id
stringlengths
9
14
submitter
stringlengths
1
64
authors
stringlengths
4
9.62k
title
stringlengths
4
343
comments
stringlengths
1
609
journal-ref
stringlengths
4
404
doi
stringlengths
12
153
report-no
stringlengths
2
254
categories
stringlengths
5
112
license
stringclasses
9 values
orig_abstract
stringlengths
14
3.76k
versions
listlengths
1
60
update_date
stringlengths
10
10
authors_parsed
listlengths
1
535
abstract
stringlengths
11
3.75k
2407.20992
Mattia Miotto
Greta Grassmann, Lorenzo Di Rienzo, Giancarlo Ruocco, Mattia Miotto, Edoardo Milanetti
Compact assessment of molecular surface complementarities enhances neural network-aided prediction of key binding residues
15 pages, 5 figures, 1 table
null
null
null
q-bio.BM
http://creativecommons.org/licenses/by-nc-sa/4.0/
Predicting interactions between biomolecules, such as protein-protein complexes, remains a challenging problem. Despite the many advancements done so far, the performances of docking protocols are deeply dependent on their capability of identify binding regions. In this context, we present a novel approach that build...
[ { "created": "Tue, 30 Jul 2024 17:28:19 GMT", "version": "v1" } ]
2024-07-31
[ [ "Grassmann", "Greta", "" ], [ "Di Rienzo", "Lorenzo", "" ], [ "Ruocco", "Giancarlo", "" ], [ "Miotto", "Mattia", "" ], [ "Milanetti", "Edoardo", "" ] ]
Predicting interactions between biomolecules, such as protein-protein complexes, remains a challenging problem. Despite the many advancements done so far, the performances of docking protocols are deeply dependent on their capability of identify binding regions. In this context, we present a novel approach that builds ...
1506.04738
Satoshi Ohya
Satoshi Ohya
BPS Monopole in the Space of Boundary Conditions
13 pages, 4 eepic figures; minor corrections
J.Phys.A48:505401,2015
10.1088/1751-8113/48/50/505401
null
hep-th math-ph math.MP quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The space of all possible boundary conditions that respect self-adjointness of Hamiltonian operator is known to be given by the group manifold $U(2)$ in one-dimensional quantum mechanics. In this paper we study non-Abelian Berry's connections in the space of boundary conditions in a simple quantum mechanical system. ...
[ { "created": "Mon, 15 Jun 2015 20:00:12 GMT", "version": "v1" }, { "created": "Tue, 24 Nov 2015 01:00:14 GMT", "version": "v2" } ]
2015-11-25
[ [ "Ohya", "Satoshi", "" ] ]
The space of all possible boundary conditions that respect self-adjointness of Hamiltonian operator is known to be given by the group manifold $U(2)$ in one-dimensional quantum mechanics. In this paper we study non-Abelian Berry's connections in the space of boundary conditions in a simple quantum mechanical system. We...
1712.01257
Sakib Khan
Sakib Mahmud Khan, Sababa Islam, MD Zadid Khan, Kakan Dey, Mashrur Chowdhury, Nathan Huynh
Development of Statewide AADT Estimation Model from Short-Term Counts: A Comparative Study for South Carolina
This paper is accepted for both presentation and publication in the Proceeding of 97th Annual Meeting of the Transportation Research Board, Washington, D.C., (2018), and under review in Transportation Research Record Journal. Abstract: 258 words + Text: 4660 + References: 552 + 6 tables/figures: 1500 = 6970 wor...
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Annual Average Daily Traffic (AADT) is an important parameter used in traffic engineering analysis. Departments of Transportation (DOTs) continually collect traffic count using both permanent count stations (i.e., Automatic Traffic Recorders or ATRs) and temporary short-term count stations. In South Carolina, 87% of ...
[ { "created": "Thu, 30 Nov 2017 04:08:15 GMT", "version": "v1" } ]
2017-12-05
[ [ "Khan", "Sakib Mahmud", "" ], [ "Islam", "Sababa", "" ], [ "Khan", "MD Zadid", "" ], [ "Dey", "Kakan", "" ], [ "Chowdhury", "Mashrur", "" ], [ "Huynh", "Nathan", "" ] ]
Annual Average Daily Traffic (AADT) is an important parameter used in traffic engineering analysis. Departments of Transportation (DOTs) continually collect traffic count using both permanent count stations (i.e., Automatic Traffic Recorders or ATRs) and temporary short-term count stations. In South Carolina, 87% of th...
2005.06324
Sarah Spiekermann
Sarah Spiekermann, Alexander Novotny
A vision for global privacy bridges: Technical and legal measures for international data markets
Information privacy Personal data market Economics of personal information Privacy regulation
null
10.1016/j.clsr.2015.01.009
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
From the early days of the information economy, personal data has been its most valuable asset. Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil". Most of this business is done without the knowledge and active informed cons...
[ { "created": "Wed, 13 May 2020 13:55:50 GMT", "version": "v1" } ]
2020-05-14
[ [ "Spiekermann", "Sarah", "" ], [ "Novotny", "Alexander", "" ] ]
From the early days of the information economy, personal data has been its most valuable asset. Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil". Most of this business is done without the knowledge and active informed consen...
hep-th/9304024
null
M.Alimohammadi, F.Ardalan, H.Arfaei
Nilpotent Gauging of SL(2,R)$WZNW$ models, and Liouville Field
17 pages, latex
Int. J. Mod. Phys. A10 (1995) 115
10.1142/S0217751X95000061
BONN-HE-93-12, SUTDP-93/72/3 ,IPM-93-007
hep-th
null
We consider the gauging of $ SL(2,R) $ WZNW model by its nilpotent subgroup E(1). The resulting space-time of the corresponding sigma model is seen to collapse to a one dimensional field theory of Liouville. Gauging the diagonal subgroup $ E(1) \times U(1) $ of $SL(2,R) \times U(1)$ theory yields an extremal three di...
[ { "created": "Wed, 7 Apr 1993 11:10:36 GMT", "version": "v1" }, { "created": "Thu, 8 Apr 1993 09:31:29 GMT", "version": "v2" } ]
2009-10-22
[ [ "Alimohammadi", "M.", "" ], [ "Ardalan", "F.", "" ], [ "Arfaei", "H.", "" ] ]
We consider the gauging of $ SL(2,R) $ WZNW model by its nilpotent subgroup E(1). The resulting space-time of the corresponding sigma model is seen to collapse to a one dimensional field theory of Liouville. Gauging the diagonal subgroup $ E(1) \times U(1) $ of $SL(2,R) \times U(1)$ theory yields an extremal three dime...
2012.02553
Qi Jia
Qi Jia, Hongru Huang, Kenny Q. Zhu
DDRel: A New Dataset for Interpersonal Relation Classification in Dyadic Dialogues
This paper has been accepted by AAAI2021
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interpersonal language style shifting in dialogues is an interesting and almost instinctive ability of human. Understanding interpersonal relationship from language content is also a crucial step toward further understanding dialogues. Previous work mainly focuses on relation extraction between named entities in text...
[ { "created": "Fri, 4 Dec 2020 12:30:31 GMT", "version": "v1" } ]
2020-12-07
[ [ "Jia", "Qi", "" ], [ "Huang", "Hongru", "" ], [ "Zhu", "Kenny Q.", "" ] ]
Interpersonal language style shifting in dialogues is an interesting and almost instinctive ability of human. Understanding interpersonal relationship from language content is also a crucial step toward further understanding dialogues. Previous work mainly focuses on relation extraction between named entities in texts....
2109.11636
Linh K\"astner
Linh K\"astner, Johannes Cox, Teham Buiyan, Jens Lambrecht
All-in-One: A DRL-based Control Switch Combining State-of-the-art Navigation Planners
7 pages, 7 figures
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Autonomous navigation of mobile robots is an essential aspect in use cases such as delivery, assistance or logistics. Although traditional planning methods are well integrated into existing navigation systems, they struggle in highly dynamic environments. On the other hand, Deep-Reinforcement-Learning-based methods s...
[ { "created": "Thu, 23 Sep 2021 20:42:03 GMT", "version": "v1" } ]
2021-09-27
[ [ "Kästner", "Linh", "" ], [ "Cox", "Johannes", "" ], [ "Buiyan", "Teham", "" ], [ "Lambrecht", "Jens", "" ] ]
Autonomous navigation of mobile robots is an essential aspect in use cases such as delivery, assistance or logistics. Although traditional planning methods are well integrated into existing navigation systems, they struggle in highly dynamic environments. On the other hand, Deep-Reinforcement-Learning-based methods sho...
2211.09151
Adam Ball
Adam Ball
Celestial Locality and the Jacobi Identity
18 pages, 1 figure; v2 typos corrected, references added
null
10.1007/JHEP01(2023)146
null
hep-th
http://creativecommons.org/licenses/by/4.0/
We show the equivalence of several different tests of the Jacobi identity for celestial currents at tree level, in particular finding a simple, practical condition on hard momentum space 4-point amplitudes in any EFT. Along the way we clarify the role of the order of soft and collinear limits in obstructing Jacobi fo...
[ { "created": "Wed, 16 Nov 2022 19:01:06 GMT", "version": "v1" }, { "created": "Tue, 21 Mar 2023 02:59:03 GMT", "version": "v2" } ]
2023-03-22
[ [ "Ball", "Adam", "" ] ]
We show the equivalence of several different tests of the Jacobi identity for celestial currents at tree level, in particular finding a simple, practical condition on hard momentum space 4-point amplitudes in any EFT. Along the way we clarify the role of the order of soft and collinear limits in obstructing Jacobi for ...
1112.3318
David Vegh
David Vegh
Holographic Fermi surfaces near quantum phase transitions
11 pages, 6 figures
null
null
null
hep-th cond-mat.str-el
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study holographic Fermi surfaces coupled to a bosonic degree of freedom using the gauge/gravity correspondence. The gravity background is a charged black hole in asymptotically AdS spacetime. We introduce a neutral scalar field with parameters such that the system is at a quantum phase transition point. We further...
[ { "created": "Wed, 14 Dec 2011 20:13:38 GMT", "version": "v1" } ]
2011-12-15
[ [ "Vegh", "David", "" ] ]
We study holographic Fermi surfaces coupled to a bosonic degree of freedom using the gauge/gravity correspondence. The gravity background is a charged black hole in asymptotically AdS spacetime. We introduce a neutral scalar field with parameters such that the system is at a quantum phase transition point. We further i...
1502.00143
Hossam Afifi
Thouraya Toukabri Gunes, Hossam Afifi
Hybrid model for LTE Network-Assisted D2D communications
null
null
10.1007/978-3-319-07425-2_8
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
New Architecture to support D2D communications, where discovery is made directly between devices while communications occur with the help of the E-Node B
[ { "created": "Sat, 31 Jan 2015 18:39:46 GMT", "version": "v1" } ]
2015-02-03
[ [ "Gunes", "Thouraya Toukabri", "" ], [ "Afifi", "Hossam", "" ] ]
New Architecture to support D2D communications, where discovery is made directly between devices while communications occur with the help of the E-Node B
2406.19763
Kiran Busch
Kiran Busch, Timotheus Kampik, Henrik Leopold
xSemAD: Explainable Semantic Anomaly Detection in Event Logs Using Sequence-to-Sequence Models
Accepted at BPM 2024
null
null
null
cs.AI
http://creativecommons.org/licenses/by/4.0/
The identification of undesirable behavior in event logs is an important aspect of process mining that is often addressed by anomaly detection methods. Traditional anomaly detection methods tend to focus on statistically rare behavior and neglect the subtle difference between rarity and undesirability. The introducti...
[ { "created": "Fri, 28 Jun 2024 09:06:52 GMT", "version": "v1" } ]
2024-07-01
[ [ "Busch", "Kiran", "" ], [ "Kampik", "Timotheus", "" ], [ "Leopold", "Henrik", "" ] ]
The identification of undesirable behavior in event logs is an important aspect of process mining that is often addressed by anomaly detection methods. Traditional anomaly detection methods tend to focus on statistically rare behavior and neglect the subtle difference between rarity and undesirability. The introduction...
2307.07930
Yifan Zhang
Yifan Zhang, Cheng Wei, Shangyou Wu, Zhengting He, Wenhao Yu
GeoGPT: Understanding and Processing Geospatial Tasks through An Autonomous GPT
23 pages, 4 figures
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Decision-makers in GIS need to combine a series of spatial algorithms and operations to solve geospatial tasks. For example, in the task of facility siting, the Buffer tool is usually first used to locate areas close or away from some specific entities; then, the Intersect or Erase tool is used to select candidate ar...
[ { "created": "Sun, 16 Jul 2023 03:03:59 GMT", "version": "v1" } ]
2023-07-18
[ [ "Zhang", "Yifan", "" ], [ "Wei", "Cheng", "" ], [ "Wu", "Shangyou", "" ], [ "He", "Zhengting", "" ], [ "Yu", "Wenhao", "" ] ]
Decision-makers in GIS need to combine a series of spatial algorithms and operations to solve geospatial tasks. For example, in the task of facility siting, the Buffer tool is usually first used to locate areas close or away from some specific entities; then, the Intersect or Erase tool is used to select candidate area...
1809.04193
Chu-Pan Wong
Chu-Pan Wong, Jens Meinicke, Lukas Lazarek, Christian K\"astner
Faster Variational Execution with Transparent Bytecode Transformation
null
null
null
null
cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Variational execution is a novel dynamic analysis technique for exploring highly configurable systems and accurately tracking information flow. It is able to efficiently analyze many configurations by aggressively sharing redundancies of program executions. The idea of variational execution has been demonstrated to b...
[ { "created": "Tue, 11 Sep 2018 22:54:37 GMT", "version": "v1" } ]
2018-09-13
[ [ "Wong", "Chu-Pan", "" ], [ "Meinicke", "Jens", "" ], [ "Lazarek", "Lukas", "" ], [ "Kästner", "Christian", "" ] ]
Variational execution is a novel dynamic analysis technique for exploring highly configurable systems and accurately tracking information flow. It is able to efficiently analyze many configurations by aggressively sharing redundancies of program executions. The idea of variational execution has been demonstrated to be ...
2310.08582
Mingyu Ding
Mengkang Hu, Yao Mu, Xinmiao Yu, Mingyu Ding, Shiguang Wu, Wenqi Shao, Qiguang Chen, Bin Wang, Yu Qiao, Ping Luo
Tree-Planner: Efficient Close-loop Task Planning with Large Language Models
Published in ICLR 2024
null
null
null
cs.CL cs.AI cs.LG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies close-loop task planning, which refers to the process of generating a sequence of skills (a plan) to accomplish a specific goal while adapting the plan based on real-time observations. Recently, prompting Large Language Models (LLMs) to generate actions iteratively has become a prevalent paradigm d...
[ { "created": "Thu, 12 Oct 2023 17:59:50 GMT", "version": "v1" }, { "created": "Wed, 24 Jul 2024 12:25:17 GMT", "version": "v2" } ]
2024-07-25
[ [ "Hu", "Mengkang", "" ], [ "Mu", "Yao", "" ], [ "Yu", "Xinmiao", "" ], [ "Ding", "Mingyu", "" ], [ "Wu", "Shiguang", "" ], [ "Shao", "Wenqi", "" ], [ "Chen", "Qiguang", "" ], [ "Wang", "Bin", ...
This paper studies close-loop task planning, which refers to the process of generating a sequence of skills (a plan) to accomplish a specific goal while adapting the plan based on real-time observations. Recently, prompting Large Language Models (LLMs) to generate actions iteratively has become a prevalent paradigm due...
2301.12569
Zahra Zahedi
Zahra Zahedi, Sarath Sreedharan, Subbarao Kambhampati
A Mental Model Based Theory of Trust
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Handling trust is one of the core requirements for facilitating effective interaction between the human and the AI agent. Thus, any decision-making framework designed to work with humans must possess the ability to estimate and leverage human trust. In this paper, we propose a mental model based theory of trust that ...
[ { "created": "Sun, 29 Jan 2023 22:36:37 GMT", "version": "v1" } ]
2023-01-31
[ [ "Zahedi", "Zahra", "" ], [ "Sreedharan", "Sarath", "" ], [ "Kambhampati", "Subbarao", "" ] ]
Handling trust is one of the core requirements for facilitating effective interaction between the human and the AI agent. Thus, any decision-making framework designed to work with humans must possess the ability to estimate and leverage human trust. In this paper, we propose a mental model based theory of trust that no...
2108.07998
Shaobo Cui
Xuming Lin, Shaobo Cui, Zhongzhou Zhao, Wei Zhou, Ji Zhang, Haiqing Chen
GGP: A Graph-based Grouping Planner for Explicit Control of Long Text Generation
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing data-driven methods can well handle short text generation. However, when applied to the long-text generation scenarios such as story generation or advertising text generation in the commercial scenario, these methods may generate illogical and uncontrollable texts. To address these aforementioned issues, we ...
[ { "created": "Wed, 18 Aug 2021 06:55:55 GMT", "version": "v1" } ]
2021-08-19
[ [ "Lin", "Xuming", "" ], [ "Cui", "Shaobo", "" ], [ "Zhao", "Zhongzhou", "" ], [ "Zhou", "Wei", "" ], [ "Zhang", "Ji", "" ], [ "Chen", "Haiqing", "" ] ]
Existing data-driven methods can well handle short text generation. However, when applied to the long-text generation scenarios such as story generation or advertising text generation in the commercial scenario, these methods may generate illogical and uncontrollable texts. To address these aforementioned issues, we pr...
2408.03796
Mehrdad Karrabi
Krishnendu Chatterjee, Amir Kafshdar Goharshady, Ehsan Kafshdar Goharshady, Mehrdad Karrabi, Milad Saadat, {\DJ}or{\dj}e \v{Z}ikeli\'c
PolyHorn: A Polynomial Horn Clause Solver
null
null
null
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polynomial Horn clauses with existentially and universally quantified variables arise in many problems of verification and program analysis. We present PolyHorn which is a tool for solving polynomial Horn clauses in which variables on both sides of the implication are real valued. Our tool provides a unified framewor...
[ { "created": "Wed, 7 Aug 2024 14:20:28 GMT", "version": "v1" } ]
2024-08-08
[ [ "Chatterjee", "Krishnendu", "" ], [ "Goharshady", "Amir Kafshdar", "" ], [ "Goharshady", "Ehsan Kafshdar", "" ], [ "Karrabi", "Mehrdad", "" ], [ "Saadat", "Milad", "" ], [ "Žikelić", "Đorđe", "" ] ]
Polynomial Horn clauses with existentially and universally quantified variables arise in many problems of verification and program analysis. We present PolyHorn which is a tool for solving polynomial Horn clauses in which variables on both sides of the implication are real valued. Our tool provides a unified framework ...
1911.06256
Luca Della Libera
Luca Della Libera
A Comparative Study between Bayesian and Frequentist Neural Networks for Remaining Useful Life Estimation in Condition-Based Maintenance
Withdrawn to resolve an authorship dispute
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the last decade, deep learning (DL) has outperformed model-based and statistical approaches in predicting the remaining useful life (RUL) of machinery in the context of condition-based maintenance. One of the major drawbacks of DL is that it heavily depends on a large amount of labeled data, which are typically ex...
[ { "created": "Thu, 14 Nov 2019 17:31:04 GMT", "version": "v1" }, { "created": "Fri, 20 Dec 2019 15:12:36 GMT", "version": "v2" } ]
2020-01-10
[ [ "Della Libera", "Luca", "" ] ]
In the last decade, deep learning (DL) has outperformed model-based and statistical approaches in predicting the remaining useful life (RUL) of machinery in the context of condition-based maintenance. One of the major drawbacks of DL is that it heavily depends on a large amount of labeled data, which are typically expe...
1005.4072
Geoffrey Comp\`ere
Dionysios Anninos, Geoffrey Comp\`ere, Sophie de Buyl, St\'ephane Detournay and Monica Guica
The Curious Case of Null Warped Space
29 pages + appendices, refs added
JHEP 1011:119,2010
10.1007/JHEP11(2010)119
NSF-KITP-10-020
hep-th gr-qc
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We initiate a comprehensive study of a set of solutions of topologically massive gravity known as null warped anti-de Sitter spacetimes. These are pp-wave extensions of three-dimensional anti-de Sitter space. We first perform a careful analysis of the linearized stability of black holes in these spacetimes. We find t...
[ { "created": "Fri, 21 May 2010 20:41:28 GMT", "version": "v1" }, { "created": "Fri, 13 Aug 2010 18:42:03 GMT", "version": "v2" } ]
2010-11-30
[ [ "Anninos", "Dionysios", "" ], [ "Compère", "Geoffrey", "" ], [ "de Buyl", "Sophie", "" ], [ "Detournay", "Stéphane", "" ], [ "Guica", "Monica", "" ] ]
We initiate a comprehensive study of a set of solutions of topologically massive gravity known as null warped anti-de Sitter spacetimes. These are pp-wave extensions of three-dimensional anti-de Sitter space. We first perform a careful analysis of the linearized stability of black holes in these spacetimes. We find two...
2204.06128
Yucheng Yang
Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, and Kassem Fawaz
Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps
to be published in the 22nd Privacy Enhancing Technologies Symposium (PETS 2022)
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-nd/4.0/
Video conferencing apps (VCAs) make it possible for previously private spaces -- bedrooms, living rooms, and kitchens -- into semi-public extensions of the office. For the most part, users have accepted these apps in their personal space without much thought about the permission models that govern the use of their pr...
[ { "created": "Wed, 13 Apr 2022 01:26:26 GMT", "version": "v1" } ]
2022-04-14
[ [ "Yang", "Yucheng", "" ], [ "West", "Jack", "" ], [ "Thiruvathukal", "George K.", "" ], [ "Klingensmith", "Neil", "" ], [ "Fawaz", "Kassem", "" ] ]
Video conferencing apps (VCAs) make it possible for previously private spaces -- bedrooms, living rooms, and kitchens -- into semi-public extensions of the office. For the most part, users have accepted these apps in their personal space without much thought about the permission models that govern the use of their priv...
1306.1345
Mamadou Moustapha Kant\'e
Binh-Minh Bui-Xuan and Mamadou Moustapha Kant\'e and Vincent Limouzy
A Note on Graphs of Linear Rank-Width 1
9 pages, 2 figures. Not to be published
null
null
null
cs.DM cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that a connected graph has linear rank-width 1 if and only if it is a distance-hereditary graph and its split decomposition tree is a path. An immediate consequence is that one can decide in linear time whether a graph has linear rank-width at most 1, and give an obstruction if not. Other immediate consequen...
[ { "created": "Thu, 6 Jun 2013 09:12:31 GMT", "version": "v1" }, { "created": "Tue, 8 Jul 2014 11:38:27 GMT", "version": "v2" } ]
2014-07-09
[ [ "Bui-Xuan", "Binh-Minh", "" ], [ "Kanté", "Mamadou Moustapha", "" ], [ "Limouzy", "Vincent", "" ] ]
We prove that a connected graph has linear rank-width 1 if and only if it is a distance-hereditary graph and its split decomposition tree is a path. An immediate consequence is that one can decide in linear time whether a graph has linear rank-width at most 1, and give an obstruction if not. Other immediate consequence...
2312.15960
Jingyao Li
Jingyao Li, Pengguang Chen, Jiaya Jia
MoTCoder: Elevating Large Language Models with Modular of Thought for Challenging Programming Tasks
Model: https://huggingface.co/JingyaoLi/MoTCoder-15B-v1.0. Code: https://github.com/dvlab-research/MoTCoder
null
null
null
cs.LG cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large Language Models (LLMs) have showcased impressive capabilities in handling straightforward programming tasks. However, their performance tends to falter when confronted with more challenging programming problems. We observe that conventional models often generate solutions as monolithic code blocks, restricting ...
[ { "created": "Tue, 26 Dec 2023 08:49:57 GMT", "version": "v1" }, { "created": "Fri, 5 Jan 2024 10:33:32 GMT", "version": "v2" } ]
2024-01-08
[ [ "Li", "Jingyao", "" ], [ "Chen", "Pengguang", "" ], [ "Jia", "Jiaya", "" ] ]
Large Language Models (LLMs) have showcased impressive capabilities in handling straightforward programming tasks. However, their performance tends to falter when confronted with more challenging programming problems. We observe that conventional models often generate solutions as monolithic code blocks, restricting th...
2303.13638
Mikhail Soutchanski
Mikhail Soutchanski and Ryan Young
Planning as Theorem Proving with Heuristics
Submitted for a review. Copyright (C) 2023 by Mikhail Soutchanski and Ryan Young
null
null
null
cs.AI cs.LO
http://creativecommons.org/licenses/by-nc-sa/4.0/
Planning as theorem proving in situation calculus was abandoned 50 years ago as an impossible project. But we have developed a Theorem Proving Lifted Heuristic (TPLH) planner that searches for a plan in a tree of situations using the A* search algorithm. It is controlled by a delete relaxation-based domain independen...
[ { "created": "Thu, 23 Mar 2023 19:52:30 GMT", "version": "v1" }, { "created": "Sat, 1 Apr 2023 19:04:52 GMT", "version": "v2" }, { "created": "Tue, 20 Jun 2023 02:59:28 GMT", "version": "v3" } ]
2023-06-21
[ [ "Soutchanski", "Mikhail", "" ], [ "Young", "Ryan", "" ] ]
Planning as theorem proving in situation calculus was abandoned 50 years ago as an impossible project. But we have developed a Theorem Proving Lifted Heuristic (TPLH) planner that searches for a plan in a tree of situations using the A* search algorithm. It is controlled by a delete relaxation-based domain independent ...
1005.3220
Ruth Gregory
Eimear O'Callaghan, Sarah Chadburn, Ghazal Geshnizjani, Ruth Gregory, and Ivonne Zavala
The effect of extra dimensions on gravity wave bursts from cosmic string cusps
33 pages, 8 figures, published version
JCAP 1009:013,2010
10.1088/1475-7516/2010/09/013
DCPT-10/13, PI-cosmo-182
hep-th astro-ph.CO gr-qc
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explore the kinematical effect of having extra dimensions on the gravity wave emission from cosmic strings. Additional dimensions both round off cusps, and reduce the probability of their formation. We recompute the gravity wave burst, taking into account these two factors, and find a potentially significant dampi...
[ { "created": "Tue, 18 May 2010 14:45:53 GMT", "version": "v1" }, { "created": "Fri, 10 Sep 2010 11:08:47 GMT", "version": "v2" } ]
2014-11-21
[ [ "O'Callaghan", "Eimear", "" ], [ "Chadburn", "Sarah", "" ], [ "Geshnizjani", "Ghazal", "" ], [ "Gregory", "Ruth", "" ], [ "Zavala", "Ivonne", "" ] ]
We explore the kinematical effect of having extra dimensions on the gravity wave emission from cosmic strings. Additional dimensions both round off cusps, and reduce the probability of their formation. We recompute the gravity wave burst, taking into account these two factors, and find a potentially significant damping...
hep-th/9804002
Conrad John Burden
C.J.Burden and P.C.Tjiang
Deconstructing the vertex Ansatz in three dimensional quantum electrodynamics
14 pages, 2 postscript figures, uses epsfig.sty
Phys.Rev.D58:085019,1998
10.1103/PhysRevD.58.085019
ANU-HEP-1-98
hep-th hep-ph
null
We consider the problem of designing an Ansatz for the fermion-photon vertex function, using three-dimensional quantum electrodynamics as a test case. In many existing studies, restrictions have been placed on the form of the vertex Ansatz by making the unsubstantiated assumption that in the quenched, massless limit ...
[ { "created": "Wed, 1 Apr 1998 05:39:25 GMT", "version": "v1" } ]
2009-08-11
[ [ "Burden", "C. J.", "" ], [ "Tjiang", "P. C.", "" ] ]
We consider the problem of designing an Ansatz for the fermion-photon vertex function, using three-dimensional quantum electrodynamics as a test case. In many existing studies, restrictions have been placed on the form of the vertex Ansatz by making the unsubstantiated assumption that in the quenched, massless limit th...
2206.04397
Rafael Menezes
Rafael Menezes, Daniel Moura, Helena Cavalcante, Rosiane de Freitas and Lucas C. Cordeiro
ESBMC-Jimple: Verifying Kotlin Programs via Jimple Intermediate Representation
ACM SIGSOFT International Symposium on Software Testing and Analysis 2022
null
10.1145/3533767.3543294
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we describe and evaluate the first model checker for verifying Kotlin programs through the Jimple intermediate representation. The verifier, named ESBMC-Jimple, is built on top of the Efficient SMT-based Context-Bounded Model Checker (ESBMC). It uses the Soot framework to obtain the Jimple IR, represent...
[ { "created": "Thu, 9 Jun 2022 10:18:53 GMT", "version": "v1" }, { "created": "Wed, 20 Jul 2022 13:26:30 GMT", "version": "v2" } ]
2022-07-21
[ [ "Menezes", "Rafael", "" ], [ "Moura", "Daniel", "" ], [ "Cavalcante", "Helena", "" ], [ "de Freitas", "Rosiane", "" ], [ "Cordeiro", "Lucas C.", "" ] ]
In this work, we describe and evaluate the first model checker for verifying Kotlin programs through the Jimple intermediate representation. The verifier, named ESBMC-Jimple, is built on top of the Efficient SMT-based Context-Bounded Model Checker (ESBMC). It uses the Soot framework to obtain the Jimple IR, representin...
hep-th/0601190
Beatriz de Carlos
A. Achucarro, B. de Carlos, J.A. Casas, L. Doplicher
deSitter vacua from uplifting D-terms in effective supergravities from realistic strings
22 pages, 4 figures
JHEP0606:014,2006
10.1088/1126-6708/2006/06/014
IFT-UAM-CSIC-05-52
hep-th hep-ph
null
We study the possibility of using the D-term associated to an anomalous U(1) for the uplifting of AdS vacua (to dS or Minkowski vacua) in effective supergravities arising from string theories, particularly in the type IIB context put forward by Kachru, Kallosh, Linde and Trivedi (KKLT). We find a gauge invariant form...
[ { "created": "Wed, 25 Jan 2006 13:35:09 GMT", "version": "v1" } ]
2009-11-11
[ [ "Achucarro", "A.", "" ], [ "de Carlos", "B.", "" ], [ "Casas", "J. A.", "" ], [ "Doplicher", "L.", "" ] ]
We study the possibility of using the D-term associated to an anomalous U(1) for the uplifting of AdS vacua (to dS or Minkowski vacua) in effective supergravities arising from string theories, particularly in the type IIB context put forward by Kachru, Kallosh, Linde and Trivedi (KKLT). We find a gauge invariant formul...
0812.4973
Neil Dickson
Neil G. Dickson
A Simple, Linear-Time Algorithm for x86 Jump Encoding
5 pages
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of space-optimal jump encoding in the x86 instruction set, also known as branch displacement optimization, is described, and a linear-time algorithm is given that uses no complicated data structures, no recursion, and no randomization. The only assumption is that there are no array declarations whose size...
[ { "created": "Mon, 29 Dec 2008 21:07:52 GMT", "version": "v1" } ]
2009-09-29
[ [ "Dickson", "Neil G.", "" ] ]
The problem of space-optimal jump encoding in the x86 instruction set, also known as branch displacement optimization, is described, and a linear-time algorithm is given that uses no complicated data structures, no recursion, and no randomization. The only assumption is that there are no array declarations whose size d...
1804.09756
Hermann Boos
Hermann Boos, Artur Hutsalyuk, Khazret Nirov
On the calculation of the correlation functions of the $\mathfrak{sl}_3$-model by means of the reduced qKZ equation
30 pages, 10 figures
J. Phys. A: Math. Theor. 51 (2018) 445202
10.1088/1751-8121/aae1d6
null
hep-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the reduced density matrix of the $\mathfrak{sl}_3$-invariant fundamental exchange model by means of a novel reduced quantum Knizhnik-Zamolodchikov equation. This gives us insight into the algebraic structure and explicit results for correlation functions in the infinite chain ranging over up to three sites....
[ { "created": "Wed, 25 Apr 2018 19:02:15 GMT", "version": "v1" }, { "created": "Wed, 10 Oct 2018 15:26:55 GMT", "version": "v2" } ]
2018-10-11
[ [ "Boos", "Hermann", "" ], [ "Hutsalyuk", "Artur", "" ], [ "Nirov", "Khazret", "" ] ]
We study the reduced density matrix of the $\mathfrak{sl}_3$-invariant fundamental exchange model by means of a novel reduced quantum Knizhnik-Zamolodchikov equation. This gives us insight into the algebraic structure and explicit results for correlation functions in the infinite chain ranging over up to three sites.
hep-th/0311149
Ichiro Oda
Ichiro Oda
A Relation Between Topological Quantum Field Theory and the Kodama State
8 pages, no figures
null
null
EDO-EP-47
hep-th gr-qc
null
We study a relation between topological quantum field theory and the Kodama (Chern-Simons) state. It is shown that the Kodama (Chern-Simons) state describes a topological state with unbroken diffeomorphism invariance in Yang-Mills theory and Einstein's general relativity in four dimensions. We give a clear explanatio...
[ { "created": "Mon, 17 Nov 2003 18:50:07 GMT", "version": "v1" } ]
2007-05-23
[ [ "Oda", "Ichiro", "" ] ]
We study a relation between topological quantum field theory and the Kodama (Chern-Simons) state. It is shown that the Kodama (Chern-Simons) state describes a topological state with unbroken diffeomorphism invariance in Yang-Mills theory and Einstein's general relativity in four dimensions. We give a clear explanation ...
2005.06107
Ali Borji
Ali Borji
Adversarial examples are useful too!
null
null
null
null
cs.CV cs.CR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep learning has come a long way and has enjoyed an unprecedented success. Despite high accuracy, however, deep models are brittle and are easily fooled by imperceptible adversarial perturbations. In contrast to common inference-time attacks, Backdoor (\aka Trojan) attacks target the training phase of model construc...
[ { "created": "Wed, 13 May 2020 01:38:56 GMT", "version": "v1" } ]
2020-05-14
[ [ "Borji", "Ali", "" ] ]
Deep learning has come a long way and has enjoyed an unprecedented success. Despite high accuracy, however, deep models are brittle and are easily fooled by imperceptible adversarial perturbations. In contrast to common inference-time attacks, Backdoor (\aka Trojan) attacks target the training phase of model constructi...
2203.05340
Zhuo Wang
Zhuo Wang, Zezheng Wang, Zitong Yu, Weihong Deng, Jiahong Li, Tingting Gao, Zhongyuan Wang
Domain Generalization via Shuffled Style Assembly for Face Anti-Spoofing
Accepted by CVPR2022
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With diverse presentation attacks emerging continually, generalizable face anti-spoofing (FAS) has drawn growing attention. Most existing methods implement domain generalization (DG) on the complete representations. However, different image statistics may have unique properties for the FAS tasks. In this work, we sep...
[ { "created": "Thu, 10 Mar 2022 12:44:05 GMT", "version": "v1" }, { "created": "Fri, 11 Mar 2022 02:36:28 GMT", "version": "v2" }, { "created": "Tue, 15 Mar 2022 07:54:42 GMT", "version": "v3" }, { "created": "Fri, 18 Mar 2022 14:49:46 GMT", "version": "v4" } ]
2022-03-21
[ [ "Wang", "Zhuo", "" ], [ "Wang", "Zezheng", "" ], [ "Yu", "Zitong", "" ], [ "Deng", "Weihong", "" ], [ "Li", "Jiahong", "" ], [ "Gao", "Tingting", "" ], [ "Wang", "Zhongyuan", "" ] ]
With diverse presentation attacks emerging continually, generalizable face anti-spoofing (FAS) has drawn growing attention. Most existing methods implement domain generalization (DG) on the complete representations. However, different image statistics may have unique properties for the FAS tasks. In this work, we separ...
1908.02737
Jennie Traschen
Yue Qiu and Jennie Traschen
Black Hole and Cosmological Particle Production in Schwarzschild de Sitter
47 pages; v2 - references added, typos fixed
null
10.1088/1361-6382/ab8bba
null
hep-th gr-qc
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We compute the spectra and total fluxes of quantum mechanically produced particles crossing the black hole and cosmological horizons in Schwarzschild de Sitter (SdS). Particle states are defined with respect to well-behaved, Kruskal coordinates near the horizons, and as a consequence we find that these spectra are ge...
[ { "created": "Wed, 7 Aug 2019 17:27:13 GMT", "version": "v1" }, { "created": "Mon, 26 Aug 2019 16:12:05 GMT", "version": "v2" } ]
2020-08-26
[ [ "Qiu", "Yue", "" ], [ "Traschen", "Jennie", "" ] ]
We compute the spectra and total fluxes of quantum mechanically produced particles crossing the black hole and cosmological horizons in Schwarzschild de Sitter (SdS). Particle states are defined with respect to well-behaved, Kruskal coordinates near the horizons, and as a consequence we find that these spectra are gene...
1206.3785
Rizos John
J. Rizos (Univ. of Ioannina), N.Tetradis (Univ. of Athens) and G. Tsolias (Univ. of Athens)
Classicalization as a tunnelling phenomenon
21 pages, 10 figures, references added
null
10.1007/JHEP08(2012)054
null
hep-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss the "wrong"-sign DBI theory as a prototype for classicalization. The theory lacks a UV completion and has to be defined with a fundamental UV cutoff. We study a quantum-mechanical toy model with similar properties. The model has a fundamental length scale and all physical states have momenta below the inve...
[ { "created": "Sun, 17 Jun 2012 19:43:25 GMT", "version": "v1" }, { "created": "Wed, 4 Jul 2012 17:18:57 GMT", "version": "v2" } ]
2015-06-05
[ [ "Rizos", "J.", "", "Univ. of Ioannina" ], [ "Tetradis", "N.", "", "Univ. of Athens" ], [ "Tsolias", "G.", "", "Univ. of Athens" ] ]
We discuss the "wrong"-sign DBI theory as a prototype for classicalization. The theory lacks a UV completion and has to be defined with a fundamental UV cutoff. We study a quantum-mechanical toy model with similar properties. The model has a fundamental length scale and all physical states have momenta below the invers...
hep-th/0201157
Dirk Kreimer
Alain Connes and Dirk Kreimer
Insertion and Elimination: the doubly infinite Lie algebra of Feynman graphs
21 pages, eps figures
Annales Henri Poincare 3 (2002) 411-433
10.1007/s00023-002-8622-9
BUCMP/02-01
hep-th math.QA
null
The Lie algebra of Feynman graphs gives rise to two natural representations, acting as derivations on the commutative Hopf algebra of Feynman graphs, by creating or eliminating subgraphs. Insertions and eliminations do not commute, but rather establish a larger Lie algebra of derivations which we here determine.
[ { "created": "Sun, 20 Jan 2002 22:10:38 GMT", "version": "v1" }, { "created": "Thu, 24 Jan 2002 20:24:00 GMT", "version": "v2" } ]
2015-06-26
[ [ "Connes", "Alain", "" ], [ "Kreimer", "Dirk", "" ] ]
The Lie algebra of Feynman graphs gives rise to two natural representations, acting as derivations on the commutative Hopf algebra of Feynman graphs, by creating or eliminating subgraphs. Insertions and eliminations do not commute, but rather establish a larger Lie algebra of derivations which we here determine.
1111.6912
Michael Gutperle
Marco Chiodaroli, Eric D'Hoker, Michael Gutperle
Simple holographic duals to boundary CFTs
37 pages, pdflatex, 5 figures
null
10.1007/JHEP02(2012)005
IGC-11/11-2
hep-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
By relaxing the regularity conditions imposed in arXiv:1107.1722 on half-BPS solutions to six-dimensional Type~4b supergravity, we enlarge the space of solutions to include two new half-BPS configurations, which we refer to as the \kap\ and the \funnel. We give evidence that the \kap\ and \funnel\ can be interpreted ...
[ { "created": "Tue, 29 Nov 2011 17:34:02 GMT", "version": "v1" } ]
2015-06-03
[ [ "Chiodaroli", "Marco", "" ], [ "D'Hoker", "Eric", "" ], [ "Gutperle", "Michael", "" ] ]
By relaxing the regularity conditions imposed in arXiv:1107.1722 on half-BPS solutions to six-dimensional Type~4b supergravity, we enlarge the space of solutions to include two new half-BPS configurations, which we refer to as the \kap\ and the \funnel. We give evidence that the \kap\ and \funnel\ can be interpreted as...
1112.2109
Beeram Sarala
B. Sarala and D.S. Venkateswarulu
MC CDMA PAPR Reduction Techniques using Discrete Transforms and Companding
18 pages,16 figures; International journal of Distributed and Parallel Systems volume 2, number 6, Novmber 2011,ISSN:0976-9757
null
null
55bs
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
High Peak to Average Power Ratio (PAPR) of the transmitted signal is a serious problem in multicarrier modulation systems. In this paper a new technique for reduction in PAPR of the Multicarrier Code Division Multiple Access (MC CDMA) signals based on combining the Discrete Transform either Discrete Cosine Transform ...
[ { "created": "Fri, 9 Dec 2011 14:32:46 GMT", "version": "v1" } ]
2011-12-12
[ [ "Sarala", "B.", "" ], [ "Venkateswarulu", "D. S.", "" ] ]
High Peak to Average Power Ratio (PAPR) of the transmitted signal is a serious problem in multicarrier modulation systems. In this paper a new technique for reduction in PAPR of the Multicarrier Code Division Multiple Access (MC CDMA) signals based on combining the Discrete Transform either Discrete Cosine Transform (D...
2308.16862
Otmar Ertl
Otmar Ertl
UltraLogLog: A Practical and More Space-Efficient Alternative to HyperLogLog for Approximate Distinct Counting
25 pages, extended version, accepted at VLDB 2024
null
10.14778/3654621.3654632
null
cs.DS cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since its invention HyperLogLog has become the standard algorithm for approximate distinct counting. Due to its space efficiency and suitability for distributed systems, it is widely used and also implemented in numerous databases. This work presents UltraLogLog, which shares the same practical properties as HyperLog...
[ { "created": "Thu, 31 Aug 2023 17:04:34 GMT", "version": "v1" }, { "created": "Fri, 1 Sep 2023 20:21:10 GMT", "version": "v2" }, { "created": "Tue, 26 Sep 2023 07:59:43 GMT", "version": "v3" }, { "created": "Mon, 15 Jan 2024 15:28:12 GMT", "version": "v4" }, { "cr...
2024-06-11
[ [ "Ertl", "Otmar", "" ] ]
Since its invention HyperLogLog has become the standard algorithm for approximate distinct counting. Due to its space efficiency and suitability for distributed systems, it is widely used and also implemented in numerous databases. This work presents UltraLogLog, which shares the same practical properties as HyperLogLo...
1502.07014
James Currie
James D. Currie, Narad Rampersad
Growth rate of binary words avoiding $xxx^R$
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider the set of those binary words with no non-empty factors of the form $xxx^R$. Du, Mousavi, Schaeffer, and Shallit asked whether this set of words grows polynomially or exponentially with length. In this paper, we demonstrate the existence of upper and lower bounds on the number of such words of length $n$, wh...
[ { "created": "Wed, 25 Feb 2015 00:07:43 GMT", "version": "v1" } ]
2015-02-26
[ [ "Currie", "James D.", "" ], [ "Rampersad", "Narad", "" ] ]
Consider the set of those binary words with no non-empty factors of the form $xxx^R$. Du, Mousavi, Schaeffer, and Shallit asked whether this set of words grows polynomially or exponentially with length. In this paper, we demonstrate the existence of upper and lower bounds on the number of such words of length $n$, wher...
hep-th/0204192
Fernando T. C. Brandt
F. T. Brandt, Ashok Das, J. Frenkel, D. G. C. McKeon and J. C. Taylor
Transport equation and hard thermal loops in noncommutative Yang-Mills theory
10 pages (revtex4)
Phys.Rev.D66:045011,2002
10.1103/PhysRevD.66.045011
null
hep-th hep-ph
null
We show that the high temperature limit of the noncommutative thermal Yang-Mills theory can be directly obtained from the Boltzmann transport equation of classical particles. As an illustration of the simplicity of the Boltzmann method, we evaluate the two and the three-point gluon functions in the noncommutative U(N...
[ { "created": "Tue, 23 Apr 2002 19:36:44 GMT", "version": "v1" } ]
2008-11-26
[ [ "Brandt", "F. T.", "" ], [ "Das", "Ashok", "" ], [ "Frenkel", "J.", "" ], [ "McKeon", "D. G. C.", "" ], [ "Taylor", "J. C.", "" ] ]
We show that the high temperature limit of the noncommutative thermal Yang-Mills theory can be directly obtained from the Boltzmann transport equation of classical particles. As an illustration of the simplicity of the Boltzmann method, we evaluate the two and the three-point gluon functions in the noncommutative U(N) ...
2108.11206
Robert Pell
Robert Pell, Sotiris Moschoyiannis, Emmanouil Panaousis, Ryan Heartfield
Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE ATT&CK
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
This article discusses how the gap between early 5G network threat assessments and an adversarial Tactics, Techniques, Procedures (TTPs) knowledge base for future use in the MITRE ATT&CK threat modelling framework can be bridged. We identify knowledge gaps in the existing framework for key 5G technology enablers such...
[ { "created": "Wed, 25 Aug 2021 12:47:33 GMT", "version": "v1" }, { "created": "Thu, 26 Aug 2021 10:38:35 GMT", "version": "v2" }, { "created": "Wed, 1 Sep 2021 09:49:11 GMT", "version": "v3" }, { "created": "Thu, 14 Oct 2021 11:42:45 GMT", "version": "v4" } ]
2021-10-15
[ [ "Pell", "Robert", "" ], [ "Moschoyiannis", "Sotiris", "" ], [ "Panaousis", "Emmanouil", "" ], [ "Heartfield", "Ryan", "" ] ]
This article discusses how the gap between early 5G network threat assessments and an adversarial Tactics, Techniques, Procedures (TTPs) knowledge base for future use in the MITRE ATT&CK threat modelling framework can be bridged. We identify knowledge gaps in the existing framework for key 5G technology enablers such a...
2206.15255
Yuehao Wang
Yuehao Wang, Yonghao Long, Siu Hin Fan, Qi Dou
Neural Rendering for Stereo 3D Reconstruction of Deformable Tissues in Robotic Surgery
11 pages, 4 figures, conference
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-nd/4.0/
Reconstruction of the soft tissues in robotic surgery from endoscopic stereo videos is important for many applications such as intra-operative navigation and image-guided robotic surgery automation. Previous works on this task mainly rely on SLAM-based approaches, which struggle to handle complex surgical scenes. Ins...
[ { "created": "Thu, 30 Jun 2022 13:06:27 GMT", "version": "v1" } ]
2022-07-01
[ [ "Wang", "Yuehao", "" ], [ "Long", "Yonghao", "" ], [ "Fan", "Siu Hin", "" ], [ "Dou", "Qi", "" ] ]
Reconstruction of the soft tissues in robotic surgery from endoscopic stereo videos is important for many applications such as intra-operative navigation and image-guided robotic surgery automation. Previous works on this task mainly rely on SLAM-based approaches, which struggle to handle complex surgical scenes. Inspi...
1102.0634
D\v{z}enan Zuki\'c
D\v{z}enan Zuki\'c and Jan Egger and Miriam H. A. Bauer and Daniela Kuhnt and Barbara Carl and Bernd Freisleben and Andreas Kolb and Christopher Nimsky
Glioblastoma Multiforme Segmentation in MRI Data with a Balloon Inflation Approach
4 pages, 4 figures, Proc. of the 6th Russian-Bavarian Conference on Bio-Medical Engineering
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gliomas are the most common primary brain tumors, evolving from the cerebral supportive cells. For clinical follow-up, the evaluation of the preoperative tumor volume is essential. Volumetric assessment of tumor volume with manual segmentation of its outlines is a time-consuming process that can be overcome with the ...
[ { "created": "Thu, 3 Feb 2011 10:00:15 GMT", "version": "v1" } ]
2011-02-04
[ [ "Zukić", "Dženan", "" ], [ "Egger", "Jan", "" ], [ "Bauer", "Miriam H. A.", "" ], [ "Kuhnt", "Daniela", "" ], [ "Carl", "Barbara", "" ], [ "Freisleben", "Bernd", "" ], [ "Kolb", "Andreas", "" ], [ "...
Gliomas are the most common primary brain tumors, evolving from the cerebral supportive cells. For clinical follow-up, the evaluation of the preoperative tumor volume is essential. Volumetric assessment of tumor volume with manual segmentation of its outlines is a time-consuming process that can be overcome with the he...
2312.05731
Brett McInnes
Brett McInnes
Evidence that the Rate of Evolution of a Black Hole Interior Has a Holographic Dual
Much improved discussion of the thermodynamics in the zero angular momentum case, 27 pages, 8 figures
null
null
null
hep-th gr-qc
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A ``large'' AdS black hole can attain equilibrium with its own Hawking radiation, and in that condition it is thought to be dual to a strongly coupled field theory, also at equilibrium. But the interior of the black hole is by no means static: the geometry of spatial sections lying inside the event horizon evolves at...
[ { "created": "Sun, 10 Dec 2023 02:28:10 GMT", "version": "v1" }, { "created": "Tue, 19 Mar 2024 12:37:07 GMT", "version": "v2" } ]
2024-03-20
[ [ "McInnes", "Brett", "" ] ]
A ``large'' AdS black hole can attain equilibrium with its own Hawking radiation, and in that condition it is thought to be dual to a strongly coupled field theory, also at equilibrium. But the interior of the black hole is by no means static: the geometry of spatial sections lying inside the event horizon evolves at s...
2106.06657
Zhili Feng
Zhili Feng, Shaobo Han, Simon S. Du
Provable Adaptation across Multiway Domains via Representation Learning
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies zero-shot domain adaptation where each domain is indexed on a multi-dimensional array, and we only have data from a small subset of domains. Our goal is to produce predictors that perform well on \emph{unseen} domains. We propose a model which consists of a domain-invariant latent representation la...
[ { "created": "Sat, 12 Jun 2021 01:15:23 GMT", "version": "v1" } ]
2021-06-15
[ [ "Feng", "Zhili", "" ], [ "Han", "Shaobo", "" ], [ "Du", "Simon S.", "" ] ]
This paper studies zero-shot domain adaptation where each domain is indexed on a multi-dimensional array, and we only have data from a small subset of domains. Our goal is to produce predictors that perform well on \emph{unseen} domains. We propose a model which consists of a domain-invariant latent representation laye...
1204.4658
Audrey Mithani
Audrey Mithani, Alexander Vilenkin
Did the universe have a beginning?
6 pages, 2 figures. To appear in the Proceedings of the 10th Incternational Conference on Gravitation, Astrophysics and Cosmology, Quy-Nhon, Vietnam, December 2011
null
null
null
hep-th gr-qc
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss three candidate scenarios which seem to allow the possibility that the universe could have existed forever with no initial singularity: eternal infation, cyclic evolution, and the emergent universe. The first two of these scenarios are geodesically incomplete to the past, and thus cannot describe a univers...
[ { "created": "Fri, 20 Apr 2012 15:51:42 GMT", "version": "v1" } ]
2012-04-23
[ [ "Mithani", "Audrey", "" ], [ "Vilenkin", "Alexander", "" ] ]
We discuss three candidate scenarios which seem to allow the possibility that the universe could have existed forever with no initial singularity: eternal infation, cyclic evolution, and the emergent universe. The first two of these scenarios are geodesically incomplete to the past, and thus cannot describe a universe ...
2202.07792
Md Ferdous Pervej
Md Ferdous Pervej, Richeng Jin, Shih-Chun Lin, Huaiyu Dai
Efficient Content Delivery in User-Centric and Cache-Enabled Vehicular Edge Networks with Deadline-Constrained Heterogeneous Demands
Under review for possible publication in IEEE Transactions on Vehicular Technology
null
null
null
cs.NI cs.SY eess.SY
http://creativecommons.org/licenses/by/4.0/
Modern connected vehicles (CVs) frequently require diverse types of content for mission-critical decision-making and onboard users' entertainment. These contents are required to be fully delivered to the requester CVs within stringent deadlines that the existing radio access technology (RAT) solutions may fail to ens...
[ { "created": "Tue, 15 Feb 2022 23:46:35 GMT", "version": "v1" }, { "created": "Sat, 1 Oct 2022 20:13:18 GMT", "version": "v2" }, { "created": "Thu, 30 Mar 2023 02:42:50 GMT", "version": "v3" } ]
2023-03-31
[ [ "Pervej", "Md Ferdous", "" ], [ "Jin", "Richeng", "" ], [ "Lin", "Shih-Chun", "" ], [ "Dai", "Huaiyu", "" ] ]
Modern connected vehicles (CVs) frequently require diverse types of content for mission-critical decision-making and onboard users' entertainment. These contents are required to be fully delivered to the requester CVs within stringent deadlines that the existing radio access technology (RAT) solutions may fail to ensur...
2011.11760
Gabriel Huang
Gabriel Huang, Bo Pang, Zhenhai Zhu, Clara Rivera, Radu Soricut
Multimodal Pretraining for Dense Video Captioning
AACL-IJCNLP 2020
null
null
null
cs.CV cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning specific hands-on skills such as cooking, car maintenance, and home repairs increasingly happens via instructional videos. The user experience with such videos is known to be improved by meta-information such as time-stamped annotations for the main steps involved. Generating such annotations automatically i...
[ { "created": "Tue, 10 Nov 2020 21:49:14 GMT", "version": "v1" } ]
2020-11-25
[ [ "Huang", "Gabriel", "" ], [ "Pang", "Bo", "" ], [ "Zhu", "Zhenhai", "" ], [ "Rivera", "Clara", "" ], [ "Soricut", "Radu", "" ] ]
Learning specific hands-on skills such as cooking, car maintenance, and home repairs increasingly happens via instructional videos. The user experience with such videos is known to be improved by meta-information such as time-stamped annotations for the main steps involved. Generating such annotations automatically is ...
2402.13487
Zhiwei Wang
Zhiwei Wang, Huazheng Wang, Hongning Wang
Stealthy Adversarial Attacks on Stochastic Multi-Armed Bandits
null
null
null
null
cs.LG cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Adversarial attacks against stochastic multi-armed bandit (MAB) algorithms have been extensively studied in the literature. In this work, we focus on reward poisoning attacks and find most existing attacks can be easily detected by our proposed detection method based on the test of homogeneity, due to their aggressiv...
[ { "created": "Wed, 21 Feb 2024 02:54:00 GMT", "version": "v1" } ]
2024-02-22
[ [ "Wang", "Zhiwei", "" ], [ "Wang", "Huazheng", "" ], [ "Wang", "Hongning", "" ] ]
Adversarial attacks against stochastic multi-armed bandit (MAB) algorithms have been extensively studied in the literature. In this work, we focus on reward poisoning attacks and find most existing attacks can be easily detected by our proposed detection method based on the test of homogeneity, due to their aggressive ...
hep-th/0008073
Vatche Sahakian
Vatche Sahakian
The phases of 2D NCOS
27 pages, 4 figures; v2: reference added; v3: error in argument on page 6 corrected
JHEP 0009 (2000) 025
10.1088/1126-6708/2000/09/025
CLNS 00/1684
hep-th
null
We study the phases of the 1+1 dimensional Non-Commutative Open String theory on a circle. We find that the length scale of non-commutativity increases at strong coupling, the coupling in turn being dressed by a power of D-string charge. The system is stringy at around this length scale, with dynamics involving an in...
[ { "created": "Tue, 8 Aug 2000 17:26:47 GMT", "version": "v1" }, { "created": "Wed, 9 Aug 2000 14:59:02 GMT", "version": "v2" }, { "created": "Tue, 15 Aug 2000 14:01:35 GMT", "version": "v3" } ]
2009-10-31
[ [ "Sahakian", "Vatche", "" ] ]
We study the phases of the 1+1 dimensional Non-Commutative Open String theory on a circle. We find that the length scale of non-commutativity increases at strong coupling, the coupling in turn being dressed by a power of D-string charge. The system is stringy at around this length scale, with dynamics involving an inte...
1910.14554
A. Yu. Petrov
A. C. Lehum, J. R. Nascimento, A. Yu. Petrov
Perturbative aspects of mass-deformed N=3 Chern-Simons-matter theory
11 pages
Phys. Rev. D 101, 065010 (2020)
10.1103/PhysRevD.101.065010
null
hep-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Within the superfield formalism, we calculate the two-point functions and the effective potential for the mass-deformed ${\cal N}=3$ Chern-Simons-matter theory and discuss the related renormalization group issues.
[ { "created": "Thu, 31 Oct 2019 15:53:32 GMT", "version": "v1" } ]
2020-03-23
[ [ "Lehum", "A. C.", "" ], [ "Nascimento", "J. R.", "" ], [ "Petrov", "A. Yu.", "" ] ]
Within the superfield formalism, we calculate the two-point functions and the effective potential for the mass-deformed ${\cal N}=3$ Chern-Simons-matter theory and discuss the related renormalization group issues.
2303.15571
Ruyi Ding
Ruyi Ding, Cheng Gongye, Siyue Wang, Aidong Ding, Yunsi Fei
EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
null
null
null
null
cs.CR cs.AI
http://creativecommons.org/licenses/by-nc-nd/4.0/
Deep Neural Networks (DNN) are vulnerable to adversarial perturbations-small changes crafted deliberately on the input to mislead the model for wrong predictions. Adversarial attacks have disastrous consequences for deep learning-empowered critical applications. Existing defense and detection techniques both require ...
[ { "created": "Mon, 27 Mar 2023 19:38:55 GMT", "version": "v1" } ]
2023-03-29
[ [ "Ding", "Ruyi", "" ], [ "Gongye", "Cheng", "" ], [ "Wang", "Siyue", "" ], [ "Ding", "Aidong", "" ], [ "Fei", "Yunsi", "" ] ]
Deep Neural Networks (DNN) are vulnerable to adversarial perturbations-small changes crafted deliberately on the input to mislead the model for wrong predictions. Adversarial attacks have disastrous consequences for deep learning-empowered critical applications. Existing defense and detection techniques both require ex...
2205.05492
Jasmin Grosinger
Sera Buyukgoz, Jasmin Grosinger, Mohamed Chetouani and Alessandro Saffiotti
Two ways to make your robot proactive: reasoning about human intentions, or reasoning about possible futures
20 pages, 1-column, 4 figures
null
null
null
cs.AI cs.RO
http://creativecommons.org/licenses/by/4.0/
Robots sharing their space with humans need to be proactive in order to be helpful. Proactive robots are able to act on their own initiative in an anticipatory way to benefit humans. In this work, we investigate two ways to make robots proactive. One way is to recognize humans' intentions and to act to fulfill them, ...
[ { "created": "Wed, 11 May 2022 13:33:14 GMT", "version": "v1" } ]
2022-05-12
[ [ "Buyukgoz", "Sera", "" ], [ "Grosinger", "Jasmin", "" ], [ "Chetouani", "Mohamed", "" ], [ "Saffiotti", "Alessandro", "" ] ]
Robots sharing their space with humans need to be proactive in order to be helpful. Proactive robots are able to act on their own initiative in an anticipatory way to benefit humans. In this work, we investigate two ways to make robots proactive. One way is to recognize humans' intentions and to act to fulfill them, li...
2112.13076
Somali Chaterji
Jayoung Lee, PengCheng Wang, Ran Xu, Venkat Dasari, Noah Weston, Yin Li, Saurabh Bagchi, and Somali Chaterji
Virtuoso: Video-based Intelligence for real-time tuning on SOCs
28 pages, 15 figures, 4 tables, ACM-TODAES
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by/4.0/
Efficient and adaptive computer vision systems have been proposed to make computer vision tasks, such as image classification and object detection, optimized for embedded or mobile devices. These solutions, quite recent in their origin, focus on optimizing the model (a deep neural network, DNN) or the system by desig...
[ { "created": "Fri, 24 Dec 2021 14:47:41 GMT", "version": "v1" } ]
2021-12-28
[ [ "Lee", "Jayoung", "" ], [ "Wang", "PengCheng", "" ], [ "Xu", "Ran", "" ], [ "Dasari", "Venkat", "" ], [ "Weston", "Noah", "" ], [ "Li", "Yin", "" ], [ "Bagchi", "Saurabh", "" ], [ "Chaterji", "S...
Efficient and adaptive computer vision systems have been proposed to make computer vision tasks, such as image classification and object detection, optimized for embedded or mobile devices. These solutions, quite recent in their origin, focus on optimizing the model (a deep neural network, DNN) or the system by designi...
2003.12256
Ichiro Oda
Ichiro Oda
Planck scale from broken local conformal invariance in Weyl geometry
17 pages; Contribution to the Proceedings of the Corfu Summer Institute 2019, 31 Aug - 25 Sep 2019, Corfu, Greece. arXiv admin note: substantial text overlap with arXiv:1903.09309
null
null
DPUR/TH/67
hep-th gr-qc hep-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that in a quadratic gravity based on Weyl's conformal geometry, the Planck mass scale can be generated from quantum effects of the gravitational field and the Weyl gauge field via the Coleman-Weinberg mechanism where a local scale symmetry is broken. At the same time, the Weyl gauge field acquires a mass less...
[ { "created": "Fri, 27 Mar 2020 07:00:17 GMT", "version": "v1" } ]
2020-03-30
[ [ "Oda", "Ichiro", "" ] ]
We show that in a quadratic gravity based on Weyl's conformal geometry, the Planck mass scale can be generated from quantum effects of the gravitational field and the Weyl gauge field via the Coleman-Weinberg mechanism where a local scale symmetry is broken. At the same time, the Weyl gauge field acquires a mass less t...
2110.13156
Wei Gu
Wei Gu
Vacuum Structures Revisited
17 pages; V2: references added; V3:Improved English, Corrected typos, added additional details in sections 2.3 and 4
null
null
null
hep-th math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the relationship between the higher symmetry and the dynamical decomposition in supersymmetric gauge theory in various dimensions by studying the semi-classical potential energy. We observe that besides the scalar moduli we shall also include the field strength $F_{0\cdots d}$ in the vacuum moduli in the ...
[ { "created": "Mon, 25 Oct 2021 18:00:01 GMT", "version": "v1" }, { "created": "Sun, 21 Nov 2021 18:35:28 GMT", "version": "v2" }, { "created": "Sat, 4 Dec 2021 22:51:44 GMT", "version": "v3" } ]
2021-12-07
[ [ "Gu", "Wei", "" ] ]
We consider the relationship between the higher symmetry and the dynamical decomposition in supersymmetric gauge theory in various dimensions by studying the semi-classical potential energy. We observe that besides the scalar moduli we shall also include the field strength $F_{0\cdots d}$ in the vacuum moduli in the 1+...
2206.08488
Heewon Kim
Heewon Kim and Kyoung Mu Lee
Controllable Image Enhancement
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Editing flat-looking images into stunning photographs requires skill and time. Automated image enhancement algorithms have attracted increased interest by generating high-quality images without user interaction. However, the quality assessment of a photograph is subjective. Even in tone and color adjustments, a singl...
[ { "created": "Thu, 16 Jun 2022 23:54:53 GMT", "version": "v1" } ]
2022-06-20
[ [ "Kim", "Heewon", "" ], [ "Lee", "Kyoung Mu", "" ] ]
Editing flat-looking images into stunning photographs requires skill and time. Automated image enhancement algorithms have attracted increased interest by generating high-quality images without user interaction. However, the quality assessment of a photograph is subjective. Even in tone and color adjustments, a single ...
2305.07455
Yu-Kuan Fu
Yu-Kuan Fu, Liang-Hsuan Tseng, Jiatong Shi, Chen-An Li, Tsu-Yuan Hsu, Shinji Watanabe, Hung-yi Lee
Improving Cascaded Unsupervised Speech Translation with Denoising Back-translation
null
null
null
null
cs.CL cs.SD eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most of the speech translation models heavily rely on parallel data, which is hard to collect especially for low-resource languages. To tackle this issue, we propose to build a cascaded speech translation system without leveraging any kind of paired data. We use fully unpaired data to train our unsupervised systems a...
[ { "created": "Fri, 12 May 2023 13:07:51 GMT", "version": "v1" } ]
2023-05-15
[ [ "Fu", "Yu-Kuan", "" ], [ "Tseng", "Liang-Hsuan", "" ], [ "Shi", "Jiatong", "" ], [ "Li", "Chen-An", "" ], [ "Hsu", "Tsu-Yuan", "" ], [ "Watanabe", "Shinji", "" ], [ "Lee", "Hung-yi", "" ] ]
Most of the speech translation models heavily rely on parallel data, which is hard to collect especially for low-resource languages. To tackle this issue, we propose to build a cascaded speech translation system without leveraging any kind of paired data. We use fully unpaired data to train our unsupervised systems and...
hep-th/9906188
null
Massimo Bianchi, Stefano Kovacs, Giancarlo Rossi and Yassen S. Stanev (Universita` di Roma ``Tor Vergata'')
On the logarithmic behaviour in N=4 SYM theory
18 pages, Latex
JHEP 9908 (1999) 020
10.1088/1126-6708/1999/08/020
ROM2F/99/9
hep-th
null
We show that the logarithmic behaviour seen in perturbative and non perturbative contributions to Green functions of gauge-invariant composite operators in N=4 SYM with SU(N) gauge group can be consistently interpreted in terms of anomalous dimensions of unprotected operators in long multiplets of the superconformal ...
[ { "created": "Thu, 24 Jun 1999 15:41:56 GMT", "version": "v1" } ]
2009-10-31
[ [ "Bianchi", "Massimo", "", "Universita` di Roma ``Tor Vergata''" ], [ "Kovacs", "Stefano", "", "Universita` di Roma ``Tor Vergata''" ], [ "Rossi", "Giancarlo", "", "Universita` di Roma ``Tor Vergata''" ], [ "Stanev", "Yassen S.", "", "Univ...
We show that the logarithmic behaviour seen in perturbative and non perturbative contributions to Green functions of gauge-invariant composite operators in N=4 SYM with SU(N) gauge group can be consistently interpreted in terms of anomalous dimensions of unprotected operators in long multiplets of the superconformal gr...
hep-th/0201094
Vincent G. J. Rodgers
A. Boveia, S. James Gates, Bjorg A. Larson, W.D. Linch, Dagny M. Kimberly, J.A. Phillips, V.G.J. Rodgers
Chiral Supergravitons Interacting with a 0-Brane N-Extended NSR Super-Virasoro Group
PACS: 04.65.+e, 11.15.-q, 11.25.-w, 12.60.J
Phys.Lett. B529 (2002) 222-232
10.1016/S0370-2693(02)01256-X
null
hep-th
null
We continue the development of the actions, S_{AFF}, by examining the cases where there are N fermionic degrees of freedom associated with a 0-brane. These actions correspond to the interaction of the N-extended super Virasoro algebra with the supergraviton and the associated SO(N) gauge field that accompanies the su...
[ { "created": "Mon, 14 Jan 2002 22:19:41 GMT", "version": "v1" } ]
2009-11-07
[ [ "Boveia", "A.", "" ], [ "Gates", "S. James", "" ], [ "Larson", "Bjorg A.", "" ], [ "Linch", "W. D.", "" ], [ "Kimberly", "Dagny M.", "" ], [ "Phillips", "J. A.", "" ], [ "Rodgers", "V. G. J.", "" ] ]
We continue the development of the actions, S_{AFF}, by examining the cases where there are N fermionic degrees of freedom associated with a 0-brane. These actions correspond to the interaction of the N-extended super Virasoro algebra with the supergraviton and the associated SO(N) gauge field that accompanies the supe...
2107.09540
Andrew Melnik
Andrew Melnik, Augustin Harter, Christian Limberg, Krishan Rana, Niko Suenderhauf, Helge Ritter
Critic Guided Segmentation of Rewarding Objects in First-Person Views
null
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by/4.0/
This work discusses a learning approach to mask rewarding objects in images using sparse reward signals from an imitation learning dataset. For that, we train an Hourglass network using only feedback from a critic model. The Hourglass network learns to produce a mask to decrease the critic's score of a high score ima...
[ { "created": "Tue, 20 Jul 2021 14:54:43 GMT", "version": "v1" } ]
2021-07-21
[ [ "Melnik", "Andrew", "" ], [ "Harter", "Augustin", "" ], [ "Limberg", "Christian", "" ], [ "Rana", "Krishan", "" ], [ "Suenderhauf", "Niko", "" ], [ "Ritter", "Helge", "" ] ]
This work discusses a learning approach to mask rewarding objects in images using sparse reward signals from an imitation learning dataset. For that, we train an Hourglass network using only feedback from a critic model. The Hourglass network learns to produce a mask to decrease the critic's score of a high score image...
hep-th/9906194
Steven Gubser
D.Z. Freedman, S.S. Gubser, K. Pilch, and N.P. Warner
Continuous distributions of D3-branes and gauged supergravity
19 pages, two figures, latex. v2: reference added, small corrections. v3: corrected unbounded spectrum error
JHEP 0007:038,2000
10.1088/1126-6708/2000/07/038
CERN-TH/99-189, HUTP-99/A029, MIT-CTP-2877, USC-99/03
hep-th
null
States on the Coulomb branch of N=4 super-Yang-Mills theory are studied from the point of view of gauged supergravity in five dimensions. These supersymmetric solutions provide examples of consistent truncation from type IIB supergravity in ten dimensions. A mass gap for states created by local operators and perfect ...
[ { "created": "Thu, 24 Jun 1999 22:41:17 GMT", "version": "v1" }, { "created": "Sun, 1 Aug 1999 17:43:18 GMT", "version": "v2" }, { "created": "Tue, 20 Jun 2000 18:48:30 GMT", "version": "v3" } ]
2009-10-31
[ [ "Freedman", "D. Z.", "" ], [ "Gubser", "S. S.", "" ], [ "Pilch", "K.", "" ], [ "Warner", "N. P.", "" ] ]
States on the Coulomb branch of N=4 super-Yang-Mills theory are studied from the point of view of gauged supergravity in five dimensions. These supersymmetric solutions provide examples of consistent truncation from type IIB supergravity in ten dimensions. A mass gap for states created by local operators and perfect sc...
2205.10337
Andr\'e Susano Pinto
Alexander Kolesnikov, Andr\'e Susano Pinto, Lucas Beyer, Xiaohua Zhai, Jeremiah Harmsen, Neil Houlsby
UViM: A Unified Modeling Approach for Vision with Learned Guiding Codes
22 pages. Accepted at NeurIPS 2022
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce UViM, a unified approach capable of modeling a wide range of computer vision tasks. In contrast to previous models, UViM has the same functional form for all tasks; it requires no task-specific modifications which require extensive human expertise. The approach involves two components: (I) a base model (...
[ { "created": "Fri, 20 May 2022 17:47:59 GMT", "version": "v1" }, { "created": "Fri, 27 May 2022 12:43:07 GMT", "version": "v2" }, { "created": "Fri, 14 Oct 2022 11:36:32 GMT", "version": "v3" } ]
2022-10-17
[ [ "Kolesnikov", "Alexander", "" ], [ "Pinto", "André Susano", "" ], [ "Beyer", "Lucas", "" ], [ "Zhai", "Xiaohua", "" ], [ "Harmsen", "Jeremiah", "" ], [ "Houlsby", "Neil", "" ] ]
We introduce UViM, a unified approach capable of modeling a wide range of computer vision tasks. In contrast to previous models, UViM has the same functional form for all tasks; it requires no task-specific modifications which require extensive human expertise. The approach involves two components: (I) a base model (fe...
1505.00327
Mariusz Pietruszka PhD
Mariusz A. Pietruszka
pH/$T$ duality - wall properties and time evolution of plant cells
50 pages, 10 figures
null
null
null
q-bio.CB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We examined the pH/$T$ (or $\mu$/$T$) duality of acidic pH and temperature ($T$) for the growth of grass shoots in order to determine the equation of state (EoS) for living plants. By considering non-meristematic growth as a dynamic series of 'state transitions' (STs) in the extending primary wall, we identified the ...
[ { "created": "Sat, 2 May 2015 08:56:45 GMT", "version": "v1" }, { "created": "Thu, 7 May 2015 11:32:17 GMT", "version": "v2" }, { "created": "Mon, 27 Jul 2015 11:02:07 GMT", "version": "v3" }, { "created": "Thu, 27 Jul 2017 07:24:26 GMT", "version": "v4" } ]
2017-07-28
[ [ "Pietruszka", "Mariusz A.", "" ] ]
We examined the pH/$T$ (or $\mu$/$T$) duality of acidic pH and temperature ($T$) for the growth of grass shoots in order to determine the equation of state (EoS) for living plants. By considering non-meristematic growth as a dynamic series of 'state transitions' (STs) in the extending primary wall, we identified the cr...
2206.14566
Rong Ma
Tal Einav and Rong Ma
Using Interpretable Machine Learning to Massively Increase the Number of Antibody-Virus Interactions Across Studies
null
Cell Reports Methods, 2023
10.1016/j.crmeth.2023.100540
null
q-bio.QM cs.LG q-bio.BM q-bio.PE
http://creativecommons.org/licenses/by-nc-nd/4.0/
A central challenge in every field of biology is to use existing measurements to predict the outcomes of future experiments. In this work, we consider the wealth of antibody inhibition data against variants of the influenza virus. Due to this viru's genetic diversity and evolvability, the variants examined in one stu...
[ { "created": "Fri, 10 Jun 2022 20:14:01 GMT", "version": "v1" }, { "created": "Sun, 30 Oct 2022 12:35:32 GMT", "version": "v2" } ]
2023-07-27
[ [ "Einav", "Tal", "" ], [ "Ma", "Rong", "" ] ]
A central challenge in every field of biology is to use existing measurements to predict the outcomes of future experiments. In this work, we consider the wealth of antibody inhibition data against variants of the influenza virus. Due to this viru's genetic diversity and evolvability, the variants examined in one study...
1906.00993
Clifford V. Johnson
Clifford V. Johnson
Instability of Super-Entropic Black Holes in Extended Thermodynamics
4 pages, 1 figure, no trumpet
Mod. Phys. Lett. A, Vol. 33, No. 1 (2020) 2050098
10.1142/S0217732320500984
null
hep-th gr-qc
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The charged black hole of Banados, Teitelbiom and Zanelli is studied in extended gravitational thermodynamics where there is a dynamical pressure and volume. It is a simple example of a super-entropic black hole, violating the reverse isoperimetric inequality. It is proven that this property implies that its specific...
[ { "created": "Mon, 3 Jun 2019 18:00:24 GMT", "version": "v1" } ]
2020-01-06
[ [ "Johnson", "Clifford V.", "" ] ]
The charged black hole of Banados, Teitelbiom and Zanelli is studied in extended gravitational thermodynamics where there is a dynamical pressure and volume. It is a simple example of a super-entropic black hole, violating the reverse isoperimetric inequality. It is proven that this property implies that its specific h...
1409.1542
Norman Poh
Norman Poh, Andrew McGovern and Simon de Lusignan
Towards automated identification of changes in laboratory measurement of renal function: implications for longitudinal research and observing trends in glomerular filtration rate (GFR)
null
null
null
TR-14-03
q-bio.QM stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Introduction: Kidney function is reported using estimates of glomerular filtration rate (eGFR). However, eGFR values are recorded without reference to the creatinine (SCr) assays used to derive them, and newer assays were introduced at different time points across laboratories in UK. These changes may cause systemati...
[ { "created": "Wed, 3 Sep 2014 09:53:20 GMT", "version": "v1" } ]
2014-09-05
[ [ "Poh", "Norman", "" ], [ "McGovern", "Andrew", "" ], [ "de Lusignan", "Simon", "" ] ]
Introduction: Kidney function is reported using estimates of glomerular filtration rate (eGFR). However, eGFR values are recorded without reference to the creatinine (SCr) assays used to derive them, and newer assays were introduced at different time points across laboratories in UK. These changes may cause systematic ...
hep-th/0609226
David Ridout
Pierre Mathieu and David Ridout
The Extended Algebra of the SU(2) Wess-Zumino-Witten Models
42 pages, 2 figures; added further motivational material and corrected typos
Nucl.Phys.B765:201-239,2007
10.1016/j.nuclphysb.2006.11.019
null
hep-th math-ph math.MP math.QA
null
The Wess-Zumino-Witten model defined on the group SU(2) has a unique (non-trivial) simple current of conformal dimension k/4 for each level k. The extended algebra defined by this simple current is carefully constructed in terms of generalised commutation relations, and the corresponding representation theory is inve...
[ { "created": "Fri, 29 Sep 2006 19:56:50 GMT", "version": "v1" }, { "created": "Wed, 15 Nov 2006 19:05:37 GMT", "version": "v2" } ]
2008-11-26
[ [ "Mathieu", "Pierre", "" ], [ "Ridout", "David", "" ] ]
The Wess-Zumino-Witten model defined on the group SU(2) has a unique (non-trivial) simple current of conformal dimension k/4 for each level k. The extended algebra defined by this simple current is carefully constructed in terms of generalised commutation relations, and the corresponding representation theory is invest...
1607.01541
Josip Trampetic Dr.
Carmelo P. Martin, Josip Trampetic and Jiangyang You
Quantum duality under the theta-exact Seiberg-Witten map
47 pages, 21 figures. Version published in JHEP under the reference: JHEP09(2016)052
null
10.1007/JHEP09(2016)052
null
hep-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that in the perturbative regime defined by the coupling constant, the theta-exact Seiberg-Witten map applied to noncommutative U(N) Yang-Mills --with or without Supersymmetry-- gives an ordinary gauge theory which is, at the quantum level, dual to the former. We do so by using the on-shell DeWitt effective ac...
[ { "created": "Wed, 6 Jul 2016 09:54:51 GMT", "version": "v1" }, { "created": "Sun, 11 Sep 2016 08:51:43 GMT", "version": "v2" } ]
2016-10-12
[ [ "Martin", "Carmelo P.", "" ], [ "Trampetic", "Josip", "" ], [ "You", "Jiangyang", "" ] ]
We show that in the perturbative regime defined by the coupling constant, the theta-exact Seiberg-Witten map applied to noncommutative U(N) Yang-Mills --with or without Supersymmetry-- gives an ordinary gauge theory which is, at the quantum level, dual to the former. We do so by using the on-shell DeWitt effective acti...
q-bio/0502027
Veit Schw\"ammle
Veit Schw\"ammle and Suzana M. de Oliveira
Simulations of a mortality plateau in the sexual Penna model for biological ageing
submitted to Phys. Rev. E
null
10.1103/PhysRevE.72.031911
null
q-bio.PE
null
The Penna model is a strategy to simulate the genetic dynamics of age-structured populations, in which the individuals genomes are represented by bit-strings. It provides a simple metaphor for the evolutionary process in terms of the mutation accumulation theory. In its original version, an individual dies due to inh...
[ { "created": "Tue, 22 Feb 2005 17:04:33 GMT", "version": "v1" } ]
2009-11-11
[ [ "Schwämmle", "Veit", "" ], [ "de Oliveira", "Suzana M.", "" ] ]
The Penna model is a strategy to simulate the genetic dynamics of age-structured populations, in which the individuals genomes are represented by bit-strings. It provides a simple metaphor for the evolutionary process in terms of the mutation accumulation theory. In its original version, an individual dies due to inher...
1404.6667
Ahmed El Shafie
Ahmed El Shafie and Tamer Khattab
Cooperative Cognitive Relaying Under Primary and Secondary Quality of Service Satisfaction
This paper was accepted in PIMRC 2014
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a new cooperative protocol which involves cooperation between primary and secondary users. We consider a cognitive setting with one primary user and multiple secondary users. The time resource is partitioned into discrete time slots. Each time slot, a secondary user is scheduled for transmission a...
[ { "created": "Sat, 26 Apr 2014 18:36:31 GMT", "version": "v1" }, { "created": "Tue, 1 Jul 2014 22:41:14 GMT", "version": "v2" } ]
2014-07-03
[ [ "Shafie", "Ahmed El", "" ], [ "Khattab", "Tamer", "" ] ]
This paper proposes a new cooperative protocol which involves cooperation between primary and secondary users. We consider a cognitive setting with one primary user and multiple secondary users. The time resource is partitioned into discrete time slots. Each time slot, a secondary user is scheduled for transmission acc...
2401.14878
Paolo Burelli
Maj Frost Jensen, Laurits Dixen, Paolo Burelli
Hades Again and Again: A Study on Frustration Tolerance, Physiology and Player Experience
null
null
null
null
cs.HC
http://creativecommons.org/licenses/by/4.0/
Accurately quantifying player experience is challenging for many reasons: identifying a ground truth and building validated and reliable scales are both challenging tasks; on top of that, empirical results are often moderated by individual factors. In this article, we present a study on the rogue-like game Hades desi...
[ { "created": "Fri, 26 Jan 2024 14:04:24 GMT", "version": "v1" } ]
2024-01-29
[ [ "Jensen", "Maj Frost", "" ], [ "Dixen", "Laurits", "" ], [ "Burelli", "Paolo", "" ] ]
Accurately quantifying player experience is challenging for many reasons: identifying a ground truth and building validated and reliable scales are both challenging tasks; on top of that, empirical results are often moderated by individual factors. In this article, we present a study on the rogue-like game Hades design...
2107.11892
Mengwu Guo
Mengwu Guo
A brief note on understanding neural networks as Gaussian processes
null
null
null
null
cs.LG cs.CE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As a generalization of the work in [Lee et al., 2017], this note briefly discusses when the prior of a neural network output follows a Gaussian process, and how a neural-network-induced Gaussian process is formulated. The posterior mean functions of such a Gaussian process regression lie in the reproducing kernel Hil...
[ { "created": "Sun, 25 Jul 2021 21:06:58 GMT", "version": "v1" } ]
2021-07-27
[ [ "Guo", "Mengwu", "" ] ]
As a generalization of the work in [Lee et al., 2017], this note briefly discusses when the prior of a neural network output follows a Gaussian process, and how a neural-network-induced Gaussian process is formulated. The posterior mean functions of such a Gaussian process regression lie in the reproducing kernel Hilbe...
2305.15383
Emmanuel Esposito
Khaled Eldowa, Emmanuel Esposito, Tommaso Cesari, Nicol\`o Cesa-Bianchi
On the Minimax Regret for Online Learning with Feedback Graphs
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we improve on the upper and lower bounds for the regret of online learning with strongly observable undirected feedback graphs. The best known upper bound for this problem is $\mathcal{O}\bigl(\sqrt{\alpha T\ln K}\bigr)$, where $K$ is the number of actions, $\alpha$ is the independence number of the gra...
[ { "created": "Wed, 24 May 2023 17:40:57 GMT", "version": "v1" }, { "created": "Sat, 28 Oct 2023 14:11:51 GMT", "version": "v2" } ]
2023-10-31
[ [ "Eldowa", "Khaled", "" ], [ "Esposito", "Emmanuel", "" ], [ "Cesari", "Tommaso", "" ], [ "Cesa-Bianchi", "Nicolò", "" ] ]
In this work, we improve on the upper and lower bounds for the regret of online learning with strongly observable undirected feedback graphs. The best known upper bound for this problem is $\mathcal{O}\bigl(\sqrt{\alpha T\ln K}\bigr)$, where $K$ is the number of actions, $\alpha$ is the independence number of the graph...
2403.03375
GuanWen Qiu
GuanWen Qiu, Da Kuang, Surbhi Goel
Complexity Matters: Dynamics of Feature Learning in the Presence of Spurious Correlations
Accepted to ICML 2024 with the title:"Complexity Matters: Feature Learning in the Presence of Spurious Correlations"
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing research often posits spurious features as easier to learn than core features in neural network optimization, but the impact of their relative simplicity remains under-explored. Moreover, studies mainly focus on end performance rather than the learning dynamics of feature learning. In this paper, we propose ...
[ { "created": "Tue, 5 Mar 2024 23:54:00 GMT", "version": "v1" }, { "created": "Sun, 16 Jun 2024 15:43:33 GMT", "version": "v2" } ]
2024-06-18
[ [ "Qiu", "GuanWen", "" ], [ "Kuang", "Da", "" ], [ "Goel", "Surbhi", "" ] ]
Existing research often posits spurious features as easier to learn than core features in neural network optimization, but the impact of their relative simplicity remains under-explored. Moreover, studies mainly focus on end performance rather than the learning dynamics of feature learning. In this paper, we propose a ...
1610.03809
Daniel Moyer
Daniel Moyer, Boris A. Gutman, Joshua Faskowitz, Neda Jahanshad, Paul M. Thompson
A Continuous Model of Cortical Connectivity
Accepted at MICCAI 2016
null
null
null
q-bio.NC cs.CE q-bio.QM stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a continuous model for structural brain connectivity based on the Poisson point process. The model treats each streamline curve in a tractography as an observed event in connectome space, here a product space of cortical white matter boundaries. We approximate the model parameter via kernel density estimat...
[ { "created": "Wed, 12 Oct 2016 18:11:46 GMT", "version": "v1" }, { "created": "Mon, 5 Nov 2018 22:33:37 GMT", "version": "v2" } ]
2018-11-07
[ [ "Moyer", "Daniel", "" ], [ "Gutman", "Boris A.", "" ], [ "Faskowitz", "Joshua", "" ], [ "Jahanshad", "Neda", "" ], [ "Thompson", "Paul M.", "" ] ]
We present a continuous model for structural brain connectivity based on the Poisson point process. The model treats each streamline curve in a tractography as an observed event in connectome space, here a product space of cortical white matter boundaries. We approximate the model parameter via kernel density estimatio...
2103.12918
Tamiaki Yoneya
Tamiaki Yoneya
Canonical Nambu mechanics: relevance to string/M-theory and approaches to quantization
Written version of an invited talk in the workshop "Space-time topology behind formation of micro-macro magneto-vortical structure by Nambu mechanics", Osaka City University, Sept. 28--Oct.1, 2020, corrected typos, added sentences, and added references, version to be published in a special section of the journa...
null
null
null
hep-th
http://creativecommons.org/licenses/by/4.0/
We review some aspects of Nambu mechanics on the basis of the works previously published separately by the present author. Main focuses are on three themes, its various symmetry structures, their possible relevance to string/M theory, and a Hamilton-Jacobi like reformulation. We try to elucidate the basic ideas, most...
[ { "created": "Wed, 24 Mar 2021 01:31:34 GMT", "version": "v1" }, { "created": "Wed, 21 Apr 2021 01:10:51 GMT", "version": "v2" } ]
2021-04-22
[ [ "Yoneya", "Tamiaki", "" ] ]
We review some aspects of Nambu mechanics on the basis of the works previously published separately by the present author. Main focuses are on three themes, its various symmetry structures, their possible relevance to string/M theory, and a Hamilton-Jacobi like reformulation. We try to elucidate the basic ideas, most o...
1811.04947
Yu-Chien Huang
Yu-Chien Huang, Washington Taylor
Mirror symmetry and elliptic Calabi-Yau manifolds
30 pages, 6 figures; v2: corrected Table 1, added references
null
10.1007/JHEP04(2019)083
MIT-CTP-5068
hep-th math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We find that for many Calabi-Yau threefolds with elliptic or genus one fibrations mirror symmetry factorizes between the fiber and the base of the fibration. In the simplest examples, the generic CY elliptic fibration over any toric base surface $B$ that supports an elliptic Calabi-Yau threefold has a mirror that is ...
[ { "created": "Mon, 12 Nov 2018 19:00:04 GMT", "version": "v1" }, { "created": "Fri, 23 Nov 2018 22:19:12 GMT", "version": "v2" } ]
2019-05-01
[ [ "Huang", "Yu-Chien", "" ], [ "Taylor", "Washington", "" ] ]
We find that for many Calabi-Yau threefolds with elliptic or genus one fibrations mirror symmetry factorizes between the fiber and the base of the fibration. In the simplest examples, the generic CY elliptic fibration over any toric base surface $B$ that supports an elliptic Calabi-Yau threefold has a mirror that is an...
1709.08237
Muhammad R. A. Khandaker PhD
Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong, Gan Zheng, Yangyang Zhang, and Zhongbin Zheng
Secure Full-Duplex Two-Way Relaying for SWIPT
Submitted to IEEE Wireless Communications Letters
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This letter studies bi-directional secure information exchange in a simultaneous wireless information and power transfer (SWIPT) system enabled by a full-duplex (FD) multiple-input multiple-output (MIMO) amplify-and-forward (AF) relay. The AF relay injects artificial noise (AN) in order to confuse the eavesdropper. S...
[ { "created": "Sun, 24 Sep 2017 18:47:40 GMT", "version": "v1" } ]
2017-09-26
[ [ "Okandeji", "Alexander A.", "" ], [ "Khandaker", "Muhammad R. A.", "" ], [ "Wong", "Kai-Kit", "" ], [ "Zheng", "Gan", "" ], [ "Zhang", "Yangyang", "" ], [ "Zheng", "Zhongbin", "" ] ]
This letter studies bi-directional secure information exchange in a simultaneous wireless information and power transfer (SWIPT) system enabled by a full-duplex (FD) multiple-input multiple-output (MIMO) amplify-and-forward (AF) relay. The AF relay injects artificial noise (AN) in order to confuse the eavesdropper. Spe...
2312.10993
Zeping Ren
Zeping Ren, Shaoli Huang, Xiu Li
Realistic Human Motion Generation with Cross-Diffusion Models
Accepted by ECCV2024
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the Cross Human Motion Diffusion Model (CrossDiff), a novel approach for generating high-quality human motion based on textual descriptions. Our method integrates 3D and 2D information using a shared transformer network within the training of the diffusion model, unifying motion noise into a single featu...
[ { "created": "Mon, 18 Dec 2023 07:44:40 GMT", "version": "v1" }, { "created": "Tue, 20 Feb 2024 05:57:51 GMT", "version": "v2" }, { "created": "Mon, 5 Aug 2024 01:58:58 GMT", "version": "v3" } ]
2024-08-06
[ [ "Ren", "Zeping", "" ], [ "Huang", "Shaoli", "" ], [ "Li", "Xiu", "" ] ]
We introduce the Cross Human Motion Diffusion Model (CrossDiff), a novel approach for generating high-quality human motion based on textual descriptions. Our method integrates 3D and 2D information using a shared transformer network within the training of the diffusion model, unifying motion noise into a single feature...
1612.04474
Qian Ge
Qian Ge, Yuval Yarom, Frank Li, Gernot Heiser
Your Processor Leaks Information - and There's Nothing You Can Do About It
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by-sa/4.0/
Timing channels are information flows, encoded in the relative timing of events, that bypass the system's protection mechanisms. Any microarchitectural state that depends on execution history and affects the rate of progress of later executions potentially establishes a timing channel, unless explicit steps are taken...
[ { "created": "Wed, 14 Dec 2016 03:41:21 GMT", "version": "v1" }, { "created": "Thu, 15 Dec 2016 02:58:30 GMT", "version": "v2" }, { "created": "Mon, 20 Feb 2017 05:56:37 GMT", "version": "v3" }, { "created": "Mon, 14 Aug 2017 15:45:32 GMT", "version": "v4" }, { "c...
2017-09-15
[ [ "Ge", "Qian", "" ], [ "Yarom", "Yuval", "" ], [ "Li", "Frank", "" ], [ "Heiser", "Gernot", "" ] ]
Timing channels are information flows, encoded in the relative timing of events, that bypass the system's protection mechanisms. Any microarchitectural state that depends on execution history and affects the rate of progress of later executions potentially establishes a timing channel, unless explicit steps are taken t...
2210.00286
Philip Schroeder
Philip Schroeder
NeuroEvo: A Cloud-based Platform for Automated Design and Training of Neural Networks using Evolutionary and Particle Swarm Algorithms
null
null
null
null
cs.NE cs.LG
http://creativecommons.org/licenses/by/4.0/
Evolutionary algorithms (EAs) provide unique advantages for optimizing neural networks in complex search spaces. This paper introduces a new web platform, NeuroEvo (neuroevo.io), that allows users to interactively design and train neural network classifiers using evolutionary and particle swarm algorithms. The classi...
[ { "created": "Sat, 1 Oct 2022 14:10:43 GMT", "version": "v1" } ]
2022-10-04
[ [ "Schroeder", "Philip", "" ] ]
Evolutionary algorithms (EAs) provide unique advantages for optimizing neural networks in complex search spaces. This paper introduces a new web platform, NeuroEvo (neuroevo.io), that allows users to interactively design and train neural network classifiers using evolutionary and particle swarm algorithms. The classifi...
2210.10864
Minchul Kim
Minchul Kim, Feng Liu, Anil Jain, Xiaoming Liu
Cluster and Aggregate: Face Recognition with Large Probe Set
To appear in NeurIPS 2022
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Feature fusion plays a crucial role in unconstrained face recognition where inputs (probes) comprise of a set of $N$ low quality images whose individual qualities vary. Advances in attention and recurrent modules have led to feature fusion that can model the relationship among the images in the input set. However, at...
[ { "created": "Wed, 19 Oct 2022 20:01:15 GMT", "version": "v1" }, { "created": "Fri, 18 Nov 2022 18:33:09 GMT", "version": "v2" }, { "created": "Thu, 16 Feb 2023 04:40:16 GMT", "version": "v3" } ]
2023-02-17
[ [ "Kim", "Minchul", "" ], [ "Liu", "Feng", "" ], [ "Jain", "Anil", "" ], [ "Liu", "Xiaoming", "" ] ]
Feature fusion plays a crucial role in unconstrained face recognition where inputs (probes) comprise of a set of $N$ low quality images whose individual qualities vary. Advances in attention and recurrent modules have led to feature fusion that can model the relationship among the images in the input set. However, atte...
1912.09256
Alexandru Uta
Alexandru Uta, Alexandru Custura, Dmitry Duplyakin, Ivo Jimenez, Jan Rellermeyer, Carlos Maltzahn, Robert Ricci, Alexandru Iosup
Is Big Data Performance Reproducible in Modern Cloud Networks?
12 pages paper, 3 pages references
null
null
null
cs.PF cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Performance variability has been acknowledged as a problem for over a decade by cloud practitioners and performance engineers. Yet, our survey of top systems conferences reveals that the research community regularly disregards variability when running experiments in the cloud. Focusing on networks, we assess the impa...
[ { "created": "Thu, 19 Dec 2019 15:05:30 GMT", "version": "v1" } ]
2019-12-20
[ [ "Uta", "Alexandru", "" ], [ "Custura", "Alexandru", "" ], [ "Duplyakin", "Dmitry", "" ], [ "Jimenez", "Ivo", "" ], [ "Rellermeyer", "Jan", "" ], [ "Maltzahn", "Carlos", "" ], [ "Ricci", "Robert", "" ], ...
Performance variability has been acknowledged as a problem for over a decade by cloud practitioners and performance engineers. Yet, our survey of top systems conferences reveals that the research community regularly disregards variability when running experiments in the cloud. Focusing on networks, we assess the impact...
1806.03454
Kavita Jain
Kavita Jain and Archana Devi
Polygenic adaptation in changing environments
null
EPL 123, 48002 (2018)
10.1209/0295-5075/123/48002
null
q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although many phenotypic traits are determined by a large number of genetic variants, how a polygenic trait adapts in response to the changes in the environment is still poorly understood. Here we study the adaptation dynamics of a polygenic trait that is determined by a finite number of genetic loci in an infinitely...
[ { "created": "Sat, 9 Jun 2018 10:44:50 GMT", "version": "v1" }, { "created": "Thu, 18 Oct 2018 10:30:20 GMT", "version": "v2" } ]
2018-10-19
[ [ "Jain", "Kavita", "" ], [ "Devi", "Archana", "" ] ]
Although many phenotypic traits are determined by a large number of genetic variants, how a polygenic trait adapts in response to the changes in the environment is still poorly understood. Here we study the adaptation dynamics of a polygenic trait that is determined by a finite number of genetic loci in an infinitely l...
2203.01282
John Lalor
John P. Lalor, Pedro Rodriguez
py-irt: A Scalable Item Response Theory Library for Python
null
null
10.1287/ijoc.2022.1250
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
py-irt is a Python library for fitting Bayesian Item Response Theory (IRT) models. py-irt estimates latent traits of subjects and items, making it appropriate for use in IRT tasks as well as ideal-point models. py-irt is built on top of the Pyro and PyTorch frameworks and uses GPU-accelerated training to scale to lar...
[ { "created": "Wed, 2 Mar 2022 18:09:46 GMT", "version": "v1" }, { "created": "Sun, 13 Mar 2022 15:51:22 GMT", "version": "v2" } ]
2022-11-16
[ [ "Lalor", "John P.", "" ], [ "Rodriguez", "Pedro", "" ] ]
py-irt is a Python library for fitting Bayesian Item Response Theory (IRT) models. py-irt estimates latent traits of subjects and items, making it appropriate for use in IRT tasks as well as ideal-point models. py-irt is built on top of the Pyro and PyTorch frameworks and uses GPU-accelerated training to scale to large...
1703.04418
Odemir Bruno PhD
Mariane B. Neiva, Patrick Guidotti, Odemir M. Bruno
Improving LBP and its variants using anisotropic diffusion
14 pages, 10 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main purpose of this paper is to propose a new preprocessing step in order to improve local feature descriptors and texture classification. Preprocessing is implemented by using transformations which help highlight salient features that play a significant role in texture recognition. We evaluate and compare four ...
[ { "created": "Mon, 13 Mar 2017 14:36:21 GMT", "version": "v1" } ]
2017-03-14
[ [ "Neiva", "Mariane B.", "" ], [ "Guidotti", "Patrick", "" ], [ "Bruno", "Odemir M.", "" ] ]
The main purpose of this paper is to propose a new preprocessing step in order to improve local feature descriptors and texture classification. Preprocessing is implemented by using transformations which help highlight salient features that play a significant role in texture recognition. We evaluate and compare four di...
1201.0035
Vladimir Lerner S
Vladimir S. Lerner
The information path functional approach for solution of a controllable stochastic problem
39 pages including 5 figures
null
null
null
cs.SY cs.IT math.DS math.IT nlin.AO
http://creativecommons.org/licenses/by/3.0/
We study a stochastic control system, described by Ito controllable equation, and evaluate the solutions by an entropy functional (EF), defined by the equation functions of controllable drift and diffusion. Considering a control problem for this functional, we solve the EF control variation problem (VP), which leads ...
[ { "created": "Thu, 29 Dec 2011 23:15:22 GMT", "version": "v1" }, { "created": "Tue, 3 Jun 2014 18:23:15 GMT", "version": "v2" } ]
2014-06-04
[ [ "Lerner", "Vladimir S.", "" ] ]
We study a stochastic control system, described by Ito controllable equation, and evaluate the solutions by an entropy functional (EF), defined by the equation functions of controllable drift and diffusion. Considering a control problem for this functional, we solve the EF control variation problem (VP), which leads to...
2010.14655
Mehmet Ozkan
Ugur Atli, Omer Guleryuz, Mehmet Ozkan
Off-Shell ${\mathcal N}=(1,0)$ Linear Multiplets in Six Dimensions
v2., typos fixed, reference added, version appeared in EPJC, 24 pages
null
10.1140/epjc/s10052-020-08773-3 10.1140/epjc/s10052-020-08773-3 10.1140/epjc/s10052-020-08773-3
null
hep-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a tensor calculus for $n$-number of ${\mathcal N}=(1,0)$ linear multiplets in six dimensions. The coupling of linear multiplets is encoded in a function ${\mathcal F}_{IJ}$ that is subject to certain constraints. We provide various rigid and local supersymmetric models depending on the choice of the functi...
[ { "created": "Tue, 27 Oct 2020 22:44:12 GMT", "version": "v1" }, { "created": "Sun, 27 Dec 2020 08:22:09 GMT", "version": "v2" } ]
2020-12-29
[ [ "Atli", "Ugur", "" ], [ "Guleryuz", "Omer", "" ], [ "Ozkan", "Mehmet", "" ] ]
We provide a tensor calculus for $n$-number of ${\mathcal N}=(1,0)$ linear multiplets in six dimensions. The coupling of linear multiplets is encoded in a function ${\mathcal F}_{IJ}$ that is subject to certain constraints. We provide various rigid and local supersymmetric models depending on the choice of the function...
1602.07957
Nathan Baker
Marilyn R. Gunner and Nathan A. Baker
Continuum Electrostatics Approaches to Calculating p$K_a$s and $E_m$s in Proteins
null
null
null
null
q-bio.BM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Proteins change their charge state through protonation and redox reactions as well as through binding charged ligands. The free energy of these reactions are dominated by solvation and electrostatic energies and modulated by protein conformational relaxation in response to the ionization state changes. Although compu...
[ { "created": "Thu, 25 Feb 2016 15:04:45 GMT", "version": "v1" } ]
2016-02-26
[ [ "Gunner", "Marilyn R.", "" ], [ "Baker", "Nathan A.", "" ] ]
Proteins change their charge state through protonation and redox reactions as well as through binding charged ligands. The free energy of these reactions are dominated by solvation and electrostatic energies and modulated by protein conformational relaxation in response to the ionization state changes. Although computa...
2206.04463
Oriel BenShmuel
Oriel BenShmuel
Meet You Halfway: Explaining Deep Learning Mysteries
null
null
null
null
cs.LG cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep neural networks perform exceptionally well on various learning tasks with state-of-the-art results. While these models are highly expressive and achieve impressively accurate solutions with excellent generalization abilities, they are susceptible to minor perturbations. Samples that suffer such perturbations are...
[ { "created": "Thu, 9 Jun 2022 12:43:10 GMT", "version": "v1" } ]
2022-06-10
[ [ "BenShmuel", "Oriel", "" ] ]
Deep neural networks perform exceptionally well on various learning tasks with state-of-the-art results. While these models are highly expressive and achieve impressively accurate solutions with excellent generalization abilities, they are susceptible to minor perturbations. Samples that suffer such perturbations are k...
1101.2402
Paul Sutcliffe
Paul Sutcliffe
Skyrmions in a truncated BPS theory
12 pages, 1 figure
JHEP 1104, 045 (2011)
10.1007/JHEP04(2011)045
DCPT-11/01
hep-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, it has been shown that (4+1)-dimensional Yang-Mills theory may be written as a (3+1)-dimensional BPS Skyrme model, in which the Skyrme field is coupled to an infinite tower of vector mesons. Truncating this tower to a single vector meson yields an extension of the standard Skyrme model to a theory of pions ...
[ { "created": "Wed, 12 Jan 2011 16:42:10 GMT", "version": "v1" } ]
2015-05-27
[ [ "Sutcliffe", "Paul", "" ] ]
Recently, it has been shown that (4+1)-dimensional Yang-Mills theory may be written as a (3+1)-dimensional BPS Skyrme model, in which the Skyrme field is coupled to an infinite tower of vector mesons. Truncating this tower to a single vector meson yields an extension of the standard Skyrme model to a theory of pions co...
1005.5521
Horace W. Crater
David Alba, Horace W. Crater, Luca Lusanna
Massless Particles plus Matter in the Rest-Frame Instant Form of Dynamics
null
J.Phys.A43:405203,2010
10.1088/1751-8113/43/40/405203
null
hep-th gr-qc math-ph math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
After introducing the parametrized Minkowski theory describing a positive-energy scalar massless particle, we study the rest-frame instant form of dynamics of such a particle in presence of another massive one (to avoid the front form of dynamics). Then we describe massless particles with Grassmann-valued helicity an...
[ { "created": "Sun, 30 May 2010 12:20:20 GMT", "version": "v1" } ]
2014-11-21
[ [ "Alba", "David", "" ], [ "Crater", "Horace W.", "" ], [ "Lusanna", "Luca", "" ] ]
After introducing the parametrized Minkowski theory describing a positive-energy scalar massless particle, we study the rest-frame instant form of dynamics of such a particle in presence of another massive one (to avoid the front form of dynamics). Then we describe massless particles with Grassmann-valued helicity and ...
2210.13210
Clara Meister
Liam van der Poel, Ryan Cotterell, Clara Meister
Mutual Information Alleviates Hallucinations in Abstractive Summarization
EMNLP 2022
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite significant progress in the quality of language generated from abstractive summarization models, these models still exhibit the tendency to hallucinate, i.e., output content not supported by the source document. A number of works have tried to fix--or at least uncover the source of--the problem with limited s...
[ { "created": "Mon, 24 Oct 2022 13:30:54 GMT", "version": "v1" }, { "created": "Sat, 29 Oct 2022 18:42:46 GMT", "version": "v2" } ]
2022-11-01
[ [ "van der Poel", "Liam", "" ], [ "Cotterell", "Ryan", "" ], [ "Meister", "Clara", "" ] ]
Despite significant progress in the quality of language generated from abstractive summarization models, these models still exhibit the tendency to hallucinate, i.e., output content not supported by the source document. A number of works have tried to fix--or at least uncover the source of--the problem with limited suc...
1911.04787
David Paulus
David Paulus, Gerdien de Vries, Bartel Van de Walle
Effects of data ambiguity and cognitive biases on the interpretability of machine learning models in humanitarian decision making
3 pager, 1 figure, AAAI Fall Symposium - AI for Social Good, November 7-9, 2019, Arlington, USA
null
null
null
cs.LG cs.HC stat.ML
http://creativecommons.org/licenses/by-nc-sa/4.0/
The effectiveness of machine learning algorithms depends on the quality and amount of data and the operationalization and interpretation by the human analyst. In humanitarian response, data is often lacking or overburdening, thus ambiguous, and the time-scarce, volatile, insecure environments of humanitarian activiti...
[ { "created": "Tue, 12 Nov 2019 10:50:42 GMT", "version": "v1" } ]
2019-11-13
[ [ "Paulus", "David", "" ], [ "de Vries", "Gerdien", "" ], [ "Van de Walle", "Bartel", "" ] ]
The effectiveness of machine learning algorithms depends on the quality and amount of data and the operationalization and interpretation by the human analyst. In humanitarian response, data is often lacking or overburdening, thus ambiguous, and the time-scarce, volatile, insecure environments of humanitarian activities...
2311.01149
Jianghao Chen
Jianghao Chen, Pu Jian, Tengxiao Xi, Dongyi Yi, Qianlong Du, Chenglin Ding, Guibo Zhu, Chengqing Zong, Jinqiao Wang, Jiajun Zhang
ChineseWebText: Large-scale High-quality Chinese Web Text Extracted with Effective Evaluation Model
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
During the development of large language models (LLMs), the scale and quality of the pre-training data play a crucial role in shaping LLMs' capabilities. To accelerate the research of LLMs, several large-scale datasets, such as C4 [1], Pile [2], RefinedWeb [3] and WanJuan [4], have been released to the public. Howeve...
[ { "created": "Thu, 2 Nov 2023 11:13:51 GMT", "version": "v1" }, { "created": "Fri, 10 Nov 2023 06:28:48 GMT", "version": "v2" } ]
2023-11-13
[ [ "Chen", "Jianghao", "" ], [ "Jian", "Pu", "" ], [ "Xi", "Tengxiao", "" ], [ "Yi", "Dongyi", "" ], [ "Du", "Qianlong", "" ], [ "Ding", "Chenglin", "" ], [ "Zhu", "Guibo", "" ], [ "Zong", "Chengqi...
During the development of large language models (LLMs), the scale and quality of the pre-training data play a crucial role in shaping LLMs' capabilities. To accelerate the research of LLMs, several large-scale datasets, such as C4 [1], Pile [2], RefinedWeb [3] and WanJuan [4], have been released to the public. However,...
1411.0373
Fen Zuo
Fen Zuo, Yi-Hong Gao
Thermodynamics of large-$N$ gauge theories on a sphere: weak versus strong coupling
Discussion on the small-$\lambda$ corrections improved
null
10.1007/JHEP05(2015)003
null
hep-th hep-lat hep-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently lattice simulation in pure Yang-Mills theory exposes significant quadratic corrections for both the thermodynamic quantities and the renormalized Polyakov loop in the deconfined phase. These terms are previously found to appear naturally for ${\mathcal N}=4$ Super Yang-Mills~(SYM) on a sphere at strong coupl...
[ { "created": "Mon, 3 Nov 2014 06:39:56 GMT", "version": "v1" }, { "created": "Thu, 12 Feb 2015 06:48:47 GMT", "version": "v2" }, { "created": "Fri, 8 May 2015 10:21:43 GMT", "version": "v3" } ]
2015-05-11
[ [ "Zuo", "Fen", "" ], [ "Gao", "Yi-Hong", "" ] ]
Recently lattice simulation in pure Yang-Mills theory exposes significant quadratic corrections for both the thermodynamic quantities and the renormalized Polyakov loop in the deconfined phase. These terms are previously found to appear naturally for ${\mathcal N}=4$ Super Yang-Mills~(SYM) on a sphere at strong couplin...
hep-th/9603106
Guido Cognola
Sergio Zerbini, Guido Cognola and Luciano Vanzo
Euclidean Approach to the Entropy for a Scalar Field in Rindler-like Space-Times
17 pages, LaTex. A sign error corrected and few comments added
Phys.Rev. D54 (1996) 2699-2710
10.1103/PhysRevD.54.2699
University of Trento, UTF 372
hep-th gr-qc
null
The off-shell entropy for a massless scalar field in a D-dimensional Rindler-like space-time is investigated within the conical Euclidean approach in the manifold $C_\be\times\M^N$, $C_\be$ being the 2-dimensional cone, making use of the zeta-function regularisation. Due to the presence of conical singularities, it i...
[ { "created": "Fri, 15 Mar 1996 16:28:41 GMT", "version": "v1" }, { "created": "Mon, 20 May 1996 11:59:27 GMT", "version": "v2" } ]
2009-10-30
[ [ "Zerbini", "Sergio", "" ], [ "Cognola", "Guido", "" ], [ "Vanzo", "Luciano", "" ] ]
The off-shell entropy for a massless scalar field in a D-dimensional Rindler-like space-time is investigated within the conical Euclidean approach in the manifold $C_\be\times\M^N$, $C_\be$ being the 2-dimensional cone, making use of the zeta-function regularisation. Due to the presence of conical singularities, it is ...
1512.02560
Omid Ghahabi
Omid Ghahabi and Javier Hernando
Deep Learning for Single and Multi-Session i-Vector Speaker Recognition
null
IEEE/ACM Transactions on Audio, Speech, and Language Processing, Volume: 25, Issue: 4, April 2017
10.1109/TASLP.2017.2661705
null
cs.SD cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The promising performance of Deep Learning (DL) in speech recognition has motivated the use of DL in other speech technology applications such as speaker recognition. Given i-vectors as inputs, the authors proposed an impostor selection algorithm and a universal model adaptation process in a hybrid system based on De...
[ { "created": "Tue, 8 Dec 2015 17:34:49 GMT", "version": "v1" } ]
2017-04-24
[ [ "Ghahabi", "Omid", "" ], [ "Hernando", "Javier", "" ] ]
The promising performance of Deep Learning (DL) in speech recognition has motivated the use of DL in other speech technology applications such as speaker recognition. Given i-vectors as inputs, the authors proposed an impostor selection algorithm and a universal model adaptation process in a hybrid system based on Deep...
2210.02361
Max A. Deppert
Max A. Deppert and Klaus Jansen
The Power of Duality: Response Time Analysis meets Integer Programming
null
null
null
null
cs.DS cs.DM
http://creativecommons.org/licenses/by/4.0/
We study a mutually enriching connection between response time analysis in real-time systems and the mixing set problem. Thereby generalizing over known results we present a new approach to the computation of response times in fixed-priority uniprocessor real-time scheduling. We even allow that the tasks are delayed ...
[ { "created": "Wed, 5 Oct 2022 16:06:07 GMT", "version": "v1" }, { "created": "Wed, 1 Nov 2023 15:19:44 GMT", "version": "v2" } ]
2023-11-02
[ [ "Deppert", "Max A.", "" ], [ "Jansen", "Klaus", "" ] ]
We study a mutually enriching connection between response time analysis in real-time systems and the mixing set problem. Thereby generalizing over known results we present a new approach to the computation of response times in fixed-priority uniprocessor real-time scheduling. We even allow that the tasks are delayed by...