-
Maximum number of edge colorings avoiding rainbow copies of $K_4$
Authors:
Hiêp Hàn,
Carlos Hoppen,
Nicolas Moro Müller,
Dionatan Ricardo Schmidt
Abstract:
In this paper we show that for $r\geq 12$ and any sufficiently large $n$-vertex graph $G$ the number of $r$-edge-colorings of $G$ with no rainbow $K_4$ is at most $r^{ex(n,K_4)}$, where $ex(n,K_4)$ denotes the Turán number of $K_4$. Moreover, $G$ attains equality if and only if it is the Turán graph $T_3(n)$.
The bound on the number of colors $r\geq 12$ is best possible. It improves upon a resul…
▽ More
In this paper we show that for $r\geq 12$ and any sufficiently large $n$-vertex graph $G$ the number of $r$-edge-colorings of $G$ with no rainbow $K_4$ is at most $r^{ex(n,K_4)}$, where $ex(n,K_4)$ denotes the Turán number of $K_4$. Moreover, $G$ attains equality if and only if it is the Turán graph $T_3(n)$.
The bound on the number of colors $r\geq 12$ is best possible. It improves upon a result of H. Lefmann, D.A. Nolibos, and the second author who showed the same result for $r \geq 5434$ and it confirms a conjecture by Gupta, Pehova, Powierski and Staden.
△ Less
Submitted 30 April, 2025; v1 submitted 24 March, 2025;
originally announced March 2025.
-
GridapROMs.jl: Efficient reduced order modelling in the Julia programming language
Authors:
Nicholas Mueller,
Santiago Badia
Abstract:
In this paper, we introduce GridapROMs, a Julia-based library for the numerical approximation of parameterized partial differential equations (PDEs) using a comprehensive suite of linear reduced order models (ROMs). The library is designed to be extendable and productive, leveraging an expressive high-level API built on the Gridap PDE solver backend, while achieving high performance through Julia'…
▽ More
In this paper, we introduce GridapROMs, a Julia-based library for the numerical approximation of parameterized partial differential equations (PDEs) using a comprehensive suite of linear reduced order models (ROMs). The library is designed to be extendable and productive, leveraging an expressive high-level API built on the Gridap PDE solver backend, while achieving high performance through Julia's just-in-time compiler and advanced lazy evaluation techniques. GridapROMs is PDE-agnostic, enabling its application to a wide range of problems, including linear, nonlinear, single-field, multi-field, steady, and unsteady equations. This work details the library's key innovations, implementation principles, and core components, providing usage examples and demonstrating its capabilities by solving a fluid dynamics problem modeled by the Navier-Stokes equations in a 3D geometry.
△ Less
Submitted 9 April, 2025; v1 submitted 20 March, 2025;
originally announced March 2025.
-
A tensor-train reduced basis solver for parameterized partial differential equations on Cartesian grids
Authors:
Nicholas Mueller,
Yiran Zhao,
Santiago Badia,
Tiangang Cui
Abstract:
In this manuscript, we introduce the tensor-train reduced basis method, a novel projection-based reduced-order model designed for the efficient solution of parameterized partial differential equations. While reduced-order models are widely used for their computational efficiency compared to full-order models, they often involve significant offline computational costs. Our proposed approach mitigat…
▽ More
In this manuscript, we introduce the tensor-train reduced basis method, a novel projection-based reduced-order model designed for the efficient solution of parameterized partial differential equations. While reduced-order models are widely used for their computational efficiency compared to full-order models, they often involve significant offline computational costs. Our proposed approach mitigates this limitation by leveraging the tensor train format to efficiently represent high-dimensional finite element quantities. This method offers several advantages, including a reduced number of operations for constructing the reduced subspaces, a cost-effective hyper-reduction strategy for assembling the PDE residual and Jacobian, and a lower dimensionality of the projection subspaces for a given accuracy. We provide a posteriori error estimates to validate the accuracy of the method and evaluate its computational performance on benchmark problems, including the Poisson equation, heat equation, and transient linear elasticity in two- and three-dimensional domains. Although the current framework is restricted to problems defined on Cartesian grids, we anticipate that it can be extended to arbitrary shapes by integrating the tensor-train reduced basis method with unfitted finite element techniques.
△ Less
Submitted 5 May, 2025; v1 submitted 18 December, 2024;
originally announced December 2024.
-
Sharp Thresholds for Factors in Random Graphs
Authors:
Fabian Burghart,
Annika Heckel,
Marc Kaufmann,
Noela Müller,
Matija Pasch
Abstract:
Let $F$ be a graph on $r$ vertices and let $G$ be a graph on $n$ vertices. Then an $F$-factor in $G$ is a subgraph of $G$ composed of $n/r$ vertex-disjoint copies of $F$, if $r$ divides $n$. In other words, an $F$-factor yields a partition of the $n$ vertices of $G$. The study of such $F$-factors in the Erdős-Rényi random graph dates back to Erdős himself. Decades later, in 2008, Johansson, Kahn a…
▽ More
Let $F$ be a graph on $r$ vertices and let $G$ be a graph on $n$ vertices. Then an $F$-factor in $G$ is a subgraph of $G$ composed of $n/r$ vertex-disjoint copies of $F$, if $r$ divides $n$. In other words, an $F$-factor yields a partition of the $n$ vertices of $G$. The study of such $F$-factors in the Erdős-Rényi random graph dates back to Erdős himself. Decades later, in 2008, Johansson, Kahn and Vu established the thresholds for the existence of an $F$-factor for strictly 1-balanced $F$ -- up to the leading constant. The sharp thresholds, meaning the leading constants, were obtained only recently by Riordan and Heckel, but only for complete graphs $F=K_r$ and for so-called nice graphs. Their results rely on sophisticated couplings that utilize the recent, celebrated solution of Shamir's problem by Kahn.
We extend the couplings by Riordan and Heckel to any strictly 1-balanced $F$ and thereby obtain the sharp threshold for the existence of an $F$-factor. In particular, we confirm the thirty year old conjecture by Rucínski that this sharp threshold indeed coincides with the sharp threshold for the disappearance of the last vertices which are not contained in a copy of $F$.
△ Less
Submitted 21 November, 2024;
originally announced November 2024.
-
Random $2$-SAT: The set of atoms of the limiting empirical marginal distribution
Authors:
Noela Müller,
Ralph Neininger,
Haodong Zhu
Abstract:
We show that the set of atoms of the limiting empirical marginal distribution in the random $2$-SAT model is $\mathbb Q \cap (0,1)$, for all clause-to-variable densities up to the satisfiability threshold. While for densities up to $1/2$, the measure is purely discrete, we additionally establish the existence of a nontrivial continuous part for any density in $(1/2, 1)$. Our proof is based on the…
▽ More
We show that the set of atoms of the limiting empirical marginal distribution in the random $2$-SAT model is $\mathbb Q \cap (0,1)$, for all clause-to-variable densities up to the satisfiability threshold. While for densities up to $1/2$, the measure is purely discrete, we additionally establish the existence of a nontrivial continuous part for any density in $(1/2, 1)$. Our proof is based on the construction of a random variable with the correct distribution as the the root marginal of a multi-type Galton-Watson tree, along with a subsequent analysis of the resulting almost sure recursion.
△ Less
Submitted 23 October, 2024;
originally announced October 2024.
-
The hitting time of nice factors
Authors:
Fabian Burghart,
Marc Kaufmann,
Noela Müller,
Matija Pasch
Abstract:
Consider the random $u$-uniform hypergraph (or $u$-graph) process on $n$ vertices, where $n$ is divisible by $r>u\ge 2$. It was recently shown that with high probability, as soon as every vertex is covered by a copy of the complete $u$-graph $K_r$, it also contains a $K_r$-factor (RSA, Vol. 65 II, Sept. 2024). The hitting time result is obtained using a process coupling, which is based on the proo…
▽ More
Consider the random $u$-uniform hypergraph (or $u$-graph) process on $n$ vertices, where $n$ is divisible by $r>u\ge 2$. It was recently shown that with high probability, as soon as every vertex is covered by a copy of the complete $u$-graph $K_r$, it also contains a $K_r$-factor (RSA, Vol. 65 II, Sept. 2024). The hitting time result is obtained using a process coupling, which is based on the proof of the corresponding sharp threshold result (RSA, Vol. 61 IV, Dec. 2022). The latter, however, was not only derived for complete $u$-graphs, but for a broader class of so-called nice $u$-graphs.
The purpose of this article is to extend the process coupling for complete $u$-graphs to the full scope of the sharp threshold result: nice $u$-graphs. As a byproduct, we obtain the extension of the hitting time result to nice $u$-graphs. Since the relevant combinatorial bounds in the proof for the $K_r$-case cannot be generalized, we introduce new arguments that do not only apply to nice u-graphs, but will be relevant for the broader class of strictly 1-balanced u-graphs. Further, we show how the remainder of the process coupling for the $K_r$-case can be utilized in a black-box manner for any u-graph. These advances pave the way for future generalizations.
△ Less
Submitted 22 October, 2024; v1 submitted 26 September, 2024;
originally announced September 2024.
-
The number of random 2-SAT solutions is asymptotically log-normal
Authors:
Arnab Chatterjee,
Amin Coja-Oghlan,
Noela Müller,
Connor Riddlesden,
Maurice Rolvien,
Pavel Zakharov,
Haodong Zhu
Abstract:
We prove that throughout the satisfiable phase, the logarithm of the number of satisfying assignments of a random 2-SAT formula satisfies a central limit theorem. This implies that the log of the number of satisfying assignments exhibits fluctuations of order $\sqrt n$, with $n$ the number of variables. The formula for the variance can be evaluated effectively. By contrast, for numerous other rand…
▽ More
We prove that throughout the satisfiable phase, the logarithm of the number of satisfying assignments of a random 2-SAT formula satisfies a central limit theorem. This implies that the log of the number of satisfying assignments exhibits fluctuations of order $\sqrt n$, with $n$ the number of variables. The formula for the variance can be evaluated effectively. By contrast, for numerous other random constraint satisfaction problems the typical fluctuations of the logarithm of the number of solutions are {\em bounded} throughout all or most of the satisfiable regime.
△ Less
Submitted 20 September, 2024; v1 submitted 6 May, 2024;
originally announced May 2024.
-
Minimal projective varieties satisfying Miyaoka's equality
Authors:
Masataka Iwai,
Shin-ichi Matsumura,
Niklas Müller
Abstract:
In this paper, we establish a structure theorem for minimal projective klt varieties $X$ that satisfiy Miyaoka's equality $3c_2(X) = c_1(X)^2$. Specifically, we prove that the canonical divisor $K_X$ is semi-ample and that the Kodaira dimension $κ(K_X)$ is either $0$, $1$, or $2$. Furthermore, based on this abundance result, we show that a maximally quasi-étale cover of $X$ is smooth, and we descr…
▽ More
In this paper, we establish a structure theorem for minimal projective klt varieties $X$ that satisfiy Miyaoka's equality $3c_2(X) = c_1(X)^2$. Specifically, we prove that the canonical divisor $K_X$ is semi-ample and that the Kodaira dimension $κ(K_X)$ is either $0$, $1$, or $2$. Furthermore, based on this abundance result, we show that a maximally quasi-étale cover of $X$ is smooth, and we describe explicitly the structure of the Iitaka fibration. Additionally, we prove a similar result for projective klt varieties with a nef anti-canonical divisor.
△ Less
Submitted 21 November, 2024; v1 submitted 11 April, 2024;
originally announced April 2024.
-
On a Near-Optimal \& Efficient Algorithm for the Sparse Pooled Data Problem
Authors:
Max Hahn-Klimroth,
Remco van der Hofstad,
Noela Müller,
Connor Riddlesden
Abstract:
The pooled data problem asks to identify the unknown labels of a set of items from condensed measurements. More precisely, given $n$ items, assume that each item has a label in $\cbc{0,1,\ldots, d}$, encoded via the ground-truth $\SIGMA$. We call the pooled data problem sparse if the number of non-zero entries of $\SIGMA$ scales as $k \sim n^θ$ for $θ\in (0,1)$. The information that is revealed ab…
▽ More
The pooled data problem asks to identify the unknown labels of a set of items from condensed measurements. More precisely, given $n$ items, assume that each item has a label in $\cbc{0,1,\ldots, d}$, encoded via the ground-truth $\SIGMA$. We call the pooled data problem sparse if the number of non-zero entries of $\SIGMA$ scales as $k \sim n^θ$ for $θ\in (0,1)$. The information that is revealed about $\SIGMA$ comes from pooled measurements, each indicating how many items of each label are contained in the pool. The most basic question is to design a pooling scheme that uses as few pools as possible, while reconstructing $\SIGMA$ with high probability. Variants of the problem and its combinatorial ramifications have been studied for at least 35 years. However, the study of the modern question of \emph{efficient} inference of the labels has suggested a statistical-to-computational gap of order $\log n$ in the minimum number of pools needed for theoretically possible versus efficient inference. In this article, we resolve the question whether this $\log n$-gap is artificial or of a fundamental nature by the design of an efficient algorithm, called \algoname, based upon a novel pooling scheme on a number of pools very close to the information-theoretic threshold.
△ Less
Submitted 22 December, 2023;
originally announced December 2023.
-
A Principle for Global Optimization with Gradients
Authors:
Nils Müller
Abstract:
This work demonstrates the utility of gradients for the global optimization of certain differentiable functions with many suboptimal local minima. To this end, a principle for generating search directions from non-local quadratic approximants based on gradients of the objective function is analyzed. Experiments measure the quality of non-local search directions as well as the performance of a prop…
▽ More
This work demonstrates the utility of gradients for the global optimization of certain differentiable functions with many suboptimal local minima. To this end, a principle for generating search directions from non-local quadratic approximants based on gradients of the objective function is analyzed. Experiments measure the quality of non-local search directions as well as the performance of a proposed simplistic algorithm, of the covariance matrix adaptation evolution strategy (CMA-ES), and of a randomly reinitialized Broyden-Fletcher-Goldfarb-Shanno (BFGS) method.
△ Less
Submitted 18 August, 2023;
originally announced August 2023.
-
Model order reduction with novel discrete empirical interpolation methods in space-time
Authors:
Nicholas Mueller,
Santiago Badia
Abstract:
This work proposes novel techniques for the efficient numerical simulation of parameterized, unsteady partial differential equations. Projection-based reduced order models (ROMs) such as the reduced basis method employ a (Petrov-)Galerkin projection onto a linear low-dimensional subspace. In unsteady applications, space-time reduced basis (ST-RB) methods have been developed to achieve a dimension…
▽ More
This work proposes novel techniques for the efficient numerical simulation of parameterized, unsteady partial differential equations. Projection-based reduced order models (ROMs) such as the reduced basis method employ a (Petrov-)Galerkin projection onto a linear low-dimensional subspace. In unsteady applications, space-time reduced basis (ST-RB) methods have been developed to achieve a dimension reduction both in space and time, eliminating the computational burden of time marching schemes. However, nonaffine parameterizations dilute any computational speedup achievable by traditional ROMs. Computational efficiency can be recovered by linearizing the nonaffine operators via hyper-reduction, such as the empirical interpolation method in matrix form. In this work, we implement new hyper-reduction techniques explicitly tailored to deal with unsteady problems and embed them in a ST-RB framework. For each of the proposed methods, we develop a posteriori error bounds. We run numerical tests to compare the performance of the proposed ROMs against high-fidelity simulations, in which we combine the finite element method for space discretization on 3D geometries and the Backward Euler time integrator. In particular, we consider a heat equation and an unsteady Stokes equation. The numerical experiments demonstrate the accuracy and computational efficiency our methods retain with respect to the high-fidelity simulations.
△ Less
Submitted 3 December, 2023; v1 submitted 20 July, 2023;
originally announced July 2023.
-
Two Non-Vanishing results concerning the Anti-Canonical Bundle
Authors:
Niklas Müller
Abstract:
Let $(X, Δ)$ be a klt threefold pair with nef anti-log canonical bundle $-(K_X+Δ)$. We show that $κ(X, -(K_X+Δ))\geq 0$. To do so, we prove a more general equivariant non-vanishing result for anti-log canonical bundles, which is valid in any dimension.
Let $(X, Δ)$ be a klt threefold pair with nef anti-log canonical bundle $-(K_X+Δ)$. We show that $κ(X, -(K_X+Δ))\geq 0$. To do so, we prove a more general equivariant non-vanishing result for anti-log canonical bundles, which is valid in any dimension.
△ Less
Submitted 25 March, 2025; v1 submitted 30 May, 2023;
originally announced May 2023.
-
The hitting time of clique factors
Authors:
Annika Heckel,
Marc Kaufmann,
Noela Müller,
Matija Pasch
Abstract:
In a recent paper, Kahn gave the strongest possible, affirmative, answer to Shamir's problem, which had been open since the late 1970s: Let $r \ge 3 $ and let $n$ be divisible by $r$. Then, in the random $r$-uniform hypergraph process on $n$ vertices, as soon as the last isolated vertex disappears, a perfect matching emerges. In the present work, we transfer this hitting time result to the setting…
▽ More
In a recent paper, Kahn gave the strongest possible, affirmative, answer to Shamir's problem, which had been open since the late 1970s: Let $r \ge 3 $ and let $n$ be divisible by $r$. Then, in the random $r$-uniform hypergraph process on $n$ vertices, as soon as the last isolated vertex disappears, a perfect matching emerges. In the present work, we transfer this hitting time result to the setting of clique factors in the random graph process: At the time that the last vertex joins a copy of the complete graph $K_r$, the random graph process contains a $K_r$-factor. Our proof draws on a novel sequence of couplings, extending techniques of Riordan and the first author. An analogous result is proved for clique factors in the $s$-uniform hypergraph process ($s \ge 3$).
△ Less
Submitted 16 February, 2023;
originally announced February 2023.
-
The rank of sparse symmetric matrices over arbitrary fields
Authors:
Remco van der Hofstad,
Noela Müller,
Haodong Zhu
Abstract:
Let $\FF$ be an arbitrary field and $(\bm{G}_{n,d/n})_n$ be a sequence of sparse weighted Erdős-Rényi random graphs on $n$ vertices with edge probability $d/n$, where weights from $\FF \setminus\{0\}$ are assigned to the edges according to a fixed matrix $J_n$. We show that the normalised rank of the adjacency matrix of $(\bm{G}_{n,d/n})_n$ converges in probability to a constant, and derive the li…
▽ More
Let $\FF$ be an arbitrary field and $(\bm{G}_{n,d/n})_n$ be a sequence of sparse weighted Erdős-Rényi random graphs on $n$ vertices with edge probability $d/n$, where weights from $\FF \setminus\{0\}$ are assigned to the edges according to a fixed matrix $J_n$. We show that the normalised rank of the adjacency matrix of $(\bm{G}_{n,d/n})_n$ converges in probability to a constant, and derive the limiting expression. Our result shows that for the general class of sparse symmetric matrices under consideration, the asymptotics of the normalised rank are independent of the edge weights and even the field, in the sense that the limiting constant for the general case coincides with the one previously established for adjacency matrices of sparse (non-weighted) Erdős-Rényi matrices over $\RR$ from \cite{bordenave2011rank}. Our proof, which is purely combinatorial in its nature, is based on an intricate extension of the novel perturbation approach from \cite{coja2022rank} to the symmetric setting.
△ Less
Submitted 30 January, 2023;
originally announced January 2023.
-
Locally Constant Fibrations and Positivity of Curvature
Authors:
Niklas Müller
Abstract:
Up to finite étale cover, any smooth complex projective variety $X$ with nef anti-canonical bundle is a holomorphic fibre bundle over a $K$-trivial variety with locally constant transition functions. We show that this result is optimal by proving that any projective fibre bundle with locally constant transition functions over a $K$-trivial variety has a nef anti-canonical bundle. Moreover, we comp…
▽ More
Up to finite étale cover, any smooth complex projective variety $X$ with nef anti-canonical bundle is a holomorphic fibre bundle over a $K$-trivial variety with locally constant transition functions. We show that this result is optimal by proving that any projective fibre bundle with locally constant transition functions over a $K$-trivial variety has a nef anti-canonical bundle. Moreover, we complement some results on the structure theory of varieties whose tangent bundle admits a singular hermitean metric of positive curvature.
△ Less
Submitted 25 March, 2025; v1 submitted 22 December, 2022;
originally announced December 2022.
-
A Proof of Kirchhoff's First Law for Hyperbolic Conservation Laws on Networks
Authors:
Alexandre M. Bayen,
Alexander Keimer,
Nils Müller
Abstract:
Networks are essential models in many applications such as information technology, chemistry, power systems, transportation, neuroscience, and social sciences. In light of such broad applicability, a general theory of dynamical systems on networks may capture shared concepts, and provide a setting for deriving abstract properties. To this end, we develop a calculus for networks modeled as abstract…
▽ More
Networks are essential models in many applications such as information technology, chemistry, power systems, transportation, neuroscience, and social sciences. In light of such broad applicability, a general theory of dynamical systems on networks may capture shared concepts, and provide a setting for deriving abstract properties. To this end, we develop a calculus for networks modeled as abstract metric spaces and derive an analog of Kirchhoff's first law for hyperbolic conservation laws. In dynamical systems on networks, Kirchhoff's first law connects the study of abstract global objects, and that of a computationally-beneficial edgewise-Euclidean perspective by stating its equivalence. In particular, our results show that hyperbolic conservation laws on networks can be stated without explicit Kirchhoff-type boundary conditions.
△ Less
Submitted 24 November, 2022;
originally announced November 2022.
-
Canonical extensions of manifolds with nef tangent bundle
Authors:
Niklas Müller
Abstract:
To any compact Kähler manifold $(X, ω)$ one may associate a bundle of affine spaces $Z_X\rightarrow X$ called a $\textit{canonical extension}$ of $X$. In this paper we prove that (assuming a well-known conjecture of Campana-Peternell to hold true) if the tangent bundle of $X$ is nef, then the total space $Z_X$ is a Stein manifold. This partially answers a question raised by Greb-Wong of whether th…
▽ More
To any compact Kähler manifold $(X, ω)$ one may associate a bundle of affine spaces $Z_X\rightarrow X$ called a $\textit{canonical extension}$ of $X$. In this paper we prove that (assuming a well-known conjecture of Campana-Peternell to hold true) if the tangent bundle of $X$ is nef, then the total space $Z_X$ is a Stein manifold. This partially answers a question raised by Greb-Wong of whether these two properties are actually equivalent. We also complement some known results for surfaces in the converse direction.
△ Less
Submitted 7 November, 2022;
originally announced November 2022.
-
Space-time reduced basis methods for parametrized unsteady Stokes equations
Authors:
Riccardo Tenderini,
Nicholas Mueller,
Simone Deparis
Abstract:
In this work, we analyse space-time reduced basis methods for the efficient numerical simulation of hemodynamics in arteries. The classical formulation of the reduced basis (RB) method features dimensionality reduction in space, while finite differences schemes are employed for the time integration of the resulting ordinary differential equation (ODE). Space-time reduced basis (ST-RB) methods exte…
▽ More
In this work, we analyse space-time reduced basis methods for the efficient numerical simulation of hemodynamics in arteries. The classical formulation of the reduced basis (RB) method features dimensionality reduction in space, while finite differences schemes are employed for the time integration of the resulting ordinary differential equation (ODE). Space-time reduced basis (ST-RB) methods extend the dimensionality reduction paradigm to the temporal dimension, projecting the full-order problem onto a low-dimensional spatio-temporal subspace. Our goal is to investigate the application of ST-RB methods to the unsteady incompressible Stokes equations, with a particular focus on stability. High-fidelity simulations are performed using the Finite Element (FE) method and BDF2 as time marching scheme. We consider two different ST-RB methods. In the first one - called ST-GRB - space-time model order reduction is achieved by means of a Galerkin projection; a spatio-temporal velocity basis enrichment procedure is introduced to guarantee stability. The second method - called ST-PGRB - is characterized by a Petrov--Galerkin projection, stemming from a suitable minimization of the FOM residual, that allows to automatically attain stability. The classical RB method - denoted as SRB-TFO - serves as a baseline for the theoretical development. Numerical tests have been conducted on an idealized symmetric bifurcation geometry and on the patient-specific one of a femoropopliteal bypass. The results show that both ST-RB methods provide accurate approximations of the high-fidelity solutions, while considerably reducing the computational cost. In particular, the ST-PGRB method exhibits the best performance, as it features a better computational efficiency while retaining accuracies in accordance with theoretical expectations.
△ Less
Submitted 25 October, 2023; v1 submitted 24 June, 2022;
originally announced June 2022.
-
The full rank condition for sparse random matrices
Authors:
Amin Coja-Oghlan,
Pu Gao,
Max Hahn-Klimroth,
Joon Lee,
Noela Müller,
Maurice Rolvien
Abstract:
We derive a sufficient condition for a sparse random matrix with given numbers of non-zero entries in the rows and columns having full row rank. The result covers both matrices over finite fields with independent non-zero entries and $\{0,1\}$-matrices over the rationals. The sufficient condition is generally necessary as well.
We derive a sufficient condition for a sparse random matrix with given numbers of non-zero entries in the rows and columns having full row rank. The result covers both matrices over finite fields with independent non-zero entries and $\{0,1\}$-matrices over the rationals. The sufficient condition is generally necessary as well.
△ Less
Submitted 7 February, 2022; v1 submitted 28 December, 2021;
originally announced December 2021.
-
Near optimal efficient decoding from pooled data
Authors:
Max Hahn-Klimroth,
Noela Müller
Abstract:
Consider $n$ items, each of which is characterised by one of $d+1$ possible features in $\{0, \ldots, d\}$. We study the inference task of learning these types by queries on subsets, or pools, of the items that only reveal a form of coarsened information on the features - in our case, the sum of all the features in the pool. This is a realistic scenario in situations where one has memory or techni…
▽ More
Consider $n$ items, each of which is characterised by one of $d+1$ possible features in $\{0, \ldots, d\}$. We study the inference task of learning these types by queries on subsets, or pools, of the items that only reveal a form of coarsened information on the features - in our case, the sum of all the features in the pool. This is a realistic scenario in situations where one has memory or technical constraints in the data collection process, or where the data is subject to anonymisation. Related prominent problems are the quantitative group testing problem, of which it is a generalisation, as well as the compressed sensing problem, of which it is a special case. In the present article, we are interested in the minimum number of queries needed to efficiently infer the labels, if one of the features, say $0$, is dominant in the sense that the number $k$ of non-zero features among the items is much smaller than $n$. It is known that in this case, all features can be recovered in exponential time by using no more than $O(k)$ queries. However, so far, all \textit{efficient} inference algorithms required at least $Ω(k\ln n)$ queries, and it was unknown whether this gap is artificial or of a fundamental nature. Here we show that indeed, the previous gap between the information-theoretic and computational bounds is not inherent to the problem by providing an efficient algorithm that succeeds with high probability and employs no more than $O(k)$ measurements. This also solves a long standing open question for the quantitative group testing problem.
△ Less
Submitted 9 February, 2022; v1 submitted 9 August, 2021;
originally announced August 2021.
-
Deep Reinforcement Learning for Backup Strategies against Adversaries
Authors:
Pascal Debus,
Nicolas Müller,
Konstantin Böttinger
Abstract:
Many defensive measures in cyber security are still dominated by heuristics, catalogs of standard procedures, and best practices. Considering the case of data backup strategies, we aim towards mathematically modeling the underlying threat models and decision problems. By formulating backup strategies in the language of stochastic processes, we can translate the challenge of finding optimal defense…
▽ More
Many defensive measures in cyber security are still dominated by heuristics, catalogs of standard procedures, and best practices. Considering the case of data backup strategies, we aim towards mathematically modeling the underlying threat models and decision problems. By formulating backup strategies in the language of stochastic processes, we can translate the challenge of finding optimal defenses into a reinforcement learning problem. This enables us to train autonomous agents that learn to optimally support planning of defense processes. In particular, we tackle the problem of finding an optimal backup scheme in the following adversarial setting: Given $k$ backup devices, the goal is to defend against an attacker who can infect data at one time but chooses to destroy or encrypt it at a later time, potentially also corrupting multiple backups made in between. In this setting, the usual round-robin scheme, which always replaces the oldest backup, is no longer optimal with respect to avoidable exposure. Thus, to find a defense strategy, we model the problem as a hybrid discrete-continuous action space Markov decision process and subsequently solve it using deep deterministic policy gradients. We show that the proposed algorithm can find storage device update schemes which match or exceed existing schemes with respect to various exposure metrics.
△ Less
Submitted 12 February, 2021;
originally announced February 2021.
-
Non-local Optimization: Imposing Structure on Optimization Problems by Relaxation
Authors:
Nils Müller,
Tobias Glasmachers
Abstract:
In stochastic optimization, particularly in evolutionary computation and reinforcement learning, the optimization of a function $f: Ω\to \mathbb{R}$ is often addressed through optimizing a so-called relaxation $θ\in Θ\mapsto \mathbb{E}_θ(f)$ of $f$, where $Θ$ resembles the parameters of a family of probability measures on $Ω$. We investigate the structure of such relaxations by means of measure th…
▽ More
In stochastic optimization, particularly in evolutionary computation and reinforcement learning, the optimization of a function $f: Ω\to \mathbb{R}$ is often addressed through optimizing a so-called relaxation $θ\in Θ\mapsto \mathbb{E}_θ(f)$ of $f$, where $Θ$ resembles the parameters of a family of probability measures on $Ω$. We investigate the structure of such relaxations by means of measure theory and Fourier analysis, enabling us to shed light on the success of many associated stochastic optimization methods. The main structural traits we derive and that allow fast and reliable optimization of relaxations are the consistency of optimal values of $f$, Lipschitzness of gradients, and convexity. We emphasize settings where $f$ itself is not differentiable or convex, e.g., in the presence of (stochastic) disturbance.
△ Less
Submitted 24 July, 2021; v1 submitted 11 November, 2020;
originally announced November 2020.
-
Belief Propagation on the random $k$-SAT model
Authors:
Amin Coja-Oghlan,
Noëla Müller,
Jean B. Ravelomanana
Abstract:
Corroborating a prediction from statistical physics, we prove that the Belief Propagation message passing algorithm approximates the partition function of the random $k$-SAT model well for all clause/variable densities and all inverse temperatures for which a modest absence of long-range correlations condition is satisfied. This condition is known as "replica symmetry" in physics language. From th…
▽ More
Corroborating a prediction from statistical physics, we prove that the Belief Propagation message passing algorithm approximates the partition function of the random $k$-SAT model well for all clause/variable densities and all inverse temperatures for which a modest absence of long-range correlations condition is satisfied. This condition is known as "replica symmetry" in physics language. From this result we deduce that a replica symmetry breaking phase transition occurs in the random $k$-SAT model at low temperature for clause/variable densities below but close to the satisfiability threshold.
△ Less
Submitted 21 November, 2020; v1 submitted 4 November, 2020;
originally announced November 2020.
-
Inference and mutual information on random factor graphs
Authors:
Amin Coja-Oghlan,
Max Hahn-Klimroth,
Philipp Loick,
Noela Müller,
Konstantinos Panagiotou,
Matija Pasch
Abstract:
Random factor graphs provide a powerful framework for the study of inference problems such as decoding problems or the stochastic block model. Information-theoretically the key quantity of interest is the mutual information between the observed factor graph and the underlying ground truth around which the factor graph was created; in the stochastic block model, this would be the planted partition.…
▽ More
Random factor graphs provide a powerful framework for the study of inference problems such as decoding problems or the stochastic block model. Information-theoretically the key quantity of interest is the mutual information between the observed factor graph and the underlying ground truth around which the factor graph was created; in the stochastic block model, this would be the planted partition. The mutual information gauges whether and how well the ground truth can be inferred from the observable data. For a very general model of random factor graphs we verify a formula for the mutual information predicted by physics techniques. As an application we prove a conjecture about low-density generator matrix codes from [Montanari: IEEE Transactions on Information Theory 2005]. Further applications include phase transitions of the stochastic block model and the mixed $k$-spin model from physics.
△ Less
Submitted 15 July, 2020;
originally announced July 2020.
-
Stochastic Perturbation of the Lighthill-Whitham-Richards Model via the Method of Stochastic Characteristics
Authors:
Nora Müller,
Wolfgang Bock
Abstract:
In this paper we apply the method of stochastic characteristics to a Lighthill-Whitham-Richards model. The stochastic perturbation can be seen as errors in measurement of the traffic density. For concrete examples we solve the equation perturbed by a standard Brownian motion and the geometric Brownian motion without drift.
In this paper we apply the method of stochastic characteristics to a Lighthill-Whitham-Richards model. The stochastic perturbation can be seen as errors in measurement of the traffic density. For concrete examples we solve the equation perturbed by a standard Brownian motion and the geometric Brownian motion without drift.
△ Less
Submitted 27 June, 2020;
originally announced June 2020.
-
The random 2-SAT partition function
Authors:
Dimitris Achlioptas,
Amin Coja-Oghlan,
Max Hahn-Klimroth,
Joon Lee,
Noela Müller,
Manuel Penschuck,
Guangyan Zhou
Abstract:
We show that throughout the satisfiable phase the normalised number of satisfying assignments of a random $2$-SAT formula converges in probability to an expression predicted by the cavity method from statistical physics. The proof is based on showing that the Belief Propagation algorithm renders the correct marginal probability that a variable is set to `true' under a uniformly random satisfying a…
▽ More
We show that throughout the satisfiable phase the normalised number of satisfying assignments of a random $2$-SAT formula converges in probability to an expression predicted by the cavity method from statistical physics. The proof is based on showing that the Belief Propagation algorithm renders the correct marginal probability that a variable is set to `true' under a uniformly random satisfying assignment.
△ Less
Submitted 10 February, 2020;
originally announced February 2020.
-
The replica symmetric phase of random constraint satisfaction problems
Authors:
Amin Coja-Oghlan,
Tobias Kapetanopoulos,
Noela Müller
Abstract:
Random constraint satisfaction problems play an important role in computer science and combinatorics. For example, they provide challenging benchmark instances for algorithms and they have been harnessed in probabilistic constructions of combinatorial structures with peculiar features. In an important contribution [Krzakala et al., PNAS 2007] physicists made several predictions on the precise loca…
▽ More
Random constraint satisfaction problems play an important role in computer science and combinatorics. For example, they provide challenging benchmark instances for algorithms and they have been harnessed in probabilistic constructions of combinatorial structures with peculiar features. In an important contribution [Krzakala et al., PNAS 2007] physicists made several predictions on the precise location and nature of phase transitions in random constraint satisfaction problems. Specifically, they predicted that their satisfiability thresholds are quite generally preceded by several other thresholds that have a substantial impact both combinatorially and computationally. These include the condensation phase transition, where long-range correlations between variables emerge, and the reconstruction threshold. In this paper we prove these physics predictions for a broad class of random constraint satisfaction problems. Additionally, we obtain contiguity results that have implications on Bayesian inference tasks, a subject that has received a great deal of interest recently (e.g., [Banks et al., COLT 2016]).
△ Less
Submitted 26 February, 2018;
originally announced February 2018.
-
Hyperelliptic Curves with Many Automorphisms
Authors:
Nicolas Müller,
Richard Pink
Abstract:
We determine all complex hyperelliptic curves with many automorphisms and decide which of their jacobians have complex multiplication.
We determine all complex hyperelliptic curves with many automorphisms and decide which of their jacobians have complex multiplication.
△ Less
Submitted 17 November, 2017;
originally announced November 2017.
-
The satisfiability threshold for random linear equations
Authors:
Peter Ayre,
Amin Coja-Oghlan,
Pu Gao,
Noëla Müller
Abstract:
Let $A$ be a random $m\times n$ matrix over the finite field $F_q$ with precisely $k$ non-zero entries per row and let $y\in F_q^m$ be a random vector chosen independently of $A$. We identify the threshold $m/n$ up to which the linear system $A x=y$ has a solution with high probability and analyse the geometry of the set of solutions. In the special case $q=2$, known as the random $k$-XORSAT probl…
▽ More
Let $A$ be a random $m\times n$ matrix over the finite field $F_q$ with precisely $k$ non-zero entries per row and let $y\in F_q^m$ be a random vector chosen independently of $A$. We identify the threshold $m/n$ up to which the linear system $A x=y$ has a solution with high probability and analyse the geometry of the set of solutions. In the special case $q=2$, known as the random $k$-XORSAT problem, the threshold was determined by [Dubois and Mandler 2002, Dietzfelbinger et al. 2010, Pittel and Sorkin 2016], and the proof technique was subsequently extended to the cases $q=3,4$ [Falke and Goerdt 2012]. But the argument depends on technically demanding second moment calculations that do not generalise to $q>3$. Here we approach the problem from the viewpoint of a decoding task, which leads to a transparent combinatorial proof.
△ Less
Submitted 27 July, 2022; v1 submitted 20 October, 2017;
originally announced October 2017.
-
Modelling the inflammatory process in atherosclerosis: a nonlinear renewal equation
Authors:
Nicolas Meunier,
Nicolas Muller
Abstract:
We present here a population structured model to describe the dynamics of macrophage cells. The model involves the interactions between modified LDL, monocytes/macrophages, cytokines and foam cells. The key assumption is that the individual macrophage dynamics depends on the amount of lipoproteins it has internalized. The obtained renewal equation is coupled with an ODE describing the lipoprotein…
▽ More
We present here a population structured model to describe the dynamics of macrophage cells. The model involves the interactions between modified LDL, monocytes/macrophages, cytokines and foam cells. The key assumption is that the individual macrophage dynamics depends on the amount of lipoproteins it has internalized. The obtained renewal equation is coupled with an ODE describing the lipoprotein dynamics. We first prove global existence and uniqueness for the nonlinear and nonlocal system. We then study long time asymp-totics in a particular case describing silent plaques which undergo periodic rupture and repair. Finally we study long time asymptotics for the nonlinear renewal equation obtained when considering the steady state of the ODE. and we prove that ....
△ Less
Submitted 30 March, 2017;
originally announced March 2017.
-
Refined Asymptotics for the Composition of Cyclic Urns
Authors:
Noela Müller,
Ralph Neininger
Abstract:
A cyclic urn is an urn model for balls of types $0,\ldots,m-1$. The urn starts at time zero with an initial configuration. Then, in each time step, first a ball is drawn from the urn uniformly and independently from the past. If its type is $j$, it is then returned to the urn together with a new ball of type $j+1 \mod m$. The case $m=2$ is the well-known Friedman urn. The composition vector, i.e.,…
▽ More
A cyclic urn is an urn model for balls of types $0,\ldots,m-1$. The urn starts at time zero with an initial configuration. Then, in each time step, first a ball is drawn from the urn uniformly and independently from the past. If its type is $j$, it is then returned to the urn together with a new ball of type $j+1 \mod m$. The case $m=2$ is the well-known Friedman urn. The composition vector, i.e., the vector of the numbers of balls of each type after $n$ steps is, after normalization, known to be asymptotically normal for $2\le m\le 6$. For $m\ge 7$ the normalized composition vector is known not to converge. However, there is an almost sure approximation by a periodic random vector.
In the present paper the asymptotic fluctuations around this periodic random vector are identified. We show that these fluctuations are asymptotically normal for all $7\le m\le 12$. For $m\ge 13$ we also find asymptotically normal fluctuations when normalizing in a more refined way. These fluctuations are of maximal dimension $m-1$ only when $6$ does not divide $m$. For $m$ being a multiple of $6$ the fluctuations are supported by a two-dimensional subspace.
△ Less
Submitted 12 March, 2019; v1 submitted 28 December, 2016;
originally announced December 2016.
-
Semantics, Specification Logic, and Hoare Logic of Exact Real Computation
Authors:
Sewon Park,
Franz Brauße,
Pieter Collins,
SunYoung Kim,
Michal Konečný,
Gyesik Lee,
Norbert Müller,
Eike Neumann,
Norbert Preining,
Martin Ziegler
Abstract:
We propose a simple imperative programming language, ERC, that features arbitrary real numbers as primitive data type, exactly. Equipped with a denotational semantics, ERC provides a formal programming language-theoretic foundation to the algorithmic processing of real numbers. In order to capture multi-valuedness, which is well-known to be essential to real number computation, we use a Plotkin po…
▽ More
We propose a simple imperative programming language, ERC, that features arbitrary real numbers as primitive data type, exactly. Equipped with a denotational semantics, ERC provides a formal programming language-theoretic foundation to the algorithmic processing of real numbers. In order to capture multi-valuedness, which is well-known to be essential to real number computation, we use a Plotkin powerdomain and make our programming language semantics computable and complete: all and only real functions computable in computable analysis can be realized in ERC. The base programming language supports real arithmetic as well as implicit limits; expansions support additional primitive operations (such as a user-defined exponential function). By restricting integers to Presburger arithmetic and real coercion to the `precision' embedding $\mathbb{Z}\ni p\mapsto 2^p\in\mathbb{R}$, we arrive at a first-order theory which we prove to be decidable and model-complete. Based on said logic as specification language for preconditions and postconditions, we extend Hoare logic to a sound (w.r.t. the denotational semantics) and expressive system for deriving correct total correctness specifications. Various examples demonstrate the practicality and convenience of our language and the extended Hoare logic.
△ Less
Submitted 21 June, 2024; v1 submitted 20 August, 2016;
originally announced August 2016.
-
Central limit theorem analogues for multicolour urn models
Authors:
Noela Müller
Abstract:
The asymptotic behaviour of a generalised Pólya--Eggenberger urn is well--known to depend on the spectrum of its replacement matrix: If its dominant eigenvalue $r$ is simple and no other eigenvalue is `large' in the sense that its real part is greater than $r/2$, the normalized urn composition is asymptotically normally distributed. However, if there is more than one large eigenvalue, the first fe…
▽ More
The asymptotic behaviour of a generalised Pólya--Eggenberger urn is well--known to depend on the spectrum of its replacement matrix: If its dominant eigenvalue $r$ is simple and no other eigenvalue is `large' in the sense that its real part is greater than $r/2$, the normalized urn composition is asymptotically normally distributed. However, if there is more than one large eigenvalue, the first few random draws have a non--negligible effect on the evolution of the urn process and almost sure random tendencies of order larger than $\sqrt{n}$ typically prevent a classical central limit theorem. In the present work, a central limit theorem analogue for the fluctuations of urn models with regard to random linear drift and random periodic growth of order larger than $\sqrt{n}$ is proved, covering the $m$-ary search tree and B-trees. The proof builds on an eigenspace decomposition of the process in order to separate components of different growth orders. By an accurately tailored adaption of martingale techniques to the components, their joint limiting behaviour is established and translated back to the urn process. Conveniently, the approach encompasses results on small urn models and therefore provides a unifying perspective on central limit theorems for certain urn models, irrespective of their spectrum.
△ Less
Submitted 12 March, 2019; v1 submitted 11 April, 2016;
originally announced April 2016.
-
The CLT Analogue for Cyclic Urns
Authors:
Noela S. Müller,
Ralph Neininger
Abstract:
A cyclic urn is an urn model for balls of types $0,\ldots,m-1$ where in each draw the ball drawn, say of type $j$, is returned to the urn together with a new ball of type $j+1 \mod m$. The case $m=2$ is the well-known Friedman urn. The composition vector, i.e., the vector of the numbers of balls of each type after $n$ steps is, after normalization, known to be asymptotically normal for…
▽ More
A cyclic urn is an urn model for balls of types $0,\ldots,m-1$ where in each draw the ball drawn, say of type $j$, is returned to the urn together with a new ball of type $j+1 \mod m$. The case $m=2$ is the well-known Friedman urn. The composition vector, i.e., the vector of the numbers of balls of each type after $n$ steps is, after normalization, known to be asymptotically normal for $2\le m\le 6$. For $m\ge 7$ the normalized composition vector does not converge. However, there is an almost sure approximation by a periodic random vector. In this paper the asymptotic fluctuations around this periodic random vector are identified. We show that these fluctuations are asymptotically normal for all $m\ge 7$. However, they are of maximal dimension $m-1$ only when $6$ does not divide $m$. For $m$ being a multiple of $6$ the fluctuations are supported by a two-dimensional subspace.
△ Less
Submitted 29 July, 2015;
originally announced July 2015.
-
Numerical simulation on a cell polarisation model: the polar case
Authors:
Vincent Calvez,
Nicolas Meunier,
Nicolas Muller,
Raphael Voituriez
Abstract:
When it is polarised, a cell develops an asymmetric distribution of specific molecular markers, cytoskeleton and cell membrane shape. Polarisation can occur spontaneously or be triggered by external signals, like gradients of signalling molecules... In this work, we use the published models of cell polarisation and we set a numerical analysis for these models. They are based on nonlinear convectio…
▽ More
When it is polarised, a cell develops an asymmetric distribution of specific molecular markers, cytoskeleton and cell membrane shape. Polarisation can occur spontaneously or be triggered by external signals, like gradients of signalling molecules... In this work, we use the published models of cell polarisation and we set a numerical analysis for these models. They are based on nonlinear convection-diffusion equations and the nonlinearity in the transport term expresses the positive loop between the level of protein concentration localised in a small area of the cell membrane and the number of new proteins that will be convected to the same area. We perform numerical simulations and we illustrate that these models are rich enough to describe the apparition of a polarisome.
△ Less
Submitted 16 January, 2013;
originally announced January 2013.
-
Numerical simulation of the dynamics of molecular markers involved in cell polarisation
Authors:
Vincent Calvez,
Nicolas Meunier,
Nicolas Muller,
Raphael Voituriez
Abstract:
A cell is polarised when it has developed a main axis of organisation through the reorganisation of its cytosqueleton and its intracellular organelles. Polarisation can occur spontaneously or be triggered by external signals, like gradients of signaling molecules ... In this work, we study mathematical models for cell polarisation. These models are based on nonlinear convection-diffusion equations…
▽ More
A cell is polarised when it has developed a main axis of organisation through the reorganisation of its cytosqueleton and its intracellular organelles. Polarisation can occur spontaneously or be triggered by external signals, like gradients of signaling molecules ... In this work, we study mathematical models for cell polarisation. These models are based on nonlinear convection-diffusion equations. The nonlinearity in the transport term expresses the positive loop between the level of protein concentration localised in a small area of the cell membrane and the number of new proteins that will be convected to the same area. We perform numerical simulations and we illustrate that these models are rich enough to describe the apparition of a polarisome.
△ Less
Submitted 16 January, 2013;
originally announced January 2013.
-
Cell polarisation model : the 1D case
Authors:
Thomas Lepoutre,
Nicolas Meunier,
Nicolas Muller
Abstract:
We study the dynamics of a one-dimensional non-linear and non-local drift-di usion equation set in the half-line, with the coupling involving the trace value on the boundary. The initial mass M of the density determines the behaviour of the equation: attraction to self similar pro le, to a steady state of nite time blow up for supercritical mass. Using the logarithmic Sobolev and the HWI inequalit…
▽ More
We study the dynamics of a one-dimensional non-linear and non-local drift-di usion equation set in the half-line, with the coupling involving the trace value on the boundary. The initial mass M of the density determines the behaviour of the equation: attraction to self similar pro le, to a steady state of nite time blow up for supercritical mass. Using the logarithmic Sobolev and the HWI inequalities we obtain a rate of convergence for the cases subcritical and critical mass. Moreover, we prove a comparison principle on the equation obtained after space integration. This concentration-comparison principle allows proving blow-up of solutions for large initial data without any monotonicity assumption on the initial data.
△ Less
Submitted 16 January, 2013;
originally announced January 2013.
-
Parameterized Uniform Complexity in Numerics: from Smooth to Analytic, from NP-hard to Polytime
Authors:
Akitoshi Kawamura,
Norbert Th. Müller,
Carsten Rösnick,
Martin Ziegler
Abstract:
The synthesis of classical Computational Complexity Theory with Recursive Analysis provides a quantitative foundation to reliable numerics. Here the operators of maximization, integration, and solving ordinary differential equations are known to map (even high-order differentiable) polynomial-time computable functions to instances which are `hard' for classical complexity classes NP, #P, and CH; b…
▽ More
The synthesis of classical Computational Complexity Theory with Recursive Analysis provides a quantitative foundation to reliable numerics. Here the operators of maximization, integration, and solving ordinary differential equations are known to map (even high-order differentiable) polynomial-time computable functions to instances which are `hard' for classical complexity classes NP, #P, and CH; but, restricted to analytic functions, map polynomial-time computable ones to polynomial-time computable ones -- non-uniformly!
We investigate the uniform parameterized complexity of the above operators in the setting of Weihrauch's TTE and its second-order extension due to Kawamura&Cook (2010). That is, we explore which (both continuous and discrete, first and second order) information and parameters on some given f is sufficient to obtain similar data on Max(f) and int(f); and within what running time, in terms of these parameters and the guaranteed output precision 2^(-n).
It turns out that Gevrey's hierarchy of functions climbing from analytic to smooth corresponds to the computational complexity of maximization growing from polytime to NP-hard. Proof techniques involve mainly the Theory of (discrete) Computation, Hard Analysis, and Information-Based Complexity.
△ Less
Submitted 21 November, 2012;
originally announced November 2012.
-
Making big steps in trajectories
Authors:
Norbert Th. Müller,
Margarita Korovina
Abstract:
We consider the solution of initial value problems within the context of hybrid systems and emphasise the use of high precision approximations (in software for exact real arithmetic). We propose a novel algorithm for the computation of trajectories up to the area where discontinuous jumps appear, applicable for holomorphic flow functions. Examples with a prototypical implementation illustrate th…
▽ More
We consider the solution of initial value problems within the context of hybrid systems and emphasise the use of high precision approximations (in software for exact real arithmetic). We propose a novel algorithm for the computation of trajectories up to the area where discontinuous jumps appear, applicable for holomorphic flow functions. Examples with a prototypical implementation illustrate that the algorithm might provide results with higher precision than well-known ODE solvers at a similar computation time.
△ Less
Submitted 2 June, 2010;
originally announced June 2010.
-
Quantum group symmetry and particle scattering in (2+1)-dimensional quantum gravity
Authors:
F. A. Bais,
N. M. Muller,
B. J. Schroers
Abstract:
Starting with the Chern-Simons formulation of (2+1)-dimensional gravity we show that the gravitational interactions deform the Poincare symmetry of flat space-time to a quantum group symmetry. The relevant quantum group is the quantum double of the universal cover of the (2+1)-dimensional Lorentz group, or Lorentz double for short. We construct the Hilbert space of two gravitating particles and…
▽ More
Starting with the Chern-Simons formulation of (2+1)-dimensional gravity we show that the gravitational interactions deform the Poincare symmetry of flat space-time to a quantum group symmetry. The relevant quantum group is the quantum double of the universal cover of the (2+1)-dimensional Lorentz group, or Lorentz double for short. We construct the Hilbert space of two gravitating particles and use the universal R-matrix of the Lorentz double to derive a general expression for the scattering cross section of gravitating particles with spin. In appropriate limits our formula reproduces the semi-classical scattering formulae found by 't Hooft, Deser, Jackiw and de Sousa Gerbert.
△ Less
Submitted 2 May, 2002;
originally announced May 2002.
-
Tensor product representations of the quantum double of a compact group
Authors:
T. H. Koornwinder,
F. A. Bais,
N. M. Muller
Abstract:
We consider the quantum double D(G) of a compact group G, following an earlier paper. We use the explicit comultiplication on D(G) in order to build tensor products of irreducible *-representations. Then we study their behaviour under the action of the R-matrix, and their decomposition into irreducible *-representations. The example of D(SU(2)) is treated in detail, with explicit formulas for di…
▽ More
We consider the quantum double D(G) of a compact group G, following an earlier paper. We use the explicit comultiplication on D(G) in order to build tensor products of irreducible *-representations. Then we study their behaviour under the action of the R-matrix, and their decomposition into irreducible *-representations. The example of D(SU(2)) is treated in detail, with explicit formulas for direct integral decomposition (`Clebsch-Gordan series') and Clebsch-Gordan coefficients. We point out possible physical applications.
△ Less
Submitted 20 April, 1998; v1 submitted 17 December, 1997;
originally announced December 1997.
-
Quantum double of a (locally) compact group
Authors:
T. H. Koornwinder,
N. M. Muller
Abstract:
We generalise the quantum double construction of Drinfel'd to the case of the (Hopf) algebra of suitable functions on a compact or locally compact group. We will concentrate on the *-algebra structure of the quantum double. If the conjugacy classes in the group are countably separated, then we classify the irreducible *-representations by using the connection with so-called transformation group…
▽ More
We generalise the quantum double construction of Drinfel'd to the case of the (Hopf) algebra of suitable functions on a compact or locally compact group. We will concentrate on the *-algebra structure of the quantum double. If the conjugacy classes in the group are countably separated, then we classify the irreducible *-representations by using the connection with so-called transformation group algebras. For finite groups, we will compare our description to the result of Dijkgraaf, Pasquier and Roche. Finally we will work out the explicit examples of SU(2) and SL(2,R).
△ Less
Submitted 2 October, 1996; v1 submitted 29 May, 1996;
originally announced May 1996.