Sciweavers

CORR
2011
Springer
170views Education» more  CORR 2011»
14 years 10 months ago
Exact observability, square functions and spectral theory
Abstract. In the first part of this article we introduce the notion of a backwardforward conditioning (BFC) system that generalises the notion of zero-class admissibiliy introduce...
Bernhard Hermann Haak, El-Maati Ouhabaz
59
Voted
CORR
2011
Springer
122views Education» more  CORR 2011»
14 years 10 months ago
Adaptive Cluster Expansion for Inferring Boltzmann Machines with Noisy Data
Simona Cocco, Rémi Monasson
99
Voted
CORR
2011
Springer
185views Education» more  CORR 2011»
14 years 10 months ago
The decimation process in random k-SAT
Amin Coja-Oghlan, Angelica Y. Pachon-Pinzon
CORR
2011
Springer
154views Education» more  CORR 2011»
14 years 10 months ago
Dual-Tree Fast Gauss Transforms
Dongryeol Lee, Alexander G. Gray, Andrew W. Moore
CORR
2011
Springer
137views Education» more  CORR 2011»
14 years 10 months ago
An improvement of the Moser-Tardos algorithmic local lemma
A recent theorem of Bissacot, et al. proved using results about the cluster expansion in statistical mechanics extends the Lov´asz Local Lemma by weakening the conditions under w...
Wesley Pegden
CORR
2011
Springer
191views Education» more  CORR 2011»
14 years 10 months ago
Picturing classical and quantum Bayesian inference
We introduce a graphical framework for Bayesian inference that is sufficiently general to accommodate not just the standard case but also recent proposals for a theory of quantum...
Bob Coecke, Robert W. Spekkens
CORR
2011
Springer
163views Education» more  CORR 2011»
14 years 10 months ago
Cryptanalysis of three matrix-based key establishment protocols
We cryptanalyse a matrix-based key transport protocol due to Baumslag, Camps, Fine, Rosenberger and Xu from 2006. We also cryptanalyse two recently proposed matrix-based key agree...
Simon R. Blackburn, Carlos Cid, Ciaran Mullan
CORR
2011
Springer
188views Education» more  CORR 2011»
14 years 10 months ago
Robust Matrix Completion with Corrupted Columns
This paper considers the problem of matrix completion, when some number of the columns are arbitrarily corrupted, potentially by a malicious adversary. It is well-known that stand...
Yudong Chen, Huan Xu, Constantine Caramanis, Sujay...
CORR
2011
Springer
144views Education» more  CORR 2011»
14 years 10 months ago
Schema Redescription in Cellular Automata: Revisiting Emergence in Complex Systems
—We present a method to eliminate redundancy in the transition tables of Boolean automata: schema redescription with two symbols. One symbol is used to capture redundancy of indi...
Manuel Marques-Pita, Luis Mateus Rocha
155
Voted
CORR
2011
Springer
161views Education» more  CORR 2011»
14 years 10 months ago
The physical Church-Turing thesis and the principles of quantum theory
Abstract. Notoriously, quantum computation shatters complexity theory, but is innocuous to computability theory [17]. Yet several works have shown how quantum theory as it stands c...
Pablo Arrighi, Gilles Dowek