text stringlengths 54 548k | label stringclasses 4
values | id_ stringlengths 32 32 |
|---|---|---|
While polaritons can be understood as semiclassical excitations of the electromagnetic field in a polarizable medium {{cite:f3bf59ead23a79a3bad4545b317f5c2541ac032e}}, a full quantum-mechanical theory of polaritons was originally proposed by Hopfield {{cite:60ff43c81adcc1afcc7bd2e55f7d554b8f1d4be4}} and Agranovich {{ci... | i | 8d3c171ea1e0eace44ba9bb150d9de55 |
Next, we took the resistivity measurements under magnetic field {{formula:eac6bcd9-51c5-465f-aa21-4da81ab1dff8}} perpendicular to and parallel with {{formula:b1414f09-701c-4dbf-8565-4945e92c96d0}} , and the results are displayed in Fig. REF (b) and (c), respectively. For {{formula:f3ebb5d2-a11c-4188-b676-a7c1fab02bbb}... | r | 5624746225d1723eeca80c517e4b214e |
There are different approaches to designing trajectory prediction models in the literature. Scene-based methods mainly rely on the semantic map of the environment alongside the agents' positional information represented as a point-cloud map {{cite:487bce901a1984ef450e3f3b1294f56be9bfad97}}, {{cite:1eb6fbeb3f40696034be1... | m | ddbf08d12e1cf3470c7b8eb7394b8439 |
Quantitative Experiments
For comparison, the state-of-the-art methods,
HKS-Net {{cite:863c53f14c513980a607b95c3f1dad7bcc1e15b2}}, HMR {{cite:6cbc5ad6961934aa48e1b6c3ecce322c0af50e5f}} and SMPLify {{cite:7f349e795970b215b9627e04cdfbbf28364a52d1}} are trained with the same data and compared
to the proposed network. HKS-N... | r | c0e25e80afd88251c78497730264744e |
We next consider the N-jettiness beam function, which is a SCET-1 observable with {{formula:8f40b9c4-12f1-4690-a65f-b7bc8d6c4d1b}} . In this case we extract
the two-loop non-cusp anomalous dimension {{formula:50195e35-ae9c-42c9-a69c-5cb4a5515ae6}} and the non-logarithmic terms of the matching kernels
{{formula:d6551f7... | r | 4e05d2594b90e84f9e1fe422e250f1bb |
Primordial hydrogen may reduce mantle oxides and produce H{{formula:5d5c8590-3015-4849-8661-9c05dac3c8cc}} O {{cite:79d048d68a77a89b2f9ffba63639c68480d16fd3}} or FeH, but it is unclear if reduced Fe would merge with the core {{cite:758bc67f6b636f1fa3658be910750d565efafc53}}. In global chemical equilibrium, mantle oxyge... | d | b97e2fb554390870915f7dff2d2266a1 |
It is well known {{cite:cbcd6492d0b09b1d50e54a65125ee363a330c0c1}} that BDFp (and hence NDFp) are unstable
for {{formula:c5e1ad5b-2b09-43fd-8189-2dbb0c27e58f}} , and for {{formula:7c060dab-4305-403d-901e-086b355cd29b}} the stability region is small and hence not practically
useful in our case. Further the celebrated D... | m | 7a164376a578b93ec10eb49b0bb875b3 |
GPDs are projections of Wigner distributions that give access to the unknown mechanical properties of the nucleon involving both space and momentum correlations. Among these are the quark and gluon angular momentum, along with spin directed {{formula:7846cc00-5558-4da3-aba2-2fd8e1f54335}} interactions {{cite:dd4059120... | m | 25bbd551368d84f9fa798deb57b157a0 |
On the other hand, quantum computer hardware technologies are maturing, making quantum algorithms a possible solution to reduce the training cost of neural networks. When this paper was written, a quantum computer with 127 qubits was revealed {{cite:6337399f07ac6b0227a58e061e767734e6798a42}}. However, the actual capabi... | i | 55e9ccf43120839e1cbb398440f3d9a3 |
We evaluated each method using the source-to-distortion ratio (SDR) {{cite:34fa41ac60f5e81b0c404bb6c3a2db205be2a778}}
of the directional target speech, which measures the separation quality and the absence of distortion.
For each of the methods, the SDR behaviors with respect to the elapsed time are shown in Fig. REF .... | r | e5b2cca8a1e3bdf67f2ca4b30fa46cad |
From the measurements of the cosmic microwave background (CMB), we know that ordinary matter (photons, electrons, etc) were part of a thermal bath, at a temperature of {{formula:3619596c-c9ed-41c7-bcec-3617f872c9a1}} eV. In the context of {{formula:93f6f0ec-453d-4830-b15e-bb45e6bc1e37}} CDM, the universe is at first d... | i | 79bd6058187d260e9a2a7646eb1a811a |
the limiting distributions under the null and alternative can be derived but are hard to simulate from. To alleviate this it is standard to use a bootstrap procedure {{cite:ef5a7049dfbd48d6ec55561a201c67e114f8e36c}}
{{formula:5ff6b7ed-d62d-4cd7-a027-3325d89783a1}}
| m | 46a902b796cf2df110444e16438e9b23 |
Boundedness is trivial, while continuity comes from the same property of the trace operator, for which we refer to {{cite:342ec19b3637de177e8421054bddc4dd92d4fcd8}}. Since strict monotonicity is a straightforward consequence of the vector inequalities in {{cite:8d9e6850e55911b42608f189930884430ea22b53}}, it remains to ... | r | a3b65bd08f22b415b5d87db580aa234c |
The Page curve has recently been postulated to develop from the action of islands {{cite:878b9ccd90b5ca918eb486ff9bbe4e963ee25045}}{{cite:4c2d353e30cf95e14c02dec31bc0c86e595f03dc}} {{cite:609cd83667986d1397b44306f363e5d99af882c0}} {{cite:033686cba4259777b21a490f16e8ed49cc9416cf}}. The density matrix of R is generally d... | i | 51199e6c84e8e3adfd94e6d7c6f84ba5 |
In this section, we discuss our experiments and results. We evaluate our model on logical inference {{cite:f574f1af8a218ae3b3bb201b8c694c10a87b62f3}}, list operations (ListOps) {{cite:4160e05d81dbe11ad93e0daad800edc6b0ee0693}}, sentiment analysis—two datasets, SST2 and SST5 {{cite:3980d2e8582bd514340ab745ce6ccc472996f6... | r | 7e7d04f07d0b66645e3392555ec77be1 |
The relationship between the speed-ups and the number of processors with the OpenMP approach is shown in Fig.REF for a small model size, where the speed-up is the ratio of computational time between eight and more than eight processors. Between the processor number 8 and 16, the maximum speed-up value increases with t... | r | 93ff0468bdd192656cc7a149e58dfa86 |
We discuss several directions for future research. First, the proposed estimators cannot adapt to the contemporaneous correlation among elements of the random error {{formula:412f0d62-2396-4ed0-8ad2-7e0018848c28}} , which may lead to efficiency loss. This issue can be addressed by considering the generalized least squa... | d | 2c674ff17d7ebde93f698d81c53dfcbf |
The trade-off between fairness and privacy is of great concern to the machine learning community, but previous work has not suggested promising research directions for how to best solve this dillemma. Our results go beyond previous work on the trade-offs between fairness and privacy {{cite:baba36405bcea1e6acbeb0a250e28... | d | 4857fe195d69a9c0f5799c91e0f682f9 |
Similar to the base model comparison in Section REF , we assess how the proposed M4M method affect RoBERTa large models in this section. We use the training data of BooksCorpus {{cite:91471700a3057af17ae60307d173fcff018ed74b}} plus English Wikipedia {{cite:cf92530c5afe45acc66624e978cdbc92a017b1e2}}, {{cite:aec855d237a5... | m | bae7a9a8682967ac74fccacc9d2d3baa |
As briefed in section , the optimal parameters can be realized using modular architecture and modular units. The parameters are reduced to {{formula:a597b58d-50eb-46e5-b6fb-7f996abdf739}} using given set of rules in section REF , as shown in Fig. REF (b). For the validation of the 3-DoF modular configuration, a Unifi... | r | cc40d8625721b2fd2a3b5457a50f91fe |
Figure REF and REF shows results of image classification on CUB-200-2011 {{cite:d38f071a8899ae9b1c772b37acda5775628d9d4c}} and CARS {{cite:d9bbf3db02b9811214b3b6da09eddc89dbb1d74c}} dataset {{formula:1607fcf3-9af8-46d7-ab26-ab85077b2253}} test images using Photon Net. Probability output of incorrect class is hig... | r | d02ae81377acab330f6e9416b791c71c |
The validation accuracy of scratch and Full KD learning on GENEactiv dataset is presented in Fig. REF . Training from scratch with the original data shows higher accuracy than KD with original data in very early stages before 25 epochs. However, KD shows better accuracy than the models trained from scratch after 40 epo... | m | 0a59356bb436cab80ac9d207f8e757f6 |
EmbDTA: Instead of a specific feature extractor, it only uses an embedding layer. We add this to see how much the proposed method improves the performance of the task using only the interaction. It uses SMILES and FASTA to represent the drugs and targets, respectively.
DeepDTA {{cite:705ea3fdcdfafed3e5901620045b01340... | m | 0149b69e84d48cc082a2fadf43d49663 |
We implemented the enumeration methods on Magma {{cite:801bc247bc6cc19158cd55b6d3cd7a4bdf5bab4f}}, and the source codes are available at the web page of the second author, see Subsection REF for the url.
Computational results obtained by our implementation will be described in Subsection REF .
| i | 00e0773dbfc312da0a277eddc02353c1 |
Instance normalization proved quite influential. Normalizing the representation extracted from the content allowed training networks which could produce outputs in a multiple predefined styles (typically 30-50). Chen et al. {{cite:04133238e324b03d378a366c1c572f3a17427403}} proposed training an architecture where the pa... | m | 90b9a24ab67e5f44f0efc457cebb299e |
On the other hand, as the Mach number vanishes, the flow converges to the incompressible limit. For the full Euler equations, at the incompressible limit, the density remains constant along the fluid particle trajectories, and the pressure waves propagate with infinite speed. Mass conservation equation reduces to the i... | i | cf66c9f59586bfa1b13f1a0eed146b4d |
Given the dependence of subhalo concentration on mass, our detailed quantitative results depend on the exact {{formula:3768bc65-e4e2-48e7-bae7-eae7dccf055d}} –{{formula:11be3e99-7ef6-44e5-bafd-11265232cc55}} relation assumed. When we use the empirical {{formula:cfe0e5a8-5282-4966-b779-b6f7b02c7c67}} –{{formula:cc0e7fd... | d | 1bdb734d71dc5218a16611095581b67c |
The vacuum is an elusive concept. From just a featureless ground state in classical field theory and quantum mechanics it acquires a rich structure in quantum field theory. The pioneering efforts of Dirac, Zeldovich, Hawking, Coleman, Kibble and others have shown that the vacuum gravitates, it can give origin to a ther... | d | fe7f39c02e377609bf7481d6ea4096b5 |
This can be seen as a classical collocation scheme for Volterra integral equations {{cite:2be5ee216e1f9a9f533f515c636da81b6032c2c9}}, {{cite:c603428693a8a4c523605cf8c7e7f90a6e92cadf}} and is equivalent to the L1 scheme of {{cite:e7b66541c63bbb31218b5d669575965c45fc7c49}} and {{cite:abac149bf7d3ecc14d8360b25a52f8dae9a35... | m | 425147bfc733abbd776294c9f8af88f3 |
To describe microscopic states of the population we use so called
marked configurations {{formula:55ad2ccc-5b60-4b25-9b71-5cc7a54c2054}} , cf. {{cite:b9419fb3ca34be39c18266cb2b7e01b0e9aa983d}}. Set
{{formula:0f314d4a-4b3f-4355-ae60-e01600a54776}}
| i | 5386d0dbe45ff97a864576f0597a7896 |
To address S1, our detection framework involves BP reverse-engineering using a small, clean dataset independently collected by the defender, like existing REDs. To address S3, unlike existing REDs that perform anomaly detection involving statistics from all classes, we inspect each class independently using a novel det... | m | 42088d09a8baa2d8c8f8b8d791820544 |
In this paper, we propose LightCap, a lightweight yet high-performance image captioning method for mobile devices.
Our core design is largely inspired by the recent CLIP method {{cite:14fce0bb31ab8c7ba696093161613e854747e18f}}.
CLIP is an impressive image-text retrieval model, which readily tells what objects exist in ... | i | f9f8789fb35e508603b8e9f16c4870e5 |
Our style-transfer based data transformation tackles this problem by applying appropriate low-level transformations to existing vanilla car image datasets {{cite:81f59750fcc8e8ae0cbce04c0179f4c3e5db6f17}}. As the degree and type of style transfer is controlled by user-defined weights and reference images respectively, ... | i | 953a56a5234de7ecc3b16f4438a643ee |
We draw inspiration from situated cognition in the context of grounded language understanding, and show that intermediate states in the external world can be leveraged to help incrementally guide models to a correct solution. In so doing, much of the bookkeeping that traditional models have to do (i.e., of “imagining” ... | d | aacda625b47e514a7bb6a75cc1a02500 |
We analyse the complexity of decidable fragments of first-order
temporal logic on finite traces. To start with, we show that
{{formula:a7b10dfc-3ef2-4c2e-a107-43a4293d697d}} -hardness holds already for the constant-free one-variable
monadic fragment {{formula:0e1cc8b6-bef6-4049-9915-cd8ff5aefd89}} . This fragment can b... | r | 64954a6692b09030feca556efeb6c4ec |
The first assumption requires all units to have a positive probability of being treated or untreated. The second assumption states that there is a well-defined population distribution for treatment, outcomes and covariates and that all units are drawn independently from it {{cite:e920acd90440ee5c3106cd10a44be2ddf776e0d... | m | 73fc3f7afa6c6211e7621deba043244c |
The symmetrical chirp effects on the momentum spectrum and reduced particle number can also be discussed in terms of the turning point structure of potential in semiclassical regime by employing complex Wentzel-Kramers-Brillouin (WKB) scattering approach. The scattering potential is determined by solving the equation {... | d | 321f20856fe851c46b721aa99822d017 |
To evaluate on the test-set, we upload predictions to Cityscapes benchmark server. We use the HS3-Fuse architecture trained using an HRNetv2-w48 {{cite:ef40d2475dc9159bd3c8edb3811feee3939248a2}} with OCR {{cite:8292175739b2ccb674bded40eaa5b7b6e9fa989a}} and Hierarchical Multi-scale attention(HMS) {{cite:447961b54775333... | r | e6ba7d7a890b935c55c3895236a87c51 |
Quantum computation is believed to be much more powerful than classical one, especially when it comes to problems which are incapable for a conventional computer, such as the prime factorization {{cite:e0af2eb5b012fd52cb92295bd5a2ec5dd5d73020}}, {{cite:b4b78d2c5e9182aa730ccc0a6146e84efd2e8dfd}}. However, full-scale qua... | i | 25196e05ac564c4a1f8af575c6ef71f4 |
CIFAR-10. For the CIFAR-10 dataset, we follow an analogous procedure. The obtained comparative effectiveness of our approach is depicted in Table REF . Therein, we also compare to the best-performing models in {{cite:8594ce02528346e190529a2a52acc9a0ca4837f6}}, namely the Madry model {{cite:ccc39453ecb3668c0bd70b4e257b0... | r | 4d06934e827b77dc9444d7f7acd3cd73 |
A typical set of eigenvalues of the linearisation about a fixed point
of (REF )-(REF ) is shown in Fig. REF . Recall that we have
discretised {{formula:690cc2e8-512e-4146-b78c-0f36e51010ee}} with 50 points. We see 49 points on the negative real axis,
each corresponding to a perturbation localised at one or two
neighbo... | r | 9a6a44263e93323d690c73c7d2cc7942 |
In a previous work, we had explored the use of a PCA-Net as a surrogate constitutive model at the macroscale {{cite:d61d054d40241360fcb177ba922d862e187e647f}}. The PCA-Net does not have a causal architectureA trained PCA-Net, however, does learn causality from the data. and seeks to approximate the response over the en... | d | 15db3f59b44d74f74abea4edb08effae |
Analogous results hold for the sample average approximation {{formula:5b0705be-8189-4fae-b20f-a6964b43a42f}} of {{formula:560b4cd1-8b56-4a1d-8146-0127269542b6}} and the sample average approximation {{formula:39951751-9126-40c2-b878-ef01bfa5c7a6}} of {{formula:13c67efa-3946-4203-b046-0aaec8bb1da0}}
{{cite:e6e18a04ac... | m | aba0bdf56db9c12684a8faedbd32a5fc |
Once the sparse graph is created, the goal to the robot is fed in terms of a goal image, {{formula:6179d769-e5fe-40e9-be41-eebfd9d86613}} . The goal image associates with it a set of frames based on the environment that it is located in. These are the frames the robot “needs to view” to associate it with a room ID {{fo... | m | f9655093d00734823bf19c83f23e301d |
Reading someone else's handwriting is often a challenging task; some of the characters are unclear, the text is cursive, there is background clutter and the image quality can be low. When deciphering each character, we often rely on the surrounding area to compensate for the occasional obscurity of local areas in the t... | i | 203b7683e40e58ee46c14272dbab767c |
We evaluate the performance of Scene Designer for both compositional sketch search (SBIR) and synthesis, contrasting performance against contemporary baselines for both tasks. We explore the efficacy of our model for both search and synthesis from sketch, image and mixed domain compositions. For SBIR we compare against... | d | 9b2ef83ee8bd4fe012eb5c983ba5f0fc |
agrees with the asymptotic estimates in {{cite:751d350a49fbd07e4c67591abb0e8226140969d2}}, {{cite:a195a20e457f10519a6bec407e385b76869c296a}} (recall from Remark REF that {{formula:48d43c85-5bb7-490e-b524-860092f52ad9}} , where {{formula:07c25efd-b9a5-43f6-bca2-6533b488480c}} denotes the small parameter in {{cite:751d... | r | 87326e3e59ac0f0c1b53e72f48c580e9 |
The granular dynamics has not the same characteristics in different granulator geometries
and may favor more or less collisional or frictional contacts between primary particles
and influence the redistribution and transport of the binding liquid. The granulation
process is easier to model and control when the agglomer... | i | 39287e8152bb2292f9411424abe7df55 |
Security is another important topic. Security itself is a common issue in autonomous and cooperative distributed systems, especially when it comes to open systems. In wireless ad hoc networking, a friend mechanism {{cite:802b6fe83443b2501982f499dfced0c1441976f3}} can be helpful for acquiring the basic security. Anomaly... | d | 080989ecd631289020bfa8719bec8a89 |
>0, =1, ,L,
which leads to a square system when {{formula:ac0e4adc-e775-459d-a7f6-963116e2277b}} and an overdetermined system when {{formula:b2301130-b8cd-472f-9292-121c411c19f6}} . We would like to point out that there is no theoretical result for the choice of the interval {{formula:42a61db2-8b6b-4832-b64e-3f0b9... | m | e9754123d75080e97fdd9cd119ffec5d |
To handle problem (), we formulate a semi-definite program by using the Gram matrix of the unknown vectors in the problem. Indeed, we form the Gram matrices {{formula:322ecd8a-dbd2-4a58-ba04-d2f181552823}} and {{formula:ac9232cc-c9fd-4773-b7a0-bf034cc79899}} corresponding to {{formula:96e30ae7-dd1f-462b-94e3-3b435720... | m | 6f528f77fe7b62cb3640928824a71a6f |
In recent years, various methods have been proposed utilizing deep learning architectures for extracting embedding vectors and have shown better performance than the i-vector framework when a large amount of training data is available {{cite:968a51e8221169a313987f7763b85fc6e4722c6b}}.
In {{cite:18f14988c226b0609572561d... | i | d316ace32c8d4630057088501ce6e1e0 |
A promising direction, NOTEARS {{cite:8984fafa3a34fb760c9924cac49479a35ff4c45d}}, formulates a smooth characterization of acyclicity that can be incorporated into a continuous optimization and solved using well-known numerical methods. NOTEARS was later extended to parametric nonlinear models and nonparametric models {... | i | c76c7f8eb00a8188e589f07e406905e0 |
The Tsfresh set on the other hand, included a `relevant subset' of 63 different time series characteristics such as absolute entropy, kurtosis, skewness etc.The interested reader may refer to https://tsfresh.readthedocs.io/en/latest/text/list_of_features.html for a complete list of time series characterization techniqu... | r | 7bf5c75fa420c5e630160f795d09d8b8 |
Although the flux phase or {{formula:974c0b7a-b0d8-47bb-888b-6ad3e575a360}} CDW is a candidate for
describing the pseudogap,
its existence
in the {{formula:76ae9827-165d-4ffd-bd83-6dbf9815e1df}} -{{formula:3665acf9-d0a7-42d6-a0bb-4c85f760d227}} and Hubbard models is controversial.
While some reports show the presence ... | d | 7f96d876e09cf4e6be0502dff85a8c31 |
The material 1T-TiSe{{formula:80d66d9d-6de8-42bf-b881-582383fa0b76}} has been long known to have a low-temperature CDW phase.
The origin of the CDW is still controversial but may be caused by the Coulomb interaction induced excitonic condensate {{cite:4ce989573f09c7937f817cc2a4c1d9a74f7c45dd}}, {{cite:e9f161c2f7c8c0c2... | i | bd3b42c2a814a6c22cb732e318232b20 |
where {{formula:f916cbc8-62cf-4514-aaa3-ed2bd8095241}} are the fitting parameters.
Our results for the form factors are presented in Table. REF and compared with the results from light-cone sum rule (LCSR) {{cite:2d9b0fea2c6e8edf5b2fadbb941958e1e2543677}} where the form factors are parameterized by
{{formula:d9a8ab0d... | r | 3fa2c03b1d78e61354b812fc9ef9268a |
Super-class Based Performance on COD10K. For the challenging dataset COD10K {{cite:2f113267c36256bd0cf9035abdbd0509566f5d09}}, it contains five super-classes: “Amphibians”, “Aquatic Animals”, “Flying Animals”, “Terrestrial Animals”, and “Others”.
Due to limited space, we only report the quantitative results of each SO... | m | c737cdbfdc2222a6f7ef74120d76073c |
where {{formula:8bc63823-16d7-4ee9-b5b6-4cef0b58163e}} is the {{formula:787d0e18-2cce-4750-b92c-4834c84d9142}} matrix of the parameter differences,
{{formula:51c451b5-0dd1-48a6-a98d-6db8318afe4d}} , {{formula:319f9190-0363-4366-a2ea-2a3616f142cc}} are the covariance matrices for the corresponding parameters in the H... | m | 8b61dbcdcd6d5b0b6def41f8b5e0aa75 |
These results suggest that Rb and Cs masers are unlikely to occur frequently in M- and L-dwarf atmospheres.
A survey of 10 giant stars and two
globular clusters for the 6.8 GHz {{formula:1019787f-7f1c-4a54-8ce0-f9a6b2c9886d}} Rb maser by {{cite:7d9afb73f5573c5b24874a285d26bfdb32c4cec4}} likewise made no detections. I s... | r | d5ad1d53c0452b638e4fa09e3d2f5d13 |
Feature extraction for each modality is separate. This allows the fusion process to be independent of point-wise or sequential operations. This is motivated by three reasons: First, independent encoding allows for retaining the complementary information from both modalities. For example, image features are not simply a... | d | a2289465793fee69e9205aedd3d95942 |
We describe the results on UCF-101 {{cite:c8d0afc02f93fa569fc0a435c15989c4bd9e9768}} and HMDB-51 {{cite:c6683c2043473c59b49f24958875315c236e335c}} datasets using ImageNet or Kinetics pre-training in Table REF .
From the results, we can check the effects of augmentations in terms of model pre-training.
Although the impr... | r | e10325be0201f73e68f86b4c8192ea85 |
Within both the EfficientNet and XCiT results, we see the desired model scaling effects where accuracy improves as the network increases in size.
This signifies that the Sig53 dataset is sufficiently challenging for this ML network research.
We can also see that XCiT significantly outperforms EfficientNets in terms of ... | r | 5f7bbaac2e14e7d0d9b1a49eb6b6ab91 |
Estimation of uncertainty represents a first step in understanding the imperfect information in our natural surroundings. Future directions of interest include: 1) improving the post-processing of the uncertainty by implementing algorithms that result in better models (e.g. the unscented Kalman filter or particle filte... | d | 44f81b67dbd2a9e59320ee129e40081b |
We have compiled the model with XLA {{cite:681b1992a18115c89cdc649d0700e91ec9f54585}} and ran inference for the 15th frame in scene 8907419590259234067_1960_000_1980_000 that has 68 vehicles and 69 pedestrians on a Nvidia T4 GPU. The latency is 43ms, more efficient than the popular realtime detector PointPillars {{cite... | r | 0361aa9e79490b499960bf9167fb7bc9 |
Let {{formula:2e280c36-4bd6-4991-9784-fe1be64fc15a}} denote the {{formula:c738026b-f3a5-4b35-8e2e-4dfa985080c2}} -dimensional area measure on {{formula:4c7e5f31-bf10-4c69-a4ba-63cf51b36b68}} normalized to be a probability measure; that is, {{formula:228d6e50-36a3-48f8-a192-afd39a5b4424}} , where {{formula:ddfcd91a-98... | r | 011c1922c19fe41029ba78a2e9d46f4d |
We evaluate clustering algorithms by four widely used metrics, unsupervised clustering accuracy (ACC) {{cite:59e7b5396ff42e592a68ddac462c9d991b8ca3a0}}, normalized mutual information (NMI) {{cite:af824d248a2f05d2facd21570ad5aec8c98292f9}}, adjusted rand index (ARI) {{cite:af824d248a2f05d2facd21570ad5aec8c98292f9}}, and... | r | cadde96006d6c84ba24e4dea2bfe4334 |
where {{formula:5315c7fc-9b37-432b-99a6-6821d6fa52d5}} {{cite:a6de100eb60d6d773e9064400b205906be7a447c}}. In addition, {{formula:0c4e7a30-ef94-4866-9c00-952090718832}} and {{formula:3f6abda1-9f17-4c94-99e5-e6b0f34bc868}} are fixed by fitting the corresponding decay widths. In particular, since the {{formula:31944c13... | r | 9302b750b065854a5758049423c6dd60 |
We use ResNet-18 {{cite:94c4707b3757a0295b1af3a30b20a4392fcf2994}} as the backbone network, a two-layer nonlinear MLP as the projector, and a linear predictor. Unless specified otherwise, SGD is used as the optimizer with weight decay {{formula:71f5c135-e84b-418c-8928-676761d4a055}} . To evaluate the quality of the pre... | r | 403ce6848064fe7b2898308cd9fb7ed8 |
Finally, FedTriNet will retrain the client model using both the real labeled data and the pseudo-labeled data. Note that since there are three models in each client, we choose to retrain the finetuned combined model, which is significantly different from FedAvg {{cite:c87c2e45b107882bc54536fc03cb600aa9888774}} and FedS... | i | 2ecd0f26c53b3cbd1619047ea15a76d5 |
Programming languages are similar to natural languages in many ways, and natural language translation has been studied extensively. Sequence-to-sequence translation models, which map input sequences to output sequences, have achieved great performance {{cite:02e10252638c9e844885e3211752a173ced0124b}}, {{cite:638caf5ee9... | i | 882dc5e77f47145135b146c3017381ec |
We would like to address some related topics for further consideration.
First, are there any algebras to characterize this type of vertex operators?
In other words, are these vertex operators the representations of some algebras?
Date, Kashiwara and Miwa {{cite:6399571f36834cb27858c0f1c0a18b6aa87719f2}} found that
the ... | d | dadd46ce0ad6d0b2d04a0c32dfc01cd9 |
Table REF lists the results of each method across the datasets that we propose. Our new measure and new datasets reveal several important properties of non-homophilous node classification. Firstly, both methods that only use node features and methods that only use graph topology appear to perform better than random, t... | r | 8b752bebb9ce5699a78a8acbecf991f4 |
Figure REF is an extension of Figure REF in the main document, and is produced under the same experimental conditions described in Section REF . The top row of Figure REF subplots shows the targeted success rates (tSuc) versus query counts ({{formula:f8d9e1e4-8966-43e8-9285-8ee738972a77}} ) for the (snake, lizard), ... | r | 06e989a595522d8c3f0cdc1134ffbd81 |
This paper demonstrates (1) what makes Vanilla-SC fail and (2) how Regularized-SC fixes that problem. One key motivation for Vanilla-SC is that it relaxes a discrete optimization problem of minimizing graph conductance {{cite:273da8d47be518bef70a01698ec51d0368c1582f}}. Yet, this graph conductance problem is fragile to ... | i | de4c5914759a0bbc9ba0c958d4641d23 |
To proceed, we must first consider the mass of a debris disc. Defining {{formula:ed9138f6-1256-4da0-9284-8321f47a88ea}} as the number of particles of radius {{formula:fda321f6-91ac-45fc-b2e8-e33d568986a7}} in the range {{formula:f8b085ca-99de-4fb6-b221-dedeff0ea8e0}} , the debris disc size distribution is often model... | m | 7230d1c03b5d68a60ce3aacd57f88482 |
By now, a lot of research efforts have been dedicated to providing
security through physical layer methods. A power control scheme is
proposed in {{cite:37df540b608e440d2722b6233d419d421f8df761}} to ensure that an eavesdropper can
never reach its desired signal-to-noise-plus-interference ratio
(SINR). However, such sch... | i | 50edc6ccb67e01db3a2973a90176cfca |
From a learning perspective, generating the distribution of successful 6-DoF grasps is quite challenging, because the distribution is multi-modal, discontinuous, imbalanced and ambiguous due to (self-) occlusions. Furthermore, direct regression in high dimensional output spaces like {{formula:7815d9c8-abf2-4694-b283-63... | m | a9a80d24fa7cb5b125eb671c5e555f20 |
Our results of the branching ratios from the LFQM and {{formula:410ec1c4-8040-49e5-bc1a-0045bdc46946}}
are given in Table REF ,
where we have also shown the {{formula:4de26c6c-769b-4a91-a697-c39e9070e8a8}} evaluations in Ref. {{cite:4a644c7e8cb52112f6f70897aa60c3c3506cb253}} and some of other theoretical predictions
... | r | e9c19e77ec652920f0d0faba36701af6 |
The contribution {{formula:48af5549-eefd-4314-82e9-f4c7b78d14ec}} from the host galaxy is an unknown factor that enters FRB observations for most of the unlocalized FRBs. The value of {{formula:07ed3b3e-3dc3-4cf3-a8a5-4b4674b04bd5}} is expected to vary from FRB to FRB depending on the host galaxy and the location of ... | m | fc59c07d0e017c7192a4e90fe51195b9 |
r2v-config performs the best or nearly the best for all graphs (Figs. REF A–F).
It consistently outperforms other random walk-based methods in all cases despite the fact that node2vec and r2v-config train the same model.
The two methods have two key differences.
First, r2v-config uses baseline {{formula:9ba7d43e-e589-4... | r | 34a7c8648acf555719e37a47cc2f5330 |
The exponent depends in general on the interaction strength {{formula:338e3f46-c982-4063-b587-2f856c1c62d8}} , vanishing for {{formula:4a8d227e-3c48-4eb9-ac5e-e7c8d332b62b}} . The self-similar form (REF ) is borrowed from the one particle quantum walk, for which the ballistic law {{formula:4fa77931-50f8-4b5c-84fb-9f8a7... | r | c2319307507988e7120444055d7d75bd |
The intrinsic and extrinsic of the camera and LiDAR are vastly different from each other. Data in both modalities need to be re-organized under a new coordinate system. Traditional early and deep fusion methods utilize an extrinsic calibration matrix to project all the LiDAR points directly to the corresponding pixels ... | m | b8b3b442a0b73919de5fece510e9e598 |
Several previous studies have defined analogs to high-{{formula:1b540fc3-f761-460c-9e71-6e68e3068a12}} galaxies using a variety of approaches. For instance, {{cite:20d90a600a4269111d8c5935c3ed8e19102faaa8}}
and {{cite:8f7d08a7f684dc8310f02f9ce18fbd49bdb170a1}} found that ultra-violet luminous galaxies (UVLGs) with hig... | i | c9ea8d547bafde0f9043e0736f63c5dd |
CVT Algorithm and Optimality. In general, it is difficult to prove guarantees for CVTs {{cite:36f6b98393f1a80f211729bec331f2cfdb95d681}}. Liu et al. provide theory on CVT convergence {{cite:6adb6827f3d8aff2b03f3055408ec631b107ee93}}. Despite theoretical challenges, CVT algorithms adaptively minimize energy and are argu... | d | d90e84d1432be1646a26c59fee54bda6 |
We first assess whether sentence encoders yield coherent representations of meaning by computing the Spearman correlation between the human ratings present in the sick benchmark {{cite:dc4124a06c6d9ef51f22e2dc68b15c562eaf2aaf}} and the cosine and Euclidean distances between the two corresponding sentence embeddings; as... | m | b3c9c636e68f8128a96c4a1c7a5d9d6d |
Although current methods for generalized MORL are sample efficient, they combined preference values with expected values in a linear manner to derive decisions or to learn expected value functions. When observed in the space of per-objective expected returns, linear methods can identify policies that belong to expected... | i | ac9ed016fdf0696ddb4c4d827f4c1e15 |
Challenge 1: Scalable self-backhauling design. The majority of prior works relies on point-to-point links, e.g., {{cite:bff7897ec9e57eaaa3f67058810cd3ad59d9d801}}, {{cite:a80360b7c9903ebc841932facf88f7882b7b8f56}}, between MBS and SBSs, which is unscalable in dense SBS deployments. The scalability issue is addressed in... | i | 917215289851fe1fd190f595ceb3e7ed |
Computation Time (CompT).
Fig. REF compares CompT for a different number of participants {{formula:4ddce9d7-c57b-41e5-8416-5da407ceef20}} and a different number of training passes {{formula:7a71b4be-f8f3-434c-8c89-0b3834e210f3}} . In the experiments, we use ResNet-18 and normalize their overheads. As we can see, mor... | r | b81fcb0c144fe1d42e9386e8e5d0e789 |
Lemma 2.4 (Equation 2.19 in {{cite:f271412465ad057c58daa10909fa563638d5688d}})
Let {{formula:8b477669-efdd-444b-ac4c-0873aefd3679}} , where each {{formula:1550ab37-5f78-4083-91db-c0996cbdf66e}} .
Then, {{formula:2c259ef9-28df-4df2-862b-de186942d3c5}} and for any {{formula:fc352bc3-72cd-44ce-a1bb-fe16d254cd7d}} , we ... | r | bcab53968b67c837c3ac095110d2d498 |
General sequential approaches such as GRU4Rec {{cite:54e6b9b0b2ff2cac4377bd81d3a276c1e8b0f627}} and SASRec {{cite:e6c2672e218aebd28ecb7987b10ede6fac5a62bc}}
rely on explicit item IDs to construct the sequential model, where they assume item IDs are pre-given. These approaches can't perform well under the cold-start set... | d | 7aac4b9ad57d158b1912122a79d624e4 |
Our work shows that while most of the research effort has focused on model-free methods in meta-RL {{cite:96fc1c9e3ce2db85b6f79fc089e5ff707ae76a1b}}, learning to learn might need explicit modeling and then planning. Also, the use of the Transformer architecture can be critical to model the complex relationship between ... | d | d268590674f826e3ebae60003fef67de |
The previous approach can be easily extended to the case of having several observed data instances {{formula:92a058fc-8b78-4437-8efb-3a2a4487cff4}} . In that case the objective is simply the sum of {{formula:fd561ed9-0e4e-416d-ab0d-c3bf0c6b75e7}} , for {{formula:ec4a8767-c3e7-4b6e-b974-38057489d3ec}} , where {{formula:... | m | df93e57175489ca5ccdd39cc8c5238ef |
and updating the prior model by incorporating the the simulated and observed LWD measurements (analysis) .
The output of the analysis component is the posterior model.
In the following, we explain the method in more detail.
The prior ensemble
The prior ensemble contains all our prior knowledge, obtained from geological... | m | fa286100fa3a0b2f654a4e656722709c |
Presented augmentation leads to more balanced image classes and it also increases rotation invariance of the CNN. Bicubic interpolation is used when the angle was not a multiple of 90°. As was shown by Goodfellow et al. {{cite:da4536f2b066d45045baa1e3dc3a2478cc2dcf28}}, such data augmentation by flipping and rotation c... | m | 7e54ac1931164eae3e4f56b98305339b |
More generally, the phylogenetic networks that we have
considered in this paper did not have arc weights. It would
be interesting to understand how arc weights might affect
our results, especially when we want to make
a straight-line drawing where the length of an
arc is proportional to its weights. A special case that... | d | d07d3ec8735034a433ed8764c2eca662 |
Let {{formula:7830a9ba-23c0-4aef-87f1-bef582993125}} be the miniversal family for the deformation of {{formula:14f85047-121a-497d-9843-8bd25a14b094}} . Since the Milnor number of hypersurface singularities is upper semicontinuous under deformations, the Milnor number of the isolated Du Val surface singularity {{formul... | d | 58f30a37cdaf69cfb40fd453a7653afd |
As discussed in {{cite:087d1645dd55cebe5d88fbeb64d25c1c7ecd9375}}, the random geometry description
of the {{formula:91de312a-4193-4a9a-a96a-c76a4880250d}}-deformed CFTs can be straightforwardly translated into the
AdS/CFT framework. The gravity dual is an ensemble of AdS{{formula:bf33d2e1-a7ec-413d-b4b9-47e92f609f02}} ... | d | 9e60bc504f33fd6d8bdc443a9894b8ed |
CP alternatives.
Algorithms of aggregated CP {{cite:0bfde49c4bdb4333a1d5d1ac1079c5421486a65d}}, cross CP {{cite:49ac49eb3c8ff0c45144487394fe89beb86ab2f3}},
CV+ and jackknife+ {{cite:2eb45f62694ccb01367757030ad81b6f3fe25605}} can be found in the respective references.
Note that CV+ and jackknife+, albeit originally desi... | m | 201d1948c38b085d9b4dc9ad3c1731e1 |
The spreading distance {{formula:862ece12-1f77-4994-9e35-174beb22c081}} of failures in the two peaks shows nonlocality characteristics of cascades. The nonlocality of the cascade suggests that the damage is distributed globally, which is hard to predict and recover. Indeed, figuring out the formation of bimodal distri... | r | 88d54fbdbdbac7ea27414216009e961b |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.