Processing math: 100%

Mathematics

2025-07-09 | | Total: 193

#1 Beating the Best Constant Rebalancing Portfolio in Long-Term Investment: A Generalization of the Kelly Criterion and Universal Learning Algorithm for Markets with Serial Dependence [PDF] [Copy] [Kimi4] [REL]

Author: Duy Khanh Lam

In the online portfolio optimization framework, existing learning algorithms generate strategies that yield significantly poorer cumulative wealth compared to the best constant rebalancing portfolio in hindsight, despite being consistent in asymptotic growth rate. While this unappealing performance can be improved by incorporating more side information, it raises difficulties in feature selection and high-dimensional settings. Instead, the inherent serial dependence of assets' returns, such as day-of-the-week and other calendar effects, can be leveraged. Although latent serial dependence patterns are commonly detected using large training datasets, this paper proposes an algorithm that learns such dependence using only gradually revealed data, without any assumption on their distribution, to form a strategy that eventually exceeds the cumulative wealth of the best constant rebalancing portfolio. Moreover, the classical Kelly criterion, which requires independent assets' returns, is generalized to accommodate serial dependence in a market modeled as an independent and identically distributed process of random matrices. In such a stochastic market, where existing learning algorithms designed for stationary processes fail to apply, the proposed learning algorithm still generates a strategy that asymptotically grows to the highest rate among all strategies, matching that of the optimal strategy constructed under the generalized Kelly criterion. The experimental results with real market data demonstrate the theoretical guarantees of the algorithm and its performance as expected, as long as serial dependence is significant, regardless of the validity of the generalized Kelly criterion in the experimental market. This further affirms the broad applicability of the algorithm in general contexts.

Subjects: Portfolio Management , Information Theory , Machine Learning , Computational Finance

Publish: 2025-07-08 13:54:14 UTC


#2 A Malliavin calculus approach to score functions in diffusion generative models [PDF1] [Copy] [Kimi1] [REL]

Authors: Ehsan Mirafzali, Frank Proske, Utkarsh Gupta, Daniele Venturi, Razvan Marinescu

Score-based diffusion generative models have recently emerged as a powerful tool for modelling complex data distributions. These models aim at learning the score function, which defines a map from a known probability distribution to the target data distribution via deterministic or stochastic differential equations (SDEs). The score function is typically estimated from data using a variety of approximation techniques, such as denoising or sliced score matching, Hyvärien's method, or Schrödinger bridges. In this paper, we derive an exact, closed form, expression for the score function for a broad class of nonlinear diffusion generative models. Our approach combines modern stochastic analysis tools such as Malliavin derivatives and their adjoint operators (Skorokhod integrals or Malliavin Divergence) with a new Bismut-type formula. The resulting expression for the score function can be written entirely in terms of the first and second variation processes, with all Malliavin derivatives systematically eliminated, thereby enhancing its practical applicability. The theoretical framework presented in this work offers a principled foundation for advancing score estimation methods in generative modelling, enabling the design of new sampling algorithms for complex probability distributions. Our results can be extended to broader classes of stochastic differential equations, opening new directions for the development of score-based diffusion generative models.

Subjects: Machine Learning , Machine Learning , Probability

Publish: 2025-07-08 00:20:57 UTC


#3 Stable Acoustic Relay Assignment with High Throughput via Lase Chaos-based Reinforcement Learning [PDF] [Copy] [Kimi2] [REL]

Authors: Zengjing Chen, Lu Wang, Chengzhi Xing

This study addresses the problem of stable acoustic relay assignment in an underwater acoustic network. Unlike the objectives of most existing literature, two distinct objectives, namely classical stable arrangement and ambiguous stable arrangement, are considered. To achieve these stable arrangements, a laser chaos-based multi-processing learning (LC-ML) method is introduced to efficiently obtain high throughput and rapidly attain stability. In order to sufficiently explore the relay's decision-making, this method uses random numbers generated by laser chaos to learn the assignment of relays to multiple source nodes. This study finds that the laser chaos-based random number and multi-processing in the exchange process have a positive effect on higher throughput and strong adaptability with environmental changing over time. Meanwhile, ambiguous cognitions result in the stable configuration with less volatility compared to accurate ones. This provides a practical and useful method and can be the basis for relay selection in complex underwater environments.

Subjects: Sound , Machine Learning , Audio and Speech Processing , Optimization and Control

Publish: 2025-07-08 11:41:24 UTC


#4 Aliasing in Convnets: A Frame-Theoretic Perspective [PDF1] [Copy] [Kimi1] [REL]

Authors: Daniel Haider, Vincent Lostanlen, Martin Ehler, Nicki Holighaus, Peter Balazs

Using a stride in a convolutional layer inherently introduces aliasing, which has implications for numerical stability and statistical generalization. While techniques such as the parametrizations via paraunitary systems have been used to promote orthogonal convolution and thus ensure Parseval stability, a general analysis of aliasing and its effects on the stability has not been done in this context. In this article, we adapt a frame-theoretic approach to describe aliasing in convolutional layers with 1D kernels, leading to practical estimates for stability bounds and characterizations of Parseval stability, that are tailored to take short kernel sizes into account. From this, we derive two computationally very efficient optimization objectives that promote Parseval stability via systematically suppressing aliasing. Finally, for layers with random kernels, we derive closed-form expressions for the expected value and variance of the terms that describe the aliasing effects, revealing fundamental insights into the aliasing behavior at initialization.

Subjects: Machine Learning , Numerical Analysis

Publish: 2025-07-08 16:34:43 UTC


#5 Unitary designs in nearly optimal depth [PDF2] [Copy] [Kimi] [REL]

Authors: Laura Cui, Thomas Schuster, Fernando Brandao, Hsin-Yuan Huang

We construct ε-approximate unitary k-designs on n qubits in circuit depth O(logkloglognk/ε). The depth is exponentially improved over all known results in all three parameters n, k, ε. We further show that each dependence is optimal up to exponentially smaller factors. Our construction uses ˜O(nk) ancilla qubits and O(nk) bits of randomness, which are also optimal up to log(nk) factors. An alternative construction achieves a smaller ancilla count ˜O(n) with circuit depth O(kloglognk/ε). To achieve these efficient unitary designs, we introduce a highly-structured random unitary ensemble that leverages long-range two-qubit gates and low-depth implementations of random classical hash functions. We also develop a new analytical framework for bounding errors in quantum experiments involving many queries to random unitaries. As an illustration of this framework's versatility, we provide a succinct alternative proof of the existence of pseudorandom unitaries.

Subjects: Quantum Physics , Computational Complexity , Information Theory , Mathematical Physics

Publish: 2025-07-08 17:48:33 UTC


#6 Optimal Young's convolutions inequality and its reverse form on the hypercube [PDF2] [Copy] [Kimi] [REL]

Authors: David Beltran, Paata Ivanisvili, José Madrid, Lekha Patil

We establish sharp forms of Young's convolution inequality and its reverse on the discrete hypercube {0,1}d in the diagonal case p=q. As applications, we derive bounds for additive energies and sumsets. We also investigate the non-diagonal regime pq, providing necessary conditions for the inequality to hold, along with partial results in the case r=2.

Subjects: Classical Analysis and ODEs , Combinatorics

Publish: 2025-07-08 15:58:18 UTC


#7 Unified Framework for Quantum Code Embedding [PDF1] [Copy] [Kimi] [REL]

Author: Andrew C. Yuan

Given a Calderbank-Shor-Steane (CSS) code, it is sometimes necessary to modify the stabilizer code by adding an arbitrary number of physical qubits and parity checks. Motivations may include embedding a high-dimensional quantum low-density parity check (LDPC) code into finite-dimensional Euclidean space, or reducing the weights of an arbitrary CSS code. During this embedding, it is essential that the modified CSS code possesses an isomorphic set of logical qubits as the original CSS code. However, despite numerous explicit constructions, the conditions of when such a property holds true is not known in general. Therefore, using the language of homological algebra, we provide a unified framework that guarantees a natural isomorphism between the output and input codes. In particular, we explicitly show how previous works fit into our framework.

Subjects: Quantum Physics , Mathematical Physics

Publish: 2025-07-07 18:00:06 UTC


#8 Property Elicitation on Imprecise Probabilities [PDF] [Copy] [Kimi1] [REL]

Authors: James Bailie, Rabanus Derr

Property elicitation studies which attributes of a probability distribution can be determined by minimising a risk. We investigate a generalisation of property elicitation to imprecise probabilities (IP). This investigation is motivated by multi-distribution learning, which takes the classical machine learning paradigm of minimising a single risk over a (precise) probability and replaces it with Γ-maximin risk minimization over an IP. We provide necessary conditions for elicitability of a IP-property. Furthermore, we explain what an elicitable IP-property actually elicits through Bayes pairs -- the elicited IP-property is the corresponding standard property of the maximum Bayes risk distribution.

Subjects: Machine Learning , Machine Learning , Statistics Theory

Publish: 2025-07-08 10:36:49 UTC


#9 Three-loop singularity structure for a non-linear sigma model [PDF1] [Copy] [Kimi] [REL]

Authors: P. V. Akacevich, A. V. Ivanov, I. V. Korenev

The paper is devoted to the three-loop renormalization of the effective action for a two-dimensional non-linear sigma model using the background field method and a cutoff regularization in the coordinate representation. The coefficients of the renormalization constant and the necessary auxiliary vertices are found, as well as the asymptotic expansions of all three-loop diagrams, and their dependence on the type of regularizing function. A comparison is also made with the standard case of cutoff in the momentum representation.

Subjects: High Energy Physics - Theory , Mathematical Physics

Publish: 2025-07-08 12:11:02 UTC


#10 Online Regularized Learning Algorithms in RKHS with β- and φ-Mixing Sequences [PDF] [Copy] [Kimi1] [REL]

Authors: Priyanka Roy, Susanne Saminger-Platz

In this paper, we study an online regularized learning algorithm in a reproducing kernel Hilbert spaces (RKHS) based on a class of dependent processes. We choose such a process where the degree of dependence is measured by mixing coefficients. As a representative example, we analyze a strictly stationary Markov chain, where the dependence structure is characterized by the ϕ- and β-mixing coefficients. Under these assumptions, we derive probabilistic upper bounds as well as convergence rates for both the exponential and polynomial decay of the mixing coefficients.

Subjects: Machine Learning , Machine Learning , Functional Analysis

Publish: 2025-07-08 12:25:04 UTC


#11 Holomorphic supergravity in ten dimensions and anomaly cancellation [PDF1] [Copy] [Kimi] [REL]

Authors: Anthony Ashmore, Javier José Murgas Ibarra, Charles Strickland-Constable, Eirik Eik Svanes

We formulate a ten-dimensional version of Kodaira-Spencer gravity on a Calabi-Yau five-fold that reproduces the classical Maurer-Cartan equation governing supersymmetric heterotic moduli. Quantising this theory's quadratic fluctuations, we show that its one-loop partition function simplifies to products of holomorphic Ray-Singer torsions and exhibits an anomaly that factorises as in SO(32) and E8×E8 supergravity. Based on this, we conjecture that this theory is the SU(5)-twisted version of ten-dimensional N=1 supergravity coupled to Yang-Mills and show that is related to the type I Kodaira-Spencer theory of Costello-Li via a non-local field redefinition. The counter-terms needed to cancel the anomaly and retain gauge invariance for the one-loop effective theory reconstruct the differential of a recently discovered double-extension complex. This complex has non-tensorial extension classes and its first cohomology counts the infinitesimal moduli of heterotic compactifications modulo order α2 corrections.

Subjects: High Energy Physics - Theory , Differential Geometry

Publish: 2025-07-08 14:07:30 UTC


#12 Quantum simulation of a noisy classical nonlinear dynamics [PDF1] [Copy] [Kimi] [REL]

Authors: Sergey Bravyi, Robert Manson-Sawko, Mykhaylo Zayats, Sergiy Zhuk

We consider the problem of simulating dynamics of classical nonlinear dissipative systems with N1 degrees of freedom. To make the problem tractable for quantum computers, we add a weak Gaussian noise to the equation of motion and the initial state. Our main result is an end-to-end quantum algorithm for simulating the noisy dynamics of nonlinear systems satisfying certain sparsity and divergence-free conditions. For any constant nonzero noise rate, the quantum runtime scales polynomially with log(N), evolution time, inverse error tolerance, and the relative strength of nonlinearity and dissipation. Our main technical tool is the Kolmogorov partial differential equation describing time evolution of scalar functions of solutions, averaged over noise. To enable efficient quantum simulation, we project the Kolmogorov equation onto the space of low degree polynomials and derive a rigorous upper bound on the resulting approximation error, which may be of independent interest. Finally, we show that the considered simulation problem is BQP-complete, meaning that it is as hard as simulating the universal quantum computer. We demonstrate the efficacy of our algorithm by simulating it numerically for two paradigmatic nonlinear systems: an anharmonic oscillator and the 2D Navier Stokes equation.

Subjects: Quantum Physics , Mathematical Physics

Publish: 2025-07-08 17:25:40 UTC


#13 Toric reduction of singularities for Newton non-degenerate p-forms [PDF1] [Copy] [Kimi] [REL]

Author: Bilal Balo

We study a class of holomorphic p-forms satisfying non-degeneracy conditions expressed through their Newton polyhedron. We show that a regular refinement of their dual fan defines a toric reduction of singularities to a log-smooth p-form.

Subject: Algebraic Geometry

Publish: 2025-07-07 19:22:04 UTC


#14 Exact and efficient basis pursuit denoising via differential inclusions and a selection principle [PDF] [Copy] [Kimi1] [REL]

Authors: Gabriel P. Langlois, Jérôme Darbon

Basis pursuit denoising (BPDN) is a cornerstone of compressive sensing, statistics and machine learning. While various algorithms for BPDN have been proposed, they invariably suffer from drawbacks and must either favor efficiency at the expense of accuracy or vice versa. As such, state-of-the-art algorithms remain ineffective for high-dimensional applications that require accurate solutions within a reasonable amount of computational time. In this work, we address this issue and propose an exact and efficient algorithm for BPDN using differential inclusions. Specifically, we prove that a selection principle from the theory of differential inclusions turns the dual problem of BPDN into calculating the trajectory of an \emph{integrable} projected dynamical system, that is, whose trajectory and asymptotic limit can be computed exactly. Our analysis naturally yields an exact algorithm, numerically up to machine precision, that is amenable to computing regularization paths and very fast. Numerical experiments confirm that our algorithm outperforms the state-of-the-art algorithms in both accuracy and efficiency. Moreover, we show that the global continuation of solutions (in terms of the hyperparameter and data) of the projected dynamical system yields a rigorous homotopy algorithm for BPDN, as well as a novel greedy algorithm for computing feasible solutions to basis pursuit in strongly polynomial time. Beyond this work, we expect that our results and analysis can be adapted to compute exact or approximate solutions to a broader class of polyhedral-constrained optimization problems.

Subjects: Optimization and Control , Machine Learning , Functional Analysis

Publish: 2025-07-08 01:07:22 UTC


#15 On the Inherent Privacy of Zeroth Order Projected Gradient Descent [PDF] [Copy] [Kimi1] [REL]

Authors: Devansh Gupta, Meisam Razaviyayn, Vatsal Sharan

Differentially private zeroth-order optimization methods have recently gained popularity in private fine tuning of machine learning models due to their reduced memory requirements. Current approaches for privatizing zeroth-order methods rely on adding Gaussian noise to the estimated zeroth-order gradients. However, since the search direction in the zeroth-order methods is inherently random, researchers including Tang et al. (2024) and Zhang et al. (2024a) have raised an important question: is the inherent noise in zeroth-order estimators sufficient to ensure the overall differential privacy of the algorithm? This work settles this question for a class of oracle-based optimization algorithms where the oracle returns zeroth-order gradient estimates. In particular, we show that for a fixed initialization, there exist strongly convex objective functions such that running (Projected) Zeroth-Order Gradient Descent (ZO-GD) is not differentially private. Furthermore, we show that even with random initialization and without revealing (initial and) intermediate iterates, the privacy loss in ZO-GD can grow superlinearly with the number of iterations when minimizing convex objective functions.

Subjects: Optimization and Control , Machine Learning , Machine Learning

Publish: 2025-07-08 02:38:14 UTC


#16 Bifurcation in dynamic problems with seasonal succession [PDF1] [Copy] [Kimi] [REL]

Authors: Gonzalo Galiano, Julián Velasco

We investigate the bifurcation structure of equilibria in a class of non-autonomous ordinary differential equations governed by a season length parameter, τ, which determines the alternation between growth and decline dynamics. This structure models biological systems exhibiting seasonal variation, such as insect population dynamics or infectious disease transmission. Using the Crandall-Rabinowitz bifurcation theorem, we establish the existence of a critical threshold τ at which a bifurcation from the extinction equilibrium occurs. We also explore the emergence of secondary bifurcations from, in general, explicitly unknown non-trivial equilibria which can only be treated numerically. Our results are illustrated with a two-species competitive Lotka-Volterra model for the growth season and a Malthusian model for the decline season for which primary and secondary bifurcations may be computed analytically, allowing the validation of numerical approximations. Our analysis shows how seasonality drives transitions between extinction of both populations, of only one, and coexistence of both populations.

Subject: Dynamical Systems

Publish: 2025-07-08 06:01:22 UTC


#17 When does a tree activate the random graph? [PDF1] [Copy] [Kimi] [REL]

Authors: Asaf Cohen Antonir, Yuval Peled, Asaf Shapira, Mykhaylo Tyomkyn, Maksim Zhukovskii

Let F and G be two graphs. A spanning subgraph H of G is called weakly F-saturated if one can add to H the edges of GH in some order, so that whenever a new edge is added, a new copy of F is formed. Obtaining lower bounds for the minimum size wsat(G,F) of such an H is a classical problem in extremal combinatorics. In particular, in the past 40 years, various algebraic tools have been developed to prove lower bounds on the weak saturation number wsat(G,F). Our paper uncovers a new connection of weak saturation to topology of clique complexes, that allows to prove tight lower bounds in some cases when the algebraic tools are not efficient. It is easy to see that the smallest K3-saturating graphs in Kn are trees, thus wsat(Kn,K3)=n1. In 2017, Korándi and Sudakov proved that this is also the case in dense random graphs GGn,p, p=const(0,1), and posed the question of determining the smallest p for which Gn,p contains a K3-saturating tree with high probability. Using the new topological connection, we show that this critical p is of order n1/3o(1). Inspired by Gromov's local-to-global principle for hyperbolic groups, we further develop our topological approach and determine the critical probability up to a constant factor, for trees with diameter at most nc, for some c>0. The new connection also enables us to improve the best known upper bound on the threshold probability for simple connectivity of the 2-dimensional clique complex of Gn,p, due to Kahle.

Subjects: Combinatorics , Algebraic Topology , Probability

Publish: 2025-07-08 06:09:01 UTC


#18 Largest zero-dimensional intersection of r degree d hypersurfaces [PDF1] [Copy] [Kimi] [REL]

Authors: Deepesh Singhal, Yuxin Lin

Suppose we have r hypersurfaces in Pm of degree d, whose defining polynomials are linearly independent, and their intersection has dimension 0. Then what is the largest possible intersection of the r hypersurfaces? We conjecture an exact formula for this problem and prove it when m=2. We show that this can be used to compute the generalized hamming weights of the projective Reed-Muller code PRMq(d,2) and hence settle a conjecture of Beelen, Datta and Ghorpade for m=2.

Subjects: Algebraic Geometry , Combinatorics , Number Theory

Publish: 2025-07-08 07:25:52 UTC


#19 Importance sampling for Sobol' indices estimation [PDF1] [Copy] [Kimi] [REL]

Authors: Haythem Boucharif, Jérôme Morio, Paul Rochet

We propose a new importance sampling framework for the estimation and analysis of Sobol' indices. We show that a Sobol' index defined under a reference input distribution can be consistently estimated from samples drawn from other sampling distributions by reweighting the estimator appropriately to account for the distribution change. We derive the optimal sampling distribution that minimizes the asymptotic variance and demonstrate its strong impact on estimation accuracy. Beyond variance reduction, the framework supports distributional sensitivity analysis via reverse importance sampling, enabling robust exploration of input distribution uncertainty with negligible additional computational cost.

Subject: Statistics Theory

Publish: 2025-07-08 13:01:31 UTC


#20 Fredholm Neural Networks for forward and inverse problems in elliptic PDEs [PDF] [Copy] [Kimi1] [REL]

Authors: Kyriakos Georgiou, Constantinos Siettos, Athanasios N. Yannacopoulos

Building on our previous work introducing Fredholm Neural Networks (Fredholm NNs/ FNNs) for solving integral equations, we extend the framework to tackle forward and inverse problems for linear and semi-linear elliptic partial differential equations. The proposed scheme consists of a deep neural network (DNN) which is designed to represent the iterative process of fixed-point iterations for the solution of elliptic PDEs using the boundary integral method within the framework of potential theory. The number of layers, weights, biases and hyperparameters are computed in an explainable manner based on the iterative scheme, and we therefore refer to this as the Potential Fredholm Neural Network (PFNN). We show that this approach ensures both accuracy and explainability, achieving small errors in the interior of the domain, and near machine-precision on the boundary. We provide a constructive proof for the consistency of the scheme and provide explicit error bounds for both the interior and boundary of the domain, reflected in the layers of the PFNN. These error bounds depend on the approximation of the boundary function and the integral discretization scheme, both of which directly correspond to components of the Fredholm NN architecture. In this way, we provide an explainable scheme that explicitly respects the boundary conditions. We assess the performance of the proposed scheme for the solution of both the forward and inverse problem for linear and semi-linear elliptic PDEs in two dimensions.

Subjects: Numerical Analysis , Machine Learning

Publish: 2025-07-08 14:40:44 UTC


#21 On the Estimation of Gaussian Moment Tensors [PDF1] [Copy] [Kimi] [REL]

Authors: Omar Al-Ghattas, Jiaheng Chen, Daniel Sanz-Alonso

This paper studies two estimators for Gaussian moment tensors: the standard sample moment estimator and a plug-in estimator based on Isserlis's theorem. We establish dimension-free, non-asymptotic error bounds that demonstrate and quantify the advantage of Isserlis's estimator for tensors of even order p>2. Our bounds hold in operator and entrywise maximum norms, and apply to symmetric and asymmetric tensors.

Subjects: Statistics Theory , Probability

Publish: 2025-07-08 16:46:41 UTC


#22 An explanation of the number or points and symmetries of starbursts [PDF1] [Copy] [Kimi] [REL]

Authors: Sergio Barbero, Antonia M. Delgado, Lidia Fernández

Starbursts are the light intensity patterns seen when small bright sources are looked at night, typically stars. Starburst shapes are produced when the presence of the eye's wave aberrations generates caustics (light concentration) at the retina. A fascinating, but never explained fact about starbursts is that they usually present a p-fold symmetry pattern. We provide a theoretical explanation of the number of points and symmetries of starbursts, based on the geometric and algebraic properties of the wave aberration function expressed as a Zernike polynomial expansion. Specifically, we investigate the number and distribution of saddle cusps of Gauss of the Hessian of the wave aberration function. We also establish the connections between those points with the symmetries and the number of starburst points. We found that starbursts are likely generated by axially symmetric dominated wave aberrations with some amount of non-axially symmetric terms. For instance, whereas a wave aberration with a dominant spherical aberration (Zernike polynomial Z04) plus Z33 may induce a 3 points starburst with a 3-fold symmetry, a wave aberration combining Z04 and Z44 may induce a 4-fold symmetry starburst with 4 or 8 points.

Subjects: Mathematical Physics , Optics

Publish: 2025-07-08 16:51:20 UTC


#23 Conservative approximation-based feedforward neural network for WENO schemes [PDF] [Copy] [Kimi1] [REL]

Authors: Kwanghyuk Park, Jiaxi Gu, Jae-Hun Jung

In this work, we present the feedforward neural network based on the conservative approximation to the derivative from point values, for the weighted essentially non-oscillatory (WENO) schemes in solving hyperbolic conservation laws. The feedforward neural network, whose inputs are point values from the three-point stencil and outputs are two nonlinear weights, takes the place of the classical WENO weighting procedure. For the training phase, we employ the supervised learning and create a new labeled dataset for one-dimensional conservative approximation, where we construct a numerical flux function from the given point values such that the flux difference approximates the derivative to high-order accuracy. The symmetric-balancing term is introduced for the loss function so that it propels the neural network to match the conservative approximation to the derivative and satisfy the symmetric property that WENO3-JS and WENO3-Z have in common. The consequent WENO schemes, WENO3-CADNNs, demonstrate robust generalization across various benchmark scenarios and resolutions, where they outperform WENO3-Z and achieve accuracy comparable to WENO5-JS.

Subjects: Numerical Analysis , Machine Learning

Publish: 2025-07-08 17:19:48 UTC


#24 Matroid isomorphism games [PDF1] [Copy] [Kimi] [REL]

Authors: Daniel Corey, Simon Schmidt, Marcel Wack

We define and study a collection of matroid isomorphism games corresponding to various axiomatic characterizations of matroids. These are nonlocal games played between two cooperative players. Each game is played on two matroids, and the matroids are isomorphic if and only if the game has a perfect classical winning strategy. We define notions of quantum isomorphism in terms of perfect quantum commuting strategies, and we find a pair of nonisomorphic matroids that are quantum isomorphic. We also give a purely algebraic characterization of quantum isomorphic matroids. Finally, we use this notion of quantum isomorphism to describe a new type of quantum automorphism group of a matroid and derive a sufficient condition for a matroid to have nonclassical quantum automorphism.

Subjects: Quantum Algebra , Mathematical Physics , Combinatorics

Publish: 2025-07-08 17:58:51 UTC


#25 Consistency and Inconsistency in K-Means Clustering [PDF1] [Copy] [Kimi] [REL]

Authors: Moïse Blanchard, Adam Quinn Jaffe, Nikita Zhivotovskiy

A celebrated result of Pollard proves asymptotic consistency for k-means clustering when the population distribution has finite variance. In this work, we point out that the population-level k-means clustering problem is, in fact, well-posed under the weaker assumption of a finite expectation, and we investigate whether some form of asymptotic consistency holds in this setting. As we illustrate in a variety of negative results, the complete story is quite subtle; for example, the empirical k-means cluster centers may fail to converge even if there exists a unique set of population k-means cluster centers. A detailed analysis of our negative results reveals that inconsistency arises because of an extreme form of cluster imbalance, whereby the presence of outlying samples leads to some empirical k-means clusters possessing very few points. We then give a collection of positive results which show that some forms of asymptotic consistency, under only the assumption of finite expectation, may be recovered by imposing some a priori degree of balance among the empirical k-means clusters.

Subjects: Statistics Theory , Probability , Machine Learning

Publish: 2025-07-08 17:59:02 UTC