text
stringlengths
54
548k
label
stringclasses
4 values
id_
stringlengths
32
32
While polaritons can be understood as semiclassical excitations of the electromagnetic field in a polarizable medium {{cite:f3bf59ead23a79a3bad4545b317f5c2541ac032e}}, a full quantum-mechanical theory of polaritons was originally proposed by Hopfield {{cite:60ff43c81adcc1afcc7bd2e55f7d554b8f1d4be4}} and Agranovich {{ci...
i
8d3c171ea1e0eace44ba9bb150d9de55
Next, we took the resistivity measurements under magnetic field {{formula:eac6bcd9-51c5-465f-aa21-4da81ab1dff8}} perpendicular to and parallel with {{formula:b1414f09-701c-4dbf-8565-4945e92c96d0}} , and the results are displayed in Fig. REF (b) and (c), respectively. For {{formula:f3ebb5d2-a11c-4188-b676-a7c1fab02bbb}...
r
5624746225d1723eeca80c517e4b214e
There are different approaches to designing trajectory prediction models in the literature. Scene-based methods mainly rely on the semantic map of the environment alongside the agents' positional information represented as a point-cloud map {{cite:487bce901a1984ef450e3f3b1294f56be9bfad97}}, {{cite:1eb6fbeb3f40696034be1...
m
ddbf08d12e1cf3470c7b8eb7394b8439
Quantitative Experiments For comparison, the state-of-the-art methods, HKS-Net {{cite:863c53f14c513980a607b95c3f1dad7bcc1e15b2}}, HMR {{cite:6cbc5ad6961934aa48e1b6c3ecce322c0af50e5f}} and SMPLify {{cite:7f349e795970b215b9627e04cdfbbf28364a52d1}} are trained with the same data and compared to the proposed network. HKS-N...
r
c0e25e80afd88251c78497730264744e
We next consider the N-jettiness beam function, which is a SCET-1 observable with {{formula:8f40b9c4-12f1-4690-a65f-b7bc8d6c4d1b}} . In this case we extract the two-loop non-cusp anomalous dimension {{formula:50195e35-ae9c-42c9-a69c-5cb4a5515ae6}} and the non-logarithmic terms of the matching kernels {{formula:d6551f7...
r
4e05d2594b90e84f9e1fe422e250f1bb
Primordial hydrogen may reduce mantle oxides and produce H{{formula:5d5c8590-3015-4849-8661-9c05dac3c8cc}} O {{cite:79d048d68a77a89b2f9ffba63639c68480d16fd3}} or FeH, but it is unclear if reduced Fe would merge with the core {{cite:758bc67f6b636f1fa3658be910750d565efafc53}}. In global chemical equilibrium, mantle oxyge...
d
b97e2fb554390870915f7dff2d2266a1
It is well known {{cite:cbcd6492d0b09b1d50e54a65125ee363a330c0c1}} that BDFp (and hence NDFp) are unstable for {{formula:c5e1ad5b-2b09-43fd-8189-2dbb0c27e58f}} , and for {{formula:7c060dab-4305-403d-901e-086b355cd29b}} the stability region is small and hence not practically useful in our case. Further the celebrated D...
m
7a164376a578b93ec10eb49b0bb875b3
GPDs are projections of Wigner distributions that give access to the unknown mechanical properties of the nucleon involving both space and momentum correlations. Among these are the quark and gluon angular momentum, along with spin directed {{formula:7846cc00-5558-4da3-aba2-2fd8e1f54335}} interactions {{cite:dd4059120...
m
25bbd551368d84f9fa798deb57b157a0
On the other hand, quantum computer hardware technologies are maturing, making quantum algorithms a possible solution to reduce the training cost of neural networks. When this paper was written, a quantum computer with 127 qubits was revealed {{cite:6337399f07ac6b0227a58e061e767734e6798a42}}. However, the actual capabi...
i
55e9ccf43120839e1cbb398440f3d9a3
We evaluated each method using the source-to-distortion ratio (SDR) {{cite:34fa41ac60f5e81b0c404bb6c3a2db205be2a778}} of the directional target speech, which measures the separation quality and the absence of distortion. For each of the methods, the SDR behaviors with respect to the elapsed time are shown in Fig. REF ....
r
e5b2cca8a1e3bdf67f2ca4b30fa46cad
From the measurements of the cosmic microwave background (CMB), we know that ordinary matter (photons, electrons, etc) were part of a thermal bath, at a temperature of {{formula:3619596c-c9ed-41c7-bcec-3617f872c9a1}} eV. In the context of {{formula:93f6f0ec-453d-4830-b15e-bb45e6bc1e37}} CDM, the universe is at first d...
i
79bd6058187d260e9a2a7646eb1a811a
the limiting distributions under the null and alternative can be derived but are hard to simulate from. To alleviate this it is standard to use a bootstrap procedure {{cite:ef5a7049dfbd48d6ec55561a201c67e114f8e36c}} {{formula:5ff6b7ed-d62d-4cd7-a027-3325d89783a1}}
m
46a902b796cf2df110444e16438e9b23
Boundedness is trivial, while continuity comes from the same property of the trace operator, for which we refer to {{cite:342ec19b3637de177e8421054bddc4dd92d4fcd8}}. Since strict monotonicity is a straightforward consequence of the vector inequalities in {{cite:8d9e6850e55911b42608f189930884430ea22b53}}, it remains to ...
r
a3b65bd08f22b415b5d87db580aa234c
The Page curve has recently been postulated to develop from the action of islands {{cite:878b9ccd90b5ca918eb486ff9bbe4e963ee25045}}{{cite:4c2d353e30cf95e14c02dec31bc0c86e595f03dc}} {{cite:609cd83667986d1397b44306f363e5d99af882c0}} {{cite:033686cba4259777b21a490f16e8ed49cc9416cf}}. The density matrix of R is generally d...
i
51199e6c84e8e3adfd94e6d7c6f84ba5
In this section, we discuss our experiments and results. We evaluate our model on logical inference {{cite:f574f1af8a218ae3b3bb201b8c694c10a87b62f3}}, list operations (ListOps) {{cite:4160e05d81dbe11ad93e0daad800edc6b0ee0693}}, sentiment analysis—two datasets, SST2 and SST5 {{cite:3980d2e8582bd514340ab745ce6ccc472996f6...
r
7e7d04f07d0b66645e3392555ec77be1
The relationship between the speed-ups and the number of processors with the OpenMP approach is shown in Fig.REF for a small model size, where the speed-up is the ratio of computational time between eight and more than eight processors. Between the processor number 8 and 16, the maximum speed-up value increases with t...
r
93ff0468bdd192656cc7a149e58dfa86
We discuss several directions for future research. First, the proposed estimators cannot adapt to the contemporaneous correlation among elements of the random error {{formula:412f0d62-2396-4ed0-8ad2-7e0018848c28}} , which may lead to efficiency loss. This issue can be addressed by considering the generalized least squa...
d
2c674ff17d7ebde93f698d81c53dfcbf
The trade-off between fairness and privacy is of great concern to the machine learning community, but previous work has not suggested promising research directions for how to best solve this dillemma. Our results go beyond previous work on the trade-offs between fairness and privacy {{cite:baba36405bcea1e6acbeb0a250e28...
d
4857fe195d69a9c0f5799c91e0f682f9
Similar to the base model comparison in Section REF , we assess how the proposed M4M method affect RoBERTa large models in this section. We use the training data of BooksCorpus {{cite:91471700a3057af17ae60307d173fcff018ed74b}} plus English Wikipedia {{cite:cf92530c5afe45acc66624e978cdbc92a017b1e2}}, {{cite:aec855d237a5...
m
bae7a9a8682967ac74fccacc9d2d3baa
As briefed in section , the optimal parameters can be realized using modular architecture and modular units. The parameters are reduced to {{formula:a597b58d-50eb-46e5-b6fb-7f996abdf739}} using given set of rules in section REF , as shown in Fig. REF (b). For the validation of the 3-DoF modular configuration, a Unifi...
r
cc40d8625721b2fd2a3b5457a50f91fe
Figure  REF and  REF shows results of image classification on CUB-200-2011  {{cite:d38f071a8899ae9b1c772b37acda5775628d9d4c}} and CARS  {{cite:d9bbf3db02b9811214b3b6da09eddc89dbb1d74c}} dataset {{formula:1607fcf3-9af8-46d7-ab26-ab85077b2253}} test images using Photon Net. Probability output of incorrect class is hig...
r
d02ae81377acab330f6e9416b791c71c
The validation accuracy of scratch and Full KD learning on GENEactiv dataset is presented in Fig. REF . Training from scratch with the original data shows higher accuracy than KD with original data in very early stages before 25 epochs. However, KD shows better accuracy than the models trained from scratch after 40 epo...
m
0a59356bb436cab80ac9d207f8e757f6
EmbDTA: Instead of a specific feature extractor, it only uses an embedding layer. We add this to see how much the proposed method improves the performance of the task using only the interaction. It uses SMILES and FASTA to represent the drugs and targets, respectively. DeepDTA {{cite:705ea3fdcdfafed3e5901620045b01340...
m
0149b69e84d48cc082a2fadf43d49663
We implemented the enumeration methods on Magma {{cite:801bc247bc6cc19158cd55b6d3cd7a4bdf5bab4f}}, and the source codes are available at the web page of the second author, see Subsection REF for the url. Computational results obtained by our implementation will be described in Subsection REF .
i
00e0773dbfc312da0a277eddc02353c1
Instance normalization proved quite influential. Normalizing the representation extracted from the content allowed training networks which could produce outputs in a multiple predefined styles (typically 30-50). Chen et al. {{cite:04133238e324b03d378a366c1c572f3a17427403}} proposed training an architecture where the pa...
m
90b9a24ab67e5f44f0efc457cebb299e
On the other hand, as the Mach number vanishes, the flow converges to the incompressible limit. For the full Euler equations, at the incompressible limit, the density remains constant along the fluid particle trajectories, and the pressure waves propagate with infinite speed. Mass conservation equation reduces to the i...
i
cf66c9f59586bfa1b13f1a0eed146b4d
Given the dependence of subhalo concentration on mass, our detailed quantitative results depend on the exact {{formula:3768bc65-e4e2-48e7-bae7-eae7dccf055d}} –{{formula:11be3e99-7ef6-44e5-bafd-11265232cc55}} relation assumed. When we use the empirical {{formula:cfe0e5a8-5282-4966-b779-b6f7b02c7c67}} –{{formula:cc0e7fd...
d
1bdb734d71dc5218a16611095581b67c
The vacuum is an elusive concept. From just a featureless ground state in classical field theory and quantum mechanics it acquires a rich structure in quantum field theory. The pioneering efforts of Dirac, Zeldovich, Hawking, Coleman, Kibble and others have shown that the vacuum gravitates, it can give origin to a ther...
d
fe7f39c02e377609bf7481d6ea4096b5
This can be seen as a classical collocation scheme for Volterra integral equations {{cite:2be5ee216e1f9a9f533f515c636da81b6032c2c9}}, {{cite:c603428693a8a4c523605cf8c7e7f90a6e92cadf}} and is equivalent to the L1 scheme of {{cite:e7b66541c63bbb31218b5d669575965c45fc7c49}} and {{cite:abac149bf7d3ecc14d8360b25a52f8dae9a35...
m
425147bfc733abbd776294c9f8af88f3
To describe microscopic states of the population we use so called marked configurations {{formula:55ad2ccc-5b60-4b25-9b71-5cc7a54c2054}} , cf. {{cite:b9419fb3ca34be39c18266cb2b7e01b0e9aa983d}}. Set {{formula:0f314d4a-4b3f-4355-ae60-e01600a54776}}
i
5386d0dbe45ff97a864576f0597a7896
To address S1, our detection framework involves BP reverse-engineering using a small, clean dataset independently collected by the defender, like existing REDs. To address S3, unlike existing REDs that perform anomaly detection involving statistics from all classes, we inspect each class independently using a novel det...
m
42088d09a8baa2d8c8f8b8d791820544
In this paper, we propose LightCap, a lightweight yet high-performance image captioning method for mobile devices. Our core design is largely inspired by the recent CLIP method {{cite:14fce0bb31ab8c7ba696093161613e854747e18f}}. CLIP is an impressive image-text retrieval model, which readily tells what objects exist in ...
i
f9f8789fb35e508603b8e9f16c4870e5
Our style-transfer based data transformation tackles this problem by applying appropriate low-level transformations to existing vanilla car image datasets {{cite:81f59750fcc8e8ae0cbce04c0179f4c3e5db6f17}}. As the degree and type of style transfer is controlled by user-defined weights and reference images respectively, ...
i
953a56a5234de7ecc3b16f4438a643ee
We draw inspiration from situated cognition in the context of grounded language understanding, and show that intermediate states in the external world can be leveraged to help incrementally guide models to a correct solution. In so doing, much of the bookkeeping that traditional models have to do (i.e., of “imagining” ...
d
aacda625b47e514a7bb6a75cc1a02500
We analyse the complexity of decidable fragments of first-order temporal logic on finite traces. To start with, we show that {{formula:a7b10dfc-3ef2-4c2e-a107-43a4293d697d}} -hardness holds already for the constant-free one-variable monadic fragment {{formula:0e1cc8b6-bef6-4049-9915-cd8ff5aefd89}} . This fragment can b...
r
64954a6692b09030feca556efeb6c4ec
The first assumption requires all units to have a positive probability of being treated or untreated. The second assumption states that there is a well-defined population distribution for treatment, outcomes and covariates and that all units are drawn independently from it {{cite:e920acd90440ee5c3106cd10a44be2ddf776e0d...
m
73fc3f7afa6c6211e7621deba043244c
The symmetrical chirp effects on the momentum spectrum and reduced particle number can also be discussed in terms of the turning point structure of potential in semiclassical regime by employing complex Wentzel-Kramers-Brillouin (WKB) scattering approach. The scattering potential is determined by solving the equation {...
d
321f20856fe851c46b721aa99822d017
To evaluate on the test-set, we upload predictions to Cityscapes benchmark server. We use the HS3-Fuse architecture trained using an HRNetv2-w48 {{cite:ef40d2475dc9159bd3c8edb3811feee3939248a2}} with OCR {{cite:8292175739b2ccb674bded40eaa5b7b6e9fa989a}} and Hierarchical Multi-scale attention(HMS) {{cite:447961b54775333...
r
e6ba7d7a890b935c55c3895236a87c51
Quantum computation is believed to be much more powerful than classical one, especially when it comes to problems which are incapable for a conventional computer, such as the prime factorization {{cite:e0af2eb5b012fd52cb92295bd5a2ec5dd5d73020}}, {{cite:b4b78d2c5e9182aa730ccc0a6146e84efd2e8dfd}}. However, full-scale qua...
i
25196e05ac564c4a1f8af575c6ef71f4
CIFAR-10. For the CIFAR-10 dataset, we follow an analogous procedure. The obtained comparative effectiveness of our approach is depicted in Table REF . Therein, we also compare to the best-performing models in {{cite:8594ce02528346e190529a2a52acc9a0ca4837f6}}, namely the Madry model {{cite:ccc39453ecb3668c0bd70b4e257b0...
r
4d06934e827b77dc9444d7f7acd3cd73
A typical set of eigenvalues of the linearisation about a fixed point of (REF )-(REF ) is shown in Fig. REF . Recall that we have discretised {{formula:690cc2e8-512e-4146-b78c-0f36e51010ee}} with 50 points. We see 49 points on the negative real axis, each corresponding to a perturbation localised at one or two neighbo...
r
9a6a44263e93323d690c73c7d2cc7942
In a previous work, we had explored the use of a PCA-Net as a surrogate constitutive model at the macroscale {{cite:d61d054d40241360fcb177ba922d862e187e647f}}. The PCA-Net does not have a causal architectureA trained PCA-Net, however, does learn causality from the data. and seeks to approximate the response over the en...
d
15db3f59b44d74f74abea4edb08effae
Analogous results hold for the sample average approximation {{formula:5b0705be-8189-4fae-b20f-a6964b43a42f}} of {{formula:560b4cd1-8b56-4a1d-8146-0127269542b6}} and the sample average approximation {{formula:39951751-9126-40c2-b878-ef01bfa5c7a6}} of {{formula:13c67efa-3946-4203-b046-0aaec8bb1da0}} {{cite:e6e18a04ac...
m
aba0bdf56db9c12684a8faedbd32a5fc
Once the sparse graph is created, the goal to the robot is fed in terms of a goal image, {{formula:6179d769-e5fe-40e9-be41-eebfd9d86613}} . The goal image associates with it a set of frames based on the environment that it is located in. These are the frames the robot “needs to view” to associate it with a room ID {{fo...
m
f9655093d00734823bf19c83f23e301d
Reading someone else's handwriting is often a challenging task; some of the characters are unclear, the text is cursive, there is background clutter and the image quality can be low. When deciphering each character, we often rely on the surrounding area to compensate for the occasional obscurity of local areas in the t...
i
203b7683e40e58ee46c14272dbab767c
We evaluate the performance of Scene Designer for both compositional sketch search (SBIR) and synthesis, contrasting performance against contemporary baselines for both tasks. We explore the efficacy of our model for both search and synthesis from sketch, image and mixed domain compositions. For SBIR we compare against...
d
9b2ef83ee8bd4fe012eb5c983ba5f0fc
agrees with the asymptotic estimates in {{cite:751d350a49fbd07e4c67591abb0e8226140969d2}}, {{cite:a195a20e457f10519a6bec407e385b76869c296a}} (recall from Remark REF that {{formula:48d43c85-5bb7-490e-b524-860092f52ad9}} , where {{formula:07c25efd-b9a5-43f6-bca2-6533b488480c}} denotes the small parameter in {{cite:751d...
r
87326e3e59ac0f0c1b53e72f48c580e9
The granular dynamics has not the same characteristics in different granulator geometries and may favor more or less collisional or frictional contacts between primary particles and influence the redistribution and transport of the binding liquid. The granulation process is easier to model and control when the agglomer...
i
39287e8152bb2292f9411424abe7df55
Security is another important topic. Security itself is a common issue in autonomous and cooperative distributed systems, especially when it comes to open systems. In wireless ad hoc networking, a friend mechanism {{cite:802b6fe83443b2501982f499dfced0c1441976f3}} can be helpful for acquiring the basic security. Anomaly...
d
080989ecd631289020bfa8719bec8a89
>0,   =1, ,L, which leads to a square system when {{formula:ac0e4adc-e775-459d-a7f6-963116e2277b}} and an overdetermined system when {{formula:b2301130-b8cd-472f-9292-121c411c19f6}} . We would like to point out that there is no theoretical result for the choice of the interval {{formula:42a61db2-8b6b-4832-b64e-3f0b9...
m
e9754123d75080e97fdd9cd119ffec5d
To handle problem (), we formulate a semi-definite program by using the Gram matrix of the unknown vectors in the problem. Indeed, we form the Gram matrices {{formula:322ecd8a-dbd2-4a58-ba04-d2f181552823}} and {{formula:ac9232cc-c9fd-4773-b7a0-bf034cc79899}} corresponding to {{formula:96e30ae7-dd1f-462b-94e3-3b435720...
m
6f528f77fe7b62cb3640928824a71a6f
In recent years, various methods have been proposed utilizing deep learning architectures for extracting embedding vectors and have shown better performance than the i-vector framework when a large amount of training data is available {{cite:968a51e8221169a313987f7763b85fc6e4722c6b}}. In {{cite:18f14988c226b0609572561d...
i
d316ace32c8d4630057088501ce6e1e0
A promising direction, NOTEARS {{cite:8984fafa3a34fb760c9924cac49479a35ff4c45d}}, formulates a smooth characterization of acyclicity that can be incorporated into a continuous optimization and solved using well-known numerical methods. NOTEARS was later extended to parametric nonlinear models and nonparametric models {...
i
c76c7f8eb00a8188e589f07e406905e0
The Tsfresh set on the other hand, included a `relevant subset' of 63 different time series characteristics such as absolute entropy, kurtosis, skewness etc.The interested reader may refer to https://tsfresh.readthedocs.io/en/latest/text/list_of_features.html for a complete list of time series characterization techniqu...
r
7bf5c75fa420c5e630160f795d09d8b8
Although the flux phase or {{formula:974c0b7a-b0d8-47bb-888b-6ad3e575a360}} CDW is a candidate for describing the pseudogap, its existence in the {{formula:76ae9827-165d-4ffd-bd83-6dbf9815e1df}} -{{formula:3665acf9-d0a7-42d6-a0bb-4c85f760d227}} and Hubbard models is controversial. While some reports show the presence ...
d
7f96d876e09cf4e6be0502dff85a8c31
The material 1T-TiSe{{formula:80d66d9d-6de8-42bf-b881-582383fa0b76}} has been long known to have a low-temperature CDW phase. The origin of the CDW is still controversial but may be caused by the Coulomb interaction induced excitonic condensate {{cite:4ce989573f09c7937f817cc2a4c1d9a74f7c45dd}}, {{cite:e9f161c2f7c8c0c2...
i
bd3b42c2a814a6c22cb732e318232b20
where {{formula:f916cbc8-62cf-4514-aaa3-ed2bd8095241}} are the fitting parameters. Our results for the form factors are presented in Table. REF and compared with the results from light-cone sum rule (LCSR) {{cite:2d9b0fea2c6e8edf5b2fadbb941958e1e2543677}} where the form factors are parameterized by {{formula:d9a8ab0d...
r
3fa2c03b1d78e61354b812fc9ef9268a
Super-class Based Performance on COD10K. For the challenging dataset COD10K {{cite:2f113267c36256bd0cf9035abdbd0509566f5d09}}, it contains five super-classes: “Amphibians”, “Aquatic Animals”, “Flying Animals”, “Terrestrial Animals”, and “Others”. Due to limited space, we only report the quantitative results of each SO...
m
c737cdbfdc2222a6f7ef74120d76073c
where {{formula:8bc63823-16d7-4ee9-b5b6-4cef0b58163e}} is the {{formula:787d0e18-2cce-4750-b92c-4834c84d9142}} matrix of the parameter differences, {{formula:51c451b5-0dd1-48a6-a98d-6db8318afe4d}} , {{formula:319f9190-0363-4366-a2ea-2a3616f142cc}} are the covariance matrices for the corresponding parameters in the H...
m
8b61dbcdcd6d5b0b6def41f8b5e0aa75
These results suggest that Rb and Cs masers are unlikely to occur frequently in M- and L-dwarf atmospheres. A survey of 10 giant stars and two globular clusters for the 6.8 GHz {{formula:1019787f-7f1c-4a54-8ce0-f9a6b2c9886d}} Rb maser by {{cite:7d9afb73f5573c5b24874a285d26bfdb32c4cec4}} likewise made no detections. I s...
r
d5ad1d53c0452b638e4fa09e3d2f5d13
Feature extraction for each modality is separate. This allows the fusion process to be independent of point-wise or sequential operations. This is motivated by three reasons: First, independent encoding allows for retaining the complementary information from both modalities. For example, image features are not simply a...
d
a2289465793fee69e9205aedd3d95942
We describe the results on UCF-101 {{cite:c8d0afc02f93fa569fc0a435c15989c4bd9e9768}} and HMDB-51 {{cite:c6683c2043473c59b49f24958875315c236e335c}} datasets using ImageNet or Kinetics pre-training in Table REF . From the results, we can check the effects of augmentations in terms of model pre-training. Although the impr...
r
e10325be0201f73e68f86b4c8192ea85
Within both the EfficientNet and XCiT results, we see the desired model scaling effects where accuracy improves as the network increases in size. This signifies that the Sig53 dataset is sufficiently challenging for this ML network research. We can also see that XCiT significantly outperforms EfficientNets in terms of ...
r
5f7bbaac2e14e7d0d9b1a49eb6b6ab91
Estimation of uncertainty represents a first step in understanding the imperfect information in our natural surroundings. Future directions of interest include: 1) improving the post-processing of the uncertainty by implementing algorithms that result in better models (e.g. the unscented Kalman filter or particle filte...
d
44f81b67dbd2a9e59320ee129e40081b
We have compiled the model with XLA {{cite:681b1992a18115c89cdc649d0700e91ec9f54585}} and ran inference for the 15th frame in scene 8907419590259234067_1960_000_1980_000 that has 68 vehicles and 69 pedestrians on a Nvidia T4 GPU. The latency is 43ms, more efficient than the popular realtime detector PointPillars {{cite...
r
0361aa9e79490b499960bf9167fb7bc9
Let {{formula:2e280c36-4bd6-4991-9784-fe1be64fc15a}} denote the {{formula:c738026b-f3a5-4b35-8e2e-4dfa985080c2}} -dimensional area measure on {{formula:4c7e5f31-bf10-4c69-a4ba-63cf51b36b68}} normalized to be a probability measure; that is, {{formula:228d6e50-36a3-48f8-a192-afd39a5b4424}} , where {{formula:ddfcd91a-98...
r
011c1922c19fe41029ba78a2e9d46f4d
We evaluate clustering algorithms by four widely used metrics, unsupervised clustering accuracy (ACC) {{cite:59e7b5396ff42e592a68ddac462c9d991b8ca3a0}}, normalized mutual information (NMI) {{cite:af824d248a2f05d2facd21570ad5aec8c98292f9}}, adjusted rand index (ARI) {{cite:af824d248a2f05d2facd21570ad5aec8c98292f9}}, and...
r
cadde96006d6c84ba24e4dea2bfe4334
where {{formula:5315c7fc-9b37-432b-99a6-6821d6fa52d5}} {{cite:a6de100eb60d6d773e9064400b205906be7a447c}}. In addition, {{formula:0c4e7a30-ef94-4866-9c00-952090718832}} and {{formula:3f6abda1-9f17-4c94-99e5-e6b0f34bc868}} are fixed by fitting the corresponding decay widths. In particular, since the {{formula:31944c13...
r
9302b750b065854a5758049423c6dd60
We use ResNet-18 {{cite:94c4707b3757a0295b1af3a30b20a4392fcf2994}} as the backbone network, a two-layer nonlinear MLP as the projector, and a linear predictor. Unless specified otherwise, SGD is used as the optimizer with weight decay {{formula:71f5c135-e84b-418c-8928-676761d4a055}} . To evaluate the quality of the pre...
r
403ce6848064fe7b2898308cd9fb7ed8
Finally, FedTriNet will retrain the client model using both the real labeled data and the pseudo-labeled data. Note that since there are three models in each client, we choose to retrain the finetuned combined model, which is significantly different from FedAvg {{cite:c87c2e45b107882bc54536fc03cb600aa9888774}} and FedS...
i
2ecd0f26c53b3cbd1619047ea15a76d5
Programming languages are similar to natural languages in many ways, and natural language translation has been studied extensively. Sequence-to-sequence translation models, which map input sequences to output sequences, have achieved great performance {{cite:02e10252638c9e844885e3211752a173ced0124b}}, {{cite:638caf5ee9...
i
882dc5e77f47145135b146c3017381ec
We would like to address some related topics for further consideration. First, are there any algebras to characterize this type of vertex operators? In other words, are these vertex operators the representations of some algebras? Date, Kashiwara and Miwa {{cite:6399571f36834cb27858c0f1c0a18b6aa87719f2}} found that the ...
d
dadd46ce0ad6d0b2d04a0c32dfc01cd9
Table REF lists the results of each method across the datasets that we propose. Our new measure and new datasets reveal several important properties of non-homophilous node classification. Firstly, both methods that only use node features and methods that only use graph topology appear to perform better than random, t...
r
8b752bebb9ce5699a78a8acbecf991f4
Figure REF is an extension of Figure REF in the main document, and is produced under the same experimental conditions described in Section REF . The top row of Figure REF subplots shows the targeted success rates (tSuc) versus query counts ({{formula:f8d9e1e4-8966-43e8-9285-8ee738972a77}} ) for the (snake, lizard), ...
r
06e989a595522d8c3f0cdc1134ffbd81
This paper demonstrates (1) what makes Vanilla-SC fail and (2) how Regularized-SC fixes that problem. One key motivation for Vanilla-SC is that it relaxes a discrete optimization problem of minimizing graph conductance {{cite:273da8d47be518bef70a01698ec51d0368c1582f}}. Yet, this graph conductance problem is fragile to ...
i
de4c5914759a0bbc9ba0c958d4641d23
To proceed, we must first consider the mass of a debris disc. Defining {{formula:ed9138f6-1256-4da0-9284-8321f47a88ea}} as the number of particles of radius {{formula:fda321f6-91ac-45fc-b2e8-e33d568986a7}} in the range {{formula:f8b085ca-99de-4fb6-b221-dedeff0ea8e0}} , the debris disc size distribution is often model...
m
7230d1c03b5d68a60ce3aacd57f88482
By now, a lot of research efforts have been dedicated to providing security through physical layer methods. A power control scheme is proposed in {{cite:37df540b608e440d2722b6233d419d421f8df761}} to ensure that an eavesdropper can never reach its desired signal-to-noise-plus-interference ratio (SINR). However, such sch...
i
50edc6ccb67e01db3a2973a90176cfca
From a learning perspective, generating the distribution of successful 6-DoF grasps is quite challenging, because the distribution is multi-modal, discontinuous, imbalanced and ambiguous due to (self-) occlusions. Furthermore, direct regression in high dimensional output spaces like {{formula:7815d9c8-abf2-4694-b283-63...
m
a9a80d24fa7cb5b125eb671c5e555f20
Our results of the branching ratios from the LFQM and {{formula:410ec1c4-8040-49e5-bc1a-0045bdc46946}} are given in Table REF , where we have also shown the {{formula:4de26c6c-769b-4a91-a697-c39e9070e8a8}} evaluations in Ref. {{cite:4a644c7e8cb52112f6f70897aa60c3c3506cb253}} and some of other theoretical predictions ...
r
e9c19e77ec652920f0d0faba36701af6
The contribution {{formula:48af5549-eefd-4314-82e9-f4c7b78d14ec}} from the host galaxy is an unknown factor that enters FRB observations for most of the unlocalized FRBs. The value of {{formula:07ed3b3e-3dc3-4cf3-a8a5-4b4674b04bd5}} is expected to vary from FRB to FRB depending on the host galaxy and the location of ...
m
fc59c07d0e017c7192a4e90fe51195b9
r2v-config performs the best or nearly the best for all graphs (Figs. REF A–F). It consistently outperforms other random walk-based methods in all cases despite the fact that node2vec and r2v-config train the same model. The two methods have two key differences. First, r2v-config uses baseline {{formula:9ba7d43e-e589-4...
r
34a7c8648acf555719e37a47cc2f5330
The exponent depends in general on the interaction strength {{formula:338e3f46-c982-4063-b587-2f856c1c62d8}} , vanishing for {{formula:4a8d227e-3c48-4eb9-ac5e-e7c8d332b62b}} . The self-similar form (REF ) is borrowed from the one particle quantum walk, for which the ballistic law {{formula:4fa77931-50f8-4b5c-84fb-9f8a7...
r
c2319307507988e7120444055d7d75bd
The intrinsic and extrinsic of the camera and LiDAR are vastly different from each other. Data in both modalities need to be re-organized under a new coordinate system. Traditional early and deep fusion methods utilize an extrinsic calibration matrix to project all the LiDAR points directly to the corresponding pixels ...
m
b8b3b442a0b73919de5fece510e9e598
Several previous studies have defined analogs to high-{{formula:1b540fc3-f761-460c-9e71-6e68e3068a12}} galaxies using a variety of approaches. For instance, {{cite:20d90a600a4269111d8c5935c3ed8e19102faaa8}} and {{cite:8f7d08a7f684dc8310f02f9ce18fbd49bdb170a1}} found that ultra-violet luminous galaxies (UVLGs) with hig...
i
c9ea8d547bafde0f9043e0736f63c5dd
CVT Algorithm and Optimality. In general, it is difficult to prove guarantees for CVTs {{cite:36f6b98393f1a80f211729bec331f2cfdb95d681}}. Liu et al. provide theory on CVT convergence {{cite:6adb6827f3d8aff2b03f3055408ec631b107ee93}}. Despite theoretical challenges, CVT algorithms adaptively minimize energy and are argu...
d
d90e84d1432be1646a26c59fee54bda6
We first assess whether sentence encoders yield coherent representations of meaning by computing the Spearman correlation between the human ratings present in the sick benchmark {{cite:dc4124a06c6d9ef51f22e2dc68b15c562eaf2aaf}} and the cosine and Euclidean distances between the two corresponding sentence embeddings; as...
m
b3c9c636e68f8128a96c4a1c7a5d9d6d
Although current methods for generalized MORL are sample efficient, they combined preference values with expected values in a linear manner to derive decisions or to learn expected value functions. When observed in the space of per-objective expected returns, linear methods can identify policies that belong to expected...
i
ac9ed016fdf0696ddb4c4d827f4c1e15
Challenge 1: Scalable self-backhauling design. The majority of prior works relies on point-to-point links, e.g., {{cite:bff7897ec9e57eaaa3f67058810cd3ad59d9d801}}, {{cite:a80360b7c9903ebc841932facf88f7882b7b8f56}}, between MBS and SBSs, which is unscalable in dense SBS deployments. The scalability issue is addressed in...
i
917215289851fe1fd190f595ceb3e7ed
Computation Time (CompT). Fig. REF compares CompT for a different number of participants {{formula:4ddce9d7-c57b-41e5-8416-5da407ceef20}} and a different number of training passes {{formula:7a71b4be-f8f3-434c-8c89-0b3834e210f3}} . In the experiments, we use ResNet-18 and normalize their overheads. As we can see, mor...
r
b81fcb0c144fe1d42e9386e8e5d0e789
Lemma 2.4 (Equation 2.19 in {{cite:f271412465ad057c58daa10909fa563638d5688d}}) Let {{formula:8b477669-efdd-444b-ac4c-0873aefd3679}} , where each {{formula:1550ab37-5f78-4083-91db-c0996cbdf66e}} . Then, {{formula:2c259ef9-28df-4df2-862b-de186942d3c5}} and for any {{formula:fc352bc3-72cd-44ce-a1bb-fe16d254cd7d}} , we ...
r
bcab53968b67c837c3ac095110d2d498
General sequential approaches such as GRU4Rec {{cite:54e6b9b0b2ff2cac4377bd81d3a276c1e8b0f627}} and SASRec {{cite:e6c2672e218aebd28ecb7987b10ede6fac5a62bc}} rely on explicit item IDs to construct the sequential model, where they assume item IDs are pre-given. These approaches can't perform well under the cold-start set...
d
7aac4b9ad57d158b1912122a79d624e4
Our work shows that while most of the research effort has focused on model-free methods in meta-RL {{cite:96fc1c9e3ce2db85b6f79fc089e5ff707ae76a1b}}, learning to learn might need explicit modeling and then planning. Also, the use of the Transformer architecture can be critical to model the complex relationship between ...
d
d268590674f826e3ebae60003fef67de
The previous approach can be easily extended to the case of having several observed data instances {{formula:92a058fc-8b78-4437-8efb-3a2a4487cff4}} . In that case the objective is simply the sum of {{formula:fd561ed9-0e4e-416d-ab0d-c3bf0c6b75e7}} , for {{formula:ec4a8767-c3e7-4b6e-b974-38057489d3ec}} , where {{formula:...
m
df93e57175489ca5ccdd39cc8c5238ef
and updating the prior model by incorporating the the simulated and observed LWD measurements (analysis) . The output of the analysis component is the posterior model. In the following, we explain the method in more detail. The prior ensemble The prior ensemble contains all our prior knowledge, obtained from geological...
m
fa286100fa3a0b2f654a4e656722709c
Presented augmentation leads to more balanced image classes and it also increases rotation invariance of the CNN. Bicubic interpolation is used when the angle was not a multiple of 90°. As was shown by Goodfellow et al. {{cite:da4536f2b066d45045baa1e3dc3a2478cc2dcf28}}, such data augmentation by flipping and rotation c...
m
7e54ac1931164eae3e4f56b98305339b
More generally, the phylogenetic networks that we have considered in this paper did not have arc weights. It would be interesting to understand how arc weights might affect our results, especially when we want to make a straight-line drawing where the length of an arc is proportional to its weights. A special case that...
d
d07d3ec8735034a433ed8764c2eca662
Let {{formula:7830a9ba-23c0-4aef-87f1-bef582993125}} be the miniversal family for the deformation of {{formula:14f85047-121a-497d-9843-8bd25a14b094}} . Since the Milnor number of hypersurface singularities is upper semicontinuous under deformations, the Milnor number of the isolated Du Val surface singularity {{formul...
d
58f30a37cdaf69cfb40fd453a7653afd
As discussed in {{cite:087d1645dd55cebe5d88fbeb64d25c1c7ecd9375}}, the random geometry description of the {{formula:91de312a-4193-4a9a-a96a-c76a4880250d}}-deformed CFTs can be straightforwardly translated into the AdS/CFT framework. The gravity dual is an ensemble of AdS{{formula:bf33d2e1-a7ec-413d-b4b9-47e92f609f02}} ...
d
9e60bc504f33fd6d8bdc443a9894b8ed
CP alternatives. Algorithms of aggregated CP {{cite:0bfde49c4bdb4333a1d5d1ac1079c5421486a65d}}, cross CP {{cite:49ac49eb3c8ff0c45144487394fe89beb86ab2f3}}, CV+ and jackknife+ {{cite:2eb45f62694ccb01367757030ad81b6f3fe25605}} can be found in the respective references. Note that CV+ and jackknife+, albeit originally desi...
m
201d1948c38b085d9b4dc9ad3c1731e1
The spreading distance {{formula:862ece12-1f77-4994-9e35-174beb22c081}} of failures in the two peaks shows nonlocality characteristics of cascades. The nonlocality of the cascade suggests that the damage is distributed globally, which is hard to predict and recover. Indeed, figuring out the formation of bimodal distri...
r
88d54fbdbdbac7ea27414216009e961b