Generalized Prolate Spheroidal Functions (GPSF) are the eigenfunctions of the truncated Fourier transform, restricted to D-dimensional balls in the spatial domain and frequency domain. Despite their useful properties ...
详细信息
Direct numerical simulation techniques are used to study the effect of spontaneous symmetry breaking leading to the phenomenon of large‐scale secondary flow generation by anisotropic small‐scale flow. It is shown th...
Direct numerical simulation techniques are used to study the effect of spontaneous symmetry breaking leading to the phenomenon of large‐scale secondary flow generation by anisotropic small‐scale flow. It is shown that anisotropy is a major factor that determines the ability of the small‐scale flow to generate the inverse energy cascade, that the large‐scale secondary flow is strongly anisotropic—almost unidirectional, and that the helical property of the primary flow is irrelevent. The pairing instability and long‐wave modulation of the subharmonic are important in the process of generation of the large‐scale structure.
In secure multi-party computations (SMC), parties wish to compute a function on their private data without revealing more information about their data than what the function reveals. In this paper, we investigate two ...
详细信息
ISBN:
(纸本)9781479980109
In secure multi-party computations (SMC), parties wish to compute a function on their private data without revealing more information about their data than what the function reveals. In this paper, we investigate two Shannon-type questions on this problem. We first consider the traditional one-shot model for SMC which does not assume a probabilistic prior on the data. In this model, private communication and randomness are the key enablers to secure computing, and we investigate a notion of randomness cost and capacity. We then move to a probabilistic model for the data, and propose a Shannon model for discrete memoryless SMC. In this model, correlations among data are the key enablers for secure computing, and we investigate a notion of dependency which permits the secure computation of a function. While the models and questions are general, this paper focuses on summation functions and relies on polar code constructions.
We present new algorithms for computing the H∞ optimal performance for a class of single-input/single-output (SISO) infinite-dimensional systems. The algorithms here only require use of one or two fast Fourier transf...
详细信息
Given a parametrized family of finite frames, we consider the optimization problem of finding the member of this family whose coefficient space most closely contains a given data vector. This nonlinear least squares p...
详细信息
Single-particle cryo-electron microscopy (cryo-EM) has recently joined X-ray crystallography and NMR spectroscopy as a high-resolution structural method for biological macromolecules. Cryo-EM was selected by Nature Me...
详细信息
We reformulate the renormalization group (RNG) and the e{open}-expansion for derivation of turbulence models. The procedure is developed for the Navier-Stokes equations and the transport equations for the kinetic ener...
详细信息
During the last few years, neural machine translation (NMT) as a notable branch of machine translation has been increasing its popularity both in research and in practice. In particular, neural machine translation bet...
详细信息
This paper studies a class of probabilistic models on graphs, where edge variables depend on incident node variables through a fixed probability kernel. The class includes planted constraint satisfaction problems (CSP...
详细信息
暂无评论