Results 41 to 50 of about 1,991 (112)

Relation spaces of hyperplane arrangements and modules defined by graphs of fiber zonotopes

open access: yes, 2013
We study the exactness of certain combinatorially defined complexes which generalize the Orlik-Solomon algebra of a geometric lattice. The main results pertain to complex reflection arrangements and their restrictions.
Finis, Tobias, Lapid, Erez
core   +1 more source

A Validation Methodology for XAI Decision Support Systems Against Relational Domain Properties

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 10, October 2025.
ABSTRACT The global adoption of artificial intelligence (AI) has increased dramatically in recent years, becoming commonplace in many fields. Such a pervasiveness has led to changes in how AI is perceived, strengthening discussions on its societal consequences. Thus, a new class of requirements for AI‐based solutions emerged. Broadly speaking, those on
Emanuele De Angelis   +3 more
wiley   +1 more source

Model‐based fault diagnosis in closed‐loop safety‐critical chemical reactors: An experimental study

open access: yesAIChE Journal, Volume 71, Issue 9, September 2025.
Abstract This experimental study investigates fault detection and estimation in a continuous stirred‐tank reactor (CSTR) system under closed‐loop feedback control, including an analysis of different manipulative inputs for temperature regulation. A novel fault diagnosis approach is proposed, combining residual signal analysis and T2 statistic for real ...
Pu Du, Benjamin Wilhite, Costas Kravaris
wiley   +1 more source

Correlation Clustering with Low-Rank Matrices

open access: yes, 2017
Correlation clustering is a technique for aggregating data based on qualitative information about which pairs of objects are labeled 'similar' or 'dissimilar.' Because the optimization problem is NP-hard, much of the previous literature focuses on ...
Arthur D.   +7 more
core   +1 more source

Belt distance between facets of space-filling zonotopes [PDF]

open access: yes, 2010
For every d-dimensional polytope P with centrally symmetric facets we can associate a "subway map" such that every line of this "subway" corresponds to set of facets parallel to one of ridges P.
Garber, Alexey
core   +2 more sources

Geometric realizations of the s‐weak order and its lattice quotients

open access: yesJournal of the London Mathematical Society, Volume 112, Issue 3, September 2025.
Abstract For an n$n$‐tuple s${\bm{s}}$ of nonnegative integers, the s${\bm{s}}$‐weak order is a lattice structure on s${\bm{s}}$‐trees, generalizing the weak order on permutations. We first describe the join irreducible elements, the canonical join representations, and the forcing order of the s${\bm{s}}$‐weak order in terms of combinatorial objects ...
Eva Philippe, Vincent Pilaud
wiley   +1 more source

A Tutte polynomial for toric arrangements [PDF]

open access: yes, 2010
We introduce a multiplicity Tutte polynomial M(x,y), with applications to zonotopes and toric arrangements. We prove that M(x,y) satisfies a deletion-restriction recurrence and has positive coefficients.
Ad Alessandro Pucci, Luca Moci
core  

Primitive Zonotopes

open access: yes, 2017
We introduce and study a family of polytopes which can be seen as a generalization of the permutahedron of type $B_d$. We highlight connections with the largest possible diameter of the convex hull of a set of points in dimension $d$ whose coordinates ...
Deza, Antoine   +2 more
core   +3 more sources

Geometric realizations of the accordion complex of a dissection [PDF]

open access: yes, 2018
Consider $2n$ points on the unit circle and a reference dissection $\mathrm{D}_\circ$ of the convex hull of the odd points. The accordion complex of $\mathrm{D}_\circ$ is the simplicial complex of non-crossing subsets of the diagonals with even endpoints
Manneville, Thibault, Pilaud, Vincent
core   +4 more sources

Safety Filters Against Actuator Attacks

open access: yesInternational Journal of Robust and Nonlinear Control, Volume 35, Issue 9, Page 3640-3657, June 2025.
ABSTRACT This manuscript focuses on mitigating the effect of deception attacks on control signals, that is, in the presence of an adversary that tampers with data coming from the controller to the system actuators in order to degrade the plant performance.
Cédric Escudero   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy