En poursuivant votre navigation sur ce site, vous acceptez l'utilisation d'un simple cookie d'identification. Aucune autre exploitation n'est faite de ce cookie. OK

Documents Petit, Jean 97 résultats

Filtrer
Sélectionner : Tous / Aucun
Q
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y

Privacy in machine learning - Cummings, Rachel (Auteur de la Conférence) | CIRM H

Multi angle

Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding privacy can cause valuable data to go unused. How can data scientists make use of potentially sensitive data, while providing rigorous privacy guarantees to the individuals who provided data? A growing literature on differential privacy has emerged in the last decade to address some of these concerns. Differential privacy is a parameterized notion of database privacy that gives a mathematically rigorous worst-case bound on the maximum amount of information that can be learned about any one individual's data from the output of a computation. Differential privacy ensures that if a single entry in the database were to be changed, then the algorithm would still have approximately the same distribution over outputs. In this talk, we will see the definition and properties of differential privacy; survey a theoretical toolbox of differentially private algorithms that come with a strong accuracy guarantee; and discuss recent applications of differential privacy in major technology companies and government organizations.[-]
Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding privacy can cause valuable data to go unused. How can data scientists make use of potentially sensitive data, while providing rigorous privacy guarantees to the individuals who provided data? A growing literature on differential privacy has ...[+]

68W40 ; 68-02 ; 62-02 ; 90-02

Sélection Signaler une erreur
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y

Machine learning on graphs - Vandergheynst, Pierre (Auteur de la Conférence) | CIRM H

Multi angle

There are a plethora of interesting applications that can leverage graph structured data, from drug discovery to route planning, and it is only natural that graph Machine Learning has attracted a lot of attention lately. We will review approaches in graph representation learning, leveraging intuition from graph signal processing to design and study graph neural networks and some of their recent extensions.

05C90 ; 05C50 ; 68T99

Sélection Signaler une erreur
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y

Odd fluids - Fanelli, Francesco (Auteur de la Conférence) | CIRM H

Multi angle

In many physical fluid systems, the constituent particles present a parity-breaking intrinsic angular momentum: this is the case, for instance, of quantum fluids and super-fluids, polyatomic gases, chiral active matter and vortex dynamics. In such situations, only the skew-symmetric component of the total viscous stress tensor, often dubbed odd viscosity, is non-zero, implying that the viscosity becomes non-dissipative.
At the level of the mathematical model, the odd viscosity term is responsible for a loss of regularity, as it involves higher order space derivatives of the velocity field and, in the case of non-homogeneous fluids, of the density.
In this talk we consider the dynamics of non-homogeneous incompressible fluids having odd viscosity and we set up a well-posedness theory in Sobolev spaces for the related system of equations. The proof is based on the introduction of a set of suitable 'good unknowns' for the system, which allow to put in evidence an underlying hyperbolic structure and to circumvent, in this way, the loss of derivatives created by the odd viscosity term.
The talk is based on a joint work with Rafael Granero-Belinchón (Universidad de Cantabria) and Stefano Scrobogna (Università degli Studi di Trieste).[-]
In many physical fluid systems, the constituent particles present a parity-breaking intrinsic angular momentum: this is the case, for instance, of quantum fluids and super-fluids, polyatomic gases, chiral active matter and vortex dynamics. In such situations, only the skew-symmetric component of the total viscous stress tensor, often dubbed odd viscosity, is non-zero, implying that the viscosity becomes non-dissipative.
At the level of the ...[+]

35Q35 ; 76B03 ; 35B45 ; 76D09

Sélection Signaler une erreur
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y

A survey of Mackey and Green 2-functors - Dell'Ambrogio, Ivo (Auteur de la Conférence) | CIRM H

Multi angle

Since the early 70s, Mackey and Green functors have been successfully used to model the induction and restriction maps which are ubiquitous in the representation theory of finite groups. In concrete examples, the latter maps are typically distilled, in some way, from induction and restriction functors between additive (abelian, triangulated...) categories. In order to better capture this richer layer of equivariant information with a (light!) set of axioms, we are naturally led to the notions of Mackey and Green 2-functors. Many such structures have been in use for a long time in algebra, geometry and topology. We survey examples and applications of this young—yet arguably overdue—theory. This is partially joint work with Paul Balmer and Jun Maillard.[-]
Since the early 70s, Mackey and Green functors have been successfully used to model the induction and restriction maps which are ubiquitous in the representation theory of finite groups. In concrete examples, the latter maps are typically distilled, in some way, from induction and restriction functors between additive (abelian, triangulated...) categories. In order to better capture this richer layer of equivariant information with a (light!) ...[+]

20J05 ; 18B40 ; 55P91

Sélection Signaler une erreur
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y

Equivariant elliptic cohomology - Meier, Lennart (Auteur de la Conférence) | CIRM H

Multi angle

Inspired by the triad of rational, trigonometric and elliptic functions appearing in representation theory, Grojnowski defined in 1995 a higher analogue of equivariant ordinary cohomology and equivariant K-theory: equivariant elliptic cohomology. However, his approach only works over the complex numbers. Based on ideas of Lurie, David Gepner and I have recently defined equivariant elliptic cohomology without these restrictions. This allows in particular to refine topological modular forms to a genuine equivariant theory.[-]
Inspired by the triad of rational, trigonometric and elliptic functions appearing in representation theory, Grojnowski defined in 1995 a higher analogue of equivariant ordinary cohomology and equivariant K-theory: equivariant elliptic cohomology. However, his approach only works over the complex numbers. Based on ideas of Lurie, David Gepner and I have recently defined equivariant elliptic cohomology without these restrictions. This allows in ...[+]

55N34 ; 55P91 ; 14A30

Sélection Signaler une erreur
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y
In joint work with Gabriel Angelini-Knoll, Christian Ausoni, Dominic Leon Culver and Eva Höning, we calculate the $\bmod \left(p, v_1, v_2\right)$ homotopy $V(2)_* T C(B P\langle 2\rangle)$ of the topological cyclic homology of the truncated Brown-Peterson spectrum $B P\langle 2\rangle$, at all primes $p \geq 7$, and show that it is a finitely generated and free $\mathbb{F}_p\left[v_3\right]$-module on $12 p+4$ generators in explicit degrees within the range $-1 \leq * \leq 2 p^3+2 p^2+2 p-3$. Our computation is the first that exhibits chromatic redshift from pure $v_2$-periodicity to pure $v_3$-periodicity in a precise quantitative manner.[-]
In joint work with Gabriel Angelini-Knoll, Christian Ausoni, Dominic Leon Culver and Eva Höning, we calculate the $\bmod \left(p, v_1, v_2\right)$ homotopy $V(2)_* T C(B P\langle 2\rangle)$ of the topological cyclic homology of the truncated Brown-Peterson spectrum $B P\langle 2\rangle$, at all primes $p \geq 7$, and show that it is a finitely generated and free $\mathbb{F}_p\left[v_3\right]$-module on $12 p+4$ generators in explicit degrees ...[+]

19D50 ; 19D55 ; 55P43 ; 55Q51

Sélection Signaler une erreur
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y
Polynomial optimization methods often encompass many major scalability issues on the practical side. Fortunately, for many real-world problems, we can look at them in the eyes and exploit the inherent data structure arising from the input cost and constraints. The first part of my lecture will focus on the notion of 'correlative sparsity', occurring when there are few correlations between the variables of the input problem. The second part will present a complementary framework, where we show how to exploit a distinct notion of sparsity, called 'term sparsity', occurring when there are a small number of terms involved in the input problem by comparison with the fully dense case. At last but not least, I will present a very recently developed type of sparsity that we call 'ideal-sparsity', which exploits the presence of equality constraints. Several illustrations will be provided on important applications arising from various fields, including computer arithmetic, robustness of deep networks, quantum entanglement, optimal power-flow, and matrix factorization ranks.[-]
Polynomial optimization methods often encompass many major scalability issues on the practical side. Fortunately, for many real-world problems, we can look at them in the eyes and exploit the inherent data structure arising from the input cost and constraints. The first part of my lecture will focus on the notion of 'correlative sparsity', occurring when there are few correlations between the variables of the input problem. The second part will ...[+]

65F50 ; 90C22 ; 90C23

Sélection Signaler une erreur
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y
Asymmetric cryptographic constructions used today could be attacked given a powerful enough quantum computer. Even if such a computer does not exist yet, it is important to anticipate its possible construction and to prepare a transition to cryptographic tools having a security resistant against attacks from quantum computers. I will introduce lattice-based cryptography, which is the most promising candidate to build post-quantum cryptographic constructions, and in particular, how we build efficient constructions based on structured lattice problems.[-]
Asymmetric cryptographic constructions used today could be attacked given a powerful enough quantum computer. Even if such a computer does not exist yet, it is important to anticipate its possible construction and to prepare a transition to cryptographic tools having a security resistant against attacks from quantum computers. I will introduce lattice-based cryptography, which is the most promising candidate to build post-quantum cryptographic ...[+]

94A60 ; 11T71

Sélection Signaler une erreur
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y
Asymmetric cryptographic constructions used today could be attacked given a powerful enough quantum computer. Even if such a computer does not exist yet, it is important to anticipate its possible construction and to prepare a transition to cryptographic tools having a security resistant against attacks from quantum computers. I will introduce lattice-based cryptography, which is the most promising candidate to build post-quantum cryptographic constructions, and in particular, how we build efficient constructions based on structured lattice problems.[-]
Asymmetric cryptographic constructions used today could be attacked given a powerful enough quantum computer. Even if such a computer does not exist yet, it is important to anticipate its possible construction and to prepare a transition to cryptographic tools having a security resistant against attacks from quantum computers. I will introduce lattice-based cryptography, which is the most promising candidate to build post-quantum cryptographic ...[+]

94A60 ; 11T71

Sélection Signaler une erreur
Déposez votre fichier ici pour le déplacer vers cet enregistrement.
y
I will first introduce a general class of mean-field-like spin systems with random couplings that comprises both the Ising model on inhomogeneous dense random graphs and the randomly diluted Hopfield model. I will then present quantitative estimates of metastability in large volumes at fixed temperatures when these systems evolve according to a Glauber dynamics, i.e. where spins flip with Metropolis rates at inverse temperature $\beta $. The main result identifies conditions ensuring that with high probability the system behaves like the corresponding system where the random couplings are replaced by their averages. More precisely, we prove that the metastability of the former system is implied with high probability by the metastability of the latter. Moreover, we consider relevant metastable hitting times of the two systems and find the asymptotic tail behaviour and the moments of their ratio. This result provides an extension of the results known for the Ising model on the the Erdos-Renyi random graph. Our proofs use the potential-theoretic approach to metastability in combination with concentration inequalities.
Based on a joint work in collaboration with Anton Bovier, Frank den Hollander, Saeda Marello and Martin Slowik.[-]
I will first introduce a general class of mean-field-like spin systems with random couplings that comprises both the Ising model on inhomogeneous dense random graphs and the randomly diluted Hopfield model. I will then present quantitative estimates of metastability in large volumes at fixed temperatures when these systems evolve according to a Glauber dynamics, i.e. where spins flip with Metropolis rates at inverse temperature $\beta $. The ...[+]

60K35 ; 60K37 ; 82B20 ; 82B44 ; 82C44

Sélection Signaler une erreur