Skip to main content

Showing 1–4 of 4 results for author: Laarhoven, T

Searching in archive math. Search in all archives.
.
  1. arXiv:2107.02550  [pdf, other

    cs.LG math.RT

    Universal approximation and model compression for radial neural networks

    Authors: Iordan Ganev, Twan van Laarhoven, Robin Walters

    Abstract: We introduce a class of fully-connected neural networks whose activation functions, rather than being pointwise, rescale feature vectors by a function depending only on their norm. We call such networks radial neural networks, extending previous work on rotation equivariant networks that considers rescaling activations in less generality. We prove universal approximation theorems for radial neural… ▽ More

    Submitted 16 February, 2023; v1 submitted 6 July, 2021; originally announced July 2021.

    Comments: 44 pages

  2. Optimal sequential fingerprinting: Wald vs. Tardos

    Authors: Thijs Laarhoven

    Abstract: We study sequential collusion-resistant fingerprinting, where the fingerprinting code is generated in advance but accusations may be made between rounds, and show that in this setting both the dynamic Tardos scheme and schemes building upon Wald's sequential probability ratio test (SPRT) are asymptotically optimal. We further compare these two approaches to sequential fingerprinting, highlighting… ▽ More

    Submitted 12 February, 2015; originally announced February 2015.

    Comments: 12 pages, 10 figures

    Journal ref: ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec), pp. 97-107, 2015

  3. arXiv:1404.2825  [pdf, other

    cs.IT cs.CR math.ST

    Asymptotics of Fingerprinting and Group Testing: Capacity-Achieving Log-Likelihood Decoders

    Authors: Thijs Laarhoven

    Abstract: We study the large-coalition asymptotics of fingerprinting and group testing, and derive explicit decoders that provably achieve capacity for many of the considered models. We do this both for simple decoders (fast but suboptimal) and for joint decoders (slow but optimal), and both for informed and uninformed settings. For fingerprinting, we show that if the pirate strategy is known, the Neyman-… ▽ More

    Submitted 9 April, 2014; originally announced April 2014.

    Comments: 14 pages, 2 figures

    Journal ref: EURASIP Journal on Information Security, 2016:3

  4. arXiv:1209.3495  [pdf, ps, other

    math.NT cs.DM math.DS

    The Collatz conjecture and De Bruijn graphs

    Authors: Thijs Laarhoven, Benne de Weger

    Abstract: We study variants of the well-known Collatz graph, by considering the action of the 3n+1 function on congruence classes. For moduli equal to powers of 2, these graphs are shown to be isomorphic to binary De Bruijn graphs. Unlike the Collatz graph, these graphs are very structured, and have several interesting properties. We then look at a natural generalization of these finite graphs to the 2-adic… ▽ More

    Submitted 16 September, 2012; originally announced September 2012.

    Comments: 9 pages, 8 figures

    Journal ref: Indagationes Mathematicae, vol. 24, no. 4, pp. 971-983, 2013