1,933 research outputs found

    Dynamical properties of profinite actions

    Get PDF
    We study profinite actions of residually finite groups in terms of weak containment. We show that two strongly ergodic profinite actions of a group are weakly equivalent if and only if they are isomorphic. This allows us to construct continuum many pairwise weakly inequivalent free actions of a large class of groups, including free groups and linear groups with property (T). We also prove that for chains of subgroups of finite index, Lubotzky's property (τ\tau) is inherited when taking the intersection with a fixed subgroup of finite index. That this is not true for families of subgroups in general leads to answering the question of Lubotzky and Zuk, whether for families of subgroups, property (τ\tau) is inherited to the lattice of subgroups generated by the family. On the other hand, we show that for families of normal subgroups of finite index, the above intersection property does hold. In fact, one can give explicite estimates on how the spectral gap changes when passing to the intersection. Our results also have an interesting graph theoretical consequence that does not use the language of groups. Namely, we show that an expander covering tower of finite regular graphs is either bipartite or stays bounded away from being bipartite in the normalized edge distance.Comment: Corrections made based on the referee's comment

    Compressed Sensing Using Binary Matrices of Nearly Optimal Dimensions

    Get PDF
    In this paper, we study the problem of compressed sensing using binary measurement matrices and 1\ell_1-norm minimization (basis pursuit) as the recovery algorithm. We derive new upper and lower bounds on the number of measurements to achieve robust sparse recovery with binary matrices. We establish sufficient conditions for a column-regular binary matrix to satisfy the robust null space property (RNSP) and show that the associated sufficient conditions % sparsity bounds for robust sparse recovery obtained using the RNSP are better by a factor of (33)/22.6(3 \sqrt{3})/2 \approx 2.6 compared to the sufficient conditions obtained using the restricted isometry property (RIP). Next we derive universal \textit{lower} bounds on the number of measurements that any binary matrix needs to have in order to satisfy the weaker sufficient condition based on the RNSP and show that bipartite graphs of girth six are optimal. Then we display two classes of binary matrices, namely parity check matrices of array codes and Euler squares, which have girth six and are nearly optimal in the sense of almost satisfying the lower bound. In principle, randomly generated Gaussian measurement matrices are "order-optimal". So we compare the phase transition behavior of the basis pursuit formulation using binary array codes and Gaussian matrices and show that (i) there is essentially no difference between the phase transition boundaries in the two cases and (ii) the CPU time of basis pursuit with binary matrices is hundreds of times faster than with Gaussian matrices and the storage requirements are less. Therefore it is suggested that binary matrices are a viable alternative to Gaussian matrices for compressed sensing using basis pursuit. \end{abstract}Comment: 28 pages, 3 figures, 5 table

    Benchmarks for Parity Games (extended version)

    Full text link
    We propose a benchmark suite for parity games that includes all benchmarks that have been used in the literature, and make it available online. We give an overview of the parity games, including a description of how they have been generated. We also describe structural properties of parity games, and using these properties we show that our benchmarks are representative. With this work we provide a starting point for further experimentation with parity games.Comment: The corresponding tool and benchmarks are available from https://github.com/jkeiren/paritygame-generator. This is an extended version of the paper that has been accepted for FSEN 201

    Generation of cubic graphs and snarks with large girth

    Full text link
    We describe two new algorithms for the generation of all non-isomorphic cubic graphs with girth at least k5k\ge 5 which are very efficient for 5k75\le k \le 7 and show how these algorithms can be efficiently restricted to generate snarks with girth at least kk. Our implementation of these algorithms is more than 30, respectively 40 times faster than the previously fastest generator for cubic graphs with girth at least 6 and 7, respectively. Using these generators we have also generated all non-isomorphic snarks with girth at least 6 up to 38 vertices and show that there are no snarks with girth at least 7 up to 42 vertices. We present and analyse the new list of snarks with girth 6.Comment: 27 pages (including appendix
    corecore