Analytic Number Theory 2015
DOI: 10.1007/978-3-319-22240-0_11
|View full text |Cite
|
Sign up to set email alerts
|

A Note on Helson’s Conjecture on Moments of Random Multiplicative Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

6
50
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 36 publications
(56 citation statements)
references
References 21 publications
6
50
0
Order By: Relevance
“…This can be related to recent results of [11] (see also [12]), where the authors obtain the asymptotic behaviour of a Steinhaus random multiplicative function (basically a multiplicative random variable whose values at prime integers are uniformly distributed on the unit circle). This can be viewed as a random model for θq(x,χ).…”
Section: Introductionsupporting
confidence: 62%
“…This can be related to recent results of [11] (see also [12]), where the authors obtain the asymptotic behaviour of a Steinhaus random multiplicative function (basically a multiplicative random variable whose values at prime integers are uniformly distributed on the unit circle). This can be viewed as a random model for θq(x,χ).…”
Section: Introductionsupporting
confidence: 62%
“…This seems surprising from a number theoretic perspective, since one rarely expects to achieve better than squareroot cancellation. Exploring the conjecture, Weber [29] established various results; Bondarenko and Seip [4] proved a lower bound E| n≤x f (n)| ≫ √ x/(log x) δ for a certain small explicit δ > 0; and Harper, Nikeghbali and Radziwi l l [13] proved a stronger lower bound E| n≤x f (n)| ≫ √ x/(log log x) 3+o (1) . They also conjectured, in opposition to Helson's conjecture, that E| n≤x f (n)| 2q ∼ C(q)x q as x → ∞, for each fixed 0 ≤ q ≤ 1.…”
Section: Introductionmentioning
confidence: 99%
“…In the following proof, we have adapted the method of [, Section 2] which relies crucially on Harper's work . We refer to [, pp. 150–152] for an illuminating outline of the method.…”
Section: Proof Of Theoremmentioning
confidence: 99%
“…We have trueleft0truenscriptSxdαfalse(nfalse)αΩ(n)zfalse(nfalse)n1/21/logxit=px0true1+j=1dαfalse(pjfalse)αjz(p)jpj(1/2+1/logx+it)left1emprefixexp()Re0truepxzfalse(pfalse)p1/21/logxit+12αRe0truepxz(p)2p12/logx2itfor all points of the configuration space false(z(p)false)px. As in [, Lem. 1], we can modify the proof of [, Corollary 2] to show that trueleftsup1t2(loglogx)2false|12itfalse|1/4(Re0true<...>…”
Section: Proof Of Theoremmentioning
confidence: 99%
See 1 more Smart Citation