168,627 research outputs found
Traveling Wave Solutions of a Reaction-Diffusion Equation with State-Dependent Delay
This paper is concerned with the traveling wave solutions of a
reaction-diffusion equation with state-dependent delay. When the birth function
is monotone, the existence and nonexistence of monotone traveling wave
solutions are established. When the birth function is not monotone, the minimal
wave speed of nontrivial traveling wave solutions is obtained. The results are
proved by the construction of upper and lower solutions and application of the
fixed point theorem
A Helly-type theorem for semi-monotone sets and monotone maps
We consider sets and maps defined over an o-minimal structure over the reals,
such as real semi-algebraic or subanalytic sets. A {\em monotone map} is a
multi-dimensional generalization of a usual univariate monotone function, while
the closure of the graph of a monotone map is a generalization of a compact
convex set. In a particular case of an identically constant function, such a
graph is called a {\em semi-monotone set}. Graphs of monotone maps are,
generally, non-convex, and their intersections, unlike intersections of convex
sets, can be topologically complicated. In particular, such an intersection is
not necessarily the graph of a monotone map. Nevertheless, we prove a
Helly-type theorem, which says that for a finite family of subsets of
\Real^n, if all intersections of subfamilies, with cardinalities at most
, are non-empty and graphs of monotone maps, then the intersection of the
whole family is non-empty and the graph of a monotone map.Comment: 7 pages. Minor corrections. Final version to appear in Discrete and
Computational Geometr
Secret-Sharing for NP
A computational secret-sharing scheme is a method that enables a dealer, that
has a secret, to distribute this secret among a set of parties such that a
"qualified" subset of parties can efficiently reconstruct the secret while any
"unqualified" subset of parties cannot efficiently learn anything about the
secret. The collection of "qualified" subsets is defined by a Boolean function.
It has been a major open problem to understand which (monotone) functions can
be realized by a computational secret-sharing schemes. Yao suggested a method
for secret-sharing for any function that has a polynomial-size monotone circuit
(a class which is strictly smaller than the class of monotone functions in P).
Around 1990 Rudich raised the possibility of obtaining secret-sharing for all
monotone functions in NP: In order to reconstruct the secret a set of parties
must be "qualified" and provide a witness attesting to this fact.
Recently, Garg et al. (STOC 2013) put forward the concept of witness
encryption, where the goal is to encrypt a message relative to a statement "x
in L" for a language L in NP such that anyone holding a witness to the
statement can decrypt the message, however, if x is not in L, then it is
computationally hard to decrypt. Garg et al. showed how to construct several
cryptographic primitives from witness encryption and gave a candidate
construction.
One can show that computational secret-sharing implies witness encryption for
the same language. Our main result is the converse: we give a construction of a
computational secret-sharing scheme for any monotone function in NP assuming
witness encryption for NP and one-way functions. As a consequence we get a
completeness theorem for secret-sharing: computational secret-sharing scheme
for any single monotone NP-complete function implies a computational
secret-sharing scheme for every monotone function in NP
Resilient Monotone Submodular Function Maximization
In this paper, we focus on applications in machine learning, optimization,
and control that call for the resilient selection of a few elements, e.g.
features, sensors, or leaders, against a number of adversarial
denial-of-service attacks or failures. In general, such resilient optimization
problems are hard, and cannot be solved exactly in polynomial time, even though
they often involve objective functions that are monotone and submodular.
Notwithstanding, in this paper we provide the first scalable,
curvature-dependent algorithm for their approximate solution, that is valid for
any number of attacks or failures, and which, for functions with low curvature,
guarantees superior approximation performance. Notably, the curvature has been
known to tighten approximations for several non-resilient maximization
problems, yet its effect on resilient maximization had hitherto been unknown.
We complement our theoretical analyses with supporting empirical evaluations.Comment: Improved suboptimality guarantees on proposed algorithm and corrected
typo on Algorithm 1's statemen
Polynomiality of monotone Hurwitz numbers in higher genera
Hurwitz numbers count branched covers of the Riemann sphere with specified
ramification, or equivalently, transitive permutation factorizations in the
symmetric group with specified cycle types. Monotone Hurwitz numbers count a
restricted subset of these branched covers, related to the expansion of
complete symmetric functions in the Jucys-Murphy elements, and have arisen in
recent work on the the asymptotic expansion of the
Harish-Chandra-Itzykson-Zuber integral. In previous work we gave an explicit
formula for monotone Hurwitz numbers in genus zero. In this paper we consider
monotone Hurwitz numbers in higher genera, and prove a number of results that
are reminiscent of those for classical Hurwitz numbers. These include an
explicit formula for monotone Hurwitz numbers in genus one, and an explicit
form for the generating function in arbitrary positive genus. From the form of
the generating function we are able to prove that monotone Hurwitz numbers
exhibit a polynomiality that is reminiscent of that for the classical Hurwitz
numbers, i.e., up to a specified combinatorial factor, the monotone Hurwitz
number in genus g with ramification specified by a given partition is a
polynomial indexed by g in the parts of the partition.Comment: 23 page
Generalized Forward-Backward Splitting with Penalization for Monotone Inclusion Problems
We introduce a generalized forward-backward splitting method with penalty
term for solving monotone inclusion problems involving the sum of a finite
number of maximally monotone operators and the normal cone to the nonempty set
of zeros of another maximal monotone operator. We show weak ergodic convergence
of the generated sequence of iterates to a solution of the considered monotone
inclusion problem, provided the condition corresponded to the Fitzpatrick
function of the operator describing the set of the normal cone is fulfilled.
Under strong monotonicity of an operator, we show strong convergence of the
iterates. Furthermore, we utilize the proposed method for minimizing a
large-scale hierarchical minimization problem concerning the sum of
differentiable and nondifferentiable convex functions subject to the set of
minima of another differentiable convex function. We illustrate the
functionality of the method through numerical experiments addressing
constrained elastic net and generalized Heron location problems
- …
