7,232 research outputs found

    Reflections on Human Suffering

    Get PDF

    Some Communication Complexity Results and their Applications

    Get PDF
    Communication Complexity represents one of the premier techniques for proving lower bounds in theoretical computer science. Lower bounds on communication problems can be leveraged to prove lower bounds in several different areas. In this work, we study three different communication complexity problems. The lower bounds for these problems have applications in circuit complexity, wireless sensor networks, and streaming algorithms. First, we study the multiparty pointer jumping problem. We present the first nontrivial upper bound for this problem. We also provide a suite of strong lower bounds under several restricted classes of protocols. Next, we initiate the study of several non-monotone functions in the distributed functional monitoring setting and provide several lower bounds. In particular, we give a generic adversarial technique and show that when deletions are allowed, no nontrivial protocol is possible. Finally, we study the Gap-Hamming-Distance problem and give tight lower bounds for protocols that use a constant number of messages. As a result, we take a well-known lower bound for one-pass streaming algorithms for a host of problems and extend it so it applies to streaming algorithms that use a constant number of passes

    The Legal Aspects of Oil Shale Development [outline]

    Get PDF
    5 pages

    Geometric Phase and Modulo Relations for Probability Amplitudes as Functions on Complex Parameter Spaces

    Full text link
    We investigate general differential relations connecting the respective behavior s of the phase and modulo of probability amplitudes of the form \amp{\psi_f}{\psi}, where ∣ψf⟩\ket{\psi_f} is a fixed state in Hilbert space and ∣ψ⟩\ket{\psi} is a section of a holomorphic line bundle over some complex parameter space. Amplitude functions on such bundles, while not strictly holomorphic, nevertheless satisfy generalized Cauchy-Riemann conditions involving the U(1) Berry-Simon connection on the parameter space. These conditions entail invertible relations between the gradients of the phase and modulo, therefore allowing for the reconstruction of the phase from the modulo (or vice-versa) and other conditions on the behavior of either polar component of the amplitude. As a special case, we consider amplitude functions valued on the space of pure states, the ray space R=CPn{\cal R} = {\mathbb C}P^n, where transition probabilities have a geometric interpretation in terms of geodesic distances as measured with the Fubini-Study metric. In conjunction with the generalized Cauchy-Riemann conditions, this geodesic interpretation leads to additional relations, in particular a novel connection between the modulus of the amplitude and the phase gradient, somewhat reminiscent of the WKB formula. Finally, a connection with geometric phases is established.Comment: 11 pages, 1 figure, revtex

    A Historical Review of Affirmative Action and the Interpretation of Its Legislative Intent by the Supreme Court

    Get PDF
    In Part I, I will discuss the history of pre-affirmative action programs. This involves an analysis of the original intent of the Fourteenth Amendment, its related remedial legislation, as well as several of the New Deal Acts prohibiting employment discrimination. Part II will analyze the advent of affirmative action, from its inception with the 1957 and 1960 Civil Rights Acts, and trace its development through Executive Orders 12250 and 12259, which constitute the last major expansion in affirmative action doctrine. Part III will examine the period between 1978 and 1991, where the Supreme Court\u27s attempts to find a consistent interpretation of the Equal Protection Clause and the level of scrutiny applicable to affirmative action programs will be addressed. Part IV will examine Adarand, and the reasoning behind the decision. Finally, I will conclude with the direction courts should take in future cases involving affirmative action programs

    Decoding the Encoding of Functional Brain Networks: an fMRI Classification Comparison of Non-negative Matrix Factorization (NMF), Independent Component Analysis (ICA), and Sparse Coding Algorithms

    Full text link
    Brain networks in fMRI are typically identified using spatial independent component analysis (ICA), yet mathematical constraints such as sparse coding and positivity both provide alternate biologically-plausible frameworks for generating brain networks. Non-negative Matrix Factorization (NMF) would suppress negative BOLD signal by enforcing positivity. Spatial sparse coding algorithms (L1L1 Regularized Learning and K-SVD) would impose local specialization and a discouragement of multitasking, where the total observed activity in a single voxel originates from a restricted number of possible brain networks. The assumptions of independence, positivity, and sparsity to encode task-related brain networks are compared; the resulting brain networks for different constraints are used as basis functions to encode the observed functional activity at a given time point. These encodings are decoded using machine learning to compare both the algorithms and their assumptions, using the time series weights to predict whether a subject is viewing a video, listening to an audio cue, or at rest, in 304 fMRI scans from 51 subjects. For classifying cognitive activity, the sparse coding algorithm of L1L1 Regularized Learning consistently outperformed 4 variations of ICA across different numbers of networks and noise levels (p<<0.001). The NMF algorithms, which suppressed negative BOLD signal, had the poorest accuracy. Within each algorithm, encodings using sparser spatial networks (containing more zero-valued voxels) had higher classification accuracy (p<<0.001). The success of sparse coding algorithms may suggest that algorithms which enforce sparse coding, discourage multitasking, and promote local specialization may capture better the underlying source processes than those which allow inexhaustible local processes such as ICA
    • …
    corecore