Skip to main content

Showing 51–72 of 72 results for author: Lange, K

.
  1. arXiv:1407.5612  [pdf, ps, other

    math.LO

    Representing Scott sets in algebraic settings

    Authors: Alf Dolich, Julia Knight, Karen Lange, David Marker

    Abstract: We prove that for every Scott set $S$ there are $S$-saturated real closed fields and models of Presburger arithmetic.

    Submitted 21 July, 2014; originally announced July 2014.

  2. arXiv:1401.1266  [pdf, ps, other

    math.LO

    $\mathcal{D}$-maximal sets

    Authors: Peter Cholak, Peter Gerdes, Karen Lange

    Abstract: Soare proved that the maximal sets form an orbit in $\mathcal{E}$. We consider here $\mathcal{D}$-maximal sets, generalizations of maximal sets introduced by Herrmann and Kummer. Some orbits of $\mathcal{D}$-maximal sets are well understood, e.g., hemimaximal sets, but many are not. The goal of this paper is to define new invariants on computably enumerable sets and to use them to give a complete… ▽ More

    Submitted 16 December, 2014; v1 submitted 6 January, 2014; originally announced January 2014.

    Comments: Submitted. This version was revised during the fall of 2014

    MSC Class: 03D25

  3. arXiv:1312.0236  [pdf

    physics.chem-ph cond-mat.mtrl-sci

    Chemical Bonding in Aqueous Ferrocyanide: Experimental and Theoretical X-ray Spectroscopic Study

    Authors: Nicholas Engel, Sergey I. Bokarev, Edlira Suljoti, Raul Garcia-Diez, Kathrin M. Lange, Kaan Atak, Ronny Golnak, Alexander Kothe, Marcus Dantz, Oliver Kühn, Emad F. Aziz

    Abstract: Resonant inelastic X-ray scattering (RIXS) and X-ray absorption (XA) experiments at the iron L- and nitrogen K-edge are combined with high-level first principles restricted active space self-consistent field (RASSCF) calculations for a systematic investigation of the nature of the chemical bond in potassium ferrocyanide in aqueous solution. The atom- and site-specific RIXS excitations allow for di… ▽ More

    Submitted 1 December, 2013; originally announced December 2013.

  4. Stable Estimation of a Covariance Matrix Guided by Nuclear Norm Penalties

    Authors: Eric C. Chi, Kenneth Lange

    Abstract: Estimation of covariance matrices or their inverses plays a central role in many statistical methods. For these methods to work reliably, estimated matrices must not only be invertible but also well-conditioned. In this paper we present an intuitive prior that shrinks the classic sample covariance estimator towards a stable target. We prove that our estimator is consistent and asymptotically effic… ▽ More

    Submitted 22 November, 2013; v1 submitted 14 May, 2013; originally announced May 2013.

    Comments: 25 pages, 3 figures

    Journal ref: Computational Statistics & Data Analysis 80:117-128, 2014

  5. arXiv:1304.0499  [pdf, other

    stat.ML math.NA math.OC stat.CO

    Splitting Methods for Convex Clustering

    Authors: Eric C. Chi, Kenneth Lange

    Abstract: Clustering is a fundamental problem in many scientific applications. Standard methods such as $k$-means, Gaussian mixture models, and hierarchical clustering, however, are beset by local minima, which are sometimes drastically suboptimal. Recently introduced convex relaxations of $k$-means and hierarchical clustering shrink cluster centroids toward one another and ensure a unique global minimizer.… ▽ More

    Submitted 18 March, 2014; v1 submitted 1 April, 2013; originally announced April 2013.

    Comments: 37 pages, 6 figures

    MSC Class: 62H30; 90C25; 90C90

    Journal ref: Journal of Computational and Graphical Statistics, 24(4):994-1013, 2015

  6. arXiv:1212.6842  [pdf, ps, other

    math.LO math.AC

    A valuation theoretic characterization of recursively saturated real closed fields

    Authors: Paola D'Aquino, Salma Kuhlmann, Karen Lange

    Abstract: We give a valuation theoretic characterization for a real closed field to be recursively saturated. Our result extends the characterization of Harnik and Ressayre \cite{hr} for a divisible ordered abelian group to be recursively saturated.

    Submitted 31 December, 2012; originally announced December 2012.

    Comments: 18 pages

    MSC Class: 06A05; 12J10; 12J15; 12L12; 13A18

    Journal ref: Journal of Symbolic Logic, Volume 80, Issue 01, 194-206 (2015)

  7. arXiv:1211.3907  [pdf, other

    math.OC stat.CO stat.ML

    Distance Majorization and Its Applications

    Authors: Eric C. Chi, Hua Zhou, Kenneth Lange

    Abstract: The problem of minimizing a continuously differentiable convex function over an intersection of closed convex sets is ubiquitous in applied mathematics. It is particularly interesting when it is easy to project onto each separate set, but nontrivial to project onto their intersection. Algorithms based on Newton's method such as the interior point method are viable for small to medium-scale problem… ▽ More

    Submitted 11 June, 2013; v1 submitted 16 November, 2012; originally announced November 2012.

    Comments: 29 pages, 6 figures

    MSC Class: 65K05; 90C25; 90C30; 62J02

    Journal ref: Mathematical Programming Series A, 146:409-436, 2014

  8. arXiv:1203.2295  [pdf, other

    math.OC cs.DS stat.CO

    Techniques for Solving Sudoku Puzzles

    Authors: Eric C. Chi, Kenneth Lange

    Abstract: Solving Sudoku puzzles is one of the most popular pastimes in the world. Puzzles range in difficulty from easy to very challenging; the hardest puzzles tend to have the most empty cells. The current paper explains and compares three algorithms for solving Sudoku puzzles. Backtracking, simulated annealing, and alternating projections are generic methods for attacking combinatorial optimization prob… ▽ More

    Submitted 16 May, 2013; v1 submitted 10 March, 2012; originally announced March 2012.

    Comments: 11 pages, 5 figures

  9. A Look at the Generalized Heron Problem through the Lens of Majorization-Minimization

    Authors: Eric C. Chi, Kenneth Lange

    Abstract: In a recent issue of this journal, Mordukhovich et al.\ pose and solve an interesting non-differentiable generalization of the Heron problem in the framework of modern convex analysis. In the generalized Heron problem one is given $k+1$ closed convex sets in $\Real^d$ equipped with its Euclidean norm and asked to find the point in the last set such that the sum of the distances to the first $k$ se… ▽ More

    Submitted 23 May, 2012; v1 submitted 2 March, 2012; originally announced March 2012.

    Comments: 21 pages, 3 figures

    Journal ref: The American Mathematical Monthly, 121(2):95-108, 2014

  10. arXiv:1202.5064  [pdf, other

    stat.ME stat.AP

    Reconstructing DNA copy number by joint segmentation of multiple sequences

    Authors: Zhongyang Zhang, Kenneth Lange, Chiara Sabatti

    Abstract: The variation in DNA copy number carries information on the modalities of genome evolution and misregulation of DNA replication in cancer cells; its study can be helpful to localize tumor suppressor genes, distinguish different populations of cancerous cell, as well identify genomic variations responsible for disease phenotypes. A number of different high throughput technologies can be used to ide… ▽ More

    Submitted 14 March, 2012; v1 submitted 22 February, 2012; originally announced February 2012.

    Comments: 54 pages, 5 figures

  11. arXiv:1201.3593  [pdf, ps, other

    math.NA math.OC stat.CO

    Path Following in the Exact Penalty Method of Convex Programming

    Authors: Hua Zhou, Kenneth Lange

    Abstract: Classical penalty methods solve a sequence of unconstrained problems that put greater and greater stress on meeting the constraints. In the limit as the penalty constant tends to $\infty$, one recovers the constrained solution. In the exact penalty method, squared penalties are replaced by absolute value penalties, and the solution is recovered for a finite value of the penalty constant. In practi… ▽ More

    Submitted 17 January, 2012; originally announced January 2012.

    MSC Class: 65K05; 90C25 (Primary)

  12. arXiv:1112.4062  [pdf, ps, other

    math.LO

    Real closed exponential fields

    Authors: Paola D'Aquino, Julia F. Knight, Salma Kuhlmann, Karen Lange

    Abstract: In an extended abstract Ressayre considered real closed exponential fields and integer parts that respect the exponential function. He outlined a proof that every real closed exponential field has an exponential integer part. In the present paper, we give a detailed account of Ressayre's construction, which becomes canonical once we fix the real closed exponential field, a residue field section, a… ▽ More

    Submitted 17 December, 2011; originally announced December 2011.

    Comments: 24 pages

    MSC Class: 03C64 (Primary) 03D45; 03C57; 12J10; 12J15; 14P99 (Secondary)

    Journal ref: Fundamenta Mathematicae, 219, 163-190 (2012)

  13. The MM Alternative to EM

    Authors: Tong Tong Wu, Kenneth Lange

    Abstract: The EM algorithm is a special case of a more general algorithm called the MM algorithm. Specific MM algorithms often have nothing to do with missing data. The first M step of an MM algorithm creates a surrogate function that is optimized in the second M step. In minimization, MM stands for majorize--minimize; in maximization, it stands for minorize--maximize. This two-step process always drives th… ▽ More

    Submitted 12 April, 2011; originally announced April 2011.

    Comments: Published in at http://dx.doi.org/10.1214/08-STS264 the Statistical Science (http://www.imstat.org/sts/) by the Institute of Mathematical Statistics (http://www.imstat.org)

    Report number: IMS-STS-STS264

    Journal ref: Statistical Science 2010, Vol. 25, No. 4, 492-505

  14. A Path Algorithm for Constrained Estimation

    Authors: Hua Zhou, Kenneth Lange

    Abstract: Many least squares problems involve affine equality and inequality constraints. Although there are variety of methods for solving such problems, most statisticians find constrained estimation challenging. The current paper proposes a new path following algorithm for quadratic programming based on exact penalization. Similar penalties arise in $l_1$ regularization in model selection. Classical pena… ▽ More

    Submitted 18 March, 2011; originally announced March 2011.

    Comments: 26 pages, 5 figures

  15. Multicategory vertex discriminant analysis for high-dimensional data

    Authors: Tong Tong Wu, Kenneth Lange

    Abstract: In response to the challenges of data mining, discriminant analysis continues to evolve as a vital branch of statistics. Our recently introduced method of vertex discriminant analysis (VDA) is ideally suited to handle multiple categories and an excess of predictors over training cases. The current paper explores an elaboration of VDA that conducts classification and variable selection simultaneous… ▽ More

    Submitted 5 January, 2011; originally announced January 2011.

    Comments: Published in at http://dx.doi.org/10.1214/10-AOAS345 the Annals of Applied Statistics (http://www.imstat.org/aoas/) by the Institute of Mathematical Statistics (http://www.imstat.org)

    Report number: IMS-AOAS-AOAS345

    Journal ref: Annals of Applied Statistics 2010, Vol. 4, No. 4, 1698-1721

  16. arXiv:1101.0228  [pdf, other

    math.LO

    On n-Tardy Sets

    Authors: Peter A. Cholak, Peter M. Gerdes, Karen Lange

    Abstract: Harrington and Soare introduced the notion of an n-tardy set. They showed that there is a nonempty $\mathcal{E}$ property Q(A) such that if Q(A) then A is 2-tardy. Since they also showed no 2-tardy set is complete, Harrington and Soare showed that there exists an orbit of computably enumerable sets such that every set in that orbit is incomplete. Our study of n-tardy sets takes off from where Harr… ▽ More

    Submitted 31 December, 2010; originally announced January 2011.

    MSC Class: 03D25

  17. arXiv:1007.2371  [pdf, ps, other

    math.NA math.OC stat.CO

    MM Algorithms for Geometric and Signomial Programming

    Authors: Kenneth Lange, Hua Zhou

    Abstract: This paper derives new algorithms for signomial programming, a generalization of geometric programming. The algorithms are based on a generic principle for optimization called the MM algorithm. In this setting, one can apply the geometric-arithmetic mean inequality and a supporting hyperplane inequality to create a surrogate function with parameters separated. Thus, unconstrained signomial program… ▽ More

    Submitted 14 July, 2010; originally announced July 2010.

    Comments: 16 pages, 1 figure

    MSC Class: 90C25; 26D07

  18. Graphics Processing Units and High-Dimensional Optimization

    Authors: Hua Zhou, Kenneth Lange, Marc A. Suchard

    Abstract: This paper discusses the potential of graphics processing units (GPUs) in high-dimensional optimization problems. A single GPU card with hundreds of arithmetic cores can be inserted in a personal computer and dramatically accelerates many statistical algorithms. To exploit these devices fully, optimization algorithms should reduce to multiple parallel tasks, each accessing a limited amount of dat… ▽ More

    Submitted 16 March, 2010; originally announced March 2010.

  19. arXiv:0908.3405  [pdf

    math.GM

    A virtual substitution of Brouwer choice sequence

    Authors: Klaus Lange

    Abstract: Step by step a substitution of the well known Brouwer choice sequence will be constructed. It begins with an establishing of quasi alternating prime number series followed by a construction of a virtual sequence in sense of the virtual set definition. The last step gives reasons for why this virtual sequence substitutes the choice sequence created by L. E. J. Brouwer.

    Submitted 24 August, 2009; originally announced August 2009.

    Comments: 17 pages, 0 figures, 5 tables

    MSC Class: 03C55

  20. arXiv:0906.2234  [pdf, ps, other

    stat.ME q-bio.GN stat.AP

    Reconstructing DNA copy number by penalized estimation and imputation

    Authors: Zhongyang Zhang, Kenneth Lange, Roel Ophoff, Chiara Sabatti

    Abstract: Recent advances in genomics have underscored the surprising ubiquity of DNA copy number variation (CNV). Fortunately, modern genotyping platforms also detect CNVs with fairly high reliability. Hidden Markov models and algorithms have played a dominant role in the interpretation of CNV data. Here we explore CNV reconstruction via estimation with a fused-lasso penalty as suggested by Tibshirani and… ▽ More

    Submitted 10 January, 2011; v1 submitted 11 June, 2009; originally announced June 2009.

    Comments: Published in at http://dx.doi.org/10.1214/10-AOAS357 the Annals of Applied Statistics (http://www.imstat.org/aoas/) by the Institute of Mathematical Statistics (http://www.imstat.org)

    Report number: IMS-AOAS-AOAS357

    Journal ref: Annals of Applied Statistics 2010, Vol. 4, No. 4, 1749-1773

  21. arXiv:0904.4839  [pdf

    math.GM

    About a virtual subset

    Authors: Klaus Lange

    Abstract: Two constructed prime number subsets (called prime brother & sisters and prime cousins) lead to a third one (called isolated primes) so that all three disjoint subsets together generate the prime number set. It should be suggested how the subset of isolated primes give a new approach to expand the set theory by using virtual subsets.

    Submitted 30 April, 2009; originally announced April 2009.

    Comments: 13 pages

    MSC Class: 03C55

  22. Coordinate descent algorithms for lasso penalized regression

    Authors: Tong Tong Wu, Kenneth Lange

    Abstract: Imposition of a lasso penalty shrinks parameter estimates toward zero and performs continuous model selection. Lasso penalized regression is capable of handling linear regression problems where the number of predictors far exceeds the number of cases. This paper tests two exceptionally fast algorithms for estimating regression coefficients with a lasso penalty. The previously known $\ell_2$ algo… ▽ More

    Submitted 27 March, 2008; originally announced March 2008.

    Comments: Published in at http://dx.doi.org/10.1214/07-AOAS147 the Annals of Applied Statistics (http://www.imstat.org/aoas/) by the Institute of Mathematical Statistics (http://www.imstat.org)

    Report number: IMS-AOAS-AOAS147

    Journal ref: Annals of Applied Statistics 2008, Vol. 2, No. 1, 224-244