prompt
stringlengths
15
200
answer
stringlengths
0
425k
\section{Introduction} \noindent The classical linear-time / branching-time spectrum~\cite{Glabbeek90} organizes a plethora of notions of behavioural equivalence on labelled transition systems at var
ious levels of granularity ranging from (strong) bisimilarity to trace equivalence. Similar spectra appear in other system types, e.g.~on probabilistic systems, again ranging from branching-time equivalence such as probabilistic bisimilarity to linear-time ones such as probabilistic trace equivalence~\cite{JouSmolka90}...
\section{Evaluation}\label{sec:evaluation} \begin{table}[t] \centering \begin{tabular}{|c|c|c|c|} \hline Model & \shortstack{Accuracy\\ on clean} & \shortstack{backdoor \\succes
s rate} & \shortstack{Discriminator \\Detection Rate}\\ \hline Non-Trojaned model & {\pmb{$99.3\%$}} & - & $100\%$ \\ \hline Trojaned model & $91.92\%$ & $81.06\%$ & $96.3\%$\\ \hline \shortstack{ Trojaned model with\\ Knowledge Distillation} & $98.74\%$ & $87.39\%$ & $99.40\%$\\ \hline Our approach ...
\section{Introduction} Interdisciplinary approaches are common in science and technology, and their importance in pedagogy cannot be overstated. Williams et al.~\cite{williams2003aren } analyse the r
easons why many high school students do not find physics interesting and suggest that an interdisciplinary approach might enhance students' interests in physics. A new idea can be better appreciated by the students when they interpret it in terms of the known concepts bearing no apparent connections with the new topic....
\section{Introduction} Attention is a technique for selecting a focused location and enhancing different representations of objects at that location. Inspired by the major success of transformer ar
chitectures in the field of natural language processing, researchers have recently applied attention techniques to computer vision tasks, such as image classification \cite{zhao2020exploring, dosovitskiy2020image}, object detection \cite{carion2020end}, semantic segmentation \cite{xie2021segformer}, video unde...
\section{Related Work} \label{sec:related_work} \textbf{Hybrid networks.} The idea originated in research presented in \cite{oyallon2017firstHybrid} where E. Oyallon et al. experimented with replacing
initial layers of ResNet \cite{he2016resNet} and Wide ResNet \cite{zagoruyko2016wrn} with a scattering transform. This approach allowed deeper analysis and better interpretation of complex deep learning techniques and demonstrated that predefined filters grant theoretical guarantees required for building better networ...
\section{INTRODUCTION} Shipping containers revolutionized the transportation of goods across the globe. Before its introduction, the process of loading and unloading a ship was extremely slow and the
y had to stay for weeks in the port at a time. Thanks to containerization, the productivity and efficiency of ports have been remarkably enhanced. Moreover, an important performance indicator of a port is the speed at which a ship is unloaded and loaded again \cite{Kreuzer2014,Sakawa1982}. With this in mind, the effi...
\section{Introduction} The Potts model is a statistical model, originally invented to study ferromagnetism~\cite{potts}; it also plays a central role in probability theory, combinatorics and computer
science, see e.g.~\cite{Sokaltutte} for background. Let $G = (V,E)$ be a finite graph. The anti-ferromagnetic Potts model on the graph $G$ has two parameters, a number of \emph{states, or colors,} $q\in \mathbb{Z}_{\geq 2}$ and an edge interaction parameter $w=e^{kJ/T}$, with $J<0$ being a coupling constant, $k$ the...
\section{Introduction} \label{sec:intro} High-mass stars are preferentially found in binary and multiple systems \citep{Sana+12sci,Sana+14apjs,Kobulnicky+14apjs} and a significant fraction have short
orbital periods. They are also bright so are over-represented in magnitude-limited samples. As a result, a relatively large number of high-mass stars have been found to be members of eclipsing binaries (EBs). Of particular interest are high-mass stars in EBs with orbital periods long enough for them to have evolved as...
\section{Introduction} \label{introduction} Imitation learning (IL) empowers non-experts to train robotic systems for arbitrary tasks. Improvements in IL would support more widespread adoption of robo
tic technologies in the home and workplace, but IL methods often require large amounts of supervised training data \cite{bc} and/or employ unintuitive data collection approaches \cite{dart, dagger}, creating a bottleneck in the adoption of these technologies. A more natural approach to training of robotic agents is t...
\section{Introduction} \label{sec_theory} Pulsar-timing arrays (PTA) offer a promising tool for detecting gravitational waves (GW) in the nano-Hertz regime. The concept was first proposed in \cite{Sa
zhin:OO,Detweiler:1979wn,Mashhoon:1979wk,Bertotti:1980pg}, and much developed thereafter -- see e.g. \cite{Lommen:2015gbz} for a review. Recently, the NANOGrav collaboration detected a signal compatible with a stochastic gravitational wave background (SGWB) \cite{NANOGrav:2020bcs}. Subsequently, the PPTA \cite{Gonc...
\section{Introduction} \label{s:introduction} As cybersecurity skills require higher-order thinking, the best way to develop and ameliorate these abilities is through hands-on training~\cite{mcmurtre
y2008,hatzivasilis2020}. In many learning areas, hands-on training produces a tangible output, e.g., a code that can be checked, analyzed, and evaluated. However, this is not the case of cybersecurity, where learning goals consist of process-oriented tasks related to attack or defense skills, e.g., scanning the netwo...
\subsection*{Acknowledgments} \begingroup \footnotesize The authors thank Matthew Foulkes, David Ceperley, Lucas Wagner, Gareth Conduit, and Ke Liao for helpful discussions. We thank ByteDance AML te
am specially for their technical and computing support. We also thank ByteDance AI-Lab LIT Group and the rest of ByteDance AI-Lab research team for inspiration and encouragement. This work is directed and supported by Hang Li and ByteDance AI-Lab. J.C. is supported by the National Natural Science Foundation of China un...
\section{Methods} \label{sec:methods} \figframework Our aim was to build a flexible and manipulative style space. In particular, we considered the following objectives. (i) Visual similarity should
be considered. For example, visually similar pairs, such as a wolf and a dog, should be placed in similar places in the style space. (ii) There should be a representative value, such as a discrete label, providing a good starting point when the user wants to fine-tune the result. \subsection{Framework} The framework o...
\section{Introduction} Cardinality estimation, or the distinct counting problem, is a fundamental data analysis task. Typical applications are found in network traffic monitoring \cite{estan2003bitma
p}, query optimization \cite{selinger1989access}, and counting unique search engine queries \cite{heule2013hyperloglog}. A key challenge is to perform this estimation in small space while processing each data item quickly. Typical approaches for solving this problem at scale involve data sketches such as the \acrfull{f...
\section{Introduction} \subsection{Definition}\label{sec:geom} Let $X$ be a smooth complex projective variety of dimension $n$, and $D \subset X$ a simple normal crossings ({$\mathsf{snc}$}) divisor
, i.e., a normal crossings divisor whose irreducible components $\{D_p\}_{p \in P}$ are smooth. We consider $\mathrm{Div}(X,D) \simeq \Z^P$, the free abelian group generated by divisors supported on $D$. Let $\mathsf{N} \subset \mathrm{Div}(X,D)_\Q$ be a rational polyhedral cone---so $\mathsf{N} = \{ \sum_{i=1}^s \la...
\section{Additional details and analysis in the synthetic experiments}\label{app:details_exp} In this section, we provide additional details on the hyperparameter selection procedure in the syntheti
c networks of Section \ref{sec:exp_synthetic}, and two supplementary experiments, namely a sensitivity analysis of our method to the window size parameter $L$ and to the choice of pooling layer in the similarity module (see Section \ref{sec:methodology}). \subsection{Hyperparameter selection} In each scenario and dif...
\section{Introduction} \ac{ISAC} has emerged as a key enabler for 5G and beyond wireless systems to deal with the challenging requirement in terms of spectral efficiency, localization, as well as
power consumption \cite{bourdoux20206g}. In particular, the waveform design for \ac{ISAC}, sharing common hardware and spectrum, has been extensively studied in the literature (see e.g. \cite{ma2019joint} and references therein). In this context, \ac{OFDM} has been widely investigated as an \ac{ISAC} waveform, in vir...
\section{Introduction} \label{sec:intro} The presence of undesirable biases in computer vision applications is of increasing concern. The evidence shows that large-scale datasets, and the models trai
ned on them, present major imbalances in how different subgroups of the population are represented \cite{excavating,buolamwini2018gender,zhao2017men,burns2018women}. Detecting and addressing these biases, often known as societal biases, has become an active research direction in our community \cite{wang2020revise,yang2...
\section{Introduction} In network topology inference, the goal is to identify the network structure from the collected signals, which plays a vital role in many applications \cite{dong2019learning,ya
ng2020network,mateos2019connecting}. In most existing research \cite{vosoughi2020large,zhang2014topology,sharma2019communication}, the network topology was inferred based on a complete set of observed data for all the entities of interest. However, many real-world applications suffer from the partial observability pro...
\section{Introduction} {\itshape Primitive model}.--- Ionic fluids cover a wide range of charged materials, including solvent-in-salt electrolytes, room-temperature ionic liquids (RTILs), various co
lloidal dispersions, and polyelectrolytes \cite{review bio, review fluid}. Recently, ionic fluids are increasingly attracting much attention, due to their diverse applications not only in chemistry and biology \cite{review bio} but also in renewable energy devices such as batteries, supercapacitors, and separation med...
\section{1. Introduction} Hand pose estimation plays a key role in many applications to support human computer interaction, such as autonomous driving, AR/VR, and robotics \cite{Erolsurvey}. Given an
input image, the goal of hand pose estimation is to estimate the location of hand skeleton joints. While many works take color images as input, methods built upon depth images usually exhibit superior performance \cite{sun2015cascaded}. Prior arts often use depth image and 2D CNN networks to regress 3D hand joints, or...
\section{Introduction} Until $4$ years ago only a couple of examples of minimal hereditary classes of unbounded clique-width had been identified, see Lozin~\cite{lozin:minimal-classes:}. However, mor
e recently many more such classes have been identified, in Atminas, Brignall, Lozin and Stacho~\cite{abls:minimal-classes-of:}, Collins, Foniok, Korpelainen, Lozin and Zamaraev~\cite{collins:infinitely-many:}, and most recently the current authors demonstrated an uncountably infinite family of minimal hereditary classe...
\section{Introduction} Quantum metrology \cite{advances} studies the employment of quantum resources (such as entanglement \cite{EN1} and discord \cite{discord1}) on the enhancement of measurement ac
curacy \cite{Braunstein1994}. The problem of quantum metrology can be reduced to find optimal scheme for the estimation of parameters that are encoded in a probe system undergoing parameter-dependent evolutions. Taking into account the laws of quantum mechanics, quantum resources are capable to improve the precision of...
\section{Introduction} {Many in-situ and remote observations along with theoretical studies} were carried out to understand the composition and energetics of the Martian upper atmosphere \citep{
Nier77, Krasnopolsky93, Bertaux05, Withers06, Gonzalez09, Bougher15a, Mahaffy15, Bhardwaj16, Bhardwaj17}. However, the study of minor neutrals in Martian upper atmosphere is still sparse due to lack of several key chemical reaction parameters and insufficient measurements from remote and in-situ observations. N...
\section{Introduction}\label{sec:introduction}} \IEEEPARstart{A}{nomalous} events are defined as an occurrence of odd incidents. The detection of these events is crucial for providing security. In ge
neral, anomalous events can be broadly grouped into three categories namely: spatial anomalies, temporal anomalies and appearance anomalies \cite{ramachandra2020survey}, \cite{chalapathy2019deep}. Spatial anomalies are related to the location of the object with respect to the scene. Temporal and appearance anomalies ar...
\section{Introduction} Bisectorial operators play a central role in the theory of abstract inhomogeneous first order differential equations on the whole real line, like \begin{equation}\label{rl} u'
(t) = Au(t) + f(t),\qquad t\in\mathbb{{R}}, \end{equation} where $A$ is a bisectorial operator on a Banach space $X$. The theory has been an active topic of research during the past years. We refer to \cite{arendt2010decomposing, schweiker2000asymptotics} and their references for a complete overview, the importance, a...
\section{Introduction} In all the engineering areas of development, multi-physics analysis appears highly difficult to be carried out because of the interactions between more than one physics involved
. During the achievement and the analysis of coupled systems, the way in which the shape of the object influences its performances is required to be carefully taken into account. In the biomedical engineering field for example, the design and the evaluation of the behaviour of prosthetic valves, stent-grafts and ventr...
\section{Introduction} In recent years, the introduction of deep learning has dramatically improved the recognition accuracy of automatic speech recognition systems (ASR). However, most research on A
SR often focuses only on a single language speech. Therefore, for ASR systems that support multiple languages, it has been proposed to use a language-specific ASR system after a language identifier has been performed \cite{Kim/2020}. However, since this approach requires sophisticated language identifiers and language ...
\section{Introduction} While numerous astronomical observations strongly support the existence of dark matter~\cite{Planck2018}, its identity remains one of the biggest mysteries of modern physics.
Axions were initially motivated to solve the Strong CP problem~\cite{PhysRevD.16.1791, PhysRevLett.38.1440,PhysRevLett.40.223,PhysRevLett.40.279}, but also turned out to be excellent candidates for dark matter~\cite{PRESKILL1983127,ABBOTT1983133,DINE1983137}. Axions in the mass range 40--400$\,\mu$eV are particularly f...
\section{Introduction} End-to-end (E2E) methods, such as connectionist temporal classification (CTC)~\cite{graves2006connectionist}, recurrent neural network transducer (RNN-T)~\cite{graves2012seque
nce,wang2021cascade,wang2019exploring}, and attention based encoder-decoder (AED)~\cite{chorowski2014end,chan2015listen,luo2021simplified,miao2020transformer}, have drawn immense interest in the last few years in automatic speech recognition (ASR). Recent works~\cite{prabhavalkar2017comparison,sainath2019two,kim2017joi...
\section{Introduction} The ability to deploy AI models, especially Deep Neural Networks (DNNs) on resource-constrained devices (smart phones/tabs/TVs and edge sensors) has transformed the way these d
evices are used. While increasingly sophisticated deep models empower intelligent features and apps, revolutionary hardware and/or neural acceleration platforms \cite{snpe,snap,coreml} allow us to enable such features on even smaller devices. However, extensive manual effort by AI experts/professionals is needed for ...
\section{\textbf{INTRODUCTION}}\label{sec:intro} In the global competitive economy nowadays, an extremely important task for manufacturing companies is to not only offer high-quality products but al
so reduce waste and increase efficiency in the production processes. The development of advanced technologies in Artificial Intelligence and Data Science fields makes this task more possible, but also more challenging when competing with other companies. Therefore, making a smart decision in manufacturing becomes a cru...
\section{Acknowledgement} We would like to thank Valeo for encouraging advanced research. Many thanks to Ciar{\'a}n Eising (University of Limerick, Ireland), Tuan-Hung Vu (valeo.ai, France), Saikat
Roy (DKFZ, Germany) and Aniruddha Saha (University of Maryland, Baltimore County) for providing a detailed review prior to submission. \section{Proposed Method} \begin{figure*} \captionsetup{singlelinecheck=false, font=small, belowskip=-6pt} \centering \includegraphics[width=\textwidth]{images/unshadown...
\section{Introduction} In the last few years, we have been experiencing a dizzying growth of the ride-hailing market \cite{nyc_ridehailing}, where on-demand ride-hailing platforms, such as Uber, Lyft
and Didi Chuxing, have to settle up suitable pricing strategies to be attractive on two nearly complementary fronts: costumers and drivers. Each ride-hailing firm, indeed, not only competes for costumers with the other firms and with traditional transportation systems, but also strives to secure an as wide as possible ...
\section{Introduction}\label{Sec:Intro} Active matter represents biological systems and their artificial analogues that are composed of large numbers of active ``agents" such as creatures and self-pr
opelling particles moving in fluids or more complex environments~\cite{Sam2013a,Marchetti2013,Bechinger2016,Prost2015,Elgeti2015}. These constituent agents are said to be \emph{active} in the sense that they convert chemical energy continuously at the microscopic level into motion or mechanical forces. In biology, acti...
\section{\textbf{Introduction}} The inverse nodal problem, posed and solved firstly by McLaughlin for a Sturm-Liouville operator \cite{mc1}. McLaughlin showed that the potential of a Sturm-Liouvi
lle problem can be determined by a given dense subset of nodal points. Later on, Hald and McLaughlin give some numerical schemes for the reconstruction of the potential \cite{H}. X.F. Yang gave an algorithm for the solution of the inverse nodal Sturm-Liouville problem \cite{yang}. His method is the first of the alg...
\section{Introduction} The sequential recommendation~\citep{fan2021continuous,liu2021augmenting,chen2018sequential,tang2018personalized,zheng2019gated} aims at predicting future items in sequences, wh
ere the crucial part is to characterize item relationships in sequences. Recent developments in sequence modeling~\citep{fan2021continuous,liu2021augmenting} verify the superiority of Transform~\citep{vaswani2017attention}, i.e. the self-attention mechanism, in revealing item correlations in sequences. A Transformer~...
\section{\label{sec:level1}Introduction} As a wave propagates through a heterogeneous medium, it undergoes scattering: one part of its energy is diverted from the initial direction, and gives rise to
secondary waves which in turn can be scattered again. Multiple scattering can be encountered with all kinds of waves, and has been a very active subject of research for several decades as well in quantum physics as in optics or acoustics~\cite{foldyMultipleScatteringWaves1945,ishimaruWavePropagationScattering1978,akke...
\section{Introduction} \label{sec:org7d983f2} Grifo \cite{grifo-stable-2020} proposed the following stable version of the Harbourne conjecture \cite{bauer-primer-2009, harbourne-are-2013}. \begin{c
onjecture}[The stable Harbourne conjecture \cite{grifo-stable-2020}] \comment{Conjecture. [The stable Harbourne conjecture \cite{grifo-stable-2020}]} \label{sec:org48c86d5} If \(\ccI\) is a radical ideal of big height \(\ccc\) in a regular ring, then \begin{equation} \label{org6e11cdb} \ccI^{(\ccc \ccn - \ccc + 1)} \...
\section{Introduction} This paper deals with the well studied GI/G/1 queue. In many ways this stochastic model lives in the centre of queueing theory and applied probability as it marks the border of
tractable explicit models (e.g. M/G/1) and models for which asymptotic approximations are needed. Living on the explicitly intractable side of the border, GI/G/1 has motivated much early works in asymptotic approximate queueing theory such as \cite{kingman1962queues}, \cite{borovkov1964some} and \cite{iglehart1970mcq}....
\section{Introduction} As it is well-known (see \cite{ACdS}), a Hamiltonian system is called \emph{completely integrable} if and only if it possesses the maximal number of independent Poisson-commutin
g first integrals of motion. In the present article we shall work in the holomorphic category and associate to a complex surface endowed with a holomorphic symplectic form and a Hamiltonian function a holomorphic completely integrable system of complex dimension $2d$. Our aim is to describe such a construction and prov...
\section{Preliminaries} A net $(x_{\alpha})_{\alpha \in A}$ in a vector lattice $X$ is \textbf{\textit{order convergent}} to $x \in X$ if there exists a net $(y_{\beta})_{\beta \in B}$, possibly over
a different index set, such that $y_{\beta} \downarrow 0$ and for each $\beta \in B$ there exists $\alpha_0 \in A$ satisfying $\lvert x_{\alpha}-x\rvert \leq y_{\beta}$ for all $\alpha \geq \alpha_0$. We will write $x_{\alpha} \xrightarrow{o}x$ to denote this convergence. Recall that a net $(x_{\alpha})$ in a vector l...
\section{Introduction} All graphs considered in this paper are finite, undirected and contain no loops nor multiple edges. For every $k \geq 1$, the set $\set{1,\ldots,k}$ is denoted $\sbr
ac{k}$. The size of a graph $G$, denoted $\norm{G}$, is the number of vertices in $G$. For a vertex $v$ of $G$, the set of vertices adjacent to $v$ in $G$ is denoted $N(v)$. For a set $X$ of vertices of $G$, the graph induced by $X$ in $G$ is denoted $G[X]$. A \emph{$d$-defective coloring} of a graph $G$ is a coloring...
\section{Introduction} \label{sec:1} Impressive achievements in investigations and applications of optical vortex beams and optical angular momentum (AM) \cite{1,2} motivated the prediction and gener
ation of free-electron vortex states carrying orbital angular momentum \cite{3,4,5,6}. These electron vortices are currently attracting considerable attention in several areas of physics, including electron microscopy, quantum theory, and high-energy physics (see \cite{7,8} for reviews). Free-electron vortex states w...
\section{Introduction} Magnetic skyrmions are nanoscale whirling spin configurations \cite{nagaosa_topological_2013}. Their small size, topological protection and the fact that they can be manipulate
d by small in-plane current densities have opened a new paradigm to manipulate the magnetization at the nanoscale. This has led to proposals for novel memory and logic devices in which the magnetic skyrmions are the information carriers \cite{fert_skyrmions_2013}. They were first observed in B20 chiral magnets thin fil...
\section{Introduction} Random fields governed by systems of stochastic partial differential equations (SPDEs) have been used to model many physical phenomena in random environments such as the motion
of a random string, stochastic fluid mechanic, the precessional motion of magnetisation with random perturbations, and so on; specific models can be founded in \cite{funaki1983random,mueller2002hitting,mikulevicius2004stochastic,hairer2006ergodicity,brzezniak2013weak,da2014stochastic} and references therein. This pap...
\section{Introduction}\label{sec:introduction} The apparent rise in political incivility has attracted substantial attention from scholars in recent years. These studies have largely focused on the e
xtent to which politicians and elected officials are increasingly employing rhetoric that appears to violate norms of civility \cite{herbst2010rude, mutz2015your}. For the purposes of our work, we use the incidence of offensive rhetoric as a stand in for incivility. The 2016 US presidential election was an especially n...
\section{Introduction} Astrophysical and cosmological evidences suggest that non-baryonic cold dark matter (DM) constitutes $84\%$ of the matter density of the Universe \citep{Ade:2015xua}. Many well
-motivated DM candidates are predicted to annihilate or decay into Standard Model (SM) particles and to produce secondary cosmic rays, such as gamma rays \citep{Bertone:2005xv}. Galaxy clusters, dwarf spheroidal (dSph) galaxies as well as the Galactic Center are principal astrophysical targets for indirect DM searc...
\section{Motivation and outlook} \label{sec:intro} The study and characterisation of supersymmetric and asymptotically AdS$_{4}$ black holes in four-dimensional $\,\mathcal{N}=2\,$ gauged supergravi
ty \cite{Caldarelli:1998hg,Cacciatori:2009iz,DallAgata:2010ejj,Hristov:2010ri} has recently received new attention in light of the gravity/gauge correspondence. Of special interest are the $\,\mathcal{N}=2\,$ gauged supergravities with a known embedding in string/M-theory \cite{Halmagyi:2013sla,Halmagyi:2014qza} due to...
\section{Introduction} \IEEEPARstart{A}{ccording} to the World Health Organization, breast cancer is one of the most frequent cancer diseases in the world \cite{Stewart2014}. To provide more effect
ive treatment and reduce the death rate, early detection of breast cancer must be carried out. Despite the fact that different diagnostic tools can be used to detect breast cancer, there is a growing interest in use of ultrasound imaging. Ultrasound is known for being non-invasive, relatively non-expensive and broad...
\section{Introduction} Planetary nebulae (PNe) are the dust and gas shells ejected at the late AGB stellar phases, and then ionized, partially or fully, by the radiation from the hot, evolving centra
l stars (CSs). PNe are probes of stellar and nebular evolution and of cosmic chemical enrichment, and knowing their formation and evolution is essential in many astrophysical fields. To date, several hundred Galactic PNe are known (e.~g., catalogs by Acker et al.~1992; Parker et al.~2006), but their distances have alw...
\section{Introduction} Fix a f\/inite f\/ield $\mathbf{F}_{q}$ and a positive integer $n$. In this paper we study a particular class of deformations of Delsarte hypersurfaces in $\mathbf{P}^n_{\mathbf
{F}_q}$. There has been an extensive study of the behaviour of the zeta function in families of varieties. First results were obtained by Dwork (e.g.,~\cite{DworkPadicCycle}) and Katz~\cite{Katz}. In the latter paper the author studies a pencil of hypersurface in $\mathbf{P}^n$ and describe a~dif\/ferential equation, w...
\section{Main result} Consider the Hamming cube $\{-1,1\}^{n}$ of an arbitrary dimension $n\geq 1$. For any $f :\{-1,1\}^{n} \to \mathbb{R}$ define the discrete partial derivative $\partial_{j} f(x)$
as follows \begin{align*} \partial_{j} f(x) = \frac{f(x)-f(S_{j}(x))}{2}, \quad x = (x_{1}, \ldots, x_{n}) \in \{-1,1\}^{n}, \end{align*} where $S_{j}(x)$ is obtained from $x$ by changing the sign of $j$'th coordinate of $x$. Set $\nabla f(x) := (\partial_{1} f(x), \ldots, \partial_{n} f(x))$, and we define the norm o...
\section{Introduction} Relations between creation and annihilation operators determine the statistical properties of quantum systems composed by non-interacting particles. Canonical examples are the
Bose-Einstein distribution for the commutation relation $[a,a^\dagger]=1$ and the Fermi-Dirac distribution for the anti-commutation relation $\{a,a^\dagger\}=1$. Starting from the pioneer works of Gentile \cite{gentile} and Green \cite{green}, many different distributions have been proposed as extensions that go beyond...
\section{Introduction} \label{intro} Brown dwarfs with masses $\lesssim$15~\mjup\ and ages $\lesssim$100~Myr lie at a nexus of astronomical interest. They represent the lowest-mass and youngest produ
cts of star formation, and as such offer rare empirical tests for evolutionary and atmospheric models. They are also the best field analogs to directly-imaged giant exoplanets, which are far more difficult to directly observe due to the glare of their host stars. Brown dwarfs cool continuously as they age, and the re...
\section{Introduction} In 1927, van der Waerden proved his famous theorem concerning arithmetic progressions in finite colorings of $\Z$, which asserts that any finite coloring of $\Z$ contains arb
itrarily long arithmetic progressions. Brown, Graham and Landman study variants of this result by considering other classes of sequences and whether these classes must also appear in finite colorings of $\Z$ \cite{BGL99}. One such class that they study are subsets of the set of arithmetic progressions whose common diff...
\section{Introduction} \label{sec:intro} A form of ``stellar archaeology" traces the formation of the Milky Way (MW) using the dense globular clusters (GCs) as test particles. However, it has become
obvious that globular cluster populations are far more chemically-diverse than we assumed a few decades ago, and are not simple single-generation star clusters \citep[and references therein]{gra12}. The Milky Way (MW) contains at least 150 GCs, and there appears to be a difference between the inner and outer halo popu...
\section{Discussion}\label{Discus} Our analysis of macroscopic realism relied heavily on the framework of PTM models and ontic models. We adopted this framework to have an analysis that is to a la
rge extent theory independent, mimicking the derivation and predictions for the experimental violations of Bell type inequalities in this sense. Obviously, though, there is a connection with quantum mechanics in the background. We use quantum mechanics to make predictions about what kind of preparations, transformati...
\section{Introduction} \label{Introduction} The lepton asymmetry of the Universe is one of the most weakly constrained cosmological parameters. Whereas the baryon asymmetry $\eta_{\text{b}} \equiv (n
_{\text{b}}-n_{\bar{\text{b}}})/n_{\gamma} = 274 \times 10^{-10} \omega_{\text{b}}= (6.099\pm 0.044) \times 10^{-10}$ \cite{Ade:2015xua} is tightly constrained, the lepton asymmetry \mbox{$\eta_{\text{l}} \equiv (n_{\text{l}}-n_{\bar{\text{l}}})/n_{\gamma}$} could be larger by many orders of magnitude. Here $n_i$ de...
\section{Introduction} \label{intro} Hierarchies (Taxonomies) are popular for organizing large volume datasets in various application domains \cite{ashburner2000gene,deng2009imagenet}. Several large-s
cale online prediction challenges such as LSHTC\footnote{http://lshtc.iit.demokritos.gr/} (webpage classification), BioASQ\footnote{http://bioasq.org/} (PubMed documents classification) and ILSVRC\footnote{http://www.image-net.org/challenges/LSVRC/2016/} (image classification) revolve around the HC problem. Although, s...
\section{Introduction} The chiral magnetic interaction discovered by Dzyaloshinskii \cite{Dzyaloshinskii:1958jpcs} and Moriya \cite{Moriya:1960pr} plays an important role in the formation of magnetic
nanostructures lacking inversion symmetry. The broken symmetry brought on by the presence of interfaces \cite{Fert:1990msf} or a chirality in the bulk crystal structure \cite{Dzyaloshinskii:1964zetf-2, Moriya:1960pr} leads to a twisting of the magnetic order. Bogdanov first identified this Dzyaloshinskii-Moriya (DM...
\section{Introduction} Many astrophysical systems are found in states out of thermal equilibrium. This is not surprising especially when gravity is the dominant interaction, given the overwhelmingly l
arge relaxation times\footnote{Strictly speaking, ``true'' thermodynamic equilibrium is impossible in isolated and finite self-gravitating systems in three dimensions, due to the non-confining nature of the potential; in this case the relaxation time denotes the time needed to effectively erase the memory of the initia...
\section{Introduction} Several websites like Wikipedia, DMOZ and Yahoo archive documents (text data) into hierarchies with large number of classes. Several classification methods have been develope
d to automatically classify text documents into different classes. In this work we seek to leverage the often implicit relationships that exists between multiple archival datasets to classify documents within them in a combined manner. Further, datasets have several classes with very few samples which make it harder...
\section{Noise performance of the detectors} \label{s:detectors_extra} \begin{figure*}[!bth] \vskip-10pt \centering \includegraphics[width=0.99\textwidth]{figures/noiseASD_O1O2.pdf} \vskip-10pt \cap
tion{Comparison of typical noise amplitude spectra of the LIGO detectors in the first observing run (O1) and the early stages of the second observing run (O2). The noise is expressed in terms of equivalent gravitational-wave strain amplitude. Some narrow features are calibration lines ($22$--$24~\mathrm{Hz}$ for L1, $3...
\section{Introduction} The core inverse and the dual core inverse of a matrix were introduced in \cite{BT}. These generalized inverses have been studied by several authors, in particular they have
been extended to rings with involution (\hspace{-1pt}\cite{rdd}) and to Hilbert space operators (\hspace{-1pt}\cite{rdd2}). It is worth noticing that the inverses under consideration are closely related to the group inverse and the Moore-Penrose inverse; to learn more results concerning these notions, see for exam...
\section{INTRODUCTION} \label{sec:intro} \subsection{Vertebral Fracture} The annual incidence of osteoporotic fractures in the United States surpasses the cumulative incidence of breast cancer, heart
attack and stroke. The most common osteoporotic fractures are those which result in compression of a vertebral body [\citenum{kanis2004family}]. In addition to being a direct source of morbidity, vertebral compression fractures (VCF’s) indicate substantially elevated risk of future osteoporotic hip fractures, which re...
\section{Extracting MQCs from the many-body echo sequence\label{sec:ExtractingMQCs}} In the time reversal sequence described in the main text, an initial state $\rho_0=\rho(t=0)$ evolves unitarily fo
r a time $t$ into $\rho=e^{-iH\ind{int}t}\rho_0 e^{iH\ind{int}t}$. Then, the rotation $U(\phi)=\exp(iA\phi)$ is applied transforming $\rho$ into $\rho(\phi)=U(\phi)\rho U^\dagger(\phi)$, and subsequently the time evolution is reversed to give the final state $\rho_f=e^{iH\ind{int}t}\rho(\phi) e^{-iH\ind{int}t}$ Measur...
\section{Introduction} \label{introductionsec} Although there have been many advances made in understanding low mass star formation over the past ten years (see, for example, \citealt{difrancesco2007
}, \citealt{wardthompson2007review}, \citealt{andre2014}), the manner in which mass assembles onto a forming star remains a crucial open question. As \cite{kenyon1990} first demonstrated, assuming the mass accretion process onto a young star occurs at a constant rate (steady inside out collapse; \citealt{shu1987}) give...
\section{Introduction} \label{sec: introduction} Passive network synthesis has been one of the most important subjects in circuit and system theories. This field has experienced a ``golden era'' fr
om the 1930s to the 1970s \cite{AV73,BD49,Gui57,SR61}. The most classical transformerless realization method, the Bott-Duffin procedure \cite{BD49}, shows that any positive-real impedance (resp. admittance) is realizable with a finite number of resistors, capacitors, and inductors. However, the resulting networks typi...
\section{Introduction} \label{eqn:Introduction} A key issue for the understanding of memory and computing structures concerns the question to which extent information imprinted on the boundary of a m
aterial remains available in the bulk or at some other boundary \cite{SHA,LTP,CWEL,NP,ALL,KWC,LBL,MMW,BRH}. We have proposed \cite{CWIT} a formalism for this problem based on the concept of classical wave functions \cite{CWQP} or the associated density matrix. This formalism resembles the derivation of the wave functio...
\section{Introduction} Speech signals are mysterious and fascinating: within just one dimensional vibration, very rich information is represented, including linguistic content, speaker trait, emotion
, channel and noise. Scientists have worked for several decades to decode speech, with different goals that focus on different informative factors within the signal. This leads to a multitude of speech information processing tasks, where automatic speech recognition (ASR) and speaker recognition (SRE) are among the mos...
\section{Introduction} Chirality in magnetic systems appears due to the broken inversion symmetry of the crystal. Microscopically it stems from a relativistic exchange interaction between magnetic mo
ments known as the Dzyaloshinsky--Moriya interaction\cite{Dzyaloshinsky,Moriya}. Originally introduced to account for the weak magnetic moment of some antiferromagnetic systems\cite{Dzyaloshinsky}, it has been demonstrated that this type of coupling gives rise to chiral spin structures ranging from domain walls\cite{Th...
\section{Introduction} The problem of signal recovery (up to a global phase) from phaseless STFT measurements appears in many audio engineering and imaging applications. Our principal motivation here
, however, is ptychographic imaging (see, e.g., \cite{rodenburg2007transmission,marchesini2016alternating}) in the 1-D setting where a compactly supported specimen, $f:\mathbb{R}\rightarrow\mathbb{C}$, is scanned by a focused illuminating beam $g:\mathbb{R}\rightarrow\mathbb{C}$ which translates across the specimen in ...
\section{Introduction} Quantum machine learning (QML) has recently attracted significant interests~\cite{Wittek14,Schuld15,Adcock15,Biamonte17,Lau17,Monras17}. However, this approach is confronted wi
th several challenges and questions, which include: is there any advantage in quantum machine learning compared to its classical counterpart? If so, what are the quantum effects and how do they contribute to this advantage? These issues were addressed theoretically in terms of learning performance, such as membership q...
\section{Introduction} Suspensions, namely mixtures of solid particles and a viscous liquid, can be considered as an incompressible fluid as long as the volume fraction $\phi$ of solid particles is
less than a certain value, the jamming point, above which a solid-like behaviour is observed. The behaviour of suspensions is not usually captured by simple Newtonian models. As primary example of non-Newtonian effect, the viscosity can vary with the shear rate, exhibiting shear thinning and shear thickening~\citep{...
\section{Introduction and summary} Conformal field theories with $(2,0)$ supersymmetry in dimension six (henceforth $(2,0)$ SCFTs, see for instance \cite{Moore2012}), play a central role in our unde
rstanding of the non-perturbative physics of lower-dimensional supersymmetric quantum field theories. They are however notoriously difficult to study because of their intrinsically quantum nature: they do not admit a semiclassical limit in which perturbative methods would apply. At the price of breaking the conformal s...
\section{Introduction} \label{intro} One of the most significant results from the {\sl Rosetta}\ mission to Comet 67P/Churyumov-Gerasimenko (67P/C-G) has been the persistent detection of \ce{O2} in t
he coma \citep{bieler15,fougere16} by the Double Focusing Mass Spectrometer (DFMS) of the Rosetta Orbiter Spectrometer for Ion and Neutral Analysis \citep[ROSINA;][]{balsiger07}. The initial detection by \citet{bieler15} found that the relative number density of \ce{O2} with respect to \ce{H2O} ranged from 1-10\%, with...
\section{Introduction} Most real-world networks have power-law degrees, so that the proportion of nodes having $k$ neighbors scales as $k^{-\tau}$ with exponent $\tau$ between 2 and 3 \cite{albert199
9,faloutsos1999,jeong2000,vazquez2002}. Power-law degrees imply various intriguing scale-free network properties, such as ultra-small distances~\cite{hofstad2007, newman2001} and the absence of percolation thresholds when $\tau<3$~\cite{janson2009b, pastor2001}. Empirical evidence has been matched by random graph null ...
\subsubsection{Reference/Translation Classification} \label{sec:classification} We experiment with predicting whether a given sentence is a reference or a back-translation. We train two kinds of bin
ary classifiers, one using an LSTM and the other using word averaging, followed by a softmax layer. We select 40,000 reference/translation pairs for training and 5,000 for each of validation and testing. A single example is a sentence with label 1 if it is a reference translation and 0 if it is a translation. In t...
\section{Introduction} Diophantus of Alexandria raised the problem of finding four positive rational numbers $a_1, a_2, a_3, a_4$ such that $a_i a_j+1$ is a square of a rational number for each $i
,j$ with $1\leq i< j\leq4$ and gave a solution $\{\frac{1}{16}, \frac{33}{16}, \frac{17}{4}, \frac{105}{16} \}$. The first example of such a set in the ring of integers was found by Fermat and it was the set $\{1, 3, 8, 120\}$. Replacing ``$+1$'' by ``$+n$'' suggests the following general definition: \begin{definiti...
\section{Introduction} The discovery of accelerated expansion of the universe by two astrophysical groups in 1998 \cite{Riess, Perlmutter} has pushed the cosmological constant problem to the foref
ront of research in modern theoretical physics. This discovery was achieved by measuring the apparent luminosity of distant supernovae. Their dimness implies that the accelerated expansion of the universe has recently (according to the cosmological standard) started and it turns out to be compatible with a very sm...
\section{Introduction} Wireless multicast media streaming is anticipated to be a significant component of the forthcoming 5G systems, motivated by the consumers' desire to take advantage of high qual
ity multimedia wireless devices (e.g., 4k hand-held devices, 3D augmented reality)\cite{Tom_Luo_Multicasting_TSP_2006,Zhengzheng_Xiang_TWC_Multicasting_2013,Zhengzheng_Xiang_JSAC_Multicasting_2014}. Energy efficiency and security are major critical issues that must be addressed in the design of such systems. Radio fr...
\section{Introduction} Observations of synchrotron radiation in supernovae, $\gamma$-ray bursts (GRBs), and tidal disruption events provide an efficient means to probe high-energy transient phenomena.
Multi-wavelength observations of these events have been successfully leveraged to determine the energy, particle density, and magnetic field strength, thereby constraining the progenitors and physical processes powering these extreme explosions \citep{spn98,pk02,sckf06,mgm12}. The observed radiation in these sources ...
\section{\large Introduction} Nacre-like imbricated (staggered) structures (see Fig.~\ref{fig:nacre}) are commonly seen in both nature and man-made materials, and are of biom
imetic interest. The mechanical merits of their characteristic 'brick-and-mortar' structure such as high fracture toughness and insensitivity of flaws have been well established. For exammple, Wang et al. \cite{WangSuo01} showed that the nano-asperities on the platelets of hydrated nacres are the main cause of high re...
\section*{Introduction} Quantum phase transition is one of the pillars underpinning condensed matter physics~\cite{sac11}. Conventional wisdom states that different quantum phases are generally discr
iminated in terms of the symmetry carried by the ground state or other features that have an underlying topological interpretation~\cite{wen04}. The former is described by local order parameters associated with the symmetries and the latter by topological orders, which are nowadays classified into intrinsic and symmetr...
\section{Introduction} Single photons are a key requirement for photonic implementations of quantum-enhanced technologies and quantum information processing. Scaling up the capabilities of algorithms
and techniques currently under investigation requires the simultaneous delivery of larger numbers of single photons from independent sources \cite{Nunn2013Enhancing-Multiphoton-Rates}. These photons must be completely indistinguishable to enable high-visibility Hong-Ou-Mandel interference \cite{Mosley2008Heralded-Gener...
\section{Introduction} New models of Grand Unified Theory (GUT) have recently been developed using F-theory, a branch of string theory which provides a geometric realization of strongly coupled Type
IIB string theory backgrounds see e.g., \cite{BHV08I, BHV08II}. In particular, one can compactify F-theory on an elliptically fibered manifold, i.e. a fiber bundle whose general fiber is a torus. We are interested in some of the mathematical questions posed by F-theory - above all - the construction of some of these...
\section{Introduction} The aim of the birational anabelian program initiated by Bogomolov~\cite{bogomolov} at the beginning of the 1990's is to recover function fields $K|k$ of dimension $>1$ over al
gebraically closed fields from their absolute Galois group $G_K$. This cannot be possible in the one-dimensional case since then $G_K$ is profinite free of rank $|k|$ by results of Harbater~\cite{harbater} and Pop~\cite{pop-galois-covers}, containing therefore almost no information about $K$. We show however that $K|k$...
\section*{Materials and Methods} \subsection*{Experimental setup} Experiments were performed with a custom-built confocal microscope equipped with a green 532~nm excitation laser and a single photon
detector, as well as microwave and radio frequency sources to control the NV center spin and the {$^{15}$N \/} nuclear spin, respectively. The NV centers were created by $^{15}$N$^+$ ion implantation at an energy of 5~keV and subsequent annealing at 850$^{\circ}$~C. We chose the {$^{15}$N \/} species to discriminate...
\section{Introduction} Critical infrastructures such as power grids and transportation systems are witnessing growing adoption of modern information and communication technologies (ICTs) for autonomo
us operation. While these advancements have improved their operational efficiency, ICTs may also make them vulnerable to cyber attacks. Vulnerabilities in ICT systems were exploited in recent high-profile cybersecurity incidents such as the BlackEnergy \cite{Ukraine2016} and Dragonfly \cite{dragonfly2014} attacks again...
\section{Introduction} Computational modeling has long played a significant role within cognitive science, allowing researchers to explore the implications of cognitive theories and to discover what
properties are necessary to account for particular phenomena~\cite{mcclelland2009place}. Over time, a variety of modeling traditions have seen their usage rise and fall. While the 1980s saw the rise in popularity of connectionism~\cite{thomas2008connectionist}, more recently symbolic Bayesian models have risen to promi...
\section{Introduction Suppose $f:M^n\rightarrow \ensuremath{\mathbb{R}}^{N}$, $N>n$ is a smooth isometric immersion. We assume that $M^n$ is closed and complete. Denote by $\vec{H}$ the mean curvatur
e vector of $f$. Then \[ (\Delta f)(p) = \vec{H}(p) \] for all $p\in M^n$, where $\Delta$ here refers to the rough Laplacian. The rough Laplacian is that induced by the connection on the pullback bundle $f^*(T\ensuremath{\mathbb{R}}^{n+1})$. Applying the operator again yields \[ (\Delta^2 f)(p) = (\Delta \vec{H})(p) \,...
\section{Introduction and Motivation}\label{Intro} The topic of control over a communication link has been extensively studied in the past decade, with issues such as the minimum data rate for stabil
ization \cite{Tak,Nair} and optimal quadratic closed-loop performance \cite{Sche,Imer} being the main focus. Other issues of interest concern effects of channel-induced packet loss and/or time-varying delays on closed-loop performance. The majority of papers concerned with control over networks regards the mechanism...
\section{Introduction} Isotonic regression is a powerful nonparametric tool used for estimating a monotone signal from noisy data. Specifically, our data consists of observations $y_1,\dots,y_n\in
\mathbb{R}$, which are assumed to be noisy observations of some monotone increasing signal---for instance, we might assume that $\EE{y_1}\leq \dots\leq \EE{y_n}$. Isotonic (least-squares) regression solves the optimization problem \[\textnormal{Minimize $\norm{y-x}^2_2$ subject to $x_1\leq \dots \leq x_n$}\] in order ...
\section*{Abstract} The Indo-Pacific region contains a unique mix of opportunities for the development and use of genetic-pest-management, gene-drive, and gene-drive-like technologies. Here I collecti
vely refer to these technologies as Evolutionary Genetic Engineering (EGE). Indo-Pacific Islands have some of the world's highest rates of endemism and extinction—species and entire ecosystems are at risk. This threat to the natural world is coupled with the burden of human diseases, many of which are new and emerging ...
\section{Introduction} In the final stages of their evolution, stars in the birth mass range $\sim1$--7 M$_\odot$ ascend the AGB, reaching luminosities of order $10^4$ L$_\odot$ due to hydrogen and h
elium shell burning; Hot Bottom Burning (HBB) at the bottom of the convection zone in the most massive AGB stars can further raise the luminosity, approaching $10^5$ L$_\odot$ \citep{Iben83}. The nuclear evolution of AGB stars is truncated by mass loss \citep{vanLoon99}, leaving behind a carbon--oxygen white dwarf. Sta...
\section{Introduction} The study of non-equilibrium dynamics of many-body quantum systems is one of the most challenging and long standing problems in various fields of physics. Here, very different f
undamental aspects can be mentioned, including photo-induced biological processes~\cite{Engel:2007,Imamoglu:2015}, formation of strongly-correlated bound-states~\cite{Brachmann:1997,Berges:2004}, quantum phase transitions~\cite{Dziarmaga:2010,Polkovnikov:2011,Bastidas:2012}, relaxation and equilibration dynamics~\cite{...
\section{Introduction} Quantification of left ventricle (LV) from cardiac imaging is among the most clinically important and most frequently demanded tasks for identification and diagnosis of cardiac
disease~\cite{karamitsos2009role}, yet still a challenging task due to the high variability of cardiac structure across subjects and the complicated global/regional temporal dynamics. Full quantification, i.e., to simultaneously quantify all LV indices including two areas, six regional wall thicknesses (RWT), three LV...
\section{Supplemental Information} \subsection{BEC and quantum-depletion momentum distributions} Assuming a top-hat BEC wavefunction $\psi(z)$, of extension $L$, gives $\tilde{n}_\text{BEC} (k) \pr
opto \sinc^2 \pc{kL/2}$. This is a good approximation at low $k$, but the unphysical sharp edges in real space give unphysical high-$k$ tails, $\propto 1/k^2$. In reality the wavefunction is rounded-off near the trap walls and the high-$k$ tails are exponentially suppressed. To take this into account, we write $\psi (...
\section{Introduction} Process Control Systems (PCSs) are at the core of Critical Infrastructures (CIs), as they control, automate and monitor most of the processes that power modern societies. Power
generation, transport, critical manufacturing, water treatment and fuel transport are some examples of CIs. As such, it is necessary to protect PCSs and related assets in order to ensure the correct functioning of modern societies. This necessity has been further revealed by the existence of security incidents direct...