id stringlengths 9 14 | submitter stringlengths 1 64 ⌀ | authors stringlengths 4 9.62k | title stringlengths 4 343 | comments stringlengths 1 609 ⌀ | journal-ref stringlengths 4 404 ⌀ | doi stringlengths 12 153 ⌀ | report-no stringlengths 2 254 ⌀ | categories stringlengths 5 112 | license stringclasses 9
values | orig_abstract stringlengths 14 3.76k | versions listlengths 1 60 | update_date stringlengths 10 10 | authors_parsed listlengths 1 535 | abstract stringlengths 11 3.75k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2407.20992 | Mattia Miotto | Greta Grassmann, Lorenzo Di Rienzo, Giancarlo Ruocco, Mattia Miotto,
Edoardo Milanetti | Compact assessment of molecular surface complementarities enhances
neural network-aided prediction of key binding residues | 15 pages, 5 figures, 1 table | null | null | null | q-bio.BM | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Predicting interactions between biomolecules, such as protein-protein
complexes, remains a challenging problem. Despite the many advancements done so
far, the performances of docking protocols are deeply dependent on their
capability of identify binding regions. In this context, we present a novel
approach that build... | [
{
"created": "Tue, 30 Jul 2024 17:28:19 GMT",
"version": "v1"
}
] | 2024-07-31 | [
[
"Grassmann",
"Greta",
""
],
[
"Di Rienzo",
"Lorenzo",
""
],
[
"Ruocco",
"Giancarlo",
""
],
[
"Miotto",
"Mattia",
""
],
[
"Milanetti",
"Edoardo",
""
]
] | Predicting interactions between biomolecules, such as protein-protein complexes, remains a challenging problem. Despite the many advancements done so far, the performances of docking protocols are deeply dependent on their capability of identify binding regions. In this context, we present a novel approach that builds ... |
1506.04738 | Satoshi Ohya | Satoshi Ohya | BPS Monopole in the Space of Boundary Conditions | 13 pages, 4 eepic figures; minor corrections | J.Phys.A48:505401,2015 | 10.1088/1751-8113/48/50/505401 | null | hep-th math-ph math.MP quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The space of all possible boundary conditions that respect self-adjointness
of Hamiltonian operator is known to be given by the group manifold $U(2)$ in
one-dimensional quantum mechanics. In this paper we study non-Abelian Berry's
connections in the space of boundary conditions in a simple quantum mechanical
system. ... | [
{
"created": "Mon, 15 Jun 2015 20:00:12 GMT",
"version": "v1"
},
{
"created": "Tue, 24 Nov 2015 01:00:14 GMT",
"version": "v2"
}
] | 2015-11-25 | [
[
"Ohya",
"Satoshi",
""
]
] | The space of all possible boundary conditions that respect self-adjointness of Hamiltonian operator is known to be given by the group manifold $U(2)$ in one-dimensional quantum mechanics. In this paper we study non-Abelian Berry's connections in the space of boundary conditions in a simple quantum mechanical system. We... |
1712.01257 | Sakib Khan | Sakib Mahmud Khan, Sababa Islam, MD Zadid Khan, Kakan Dey, Mashrur
Chowdhury, Nathan Huynh | Development of Statewide AADT Estimation Model from Short-Term Counts: A
Comparative Study for South Carolina | This paper is accepted for both presentation and publication in the
Proceeding of 97th Annual Meeting of the Transportation Research Board,
Washington, D.C., (2018), and under review in Transportation Research Record
Journal. Abstract: 258 words + Text: 4660 + References: 552 + 6
tables/figures: 1500 = 6970 wor... | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Annual Average Daily Traffic (AADT) is an important parameter used in traffic
engineering analysis. Departments of Transportation (DOTs) continually collect
traffic count using both permanent count stations (i.e., Automatic Traffic
Recorders or ATRs) and temporary short-term count stations. In South Carolina,
87% of ... | [
{
"created": "Thu, 30 Nov 2017 04:08:15 GMT",
"version": "v1"
}
] | 2017-12-05 | [
[
"Khan",
"Sakib Mahmud",
""
],
[
"Islam",
"Sababa",
""
],
[
"Khan",
"MD Zadid",
""
],
[
"Dey",
"Kakan",
""
],
[
"Chowdhury",
"Mashrur",
""
],
[
"Huynh",
"Nathan",
""
]
] | Annual Average Daily Traffic (AADT) is an important parameter used in traffic engineering analysis. Departments of Transportation (DOTs) continually collect traffic count using both permanent count stations (i.e., Automatic Traffic Recorders or ATRs) and temporary short-term count stations. In South Carolina, 87% of th... |
2005.06324 | Sarah Spiekermann | Sarah Spiekermann, Alexander Novotny | A vision for global privacy bridges: Technical and legal measures for
international data markets | Information privacy Personal data market Economics of personal
information Privacy regulation | null | 10.1016/j.clsr.2015.01.009 | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | From the early days of the information economy, personal data has been its
most valuable asset. Despite data protection laws and an acknowledged right to
privacy, trading personal information has become a business equated with
"trading oil". Most of this business is done without the knowledge and active
informed cons... | [
{
"created": "Wed, 13 May 2020 13:55:50 GMT",
"version": "v1"
}
] | 2020-05-14 | [
[
"Spiekermann",
"Sarah",
""
],
[
"Novotny",
"Alexander",
""
]
] | From the early days of the information economy, personal data has been its most valuable asset. Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil". Most of this business is done without the knowledge and active informed consen... |
hep-th/9304024 | null | M.Alimohammadi, F.Ardalan, H.Arfaei | Nilpotent Gauging of SL(2,R)$WZNW$ models, and Liouville Field | 17 pages, latex | Int. J. Mod. Phys. A10 (1995) 115 | 10.1142/S0217751X95000061 | BONN-HE-93-12, SUTDP-93/72/3 ,IPM-93-007 | hep-th | null | We consider the gauging of $ SL(2,R) $ WZNW model by its nilpotent subgroup
E(1). The resulting space-time of the corresponding sigma model is seen to
collapse to a one dimensional field theory of Liouville. Gauging the diagonal
subgroup $ E(1) \times U(1) $ of $SL(2,R) \times U(1)$ theory yields an
extremal three di... | [
{
"created": "Wed, 7 Apr 1993 11:10:36 GMT",
"version": "v1"
},
{
"created": "Thu, 8 Apr 1993 09:31:29 GMT",
"version": "v2"
}
] | 2009-10-22 | [
[
"Alimohammadi",
"M.",
""
],
[
"Ardalan",
"F.",
""
],
[
"Arfaei",
"H.",
""
]
] | We consider the gauging of $ SL(2,R) $ WZNW model by its nilpotent subgroup E(1). The resulting space-time of the corresponding sigma model is seen to collapse to a one dimensional field theory of Liouville. Gauging the diagonal subgroup $ E(1) \times U(1) $ of $SL(2,R) \times U(1)$ theory yields an extremal three dime... |
2012.02553 | Qi Jia | Qi Jia, Hongru Huang, Kenny Q. Zhu | DDRel: A New Dataset for Interpersonal Relation Classification in Dyadic
Dialogues | This paper has been accepted by AAAI2021 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interpersonal language style shifting in dialogues is an interesting and
almost instinctive ability of human. Understanding interpersonal relationship
from language content is also a crucial step toward further understanding
dialogues. Previous work mainly focuses on relation extraction between named
entities in text... | [
{
"created": "Fri, 4 Dec 2020 12:30:31 GMT",
"version": "v1"
}
] | 2020-12-07 | [
[
"Jia",
"Qi",
""
],
[
"Huang",
"Hongru",
""
],
[
"Zhu",
"Kenny Q.",
""
]
] | Interpersonal language style shifting in dialogues is an interesting and almost instinctive ability of human. Understanding interpersonal relationship from language content is also a crucial step toward further understanding dialogues. Previous work mainly focuses on relation extraction between named entities in texts.... |
2109.11636 | Linh K\"astner | Linh K\"astner, Johannes Cox, Teham Buiyan, Jens Lambrecht | All-in-One: A DRL-based Control Switch Combining State-of-the-art
Navigation Planners | 7 pages, 7 figures | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Autonomous navigation of mobile robots is an essential aspect in use cases
such as delivery, assistance or logistics. Although traditional planning
methods are well integrated into existing navigation systems, they struggle in
highly dynamic environments. On the other hand,
Deep-Reinforcement-Learning-based methods s... | [
{
"created": "Thu, 23 Sep 2021 20:42:03 GMT",
"version": "v1"
}
] | 2021-09-27 | [
[
"Kästner",
"Linh",
""
],
[
"Cox",
"Johannes",
""
],
[
"Buiyan",
"Teham",
""
],
[
"Lambrecht",
"Jens",
""
]
] | Autonomous navigation of mobile robots is an essential aspect in use cases such as delivery, assistance or logistics. Although traditional planning methods are well integrated into existing navigation systems, they struggle in highly dynamic environments. On the other hand, Deep-Reinforcement-Learning-based methods sho... |
2211.09151 | Adam Ball | Adam Ball | Celestial Locality and the Jacobi Identity | 18 pages, 1 figure; v2 typos corrected, references added | null | 10.1007/JHEP01(2023)146 | null | hep-th | http://creativecommons.org/licenses/by/4.0/ | We show the equivalence of several different tests of the Jacobi identity for
celestial currents at tree level, in particular finding a simple, practical
condition on hard momentum space 4-point amplitudes in any EFT. Along the way
we clarify the role of the order of soft and collinear limits in obstructing
Jacobi fo... | [
{
"created": "Wed, 16 Nov 2022 19:01:06 GMT",
"version": "v1"
},
{
"created": "Tue, 21 Mar 2023 02:59:03 GMT",
"version": "v2"
}
] | 2023-03-22 | [
[
"Ball",
"Adam",
""
]
] | We show the equivalence of several different tests of the Jacobi identity for celestial currents at tree level, in particular finding a simple, practical condition on hard momentum space 4-point amplitudes in any EFT. Along the way we clarify the role of the order of soft and collinear limits in obstructing Jacobi for ... |
1112.3318 | David Vegh | David Vegh | Holographic Fermi surfaces near quantum phase transitions | 11 pages, 6 figures | null | null | null | hep-th cond-mat.str-el | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study holographic Fermi surfaces coupled to a bosonic degree of freedom
using the gauge/gravity correspondence. The gravity background is a charged
black hole in asymptotically AdS spacetime. We introduce a neutral scalar field
with parameters such that the system is at a quantum phase transition point. We
further... | [
{
"created": "Wed, 14 Dec 2011 20:13:38 GMT",
"version": "v1"
}
] | 2011-12-15 | [
[
"Vegh",
"David",
""
]
] | We study holographic Fermi surfaces coupled to a bosonic degree of freedom using the gauge/gravity correspondence. The gravity background is a charged black hole in asymptotically AdS spacetime. We introduce a neutral scalar field with parameters such that the system is at a quantum phase transition point. We further i... |
1502.00143 | Hossam Afifi | Thouraya Toukabri Gunes, Hossam Afifi | Hybrid model for LTE Network-Assisted D2D communications | null | null | 10.1007/978-3-319-07425-2_8 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | New Architecture to support D2D communications, where discovery is made
directly between devices while communications occur with the help of the E-Node
B
| [
{
"created": "Sat, 31 Jan 2015 18:39:46 GMT",
"version": "v1"
}
] | 2015-02-03 | [
[
"Gunes",
"Thouraya Toukabri",
""
],
[
"Afifi",
"Hossam",
""
]
] | New Architecture to support D2D communications, where discovery is made directly between devices while communications occur with the help of the E-Node B |
2406.19763 | Kiran Busch | Kiran Busch, Timotheus Kampik, Henrik Leopold | xSemAD: Explainable Semantic Anomaly Detection in Event Logs Using
Sequence-to-Sequence Models | Accepted at BPM 2024 | null | null | null | cs.AI | http://creativecommons.org/licenses/by/4.0/ | The identification of undesirable behavior in event logs is an important
aspect of process mining that is often addressed by anomaly detection methods.
Traditional anomaly detection methods tend to focus on statistically rare
behavior and neglect the subtle difference between rarity and undesirability.
The introducti... | [
{
"created": "Fri, 28 Jun 2024 09:06:52 GMT",
"version": "v1"
}
] | 2024-07-01 | [
[
"Busch",
"Kiran",
""
],
[
"Kampik",
"Timotheus",
""
],
[
"Leopold",
"Henrik",
""
]
] | The identification of undesirable behavior in event logs is an important aspect of process mining that is often addressed by anomaly detection methods. Traditional anomaly detection methods tend to focus on statistically rare behavior and neglect the subtle difference between rarity and undesirability. The introduction... |
2307.07930 | Yifan Zhang | Yifan Zhang, Cheng Wei, Shangyou Wu, Zhengting He, Wenhao Yu | GeoGPT: Understanding and Processing Geospatial Tasks through An
Autonomous GPT | 23 pages, 4 figures | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Decision-makers in GIS need to combine a series of spatial algorithms and
operations to solve geospatial tasks. For example, in the task of facility
siting, the Buffer tool is usually first used to locate areas close or away
from some specific entities; then, the Intersect or Erase tool is used to
select candidate ar... | [
{
"created": "Sun, 16 Jul 2023 03:03:59 GMT",
"version": "v1"
}
] | 2023-07-18 | [
[
"Zhang",
"Yifan",
""
],
[
"Wei",
"Cheng",
""
],
[
"Wu",
"Shangyou",
""
],
[
"He",
"Zhengting",
""
],
[
"Yu",
"Wenhao",
""
]
] | Decision-makers in GIS need to combine a series of spatial algorithms and operations to solve geospatial tasks. For example, in the task of facility siting, the Buffer tool is usually first used to locate areas close or away from some specific entities; then, the Intersect or Erase tool is used to select candidate area... |
1809.04193 | Chu-Pan Wong | Chu-Pan Wong, Jens Meinicke, Lukas Lazarek, Christian K\"astner | Faster Variational Execution with Transparent Bytecode Transformation | null | null | null | null | cs.PL cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Variational execution is a novel dynamic analysis technique for exploring
highly configurable systems and accurately tracking information flow. It is
able to efficiently analyze many configurations by aggressively sharing
redundancies of program executions. The idea of variational execution has been
demonstrated to b... | [
{
"created": "Tue, 11 Sep 2018 22:54:37 GMT",
"version": "v1"
}
] | 2018-09-13 | [
[
"Wong",
"Chu-Pan",
""
],
[
"Meinicke",
"Jens",
""
],
[
"Lazarek",
"Lukas",
""
],
[
"Kästner",
"Christian",
""
]
] | Variational execution is a novel dynamic analysis technique for exploring highly configurable systems and accurately tracking information flow. It is able to efficiently analyze many configurations by aggressively sharing redundancies of program executions. The idea of variational execution has been demonstrated to be ... |
2310.08582 | Mingyu Ding | Mengkang Hu, Yao Mu, Xinmiao Yu, Mingyu Ding, Shiguang Wu, Wenqi Shao,
Qiguang Chen, Bin Wang, Yu Qiao, Ping Luo | Tree-Planner: Efficient Close-loop Task Planning with Large Language
Models | Published in ICLR 2024 | null | null | null | cs.CL cs.AI cs.LG cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies close-loop task planning, which refers to the process of
generating a sequence of skills (a plan) to accomplish a specific goal while
adapting the plan based on real-time observations. Recently, prompting Large
Language Models (LLMs) to generate actions iteratively has become a prevalent
paradigm d... | [
{
"created": "Thu, 12 Oct 2023 17:59:50 GMT",
"version": "v1"
},
{
"created": "Wed, 24 Jul 2024 12:25:17 GMT",
"version": "v2"
}
] | 2024-07-25 | [
[
"Hu",
"Mengkang",
""
],
[
"Mu",
"Yao",
""
],
[
"Yu",
"Xinmiao",
""
],
[
"Ding",
"Mingyu",
""
],
[
"Wu",
"Shiguang",
""
],
[
"Shao",
"Wenqi",
""
],
[
"Chen",
"Qiguang",
""
],
[
"Wang",
"Bin",
... | This paper studies close-loop task planning, which refers to the process of generating a sequence of skills (a plan) to accomplish a specific goal while adapting the plan based on real-time observations. Recently, prompting Large Language Models (LLMs) to generate actions iteratively has become a prevalent paradigm due... |
2301.12569 | Zahra Zahedi | Zahra Zahedi, Sarath Sreedharan, Subbarao Kambhampati | A Mental Model Based Theory of Trust | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Handling trust is one of the core requirements for facilitating effective
interaction between the human and the AI agent. Thus, any decision-making
framework designed to work with humans must possess the ability to estimate and
leverage human trust. In this paper, we propose a mental model based theory of
trust that ... | [
{
"created": "Sun, 29 Jan 2023 22:36:37 GMT",
"version": "v1"
}
] | 2023-01-31 | [
[
"Zahedi",
"Zahra",
""
],
[
"Sreedharan",
"Sarath",
""
],
[
"Kambhampati",
"Subbarao",
""
]
] | Handling trust is one of the core requirements for facilitating effective interaction between the human and the AI agent. Thus, any decision-making framework designed to work with humans must possess the ability to estimate and leverage human trust. In this paper, we propose a mental model based theory of trust that no... |
2108.07998 | Shaobo Cui | Xuming Lin, Shaobo Cui, Zhongzhou Zhao, Wei Zhou, Ji Zhang, Haiqing
Chen | GGP: A Graph-based Grouping Planner for Explicit Control of Long Text
Generation | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing data-driven methods can well handle short text generation. However,
when applied to the long-text generation scenarios such as story generation or
advertising text generation in the commercial scenario, these methods may
generate illogical and uncontrollable texts. To address these aforementioned
issues, we ... | [
{
"created": "Wed, 18 Aug 2021 06:55:55 GMT",
"version": "v1"
}
] | 2021-08-19 | [
[
"Lin",
"Xuming",
""
],
[
"Cui",
"Shaobo",
""
],
[
"Zhao",
"Zhongzhou",
""
],
[
"Zhou",
"Wei",
""
],
[
"Zhang",
"Ji",
""
],
[
"Chen",
"Haiqing",
""
]
] | Existing data-driven methods can well handle short text generation. However, when applied to the long-text generation scenarios such as story generation or advertising text generation in the commercial scenario, these methods may generate illogical and uncontrollable texts. To address these aforementioned issues, we pr... |
2408.03796 | Mehrdad Karrabi | Krishnendu Chatterjee, Amir Kafshdar Goharshady, Ehsan Kafshdar
Goharshady, Mehrdad Karrabi, Milad Saadat, {\DJ}or{\dj}e \v{Z}ikeli\'c | PolyHorn: A Polynomial Horn Clause Solver | null | null | null | null | cs.LO cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Polynomial Horn clauses with existentially and universally quantified
variables arise in many problems of verification and program analysis. We
present PolyHorn which is a tool for solving polynomial Horn clauses in which
variables on both sides of the implication are real valued. Our tool provides a
unified framewor... | [
{
"created": "Wed, 7 Aug 2024 14:20:28 GMT",
"version": "v1"
}
] | 2024-08-08 | [
[
"Chatterjee",
"Krishnendu",
""
],
[
"Goharshady",
"Amir Kafshdar",
""
],
[
"Goharshady",
"Ehsan Kafshdar",
""
],
[
"Karrabi",
"Mehrdad",
""
],
[
"Saadat",
"Milad",
""
],
[
"Žikelić",
"Đorđe",
""
]
] | Polynomial Horn clauses with existentially and universally quantified variables arise in many problems of verification and program analysis. We present PolyHorn which is a tool for solving polynomial Horn clauses in which variables on both sides of the implication are real valued. Our tool provides a unified framework ... |
1911.06256 | Luca Della Libera | Luca Della Libera | A Comparative Study between Bayesian and Frequentist Neural Networks for
Remaining Useful Life Estimation in Condition-Based Maintenance | Withdrawn to resolve an authorship dispute | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the last decade, deep learning (DL) has outperformed model-based and
statistical approaches in predicting the remaining useful life (RUL) of
machinery in the context of condition-based maintenance. One of the major
drawbacks of DL is that it heavily depends on a large amount of labeled data,
which are typically ex... | [
{
"created": "Thu, 14 Nov 2019 17:31:04 GMT",
"version": "v1"
},
{
"created": "Fri, 20 Dec 2019 15:12:36 GMT",
"version": "v2"
}
] | 2020-01-10 | [
[
"Della Libera",
"Luca",
""
]
] | In the last decade, deep learning (DL) has outperformed model-based and statistical approaches in predicting the remaining useful life (RUL) of machinery in the context of condition-based maintenance. One of the major drawbacks of DL is that it heavily depends on a large amount of labeled data, which are typically expe... |
1005.4072 | Geoffrey Comp\`ere | Dionysios Anninos, Geoffrey Comp\`ere, Sophie de Buyl, St\'ephane
Detournay and Monica Guica | The Curious Case of Null Warped Space | 29 pages + appendices, refs added | JHEP 1011:119,2010 | 10.1007/JHEP11(2010)119 | NSF-KITP-10-020 | hep-th gr-qc | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We initiate a comprehensive study of a set of solutions of topologically
massive gravity known as null warped anti-de Sitter spacetimes. These are
pp-wave extensions of three-dimensional anti-de Sitter space. We first perform
a careful analysis of the linearized stability of black holes in these
spacetimes. We find t... | [
{
"created": "Fri, 21 May 2010 20:41:28 GMT",
"version": "v1"
},
{
"created": "Fri, 13 Aug 2010 18:42:03 GMT",
"version": "v2"
}
] | 2010-11-30 | [
[
"Anninos",
"Dionysios",
""
],
[
"Compère",
"Geoffrey",
""
],
[
"de Buyl",
"Sophie",
""
],
[
"Detournay",
"Stéphane",
""
],
[
"Guica",
"Monica",
""
]
] | We initiate a comprehensive study of a set of solutions of topologically massive gravity known as null warped anti-de Sitter spacetimes. These are pp-wave extensions of three-dimensional anti-de Sitter space. We first perform a careful analysis of the linearized stability of black holes in these spacetimes. We find two... |
2204.06128 | Yucheng Yang | Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith,
and Kassem Fawaz | Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video
Conferencing Apps | to be published in the 22nd Privacy Enhancing Technologies Symposium
(PETS 2022) | null | null | null | cs.CR | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Video conferencing apps (VCAs) make it possible for previously private spaces
-- bedrooms, living rooms, and kitchens -- into semi-public extensions of the
office. For the most part, users have accepted these apps in their personal
space without much thought about the permission models that govern the use of
their pr... | [
{
"created": "Wed, 13 Apr 2022 01:26:26 GMT",
"version": "v1"
}
] | 2022-04-14 | [
[
"Yang",
"Yucheng",
""
],
[
"West",
"Jack",
""
],
[
"Thiruvathukal",
"George K.",
""
],
[
"Klingensmith",
"Neil",
""
],
[
"Fawaz",
"Kassem",
""
]
] | Video conferencing apps (VCAs) make it possible for previously private spaces -- bedrooms, living rooms, and kitchens -- into semi-public extensions of the office. For the most part, users have accepted these apps in their personal space without much thought about the permission models that govern the use of their priv... |
1306.1345 | Mamadou Moustapha Kant\'e | Binh-Minh Bui-Xuan and Mamadou Moustapha Kant\'e and Vincent Limouzy | A Note on Graphs of Linear Rank-Width 1 | 9 pages, 2 figures. Not to be published | null | null | null | cs.DM cs.DS math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that a connected graph has linear rank-width 1 if and only if it is
a distance-hereditary graph and its split decomposition tree is a path. An
immediate consequence is that one can decide in linear time whether a graph has
linear rank-width at most 1, and give an obstruction if not. Other immediate
consequen... | [
{
"created": "Thu, 6 Jun 2013 09:12:31 GMT",
"version": "v1"
},
{
"created": "Tue, 8 Jul 2014 11:38:27 GMT",
"version": "v2"
}
] | 2014-07-09 | [
[
"Bui-Xuan",
"Binh-Minh",
""
],
[
"Kanté",
"Mamadou Moustapha",
""
],
[
"Limouzy",
"Vincent",
""
]
] | We prove that a connected graph has linear rank-width 1 if and only if it is a distance-hereditary graph and its split decomposition tree is a path. An immediate consequence is that one can decide in linear time whether a graph has linear rank-width at most 1, and give an obstruction if not. Other immediate consequence... |
2312.15960 | Jingyao Li | Jingyao Li, Pengguang Chen, Jiaya Jia | MoTCoder: Elevating Large Language Models with Modular of Thought for
Challenging Programming Tasks | Model: https://huggingface.co/JingyaoLi/MoTCoder-15B-v1.0. Code:
https://github.com/dvlab-research/MoTCoder | null | null | null | cs.LG cs.PL cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large Language Models (LLMs) have showcased impressive capabilities in
handling straightforward programming tasks. However, their performance tends to
falter when confronted with more challenging programming problems. We observe
that conventional models often generate solutions as monolithic code blocks,
restricting ... | [
{
"created": "Tue, 26 Dec 2023 08:49:57 GMT",
"version": "v1"
},
{
"created": "Fri, 5 Jan 2024 10:33:32 GMT",
"version": "v2"
}
] | 2024-01-08 | [
[
"Li",
"Jingyao",
""
],
[
"Chen",
"Pengguang",
""
],
[
"Jia",
"Jiaya",
""
]
] | Large Language Models (LLMs) have showcased impressive capabilities in handling straightforward programming tasks. However, their performance tends to falter when confronted with more challenging programming problems. We observe that conventional models often generate solutions as monolithic code blocks, restricting th... |
2303.13638 | Mikhail Soutchanski | Mikhail Soutchanski and Ryan Young | Planning as Theorem Proving with Heuristics | Submitted for a review. Copyright (C) 2023 by Mikhail Soutchanski and
Ryan Young | null | null | null | cs.AI cs.LO | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Planning as theorem proving in situation calculus was abandoned 50 years ago
as an impossible project. But we have developed a Theorem Proving Lifted
Heuristic (TPLH) planner that searches for a plan in a tree of situations using
the A* search algorithm. It is controlled by a delete relaxation-based domain
independen... | [
{
"created": "Thu, 23 Mar 2023 19:52:30 GMT",
"version": "v1"
},
{
"created": "Sat, 1 Apr 2023 19:04:52 GMT",
"version": "v2"
},
{
"created": "Tue, 20 Jun 2023 02:59:28 GMT",
"version": "v3"
}
] | 2023-06-21 | [
[
"Soutchanski",
"Mikhail",
""
],
[
"Young",
"Ryan",
""
]
] | Planning as theorem proving in situation calculus was abandoned 50 years ago as an impossible project. But we have developed a Theorem Proving Lifted Heuristic (TPLH) planner that searches for a plan in a tree of situations using the A* search algorithm. It is controlled by a delete relaxation-based domain independent ... |
1005.3220 | Ruth Gregory | Eimear O'Callaghan, Sarah Chadburn, Ghazal Geshnizjani, Ruth Gregory,
and Ivonne Zavala | The effect of extra dimensions on gravity wave bursts from cosmic string
cusps | 33 pages, 8 figures, published version | JCAP 1009:013,2010 | 10.1088/1475-7516/2010/09/013 | DCPT-10/13, PI-cosmo-182 | hep-th astro-ph.CO gr-qc | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We explore the kinematical effect of having extra dimensions on the gravity
wave emission from cosmic strings. Additional dimensions both round off cusps,
and reduce the probability of their formation. We recompute the gravity wave
burst, taking into account these two factors, and find a potentially
significant dampi... | [
{
"created": "Tue, 18 May 2010 14:45:53 GMT",
"version": "v1"
},
{
"created": "Fri, 10 Sep 2010 11:08:47 GMT",
"version": "v2"
}
] | 2014-11-21 | [
[
"O'Callaghan",
"Eimear",
""
],
[
"Chadburn",
"Sarah",
""
],
[
"Geshnizjani",
"Ghazal",
""
],
[
"Gregory",
"Ruth",
""
],
[
"Zavala",
"Ivonne",
""
]
] | We explore the kinematical effect of having extra dimensions on the gravity wave emission from cosmic strings. Additional dimensions both round off cusps, and reduce the probability of their formation. We recompute the gravity wave burst, taking into account these two factors, and find a potentially significant damping... |
hep-th/9804002 | Conrad John Burden | C.J.Burden and P.C.Tjiang | Deconstructing the vertex Ansatz in three dimensional quantum
electrodynamics | 14 pages, 2 postscript figures, uses epsfig.sty | Phys.Rev.D58:085019,1998 | 10.1103/PhysRevD.58.085019 | ANU-HEP-1-98 | hep-th hep-ph | null | We consider the problem of designing an Ansatz for the fermion-photon vertex
function, using three-dimensional quantum electrodynamics as a test case. In
many existing studies, restrictions have been placed on the form of the vertex
Ansatz by making the unsubstantiated assumption that in the quenched, massless
limit ... | [
{
"created": "Wed, 1 Apr 1998 05:39:25 GMT",
"version": "v1"
}
] | 2009-08-11 | [
[
"Burden",
"C. J.",
""
],
[
"Tjiang",
"P. C.",
""
]
] | We consider the problem of designing an Ansatz for the fermion-photon vertex function, using three-dimensional quantum electrodynamics as a test case. In many existing studies, restrictions have been placed on the form of the vertex Ansatz by making the unsubstantiated assumption that in the quenched, massless limit th... |
2206.04397 | Rafael Menezes | Rafael Menezes, Daniel Moura, Helena Cavalcante, Rosiane de Freitas
and Lucas C. Cordeiro | ESBMC-Jimple: Verifying Kotlin Programs via Jimple Intermediate
Representation | ACM SIGSOFT International Symposium on Software Testing and Analysis
2022 | null | 10.1145/3533767.3543294 | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we describe and evaluate the first model checker for verifying
Kotlin programs through the Jimple intermediate representation. The verifier,
named ESBMC-Jimple, is built on top of the Efficient SMT-based Context-Bounded
Model Checker (ESBMC). It uses the Soot framework to obtain the Jimple IR,
represent... | [
{
"created": "Thu, 9 Jun 2022 10:18:53 GMT",
"version": "v1"
},
{
"created": "Wed, 20 Jul 2022 13:26:30 GMT",
"version": "v2"
}
] | 2022-07-21 | [
[
"Menezes",
"Rafael",
""
],
[
"Moura",
"Daniel",
""
],
[
"Cavalcante",
"Helena",
""
],
[
"de Freitas",
"Rosiane",
""
],
[
"Cordeiro",
"Lucas C.",
""
]
] | In this work, we describe and evaluate the first model checker for verifying Kotlin programs through the Jimple intermediate representation. The verifier, named ESBMC-Jimple, is built on top of the Efficient SMT-based Context-Bounded Model Checker (ESBMC). It uses the Soot framework to obtain the Jimple IR, representin... |
hep-th/0601190 | Beatriz de Carlos | A. Achucarro, B. de Carlos, J.A. Casas, L. Doplicher | deSitter vacua from uplifting D-terms in effective supergravities from
realistic strings | 22 pages, 4 figures | JHEP0606:014,2006 | 10.1088/1126-6708/2006/06/014 | IFT-UAM-CSIC-05-52 | hep-th hep-ph | null | We study the possibility of using the D-term associated to an anomalous U(1)
for the uplifting of AdS vacua (to dS or Minkowski vacua) in effective
supergravities arising from string theories, particularly in the type IIB
context put forward by Kachru, Kallosh, Linde and Trivedi (KKLT). We find a
gauge invariant form... | [
{
"created": "Wed, 25 Jan 2006 13:35:09 GMT",
"version": "v1"
}
] | 2009-11-11 | [
[
"Achucarro",
"A.",
""
],
[
"de Carlos",
"B.",
""
],
[
"Casas",
"J. A.",
""
],
[
"Doplicher",
"L.",
""
]
] | We study the possibility of using the D-term associated to an anomalous U(1) for the uplifting of AdS vacua (to dS or Minkowski vacua) in effective supergravities arising from string theories, particularly in the type IIB context put forward by Kachru, Kallosh, Linde and Trivedi (KKLT). We find a gauge invariant formul... |
0812.4973 | Neil Dickson | Neil G. Dickson | A Simple, Linear-Time Algorithm for x86 Jump Encoding | 5 pages | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of space-optimal jump encoding in the x86 instruction set, also
known as branch displacement optimization, is described, and a linear-time
algorithm is given that uses no complicated data structures, no recursion, and
no randomization. The only assumption is that there are no array declarations
whose size... | [
{
"created": "Mon, 29 Dec 2008 21:07:52 GMT",
"version": "v1"
}
] | 2009-09-29 | [
[
"Dickson",
"Neil G.",
""
]
] | The problem of space-optimal jump encoding in the x86 instruction set, also known as branch displacement optimization, is described, and a linear-time algorithm is given that uses no complicated data structures, no recursion, and no randomization. The only assumption is that there are no array declarations whose size d... |
1804.09756 | Hermann Boos | Hermann Boos, Artur Hutsalyuk, Khazret Nirov | On the calculation of the correlation functions of the
$\mathfrak{sl}_3$-model by means of the reduced qKZ equation | 30 pages, 10 figures | J. Phys. A: Math. Theor. 51 (2018) 445202 | 10.1088/1751-8121/aae1d6 | null | hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the reduced density matrix of the $\mathfrak{sl}_3$-invariant
fundamental exchange model by means of a novel reduced quantum
Knizhnik-Zamolodchikov equation. This gives us insight into the algebraic
structure and explicit results for correlation functions in the infinite chain
ranging over up to three sites.... | [
{
"created": "Wed, 25 Apr 2018 19:02:15 GMT",
"version": "v1"
},
{
"created": "Wed, 10 Oct 2018 15:26:55 GMT",
"version": "v2"
}
] | 2018-10-11 | [
[
"Boos",
"Hermann",
""
],
[
"Hutsalyuk",
"Artur",
""
],
[
"Nirov",
"Khazret",
""
]
] | We study the reduced density matrix of the $\mathfrak{sl}_3$-invariant fundamental exchange model by means of a novel reduced quantum Knizhnik-Zamolodchikov equation. This gives us insight into the algebraic structure and explicit results for correlation functions in the infinite chain ranging over up to three sites. |
hep-th/0311149 | Ichiro Oda | Ichiro Oda | A Relation Between Topological Quantum Field Theory and the Kodama State | 8 pages, no figures | null | null | EDO-EP-47 | hep-th gr-qc | null | We study a relation between topological quantum field theory and the Kodama
(Chern-Simons) state. It is shown that the Kodama (Chern-Simons) state
describes a topological state with unbroken diffeomorphism invariance in
Yang-Mills theory and Einstein's general relativity in four dimensions. We give
a clear explanatio... | [
{
"created": "Mon, 17 Nov 2003 18:50:07 GMT",
"version": "v1"
}
] | 2007-05-23 | [
[
"Oda",
"Ichiro",
""
]
] | We study a relation between topological quantum field theory and the Kodama (Chern-Simons) state. It is shown that the Kodama (Chern-Simons) state describes a topological state with unbroken diffeomorphism invariance in Yang-Mills theory and Einstein's general relativity in four dimensions. We give a clear explanation ... |
2005.06107 | Ali Borji | Ali Borji | Adversarial examples are useful too! | null | null | null | null | cs.CV cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep learning has come a long way and has enjoyed an unprecedented success.
Despite high accuracy, however, deep models are brittle and are easily fooled
by imperceptible adversarial perturbations. In contrast to common
inference-time attacks, Backdoor (\aka Trojan) attacks target the training
phase of model construc... | [
{
"created": "Wed, 13 May 2020 01:38:56 GMT",
"version": "v1"
}
] | 2020-05-14 | [
[
"Borji",
"Ali",
""
]
] | Deep learning has come a long way and has enjoyed an unprecedented success. Despite high accuracy, however, deep models are brittle and are easily fooled by imperceptible adversarial perturbations. In contrast to common inference-time attacks, Backdoor (\aka Trojan) attacks target the training phase of model constructi... |
2203.05340 | Zhuo Wang | Zhuo Wang, Zezheng Wang, Zitong Yu, Weihong Deng, Jiahong Li, Tingting
Gao, Zhongyuan Wang | Domain Generalization via Shuffled Style Assembly for Face Anti-Spoofing | Accepted by CVPR2022 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With diverse presentation attacks emerging continually, generalizable face
anti-spoofing (FAS) has drawn growing attention. Most existing methods
implement domain generalization (DG) on the complete representations. However,
different image statistics may have unique properties for the FAS tasks. In
this work, we sep... | [
{
"created": "Thu, 10 Mar 2022 12:44:05 GMT",
"version": "v1"
},
{
"created": "Fri, 11 Mar 2022 02:36:28 GMT",
"version": "v2"
},
{
"created": "Tue, 15 Mar 2022 07:54:42 GMT",
"version": "v3"
},
{
"created": "Fri, 18 Mar 2022 14:49:46 GMT",
"version": "v4"
}
] | 2022-03-21 | [
[
"Wang",
"Zhuo",
""
],
[
"Wang",
"Zezheng",
""
],
[
"Yu",
"Zitong",
""
],
[
"Deng",
"Weihong",
""
],
[
"Li",
"Jiahong",
""
],
[
"Gao",
"Tingting",
""
],
[
"Wang",
"Zhongyuan",
""
]
] | With diverse presentation attacks emerging continually, generalizable face anti-spoofing (FAS) has drawn growing attention. Most existing methods implement domain generalization (DG) on the complete representations. However, different image statistics may have unique properties for the FAS tasks. In this work, we separ... |
1908.02737 | Jennie Traschen | Yue Qiu and Jennie Traschen | Black Hole and Cosmological Particle Production in Schwarzschild de
Sitter | 47 pages; v2 - references added, typos fixed | null | 10.1088/1361-6382/ab8bba | null | hep-th gr-qc | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We compute the spectra and total fluxes of quantum mechanically produced
particles crossing the black hole and cosmological horizons in Schwarzschild de
Sitter (SdS). Particle states are defined with respect to well-behaved, Kruskal
coordinates near the horizons, and as a consequence we find that these spectra
are ge... | [
{
"created": "Wed, 7 Aug 2019 17:27:13 GMT",
"version": "v1"
},
{
"created": "Mon, 26 Aug 2019 16:12:05 GMT",
"version": "v2"
}
] | 2020-08-26 | [
[
"Qiu",
"Yue",
""
],
[
"Traschen",
"Jennie",
""
]
] | We compute the spectra and total fluxes of quantum mechanically produced particles crossing the black hole and cosmological horizons in Schwarzschild de Sitter (SdS). Particle states are defined with respect to well-behaved, Kruskal coordinates near the horizons, and as a consequence we find that these spectra are gene... |
1206.3785 | Rizos John | J. Rizos (Univ. of Ioannina), N.Tetradis (Univ. of Athens) and G.
Tsolias (Univ. of Athens) | Classicalization as a tunnelling phenomenon | 21 pages, 10 figures, references added | null | 10.1007/JHEP08(2012)054 | null | hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss the "wrong"-sign DBI theory as a prototype for classicalization.
The theory lacks a UV completion and has to be defined with a fundamental UV
cutoff. We study a quantum-mechanical toy model with similar properties. The
model has a fundamental length scale and all physical states have momenta below
the inve... | [
{
"created": "Sun, 17 Jun 2012 19:43:25 GMT",
"version": "v1"
},
{
"created": "Wed, 4 Jul 2012 17:18:57 GMT",
"version": "v2"
}
] | 2015-06-05 | [
[
"Rizos",
"J.",
"",
"Univ. of Ioannina"
],
[
"Tetradis",
"N.",
"",
"Univ. of Athens"
],
[
"Tsolias",
"G.",
"",
"Univ. of Athens"
]
] | We discuss the "wrong"-sign DBI theory as a prototype for classicalization. The theory lacks a UV completion and has to be defined with a fundamental UV cutoff. We study a quantum-mechanical toy model with similar properties. The model has a fundamental length scale and all physical states have momenta below the invers... |
hep-th/0201157 | Dirk Kreimer | Alain Connes and Dirk Kreimer | Insertion and Elimination: the doubly infinite Lie algebra of Feynman
graphs | 21 pages, eps figures | Annales Henri Poincare 3 (2002) 411-433 | 10.1007/s00023-002-8622-9 | BUCMP/02-01 | hep-th math.QA | null | The Lie algebra of Feynman graphs gives rise to two natural representations,
acting as derivations on the commutative Hopf algebra of Feynman graphs, by
creating or eliminating subgraphs. Insertions and eliminations do not commute,
but rather establish a larger Lie algebra of derivations which we here
determine.
| [
{
"created": "Sun, 20 Jan 2002 22:10:38 GMT",
"version": "v1"
},
{
"created": "Thu, 24 Jan 2002 20:24:00 GMT",
"version": "v2"
}
] | 2015-06-26 | [
[
"Connes",
"Alain",
""
],
[
"Kreimer",
"Dirk",
""
]
] | The Lie algebra of Feynman graphs gives rise to two natural representations, acting as derivations on the commutative Hopf algebra of Feynman graphs, by creating or eliminating subgraphs. Insertions and eliminations do not commute, but rather establish a larger Lie algebra of derivations which we here determine. |
1111.6912 | Michael Gutperle | Marco Chiodaroli, Eric D'Hoker, Michael Gutperle | Simple holographic duals to boundary CFTs | 37 pages, pdflatex, 5 figures | null | 10.1007/JHEP02(2012)005 | IGC-11/11-2 | hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | By relaxing the regularity conditions imposed in arXiv:1107.1722 on half-BPS
solutions to six-dimensional Type~4b supergravity, we enlarge the space of
solutions to include two new half-BPS configurations, which we refer to as the
\kap\ and the \funnel. We give evidence that the \kap\ and \funnel\ can be
interpreted ... | [
{
"created": "Tue, 29 Nov 2011 17:34:02 GMT",
"version": "v1"
}
] | 2015-06-03 | [
[
"Chiodaroli",
"Marco",
""
],
[
"D'Hoker",
"Eric",
""
],
[
"Gutperle",
"Michael",
""
]
] | By relaxing the regularity conditions imposed in arXiv:1107.1722 on half-BPS solutions to six-dimensional Type~4b supergravity, we enlarge the space of solutions to include two new half-BPS configurations, which we refer to as the \kap\ and the \funnel. We give evidence that the \kap\ and \funnel\ can be interpreted as... |
1112.2109 | Beeram Sarala | B. Sarala and D.S. Venkateswarulu | MC CDMA PAPR Reduction Techniques using Discrete Transforms and
Companding | 18 pages,16 figures; International journal of Distributed and
Parallel Systems volume 2, number 6, Novmber 2011,ISSN:0976-9757 | null | null | 55bs | cs.NI | http://creativecommons.org/licenses/by-nc-sa/3.0/ | High Peak to Average Power Ratio (PAPR) of the transmitted signal is a
serious problem in multicarrier modulation systems. In this paper a new
technique for reduction in PAPR of the Multicarrier Code Division Multiple
Access (MC CDMA) signals based on combining the Discrete Transform either
Discrete Cosine Transform ... | [
{
"created": "Fri, 9 Dec 2011 14:32:46 GMT",
"version": "v1"
}
] | 2011-12-12 | [
[
"Sarala",
"B.",
""
],
[
"Venkateswarulu",
"D. S.",
""
]
] | High Peak to Average Power Ratio (PAPR) of the transmitted signal is a serious problem in multicarrier modulation systems. In this paper a new technique for reduction in PAPR of the Multicarrier Code Division Multiple Access (MC CDMA) signals based on combining the Discrete Transform either Discrete Cosine Transform (D... |
2308.16862 | Otmar Ertl | Otmar Ertl | UltraLogLog: A Practical and More Space-Efficient Alternative to
HyperLogLog for Approximate Distinct Counting | 25 pages, extended version, accepted at VLDB 2024 | null | 10.14778/3654621.3654632 | null | cs.DS cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Since its invention HyperLogLog has become the standard algorithm for
approximate distinct counting. Due to its space efficiency and suitability for
distributed systems, it is widely used and also implemented in numerous
databases. This work presents UltraLogLog, which shares the same practical
properties as HyperLog... | [
{
"created": "Thu, 31 Aug 2023 17:04:34 GMT",
"version": "v1"
},
{
"created": "Fri, 1 Sep 2023 20:21:10 GMT",
"version": "v2"
},
{
"created": "Tue, 26 Sep 2023 07:59:43 GMT",
"version": "v3"
},
{
"created": "Mon, 15 Jan 2024 15:28:12 GMT",
"version": "v4"
},
{
"cr... | 2024-06-11 | [
[
"Ertl",
"Otmar",
""
]
] | Since its invention HyperLogLog has become the standard algorithm for approximate distinct counting. Due to its space efficiency and suitability for distributed systems, it is widely used and also implemented in numerous databases. This work presents UltraLogLog, which shares the same practical properties as HyperLogLo... |
1502.07014 | James Currie | James D. Currie, Narad Rampersad | Growth rate of binary words avoiding $xxx^R$ | null | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider the set of those binary words with no non-empty factors of the form
$xxx^R$. Du, Mousavi, Schaeffer, and Shallit asked whether this set of words
grows polynomially or exponentially with length. In this paper, we demonstrate
the existence of upper and lower bounds on the number of such words of length
$n$, wh... | [
{
"created": "Wed, 25 Feb 2015 00:07:43 GMT",
"version": "v1"
}
] | 2015-02-26 | [
[
"Currie",
"James D.",
""
],
[
"Rampersad",
"Narad",
""
]
] | Consider the set of those binary words with no non-empty factors of the form $xxx^R$. Du, Mousavi, Schaeffer, and Shallit asked whether this set of words grows polynomially or exponentially with length. In this paper, we demonstrate the existence of upper and lower bounds on the number of such words of length $n$, wher... |
hep-th/0204192 | Fernando T. C. Brandt | F. T. Brandt, Ashok Das, J. Frenkel, D. G. C. McKeon and J. C. Taylor | Transport equation and hard thermal loops in noncommutative Yang-Mills
theory | 10 pages (revtex4) | Phys.Rev.D66:045011,2002 | 10.1103/PhysRevD.66.045011 | null | hep-th hep-ph | null | We show that the high temperature limit of the noncommutative thermal
Yang-Mills theory can be directly obtained from the Boltzmann transport
equation of classical particles. As an illustration of the simplicity of the
Boltzmann method, we evaluate the two and the three-point gluon functions in
the noncommutative U(N... | [
{
"created": "Tue, 23 Apr 2002 19:36:44 GMT",
"version": "v1"
}
] | 2008-11-26 | [
[
"Brandt",
"F. T.",
""
],
[
"Das",
"Ashok",
""
],
[
"Frenkel",
"J.",
""
],
[
"McKeon",
"D. G. C.",
""
],
[
"Taylor",
"J. C.",
""
]
] | We show that the high temperature limit of the noncommutative thermal Yang-Mills theory can be directly obtained from the Boltzmann transport equation of classical particles. As an illustration of the simplicity of the Boltzmann method, we evaluate the two and the three-point gluon functions in the noncommutative U(N) ... |
2108.11206 | Robert Pell | Robert Pell, Sotiris Moschoyiannis, Emmanouil Panaousis, Ryan
Heartfield | Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE
ATT&CK | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | This article discusses how the gap between early 5G network threat
assessments and an adversarial Tactics, Techniques, Procedures (TTPs) knowledge
base for future use in the MITRE ATT&CK threat modelling framework can be
bridged. We identify knowledge gaps in the existing framework for key 5G
technology enablers such... | [
{
"created": "Wed, 25 Aug 2021 12:47:33 GMT",
"version": "v1"
},
{
"created": "Thu, 26 Aug 2021 10:38:35 GMT",
"version": "v2"
},
{
"created": "Wed, 1 Sep 2021 09:49:11 GMT",
"version": "v3"
},
{
"created": "Thu, 14 Oct 2021 11:42:45 GMT",
"version": "v4"
}
] | 2021-10-15 | [
[
"Pell",
"Robert",
""
],
[
"Moschoyiannis",
"Sotiris",
""
],
[
"Panaousis",
"Emmanouil",
""
],
[
"Heartfield",
"Ryan",
""
]
] | This article discusses how the gap between early 5G network threat assessments and an adversarial Tactics, Techniques, Procedures (TTPs) knowledge base for future use in the MITRE ATT&CK threat modelling framework can be bridged. We identify knowledge gaps in the existing framework for key 5G technology enablers such a... |
2206.15255 | Yuehao Wang | Yuehao Wang, Yonghao Long, Siu Hin Fan, Qi Dou | Neural Rendering for Stereo 3D Reconstruction of Deformable Tissues in
Robotic Surgery | 11 pages, 4 figures, conference | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Reconstruction of the soft tissues in robotic surgery from endoscopic stereo
videos is important for many applications such as intra-operative navigation
and image-guided robotic surgery automation. Previous works on this task mainly
rely on SLAM-based approaches, which struggle to handle complex surgical
scenes. Ins... | [
{
"created": "Thu, 30 Jun 2022 13:06:27 GMT",
"version": "v1"
}
] | 2022-07-01 | [
[
"Wang",
"Yuehao",
""
],
[
"Long",
"Yonghao",
""
],
[
"Fan",
"Siu Hin",
""
],
[
"Dou",
"Qi",
""
]
] | Reconstruction of the soft tissues in robotic surgery from endoscopic stereo videos is important for many applications such as intra-operative navigation and image-guided robotic surgery automation. Previous works on this task mainly rely on SLAM-based approaches, which struggle to handle complex surgical scenes. Inspi... |
1102.0634 | D\v{z}enan Zuki\'c | D\v{z}enan Zuki\'c and Jan Egger and Miriam H. A. Bauer and Daniela
Kuhnt and Barbara Carl and Bernd Freisleben and Andreas Kolb and Christopher
Nimsky | Glioblastoma Multiforme Segmentation in MRI Data with a Balloon
Inflation Approach | 4 pages, 4 figures, Proc. of the 6th Russian-Bavarian Conference on
Bio-Medical Engineering | null | null | null | cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Gliomas are the most common primary brain tumors, evolving from the cerebral
supportive cells. For clinical follow-up, the evaluation of the preoperative
tumor volume is essential. Volumetric assessment of tumor volume with manual
segmentation of its outlines is a time-consuming process that can be overcome
with the ... | [
{
"created": "Thu, 3 Feb 2011 10:00:15 GMT",
"version": "v1"
}
] | 2011-02-04 | [
[
"Zukić",
"Dženan",
""
],
[
"Egger",
"Jan",
""
],
[
"Bauer",
"Miriam H. A.",
""
],
[
"Kuhnt",
"Daniela",
""
],
[
"Carl",
"Barbara",
""
],
[
"Freisleben",
"Bernd",
""
],
[
"Kolb",
"Andreas",
""
],
[
"... | Gliomas are the most common primary brain tumors, evolving from the cerebral supportive cells. For clinical follow-up, the evaluation of the preoperative tumor volume is essential. Volumetric assessment of tumor volume with manual segmentation of its outlines is a time-consuming process that can be overcome with the he... |
2312.05731 | Brett McInnes | Brett McInnes | Evidence that the Rate of Evolution of a Black Hole Interior Has a
Holographic Dual | Much improved discussion of the thermodynamics in the zero angular
momentum case, 27 pages, 8 figures | null | null | null | hep-th gr-qc | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A ``large'' AdS black hole can attain equilibrium with its own Hawking
radiation, and in that condition it is thought to be dual to a strongly coupled
field theory, also at equilibrium. But the interior of the black hole is by no
means static: the geometry of spatial sections lying inside the event horizon
evolves at... | [
{
"created": "Sun, 10 Dec 2023 02:28:10 GMT",
"version": "v1"
},
{
"created": "Tue, 19 Mar 2024 12:37:07 GMT",
"version": "v2"
}
] | 2024-03-20 | [
[
"McInnes",
"Brett",
""
]
] | A ``large'' AdS black hole can attain equilibrium with its own Hawking radiation, and in that condition it is thought to be dual to a strongly coupled field theory, also at equilibrium. But the interior of the black hole is by no means static: the geometry of spatial sections lying inside the event horizon evolves at s... |
2106.06657 | Zhili Feng | Zhili Feng, Shaobo Han, Simon S. Du | Provable Adaptation across Multiway Domains via Representation Learning | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies zero-shot domain adaptation where each domain is indexed
on a multi-dimensional array, and we only have data from a small subset of
domains. Our goal is to produce predictors that perform well on \emph{unseen}
domains. We propose a model which consists of a domain-invariant latent
representation la... | [
{
"created": "Sat, 12 Jun 2021 01:15:23 GMT",
"version": "v1"
}
] | 2021-06-15 | [
[
"Feng",
"Zhili",
""
],
[
"Han",
"Shaobo",
""
],
[
"Du",
"Simon S.",
""
]
] | This paper studies zero-shot domain adaptation where each domain is indexed on a multi-dimensional array, and we only have data from a small subset of domains. Our goal is to produce predictors that perform well on \emph{unseen} domains. We propose a model which consists of a domain-invariant latent representation laye... |
1204.4658 | Audrey Mithani | Audrey Mithani, Alexander Vilenkin | Did the universe have a beginning? | 6 pages, 2 figures. To appear in the Proceedings of the 10th
Incternational Conference on Gravitation, Astrophysics and Cosmology,
Quy-Nhon, Vietnam, December 2011 | null | null | null | hep-th gr-qc | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss three candidate scenarios which seem to allow the possibility that
the universe could have existed forever with no initial singularity: eternal
infation, cyclic evolution, and the emergent universe. The first two of these
scenarios are geodesically incomplete to the past, and thus cannot describe a
univers... | [
{
"created": "Fri, 20 Apr 2012 15:51:42 GMT",
"version": "v1"
}
] | 2012-04-23 | [
[
"Mithani",
"Audrey",
""
],
[
"Vilenkin",
"Alexander",
""
]
] | We discuss three candidate scenarios which seem to allow the possibility that the universe could have existed forever with no initial singularity: eternal infation, cyclic evolution, and the emergent universe. The first two of these scenarios are geodesically incomplete to the past, and thus cannot describe a universe ... |
2202.07792 | Md Ferdous Pervej | Md Ferdous Pervej, Richeng Jin, Shih-Chun Lin, Huaiyu Dai | Efficient Content Delivery in User-Centric and Cache-Enabled Vehicular
Edge Networks with Deadline-Constrained Heterogeneous Demands | Under review for possible publication in IEEE Transactions on
Vehicular Technology | null | null | null | cs.NI cs.SY eess.SY | http://creativecommons.org/licenses/by/4.0/ | Modern connected vehicles (CVs) frequently require diverse types of content
for mission-critical decision-making and onboard users' entertainment. These
contents are required to be fully delivered to the requester CVs within
stringent deadlines that the existing radio access technology (RAT) solutions
may fail to ens... | [
{
"created": "Tue, 15 Feb 2022 23:46:35 GMT",
"version": "v1"
},
{
"created": "Sat, 1 Oct 2022 20:13:18 GMT",
"version": "v2"
},
{
"created": "Thu, 30 Mar 2023 02:42:50 GMT",
"version": "v3"
}
] | 2023-03-31 | [
[
"Pervej",
"Md Ferdous",
""
],
[
"Jin",
"Richeng",
""
],
[
"Lin",
"Shih-Chun",
""
],
[
"Dai",
"Huaiyu",
""
]
] | Modern connected vehicles (CVs) frequently require diverse types of content for mission-critical decision-making and onboard users' entertainment. These contents are required to be fully delivered to the requester CVs within stringent deadlines that the existing radio access technology (RAT) solutions may fail to ensur... |
2011.11760 | Gabriel Huang | Gabriel Huang, Bo Pang, Zhenhai Zhu, Clara Rivera, Radu Soricut | Multimodal Pretraining for Dense Video Captioning | AACL-IJCNLP 2020 | null | null | null | cs.CV cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning specific hands-on skills such as cooking, car maintenance, and home
repairs increasingly happens via instructional videos. The user experience with
such videos is known to be improved by meta-information such as time-stamped
annotations for the main steps involved. Generating such annotations
automatically i... | [
{
"created": "Tue, 10 Nov 2020 21:49:14 GMT",
"version": "v1"
}
] | 2020-11-25 | [
[
"Huang",
"Gabriel",
""
],
[
"Pang",
"Bo",
""
],
[
"Zhu",
"Zhenhai",
""
],
[
"Rivera",
"Clara",
""
],
[
"Soricut",
"Radu",
""
]
] | Learning specific hands-on skills such as cooking, car maintenance, and home repairs increasingly happens via instructional videos. The user experience with such videos is known to be improved by meta-information such as time-stamped annotations for the main steps involved. Generating such annotations automatically is ... |
2402.13487 | Zhiwei Wang | Zhiwei Wang, Huazheng Wang, Hongning Wang | Stealthy Adversarial Attacks on Stochastic Multi-Armed Bandits | null | null | null | null | cs.LG cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Adversarial attacks against stochastic multi-armed bandit (MAB) algorithms
have been extensively studied in the literature. In this work, we focus on
reward poisoning attacks and find most existing attacks can be easily detected
by our proposed detection method based on the test of homogeneity, due to their
aggressiv... | [
{
"created": "Wed, 21 Feb 2024 02:54:00 GMT",
"version": "v1"
}
] | 2024-02-22 | [
[
"Wang",
"Zhiwei",
""
],
[
"Wang",
"Huazheng",
""
],
[
"Wang",
"Hongning",
""
]
] | Adversarial attacks against stochastic multi-armed bandit (MAB) algorithms have been extensively studied in the literature. In this work, we focus on reward poisoning attacks and find most existing attacks can be easily detected by our proposed detection method based on the test of homogeneity, due to their aggressive ... |
hep-th/0008073 | Vatche Sahakian | Vatche Sahakian | The phases of 2D NCOS | 27 pages, 4 figures; v2: reference added; v3: error in argument on
page 6 corrected | JHEP 0009 (2000) 025 | 10.1088/1126-6708/2000/09/025 | CLNS 00/1684 | hep-th | null | We study the phases of the 1+1 dimensional Non-Commutative Open String theory
on a circle. We find that the length scale of non-commutativity increases at
strong coupling, the coupling in turn being dressed by a power of D-string
charge. The system is stringy at around this length scale, with dynamics
involving an in... | [
{
"created": "Tue, 8 Aug 2000 17:26:47 GMT",
"version": "v1"
},
{
"created": "Wed, 9 Aug 2000 14:59:02 GMT",
"version": "v2"
},
{
"created": "Tue, 15 Aug 2000 14:01:35 GMT",
"version": "v3"
}
] | 2009-10-31 | [
[
"Sahakian",
"Vatche",
""
]
] | We study the phases of the 1+1 dimensional Non-Commutative Open String theory on a circle. We find that the length scale of non-commutativity increases at strong coupling, the coupling in turn being dressed by a power of D-string charge. The system is stringy at around this length scale, with dynamics involving an inte... |
1910.14554 | A. Yu. Petrov | A. C. Lehum, J. R. Nascimento, A. Yu. Petrov | Perturbative aspects of mass-deformed N=3 Chern-Simons-matter theory | 11 pages | Phys. Rev. D 101, 065010 (2020) | 10.1103/PhysRevD.101.065010 | null | hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Within the superfield formalism, we calculate the two-point functions and the
effective potential for the mass-deformed ${\cal N}=3$ Chern-Simons-matter
theory and discuss the related renormalization group issues.
| [
{
"created": "Thu, 31 Oct 2019 15:53:32 GMT",
"version": "v1"
}
] | 2020-03-23 | [
[
"Lehum",
"A. C.",
""
],
[
"Nascimento",
"J. R.",
""
],
[
"Petrov",
"A. Yu.",
""
]
] | Within the superfield formalism, we calculate the two-point functions and the effective potential for the mass-deformed ${\cal N}=3$ Chern-Simons-matter theory and discuss the related renormalization group issues. |
2303.15571 | Ruyi Ding | Ruyi Ding, Cheng Gongye, Siyue Wang, Aidong Ding, Yunsi Fei | EMShepherd: Detecting Adversarial Samples via Side-channel Leakage | null | null | null | null | cs.CR cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Deep Neural Networks (DNN) are vulnerable to adversarial perturbations-small
changes crafted deliberately on the input to mislead the model for wrong
predictions. Adversarial attacks have disastrous consequences for deep
learning-empowered critical applications. Existing defense and detection
techniques both require ... | [
{
"created": "Mon, 27 Mar 2023 19:38:55 GMT",
"version": "v1"
}
] | 2023-03-29 | [
[
"Ding",
"Ruyi",
""
],
[
"Gongye",
"Cheng",
""
],
[
"Wang",
"Siyue",
""
],
[
"Ding",
"Aidong",
""
],
[
"Fei",
"Yunsi",
""
]
] | Deep Neural Networks (DNN) are vulnerable to adversarial perturbations-small changes crafted deliberately on the input to mislead the model for wrong predictions. Adversarial attacks have disastrous consequences for deep learning-empowered critical applications. Existing defense and detection techniques both require ex... |
2205.05492 | Jasmin Grosinger | Sera Buyukgoz, Jasmin Grosinger, Mohamed Chetouani and Alessandro
Saffiotti | Two ways to make your robot proactive: reasoning about human intentions,
or reasoning about possible futures | 20 pages, 1-column, 4 figures | null | null | null | cs.AI cs.RO | http://creativecommons.org/licenses/by/4.0/ | Robots sharing their space with humans need to be proactive in order to be
helpful. Proactive robots are able to act on their own initiative in an
anticipatory way to benefit humans. In this work, we investigate two ways to
make robots proactive. One way is to recognize humans' intentions and to act to
fulfill them, ... | [
{
"created": "Wed, 11 May 2022 13:33:14 GMT",
"version": "v1"
}
] | 2022-05-12 | [
[
"Buyukgoz",
"Sera",
""
],
[
"Grosinger",
"Jasmin",
""
],
[
"Chetouani",
"Mohamed",
""
],
[
"Saffiotti",
"Alessandro",
""
]
] | Robots sharing their space with humans need to be proactive in order to be helpful. Proactive robots are able to act on their own initiative in an anticipatory way to benefit humans. In this work, we investigate two ways to make robots proactive. One way is to recognize humans' intentions and to act to fulfill them, li... |
2112.13076 | Somali Chaterji | Jayoung Lee, PengCheng Wang, Ran Xu, Venkat Dasari, Noah Weston, Yin
Li, Saurabh Bagchi, and Somali Chaterji | Virtuoso: Video-based Intelligence for real-time tuning on SOCs | 28 pages, 15 figures, 4 tables, ACM-TODAES | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Efficient and adaptive computer vision systems have been proposed to make
computer vision tasks, such as image classification and object detection,
optimized for embedded or mobile devices. These solutions, quite recent in
their origin, focus on optimizing the model (a deep neural network, DNN) or the
system by desig... | [
{
"created": "Fri, 24 Dec 2021 14:47:41 GMT",
"version": "v1"
}
] | 2021-12-28 | [
[
"Lee",
"Jayoung",
""
],
[
"Wang",
"PengCheng",
""
],
[
"Xu",
"Ran",
""
],
[
"Dasari",
"Venkat",
""
],
[
"Weston",
"Noah",
""
],
[
"Li",
"Yin",
""
],
[
"Bagchi",
"Saurabh",
""
],
[
"Chaterji",
"S... | Efficient and adaptive computer vision systems have been proposed to make computer vision tasks, such as image classification and object detection, optimized for embedded or mobile devices. These solutions, quite recent in their origin, focus on optimizing the model (a deep neural network, DNN) or the system by designi... |
2003.12256 | Ichiro Oda | Ichiro Oda | Planck scale from broken local conformal invariance in Weyl geometry | 17 pages; Contribution to the Proceedings of the Corfu Summer
Institute 2019, 31 Aug - 25 Sep 2019, Corfu, Greece. arXiv admin note:
substantial text overlap with arXiv:1903.09309 | null | null | DPUR/TH/67 | hep-th gr-qc hep-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that in a quadratic gravity based on Weyl's conformal geometry, the
Planck mass scale can be generated from quantum effects of the gravitational
field and the Weyl gauge field via the Coleman-Weinberg mechanism where a local
scale symmetry is broken. At the same time, the Weyl gauge field acquires a
mass less... | [
{
"created": "Fri, 27 Mar 2020 07:00:17 GMT",
"version": "v1"
}
] | 2020-03-30 | [
[
"Oda",
"Ichiro",
""
]
] | We show that in a quadratic gravity based on Weyl's conformal geometry, the Planck mass scale can be generated from quantum effects of the gravitational field and the Weyl gauge field via the Coleman-Weinberg mechanism where a local scale symmetry is broken. At the same time, the Weyl gauge field acquires a mass less t... |
2110.13156 | Wei Gu | Wei Gu | Vacuum Structures Revisited | 17 pages; V2: references added; V3:Improved English, Corrected typos,
added additional details in sections 2.3 and 4 | null | null | null | hep-th math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the relationship between the higher symmetry and the dynamical
decomposition in supersymmetric gauge theory in various dimensions by studying
the semi-classical potential energy. We observe that besides the scalar moduli
we shall also include the field strength $F_{0\cdots d}$ in the vacuum moduli
in the ... | [
{
"created": "Mon, 25 Oct 2021 18:00:01 GMT",
"version": "v1"
},
{
"created": "Sun, 21 Nov 2021 18:35:28 GMT",
"version": "v2"
},
{
"created": "Sat, 4 Dec 2021 22:51:44 GMT",
"version": "v3"
}
] | 2021-12-07 | [
[
"Gu",
"Wei",
""
]
] | We consider the relationship between the higher symmetry and the dynamical decomposition in supersymmetric gauge theory in various dimensions by studying the semi-classical potential energy. We observe that besides the scalar moduli we shall also include the field strength $F_{0\cdots d}$ in the vacuum moduli in the 1+... |
2206.08488 | Heewon Kim | Heewon Kim and Kyoung Mu Lee | Controllable Image Enhancement | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Editing flat-looking images into stunning photographs requires skill and
time. Automated image enhancement algorithms have attracted increased interest
by generating high-quality images without user interaction. However, the
quality assessment of a photograph is subjective. Even in tone and color
adjustments, a singl... | [
{
"created": "Thu, 16 Jun 2022 23:54:53 GMT",
"version": "v1"
}
] | 2022-06-20 | [
[
"Kim",
"Heewon",
""
],
[
"Lee",
"Kyoung Mu",
""
]
] | Editing flat-looking images into stunning photographs requires skill and time. Automated image enhancement algorithms have attracted increased interest by generating high-quality images without user interaction. However, the quality assessment of a photograph is subjective. Even in tone and color adjustments, a single ... |
2305.07455 | Yu-Kuan Fu | Yu-Kuan Fu, Liang-Hsuan Tseng, Jiatong Shi, Chen-An Li, Tsu-Yuan Hsu,
Shinji Watanabe, Hung-yi Lee | Improving Cascaded Unsupervised Speech Translation with Denoising
Back-translation | null | null | null | null | cs.CL cs.SD eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most of the speech translation models heavily rely on parallel data, which is
hard to collect especially for low-resource languages. To tackle this issue, we
propose to build a cascaded speech translation system without leveraging any
kind of paired data. We use fully unpaired data to train our unsupervised
systems a... | [
{
"created": "Fri, 12 May 2023 13:07:51 GMT",
"version": "v1"
}
] | 2023-05-15 | [
[
"Fu",
"Yu-Kuan",
""
],
[
"Tseng",
"Liang-Hsuan",
""
],
[
"Shi",
"Jiatong",
""
],
[
"Li",
"Chen-An",
""
],
[
"Hsu",
"Tsu-Yuan",
""
],
[
"Watanabe",
"Shinji",
""
],
[
"Lee",
"Hung-yi",
""
]
] | Most of the speech translation models heavily rely on parallel data, which is hard to collect especially for low-resource languages. To tackle this issue, we propose to build a cascaded speech translation system without leveraging any kind of paired data. We use fully unpaired data to train our unsupervised systems and... |
hep-th/9906188 | null | Massimo Bianchi, Stefano Kovacs, Giancarlo Rossi and Yassen S. Stanev
(Universita` di Roma ``Tor Vergata'') | On the logarithmic behaviour in N=4 SYM theory | 18 pages, Latex | JHEP 9908 (1999) 020 | 10.1088/1126-6708/1999/08/020 | ROM2F/99/9 | hep-th | null | We show that the logarithmic behaviour seen in perturbative and non
perturbative contributions to Green functions of gauge-invariant composite
operators in N=4 SYM with SU(N) gauge group can be consistently interpreted in
terms of anomalous dimensions of unprotected operators in long multiplets of
the superconformal ... | [
{
"created": "Thu, 24 Jun 1999 15:41:56 GMT",
"version": "v1"
}
] | 2009-10-31 | [
[
"Bianchi",
"Massimo",
"",
"Universita` di Roma ``Tor Vergata''"
],
[
"Kovacs",
"Stefano",
"",
"Universita` di Roma ``Tor Vergata''"
],
[
"Rossi",
"Giancarlo",
"",
"Universita` di Roma ``Tor Vergata''"
],
[
"Stanev",
"Yassen S.",
"",
"Univ... | We show that the logarithmic behaviour seen in perturbative and non perturbative contributions to Green functions of gauge-invariant composite operators in N=4 SYM with SU(N) gauge group can be consistently interpreted in terms of anomalous dimensions of unprotected operators in long multiplets of the superconformal gr... |
hep-th/0201094 | Vincent G. J. Rodgers | A. Boveia, S. James Gates, Bjorg A. Larson, W.D. Linch, Dagny M.
Kimberly, J.A. Phillips, V.G.J. Rodgers | Chiral Supergravitons Interacting with a 0-Brane N-Extended NSR
Super-Virasoro Group | PACS: 04.65.+e, 11.15.-q, 11.25.-w, 12.60.J | Phys.Lett. B529 (2002) 222-232 | 10.1016/S0370-2693(02)01256-X | null | hep-th | null | We continue the development of the actions, S_{AFF}, by examining the cases
where there are N fermionic degrees of freedom associated with a 0-brane. These
actions correspond to the interaction of the N-extended super Virasoro algebra
with the supergraviton and the associated SO(N) gauge field that accompanies
the su... | [
{
"created": "Mon, 14 Jan 2002 22:19:41 GMT",
"version": "v1"
}
] | 2009-11-07 | [
[
"Boveia",
"A.",
""
],
[
"Gates",
"S. James",
""
],
[
"Larson",
"Bjorg A.",
""
],
[
"Linch",
"W. D.",
""
],
[
"Kimberly",
"Dagny M.",
""
],
[
"Phillips",
"J. A.",
""
],
[
"Rodgers",
"V. G. J.",
""
]
] | We continue the development of the actions, S_{AFF}, by examining the cases where there are N fermionic degrees of freedom associated with a 0-brane. These actions correspond to the interaction of the N-extended super Virasoro algebra with the supergraviton and the associated SO(N) gauge field that accompanies the supe... |
2107.09540 | Andrew Melnik | Andrew Melnik, Augustin Harter, Christian Limberg, Krishan Rana, Niko
Suenderhauf, Helge Ritter | Critic Guided Segmentation of Rewarding Objects in First-Person Views | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | This work discusses a learning approach to mask rewarding objects in images
using sparse reward signals from an imitation learning dataset. For that, we
train an Hourglass network using only feedback from a critic model. The
Hourglass network learns to produce a mask to decrease the critic's score of a
high score ima... | [
{
"created": "Tue, 20 Jul 2021 14:54:43 GMT",
"version": "v1"
}
] | 2021-07-21 | [
[
"Melnik",
"Andrew",
""
],
[
"Harter",
"Augustin",
""
],
[
"Limberg",
"Christian",
""
],
[
"Rana",
"Krishan",
""
],
[
"Suenderhauf",
"Niko",
""
],
[
"Ritter",
"Helge",
""
]
] | This work discusses a learning approach to mask rewarding objects in images using sparse reward signals from an imitation learning dataset. For that, we train an Hourglass network using only feedback from a critic model. The Hourglass network learns to produce a mask to decrease the critic's score of a high score image... |
hep-th/9906194 | Steven Gubser | D.Z. Freedman, S.S. Gubser, K. Pilch, and N.P. Warner | Continuous distributions of D3-branes and gauged supergravity | 19 pages, two figures, latex. v2: reference added, small corrections.
v3: corrected unbounded spectrum error | JHEP 0007:038,2000 | 10.1088/1126-6708/2000/07/038 | CERN-TH/99-189, HUTP-99/A029, MIT-CTP-2877, USC-99/03 | hep-th | null | States on the Coulomb branch of N=4 super-Yang-Mills theory are studied from
the point of view of gauged supergravity in five dimensions. These
supersymmetric solutions provide examples of consistent truncation from type
IIB supergravity in ten dimensions. A mass gap for states created by local
operators and perfect ... | [
{
"created": "Thu, 24 Jun 1999 22:41:17 GMT",
"version": "v1"
},
{
"created": "Sun, 1 Aug 1999 17:43:18 GMT",
"version": "v2"
},
{
"created": "Tue, 20 Jun 2000 18:48:30 GMT",
"version": "v3"
}
] | 2009-10-31 | [
[
"Freedman",
"D. Z.",
""
],
[
"Gubser",
"S. S.",
""
],
[
"Pilch",
"K.",
""
],
[
"Warner",
"N. P.",
""
]
] | States on the Coulomb branch of N=4 super-Yang-Mills theory are studied from the point of view of gauged supergravity in five dimensions. These supersymmetric solutions provide examples of consistent truncation from type IIB supergravity in ten dimensions. A mass gap for states created by local operators and perfect sc... |
2205.10337 | Andr\'e Susano Pinto | Alexander Kolesnikov, Andr\'e Susano Pinto, Lucas Beyer, Xiaohua Zhai,
Jeremiah Harmsen, Neil Houlsby | UViM: A Unified Modeling Approach for Vision with Learned Guiding Codes | 22 pages. Accepted at NeurIPS 2022 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce UViM, a unified approach capable of modeling a wide range of
computer vision tasks. In contrast to previous models, UViM has the same
functional form for all tasks; it requires no task-specific modifications which
require extensive human expertise. The approach involves two components: (I) a
base model (... | [
{
"created": "Fri, 20 May 2022 17:47:59 GMT",
"version": "v1"
},
{
"created": "Fri, 27 May 2022 12:43:07 GMT",
"version": "v2"
},
{
"created": "Fri, 14 Oct 2022 11:36:32 GMT",
"version": "v3"
}
] | 2022-10-17 | [
[
"Kolesnikov",
"Alexander",
""
],
[
"Pinto",
"André Susano",
""
],
[
"Beyer",
"Lucas",
""
],
[
"Zhai",
"Xiaohua",
""
],
[
"Harmsen",
"Jeremiah",
""
],
[
"Houlsby",
"Neil",
""
]
] | We introduce UViM, a unified approach capable of modeling a wide range of computer vision tasks. In contrast to previous models, UViM has the same functional form for all tasks; it requires no task-specific modifications which require extensive human expertise. The approach involves two components: (I) a base model (fe... |
1505.00327 | Mariusz Pietruszka PhD | Mariusz A. Pietruszka | pH/$T$ duality - wall properties and time evolution of plant cells | 50 pages, 10 figures | null | null | null | q-bio.CB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We examined the pH/$T$ (or $\mu$/$T$) duality of acidic pH and temperature
($T$) for the growth of grass shoots in order to determine the equation of
state (EoS) for living plants. By considering non-meristematic growth as a
dynamic series of 'state transitions' (STs) in the extending primary wall, we
identified the ... | [
{
"created": "Sat, 2 May 2015 08:56:45 GMT",
"version": "v1"
},
{
"created": "Thu, 7 May 2015 11:32:17 GMT",
"version": "v2"
},
{
"created": "Mon, 27 Jul 2015 11:02:07 GMT",
"version": "v3"
},
{
"created": "Thu, 27 Jul 2017 07:24:26 GMT",
"version": "v4"
}
] | 2017-07-28 | [
[
"Pietruszka",
"Mariusz A.",
""
]
] | We examined the pH/$T$ (or $\mu$/$T$) duality of acidic pH and temperature ($T$) for the growth of grass shoots in order to determine the equation of state (EoS) for living plants. By considering non-meristematic growth as a dynamic series of 'state transitions' (STs) in the extending primary wall, we identified the cr... |
2206.14566 | Rong Ma | Tal Einav and Rong Ma | Using Interpretable Machine Learning to Massively Increase the Number of
Antibody-Virus Interactions Across Studies | null | Cell Reports Methods, 2023 | 10.1016/j.crmeth.2023.100540 | null | q-bio.QM cs.LG q-bio.BM q-bio.PE | http://creativecommons.org/licenses/by-nc-nd/4.0/ | A central challenge in every field of biology is to use existing measurements
to predict the outcomes of future experiments. In this work, we consider the
wealth of antibody inhibition data against variants of the influenza virus. Due
to this viru's genetic diversity and evolvability, the variants examined in one
stu... | [
{
"created": "Fri, 10 Jun 2022 20:14:01 GMT",
"version": "v1"
},
{
"created": "Sun, 30 Oct 2022 12:35:32 GMT",
"version": "v2"
}
] | 2023-07-27 | [
[
"Einav",
"Tal",
""
],
[
"Ma",
"Rong",
""
]
] | A central challenge in every field of biology is to use existing measurements to predict the outcomes of future experiments. In this work, we consider the wealth of antibody inhibition data against variants of the influenza virus. Due to this viru's genetic diversity and evolvability, the variants examined in one study... |
1906.00993 | Clifford V. Johnson | Clifford V. Johnson | Instability of Super-Entropic Black Holes in Extended Thermodynamics | 4 pages, 1 figure, no trumpet | Mod. Phys. Lett. A, Vol. 33, No. 1 (2020) 2050098 | 10.1142/S0217732320500984 | null | hep-th gr-qc | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The charged black hole of Banados, Teitelbiom and Zanelli is studied in
extended gravitational thermodynamics where there is a dynamical pressure and
volume. It is a simple example of a super-entropic black hole, violating the
reverse isoperimetric inequality. It is proven that this property implies that
its specific... | [
{
"created": "Mon, 3 Jun 2019 18:00:24 GMT",
"version": "v1"
}
] | 2020-01-06 | [
[
"Johnson",
"Clifford V.",
""
]
] | The charged black hole of Banados, Teitelbiom and Zanelli is studied in extended gravitational thermodynamics where there is a dynamical pressure and volume. It is a simple example of a super-entropic black hole, violating the reverse isoperimetric inequality. It is proven that this property implies that its specific h... |
1409.1542 | Norman Poh | Norman Poh, Andrew McGovern and Simon de Lusignan | Towards automated identification of changes in laboratory measurement of
renal function: implications for longitudinal research and observing trends
in glomerular filtration rate (GFR) | null | null | null | TR-14-03 | q-bio.QM stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Introduction: Kidney function is reported using estimates of glomerular
filtration rate (eGFR). However, eGFR values are recorded without reference to
the creatinine (SCr) assays used to derive them, and newer assays were
introduced at different time points across laboratories in UK. These changes
may cause systemati... | [
{
"created": "Wed, 3 Sep 2014 09:53:20 GMT",
"version": "v1"
}
] | 2014-09-05 | [
[
"Poh",
"Norman",
""
],
[
"McGovern",
"Andrew",
""
],
[
"de Lusignan",
"Simon",
""
]
] | Introduction: Kidney function is reported using estimates of glomerular filtration rate (eGFR). However, eGFR values are recorded without reference to the creatinine (SCr) assays used to derive them, and newer assays were introduced at different time points across laboratories in UK. These changes may cause systematic ... |
hep-th/0609226 | David Ridout | Pierre Mathieu and David Ridout | The Extended Algebra of the SU(2) Wess-Zumino-Witten Models | 42 pages, 2 figures; added further motivational material and
corrected typos | Nucl.Phys.B765:201-239,2007 | 10.1016/j.nuclphysb.2006.11.019 | null | hep-th math-ph math.MP math.QA | null | The Wess-Zumino-Witten model defined on the group SU(2) has a unique
(non-trivial) simple current of conformal dimension k/4 for each level k. The
extended algebra defined by this simple current is carefully constructed in
terms of generalised commutation relations, and the corresponding
representation theory is inve... | [
{
"created": "Fri, 29 Sep 2006 19:56:50 GMT",
"version": "v1"
},
{
"created": "Wed, 15 Nov 2006 19:05:37 GMT",
"version": "v2"
}
] | 2008-11-26 | [
[
"Mathieu",
"Pierre",
""
],
[
"Ridout",
"David",
""
]
] | The Wess-Zumino-Witten model defined on the group SU(2) has a unique (non-trivial) simple current of conformal dimension k/4 for each level k. The extended algebra defined by this simple current is carefully constructed in terms of generalised commutation relations, and the corresponding representation theory is invest... |
1607.01541 | Josip Trampetic Dr. | Carmelo P. Martin, Josip Trampetic and Jiangyang You | Quantum duality under the theta-exact Seiberg-Witten map | 47 pages, 21 figures. Version published in JHEP under the reference:
JHEP09(2016)052 | null | 10.1007/JHEP09(2016)052 | null | hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that in the perturbative regime defined by the coupling constant, the
theta-exact Seiberg-Witten map applied to noncommutative U(N) Yang-Mills --with
or without Supersymmetry-- gives an ordinary gauge theory which is, at the
quantum level, dual to the former. We do so by using the on-shell DeWitt
effective ac... | [
{
"created": "Wed, 6 Jul 2016 09:54:51 GMT",
"version": "v1"
},
{
"created": "Sun, 11 Sep 2016 08:51:43 GMT",
"version": "v2"
}
] | 2016-10-12 | [
[
"Martin",
"Carmelo P.",
""
],
[
"Trampetic",
"Josip",
""
],
[
"You",
"Jiangyang",
""
]
] | We show that in the perturbative regime defined by the coupling constant, the theta-exact Seiberg-Witten map applied to noncommutative U(N) Yang-Mills --with or without Supersymmetry-- gives an ordinary gauge theory which is, at the quantum level, dual to the former. We do so by using the on-shell DeWitt effective acti... |
q-bio/0502027 | Veit Schw\"ammle | Veit Schw\"ammle and Suzana M. de Oliveira | Simulations of a mortality plateau in the sexual Penna model for
biological ageing | submitted to Phys. Rev. E | null | 10.1103/PhysRevE.72.031911 | null | q-bio.PE | null | The Penna model is a strategy to simulate the genetic dynamics of
age-structured populations, in which the individuals genomes are represented by
bit-strings. It provides a simple metaphor for the evolutionary process in
terms of the mutation accumulation theory. In its original version, an
individual dies due to inh... | [
{
"created": "Tue, 22 Feb 2005 17:04:33 GMT",
"version": "v1"
}
] | 2009-11-11 | [
[
"Schwämmle",
"Veit",
""
],
[
"de Oliveira",
"Suzana M.",
""
]
] | The Penna model is a strategy to simulate the genetic dynamics of age-structured populations, in which the individuals genomes are represented by bit-strings. It provides a simple metaphor for the evolutionary process in terms of the mutation accumulation theory. In its original version, an individual dies due to inher... |
1404.6667 | Ahmed El Shafie | Ahmed El Shafie and Tamer Khattab | Cooperative Cognitive Relaying Under Primary and Secondary Quality of
Service Satisfaction | This paper was accepted in PIMRC 2014 | null | null | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a new cooperative protocol which involves cooperation
between primary and secondary users. We consider a cognitive setting with one
primary user and multiple secondary users. The time resource is partitioned
into discrete time slots. Each time slot, a secondary user is scheduled for
transmission a... | [
{
"created": "Sat, 26 Apr 2014 18:36:31 GMT",
"version": "v1"
},
{
"created": "Tue, 1 Jul 2014 22:41:14 GMT",
"version": "v2"
}
] | 2014-07-03 | [
[
"Shafie",
"Ahmed El",
""
],
[
"Khattab",
"Tamer",
""
]
] | This paper proposes a new cooperative protocol which involves cooperation between primary and secondary users. We consider a cognitive setting with one primary user and multiple secondary users. The time resource is partitioned into discrete time slots. Each time slot, a secondary user is scheduled for transmission acc... |
2401.14878 | Paolo Burelli | Maj Frost Jensen, Laurits Dixen, Paolo Burelli | Hades Again and Again: A Study on Frustration Tolerance, Physiology and
Player Experience | null | null | null | null | cs.HC | http://creativecommons.org/licenses/by/4.0/ | Accurately quantifying player experience is challenging for many reasons:
identifying a ground truth and building validated and reliable scales are both
challenging tasks; on top of that, empirical results are often moderated by
individual factors. In this article, we present a study on the rogue-like game
Hades desi... | [
{
"created": "Fri, 26 Jan 2024 14:04:24 GMT",
"version": "v1"
}
] | 2024-01-29 | [
[
"Jensen",
"Maj Frost",
""
],
[
"Dixen",
"Laurits",
""
],
[
"Burelli",
"Paolo",
""
]
] | Accurately quantifying player experience is challenging for many reasons: identifying a ground truth and building validated and reliable scales are both challenging tasks; on top of that, empirical results are often moderated by individual factors. In this article, we present a study on the rogue-like game Hades design... |
2107.11892 | Mengwu Guo | Mengwu Guo | A brief note on understanding neural networks as Gaussian processes | null | null | null | null | cs.LG cs.CE stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As a generalization of the work in [Lee et al., 2017], this note briefly
discusses when the prior of a neural network output follows a Gaussian process,
and how a neural-network-induced Gaussian process is formulated. The posterior
mean functions of such a Gaussian process regression lie in the reproducing
kernel Hil... | [
{
"created": "Sun, 25 Jul 2021 21:06:58 GMT",
"version": "v1"
}
] | 2021-07-27 | [
[
"Guo",
"Mengwu",
""
]
] | As a generalization of the work in [Lee et al., 2017], this note briefly discusses when the prior of a neural network output follows a Gaussian process, and how a neural-network-induced Gaussian process is formulated. The posterior mean functions of such a Gaussian process regression lie in the reproducing kernel Hilbe... |
2305.15383 | Emmanuel Esposito | Khaled Eldowa, Emmanuel Esposito, Tommaso Cesari, Nicol\`o
Cesa-Bianchi | On the Minimax Regret for Online Learning with Feedback Graphs | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we improve on the upper and lower bounds for the regret of
online learning with strongly observable undirected feedback graphs. The best
known upper bound for this problem is $\mathcal{O}\bigl(\sqrt{\alpha T\ln
K}\bigr)$, where $K$ is the number of actions, $\alpha$ is the independence
number of the gra... | [
{
"created": "Wed, 24 May 2023 17:40:57 GMT",
"version": "v1"
},
{
"created": "Sat, 28 Oct 2023 14:11:51 GMT",
"version": "v2"
}
] | 2023-10-31 | [
[
"Eldowa",
"Khaled",
""
],
[
"Esposito",
"Emmanuel",
""
],
[
"Cesari",
"Tommaso",
""
],
[
"Cesa-Bianchi",
"Nicolò",
""
]
] | In this work, we improve on the upper and lower bounds for the regret of online learning with strongly observable undirected feedback graphs. The best known upper bound for this problem is $\mathcal{O}\bigl(\sqrt{\alpha T\ln K}\bigr)$, where $K$ is the number of actions, $\alpha$ is the independence number of the graph... |
2403.03375 | GuanWen Qiu | GuanWen Qiu, Da Kuang, Surbhi Goel | Complexity Matters: Dynamics of Feature Learning in the Presence of
Spurious Correlations | Accepted to ICML 2024 with the title:"Complexity Matters: Feature
Learning in the Presence of Spurious Correlations" | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing research often posits spurious features as easier to learn than core
features in neural network optimization, but the impact of their relative
simplicity remains under-explored. Moreover, studies mainly focus on end
performance rather than the learning dynamics of feature learning. In this
paper, we propose ... | [
{
"created": "Tue, 5 Mar 2024 23:54:00 GMT",
"version": "v1"
},
{
"created": "Sun, 16 Jun 2024 15:43:33 GMT",
"version": "v2"
}
] | 2024-06-18 | [
[
"Qiu",
"GuanWen",
""
],
[
"Kuang",
"Da",
""
],
[
"Goel",
"Surbhi",
""
]
] | Existing research often posits spurious features as easier to learn than core features in neural network optimization, but the impact of their relative simplicity remains under-explored. Moreover, studies mainly focus on end performance rather than the learning dynamics of feature learning. In this paper, we propose a ... |
1610.03809 | Daniel Moyer | Daniel Moyer, Boris A. Gutman, Joshua Faskowitz, Neda Jahanshad, Paul
M. Thompson | A Continuous Model of Cortical Connectivity | Accepted at MICCAI 2016 | null | null | null | q-bio.NC cs.CE q-bio.QM stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a continuous model for structural brain connectivity based on the
Poisson point process. The model treats each streamline curve in a tractography
as an observed event in connectome space, here a product space of cortical
white matter boundaries. We approximate the model parameter via kernel density
estimat... | [
{
"created": "Wed, 12 Oct 2016 18:11:46 GMT",
"version": "v1"
},
{
"created": "Mon, 5 Nov 2018 22:33:37 GMT",
"version": "v2"
}
] | 2018-11-07 | [
[
"Moyer",
"Daniel",
""
],
[
"Gutman",
"Boris A.",
""
],
[
"Faskowitz",
"Joshua",
""
],
[
"Jahanshad",
"Neda",
""
],
[
"Thompson",
"Paul M.",
""
]
] | We present a continuous model for structural brain connectivity based on the Poisson point process. The model treats each streamline curve in a tractography as an observed event in connectome space, here a product space of cortical white matter boundaries. We approximate the model parameter via kernel density estimatio... |
2103.12918 | Tamiaki Yoneya | Tamiaki Yoneya | Canonical Nambu mechanics: relevance to string/M-theory and approaches
to quantization | Written version of an invited talk in the workshop "Space-time
topology behind formation of micro-macro magneto-vortical structure by Nambu
mechanics", Osaka City University, Sept. 28--Oct.1, 2020, corrected typos,
added sentences, and added references, version to be published in a special
section of the journa... | null | null | null | hep-th | http://creativecommons.org/licenses/by/4.0/ | We review some aspects of Nambu mechanics on the basis of the works
previously published separately by the present author. Main focuses are on
three themes, its various symmetry structures, their possible relevance to
string/M theory, and a Hamilton-Jacobi like reformulation. We try to elucidate
the basic ideas, most... | [
{
"created": "Wed, 24 Mar 2021 01:31:34 GMT",
"version": "v1"
},
{
"created": "Wed, 21 Apr 2021 01:10:51 GMT",
"version": "v2"
}
] | 2021-04-22 | [
[
"Yoneya",
"Tamiaki",
""
]
] | We review some aspects of Nambu mechanics on the basis of the works previously published separately by the present author. Main focuses are on three themes, its various symmetry structures, their possible relevance to string/M theory, and a Hamilton-Jacobi like reformulation. We try to elucidate the basic ideas, most o... |
1811.04947 | Yu-Chien Huang | Yu-Chien Huang, Washington Taylor | Mirror symmetry and elliptic Calabi-Yau manifolds | 30 pages, 6 figures; v2: corrected Table 1, added references | null | 10.1007/JHEP04(2019)083 | MIT-CTP-5068 | hep-th math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We find that for many Calabi-Yau threefolds with elliptic or genus one
fibrations mirror symmetry factorizes between the fiber and the base of the
fibration. In the simplest examples, the generic CY elliptic fibration over any
toric base surface $B$ that supports an elliptic Calabi-Yau threefold has a
mirror that is ... | [
{
"created": "Mon, 12 Nov 2018 19:00:04 GMT",
"version": "v1"
},
{
"created": "Fri, 23 Nov 2018 22:19:12 GMT",
"version": "v2"
}
] | 2019-05-01 | [
[
"Huang",
"Yu-Chien",
""
],
[
"Taylor",
"Washington",
""
]
] | We find that for many Calabi-Yau threefolds with elliptic or genus one fibrations mirror symmetry factorizes between the fiber and the base of the fibration. In the simplest examples, the generic CY elliptic fibration over any toric base surface $B$ that supports an elliptic Calabi-Yau threefold has a mirror that is an... |
1709.08237 | Muhammad R. A. Khandaker PhD | Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong, Gan
Zheng, Yangyang Zhang, and Zhongbin Zheng | Secure Full-Duplex Two-Way Relaying for SWIPT | Submitted to IEEE Wireless Communications Letters | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This letter studies bi-directional secure information exchange in a
simultaneous wireless information and power transfer (SWIPT) system enabled by
a full-duplex (FD) multiple-input multiple-output (MIMO) amplify-and-forward
(AF) relay. The AF relay injects artificial noise (AN) in order to confuse the
eavesdropper. S... | [
{
"created": "Sun, 24 Sep 2017 18:47:40 GMT",
"version": "v1"
}
] | 2017-09-26 | [
[
"Okandeji",
"Alexander A.",
""
],
[
"Khandaker",
"Muhammad R. A.",
""
],
[
"Wong",
"Kai-Kit",
""
],
[
"Zheng",
"Gan",
""
],
[
"Zhang",
"Yangyang",
""
],
[
"Zheng",
"Zhongbin",
""
]
] | This letter studies bi-directional secure information exchange in a simultaneous wireless information and power transfer (SWIPT) system enabled by a full-duplex (FD) multiple-input multiple-output (MIMO) amplify-and-forward (AF) relay. The AF relay injects artificial noise (AN) in order to confuse the eavesdropper. Spe... |
2312.10993 | Zeping Ren | Zeping Ren, Shaoli Huang, Xiu Li | Realistic Human Motion Generation with Cross-Diffusion Models | Accepted by ECCV2024 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the Cross Human Motion Diffusion Model (CrossDiff), a novel
approach for generating high-quality human motion based on textual
descriptions. Our method integrates 3D and 2D information using a shared
transformer network within the training of the diffusion model, unifying motion
noise into a single featu... | [
{
"created": "Mon, 18 Dec 2023 07:44:40 GMT",
"version": "v1"
},
{
"created": "Tue, 20 Feb 2024 05:57:51 GMT",
"version": "v2"
},
{
"created": "Mon, 5 Aug 2024 01:58:58 GMT",
"version": "v3"
}
] | 2024-08-06 | [
[
"Ren",
"Zeping",
""
],
[
"Huang",
"Shaoli",
""
],
[
"Li",
"Xiu",
""
]
] | We introduce the Cross Human Motion Diffusion Model (CrossDiff), a novel approach for generating high-quality human motion based on textual descriptions. Our method integrates 3D and 2D information using a shared transformer network within the training of the diffusion model, unifying motion noise into a single feature... |
1612.04474 | Qian Ge | Qian Ge, Yuval Yarom, Frank Li, Gernot Heiser | Your Processor Leaks Information - and There's Nothing You Can Do About
It | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by-sa/4.0/ | Timing channels are information flows, encoded in the relative timing of
events, that bypass the system's protection mechanisms. Any microarchitectural
state that depends on execution history and affects the rate of progress of
later executions potentially establishes a timing channel, unless explicit
steps are taken... | [
{
"created": "Wed, 14 Dec 2016 03:41:21 GMT",
"version": "v1"
},
{
"created": "Thu, 15 Dec 2016 02:58:30 GMT",
"version": "v2"
},
{
"created": "Mon, 20 Feb 2017 05:56:37 GMT",
"version": "v3"
},
{
"created": "Mon, 14 Aug 2017 15:45:32 GMT",
"version": "v4"
},
{
"c... | 2017-09-15 | [
[
"Ge",
"Qian",
""
],
[
"Yarom",
"Yuval",
""
],
[
"Li",
"Frank",
""
],
[
"Heiser",
"Gernot",
""
]
] | Timing channels are information flows, encoded in the relative timing of events, that bypass the system's protection mechanisms. Any microarchitectural state that depends on execution history and affects the rate of progress of later executions potentially establishes a timing channel, unless explicit steps are taken t... |
2210.00286 | Philip Schroeder | Philip Schroeder | NeuroEvo: A Cloud-based Platform for Automated Design and Training of
Neural Networks using Evolutionary and Particle Swarm Algorithms | null | null | null | null | cs.NE cs.LG | http://creativecommons.org/licenses/by/4.0/ | Evolutionary algorithms (EAs) provide unique advantages for optimizing neural
networks in complex search spaces. This paper introduces a new web platform,
NeuroEvo (neuroevo.io), that allows users to interactively design and train
neural network classifiers using evolutionary and particle swarm algorithms.
The classi... | [
{
"created": "Sat, 1 Oct 2022 14:10:43 GMT",
"version": "v1"
}
] | 2022-10-04 | [
[
"Schroeder",
"Philip",
""
]
] | Evolutionary algorithms (EAs) provide unique advantages for optimizing neural networks in complex search spaces. This paper introduces a new web platform, NeuroEvo (neuroevo.io), that allows users to interactively design and train neural network classifiers using evolutionary and particle swarm algorithms. The classifi... |
2210.10864 | Minchul Kim | Minchul Kim, Feng Liu, Anil Jain, Xiaoming Liu | Cluster and Aggregate: Face Recognition with Large Probe Set | To appear in NeurIPS 2022 | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Feature fusion plays a crucial role in unconstrained face recognition where
inputs (probes) comprise of a set of $N$ low quality images whose individual
qualities vary. Advances in attention and recurrent modules have led to feature
fusion that can model the relationship among the images in the input set.
However, at... | [
{
"created": "Wed, 19 Oct 2022 20:01:15 GMT",
"version": "v1"
},
{
"created": "Fri, 18 Nov 2022 18:33:09 GMT",
"version": "v2"
},
{
"created": "Thu, 16 Feb 2023 04:40:16 GMT",
"version": "v3"
}
] | 2023-02-17 | [
[
"Kim",
"Minchul",
""
],
[
"Liu",
"Feng",
""
],
[
"Jain",
"Anil",
""
],
[
"Liu",
"Xiaoming",
""
]
] | Feature fusion plays a crucial role in unconstrained face recognition where inputs (probes) comprise of a set of $N$ low quality images whose individual qualities vary. Advances in attention and recurrent modules have led to feature fusion that can model the relationship among the images in the input set. However, atte... |
1912.09256 | Alexandru Uta | Alexandru Uta, Alexandru Custura, Dmitry Duplyakin, Ivo Jimenez, Jan
Rellermeyer, Carlos Maltzahn, Robert Ricci, Alexandru Iosup | Is Big Data Performance Reproducible in Modern Cloud Networks? | 12 pages paper, 3 pages references | null | null | null | cs.PF cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Performance variability has been acknowledged as a problem for over a decade
by cloud practitioners and performance engineers. Yet, our survey of top
systems conferences reveals that the research community regularly disregards
variability when running experiments in the cloud. Focusing on networks, we
assess the impa... | [
{
"created": "Thu, 19 Dec 2019 15:05:30 GMT",
"version": "v1"
}
] | 2019-12-20 | [
[
"Uta",
"Alexandru",
""
],
[
"Custura",
"Alexandru",
""
],
[
"Duplyakin",
"Dmitry",
""
],
[
"Jimenez",
"Ivo",
""
],
[
"Rellermeyer",
"Jan",
""
],
[
"Maltzahn",
"Carlos",
""
],
[
"Ricci",
"Robert",
""
],
... | Performance variability has been acknowledged as a problem for over a decade by cloud practitioners and performance engineers. Yet, our survey of top systems conferences reveals that the research community regularly disregards variability when running experiments in the cloud. Focusing on networks, we assess the impact... |
1806.03454 | Kavita Jain | Kavita Jain and Archana Devi | Polygenic adaptation in changing environments | null | EPL 123, 48002 (2018) | 10.1209/0295-5075/123/48002 | null | q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although many phenotypic traits are determined by a large number of genetic
variants, how a polygenic trait adapts in response to the changes in the
environment is still poorly understood. Here we study the adaptation dynamics
of a polygenic trait that is determined by a finite number of genetic loci in
an infinitely... | [
{
"created": "Sat, 9 Jun 2018 10:44:50 GMT",
"version": "v1"
},
{
"created": "Thu, 18 Oct 2018 10:30:20 GMT",
"version": "v2"
}
] | 2018-10-19 | [
[
"Jain",
"Kavita",
""
],
[
"Devi",
"Archana",
""
]
] | Although many phenotypic traits are determined by a large number of genetic variants, how a polygenic trait adapts in response to the changes in the environment is still poorly understood. Here we study the adaptation dynamics of a polygenic trait that is determined by a finite number of genetic loci in an infinitely l... |
2203.01282 | John Lalor | John P. Lalor, Pedro Rodriguez | py-irt: A Scalable Item Response Theory Library for Python | null | null | 10.1287/ijoc.2022.1250 | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | py-irt is a Python library for fitting Bayesian Item Response Theory (IRT)
models. py-irt estimates latent traits of subjects and items, making it
appropriate for use in IRT tasks as well as ideal-point models. py-irt is built
on top of the Pyro and PyTorch frameworks and uses GPU-accelerated training to
scale to lar... | [
{
"created": "Wed, 2 Mar 2022 18:09:46 GMT",
"version": "v1"
},
{
"created": "Sun, 13 Mar 2022 15:51:22 GMT",
"version": "v2"
}
] | 2022-11-16 | [
[
"Lalor",
"John P.",
""
],
[
"Rodriguez",
"Pedro",
""
]
] | py-irt is a Python library for fitting Bayesian Item Response Theory (IRT) models. py-irt estimates latent traits of subjects and items, making it appropriate for use in IRT tasks as well as ideal-point models. py-irt is built on top of the Pyro and PyTorch frameworks and uses GPU-accelerated training to scale to large... |
1703.04418 | Odemir Bruno PhD | Mariane B. Neiva, Patrick Guidotti, Odemir M. Bruno | Improving LBP and its variants using anisotropic diffusion | 14 pages, 10 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The main purpose of this paper is to propose a new preprocessing step in
order to improve local feature descriptors and texture classification.
Preprocessing is implemented by using transformations which help highlight
salient features that play a significant role in texture recognition. We
evaluate and compare four ... | [
{
"created": "Mon, 13 Mar 2017 14:36:21 GMT",
"version": "v1"
}
] | 2017-03-14 | [
[
"Neiva",
"Mariane B.",
""
],
[
"Guidotti",
"Patrick",
""
],
[
"Bruno",
"Odemir M.",
""
]
] | The main purpose of this paper is to propose a new preprocessing step in order to improve local feature descriptors and texture classification. Preprocessing is implemented by using transformations which help highlight salient features that play a significant role in texture recognition. We evaluate and compare four di... |
1201.0035 | Vladimir Lerner S | Vladimir S. Lerner | The information path functional approach for solution of a controllable
stochastic problem | 39 pages including 5 figures | null | null | null | cs.SY cs.IT math.DS math.IT nlin.AO | http://creativecommons.org/licenses/by/3.0/ | We study a stochastic control system, described by Ito controllable equation,
and evaluate the solutions by an entropy functional (EF), defined by the
equation functions of controllable drift and diffusion. Considering a control
problem for this functional, we solve the EF control variation problem (VP),
which leads ... | [
{
"created": "Thu, 29 Dec 2011 23:15:22 GMT",
"version": "v1"
},
{
"created": "Tue, 3 Jun 2014 18:23:15 GMT",
"version": "v2"
}
] | 2014-06-04 | [
[
"Lerner",
"Vladimir S.",
""
]
] | We study a stochastic control system, described by Ito controllable equation, and evaluate the solutions by an entropy functional (EF), defined by the equation functions of controllable drift and diffusion. Considering a control problem for this functional, we solve the EF control variation problem (VP), which leads to... |
2010.14655 | Mehmet Ozkan | Ugur Atli, Omer Guleryuz, Mehmet Ozkan | Off-Shell ${\mathcal N}=(1,0)$ Linear Multiplets in Six Dimensions | v2., typos fixed, reference added, version appeared in EPJC, 24 pages | null | 10.1140/epjc/s10052-020-08773-3 10.1140/epjc/s10052-020-08773-3
10.1140/epjc/s10052-020-08773-3 | null | hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a tensor calculus for $n$-number of ${\mathcal N}=(1,0)$ linear
multiplets in six dimensions. The coupling of linear multiplets is encoded in a
function ${\mathcal F}_{IJ}$ that is subject to certain constraints. We provide
various rigid and local supersymmetric models depending on the choice of the
functi... | [
{
"created": "Tue, 27 Oct 2020 22:44:12 GMT",
"version": "v1"
},
{
"created": "Sun, 27 Dec 2020 08:22:09 GMT",
"version": "v2"
}
] | 2020-12-29 | [
[
"Atli",
"Ugur",
""
],
[
"Guleryuz",
"Omer",
""
],
[
"Ozkan",
"Mehmet",
""
]
] | We provide a tensor calculus for $n$-number of ${\mathcal N}=(1,0)$ linear multiplets in six dimensions. The coupling of linear multiplets is encoded in a function ${\mathcal F}_{IJ}$ that is subject to certain constraints. We provide various rigid and local supersymmetric models depending on the choice of the function... |
1602.07957 | Nathan Baker | Marilyn R. Gunner and Nathan A. Baker | Continuum Electrostatics Approaches to Calculating p$K_a$s and $E_m$s in
Proteins | null | null | null | null | q-bio.BM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Proteins change their charge state through protonation and redox reactions as
well as through binding charged ligands. The free energy of these reactions are
dominated by solvation and electrostatic energies and modulated by protein
conformational relaxation in response to the ionization state changes. Although
compu... | [
{
"created": "Thu, 25 Feb 2016 15:04:45 GMT",
"version": "v1"
}
] | 2016-02-26 | [
[
"Gunner",
"Marilyn R.",
""
],
[
"Baker",
"Nathan A.",
""
]
] | Proteins change their charge state through protonation and redox reactions as well as through binding charged ligands. The free energy of these reactions are dominated by solvation and electrostatic energies and modulated by protein conformational relaxation in response to the ionization state changes. Although computa... |
2206.04463 | Oriel BenShmuel | Oriel BenShmuel | Meet You Halfway: Explaining Deep Learning Mysteries | null | null | null | null | cs.LG cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep neural networks perform exceptionally well on various learning tasks
with state-of-the-art results. While these models are highly expressive and
achieve impressively accurate solutions with excellent generalization
abilities, they are susceptible to minor perturbations. Samples that suffer
such perturbations are... | [
{
"created": "Thu, 9 Jun 2022 12:43:10 GMT",
"version": "v1"
}
] | 2022-06-10 | [
[
"BenShmuel",
"Oriel",
""
]
] | Deep neural networks perform exceptionally well on various learning tasks with state-of-the-art results. While these models are highly expressive and achieve impressively accurate solutions with excellent generalization abilities, they are susceptible to minor perturbations. Samples that suffer such perturbations are k... |
1101.2402 | Paul Sutcliffe | Paul Sutcliffe | Skyrmions in a truncated BPS theory | 12 pages, 1 figure | JHEP 1104, 045 (2011) | 10.1007/JHEP04(2011)045 | DCPT-11/01 | hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, it has been shown that (4+1)-dimensional Yang-Mills theory may be
written as a (3+1)-dimensional BPS Skyrme model, in which the Skyrme field is
coupled to an infinite tower of vector mesons. Truncating this tower to a
single vector meson yields an extension of the standard Skyrme model to a
theory of pions ... | [
{
"created": "Wed, 12 Jan 2011 16:42:10 GMT",
"version": "v1"
}
] | 2015-05-27 | [
[
"Sutcliffe",
"Paul",
""
]
] | Recently, it has been shown that (4+1)-dimensional Yang-Mills theory may be written as a (3+1)-dimensional BPS Skyrme model, in which the Skyrme field is coupled to an infinite tower of vector mesons. Truncating this tower to a single vector meson yields an extension of the standard Skyrme model to a theory of pions co... |
1005.5521 | Horace W. Crater | David Alba, Horace W. Crater, Luca Lusanna | Massless Particles plus Matter in the Rest-Frame Instant Form of
Dynamics | null | J.Phys.A43:405203,2010 | 10.1088/1751-8113/43/40/405203 | null | hep-th gr-qc math-ph math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | After introducing the parametrized Minkowski theory describing a
positive-energy scalar massless particle, we study the rest-frame instant form
of dynamics of such a particle in presence of another massive one (to avoid the
front form of dynamics). Then we describe massless particles with
Grassmann-valued helicity an... | [
{
"created": "Sun, 30 May 2010 12:20:20 GMT",
"version": "v1"
}
] | 2014-11-21 | [
[
"Alba",
"David",
""
],
[
"Crater",
"Horace W.",
""
],
[
"Lusanna",
"Luca",
""
]
] | After introducing the parametrized Minkowski theory describing a positive-energy scalar massless particle, we study the rest-frame instant form of dynamics of such a particle in presence of another massive one (to avoid the front form of dynamics). Then we describe massless particles with Grassmann-valued helicity and ... |
2210.13210 | Clara Meister | Liam van der Poel, Ryan Cotterell, Clara Meister | Mutual Information Alleviates Hallucinations in Abstractive
Summarization | EMNLP 2022 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite significant progress in the quality of language generated from
abstractive summarization models, these models still exhibit the tendency to
hallucinate, i.e., output content not supported by the source document. A
number of works have tried to fix--or at least uncover the source of--the
problem with limited s... | [
{
"created": "Mon, 24 Oct 2022 13:30:54 GMT",
"version": "v1"
},
{
"created": "Sat, 29 Oct 2022 18:42:46 GMT",
"version": "v2"
}
] | 2022-11-01 | [
[
"van der Poel",
"Liam",
""
],
[
"Cotterell",
"Ryan",
""
],
[
"Meister",
"Clara",
""
]
] | Despite significant progress in the quality of language generated from abstractive summarization models, these models still exhibit the tendency to hallucinate, i.e., output content not supported by the source document. A number of works have tried to fix--or at least uncover the source of--the problem with limited suc... |
1911.04787 | David Paulus | David Paulus, Gerdien de Vries, Bartel Van de Walle | Effects of data ambiguity and cognitive biases on the interpretability
of machine learning models in humanitarian decision making | 3 pager, 1 figure, AAAI Fall Symposium - AI for Social Good, November
7-9, 2019, Arlington, USA | null | null | null | cs.LG cs.HC stat.ML | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The effectiveness of machine learning algorithms depends on the quality and
amount of data and the operationalization and interpretation by the human
analyst. In humanitarian response, data is often lacking or overburdening, thus
ambiguous, and the time-scarce, volatile, insecure environments of humanitarian
activiti... | [
{
"created": "Tue, 12 Nov 2019 10:50:42 GMT",
"version": "v1"
}
] | 2019-11-13 | [
[
"Paulus",
"David",
""
],
[
"de Vries",
"Gerdien",
""
],
[
"Van de Walle",
"Bartel",
""
]
] | The effectiveness of machine learning algorithms depends on the quality and amount of data and the operationalization and interpretation by the human analyst. In humanitarian response, data is often lacking or overburdening, thus ambiguous, and the time-scarce, volatile, insecure environments of humanitarian activities... |
2311.01149 | Jianghao Chen | Jianghao Chen, Pu Jian, Tengxiao Xi, Dongyi Yi, Qianlong Du, Chenglin
Ding, Guibo Zhu, Chengqing Zong, Jinqiao Wang, Jiajun Zhang | ChineseWebText: Large-scale High-quality Chinese Web Text Extracted with
Effective Evaluation Model | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | During the development of large language models (LLMs), the scale and quality
of the pre-training data play a crucial role in shaping LLMs' capabilities. To
accelerate the research of LLMs, several large-scale datasets, such as C4 [1],
Pile [2], RefinedWeb [3] and WanJuan [4], have been released to the public.
Howeve... | [
{
"created": "Thu, 2 Nov 2023 11:13:51 GMT",
"version": "v1"
},
{
"created": "Fri, 10 Nov 2023 06:28:48 GMT",
"version": "v2"
}
] | 2023-11-13 | [
[
"Chen",
"Jianghao",
""
],
[
"Jian",
"Pu",
""
],
[
"Xi",
"Tengxiao",
""
],
[
"Yi",
"Dongyi",
""
],
[
"Du",
"Qianlong",
""
],
[
"Ding",
"Chenglin",
""
],
[
"Zhu",
"Guibo",
""
],
[
"Zong",
"Chengqi... | During the development of large language models (LLMs), the scale and quality of the pre-training data play a crucial role in shaping LLMs' capabilities. To accelerate the research of LLMs, several large-scale datasets, such as C4 [1], Pile [2], RefinedWeb [3] and WanJuan [4], have been released to the public. However,... |
1411.0373 | Fen Zuo | Fen Zuo, Yi-Hong Gao | Thermodynamics of large-$N$ gauge theories on a sphere: weak versus
strong coupling | Discussion on the small-$\lambda$ corrections improved | null | 10.1007/JHEP05(2015)003 | null | hep-th hep-lat hep-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently lattice simulation in pure Yang-Mills theory exposes significant
quadratic corrections for both the thermodynamic quantities and the
renormalized Polyakov loop in the deconfined phase. These terms are previously
found to appear naturally for ${\mathcal N}=4$ Super Yang-Mills~(SYM) on a
sphere at strong coupl... | [
{
"created": "Mon, 3 Nov 2014 06:39:56 GMT",
"version": "v1"
},
{
"created": "Thu, 12 Feb 2015 06:48:47 GMT",
"version": "v2"
},
{
"created": "Fri, 8 May 2015 10:21:43 GMT",
"version": "v3"
}
] | 2015-05-11 | [
[
"Zuo",
"Fen",
""
],
[
"Gao",
"Yi-Hong",
""
]
] | Recently lattice simulation in pure Yang-Mills theory exposes significant quadratic corrections for both the thermodynamic quantities and the renormalized Polyakov loop in the deconfined phase. These terms are previously found to appear naturally for ${\mathcal N}=4$ Super Yang-Mills~(SYM) on a sphere at strong couplin... |
hep-th/9603106 | Guido Cognola | Sergio Zerbini, Guido Cognola and Luciano Vanzo | Euclidean Approach to the Entropy for a Scalar Field in Rindler-like
Space-Times | 17 pages, LaTex. A sign error corrected and few comments added | Phys.Rev. D54 (1996) 2699-2710 | 10.1103/PhysRevD.54.2699 | University of Trento, UTF 372 | hep-th gr-qc | null | The off-shell entropy for a massless scalar field in a D-dimensional
Rindler-like space-time is investigated within the conical Euclidean approach
in the manifold $C_\be\times\M^N$, $C_\be$ being the 2-dimensional cone, making
use of the zeta-function regularisation. Due to the presence of conical
singularities, it i... | [
{
"created": "Fri, 15 Mar 1996 16:28:41 GMT",
"version": "v1"
},
{
"created": "Mon, 20 May 1996 11:59:27 GMT",
"version": "v2"
}
] | 2009-10-30 | [
[
"Zerbini",
"Sergio",
""
],
[
"Cognola",
"Guido",
""
],
[
"Vanzo",
"Luciano",
""
]
] | The off-shell entropy for a massless scalar field in a D-dimensional Rindler-like space-time is investigated within the conical Euclidean approach in the manifold $C_\be\times\M^N$, $C_\be$ being the 2-dimensional cone, making use of the zeta-function regularisation. Due to the presence of conical singularities, it is ... |
1512.02560 | Omid Ghahabi | Omid Ghahabi and Javier Hernando | Deep Learning for Single and Multi-Session i-Vector Speaker Recognition | null | IEEE/ACM Transactions on Audio, Speech, and Language Processing,
Volume: 25, Issue: 4, April 2017 | 10.1109/TASLP.2017.2661705 | null | cs.SD cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The promising performance of Deep Learning (DL) in speech recognition has
motivated the use of DL in other speech technology applications such as speaker
recognition. Given i-vectors as inputs, the authors proposed an impostor
selection algorithm and a universal model adaptation process in a hybrid system
based on De... | [
{
"created": "Tue, 8 Dec 2015 17:34:49 GMT",
"version": "v1"
}
] | 2017-04-24 | [
[
"Ghahabi",
"Omid",
""
],
[
"Hernando",
"Javier",
""
]
] | The promising performance of Deep Learning (DL) in speech recognition has motivated the use of DL in other speech technology applications such as speaker recognition. Given i-vectors as inputs, the authors proposed an impostor selection algorithm and a universal model adaptation process in a hybrid system based on Deep... |
2210.02361 | Max A. Deppert | Max A. Deppert and Klaus Jansen | The Power of Duality: Response Time Analysis meets Integer Programming | null | null | null | null | cs.DS cs.DM | http://creativecommons.org/licenses/by/4.0/ | We study a mutually enriching connection between response time analysis in
real-time systems and the mixing set problem. Thereby generalizing over known
results we present a new approach to the computation of response times in
fixed-priority uniprocessor real-time scheduling. We even allow that the tasks
are delayed ... | [
{
"created": "Wed, 5 Oct 2022 16:06:07 GMT",
"version": "v1"
},
{
"created": "Wed, 1 Nov 2023 15:19:44 GMT",
"version": "v2"
}
] | 2023-11-02 | [
[
"Deppert",
"Max A.",
""
],
[
"Jansen",
"Klaus",
""
]
] | We study a mutually enriching connection between response time analysis in real-time systems and the mixing set problem. Thereby generalizing over known results we present a new approach to the computation of response times in fixed-priority uniprocessor real-time scheduling. We even allow that the tasks are delayed by... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.