Results 61 to 70 of about 467 (189)
A Privacy Score for Anonymous Databases [PDF]
In this thesis, we present a quantitative measure called the Database Privacy Score to assess the level of privacy in an anonymous database. Individuals in an anonymous database are still at risk of having personal information uncovered about them in ...
White, Lindsay A.
core
Fixed‐point posets of groups and Euler characteristics
Abstract Suppose that G$G$ is a group and Ω$\Omega$ is a G$G$‐set. For X$\mathcal {X}$ a set of subgroups of G$G$, we introduce the fixed‐point poset XΩ$\mathcal {X}_{\Omega }$. A variety of results concerning XΩ$\mathcal {X}_{\Omega }$ are proved as, for example, in the case when p$p$ is a prime and X$\mathcal {X}$ is a non‐empty set of finite non ...
Peter Rowley
wiley +1 more source
Assembly of constructible factorization algebras
Abstract We provide a toolbox of extension, gluing, and assembly techniques for factorization algebras. Using these tools, we fill various gaps in the literature on factorization algebras on stratified manifolds, the main one being that constructible factorization algebras form a sheaf of symmetric monoidal ∞$\infty$‐categories.
Eilind Karlsson +2 more
wiley +1 more source
A characterization of a pomonoid $S$ all of its cyclic $S$-posets are regular injective [PDF]
This work is devoted to give a charcaterization of a pomonoid $S$ such that all cyclic $S$-posets are regular injective.
Xia Zhang, Wenling Zhang, Ulrich Knauer
doaj
Cyclic posets and triangulation clusters
Triangulated categories coming from cyclic posets were originally introduced by the authors in [IT15b] as a generalization of the constructions of various triangulated categories with cluster structures.
Igusa, Kiyoshi, Todorov, Gordana
core +1 more source
The ∞$\infty$‐categorical reflection theorem and applications
Abstract We prove an ∞$\infty$‐categorical version of the reflection theorem of AdÁmek and Rosický [Arch. Math. 25 (1989), no. 1, 89–94]. Namely, that a full subcategory of a presentable ∞$\infty$‐category that is closed under limits and κ$\kappa$‐filtered colimits is a presentable ∞$\infty$‐category.
Shaul Ragimov, Tomer M. Schlank
wiley +1 more source
Weak factorization systems and fibrewise regular injectivity for actions of pomonoids on posets [PDF]
Let S be a pomonoid. In this paper, Pos-S, the category of S-posets and S-poset maps, is considered. One of the main aims of this paper is to draw attention to the notion of weak factorization systems in Pos-S.
Farsad, F., Madanshekaf, A.
core +1 more source
On Multilevel Energy‐Based Fragmentation Methods
We investigate the working equations of energy‐based fragmentation methods and present ML‐SUPANOVA, a Möbius‐inversion‐based multilevel fragmentation scheme that enables adaptive, quasi‐optimal truncations to efficiently approximate Born‐Oppenheimer potentials across hierarchies of electronic‐structure methods and basis sets.
James Barker +2 more
wiley +1 more source
Hypergeometric motives from Euler integral representations
Abstract We revisit certain one‐parameter families of affine covers arising naturally from Euler's integral representation of hypergeometric functions. We introduce a partial compactification of this family. We show that the zeta function of the fibers in the family can be written as an explicit product of L$L$‐series attached to nondegenerate ...
Tyler L. Kelly, John Voight
wiley +1 more source
When do pseudo‐Gorenstein rings become Gorenstein?
Abstract We discuss the relationship between the trace ideal of the canonical module and pseudo‐Gorensteinness. In particular, under certain mild assumptions, we show that every positively graded domain that is both pseudo‐Gorenstein and nearly Gorenstein is Gorenstein. As an application, we clarify the relationships among nearly Gorensteinness, almost
Sora Miyashita
wiley +1 more source

