ترغب بنشر مسار تعليمي؟ اضغط هنا

One-sided epsilon-approximants

120   0   0.0 ( 0 )
 نشر من قبل Boris Bukh
 تاريخ النشر 2016
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

Given a finite point set $Psubsetmathbb{R}^d$, we call a multiset $A$ a one-sided weak $varepsilon$-approximant for $P$ (with respect to convex sets), if $|Pcap C|/|P|-|Acap C|/|A|leqvarepsilon$ for every convex set $C$. We show that, in contrast with the usual (two-sided) weak $varepsilon$-approximants, for every set $Psubset mathbb{R}^d$ there exists a one-sided weak $varepsilon$-approximant of size bounded by a function of $varepsilon$ and $d$.



قيم البحث

اقرأ أيضاً

It is well-known that discrete-time finite-state Markov Chains, which are described by one-sided conditional probabilities which describe a dependence on the past as only dependent on the present, can also be described as one-dimensional Markov Field s, that is, nearest-neighbour Gibbs measures for finite-spin models, which are described by two-sided conditional probabilities. In such Markov Fields the time interpretation of past and future is being replaced by the space interpretation of an interior volume, surrounded by an exterior to the left and to the right. If we relax the Markov requirement to weak dependence, that is, continuous dependence, either on the past (generalising the Markov-Chain description) or on the external configuration (generalising the Markov-Field description), it turns out this equivalence breaks down, and neither class contains the other. In one direction this result has been known for a few years, in the opposite direction a counterexample was found recently. Our counterexample is based on the phenomenon of entropic repulsion in long-range Ising (or Dyson) models.
In this paper, we study the problem of privacy-preserving data sharing, wherein only a subset of the records in a database are sensitive, possibly based on predefined privacy policies. Existing solutions, viz, differential privacy (DP), are over-pess imistic and treat all information as sensitive. Alternatively, techniques, like access control and personalized differential privacy, reveal all non-sensitive records truthfully, and they indirectly leak information about sensitive records through exclusion attacks. Motivated by the limitations of prior work, we introduce the notion of one-sided differential privacy (OSDP). We formalize the exclusion attack and we show how OSDP protects against it. OSDP offers differential privacy like guarantees, but only to the sensitive records. OSDP allows the truthful release of a subset of the non-sensitive records. The sample can be used to support applications that must output true data, and is well suited for publishing complex types of data, e.g. trajectories. Though some non-sensitive records are suppressed to avoid exclusion attacks, our experiments show that the suppression results in a small loss in utility in most cases. Additionally, we present a recipe for turning DP mechanisms for answering counting queries into OSDP techniques for the same task. Our OSDP algorithms leverage the presence of non-sensitive records and are able to offer up to a 25x improvement in accuracy over state-of-the-art DP-solutions.
Let $n$ be an integer greater or equal than $3$. We give a simultaneous generalization of $(n-2)$-exact categories and $n$-angulated categories, and we call it one-sided $n$-suspended categories. One-sided $n$-angulated categories are also examples o f one-sided $n$-suspended categories. We provide a general framework for passing from one-sided $n$-suspended categories to one-sided $n$-angulated categories. Besides, we give a method to construct $n$-angulated quotient categories from Frobenius $n$-prile categories. These results generalize their works by Jasso for $n$-exact categories, Lin for $(n+2)$-angulated categories and Li for one-sided suspended categories.
In this paper, we introduce quotients of exact categories by percolating subcategories. This approach extends earlier localization theories by Cardenas and Schlichting for exact categories, allowing new examples. Let $mathcal{A}$ be a percolating sub category of an exact category $mathcal{E}$, the quotient $mathcal{E} {/mkern-6mu/} mathcal{A}$ is constructed in two steps. In the first step, we associate a set $S_mathcal{A} subseteq operatorname{Mor}(mathcal{E})$ to $mathcal{A}$ and consider the localization $mathcal{E}[S^{-1}_mathcal{A}]$. In general, $mathcal{E}[S_mathcal{A}^{-1}]$ need not be an exact category, but will be a one-sided exact category. In the second step, we take the exact hull $mathcal{E} {/mkern-6mu/} mathcal{A}$ of $mathcal{E}[S_mathcal{E}^{-1}]$. The composition $mathcal{E} rightarrow mathcal{E}[S_mathcal{A}^{-1}] rightarrow mathcal{E} {/mkern-6mu/} mathcal{A}$ satisfies the 2-universal property of a quotient in the 2-category of exact categories. We formulate our results in slightly more generality, allowing to start from a one-sided exact category. Additionally, we consider a type of percolating subcategories which guarantee that the morphisms of the set $S_mathcal{A}$ are admissible. In upcoming work, we show that these localizations induce Verdier localizations on the level of the bounded derived category.
152 - Paul Tod 2020
We consider four-dimensional, Riemannian, Ricci-flat metrics for which one or other of the self-dual or anti-self-dual Weyl tensors is type-D. Such metrics always have a valence-2 Killing spinor, and therefore a Hermitian structure and at least one K illing vector. We rederive the results of Przanowski and collaborators, that these metrics can all be given in terms of a solution of the $SU(infty)$-Toda field equation, and show that, when there is a second Killing vector commuting with the first, the method of Ward can be applied to show that the metrics can also be given in terms of an axisymmetric solution of the flat three-dimensional Laplacian. Thus in particular the field equations linearise. As a corollary, we show that the same technique linearises the field equations for a four-dimensional Einstein metric with anti-self-dual Weyl tensor and two commuting symmetries. Some examples of both constructions are given.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا