total 7368took 0.10s

Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against AttacksApr 12 2019May 13 2019There is great potential for damage from adversarial learning (AL) attacks on machine-learning based systems. In this paper, we provide a contemporary survey of AL, focused particularly on defenses against attacks on statistical classifiers. After introducing ... More

Golden-rule capacity allocation for distributed delay management in peer-to-peer networksFeb 02 2014We describe a distributed framework for resources management in peer-to-peer networks leading to golden-rule reciprocity, a kind of one-versus-rest tit-for-tat, so that the delays experienced by any given peer's messages in the rest of the network are ... More

Stochastic Loss Aversion for Random Medium AccessJan 09 2012Feb 26 2012We consider a slotted-ALOHA LAN with loss-averse, noncooperative greedy users. To avoid non-Pareto equilibria, particularly deadlock, we assume probabilistic loss-averse behavior. This behavior is modeled as a modulated white noise term, in addition to ... More

Behavior in a Shared Resource Game with Cooperative, Greedy, and Vigilante PlayersJun 13 2013Jul 04 2013We study a problem of trust in a distributed system in which a common resource is shared by multiple parties. In such naturally information-limited settings, parties abide by a behavioral protocol that leads to fair sharing of the resource. However, greedy ... More

An Iterated Game of Uncoordinated Sharing of Licensed Spectrum Using Zero-Determinant StrategiesJan 14 2014We consider private commons for secondary sharing of licensed spectrum bands with no access coordination provided by the primary license holder. In such environments, heterogeneity in demand patterns of the secondary users can lead to constant changes ... More

When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image ClassifiersOct 31 2018This paper addresses detection of a reverse engineering (RE) attack targeting a deep neural network (DNN) image classifier; by querying, RE's aim is to discover the classifier's decision rule. RE can enable test-time evasion attacks, which require knowledge ... More

Clustering Consumption in Queues: A Scalable Model for Electric Vehicle SchedulingApr 24 2013May 02 2013In this paper, we introduce a scalable model for the aggregate electricity demand of a fleet of electric vehicles, which can provide the right balance between model simplicity and accuracy. The model is based on classification of tasks with similar energy ... More

Detecting Clusters of Anomalies on Low-Dimensional Feature Subsets with Application to Network Traffic Flow DataJun 10 2015In a variety of applications, one desires to detect groups of anomalous data samples, with a group potentially manifesting its atypicality (relative to a reference model) on a low-dimensional subset of the full measured set of features. Samples may only ... More

Network Non-Neutrality on the Internet: Content Provision Under a Subscription Revenue ModelApr 07 2014Apr 08 2014The goal of this paper is to provide an insight into the equilibrium of the Internet market, when the current balance of the market is disrupted, and one of the ISPs switches to a non-neutral regime. We consider a content provider with a subscription ... More

Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? - Part INov 30 2016Nov 24 2017Net neutrality on the Internet is perceived as the policy that mandates Internet Service Providers (ISPs) to treat all data equally, regardless of the source, destination, or type of transmitted data. In this work, we consider a scheme in which the decision ... More

Multicategory Crowdsourcing Accounting for Plurality in Worker Skill and Intention, Task Difficulty, and Task HeterogeneityJul 28 2013Crowdsourcing allows to instantly recruit workers on the web to annotate image, web page, or document databases. However, worker unreliability prevents taking a workers responses at face value. Thus, responses from multiple workers are typically aggregated ... More

Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against AttacksApr 12 2019With the wide deployment of machine learning (ML) based systems for a variety of applications including medical, military, automotive, genomic, as well as multimedia and social networking, there is great potential for damage from adversarial learning ... More

Application Neutrality and a Paradox of Side PaymentsAug 13 2010Oct 21 2010The ongoing debate over net neutrality covers a broad set of issues related to the regulation of public networks. In two ways, we extend an idealized usage-priced game-theoretic framework based on a common linear demand-response model. First, we study ... More

The distribution of age-of-information performance measures for message processing systemsApr 11 2019The idea behind the recently introduced "age of information" performance measure of a networked message processing system is that it indicates our knowledge regarding the "freshness" of the most recent piece of information that can be used as a criterion ... More

Is Non-Neutrality Profitable for the Stakeholders of the Internet Market?Nov 30 2016We consider a system in which there exists two ISPs, one "big" Content Provider (CP), and a continuum of End-Users (EUs). One of the ISPs is neutral and the other is non-neutral. We consider that the CP can differentiate between ISPs by controlling the ... More

When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test TimeDec 18 2017Jun 28 2018A significant threat to the recent, wide deployment of machine learning-based systems, including deep neural networks (DNNs), is adversarial learning attacks. We analyze possible test-time evasion-attack mechanisms and show that, in some important cases, ... More

Market-Based Power Allocation for a Differentially Priced FDMA SystemFeb 13 2014Sep 30 2014In this paper, we study the problem of differential pricing and QoS assignment by a broadband data provider. In our model, the broadband data provider decides on the power allocated to an end-user not only based on parameters of the transmission medium, ... More

Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? - Part IINov 24 2017In this part of the paper, we obtain analytical results for the case that transport costs are not small (complement of Part I), and combine them with the results in Part I of the paper to provide general results for all values of transport costs. We show ... More

A stochastic epidemiological model and a deterministic limit for BitTorrent-like peer-to-peer file-sharing networksNov 06 2008In this paper, we propose a stochastic model for a file-sharing peer-to-peer network which resembles the popular BitTorrent system: large files are split into chunks and a peer can download or swap from another peer only one chunk at a time. We prove ... More

Data Center Cost Optimization Via Workload Modulation Under Real-World Electricity PricingAug 02 2013Sep 04 2013We formulate optimization problems to study how data centers might modulate their power demands for cost-effective operation taking into account three key complex features exhibited by real-world electricity pricing schemes: (i) time-varying prices (e.g., ... More

CSMA Local Area Networking under Dynamic AltruismApr 21 2012In this paper, we consider medium access control of local area networks (LANs) under limited-information conditions as befits a distributed system. Rather than assuming "by rule" conformance to a protocol designed to regulate packet-flow rates (e.g., ... More

Game Theoretic Iterative Partitioning for Dynamic Load Balancing in Distributed Network SimulationNov 03 2011Oct 13 2012High fidelity simulation of large-sized complex networks can be realized on a distributed computing platform that leverages the combined resources of multiple processors or machines. In a discrete event driven simulation, the assignment of logical processes ... More

Scalable and Anonymous Modeling of Large Populations of Flexible AppliancesApr 07 2014To respond to volatility and congestion in the power grid, demand response (DR) mechanisms allow for shaping the load compared to a base load profile. When tapping on a large population of heterogeneous appliances as a DR resource, the challenge is in ... More

Capturing Aggregate Flexibility in Demand ResponseApr 07 2014Flexibility in electric power consumption can be leveraged by Demand Response (DR) programs. The goal of this paper is to systematically capture the inherent aggregate flexibility of a population of appliances. We do so by clustering individual loads ... More

Roaming charges for customers of cellular-wireless entrant and incumbent providersSep 22 2014We consider a simple two-player game involving a large incumbent and small entrant into a cellular wireless access provider marketplace. The entrant's customers must pay roaming charges. We assume that the roaming charges are regulated, because if they ... More

Adversarial Learning: A Critical Review and Active Learning StudyMay 27 2017This papers consists of two parts. The first is a critical review of prior art on adversarial learning, identifying some significant limitations of previous works. The second part is an experimental study considering adversarial active learning and an ... More

Modeling and Control of Rare Segments in BitTorrent with Epidemic DynamicsJun 13 2013Despite its existing incentives for leecher cooperation, BitTorrent file sharing fundamentally relies on the presence of seeder peers. Seeder peers essentially operate outside the BitTorrent incentives, with two caveats: slow downlinks lead to increased ... More

A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam FiltersOct 31 2018Naive Bayes spam filters are highly susceptible to data poisoning attacks. Here, known spam sources/blacklisted IPs exploit the fact that their received emails will be treated as (ground truth) labeled spam examples, and used for classifier training (or ... More

A caching system with object sharingMay 18 2019We consider a public content caching system that is shared by a number of proxies. The cache could be located in an edge-cloud datacenter and the the proxies could each serve a large population of mobile end-users. The proxies operate their own LRU-list ... More

Heterogeneous MacroTasking (HeMT) for Parallel Processing in the Public CloudOct 01 2018Using tiny, equal-sized tasks (Homogeneous microTasking, HomT) has long been regarded an effective way of load balancing in parallel computing systems. When combined with nodes pulling in work upon becoming idle, HomT has the desirable property of automatically ... More

Online Scheduling of Spark Workloads with Mesos using Different Fair Allocation AlgorithmsMar 02 2018Apr 20 2018In the following, we present example illustrative and experimental results comparing fair schedulers allocating resources from multiple servers to distributed application frameworks. Resources are allocated so that at least one resource is exhausted in ... More

A comprehensive study of sparse representation techniques for offline signature verificationJul 13 2018Jan 23 2019In this work, a feature extraction method for offline signature verification is presented that harnesses the power of sparse representation in order to deliver state-of-the-art verification performance in several signature datasets like CEDAR, MCYT-75, ... More

Per-Server Dominant-Share Fairness (PS-DSF): A Multi-Resource Fair Allocation Mechanism for Heterogeneous ServersNov 01 2016Users of cloud computing platforms pose different types of demands for multiple resources on servers (physical or virtual machines). Besides differences in their resource capacities, servers may be additionally heterogeneous in their ability to service ... More

An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous ServersDec 29 2017Efficient and fair allocation of multiple types of resources is a crucial objective in a cloud/distributed computing cluster. Users may have diverse resource needs. Furthermore, diversity in server properties/ capabilities may mean that only a subset ... More

Per-Server Dominant-Share Fairness (PS-DSF): A Multi-Resource Fair Allocation Mechanism for Heterogeneous ServersNov 01 2016Feb 21 2017Users of cloud computing platforms pose different types of demands for multiple resources on servers (physical or virtual machines). Besides differences in their resource capacities, servers may be additionally heterogeneous in their ability to service ... More

An MRI-Derived Definition of MCI-to-AD Conversion for Long-Term, Automati c Prognosis of MCI PatientsApr 28 2011Alzheimer's disease (AD) and mild cognitive impairment (MCI), continue to be widely studied. While there is no consensus on whether MCIs actually "convert" to AD, the more important question is not whether MCIs convert, but what is the best such definition. ... More

Generation bidding game with flexible demandAug 28 2014For a simple model of price-responsive demand, we consider a deregulated electricity marketplace wherein the grid (ISO, retailer-distributor) accepts bids per-unit supply from generators (simplified herein neither to consider start-up/ramp-up expenses ... More

Valley currents and non-local resistances of graphene nanostructures with broken inversion symmetry from the perspective of scattering theorySep 23 2015Valley currents and non-local resistances of graphene nanostructures with broken inversion symmetry are considered theoretically in the linear response regime. Scattering state wave functions of electrons entering the nanostructure from the contacts represented ... More

Ideal Spin Filters: Theoretical Study of Electron Transmission Through Ordered and Disordered Interfaces Between Ferromagnetic Metals and SemiconductorsOct 11 2000It is predicted that certain atomically ordered interfaces between some ferromagnetic metals (F) and semiconductors (S) should act as ideal spin filters that transmit electrons only from the majority spin bands or only from the minority spin bands of ... More

Why Are Large Persistent Currents Observed in Small Gold Rings?Jan 13 1995It is demonstrated using three-dimensional computer simulations that some simple non-interacting electron models that include electron scattering by grain boundaries, exhibit coexistence of large persistent currents and small conductances, similar to ... More

Sentient NetworksDec 13 1997In this paper we consider the question whether a distributed network of sensors and data processors can form "perceptions" based on the sensory data. Because sensory data can have exponentially many explanations, the use of a central data processor to ... More

Quantum Mechanics as Information FusionDec 04 1999We provide evidence that quantum mechanics can be interpreted as a rational algorithm for finding the least complex description for the correlations in the outputs of sensors in a large array. In particular, by comparing the self-organization approach ... More

A Natural Cosmological Model with Omega_matter <1Feb 12 1999Flat cosmological models with a cosmological constant on the order of the Einstein-de Sitter critical density are enigmatic in the sense that there does not appear to be any natural explanation for why there should be a cosmological constant with such ... More

The Black Hole Information Puzzle and Evidence for a Cosmological ConstantJul 22 1998Recent hints from observations of distant supernovae of a positive cosmological constant with magnitude comparable to the average density of matter seem to point in the direction of a two fluid model for spacetime; where the "normal" component consists ... More

The Monster Sporadic Group and a Theory Underlying Superstring ModelsSep 18 1996The pattern of duality symmetries acting on the states of compactified superstring models reinforces an earlier suggestion that the Monster sporadic group is a hidden symmetry for superstring models. This in turn points to a supersymmetric theory of self-dual ... More

Change Detection with Compressive MeasurementsApr 11 2014Quickest change point detection is concerned with the detection of statistical change(s) in sequences while minimizing the detection delay subject to false alarm constraints. In this paper, the problem of change point detection is studied when the decision ... More

Discussion of "Estimating the historical and future probabilities of large terrorist events" by Aaron Clauset and Ryan WoodardJan 10 2014Discussion of "Estimating the historical and future probabilities of large terrorist events" by Aaron Clauset and Ryan Woodard [arXiv:1209.0089].

Modeling and estimation of multi-source clustering in crime and security dataNov 28 2013While the presence of clustering in crime and security event data is well established, the mechanism(s) by which clustering arises is not fully understood. Both contagion models and history independent correlation models are applied, but not simultaneously. ... More

Three-Dimensional Reddening Map for Stars from 2MASS Photometry: The Method and the First ResultsJul 02 2016The first results of the construction of a 3D reddening map for stars within 1600 pc of the Sun are presented. Analysis of the distribution of 70 million stars from the 2MASS catalog with the most accurate photometry on the (J-Ks) - Ks diagram supplemented ... More

Four Weak Gauge Boson Production at Photon Linear Collider and Heavy Higgs SignalJul 28 1994We study the signals and backgrounds for a heavy Higgs boson in the processes $\gamma\gamma\to WWWW$, $\gamma\gamma\to WWZZ$ at the photon linear collider. The results are based on the complete tree level SM calculation for these reactions. We show that ... More

Spatial Variations of the Extinction Law in the Galactic Disk from Infrared ObservationsJun 28 2016Infrared photometry in the J (1.2 microns), H (1.7 microns), Ks (2.2 microns) bands from the 2MASS catalogue and in the W1 (3.4 microns), W2 (4.6 microns), W3 (12 microns), W4 (22 microns) bands from the WISE catalogue is used to reveal the spatial variations ... More

Doubles melanges des polylogarithmes multiples aux racines de l'unit'eFeb 15 2002The values at positive integers of the polyzeta functions are solutions of the polynomial equations arising from Drinfeld's associators, which have numerous applications in quantum algebra. Considered as iterated integrals they become periods of the motivic ... More

A Person Re-Identification System For Mobile DevicesDec 13 2015Person re-identification is a critical security task for recognizing a person across spatially disjoint sensors. Previous work can be computationally intensive and is mainly based on low-level cues extracted from RGB data and implemented on a PC for a ... More

Verso folio: Diversified Ranking for Large Graphs with Context-Aware ConsiderationsJul 25 2016This work is pertaining to the diversified ranking of web-resources and interconnected documents that rely on a network-like structure, e.g. web-pages. A practical example of this would be a query for the k most relevant web-pages that are also in the ... More

Connections Between Symmetries and Conservation LawsNov 09 2005This paper presents recent work on connections between symmetries and conservation laws. After reviewing Noether's theorem and its limitations, we present the Direct Construction Method to show how to find directly the conservation laws for any given ... More

Mass Determinations of Star ClustersJul 03 2001Mass determinations are difficult to obtain and still frequently characterised by deceptively large uncertainties. We review below the various mass estimators used for star clusters of all ages and luminosities. We highlight a few recent results related ... More

Mirror mesons at the Large Hadron Collider (LHC)Jun 23 2016The existence of mirror partners of Standard-Model fermions offers a viable alternative to a fundamental BEH mechanism, with the coupling corresponding to the gauged mirror generation symmetry becoming naturally strong at energies around 1 TeV. The resulting ... More

A Bayesian Nonparametric IRT ModelFeb 11 2015This paper introduces a flexible Bayesian nonparametric Item Response Theory (IRT) model, which applies to dichotomous or polytomous item responses, and which can apply to either unidimensional or multidimensional scaling. This is an infinite-mixture ... More

Variations of the Interstellar Extinction Law within the Nearest KiloparsecJun 30 2016Multicolor photometry from the Tycho-2 and 2MASS catalogues for 11 990 OB and 30 671 K-type red giant branch stars is used to detect systematic large-scale variations of the interstellar extinction law within the nearest kiloparsec. The characteristic ... More

Some Properties of Dust Outside the Galactic DiskJun 28 2016The joint use of accurate near- and mid-infrared photometry from the 2MASS and WISE catalogues has allowed the variations of the extinction law and the dust grain size distribution in high Galactic latitudes (|b|>50) at distances up to 3 kpc from the ... More

Influence of the Gould Belt on Interstellar ExtinctionJun 30 2016A new analytical 3D model of interstellar extinction within 500 pc of the Sun as a function of the Galactic spherical coordinates is suggested. This model is physically more justified than the widely used Arenou model, since it takes into account the ... More

On the maximal operators of Walsh-Kaczmarz-Fejér meansOct 05 2014The main aim of this paper is to prove that the maximal operator $\sigma_{p}^{\kappa ,\ast }f:=\sup_{n\in \mathbf{P}}\left\vert \sigma_{n}^{\kappa }f\right\vert /\left( n+1\right) ^{1/p-2}$ is bounded from the Hardy space $% H_{p}$ to the space $L_{p},$ ... More

Travelling waves in the expanding spatially homogeneous space-timesNov 11 2014Some classes of the so called "travelling wave" solutions of Einstein and Einstein - Maxwell equations in General Relativity and of dynamical equations for massless bosonic fields in string gravity in four and higher dimensions are presented. Similarly ... More

Projective Connections and the Algebra of DensitiesAug 20 2008Projective connections first appeared in Cartan's papers in the 1920's. Since then they have resurfaced periodically in, for example, integrable systems and perhaps most recently in the context of so called projectively equivariant quantisation. We recall ... More

Black Holes and Sphalerons in Low Energy Effective String TheoryOct 25 1994Talk given at the 7th Marcel Grossmann Meeting on General Relativity, Stanford University, July 24-30, 1994.

New half supersymmetric solutions of the heterotic stringSep 07 2008May 26 2009We describe all supersymmetric solutions of the heterotic string which preserve 8 supersymmetries and show that are distinguished by the holonomy, ${\rm hol}(\hat\nabla)$, of the connection, $\hat\nabla$, with skew-symmetric torsion. The ${\rm hol}(\hat\nabla) ... More

Resonant capture of multiple planet systems under dissipation and stable orbital configurationsApr 12 2016Migration of planetary systems caused by the action of dissipative forces may lead the planets to be trapped in a resonance. In this work we study the conditions and the dynamics of such resonant trapping. Particularly, we are interested in finding out ... More

Quenched Chiral Perturbation Theory for Heavy BaryonsApr 28 1997Heavy baryon chiral perturbation theory is extended to include the effects of quenching. In this framework the leading nonanalytic dependence of the heavy baryon masses on the light quark masses is studied. The size of quenching effects is estimated by ... More

Performance evaluation of a production line operated under an echelon buffer policyMar 09 2019We consider a production line consisting of several machines in series separated by intermediate finite-capacity buffers. The line operates under an "echelon buffer" (EB) policy according to which each machine can store the parts that it produces in any ... More

Automorphisms of an orthomodular poset of projectionsNov 29 2002Oct 07 2003By using a lattice characterization of continuous projections defined on a topological vector space E arising from a dual pair, we determine the automorphism group of their orthomodular poset Proj(E) by means of automorphisms and anti-automorphisms of ... More

Spatial Variations of the Interstellar Polarization and Interstellar ExtinctionJul 24 2017For more than 5000 stars with accurate parallaxes from the Hipparcos and Gaia DR1 Tycho-Gaia astrometric solution (TGAS), Tycho-2 photometry, interstellar polarization from eight catalogues and interstellar extinction from eight 3D maps the largest up ... More

Congruences in slim, planar, semimodular lattices: The Swing LemmaDec 30 2014Apr 24 2015In an earlier paper, to describe how a congruence spreads from a prime interval to another in a finite lattice, I introduced the concept of prime-perspectivity and its transitive extension, prime-projectivity and proved the Prime-projectivity Lemma. In ... More

Congruences of the fork extensions. I. The Congruence Extension PropertyJul 02 2013Sep 08 2013For a slim, planar, semimodular lattice, G. Cz\'edli and E.\,T. Schmidt introduced the fork extension in 2012. In this note we prove that the fork extension has the Congruence Extension Property. This paper has been merged with Part II, under the title ... More

Cryptocurrencies, Mainstream Asset Classes and Risk Factors - A Study of ConnectednessSep 10 2018We investigate connectedness within and across two major groups or assets: i) five popular cryptocurrencies, and ii) six major asset classes plus two commonly employed risk factors. Granger-causality tests uncover six direct channels of causality from ... More

Quantization of maximally-charged slowly-moving black holesSep 15 2000Jan 11 2001We discuss the quantization of a system of slowly-moving extreme Reissner-Nordstrom black holes. In the near-horizon limit, this system has been shown to possess an SL(2,R) conformal symmetry. However, the Hamiltonian appears to have no well-defined ground ... More

Canonical quantization of a particle near a black holeJun 12 2000We discuss the quantization of a particle near an extreme Reissner-Nordstrom black hole in the canonical formalism. This model appears to be described by a Hamiltonian with no well-defined ground state. This problem can be circumvented by a redefinition ... More

Non-Noether symmetries in integrable modelsJul 09 2003Aug 13 2003In the present paper the non-Noether symmetries of the Toda model, nonlinear Schodinger equation and Korteweg-de Vries equations (KdV and mKdV) are discussed. It appears that these symmetries yield the complete sets of conservation laws in involution ... More

Single or combined location measurements of the same parameter without prior probability. (Altern. title, Parametric inference as useful illusion; Part 1)Mar 28 2002May 13 2003Motivation. This version is based solely on the calculus of probability, excluding any statistical principle. "Location measurement" means the pdf of the error is known. When the datum is obtained, intuition suggests something like a pdf for the parameter; ... More

On higher energy decompositions and the sum-product phenomenonMar 13 2018Jun 04 2018Let $A \subset \mathbb{R}$ be finite. We quantitatively improve the Balog-Wooley decomposition, that is $A$ can be partitioned into sets $B$ and $C$ such that $$\max\{E^+(B) , E^{\times}(C)\} \lesssim |A|^{3 - 7/26}, \ \ \max \{E^+(B,A) , E^{\times}(C, ... More

Nondifferentiable functions of one-dimensional semimartingalesFeb 04 2008Jan 26 2010We consider decompositions of processes of the form $Y=f(t,X_t)$ where $X$ is a semimartingale. The function $f$ is not required to be differentiable, so It\^{o}'s lemma does not apply. In the case where $f(t,x)$ is independent of $t$, it is shown that ... More

Quillen's adjunction theorem for derived functors, revisitedNov 30 2006The aim of this paper is to present a very simple original, purely formal, proof of Quillen's adjunction theorem for derived functors, and of some more recent variations and generalizations of this theorem. This is obtained by proving an abstract adjunction ... More

Convergence of blanket times for sequences of random walks on critical random graphsOct 17 2018Under the assumption that sequences of graphs equipped with resistances, associated measures, walks and local times converge in a suitable Gromov-Hausdorff topology, we establish asymptotic bounds on the distribution of the $\varepsilon$-blanket times ... More

Local theta-regulators of an algebraic number -- p-adic ConjecturesJan 10 2017Let K/Q be Galois and let eta in K* be such that the multiplicative Z[G]-module generated by eta is of Z-rank n.We define the local theta-regulators Delta\_p^theta(eta) in F\_p for the Q\_p-irreducible characters theta of G=Gal(K/Q). Let V\_theta be the ... More

On The maximal operators of Vilenkin-Fejér means on Hardy spacesOct 05 2014The main aim of this paper is to prove that when $0<p<1/2$ the maximal operator $\overset{\sim }{\sigma }_{p}^{\ast }f:=\underset{n\in \mathbb{N}}{% \sup }\frac{\left\vert \sigma_{n}f\right\vert }{\left( n+1\right) ^{1/p-2}}$ is bounded from the martingale ... More

On the convergence of Fejér means of Walsh-Fourier series in the space $H_{p}$Sep 17 2014The main aim of this paper is to find the necessary and sufficient conditions for a modulus of continuity of a martingale $F\in H_{p},$ for which Fej\'er means convergence in $H_{p}$-norm, when $0<p\leq 1/2.$

Reduction of couplings in the MSSMJul 16 2015We present an application of the reduction of couplings program in the minimal supersymmetric Standard Model (MSSM). We investigate if a functional relation between $\alpha_1$ and $\alpha_2$ gauge couplings can be realized which is Renormalization Group ... More

Predictable Software -- A Shortcut to Dependable Computing ?Mar 11 2004Many dependability techniques expect certain behaviors from the underlying subsystems and fail in chaotic ways if these expectations are not met. Under expected circumstances, however, software tends to work quite well. This paper suggests that, instead ... More

Parallelized Proximity-Based Query Processing Methods for Road NetworksJul 26 2016In this paper, we propose a paradigm for processing in parallel graph joins in road networks. The methodology we present can be used for distance join processing among the elements of two disjoint sets R,S of nodes from the road network, with R preceding ... More

Anosov C-systems and random number generatorsJul 22 2015Jan 12 2016We are developing further our earlier suggestion to use hyperbolic Anosov C-systems for the Monte-Carlo simulations in high energy particle physics. The hyperbolic dynamical systems have homogeneous instability of all trajectories and as such they have ... More

Extinction Law at a Distance up to 25 kpc toward the Galactic PolesJun 29 2016Photometry from the Tycho-2, 2MASS, and WISE catalogues for clump and branch giants at a distance up to 25 kpc toward the Galactic poles has allowed the variations of various characteristics of the infrared interstellar extinction law with distance to ... More

Dependence of Kinematics on the Age of Stars in the Solar NeighborhoodJun 28 2016The variations of kinematic parameters with age are considered for a sample of 15 402 thin-disk O--F stars with accurate $\alpha$, $\delta$, $\mu$, and $\pi>3$ mas from the Hipparcos catalogue and radial velocities from the PCRV catalogue. The ages have ... More

Strongly Correlated Electron Materials: Dynamical Mean-Field Theory and Electronic StructureMar 03 2004These are introductory lectures to some aspects of the physics of strongly correlated electron systems. I first explain the main reasons for strong correlations in several classes of materials. The basic principles of dynamical mean-field theory (DMFT) ... More

Verifying the Planetary Nebula Luminosity Function MethodAug 20 1996The planetary nebula luminosity function (PNLF) technique for determining distances to galaxies now has been applied to 34 galaxies, including 6 in the Virgo cluster and 3 in the Fornax cluster. Of these, 16 galaxies are late-type or spirals and presumably ... More

Rationality properties of unipotent representationsMar 30 2001We describe those unipotent representations of a finite group of Lie type which are defined over the rational numbers.

Nucleosynthesis from massive stars 50 years after B2FHAug 23 2007We review some important observed properties of massive stars. Then we discuss how mass loss and rotation affect their evolution and help in giving better fits to observational constraints. Consequences for nucleosynthesis at different metallicities are ... More

Physics of rotation in stellar modelsJan 18 2008In these lecture notes, we present the equations presently used in stellar interior models in order to compute the effects of axial rotation. We discuss the hypotheses made. We suggest that the effects of rotation might play a key role at low metallicity. ... More

Density functionals derived from Feynman diagramsOct 10 2009Dec 22 2009We construct a stationary density functional for the partition function from a chosen set of one (boson) line irreducible Feynman diagrams. The construction does not proceed by the inversion of a Legendre transform. It is formulated for fermions with ... More

A Menu-Driven Software Package of Bayesian Nonparametric (and Parametric) Mixed Models for Regression Analysis and Density EstimationJun 17 2015Jul 14 2015Most of applied statistics involves regression analysis of data. This paper presents a stand-alone and menu-driven software package, Bayesian Regression: Nonparametric and Parametric Models. Currently, this package gives the user a choice from 83 Bayesian ... More

Picard groups of differential operators on curvesOct 21 2010Let X be a complex affine curve (not isomorphic to the affine line), and let Pic(D) be the group of autoequivalences of the category of D(X)-modules. Cannings and Holland have shown that Pic(D) fits into an exact sequence in which the other groups can ... More

The Red Giant Branch in the Tycho-2 CatalogueJul 02 2016Based on multicolor photometry from the 2MASS and Tycho-2 catalogues, we have produced a sample of 38 368 branch red giants that has less than 1\% of admixtures and is complete within 500 pc of the Sun. The sample includes 30 671 K giants, 7544 M giants, ... More