Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
See detailOn equidistribution of signs and the Sato-Tate conjecture
Wiese, Gabor UL

Presentation (2014, January 27)

The talk concerns our joint work with Sara Arias-de-Reyna and Ilker Inam about the equidistribution of signs of coefficients of half-integral weight modular forms. The basic idea is to apply the Shimura ... [more ▼]

The talk concerns our joint work with Sara Arias-de-Reyna and Ilker Inam about the equidistribution of signs of coefficients of half-integral weight modular forms. The basic idea is to apply the Shimura lift to get into integral weight modular forms, where one can make use of the Sato-Tate theorem. The importance of error terms for the Sato-Tate theorem is stressed in this context. [less ▲]

Detailed reference viewed: 75 (0 UL)
See detailOn equivariant quantization and related problems I
Poncin, Norbert UL

Presentation (2004)

Detailed reference viewed: 51 (2 UL)
See detailOn equivariant quantization and related problems II
Poncin, Norbert UL

Presentation (2004)

Detailed reference viewed: 52 (1 UL)
Full Text
Peer Reviewed
See detailOn Evaluating Adversarial Robustness of Chest X-ray Classification: Pitfalls and Best Practices
Ghamizi, Salah UL; Cordy, Maxime UL; Papadakis, Mike UL et al

in The Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI- 23) - SafeAI Workshop, Washington, D.C., Feb 13-14, 2023 (2022)

Full Text
Peer Reviewed
See detailOn Evaluation of Location Privacy Preserving Schemes for VANET Safety Applications
Emara, Karim Ahmed Awad El-Sayed UL; Woerndl, Wolfgang; Schlichter, Johann

in Computer Communications (2015), 63(1), 11--23

Location privacy in vehicular ad hoc networks has gained considerable attention in the past few years. The majority of studies concern changing pseudonyms to prevent linking messages of the same pseudonym ... [more ▼]

Location privacy in vehicular ad hoc networks has gained considerable attention in the past few years. The majority of studies concern changing pseudonyms to prevent linking messages of the same pseudonym. However, the precise spatiotemporal information included in beacons (i.e., timestamp, position, speed and heading) makes them vulnerable to tracking even if they are completely anonymous. One of the most important issues in designing location privacy scheme is to preserve the quality of service of the application. This issue is more significant for safety applications, since they require precise and frequent state updates. Thus, it is crucial to consider this trade-off between location privacy and quality of service of the safety application when designing and evaluating privacy schemes. In this paper, we propose a methodology to measure both the protection level of a privacy scheme and its impact on safety applications. We employ an empirical vehicle tracker to measure the effectiveness of a privacy scheme in terms of a number of confusions. We also measure its impact on a safety application by estimating the probability of correctly identifying the fundamental factors of that application using Monte Carlo analysis. Further, we propose an obfuscation privacy scheme which perturbs position and beacon frequency. Finally, we apply our methodology to evaluate the proposed scheme and compare it with the popular privacy scheme, random silent period. [less ▲]

Detailed reference viewed: 145 (1 UL)
Full Text
Peer Reviewed
See detailOn evaluations of propositional formulas in countable structures
Perovi, Aleksandar; Doder, Dragan UL; Ognjanovi, Zoran et al

in Filomat (2016), 30(1), 1--13

Detailed reference viewed: 51 (1 UL)
Full Text
Peer Reviewed
See detailOn Fairness Optimization for NOMA-Enabled Multi-Beam Satellite Systems
Wang, Anyue UL; Lei, Lei UL; Lagunas, Eva UL et al

in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 2019 (2019, September)

Detailed reference viewed: 159 (34 UL)
Full Text
Peer Reviewed
See detailOn Farrell-Tate cohomology of SL_2 over S-integers
Rahm, Alexander UL; Wendt, Matthias

in Journal of Algebra (2018), 512

In this paper, we provide number-theoretic formulas for Farrell–Tate cohomology for SL_2 over rings of S-integers in number fields satisfying a weak regularity assumption. These formulas describe group ... [more ▼]

In this paper, we provide number-theoretic formulas for Farrell–Tate cohomology for SL_2 over rings of S-integers in number fields satisfying a weak regularity assumption. These formulas describe group cohomology above the virtual cohomological dimension, and can be used to study some questions in homology of linear groups. We expose three applications, to (I) detection questions for the Quillen conjecture, (II) the existence of transfers for the Friedlander–Milnor conjecture, (III) cohomology of SL_2 over number fields. [less ▲]

Detailed reference viewed: 145 (6 UL)
Full Text
See detailOn four Koszul-Tate resolutions
Pistalo, Damjan UL; Poncin, Norbert UL

E-print/Working paper (2015)

Detailed reference viewed: 189 (32 UL)
Full Text
Peer Reviewed
See detailOn Fourier's inversion theorem in the context of nilpotent Lie groups
Ludwig, Jean; Molitor-Braun, Carine UL; Scuto, Laurent

in Acta Scientiarum Mathematicarum (2007), 73(3-4), 547-591

Detailed reference viewed: 124 (0 UL)
Full Text
Peer Reviewed
See detailOn Frame Fingerprinting and Controller Area Networks Security in Connected Vehicles
Buscemi, Alessio UL; Turcanu, Ion; Castignani, German et al

in IEEE Consumer Communications & Networking Conference, Virtual Conference 8-11 January 2022 (2022, January)

Modern connected vehicles are equipped with a large number of sensors, which enable a wide range of services that can improve overall traffic safety and efficiency. However, remote access to connected ... [more ▼]

Modern connected vehicles are equipped with a large number of sensors, which enable a wide range of services that can improve overall traffic safety and efficiency. However, remote access to connected vehicles also introduces new security issues affecting both inter and intra-vehicle communications. In fact, existing intra-vehicle communication systems, such as Controller Area Network (CAN), lack security features, such as encryption and secure authentication for Electronic Control Units (ECUs). Instead, Original Equipment Manufacturers (OEMs) seek security through obscurity by keeping secret the proprietary format with which they encode the information. Recently, it has been shown that the reuse of CAN frame IDs can be exploited to perform CAN bus reverse engineering without physical access to the vehicle, thus raising further security concerns in a connected environment. This work investigates whether anonymizing the frames of each newly released vehicle is sufficient to prevent CAN bus reverse engineering based on frame ID matching. The results show that, by adopting Machine Learning techniques, anonymized CAN frames can still be fingerprinted and identified in an unknown vehicle with an accuracy of up to 80 %. [less ▲]

Detailed reference viewed: 133 (18 UL)
Full Text
Peer Reviewed
See detailOn functional equations characterizing derivations: methods and examples
Gselmann, Eszter; Kiss, Gergely UL; Vincze, Csaba

in Results in Mathematics (2018)

Functional equations satisfied by additive functions have a special interest not only in the theory of functional equations, but also in the theory of (commutative) algebra because the fundamental notions ... [more ▼]

Functional equations satisfied by additive functions have a special interest not only in the theory of functional equations, but also in the theory of (commutative) algebra because the fundamental notions such as derivations and automorphisms are additive functions satisfying some further functional equations as well. It is an important question that how these morphisms can be characterized among additive mappings in general. The paper contains some multivariate characterizations of higher order derivations. The univariate characterizations are given as consequences by the diagonalization of the multivariate formulas. This method allows us to refine the process of computing the solutions of univariate functional equations of the form ∑k=1nxpkfk(xqk)=0, where pk and qk (k=1,…,n) are given nonnegative integers and the unknown functions f1,…,fn:R→R are supposed to be additive on the ring R. It is illustrated by some explicit examples too. As another application of the multivariate setting we use spectral analysis and spectral synthesis in the space of the additive solutions to prove that it is spanned by differential operators. The results are uniformly based on the investigation of the multivariate version of the functional equations. [less ▲]

Detailed reference viewed: 103 (3 UL)
See detailOn Galois representations of mod p Hilbert eigenforms of weight one
Wiese, Gabor UL

Scientific Conference (2016, August 16)

Detailed reference viewed: 79 (9 UL)
Full Text
Peer Reviewed
See detailOn Galois Representations of Weight One
Wiese, Gabor UL

in Documenta Mathematica (2014), 19

A two-dimensional Galois representation into the Hecke algebra of Katz modular forms of weight one over a finite field of characteristic p is constructed and is shown to be unramified at p in most cases.

Detailed reference viewed: 66 (5 UL)
See detailOn Galois representations of weight one
Wiese, Gabor UL

Scientific Conference (2017, June 08)

Modular forms of weight one play a special role, especially those that are geometrically defined over a finite field of characteristic p. For instance, in general they cannot be obtained as reductions ... [more ▼]

Modular forms of weight one play a special role, especially those that are geometrically defined over a finite field of characteristic p. For instance, in general they cannot be obtained as reductions from weight one forms in characteristic zero. Another property is that if the level is prime-to p, then the attached mod p Galois representation is unramified at p. It is known that this property characterises weight one forms (if p>2). In this talk, I will present the approach chosen in joint work with Mladen Dimitrov to prove the unramifiedness above p in the case of Hilbert modular forms of parallel weight one over finite fields of characteristic p and level prime-to p. The approach is based on Hecke theory and exhibits an interesting behaviour of the Galois representation into an appropriate higher weight integral Hecke algebra. [less ▲]

Detailed reference viewed: 70 (1 UL)
Full Text
See detailOn generalized Iwasawa main conjectures and p-adic Stark conjectures for Artin motives
Maksoud, Alexandre UL

E-print/Working paper (2021)

We continue the study of Selmer groups associated with an Artin representation endowed with a p-stabilization which was initiated in arXiv:1811.05368. We formulate a main conjecture and an extra zeros ... [more ▼]

We continue the study of Selmer groups associated with an Artin representation endowed with a p-stabilization which was initiated in arXiv:1811.05368. We formulate a main conjecture and an extra zeros conjecture at all unramified odd primes p, which are shown to imply the p-part of the Tamagawa number conjecture for Artin motives at s=0. We also relate our new conjectures with various cyclotomic Iwasawa main conjectures and p-adic Stark conjectures that appear in the literature. In particular, they provide a natural interpretation for recent conjectures on p-adic L-functions attached to (the adjoint of) a weight one modular form. In the case of monomial representations, we prove that our conjectures are essentially equivalent to some newly introduced Iwasawa-theoretic conjectures for Rubin-Stark elements. [less ▲]

Detailed reference viewed: 80 (0 UL)
Full Text
Peer Reviewed
See detailOn gradient solitons of the Ricci-Harmonic flow
Guo, Hongxin; Philipowski, Robert UL; Thalmaier, Anton UL

in Acta Mathematica Sinica (2015), 31(11), 1798-1804

In this paper we study gradient solitons to the Ricci flow coupled with harmonic map heat flow. We derive new identities on solitons similar to those on gradient solitons of the Ricci flow. When the ... [more ▼]

In this paper we study gradient solitons to the Ricci flow coupled with harmonic map heat flow. We derive new identities on solitons similar to those on gradient solitons of the Ricci flow. When the soliton is compact, we get a classification result. We also discuss the relation with quasi-Einstein manifolds. [less ▲]

Detailed reference viewed: 449 (47 UL)
See detailOn horizontal and vertical categorifications of Leibniz algebras
Poncin, Norbert UL

Presentation (2016, December 16)

Detailed reference viewed: 75 (3 UL)
Full Text
Peer Reviewed
See detailOn idempotent discrete uninorms
Couceiro, Miguel; Devillet, Jimmy UL; Marichal, Jean-Luc UL

in De Baets, Bernard; Torra, Vicenç; Mesiar, Radko (Eds.) Aggregation Functions in Theory and in Practice (2017, June)

In this paper we provide two axiomatizations of the class of idempotent discrete uninorms as conservative binary operations, where an operation is conservative if it always outputs one of its input values ... [more ▼]

In this paper we provide two axiomatizations of the class of idempotent discrete uninorms as conservative binary operations, where an operation is conservative if it always outputs one of its input values. More precisely we first show that the idempotent discrete uninorms are exactly those operations that are conservative, symmetric, and nondecreasing in each variable. Then we show that, in this characterization, symmetry can be replaced with both bisymmetry and existence of a neutral element. [less ▲]

Detailed reference viewed: 214 (39 UL)
Full Text
See detailOn idempotent n-ary semigroups
Devillet, Jimmy UL

Doctoral thesis (2020)

This thesis, which consists of two parts, focuses on characterizations and descriptions of classes of idempotent n-ary semigroups where n >= 2 is an integer. Part I is devoted to the study of various ... [more ▼]

This thesis, which consists of two parts, focuses on characterizations and descriptions of classes of idempotent n-ary semigroups where n >= 2 is an integer. Part I is devoted to the study of various classes of idempotent semigroups and their link with certain concepts stemming from social choice theory. In Part II, we provide constructive descriptions of various classes of idempotent n-ary semigroups. More precisely, after recalling and studying the concepts of single-peakedness and rectangular semigroups in Chapters 1 and 2, respectively, in Chapter 3 we provide characterizations of the classes of idempotent semigroups and totally ordered idempotent semigroups, in which the latter two concepts play a central role. Then in Chapter 4 we particularize the latter characterizations to the classes of quasitrivial semigroups and totally ordered quasitrivial semigroups. We then generalize these results to the class of quasitrivial n-ary semigroups in Chapter 5. Chapter 6 is devoted to characterizations of several classes of idempotent n-ary semigroups satisfying quasitriviality on certain subsets of the domain. Finally, Chapter 7 focuses on characterizations of the class of symmetric idempotent n-ary semigroups. Throughout this thesis, we also provide several enumeration results which led to new integer sequences that are now recorded in The On-Line Encyclopedia of Integer Sequences (OEIS). For instance, one of these enumeration results led to a new definition of the Catalan numbers. [less ▲]

Detailed reference viewed: 112 (9 UL)