30 results on '"Guangwu Xu"'
Search Results
2. On the Optimal Pre-Computation of Window NAF for Koblitz Curves
- Author
-
Guangwu Xu and William R. Trost
- Subjects
Discrete mathematics ,Computation ,010102 general mathematics ,Window (computing) ,02 engineering and technology ,Divisibility rule ,01 natural sciences ,020202 computer hardware & architecture ,Theoretical Computer Science ,Combinatorics ,Elliptic curve ,Computational Theory and Mathematics ,Hardware and Architecture ,Scheme (mathematics) ,0202 electrical engineering, electronic engineering, information engineering ,Multiplication ,Point (geometry) ,0101 mathematics ,Elliptic curve cryptography ,Software ,Mathematics - Abstract
Koblitz curves have been an important subject of consideration for both theoretical andpractical interests. The window $\tau$ -adic algorithm of Solinas (window $\tau$ NAF) is the most powerful method for computing point multiplication for Koblitz curves.Pre-computation plays an important role in improving the performance of point multiplication. In this paper, the concept of optimal pre-computation for window $\tau$ NAF is formulated. In this setting, an optimal pre-computation has some mathematically natural and clean forms, and requires $2^{w-2}-1$ point additions and two evaluations of the Frobenius map $\tau$ , where $w$ is the window width. One of the main results of this paper is to construct an optimal pre-computation scheme for each window width $w$ from $4$ to $15$ (more than practical needs).These pre-computations can be easily incorporated into implementations of window $\tau$ NAF. The ideas in the paper can also be used to construct other suitable pre-computations. This paper includes a discussion of coefficient sets for window $\tau$ NAF and the divisibility by powers of $\tau$ through different approaches. Some issues of implementation are also discussed.
- Published
- 2016
3. On Solving a Generalized Chinese Remainder Theorem in the Presence of Remainder Errors
- Author
-
Guangwu Xu
- Subjects
Combinatorics ,Coprime integers ,Modulo ,0202 electrical engineering, electronic engineering, information engineering ,020206 networking & telecommunications ,02 engineering and technology ,Remainder ,Extreme value theory ,Chinese remainder theorem ,Quotient ,Moduli ,Counterexample ,Mathematics - Abstract
In estimating frequencies given that the signal waveforms are undersampled multiple times, Xia et al. proposed to use a generalized version of Chinese remainder Theorem (CRT), where the moduli are \(M_1, M_2, \ldots , M_k\) which are not necessarily pairwise coprime. If the errors of the corrupted remainders are within \(\tau = \displaystyle \max _{1\le i\le k} \min _{{\mathop {j\ne i}\limits ^{1\le j\le k}}} \frac{\gcd (M_i,M_j)}{4}\), their schemes can be used to construct an approximation of the solution to the generalized CRT with an error smaller than \(\tau \). Accurately finding the quotients is a critical ingredient in their approach. In this paper, we shall start with a faithful historical account of the generalized CRT. We then present two treatments of the problem of solving generalized CRT with erroneous remainders. The first treatment follows the route of Wang and Xia to find the quotients, but with a simplified process. The second treatment considers a simplified model of generalized CRT and takes a different approach by working on the corrupted remainders directly. This approach also reveals some useful information about the remainders by inspecting extreme values of the erroneous remainders modulo \(4\tau \). Both of our treatments produce efficient algorithms with essentially optimal performance. Finally, this paper constructs a counterexample to prove the sharpness of the error bound \(\tau \).
- Published
- 2018
4. Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas
- Author
-
Guangwu Xu and Saud Al Musa
- Subjects
010102 general mathematics ,Binary number ,02 engineering and technology ,Lambda ,Scalar multiplication ,01 natural sciences ,Supersingular elliptic curve ,020202 computer hardware & architecture ,Elliptic curve ,Tree (descriptive set theory) ,Elliptic curve point multiplication ,0202 electrical engineering, electronic engineering, information engineering ,Applied mathematics ,Affine transformation ,0101 mathematics ,Mathematics - Abstract
This paper considers efficient scalar multiplication of elliptic curves over binary fields with a twofold purpose. Firstly, we derive the most efficient 3P formula in \(\lambda \)-projective coordinates and 5P formula in both affine and \(\lambda \)-projective coordinates. Secondly, extensive experiments have been conducted to test various multi-base scalar multiplication methods (e.g., greedy, ternary/binary, multi-base NAF, and tree-based) by integrating our fast formulas. The experiments show that our 3P and 5P formulas had an important role in speeding up the greedy, the ternary/binary, the multi-base NAF, and the tree-based methods over the NAF method. We also establish an efficient 3P formula for Koblitz curves and use it to construct an improved set for the optimal pre-computation of window TNAF.
- Published
- 2017
5. A note on BDD problems with λ2-gap
- Author
-
Xiaoyun Wang, Mingjie Liu, Xuexin Zheng, Guangwu Xu, Institute for Advanced Study [Tsinghua], Tsinghua University [Beijing], Cryptanalyse (CRYPT), Laboratoire Franco-Chinois d'Informatique, d'Automatique et de Mathématiques Appliquées (LIAMA), Centre de Coopération Internationale en Recherche Agronomique pour le Développement (Cirad)-Institut National de la Recherche Agronomique (INRA)-Chinese Academy of Sciences [Changchun Branch] (CAS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institute of Automation - Chinese Academy of Sciences-Centre National de la Recherche Scientifique (CNRS)-Centre de Coopération Internationale en Recherche Agronomique pour le Développement (Cirad)-Institut National de la Recherche Agronomique (INRA)-Chinese Academy of Sciences [Changchun Branch] (CAS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institute of Automation - Chinese Academy of Sciences-Centre National de la Recherche Scientifique (CNRS)-Inria Paris-Rocquencourt, Institut National de Recherche en Informatique et en Automatique (Inria), and Tsinghua University [Beijing] (THU)
- Subjects
Discrete mathematics ,Successive minima ,Lattice problem ,Open problem ,010102 general mathematics ,Lattice ,uSVP ,0102 computer and information sciences ,01 natural sciences ,Computer Science Applications ,Theoretical Computer Science ,Combinatorics ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,010201 computation theory & mathematics ,Bounded function ,Lattice (order) ,Signal Processing ,Partial solution ,Cryptography ,0101 mathematics ,BDD ,Decoding methods ,Information Systems ,Mathematics - Abstract
In CRYPTO 2009, Lyubashevsky and Micciancio presented reductions BDD 1 / 2 γ (Bounded Distance Decoding Problem) ≤ uSVP γ (Unique Shortest Vector Problem) ≤ BDD 1 / γ , and posed an open problem whether the reduction gap can be closed. This paper concerns bounded distance decoding (BDD) problems for lattices with large λ 2 -gap. In the presence of larger λ 2 -gap, better reductions from BDD to uSVP and exact SVP are obtained. Some result can be regarded as a partial solution to the open problem. For some parameters, a better reduction from BDD to uSVP is given.An open problem proposed by Lyubashevsky and Micciancio is partially solved.This paper also improves a previous reduction from BDD to exact SVP.
- Published
- 2014
6. On the ℓ 1-Norm Invariant Convex k-Sparse Decomposition of Signals
- Author
-
Guangwu Xu and Zhiqiang Xu
- Subjects
Combinatorics ,Compressed sensing ,Norm (mathematics) ,Regular polygon ,Sparse approximation ,Management Science and Operations Research ,Invariant (mathematics) ,L1 minimization ,Mathematics ,Restricted isometry property - Abstract
Inspired by an interesting idea of Cai and Zhang, we formulate and prove the convex k-sparse decomposition of vectors that is invariant with respect to the l 1 norm. This result fits well in discussing compressed sensing problems under the Restricted Isometry property, but we believe it also has independent interest. As an application, a simple derivation of the RIP recovery condition δ k +θ k,k
- Published
- 2013
7. Measure inequalities and the transference theorem in the geometry of numbers
- Author
-
Chengliang Tian, Guangwu Xu, and Mingjie Liu
- Subjects
Algebra ,Discrete mathematics ,Inequality ,Geometry of numbers ,Applied Mathematics ,General Mathematics ,media_common.quotation_subject ,Convex body ,Lattice-based cryptography ,Measure (mathematics) ,media_common ,Mathematics - Published
- 2013
8. A polynomial time algorithm for GapCVPP in l 1 norm
- Author
-
ChengLiang Tian, LiDong Han, and Guangwu Xu
- Subjects
Combinatorics ,Discrete mathematics ,General Computer Science ,Computational complexity theory ,Lattice (order) ,Norm (mathematics) ,Algorithm ,Time complexity ,Laplace distribution ,Mathematics - Abstract
This paper concerns the hardness of approximating the closest vector in a lattice with preprocessing in l 1 norm, and gives a polynomial time algorithm for GapCVPPγ in l 1 norm with gap γ = O(n/logn). The gap is smaller than that obtained by simply generalizing the approach given by Aharonov and Regev. The main technical ingredient used in this paper is the discrete Laplace distribution on lattices which may be of independent interest.
- Published
- 2013
9. New Bounds for Restricted Isometry Constants
- Author
-
Lie Wang, Guangwu Xu, and T. Tony Cai
- Subjects
FOS: Computer and information sciences ,Discrete mathematics ,Observational error ,Noise measurement ,Signal reconstruction ,Information Theory (cs.IT) ,Computer Science - Information Theory ,020206 networking & telecommunications ,02 engineering and technology ,Library and Information Sciences ,Upper and lower bounds ,Computer Science Applications ,Restricted isometry property ,Combinatorics ,Compressed sensing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Minification ,Information Systems ,Sparse matrix ,Mathematics - Abstract
This paper discusses new bounds for restricted isometry constants in compressed sensing. Let Φ be an n × p real matrix and A; be a positive integer with k ≤ n. One of the main results of this paper shows that if the restricted isometry constant δk of Φ satisfies δk
- Published
- 2010
10. On an attack on RSA with small CRT-exponents
- Author
-
Lidong Han, Xiaoyun Wang, and Guangwu Xu
- Subjects
General Computer Science ,law ,Computation ,Lattice reduction ,Remainder ,Arithmetic ,Cryptanalysis ,Computer Science::Cryptography and Security ,Counterexample ,law.invention ,Mathematics - Abstract
This paper concerns the RSA system with private CRT-exponents. Since Chinese remainder representation provides efficiency in computation, such system is of some practical significance. In this paper, an existing attack to small private CRT-exponents is analyzed. It is indicated that this attack makes nice use of lattice in RSA analysis, but some argument does not hold in general. Several counterexamples are constructed. Refinements and more precise statements of the attack are given.
- Published
- 2010
11. Stable Recovery of Sparse Signals and an Oracle Inequality
- Author
-
T. Tony Cai, Lie Wang, and Guangwu Xu
- Subjects
Noise measurement ,Signal reconstruction ,business.industry ,Context (language use) ,Pattern recognition ,Library and Information Sciences ,Oracle ,Computer Science Applications ,Noise ,symbols.namesake ,Compressed sensing ,Gaussian noise ,symbols ,Artificial intelligence ,business ,Algorithm ,Information Systems ,Counterexample ,Mathematics - Abstract
This article considers sparse signal recovery in the presence of noise. A mutual incoherence condition which was previously used for exact recovery in the noiseless case is shown to be sufficient for stable recovery in the noisy case. Furthermore, the condition is proved to be sharp. A specific counterexample is given. In addition, an oracle inequality is derived under the mutual incoherence condition in the case of Gaussian noise.
- Published
- 2010
12. Shifting Inequality and Recovery of Sparse Signals
- Author
-
T. Tony Cai, Lie Wang, and Guangwu Xu
- Subjects
Signal processing ,Mathematical optimization ,Inequality ,Signal reconstruction ,media_common.quotation_subject ,Constrained optimization ,Restricted isometry property ,Norm (mathematics) ,Signal Processing ,Subsequence ,Applied mathematics ,Minification ,Electrical and Electronic Engineering ,Mathematics ,media_common - Abstract
In this paper, we present a concise and coherent analysis of the constrained ?1 minimization method for stable recovering of high-dimensional sparse signals both in the noiseless case and noisy case. The analysis is surprisingly simple and elementary, while leads to strong results. In particular, it is shown that the sparse recovery problem can be solved via ?1 minimization under weaker conditions than what is known in the literature. A key technical tool is an elementary inequality, called Shifting Inequality, which, for a given nonnegative decreasing sequence, bounds the ?2 norm of a subsequence in terms of the ?1 norm of another subsequence by shifting the elements to the upper end.
- Published
- 2010
13. On stars and Steiner stars
- Author
-
Adrian Dumitrescu, Guangwu Xu, and Csaba D. Tóth
- Subjects
Unit sphere ,Discrete mathematics ,Minimum Steiner star ,Applied Mathematics ,010102 general mathematics ,Fermat–Torricelli–Weber point ,A* search algorithm ,Wallis product ,0102 computer and information sciences ,Minimum star ,01 natural sciences ,Infimum and supremum ,Graph ,Theoretical Computer Science ,law.invention ,Euclidean distance ,Combinatorics ,Stars ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,law ,Facility location ,0101 mathematics ,Mathematics - Abstract
A Steiner star for a set P of n points in R^d connects an arbitrary point in R^d to all points of P, while a star connects one of the points in P to the remaining n-1 points of P. All connections are realized by straight line segments. Let the length of a graph be the total Euclidean length of its edges. Fekete and Meijer showed that the minimum star is at most 2 times longer than the minimum Steiner star for any finite point configuration in R^d. The supremum of the ratio between the two lengths, over all finite point configurations in R^d, is called the star Steiner ratio in R^d. It is conjectured that this ratio is 4/@p=1.2732... in the plane and 4/3=1.3333... in three dimensions. Here we give upper bounds of 1.3631 in the plane, and 1.3833 in 3-space. These estimates yield improved upper bounds on the maximum ratios between the minimum star and the maximum matching in two and three dimensions. We also verify that the conjectured bound 4/@p in the plane holds in two special cases. Our method exploits the connection with the classical problem of estimating the maximum sum of pairwise distances among n points on the unit sphere, first studied by Laszlo Fejes Toth. It is quite general and yields the first nontrivial estimates below 2 on the star Steiner ratios in arbitrary dimensions. We show, however, that the star Steiner ratio in R^d tends to 2 as d goes to infinity. As it turns out, our estimates are related to the classical infinite Wallis product: @[email protected]?"n"="1^~(4n^24n^2-1)[email protected][email protected][email protected][email protected][email protected][email protected][email protected]?89....
- Published
- 2009
14. Linear dynamical systems over finite rings
- Author
-
Yi Ming Zou and Guangwu Xu
- Subjects
Discrete mathematics ,Algebra and Number Theory ,Polynomial ring ,Linear system ,Fixed point systems ,Commutative ring ,Linear equation over a ring ,Dynamical Systems (math.DS) ,92D99 ,Commutative Algebra (math.AC) ,Mathematics - Commutative Algebra ,Linear dynamical system ,Finite field ,Linear dynamical systems ,FOS: Mathematics ,Finite rings ,13M99 ,Mathematics - Dynamical Systems ,Linear combination ,Random dynamical system ,Mathematics - Abstract
The problem of linking the structure of a finite linear dynamical system with its dynamics is well understood when the phase space is a vector space over a finite field. The cycle structure of such a system can be described by the elementary divisors of the linear function, and the problem of determining whether the system is a fixed point system can be answered by computing and factoring the system's characteristic polynomial and minimal polynomial. It has become clear recently that the study of finite linear dynamical systems must be extended to embrace finite rings. The difficulty of dealing with an arbitrary finite commutative ring is that it lacks of unique factorization. In this paper, an efficient algorithm is provided for analyzing the cycle structure of a linear dynamical system over a finite commutative ring. In particular, for a given commutative ring $R$ such that $|R|=q$, where $q$ is a positive integer, the algorithm determines whether a given linear system over $R^n$ is a fixed point system or not in time $O(n^3\log(n\log(q)))$., To appear in Journal of Algebra (Computational Section). Code for the algorithm is available upon request
- Published
- 2009
- Full Text
- View/download PDF
15. Nonadjacent Radix-τ Expansions of Integers in Euclidean Imaginary Quadratic Number Fields
- Author
-
V. Kumar Murty, Guangwu Xu, and Ian F. Blake
- Subjects
Discrete mathematics ,General Mathematics ,010102 general mathematics ,Algebraic number field ,01 natural sciences ,Quadratic equation ,0103 physical sciences ,Euclidean geometry ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Point (geometry) ,Radix ,010307 mathematical physics ,0101 mathematics ,GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries) ,Mathematics - Abstract
In his seminal papers, Koblitz proposed curves for cryptographic use. For fast operations on these curves, these papers also initiated a study of the radix-τ expansion of integers in the number fields and . The (window) nonadjacent form of τ -expansion of integers in was first investigated by Solinas. For integers in , the nonadjacent form and the window nonadjacent form of the τ -expansion were studied. These are used for efficient point multiplications on Koblitz curves. In this paper, we complete the picture by producing the (window) nonadjacent radix-τ expansions for integers in all Euclidean imaginary quadratic number fields.
- Published
- 2008
16. Basic Concepts
- Author
-
Guangwu Xu, Mingqiang Wang, Xianmeng Meng, and Xiaoyun Wang
- Subjects
Public-key cryptography ,Mathematical problem ,business.industry ,business ,Computer security ,computer.software_genre ,computer ,Mathematics - Published
- 2015
17. Congruences
- Author
-
Mingqiang Wang, Guangwu Xu, Xiaoyun Wang, and Xianmeng Meng
- Subjects
Pure mathematics ,Distribution (number theory) ,Prime (order theory) ,Mathematics - Published
- 2015
18. Congruence Equations
- Author
-
Xiaoyun Wang, Guangwu Xu, Xianmeng Meng, and Mingqiang Wang
- Subjects
Simple (abstract algebra) ,Applied mathematics ,Mathematics - Published
- 2015
19. Divisibility of Integers
- Author
-
Guangwu Xu, Mingqiang Wang, Xianmeng Meng, and Xiaoyun Wang
- Subjects
Combinatorics ,Pure mathematics ,Divisibility rule ,Primitive root modulo n ,Mathematics - Published
- 2015
20. A note on window τ-NAF algorithm
- Author
-
Guangwu Xu, V. Kumar Murty, and Ian F. Blake
- Subjects
business.industry ,Mathematics::Number Theory ,Window (computing) ,Cryptography ,Computer Science Applications ,Theoretical Computer Science ,Elliptic curve ,Signal Processing ,Point (geometry) ,Multiplication ,Element (category theory) ,business ,Algorithm ,Information Systems ,Mathematics - Abstract
The window τ-adic algorithm of Solinas [Efficient arithmetic on Koblitz curves, Designs, Codes and Cryptography 19 (2000) 195] is the most powerful method for computing point multiplication for Koblitz curves. In this note, the existence of a more general window τ-adic form for each element in Z[τ] is obtained. In particular, this provides a proof of the termination of Solinas algorithm.
- Published
- 2005
21. Efficient algorithms for Koblitz curves over fields of characteristic three
- Author
-
Guangwu Xu, Ian F. Blake, and V. Kumar Murty
- Subjects
Discrete mathematics ,business.industry ,Cryptography ,Supersingular elliptic curve ,Theoretical Computer Science ,Algorithm ,Reduction (complexity) ,Elliptic curve ,Finite field ,Computational Theory and Mathematics ,Counting points on elliptic curves ,Elliptic curves ,Discrete Mathematics and Combinatorics ,Point (geometry) ,Multiplication ,Window nonadjacent expansion ,business ,Mathematics - Abstract
The nonadjacent form method of Koblitz [Advances in Cryptology (CRYPTO'98), in: Lecture Notes in Comput. Sci., vol. 1462, 1998, pp. 327–337] is an efficient algorithm for point multiplication on a family of supersingular curves over a finite field of characteristic 3. In this paper, a further discussion of the method is given. A window nonadjacent form method is proposed and its validity is proved. Efficient reduction and pre-computations are given. Analysis shows that more than 30% of saving can be achieved.
- Published
- 2005
22. The weak closure of the set of left translation operators
- Author
-
Guangwu Xu and Ching Chou
- Subjects
Discrete mathematics ,Set (abstract data type) ,Applied Mathematics ,General Mathematics ,Converse ,Closure (topology) ,Nest algebra ,Locally compact group ,Tomita–Takesaki theory ,Translation (geometry) ,Affiliated operator ,Mathematics - Abstract
It is known that for an amenable locally compact group G, 0 is not in the weak closure of {A(g): g E G} of VN(G). In this paper, it is proved that the converse of this is true. In other words, if G is a non-amenable locally compact group, then 0 is in the weak closure of {A(g): g E G}. This answers several questions of Ulger. Applications to the algebra C,; (G) and the dual of the reduced group C*-algebra are obtained.
- Published
- 1999
23. On a query algorithm for a divisibility problem
- Author
-
Adrian Dumitrescu and Guangwu Xu
- Subjects
Combinatorics ,Discrete mathematics ,General Medicine ,Divisibility rule ,Value (mathematics) ,Upper and lower bounds ,Algorithm ,Oracle ,Mathematics - Abstract
According to an old result of Turán, any ( n + 1)-subset of {1, 2, ..., 2 n } contains a pair of divisible numbers. Ciurea et al. have recently considered a natural algorithmic variant of this classic mathematical result: if the subset is not known, and it is only accessible via a membership oracle, what is the minimum number of questions necessary to identify one such divisible pair? They showed a 4/3 n -- O (1) lower bound and also designed an algorithm which they conjectured asks no more than 4/3 n + O (1) queries, and therefore would be optimal. We reanalyze the proposed algorithm and prove that it comes close to the conjectured value, in asking no more than (4/3 + 5/108) n + O (1) queries; this corrects an error in the old analysis.
- Published
- 2007
24. Herz-Schur multipliers and weakly almost periodic functions on locally compact groups
- Author
-
Guangwu Xu
- Subjects
Almost periodic function ,Pure mathematics ,Applied Mathematics ,General Mathematics ,Locally compact space ,Topology ,Mathematics - Abstract
For a locally compact group G G and 1 > p > ∞ 1>p>\infty , let A p ( G ) A_{p}(G) be the Herz–Figà-Talamanca algebra and B p ( G ) B_{p}(G) the Herz-Schur multipliers of G G , and M A p ( G ) MA_{p}(G) the multipliers of A p ( G ) A_{p}(G) . Let W ( G ) W(G) be the algebra of continuous weakly almost periodic functions on G G . In this paper, we show that (1), if G G is a noncompact nilpotent group or a noncompact [IN]-group, then W ( G ) / B p ( G ) − W(G)/B_{p}(G)^{-} contains a linear isometric copy of l ∞ ( N ) l^{\infty }({\mathbb {N}}) ; (2), for a noncommutative free group F , B p ( F ) F, B_{p}(F) is a proper subset of M A p ( F ) ∩ W ( F ) {MA_{p}(F)\cap {W(F)}} .
- Published
- 1997
25. Compressed Sensing Matrices from Fourier Matrices
- Author
-
Guangwu Xu and Zhiqiang Xu
- Subjects
FOS: Computer and information sciences ,Pure mathematics ,Information Theory (cs.IT) ,Computer Science - Information Theory ,MathematicsofComputing_NUMERICALANALYSIS ,Numerical Analysis (math.NA) ,Library and Information Sciences ,Computer Science Applications ,Matrix (mathematics) ,Character sum ,symbols.namesake ,Fourier transform ,Quadratic equation ,Compressed sensing ,Dimension (vector space) ,FOS: Mathematics ,symbols ,Orthonormal basis ,Mathematics - Numerical Analysis ,Mutually unbiased bases ,Information Systems ,Mathematics - Abstract
The class of Fourier matrices is of special importance in compressed sensing (CS). This paper concerns deterministic construction of compressed sensing matrices from Fourier matrices. By using Katz' character sum estimation, we are able to design a deterministic procedure to select rows from a Fourier matrix to form a good compressed sensing matrix for sparse recovery. The sparsity bound in our construction is similar to that of binary CS matrices constructed by DeVore which greatly improves previous results for CS matrices from Fourier matrices. Our approach also provides more flexibilities in terms of the dimension of CS matrices. As a consequence, our construction yields an approximately mutually unbiased bases from Fourier matrices which is of particular interest to quantum information theory. This paper also contains a useful improvement to Katz' character sum estimation for quadratic extensions, with an elementary and transparent proof. Some numerical examples are included., 17 pages
- Published
- 2013
26. Amenability and uniformly continuous functionals on the algebras 𝐴_{𝑝}(𝐺) for discrete groups
- Author
-
Guangwu Xu
- Subjects
Fourier algebra ,Discrete group ,Applied Mathematics ,General Mathematics ,Banach space ,Locally compact group ,Combinatorics ,Uniform continuity ,symbols.namesake ,Von Neumann algebra ,Bounded function ,symbols ,Operator norm ,Mathematics - Abstract
In this paper, it is shown that for every discrete group G and 1 > p > ∞ , A p ( G ) ⋅ P M p ( G ) 1 > p > \infty ,{A_p}(G) \cdot P{M_p}(G) is closed in P M p ( G ) P{M_p}(G) if and only if G is amenable.
- Published
- 1995
27. On Recovery of Sparse Signals via $\ell_1$ Minimization
- Author
-
Jun Zhang, T. Tony Cai, and Guangwu Xu
- Subjects
FOS: Computer and information sciences ,Mathematical optimization ,Signal processing ,Noise measurement ,Constrained optimization ,020206 networking & telecommunications ,02 engineering and technology ,Library and Information Sciences ,01 natural sciences ,Bounded error ,Computer Science Applications ,Restricted isometry property ,Machine Learning (cs.LG) ,010104 statistics & probability ,symbols.namesake ,Statistics::Machine Learning ,Computer Science - Learning ,Compressed sensing ,Gaussian noise ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Minification ,0101 mathematics ,Information Systems ,Mathematics - Abstract
This paper considers constrained lscr1 minimization methods in a unified framework for the recovery of high-dimensional sparse signals in three settings: noiseless, bounded error, and Gaussian noise. Both lscr1 minimization with an lscrinfin constraint (Dantzig selector) and lscr1 minimization under an llscr2 constraint are considered. The results of this paper improve the existing results in the literature by weakening the conditions and tightening the error bounds. The improvement on the conditions shows that signals with larger support can be recovered accurately. In particular, our results illustrate the relationship between lscr1 minimization with an llscr2 constraint and lscr1 minimization with an lscrinfin constraint. This paper also establishes connections between restricted isometry property and the mutual incoherence property. Some results of Candes, Romberg, and Tao (2006), Candes and Tao (2007), and Donoho, Elad, and Temlyakov (2006) are extended.
- Published
- 2008
28. Fast Arithmetics Using Chinese Remaindering
- Author
-
Bruce Litow, George I. Davida, and Guangwu Xu
- Subjects
Discrete mathematics ,FOS: Computer and information sciences ,Division algorithm ,Parallel algorithm ,Division (mathematics) ,Computer Science Applications ,Theoretical Computer Science ,Randomized algorithm ,G.1.0 ,Linear form ,Computer Science - Data Structures and Algorithms ,Signal Processing ,Data Structures and Algorithms (cs.DS) ,Representation (mathematics) ,Algorithm ,Information Systems ,Mathematics - Abstract
In this paper, some issues concerning the Chinese remaindering representation are discussed. A new converting method, which is an efficient probabilistic algorithm based on a recent result of von zur Gathen and Shparlinski [J. von zur Gathen, I. Shparlinski, GCD of random linear forms, Algorithmica 46 (2006) 137-148], is described. An efficient refinement of the NC^1 division algorithm of Chiu, Davida and Litow [A. Chiu, G. Davida, B. Litow, Division in logspace-uniform NC^1, Theoret. Informatics Appl. 35 (2001) 259-275] is given, where the number of moduli is reduced by a factor of logn.
- Published
- 2008
- Full Text
- View/download PDF
29. Corrigendum to: 'Applying the exponential Chebyshev inequality to the nondeterministic computation of form factors'
- Author
-
Guangwu Xu, Gladimir V. G. Baranoski, and Jon G. Rokne
- Subjects
Nondeterministic algorithm ,Radiation ,Chebyshev's inequality ,Computation ,Radiative transfer ,Applied mathematics ,Spectroscopy ,Atomic and Molecular Physics, and Optics ,Exponential function ,Mathematics - Published
- 2002
30. Disjunctive decomposition of languages
- Author
-
Gabriel Thierrin, Y. Q. Guo, and Guangwu Xu
- Subjects
Discrete mathematics ,Disjoint union ,General Computer Science ,010102 general mathematics ,InformationSystems_DATABASEMANAGEMENT ,02 engineering and technology ,01 natural sciences ,Theoretical Computer Science ,Philosophy of language ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Intersection ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Free monoid ,Formal language ,0202 electrical engineering, electronic engineering, information engineering ,Decomposition (computer science) ,020201 artificial intelligence & image processing ,Decomposition method (constraint satisfaction) ,0101 mathematics ,Computer Science(all) ,Mathematics - Abstract
Some relations between dense languages and their semidiscrete disjunctive sublanguages are considered. Several decompositions of dense languages into disjunctive components are established. As an application, it is shown that every language is either the disjoint union or the intersection of two disjunctive languages.
- Published
- 1986
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.