نتایج جستجو برای: bounded approximate identity

تعداد نتایج: 254663  

Load Frequency Control (LFC) has received considerable attention during last decades. This paper proposes a new method for designing decentralized interaction estimators for interconnected large-scale systems and utilizes it to multi-area power systems. For each local area, a local estimator is designed to estimate the interactions of this area using only the local output measurements. In fact,...

Journal: :CoRR 2012
Ankan Saha Prateek Jain Ambuj Tewari

This paper considers the stability of online learning algorithms and its implications for learnability (bounded regret). We introduce a novel quantity called forward regret that intuitively measures how good an online learning algorithm is if it is allowed a one-step look-ahead into the future. We show that given stability, bounded forward regret is equivalent to bounded regret. We also show th...

2014
Tomasz Kania Piotr Koszmider Niels Jakob Laustsen

Denote by [0, ω1) the locally compact Hausdorff space consisting of all countable ordinals, equipped with the order topology, and let C0[0, ω1) be the Banach space of scalar-valued, continuous functions which are defined on [0, ω1) and vanish eventually. We show that a weak ∗compact subset of the dual space of C0[0, ω1) is either uniformly Eberlein compact, or it contains a homeomorphic copy of...

2016
Charles S. Kahane

In this paper we characterize those bounded linear transformations Tf carrying L1(R1) into the space of bounded continuous functions on R1 , for which the convolution identity T (f ∗ g) = Tf ·Tg holds. It is shown that such a transformation is just the Fourier transform combined with an appropriate change of variable.

Journal: :Journal of High Energy Physics 2021

We use the SYK family of models with $N$ Majorana fermions to study complexity time evolution, formulated as shortest geodesic length on unitary group manifold between identity and evolution operator, in free, integrable, chaotic systems. Initially, follows trajectory, hence grows linearly time. how this linear growth is eventually truncated by appearance accumulation conjugate points, which si...

Journal: :CoRR 2018
Peter L. Bartlett David P. Helmbold Philip M. Long

We analyze algorithms for approximating a function $f(x) = \Phi x$ mapping $\Re^d$ to $\Re^d$ using deep linear neural networks, i.e. that learn a function $h$ parameterized by matrices $\Theta_1,...,\Theta_L$ and defined by $h(x) = \Theta_L \Theta_{L-1} ... \Theta_1 x$. We focus on algorithms that learn through gradient descent on the population quadratic loss in the case that the distribution...

Journal: :Inf. Process. Lett. 2015
Dean Doron Amnon Ta-Shma

It was recently shown that SVD and matrix inversion can be approximated in quantum log-space [1] for well formed matrices. This can be interpreted as a fully logarithmic quantum approximation scheme for both problems. We show that if prBQL = prBPL then every fully logarithmic quantum approximation scheme can be replaced by a probabilistic one. Hence, if classical algorithms cannot approximate t...

2016
Adam Fidel Francisco Coral-Sabido Colton Riedel Nancy M. Amato Lawrence Rauchwerger

We introduce a new parallel algorithm for approximate breadthfirst ordering of an unweighted graph by using bounded asynchrony to parametrically control both the performance and error of the algorithm. This work is based on the k-level asynchronous (KLA) paradigm that trades expensive global synchronizations in the level-synchronous model for local synchronizations in the asynchronous model, wh...

Journal: :Theor. Comput. Sci. 2008
Marcos A. Kiwi Gonzalo Navarro Claudio Telha

We introduce a new dimension to the widely studied on-line approximate string matching problem, by introducing an error threshold parameter so that the algorithm is allowed to miss occurrences with probability . This is particularly appropriate for this problem, as approximate searching is used to model many cases where exact answers are not mandatory. We show that the relaxed version of the pr...

2018
Phillip Stanley-Marbell Paul Hurley

M computing systems are designed to prevent errors in computation, memory, and communication. Guarding against errors however requires energy, temporal redundancy, or spatial redundancy and therefore consumes resources. But not all systems need to be free of errors: In some systems, either by explicit design or by the nature of the problems they solve, system output quality degrades gracefully ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید