text
stringlengths
54
548k
label
stringclasses
4 values
id_
stringlengths
32
32
The {{formula:16a89007-266b-4a5e-b300-07fe0d6eed6d}} gravity is a modified gravitational theory in which the standard Einstein-Hilbert action is replaced by an arbitrary function of the Ricci scalar {{cite:e4f805495d6472b76ba78d83a30903be8e8810d9}}, {{cite:674ad41aece911f6726f0c4ae79d65bae9ffb45d}}. These theories hav...
i
1002a42ddf5b6d294c01066f29940fbe
Beyond graph representations, Ogay and Kim {{cite:d95c2263d0baa4562272f0d56a3c74e853a9cd3d}} proposed to represent a motion planning algorithm as a random process that is controlled by a heuristic as a distribution of random variables. A machine learning method then learns to relate the obstacle distribution and the he...
m
d6775610a452dbfc9f87ff151d5aced6
In the Standard Model, in terms of CKM matrix elements, {{formula:aa3ee7dc-a760-4d71-bb3f-2450cc2b2b73}} The equations below are written assuming that there is only one decay amplitude, ignoring possible small contributions from other diagrams {{cite:6e8ac9e38e5222cf54d5b7ea2842f10b29177d53}}, . The decay time evoluti...
i
35ffe85683c332cdc60edd43f8dc5330
Our model also computes an artificial label for each pair of strong and weak augmented unlabeled samples (i.e. pseudo-labeling {{cite:75379598979df2a8f2b6a965678a4375d4c866d6}}, {{cite:099199450c4443a7a0e9d09f2c013dbb3c1d1917}}, {{cite:690a63dc7545be8c42c4467329ab66f1aa598264}}). This label can be obtained by computing...
m
4aed64aa83964e4cdabd206dfd496bce
To make progress in positive characteristic, where the landscape is distinctively more complex, it is best to adopt a more restrictive definition (see Remark REF for a comparison). Graded Lie algebras of maximal class {{formula:29c6ba54-ce90-4083-8520-faa047f704e2}} which are generated by {{formula:16817375-9702-4a6e...
i
281934e7f2577be9cc3ae8e7df710996
In the following, we should discuss the mass spectrum of vector bottomonia. As listed in PDG {{cite:63bd7775363ad9539b8c5982fd0b2830e45c2c5f}}, there were {{formula:88af7ad0-7820-492d-903f-dc723957ae79}} , {{formula:f9d520e4-d7de-4d89-87e6-e9b2270e5007}} , {{formula:cfeeda0f-7e8a-4361-85f6-3a432f4e9ede}} , {{formula:ef...
d
6aa91030d62b3cb5fb594d18518f1356
In the jet distance range from 0.2 mas to 1 mas the component position angles (PA) listed in Tab. REF are in agreement with {{cite:f62e0a909a685856e783a3bcaeeb2ef09f71565c}} within the errors. For example, the PA of component J6 is {{formula:f4ce0b44-676b-4f1c-a31a-121d88bad951}} in the model while here we find {{for...
d
02bd052a79770778699dd27388640bbe
where {{formula:0f5a777d-c16f-407b-b5bd-a3c0ca13960f}} is the location of the maximum of the RW potential (REF ), {{formula:a0353699-d4e0-4b52-a807-baa854f55ca4}} . {{formula:c7596771-c18f-4edf-b5d2-75df967956bc}} are the WKB correction terms and {{formula:cdba95c2-ecdb-40da-9c4f-85c1fad8f818}} is the order. The cor...
m
7faf7df23cb49fedfd82929373632f1a
We also simultaneously fit {{formula:2e93d972-4c3c-41f7-8413-ce1291556ad0}} to the nonprompt {{formula:d39595cb-82fc-4b80-8c3d-a7b1719e6082}} data from ATLAS {{cite:a9dd958c45079049e443ce2e6397d113b67d0c82}} and CMS {{cite:ed4cefb2b61e5f1e8bd88ce11fec07e57f1a2b8b}}. This is possibly problematic because the experiment...
r
b1e55230a2970a7a98c38fda559545d3
These considerations pose the problem of the degree to which EoS constraints are driven by the data, rather than by correlations between different densities imposed by the EoS model. Under that light, it is interesting to consider the effect of folding nuclear calculations into the inference of the EoS. Figure REF sho...
d
a77255941cd1f41efe3dde2465ccbb62
It is interesting to know how far an approach such as this can be taken. It is possible that different state spaces could lead to classical simulation algorithms for other quantum inputs. If we are interested in simulating quantum systems, then we do not directly care about simulating systems with non-physical cylindri...
d
16ddd65303b6dab5b2085bbbf04b93ec
INCV {{cite:a8156e9cf50e75201a6994484ebe25512c00cac5}} iteratively filter out noisy examples by using cross-validation.
m
d5c808c81926d10ad658fab26a01998c
Societal impacts. Image segmentation has several applications, including autonomous driving {{cite:14cd314dbda52f6ccb7fd9ef2fdae9424b086733}}, medical image analysis {{cite:fdecb747c4e728a5b874def3f61420cb5ea712c3}}, and video surveillance {{cite:1c89f9a7634c60dfbda53c56d45aa1b7d89d54a2}}. Although we have not focused ...
d
19d0e14a8d823dae3f38bffd6e0cd363
Magnetic resonance (MR) imaging is rapidly becoming the dominant technique for image-guided adaptive radiotherapy because it offers better soft tissue contrast than computed tomography (CT), while avoiding radiation exposure. However, due to the physical nature of the MR imaging procedure, the scanning time can take up...
i
d250a994346972640ff46f9e8ee7e8a9
AIB is compared with VIB {{cite:4695b3e6061a77e49dfb9727be1f576a24016f83}} and NIB {{cite:34f29ddabede43a78e13b49a6bd057c3a018b828}} on a synthetic dataset {{cite:b443ff04fc05dbc315f54235be06a89beca616b0}} and two common classification datasets MNIST {{cite:aaafec02e8e9b0a9bdf082a9d6b257ad8283acb4}} and FashionMNIST {{...
r
37c6bc9ecfa4d0e9fd18a57ddfc18264
The models are trained with Adam optimizer {{cite:cfccf969bbe38ad0b861d18b35cf4b02af582463}} and teacher forcing. We use linear warm-up to increase the learning rate from 0 to {{formula:a1cb72ca-9993-4584-b7b9-11d77ce14ac2}} in the first 200 steps, followed by a 200,000-step cosine decay down to {{formula:d405560e-523...
m
6a1b2d0ad4bde360a9cf51670cb1ae58
In Table REF , we compare the performance of our best method after distillation with transfer learning, semi-supervised learning {{cite:ec36c2034efaad60d983fe2dd2462a295f2da092}} and DatasetGAN baselines. The transfer learning baseline was initialized with pre-trained weights on semantic segmentation of MS-COCO {{cite...
m
80a780bcda30a59c637e9e6998d4ac63
We have only considered gauged supergravity with {{formula:d0abbb5a-9d97-418c-870e-44cb5870f5b8}} gauge group electrically embedded in the global {{formula:da78af20-a6b1-4e33-8318-5b549e3f8852}} symmetry. It would be interesting to study magnetic and dyonic gaugings involving also magnetic gauge fields. In particular...
d
246603f220f8133b66db338f0ded93c2
Second, the proposed sequences constitute a partial unitary matrix with a column mask through arbitrary row selection, whereas the ZC sequences of prime length form a deterministic matrix with low coherence. While the coherence-based recovery guarantee of the deterministic matrix is limited by its theoretical bottlenec...
d
24628be702363293cbc5acadb16e6589
This proof can be extended to the case of the arbitrary {{formula:7514682e-1b7d-4cf2-b742-1ee61a72cf3d}} , too. Then, the most appropriate way is to show that there is a correct limit of {{formula:59e9d87d-37c1-487f-bc5b-9199c606e53f}} defined via (REF ). Application of the following known limit relation between the L...
d
5b6ea17971d3f1fdc022979a2e9cd84e
In some scenarios, an intelligent attacker may attempt to launch an adversarial attacks to fool forensic algorithms {{cite:a0ac543428adaac59158e6ceee3808b023a5f82a}}, {{cite:4329ea9d72b5c72f3e7007a6992fa4b91430f328}}, {{cite:24e41eecc791c9db927e478dd3b853d7d846ef4a}}, {{cite:c8753d556b7a2565cb1eb54cb36091ad942e856c}}, ...
i
de04a9e6ce685d8fb85f988f781a06c5
For lane lines detection, the method was tested on KITTI {{cite:03d82607ad779809ed9cc0a731bd01131b4a909b}} and Cityscapes {{cite:02761ff642722c4db060a91863e59b32ae0395ae}}. For general traffic lines detection, The proposed method was tested on the Berkeley deep drive (BDD 100k) {{cite:d670a925c6fd4be961005ebce34f7811cf...
r
a1434d243d2b6f85b5759b4338e70f47
We compare our method with an extensive list of recent works on efficient video recognition: AR-Net {{cite:478ea0bf01eb8f6921cdf6865d8f29e117f80abe}}, AdaFrame {{cite:a7c6777d09ba031ad40524219dfb674d957024f2}}, LiteEval {{cite:f16eed5d5217a5f20273b481e0de5484a4947d80}}, SCSampler {{cite:8cf426dee003122bc42f447db1f4e62e...
r
17324edf8bb2b954c3c2a29eb7f06b42
We have seen how PermaKey, by focusing on local predictability, is able to reliably discover salient object keypoints while being more robust to certain distractors compared to Transporter {{cite:eebbf862c0880bd4262809e661cffdae7fe1621e}}. However, it should be noted that PermaKey can only account for a “bottom-up” not...
d
6dfa51e0da10a6401315552c892bc994
In this section, we aim to improve the data efficiency of existing detection transformers, while making minimum modifications to their original designs. Firstly, we provide a brief revisiting of the existing detection transformers. Subsequently, based on the experiments and analysis in the previous section, we make min...
m
3a913d9095b7f9d4128d5cf2bd59773a
Because of its random-walk nature, the local dynamics of Gibbs sampling suffers long auto-correlation times when equally likely states are separated by an extensive number of variables flips. As a consequence of long mixing times between such states, statistics become heavily biased. In the initial phase of DBM trainin...
d
df3671988652772c889092be572ae382
The P-N junction is one of the fundamental building blocks for modern electronics. With recent discoveries of atomically thin materials, layer-by-layer stacking (vertically stacked) or lateral interfacing (in-plane interconnected) heterojunction has been reported, {{cite:a8dbc7ba31a7c6bb775878d9446f6f5b3a19483e}}, {{ci...
r
c90c6ae8bab4815decbc73cbf4ba2ec4
The likelihood analysis for each data set and cosmological model is done using the MCMC method as implemented in the MontePython code {{cite:72e1acf8544bfa6a16753393047715ddb3df0b6d}}. Convergence of the MCMC chains for each parameter is determined with the Gelman-Rubin criterion {{formula:6a394905-c254-4038-8a1f-1067c...
m
63c79c79e237d22ef40394e1f8eb720c
Most of the previous studies on the design of phase shifts in the RIS focus on the sub-6 GHz or narrow band systems {{cite:e94943040286388556c36b5b44503914e615cc69}}, {{cite:3c283425dec6003415243918e67d3e2f292dc068}}, {{cite:c9c7b4c460a2d50d965152daec9888dc78a16988}}, {{cite:550a15baa071df34beffb8bf3aa50a7fab9414a4}}. ...
i
aaaad2f4aefa1497d13b3d4be004fb88
In the standard LBM for fluid flows, the evolution equation reads {{cite:48eab936cdd4a381ac42ad70f351318939c9ee2f}} {{formula:de593b01-c83a-4a95-aedd-a462ae3c92dc}}
m
1832c221d72687ae5c1598cabb574bd5
with {{formula:3b0d838f-35d7-48ad-936d-5a0d171985a6}} the weight function, and {{formula:c0ecd94e-8408-4668-968f-513a9b95b495}} the quadrature weights. The error is given by {{formula:6985d13a-7f5e-4830-8d03-5abad183951f}} , for {{formula:514054cf-758e-41b7-a112-88d655d0519a}} , and the pair {{formula:469ad3b0-4c89-4...
m
7bac7227ce709d69e9a63a94ba3a1e5d
Recent studies on graph neural networks (GNN) bring a new structure for model learning. By viewing particles of the object as the graph vertices, the dynamics is modeled as the interaction between the vertices pairs {{cite:1a7281d3917ad945d83acfbdc2797c560043fc38}}. The future object state can be predicted through a se...
i
1167c5b6d1313e5880a923e217109bdb
Filtering methods update their belief based on the past state and current observations of visual and inertial modalities {{cite:836accb4849c36eeeedacccf51442cad5b34fed0}}, {{cite:a2c30dba3bc254dd3d4336f72ea4e29a3d0edb8a}}, {{cite:33d1a551b4a923667b28c96c6d1c09904972a500}}, {{cite:fc94172688b9c481362c65d3119d262b6833b2b...
d
01b68d57eebb9691df3cff61362bc468
[leftmargin=*] Additive white noise perturbations are constructed as {{formula:6fdbbb54-7d3b-4d4d-ac87-5e706f5a6159}} , where the additive noise is drawn from a Gaussian distribution {{formula:3e30bd1d-4df7-4850-ba0b-ced9603db692}} . This perturbation strategy emulates measurement errors that can result from data acqui...
r
ac10f02e7cbf4b850524bbcf93186230
In this work, we employ the Wide Activation Super-Resolution (WDSR) model {{cite:d8a03188ed7a777a09f78b7a49531a44895230af}} as a building block to investigate architectures for joint denoising and super-resolution.
m
b4d6945a5b84aa17fea69a1c89ad90a9
Recent years have witnessed rapid development in self-supervised learning and it has achieved success in both computer vision {{cite:3b0611af13e6fde2da154fd0534ad38e2481e9cb}}, {{cite:08511c5fdde133a596f7f4eccbeb14034ff88162}}, {{cite:ebe64fbf83cf7ec24b07152d8a02a3f154d0a231}}, {{cite:1bde711a6504c79dee3169acdf894710a6...
i
d74a1623af3731769d833c8bed7a870f
In this subsection, we perform a variety of experiments to validate the effectiveness of SRKOCL in continual learning scenario. In the first set of experiments, we compare the performance of our SRKOCL algorithm to the state-of-the-art approaches on different benchmark datasets in continual learning literatures via thr...
r
660e4709341aab71dafd84db54e4f163
As a good theory should explain as many observations as possible with the fewest possible assumptions, it is logical that SAMs should try and extend the lesson from cool-core clusters to lower masses. In this case, however, Occam's razor does not cut it. {{cite:28cb30d22cd4296e4b9c715032a6b21560fbc4a5}} and we have sho...
d
94abf57ed6282f043d0c2ed84ab730f6
Since the birth of theory of stability, which was first proposed by Ulam {{cite:e1301c6692cf9af8d2ae53eee0d5555c1c7fde4f}} in the form of a question and after the first answer due to Hyers {{cite:562b0411792ffcece148e2afc62b6bfc4f345172}}, many results have been obtained for many functional equations in different space...
i
12119aa176f5398f369be199f9ecca21
One of the reasons for using nonlocal scoring rules is to address particular problems where a local scoring rule is not considered “suitable". For example, Ignorance is infinity if the forecast assigns vanishing probability to an event that obtains. {{cite:cf84341b06dd2de4c9c9c1bcf0cf732c2a4a1388}} emphasizes that the ...
d
6a94360f99bd23f839678d3cb23f82e3
In this paper, extending the construction of {{cite:21edeacff241113caed8b97e0a61b8b335add983}}, we gave a formulation of the classical double copy with a generic, curved background spacetime. Apart from obtaining solutions of Maxwell's theory defined on curved backgrounds, our formulation makes the effect of the backgr...
d
9d2c3cfdbc198db984f9c885dae45af6
From this holographic argument one may wonder if the two boundary theories: (i) a CFT coupled to a gravity and (ii) a BCFT, are equivalent as depicted in Figure REF . The purpose of this paper is to argue that this is indeed the case by presenting evidences of the equivalence by focusing on two dimensional (2d) CFTs {{...
i
361f6bde38e5412beb2e4e22e839f9d8
In Table REF and REF , we present evaluation results for zero-shot adaptation performance on unseen speakers. In short, Grad-StyleSpeech outperforms other baselines. Notably, our model outperforms the modified version of Grad-TTS {{cite:2a6acf2fc9a796fd3feed94dca7477d9b06f61c5}}, showing that such any-speaker adaption...
r
f79053a734561b9dddf66524039d922e
Machine learning methods primarily address prediction or classification problems, and have been included in statistical textbooks {{cite:22bd60cc65feeae217703160015a1f5d41e2fa62}}, {{cite:15747c19ded59073cb2f00393c6cef5175c2c27c}}, {{cite:573dc3f389ced43d874a33a0b1ab8af7f6d0bf8b}}. On a high level, there are two broad ...
m
692842789518ab73b929fd2a6cd64aee
In this paper, we compared several readily-available methods for assessing HTE in CRTs using a neutral simulation study design and then used a completed CRT where we imposed selected missing data patterns to compare their performance using real data. The key findings of our work are as follows. First, MMI and B-MMI had...
d
27f41a341c268f171dab296b868d46e4
Other FL Algorithms. Many FL algorithms have been proposed to tackle the limitations of FedAvg. We plan to extend FedTuning to the following scenarios. (1) Participant selection. Compared to the random selection of participants, guided participant selection that considers clients' data utility and device utility can im...
d
4a38d81d7707881fcba0afcf0da8bb9b
Learning strong and discriminative representations is important for diverse applications such as face analysis, medical imaging, and several other computer vision and natural language processing (NLP) tasks. While considerable progress has been made using deep neural networks, learning a representation often requires a...
i
6f35af0dc6c30ecf42a2b05e1df757c2
In the image classification task, DCNNs learn to generate the predicted distribution of image class by extracting the features of an input image{{cite:d567a2ea634ed296e940481729145a0826384c25}}. The learning objective is to minimize the difference between the class distribution predicted by DCNNs and true data-generati...
m
66267b7556f08a8bb15c12ff45b9c1c0
Training artificial intelligence using curriculum approaches, from easy to hard, can lead to improved results in a wide range of tasks {{cite:eca19f707ffbfc1aa405fd6c9f9369cdad18f0cc}}, {{cite:52771194d5fe3dd6832837ceb415af31c079e7f1}}, {{cite:0fea3d71ba52434a80cbbeaf1d01122a03a3053c}}, {{cite:61b0f6dc4bd2bcb9247e2a35e...
m
63a037014ef3e009cbd98c5181c3bb3d
Over the last two decades, quantum physics has experienced its second revolution giving rise to new quantum technologies. Thanks to quantum control, matter can be manipulated at the single particle level by exploiting quantum resources such as entanglement, superposition or squeezing of states in various platform regis...
i
43846659419038935794b61d7667b49e
Moreover, quantum algorithms can be utilized for cryptography, search and optimization, simulation of quantum systems, and solving large systems of linear equations {{cite:4724f669e02451a885721f96cc1dd791ec3de624}}, {{cite:772e07cf5930e4bad416554138489202eae44503}}, {{cite:570abdb14d94abd3cec15b0f7520926cb7455f98}}, {{...
i
454fe6ac231fa44ffd343a8eb56b44a0
The core of DCM approach is that the test statistic {{formula:3c9028f5-73fe-469b-862c-cffeadf83b60}} in Eqs. REF and REF refers indirectly to the reduced Chi-square {{cite:7c38df2f63919c36ab459ed386557d9ed2c5254d}}, {{cite:68b91dd502307888c9dd385a2131f18d22e2f2c8}}. Our DCM computer code dcm.py minimizes {{formula...
m
e6c600028b6e7fc88a129c2d941624fe
In a hard freeze forecasting context, a proportional hazard model can be applied to build a joint model for all study locations using explanatory variables like longitude, latitude and elevation. From the parametric relationship, predictions for any location can be derived. If we want to take the model a step further, ...
d
cbdcd07310f49582c4dd649a8418064a
To test the generalization capability of the proposed approach, we perform training on Dataset 1 and test on Dataset 3. The F1-score drops down dramatically to 33.05%. In order to understand this finding, we visualize each dataset using PCA (Figure REF ). It depicts that, although Dataset 1 is mostly linearly separable...
d
489b7c0af72ef6a42ff5616a43d1ca1e
2.3 Complete intersection and Gorenstein dimensions. The notion of Gorenstein dimension was initially introduced by Auslander {{cite:71efe4558951e80c88f109259d81ade7376f2ed2}} and subsequently developed by Auslander and Bridger in {{cite:57e8cb9db08548f16ba68d11f9731fca4c0e6fe9}}.
r
3b8cfc75651e426eb8ba08aea1bbc65b
Limitations: Despite the promising performance and an applicable trade-off nature, the time cost at reverse diffusion process could be expensive due to multiple steps (100 steps in our experiments). When evaluated with 512 trajectories on the ZARA1 dataset, Trajectron++ needs {{formula:94d1e046-fd31-49f7-8a0f-cbc8e5db2...
d
4709a77886d7a2219b4c00e1ae13930c
Contrastive Loss {{cite:9dc56f1435a2dd6f01510ddb25e85b823ebf0706}}. It construct positive and negative pairs to learn joint embedding. A set {{formula:f9b99761-2b9b-4293-b757-e2b8e2fd1aeb}} is formulated comprising of training pairs {{formula:e31f05b3-fc62-4bcd-a026-312eb041ff9b}} using d-dimensional face ({{formula:...
m
b12dc0035dfa201381edc72d85eb5c58
At about 50 years ago, vacuum pair production has been investigated in many original works {{cite:ebf0b9e327a7fc197586d9f8e7be9b3e852092f4}}, {{cite:bcb59392b2c5e3faa8e9d454763c63426473d1f1}}, {{cite:03763685f8b5f46024f39bdf035557b52dafa8b2}}, {{cite:856c99978107c65d69a0c045b61caf78b7774344}}, {{cite:88976ec6b2786c3abf...
i
f7ee3a8640ee61959a5df2a38623b2c0
The computation and evaluation of magnetic trap properties are based on current density. The technique used in this paper is Galerkin method {{cite:d60b5f145c50163963aa4b345eefefed7f2ee4ce}} or MoM {{cite:332496b4dc1c9b30e1689dd6f1d52a665ea925cb}}, {{cite:cc94ad978731c099b9fa1accd1053b3b30860ca9}}, see Appendix . This ...
r
10272ff6dd6db04e7bd23efb5b18eefb
A conceptual feature we wish to convey through our work is that the one-loop method used in our of calculation of critical exponents in § is possibly more convenient than using Feynman diagrammatics to do the same, as performed for {{formula:d5edebd9-34df-4abc-ba4d-bda2f004382a}} in {{cite:83644d2f64ffa4c0617d1c220efa...
d
ec9d7058332035a63a72e0c44c212737
Intriguingly, the recently published works {{cite:1acd7fddbc9f2ad5e612a184fb8894afe757d593}}, {{cite:121426629c23b5f49e03efc2839673df5fcfe768}} have revealed the physically important fact that charged black-hole spacetimes with regular event horizons can support massless scalar field configurations which are non-minima...
d
d716dc6672ea1df05b0acb82832f117b
However, a systematic method to construct a generalized hedgehog ansatz which is not spherically symmetric but keep all the other nice properties of the usual hedgehog ansatz alive has been developed in {{cite:d9cfb0d5073a2ad70623c4842bce65f659ac7141}}, {{cite:e57706b00cfef55795de3a6d048872982ddea3f3}}, {{cite:6c422e71...
i
957ad647dc21d30d3e0a899206a979dc
The first two initial centroids certainly are far away from each other. We can find the two farthest samples by calculating distance from all samples to all samples. Unfortunately, this is a very time consuming process. However, we can reduce this computation if we consider only the outer samples of the dataset because...
m
30ac076825310ef43c5bcc93ac0921c6
Further, we experimented with combining language-independent and language-agnostic models. In the context of this paper, we incorporated a simplistic combination - if either of the combined models predicts a conversational turning point we consider this as a positive signal. Analysing the results, we observe that incor...
r
dbf735ab439d84cddb29afe6e787037e
Related works. Several works have focused on extensions of Atl{{formula:56a680b6-0362-41f6-a012-81bdb3f8f343}} to incorporate more powerful strategic constructs. Among them, we recall Alternating-Time {{formula:a9a55288-8af3-4083-82bc-8eb4494f8e01}} Calculus (A{{formula:b0b3da45-0d57-4bda-bd0d-f1f97062514c}} Calculus, ...
i
e7f29942bc908c49cd0f7e3e250a636f
As indicated, we must still remain open to the possibility that the {{formula:cd5aee35-8abf-4ce4-aa1d-dd312e5c607b}} and/or {{formula:6a2bb14c-3355-416d-b53c-49d0d4b4df58}} measurements are affected by some kind of (unknown) systematic errors, although some of these possibilities may be on the way of being ruled out ...
d
14f8e91fc14e574d85678f06124a8889
The reconstructed image is the minimizer {{formula:c50b4718-03c8-4406-8b96-eb5e7405a788}} of the variational model (REF ) with this data-fitting term, where {{formula:549319bf-551b-4276-972b-f502be64abdc}} is the observed image. There are plenty of approaches for denoising problems involving Poisson noise. For instan...
i
19bfa314095a2ce1584a4804a661c8f5
Though GNNs have achieved great success, they are usually data-hungry, which requires a big amount of labeled data (i.e., molecules whose properties are known) for training {{cite:c4527fa80bf893249c35a1d99ae06fccd5d97cde}}. However, the labeled molecules usually take an extreme small portion in the whole chemical space...
i
4026008ad69c0966ca2dfe9ed4bf0e10
Actually a natural configuration of the B-LSSM includes another relatively light {{formula:dee8f00c-9975-43e7-ac3e-4451bfdde451}} -even Higgs {{formula:a7ec38e2-d662-44d1-9080-1206b3b1ba6f}} , with mass {{formula:dcc95eb3-6db0-4550-a629-66644b1ca7b7}} besides the lightest Higgs state with mass around {{formula:9408770...
r
6c09776449695dd30ad62513c52a8aaf
Another practical advantage of our solution is that allows for efficient experimentation on reward shaping. During the development of an agent, the designer can define a shaped reward such that the goals in the environment are more easily satisfied. However, reward shaping, is a trial-and-error iterative process {{cite...
d
ea86dc44d055dd5c9321477a2a3d1a7c
It may be noted that, as in {{cite:6c6cf1ceb8ef3b1dd04714f420a5701816fd8a4c}}, we first represent collision as a cascaded process in which the effect of collision on lower order central moments successively influence those at higher orders in a cascaded manner. That is, in general, {{formula:d974a8a7-8cc1-482f-b8f5-9dc...
m
aa4932a35c4cbe475f8e7731638c75d9
HODMD is an extension of the well known technique, in the field of fluid dynamics, dynamic mode decomposition (DMD) {{cite:c0515f90f822d504e5a82f1eb39e0f9100e78286}}, generally used for the analysis of complex data modeling non-linear dynamical systems, solving different applications (e.g, {{cite:3cda4fe692854cfd454c37...
m
24c7d2af1280437fa708be93dc83783e
In this section, we show the result of proposed OOD detector with subset scanning and ODIN as detailed in Section . We first compare our result of OOD detection to Softmax Score {{cite:57fdd4200fe5789b74d42d7e531fddb94e603cab}} and ODIN {{cite:1137675615727e47ff17718bc18d9e4c9330e533}} in Tables REF for OOD samples wi...
r
442cb4c2f74dc771d9b549719f6b6579
Inducing and imposing hierarchical tree-like inductive biases in sequential models has garnered increasingly significant attention {{cite:a3cd5be2ef459d6cac2f6a10e344db1090b67e10}}, {{cite:a8f34dccaf67d9890092ebf22026d6c452aa4a04}}, {{cite:ecc887db587e9bc2f1ae7dbdfa16e7529ac3d799}}, {{cite:fc004ee2188b954af8ee6afb8fc63...
i
34ed0cc2e812538d71690960d70eb835
While the results discussed in this paper may have deepened our understanding of quantum computers and their limits, they have not explicitly resulted in any practical applications in the same way that studying Boxworld type correlations led to the development of device-independent cryptography {{cite:9f3e56f8555a57fce...
d
1b69c09b0dbcb70d5bfcf8634658b978
The second benchmarking study is then performed on a large cardinality dataset describing an intrusion detection task. This dataset is the union of the normal and botnet data from the CTU-13 dataset {{cite:2c6649bbb7d6da3d5e0e4d8ec4e9a75bf3924521}}, resulting in hundreds of thousands of data records (Table REF ). In th...
m
39b8d11a464bc620d250be9ce80a49a2
We concentrate on the critical {{formula:dc634e7b-bc0a-429f-9dd4-a8b79e4ef59f}} model, arguably one of the most well-understood CFTs in {{formula:49bad3b9-0554-49a7-8edd-0437b9a2b487}} , which also has extensive experimental applications {{cite:9e9b887abdb63225d5b12e313bdfbf0b8fdc94ff}}. In particular, we turn on a ba...
i
c6fb268a78cd0b1d800363b9cc2778ab
Although considerable advantages of ISAC have been predicted, deep integration of sensing and communications still requires further investigation. SLAM can provide locations of user equipment (UE) and radio features in the propagation environment. These results help design sensing-aided communication strategies. Theref...
i
a17550788a20c2b5bc5299a4ae5ace87
AGILE contributed in a significant way to the multifrequency follow-up observations of the exceptional event GW170817 (MMA17). Despite the Earth occultation of the LR at {{formula:6c52b8e2-6967-4ff7-a258-22e00c477259}} , AGILE obtained very relevant X-ray and gamma-ray constraints on GW170817. As reported in {{cite:175...
d
7150bcf18836035e773ba93d162f645e
The local monotonicity of set-valued mappings is naturally defined as follows; see, e.g., {{cite:b647e02a3e5f8041d11b00cd6684806c55c05392}}.
d
206c08e468dad9a7ed114c9262f76ee6
where {{formula:4fc82e1b-90a1-4630-95ac-27f28eb7ff35}} denotes the Riemann zeta function and {{formula:48c98d53-9d22-4c04-b9bb-6287fde2bf90}} . This article concerns the behaviour of (REF ) in the case {{formula:fc74f665-93fb-4b57-bf16-5e90f7ae5e9c}} . Hardy and Littlewood initiated the study of the moments (REF ). Th...
i
c80053cc0d83a8e5cc122640b0aa2fd9
Ablation study. We perform an ablation study to understand the impact of different components of PONI. There are three key components that contribute to our performance: the object potential function ({{formula:8f80bcff-4fd5-4792-a8ef-b3b9849fd329}} ), the area potential function ({{formula:ac88f7de-196f-481b-b611-a34e...
r
a18adfdc4b5ecb7fa61e4af94a357c12
We recall that if {{formula:9a4fb78c-5a6d-46dc-8d6f-53e310bbdd82}} is a very smooth point, then the unique functional {{formula:b5afacd9-9f01-44dc-b060-e4f45269a7c9}} has the property that in {{formula:c4ff404c-859a-4a25-9784-84a9056b2547}} , it is also the unique norm preserving extension of {{formula:a75fcf16-a15d-...
r
bc02591681c621684cbf2afe21bae925
Recent experiments on gate control of the supercurrent in metallic Josephson junctions {{cite:392eb346f7c2c13bab2f00807c757ea866363ab4}}, {{cite:ab1f7c90715208e43251a371c7bf15710dcde651}}, {{cite:341557d8277482eeb592fc71379d9035bdabe551}}, {{cite:502fcfc5785a90045e90de7954f78ea0226fb22b}}, {{cite:5b1b1bfb7b256b164b0b10...
i
b326cfad9f602c7a6548eafec5581e9f
If {{formula:650fe78c-db97-42d4-9f88-ced02a917bb7}} is twice continuously differentiable in the classical sense, then {{formula:35cbf88a-fe2b-431d-bd6a-52ebe38692d6}} has gradient {{formula:9dbf7ceb-2353-44b2-9957-0ba5f5c005b9}} and Hessian {{formula:d4f25b93-fd41-4df2-a13c-1b125b4ced6c}} . We recall that if {{formu...
i
5942f85468c64e1785fd1b35c9ef61e5
Finally, we compare the WOT-SRSH approach with many-body perturbation theory in the GW approximation, where the self-energy operator is approximated by G, the single-particle Green’s function, and W, the screened Coulomb interaction {{cite:1c00a5c5297ee2afc24e32311f8083c40c624ea2}}, {{cite:519f39cb538afb732d7d59873a401...
r
2608de612f0001f66863d3f9097a75ac
In the context of the NLS, Gibbs measures (REF )–(REF ) were relevant to study a substitute for a conservation law at low regularity. Namely, one can show that they are invariant under the flow and that they are supported on Sobolev spaces of low regularity. Consequently, it is possible to construct global solutions fo...
r
248631d13e6b998eb730706b60d15497
On the other hand, multi-agent reinforcement learning (MARL) has also been explored for autonomous driving tasks {{cite:4b559fbcb6921e2f383011a2006ab92471eb4dff}}, {{cite:48c47eff0766265d0b110a3b525d411d674cfa12}}, {{cite:7d444ae23a17e6a1c819f0fa78478daa2f2640d3}}, {{cite:13b7172ede27e20eb3489c984718faca9a8636fe}}. In ...
m
9c287886a4b6ce31741cbfed3ee421d9
BayLIME is a Bayesian modification of LIME that provides a principled mechanism to combine useful knowledge (e.g., from other diverse XAI methods, embedded human knowledge in the training of the AI/ML model under explanation or simply previous explanations of similar instances), which is a clear trend in AI {{cite:dffd...
d
b18bb683af74525db7e710b82faeaf18
Each agent in each scenario has a different mission to complete: driving from a specific start to a specific goal. Traffic consists of the agents in training as well as the background traffic provided by SUMO {{cite:63dd32d9bb884af8fc2467ecc265b96987576d1b}}. The chosen baselines include two independent learning algori...
r
146f549251fcd8fddd39b6926dfb4111
Utilizing humanoid characters in a physics simulator to optimize motions is a promising solution because the physics simulator can guarantee the physical plausibility of the generated motions. Prior works {{cite:f46aaf7f3108242ecbf19b8e8da7b33821687af8}}, {{cite:8e7c5ad265c2ca8ca502380264e751d6fd04b32f}}, {{cite:ee39c7...
i
1ea07c5b6f82dc85fded36ccef5d7992
Once the network is formed, we change the interaction potential, making the bonds permanent and thus fixing the topology of the network. Since we are interested in understanding the roles that topology and chain size distribution of a polymer network play in determining its elasticity, we consider interactions only bet...
m
83cf3ee55a45a86d842f1af8455309e1
As shown in Figure REF , we develop a new deep network architecture for automatic portrait video matting. It recurrently estimates the alpha maps and foreground images. Our network can be distilled into four parts: (1) feature extraction, (2) optical flow estimation, (3) context-motion updating operator, and (4) upsamp...
m
2e6fdf2f576fc74da640714395856386
We have chosen to use some derivative-free optimization methods because NCRS needs some adjustments for using deep reinforcement learning because of the variable number of inputs and outputs {{cite:c10d86e75bb35a890a888a86ef0db95e4e58e51a}}. They are the covariance matrix adaptation evolution strategy (CMA-ES) {{cite:9...
m
9e0b774ac574e0cb7e440b5b6e98e28b
Duplicate Removal of Oriented Boxes. Although the state-of-the-art NMS algorithms achieve promising performances in horizontal object detection, their performances may greatly drop in the task of multi-oriented detection. To remove duplicates in multi-oriented object detection, RRPN {{cite:6a6bf3570f39f386dcb6446132bf5...
m
405c2f9e0c891abc25b3d5c7570ff3d2
The restriction that the weight be at least 2 means that weight 1 forms are missed in this approach.Weight 1 forms are also missed in the modular symbols approach outlined in {{cite:a3ac3280591e1eedb349e0f16bcf545f5765f97a}} This is a meaningful issue as, since the proof of Serre's modularity conjecture in {{cite:df23e...
r
ddadfc7fc0e8659328abb1bd49190451
The response of microstructures for use in multiscale simulations, structure-property investigations, and uncertainty quantification can be accurately modeled with graphs. The proposed formulation used the topology of the data discretization directly instead of a segmentation or clustering of the image data. This aspec...
d
d1d1b5fc3140188dc4f4c3baf380ce99
If {{formula:673038a1-326b-4bfd-9ba1-7746dcc33ee7}} is Lipschitz continuous (in particular if {{formula:11f73d17-b6eb-40db-a1df-2aec43686254}} ), then our Assumptions hold true. Moreover, inequality (REF ) recovers {{cite:8532ae934d4306af37b219c34726ca4a586ac959}} but with the duality gap instead of the KL divergence....
r
fd9fd57d8aa84a228b45b595059435b8
The muon anomalous magnetic moment {{formula:83cd38ab-7e96-4b05-82b0-83c8cbd5180d}} has become a leading candidate quantity with which to test the Standard Model. The latest experimental result from Fermilab this past April {{cite:52b9ee2b366ae9f355e4609ce8962c7e12220a86}}, when combined with the previous result from ...
i
816d7a03a7a3ba53a8cbdf8869d38814
[itemsep= -2 pt,topsep = -1 pt] Sum: this variant combines the features of source nodes and its neighboring nodes by sum operation, which is widely used in existing GNN works, such as {{cite:8b52b894093124cf43126e114ca84efa3699dd80}}. Product: this variant updates each node by computing the element-wise multiplication...
r
80c7235b134d925b95c7707efb976366