Na matemática, o teorema de Green-Tao, demonstrado por Ben Green e Terence Tao em 2004, afirma que a sequência de números primos contém progressões aritméticas arbitrariamente longas. Em outras palavras, para cada número natural k, existe um progressão aritmética formada por k números primos. O Teorema de Green-Tao é um caso particular da conjectura de Erdös sobre progressões aritméticas.
Error Estimates for Multi-Penalty Regularization under General Source Conditioncsandit
In learning theory, the convergence issues of the regression problem are investigated with
the least square Tikhonov regularization schemes in both the RKHS-norm and the L 2
-norm.
We consider the multi-penalized least square regularization scheme under the general source
condition with the polynomial decay of the eigenvalues of the integral operator. One of the
motivation for this work is to discuss the convergence issues for widely considered manifold
regularization scheme. The optimal convergence rates of multi-penalty regularizer is achieved
in the interpolation norm using the concept of effective dimension. Further we also propose
the penalty balancing principle based on augmented Tikhonov regularization for the choice of
regularization parameters. The superiority of multi-penalty regularization over single-penalty
regularization is shown using the academic example and moon data set.
Na matemática, o teorema de Green-Tao, demonstrado por Ben Green e Terence Tao em 2004, afirma que a sequência de números primos contém progressões aritméticas arbitrariamente longas. Em outras palavras, para cada número natural k, existe um progressão aritmética formada por k números primos. O Teorema de Green-Tao é um caso particular da conjectura de Erdös sobre progressões aritméticas.
Error Estimates for Multi-Penalty Regularization under General Source Conditioncsandit
In learning theory, the convergence issues of the regression problem are investigated with
the least square Tikhonov regularization schemes in both the RKHS-norm and the L 2
-norm.
We consider the multi-penalized least square regularization scheme under the general source
condition with the polynomial decay of the eigenvalues of the integral operator. One of the
motivation for this work is to discuss the convergence issues for widely considered manifold
regularization scheme. The optimal convergence rates of multi-penalty regularizer is achieved
in the interpolation norm using the concept of effective dimension. Further we also propose
the penalty balancing principle based on augmented Tikhonov regularization for the choice of
regularization parameters. The superiority of multi-penalty regularization over single-penalty
regularization is shown using the academic example and moon data set.
All of material inside is un-licence, kindly use it for educational only but please do not to commercialize it.
Based on 'ilman nafi'an, hopefully this file beneficially for you.
Thank you.
All of material inside is un-licence, kindly use it for educational only but please do not to commercialize it.
Based on 'ilman nafi'an, hopefully this file beneficially for you.
Thank you.
A Primality test is an algorithm for determining whether an input number is Prime. Among other fields of mathematics, it is used for Cryptography. Factorization is thought to be a computationally difficult problem, whereas primality testing is comparatively easy (its running time is polynomial in the size of the input).
All of material inside is un-licence, kindly use it for educational only but please do not to commercialize it.
Based on 'ilman nafi'an, hopefully this file beneficially for you.
Thank you.
Euclid's Algorithm for Greatest Common Divisor - Time Complexity AnalysisAmrinder Arora
Euclid's algorithm for finding greatest common divisor is an elegant algorithm that can be written iteratively as well as recursively. The time complexity of this algorithm is O(log^2 n) where n is the larger of the two inputs.
The Minimum Hamming Distances of the Irreducible Cyclic Codes of Length inventionjournals
Let be a finite field with elements and where are positive integers and are distinct odd primes and 1. In this paper, we study the irreducible factorization of over and all primitive idempotents in the ring Moreover, we obtain the dimensions and the minimum Hamming distances of all irreducible cyclic codes of length over
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENTijcisjournal
In this paper, we consider an RSA modulus N=pq, where the prime factors p, q are of the same size. We
present an attack on RSA when the decryption exponent d is in the form d=Md1+d0 where M is a given
positive integer and d1 and d0 are two suitably small unknown integers. In 1999, Boneh and Durfee
presented an attack on RSA when
0.292 d < N . When d=Md1+d0, our attack enables one to overcome
Boneh and Durfee's bound and to factor the RSA modulus
The complexity of promise problems with applications to public-key cryptographyXequeMateShannon
A “promise problem” is a formulation of partial decision problem. Complexity issues about promise problems arise from considerations about cracking problems for public-key cryptosystems. Using a notion of Turing reducibility between promise problems, this paper disproves a conjecture made by Even and Yacobi (1980), that would imply nonexistence of public-key cryptosystems with NP-hard cracking problems. In its place a new conjecture is raised having the same consequence. In addition, the new conjecture implies that NP-complete sets cannot be accepted by Turing machines that have at most one accepting computation for each input word.
All of material inside is un-licence, kindly use it for educational only but please do not to commercialize it.
Based on 'ilman nafi'an, hopefully this file beneficially for you.
Thank you.
All of material inside is un-licence, kindly use it for educational only but please do not to commercialize it.
Based on 'ilman nafi'an, hopefully this file beneficially for you.
Thank you.
A Primality test is an algorithm for determining whether an input number is Prime. Among other fields of mathematics, it is used for Cryptography. Factorization is thought to be a computationally difficult problem, whereas primality testing is comparatively easy (its running time is polynomial in the size of the input).
All of material inside is un-licence, kindly use it for educational only but please do not to commercialize it.
Based on 'ilman nafi'an, hopefully this file beneficially for you.
Thank you.
Euclid's Algorithm for Greatest Common Divisor - Time Complexity AnalysisAmrinder Arora
Euclid's algorithm for finding greatest common divisor is an elegant algorithm that can be written iteratively as well as recursively. The time complexity of this algorithm is O(log^2 n) where n is the larger of the two inputs.
The Minimum Hamming Distances of the Irreducible Cyclic Codes of Length inventionjournals
Let be a finite field with elements and where are positive integers and are distinct odd primes and 1. In this paper, we study the irreducible factorization of over and all primitive idempotents in the ring Moreover, we obtain the dimensions and the minimum Hamming distances of all irreducible cyclic codes of length over
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENTijcisjournal
In this paper, we consider an RSA modulus N=pq, where the prime factors p, q are of the same size. We
present an attack on RSA when the decryption exponent d is in the form d=Md1+d0 where M is a given
positive integer and d1 and d0 are two suitably small unknown integers. In 1999, Boneh and Durfee
presented an attack on RSA when
0.292 d < N . When d=Md1+d0, our attack enables one to overcome
Boneh and Durfee's bound and to factor the RSA modulus
The complexity of promise problems with applications to public-key cryptographyXequeMateShannon
A “promise problem” is a formulation of partial decision problem. Complexity issues about promise problems arise from considerations about cracking problems for public-key cryptosystems. Using a notion of Turing reducibility between promise problems, this paper disproves a conjecture made by Even and Yacobi (1980), that would imply nonexistence of public-key cryptosystems with NP-hard cracking problems. In its place a new conjecture is raised having the same consequence. In addition, the new conjecture implies that NP-complete sets cannot be accepted by Turing machines that have at most one accepting computation for each input word.
This talk is going to be centered on two papers that are going to appear in the following months:
Neerja Mhaskar and Michael Soltys, Non-repetitive strings over alphabet lists
to appear in WALCOM, February 2015.
Neerja Mhaskar and Michael Soltys, String Shuffle: Circuits and Graphs
to appear in the Journal of Discrete Algorithms, January 2015.
Visit http://soltys.cs.csuci.edu for more details (these two papers are number 3 and 19 on the page), as well as Python programs that can be used to illustrate the ideas in the papers. We are going to introduce some basic concepts related to computations on string, present some recent results, and propose two open problems.
Fair ranking in competitive bidding procurement: a case analysisMichael Soltys
Fair and transparent procurement procedures are a cornerstone of a well functioning free-market economy. In particular, bidding is a mechanism whereby companies compete for contracts; when functioning well, the process rewards both the quality of the proposal, and the “reasonableness” of the quote.
Thue showed that there exist arbitrarily long square-free strings over an alphabet of three symbols (not true for two symbols). An open problem was posed, which is a generalization of Thue’s original result: given an alphabet list L = L1, . . . , Ln, where |Li| = 3, is it always possible to find a square-free string, w = w1w2 . . . wn, where wi ∈ Li? In this paper we show that squares can be forced on square-free strings over alphabet lists iff a suffix of the square-free string conforms to a pattern which we term as an offending suffix. We also prove properties of offending suffixes. However, the problem remains tantalizingly open.
This is a three part talk, where I give some historical context to computer science, then do a pitch for the field (from the point of view of prospective students), and then I talk about my three different research threads (proof complexity of linear algebra, 0-1 combinatorial matrices, string algorithms), and finish with a talk about security - where I mostly do consulting work.
We will describe and analyze accurate and efficient numerical algorithms to interpolate and approximate the integral of multivariate functions. The algorithms can be applied when we are given the function values at an arbitrary positioned, and usually small, existing sparse set of function values (samples), and additional samples are impossible, or difficult (e.g. expensive) to obtain. The methods are based on local, and global, tensor-product sparse quasi-interpolation methods that are exact for a class of sparse multivariate orthogonal polynomials.
Computer Science
Active and Programmable Networks
Active safety systems
Ad Hoc & Sensor Network
Ad hoc networks for pervasive communications
Adaptive, autonomic and context-aware computing
Advance Computing technology and their application
Advanced Computing Architectures and New Programming Models
Advanced control and measurement
Aeronautical Engineering,
Agent-based middleware
Alert applications
Automotive, marine and aero-space control and all other control applications
Autonomic and self-managing middleware
Autonomous vehicle
Biochemistry
Bioinformatics
BioTechnology(Chemistry, Mathematics, Statistics, Geology)
Broadband and intelligent networks
Broadband wireless technologies
CAD/CAM/CAT/CIM
Call admission and flow/congestion control
Capacity planning and dimensioning
Changing Access to Patient Information
Channel capacity modelling and analysis
Civil Engineering,
Cloud Computing and Applications
Collaborative applications
Communication application
Communication architectures for pervasive computing
Communication systems
Computational intelligence
Computer and microprocessor-based control
Computer Architecture and Embedded Systems
Computer Business
Computer Sciences and Applications
Computer Vision
Computer-based information systems in health care
Computing Ethics
Computing Practices & Applications
Congestion and/or Flow Control
Content Distribution
Context-awareness and middleware
Creativity in Internet management and retailing
Cross-layer design and Physical layer based issue
Cryptography
Data Base Management
Data fusion
Data Mining
Data retrieval
Data Storage Management
Decision analysis methods
Decision making
Digital Economy and Digital Divide
Digital signal processing theory
Distributed Sensor Networks
Drives automation
Drug Design,
Drug Development
DSP implementation
E-Business
E-Commerce
E-Government
Electronic transceiver device for Retail Marketing Industries
Electronics Engineering,
Embeded Computer System
Emerging advances in business and its applications
Emerging signal processing areas
Enabling technologies for pervasive systems
Energy-efficient and green pervasive computing
Environmental Engineering,
Estimation and identification techniques
Evaluation techniques for middleware solutions
Event-based, publish/subscribe, and message-oriented middleware
Evolutionary computing and intelligent systems
Expert approaches
Facilities planning and management
Flexible manufacturing systems
Formal methods and tools for designing
Fuzzy algorithms
Fuzzy logics
GPS and location-based app
Resource theory of asymmetric distinguishabilityMark Wilde
We systematically develop the resource-theoretic perspective on distinguishability. The theory is a resource theory of asymmetric distinguishability, given that approximation is allowed for the first quantum state in general transformation tasks. We introduce bits of asymmetric distinguishability as the basic currency in this resource theory, and we prove that it is a reversible resource theory in the asymptotic limit, with the quantum relative entropy being the fundamental rate of resource interconversion. We formally define the distillation and dilution tasks, and we find that the exact one-shot distillable distinguishability is equal to the min-relative entropy, the exact one-shot distinguishability cost is equal to the max-relative entropy, the approximate one-shot distillable distinguishability is equal to the smooth min-relative entropy, and the approximate one-shot distinguishability cost is equal to the smooth max-relative entropy. We also develop the resource theory of asymmetric distinguishability for quantum channels. For this setting, we prove that the exact distinguishability cost is equal to channel max-relative entropy and the distillable distinguishability is equal to the amortized channel relative entropy.
Iterative Soft Decision Based Complex K-best MIMO DecoderCSCJournals
This paper presents an iterative soft decision based complex multiple input multiple output (MIMO) decoding algorithm, which reduces the complexity of Maximum Likelihood (ML) detector. We develop a novel iterative complex K-best decoder exploiting the techniques of lattice reduction for 8×8 MIMO. Besides list size, a new adjustable variable has been introduced in order to control the on-demand child expansion. Following this method, we obtain 6.9 to 8.0 dB improvement over real domain K-best decoder and 1.4 to 2.5 dB better performance compared to iterative conventional complex decoder for 4th iteration and 64-QAM modulation scheme. We also demonstrate the significance of new parameter on bit error rate. The proposed decoder not only increases the performance, but also reduces the computational complexity to a certain level.
Iterative Soft Decision Based Complex K-best MIMO DecoderCSCJournals
This paper presents an iterative soft decision based complex multiple input multiple output (MIMO) decoding algorithm, which reduces the complexity of Maximum Likelihood (ML) detector. We develop a novel iterative complex K-best decoder exploiting the techniques of lattice reduction for 8×8 MIMO. Besides list size, a new adjustable variable has been introduced in order to control the on-demand child expansion. Following this method, we obtain 6.9 to 8.0 dB improvement over real domain K-best decoder and 1.4 to 2.5 dB better performance compared to iterative conventional complex decoder for 4th iteration and 64-QAM modulation scheme. We also demonstrate the significance of new parameter on bit error rate. The proposed decoder not only increases the performance, but also reduces the computational complexity to a certain level.
Similar to Feasible Combinatorial Matrix Theory - LICS2013 presentation (20)
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
Feasible Combinatorial Matrix Theory - LICS2013 presentation
1. Feasible Combinatorial Matrix Theory
Ariel G. Fern´andez, Michael Soltys.
fernanag@mcmaster.ca, soltys@mcmaster.ca
Department of Computing and Software
McMaster University
Hamilton, Ontario, Canada
2. Outline
Introduction
KMM connects max matching with min vertex core
Language to Formalize Min-Max Reasoning
Main Results
LA with ΣB
1 -Ind. proves KMM
LA Equivalence: K¨onig, Menger, Hall, Dilworth
Related Theorems
Menger’s Theorem, Hall’s Theorem, and Dilworh’s Theorem
Future Work
1/12
3. KMM connects max matching with min vertex core
1
2
3
4
5
1’
2’
3’
4’
V1 V2
2/12
4. KMM connects max matching with min vertex core
1
2
3
4
5
1’
2’
3’
4’
V1 V2
M is a Matching denoted by snaked lines.
C is a Vertex cover denoted by square nodes.
Here M is a Maximum Matching and V is a
Minimum Vertex Cover.
So by K¨onig’s Mini-Max Theorem, |M| = |C|.
2/12
5. Language to Formalize Min-Max Reasoning
LA is
(Developed by Cook and Soltys.) Part of Cook’s program of
Reverse Mathematics.
Three sorts:
indices
ring elements
matrices
LA formalize linear algebra (Matrix Algebra).
LA over Z (though all matrices are 0-1 matrices.)
Since we want to count the number of 1s in A by ΣA.
3/12
6. LA with ΣB
1 -Induction
LA (i.e., LA with ΣB
0 -Induction), proves all the ring properties of
matrices (eg.,(AB)C = A(BC)), and LA over Z translates into
TC0
-Frege ([Cook-Soltys’04]).
Bounded Matrix Quantifiers: We let
(∃A ≤ n)α stands for (∃A)[|A| ≤ n ∧ α], and
(∀A ≤ n)α stands for (∀A)[|A| ≤ n → α].
LA with ΣB
1 -Induction correspond to polytime reasoning and proves
standard properties of the determinant, and translate into extended
Frege.
4/12
7. Main Results
Theorem 1:
LA with ΣB
1 -Induction KMM.
Theorem 2:
LA proves the equivalence of fundamental theorems:
K¨onig Mini-Max
Menger’s Connectivity
Hall’s System of Distinct Representatives
Dilworth’s Decomposition
5/12
8. LA with ΣB
1 -Ind. proves KMM
Diagonal Property
∗
∗
0
...
00
0
0 . . .1
Either Aii = 1 or (∀j ≥ i)[Aij = 0 ∧ Aji = 0].
Claim Given any matrix A, ∃LA proves that there exist permutation
matrices P, Q such that PAQ has the diagonal property.
6/12
9. LA Equivalence: K¨onig, Menger, Hall, Dilworth
Theorem :
LA proves the equivalence of fundamental theorems:
K¨onig Mini-Max
Menger’s Connectivity
Hall’s System of Distinct Representatives
Dilworth’s Decomposition
7/12
15. Hall’s SDR Theorem - Example
Let X = {1, 2, 3, 4, 5} be the 5-set of integers.
Let S = {S1, S2, S3, S4} be a family of X. For instance,
S1 = {2, 5}, S2 = {2, 5}, S3 = {1, 2, 3, 4}, S4 = {1, 2, 5}.
Then D := (2, 5, 3, 1) is an SDR for (S1, S2, S3, S4).
Now, if we replace S4 by S4 = {2, 5}, then the subsets no
longer have an SDR.
For S1 ∪ S2 ∪ S4 is a 2-set, and three elements are required to
represent S1, S2, S4
9/12
16. Dilworth’s Decomposition Theorem - Example
{}
{1} {2} {3}
{1, 2} {1, 3} {2, 3}
{1, 2, 3}
Let P = (⊂, 2X
), i.e., all subsets of
X with |X| = n with set inclusion,
x < y ⇐⇒ x ⊂ y.
(A) Suppose that the largest
chain in P has size . Then P can
be partitioned into antichains.
We have 4-antichains [{}] ,
[{1}, {2}, {3}] , [{1, 2}, {1, 3}, {2, 3}] ,
and [{1, 2, 3}] .
(B) Suppose that the largest
antichain in P has size .
Then P can be partitioned into
disjoint chains. We have
[{} ⊂ {1} ⊂ {1, 2} ⊂ {1, 2, 3}] ,
[{2} ⊂ {2, 3}] , and [{3} ⊂ {1, 3}].
10/12
17. Examples of LA formalization
For example, concepts necessary to state KMM in LLA:
Cover(A, α) :=
∀i, j ≤ r(A)(A(i, j) = 1 → α(1, i) = 1 ∨ α(2, j) = 1)
Select(A, β) :=
∀i, j ≤ r(A)((β(i, j) = 1 → A(i, j) = 1)
∧
∀k ≤ r(A)(β(i, j) = 1 → β(i, k) = 0 ∧ β(k, j) = 0))
11/12
18. Future Work
Can LA-Theory prove KMM?
What is the relationship between KMM and PHP?
(Eg. LA ∪ PHP KMM?)
Can LA ∪ KMM prove Hard Matrix Identities?
We would like to know whether LA ∪ KMM can prove hard
matrix identities, such as AB = I → BA = I. Of course, we
already know from [TZ11] that (non-uniform) NC2
-Frege is
sufficient to prove AB = I → BA = I, and from [Sol06] we
know that ∃LA can prove them also.
What about ∞-KMM?
12/12