This document discusses the relationships between orbits of linear maps and regular languages. It shows that the chamber hitting problem (CHP) and permutation filter realizability problem are Turing equivalent. It also shows that the injective filter and surjective filter realizability problems are decidable by reducing them to problems about orbits. However, the regular realizability problem for the track product of the periodic and permutation filters is undecidable, as it can reduce the undecidable zero in the upper right corner problem.
This document discusses the relationships between orbits of linear maps and regular languages. It shows that the chamber hitting problem (CHP) and permutation filter-realizability problem are Turing equivalent. It also shows that the injective filter-realizability problem and surjective filter-realizability problem are decidable, while the track product of the periodic and permutation filter-realizability problem is undecidable. The zero in the upper right corner problem, which is undecidable, can be reduced to the latter regular realizability problem.
Symbolic Solving of Extended Regular Expression InequalitiesMatthias Keil
The document summarizes research on symbolic solving of extended regular expression inequalities. It generalizes Brzozowski's derivative operator to work with extended regular expressions over potentially infinite alphabets. Key contributions include: (1) representing sets of symbols using literals from an effective boolean algebra, (2) defining positive and negative derivatives with respect to literals, and (3) identifying a finite set of literals (next literals) that covers all possibilities to decide language containment symbolically.
The document discusses the method of multiplicities, which is a technique for combinatorics using algebra. It involves finding a polynomial that vanishes on a set with high multiplicity. This is applied to problems in list decoding of Reed-Solomon codes, bounding the size of Kakeya sets, and constructing randomness extractors. Specifically, the method is used to improve bounds on list decoding, show that certain Kakeya sets must be large, and allow extraction of more randomness from weak sources. Propagating multiplicities of derivatives allows tighter analysis of these problems.
Clustering in Hilbert geometry for machine learningFrank Nielsen
- The document discusses different geometric approaches for clustering multinomial distributions, including total variation distance, Fisher-Rao distance, Kullback-Leibler divergence, and Hilbert cross-ratio metric.
- It benchmarks k-means clustering using these four geometries on the probability simplex, finding that Hilbert geometry clustering yields good performance with theoretical guarantees.
- The Hilbert cross-ratio metric defines a non-Riemannian Hilbert geometry on the simplex with polytopal balls, and satisfies information monotonicity properties desirable for clustering distributions.
Dragisa Zunic - Classical computing with explicit structural rules - the *X c...Dragisa Zunic
The document discusses the ∗X calculus, which provides an explicit computational interpretation of classical logic proofs represented in sequent calculus. The ∗X calculus makes weakening and contraction explicit through terms corresponding to proofs. Terms are built from names and represent proofs with explicit erasure and duplication operations corresponding to weakening and contraction.
1. Representation theory studies how algebraic structures like groups, algebras, and Lie algebras can be represented by linear transformations on vector spaces. Quiver representations assign vector spaces to vertices and linear maps to arrows of a quiver.
2. Hall algebras were introduced to study representations of quivers. The document outlines representation theory, quivers, Hall algebras, and connections between quivers, Lie theory, and quantum groups.
3. Representation theory has applications in many areas of mathematics including algebra, analysis, algebraic geometry, and topology. Dynkin diagrams classify semisimple Lie algebras and Kac-Moody algebras. Quantum groups are quantized enveloping algebras generalizing the structure of universal enveloping algebras.
This document provides an introduction to graph theory concepts. It defines graphs as mathematical objects consisting of nodes and edges. Both directed and undirected graphs are discussed. Key graph properties like paths, cycles, degrees, and connectivity are defined. Classic graph problems introduced include Eulerian circuits, Hamiltonian circuits, spanning trees, and graph coloring. Graph theory is a fundamental area of mathematics with applications in artificial intelligence.
This document discusses category theory and algebraic semantics for programming languages. It defines categories, functors, natural transformations, Ω-algebras, (Ω,E)-algebras, and monads. Ω-algebras allow modeling algebraic structures like groups. (Ω,E)-algebras satisfy equations E and have a free algebra. Monads correspond to algebraic theories and define Kleisli categories of algebras. Algebraic semantics uses axioms and rules to prove equalities in (Ω,E)-algebras.
This document discusses the relationships between orbits of linear maps and regular languages. It shows that the chamber hitting problem (CHP) and permutation filter-realizability problem are Turing equivalent. It also shows that the injective filter-realizability problem and surjective filter-realizability problem are decidable, while the track product of the periodic and permutation filter-realizability problem is undecidable. The zero in the upper right corner problem, which is undecidable, can be reduced to the latter regular realizability problem.
Symbolic Solving of Extended Regular Expression InequalitiesMatthias Keil
The document summarizes research on symbolic solving of extended regular expression inequalities. It generalizes Brzozowski's derivative operator to work with extended regular expressions over potentially infinite alphabets. Key contributions include: (1) representing sets of symbols using literals from an effective boolean algebra, (2) defining positive and negative derivatives with respect to literals, and (3) identifying a finite set of literals (next literals) that covers all possibilities to decide language containment symbolically.
The document discusses the method of multiplicities, which is a technique for combinatorics using algebra. It involves finding a polynomial that vanishes on a set with high multiplicity. This is applied to problems in list decoding of Reed-Solomon codes, bounding the size of Kakeya sets, and constructing randomness extractors. Specifically, the method is used to improve bounds on list decoding, show that certain Kakeya sets must be large, and allow extraction of more randomness from weak sources. Propagating multiplicities of derivatives allows tighter analysis of these problems.
Clustering in Hilbert geometry for machine learningFrank Nielsen
- The document discusses different geometric approaches for clustering multinomial distributions, including total variation distance, Fisher-Rao distance, Kullback-Leibler divergence, and Hilbert cross-ratio metric.
- It benchmarks k-means clustering using these four geometries on the probability simplex, finding that Hilbert geometry clustering yields good performance with theoretical guarantees.
- The Hilbert cross-ratio metric defines a non-Riemannian Hilbert geometry on the simplex with polytopal balls, and satisfies information monotonicity properties desirable for clustering distributions.
Dragisa Zunic - Classical computing with explicit structural rules - the *X c...Dragisa Zunic
The document discusses the ∗X calculus, which provides an explicit computational interpretation of classical logic proofs represented in sequent calculus. The ∗X calculus makes weakening and contraction explicit through terms corresponding to proofs. Terms are built from names and represent proofs with explicit erasure and duplication operations corresponding to weakening and contraction.
1. Representation theory studies how algebraic structures like groups, algebras, and Lie algebras can be represented by linear transformations on vector spaces. Quiver representations assign vector spaces to vertices and linear maps to arrows of a quiver.
2. Hall algebras were introduced to study representations of quivers. The document outlines representation theory, quivers, Hall algebras, and connections between quivers, Lie theory, and quantum groups.
3. Representation theory has applications in many areas of mathematics including algebra, analysis, algebraic geometry, and topology. Dynkin diagrams classify semisimple Lie algebras and Kac-Moody algebras. Quantum groups are quantized enveloping algebras generalizing the structure of universal enveloping algebras.
This document provides an introduction to graph theory concepts. It defines graphs as mathematical objects consisting of nodes and edges. Both directed and undirected graphs are discussed. Key graph properties like paths, cycles, degrees, and connectivity are defined. Classic graph problems introduced include Eulerian circuits, Hamiltonian circuits, spanning trees, and graph coloring. Graph theory is a fundamental area of mathematics with applications in artificial intelligence.
This document discusses category theory and algebraic semantics for programming languages. It defines categories, functors, natural transformations, Ω-algebras, (Ω,E)-algebras, and monads. Ω-algebras allow modeling algebraic structures like groups. (Ω,E)-algebras satisfy equations E and have a free algebra. Monads correspond to algebraic theories and define Kleisli categories of algebras. Algebraic semantics uses axioms and rules to prove equalities in (Ω,E)-algebras.
This document provides an overview of computational geometry algorithms and their generalization to information spaces. It begins with a brief history of computational geometry and examples of libraries for geometric computing. The core concepts of Voronoi diagrams and their dual Delaunay complexes are reviewed for Euclidean spaces. These concepts are then generalized to Riemannian and dually affine computational information geometry, with applications to clustering and learning mixtures.
An elementary introduction to information geometryFrank Nielsen
This document provides an elementary introduction to information geometry. It discusses how information geometry generalizes concepts from Riemannian geometry to study the geometry of decision making and model fitting. Specifically, it introduces:
1. Dually coupled connections (∇, ∇*) that are compatible with a metric tensor g and define dual parallel transport on a manifold.
2. The fundamental theorem of information geometry, which states that manifolds with dually coupled connections (∇, ∇*) have the same constant curvature.
3. Examples of statistical manifolds with dually flat geometry that arise from Bregman divergences and f-divergences, making them useful for modeling relationships between probability distributions
Information geometry: Dualistic manifold structures and their usesFrank Nielsen
Information geometry: Dualistic manifold structures and their uses
by Frank Nielsen
Talk given at ICML GIMLI2018
http://gimli.cc/2018/
See tutorial at:
https://arxiv.org/abs/1808.08271
``An elementary introduction to information geometry''
This document summarizes a talk given by Yoshihiro Mizoguchi on developing a Coq library for relational calculus. The talk introduces relational calculus and its applications. It describes implementing definitions and proofs about relations, Boolean algebras, relation algebras, and Dedekind categories in Coq. The library provides a formalization of basic notions in relational theory and can be used to formally verify properties of relations and prove theorems automatedly.
This document summarizes research on sparse representations by Joel Tropp. It discusses how sparse approximation problems arise in applications like variable selection in regression and seismic imaging. It presents algorithms for solving sparse representation problems, including orthogonal matching pursuit and 1-minimization. It analyzes when these algorithms can recover sparse solutions and proves performance guarantees for random matrices and random sparse vectors. The document also discusses related areas like compressive sampling and simultaneous sparsity.
The document summarizes research on threshold network models, which generate scale-free networks without growth by assigning intrinsic weights to nodes based on a given distribution and connecting nodes based on whether their total weight exceeds a threshold. The model has been extended to spatial networks by incorporating distance between nodes and to include homophily. Analytical results show the degree distribution and other properties depend on the weight distribution and thresholding function used. Several open problems are also discussed.
Masaki Asano from Osaka City University gave a presentation titled "On Information Geometry and its Applications" on July 24, 2012. He discussed statistical models, the Fisher information metric, α-connections, and statistical manifolds. He also described two applications of information geometry: relating statistical models to statistical manifolds, and the relationships between information geometry and other fields like statistics, information theory, and geometries. However, he noted there is still more to learn about the applications of information geometry.
The marginal likelihood of the data computed using Bayesian score metrics is at the core of score+search methods when learning Bayesian networks from data. However, common formulations of those Bayesian score metrics depend of free parameters which are hard to asses. Recent theoretical and experimental works have also shown as the commonly employed BDeu score metric is strongly biased by the particular assignments of its free parameter known as the equivalent sample size and, also, as an optimal selection of this parameter depends of the underlying distribution. This sensibility causes that wrong choices of this parameter lead to inferred models which do not properly represent the distribution generating the data even with large sample sizes. To overcome this issue we introduce here an approach which tries to marginalize this free parameter with a simple averaging method. As experimentally shown, this approach robustly performs as well as an optimum selection of this parameter while it prevents from the choice of wrong settings for this widely applied Bayesian score metric.
A Compositional Encoding for the Asynchronous Pi-Calculus into the Join-Calculussmennicke
This document presents a compositional encoding of the asynchronous π-calculus (πa) into the join-calculus. It discusses the key differences between πa and the join-calculus in terms of their primitives for parallelism, communication, and restriction. It then reviews an existing encoding by Fournet and Gonthier, and Gorla's criteria for a good encoding in terms of compositionality, name invariance, and operational correspondence. The goal is to define a new encoding of πa into the join-calculus that satisfies Gorla's criteria for being a good encoding.
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...Vladimir Kulyukin
We study two theoretical problems that arise naturally in the application domain of assisted
navigation. Connect-the-dots in a graph is a graph-theoretical problem with application to
robot indoor localization. Buffon’s needle on a chessboard is a problem in geometric probability
with application to the design of RFID-enabled surface for robot-assisted navigation.
This document discusses linear independence and linear transformations. It defines linear independence of vectors and vector sets and provides examples to illustrate the concept. Key results covered include: a set of vectors is linearly dependent if one vector can be written as a linear combination of the others; a set with more vectors than dimensions is linearly dependent; and a set containing the zero vector is linearly dependent. The document also defines linear transformations and matrix transformations, and discusses properties such as whether a transformation is one-to-one or onto based on the matrix.
The document outlines a paper on Bayesian linear models. It introduces a simple example of a linear model with exchangeable priors. It then presents the general Bayesian linear model and theorems for the posterior distribution given multiple stages of priors. It applies this to an experimental design setting, deriving Bayes estimates that shrink treatment and block effects towards zero based on their variances.
Toward Disentanglement through Understand ELBOKai-Wen Zhao
Disentangled representation is the holy grail for representation learning which factorizes human-understandable factors in unsupervised way what help us move forward to interpretable machine learning.
A multi-objective optimization framework for a second order traffic flow mode...Guillaume Costeseque
This slides deal with a common work with Paola Goatin (Inria Sophia-Antipolis), Simone Göttlich and Oliver Kolb (Universität Mannheim) about Riemann solvers for the ARZ model on a junction
We propose a regularized method for multivariate linear regression when the number of predictors may exceed the sample size. This method is designed to strengthen the estimation and the selection of the relevant input features with three ingredients: it takes advantage of the dependency pattern between the responses by estimating the residual covariance; it performs selection on direct links between predictors and responses; and selection is driven by prior structural information. To this end, we build on a recent reformulation of the multivariate linear regression model to a conditional Gaussian graphical model and propose a new regularization scheme accompanied with an efficient optimization procedure. On top of showing very competitive performance on artificial and real data sets, our method demonstrates capabilities for fine interpretation of its parameters, as illustrated in applications to genetics, genomics and spectroscopy.
Pattern-based classification of demographic sequencesDmitrii Ignatov
We have proposed prefix-based gapless sequential patterns for classification of demographic sequences. In comparison to black-box machine learning techniques, this one provides interpretable patterns suitable for treatment by professional demographers. As for the language, we have used Pattern Structures as an extension of Formal Concept Analysis for the case of complex data like sequences, graphs, intervals, etc.
The document proposes a lattice-based approach for consensus clustering. It introduces the consensus clustering problem and existing approaches. It then describes a least-squares criterion for ensemble and combined consensus clustering. A lattice-based algorithm is presented that finds a consensus partition by identifying an antichain of concepts in the lattice formed from a partition context. Computational experiments on synthetic datasets are used to evaluate the lattice-based approach and compare it to state-of-the-art algorithms, using adjusted rand index to measure similarity between partitions.
This document introduces eigenvalues and eigenvectors through examples. It begins by discussing how linear algebra can be used to solve systems of equations, moving from the "row picture" of intersecting lines to the "column picture" of linear combinations of vectors. It introduces key concepts like vectors, scalars, and linear combinations. The document then discusses how to represent systems of equations using matrices by choosing appropriate reference vectors. This allows solving problems algebraically by finding linear combinations of vectors rather than geometrically finding intersections of lines.
The document discusses graphs and their representations. It defines a graph as a pair (V,E) where V is a set of vertices and E is a set of edges. There are two main representations of graphs: adjacency matrix and adjacency lists. The adjacency matrix represents the graph as a 2D matrix where rows and columns are vertices and entries indicate edges. The adjacency lists representation uses an array of linked lists, where each list stores the neighbors of its corresponding vertex.
The document discusses Euler's generalization of Fermat's Little Theorem to composite moduli called the Theorem of Euler-Fermat. It explains that for any integer a coprime to a composite number m, a raised to the totient function of m (φ(m)) is congruent to 1 modulo m. It also provides formulas for calculating the totient function for prime powers and products of coprime integers. The Chinese Remainder Theorem, which states that a system of congruences with coprime moduli always has a solution, is introduced as well.
Euler proved Fermat's Last Theorem for n=3 in 1770 by establishing a method of infinite descent. However, some key steps in the proof were not fully justified at the time. Euler had relied on previous work from 1759/1763 that proved important properties of numbers of the form x^2 + 3y^2, which provided the missing justification needed for the descent argument. While Euler claimed a proof by 1753, he waited to publish a more polished version incorporating the supplemental work.
This document provides an overview of computational geometry algorithms and their generalization to information spaces. It begins with a brief history of computational geometry and examples of libraries for geometric computing. The core concepts of Voronoi diagrams and their dual Delaunay complexes are reviewed for Euclidean spaces. These concepts are then generalized to Riemannian and dually affine computational information geometry, with applications to clustering and learning mixtures.
An elementary introduction to information geometryFrank Nielsen
This document provides an elementary introduction to information geometry. It discusses how information geometry generalizes concepts from Riemannian geometry to study the geometry of decision making and model fitting. Specifically, it introduces:
1. Dually coupled connections (∇, ∇*) that are compatible with a metric tensor g and define dual parallel transport on a manifold.
2. The fundamental theorem of information geometry, which states that manifolds with dually coupled connections (∇, ∇*) have the same constant curvature.
3. Examples of statistical manifolds with dually flat geometry that arise from Bregman divergences and f-divergences, making them useful for modeling relationships between probability distributions
Information geometry: Dualistic manifold structures and their usesFrank Nielsen
Information geometry: Dualistic manifold structures and their uses
by Frank Nielsen
Talk given at ICML GIMLI2018
http://gimli.cc/2018/
See tutorial at:
https://arxiv.org/abs/1808.08271
``An elementary introduction to information geometry''
This document summarizes a talk given by Yoshihiro Mizoguchi on developing a Coq library for relational calculus. The talk introduces relational calculus and its applications. It describes implementing definitions and proofs about relations, Boolean algebras, relation algebras, and Dedekind categories in Coq. The library provides a formalization of basic notions in relational theory and can be used to formally verify properties of relations and prove theorems automatedly.
This document summarizes research on sparse representations by Joel Tropp. It discusses how sparse approximation problems arise in applications like variable selection in regression and seismic imaging. It presents algorithms for solving sparse representation problems, including orthogonal matching pursuit and 1-minimization. It analyzes when these algorithms can recover sparse solutions and proves performance guarantees for random matrices and random sparse vectors. The document also discusses related areas like compressive sampling and simultaneous sparsity.
The document summarizes research on threshold network models, which generate scale-free networks without growth by assigning intrinsic weights to nodes based on a given distribution and connecting nodes based on whether their total weight exceeds a threshold. The model has been extended to spatial networks by incorporating distance between nodes and to include homophily. Analytical results show the degree distribution and other properties depend on the weight distribution and thresholding function used. Several open problems are also discussed.
Masaki Asano from Osaka City University gave a presentation titled "On Information Geometry and its Applications" on July 24, 2012. He discussed statistical models, the Fisher information metric, α-connections, and statistical manifolds. He also described two applications of information geometry: relating statistical models to statistical manifolds, and the relationships between information geometry and other fields like statistics, information theory, and geometries. However, he noted there is still more to learn about the applications of information geometry.
The marginal likelihood of the data computed using Bayesian score metrics is at the core of score+search methods when learning Bayesian networks from data. However, common formulations of those Bayesian score metrics depend of free parameters which are hard to asses. Recent theoretical and experimental works have also shown as the commonly employed BDeu score metric is strongly biased by the particular assignments of its free parameter known as the equivalent sample size and, also, as an optimal selection of this parameter depends of the underlying distribution. This sensibility causes that wrong choices of this parameter lead to inferred models which do not properly represent the distribution generating the data even with large sample sizes. To overcome this issue we introduce here an approach which tries to marginalize this free parameter with a simple averaging method. As experimentally shown, this approach robustly performs as well as an optimum selection of this parameter while it prevents from the choice of wrong settings for this widely applied Bayesian score metric.
A Compositional Encoding for the Asynchronous Pi-Calculus into the Join-Calculussmennicke
This document presents a compositional encoding of the asynchronous π-calculus (πa) into the join-calculus. It discusses the key differences between πa and the join-calculus in terms of their primitives for parallelism, communication, and restriction. It then reviews an existing encoding by Fournet and Gonthier, and Gorla's criteria for a good encoding in terms of compositionality, name invariance, and operational correspondence. The goal is to define a new encoding of πa into the join-calculus that satisfies Gorla's criteria for being a good encoding.
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...Vladimir Kulyukin
We study two theoretical problems that arise naturally in the application domain of assisted
navigation. Connect-the-dots in a graph is a graph-theoretical problem with application to
robot indoor localization. Buffon’s needle on a chessboard is a problem in geometric probability
with application to the design of RFID-enabled surface for robot-assisted navigation.
This document discusses linear independence and linear transformations. It defines linear independence of vectors and vector sets and provides examples to illustrate the concept. Key results covered include: a set of vectors is linearly dependent if one vector can be written as a linear combination of the others; a set with more vectors than dimensions is linearly dependent; and a set containing the zero vector is linearly dependent. The document also defines linear transformations and matrix transformations, and discusses properties such as whether a transformation is one-to-one or onto based on the matrix.
The document outlines a paper on Bayesian linear models. It introduces a simple example of a linear model with exchangeable priors. It then presents the general Bayesian linear model and theorems for the posterior distribution given multiple stages of priors. It applies this to an experimental design setting, deriving Bayes estimates that shrink treatment and block effects towards zero based on their variances.
Toward Disentanglement through Understand ELBOKai-Wen Zhao
Disentangled representation is the holy grail for representation learning which factorizes human-understandable factors in unsupervised way what help us move forward to interpretable machine learning.
A multi-objective optimization framework for a second order traffic flow mode...Guillaume Costeseque
This slides deal with a common work with Paola Goatin (Inria Sophia-Antipolis), Simone Göttlich and Oliver Kolb (Universität Mannheim) about Riemann solvers for the ARZ model on a junction
We propose a regularized method for multivariate linear regression when the number of predictors may exceed the sample size. This method is designed to strengthen the estimation and the selection of the relevant input features with three ingredients: it takes advantage of the dependency pattern between the responses by estimating the residual covariance; it performs selection on direct links between predictors and responses; and selection is driven by prior structural information. To this end, we build on a recent reformulation of the multivariate linear regression model to a conditional Gaussian graphical model and propose a new regularization scheme accompanied with an efficient optimization procedure. On top of showing very competitive performance on artificial and real data sets, our method demonstrates capabilities for fine interpretation of its parameters, as illustrated in applications to genetics, genomics and spectroscopy.
Pattern-based classification of demographic sequencesDmitrii Ignatov
We have proposed prefix-based gapless sequential patterns for classification of demographic sequences. In comparison to black-box machine learning techniques, this one provides interpretable patterns suitable for treatment by professional demographers. As for the language, we have used Pattern Structures as an extension of Formal Concept Analysis for the case of complex data like sequences, graphs, intervals, etc.
The document proposes a lattice-based approach for consensus clustering. It introduces the consensus clustering problem and existing approaches. It then describes a least-squares criterion for ensemble and combined consensus clustering. A lattice-based algorithm is presented that finds a consensus partition by identifying an antichain of concepts in the lattice formed from a partition context. Computational experiments on synthetic datasets are used to evaluate the lattice-based approach and compare it to state-of-the-art algorithms, using adjusted rand index to measure similarity between partitions.
This document introduces eigenvalues and eigenvectors through examples. It begins by discussing how linear algebra can be used to solve systems of equations, moving from the "row picture" of intersecting lines to the "column picture" of linear combinations of vectors. It introduces key concepts like vectors, scalars, and linear combinations. The document then discusses how to represent systems of equations using matrices by choosing appropriate reference vectors. This allows solving problems algebraically by finding linear combinations of vectors rather than geometrically finding intersections of lines.
The document discusses graphs and their representations. It defines a graph as a pair (V,E) where V is a set of vertices and E is a set of edges. There are two main representations of graphs: adjacency matrix and adjacency lists. The adjacency matrix represents the graph as a 2D matrix where rows and columns are vertices and entries indicate edges. The adjacency lists representation uses an array of linked lists, where each list stores the neighbors of its corresponding vertex.
The document discusses Euler's generalization of Fermat's Little Theorem to composite moduli called the Theorem of Euler-Fermat. It explains that for any integer a coprime to a composite number m, a raised to the totient function of m (φ(m)) is congruent to 1 modulo m. It also provides formulas for calculating the totient function for prime powers and products of coprime integers. The Chinese Remainder Theorem, which states that a system of congruences with coprime moduli always has a solution, is introduced as well.
Euler proved Fermat's Last Theorem for n=3 in 1770 by establishing a method of infinite descent. However, some key steps in the proof were not fully justified at the time. Euler had relied on previous work from 1759/1763 that proved important properties of numbers of the form x^2 + 3y^2, which provided the missing justification needed for the descent argument. While Euler claimed a proof by 1753, he waited to publish a more polished version incorporating the supplemental work.
This document discusses Fermat's and Euler's theorems regarding prime numbers and their applications in cryptography. It begins by defining prime numbers, prime factorization, and greatest common divisors. It then explains Fermat's theorem that any integer to the power of a prime number minus one is congruent to one modulo that prime number. Next, it defines Euler's totient function and proves Euler's theorem, which generalizes Fermat's theorem. It concludes by providing an example of how these theorems can be applied to encrypt and decrypt messages in a public-key cryptography system.
This document describes a collection of functions for number theory, graph theory, relations on finite sets, permutations and permutation groups, combinatorial species, and other topics. Some key functions include chinese remainder for solving systems of congruences, finding the automorphism group of a graph, checking if a relation is an equivalence relation, computing the cycle index of a permutation or group, and counting elements in a combinatorial species. The functions provide tools for discrete mathematics and combinatorial analysis.
This document defines key algebraic concepts such as expressions, equations, polynomials, and their solutions. It begins by explaining that an expression is a well-formed symbolic representation of operands on which operations can define a relationship. An equation is then defined as a proposition stating an equality relationship between expressions. Finally, the document discusses the degree and solutions of polynomial expressions and equations, noting that the solution set includes all values that satisfy the equation.
The document discusses subgroups of groups, with examples. It defines a subgroup as a subset of a group that is closed under the group's operation and contains inverses and identities. Examples of groups given include the general linear group of invertible matrices, the symmetric group of permutations, and the integers under addition. Subgroups are discussed, including cyclic subgroups generated by a group element and its powers. Specific subgroups of the positive integers under addition are analyzed in detail.
- Euler's theorem states that for a homogeneous function f(x) of degree k, the partial derivative of f with respect to x is equal to kf(x)/x.
- Homogeneous functions have special properties related to their degree of homogeneity. One important property is described by Euler's theorem.
- National income can be modeled as a homogeneous function of degree one, implying some key relationships between its arguments.
This document discusses Euler's formula, which relates the number of vertices (V), edges (E), and faces (P) of a polyhedron. Through experimenting with attaching polygons and bending shapes, students derive the formula V - E + P = 2 for polyhedra. Removing a face shows the formula still holds, revealing why it is true for any polyhedron. Comparing polyhedra to other 3D shapes shows the formula can distinguish polyhedral structures.
This document provides an introduction and outline for a course on Formal Language Theory. The course will cover topics like set theory, relations, mathematical induction, graphs and trees, strings and languages. It will then introduce formal grammars including regular grammars, context-free grammars and pushdown automata. The course is divided into 5 chapters: Basics, Introduction to Grammars, Regular Languages, Context-Free Languages, and Pushdown Automata. The Basics chapter provides an overview of formal vs natural languages and reviews concepts like sets, relations, functions, and mathematical induction.
The document describes string comparison techniques using matrix algebra and seaweed matrices. It introduces the concept of semi-local string comparison, which involves comparing a whole string to substrings of another string. The key idea is representing string comparison matrices implicitly using seaweed matrices, which represent unit-Monge matrices. This allows developing algebraic techniques for efficiently multiplying such matrices using the algebra of braids and the seaweed monoid. These multiplication techniques can then be applied to problems like dynamic programming string comparison and comparing compressed strings.
Contact geometry is the study of certain geometric structures on odd dimensional smooth manifolds. A contact structure is a hyperplane field specified by a one form which satisfies a maximum nondegeneracy condition called complete non-integrability. The associated one form is called a contact form and uniquely determines a Hamiltonian-like vector field called the Reeb vector field on the manifold. I will give some background on this subject, including motivation from classical mechanics. I will also explain how to make use of J-holomorphic curves to obtain a Floer theoretic contact invariant, contact homology, whose chain complex is generated by closed Reeb orbits. This talk will feature numerous graphics to acclimate people to the realm of contact geometry.
The document introduces the Word-based Regular Expressions (WRE) as an expanded regular language for natural language processing. WRE allows matching words and sequences based on part-of-speech tags, semantic tags, and regular expressions. The syntax of WRE is defined, including constructs for tagging words, matching repetitions, grouping, extraction, and more. Examples are given that show how WRE can be used for tasks like noun phrase matching, named entity recognition, question analysis, sentiment analysis, and more. In summary, WRE provides a domain-specific language for regular expression-based natural language processing using linguistic annotations.
Complex reflection groups are somehow realDavid Bessis
Slides from my talk at "Finite Chevalley groups, reflection groups and braid groups - A conference in honour of Professor Jean Michel" in Lausanne.
The talk presents an overview of my proof of the K(π,1) property for complex reflection groups, together with a drastic simplication. As it happens, the discriminant complement is homotopy equivalent to the space of configurations of n (non-necessarily distinct) points on the circle, decorated by compatible factorizations of the Coxeter element. This space is a compact real subvariety of dimension n of the discriminant complement, and admits a natural cellular decompositions whose simplicial structure coincides with the abstract simplicial K(B,1) model provided by the dual braid monoid.
Bottomline: my K(π,1) could be rewritten in a much simpler way, removing all the tedious work with open coverings of the universal cover.
Feel free to steal ideas, reuse & repackage them, and publish as many derived works as you want (I'd love to write it down but don't have the bandwidth.)
This is open source math, enjoy ;-)!
M. Dimitrijević, Noncommutative models of gauge and gravity theoriesSEENET-MTP
- The document describes a talk on noncommutative geometry and gravity theories given at a workshop in Serbia.
- Noncommutative geometry arises in string theory and could help address problems in quantum gravity and the standard model. The talk presents an approach using a star product to represent noncommutative algebras.
- Actions for noncommutative gauge theory and gravity are discussed. For gravity, a deformation of the MacDowell-Mansouri action is proposed based on the Seiberg-Witten map. This leads to modified field equations and corrections to the Einstein-Hilbert and cosmological constant terms.
This document discusses separating shuffle regular expressions (SSRE) for describing languages of data words. SSRE extend regular expressions with a separating shuffle operation. The document defines SSRE and proves several results about their expressiveness and decidability properties in comparison to register automata, data automata, and first-order logic on data words. Key results include: 1) every data automata definable language is definable by a SSRE with homomorphisms; 2) the emptiness problem for SSRE with homomorphisms is undecidable; and 3) there are languages definable by SSRE that cannot be defined by register automata. The document raises several open questions and conjectures about SSRE and their relationships to other
Semantic Web technologies are a set of languages standardized by the World Wide Web Consortium (W3C) and designed to create a web of data that can be processed by machines. One of the core languages of the Semantic Web is Web Ontology Language (OWL), a family of knowledge representation languages for authoring ontologies or knowledge bases. The newest OWL is based on Description Logics (DL), a family of logics that are decidable fragments of first-order logic. leanCoR is a new description logic reasoner designed for experimenting with the new connection method algorithms and optimization techniques for DL. leanCoR is an extension of leanCoP, a compact automated theorem prover for classical first-order logic.
Data Complexity in EL Family of Description LogicsAdila Krisnadhi
The document summarizes data complexity results for reasoning in extensions of the EL family of description logics. It shows that instance checking is coNP-hard, and thus data intractable, for several extensions including EL∀r.⊥, EL∀r.C, EL∃¬r.C, ELC∪D, EL∃r+.C, and EL(≥kr) for k ≥ 2. The reductions are from the NP-complete 2+2SAT problem and use partitioning or covering concepts in the TBox along with a polynomial-sized ABox to encode truth assignments. Instance checking remains tractable for the data-tractable logics ELIf and extensions of DL
Nelly Litvak presents a document on degree-degree dependencies in random graphs with heavy-tailed degrees. She discusses Newman's assortativity coefficient ρ(G) which is a measure of correlations between the degrees of connected nodes. Positive values indicate assortative mixing where high degree nodes connect to other high degree nodes, while negative values indicate disassortative mixing. She reviews that technological and biological networks are typically disassortative while social networks are assortative. Litvak then presents theorems showing that in power law graphs with γ ∈ (1,3), the assortativity coefficient converges to a non-negative value, so these graphs are never strongly disassortative. She also discusses
Mathematical modelling of human brain transport: from medical images to bioph...Marie E. Rognes
This document discusses mathematical modeling of transport processes in the human brain using poroelasticity theory. It begins by describing the brain as a soft, heterogeneous, porous medium permeated by multiple fluid networks including extracellular spaces, arteries, veins, and paravascular spaces. It then introduces the theory of poroelasticity, including Biot's equations and the multiple-network poroelasticity theory (MPET) equations, to model fluid flow and solute transport coupling to solid deformation. The document formulates MPET as a coupled elliptic-parabolic problem within the Ern-Meunier framework. It proves that the bilinear form in this formulation satisfies the assumptions of symmetry, coercivity and continuity required for well-posed
This document discusses quadric surfaces, which are surfaces defined by quadratic polynomials. It begins by introducing quadric surfaces and their classification. Quadric surfaces are classified based on their inertia, which is the number of positive and negative eigenvalues of the surface's defining matrix. The document then discusses various types of nonsingular and singular quadric surfaces in more detail, including ellipsoids, hyperboloids, paraboloids, cylinders, cones, and planes. It introduces the concept of inertia as an invariant for classifying quadric surfaces up to congruence transformations.
Dependent Types and Dynamics of Natural LanguageDaisuke BEKKI
The document discusses dependent type semantics (DTS) as a framework for natural language semantics. DTS takes a proof-theoretic approach and uses dependent types to provide unified treatments of anaphora and general inferences. The key aspects of DTS are that it uses dependent functions and products to represent anaphora and other context-dependent phenomena compositionally, while maintaining a correspondence to natural language syntax. Underspecified terms are used for lexical items to retrieve contexts during type checking and semantic composition. Examples show how DTS can provide representations of E-type and donkey anaphora through dependent types.
GATE Math 2016 Question Paper | Sourav Sir's ClassesSOURAV DAS
GATE Math 2016 Question Paper
GATE Math Preparation Strategy
Math Question Paper
For full solutions contact us.
Call - 9836793076
Sourav Sir's Classes
Kolkata, New Delhi
The document discusses methods for performing spatial statistics on large datasets. Standard maximum likelihood estimation is computationally infeasible for datasets with tens of thousands of observations due to the need to compute and store large covariance matrices. The document outlines several approximation methods that can accommodate large datasets, including variogram fitting, pairwise likelihood approximations, independent block approximations, tapering of the covariance function, low-rank approximations using basis functions, and approximations based on stochastic partial differential equations. These methods allow inference for large spatial datasets by avoiding direct computation and storage of large covariance matrices.
Tensor-based models of natural language semantics provide a conceptually motivated procedure to compute the meaning of a sentence, given its grammatical structure and a vectorial representation of the meaning of its parts. The main characteristic of these models is that words with relational nature, such as adjectives and verbs, become (multi-)linear maps acting on vectors representing words of atomic types, e.g. nouns and noun phrases. On the practical side, the tensor-based framework has been proved useful in a number of NLP tasks. On the theoretical side, its rigorous mathematical foundations provide a test-bed for studying compositional aspects of language at a level deeper than most practically-oriented approaches would allow; for example, mathematical structures such as Frobenius algebras and bialgebras have been used to allow the explication of functional words such as relative pronouns, to model linguistic aspects such as coordination and intonation, and to provide accounts of quantification in distributional models. Furthermore, the deep structural similarity of the framework to concepts that explain the behaviour of quantum-mechanical systems has enabled a unique perspective in approaching language-related problems, such as lexical ambiguity and entailment, by leveraging the model to the realm of density operators and complete positive maps via Selinger's CPM construction. This talk aims at providing a comprehensive introduction to this emerging field by presenting the mathematical foundations, discussing important extensions and recent work, and (time permitted) touching implementation issues and practical applications.
Computing the volume of a convex body is a fundamental problem in computational geometry and optimization. In this talk we discuss the computational complexity of this problem from a theoretical as well as practical point of view. We show examples of how volume computation appear in applications ranging from combinatorics to algebraic geometry.
Next, we design the first practical algorithm for polytope volume approximation in high dimensions (few hundreds).
The algorithm utilizes uniform sampling from a convex region and efficient boundary polytope oracles.
Interestingly, our software provides a framework for exploring theoretical advances since it is believed, and our experiments provide evidence for this belief, that the current asymptotic bounds are unrealistically high.
The document discusses computational models for algebraic decision trees and algebraic computation trees over a ground field F. It describes how algebraic decision trees use polynomials of degree ≤ d to branch at each node, while algebraic computation trees allow testing polynomials to be calculated from previous polynomials along the path. The document then covers existing lower bounds on the complexity C(S) of the membership problem for a set S in terms of topological invariants of S, such as the number of connected components, Euler characteristic, and sum of Betti numbers.
The document discusses recognizing sparse perfect elimination bipartite graphs. It begins with an example of Gaussian elimination on a matrix that introduces new non-zero values. The key points are that perfect elimination bipartite graphs correspond to matrices that can be eliminated without creating new non-zeros, and this can be achieved by finding a sequence of bisimplicial edges in the corresponding bipartite graph. The document proposes using bisimplicial edges as pivots during elimination to avoid introducing new non-zeros.
The document discusses recognizing sparse perfect elimination bipartite graphs through matrix elimination. It provides an example of Gaussian elimination on a matrix that introduces new non-zero values. The key points are:
- Perfect elimination bipartite graphs correspond to matrices that allow elimination without creating new non-zeros.
- Existing algorithms have time complexity of O(n^5) or O(n^3/log n) but may produce dense matrices from sparse ones.
- A new algorithm is proposed that avoids this issue by working directly with the sparse matrix structure.
The document summarizes research on multiple-conclusion calculi for first-order Gödel logic. It introduces Gödel logic and describes its semantics using both many-valued semantics based on truth values in the interval [0,1] and Kripke-style semantics. It then outlines proof theory for Gödel logic, including early sequent calculi and more recent hypersequent calculi. The hypersequent calculus introduced in 1991 uses standard rules and has been extended to the first-order case. The document provides details on the structural and logical rules of this single-conclusion hypersequent system.
The document summarizes a talk on polynomial identity testing (PIT). PIT is the problem of determining if a polynomial computed by an arithmetic circuit is identical to the zero polynomial. The talk outlines the definition of PIT, its connection to circuit lower bounds, and surveys positive results for restricted circuit classes. It also provides examples of proof techniques for PIT on depth-3 and depth-4 circuits and discusses the relationship between PIT and polynomial factorization.
This document summarizes an algorithm for maximizing throughput in online scheduling of equal length jobs. The algorithm aims to schedule incoming jobs with the goal of maximizing total value of completed jobs by their deadlines. It uses a charging scheme and potential function to prove it is (2+√5)-competitive, an improvement over prior algorithms. The algorithm handles jobs arriving online with weights, processing times, deadlines, and considers models where preemption allows restarting or resuming previously completed work. Open questions remain around settling the exact competitive ratio and developing new algorithmic methods.
The document discusses efficient algorithms for performing approximate matching queries on strings that have been grammar-compressed. It introduces the concept of implicit unit-Monge matrices which can represent permutation matrices in a space-efficient way using a range tree data structure. This representation allows dominance counting queries, needed for string comparison, to be performed in O(log2 n) time after an O(n log n) preprocessing step. More advanced data structures can improve these asymptotic time and space bounds further.
This document presents an overview of the consensus problem from an informal and formal perspective. It discusses how consensus requires representativity, where the decision reflects a sufficient number of individual opinions, and stability, where the decision is robust to individual opinion variations. It also presents some key formalizations, including defining consensus as a function from the set of sensor inputs and memory states to decisions. It introduces the concept of a geodesic to measure stability as the maximum number of state transitions needed to return to the starting configuration along a trajectory where each sensor changes at most once.
This document summarizes research on the combinatorial properties of Burrows-Wheeler Transforms (BWT). It discusses prior work that characterized words with simple BWT image forms. It also introduces two general decision problems about BWT images and claims to provide efficient solutions to these problems. Specifically, it presents a theorem providing a criterion to check whether a given word is a valid BWT image based on analyzing the number of orbits in the word's stable sorting.
The document presents a polynomial-time algorithm for finding a minimal conflicting set of rows (MCSR) in a binary matrix that contains a given row. It defines MCSR as a set of rows that does not have the consecutive ones property but where any proper subset does have the property. The algorithm works by representing the binary matrix as a vertex-colored bipartite graph and detecting forbidden substructures called Tucker configurations that characterize when the consecutive ones property does not hold. It finds an MCSR containing the given row by pruning rows from the graph until a Tucker configuration exists using the current set but not with any proper subset.
The document discusses locally decodable codes, which allow recovery of individual data symbols from a coded data set even after erasures. Reed-Muller codes and multiplicity codes were early constructions that provided locality but only up to a rate of 0.5. Matching vector codes were later introduced and can achieve locality r for codes of positive rate and length n=O(r^2). However, the optimal tradeoff between rate, length, and locality remains an open problem.
The document discusses locally decodable codes, which allow recovery of individual data symbols from a coded data set even after erasures. Reed-Muller codes and multiplicity codes were early constructions that provided locality but only up to a rate of 0.5. Matching vector codes were later introduced and can achieve locality r for codes of positive rate and length n=O(r^2). However, the optimal tradeoff between rate, length, and locality remains an open problem.
The document summarizes precedence automata and languages. It provides historical background on operator precedence grammars and Floyd languages. It then discusses how precedence parsing works using an example arithmetic expression. Key points include using a precedence table to determine parentheses insertion and defining three types of moves for an automata model based on symbol precedence: push, mark, and flush. The example demonstrates the automata processing a Dyck language expression.
The document discusses the constraint satisfaction problem (CSP) and the dichotomy conjecture regarding the complexity of CSP instances. It provides definitions and examples of CSPs. It explains the role of polymorphisms in determining the complexity, identifying semilattice, majority and affine polymorphisms as "good". It outlines the dichotomy conjecture that CSPs are either solvable in polynomial time or NP-complete depending on the presence of certain types of local structure defined by polymorphisms. The document also discusses algorithms and results for various constraint languages.
This document describes a Synchronized Alternating Pushdown Automaton (SAPDA) that accepts the language of reduplication with a center marker (RCM). The SAPDA utilizes recursive conjunctive transitions to check that the nth letter before the center marker '$' is the same as the nth letter from the end of the string, for all letters n. This allows the SAPDA to accept strings of the form w$w, where w is any string over the alphabet {a,b}. The construction of the SAPDA involves states that check specific letters at specific positions relative to the center marker.
The document discusses the constraint satisfaction problem (CSP) and the dichotomy conjecture in computational complexity theory. It defines CSP and provides examples. It discusses the role of polymorphisms - operations that preserve constraints. The presence or absence of certain polymorphisms like semilattice, majority, and affine operations determines the complexity of CSP for a given constraint language. The document outlines a proposed dichotomy - CSP is either solvable in polynomial time or NP-complete, depending on the polymorphisms. It surveys partial results proving this conjecture and algorithms for certain constraint languages.
The document discusses shared-memory systems and charts. It provides definitions and concepts related to modeling shared-memory concurrency using partial orders of events called pomsets. Specifically, it defines:
- Shared-memory systems as consisting of registers, data, processes, actions, and rules for updating configurations.
- Pomsets as labeled partial orders used to model executions.
- The may-occur-concurrently relation for rules in a shared-memory system.
- Partial-order semantics for runs of pomsets in a shared-memory system.
- Shared-memory charts (SMCs) as pomsets with gates used to model specifications.
The document discusses precedence automata and languages. It provides historical background on operator precedence grammars and related families of languages. As an example, it explains how parsing an arithmetic expression like 4+5×6 works according to an implicit context-free grammar and by respecting the precedence of operators. It introduces the concept of a precedence table to determine the admissible parentheses generators between pairs of symbols in a grammar.
Locally decodable codes allow recovery of individual data symbols even after data loss by accessing only a small number of codeword symbols. Reed-Muller codes provide locality but only up to a rate of 0.5, while multiplicity codes achieve higher rates but have weaker locality guarantees. Matching vector codes can match the best known locality bounds, constructing codes of length n with locality r for constant r, but the optimal tradeoff between rate, length and locality remains an open problem.
1. Orbits of Linear Maps and Regular Languages
S. Tarasov, M. Vyalyi
Dorodnitsyn Computing Center of RAS
CSR 2011
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 1 / 17
2. Contents
1 Orbits of linear maps
2 Regular realizability (RR)
3 Examples of relation between RR and linear algebra
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 2 / 17
3. Chamber hitting problem
Definition
An orbit OrbΦ x is {Φk x : k ∈ Z+ }, where Φ : Qd → Qd is a linear map
and x ∈ Qd .
Definition
A chamber HS = {x ∈ Qd : sign(hi (x)) = si for 1 i m}, where hi are
affine functions and s ∈ {±1, 0}m is a sign pattern.
Chamber hitting problem (CHP)
INPUT: Φ, x0 , h1 , . . . , hm , s.
OUTPUT: ‘yes’ if OrbΦ x0 ∩ Hs = ∅ and
‘no’ otherwise.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 3 / 17
4. Chamber hitting problem
Definition
An orbit OrbΦ x is {Φk x : k ∈ Z+ }, where Φ : Qd → Qd is a linear map
and x ∈ Qd .
Definition
A chamber HS = {x ∈ Qd : sign(hi (x)) = si for 1 i m}, where hi are
affine functions and s ∈ {±1, 0}m is a sign pattern.
Chamber hitting problem (CHP)
INPUT: Φ, x0 , h1 , . . . , hm , s.
OUTPUT: ‘yes’ if OrbΦ x0 ∩ Hs = ∅ and
‘no’ otherwise.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 3 / 17
5. Chamber hitting problem
Definition
An orbit OrbΦ x is {Φk x : k ∈ Z+ }, where Φ : Qd → Qd is a linear map
and x ∈ Qd .
Definition
A chamber HS = {x ∈ Qd : sign(hi (x)) = si for 1 i m}, where hi are
affine functions and s ∈ {±1, 0}m is a sign pattern.
Chamber hitting problem (CHP)
INPUT: Φ, x0 , h1 , . . . , hm , s.
OUTPUT: ‘yes’ if OrbΦ x0 ∩ Hs = ∅ and
‘no’ otherwise.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 3 / 17
6. Special cases: the orbit problem
Orbit problem
INPUT: Φ, x, y .
OUTPUT: ‘yes’ if y ∈ OrbΦ x and
‘no’ otherwise.
In this case the chamber is {y }.
Theorem (Kannan, Lipton, 1986)
There exists a polynomial time algorithm for the orbit problem.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 4 / 17
7. Special cases: the orbit problem
Orbit problem
INPUT: Φ, x, y .
OUTPUT: ‘yes’ if y ∈ OrbΦ x and
‘no’ otherwise.
In this case the chamber is {y }.
Theorem (Kannan, Lipton, 1986)
There exists a polynomial time algorithm for the orbit problem.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 4 / 17
8. Problems reducible to CHP
Skolem problem
INPUT: a1 , . . . , ad ; b1 , . . . , bd .
xn — a linear recurrent sequence
d
xn = ai xn−i , (n > d), xn = bn (1 n d)
i=1
OUTPUT: ‘yes’ if xn = 0 for some n and
‘no’ otherwise.
Positivity problem
INPUT: a1 , . . . , ad ; b1 , . . . , bd ; xn is LRS.
OUTPUT: ‘yes’ if xn > 0 for all n and
‘no’ otherwise.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 5 / 17
9. Problems reducible to CHP
Skolem problem
INPUT: a1 , . . . , ad ; b1 , . . . , bd .
xn — a linear recurrent sequence
d
xn = ai xn−i , (n > d), xn = bn (1 n d)
i=1
OUTPUT: ‘yes’ if xn = 0 for some n and
‘no’ otherwise.
Positivity problem
INPUT: a1 , . . . , ad ; b1 , . . . , bd ; xn is LRS.
OUTPUT: ‘yes’ if xn > 0 for all n and
‘no’ otherwise.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 5 / 17
10. State of the art
Open questions
Is CHP decidable? Is Skolem problem decidable? Is positivity problem
decidable?
Known decidability results for small d
d =2 d =3 d =4 d =5
Skolem folklore Vereshchagin, 1985 Halava et al.,
2005
Pos. pr. Halava et al., Laohakosol,
2006 Tangsupphathawat,
2009
CHP Sechin, 2011
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 6 / 17
11. Regular realizability problems (RR)
A set L ⊂ Σ∗ is called a filter. Each filter determines a specific regular
realizability problem:
L-realizability problem
INPUT: a description of a regular language R.
OUTPUT: ‘yes’ if R ∩ L = ∅ and
‘no’ otherwise.
w
R Filter L w ∈R∩L
w∈L
/
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 7 / 17
12. Permutation filter
Definition
PB ⊂ {#, 0, 1}∗ consists of permutation words, i.e., words of the form
#w1 #w2 # . . . wN #,
where
wi ∈ {0, 1}∗ are blocks,
|wi | = n, i = 1, 2, . . . , N (n is the block rank),
N = 2n , n 1,
each binary word of length n is a block.
Examples
#00#11#10#01# ∈ PB
#10#11#00#01# ∈ PB
#10#01#00#11# ∈ PB
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 8 / 17
13. Orbits vs Regular realizability
Theorem (Tarasov, Vyalyi, 2010)
CHP and PB -realizability problem are Turing equivalent.
From PB -realizability to CHP
Reduction starts from a Q-linear extension of the transition monoid.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 9 / 17
14. Orbits vs Regular realizability
Theorem (Tarasov, Vyalyi, 2010)
CHP and PB -realizability problem are Turing equivalent.
From PB -realizability to CHP
Reduction starts from a Q-linear extension of the transition monoid.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 9 / 17
15. From CHP to PB -realizability
The idea is to represent an arithmetic computation in a ‘natural’ form.
The main construction
R1 , R2 — regular languages.
How to check that there exists an integer n such that
Card({w : |w | = n ∧ w ∈ R1 }) = Card({w : |w | = n ∧ w ∈ R2 })?
(♣)
Regular expression
E = #((R1 ∩ R2 )#)∗ ((R1 R2 )#(R2 R1 )#)∗ ((R1 ∩ R2 )#)∗
(♣) is equivalent to E ∩ PB = ∅.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 10 / 17
16. From CHP to PB -realizability
The idea is to represent an arithmetic computation in a ‘natural’ form.
The main construction
R1 , R2 — regular languages.
How to check that there exists an integer n such that
Card({w : |w | = n ∧ w ∈ R1 }) = Card({w : |w | = n ∧ w ∈ R2 })?
(♣)
Regular expression
E = #((R1 ∩ R2 )#)∗ ((R1 R2 )#(R2 R1 )#)∗ ((R1 ∩ R2 )#)∗
(♣) is equivalent to E ∩ PB = ∅.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 10 / 17
17. From CHP to PB -realizability
The idea is to represent an arithmetic computation in a ‘natural’ form.
The main construction
R1 , R2 — regular languages.
How to check that there exists an integer n such that
Card({w : |w | = n ∧ w ∈ R1 }) = Card({w : |w | = n ∧ w ∈ R2 })?
(♣)
Regular expression
E = #((R1 ∩ R2 )#)∗ ((R1 R2 )#(R2 R1 )#)∗ ((R1 ∩ R2 )#)∗
(♣) is equivalent to E ∩ PB = ∅.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 10 / 17
18. From CHP to PB -realizability
The idea is to represent an arithmetic computation in a ‘natural’ form.
The main construction
R1 , R2 — regular languages.
How to check that there exists an integer n such that
Card({w : |w | = n ∧ w ∈ R1 }) = Card({w : |w | = n ∧ w ∈ R2 })?
(♣)
Regular expression
E = #((R1 ∩ R2 )#)∗ ((R1 R2 )#(R2 R1 )#)∗ ((R1 ∩ R2 )#)∗
(♣) is equivalent to E ∩ PB = ∅.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 10 / 17
19. More examples of relation between RR and linear algebra
undecidable track product of the periodic and permutation filter
unknown permutation filter
decidable surjective filter injective filter
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 11 / 17
20. Surjective filter
Definition
SB consists of words of the form
#w1 #w2 # . . . wN #,
where
wi ∈ {0, 1}∗ are blocks,
|wi | = n, i = 1, 2, . . . , N, n is the block rank,
each binary word of length n is a block.
Examples
#00#00#11#10#01# ∈ SB
#10#11#10#00#01# ∈ SB
#10#01#00#01#11# ∈ SB
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 12 / 17
21. Injective filter
Definition
IB consists of words of the form
#w1 #w2 # . . . wN #,
where
wi ∈ {0, 1}∗ are blocks,
|wi | = n, i = 1, 2, . . . , N, n is the block rank,
wi = wj for i = j.
Examples
#00#10#01# ∈ IB
#101#111#001#010# ∈ IB
#1000#0110#0000#1111# ∈ IB
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 13 / 17
22. Decidability results
Theorem
IB -realizability problem is decidable.
SB -realizability problem is decidable.
Proofs are based on converting IB -realizability problem (resp.,
SB -realizability problem) to a problem about orbits.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 14 / 17
23. Decidability results
Theorem
IB -realizability problem is decidable.
SB -realizability problem is decidable.
Proofs are based on converting IB -realizability problem (resp.,
SB -realizability problem) to a problem about orbits.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 14 / 17
24. An undecidable problem
Zero in the Upper Right Corner Problem (ZURC)
INPUT: A1 , . . . , AN are D × D integer matrices.
OUTPUT: ‘yes’ if there exists a sequence j1 , . . . , j such that
(Aj1 Aj2 . . . Aj )1D = 0 and
‘no’ otherwise.
Theorem (Bell, Potapov, 2006)
The ZURC problem is undecidable for N = 2 and D = 18.
The ZURC problem is reduced to the regular realizability problem for the
track product of periodic and permutation filters.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 15 / 17
25. An undecidable problem
Zero in the Upper Right Corner Problem (ZURC)
INPUT: A1 , . . . , AN are D × D integer matrices.
OUTPUT: ‘yes’ if there exists a sequence j1 , . . . , j such that
(Aj1 Aj2 . . . Aj )1D = 0 and
‘no’ otherwise.
Theorem (Bell, Potapov, 2006)
The ZURC problem is undecidable for N = 2 and D = 18.
The ZURC problem is reduced to the regular realizability problem for the
track product of periodic and permutation filters.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 15 / 17
26. An undecidable problem
Zero in the Upper Right Corner Problem (ZURC)
INPUT: A1 , . . . , AN are D × D integer matrices.
OUTPUT: ‘yes’ if there exists a sequence j1 , . . . , j such that
(Aj1 Aj2 . . . Aj )1D = 0 and
‘no’ otherwise.
Theorem (Bell, Potapov, 2006)
The ZURC problem is undecidable for N = 2 and D = 18.
The ZURC problem is reduced to the regular realizability problem for the
track product of periodic and permutation filters.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 15 / 17
27. Track product
For languages L1 ⊂ ({#} ∪ Σ1 )∗ , L2 ⊂ ({#} ∪ Σ2 )∗ the track product
L1 L2 ⊂ ({#} ∪ Σ1 × Σ2 )∗ .
Projections
a1 a2 a3
... # # ...
b 1 b2 b3
π1 π2
. . . # a1 a2 a3 # . . . . . . # b 1 b 2 b3 # . . .
Definition of L1 L2
L1 L2 = {w ∈ ({#} ∪ Σ1 × Σ2 )∗ | π1 w ∈ L1 ; π2 w ∈ L2 }
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 16 / 17
28. Track product
For languages L1 ⊂ ({#} ∪ Σ1 )∗ , L2 ⊂ ({#} ∪ Σ2 )∗ the track product
L1 L2 ⊂ ({#} ∪ Σ1 × Σ2 )∗ .
Projections
a1 a2 a3
... # # ...
b 1 b2 b3
π1 π2
. . . # a1 a2 a3 # . . . . . . # b 1 b 2 b3 # . . .
Definition of L1 L2
L1 L2 = {w ∈ ({#} ∪ Σ1 × Σ2 )∗ | π1 w ∈ L1 ; π2 w ∈ L2 }
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 16 / 17
29. Track product of periodic and permutation filters
Definitions
Periodic filter PerΣ ⊂ ({#} ∪ Σ)∗ consists of words of the form
#w #w # . . . w #,
where w ∈ {0, 1}∗ .
Definition of the permutation filter PΣ over the alphabet {#} ∪ Σ is
similar to the binary case.
Theorem
ZURC ≤m (PerΣ1 PΣ2 )-regular realizability for |Σ1 | = 2, |Σ2 | = 648.
Informally, the periodic part is to represent a sequence of matrices and the
permutation part is to encode the condition that the URC entry is 0.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 17 / 17
30. Track product of periodic and permutation filters
Definitions
Periodic filter PerΣ ⊂ ({#} ∪ Σ)∗ consists of words of the form
#w #w # . . . w #,
where w ∈ {0, 1}∗ .
Definition of the permutation filter PΣ over the alphabet {#} ∪ Σ is
similar to the binary case.
Theorem
ZURC ≤m (PerΣ1 PΣ2 )-regular realizability for |Σ1 | = 2, |Σ2 | = 648.
Informally, the periodic part is to represent a sequence of matrices and the
permutation part is to encode the condition that the URC entry is 0.
S. Tarasov, M. Vyalyi (CCAS) Orbits of linear maps and regular languages CSR 2011 17 / 17