content
stringlengths
1
15.9M
\section{Introduction}\label{sec:introduction} It is known that a speaker's voice contains {{personal traits}} of the speaker, given the unique pronunciation organs and speaking manner of the speaker, e.g. the unique vocal tract shape, larynx size, accent, and rhythm \cite{kinnunen2010overview}. Therefore, it is poss...
\section{Introduction} \vspace{-4pt} The visual/LiDAR odometry is one of the key technologies in autonomous driving. This task uses two consecutive images or point clouds to obtain the relative pose transformation between two frames, and acts as the base of the subsequential planning and decision making of mobile robot...
\section{Introduction} \IEEEPARstart{W}{ith} the rapid development of the Internet of Things (IoT) and edge computing technologies, IoT users can be distributed in order to provide wide coverage services in remote areas, e.g., environment monitoring, ocean transportation, smart grid, etc., \cite{7289337}. Considering ...
\section{Introduction} Quantum tunneling, allowing an object to pass a potential energy barrier, even when classically it does not have enough energy, is one of the most striking concepts of quantum physics. In Nature, it produces energy in stars via nuclear fusion, it heats the Earth's interior by $\alpha-$decay, it...
\section{Introduction} The success of deep networks largely relies on large-scale datasets with high-quality label annotations \cite{han2018masking,wang2018iterative,jiang2020beyond}. However, it is quite costly, time-consuming, or even infeasible to collect such data. Instead, in practice, many large-scale datasets ar...
\section{Introduction} In this paper we prove $L^{2}$ instability of the soliton for the focusing, mass-critical, generalized KdV equation \begin{equation}\label{1.1} u_{t} = -(u_{xx} + u^{5})_{x}, \qquad u(0,x) = u_{0} \in L^{2}(\mathbb{R}). \end{equation} This equation is called mass-critical because the scaling l...
\section{Introduction} Category theory provides a means through which many far-ranging fields of mathematics can be related by their similar structure. In a paper by Robinson \cite{Robinson1981}, this interconnectivity afforded by categorical perspectives allowed for the realization of torsion products as the homotopy ...
\section{Introduction} \vspace{-4mm} Humans are adaptive by nature. While it is very natural for humans to ask clarifying questions and immediately correct course whenever there is a misunderstanding, interactive learning using self-supervision has been a holy grail area for Conversational AI. Most Conversational AI sy...
\section{Introduction} Magnetohydrodynamic (MHD) turbulence has been studied extensively for the purpose of understanding macroscopic plasma turbulence as well as understanding universal physics of turbulence which should be shared with neutral fluid turbulence. Numerous theoretical, numerical, and observational works ...
\section{Introduction} Social networks have become increasingly important in our daily life. Commonly, people join multiple social networks to enjoy different types of services at the same time, e.g., Facebook and Twitter. Users usually have separate accounts in different social networks. They can act as bridges connec...
\section{Introduction} \label{sec:introduction} \IEEEPARstart{M}{illimeter-wave} (mmWave) communication technology presents great opportunities in a wide range of data-intensive applications. Owing to the wider available bandwidth in the mmWave band, this greatly supports the 5G new radio (NR) access technology to comp...
\section{Introduction} Network data is among the most common types of relational data. As a fundamental task in network data analysis \cite{wasserman1994social,goldenberg2010survey}, \emph{community detection} refers to the problem of partitioning the nodes of a network into clusters so that intra-cluster nodes are...
\section{Introduction} \label{sec:intro} In recent years, the outskirts of galaxy clusters have emerged as one of the new frontiers for cosmology and astrophysics \citep[see][for review]{walker_etal19}. Recent theoretical advances revealed that the physical outer boundary for a dark matter (DM) halo can be defined us...
\section{Introduction} Let $T$ be a weighted tree. The tree metric induced by $T$, denoted $M_T$, is the complete graph on the vertices of $T$ where the weight of each edge $(u, v)$ is the weight of the path connecting $u$ and $v$ in $T$. For $t\ge 1$, a $t$-spanner for a metric $(V, d)$ is a subgraph $H$ of the comple...
\section*{ACKNOWLEDGMENTS} The 1.85-m telescope project is promoted on a lot of contributions of people engaged in this project, so the authors would like to thank all those people, Takafumi Kojima, Taku Nakajima, Toshihisa Tsutsumi, Ryoko Amari, Kozuki Yuto, Noriaki Arima, Ryosuke Kiridoshi, Takao Matsumoto, Shi...
\section{\@startsection{section}{1}% \z@{.7\linespacing\@plus\linespacing}{.5\linespacing}% {\normalfont\scshape} \makeatother \title[Compactness of Free Boundary CMC Surfaces]{Compactness of the Space of Free Boundary CMC Surfaces with Bounded Topology} \author{Nicolau S. Aiex and Han Hong} \date{\today} \address...
\section{Introduction}\label{sec:intro} \begin{figure*}[!t] \centering \includegraphics[width=\linewidth, page=1]{./figs/utils/ris_nonterrestrial} \caption{RISs can enable low-cost and energy-efficient non-terrestrial communication links including HAPS, satellites, and even deep space communications syste...
\section{Introduction} Deep Neural Networks (DNNs) have achieved great success in different computer vision problems, e.g., image classification~\cite{krizhevsky2017imagenet}, detection~\cite{ren2016faster}, and semantic segmentation~\cite{long2015fully}. Such success is demanding for large datasets with clean human-an...
\section{Introduction} \IEEEPARstart{I}{nfertile} couples worldwide use In-Vitro Fertilization (IVF) to treat their infertility. In a typical IVF treatment, clinicians stimulate the woman to produce many eggs, fertilize those eggs, and culture the resulting embryos for 3--5 days. The clinicians then visually inspect ...
\section{Introduction} A recurring theme across many diverse areas of mathematics is the natural occurrence of structures for which a key aspect can take one of only two values. We mention several examples of this two-valued phenomenon. In coding theory, a projective two-weight code is a linear code whose codeword ...
\section{Introduction} In the design of control systems for industrial applications, it is important to achieve a certain level of fault tolerance. There has been a growing interest in the literature recently on developing effective fault tolerant paradigms for reliable control of real-world systems \cite{Frank2004}. ...
\section{Introduction} \subfile{sections/introduction} \section{Related Work} \subfile{sections/related_work} \section{Materials} \subfile{sections/materials} \section{Event Extraction} \subfile{sections/event_extraction} \section{COVID-19 Prediction Application} \subfile{sections/covid_prediction} \section{Conclu...
\section{Introduction} \label{section:introduction} It is increasingly common in the natural and social sciences to amass large quantities of geo-referenced data. Researchers seek to use these data to understand phenomena and make predictions via interpretable models that quantify uncertainty taking into account the s...
\subsubsection{\@startsection{subsubsection}{3}% \begin{abstract} Serverless computing becomes the new trending paradigm in cloud computing, allowing developers to focus on the core application logic and rapidly prototype applications. Due to the great prospects of serverless computing, in recent years, most major clou...
\section{Conclusion} \vspace{-0.1in} We have presented {\textsc{DiTucker}}\xspace, a deep multi-fidelity active learning approach for high-dimensional outputs. Our deep neural network based multi-fidelity model is flexibly enough to capture the strong, complex relationships between the outputs and between the fideliti...
\section{Introduction} Generation of picosecond optical laser pulses with tailored temporal intensity envelopes is a technically challenging task. Their narrow spectral bandwidth restricts methods that attempt to modify temporal intensity through spectral phase and their temporal duration is too short to exploit dire...
\section{Introduction} Even though the idea of a ``canonical'' $1.4 M_{\odot}$ mass for compact stars has been around for years, it became clear in the last decade or so that this single-scale is not tenable \cite{HV}. At least one additional peak, and most likely two \cite{nos1} are present in the mass distribution, ...
\section{Introduction} The strong shock wave released from the metal--vacuum/gas interface may eject a great number of metal particles.\cite{Sollier:1,Monfared:1,Asay:1,Speight:1,Ogorodnikov:1} Most of these particles are of micrometer-scale in size. This phenomenon of ejecta, or microjetting, was first observed by Kor...
\section{Introduction} Deep Neural Networks (DNNs) have achieved human-level performance in many computer vision tasks such as image classification, object detection, and segmentation. However, the increased compute cost and memory requirement of large DNN models pose a burden on resource-constrained environments such ...
\section{Introduction} During past decades, significant attention has focused on embedded or networked control systems that have limited and time-varying controller's computation capability due to high requirements on multitasking operations. In particular, assuming constant and limited computational resources, bound...
\section{Introduction} \setkeys{Gin}{draft=false} Complex magnetic lattice configurations have gained attention both theoretically and experimentally during the last decade as part of the search for topological and non-collinear magnetic orders, flat-band and Kitaev interactions, and the elusive quantum spin liquid st...
\section{Introduction}\label{intro In the accreting systems, large scale jets are usually steady, while episodic jets are sometimes related to flares, which are observed on the smaller scale. One such example is Sgr~A*, a massive black hole in the Galactic centre, where we observe radio, infrared and X-ray flares seve...
\section{Introduction} \iftoggle{arxiv}{}{} Multivariate extreme value theory is complicated by the lack of natural ordering in $\mathbb{R}^d$, and the infinite possibilities for the underlying set of dependence structures between random variables. Some of the earliest characterizations of multivariate extremes were i...
\section{Introduction} In the past half-decade, there has been a burst of activity surrounding the application of deep learning methods (particularly neural networks) to a variety of problems in collider physics. Much of this research has been focused on tagging jets \cite{Lonnblad:1990qp, Cheng:2017rdo, Luo:2017nc...
\section{Introduction} Let $G$ be a graph with vertices $\{v_1,v_2,\ldots,v_n\}$ that are totally ordered $v_1<v_2<\cdots <v_n$. In~\cite{St1}, Stanley defined the chromatic symmetric function $\csf{G}$ of $G$ as \begin{equation} \csf{G} = \sum_{\kappa: V\to \mathbb{P}, \text{ proper}} {\bf x}^{\kappa} = \sum_{...
\section{Introduction} \label{intro} The study of dense granular packings is an active field of research in materials science. In these packings, the macroscopic and structural properties rely heavily on the characteristics of the individual grains (friction, stiffness, restitution, etc.). For instance, it is known tha...
\section{Introduction} Let $\Omega\subseteq \mathbb{R}^2$ be a smooth bounded domain and $W_0^{1,2}(\Omega)$ be the completion of $C_0^{\infty}(\Omega)$ under the Sobolev norm $\|\nabla_{\mathbb{R}^2} u\|_2^2= \int_{\Omega}{|\nabla_{\mathbb{R}^2} u|^2}dx,$ where $\nabla_{\mathbb{R}^2}$ is the gradient operator on ${...
\section{Introduction} \label{sec:introduction} \input{sections/introduction} \section{Related Work} \label{sec:related} \input{sections/related} \section{Methods} \label{sec:methods} \input{sections/methods} \section{Experiments and Analysis} \label{sec:experiments} \input{sections/experiments} \section{Discussion...
\section{Introduction} Full understanding of the radiation generated by accelerating charged particles is crucial for accelerator physics and electrodynamics in general. The predictions of classical electrodynamics for pulse-by-pulse average characteristics of synchrotron radiation, such as the total radiated power, s...
\section{Introduction} The era of precision observation of the neutron star, and the multi-messenger astronomy and astrophysics has begun. One of the most fundamental questions in the neutron star physics is what is the correct equation of state (EoS) of nuclear matter at densities below and above the saturation d...
\section{Introduction} Semimartingale and non-semimartingale properties of the standard fractional Brownian motion (FBM) $B^H$ and its mixtures are well understood. These properties are important in modeling stock price \cite{kluppelberg2004fractional,rostek2009option}, constructing arbitrage strategies and hedging p...
\section*{acknowledgments} This work is supported by NSFC under Grant No.11674058 and NCET-13-0734.
\section{Introduction} Seyfert 1 galaxies and quasars vary in the optical and X-ray continua on timescales of hours to decades. They show typical root mean square (rms) variabilities of 10–20 percent and, on occasion, changes by a factor up to 2 in their optical luminosity \citep{rumbaugh18} on timescales of years. S...
\section{Introduction} \label{sec:intro} \input{sections/intro} \section{Related Work} \label{sec:related} \input{sections/related} \section{Background} \label{sec:background} \input{sections/background} \section{Method} \label{sec:method} \input{sections/method} \section{Experiments} \label{sec:experiments} \inp...
\section{Introduction} \label{sec:intro} 3D object detection from point clouds has received much attention in recent years~\cite{zhou2018voxelnet,shi2019pointrcnn,shi2020pv,yin2021center,fan2022fully} as its wide applications in autonomous driving, robots navigation, etc. State-of-the-art 3D detectors~\cite{shi2021pv...
\section{Introduction} \label{sec:introduction} Storing data in deoxyribonucleic acid (DNA) promises unprecedented density and durability and is seen as the new frontier of data storage. Recent experiments have already demonstrated the viability of DNA-based data storage \cite{church_next-generation_2012, grass_r...
\section{Introduction} In mainstream macroeconometrics literature of structural vector autoregressive (SVAR) models, Gaussian behaviour of structural shocks is assumed either explicitly or implicitly, and the consequence is that only second order information can be exploited. This leads to the well-documented proble...
\section{Introduction} In this paper, we address multivariate Hermite interpolation of a function that takes values on a complete Riemannian manifold $\mcM$ with tangent bundle $T\mcM$. More precisely, let $D\subset \R^d$ be a parameter domain and consider a differentiable function \begin{equation*} f\colon D \to \...
\section{Introduction} In the past decades, the error Backpropagation algorithm (BP) \cite{error_backpropagation} has developed into an indispensable technique to train Deep Neural Networks (DNNs) with high performance. However, BP has numerous drawbacks. First, it relies on the sequential propagation of errors th...
\section{Introduction} \vspace{-0.1cm} Deep learning methods have demonstrated their tremendous potential when it comes to medical image segmentation. However, the success of most existing architectures relies on the availability of pixel-level annotations, which are difficult to produce \cite{challenges}. Furthermore,...
\section{\textsc{Cifar} supervised transfer learning} \label{apx:cifar10_100_sl} \textsc{Cifar10} supervised transfer learning experiments train a \textsc{resnet18} network on the \textsc{Cifar10} dataset with/without L2 weight decay (4e-5) for $200$ epochs. During training, we use a SGD optimizer \citep{bottou2018op...
\section{Introduction} Increasing levels of sophistication are required to build large-scale, data-driven models of complicated, nonlinear dynamic processes. Koopman operator theory provides an alluring, though nuanced, approach to building such models \cite{rowley2009spectral, schmid2010dynamic, mezic2013analysis...
\section{Introduction} More than a century after its proposal, General Relativity continues to score successes by accurately describing an ever-increasing range of phenomena, all the way from cosmology to the spectra of gravitational waves from binary mergers and the shadows of black holes. Aside from its truly impres...
\section{Introduction} The quantum groups provide the key to $q$-deforming the basic structures of physics from the point of view of non-commutative geometry. The theory plays an important role in the conformal field theory, exact soluble models in statistical physics \cite{Baxte1982} and in a wide range of applicatio...
\section{Introduction} \label{sec_intro} Data-driven approaches are becoming a competitive and viable means for solving some challenging problems in scientific computing. In particular, machine learning and data science techniques are being developed specifically for scientific tasks such as predicting solutions fro...
\section{Introduction} Currently available quantum hardware do not have the capability to perform fully fault tolerant quantum computation due to the non-availability of high fidelity qubits. However, due to the inherent decoherence in quantum mechanics from interactions of the system with the environment, errors are ...
\section{Introduction} Accreting active galactic nuclei (AGN) can be identified by their optical emission line features such as broad and/or narrow high ionization lines. Doppler broadened Broad Emission Lines (BELs) originate from the gravitationally-bound broad-line region (BLR). In contrast, the narrow-line region...
\section{Introduction} \label{intro} Flow of immiscible fluids in porous media \cite{b88,s11,b17,ffh22} is a problem that has been in the hands of engineers for a long time. This has resulted in a schism between the physics at the pore scale and the description of the flow at scales where the porous medium may be...
\section{Introduction} \label{sec:intro} Video Super-Resolution (VSR) aims to recover high-resolution (HR) frame sequences from their low-resolution (LR) counterparts, where the utilization of complementary information across adjacent frames is the key factor to improve performance. VSR can be roughly classified into...
\section{Introduction} In recent years, conditional image generation has received significant attention in the computer vision community. Some applications that make use of conditional image generation include text-to-image generation (\eg DALLE-2~\cite{ramesh2022hierarchical}) and image restoration (\eg SR3~\cite{saha...
\section{Introduction} The interaction of composite particles with electromagnetic, QCD energy-momentum and weak currents are parameterized in terms of the corresponding form factors (FFs) as the building blocks. Having determined these FFs, one can construct different observables in terms of these non-perturbative ob...
\section{Introduction}\label{sec:intro} To protect accounts from unauthorized access, login notifications are intended to inform users about recent sign-ins. Depending on the service, the notifications are only sent if the login occurred from an \textit{unknown location} or \textit{new device}, which could indicate ma...
\section{Introduction} \label{sec:01} \input{sections/01_Intro} \section{Liquidation Mechanics} \label{sec:02} \input{sections/02_Liquidation_Mechanics} \section{Toxic Liquidation Spirals} \label{sec:03} \input{sections/03_Toxic_Liquidation_Spiral} \section{Mitigation Measures} \label{sec:04} \input{sections/04_Mitigat...
\section{Conclusion} \noindent We build one of the first generative adversarial networks 3DHumanGAN that achieves 3D-aware synthesis of full-body human images. Our 2D-3D hybrid generator effectively and efficiently uses 3D geometric prior of the human body and achieves consistent appearance under varying poses and vi...
\subsubsection*{Acknowledgements}} \long\def\longthanks#1{\subsubsection*{Acknowledgements} #1}% \def\enddoc@text{} \def\@makePagedeGarde \ifcdr@pagedegarde {\makeatletter\input{CR-pagedegarde}}% \newpage\pagecolor{white}\gdef\GPT@pageliteral{}\fi} \ifcdr@sommaire \let\cdr@postabstracthook\@empty \def\ps@firstpage{...
\section{Introduction}\lb{sec1}\lb{sec1} The post-Newtonian (PN) approximation (see, e.g., \cite{1987thyg.book..128D,1997PThPS.128..123A,2003trso.conf..411B,2006LRR.....9....4B,2007LRR....10....2F,2018tegp.book.....W} and references therein) is a computational scheme for solving the Einstein's field equations of his G...
\section{Introduction} Mobility on demand (MoD) systems, in which a fleet of free-floating vehicles serves customers' ad hoc requests for point-to-point transportation, have transformed urban mobility in recent years. Companies like Uber, Lyft, and DiDi, made MoD more accessible compared to taxi-based ride hailing serv...
\section{Introduction}\label{sec-1} Let $V$ be a vector space over a field $K$. Recall that a linear map $R\colon V\otimes V\to V\otimes V$ is said to be a solution of the Yang--Baxter equation if \[(R\otimes{\id})({\id}\otimes R)(R\otimes{\id})=({\id}\otimes R)(R\otimes{\id})({\id}\otimes R).\] This equation originat...
\section{Introduction} \label{sec_intro} One of the fundamental observables both in classical and quantum field theory is the stress tensor (or stress-energy or energy-momentum tensor) $T_{\mu\nu}$. It enters the Einstein equations in General Relativity, linking the distribution of matter to the curvature of spacetime...
\section{Introduction} \label{sec:sgnd_introduction} Complex datasets with outliers in the response and/or heavy-tailed errors can pose a challenge for standard modelling techniques. Classical regression procedures that assume normally distributed errors minimize the sum of squared errors (SSE) function, which can be p...
\section{Introduction} The concept of cographs was unfolded independently by several researchers \cite{Corneil 1, Jung,Lerchs, Seinsche, Sumner} around $1970$. They give a simple structural decomposition with disjoint union and graph complement operations that can be described by a labelled tree which are used algori...
\section{Introduction} Nowadays, counterfeiting and piracy are among the main challenges for modern economy. Existing methods of anti-counterfeiting are very diverse, ranging from watermarking techniques, special inking, holograms, electronic IDs, etc. The drawbacks of these technologies are that they can be expens...
\section{Introduction} It is well-known that the collection of fixed points of normal unital completely positive (UCP) maps has a von Neumann algebra structure on introducing a new product called the Choi-Effros product. This von Neumann algebra is known as the Poisson boundary of the UCP map. In \cite{BhatTalwarKar} ...
\section{Introduction} Jensen's square principle $\Box_\k$ at an infinite successor cardinal $\k^+$, as well as its natural weakenings $\Box_{\k, {<}\l}$, are very well studied principles in combinatorial set theory that can be naturally viewed as incompactness or anti-reflection principles. For example, and as is wel...
\section{Introduction and related works} Distributed data fusion (DDF) is a process in which a group of agents senses their immediate environment, communicates with other agents, and aims at inferring knowledge about a specific process collectively. Some applications include cooperative robots mapp...
\section*{Multimedia Material} Project page: \url{https://github.com/tub-rip/event_collapse} \section{Introduction} Event cameras \cite{Lichtsteiner08ssc,Finateu20isscc} are an emerging technology attracting considerable attention because of their advantages, such as low latency, high dynamic range and data...
\section{Introduction} Corrosion of metallic interfaces leads to weakening of their structural integrity and has been widely estimated to cost billions of dollars annually \cite{koch2002corrosion}. While this has inspired numerous studies on corrosion and strategies to protect against it, the fundamental atomistic mec...
\section{Introduction} The celebrated Brezis-Oswald theorem \cite{BO} states, among other things, that the problem \begin{equation} \label{bo} \begin{cases} -\Delta u=f(x, u) &\text{in $\Omega$}\\ u=0&\text{on $\partial\Omega$}\\ u\ge 0 &\text{in $\Omega$} \end{cases} \end{equation} in a connected smooth bounded domai...
\section{Introduction} The current high precision era of lattice QCD introduces new questions on data generation, availability and access. With the increase in precision comes also an increase in numerical cost as well as the size and complexity of the data. Especially data sharing and community access become importan...
\section{Introduction}\label{sec:introduction} It is well-known that blockchain-based systems suffer from the information isolation problem~\cite{xie2019survey}, which prevents message transports, value exchanges, and collaborative operations among blockchains, hindering the advantages of blockchain technologies in c...
\section{Introduction} The generation of quantum states of light has long been a milestone of quantum optics. An example of such states are squeezed states, in which the uncertainty in one observable reduces at the expense of the other, An example of such variables are number and phase. States of light squeezed in ph...
\section{Introduction} \label{sec:intro} \textit{Discriminative classification} and \textit{generative classification} are two different approaches to solving classification problems. In discriminative classification, we directly model the posterior distribution of the class labels $p({k}|\bm{x})$. This posterior distr...
\section{Introduction}\label{sec:introduction} \begin{figure} \centering \includegraphics[width=\linewidth]{problemsetting_5.pdf} \vspace{-20pt} \caption{\textbf{Comparisons between UDA, OSUDA and OSDG.} UDA assumes there are a large number of unlabeled target real images available. Nevertheless, OSUDA...
\section*{Table of Contents} \tableofcontents \newpage \section{Introduction} \label{sec:intro} In the last decade, with the observation of gravitational wave events by the LIGO Scientific Collaboration \cite{LIGOScientific:2016aoc,LIGOScientific:2016sjg,LIGOScientific:2017bnn,LIGOScientific:2017vox,LIGOScientific:20...
\section{Introduction} The Large Hadron Collider (LHC) is currently the highest energy particle collider in the world. It accelerates beams of protons to almost the speed of light and then collides them at a centre-of-mass energy of 13.6 TeV at the centre of large, multi-purpose particle detectors that are designed to...
\section{Introduction} In order to improve Language Models (LMs), the Natural Language Processing field has removed most of the system-induced biases in the last few years. For instance, practices that were once standard such as lemmatization, stemming and feature engineering have progressively disappeared in favor of ...
\section{Introduction} \label{sect:Introduction} In spite of major efforts for more than 50 years, the understanding of radiation damage in silicon by hadrons remains a big challenge. Reasons are the large number of radiation-induced states in the silicon band gap, the formation of defect clusters and the difficult...
\section{Introduction} This paper showcases \texttt{PSTMonitor}\xspace, a tool supporting the run-time monitoring of quantitative properties of message-passing applications. The underlying methodology of \texttt{PSTMonitor}\xspace, recently described in the companion paper~\cite{DBLP:conf/coordination/BurloFSTT21}, r...
\section{Introduction} The final task of the 3rd ACM-China IPCC is to optimize a program for graph spectral sparsification. In this competition, three test cases and source code of a program are provided for participants. These test cases are used for performance evaluation, which consist of 4K, 7K and 16K nodes res...
\section{Introduction} \label{sec:intro} The wave instabilities generated by electron beams in various plasma setups are invoked in many applications in astrophysics and space plasmas. Magneto-genesis in galaxies and intergalactic medium can be explained by the Weibel-type instabilities involving interpenetrating elec...
\section{Introduction} The next-generation wireless communication systems aim for increased data rates, reduced lower latency and large-scale access. The mmWave technology has shown significant promise in meeting these requirements \cite{hemadeh2017millimeter, 8424038, shokri2015millimeter}. Communication at mmWave fre...
\section{Implementation details} \label{sec: implementation} \subsection{Training Procedure} \label{sec: training_details} The overall training procedure is shown in algorithm \ref{alg:train}. We use the weighted version of our nonparametric representation during training, as displayed in lines 3 - 9. Another option...
\section*{Introduction} Improving access to research is a broad and inclusive effort, championed and moved forward by individuals and organizations around the world. In scientific publishing, arXiv has played an important role in open access for over 30 years by removing financial, institutional, and geographic barrier...
\section{Introduction} \label{sec:introduction} It is well established that galaxy mergers play a fundamental role in the growth of galaxies in the Universe. In addition to the assembly of the main matter components, the merger process is predicted to have short-lived, but dramatic, effects on numerous galactic proper...
\section{Introduction} In his $1940$ book \emph{The Theory of Group Characters and Matrix Representations of Groups}, D.~E.~Littlewood devotes a section to the evaluation of the Schur function $s_\lambda$ at a set of variables ``twisted'' (not his term) by a primitive $t$-th root of unity $\zeta$ \cite[\S7.3]{Littl...
\section{Lossless Compression} \label{app:lossless} The goal of lossless compression is to encode samples from a discrete probably distribution $x\sim p_d(x)$ $x\in \mathcal{X}$ as bit strings $m=\texttt{enc}(x) \in \{0,1\}^*$ of shortest possible length $\ell(m)$ such that $x$ can be decoded without loss of informat...
\section{Introduction} \par We study a~combinatorial property of a~pair ${\mathcal I},{\mathcal J}$ of ideals on~$\omega$. Namely, we consider the~following variation of a~P-ideal: \begin{defi}\label{definiciaPJ} We say that an~ideal ${\mathcal I}$ is a~$\mathrm{P}({\mathcal J})$-ideal if for any family $\{I_n:n\in\o...
\section{Introduction} \label{intro} Let $\Omega \subset \mathbb{R}^{n+1}$ be open; let $E_\ell\subset \mathbb{R}^{n+1}$, $\ell\in\mathbb{N}$, and $E$ be Caccioppoli sets in $\Omega$ (sets with locally finite perimeter); let $g_\ell:\Omega \to \mathbb{R}$, $\ell\in\mathbb{N}$, and $g:\Omega\to \mathbb{R}$ be functions...
\section{Introduction} We begin with the following definitions that play a pivotal role in this paper. In addition, by the capital letter $N$ we denote a standard Gaussian random variable $N \sim N(0,1)$ with density function $p_N (x)=(2\pi)^{-1/2}e^{-x^2/2} $, $x\in {\rm I\kern-0.16em R}$. All random variables throu...
\section{{\rm REFERENCES}} \sloppy \hyphenpenalty10000 \begin{list}{}{\leftmargin1cm\listparindent-1cm \itemindent\listparindent\parsep0pt\itemsep0pt} {\end{list}\vspace{2mm}} \def~{~} \newlength{\DW} \settowidth{\DW}{0} \newcommand{\hspace{\DW}}{\hspace{\DW}} \newcommand{\refitem}[5]{\item[]{#1} # \def#5}\ifx\REFARG...