168,627 research outputs found

    Traveling Wave Solutions of a Reaction-Diffusion Equation with State-Dependent Delay

    Full text link
    This paper is concerned with the traveling wave solutions of a reaction-diffusion equation with state-dependent delay. When the birth function is monotone, the existence and nonexistence of monotone traveling wave solutions are established. When the birth function is not monotone, the minimal wave speed of nontrivial traveling wave solutions is obtained. The results are proved by the construction of upper and lower solutions and application of the fixed point theorem

    A Helly-type theorem for semi-monotone sets and monotone maps

    Full text link
    We consider sets and maps defined over an o-minimal structure over the reals, such as real semi-algebraic or subanalytic sets. A {\em monotone map} is a multi-dimensional generalization of a usual univariate monotone function, while the closure of the graph of a monotone map is a generalization of a compact convex set. In a particular case of an identically constant function, such a graph is called a {\em semi-monotone set}. Graphs of monotone maps are, generally, non-convex, and their intersections, unlike intersections of convex sets, can be topologically complicated. In particular, such an intersection is not necessarily the graph of a monotone map. Nevertheless, we prove a Helly-type theorem, which says that for a finite family of subsets of \Real^n, if all intersections of subfamilies, with cardinalities at most n+1n+1, are non-empty and graphs of monotone maps, then the intersection of the whole family is non-empty and the graph of a monotone map.Comment: 7 pages. Minor corrections. Final version to appear in Discrete and Computational Geometr

    Secret-Sharing for NP

    Get PDF
    A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset of parties cannot efficiently learn anything about the secret. The collection of "qualified" subsets is defined by a Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing schemes. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in P). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in NP: In order to reconstruct the secret a set of parties must be "qualified" and provide a witness attesting to this fact. Recently, Garg et al. (STOC 2013) put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement "x in L" for a language L in NP such that anyone holding a witness to the statement can decrypt the message, however, if x is not in L, then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in NP assuming witness encryption for NP and one-way functions. As a consequence we get a completeness theorem for secret-sharing: computational secret-sharing scheme for any single monotone NP-complete function implies a computational secret-sharing scheme for every monotone function in NP

    Resilient Monotone Submodular Function Maximization

    Full text link
    In this paper, we focus on applications in machine learning, optimization, and control that call for the resilient selection of a few elements, e.g. features, sensors, or leaders, against a number of adversarial denial-of-service attacks or failures. In general, such resilient optimization problems are hard, and cannot be solved exactly in polynomial time, even though they often involve objective functions that are monotone and submodular. Notwithstanding, in this paper we provide the first scalable, curvature-dependent algorithm for their approximate solution, that is valid for any number of attacks or failures, and which, for functions with low curvature, guarantees superior approximation performance. Notably, the curvature has been known to tighten approximations for several non-resilient maximization problems, yet its effect on resilient maximization had hitherto been unknown. We complement our theoretical analyses with supporting empirical evaluations.Comment: Improved suboptimality guarantees on proposed algorithm and corrected typo on Algorithm 1's statemen

    Polynomiality of monotone Hurwitz numbers in higher genera

    Full text link
    Hurwitz numbers count branched covers of the Riemann sphere with specified ramification, or equivalently, transitive permutation factorizations in the symmetric group with specified cycle types. Monotone Hurwitz numbers count a restricted subset of these branched covers, related to the expansion of complete symmetric functions in the Jucys-Murphy elements, and have arisen in recent work on the the asymptotic expansion of the Harish-Chandra-Itzykson-Zuber integral. In previous work we gave an explicit formula for monotone Hurwitz numbers in genus zero. In this paper we consider monotone Hurwitz numbers in higher genera, and prove a number of results that are reminiscent of those for classical Hurwitz numbers. These include an explicit formula for monotone Hurwitz numbers in genus one, and an explicit form for the generating function in arbitrary positive genus. From the form of the generating function we are able to prove that monotone Hurwitz numbers exhibit a polynomiality that is reminiscent of that for the classical Hurwitz numbers, i.e., up to a specified combinatorial factor, the monotone Hurwitz number in genus g with ramification specified by a given partition is a polynomial indexed by g in the parts of the partition.Comment: 23 page

    Generalized Forward-Backward Splitting with Penalization for Monotone Inclusion Problems

    Full text link
    We introduce a generalized forward-backward splitting method with penalty term for solving monotone inclusion problems involving the sum of a finite number of maximally monotone operators and the normal cone to the nonempty set of zeros of another maximal monotone operator. We show weak ergodic convergence of the generated sequence of iterates to a solution of the considered monotone inclusion problem, provided the condition corresponded to the Fitzpatrick function of the operator describing the set of the normal cone is fulfilled. Under strong monotonicity of an operator, we show strong convergence of the iterates. Furthermore, we utilize the proposed method for minimizing a large-scale hierarchical minimization problem concerning the sum of differentiable and nondifferentiable convex functions subject to the set of minima of another differentiable convex function. We illustrate the functionality of the method through numerical experiments addressing constrained elastic net and generalized Heron location problems
    corecore