https://arxiv.org/api/3crDt/5KcMaq2ErmvUd0dK8NpPA2026-03-26T08:26:33Z6473015015http://arxiv.org/abs/2503.14992v2Free multiplicative convolution with an arbitrary measure on the real line2026-03-20T13:42:19ZWe develop analytic tools for studying the free multiplicative convolution of any measure on the real line and any measure on the nonnegative real line. More precisely, we construct the subordination functions and the $S$-transform of an arbitrary probability measure. The important multiplicativity of $S$-transform is proved with the help of subordination functions. We then apply the $S$-transform to establish convolution identities for stable laws, which had been considered in the literature only for the positive and symmetric cases. Subordination functions are also used in order to extend Belinschi--Nica's semigroup of homomorphisms, and to establish regularity properties of free multiplicative convolution, in particular, the absence of singular continuous part and analyticity of the density.2025-03-19T08:37:17Z50 pages, 2 figuresOctavio ArizmendiTakahiro HasebeYu Kitagawahttp://arxiv.org/abs/2510.03934v2Local criteria for global connectivity comparisons: beyond stochastic domination2026-03-20T13:16:02ZWe introduce a site-wise domination criterion for local percolation models, which enables the comparison of one-arm probabilities even in the absence of stochastic domination. The method relies on a local-to-global principle: if, at each site, one model is more likely than the other to connect to a subset of its neighbors, for all nontrivial such subsets, then this advantage propagates to connectivity events at all scales. In this way, we obtain a robust alternative to stochastic domination, applicable in all cases where the latter works and in many where it does not. As a main application, we compare classical Bernoulli bond percolation with degree-constrained models, showing that degree constraints enhance percolation, and obtain asymptotically optimal bounds on critical parameters for degree-constrained models.2025-10-04T20:26:13Z12 pages, 1 figure, 1 tableJohannes BäumlerBenedikt JahnelJonas KöpplBas LodewijksLily ReevesAndrás Tóbiáshttp://arxiv.org/abs/2304.00923v6Tree embeddings and nonuniqueness in site percolation2026-03-20T13:13:23ZWe prove a nonuniqueness theorem for Bernoulli site percolation on properly embedded planar graphs, and we obtain a general connectivity principle beyond planarity. Let $G$ be an infinite connected graph properly embedded in $\RR^2$ with minimum degree at least $7$. Then \[ p_c^{\mathrm{site}}(G)<\tfrac12, \] and for every \[ p\in \bigl(p_c^{\mathrm{site}}(G),\,1-p_c^{\mathrm{site}}(G)\bigr), \] Bernoulli$(p)$ site percolation on $G$ has almost surely infinitely many infinite open clusters. In particular, this verifies a conjecture of Benjamini and Schramm for properly embedded planar graphs.
The core new ingredient is an explicit embedded-tree separation mechanism for planar nonuniqueness. We construct embedded trees and an embedded forest whose separation properties yield exponential decay of two-point connection probabilities in the matching graph. To treat the high-density regime, we introduce a binary-tree version of uniform percolation and prove stability of infinite clusters under edge additions, without any bounded-degree assumption.
Beyond the planar theorem, we prove a general lower bound on two-point connectivity under uniqueness for arbitrary infinite locally finite graphs. As a consequence, if \[ p_c^{\mathrm{site}}(G)<p<p_{\mathrm{conn}}(G), \] then Bernoulli site percolation on $G$ has almost surely infinitely many infinite open clusters.2023-04-03T12:28:10ZZhongyang Lihttp://arxiv.org/abs/2602.18184v2Kolmogorov-Type Maximal Inequalities for Independent and Dependent Negative Binomial Random Variables: Sharp Bounds, Sub-Exponential Refinements, and Applications to Overdispersed Count Data2026-03-20T12:20:17ZThis paper develops Kolmogorov-type maximal inequalities for sums of Negative Binomial random variables under both independence and dependence structures. For independent heterogeneous Negative Binomial variables we derive sharp Markov-type deviation inequalities and Kolmogorov-type bounds expressed in terms of Tweedie dispersion parameters, providing explicit control limits for NB2 generalized linear model monitoring. For dependent count data arising through a shared Gamma mixing variable, we establish a \emph{sub-exponential Bernstein-type refinement} that exploits the Poisson-Gamma hierarchical structure to yield exponentially decaying tail probabilities -- this refinement is new in the literature. Through moment-matched Monte Carlo experiments ($n=20$, 2{,}000 replications), we document a 55\% reduction in mean maximum deviation under appropriate dependence structures, a stabilization effect we explain analytically. A concrete epidemiological application with NB2 parameters calibrated from COVID-19 surveillance data demonstrates practical utility. These results materially advance the applicability of classical maximal inequalities to overdispersed and dependent count data prevalent in public health, insurance, and ecological modeling.2026-02-20T12:44:18Z11 pages, 8 figures, 2 tablesAristides V. DoumasS. Spektorhttp://arxiv.org/abs/2603.19859v1SIR model with random diffusion, reinfection, and random transmission: exponential attractors and spread of the disease2026-03-20T11:21:48ZWe introduce a stochastic SIR-type partial differential equation model incorporating random diffusion, reinfection, vital dynamics, and a randomly varying transmission rate. For the associated random dynamical system, we prove the existence of both random and exponential attractors. We construct a non-stationary, random disease-free global solution, which serves to localize the random attractor. Furthermore, we analyze the mean value of the random transmission coefficient to establish conditions under which the disease may either be eradicated or persist in an endemic state, depending on the system's parameters.2026-03-20T11:21:48ZTomás CaraballoJavier López-de-la-CruzAlexandre N. Oliveira-SousaPaulo N. Seminario-Huertashttp://arxiv.org/abs/2603.19853v1Random chemostats with competition and different kinetics to investigate the growth of the gut microbiome2026-03-20T11:10:27ZWe investigate some chemostat models incorporating wall growth, competition, random fluctuations on the dilution rate, and different consumption functions (Monod and Haldane). We analyze the asymptotic behavior of the solutions of the corresponding random differential systems to establish conditions on the model parameters under which the microbes persist in the gut or disappear. Moreover, several numerical simulations are presented to support the theoretical results and illustrate their biological interpretation.2026-03-20T11:10:27ZJavier López-de-la-CruzFelipe RiveroCarlos R. Takaessu10.1002/mma.70688http://arxiv.org/abs/2512.21779v2The anti-concentration phenomenon with respect to random permutations2026-03-20T10:45:32ZThe anti-concentration phenomenon in probability theory has been intensively studied in recent years, with applications across many areas of mathematics. In most existing works, the ambient probability space is a product space generated by independent random variables.
In this paper, we initiate a systematic study of anti-concentration when the ambient space is the symmetric group, equipped with the uniform measure. Concretely, we focus on the random sum $S_π = \sum_{i=1}^{n} w_i\, v_{π(i)}$, where $w=(w_1,\dots,w_n)$ and $v=(v_1,\dots,v_n)$ are fixed vectors and $π$ is a uniformly random permutation. The paper contains several new results, addressing both discrete and continuous anti-concentration phenomena.
On the discrete side, we establish a near-optimal structural characterization of the vectors $w$ and $v$ under the assumption that the concentration probability $\sup_x P(S_π=x)$ is polynomially large. On the continuous side, we study the small-ball event $|S_π-L|\le δ$. Our results exhibit sub-gaussian decay in $L$.
Our results have applications in various areas. First, we use our inverse theorems to derive and strengthen a number of previous anti-concentration bounds. In particular, we show that if both $w$ and $v$ have distinct entries, then $\sup_x P(S_π=x) \le n^{-5/2+o(1)}$. Next, we apply our new results to study random polynomials, and prove that the number of extremal points of random permutation polynomials is bounded by $O(\log n)$, extending results of S{ö}ze~\cite{Soze1, Soze2}. In the final application, we prove that random matrices whose rows are independent random permutations of a fixed non-degenerate vector are nonsingular with high probability.2025-12-25T20:32:34Z59 pages; title changed; references and applications addedViet H. DoHoi H. NguyenKiet H. PhanTuan TranVan H. Vuhttp://arxiv.org/abs/2501.18329v2On Lorden's Inequality and Renewal-Type Processes with Dependent Inter-renewal Times2026-03-20T10:43:12ZWe consider renewal-type processes whose positive inter-renewal times may be dependent, non-identically distributed, and may have mixed distributions. We introduce a generalised intensity measure extending the classical hazard-rate representation to this setting. Under a two-sided comparison scheme for the inter-renewal laws and an additional renewal-measure domination condition \textnormal{(RD)}, we prove a Lorden-type bound for the forward recurrence time. This bound provides an explicit first-moment input for coupling constructions and, once the remaining coupling parameters are controlled, yields a total-variation estimate. We illustrate the result on exponential, mixed, Markov-modulated, and Pareto benchmarks. In the i.i.d.\ benchmarks, the bound has the correct renewal scale up to a universal factor; in the Markov-modulated benchmark, the explicit Lorden constant is verified while the final convergence consequence remains conditional on \textnormal{(RD)}; and in the Pareto case the construction identifies the natural second-moment threshold for finiteness of the Lorden input.2025-01-30T13:15:14Z36 pages, no figures, two tablesEl'mira Yu. KalimulinaGalina A. Zverkinahttp://arxiv.org/abs/2603.19800v1The logarithmic law of sample correlation matrices2026-03-20T09:39:34ZLet $\mathbf{R}$ be the sample correlation matrix constructed from $\mathbf{X}\in \mathbb{R}^{p\times n}$, whose entries are independent and identically distributed random variables with mean zero and tail probability condition $\lim_{x\rightarrow \infty}x^3\mathbb{P}(|ξ|>x)=0$. We derive the universal logarithmic law for $\log \det \mathbf{R}$,
\begin{equation*}
\frac{\log \det \mathbf{R}-(p-n+1/2)\log (1-\frac{p-1}{n})+p-\frac{p}{n}}{\sqrt{-2\log (1-\frac{p-1}{n})-2\frac{p}{n}}}\stackrel{d}{\rightarrow} {N}(0,1),
\end{equation*}
if $p\le n$ as $p,n\rightarrow \infty$. Moreover, under the near-singularity case $0\le n-p\le n^{1-w}$ for any $w\in (0,1)$, it is shown that the tail probability condition can be weakened to $\lim_{x\rightarrow \infty}x^3(\log x)^{-1/4+\mathfrak{c}}\mathbb{P}(|ξ|>x)<\infty$ for any constant $0<\mathfrak{c}<1/4$.2026-03-20T09:39:34Z56 pagesYanpeng LiZhi LiuJiahui XieWang Zhouhttp://arxiv.org/abs/2603.19774v1Topological trapping in circular midpoint opinion dynamics2026-03-20T09:04:53ZWe study a discrete-time asynchronous midpoint dynamics on the circle in which, at each step, a uniformly chosen neighboring pair moves to the midpoint along the shortest arc.
Although the update rule is locally contractive, we show that the global relaxation mechanism depends sharply on the boundary topology. Under open boundary conditions the system converges almost surely to consensus through pure contraction. Under periodic boundary conditions the graph contains a single cycle, and the wrapped edge increments define an integer-valued winding number. While consensus remains the unique absorbing state for every fixed system size, we show that topology profoundly reshapes the transient dynamics.
We prove that branch-crossings are the only mechanism capable of modifying the winding number and compute explicitly their probability for disordered initial data. Local averaging rapidly suppresses large gradients and drives the system into a no-branch-crossing regime where the winding number freezes. Inside a fixed winding sector we construct an adaptive co-moving frame in which the dynamics becomes an exact Euclidean midpoint process and establish strict contraction toward a twisted linear profile determined by the winding number.
Our results isolate a minimal mechanism by which a single cycle induces sector locking and escape, even though the final equilibrium remains unchanged.2026-03-20T09:04:53Z17 figuresAnnika BrockhausWioletta M. RuszelCristian Spitonihttp://arxiv.org/abs/2510.05685v3Sample complexity for divergence regularized optimal transport with radial cost2026-03-20T09:04:21ZWe prove a new sample complexity result for divergence regularized optimal transport. Our bound holds for probability measures on~$\mathbb{R}^d$ with exponential tail decay and for radial cost functions that satisfy a local Lipschitz condition. It is sharp up to logarithmic factors, and captures the intrinsic dimension of the marginal distributions through a generalized covering number of their supports. Examples that fit into our framework include subexponential and subgaussian distributions and radial cost functions $c(x,y)=|x-y|^p$ for $p\ge 1$ with logarithmic entropy or polynomial $α$-divergence.2025-10-07T08:41:29ZRuiyu HanJohannes Wieselhttp://arxiv.org/abs/2603.19772v1The equivalence of precompactness, zero maximal pattern entropy and bounded mean complexity for finite partitions2026-03-20T09:04:11ZIn this paper, we investigate several types of low complexity of finite partitions, including precompactness, zero maximal pattern entropy, bounded mean complexity and mean equicontinuity. We first show that a collection of finite partitions in a standard probability space is precompact in the Rokhlin metric if and only if it has zero maximal pattern entropy if and only if the collection of the characteristic functions of atoms in those partitions is precompact in $L^2$ if and only if it has bounded mean complexity with respect the Hamming distance. Next, we show that for a countably infinite discrete amenable group acting on a standard probability space, a finite partition has zero maximal pattern entropy if and only if each characteristic function of atom in the partition is almost periodic if and only if it has bounded mean complexity with respect to some (and hence any) Følner sequence if and only if it is mean equicontinuous with respect to some (and hence any) tempered Følner sequence.2026-03-20T09:04:11Z24pagesJian LiTao YuXianliang Zhonghttp://arxiv.org/abs/2603.19758v1Eigenvalue Stability and New Perturbation Bounds for the extremal eigenvalues of a matrix2026-03-20T08:42:36ZLet $A$ be a full ranked $ n\times n$ matrix, with singular values $σ_1 (A) \ge \dots \ge σ_n (A) >0$. The condition number $κ(A):= σ_1(A)/σ_n(A)=\|A\|\cdot \|A\|^{-1}$ is a key parameter in the analysis of algorithms taking $A$ as input. In practice, matrices (representing real data) are often perturbed by noise. Technically speaking, the real input would be a noisy variant $\tilde A =A +E$ of $A$, where $E$ represents the noise. The condition number $κ(\tilde A)$ will be used instead of $κ(A)$. Thus, it is of importance to measure the impact of noise on the condition number.
In this paper, we focus on the case when the noise is random. We introduce the notion of regional stability, via which we design a new framework to estimate the perturbation of the extremal singular values and the condition number of a matrix. Our framework allows us to bound the perturbation of singular values through the perturbation of singular spaces. We then bound the latter using a novel contour analysis argument, which, as a co-product, provides an improved version of the classical Davis-Kahan theorem in many settings.
Our new estimates concerning the least singular value $σ_n(A)$ complement well-known results in this area, and are more favorable in the case when the ground matrix $A$ is large compared to the noise matrix $E$.2026-03-20T08:42:36ZPhuc TranVan Vuhttp://arxiv.org/abs/2603.19717v1Indistinguishability in One-or-Two-Ended Forests on Unimodular Random Graphs2026-03-20T07:47:07ZWe provide a new approach for proving the indistinguishability of connected components of random one-or-two-ended oriented forests on unimodular random graphs. In particular, this approach leads to a new and simpler proof for the wired uniform spanning forest, which is the only one-ended model previously studied in the literature. This approach can also be used for proving the indistinguishability of `level-sets' in this setting, where the previously available methods do not work. The approach leads to new indistinguishability results for a variety of models, including, for instance, river models, coalescing renewal process models, coalescing simple random walks and coalescing Markov chains. These models are unified as `coalescing Markov trajectories' (CMT), under some general conditions, where the out-going edges of the vertices are chosen randomly and independently. These models and results are also extended to models based on point-maps on Bernoulli/Poisson point processes, like Howard's model and the strip point-map.
The proof technique is based on conditioning on the `ancestry chain' of the root. It leverages measure-theoretic results on the completion of certain invariant or tail sigma-fields, which are of independent interest. First, non-tail events are ruled out regardless of the forest model. The next step, which is model dependent, is to reduce the indistinguishability of the components (resp. level-sets) to the ergodicity (resp. tail triviality) of the ancestry chain of the root. A result of independent interest is the tail triviality of Markov chains on unimodular random graphs, under suitable conditions, which completes the last step of the proof of the indistinguishability of level-sets of CMTs on unimodular graphs.2026-03-20T07:47:07Z96 pages, 4 figuresFrancois BaccelliAli Khezelihttp://arxiv.org/abs/2501.03227v5When Should Selfish Miners Double-Spend?2026-03-20T04:05:22ZConventional double-spending attack models ignore the revenue losses stemming from the orphan blocks. On the other hand, selfish mining literature usually ignores the chance of the attacker to double-spend at no-cost in each attack cycle. In this paper, we give a rigorous stochastic analysis of an attack where the goal of the adversary is to double-spend while mining selfishly. To do so, we first combine stubborn and selfish mining attacks, \textit{i.e.}, construct a strategy where the attacker acts stubborn until its private branch reaches a certain length and then switches to act selfish. We provide the optimal stubbornness for each parameter regime. Next, we provide the maximum stubbornness that is still more profitable than honest mining and argue a connection between the level of stubbornness and the $k$-confirmation rule. We show that, at each attack cycle, if the level of stubbornness is higher than $k$, the adversary gets a free shot at double-spending. At each cycle, for a given stubbornness level, we rigorously formulate how great the probability of double-spending is. We further modify the attack in the stubborn regime in order to conceal the attack and increase the double-spending probability.2025-01-06T18:59:26ZMustafa DogerSennur Ulukus