26,685 research outputs found

    Fractal time random walk and subrecoil laser cooling considered as renewal processes with infinite mean waiting times

    Full text link
    There exist important stochastic physical processes involving infinite mean waiting times. The mean divergence has dramatic consequences on the process dynamics. Fractal time random walks, a diffusion process, and subrecoil laser cooling, a concentration process, are two such processes that look qualitatively dissimilar. Yet, a unifying treatment of these two processes, which is the topic of this pedagogic paper, can be developed by combining renewal theory with the generalized central limit theorem. This approach enables to derive without technical difficulties the key physical properties and it emphasizes the role of the behaviour of sums with infinite means.Comment: 9 pages, 7 figures, to appear in the Proceedings of Cargese Summer School on "Chaotic dynamics and transport in classical and quantum systems

    Ising Model Observables and Non-Backtracking Walks

    Full text link
    This paper presents an alternative proof of the connection between the partition function of the Ising model on a finite graph GG and the set of non-backtracking walks on GG. The techniques used also give formulas for spin-spin correlation functions in terms of non-backtracking walks. The main tools used are Viennot's theory of heaps of pieces and turning numbers on surfaces.Comment: 33 pages, 11 figures. Typos and errors corrected, exposition improved, results unchange

    The boundary action of a sofic random subgroup of the free group

    Full text link
    We prove that the boundary action of a sofic random subgroup of a finitely generated free group is conservative. This addresses a question asked by Grigorchuk, Kaimanovich, and Nagnibeda, who studied the boundary actions of individual subgroups of the free group. Following their work, we also investigate the cogrowth and various limit sets associated to sofic random subgroups. We make heavy use of the correspondence between subgroups and their Schreier graphs, and central to our approach is an investigation of the asymptotic density of a given set inside of large neighborhoods of the root of a sofic random Schreier graph.Comment: 21 pages, 2 figures, made minor corrections, to appear in Groups, Geometry, and Dynamic

    Finite size effect of harmonic measure estimation in a DLA model: Variable size of probe particles

    Full text link
    A finite size effect in the probing of the harmonic measure in simulation of diffusion-limited aggregation (DLA) growth is investigated. We introduce a variable size of probe particles, to estimate harmonic measure and extract the fractal dimension of DLA clusters taking two limits, of vanishingly small probe particle size and of infinitely large size of a DLA cluster. We generate 1000 DLA clusters consisting of 50 million particles each, using an off-lattice killing-free algorithm developed in the early work. The introduced method leads to unprecedented accuracy in the estimation of the fractal dimension. We discuss the variation of the probability distribution function with the size of probing particles

    Exact Solution for the Time Evolution of Network Rewiring Models

    Full text link
    We consider the rewiring of a bipartite graph using a mixture of random and preferential attachment. The full mean field equations for the degree distribution and its generating function are given. The exact solution of these equations for all finite parameter values at any time is found in terms of standard functions. It is demonstrated that these solutions are an excellent fit to numerical simulations of the model. We discuss the relationship between our model and several others in the literature including examples of Urn, Backgammon, and Balls-in-Boxes models, the Watts and Strogatz rewiring problem and some models of zero range processes. Our model is also equivalent to those used in various applications including cultural transmission, family name and gene frequencies, glasses, and wealth distributions. Finally some Voter models and an example of a Minority game also show features described by our model.Comment: This version contains a few footnotes not in published Phys.Rev.E versio

    Solving multivariate polynomial systems and an invariant from commutative algebra

    Get PDF
    The complexity of computing the solutions of a system of multivariate polynomial equations by means of Gr\"obner bases computations is upper bounded by a function of the solving degree. In this paper, we discuss how to rigorously estimate the solving degree of a system, focusing on systems arising within public-key cryptography. In particular, we show that it is upper bounded by, and often equal to, the Castelnuovo Mumford regularity of the ideal generated by the homogenization of the equations of the system, or by the equations themselves in case they are homogeneous. We discuss the underlying commutative algebra and clarify under which assumptions the commonly used results hold. In particular, we discuss the assumption of being in generic coordinates (often required for bounds obtained following this type of approach) and prove that systems that contain the field equations or their fake Weil descent are in generic coordinates. We also compare the notion of solving degree with that of degree of regularity, which is commonly used in the literature. We complement the paper with some examples of bounds obtained following the strategy that we describe

    Stopping time signatures for some algorithms in cryptography

    Get PDF
    We consider the normalized distribution of the overall running times of some cryptographic algorithms, and what information they reveal about the algorithms. Recent work of Deift, Menon, Olver, Pfrang, and Trogdon has shown that certain numerical algorithms applied to large random matrices exhibit a characteristic distribution of running times, which depends only on the algorithm but are independent of the choice of probability distributions for the matrices. Different algorithms often exhibit different running time distributions, and so the histograms for these running time distributions provide a time-signature for the algorithms, making it possible, in many cases, to distinguish one algorithm from another. In this paper we extend this analysis to cryptographic algorithms, and present examples of such algorithms with time-signatures that are indistinguishable, and others with time-signatures that are clearly distinct.Comment: 20 page

    A low-memory parallel version of Matsuo, Chao and Tsujii's algorithm

    No full text
    International audienceWe present an algorithm based on the birthday paradox, which is a low-memory parallel counterpart to the algorithm of Matsuo, Chao and Tsujii. This algorithm computes the group order of the Jacobian of a genus 2 curve over a finite field for which the characteristic polynomial of the Frobenius endomorphism is known modulo some integer. The main tool is a 2-dimensional pseudo-random walk that allows to heuristically choose random elements in a 2-dimensional space. We analyze the expected running time based on heuristics that we validate by computer experiments. Compared with the original algorithm by Matsuo, Chao and Tsujii, we lose a factor of about 3 in running time, but the memory requirement drops from several GB to almost nothing. Our method is general and can be applied in other contexts to transform a baby-step giant-step approach into a low memory algorithm
    corecore