1,803 research outputs found

    High-dimensional Sparse Inverse Covariance Estimation using Greedy Methods

    Full text link
    In this paper we consider the task of estimating the non-zero pattern of the sparse inverse covariance matrix of a zero-mean Gaussian random vector from a set of iid samples. Note that this is also equivalent to recovering the underlying graph structure of a sparse Gaussian Markov Random Field (GMRF). We present two novel greedy approaches to solving this problem. The first estimates the non-zero covariates of the overall inverse covariance matrix using a series of global forward and backward greedy steps. The second estimates the neighborhood of each node in the graph separately, again using greedy forward and backward steps, and combines the intermediate neighborhoods to form an overall estimate. The principal contribution of this paper is a rigorous analysis of the sparsistency, or consistency in recovering the sparsity pattern of the inverse covariance matrix. Surprisingly, we show that both the local and global greedy methods learn the full structure of the model with high probability given just O(dlog(p))O(d\log(p)) samples, which is a \emph{significant} improvement over state of the art 1\ell_1-regularized Gaussian MLE (Graphical Lasso) that requires O(d2log(p))O(d^2\log(p)) samples. Moreover, the restricted eigenvalue and smoothness conditions imposed by our greedy methods are much weaker than the strong irrepresentable conditions required by the 1\ell_1-regularization based methods. We corroborate our results with extensive simulations and examples, comparing our local and global greedy methods to the 1\ell_1-regularized Gaussian MLE as well as the Neighborhood Greedy method to that of nodewise 1\ell_1-regularized linear regression (Neighborhood Lasso).Comment: Accepted to AI STAT 2012 for Oral Presentatio

    Organize Cloud Data Access Privilege and Anonymity with Fully Nameless Attribute-Based Encryption

    Get PDF
    Cloud computing may be a computing ideas that allows once needed and low maintenance usage of resources, however the info is shares to some cloud servers and varied privacy connected issues emerge from it. Various schemes based on the Attribute-Based Encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy, but also the user identity privacy in existing access control schemes. Anony Control decentralizes the central authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-grained manner. Our security analysis shows that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility of our schemes

    Violent Hard X-ray Variability of Mrk 421 Observed by NuSTAR in 2013 April

    Full text link
    The well studied blazar Markarian 421 (Mrk 421, zz=0.031) was the subject of an intensive multi-wavelength campaign when it flared in 2013 April. The recorded X-ray and very high energy (VHE, E>>100 GeV) γ\gamma-ray fluxes are the highest ever measured from this object. At the peak of the activity, it was monitored by the hard X-ray focusing telescope {\it Nuclear Spectroscopic Telescope Array} ({\it NuSTAR}) and {\it Swift} X-Ray Telescope (XRT). In this work, we present a detailed variability analysis of {\it NuSTAR} and {\it Swift}-XRT observations of Mrk 421 during this flaring episode. We obtained the shortest flux doubling time of 14.01±\pm5.03 minutes, which is the shortest hard X-ray (3-79 keV) variability ever recorded from Mrk 421 and is on the order of the light crossing time of the black hole's event horizon. A pattern of extremely fast variability events superposed on slowly varying flares is found in most of the {\it NuSTAR} observations. We suggest that these peculiar variability patterns may be explained by magnetic energy dissipation and reconnection in a fast moving compact emission region within the jet. Based on the fast variability, we derive a lower limit on the magnetic field strength of B0.73δ12/3ν191/3B \ge 0.73 \delta_1^{-2/3} \, \nu_{19}^{1/3}~G, where δ1\delta_1 is the Doppler factor in units of 10, and ν19\nu_{19} is the characteristic X-ray synchrotron frequency in units of 101910^{19}~Hz.Comment: 23 pages, 5 figures, 2 tables, to appear in the Astrophysical Journa

    Stable and Metastable vortex states and the first order transition across the peak effect region in weakly pinned 2H-NbSe_2

    Get PDF
    The peak effect in weakly pinned superconductors is accompanied by metastable vortex states. Each metastable vortex configuration is characterized by a different critical current density J_c, which mainly depends on the past thermomagnetic history of the superconductor. A recent model [G. Ravikumar, et al, Phys. Rev. B 61, R6479 (2000)] proposed to explain the history dependent J_c postulates a stable state of vortex lattice with a critical current density J_c^{st}, determined uniquely by the field and temperature. In this paper, we present evidence for the existence of the stable state of the vortex lattice in the peak effect region of 2H-NbSe_2. It is shown that this stable state can be reached from any metastable vortex state by cycling the applied field by a small amplitude. The minor magnetization loops obtained by repeated field cycling allow us to determine the pinning and "equilibrium" properties of the stable state of the vortex lattice at a given field and temperature unambiguously. The data imply the occurence of a first order phase transition from an ordered phase to a disordered vortex phase across the peak effect.Comment: 20 pages, 10 figures. Corresponding author: S. Ramakrishna
    corecore