text stringlengths 54 548k | label stringclasses 4
values | id_ stringlengths 32 32 |
|---|---|---|
Even with the great success of GNN models in solving various graph mining tasks such as node/graph classification {{cite:388dbaa0804f40063d36b64a45aeb46f7e07c63e}}, much less attention has been yet paid to the study on explaining GNN models. As an earlier attempt, the application of existing explanation methods such as... | m | 753c53225a430e0d257a6dfa2e733a88 |
In words, we are assuming that the dot product of the {{formula:f6377141-5d58-42f8-b984-6cde5dcb0d38}} row of
the precision matrix with the marginal covariance between {{formula:4ed3a424-845b-4f40-a683-a1cec914ee18}} and {{formula:44e4d079-a0f7-4697-84e9-d600560639c2}}
is zero whenever the {{formula:9501fcd5-6d4b-4a... | m | 8be842490d4be311e5733aeb23fb3d11 |
In this work, we propose to explore the identity factor from the I frame with the pre-trained face recognizer, e.g., FaceNet {{cite:e4eac2c56f57a5eb1936b97c34d29fbfbe742582}}. Their embeddings are remarkably reliable, since they achieve high accuracy over millions of identities {{cite:e8fa9434ee1c51b0b18eb641b64f03f49f... | i | 2a6eee23f71197c93c9abb38a9241897 |
The vFWM yield, which, more specifically from the particle physics point of view,
is the signal yield per pulse collision from stimulated resonant photon-photon scattering,
{{formula:85ac0076-fe22-4f05-8043-2f7ee4f637e6}} , is factorized as {{cite:865c74f2cdea0f3d81822102b5ddf4e18ccba9be}}, {{cite:d0672b62a943724a4cf31... | m | b166da48993d39194b2baa81eede78c6 |
Recent works have shown promising results in dynamic view synthesis (DVS) from a monocular video {{cite:4d6f15fae351e79a9736de3d0e2157dd3a7bd64d}}, {{cite:53ffc0f15c2c2891cd9ffbdd424af617305317a0}}, {{cite:02e807cd62b86235a1a5341b72bc914453f29a78}}, {{cite:b20f366f718da128f7807eac2de6bc896b8c0a6b}}, {{cite:1ae4ddd15356... | i | c62cc3fe6fbf587331d7df372a3c915b |
We wish to make high fidelity 3D reconstruction and control of complex facial movements with a simplified camera setup and little or no manual annotation. A high-level summary of our method is shown on Fig. REF . First, we capture fine-scale transitions of facial movements during a semi-structured expression task. The ... | i | ec4f590c8d3f9d89fae07efad98d87e2 |
established by Mordukhovich {{cite:8794092887ca09f09a0907aa55249c3691c63f8a}} via his limiting coderivative (REF ) and then labeled as the Mordukhovich criterion in Rockafellar and Wets {{cite:6ea8b52da29ad5669fe14fb614d39cb1306cb328}}. Broad applications of this result are based on robustness and full calculus availab... | d | 12708032813396e9278566c500514eae |
As in previous works motivated by probabilistic inference {{cite:3c6f8fd352e4c5ab74fa9b59c5b5a52974bdc13e}}, {{cite:f38a0ee05f35bcb16e1c7b5ae6a4044a44840d94}}, we introduce to the standard graphical model of an MDP a binary event variable {{formula:3abf6647-5595-4d59-899a-2eaf2eab06a5}} , which represents whether the ... | m | ce7218a7bf8d20011a0dc0bc5e683935 |
In the proof we inspire in a Lindenstrauss compactness argument (see e.g. {{cite:3619e74edcad74ee96800d4b841b413a8af12a82}}). Let {{formula:764120fb-50a8-4ddb-8163-fcd98a8b0c58}} be a finite metric space, {{formula:8aa1b28d-580e-4530-a6e7-2ff0e23b7b85}} and {{formula:549d3ace-cd21-43e5-a33e-2ebd4a9af47d}} be a Lipsc... | r | 5da5f33aeda60e76d1936ebe723b1d24 |
Change-point problems range from the simple situation of detecting an alteration in the regime of a random sequence to identifying a structural break in multiple linear regression with possibly correlated errors. Although in the second case the change-point can assume any value, in the first situation it must lie in a ... | d | 6f903187493e2c3b745f63b4688b226a |
In this work, we focus on the problem of CT image reconstruction from incomplete data {{cite:884d78834eaf14f631492af8e50287b5f28c0ede}}, i.e., sparse views and limited angle reconstruction problems. Traditional CT image reconstruction algorithms include filtered back-projection(FBP) {{cite:884d78834eaf14f631492af8e5028... | i | 3a8480034fcf8bb5189a0543bac02182 |
A promising direction for improving the sample efficiency of reinforcement learning agents in complex environments is to pre-train low-level skills that are then used to structure the exploration in downstream tasks {{cite:1672b2f8a5f5fbde10a7dfe6d2be2d5ef1f6938c}}, {{cite:962fe25d65632e95cf72855e98c22ed9f6958c2a}}, {{... | i | 82e9aac860a8d71eb583f196efd746ad |
The structures and kinematics observed for these UCHII regions cannot, with the one exception of W33M2a, be satisfactorily modelled by a single embedded star either moving or stationary.
Each UCHII region can be simulated by a range of lower mass OB stars, moving relative to each other; the stars, the winds and their... | d | 65dcde5f1f55546c236f1f980735595f |
UCDCC {{cite:37166ee9dde777d31c0fcf3175cff049a9a62561}} is a Siamese LSTM model exploiting Glove word embedding features. It achieves the best performance on SemEval 2018 Task 3 Subtask A. The method has designed a lot of rules in preprocessing Twitter data.
THU-NGN {{cite:987ae9c071bbda8655a0c6a87f48b69ad62e1579}} r... | m | b15f337148cbef7b04df12a731d387d3 |
Results
In Fig. REF and table REF , we show our main result, i.e. that our model consistently outperforms the SOTA {{cite:2d676fbba05cc2998740f95e7f3a7da75925d922}} by 5 to {{formula:722ce307-49c6-48c6-b14f-ae76f8262e06}} depending on the task, in terms of test accuracy, despite having much fewer learnable paramet... | r | b916fdb5aa0df2efd6ec44c0c36ff8b5 |
where {{formula:9106ba38-9b6a-4438-918d-44b30526e07a}} is the photon energy. The total photon flux modulated by the non-interaction probability is given by {{cite:7defed718398a9ebccbf20063b6f94562279868d}}, {{cite:89c7397470894ae2a2db032f0469c0df9355f63b}},
{{formula:3272a318-c47a-41fd-b30f-159bb7695c04}}
| r | 41a99eb5dc5f4ceaf7f5979b33a41121 |
By the classical open mapping theorem in functional analysis, if two Banach spaces coincide as sets, we obtain the equivalence of norms immediately. In {{cite:1f046d0de1f2603952fbfa2981acb4664902d814}}, authors only studied the case that the base domain is the unit ball {{formula:9db32032-682f-4f77-897b-e6b81811ad38}} ... | i | 9aa53cee48b12b8171bc64e9223cd655 |
This result was refined in the pioneering works by Bramson {{cite:1d618d78fd912bf7814cff538669ae3bc49513a1}}, {{cite:e8883097e8952ba92659d6498459099f97769552}}, who
used probabilistic techniques and the
connection of (REF ) to branching Brownian motion to analyze the front position {{formula:e1369e10-3390-4a24-9a0a-f0f... | r | 349e6793d7b2e768a061dca5418a7a72 |
Most of the literatures are confined in using a particular type of image sets for the analysis of corresponding denoising algorithm/s {{cite:82e93263b2f6a68a78952db6868b0f9fa241bd6a}}. Moreover, the image quality assessment (IQA) measures such as: Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Measur... | r | 9e2d4b30e4c01ce49b6a1b1be0db3ca2 |
Previous studies have concluded that Bot-like accounts stir conversations in differently politically aligned belief groups rather than concentrating on conversations in one belief group {{cite:4dc22eceb40a612d636703dea5ead8a54f04d0a2}}, {{cite:e40871bf2c8cce352f200da800c919a6c98b95f2}}. In this study, we further provid... | d | 8f010cc17df2f23714cf4d94a9db5c53 |
The Leiden algorithm is an improvement of the Louvain algorithm {{cite:af290727786befb2d58c1f1dc15ebdc58b2b9d73}}. The Leiden algorithm consists of three phases:
| m | 343459da45a9a773b85c59714122a223 |
We use birth/lifetime coordinates rather than birth/death coordinates. Lifetime coordinates provide a more interpretable feature, and simplify the description of partial Wasserstein metrics, as the distance to the boundary is simply the lifetime coordinate. Birth/lifetime coordinates have previously been used in the d... | m | 2d98c5794eceb87afb0e34e1a1368600 |
In order to emphasize the input variable discarding step, we use a similar approach to the momentum method {{cite:bd36f0d4569b36669d30e57f3e7cfd4a8ebbf48d}}, which is a technique for accelerating gradient descent algorithms by accumulating a velocity vector in the gradient direction of the loss function across iteratio... | m | 9190eac1f2668ccf54794cfeeaf7a99d |
Timescales in the neural activities are hierarchically distributed across several cortical areas {{cite:5392f9b3462a2cb0cd790d7e8e2e39be16250d7e}}, {{cite:690cb82a3933bfd3e006f6ede735de4c007c2fa6}}, {{cite:ac34575d92af0a7524e889887ee6743967edb1f8}}, {{cite:57eb42b7f7e29cb76b97313035699921fbdc5d3b}}.
For instance, consi... | d | 2842f6620a65ab04d6a4361ba0f15bf9 |
Furthermore, in our graph neural network approach, the embedding vectors for the vertices are fixed through time. This limits the capability of the vertex embedding module to capture the evolution of the vertex over time. Alternatively, we can try incorporating a time dependent embedding module into our graph neural ne... | d | d7b8d193835470f856bb0141d6478104 |
Unfortunately, the application of this powerful concept for the estimation of {{formula:4ac60f94-8114-49f6-95f9-877bb4b3a7f7}}
is limited by the fact that AC is a non-computable quantity.
Even if the minimal theoretical program that generates the sequence is not
achievable, there are compression algorithms which can o... | m | e494b004ff6be4192cec13f9b7e4ba08 |
We propose to employ CNNs as feature extractors similar to {{cite:8ce70951182aa5e32b1a55e7b332d9d2482b46ab}} to facilitate comparisons with traditional texture features. We also propose to use a well-known machine learning classifier, to evaluate performance of different feature sets, thereby eliminating the effects of... | m | 83c652e1f9dc7dd5489a3bcadf6da725 |
We first show that semantic fusion confers additional robustness against existing LiDAR attacks; traditional, naive FP and FN attacks are intrinsically limited against certain fusion architectures. In fact, we leverage that naive LiDAR attacks on camera-LiDAR fusion generate inconsistencies between the camera and LiDAR... | i | c7eed779ce76dcdcef4e2a9b150113c6 |
The renormalization scale is taken as {{formula:8353adf4-10fe-48e1-9abc-4159150a3aca}} , and the bottom
quark mass is taken as {{cite:c6d99dd3b4a1d9a9f26b882b1efef5503fe8e383}}: {{formula:b354e1a8-cbe3-4bd8-a8c5-b9cc3326a3de}} .
{{formula:7a597232-ca4b-46bb-ba50-9897bf2af943}} is taken from {{cite:8826f045c20498653a74... | r | 19c811e919914b5fa3ebed2ee603cd4e |
Analytical calculations in Section and Appendix were made using the Wolfram Mathematica system for technical computing and the package {{cite:fc864db768296f7800610868dd6304beb7a5c0fd}}, on the parallel computing server Theor4 of JINR BLTP.
| i | bf112077ebc6d52298b0c2791016245e |
Starting from the state {{formula:11872668-50ce-496c-a835-61253f0be0fd}} , prepare a superposition over the first register
{{formula:5dbc83d0-c5a8-48e9-9489-3f77fdfa2952}}
If we allow for error {{formula:0a127d15-e8b4-4b71-8fef-7ec45c031c7d}} , the complexity of this step, in terms of T-gates using the QROM is {{form... | m | 7f54234d8b233675f4a5eda0501581e8 |
Also, the effects from passivating hydrogens, known to be commonly present at the edges of experimental
nanoribbon samples {{cite:6e2f5d99385cb93a104461afd6bfd6f2f7c326e3}}, {{cite:5f8934af51c780fc55274702cf8093c30d5060fc}}, {{cite:fd3acb5232e22fd0c436ea5a71b96efcd0c48c36}}, {{cite:d016694804bf076f71158282379c154cafa7f... | d | afafa60d0c62c67be2c74088ebd510a0 |
DeepLIFT (Deep Learning Important FeaTures) is a technique based on decomposing the prediction of a neural network for specific input. The entire backpropagation process is observed along with observation of weight and bias on each neuron on every layer of the entire architecture. Based on a variety of weights on neuro... | m | ca8f1d3a09c366c69e6df5bd6e524d49 |
Another motivation for using BEV features to perform perception tasks is that BEV is a desirable bridge to connect temporal and spatial space.
For the human visual perception system, temporal information plays a crucial role in inferring the motion state of objects and identifying occluded objects, and many works in vi... | i | 6112d98d081506713983592cd5c0f59f |
Classical penalisation methods {{cite:47f2bc7b7f4c7106389817c0b9f17185f43bfb3c}}, including lasso, ridge, and elastic net penalties, can offer sparse solutions to the linear regression problem. They are deterministic approaches that employ constrained optimisation schemes to achieve sparse solutions, in that they add a... | i | 7e70530611d5957492a75c4263c6ee22 |
To realize the real-world environmental impact of Data-genie, we discuss a typical weekly RecSys development cycle
and its carbon footprint.
Taking the Criteo Ad dataset as inspiration, we assume a common industry-scale dataset to have {{formula:db366742-c265-4ea3-a84a-43f5fb9f93a5}} B interactions.
We assume a hypothe... | d | 00feb94685299fdaad5d963d35ab7a64 |
That being said, the various applications mentioned above may yet be guaranteed to
run efficiently by exploiting various restrictions. Our results to date suggest that it
is most important to restrict the environment. This can be done either directly by
restricting the available features and actions in the environment ... | d | a7c85b020ef0c69ca6fc3209ed1f11c8 |
Corollary 3 (Dirac, Corollary on p.73 in {{cite:d289fd5863e8fced0e8d2aef87569ce3bd56b1aa}})
If {{formula:c13e987a-a5cb-49a7-939e-5cd1f85e753b}} is adjacent to a vertex {{formula:d0e7c9c9-6c4d-4df4-b6f9-f842278cea62}} of {{formula:662006a5-76f5-4cf3-b9ae-b772ff934196}} , then the graph contains two
paths connecting {... | i | 8b9cad43f67571b3b1870a75cf9d9616 |
On the other hand, the study of quantum many-body systems has lived an explosion of results. This is specifically true in the field of Tensor Networks. Recently, "Matrix Product States", and more generally
"Tensor Network States" have played a crucial role in the description of the whole quantum systems {{cite:313fee8b... | i | 6010d7ef71d6c77a74069530d63c2bbd |
We use three different methodologies for training the cross-lingual word embedding models on all the language pairs with Hindi as a pivot language (Hi-Mr, Hi-Bn and so on). The first methodology uses the supervised method named MUSE {{cite:b4cd87eaf801a35c1082cee1930dd85daafeb77f}}Link: MUSE - GitHub which utilizes a m... | m | 82c8e9d793cf36e06180468aa8fac31e |
The mechanical characteristics of light in optomechanical system {{cite:be6df29446df9581553171dc498f255f773b4fba}}, {{cite:5b5f88d979b25f19b712cb42029394d4646dbdda}}, {{cite:3f146255f49abaac1d7159cf0d3f84d26d39aca4}}, {{cite:346957629df3cf0bca2c87749f4ea7a6fa8b645b}}, {{cite:c7f2b606d381743c057b844c957c0c3a6ba57d98}}, ... | i | 8311090d4bb4eae32b6cccfff7cb89be |
is free from IR divergences for the scattering problem with a potential {{formula:3ce69e37-ef45-4b4f-9bf6-d2da1e50f76b}} , see the last section of Ref. {{cite:939b58c3c8d6a317b05f7e5c0ffd3deed38f8f46}}.
Regarding the value of {{formula:785ad5f0-ef51-4d95-a59d-f96ee6988939}} , it is important to stress that Eq. (REF ) ... | m | 06a86a16b44e1404e7f2931771f7a50e |
where {{formula:57a34437-e5d5-4809-9d2f-0a6f96ac782f}} and {{formula:ac8111c6-4b72-402a-8620-fc692f8dc02b}} are numerical constants of order 1 (see
{{cite:575fc4ae1e545742eb55396ebf5807143ff462b1}}) and {{formula:42106adb-014e-47d1-9a4e-d329b0612b43}} is the number of times the estimation is
repeated (here we will c... | r | feb32d8d889c902362fcf15c6c955037 |
Finally, our work highlights how computational solutions that appear in humans can be fruitful for approaching related problems in machine learning and AI. In recent years, models that capture human reasoning have received substantial attention {{cite:d7db93d999d124bb43ac1cfa81b92c72a1040bc8}}, {{cite:380347392b2e4f9cc... | d | 06be242494120300732bb0a6c944f891 |
In this section, the DRL-based algorithm is simulated and analyzed. To evaluate the proposed method, the minimum rate among all users is used as a comparison benchmark. Furthermore, the proposed schemes are compared to the exhaustive search method and the random pilot assignment, which respectively give the upper and t... | r | 13a750fce1aef6956f1a9760ae35260f |
In the unsupervised domain adaptation problem, the source dataset {{formula:64dca346-6f1d-4135-94ff-ae0ee82b0042}} consists of data sample ({{formula:98021307-72c3-4ee8-9212-5c82e52b52d0}} ) with corresponding label ({{formula:3d4f96d4-8c7b-4afb-a5d0-9e28f5f38e88}} ) where {{formula:39b76aef-8f7c-4211-a878-2200d24563e... | m | 35bdb4d06329ec6cfd4f09f70f02b57c |
Reinforcement Learning (RL) is a machine learning paradigm where an
agent learns the optimal action for a given task through its
repeated interaction with a dynamic environment that either rewards
or punishes the agent's action. Reinforcement learning could be
considered as a semi-supervised learning approach where the... | i | 29d0e2788d582b104d29992cc8ed09ee |
Given a set of {{formula:8766f9a0-176b-4a71-9121-ddb7273e0f76}} images {{formula:cfb0f03b-b115-4774-a74d-02f43d17ef20}} depicting a generic object in-the-wild, we aim to recover a set of {{formula:1faed72a-d327-4cb8-af87-6d49d4a68f52}} rotation matrices {{formula:ca2ec3c3-fd4d-4423-a581-6c71918aa413}} such that rot... | m | 8517a76ae75ce7e83303b81a50bb107c |
Among WiFi RSSI fingerprinting indoor localization approaches, the probabilistic method is based on statistical inference between the target signal measurement and stored fingerprints using Bayes rule {{cite:15df3a2a851f1431d49b79a61849bd98ebdc1ea0}}. The RSSI probability density function (PDF) is assumed to have empir... | i | 8fcd8d226ab991073b5aa3dea3c694f7 |
As ultra-precise measurement schemes require the finest possible revolution technology in the detection, they are then convinced to be limited by the fundamental building block describing the physical nature at the microscope levels. More precisely, improving detection precision requires exploiting the resources of qua... | i | 7b25d2ceb6e0e3a48320ebb9ffab9ea1 |
Segmentation of given point clouds: Segmentation of point cloud data is one of the popular 3D tasks. We carried out this experiment on the ShapeNet benchmark {{cite:b79553f69d3f90a9b3b6315530d936da12012b1e}} and followed the data split in {{cite:2476e5645d95641547991697d8479644bf08302f}}. ShapeNet contains 16881 models... | r | 0602a144e082c564a657bd0de1f15dd2 |
Assumption REF and REF are both standard, they have been used in {{cite:a7a943532ad7bcd7bbd6c1706fff70b3005c914b}} for theoretical analysis of reduced rank regression and in {{cite:ab0a1b61b8d0dcd5d42408c33c0cc7891bb51c46}} for trace regression and matrix completion.
| r | f320df3cd571b20f7475adbddc6186f6 |
The second category corresponds to a scenario where each agent knows its own local constraint {{formula:532fff0c-df2e-456e-8ebb-fcab55700d89}} . {{cite:98390e09ae0af151a124d8dcc3fb4db7f2718c32}} and {{cite:6fa66b07e95e06aed98fe3588f201a6d82b89213}} proposed projection onto local constraint sets in each iteration. They ... | m | 5c0cfb33198f3f5c92973fb09ac4b7d8 |
In this paper, we review some theoretical results on least-squares methods, in particular, when they yield optimal estimates. We show how they can be applied to counting experiments without sacrificing optimality. The insights discussed here are known in the statistics community {{cite:f7be517a9d1b52d45a2a78e30fd1b4ec9... | i | 19261599cf3455ebd77b87af6884fc5f |
for {{formula:6b2a438b-7b0d-4ad6-8467-a5d18f3c6685}} and {{formula:26967062-0375-4df5-a9cc-56f489cfed3f}} .
This, together with the regularity estimates for solutions to elliptic partial differential equations
(see {{cite:29cda21a39f77137c21ee6564c586a99c7bc4056}}), implies that such estimates actually hold for partia... | m | 98b2221d3c20dd051b6b0c6a1d6a3fae |
RFA{{cite:d0a85ee4c6867580bf862669e89b38e306df820e}}: RFA takes the weighted geometric median of collected local model updates using the smoothed Weiszfeld's algorithm as the aggregated global model. A particular round of the smoothed Weiszfeld's algorithm is computed as follows:
{{formula:b675f306-828c-4069-897e-edd... | m | 8fb4578c717ca1d18e80a8c64916a362 |
The full set is a concrete, learnable cousin of an abstraction called the manifold of data in the series of recent papers {{cite:49e9d99afa1e9819ce0a60b8f42ce0178587daeb}}, {{cite:bb8e88dd76f217ca91ccb731b11398a5344a697d}}, {{cite:e58588d44a881821544556789da79eea095c5cac}}.
The manifold of data, by definition, requires... | d | 3768793d9da7e369f653bd87996de3c5 |
(ii) Set {{formula:42f91680-febe-45d2-822f-52d71381d74f}} . Clearly, by (REF ), {{formula:e91d76ee-d65b-4d06-a223-769b58744a0f}} . Let {{formula:02f80b73-b51e-486b-995b-b2f7bd8aa287}} be the largest invariant subset of {{formula:dcfa6097-1b5d-4c5e-bc5a-8e1ec52651f5}} . By Lemma REF , {{formula:9dcb0ebf-fe8d-4ba2-9736-... | r | 8ab92aa6561e8d6aa72fa9d08eeae071 |
The usual multihomogeneous start systems depend only on the degrees of {{formula:5c03469b-015b-40ed-bc08-4316599d3baf}} In contrast, the polyhedral homotopy introduced in {{cite:b15fcca59fc65975f70bbfbb95af5f6bf9116b7d}}, {{cite:181c69eea29744b504faf2cbc911625a14382382}} takes the Newton polytopes of {{formula:e655b15... | i | f86f965cfb5bc4fad68277efdaf14f08 |
The small {{formula:3faca29a-16c4-418f-a198-830b2251cf66}} limit for {{formula:8cd672f9-097d-4a03-843c-cdbf34b46045}} ,
as Eq.(6) shows, is related to a Friedel-like {{cite:d0d83a9c1b218ec25dba6cc302226a8bd82d35e0}} sum of phase shifts since at the
forward limit ({{formula:7586c6bb-133c-4520-b945-8bdf8ae9348e}} ) one ... | r | 46081cc7c9a027e976d4ec8e8466a0a9 |
Related work:
Several existing algorithms such as sequential probability ratio test (SPRT), generalized likelihood ratio test (GLRT), CUSUM and its variants such as weighted CUSUM are based on the assumption that the density ratios can be readily computed for devising test-statistics for change detection {{cite:8bacbeb... | i | 97cd575cc0d7ab1271732405e825eb28 |
Tunneling is a purely quantum mechanical phenomenon which takes place in classically-forbidden region, originally intended to account for {{formula:b8d1e7a1-1609-4f13-80c8-5c395e14bd8c}} -decay, fusion, and fission in nuclear physics {{cite:e76177447525acdc6a6dac426c80c9b890d79ac4}}, {{cite:15476a90793a176af00df4b0fe5e... | i | 4289b9dc023a1ab4ec2eed61557dda8b |
These discrepancies can primarily be attributed to three factors. First, it is known that solitary wave-defect interactions lead to `leaking' of energy into the infinite dimensional subspace of linear waves (`phonons'), even in the continuum setting. Our reduced-order model can potentially be made more accurate by incl... | d | b5182f588800d78087dfa94fb469f758 |
Using the 3D SPH models of {{cite:aa8dff2fc1267422962efba2a5887790f7040988}} and simple geometric models, we determined that the high-ionization emission originates from a distorted paraboloidal structure lying in the skirt of the Homunculus. Based upon the blue-shifted velocities and near symmetry for PAs ranging from... | d | e6ccb32e5447ebe8e1e92f0098350888 |
Task-Content
In terms of 6-class classification for image content, although all modalities outperform the baseline, the task is shown to be very challenging. It is surprising that the performance with I-M is lower than T-M. The reason might be that visual argumentative tasks demand more specific image encoders that lea... | r | 130b498bedbdda32cfd53b443df2ff01 |
Pre-trained language models (e.g., BERT {{cite:7ad643be419fd45a1f76c495702517294fe70e73}}, GPT {{cite:dc30439986aa9547c1322060b574c074554642af}}, XLNet {{cite:2cb426fefc88e2b44641831bcb0b855c3c467105}}, MASS {{cite:e22be7bacb113593f0e58c937136294b6f6271a2}} and etc) have achieved significant progress in natural languag... | m | 0a257c1489f598efda7026243b74dfa4 |
We aim to leverage state-of-the-art out-of-distribution detection methods {{cite:db671a341cf08542ea69ac79dbb240b1bf07b307}}, {{cite:87ab20903d2f36d129af8afb8a2d19802dc90f31}}, {{cite:3f6f30c7f17d5716aeddd2c00c9f59b842b84ab4}} in the health domain for users to safely use health deep learning models.
We selected three ou... | m | 1bf27c943c9385e4eb2e32122bf2d7c9 |
Code availability. The polymer simulations are performed using LAMMPS Molecular Dynamics Simulation software {{cite:e47657730a163fb88b848f7e039766a172dfa38f}}, which is an open source code available at http://lammps.sandia.gov. The codes used to analyze data in the present study are deposited to Github repository https... | m | 7a427fe73269bf7cce88229a38df5738 |
We introduce an additional loss called Diverse Loss {{formula:b17365af-cd70-4d08-bbf5-5e7105c87b44}} given in (REF ) that further encourages the complementary information across time-series and spectrogram views. Due to contrastive loss on concatenated features, the time-series and spectrogram representations can tend... | m | bb386304ab743bd3c6327bbbd05b10a0 |
Ideas and computations of the proposal of gravity with Hayward term of {{cite:1cb6df839b499a5250a94ef9aeebdb213c72bf68}} were tested for JT gravity.
Supplementary suppositions of {{cite:1cb6df839b499a5250a94ef9aeebdb213c72bf68}} in the JT lab on the holographic correspondence between subsystems were investigated. In ... | r | 78ca44686ce1940c6ff248fc35bd4375 |
In Section REF , we introduce the planet-disc interaction
model adopted from {{cite:b725fa3b9ab9eccaed856898c63b1e94a33e4426}},and we show how planet migration as
well as eccentricity and inclination damping of protoplanetary orbits
are modelled in our code. We also updated the type II migration
prescription by followi... | m | 48dacec4fdb1ba6f99ecac4f8f335547 |
Tab. REF shows that our pretrained model generalizes well to novel scenes and consistently outperforms LLFF {{cite:4aceb01fb0af5677a1b4b9ab30076ce13c90cc99}} on all test scenes. After finetuning, our model's performance is competitive with state-of-the-art neural rendering methods like NeRF {{cite:784ad94b893a20b528bb... | r | 5538ed78b4acc658ea838e1a7b951b83 |
Then, RCG (Q) updates {{formula:23f44e92-0786-4890-98e0-1d31dd77a1d0}} along the conjugate direction, followed by retraction.
Regarding the step size, the optimal choice of {{formula:2fd6750d-ca7e-46e8-a70d-bdcac138022f}} would be the minimizer of the objective function: {{formula:b0db6fc3-fe62-4590-af4a-8c9d336d90d... | m | 38be708769563c82588e214890a9ebb0 |
However, as the first work to address the multi-degraded LF image SR problem, we adopt the non-blind SR settings as in {{cite:ade05958ec695a6cb2b11e55a7691ae05957c782}}, and take both degraded LF images and their degradations (blur kernel width and noise level) as inputs of our LF-DAnet. Reasons are in three folds.
Fir... | d | f8be0f78ebe637b4eae3a5d6754b9774 |
Multi-modal fusion can be grouped into early, late, and intermediate fusion approaches. In the context of early fusion, the multi-modal features are fused at the input level before the learning algorithm {{cite:3be03ee320c30b4e32ab6a2bf393b1496f5cf15d}}. Besides, in the late fusion, the features from the multi-modal ar... | m | 59474064c13930e5b949dcd0453dfc24 |
The advances in methods of evaluation of multi-leg virtual
amplitudes {{cite:75d0abe8e89a5a12640067daad56b4c6d9c58ef5}}, {{cite:1043bcb6dc0ee785eae0a9b906e0873266ec58cd}}, {{cite:8d07e3b704718612d4bfb2d6ae0758b84e99ee05}}, {{cite:6a6f0f4aed1c5291c7067336ae55f8ab5747cb40}}, {{cite:bc688421573ed7bf01217e4cfffd016d066da3b... | i | 0bc50b08eba461c4eca840935537fce0 |
Beyond elucidating the behavior of vanilla self-attention architectures, our work theoretically motivates architectural changes that can provide the next leap in self-attention network expressiveness.
By indicating the network width as the limiting factor for depth-efficiency, our analysis encourages the development of... | d | cc5c9a37157f35f89bc4474c1d22f573 |
Our aim in this work is to study the physics that emerges when two
slabs of WSM are twisted with respect to each other and
tunnel-coupled. From the analogy to graphene bilayers
{{cite:9ff974a2bc6846e06bb1c2ca1f6cf0edd33a4855}}, {{cite:766bc67c9b781ec3d5cc3bc5a2023f1c120bc748}}, {{cite:70b3f3b9c6eb5b3c2a95b8c91be7cb36b8... | i | 980b868fd1baa3c8ee0e16fa11d6d9a5 |
Cache-Hit-Ratio: This metric illustrates the number of requests served by caching nodes versus the total number of requests made across the network. The high value of cache-hit-ratio shows the superiority of the framework. Since we assume that ground users can download one segment in each contact, we evaluate the cache... | r | 5cebbbe69da2ebf0a611760e3e9917de |
We implemented the three enumeration methods (Methods REF , REF and REF ) described in Subsection REF on Magma V2.26-10 {{cite:801bc247bc6cc19158cd55b6d3cd7a4bdf5bab4f}} in a PC with macOS Monterey 12.0.1, at 2.6 GHz CPU 6 Core (Intel Core i7) and 16GB memory.
We also implemented decision-versions of the three method... | r | ee5119740fcae319d1e0f6fd4704f249 |
Exploration methods in RL improve the agent's policy by motivating the agent to explore the environment. As the agent explores an environment, the agent improves its policy. The researchers proposed methods to motivate the agent to explore less visited states {{cite:183cf0afb4daba8d0e276e1cb5baeaf9d7aa2b19}} {{cite:605... | i | 4ae484bd79f8b580666893d2509d34f6 |
Inspired by the feedforward multilayer perceptron
(FF-MLP) {{cite:fdb861ffcf8bb431bfb11ddc8cc1bb1fba97b330}}, decision tree (DT) {{cite:26a1a18380e19f8cc605805a43bfc9db1b2eeb62}} and extreme learning machine
(ELM) {{cite:4bbfb92499ed7c0f0c894606ae762a3d8ce4c5dd}}, a new machine learning model named SLM was proposed by
... | m | b267bcd41b15a2f8d074e95de49d691a |
We numerically studied the mechanical and geometrical properties of wet granular materials with {{formula:b493fade-6271-4613-b258-769d2ef3e34e}} .
For {{formula:ac63e4c3-a235-492e-8fbf-99a2dac96bf7}} , the shear modulus {{formula:5c647012-1144-4af6-81ed-e1197c140e1c}} has two inflection points, and the bulk modulus {{... | d | 8fce16a2b33b7cc687fa34c88840a352 |
Our result suggests that so far there is no evidence of FRBs associated with catastrophic events such as GRBs. This is consistent with the consensus in the community that the majority of FRBs, if not all, are related to non-catastrophic, repeating sources {{cite:1c549fd327a951ee673c5c8be552d7219ea7ef0c}}, {{cite:921bb2... | d | 8161cb3bb4a08c858f1f384599e8d1ec |
The convergence test of the projection scheme is presented in Appendix REF , where the computation of the end-of-step velocity is found to be indispensible to the numerical stability, which is contrary to some conventional understanding as in {{cite:9d5df5205cd7a7c0f7d6037b67a2bd96bfe8ba66}}.
| m | 95ca6a58661ada718242e1c0d4b2dc86 |
The dependence of the predicted values on the quantities {{formula:dd9f4ae8-b33a-41b2-8d52-4eb44d6af271}} , and {{formula:bdd0c981-2dfc-479c-8eb4-40d3227bf06c}}
is described in detail in the Appendix. The {{formula:3b60ee7b-f2ad-4560-9d4b-bebe5015e281}} are measured inputs to these predicted values, including the Wol... | m | d761d84e9c2fa359427ad7d3686c4866 |
It is easy to see that our operator satisfies the assumptions in {{cite:695ed9ce09bcd6055bbe4a4219ef48e5b8bcf5bb}}.
Define the following two functions,
{{formula:d887ce72-e526-4cad-ab28-cea77f0b12e2}}
where {{formula:f3001393-7624-4bb4-921c-ce6fde90a43a}} is a small constant to be chosen depending on {{formula:c443d9... | r | 5662edf06128f20b0bb5a6b693a55092 |
ImageNet.
We perform experiments on ImageNet to validate the existence and effectiveness of feature transformation on large scale classification dataset.
Furthermore, we also adopt different architectures of teacher and student to validate them.
A ResNet50 is chosen to be the teacher while a ResNet18 and a MobileNetV2-... | m | 268377a97100573906cb2a90e3cf1111 |
where {{formula:ef228c73-1f3f-431d-ba1a-c5cadbc9bae3}} is a constant depending on the carrier frequency, the
user and AP heights, given in {{cite:24dcdb3146bbf8f232bfc96e4fc11143a3b13886}}. We further use the correlated shadowing model for {{formula:4a157f59-972e-4525-af2d-b9ae847738e4}} as described in {{cite:24dcd... | r | 50580fb6f032c60ef13ea945ae2dbff4 |
On the other hand, the units of biological networks are in general not rational agents, and it is not straightforward to argue that benefits in terms of betweenness centrality shaped, for instance, the structure of metabolic, genetic or brain networks along their million year long evolutionary path {{cite:1585ea5b08371... | d | 44d026dd823b3e3301b2190cda8a5916 |
In this section, we first revisit ImageMAE {{cite:9537d968a32218a97bc63bdd4cb14ab013abf75e}}. Then we analyze the characteristics of video data. Finally, we show how we explore MAE in the video data by presenting our VideoMAE.
| m | 3dc2f5808e88ad4070078556684e960d |
Our results are different from existing work on image classification.
Using logits with Mahalanobis distance as proposed by
{{cite:d17a372d028329259a9f9cc749d639433f26a335}} is out-performed by the backbone features by a
large margin in our experiments. Similarly, our OC-SVM model with early layer
features could not ac... | r | 17f5bbf50ec5bf1cd77e595a5bb9429a |
We studied in this work the kinetic EOS (both with and without the HMT) in some details in the general dimension {{formula:489f98b8-6953-45a5-914c-0cfa87f0c9af}} , the next important step is to effectively/reasonably incorporate the nucleon-nucleon interactions/potentials in a self-consistent way, either at the phenom... | d | f5d630d9924d05047edfef3850a10214 |
Observe that, in finding {{formula:ac139279-64c2-478f-a0b4-b41dcf0fbb7a}} , the operator {{formula:f891aaef-e9ba-4ded-9b0c-eaf3816e6d58}} is evaluated (possibly)
many times, but no extra projections onto the set {{formula:e795f0ff-e0b2-4117-9531-b1c8c351bcf4}} are needed. This
is in contrast to a couple of related al... | m | 83a45a31e4bf680a6d3b40f371302b11 |
One challenge for the future is to extend this work beyond purely
geometric situations, e.g. to images with multiple digits as in
{{cite:361a9e4996b4dc65e51380e2eef77a3bb3bca6b9}}. The theory for this is presented in
supp. material .
The other notable challenge is around generalizing RANSAC-style
inference. For the geo... | d | 7db46f55360a5736f7c2bb9414c272a1 |
Inspired by the single perfect fluid exact solutions in Einstein's gravity {{cite:2296ab31901253e9245882c301cefe53696547eb}}, we consider the ansatz
{{formula:657a563a-e253-46f9-a1c3-118aced9f681}}
| r | 71c704959924f0215d9919acf4df2498 |
Among other similar works, in {{cite:d9714919819184357557e4c61579f6e7017a5bee}}, the authors study in the framework of Bethe-Salpeter equation, the production ratio of neutral to charged kaon pair in {{formula:68b3f127-7e86-4224-a66e-f6a643d03e46}} annihilation below the {{formula:936151ec-7517-4ef1-807f-ef290c1513f6}... | d | 1f3bd516c8398a748a1e452ba46a7430 |
Finally, the notation we employ is standard and follows
{{cite:868ac067eb1282dc40ac45cb13fe76f43d649e39}} and {{cite:4162ab3030554d4dbf08195ffeac45e597e9404f}}.
| i | d38cc464442fd503d10b2f1a773ed135 |
Assumption REF allows the policy to explore, but in the limit ({{formula:fa99e5d9-8524-42b5-8ca5-34d1b7e1e439}} ) this assumption requires the policy to choose greedy actions. Assumption REF is strong, however, {{cite:a0798d6924eb23f58242e3c98ef1075c5aaaaf35}} show that similar assumptions are required to prove conve... | r | c0e1bd87ceb4c79e4a80cf8ed7ec2c76 |
The main contribution of this work is that we create a connection between exploration methods and model-based reinforcement learning. We present a method of maximum-entropy exploration for model-based reinforcement learning agents and build a MaxEnt Dreamer that improves the performance to model-based Dreamer {{cite:bf... | i | f57a5ea92714795451dd48f54b9f118f |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.