108 research outputs found

    Deformed Kazhdan-Lusztig elements and Macdonald polynomials

    Full text link
    We introduce deformations of Kazhdan-Lusztig elements and specialised nonsymmetric Macdonald polynomials, both of which form a distinguished basis of the polynomial representation of a maximal parabolic subalgebra of the Hecke algebra. We give explicit integral formula for these polynomials, and explicitly describe the transition matrices between classes of polynomials. We further develop a combinatorial interpretation of homogeneous evaluations using an expansion in terms of Schubert polynomials in the deformation parameters.Comment: major revision, 29 pages, 22 eps figure

    Tracking the effects of interactions on spinons in gapless Heisenberg chains

    Get PDF
    We consider the effects of interactions on spinon excitations in Heisenberg spin-1/2 chains. We compute the exact two-spinon part of the longitudinal structure factor of the infinite chain in zero field for all values of anisotropy in the gapless antiferromagnetic regime, via an exact algebraic approach. Our results allow us to quantitatively describe the behavior of these fundamental excitations throughout the observable continuum, for cases ranging from free to fully coupled chains, thereby explicitly mapping the effects of "turning on the interactions" in a strongly correlated system

    Efficient, noise-tolerant, and private learning via boosting

    Full text link
    We introduce a simple framework for designing private boosting algorithms. We give natural conditions under which these algorithms are differentially private, efficient, and noise-tolerant PAC learners. To demonstrate our framework, we use it to construct noise-tolerant and private PAC learners for large-margin halfspaces whose sample complexity does not depend on the dimension. We give two sample complexity bounds for our large-margin halfspace learner. One bound is based only on differential privacy, and uses this guarantee as an asset for ensuring generalization. This first bound illustrates a general methodology for obtaining PAC learners from privacy, which may be of independent interest. The second bound uses standard techniques from the theory of large-margin classification (the fat-shattering dimension) to match the best known sample complexity for differentially private learning of large-margin halfspaces, while additionally tolerating random label noise.https://arxiv.org/pdf/2002.01100.pd

    Securing Approximate Homomorphic Encryption Using Differential Privacy

    Get PDF
    Recent work of Li and Micciancio (Eurocrypt 2021) has shown that the traditional formulation of indistinguishability under chosen plaintext attack (INDCPA) is not adequate to capture the security of approximate homomorphic encryption against passive adversaries, and identified a stronger INDCPA^D security definition (INDCPA with decryption oracles) as the appropriate security target for approximate encryption schemes. We show how to any approximate homomorphic encryption scheme achieving the weak INDCPA security definition, into one which is provably INDCPA^D secure, offering strong guarantees against realistic passive attacks. The method works by post-processing the output of the decryption function with a mechanism satisfying an appropriate notion of differential privacy (DP), adding an amount of noise tailored to the worst-case error growth of the homomorphic computation. We apply these results to the approximate homomorphic encryption scheme of Cheon, Kim, Kim, and Song (CKKS, Asiacrypt 2017), proving that adding Gaussian noise to the output of CKKS decryption suffices to achieve INDCPA^D security. We precisely quantify how much Gaussian noise must be added by proving nearly matching upper and lower bounds, showing that one cannot hope to significantly reduce the amount of noise added in this post-processing step. As an additional contribution, we present and use a finer-grained definition of bit security that distinguishes between a computational security parameter (c) and a statistical one (s). Based on our upper and lower bounds, we propose parameters for the counter-measures recently adopted by open-source libraries implementing CKKS. Lastly, we investigate the plausible claim that smaller DP noise parameters might suffice to achieve INDCPA^D-security for schemes supporting more accurate (dynamic, key dependent) estimates of ciphertext noise during decryption. Perhaps surprisingly, we show that this claim is false, and that DP mechanisms with noise parameters tailored to the error present in a given ciphertext, rather than worst-case error, are vulnerable to INDCPA^D attacks

    Stability is Stable: Connections between Replicability, Privacy, and Adaptive Generalization

    Get PDF
    The notion of replicable algorithms was introduced in Impagliazzo et al. [STOC '22] to describe randomized algorithms that are stable under the resampling of their inputs. More precisely, a replicable algorithm gives the same output with high probability when its randomness is fixed and it is run on a new i.i.d. sample drawn from the same distribution. Using replicable algorithms for data analysis can facilitate the verification of published results by ensuring that the results of an analysis will be the same with high probability, even when that analysis is performed on a new data set. In this work, we establish new connections and separations between replicability and standard notions of algorithmic stability. In particular, we give sample-efficient algorithmic reductions between perfect generalization, approximate differential privacy, and replicability for a broad class of statistical problems. Conversely, we show any such equivalence must break down computationally: there exist statistical problems that are easy under differential privacy, but that cannot be solved replicably without breaking public-key cryptography. Furthermore, these results are tight: our reductions are statistically optimal, and we show that any computational separation between DP and replicability must imply the existence of one-way functions. Our statistical reductions give a new algorithmic framework for translating between notions of stability, which we instantiate to answer several open questions in replicability and privacy. This includes giving sample-efficient replicable algorithms for various PAC learning, distribution estimation, and distribution testing problems, algorithmic amplification of δ\delta in approximate DP, conversions from item-level to user-level privacy, and the existence of private agnostic-to-realizable learning reductions under structured distributions.Comment: STOC 2023, minor typos fixe

    Effect of skin tone on the accuracy of the estimation of arterial oxygen saturation by pulse oximetry: a systematic review

    Get PDF
    BACKGROUND: Pulse oximetry-derived oxygen saturation (SpO2) is an estimate of true arterial oxygen saturation (SaO2). The aim of this review was to evaluate available evidence determining the effect of skin tone on the ability of pulse oximeters to accurately estimate SaO2. METHODS: Published literature was screened to identify clinical and non-clinical studies enrolling adults and children when SpO2 was compared with a paired co-oximetry SaO2 value. We searched literature databases from their inception to March 20, 2023. Risk of bias (RoB) was assessed using the QUADAS-2 tool. Certainty of assessment was evaluated using the GRADE tool. RESULTS: Forty-four studies were selected reporting on at least 222 644 participants (6121 of whom were children) and 733 722 paired SpO2-SaO2 measurements. Methodologies included laboratory studies, prospective clinical, and retrospective clinical studies. A high RoB was detected in 64% of studies and there was considerable heterogeneity in study design, data analysis, and reporting metrics. Only 11 (25%) studies measured skin tone in 2353 (1.1%) participants; the remainder reported participant ethnicity: 68 930 (31.0%) participants were of non-White ethnicity or had non-light skin tones. The majority of studies reported overestimation of SaO2 by pulse oximetry in participants with darker skin tones or from ethnicities assumed to have darker skin tones. Several studies reported no inaccuracy related to skin tone. Meta-analysis of the data was not possible. CONCLUSIONS: Pulse oximetry can overestimate true SaO2 in people with darker skin tones. The clinical relevance of this bias remains unclear, but its magnitude is likely to be greater when SaO2 is lower. SYSTEMATIC REVIEW PROTOCOL: International Prospective Register of Systematic Reviews (PROSPERO): CRD42023390723

    Relaxation rate of the reverse biased asymmetric exclusion process

    Full text link
    We compute the exact relaxation rate of the partially asymmetric exclusion process with open boundaries, with boundary rates opposing the preferred direction of flow in the bulk. This reverse bias introduces a length scale in the system, at which we find a crossover between exponential and algebraic relaxation on the coexistence line. Our results follow from a careful analysis of the Bethe ansatz root structure.Comment: 22 pages, 12 figure

    Complex WKB Analysis of a PT Symmetric Eigenvalue Problem

    Full text link
    The spectra of a particular class of PT symmetric eigenvalue problems has previously been studied, and found to have an extremely rich structure. In this paper we present an explanation for these spectral properties in terms of quantisation conditions obtained from the complex WKB method. In particular, we consider the relation of the quantisation conditions to the reality and positivity properties of the eigenvalues. The methods are also used to examine further the pattern of eigenvalue degeneracies observed by Dorey et al. in [1,2].Comment: 22 pages, 13 figures. Added references, minor revision
    • …
    corecore