text
stringlengths
54
548k
label
stringclasses
4 values
id_
stringlengths
32
32
We applied the proposed scheme to the Flickr8K {{cite:493e1a1971484e169c4b71b6699c67aeac5073e4}} dataset, which was split to 1000 images (and corresponding captions) for test, 1000 images for validation, and 6000 images for training, following Karpathy and Fei-Fei {{cite:bd2fdc63c82c4123fef0a5be184fc9b4daf1f3ff}}. We u...
r
7944296b25e8c79dc6c895b31aafa5a9
Similar to the previous reports in other systems {{cite:f4102c41115694a5ce6954c9838b8327ea1f9e76}}, {{cite:b85f0da5ebf236758101002315deb86b965ca71c}}, {{cite:4b7e4da77a53e5766657b4e48dd1092760939fb2}}, {{cite:b7d07c7c07bc889c6deb2a1acda5fd5702ec723a}}, the {{formula:de1c64e4-2c28-43ec-a24e-23b821461a83}} -{{formula:a32...
r
678d19cb9eb7ef2a96f2cbf66ac96d18
Lemma 5 (Convergence of an approximate entropy-regularized NPG, Theorem 2 in {{cite:22afd7451b0a0f8cbec1fb223da2347088b71b21}}) For any learning rate {{formula:2c4cbd37-10a7-4383-b247-72b9e2f40860}} and any {{formula:0e88468e-aa0f-4778-87d6-8a7a6ba93f9e}} , if {{formula:a9473131-4ccf-4115-9be5-cbfe05e1baf7}} the en...
r
c87c82efcc3fd4ce62aa378bf7709464
One common approach is determining a single metric in controlled experiments. Researchers put significant effort into the operationalizing the metric that can capture the “success” of explorative tasks (e.g., false discovery rate {{cite:7fb1486d28047d451376a10428ec77acda892b3f}}, interaction rates {{cite:c4f720898ebe52...
m
d5b94c64ed685343b3389df7f1ac2d48
Second, the epistemic equity of the models used to guide clinical care – our concern here – is obviously not the only kind of equity healthcare must consider. Unwarranted variation in clinical outcomes may arise from a wide diversity of procedural, cultural, social, economic, political, and regulatory factors that oper...
d
4fb8bf3046e8e51e4f2777938f4ed420
“Graph” is a derived discrete data structure consisting of vertices and edges, which can be leveraged to model and solve various general problems. Benefitting from the embedding of human knowledge, graphs are semantically dense data. In contrast, native data structures, such as images and videos, are usually semantical...
i
7940937fe0dc71c37957167ffd05c992
This section provides numerical results to validate the proposed designs. The parameters are set as follows: {{formula:3cfab7fe-d10d-4d2b-a3bb-b6c6c8f0eaba}} meters, {{formula:b1ff93d8-9576-492c-9035-5fd2355cfa7c}} MHz, path loss exponent {{formula:b8d24367-1b60-4f06-a4c5-a36b5715d238}} , {{formula:9cfef1fe-5b84-401f...
r
09fa52dc0e7c01d8e4669d3a3c9ef636
For the sake of completeness, let us briefly discuss the case {{formula:4f7d709a-4ee7-4c45-8d86-eeae6f92e6ae}} when freely falling observers have “orbits” constrained by the finite radius {{formula:0487e574-97d1-4983-823f-db3131b7853f}} . The problem here is that our formula for the Noether charges (REF ) relies on ta...
d
35963190e0928f4a9de98c42c3e51823
From the perspective of quantum modeling, there is a wide range of extensions that would be desirable. This would include the use of larger networks by means of matrix product states {{cite:321bafea5f4affd43d6c37ccabbc1ec3bf817cd3}}, the use of heterogenous network topologies, e.g. with several fully-connected systems ...
d
21987f3ad7e2fade72f520bf11d21bc8
The uncertainty principle investigated here is different from the standard approaches {{cite:b41837d50639aa25650e9116217e357fd18ba41e}}, {{cite:88aea71cfd68c5f5dc96b9daf05ca5d2c606c7a3}}, {{cite:680236a98ef9415f686cf9554b4424ef9c208ad0}}, {{cite:fd7cd70b9e28610a0049562b7b9c9a085d4ca0f9}}. These are roughly divided into...
d
f316c6eecadb7031a519535db463c340
As a rule, the basis for the understanding of properties of materials relies on their non-interacting, or single particle, properties. The “particle in a box" model for 3D metals, proposed by Sommerfeld {{cite:9414fb4c80e0dac3de843d915a03ffbbf330adc6}} at the beginning of the 20th century, is an example of how an overs...
i
e7bfe3c427216d0a4b43d744481cf5da
Zero-shot ImageNet monitor. SLIP may also serve as a useful framework within which to evaluate new methods for self-supervised learning. Training loss on the pre-text task is a poor predictor of downstream performance, so a simple external metric like kNN accuracy is important for quickly estimating performance and dia...
d
b5ec9bf069288303a9a0ab8bdac61091
Federated Learning (FL) is a learning procedure where the aim is to utilize vast amount of data residing in numerous (in millions) edge devices (clients) to train machine learning models without collecting clients' data {{cite:203368a324c86948d2674e1ae67e3b0fb69d9d92}}. Formally, if there are {{formula:f2e18053-b4b0-42...
i
f07e3c0f182028689004fe4f717cbe81
Multi-layer perceptron (MLP) {{cite:94583407e622db9f8056d6191aed41318619252a}} is used to measure the ability of the proposed additive neural network, in machine learning problems. MLP consists of a single input and output layer and multiple hidden layers. The size and the number of hidden layers can vary a great deal,...
r
21c51591e8c3a15a7ab8c288024e1c56
While the Discovery of the Higgs boson at the Large Hadron Collider (LHC) {{cite:c8e2518a2b43cfedd1d7f2c9f5f048284f8461dd}}, {{cite:d42a5e3ed18e251cbce6ac1e0bba59fa58d08428}} completes the particle spectrum of the Standard Model (SM), this spin-zero boson also confirms the mass generation mechanism of the fermions and ...
i
e76a0172fb026993792a2ec787701d4b
The total mid-infrared (MIR) luminosities of the source, obtained with the Wide-Field Infrared Survey Explorer (WISE), have been reported in {{cite:aad491e8088f7bf33b96cd619b5fc5e5dcebdef6}}: {{formula:0ccc88e3-d620-479d-a681-72689f97c8a4}} , {{formula:0e129135-8330-4399-9837-05cad474d1da}} and {{formula:ed59559d-c816...
d
89cc34b8569e50cd80e031c3c3674008
The state-of-the-art approaches {{cite:3de620647aeb8800818d1ec1f7c4115d5ab673d9}}, {{cite:6d0e16c8d738be49286aafd4df0d10def1c2e304}}, {{cite:1a1aac3ae6aad7cb9107c4ed544e45da355f19c6}} pose the problem of detecting the plane of symmetry as an optimization problem. They use the L2-norm as a metric to find the residuals a...
i
e45d2fa56786a3cfa4c158c3cedc92a7
Dataset Sub-groups. For debiasing, *UpWt, *gDRO, and *PGI require additional labels for covariates (sub-group labels). Past work has focused on these labels being supplied by an oracle; however, having access to all relevant sub-group labels is often impractical for large datasets. Some recent efforts have attempted to...
m
3e13aea582ee31f8eb73dfc6ba19c48e
While Medicare data limitations necessitate use of ZIP-code aggregate exposures in our analysis, there are various simplifications to Sections and that can be made to accommodate scenarios where certain measurement error sources are absent. If we were provided individual level outcome and error-prone exposure data, t...
d
9172ee428f014af5ea03bda101354bf2
the best sum-product results over fields have followed from geometric methods. Elekes' proof of (REF ) was based on the Szemerédi-Trotter incidence bound {{cite:96c4f74306b99c0f3f73ca59b462884fe8b08960}}, {{cite:d05ef7e35f9511b8fa0821e7ba9d16254c4dbd8a}}.
r
e53cd04948914ea82aaf790f2d6d4eb4
Finally, we give outline of the proofs. In the one dimension case, the energy functional is bounded from below on the product of {{formula:b2da360a-8f78-49ff-9ade-8caeeb23a94c}} -spheres, the constrained minimization method developed by L. Jeanjean {{cite:c2637fa0631e781cd7fb0692f13ed3493f620511}} can be used to obtain...
i
ed543c595c31634534cd38c8b646690d
For any {{formula:8943db9c-f08d-4e62-90f6-6b45438349a7}} and {{formula:9c7c65c2-5011-4a43-b79c-1af2554a760f}} , we define function {{formula:24b6e5a0-d7bc-4897-a33e-e9e179db8862}} on {{formula:0bba205b-cae7-4572-9200-234453f542e9}} as {{formula:c4b21e32-b1a4-4bf4-b605-b40ef299f9ec}} and define {{formula:232ec7af-7c...
r
5b3ba096a2f09ec1f2a9a739dd140c0d
Recently, deep learning demonstrates superior performance in computer vision{{cite:79fd4b047e097493d2ba139bf8e3c1a69780f532}} {{cite:a3a38467dfe265afc7ab939e105c7d0bbdb875f3}}. A great deal of image Compressed Sensing reconstruction methods have been developed, such as stacked denoising autoencoder (SDA){{cite:532f0ceb...
i
30bdf41dd3200d78b5733599efee350b
The nodes {{formula:7502d91d-5c63-446d-93fe-109d653eb40a}} are the zeros of {{formula:0a72122c-c672-41fc-a033-551f67ed980e}} . The weights, sometimes referred to as Christoffel numbers, can be expressed in various ways (see {{cite:c4ef78e00da62f6bf75c06bb0e7c53afd763f137}}, {{cite:22f56da3edb469e6875e2724645f5b4f1aaaa...
r
2eac7ea0f0618946e88e26dcc5108d50
The overall framework is shown in Figure REF . The reference encoder {{formula:725831cf-c036-4f80-8fb7-eb68c54d2df3}} first encodes {{formula:9a599558-3712-4713-b0cd-4d57a40a0994}} into {{formula:2bcfb9a0-e05b-4051-93cc-b2adbd75166c}} -shot reference maps {{formula:a8ca0e2e-9c1c-4792-be88-c8f576779ead}} , where {{for...
m
5742a5ebbf4b38f796731e25a47f4d74
Finally, we would like to mention that similar features can be found in the chimera setup suggest by Abrams and Strogatz {{cite:6cb015d5a85967896864eb32fe9598ad5427bf12}}; these results will be reported elsewhere. This paper was supported by the Russian Science Foundation (Secs.  and , Grant No. 22-12-00348), and the S...
d
71e6f4560f8da885e7abfbe674181465
From (2.8) in {{cite:eb3a7a62c63ecd48583acd28d311cda7af32201f}}, {{formula:5143e1a0-a842-4997-b76f-f59bdd7751e3}} has limit zero. {{formula:2e5677ec-a806-4fd0-9291-81badf4cba0f}} Let {{formula:0db524d4-0a91-4855-8d4a-5da8a8c70f5d}} be the set of coordinates with signal larger than the detection limit ({{formula:f50...
m
2ce5014b730d3f93d40af12b98fe2dcd
(2) If {{formula:9c7eb3fb-14ed-419f-947e-4a5757148cc4}} , then {{formula:214f6eb9-0f17-43e1-9baa-df7eba1c708a}} is the class of split triangles by Theorem REF . So {{formula:6ad3b918-d774-4f92-afb3-903ad70f93a8}} is an exact category by {{cite:30bf9195fcb8b6908caa781f1a39fd0b7d531c98}}. Conversely, we assume that {{f...
r
9e2303774ccb2a6810f5033f54bf9afa
Looking ahead, our first goal is to upgrade these upper bounds to islands for every {{formula:780bc666-4277-4944-b134-fbac388a548a}} and {{formula:5e468dab-3dbf-4311-a353-8f1adeb9b540}} . As was the case for the {{formula:b190817b-86ab-4fa0-b071-cc37a84727cd}} model bootstrap {{cite:b39df17cec1a40ccd241a408bf052e7fb0...
d
bfaf75547d72e1525ab06b6c3820eaf3
Semantic segmentation is a challenging fundamental problem in computer vision with applications to many real-world tasks which require detailed knowledge regarding the surrounding environment. While the introduction of new architectures e.g., Convolutional Neural Networks (CNNs) {{cite:3d9a5e1cfdfe4cf2d8c0fb35cfee81d9f...
i
e4493d916c80ab36587f17a1669b9259
For now the most precise calculations for stable top quarks are the total cross section at NNLO+NNLL {{cite:c3966ea0a5b85568112ce479b1c27501a8802849}} and differential distributions at NNLO QCD + NLO EW {{cite:3417e8bb7aeb5ab53785eca64133b00e9185c31f}}. However, the top quark is a highly unstable particle and decays be...
i
7687008d6823b141063bdcdcccd51402
We applied our method to the well-studied Kuramoto model, reproducing known behaviors in some cases and revealing novel behaviors and related novel order parameters in others. Further, the known behaviors of the canonical Kuramoto model are not thought to transfer immediately to related models such as with excitable os...
d
b90976724a791fb77269ee4bf06a8f7e
Trust-region methods have been used in many fields (see the discussion in {{cite:83f72078e53f52650e77e4e76c6c680147d6f197}}, for instance) and the number of variants is remarkable. In particular, their robustness for complex optimization tasks has shown advantageous in many regards. For the work at hand, the idea of a ...
m
8aca0bd8aeabb7ebf0e29e88edc4af20
As a recap, some problem of DP mixture models have been brought about when apply them to practical problems. For example, they always produce more components than that the real data should have. The small mixture components are mainly caused by noise. Some approaches have been proposed for solving this problem. In {{ci...
m
69351abdde9d269b0d480c99cb54d50a
Results obtained are summarised in figure REF and Table REF . In Table REF , we compared our method to the ST-GCN model {{cite:db51c656f3cfee275ccc73e2310a07b59cf2fb44}}, on the 22 ROIs and the ICA subject-specific node timeseries at different dimensionalities for sex classification and fluid intelligence prediction, ...
r
37e06e322beae1e4726217d971831fa0
Models and Datasets. We use a convex model Logistic Regression (LR) {{cite:48b68060e817c15495cc58c8f3d4d1c048bd0b96}}. We conduct our experiments using a public dataset MNIST {{cite:7379826405278a3002ad75a6afae743f01b0a76b}}.
m
3f91a9423c6ac2706c19bd8589091727
We train the model described in Section REF on the complete training set before submitting to the leaderboard. Our best performing model was placed 7th amongst the 13 teams that submitted results for this task. We present our score on the test set alongside those of comparable teams in Table REF . We note that the tas...
r
f5392002ca5725e22e62ef9bbeca3371
With the integration of RES in the modern power grid, forecasting trends are shifting from point to probabilistic in regards to the future demand and generation at disaggregated levels {{cite:3606382921c4eb557221eb021969b78f4b52a18d}}. Hong et al. presented a review for probabilistic methods and emphasized their import...
m
554048c5916c2aedd0cf1b6e0f3ea908
Theorems REF and REF show the failure of concept removal methods under a simplified setup and max-margin loss. But current deep-learning models are not trained using max-margin objective and might not satisfy the required assumptions (Assumption REF ,REF ,REF ,REF ). Thus, we now verify the failure modes on three rea...
r
cb46c2997ca834efd23db6572fd13f22
In order to study the compact approximation problem, we use the identification of space of compact operators as injective tensor product spaces. The monographs by Ryan ({{cite:a5b2d2237624e32cc430143c236a4d8202d7f12e}}), Diestel and Uhl ({{cite:2260d8c30f98054798837fb40cd84746507a5b61}}, Chapter VIII) are standard refe...
r
bd8b255cc09bd1f8e9268a1ef4257499
To summarize our work, we propose wav2vec-U 2.0  - an unsupervised ASR framework with an end-to-end style training and an improved objective function. In our experiments, we validate the effectiveness of the pipeline simplification and the proposed modification of the objective function. We show that wav2vec-U 2.0  per...
i
4a1b29d8adc5eb435246abb125f11636
It would also be interesting to understand whether we can derive a more general discrete-time analysis framework that works under a relaxed condition, e.g. without requiring contraction in continuous time, but only exponential convergence in function value (which is known for ULA and the Langevin dynamics under the log...
d
af96978ffeeb372f6c56fbe24dd494b6
We also display results from the real-world Pixel3D dataset {{cite:e84b58e70fe775a421e3881d5c9e3127b672ddb3}} in Fig. REF . In general, our model is able to detect the dominant mirror symmetry accurately from images unless multiple symmetries are present. {{figure:0e7c017d-527c-421e-bb95-fcd11436e56e}}
d
b71ca9e46b007d33a2651b54a9807842
where {{formula:4c9c8b6c-de0d-4940-a42a-d5a8443655e3}} and {{formula:ac3fa2dd-dcba-4ad0-92ae-bee68b26eba2}} are the gluon and photon actions and {{formula:7be2fcac-4e94-4045-8101-90779fa6338c}} is the Dirac operator associated to the quark of flavor {{formula:74b032ba-85be-436a-9309-c5b8427d9b93}} . The latter inclu...
m
4b9a58504805f070eb5d61f3dc3ed268
In this sections we give detailed training curves for the results shown in Figure REF . As can be seen, in the highly non-iid setting at {{formula:70ca32ad-e551-4fb5-bda9-851490c39cf5}} , all methods exhibit convergence issues. This behavior is well known in FL and is described for instance in {{cite:fedbbdb4c85358fb58...
r
f5bfbccedb5a39400ae37119b613b65d
Synthesizing realistic virtual environments is one of the most researched topics in computer graphics and computer vision. An important decision is how 3D shapes should be encoded and stored in memory. Users usually choose between triangle meshes, voxel grids, implicit functions, and point clouds {{cite:5f287b501271981...
i
83e91177fcee44e47fdceb9f62a473d1
For technical reasons {{cite:a7fb9e4130ad38b4eb2fa1468952879d6805eecc}}, {{cite:a1e751b2941b8d93008ee9478a329b5a19bc0066}}, our intractability results are initially derived relative to decision versions of our problems, i.e., problems whose answers are either “Yes” or “No”. Problem TeamEnvVer is already phrased as a de...
r
5206414f007818363a64b3d5f8ae9da5
Our work is an algorithm for multi-arm bandit (MAB) problem. On the novelty side, our work automates the exploration in bandit problems. Such algorithm could be used in recommendation system and clinic trials. On the positive side, our work could balance the exploration and exploitation trade-off in a problem dependent...
d
f52661224553d7521a5cd20545c2e034
Hence the late-time entropy is determined by which subsystem can hold the least information, i.e., if the bath entropy {{formula:8fa1562a-8091-4966-a903-772bc1770615}} is smaller, the baths set the bound, or if {{formula:3505c5d2-2c9c-409e-b45c-f2cc44904af7}} is smaller, the defects set the bound. Of course, if the b...
d
a634607c340e8a130df55f45b00987e3
The norms {{formula:c349415f-d49b-4f5e-be99-ad0ffe101004}} and {{formula:4ab23b0e-4826-480c-abef-2d71fc91bc92}} are the injective and the projective tensor norms, respectively. Actually, they are the smallest and the biggest reasonable crossnorms (we refer to {{cite:80fef02b58b30a9aeb4614b67230107ad9cb8fc6}}, {{cite:...
i
9eb54618b134b641a590cb331bb0195f
Very recent works {{cite:5045ecce7d2cf06e4f4219976596e2243d0267d4}}, {{cite:4f2ba6b7e1ed05457ec21f28bf9f4aa19b1ce230}} have explored the use of OSM data combined with social media textual information, obtained from Twitter, to perform land use classification. These works use natural language processing techniques (e.g,...
d
d3146a36d45f58dd466f15f275e4918a
Several numerical methods have been proposed for accurate solution of this class of problems based on explicit or implicit representation of the interface. Finite element methods rely on explicit meshing of the surface that poses severe challenges {{cite:b46c5c96095ad3722347d13744a27fb02a7b3609}}, {{cite:97bde05bfdd77b...
m
5ae02e263ff5830318a699197035735c
Since implicit feedback such as click is redundant, most methods use the click feedback of users as the prediction target. They formulate the news recommendation task as a click prediction task. Some methods simply classify whether a candidate news will be clicked by a target user {{cite:23409dc9bb8dad649bc5faf9918f2b9...
m
cfcbae9722de22c7886ae0b7bbfa956b
It would be very interesting if one would consider other topological defects, like strings and monopoles, which can appear in nonlocal models characterized by continuous-symmetry breaking. In fact, global string might play important roles like axion emissions in an expanding universe. In the local case, the topological...
d
7c9c02a84fc6f0b717ef3864b1c9b9dc
In the experiments, the action selection algorithm that uses Dropout for action exploration is more effective than the action selection algorithm that does not use Dropout. This is because the action sampling using Dropout can be approximated as Thompson Sampling {{cite:3b6168d36d4172f319eb8b2ddf8fc4b2c32cf97e}}, which...
r
0102c3712cc0b33a39eeec35bd66c3d4
Channel budget We study here the pruning efficacy of ChipNet coupled with channel constraint on PreResNet-164 architecture for CIFAR-10 and CIFAR-100 datasets. Results are compared with the network slimming approach {{cite:b6508bf02d55eadf6a22a6ba572f370e198c4c2a}}, implementation details related to which can be found ...
r
959a3d1d21dfecce2154300984f9cc33
Content caching is an efficient technique to handle the increase of requests for massive amounts of data and content over communication networks. By leveraging low-cost memory components at the user sides, caching reduces peak-time traffic by prefetching contents closer to users during off-peak time, thereby reducing t...
i
64e4148ee998c46af779e261e4238099
See Appendix . The performance of a FA-based UE in large-scale multi-cell networks is mainly compromised by the existence of multi-user interference {{cite:05c2b433627d0158b56389ea6fb6e906bc72ef67}}. In the considered network deployment, the multi-user interference observed by the {{formula:465e238e-cacc-4c91-8129-bd5...
r
02b3c212bb11ceb0c4ddbc28cb4bbc51
GraphSAGE {{cite:4f71d17697e4ce4e0da4dd08dccc275c5a6fd8a1}}: a general and inductive framework that efficiently generates node embeddings by sampling and aggregating features from a node's local neighbors.
m
a691d8863354246ed66cb08d8d7c3bd7
3) Grow-and-prune: This method gradually grows and prunes the backbone model for each new task. We choose two representative works for comparison, DEN {{cite:bbf0fb30b8269b106d15ee4bd989d32f7826b14c}}, CPG {{cite:5df437b5cf7af34eaba3135cac7f8a97142819b4}}. In addition, we also compare APD {{cite:9afafafba3c764ac0adca93...
m
2a429c9ad10a2d49ab0cde61bfb39370
In Figures REF (a and c) and REF (a,b,d and f) the attempt to reach chemical accuracy is displayed alongside with the number of CNOTs for both the UCCSD and fermionic ADAPT-VQE. The UCCGSD (see Eq. REF ) method remains to be characterized. We do so using the BFGS optimizer in a similar VQE loop. Table REF and Table RE...
m
ad386676727bcf605da3ef6d0033797c
Q-learning is one of the typical RL algorithms which applies look-up tables to find the optimal strategy in each state of the system{{cite:bbc57ff93beb1a44ce4c23bb1833726f218e9a18}} . However, since a bidding strategy in electricity markets is a continuous action, this method has a high computational time {{cite:f58630...
i
a52bb3968d038203990b55d51d5f2e60
It has been suggested that Ca2+ signaling among astrocytes constitutes an additional, complementary pathway for longer-term information processing and modulation of mental states {{cite:ab772c69a2248eac4ddeee2d6a35e02eb93cad66}}. In theory, states of creative problem solving, idle thought, and rumination may be a few e...
d
cc35e4076f7431965a26275153c48916
In the special case of {{formula:a41fc26d-f859-4045-beff-160a86a9115e}} in Theorem REF , we need the least singular value {{formula:e117fa5b-0d0b-4fb0-9d16-491598c37f6c}} (this necessitates that {{formula:dcea65d9-2562-4969-a184-ad323a6ed4ab}} ). This corresponds to the full-rank setting considered in Theorem REF . I...
r
422dbc66bcde1973fb915437e741bad6
The density-functional theory (DFT) calculations in this work are performed using the plane-wave basis projector augmented wave (PAW) method along with generalized gradient approximation (GGA) with Perdew-Burke-Ernzerhof(PBE){{cite:19645eb7cfb88adc6d377157f7d8adfeb8959d3a}}, {{cite:b214bfb443b5ee85a40303e8e8f190ba9a011...
m
bd90d02c5f30f643165ccd9ac448664c
A recent approach to the analysis of nuclear rates is based on Bayesian probability theory, which directly gives the probability density functions for the reaction rates (see {{cite:b3d56aac0c76d939334fc06fce0a925e6cfc6656}}, {{cite:591042f00afc21f298f28413b009d663021339ba}} for the reactions we are interested in). The...
m
dfa7134e4bef6161f5b6968b8e688305
where the optimization is over the space {{formula:a2a58ac5-1655-4264-bdc8-59897fc538ca}} , i.e., the function space induced by the realizations of DNNs with depth {{formula:51887547-6bd5-4b65-b4e9-ed9d39f5a0f2}} and width {{formula:8a32d5c9-1ffb-44d0-90db-7ddbf3541558}} . The fully-connected DNN architecture that we ...
m
55fb30f6903b86b81faede3e84331a46
In this study we explored how trust from users varied as a result of the anthropomorphic features of a robot in an industrial environment. Hancock et al. {{cite:eb782ad2011d2c04047360d3cbd9f7c7fc1c7346}} outlined the importance of robot-related factors for the development of trust in a human-robot interaction. In {{cit...
d
f330b2fae2a8fa30193f2099cbef3346
where {{formula:90c1cb10-e4fb-4515-9fb2-e9d5d316aa28}} adjusts the weights of objectives with respect to different time steps, though we found that just setting all {{formula:fcf96096-323a-409c-8f0f-5c763c6ecb53}} equal to each other could work well. We resort to contrastive divergence methods {{cite:df47bc4072d6ce47...
m
e9f84fec44081a9a168091fbeb5ed90c
Comparison with baselines. We compare our proposed method with the baseline models to validate the effectiveness of GST. In this experiment, the student is trained on the full human VisDial dataset with size {{formula:344fd52e-ddaf-432b-95e8-af754b880ced}} and a subset of the machine VisDial dataset (5 out of 30 data ...
r
1480f9a063aecec8681fc4a18c73bfc4
With the help of the Palais-Smale condition, Ambrosetti and Rabinowitz established the following Mountain Pass theorem {{cite:70913765f0502ff75f72539159d7e30829852a39}}.
r
b7b3f790970bf7ee230d840c69acaf7d
We study the estimation precision improvement from subpopulation selection by contrasting the estimation results for the full target population to those for the subpopulation in {{formula:da165736-bdfd-4b56-a6f2-2c5c29e6ccb4}} , which are measured in terms of bias, root mean square error (RMSE), and the average width a...
r
18cf3deeb096cbc76cda4b3aa28c419d
2-DVPP is a generalization of BPP and a special case of 2-BCPP. It considers two attributes for each item and bin. The problem is to pack all items in the minimum number of bins, considering both attributes of the bin's capacity limits. In {{cite:40c368488e2863704969e30b4294cc6edb5f8530}} a 2–approximation algorithm fo...
r
c4d3c028a875312b56cc2ece9ccea3ee
Deep SE-based methods {{cite:ccb418465b93b75f4d10052f4d0535d3e47324c2}}, {{cite:e51bfc0196f0b600037c7f00ae92d1775827cc58}}, {{cite:740ffd1dd559ae71738abfbd120a17e96c7407fe}}, {{cite:c70dbcc4686d02a4c5616270b4365012d57c233e}}, {{cite:c5919d8471eddcd7698d1f8c2960ff4a4e5705c5}} aim to achieve clustering by exploiting the ...
m
89544d9a8d7dfff297cff1deabac25f9
For the near end single talk scenario, we can compare our AECMOS with DNSMOS model which was developed for evaluating noise suppression models {{cite:24821461a58a2b5a310d0d521d0c18960944d326}}. AECMOS has a more difficult task than DNSMOS: evaluate both echo and other degradations and do so independently of each other....
r
7b2f34a5a7767528e51338a1bfef26b3
In this paper, we develop novel efficient and effective screening rules for the Lasso problem; our screening rules are safe in the sense that no active features will be discarded. As the name indicated (DPP), the proposed approaches heavily rely on the geometric properties of the Lasso problem. Indeed, the dual problem...
i
8144cff6b60faa859e78021ce2cf3d5a
Our construction can be seen as a realization of a quantum wire allowing tunable transfer of information between the input and the output qubits. The adjacency matrix {{formula:601ebd25-83f0-4321-949a-c5b721fa44b7}} is related to the graph {{formula:ce3765d1-132f-491a-bbfb-3a64fbe448c1}} , where we place {{formula:141...
d
981e8b8443922394ca9f667595066b10
A natural and interesting extension of our research is to consider the problem of variable selection. In the Bayesian setting, one could take into account alternative prior distributions of the multinomial logit coefficients per cluster, e.g. spike and slab priors that encourage sparsity in the model. Another direction...
d
d5f936d025d7ff7cc5f46b9df5f80b5f
We decided to follow a methodology upon the DBScan method of clustering {{cite:3e2e1e39eb8d28c30dffcadb866950fbb5a60f41}}. DBScan considers all distances between pairs of points. If they are under {{formula:b828ace7-000c-4a7b-8e6b-4af9902a682b}} then those two are linked. Once the number of connected points exceeds a ...
m
4a0cecbed0753991a0dbc505a2723c8a
For each candidate causal graph, one typically requires that a probability distribution satisfies two conditions relative to that graph: the Causal Markov Condition and a faithfulness condition.See, for example, {{cite:38561388bcbdc0ff0b861d07770b274a10db912f}}, {{cite:4e27b0c9716c075182b364af3926b396056e9960}}, or {{c...
m
ee9f76375b5ad6fca1315848bb00f4dc
Afterwards, black holes with the presence of the Æther field have attracted more and more attention. After studying Einstein-Æther theory, Jacobson et al. turned their attentions to black hole solutions in GR coupled to the Æther field {{cite:34820fd324c98f39a408ff5b7ac6b5bf2c371d36}}. It is found that within a wide ra...
i
49d804f74f53ca94c7eb68c60f1dd6d4
While it is assumed that these limitations can be overcome by adding suitable inductive biases in current neural network architectures {{cite:0ea2a14211d6d895dc38ee573e89b87fa1e94fc1}}, {{cite:24a81e0e78c6054a740df6ac8d4dcc47398c325b}}, the notion of inductive biases itself is often left vague and does not always provi...
i
6aa234d7f1c053f153fb053783ac5ac1
Gromov first raised the question which CAT(1) spaces do contain regular points {{cite:b4b3232751ad08858bdcaa5c7d69996f9ce793b3}}. A general CAT(1) space does not have to contain any regular points. On the other hand, locally compact and geodesically complete CAT(1) spaces always do, as shown by Lytchak-Nagano in {{cite...
r
605c694b22acce9cd40629ec67132bf3
We will extend {{formula:279e0162-17e2-4026-9b05-8239ef34e288}} to be an endomorphism {{formula:5eb2a054-9933-42bf-a880-2de3e5dcfb89}} by defining {{formula:1dfb2ee5-c69f-4789-a22a-512a7bd8aa93}} . According to the definition of a contact metric structure in {{cite:22e50e3014452d436daa30d2517ee20caec87291}}, one only...
r
3f1d972e0dabfb5b1966c78fc59099f4
Our main contributions are as follows: (1) we create a methodology based on local search to generate a stratified oriented-to-the-individual dataset, with each example composed of a set of posts of a single individual (section Dataset Generation) so that our inferences do not consider only snapshots of posts but the ta...
i
674f1773c62cee408da5aafaa49edcb4
Remark. Apparently, a construction of {{formula:52b4b65d-dfa7-4b8a-b08a-215632a5183e}} was firstly appeared in Aldous {{cite:65234f580f4694d7780d93af356e4e858b4da2b4}} (1985), 11.19, with a reference to J. Pitman (see, also, Pitman {{cite:31b3d7f5597c171dd5ee27782d0e45fc4ee43940}}). The action of the group {{formula:b...
i
c9abf011e2f1afb782428d54796e210f
For objective evaluation, we use the Mel-Cepstral Distance metric {{cite:8bdca5973780b2724e55a73e0700066edfff702b}} as shown in Eq. (REF ) and the results are presented in Tab. REF . For subjective evaluation, we asked participants to listen to the songs generated by both the models and evaluate them on Audio Quality, ...
m
dc7617443e5fd7eae950d13fa5fb5ee4
We develop a deep CNN network named SeizNet for end-to-end seizure detection solution. Comparing to {{cite:8081f981cbef22afebb8a3c391c1aa2b2747613c}}, SeizNet contains additional dropout layers {{cite:8784217317ee0c7fd9f2a97b03a6c75cb664733e}} and batch normalization {{cite:d9930243885559fbf0cbb810df75fcb5d9bd88bb}} af...
m
f7096e91be024d8816808831d35caaca
Miscellaneous: We can extend the above sampling procedure on a product graph under the noisy sample acquisition setting by finding the optimal sampling operator. In addition, we can process multi-band signals by sampling optimally on a product graph by constructing filter banks analogously to {{cite:f0e87f14a0ad4af6a58...
d
1ca759b1356a668272b0fb0b9b97260c
Due to the advancements in computational power and a large amount of high-quality datasets, deep learning has become the state-of-the-art technology in computer vision, natural language processing, and others {{cite:4e87feb0218263bdd36bf275feba3505665e2a31}}. Deep learning has also made remarkable progress in all areas...
i
ed88404464e6cca8272220be86ed77ed
It remains to discuss how to make simulations. For the first model in Section REF , the orientations are independent and each orientation follows the density {{formula:9387d8c0-4adc-4f93-8162-1aba64135978}} , cf. (REF ). We use rejection sampling when simulating from {{formula:de366213-a002-431c-8b81-68874bac6241}} an...
m
ac9bd88fe9fcdd379b90fdeda11243f4
Although contact binary merger events are predicted to be relatively frequent so far only a single event has been confirmed and that only in retrospect. The linking of orbital stability with the mass ratio of contact binary systems has long been recognised as potential avenue for identifying unstable systems {{cite:5a7...
d
5e3b4a40623b59ae35b52b00dcc13c3d
The chirping gain should also depend on the choice of chirping amplitude. If the amplitude is reduced to zero, the chirping gain must tend to zero. If the amplitude is too large, the laser will sample velocity classes that have a smaller atomic population.Therefore, amplitudes on the order of or larger than the width o...
d
2a7b445173b058d3bbb697d4d169becf
In this work, we have proposed a validation workflow for driver models in interaction-aware AV controllers. We illustrated its utility through a case study of validating an inverse reinforcement learning-based driver model replicated from literature {{cite:e459cfb8d73baa14cbdacfd093a0fbd39934bc6d}} using naturalistic h...
d
e668d45ca19e24f1284feaee2bb71c0b
The depth-resolved Laue patterns were obtained by solving Eq. REF for each pixel in the detector. We used a sequential approach by first recovering {{formula:9a87e52c-30c0-472f-8544-898df9658f01}} with an exhaustive search, and then recovering {{formula:bf0db976-b4e2-4d17-9dbe-c67f54c6c0bb}} with a non-negative leas...
r
17a7d34eac5926b4ee59939a09b686d1
As showcases, we herein report iOI calculations of a series of double-stranded DNA molecules of various lengths, hereafter termed as DNA{{formula:403a941f-1874-4c7a-8bd4-d4fed3f47502}} , where one strand is composed of {{formula:90402062-3a09-4cc4-a461-5021deb9bb57}} consecutive adenosines (A) and the other is compose...
r
c6387814938f535209b08ffceb8e3cfa
The top part of Table REF shows the result of the gel detection classifier. We generated three different classifiers from the training data, one for each of the threshold values 0.15, 0.3 and 0.6. Lower threshold values lead to higher recall at the cost of precision, and vice versa. In the balanced case, we achieved a...
r
26354e820f0db99d43692844d86e98d6
We applied the GBT within the first-principles calculation as implemented in the OpenMX code {{cite:d73cb5e45f9ddbd014bb3dec081b217e9abe5b97}}, a DFT package exploiting the localized basis function {{cite:4c74fa6b161a99917fc2103c8638f37b4aa49785}} and norm-conserving pseudopotentials {{cite:8a58d7b3294d182e33e0864ec66e...
m
991e971c9bc8a6614c66e975a70bc9d9
Since the Eq.  is independent of {{formula:288e7922-251f-4889-abd6-c841b56f186b}} , the system is effectively under a constant driving. As a result, the system at long time limit, if classical, should obey the original TUR {{cite:82f63f19dac8497ef436013a15de62b0788a3a62}}, {{cite:0092372cc28c0810558f0480563e9c8841b7686...
d
b9d746b94941418387bd2cb78c76c24d
where {{formula:ba0e43d3-a27c-46f2-b0d2-599ec6999077}} is the subsequent state of the state-input pair ({{formula:ffdf96d3-0d93-4286-b732-5563fd4a2298}} ). Under some conditions {{cite:8d3f622beb292e25af5949273e75688e4bd120e4}}, the action-value function {{formula:1e0367f4-38f0-471e-acbe-917ebf335f2b}} in (REF ) ca...
m
4e1d289dd562d4cd6c5dfdd7c1b5a922