text stringlengths 54 548k | label stringclasses 4
values | id_ stringlengths 32 32 |
|---|---|---|
We applied the proposed scheme to the Flickr8K
{{cite:493e1a1971484e169c4b71b6699c67aeac5073e4}} dataset, which was split to 1000 images (and
corresponding captions) for test, 1000 images for validation, and 6000 images
for training, following Karpathy and Fei-Fei {{cite:bd2fdc63c82c4123fef0a5be184fc9b4daf1f3ff}}. We u... | r | 7944296b25e8c79dc6c895b31aafa5a9 |
Similar to the previous reports in other systems {{cite:f4102c41115694a5ce6954c9838b8327ea1f9e76}}, {{cite:b85f0da5ebf236758101002315deb86b965ca71c}}, {{cite:4b7e4da77a53e5766657b4e48dd1092760939fb2}}, {{cite:b7d07c7c07bc889c6deb2a1acda5fd5702ec723a}},
the {{formula:de1c64e4-2c28-43ec-a24e-23b821461a83}} -{{formula:a32... | r | 678d19cb9eb7ef2a96f2cbf66ac96d18 |
Lemma 5 (Convergence of an approximate entropy-regularized NPG, Theorem 2 in {{cite:22afd7451b0a0f8cbec1fb223da2347088b71b21}})
For any learning rate {{formula:2c4cbd37-10a7-4383-b247-72b9e2f40860}} and any {{formula:0e88468e-aa0f-4778-87d6-8a7a6ba93f9e}} , if {{formula:a9473131-4ccf-4115-9be5-cbfe05e1baf7}} the en... | r | c87c82efcc3fd4ce62aa378bf7709464 |
One common approach is determining a single metric in controlled experiments. Researchers put significant effort into the operationalizing the metric that can capture the “success” of explorative tasks (e.g., false discovery rate {{cite:7fb1486d28047d451376a10428ec77acda892b3f}}, interaction rates {{cite:c4f720898ebe52... | m | d5b94c64ed685343b3389df7f1ac2d48 |
Second, the epistemic equity of the models used to guide clinical care – our concern here – is obviously not the only kind of equity healthcare must consider. Unwarranted variation in clinical outcomes may arise from a wide diversity of procedural, cultural, social, economic, political, and regulatory factors that oper... | d | 4fb8bf3046e8e51e4f2777938f4ed420 |
“Graph” is a derived discrete data structure consisting of vertices and edges, which can be leveraged to model and solve various general problems. Benefitting from the embedding of human knowledge, graphs are semantically dense data. In contrast, native data structures, such as images and videos, are usually semantical... | i | 7940937fe0dc71c37957167ffd05c992 |
This section provides numerical results to validate the proposed designs. The parameters are set as follows: {{formula:3cfab7fe-d10d-4d2b-a3bb-b6c6c8f0eaba}} meters, {{formula:b1ff93d8-9576-492c-9035-5fd2355cfa7c}} MHz, path loss exponent {{formula:b8d24367-1b60-4f06-a4c5-a36b5715d238}} , {{formula:9cfef1fe-5b84-401f... | r | 09fa52dc0e7c01d8e4669d3a3c9ef636 |
For the sake of completeness, let us briefly discuss the case {{formula:4f7d709a-4ee7-4c45-8d86-eeae6f92e6ae}} when freely falling observers have “orbits” constrained by the finite radius {{formula:0487e574-97d1-4983-823f-db3131b7853f}} . The problem here is that our formula for the Noether charges (REF ) relies on ta... | d | 35963190e0928f4a9de98c42c3e51823 |
From the perspective of quantum modeling, there is a wide range of extensions that would be desirable. This would include the use of larger networks by means of matrix product states {{cite:321bafea5f4affd43d6c37ccabbc1ec3bf817cd3}}, the use of heterogenous network topologies, e.g. with several fully-connected systems ... | d | 21987f3ad7e2fade72f520bf11d21bc8 |
The uncertainty principle
investigated here is different from the standard approaches {{cite:b41837d50639aa25650e9116217e357fd18ba41e}}, {{cite:88aea71cfd68c5f5dc96b9daf05ca5d2c606c7a3}}, {{cite:680236a98ef9415f686cf9554b4424ef9c208ad0}}, {{cite:fd7cd70b9e28610a0049562b7b9c9a085d4ca0f9}}. These are
roughly divided into... | d | f316c6eecadb7031a519535db463c340 |
As a rule, the basis for the understanding of properties of materials relies on their non-interacting, or single particle, properties. The “particle in a box" model for 3D metals, proposed by Sommerfeld {{cite:9414fb4c80e0dac3de843d915a03ffbbf330adc6}} at the beginning of the 20th century, is an example of how an overs... | i | e7bfe3c427216d0a4b43d744481cf5da |
Zero-shot ImageNet monitor.
SLIP may also serve as a useful framework within which to evaluate new methods for self-supervised learning.
Training loss on the pre-text task is a poor predictor of downstream performance, so a simple external metric like kNN accuracy is important for quickly estimating performance and dia... | d | b5ec9bf069288303a9a0ab8bdac61091 |
Federated Learning (FL) is a learning procedure where the aim is to utilize vast amount of data residing in numerous (in millions) edge devices (clients) to train machine learning models without collecting clients' data {{cite:203368a324c86948d2674e1ae67e3b0fb69d9d92}}. Formally, if there are {{formula:f2e18053-b4b0-42... | i | f07e3c0f182028689004fe4f717cbe81 |
Multi-layer perceptron (MLP) {{cite:94583407e622db9f8056d6191aed41318619252a}} is used to measure the ability of the proposed additive neural network, in machine learning problems. MLP consists of a single input and output layer and multiple hidden layers. The size and the number of hidden layers can vary a great deal,... | r | 21c51591e8c3a15a7ab8c288024e1c56 |
While the Discovery of the Higgs boson at the Large Hadron Collider (LHC) {{cite:c8e2518a2b43cfedd1d7f2c9f5f048284f8461dd}}, {{cite:d42a5e3ed18e251cbce6ac1e0bba59fa58d08428}} completes the particle spectrum of the Standard Model (SM), this spin-zero boson also confirms the mass generation mechanism of the fermions and ... | i | e76a0172fb026993792a2ec787701d4b |
The total mid-infrared (MIR) luminosities of the source, obtained with the Wide-Field Infrared Survey Explorer (WISE), have been reported in {{cite:aad491e8088f7bf33b96cd619b5fc5e5dcebdef6}}: {{formula:0ccc88e3-d620-479d-a681-72689f97c8a4}} , {{formula:0e129135-8330-4399-9837-05cad474d1da}} and {{formula:ed59559d-c816... | d | 89cc34b8569e50cd80e031c3c3674008 |
The state-of-the-art approaches {{cite:3de620647aeb8800818d1ec1f7c4115d5ab673d9}}, {{cite:6d0e16c8d738be49286aafd4df0d10def1c2e304}}, {{cite:1a1aac3ae6aad7cb9107c4ed544e45da355f19c6}} pose the problem of detecting the plane of symmetry as an optimization problem. They use the L2-norm as a metric to find the residuals a... | i | e45d2fa56786a3cfa4c158c3cedc92a7 |
Dataset Sub-groups. For debiasing, *UpWt, *gDRO, and *PGI require additional labels for covariates (sub-group labels). Past work has focused on these labels being supplied by an oracle; however, having access to all relevant sub-group labels is often impractical for large datasets. Some recent efforts have attempted to... | m | 3e13aea582ee31f8eb73dfc6ba19c48e |
While Medicare data limitations necessitate use of ZIP-code aggregate exposures in our analysis, there are various simplifications to Sections and that can be made to accommodate scenarios where certain measurement error sources are absent. If we were provided individual level outcome and error-prone exposure data, t... | d | 9172ee428f014af5ea03bda101354bf2 |
the best sum-product results over fields have followed from geometric methods.
Elekes' proof of (REF ) was based on the Szemerédi-Trotter incidence bound {{cite:96c4f74306b99c0f3f73ca59b462884fe8b08960}}, {{cite:d05ef7e35f9511b8fa0821e7ba9d16254c4dbd8a}}.
| r | e53cd04948914ea82aaf790f2d6d4eb4 |
Finally, we give outline of the proofs.
In the one dimension case, the energy functional is bounded from below on the product of {{formula:b2da360a-8f78-49ff-9ade-8caeeb23a94c}} -spheres, the constrained minimization method developed by L. Jeanjean {{cite:c2637fa0631e781cd7fb0692f13ed3493f620511}} can be used to obtain... | i | ed543c595c31634534cd38c8b646690d |
For any {{formula:8943db9c-f08d-4e62-90f6-6b45438349a7}} and {{formula:9c7c65c2-5011-4a43-b79c-1af2554a760f}} , we define function {{formula:24b6e5a0-d7bc-4897-a33e-e9e179db8862}} on {{formula:0bba205b-cae7-4572-9200-234453f542e9}} as
{{formula:c4b21e32-b1a4-4bf4-b605-b40ef299f9ec}}
and define {{formula:232ec7af-7c... | r | 5b3ba096a2f09ec1f2a9a739dd140c0d |
Recently, deep learning demonstrates superior performance in computer vision{{cite:79fd4b047e097493d2ba139bf8e3c1a69780f532}} {{cite:a3a38467dfe265afc7ab939e105c7d0bbdb875f3}}. A great deal of image Compressed Sensing reconstruction methods have been developed, such as stacked denoising autoencoder (SDA){{cite:532f0ceb... | i | 30bdf41dd3200d78b5733599efee350b |
The nodes {{formula:7502d91d-5c63-446d-93fe-109d653eb40a}} are the zeros of {{formula:0a72122c-c672-41fc-a033-551f67ed980e}} . The weights, sometimes referred to as Christoffel numbers, can be expressed in various ways (see {{cite:c4ef78e00da62f6bf75c06bb0e7c53afd763f137}}, {{cite:22f56da3edb469e6875e2724645f5b4f1aaaa... | r | 2eac7ea0f0618946e88e26dcc5108d50 |
The overall framework is shown in Figure REF . The reference encoder {{formula:725831cf-c036-4f80-8fb7-eb68c54d2df3}} first encodes {{formula:9a599558-3712-4713-b0cd-4d57a40a0994}} into {{formula:2bcfb9a0-e05b-4051-93cc-b2adbd75166c}} -shot reference maps {{formula:a8ca0e2e-9c1c-4792-be88-c8f576779ead}} , where {{for... | m | 5742a5ebbf4b38f796731e25a47f4d74 |
Finally, we would like to mention that similar features can be found in the chimera setup suggest by Abrams and Strogatz {{cite:6cb015d5a85967896864eb32fe9598ad5427bf12}}; these results will be reported elsewhere.
This paper was supported by the Russian Science Foundation (Secs. and , Grant No. 22-12-00348), and the S... | d | 71e6f4560f8da885e7abfbe674181465 |
From (2.8) in {{cite:eb3a7a62c63ecd48583acd28d311cda7af32201f}},
{{formula:5143e1a0-a842-4997-b76f-f59bdd7751e3}}
has limit zero. {{formula:2e5677ec-a806-4fd0-9291-81badf4cba0f}}
Let {{formula:0db524d4-0a91-4855-8d4a-5da8a8c70f5d}} be the set of coordinates with signal larger than the detection limit ({{formula:f50... | m | 2ce5014b730d3f93d40af12b98fe2dcd |
(2) If {{formula:9c7eb3fb-14ed-419f-947e-4a5757148cc4}} , then {{formula:214f6eb9-0f17-43e1-9baa-df7eba1c708a}} is the class of split triangles by Theorem REF . So {{formula:6ad3b918-d774-4f92-afb3-903ad70f93a8}} is an exact category by {{cite:30bf9195fcb8b6908caa781f1a39fd0b7d531c98}}. Conversely, we assume that {{f... | r | 9e2303774ccb2a6810f5033f54bf9afa |
Looking ahead, our first goal is to upgrade these upper bounds to islands for every {{formula:780bc666-4277-4944-b134-fbac388a548a}} and {{formula:5e468dab-3dbf-4311-a353-8f1adeb9b540}} . As was the case for the {{formula:b190817b-86ab-4fa0-b071-cc37a84727cd}} model bootstrap {{cite:b39df17cec1a40ccd241a408bf052e7fb0... | d | bfaf75547d72e1525ab06b6c3820eaf3 |
Semantic segmentation is a challenging fundamental problem in computer vision with applications to many real-world tasks which require detailed knowledge regarding the surrounding environment. While the introduction of new architectures e.g., Convolutional Neural Networks (CNNs) {{cite:3d9a5e1cfdfe4cf2d8c0fb35cfee81d9f... | i | e4493d916c80ab36587f17a1669b9259 |
For now the most precise calculations for stable top quarks are the total cross
section at NNLO+NNLL {{cite:c3966ea0a5b85568112ce479b1c27501a8802849}} and differential distributions at
NNLO QCD + NLO EW {{cite:3417e8bb7aeb5ab53785eca64133b00e9185c31f}}. However, the top quark is a
highly unstable particle and decays be... | i | 7687008d6823b141063bdcdcccd51402 |
We applied our method to the well-studied Kuramoto model, reproducing known behaviors in some cases and revealing novel behaviors and related novel order parameters in others. Further, the known behaviors of the canonical Kuramoto model are not thought to transfer immediately to related models such as with excitable os... | d | b90976724a791fb77269ee4bf06a8f7e |
Trust-region methods have been used in many fields (see the discussion in {{cite:83f72078e53f52650e77e4e76c6c680147d6f197}}, for instance) and the number of variants is remarkable.
In particular, their robustness for complex optimization tasks has shown advantageous in many regards.
For the work at hand, the idea of a ... | m | 8aca0bd8aeabb7ebf0e29e88edc4af20 |
As a recap, some problem of DP mixture models have been brought about when apply them to practical problems. For example, they always produce more components than that the real data should have. The small mixture components are mainly caused by noise. Some approaches have been proposed for solving this problem. In {{ci... | m | 69351abdde9d269b0d480c99cb54d50a |
Results obtained are summarised in figure REF and Table REF . In Table REF , we compared our method to the ST-GCN model {{cite:db51c656f3cfee275ccc73e2310a07b59cf2fb44}}, on the 22 ROIs and the ICA subject-specific node timeseries at different dimensionalities for sex classification and fluid intelligence prediction, ... | r | 37e06e322beae1e4726217d971831fa0 |
Models and Datasets.
We use a convex model Logistic Regression (LR) {{cite:48b68060e817c15495cc58c8f3d4d1c048bd0b96}}. We conduct our experiments using a public dataset MNIST {{cite:7379826405278a3002ad75a6afae743f01b0a76b}}.
| m | 3f91a9423c6ac2706c19bd8589091727 |
We train the model described in Section REF on the complete training set before submitting to the leaderboard. Our best performing model was placed 7th amongst the 13 teams that submitted results for this task. We present our score on the test set alongside those of comparable teams in Table REF . We note that the tas... | r | f5392002ca5725e22e62ef9bbeca3371 |
With the integration of RES in the modern power grid, forecasting trends are shifting from point to probabilistic in regards to the future demand and generation at disaggregated levels {{cite:3606382921c4eb557221eb021969b78f4b52a18d}}.
Hong et al. presented a review for probabilistic methods and emphasized their import... | m | 554048c5916c2aedd0cf1b6e0f3ea908 |
Theorems REF and REF show the failure of concept removal methods under a simplified setup and max-margin loss. But current deep-learning models are not trained using max-margin objective and might not satisfy the required assumptions (Assumption REF ,REF ,REF ,REF ). Thus, we now verify the failure modes on three rea... | r | cb46c2997ca834efd23db6572fd13f22 |
In order to study the compact approximation problem, we use the identification of space of compact operators as injective tensor product spaces. The monographs by Ryan ({{cite:a5b2d2237624e32cc430143c236a4d8202d7f12e}}), Diestel and Uhl ({{cite:2260d8c30f98054798837fb40cd84746507a5b61}}, Chapter VIII) are standard refe... | r | bd8b255cc09bd1f8e9268a1ef4257499 |
To summarize our work, we propose wav2vec-U 2.0 - an unsupervised ASR framework with an end-to-end style training and an improved objective function.
In our experiments, we validate the effectiveness of the pipeline simplification and the proposed modification of the objective function.
We show that wav2vec-U 2.0 per... | i | 4a1b29d8adc5eb435246abb125f11636 |
It would also be interesting to understand whether we can derive a more general discrete-time analysis framework that works under a relaxed condition, e.g. without requiring contraction in continuous time, but only exponential convergence in function value (which is known for ULA and the Langevin dynamics under the log... | d | af96978ffeeb372f6c56fbe24dd494b6 |
We also display results from the real-world Pixel3D dataset {{cite:e84b58e70fe775a421e3881d5c9e3127b672ddb3}} in Fig. REF . In general, our model is able to detect the dominant mirror symmetry accurately from images unless multiple symmetries are present.
{{figure:0e7c017d-527c-421e-bb95-fcd11436e56e}} | d | b71ca9e46b007d33a2651b54a9807842 |
where {{formula:4c9c8b6c-de0d-4940-a42a-d5a8443655e3}} and {{formula:ac3fa2dd-dcba-4ad0-92ae-bee68b26eba2}} are the gluon and photon actions and {{formula:7be2fcac-4e94-4045-8101-90779fa6338c}} is the Dirac operator associated to the quark of flavor {{formula:74b032ba-85be-436a-9309-c5b8427d9b93}} . The latter inclu... | m | 4b9a58504805f070eb5d61f3dc3ed268 |
In this sections we give detailed training curves for the results shown in Figure REF . As can be seen, in the highly non-iid setting at {{formula:70ca32ad-e551-4fb5-bda9-851490c39cf5}} , all methods exhibit convergence issues. This behavior is well known in FL and is described for instance in {{cite:fedbbdb4c85358fb58... | r | f5bfbccedb5a39400ae37119b613b65d |
Synthesizing realistic virtual environments is one of the most researched topics in computer graphics and computer vision.
An important decision is how 3D shapes should be encoded and stored in memory.
Users usually choose between triangle meshes, voxel grids, implicit functions, and point clouds {{cite:5f287b501271981... | i | 83e91177fcee44e47fdceb9f62a473d1 |
For technical reasons {{cite:a7fb9e4130ad38b4eb2fa1468952879d6805eecc}}, {{cite:a1e751b2941b8d93008ee9478a329b5a19bc0066}}, our intractability results are initially
derived relative to decision versions of our problems, i.e., problems whose answers
are either “Yes” or “No”. Problem TeamEnvVer is already phrased as a de... | r | 5206414f007818363a64b3d5f8ae9da5 |
Our work is an algorithm for multi-arm bandit (MAB) problem. On the novelty side, our work automates the exploration in bandit problems.
Such algorithm could be used in recommendation system and clinic trials. On the positive side, our work could balance the exploration and exploitation trade-off in a problem dependent... | d | f52661224553d7521a5cd20545c2e034 |
Hence the late-time entropy is determined by which subsystem can hold the least information, i.e., if the bath entropy {{formula:8fa1562a-8091-4966-a903-772bc1770615}} is smaller, the baths set the bound, or if {{formula:3505c5d2-2c9c-409e-b45c-f2cc44904af7}} is smaller, the defects set the bound. Of course, if the b... | d | a634607c340e8a130df55f45b00987e3 |
The norms {{formula:c349415f-d49b-4f5e-be99-ad0ffe101004}} and {{formula:4ab23b0e-4826-480c-abef-2d71fc91bc92}} are the injective and the projective tensor norms, respectively. Actually, they are the smallest and the biggest reasonable crossnorms (we refer to {{cite:80fef02b58b30a9aeb4614b67230107ad9cb8fc6}}, {{cite:... | i | 9eb54618b134b641a590cb331bb0195f |
Very recent works {{cite:5045ecce7d2cf06e4f4219976596e2243d0267d4}}, {{cite:4f2ba6b7e1ed05457ec21f28bf9f4aa19b1ce230}} have explored the use of OSM data combined with social media textual information, obtained from Twitter, to perform land use classification. These works use natural language processing techniques (e.g,... | d | d3146a36d45f58dd466f15f275e4918a |
Several numerical methods have been proposed for accurate solution of this class of problems based on explicit or implicit representation of the interface. Finite element methods rely on explicit meshing of the surface that poses severe challenges {{cite:b46c5c96095ad3722347d13744a27fb02a7b3609}}, {{cite:97bde05bfdd77b... | m | 5ae02e263ff5830318a699197035735c |
Since implicit feedback such as click is redundant, most methods use the click feedback of users as the prediction target.
They formulate the news recommendation task as a click prediction task.
Some methods simply classify whether a candidate news will be clicked by a target user {{cite:23409dc9bb8dad649bc5faf9918f2b9... | m | cfcbae9722de22c7886ae0b7bbfa956b |
It would be very interesting if one would consider other topological defects, like strings and monopoles, which can appear in nonlocal models characterized by continuous-symmetry breaking. In fact, global string might play important roles like axion emissions in an expanding universe. In the local case, the topological... | d | 7c9c02a84fc6f0b717ef3864b1c9b9dc |
In the experiments, the action selection algorithm that uses Dropout for action exploration is more effective than the action selection algorithm that does not use Dropout. This is because the action sampling using Dropout can be approximated as Thompson Sampling {{cite:3b6168d36d4172f319eb8b2ddf8fc4b2c32cf97e}}, which... | r | 0102c3712cc0b33a39eeec35bd66c3d4 |
Channel budget We study here the pruning efficacy of ChipNet coupled with channel constraint on PreResNet-164 architecture for CIFAR-10 and CIFAR-100 datasets. Results are compared with the network slimming approach {{cite:b6508bf02d55eadf6a22a6ba572f370e198c4c2a}}, implementation details related to which can be found ... | r | 959a3d1d21dfecce2154300984f9cc33 |
Content caching is an efficient technique to handle the increase of requests for massive amounts of data and content over communication networks.
By leveraging low-cost memory components at the user sides, caching reduces
peak-time traffic by prefetching contents closer to users
during off-peak time, thereby reducing
t... | i | 64e4148ee998c46af779e261e4238099 |
See Appendix .
The performance of a FA-based UE in large-scale multi-cell networks is mainly compromised by the existence of multi-user interference {{cite:05c2b433627d0158b56389ea6fb6e906bc72ef67}}. In the considered network deployment, the multi-user interference observed by the {{formula:465e238e-cacc-4c91-8129-bd5... | r | 02b3c212bb11ceb0c4ddbc28cb4bbc51 |
GraphSAGE {{cite:4f71d17697e4ce4e0da4dd08dccc275c5a6fd8a1}}: a general and inductive framework that efficiently generates node embeddings by sampling and aggregating features from a node's local neighbors.
| m | a691d8863354246ed66cb08d8d7c3bd7 |
3) Grow-and-prune: This method gradually grows and prunes the backbone model for each new task. We choose two representative works for comparison, DEN {{cite:bbf0fb30b8269b106d15ee4bd989d32f7826b14c}}, CPG {{cite:5df437b5cf7af34eaba3135cac7f8a97142819b4}}. In addition, we also compare APD {{cite:9afafafba3c764ac0adca93... | m | 2a429c9ad10a2d49ab0cde61bfb39370 |
In Figures REF (a and c) and REF (a,b,d and f) the attempt to reach chemical accuracy is displayed alongside with the number of CNOTs for both the UCCSD and fermionic ADAPT-VQE.
The UCCGSD (see Eq. REF ) method remains to be characterized. We do so using the BFGS optimizer in a similar VQE loop.
Table REF and Table RE... | m | ad386676727bcf605da3ef6d0033797c |
Q-learning is one of the typical RL algorithms which applies look-up tables to find the optimal strategy in each state of the system{{cite:bbc57ff93beb1a44ce4c23bb1833726f218e9a18}}
. However, since a bidding strategy in electricity markets is a continuous action, this method has a high computational time {{cite:f58630... | i | a52bb3968d038203990b55d51d5f2e60 |
It has been suggested that Ca2+ signaling among astrocytes constitutes an additional, complementary pathway for longer-term information processing and modulation of mental states {{cite:ab772c69a2248eac4ddeee2d6a35e02eb93cad66}}.
In theory, states of creative problem solving, idle thought, and rumination may be a few e... | d | cc35e4076f7431965a26275153c48916 |
In the special case of {{formula:a41fc26d-f859-4045-beff-160a86a9115e}} in Theorem REF , we need the least singular value {{formula:e117fa5b-0d0b-4fb0-9d16-491598c37f6c}} (this necessitates that {{formula:dcea65d9-2562-4969-a184-ad323a6ed4ab}} ). This corresponds to the full-rank setting considered in Theorem REF .
I... | r | 422dbc66bcde1973fb915437e741bad6 |
The density-functional theory (DFT) calculations in this work are performed using the plane-wave basis projector augmented wave (PAW) method along with generalized gradient approximation (GGA) with Perdew-Burke-Ernzerhof(PBE){{cite:19645eb7cfb88adc6d377157f7d8adfeb8959d3a}}, {{cite:b214bfb443b5ee85a40303e8e8f190ba9a011... | m | bd90d02c5f30f643165ccd9ac448664c |
A recent approach to the analysis of nuclear rates is based on Bayesian probability theory, which directly gives the probability density functions for the reaction rates (see {{cite:b3d56aac0c76d939334fc06fce0a925e6cfc6656}}, {{cite:591042f00afc21f298f28413b009d663021339ba}} for the reactions we are interested in). The... | m | dfa7134e4bef6161f5b6968b8e688305 |
where the optimization is over the space {{formula:a2a58ac5-1655-4264-bdc8-59897fc538ca}} , i.e.,
the function space induced by the realizations of DNNs with depth {{formula:51887547-6bd5-4b65-b4e9-ed9d39f5a0f2}}
and width {{formula:8a32d5c9-1ffb-44d0-90db-7ddbf3541558}} . The fully-connected DNN architecture that we ... | m | 55fb30f6903b86b81faede3e84331a46 |
In this study we explored how trust from users varied as a result of the anthropomorphic features of a robot in an industrial environment. Hancock et al. {{cite:eb782ad2011d2c04047360d3cbd9f7c7fc1c7346}} outlined the importance of robot-related factors for the development of trust in a human-robot interaction. In {{cit... | d | f330b2fae2a8fa30193f2099cbef3346 |
where {{formula:90c1cb10-e4fb-4515-9fb2-e9d5d316aa28}} adjusts the weights of objectives with respect to different time steps, though we found that just setting all {{formula:fcf96096-323a-409c-8f0f-5c763c6ecb53}} equal to each other could work well. We resort to contrastive divergence methods {{cite:df47bc4072d6ce47... | m | e9f84fec44081a9a168091fbeb5ed90c |
Comparison with baselines. We compare our proposed method with the baseline models to validate the effectiveness of GST. In this experiment, the student is trained on the full human VisDial dataset with size {{formula:344fd52e-ddaf-432b-95e8-af754b880ced}} and a subset of the machine VisDial dataset (5 out of 30 data ... | r | 1480f9a063aecec8681fc4a18c73bfc4 |
With the help of the Palais-Smale condition, Ambrosetti and Rabinowitz established the following Mountain Pass theorem {{cite:70913765f0502ff75f72539159d7e30829852a39}}.
| r | b7b3f790970bf7ee230d840c69acaf7d |
We study the estimation precision improvement from subpopulation selection by contrasting the estimation results for the full target population to those for the subpopulation in {{formula:da165736-bdfd-4b56-a6f2-2c5c29e6ccb4}} , which are measured in terms of bias, root mean square error (RMSE), and the average width a... | r | 18cf3deeb096cbc76cda4b3aa28c419d |
2-DVPP is a generalization of BPP and a special case of 2-BCPP. It considers two attributes for each item and bin. The problem is to pack all items in the minimum number of bins, considering both attributes of the bin's capacity limits. In {{cite:40c368488e2863704969e30b4294cc6edb5f8530}} a 2–approximation algorithm fo... | r | c4d3c028a875312b56cc2ece9ccea3ee |
Deep SE-based methods {{cite:ccb418465b93b75f4d10052f4d0535d3e47324c2}}, {{cite:e51bfc0196f0b600037c7f00ae92d1775827cc58}}, {{cite:740ffd1dd559ae71738abfbd120a17e96c7407fe}}, {{cite:c70dbcc4686d02a4c5616270b4365012d57c233e}}, {{cite:c5919d8471eddcd7698d1f8c2960ff4a4e5705c5}} aim to achieve clustering by exploiting the ... | m | 89544d9a8d7dfff297cff1deabac25f9 |
For the near end single talk scenario, we can compare our AECMOS with DNSMOS model which was developed for evaluating noise suppression models {{cite:24821461a58a2b5a310d0d521d0c18960944d326}}.
AECMOS has a more difficult task than DNSMOS: evaluate both echo and other degradations and do so independently of each other.... | r | 7b2f34a5a7767528e51338a1bfef26b3 |
In this paper, we develop novel efficient and effective screening rules for the Lasso problem; our screening rules are safe in the sense that no active features will be discarded. As the name indicated (DPP), the proposed approaches heavily rely on the geometric properties of the Lasso problem. Indeed, the dual problem... | i | 8144cff6b60faa859e78021ce2cf3d5a |
Our construction can be seen as a realization of a quantum wire allowing tunable transfer of information between the input and the output qubits. The adjacency matrix {{formula:601ebd25-83f0-4321-949a-c5b721fa44b7}} is related to the graph {{formula:ce3765d1-132f-491a-bbfb-3a64fbe448c1}} , where we place {{formula:141... | d | 981e8b8443922394ca9f667595066b10 |
A natural and interesting extension of our research is to consider the problem of variable selection. In the Bayesian setting, one could take into account alternative prior distributions of the multinomial logit coefficients per cluster, e.g. spike and slab priors that encourage sparsity in the model. Another direction... | d | d5f936d025d7ff7cc5f46b9df5f80b5f |
We decided to follow a methodology upon the DBScan method of clustering {{cite:3e2e1e39eb8d28c30dffcadb866950fbb5a60f41}}. DBScan considers all distances between pairs of points. If they are under {{formula:b828ace7-000c-4a7b-8e6b-4af9902a682b}} then those two are linked. Once the number of connected points exceeds a ... | m | 4a0cecbed0753991a0dbc505a2723c8a |
For each candidate causal graph, one typically requires that a probability distribution satisfies two conditions relative to that graph: the Causal Markov Condition and a faithfulness condition.See, for example, {{cite:38561388bcbdc0ff0b861d07770b274a10db912f}}, {{cite:4e27b0c9716c075182b364af3926b396056e9960}}, or {{c... | m | ee9f76375b5ad6fca1315848bb00f4dc |
Afterwards, black holes with the presence of the Æther field have attracted more and more attention. After studying Einstein-Æther theory, Jacobson et al. turned their attentions to black hole solutions in GR coupled to the Æther field {{cite:34820fd324c98f39a408ff5b7ac6b5bf2c371d36}}. It is found that within a wide ra... | i | 49d804f74f53ca94c7eb68c60f1dd6d4 |
While it is assumed that these limitations can be overcome by adding
suitable inductive biases in current neural network architectures {{cite:0ea2a14211d6d895dc38ee573e89b87fa1e94fc1}}, {{cite:24a81e0e78c6054a740df6ac8d4dcc47398c325b}},
the notion of inductive biases itself is often left vague and does not always provi... | i | 6aa234d7f1c053f153fb053783ac5ac1 |
Gromov first raised the question which CAT(1) spaces do contain regular points {{cite:b4b3232751ad08858bdcaa5c7d69996f9ce793b3}}.
A general CAT(1) space does not have to contain any regular points.
On the other hand, locally compact and geodesically complete CAT(1) spaces always do,
as shown by Lytchak-Nagano in {{cite... | r | 605c694b22acce9cd40629ec67132bf3 |
We will extend {{formula:279e0162-17e2-4026-9b05-8239ef34e288}} to be an endomorphism {{formula:5eb2a054-9933-42bf-a880-2de3e5dcfb89}} by defining {{formula:1dfb2ee5-c69f-4789-a22a-512a7bd8aa93}} . According to the definition of a contact metric structure in {{cite:22e50e3014452d436daa30d2517ee20caec87291}}, one only... | r | 3f1d972e0dabfb5b1966c78fc59099f4 |
Our main contributions are as follows: (1) we create a methodology based on local search to generate a stratified oriented-to-the-individual dataset, with each example composed of a set of posts of a single individual (section Dataset Generation) so that our inferences do not consider only snapshots of posts but the ta... | i | 674f1773c62cee408da5aafaa49edcb4 |
Remark. Apparently, a construction of {{formula:52b4b65d-dfa7-4b8a-b08a-215632a5183e}} was firstly appeared in Aldous {{cite:65234f580f4694d7780d93af356e4e858b4da2b4}} (1985), 11.19,
with a reference to J. Pitman (see, also, Pitman {{cite:31b3d7f5597c171dd5ee27782d0e45fc4ee43940}}). The action of the group {{formula:b... | i | c9abf011e2f1afb782428d54796e210f |
For objective evaluation, we use the Mel-Cepstral Distance metric {{cite:8bdca5973780b2724e55a73e0700066edfff702b}} as shown in Eq. (REF ) and the results are presented in Tab. REF . For subjective evaluation, we asked participants to listen to the songs generated by both the models and evaluate them on Audio Quality, ... | m | dc7617443e5fd7eae950d13fa5fb5ee4 |
We develop a deep CNN network named SeizNet for end-to-end seizure detection solution. Comparing to
{{cite:8081f981cbef22afebb8a3c391c1aa2b2747613c}}, SeizNet contains additional dropout layers {{cite:8784217317ee0c7fd9f2a97b03a6c75cb664733e}} and batch normalization
{{cite:d9930243885559fbf0cbb810df75fcb5d9bd88bb}} af... | m | f7096e91be024d8816808831d35caaca |
Miscellaneous: We can extend the above sampling procedure on a product graph under the noisy sample acquisition setting by finding the optimal sampling operator. In addition, we can process multi-band signals by sampling optimally on a product graph by constructing filter banks analogously to {{cite:f0e87f14a0ad4af6a58... | d | 1ca759b1356a668272b0fb0b9b97260c |
Due to the advancements in computational power and a large amount of high-quality datasets, deep learning has become the state-of-the-art technology in computer vision, natural language processing, and others {{cite:4e87feb0218263bdd36bf275feba3505665e2a31}}. Deep learning has also made remarkable progress in all areas... | i | ed88404464e6cca8272220be86ed77ed |
It remains to discuss how to make simulations. For the first model in Section REF , the orientations are independent and each orientation follows the density {{formula:9387d8c0-4adc-4f93-8162-1aba64135978}} , cf. (REF ). We use rejection sampling when simulating from {{formula:de366213-a002-431c-8b81-68874bac6241}} an... | m | ac9bd88fe9fcdd379b90fdeda11243f4 |
Although contact binary merger events are predicted to be relatively frequent so far only a single event has been confirmed and that only in retrospect. The linking of orbital stability with the mass ratio of contact binary systems has long been recognised as potential avenue for identifying unstable systems {{cite:5a7... | d | 5e3b4a40623b59ae35b52b00dcc13c3d |
The chirping gain should also depend on the choice of chirping amplitude. If the amplitude is reduced to zero, the chirping gain must tend to zero. If the amplitude is too large, the laser will sample velocity classes that have a smaller atomic population.Therefore, amplitudes on the order of or larger than the width o... | d | 2a7b445173b058d3bbb697d4d169becf |
In this work, we have proposed a validation workflow for driver models in interaction-aware AV controllers. We illustrated its utility through a case study of validating an inverse reinforcement learning-based driver model replicated from literature {{cite:e459cfb8d73baa14cbdacfd093a0fbd39934bc6d}} using naturalistic h... | d | e668d45ca19e24f1284feaee2bb71c0b |
The depth-resolved Laue patterns were obtained by solving Eq. REF for each pixel in the detector. We used a sequential approach by first recovering {{formula:9a87e52c-30c0-472f-8544-898df9658f01}} with an exhaustive search, and then recovering {{formula:bf0db976-b4e2-4d17-9dbe-c67f54c6c0bb}} with a non-negative leas... | r | 17a7d34eac5926b4ee59939a09b686d1 |
As showcases, we herein report iOI calculations of a series of double-stranded DNA molecules of various lengths, hereafter termed as DNA{{formula:403a941f-1874-4c7a-8bd4-d4fed3f47502}} ,
where one strand is composed of {{formula:90402062-3a09-4cc4-a461-5021deb9bb57}} consecutive adenosines (A) and the other is compose... | r | c6387814938f535209b08ffceb8e3cfa |
The top part of Table REF shows the result of the gel detection classifier. We generated three different classifiers from the training data, one for each of the threshold values 0.15, 0.3 and 0.6. Lower threshold values lead to higher recall at the cost of precision, and vice versa. In the balanced case, we achieved a... | r | 26354e820f0db99d43692844d86e98d6 |
We applied the GBT within the first-principles calculation as implemented in the OpenMX code {{cite:d73cb5e45f9ddbd014bb3dec081b217e9abe5b97}}, a DFT package exploiting the localized basis function {{cite:4c74fa6b161a99917fc2103c8638f37b4aa49785}} and norm-conserving pseudopotentials {{cite:8a58d7b3294d182e33e0864ec66e... | m | 991e971c9bc8a6614c66e975a70bc9d9 |
Since the Eq. is independent of {{formula:288e7922-251f-4889-abd6-c841b56f186b}} ,
the system is effectively under a constant driving.
As a result, the system at long time limit, if classical, should obey the original TUR {{cite:82f63f19dac8497ef436013a15de62b0788a3a62}}, {{cite:0092372cc28c0810558f0480563e9c8841b7686... | d | b9d746b94941418387bd2cb78c76c24d |
where {{formula:ba0e43d3-a27c-46f2-b0d2-599ec6999077}} is the subsequent state of the state-input pair ({{formula:ffdf96d3-0d93-4286-b732-5563fd4a2298}} ). Under some conditions {{cite:8d3f622beb292e25af5949273e75688e4bd120e4}}, the action-value function {{formula:1e0367f4-38f0-471e-acbe-917ebf335f2b}} in (REF ) ca... | m | 4e1d289dd562d4cd6c5dfdd7c1b5a922 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.