text
stringlengths
54
548k
label
stringclasses
4 values
id_
stringlengths
32
32
Even with the great success of GNN models in solving various graph mining tasks such as node/graph classification {{cite:388dbaa0804f40063d36b64a45aeb46f7e07c63e}}, much less attention has been yet paid to the study on explaining GNN models. As an earlier attempt, the application of existing explanation methods such as...
m
753c53225a430e0d257a6dfa2e733a88
In words, we are assuming that the dot product of the {{formula:f6377141-5d58-42f8-b984-6cde5dcb0d38}} row of the precision matrix with the marginal covariance between {{formula:4ed3a424-845b-4f40-a683-a1cec914ee18}} and {{formula:44e4d079-a0f7-4697-84e9-d600560639c2}} is zero whenever the {{formula:9501fcd5-6d4b-4a...
m
8be842490d4be311e5733aeb23fb3d11
In this work, we propose to explore the identity factor from the I frame with the pre-trained face recognizer, e.g., FaceNet {{cite:e4eac2c56f57a5eb1936b97c34d29fbfbe742582}}. Their embeddings are remarkably reliable, since they achieve high accuracy over millions of identities {{cite:e8fa9434ee1c51b0b18eb641b64f03f49f...
i
2a6eee23f71197c93c9abb38a9241897
The vFWM yield, which, more specifically from the particle physics point of view, is the signal yield per pulse collision from stimulated resonant photon-photon scattering, {{formula:85ac0076-fe22-4f05-8043-2f7ee4f637e6}} , is factorized as {{cite:865c74f2cdea0f3d81822102b5ddf4e18ccba9be}}, {{cite:d0672b62a943724a4cf31...
m
b166da48993d39194b2baa81eede78c6
Recent works have shown promising results in dynamic view synthesis (DVS) from a monocular video {{cite:4d6f15fae351e79a9736de3d0e2157dd3a7bd64d}}, {{cite:53ffc0f15c2c2891cd9ffbdd424af617305317a0}}, {{cite:02e807cd62b86235a1a5341b72bc914453f29a78}}, {{cite:b20f366f718da128f7807eac2de6bc896b8c0a6b}}, {{cite:1ae4ddd15356...
i
c62cc3fe6fbf587331d7df372a3c915b
We wish to make high fidelity 3D reconstruction and control of complex facial movements with a simplified camera setup and little or no manual annotation. A high-level summary of our method is shown on Fig. REF . First, we capture fine-scale transitions of facial movements during a semi-structured expression task. The ...
i
ec4f590c8d3f9d89fae07efad98d87e2
established by Mordukhovich {{cite:8794092887ca09f09a0907aa55249c3691c63f8a}} via his limiting coderivative (REF ) and then labeled as the Mordukhovich criterion in Rockafellar and Wets {{cite:6ea8b52da29ad5669fe14fb614d39cb1306cb328}}. Broad applications of this result are based on robustness and full calculus availab...
d
12708032813396e9278566c500514eae
As in previous works motivated by probabilistic inference  {{cite:3c6f8fd352e4c5ab74fa9b59c5b5a52974bdc13e}}, {{cite:f38a0ee05f35bcb16e1c7b5ae6a4044a44840d94}}, we introduce to the standard graphical model of an MDP a binary event variable {{formula:3abf6647-5595-4d59-899a-2eaf2eab06a5}} , which represents whether the ...
m
ce7218a7bf8d20011a0dc0bc5e683935
In the proof we inspire in a Lindenstrauss compactness argument (see e.g. {{cite:3619e74edcad74ee96800d4b841b413a8af12a82}}). Let {{formula:764120fb-50a8-4ddb-8163-fcd98a8b0c58}} be a finite metric space, {{formula:8aa1b28d-580e-4530-a6e7-2ff0e23b7b85}} and {{formula:549d3ace-cd21-43e5-a33e-2ebd4a9af47d}} be a Lipsc...
r
5da5f33aeda60e76d1936ebe723b1d24
Change-point problems range from the simple situation of detecting an alteration in the regime of a random sequence to identifying a structural break in multiple linear regression with possibly correlated errors. Although in the second case the change-point can assume any value, in the first situation it must lie in a ...
d
6f903187493e2c3b745f63b4688b226a
In this work, we focus on the problem of CT image reconstruction from incomplete data {{cite:884d78834eaf14f631492af8e50287b5f28c0ede}}, i.e., sparse views and limited angle reconstruction problems. Traditional CT image reconstruction algorithms include filtered back-projection(FBP) {{cite:884d78834eaf14f631492af8e5028...
i
3a8480034fcf8bb5189a0543bac02182
A promising direction for improving the sample efficiency of reinforcement learning agents in complex environments is to pre-train low-level skills that are then used to structure the exploration in downstream tasks {{cite:1672b2f8a5f5fbde10a7dfe6d2be2d5ef1f6938c}}, {{cite:962fe25d65632e95cf72855e98c22ed9f6958c2a}}, {{...
i
82e9aac860a8d71eb583f196efd746ad
The structures and kinematics observed for these UCHII regions cannot, with the one exception of W33M2a, be satisfactorily modelled by a single embedded star either moving or stationary. Each UCHII region can be simulated by a range of lower mass OB stars, moving relative to each other; the stars, the winds and their...
d
65dcde5f1f55546c236f1f980735595f
UCDCC {{cite:37166ee9dde777d31c0fcf3175cff049a9a62561}} is a Siamese LSTM model exploiting Glove word embedding features. It achieves the best performance on SemEval 2018 Task 3 Subtask A. The method has designed a lot of rules in preprocessing Twitter data. THU-NGN {{cite:987ae9c071bbda8655a0c6a87f48b69ad62e1579}} r...
m
b15f337148cbef7b04df12a731d387d3
Results    In Fig. REF and table REF , we show our main result, i.e. that our model consistently outperforms the SOTA {{cite:2d676fbba05cc2998740f95e7f3a7da75925d922}} by 5 to {{formula:722ce307-49c6-48c6-b14f-ae76f8262e06}} depending on the task, in terms of test accuracy, despite having much fewer learnable paramet...
r
b916fdb5aa0df2efd6ec44c0c36ff8b5
where {{formula:9106ba38-9b6a-4438-918d-44b30526e07a}} is the photon energy. The total photon flux modulated by the non-interaction probability is given by {{cite:7defed718398a9ebccbf20063b6f94562279868d}}, {{cite:89c7397470894ae2a2db032f0469c0df9355f63b}}, {{formula:3272a318-c47a-41fd-b30f-159bb7695c04}}
r
41a99eb5dc5f4ceaf7f5979b33a41121
By the classical open mapping theorem in functional analysis, if two Banach spaces coincide as sets, we obtain the equivalence of norms immediately. In {{cite:1f046d0de1f2603952fbfa2981acb4664902d814}}, authors only studied the case that the base domain is the unit ball {{formula:9db32032-682f-4f77-897b-e6b81811ad38}} ...
i
9aa53cee48b12b8171bc64e9223cd655
This result was refined in the pioneering works by Bramson {{cite:1d618d78fd912bf7814cff538669ae3bc49513a1}}, {{cite:e8883097e8952ba92659d6498459099f97769552}}, who used probabilistic techniques and the connection of (REF ) to branching Brownian motion to analyze the front position {{formula:e1369e10-3390-4a24-9a0a-f0f...
r
349e6793d7b2e768a061dca5418a7a72
Most of the literatures are confined in using a particular type of image sets for the analysis of corresponding denoising algorithm/s {{cite:82e93263b2f6a68a78952db6868b0f9fa241bd6a}}. Moreover, the image quality assessment (IQA) measures such as: Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Measur...
r
9e2d4b30e4c01ce49b6a1b1be0db3ca2
Previous studies have concluded that Bot-like accounts stir conversations in differently politically aligned belief groups rather than concentrating on conversations in one belief group {{cite:4dc22eceb40a612d636703dea5ead8a54f04d0a2}}, {{cite:e40871bf2c8cce352f200da800c919a6c98b95f2}}. In this study, we further provid...
d
8f010cc17df2f23714cf4d94a9db5c53
The Leiden algorithm is an improvement of the Louvain algorithm {{cite:af290727786befb2d58c1f1dc15ebdc58b2b9d73}}. The Leiden algorithm consists of three phases:
m
343459da45a9a773b85c59714122a223
We use birth/lifetime coordinates rather than birth/death coordinates. Lifetime coordinates provide a more interpretable feature, and simplify the description of partial Wasserstein metrics, as the distance to the boundary is simply the lifetime coordinate. Birth/lifetime coordinates have previously been used in the d...
m
2d98c5794eceb87afb0e34e1a1368600
In order to emphasize the input variable discarding step, we use a similar approach to the momentum method {{cite:bd36f0d4569b36669d30e57f3e7cfd4a8ebbf48d}}, which is a technique for accelerating gradient descent algorithms by accumulating a velocity vector in the gradient direction of the loss function across iteratio...
m
9190eac1f2668ccf54794cfeeaf7a99d
Timescales in the neural activities are hierarchically distributed across several cortical areas {{cite:5392f9b3462a2cb0cd790d7e8e2e39be16250d7e}}, {{cite:690cb82a3933bfd3e006f6ede735de4c007c2fa6}}, {{cite:ac34575d92af0a7524e889887ee6743967edb1f8}}, {{cite:57eb42b7f7e29cb76b97313035699921fbdc5d3b}}. For instance, consi...
d
2842f6620a65ab04d6a4361ba0f15bf9
Furthermore, in our graph neural network approach, the embedding vectors for the vertices are fixed through time. This limits the capability of the vertex embedding module to capture the evolution of the vertex over time. Alternatively, we can try incorporating a time dependent embedding module into our graph neural ne...
d
d7b8d193835470f856bb0141d6478104
Unfortunately, the application of this powerful concept for the estimation of {{formula:4ac60f94-8114-49f6-95f9-877bb4b3a7f7}} is limited by the fact that AC is a non-computable quantity. Even if the minimal theoretical program that generates the sequence is not achievable, there are compression algorithms which can o...
m
e494b004ff6be4192cec13f9b7e4ba08
We propose to employ CNNs as feature extractors similar to {{cite:8ce70951182aa5e32b1a55e7b332d9d2482b46ab}} to facilitate comparisons with traditional texture features. We also propose to use a well-known machine learning classifier, to evaluate performance of different feature sets, thereby eliminating the effects of...
m
83c652e1f9dc7dd5489a3bcadf6da725
We first show that semantic fusion confers additional robustness against existing LiDAR attacks; traditional, naive FP and FN attacks are intrinsically limited against certain fusion architectures. In fact, we leverage that naive LiDAR attacks on camera-LiDAR fusion generate inconsistencies between the camera and LiDAR...
i
c7eed779ce76dcdcef4e2a9b150113c6
The renormalization scale is taken as {{formula:8353adf4-10fe-48e1-9abc-4159150a3aca}} , and the bottom quark mass is taken as {{cite:c6d99dd3b4a1d9a9f26b882b1efef5503fe8e383}}: {{formula:b354e1a8-cbe3-4bd8-a8c5-b9cc3326a3de}} . {{formula:7a597232-ca4b-46bb-ba50-9897bf2af943}} is taken from {{cite:8826f045c20498653a74...
r
19c811e919914b5fa3ebed2ee603cd4e
Analytical calculations in Section and Appendix were made using the Wolfram Mathematica system for technical computing and the package {{cite:fc864db768296f7800610868dd6304beb7a5c0fd}}, on the parallel computing server Theor4 of JINR BLTP.
i
bf112077ebc6d52298b0c2791016245e
Starting from the state {{formula:11872668-50ce-496c-a835-61253f0be0fd}} , prepare a superposition over the first register {{formula:5dbc83d0-c5a8-48e9-9489-3f77fdfa2952}} If we allow for error {{formula:0a127d15-e8b4-4b71-8fef-7ec45c031c7d}} , the complexity of this step, in terms of T-gates using the QROM is {{form...
m
7f54234d8b233675f4a5eda0501581e8
Also, the effects from passivating hydrogens, known to be commonly present at the edges of experimental nanoribbon samples {{cite:6e2f5d99385cb93a104461afd6bfd6f2f7c326e3}}, {{cite:5f8934af51c780fc55274702cf8093c30d5060fc}}, {{cite:fd3acb5232e22fd0c436ea5a71b96efcd0c48c36}}, {{cite:d016694804bf076f71158282379c154cafa7f...
d
afafa60d0c62c67be2c74088ebd510a0
DeepLIFT (Deep Learning Important FeaTures) is a technique based on decomposing the prediction of a neural network for specific input. The entire backpropagation process is observed along with observation of weight and bias on each neuron on every layer of the entire architecture. Based on a variety of weights on neuro...
m
ca8f1d3a09c366c69e6df5bd6e524d49
Another motivation for using BEV features to perform perception tasks is that BEV is a desirable bridge to connect temporal and spatial space. For the human visual perception system, temporal information plays a crucial role in inferring the motion state of objects and identifying occluded objects, and many works in vi...
i
6112d98d081506713983592cd5c0f59f
Classical penalisation methods {{cite:47f2bc7b7f4c7106389817c0b9f17185f43bfb3c}}, including lasso, ridge, and elastic net penalties, can offer sparse solutions to the linear regression problem. They are deterministic approaches that employ constrained optimisation schemes to achieve sparse solutions, in that they add a...
i
7e70530611d5957492a75c4263c6ee22
To realize the real-world environmental impact of Data-genie, we discuss a typical weekly RecSys development cycle and its carbon footprint. Taking the Criteo Ad dataset as inspiration, we assume a common industry-scale dataset to have {{formula:db366742-c265-4ea3-a84a-43f5fb9f93a5}} B interactions. We assume a hypothe...
d
00feb94685299fdaad5d963d35ab7a64
That being said, the various applications mentioned above may yet be guaranteed to run efficiently by exploiting various restrictions. Our results to date suggest that it is most important to restrict the environment. This can be done either directly by restricting the available features and actions in the environment ...
d
a7c85b020ef0c69ca6fc3209ed1f11c8
Corollary 3 (Dirac, Corollary on p.73 in {{cite:d289fd5863e8fced0e8d2aef87569ce3bd56b1aa}}) If {{formula:c13e987a-a5cb-49a7-939e-5cd1f85e753b}} is adjacent to a vertex {{formula:d0e7c9c9-6c4d-4df4-b6f9-f842278cea62}} of {{formula:662006a5-76f5-4cf3-b9ae-b772ff934196}} , then the graph contains two paths connecting {...
i
8b9cad43f67571b3b1870a75cf9d9616
On the other hand, the study of quantum many-body systems has lived an explosion of results. This is specifically true in the field of Tensor Networks. Recently, "Matrix Product States", and more generally "Tensor Network States" have played a crucial role in the description of the whole quantum systems {{cite:313fee8b...
i
6010d7ef71d6c77a74069530d63c2bbd
We use three different methodologies for training the cross-lingual word embedding models on all the language pairs with Hindi as a pivot language (Hi-Mr, Hi-Bn and so on). The first methodology uses the supervised method named MUSE {{cite:b4cd87eaf801a35c1082cee1930dd85daafeb77f}}Link: MUSE - GitHub which utilizes a m...
m
82c8e9d793cf36e06180468aa8fac31e
The mechanical characteristics of light in optomechanical system {{cite:be6df29446df9581553171dc498f255f773b4fba}}, {{cite:5b5f88d979b25f19b712cb42029394d4646dbdda}}, {{cite:3f146255f49abaac1d7159cf0d3f84d26d39aca4}}, {{cite:346957629df3cf0bca2c87749f4ea7a6fa8b645b}}, {{cite:c7f2b606d381743c057b844c957c0c3a6ba57d98}}, ...
i
8311090d4bb4eae32b6cccfff7cb89be
is free from IR divergences for the scattering problem with a potential {{formula:3ce69e37-ef45-4b4f-9bf6-d2da1e50f76b}} , see the last section of Ref. {{cite:939b58c3c8d6a317b05f7e5c0ffd3deed38f8f46}}. Regarding the value of {{formula:785ad5f0-ef51-4d95-a59d-f96ee6988939}} , it is important to stress that Eq. (REF ) ...
m
06a86a16b44e1404e7f2931771f7a50e
where {{formula:57a34437-e5d5-4809-9d2f-0a6f96ac782f}} and {{formula:ac8111c6-4b72-402a-8620-fc692f8dc02b}} are numerical constants of order 1 (see {{cite:575fc4ae1e545742eb55396ebf5807143ff462b1}}) and {{formula:42106adb-014e-47d1-9a4e-d329b0612b43}} is the number of times the estimation is repeated (here we will c...
r
feb32d8d889c902362fcf15c6c955037
Finally, our work highlights how computational solutions that appear in humans can be fruitful for approaching related problems in machine learning and AI. In recent years, models that capture human reasoning have received substantial attention {{cite:d7db93d999d124bb43ac1cfa81b92c72a1040bc8}}, {{cite:380347392b2e4f9cc...
d
06be242494120300732bb0a6c944f891
In this section, the DRL-based algorithm is simulated and analyzed. To evaluate the proposed method, the minimum rate among all users is used as a comparison benchmark. Furthermore, the proposed schemes are compared to the exhaustive search method and the random pilot assignment, which respectively give the upper and t...
r
13a750fce1aef6956f1a9760ae35260f
In the unsupervised domain adaptation problem, the source dataset {{formula:64dca346-6f1d-4135-94ff-ae0ee82b0042}} consists of data sample ({{formula:98021307-72c3-4ee8-9212-5c82e52b52d0}} ) with corresponding label ({{formula:3d4f96d4-8c7b-4afb-a5d0-9e28f5f38e88}} ) where {{formula:39b76aef-8f7c-4211-a878-2200d24563e...
m
35bdb4d06329ec6cfd4f09f70f02b57c
Reinforcement Learning (RL) is a machine learning paradigm where an agent learns the optimal action for a given task through its repeated interaction with a dynamic environment that either rewards or punishes the agent's action. Reinforcement learning could be considered as a semi-supervised learning approach where the...
i
29d0e2788d582b104d29992cc8ed09ee
Given a set of {{formula:8766f9a0-176b-4a71-9121-ddb7273e0f76}} images {{formula:cfb0f03b-b115-4774-a74d-02f43d17ef20}} depicting a generic object in-the-wild, we aim to recover a set of {{formula:1faed72a-d327-4cb8-af87-6d49d4a68f52}} rotation matrices {{formula:ca2ec3c3-fd4d-4423-a581-6c71918aa413}} such that rot...
m
8517a76ae75ce7e83303b81a50bb107c
Among WiFi RSSI fingerprinting indoor localization approaches, the probabilistic method is based on statistical inference between the target signal measurement and stored fingerprints using Bayes rule {{cite:15df3a2a851f1431d49b79a61849bd98ebdc1ea0}}. The RSSI probability density function (PDF) is assumed to have empir...
i
8fcd8d226ab991073b5aa3dea3c694f7
As ultra-precise measurement schemes require the finest possible revolution technology in the detection, they are then convinced to be limited by the fundamental building block describing the physical nature at the microscope levels. More precisely, improving detection precision requires exploiting the resources of qua...
i
7b25d2ceb6e0e3a48320ebb9ffab9ea1
Segmentation of given point clouds: Segmentation of point cloud data is one of the popular 3D tasks. We carried out this experiment on the ShapeNet benchmark {{cite:b79553f69d3f90a9b3b6315530d936da12012b1e}} and followed the data split in {{cite:2476e5645d95641547991697d8479644bf08302f}}. ShapeNet contains 16881 models...
r
0602a144e082c564a657bd0de1f15dd2
Assumption REF and REF are both standard, they have been used in {{cite:a7a943532ad7bcd7bbd6c1706fff70b3005c914b}} for theoretical analysis of reduced rank regression and in {{cite:ab0a1b61b8d0dcd5d42408c33c0cc7891bb51c46}} for trace regression and matrix completion.
r
f320df3cd571b20f7475adbddc6186f6
The second category corresponds to a scenario where each agent knows its own local constraint {{formula:532fff0c-df2e-456e-8ebb-fcab55700d89}} . {{cite:98390e09ae0af151a124d8dcc3fb4db7f2718c32}} and {{cite:6fa66b07e95e06aed98fe3588f201a6d82b89213}} proposed projection onto local constraint sets in each iteration. They ...
m
5c0cfb33198f3f5c92973fb09ac4b7d8
In this paper, we review some theoretical results on least-squares methods, in particular, when they yield optimal estimates. We show how they can be applied to counting experiments without sacrificing optimality. The insights discussed here are known in the statistics community {{cite:f7be517a9d1b52d45a2a78e30fd1b4ec9...
i
19261599cf3455ebd77b87af6884fc5f
for {{formula:6b2a438b-7b0d-4ad6-8467-a5d18f3c6685}} and {{formula:26967062-0375-4df5-a9cc-56f489cfed3f}} . This, together with the regularity estimates for solutions to elliptic partial differential equations (see {{cite:29cda21a39f77137c21ee6564c586a99c7bc4056}}), implies that such estimates actually hold for partia...
m
98b2221d3c20dd051b6b0c6a1d6a3fae
RFA{{cite:d0a85ee4c6867580bf862669e89b38e306df820e}}: RFA takes the weighted geometric median of collected local model updates using the smoothed Weiszfeld's algorithm as the aggregated global model. A particular round of the smoothed Weiszfeld's algorithm is computed as follows: {{formula:b675f306-828c-4069-897e-edd...
m
8fb4578c717ca1d18e80a8c64916a362
The full set is a concrete, learnable cousin of an abstraction called the manifold of data in the series of recent papers {{cite:49e9d99afa1e9819ce0a60b8f42ce0178587daeb}}, {{cite:bb8e88dd76f217ca91ccb731b11398a5344a697d}}, {{cite:e58588d44a881821544556789da79eea095c5cac}}. The manifold of data, by definition, requires...
d
3768793d9da7e369f653bd87996de3c5
(ii) Set {{formula:42f91680-febe-45d2-822f-52d71381d74f}} . Clearly, by (REF ), {{formula:e91d76ee-d65b-4d06-a223-769b58744a0f}} . Let {{formula:02f80b73-b51e-486b-995b-b2f7bd8aa287}} be the largest invariant subset of {{formula:dcfa6097-1b5d-4c5e-bc5a-8e1ec52651f5}} . By Lemma REF , {{formula:9dcb0ebf-fe8d-4ba2-9736-...
r
8ab92aa6561e8d6aa72fa9d08eeae071
The usual multihomogeneous start systems depend only on the degrees of {{formula:5c03469b-015b-40ed-bc08-4316599d3baf}} In contrast, the polyhedral homotopy introduced in {{cite:b15fcca59fc65975f70bbfbb95af5f6bf9116b7d}}, {{cite:181c69eea29744b504faf2cbc911625a14382382}} takes the Newton polytopes of {{formula:e655b15...
i
f86f965cfb5bc4fad68277efdaf14f08
The small {{formula:3faca29a-16c4-418f-a198-830b2251cf66}} limit for {{formula:8cd672f9-097d-4a03-843c-cdbf34b46045}} , as Eq.(6) shows, is related to a Friedel-like {{cite:d0d83a9c1b218ec25dba6cc302226a8bd82d35e0}} sum of phase shifts since at the forward limit ({{formula:7586c6bb-133c-4520-b945-8bdf8ae9348e}} ) one ...
r
46081cc7c9a027e976d4ec8e8466a0a9
Related work: Several existing algorithms such as sequential probability ratio test (SPRT), generalized likelihood ratio test (GLRT), CUSUM and its variants such as weighted CUSUM are based on the assumption that the density ratios can be readily computed for devising test-statistics for change detection {{cite:8bacbeb...
i
97cd575cc0d7ab1271732405e825eb28
Tunneling is a purely quantum mechanical phenomenon which takes place in classically-forbidden region, originally intended to account for {{formula:b8d1e7a1-1609-4f13-80c8-5c395e14bd8c}} -decay, fusion, and fission in nuclear physics {{cite:e76177447525acdc6a6dac426c80c9b890d79ac4}}, {{cite:15476a90793a176af00df4b0fe5e...
i
4289b9dc023a1ab4ec2eed61557dda8b
These discrepancies can primarily be attributed to three factors. First, it is known that solitary wave-defect interactions lead to `leaking' of energy into the infinite dimensional subspace of linear waves (`phonons'), even in the continuum setting. Our reduced-order model can potentially be made more accurate by incl...
d
b5182f588800d78087dfa94fb469f758
Using the 3D SPH models of {{cite:aa8dff2fc1267422962efba2a5887790f7040988}} and simple geometric models, we determined that the high-ionization emission originates from a distorted paraboloidal structure lying in the skirt of the Homunculus. Based upon the blue-shifted velocities and near symmetry for PAs ranging from...
d
e6ccb32e5447ebe8e1e92f0098350888
Task-Content In terms of 6-class classification for image content, although all modalities outperform the baseline, the task is shown to be very challenging. It is surprising that the performance with I-M is lower than T-M. The reason might be that visual argumentative tasks demand more specific image encoders that lea...
r
130b498bedbdda32cfd53b443df2ff01
Pre-trained language models (e.g., BERT {{cite:7ad643be419fd45a1f76c495702517294fe70e73}}, GPT {{cite:dc30439986aa9547c1322060b574c074554642af}}, XLNet {{cite:2cb426fefc88e2b44641831bcb0b855c3c467105}}, MASS {{cite:e22be7bacb113593f0e58c937136294b6f6271a2}} and etc) have achieved significant progress in natural languag...
m
0a257c1489f598efda7026243b74dfa4
We aim to leverage state-of-the-art out-of-distribution detection methods {{cite:db671a341cf08542ea69ac79dbb240b1bf07b307}}, {{cite:87ab20903d2f36d129af8afb8a2d19802dc90f31}}, {{cite:3f6f30c7f17d5716aeddd2c00c9f59b842b84ab4}} in the health domain for users to safely use health deep learning models. We selected three ou...
m
1bf27c943c9385e4eb2e32122bf2d7c9
Code availability. The polymer simulations are performed using LAMMPS Molecular Dynamics Simulation software {{cite:e47657730a163fb88b848f7e039766a172dfa38f}}, which is an open source code available at http://lammps.sandia.gov. The codes used to analyze data in the present study are deposited to Github repository https...
m
7a427fe73269bf7cce88229a38df5738
We introduce an additional loss called Diverse Loss {{formula:b17365af-cd70-4d08-bbf5-5e7105c87b44}} given in (REF ) that further encourages the complementary information across time-series and spectrogram views. Due to contrastive loss on concatenated features, the time-series and spectrogram representations can tend...
m
bb386304ab743bd3c6327bbbd05b10a0
Ideas and computations of the proposal of gravity with Hayward term of {{cite:1cb6df839b499a5250a94ef9aeebdb213c72bf68}} were tested for JT gravity. Supplementary suppositions of {{cite:1cb6df839b499a5250a94ef9aeebdb213c72bf68}} in the JT lab on the holographic correspondence between subsystems were investigated. In ...
r
78ca44686ce1940c6ff248fc35bd4375
In Section REF , we introduce the planet-disc interaction model adopted from {{cite:b725fa3b9ab9eccaed856898c63b1e94a33e4426}},and we show how planet migration as well as eccentricity and inclination damping of protoplanetary orbits are modelled in our code. We also updated the type II migration prescription by followi...
m
48dacec4fdb1ba6f99ecac4f8f335547
Tab. REF shows that our pretrained model generalizes well to novel scenes and consistently outperforms LLFF {{cite:4aceb01fb0af5677a1b4b9ab30076ce13c90cc99}} on all test scenes. After finetuning, our model's performance is competitive with state-of-the-art neural rendering methods like NeRF {{cite:784ad94b893a20b528bb...
r
5538ed78b4acc658ea838e1a7b951b83
Then, RCG (Q) updates {{formula:23f44e92-0786-4890-98e0-1d31dd77a1d0}} along the conjugate direction, followed by retraction. Regarding the step size, the optimal choice of {{formula:2fd6750d-ca7e-46e8-a70d-bdcac138022f}} would be the minimizer of the objective function: {{formula:b0db6fc3-fe62-4590-af4a-8c9d336d90d...
m
38be708769563c82588e214890a9ebb0
However, as the first work to address the multi-degraded LF image SR problem, we adopt the non-blind SR settings as in {{cite:ade05958ec695a6cb2b11e55a7691ae05957c782}}, and take both degraded LF images and their degradations (blur kernel width and noise level) as inputs of our LF-DAnet. Reasons are in three folds. Fir...
d
f8be0f78ebe637b4eae3a5d6754b9774
Multi-modal fusion can be grouped into early, late, and intermediate fusion approaches. In the context of early fusion, the multi-modal features are fused at the input level before the learning algorithm {{cite:3be03ee320c30b4e32ab6a2bf393b1496f5cf15d}}. Besides, in the late fusion, the features from the multi-modal ar...
m
59474064c13930e5b949dcd0453dfc24
The advances in methods of evaluation of multi-leg virtual amplitudes {{cite:75d0abe8e89a5a12640067daad56b4c6d9c58ef5}}, {{cite:1043bcb6dc0ee785eae0a9b906e0873266ec58cd}}, {{cite:8d07e3b704718612d4bfb2d6ae0758b84e99ee05}}, {{cite:6a6f0f4aed1c5291c7067336ae55f8ab5747cb40}}, {{cite:bc688421573ed7bf01217e4cfffd016d066da3b...
i
0bc50b08eba461c4eca840935537fce0
Beyond elucidating the behavior of vanilla self-attention architectures, our work theoretically motivates architectural changes that can provide the next leap in self-attention network expressiveness. By indicating the network width as the limiting factor for depth-efficiency, our analysis encourages the development of...
d
cc5c9a37157f35f89bc4474c1d22f573
Our aim in this work is to study the physics that emerges when two slabs of WSM are twisted with respect to each other and tunnel-coupled. From the analogy to graphene bilayers {{cite:9ff974a2bc6846e06bb1c2ca1f6cf0edd33a4855}}, {{cite:766bc67c9b781ec3d5cc3bc5a2023f1c120bc748}}, {{cite:70b3f3b9c6eb5b3c2a95b8c91be7cb36b8...
i
980b868fd1baa3c8ee0e16fa11d6d9a5
Cache-Hit-Ratio: This metric illustrates the number of requests served by caching nodes versus the total number of requests made across the network. The high value of cache-hit-ratio shows the superiority of the framework. Since we assume that ground users can download one segment in each contact, we evaluate the cache...
r
5cebbbe69da2ebf0a611760e3e9917de
We implemented the three enumeration methods (Methods REF , REF and REF ) described in Subsection REF on Magma V2.26-10 {{cite:801bc247bc6cc19158cd55b6d3cd7a4bdf5bab4f}} in a PC with macOS Monterey 12.0.1, at 2.6 GHz CPU 6 Core (Intel Core i7) and 16GB memory. We also implemented decision-versions of the three method...
r
ee5119740fcae319d1e0f6fd4704f249
Exploration methods in RL improve the agent's policy by motivating the agent to explore the environment. As the agent explores an environment, the agent improves its policy. The researchers proposed methods to motivate the agent to explore less visited states {{cite:183cf0afb4daba8d0e276e1cb5baeaf9d7aa2b19}} {{cite:605...
i
4ae484bd79f8b580666893d2509d34f6
Inspired by the feedforward multilayer perceptron (FF-MLP) {{cite:fdb861ffcf8bb431bfb11ddc8cc1bb1fba97b330}}, decision tree (DT) {{cite:26a1a18380e19f8cc605805a43bfc9db1b2eeb62}} and extreme learning machine (ELM) {{cite:4bbfb92499ed7c0f0c894606ae762a3d8ce4c5dd}}, a new machine learning model named SLM was proposed by ...
m
b267bcd41b15a2f8d074e95de49d691a
We numerically studied the mechanical and geometrical properties of wet granular materials with {{formula:b493fade-6271-4613-b258-769d2ef3e34e}} . For {{formula:ac63e4c3-a235-492e-8fbf-99a2dac96bf7}} , the shear modulus {{formula:5c647012-1144-4af6-81ed-e1197c140e1c}} has two inflection points, and the bulk modulus {{...
d
8fce16a2b33b7cc687fa34c88840a352
Our result suggests that so far there is no evidence of FRBs associated with catastrophic events such as GRBs. This is consistent with the consensus in the community that the majority of FRBs, if not all, are related to non-catastrophic, repeating sources {{cite:1c549fd327a951ee673c5c8be552d7219ea7ef0c}}, {{cite:921bb2...
d
8161cb3bb4a08c858f1f384599e8d1ec
The convergence test of the projection scheme is presented in Appendix REF , where the computation of the end-of-step velocity is found to be indispensible to the numerical stability, which is contrary to some conventional understanding as in {{cite:9d5df5205cd7a7c0f7d6037b67a2bd96bfe8ba66}}.
m
95ca6a58661ada718242e1c0d4b2dc86
The dependence of the predicted values on the quantities {{formula:dd9f4ae8-b33a-41b2-8d52-4eb44d6af271}} , and {{formula:bdd0c981-2dfc-479c-8eb4-40d3227bf06c}} is described in detail in the Appendix. The {{formula:3b60ee7b-f2ad-4560-9d4b-bebe5015e281}} are measured inputs to these predicted values, including the Wol...
m
d761d84e9c2fa359427ad7d3686c4866
It is easy to see that our operator satisfies the assumptions in {{cite:695ed9ce09bcd6055bbe4a4219ef48e5b8bcf5bb}}. Define the following two functions, {{formula:d887ce72-e526-4cad-ab28-cea77f0b12e2}} where {{formula:f3001393-7624-4bb4-921c-ce6fde90a43a}} is a small constant to be chosen depending on {{formula:c443d9...
r
5662edf06128f20b0bb5a6b693a55092
ImageNet. We perform experiments on ImageNet to validate the existence and effectiveness of feature transformation on large scale classification dataset. Furthermore, we also adopt different architectures of teacher and student to validate them. A ResNet50 is chosen to be the teacher while a ResNet18 and a MobileNetV2-...
m
268377a97100573906cb2a90e3cf1111
where {{formula:ef228c73-1f3f-431d-ba1a-c5cadbc9bae3}} is a constant depending on the carrier frequency, the user and AP heights, given in {{cite:24dcdb3146bbf8f232bfc96e4fc11143a3b13886}}. We further use the correlated shadowing model for {{formula:4a157f59-972e-4525-af2d-b9ae847738e4}} as described in {{cite:24dcd...
r
50580fb6f032c60ef13ea945ae2dbff4
On the other hand, the units of biological networks are in general not rational agents, and it is not straightforward to argue that benefits in terms of betweenness centrality shaped, for instance, the structure of metabolic, genetic or brain networks along their million year long evolutionary path {{cite:1585ea5b08371...
d
44d026dd823b3e3301b2190cda8a5916
In this section, we first revisit ImageMAE {{cite:9537d968a32218a97bc63bdd4cb14ab013abf75e}}. Then we analyze the characteristics of video data. Finally, we show how we explore MAE in the video data by presenting our VideoMAE.
m
3dc2f5808e88ad4070078556684e960d
Our results are different from existing work on image classification. Using logits with Mahalanobis distance as proposed by {{cite:d17a372d028329259a9f9cc749d639433f26a335}} is out-performed by the backbone features by a large margin in our experiments. Similarly, our OC-SVM model with early layer features could not ac...
r
17f5bbf50ec5bf1cd77e595a5bb9429a
We studied in this work the kinetic EOS (both with and without the HMT) in some details in the general dimension {{formula:489f98b8-6953-45a5-914c-0cfa87f0c9af}} , the next important step is to effectively/reasonably incorporate the nucleon-nucleon interactions/potentials in a self-consistent way, either at the phenom...
d
f5d630d9924d05047edfef3850a10214
Observe that, in finding {{formula:ac139279-64c2-478f-a0b4-b41dcf0fbb7a}} , the operator {{formula:f891aaef-e9ba-4ded-9b0c-eaf3816e6d58}} is evaluated (possibly) many times, but no extra projections onto the set {{formula:e795f0ff-e0b2-4117-9531-b1c8c351bcf4}} are needed. This is in contrast to a couple of related al...
m
83a45a31e4bf680a6d3b40f371302b11
One challenge for the future is to extend this work beyond purely geometric situations, e.g. to images with multiple digits as in {{cite:361a9e4996b4dc65e51380e2eef77a3bb3bca6b9}}. The theory for this is presented in supp. material . The other notable challenge is around generalizing RANSAC-style inference. For the geo...
d
7db46f55360a5736f7c2bb9414c272a1
Inspired by the single perfect fluid exact solutions in Einstein's gravity {{cite:2296ab31901253e9245882c301cefe53696547eb}}, we consider the ansatz {{formula:657a563a-e253-46f9-a1c3-118aced9f681}}
r
71c704959924f0215d9919acf4df2498
Among other similar works, in {{cite:d9714919819184357557e4c61579f6e7017a5bee}}, the authors study in the framework of Bethe-Salpeter equation, the production ratio of neutral to charged kaon pair in {{formula:68b3f127-7e86-4224-a66e-f6a643d03e46}} annihilation below the {{formula:936151ec-7517-4ef1-807f-ef290c1513f6}...
d
1f3bd516c8398a748a1e452ba46a7430
Finally, the notation we employ is standard and follows {{cite:868ac067eb1282dc40ac45cb13fe76f43d649e39}} and {{cite:4162ab3030554d4dbf08195ffeac45e597e9404f}}.
i
d38cc464442fd503d10b2f1a773ed135
Assumption REF allows the policy to explore, but in the limit ({{formula:fa99e5d9-8524-42b5-8ca5-34d1b7e1e439}} ) this assumption requires the policy to choose greedy actions. Assumption REF is strong, however, {{cite:a0798d6924eb23f58242e3c98ef1075c5aaaaf35}} show that similar assumptions are required to prove conve...
r
c0e1bd87ceb4c79e4a80cf8ed7ec2c76
The main contribution of this work is that we create a connection between exploration methods and model-based reinforcement learning. We present a method of maximum-entropy exploration for model-based reinforcement learning agents and build a MaxEnt Dreamer that improves the performance to model-based Dreamer {{cite:bf...
i
f57a5ea92714795451dd48f54b9f118f