The goal of this section is to reduce Theorem 4.8 (Montaldi and Rodriguez-Olmos’s criterion) to the special case Theorem 4.24, which we proved in the previous section. The main result of this section is Lemma 5.3.

We present applications of the notion of isomorphic vector fields to the study of nonlinear stability of relative equilibria. Isomorphic vector field…

In this section we construct a diffeomorphism that is an element of the connected component of the identity in the group of diffeomorphisms of M, but on the other hand is not contained in the C0-closure of the group of contact diffeomorphisms. Toget…

We prove that the group of contact diffeomorphisms is closed in the group of all diffeomorphisms in the C^0-topology. By Gromov's alternative, it suf…

This work was supported by the U.S. Air Force Office of Scientific Research under MURI grant FA9550-10-1-0569, by the U.S. Defense Threat Reduction Agency under grant HDTRA1-10-1-0086, by the U.S. Defense Advanced Research Projects Agency under gran…

We consider the problem of quickly detecting a signal in a sensor network when the subset of sensors in which signal may be present is completely unk…

Throughout this section, let F:M//H→M//G be a morphism of Lie groupoids induced by a homomorphism H→G of finite groups. For d=1,2, this induces a morphism of stacks Ld|10(F):Ld|10(M//H)→Ld|10(M//G). For τ a (d+1)-cocycle, naturality gives a restrict…

We use the geometry of 2|1-dimensional gauged sigma models to construct a cocycle model for twisted equivariant elliptic cohomology with complex coef…

Let ℓ≥5 be prime. On the spaces M!−12(¯¯¯ε) and H!52(ε) we have the Hecke operators T−12(ℓ2) and T52(ℓ2). For

We construct a natural basis for the space of weak harmonic Maass forms of weight 5/2 on the full modular group. The non-holomorphic part of the firs…

This section contains our main result, namely, the Σp2-completeness of the decision problem for provability of formulas in CL5.

Introduced in 2006 by Japaridze, cirquent calculus is a refinement of sequent calculus. The advent of cirquent calculus arose from the need for a ded…

The authors would like to thank William Balderrama, Alexander Dunn, Lou van den Dries, Allen Gehret, Itay Kaplan, and Erik Walsberg for dicussions and comments at various stages of the project.

We consider the four structures $(\mathbb{Z}; \mathrm{Sqf}^\mathbb{Z})$, $(\mathbb{Z}; <, \mathrm{Sqf}^\mathbb{Z})$, $(\mathbb{Q}; \mathrm{Sqf}^\math…

In this article we present results from the axisymmetric 2-D MHD simulations of a low angular momentum accretion flow on to the BH. Our work is an extension of MP08, which in turn was initiated by PB03a and PB03b (see also Proga et al. 2003). Here, …

We study how axisymmetric magnetohydrodynamical (MHD) accretion flows depend on gamma adiabatic index in the polytropic equation of state. This work …

With the preliminaries out of the way, we are now ready to prove Theorem 1.

In 1989, Thomassen asked whether there is an integer-valued function f(k) such that every f(k)-connected graph admits a spanning, bipartite $k$-conne…

In this section, we discuss the extension of our results to: (1) the planted dense subgraph recovery and DKS problem; (2) the PDS problem where the planted dense subgraph has a deterministic size. (3) the bipartite PDS problem;

This paper studies the problem of detecting the presence of a small dense community planted in a large Erd\H{o}s-R\'enyi random graph $\mathcal{G}(N,…

We report on the status of our Cybersecurity Assessment Tools (CATS) project that is creating and validating a concept inventory for cybersecurity, which assesses the quality of instruction of any first course in cybersecurity. In fall 2014, we carr…

We report on the status of our Cybersecurity Assessment Tools (CATS) project that is creating and validating a concept inventory for cybersecurity, w…

Accurate location information is essential for many wireless sensor network (WSN) applications. A location-aware WSN generally includes two types of …

In general, P(S) contains many vertices that fail Gromov’s link condition [9, Section 4.2.C], which we rephrase as follows. When ∂S=∅ this is the only reason why P(S) fails to be CAT(0), since in this case P(S) is contractible.

We introduce the polygonalisation complex of a surface, a cube complex whose vertices correspond to polygonalisations. This is a geometric model for …

The systems are modeled by a tight-binding Hamiltonian with nearest-neighbor hopping, which is given by

The realization of high-performance, small-footprint, on-chip inductors remains a challenge in radio-frequency and power microelectronics, where they…

The article poses a general model for optimal control subject to information constraints, motivated in part by recent work of Sims and others on info…

The estimation and utilization of photometric redshift probability density functions (photo-$z$ PDFs) has become increasingly important over the last…

We derive lower bounds on the Bayes risk in decentralized estimation, where the estimator does not have direct access to the random samples generated…

The goal of Byzantine Broadcast (BB) is to allow a set of fault-free nodes to agree on information that a source node wants to broadcast to them, in …

This paper considers a resilient state estimation framework for unmanned aerial vehicles (UAVs) that integrates a Kalman filter-like state estimator …

Metagenomic binning is an essential task in analyzing metagenomic sequence datasets. To analyze structure or function of microbial communities from e…

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account