18 research outputs found

    Rational Parking Functions and LLT Polynomials

    Get PDF
    We prove that the combinatorial side of the "Rational Shuffle Conjecture" provides a Schur-positive symmetric polynomial. Furthermore, we prove that the contribution of a given rational Dyck path can be computed as a certain skew LLT polynomial, thus generalizing the result of Haglund, Haiman, Loehr, Remmel and Ulyanov. The corresponding skew diagram is described explicitly in terms of a certain (m,n)-core.Comment: 14 pages, 8 figure

    Infinitesimal change of stable basis

    Get PDF
    The purpose of this note is to study the Maulik–Okounkov K-theoretic stable basis for the Hilbert scheme of points on the plane, which depends on a “slope” m∈ R. When m=ab is rational, we study the change of stable matrix from slope m- ε to m+ ε for small ε> 0 , and conjecture that it is related to the Leclerc–Thibon conjugation in the q-Fock space for Uqgl^ b. This is part of a wide framework of connections involving derived categories of quantized Hilbert schemes, modules for rational Cherednik algebras and Hecke algebras at roots of unity

    A combinatorial formula for LLT cumulants of melting lollipops in terms of spanning trees

    Full text link
    We prove a combinatorial formula for LLT cumulants of melting lollipops as a positive combination of LLT polynomials indexed by spanning trees. The result gives an affirmative answer to a general positivity question for this class of unicellular LLT cumulants, and gives an independent proof of their Schur-positivity. In the special case of the complete graph, we also express the formula in terms of parking functions.Comment: An extended abstract of this work with fewer results and a different title is available at arXiv:2011.15080v

    Rectangular analogues of the square paths conjecture and the univariate Delta conjecture

    Get PDF
    In this paper, we extend the rectangular side of the shuffle conjecture by stating a rectangular analogue of the square paths conjecture. In addition, we describe a set of combinatorial objects and one statistic that are a first step towards a rectangular extension of (the rise version of) the Delta conjecture, and of (the rise version of) the Delta square conjecture, corresponding to the case q=1 of an expected general statement. We also prove our new rectangular paths conjecture in the special case when the sides of the rectangle are coprime

    Singularities

    Get PDF
    Singularity theory is a central part of contemporary mathematics. It is concerned with the local and global structure of maps and spaces that occur in algebraic, analytic or differential geometric context. For its study it uses methods from algebra, topology, algebraic geometry and complex analysis

    kk-Schur functions and affine Schubert calculus

    Full text link
    This book is an exposition of the current state of research of affine Schubert calculus and kk-Schur functions. This text is based on a series of lectures given at a workshop titled "Affine Schubert Calculus" that took place in July 2010 at the Fields Institute in Toronto, Ontario. The story of this research is told in three parts: 1. Primer on kk-Schur Functions 2. Stanley symmetric functions and Peterson algebras 3. Affine Schubert calculusComment: 213 pages; conference website: http://www.fields.utoronto.ca/programs/scientific/10-11/schubert/, updates and corrections since v1. This material is based upon work supported by the National Science Foundation under Grant No. DMS-065264

    Buffer Overflow Vulnerability Diagnosis For Commodity Software

    Get PDF
    Buffer overflow attacks have been a computer security threat in software-based systems andapplications for decades. The existence of buffer overflow vulnerabilities makes the systemsusceptible to Internet worms and denial of service (DDoS) attacks which can cause hugesocial and financial impacts. Due to its importance, buffer overflow problem has been intensively studied. Researchershave proposed different techniques to defend against unknown buffer overflow attacks. Theyhave also investigated various solutions, including automatic signature generation, automatic patch generation, etc., to automatically protect computer systems with known vulnerabilities. The effectiveness and efficiency of the automatic signature generation approaches andthe automatic patch generation approaches are all based on the accurate understanding ofthe vulnerabilities, the buffer overflow vulnerability diagnosis (BOVD). Currently, the results of automatic signature generation and automatic patch generation are far from satisfaction due to the insufficient research results from the automatic BOVD. This thesis defines the automatic buffer overflow vulnerability diagnosis (BOVD) problemand provides solutions towards automatic BOVD for commodity software. It targets oncommodity software when source code and symbol table are not available. The solutionscombine both of the dynamic analysis techniques and static analysis techniques to achievethe goal. Based on the observation that buffer overflow attack happens when the size of the destination buffer is smaller than the total number of writes after the data copy process if the buffer overflow attack happens through a data copy procedure, the diagnosis results return the information of the size of destination buffer, the total number of writes of a data copy procedure and how the user inputs are related with them. They are achieved through bound analysis, loop analysis and input analysis respectively. We demonstrate the effectiveness of this thesis approach using real world vulnerable applications including the buffer overflow vulnerabilities attacked by the record-setting Slammer and Blaster worms. This thesis also does the complete case study for buffer overflow vulnerabilities which may have independent interests to researchers. Our buffer overflow case study results can help other researchers to design more effective defense systems and debugging tools against buffer overflow attacks

    Application of Physics-Based Image Formation Models to Change Detection in The Context of Indoor Workplace Video Surveillance

    Get PDF
    The aim of this thesis is to investigate the application of physics-based image formation models to change detection in the context of indoor workplace video surveillance. First, video surveillance applications are reviewed. Based on this review, a new classification of video surveillance applications is proposed and indoor workplace surveillance is chosen as the target application. A new workplace surveillance modelis then introduced, which relates the needs of workplace surveillance applications, their implications and the capabilities of video surveillance techniques. Furthermore, a set of requirements for workplace surveillance applications are elicited and a videobased workplace system structure is proposed. Change detection is then reviewed, and the suitability of using physics-based image formation models to enhance change detection algorithms is investigated. Two physics-based change detection techniques are developed. The foundations of these techniques are advances of colour constancy techniques which extract physical features from the camera output; this approach is unlike other change detection algorithms which use the camera output directly without considering its physical meaning. The performance of the proposed techniques is measured and compared against the Horprasert algorithm, using objective and computational complexity evaluation methods, where the quality of the change detection is measured using recall and precision measures. The Horprasert algorithm was shown, in an independent study by other researchers, to have the best trade-off between segmentation quality and computational complexity among other state-of-the-art algorithms such as Cavallaro, McKenna and Shen under experimental conditions which covered different lightings and background structures
    corecore