Let G=(V,E) be an undirected graph. Given ℓ∈\Z, let m:V→\Z+ be a non-negative integer valued function satisfying

Given an undirected graph, the non-empty subgraph polytope is the convex hull of the characteristic vectors of pairs (F, S) where S is a non-empty su…

The connection between swimming and control theory is attracting increasing attention in the recent literature. Starting from an idea of Alberto Bres…

We study the large time behavior of solutions of first-order convex Hamilton-Jacobi Equations of Eikonal type set in the whole space. We assume that …

Rhodonea curves are classical planar curves in the unit disk with the characteristic shape of a rose. In this work, we use point samples along such r…

We consider a general discrete model for heterogeneous semiflexible polymer chains. Both the thermal noise and the inhomogeneous character of the cha…

A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them an…

Acoustic emanations of computer keyboards represent a serious privacy issue. As demonstrated in prior work, physical properties of keystroke sounds m…

As an application of Theorem 5.1, in this final section we prove results on the growth of Selmer and Mordell–Weil groups along the finite layers of K∞/K.

Let $E$ be an elliptic curve over $\mathbb Q$ and let $p\geq5$ be a prime of good supersingular reduction for $E$. Let $K$ be an imaginary quadratic …

A natural question to ask is whether or not the analogue of Corollary 3.4 or Corollary 4.4 holds with Pic(−)Q replaced by Pic(−)Qp. We will show in the section that when k is a finite field this cannot be the case, since it would imply Tate’s isogen…

In this article we prove a semistable version of the variational Tate conjecture for divisors in crystalline cohomology, stating that a rational (log…

Despite its success and popularity, machine learning is now recognized as vulnerable to evasion attacks, i.e., carefully crafted perturbations of tes…

Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this appr…

Process-aware Recommender systems (PAR systems) are information systems that aim to monitor process executions, predict their outcome, and recommend …

We introduce numerical methods for the approximation of the main (global) quantities in Pluripotential Theory as the \emph{extremal plurisubharmonic …

We study the impact of contagion in a network of firms facing credit risk. We describe an intensity based model where the homogeneity assumption is b…

We study single commodity network flows with suitable robustness and efficiency specs. An original use of a maximum entropy problem for distributions…

In this paper, we describe a new active-set algorithmic framework for minimizing a function over the simplex. The method, at each iteration, makes us…

Kernel-based methods in Numerical Analysis have the advantage of yielding optimal recovery processes in the "native" Hilbert space $\calh$ in which t…

In real-life temporal scenarios, uncertainty and preferences are often essential and coexisting aspects. We present a formalism where quantitative te…

We consider an exit-time minimum problem with a running cost, $l\geq 0$ and unbounded controls. The occurrence of points where $l=0$ can be regarded …

In this section, we prove the main results of this article, that are Theorem 3 about existence of solutions to (3) and Theorem 4 about uniqueness.

We introduce a new formulation for differential equation describing dynamics of measures on an Euclidean space, that we call Measure Differential Equ…

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account