311 research outputs found
Information mobility in complex networks
The concept of information mobility in complex networks is introduced on the basis of a stochastic process taking place in the network. The transition matrix for this process represents the probability that the information arising at a given node is transferred to a target one. We use the fractional powers of this transition matrix to investigate the stochastic process at fractional time intervals. The mobility coefficient is then introduced on the basis of the trace of these fractional powers of the stochastic matrix. The fractional time at which a network diffuses 50% of the information contained in its nodes (1/ k50 ) is also introduced. We then show that the scale-free random networks display better spread of information than the non scale-free ones. We study 38 real-world networks and analyze their performance in spreading information from their nodes. We find that some real-world networks perform even better than the scale-free networks with the same average degree and we point out some of the structural parameters that make this possible
Radiating and non-radiating sources in elasticity
In this work, we study the inverse source problem of a fixed frequency for
the Navier's equation. We investigate that nonradiating external forces. If the
support of such a force has a convex or non-convex corner or edge on their
boundary, the force must be vanishing there. The vanishing property at corners
and edges holds also for sufficiently smooth transmission eigenfunctions in
elasticity. The idea originates from the enclosure method: The energy identity
and new type exponential solutions for the Navier's equation.Comment: 17 page
Local well-posedness and blow up in the energy space for a class of L2 critical dispersion generalized Benjamin-Ono equations
We consider a family of dispersion generalized Benjamin-Ono equations (dgBO)
which are critical with respect to the L2 norm and interpolate between the
critical modified (BO) equation and the critical generalized Korteweg-de Vries
equation (gKdV). First, we prove local well-posedness in the energy space for
these equations, extending results by Kenig, Ponce and Vega concerning the
(gKdV) equations. Second, we address the blow up problem in the spirit of works
of Martel and Merle on the critical (gKdV) equation, by studying rigidity
properties of the (dgBO) flow in a neighborhood of solitons. We prove that when
the model is close to critical (gKdV), solutions of negative energy close to
solitons blow up in finite or infinite time in the energy space. The blow up
proof requires in particular extensions to (dgBO) of monotonicity results for
localized versions of L2 norms by pseudo-differential operator tools.Comment: Submitte
Linear resolutions of powers and products
The goal of this paper is to present examples of families of homogeneous
ideals in the polynomial ring over a field that satisfy the following
condition: every product of ideals of the family has a linear free resolution.
As we will see, this condition is strongly correlated to good primary
decompositions of the products and good homological and arithmetical properties
of the associated multi-Rees algebras. The following families will be discussed
in detail: polymatroidal ideals, ideals generated by linear forms and Borel
fixed ideals of maximal minors. The main tools are Gr\"obner bases and Sagbi
deformation
Betti numbers for numerical semigroup rings
We survey results related to the magnitude of the Betti numbers of numerical
semigroup rings and of their tangent cones.Comment: 22 pages; v2: updated references. To appear in Multigraded Algebra
and Applications (V. Ene, E. Miller Eds.
Basic Module Theory over Non-Commutative Rings with Computational Aspects of Operator Algebras
The present text surveys some relevant situations and results where basic
Module Theory interacts with computational aspects of operator algebras. We
tried to keep a balance between constructive and algebraic aspects.Comment: To appear in the Proceedings of the AADIOS 2012 conference, to be
published in Lecture Notes in Computer Scienc
Adversarial Branch Architecture Search for Unsupervised Domain Adaptation
Unsupervised Domain Adaptation (UDA) is a key issue in visual recognition, as it allows to bridge different visual domains enabling robust performances in the real world. To date, all proposed approaches rely on human expertise to manually adapt a given UDA method (e.g. DANN) to a specific backbone architecture (e.g. ResNet). This dependency on handcrafted designs limits the applicability of a given approach in time, as old methods need to be constantly adapted to novel backbones.Existing Neural Architecture Search (NAS) approaches cannot be directly applied to mitigate this issue, as they rely on labels that are not available in the UDA setting. Furthermore, most NAS methods search for full architectures, which precludes the use of pre-trained models, essential in a vast range of UDA settings for reaching SOTA results.To the best of our knowledge, no prior work has addressed these aspects in the context of NAS for UDA. Here we tackle both aspects with an Adversarial Branch Architecture Search for UDA (ABAS): i. we address the lack of target labels by a novel data-driven ensemble approach for model selection; and ii. we search for an auxiliary adversarial branch, attached to a pre-trained backbone, which drives the domain alignment. We extensively validate ABAS to improve two modern UDA techniques, DANN and ALDA, on three standard visual recognition datasets (Office31, Office-Home and PACS). In all cases, ABAS robustly finds the adversarial branch architectures and parameters which yield best performances. https://github.com/lr94/abas
- …
