We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
In this paper we consider positional games where the winning sets are edge sets of tree-universal graphs. Specifically, we show that in the unbiased Maker-Breaker game on the edges of the complete graph $K_n$, Maker has a strategy to claim a graph which contains copies of all spanning trees with maximum degree at most $cn/\log (n)$, for a suitable constant $c$ and $n$ being large enough. We also prove an analogous result for Waiter-Client games. Both of our results show that the building player can play at least as good as suggested by the random graph intuition. Moreover, they improve on a special case of earlier results by Johannsen, Krivelevich, and Samotij as well as Han and Yang for Maker-Breaker games.
Given an $n\times n$ symmetric matrix $W\in [0,1]^{[n]\times [n]}$, let ${\mathcal G}(n,W)$ be the random graph obtained by independently including each edge $jk\in \binom{[n]}{2}$ with probability $W_{jk}=W_{kj}$. Given a degree sequence $\textbf{d}=(d_1,\ldots, d_n)$, let ${\mathcal G}(n,\textbf{d})$ denote a uniformly random graph with degree sequence $\textbf{d}$. We couple ${\mathcal G}(n,W)$ and ${\mathcal G}(n,\textbf{d})$ together so that asymptotically almost surely ${\mathcal G}(n,W)$ is a subgraph of ${\mathcal G}(n,\textbf{d})$, where $W$ is some function of $\textbf{d}$. Let $\Delta (\textbf{d})$ denote the maximum degree in $\textbf{d}$. Our coupling result is optimal when $\Delta (\textbf{d})^2\ll \|\textbf{d}\|_1$, that is, $W_{ij}$ is asymptotic to ${\mathbb P}(ij\in{\mathcal G}(n,\textbf{d}))$ for every $i,j\in [n]$. We also have coupling results for $\textbf{d}$ that are not constrained by the condition $\Delta (\textbf{d})^2\ll \|\textbf{d}\|_1$. For such $\textbf{d}$ our coupling result is still close to optimal, in the sense that $W_{ij}$ is asymptotic to ${\mathbb P}(ij\in{\mathcal G}(n,\textbf{d}))$ for most pairs $ij\in \binom{[n]}{2}$.
Machine learning has revolutionized many fields, including science, healthcare, and business. It is also widely used in network data analysis. This chapter provides an overview of machine learning methods and how they can be applied to network data. Machine learning can be used to clean, process, and analyze network data, as well as make predictions about networks and network attributes. Methods that transform networks into meaningful representations are especially useful for specific network prediction tasks, such as classifying nodes and predicting links. The challenges of using machine learning with network data include recognizing data leakage and detecting dataset shift. As with all machine learning, effective use of machine learning on networks depends on practicing good data hygiene when evaluating a predictive model’s performance.
Every countable group G can be embedded in a finitely generated group $G^*$ that is hopfian and complete, that is, $G^*$ has trivial centre and every epimorphism $G^*\to G^*$ is an inner automorphism. Every finite subgroup of $G^*$ is conjugate to a finite subgroup of G. If G has a finite presentation (respectively, a finite classifying space), then so does $G^*$. Our construction of $G^*$ relies on the existence of closed hyperbolic 3-manifolds that are asymmetric and non-Haken.
This chapter focuses on grammatical resources for construing experience – transitivity. It begins with a basic introduction to experiential clause structure, covering participants, processes and circumstances. It then presents the distinctive structures of material, mental, relational and verbal clauses. The meaning potential of each clause type is consolidated in a system network whose realisation in structure is specified. Following a discussion of diathesis (covering voice and causatives), a range of types of circumstance are surveyed.
Taking as a starting point the variation in introspective judgments on embedded gapping in English in the literature, the main goal of this paper is to test the ‘No Embedding Constraint’ experimentally. Building on a first experimental study designed to measure the interaction between that-omission and factivity in English embedded complement clauses, we conducted two experiments testing the role of the complementizer in embedded gapping, paying special attention to the semantic nature of the matrix predicates (non-factives vs semi-factives vs true factives). Our results show, on the one hand, that the ‘No Embedding Constraint’ makes too strong claims that are not backed up by our experimental findings, and, on the other hand, that embedded gapping is affected by both the presence/absence of that and by the semantic class of the matrix predicate in English. In particular, embedded gapping seems to be more acceptable under non-factive verbs, especially in the absence of a complementizer. Both constraints (that-omission and factivity) can be accounted for by a constructionist fragment-based analysis, where the gapped clause is a non-finite phrase that has to address the same Question Under Discussion as its source. This explains, in turn, why embedded gapping under true factive predicates is considered significantly less acceptable. We show that the acceptable cases of embedded gapping involve true syntactic embedding (so, the matrix clause has no parenthetical use). We conclude that English has the same sensitivity to the semantic class of the matrix predicate as other languages, but that the requirements on the presence/absence of that are English specific.
The Borel heuristic makes some preictions about group actions, but in this chapter we see that some are reasonably well founded, with some counterexamples at the prime 2, and others are false. Partly this is explained by means of the difference between equivariant and isovariant topology, and also in restricting the class of equivariantly aspherical spaces that are expected to be rigid.
We show that the image of a subshift X under various injective morphisms of symbolic algebraic varieties over monoid universes with algebraic variety alphabets is a subshift of finite type, respectively a sofic subshift, if and only if so is X. Similarly, let G be a countable monoid and let A, B be Artinian modules over a ring. We prove that for every closed subshift submodule $\Sigma \subset A^G$ and every injective G-equivariant uniformly continuous module homomorphism $\tau \colon \! \Sigma \to B^G$, a subshift $\Delta \subset \Sigma $ is of finite type, respectively sofic, if and only if so is the image $\tau (\Delta )$. Generalizations for admissible group cellular automata over admissible Artinian group structure alphabets are also obtained.
Let
${\mathbb{G}(n_1,n_2,m)}$
be a uniformly random m-edge subgraph of the complete bipartite graph
${K_{n_1,n_2}}$
with bipartition
$(V_1, V_2)$
, where
$n_i = |V_i|$
,
$i=1,2$
. Given a real number
$p \in [0,1]$
such that
$d_1 \,{:\!=}\, pn_2$
and
$d_2 \,{:\!=}\, pn_1$
are integers, let
$\mathbb{R}(n_1,n_2,p)$
be a random subgraph of
${K_{n_1,n_2}}$
with every vertex
$v \in V_i$
of degree
$d_i$
,
$i = 1, 2$
. In this paper we determine sufficient conditions on
$n_1,n_2,p$
and m under which one can embed
${\mathbb{G}(n_1,n_2,m)}$
into
$\mathbb{R}(n_1,n_2,p)$
and vice versa with probability tending to 1. In particular, in the balanced case
$n_1=n_2$
, we show that if
$p\gg\log n/n$
and
$1 - p \gg \left(\log n/n \right)^{1/4}$
, then for some
$m\sim pn^2$
, asymptotically almost surely one can embed
${\mathbb{G}(n_1,n_2,m)}$
into
$\mathbb{R}(n_1,n_2,p)$
, while for
$p\gg\left(\log^{3} n/n\right)^{1/4}$
and
$1-p\gg\log n/n$
the opposite embedding holds. As an extension, we confirm the Kim–Vu Sandwich Conjecture for degrees growing faster than
$(n \log n)^{3/4}$
.
Clause combining, or clause linkage, is traditionally analysed on the syntactic, semantic and prosodic (spoken) levels, and the combinations are called complex sentences in many popular grammars. What is widely accepted today is that clause combining or clause linkage should be understood as mechanisms of connecting clauses rather than sentences. Since the clause is the most fundamental grammatical unit, Chapter 5 considers how non-finiteness plays its role in clause combining from the process-relation perspective. Three types of clause relations are proposed: paratactic, circumstantial and participantial. Non-finite clauses act as the bridges in clause combining viewed from the perspective of metaphoric syndrome. Thus, an answer to the third research question (How does non-finiteness function for inter-clausal connectivity?) is provided.
For human dental cementum research, sample preparation protocol is now widely tested, validated, and standardized, thanks to the low variability in teeth morphology. For non-human mammals, posterior teeth are typically preferred. However, the taxa diversity implies a significant variation in morphology or specific characteristics for certain species (equids, suids), leading to multiple unstandardized protocols. This work aims to improve protocols for producing a thin section by optimizing the parameters, minimizing the risk of errors, and offering an easily reproducible quality of thin-sections. The result of 26 experiments and 124 analyses during stages of consolidation (embedding), cutting, gluing, and finishing (grinding) allowed the co-authors' combined experience from multiple laboratories to propose standardized humans and ungulates (large teeth) protocols for the systematic analysis of dental research collections.
Counting dental acellular cementum (AC) annulations is used to estimate age at death in anthropological contexts by embedding the tooth, sectioning the root, and imaging the thin sections. However, there are several published protocols creating confusion to optimize these steps. We compared three standard illumination techniques (differential interference contrast; transmitted bright field; transmitted polarized) on sections with the same thickness, field of view, on three types of samples: fresh teeth embedded in both MMA and epoxy; archeological samples embedded in epoxy. We compared the quality of AC increment visibility on longitudinal and transversal sections of the same root, to optimize the quality of AC micrographs for age estimation. Results suggest that differential interference contrast microscopy might be ideal, even though brightfield consistently provides a decent image; epoxy resin with quick polymerization time doesn't affect AC structure and allows for higher contrast than traditional MMA; transverse sections are more consistent. These results emphasize the need for cementum-specific procedures not always compatible with traditional dental analyses.
Given a finite lattice L that can be embedded in the recursively enumerable (r.e.) Turing degrees
$\langle \mathcal {R}_{\mathrm {T}},\leq _{\mathrm {T}}\rangle $
, we do not in general know how to characterize the degrees
$\mathbf {d}\in \mathcal {R}_{\mathrm {T}}$
below which L can be bounded. The important characterizations known are of the
$L_7$
and
$M_3$
lattices, where the lattices are bounded below
$\mathbf {d}$
if and only if
$\mathbf {d}$
contains sets of “fickleness”
$>\omega $
and
$\geq \omega ^\omega $
respectively. We work towards finding a lattice that characterizes the levels above
$\omega ^2$
, the first non-trivial level after
$\omega $
. We introduced a lattice-theoretic property called “
$3$
-directness” to describe lattices that are no “wider” or “taller” than
$L_7$
and
$M_3$
. We exhaust the 3-direct lattices L, but they turn out to also characterize the
$>\omega $
or
$\geq \omega ^\omega $
levels, if L is not already embeddable below all non-zero r.e. degrees. We also considered upper semilattices (USLs) by removing the bottom meet(s) of some 3-direct lattices, but the removals did not change the levels characterized. This leads us to conjecture that a USL characterizes the same r.e. degrees as the lattice on which the USL is based. We discovered three 3-direct lattices besides
$M_3$
that also characterize the
$\geq \omega ^\omega $
-levels. Our search for a
$>\omega ^2$
-candidate therefore involves the lattice-theoretic problem of finding lattices that do not contain any of the four
$\geq \omega ^\omega $
-lattices as sublattices.
In this note, we show that given a closed connected oriented
$3$
-manifold M, there exists a knot K in M such that the manifold
$M'$
obtained from M by performing an integer surgery admits an open book decomposition which embeds into the trivial open book of the
$5$
-sphere
$S^5.$
The bandwidth theorem of Böttcher, Schacht, and Taraz [Proof of the bandwidth conjecture of Bollobás andKomlós, Mathematische Annalen, 2009] gives a condition on the minimum degree of an n-vertex graph G that ensures G contains every r-chromatic graph H on n vertices of bounded degree and of bandwidth
$o(n)$
, thereby proving a conjecture of Bollobás and Komlós [The Blow-up Lemma, Combinatorics, Probability, and Computing, 1999]. In this paper, we prove a version of the bandwidth theorem for locally dense graphs. Indeed, we prove that every locally dense n-vertex graph G with
$\delta (G)> (1/2+o(1))n$
contains as a subgraph any given (spanning) H with bounded maximum degree and sublinear bandwidth.
We provide a finite basis for the class of Borel functions that are not in the first Baire class, as well as the class of Borel functions that are not
$\sigma $
-continuous with closed witnesses.
Chapter 8 scrutinizes why actors should embed themselves in the arena in the first place and when they prefer detaching from everyday security. The question of embedding or detaching is particularly relevant to newly arriving peacekeepers but also poses itself to national militaries. Embedding into the arena forces an actor to engage in fluid ordering as everyday contact and spontaneous security events necessitate immediate reactions. Detachment, on the other hand, allows for more organized and directed engagement of the security arena through stable ordering. However, detachment can fuel rumours and allegations thereby deteriorating the overall security situation. Actors become torn between fulfilling local demands for robust intervention by accepting fluidity, on the one hand, and meeting international demands of stable ordering through detachment, on the other.
We prove some open book embedding results in the contact category with a constructive approach. As a consequence, we give an alternative proof of a theorem of Etnyre and Lekili that produces a large class of contact 3-manifolds admitting contact open book embeddings in the standard contact 5-sphere. We also show that all the Ustilovsky $(4m+1)$-spheres contact open book embed in the standard contact $(4m+3)$-sphere.
We present an actuarial claims reserving technique that takes into account both claim counts and claim amounts. Separate (overdispersed) Poisson models for the claim counts and the claim amounts are combined by a joint embedding into a neural network architecture. As starting point of the neural network calibration, we use exactly these two separate (overdispersed) Poisson models. Such a nested model can be interpreted as a boosting machine. It allows us for joint modeling and mutual learning of claim counts and claim amounts beyond the two individual (overdispersed) Poisson models.
It is proved that the free topological vector space $\mathbb{V}([0,1])$ contains an isomorphic copy of the free topological vector space $\mathbb{V}([0,1]^{n})$ for every finite-dimensional cube $[0,1]^{n}$, thereby answering an open question in the literature. We show that this result cannot be extended from the closed unit interval $[0,1]$ to general metrisable spaces. Indeed, we prove that the free topological vector space $\mathbb{V}(X)$ does not even have a vector subspace isomorphic as a topological vector space to $\mathbb{V}(X\oplus X)$, where $X$ is a Cook continuum, which is a one-dimensional compact metric space. This is also shown to be the case for a rigid Bernstein set, which is a zero-dimensional subspace of the real line.