1,895 research outputs found

    HR: A System for Machine Discovery in Finite Algebras

    Get PDF
    We describe the HR concept formation program which invents mathematical definitions and conjectures in finite algebras such as group theory and ring theory. We give the methods behind and the reasons for the concept formation in HR, an evaluation of its performance in its training domain, group theory, and a look at HR in domains other than group theory

    The glass coffin: gothic adaptations and the formation of sexual subjectivity.

    Get PDF
    It is now an almost foregone conclusion that classic depictions of vampirism resonate with contemporary queer audiences. A sympathetic response to the monster’s persecution is often the key factor in these arguments, yet little attention is paid to the textual details that prompt such a process of identification. This study posits that the iconography used to establish a connection between monstrosity and non-normative sexuality has its origins in Victorian Gothic fiction, whose descriptions of vampirism were assimilated into the discourse of the fin-de-siècle medical field known as sexology. Theories that defined homosexuality as an illness with physical and psychological symptoms in turn influenced Late Victorian vampire literature and its translation into twentieth-century cinematic and televisual content. An analysis of these adaptations shows how a readily accessible assemblage of grotesque Gothic symbology and popular scientific ideology help constitute a secure space for exploring queer identity I have termed the “glass coffin.

    Reallocation Problems in Scheduling

    Full text link
    In traditional on-line problems, such as scheduling, requests arrive over time, demanding available resources. As each request arrives, some resources may have to be irrevocably committed to servicing that request. In many situations, however, it may be possible or even necessary to reallocate previously allocated resources in order to satisfy a new request. This reallocation has a cost. This paper shows how to service the requests while minimizing the reallocation cost. We focus on the classic problem of scheduling jobs on a multiprocessor system. Each unit-size job has a time window in which it can be executed. Jobs are dynamically added and removed from the system. We provide an algorithm that maintains a valid schedule, as long as a sufficiently feasible schedule exists. The algorithm reschedules only a total number of O(min{log^* n, log^* Delta}) jobs for each job that is inserted or deleted from the system, where n is the number of active jobs and Delta is the size of the largest window.Comment: 9 oages, 1 table; extended abstract version to appear in SPAA 201

    Automatic Invention of Integer Sequences

    Get PDF
    We report on the application of the HR program (Colton, Bundy, & Walsh 1999) to the problem of automatically inventing integer sequences. Seventeen sequences invented by HR are interesting enough to have been accepted into the Encyclopedia of Integer Sequences (Sloane 2000) and all were supplied with interesting conjectures about their nature, also discovered by HR. By extending HR, we have enabled it to perform a two stage process of invention and investigation. This involves generating both the definition and terms of a new sequence, relating it to sequences already in the Encyclopedia and pruning the output to help identify the most surprising and interesting results

    Lower Bounds for Structuring Unreliable Radio Networks

    Full text link
    In this paper, we study lower bounds for randomized solutions to the maximal independent set (MIS) and connected dominating set (CDS) problems in the dual graph model of radio networks---a generalization of the standard graph-based model that now includes unreliable links controlled by an adversary. We begin by proving that a natural geographic constraint on the network topology is required to solve these problems efficiently (i.e., in time polylogarthmic in the network size). We then prove the importance of the assumption that nodes are provided advance knowledge of their reliable neighbors (i.e, neighbors connected by reliable links). Combined, these results answer an open question by proving that the efficient MIS and CDS algorithms from [Censor-Hillel, PODC 2011] are optimal with respect to their dual graph model assumptions. They also provide insight into what properties of an unreliable network enable efficient local computation.Comment: An extended abstract of this work appears in the 2014 proceedings of the International Symposium on Distributed Computing (DISC

    Compressive Inverse Scattering II. SISO Measurements with Born scatterers

    Full text link
    Inverse scattering methods capable of compressive imaging are proposed and analyzed. The methods employ randomly and repeatedly (multiple-shot) the single-input-single-output (SISO) measurements in which the probe frequencies, the incident and the sampling directions are related in a precise way and are capable of recovering exactly scatterers of sufficiently low sparsity. For point targets, various sampling techniques are proposed to transform the scattering matrix into the random Fourier matrix. The results for point targets are then extended to the case of localized extended targets by interpolating from grid points. In particular, an explicit error bound is derived for the piece-wise constant interpolation which is shown to be a practical way of discretizing localized extended targets and enabling the compressed sensing techniques. For distributed extended targets, the Littlewood-Paley basis is used in analysis. A specially designed sampling scheme then transforms the scattering matrix into a block-diagonal matrix with each block being the random Fourier matrix corresponding to one of the multiple dyadic scales of the extended target. In other words by the Littlewood-Paley basis and the proposed sampling scheme the different dyadic scales of the target are decoupled and therefore can be reconstructed scale-by-scale by the proposed method. Moreover, with probes of any single frequency \om the coefficients in the Littlewood-Paley expansion for scales up to \om/(2\pi) can be exactly recovered.Comment: Add a new section (Section 3) on localized extended target

    Determining the shape of defects in non-absorbing inhomogeneous media from far-field measurements

    Get PDF
    International audienceWe consider non-absorbing inhomogeneous media represented by some refraction index. We have developed a method to reconstruct, from far-field measurements, the shape of the areas where the actual index differs from a reference index. Following the principle of the Factorization Method, we present a fast reconstruction algorithm relying on far field measurements and near field values, easily computed from the reference index. Our reconstruction result is illustrated by several numerical test cases
    • …
    corecore