median graph) isometrically embeds in the
Cartesian product of at most trees, and that the event
structure whose domain is admits a nice labeling with
labels. On the other hand, we present an example of a
5-dimensional CAT(0) cube complex with uniformly bounded degrees of 0-cubes
which cannot be embedded into a Cartesian product of a finite number of trees.
This answers in the negative a question raised independently by F. Haglund, G.
Niblo, M. Sageev, and the first author of this paper.Comment: Some small corrections; main change is a correction of the
computation of the bounds in Theorem 1. Some figures repaire
- …