text
stringlengths
54
548k
label
stringclasses
4 values
id_
stringlengths
32
32
It has been widely agreed upon the fact that Nash's concept of equilibrium reflects the possibility of challenging the choices of the unilateral acts of the players involved in noncooperative games. Having the aim of gaining the most they can do, the players are in the situation of making choices in a process described...
i
113b6a6cf9d4714457e3b3717d5c6644
For the US airport network however, the geographic results are poor. These poor results may be unexpected at first, but they have a simple explanation in that the geometry of the airport network is not really Euclidean, as the geometry of the nearly planar road network, but hyperbolic. Indeed, efficient paths in the ai...
r
02d26b5dbce0d3111b63cfab1944e77c
Additionally, in our experiments, we also select two representatives – Input {{formula:5e6add4c-d339-4150-9ceb-e07fd40bcbab}} Gradient (InputGrad) {{cite:b6c2ac5dedd36863ff3775f7f6811af43962623c}}, {{cite:e528768cffcb0b64344a99e2bf701ac4e96cc6c0}} and Integrated Gradients (IG) {{cite:e11bcd1c435c7eb2abc467e3ccbd89dae2...
m
78b189e282fda37a49c939300d2fbe73
In order to study the patterns of the 1st type rogue waves of the three-component NLS rogue waves under the condition {{formula:332d0d8f-8256-4648-98d6-99bf3de0c64a}} in the inner region with {{formula:067123f3-2e5a-4a57-84d4-1c2bfdd78af8}} , we first use similar method as that in {{cite:5b91e1c30b67d0a3917f346bd8729b...
r
33c454de15f25faff05115c8ac3f8123
Hence, the relationship between predictive coding and backpropagation identified in previous work relies critically on the fixed prediction assumption. Formal derivations of predictive coding in terms of approximate variational inference {{cite:adb45c296e2d9434d994fbb36a900c3b4b31fcb9}} does not produce the fixed predi...
d
a1004854f1dbe9848b723840f52d69c2
With (REF ) in mind, we estimate the local Lipschitz constants of the integrand as in (REF ). The numerical estimation of the Lipschitz constants of NNs has attracted attention, as they form a way of of estimating the generalizability of a neural network, and have been used in the training process as a way to encourage...
m
aecf66811d545ecb677049588a9d8ef4
Query modification, especially query expansion in document retrieval step has been shown to give rise to significant improvements in QA performance. The GAR {{cite:420a3e5deb213b59e530bce96ef93f0e3994bea5}} system uses a sequence to sequence generative transformer model, BART {{cite:b7d8be5a626b651d496b1c7dd092a6e2b032...
m
09ab8e6b744180f0054d5b7b5227c217
since {{formula:65bdd933-d55c-4294-b85f-d5b649f9555c}} is assumed to be positive. This implies that {{formula:09105b10-1352-450c-99a1-d813dbd89c1c}} is a self-adjoint(see Corollary 7.3 of {{cite:054e820d90a5974a98007ac951b4c42cfd9185c5}}) compact operator on the complex Hilbert Space {{formula:3ad311a8-0fbe-42a0-baae...
m
6456173ff13b975e1ae2ecf75fff7f4f
To study the dependence of synchronizability on the network structure with higher-order interactions, we focus on the Kuramoto type of coupling function for the coupled oscillator. Then, the master stability equation, Eq. (REF ), belongs to the case of Eq. (15) in {{cite:ad10bbb475f8f1b59bbfbcb887f086645bafa405}}. As n...
r
89542783d8715732f5a900d98680d940
Our open-set and closed-set results are presented in Table REF . We compare the proposed AvaTr V1 and V2 with two state-of-the-art methods, VoiceFilter {{cite:8023773aecdeb3332963094724884c8c546dd86e}} and SoundFilter {{cite:9660e31fe6b6bcf699ddba4761d9cb8dce359e3f}}. Since neither VoiceFilter nor SoundFilter released ...
r
b07c9285b81bdb077b852fca1b81936f
In Section , we verify these ideas empirically on fully-connected networks for MNIST {{cite:c3fab1c127c9ca6252227375a26465ad7a17740b}}, Fashion-MNIST {{cite:4035135165ab9206f18860687bffd7e3b3601f2b}} and on VGG-16 {{cite:3f5903d6d92c2adc30e6658e6cc4134cfb6d2f19}} for CIFAR-10, CIFAR-100 {{cite:8e76c0a9c4450af1d41aae78a...
r
0a6dd6ece09c0e2e188c7f34aed99bd5
GCN {{cite:15fa17e82970154e2b93ade77a1b2d4d87a22887}}: This is the widely-used spectral GCN model. Since it is not designed for multi-relational graphs, we only pick one type of relation for each graph in the pre-training. R-GCN {{cite:254a7d2c5b999cf8f5751d79a880bffe9b3cd961}}: Relational GCN enhances the GCN by emp...
m
ae17a1e1a2d626d8b949e25111de1ef9
Let {{formula:75cb9992-9a84-4d35-b167-c070da1197fd}} , where, {{formula:77229e71-ca8e-442f-8218-f2d306c73200}} ={{formula:f52ae192-00db-4e55-b2d2-d4ba27cc79b2}} is a random vector of hidden components {{formula:38064f4f-6321-40b7-9f9e-5dd5e144320a}} 's, ({{formula:8c7149ac-21a6-4ba1-b496-8d715c95b583}} = 1, 2, 3, ......
m
9c35e7b9f16f7b2ee633620277c7ba0d
This research was financially supported by JSPS KAKENHI Grant Number JP19K14766. We would like to thank Editage (www.editage.com) for English language editing. This work made extensive use of the following tools, NumPy {{cite:6545e7ddb58a3451ec438c80cb45803fd3397fa5}}, Matplotlib {{cite:4b9a76d4cd56b186668482b77feed508...
d
b8cfa3a8f2230a80b7f81a3c306e5af3
where {{formula:d7cb9210-10ed-482e-aef1-c905d63ac566}} is a probability measure in {{formula:d05eae2c-2a9f-4d02-b4ba-38299098a8cd}} , {{formula:751c6503-e3ff-4d1f-a94a-33ee5cb77d8a}} , {{formula:9e8a969e-4a5e-43b1-9a47-bcfca7792ba5}} , stand, respectively, for the {{formula:29da0c76-5028-4b0d-94da-f23bd96b9ced}} and ...
i
5c0b7849411d6b1166f22c48e1535072
More qualitative results of image retrieval on the CUB-200-2011, Cars-196, and SOP datasets are presented in Fig. REF , REF , and REF , respectively. We prove the positive effect of the proposed method by showing qualitative results before and after applying the proposed method in the self-transfer setting; the source ...
r
1c1def80227ee6a35205dc6319651a86
To further investigate the different outcome from each approach, we show in Figure REF the posterior probability density function (p.d.f.) for the BBN observables {{formula:7a0e1289-e553-4e3a-afd7-8663fba0f4ed}} and {{formula:6d8b97cc-f1bb-4ed3-b0f2-768a23a89790}} . We report both the result from the BSM fit varying ...
r
c3db9e4ceaac76ec825bf1356fda9f52
Relation to fine-tuning. In SSKT scenarios, fine-tuning and learning from scratch can be applied for target network training. We adopted fine-tuning-based SSKT with a ResNet18 model trained in ImageNet for a multiclass image classification problem using the PASCAL VOC dataset. In addition, using the pretrained 3D-ResNe...
d
77e05087055c0d4852e4d4eebaa09341
To fit the {{formula:3036d98d-f52f-4790-ad79-835fc20c541d}} invariant mass distribution, a smooth incoherent background is exploited to model the contributions from misidentified non-{{formula:3205a910-df66-4a96-8bb6-01e0054089f0}} events, crossed-channel effects and possibly additional broad {{formula:c71fbe57-e3af-...
r
56b0fc267383fa63d34115faa84dcc2b
There are several topics that merit further research. The asymptotic properties, such as consistency and asymptotic normality, of our proposed method could be developed. In particular, the asymptotic properties of (REF ) may be studied by using the techniques in {{cite:e3dcdb69869af938293d4ddd31f727527854f98d}}. In the...
d
6823c5c7dfa75218fc516905f4e530c4
The whole attacking process is summarized in Figure REF and Algorithm REF , which can be devided into the following two scenarios: (1) If we can obtain the clean datasets, the poisoned samples are constructed following previous work {{cite:79f5e853450134a00ca10265585992fb53483bad}}, but only the word embedding weight ...
m
89eea8280e9cb91edf7afc4356a44cb2
In the paper we present two single-task networks dubbed Seg and Reg networks (see Sections REF and REF for more details). Moreover, we investigated multiple multi-task networks, namely JRS-reg, dense, SEDD, and Cross-stitch (see Sections REF , REF , REF , and REF for more details). We compared our proposed methods a...
r
d5a58ddd920c0db13482e08e93586d0d
For the function theory of slice hyperholomorphic functions the main books are {{cite:f7a68c63b23eaef35d0735aab5a9398cbaeb0335}}, {{cite:8c693c5a719cac0ac9bb52e6e65315564bc27466}}, {{cite:d2ee362164b3f59d4072c8ce52a2792e35b7f198}}, {{cite:09826f8cd01ea0545b655f99677bd2504d02e59b}}, {{cite:4bcc13cff30540b4fdd2a4214c5066...
i
ec0409724d5eaa7cd3c71081616b0e8b
The conclusion to be drawn from the above results is that the observational data in the Fermi-LAT 12-Year Catalog on gamma-ray pulsars are consistent with the dependence {{formula:e6bb1740-502b-43ea-a4f3-c413aefdf41c}} of the flux densities {{formula:ec72af23-cce1-4fae-8b3b-44baf4350eb0}} of these pulsars on their di...
d
a935ff7c67a323a2395f902f9f93b448
The existence of a sterile neutrino with a mass in the eV range is motivated by the fact that it might provide an explanation to long-standing anomalies in short-baseline (SBL) neutrino oscillation experiments. These include the anomalous appearance of events measured by the LSND {{cite:c912b1c83afb001fb77dad67872a2711...
i
f4b9ed98ca63d53e25cffaeb41dfe0d1
The objective of the ASP is to select the motion primitive (grasp vs. push) to be executed, if applicable, which minimizes the number of required actions to retrieve a TO. This task has a finite discrete action space, which makes a Q-Learning algorithm a simple and effective RL method to deal with it. Thus, we use a de...
m
d857db90a0c0567fbaa89e2f3345d75f
Although several novel methods are described in this paper, these are only a few of the many potential cyclical techniques that are possible. Curriculum learning can be considered a component of cyclical training and at the time of this writing, there are well over 3,000 citations to Bengio, et al. {{cite:ffa209ffcb5ed...
d
9a7b7a09cae03abbd585b75f0808f4a6
We propose a novel method for DTW-based audio-to-score alignment that uses Siamese neural networks. We additionally employ deep salience representations {{cite:2bfceaabfcd37ab797c71cafe7a3040610e9d70b}} to improve model performance in data-scarce conditions. We describe the method in detail in the subsequent subsection...
m
a3fd7196a4be90d636eb14146f46bce9
Lemma 3 (Pages 30 and 37 in {{cite:2c3382d79e000c3f341100e3f9e7d9a5a5d5e7a2}}) Let {{formula:ab210808-a946-4c3b-a391-947b1a640f9a}} be an irrational number.
r
d9be55b1c87303293d2687a27fc191b9
Van der Waals barriers host atomic point defects {{cite:0812d944437482f783968b0b1c8068239e902b24}}, {{cite:6cb2a5c7ff2c99923ee708a0552da06812640cd9}}, {{cite:400f5e546e8e4807a39ae49a168a6a84aaaf3855}}, {{cite:4ff697a2dfc663e2dded307d7b5ee3a1a1ebf96b}}, {{cite:b303c35e2c2d8936ba894de72c6b9c5018f56f83}}  associated with ...
i
e79d834fee48417c3aea0b95dcd24aed
The proposed PIC-DNN model for power flow and injection estimation was applied to the IEEE 118-bus system. This system has 99 loads, 54 generators, 11 high voltage (HV) buses, and 186 branches. PMUs were assumed to be placed by default on the 11 HV buses such that all the branches coming out of these buses was directly...
r
b903a8b17155ed7c3cf651547942e0a0
In Table REF , we exhibit the computational performance comparison for {{formula:a7f359d4-bb99-4318-8165-45f00d80de33}} with mixed boundary condition. It is clear that adding offline basis can definitely improve the accuracy of the GMsFEM, for example, the relative {{formula:668bdb52-1cbd-4ad8-a213-c5539d31b404}} err...
r
4ed0289d87030f8fb6f53185fcebf5d3
In addition, explaining the model predictions provide interesting insights into the analysis of gait patterns. The input relevance values highlight that in most cases not a single gait characteristic (specific value or shape of a certain variable at a certain time of the gait cycle) is relevant for the identification o...
d
c22d24d57872f2b30f4cac5a9a153f77
The Fast Gradient Sign Method (FGSM) {{cite:850601445941cbdc2b61816a96cc8e2766b12969}} is an early gradient-based method, which is especially fast. The gradient of the loss function {{formula:9af2e52f-7494-48d3-9083-b0309505a447}} is calculated with respect to the input {{formula:8b71dd24-8e17-4bec-9cdd-36d8af65a3d2}}...
m
a276e3fee5129760734e5e990fbb2470
After the Gaussian case being solved, a significant amount of work has been done for general non-Gaussian entries. This problem is known as edge universality. The edge universality of the Wigner matrix was first proved in the paper {{cite:6988ac907d6beadcc012a91128be5c30502d85d0}} through combinatorial methods. He assu...
i
987504f4f18b753718ce4c3378c8e52c
Although this new proposal has elegant features, it is not immediately evident that the regularisation is successfully implemented in the flow equation, at the detailed level of Feynman diagrams, first at one loop and then also at higher loops. In this paper we put the proposal to the test by constructing explicit expr...
i
65c17ae3b0661f6894c59aabd0cfa6e0
and let {{formula:8c7ff302-274b-498a-83e1-eb2bdcc0b7d3}} or {{formula:fa259834-0d01-4ed3-98d2-70baf000beed}} denote its {{formula:1a14c840-cb76-4b5d-a72c-721eff7e3503}} 'th eigenstate, with eigenvalue {{formula:5683934a-970c-41d7-b779-58b3511c76d4}} . Here {{formula:e15bc39c-a92b-4848-a343-0706d055d29f}} is a real f...
i
6459677ba2deb0a9859f69b347e60798
The defining feature of our phylogenetic inference method is that it gains power by jointly leveraging expression measurements of a group of genes, while avoiding a high-dimensional evolutionary model. Rather than requiring an estimate of the evolutionary rate at each gene, our strategy estimates the parameters of a di...
d
da18887e2fa187be0b24dc9664dea3a5
Given the results in Tables REF and REF , we decided to study in more details the range and {{formula:692c2bd6-8ab1-4a25-abf5-e52538202438}} -score normalisations. We then devised a set of experiments aiming to find out whether there are parameters for the rescaled {{formula:d127dff1-0082-44be-afd8-7857d4b31e45}} -mea...
r
cedce3da695b58d8062754e3a2c1a15c
for all {{formula:ec8968db-0ee5-48ec-98f5-4250a540be17}} . Combining these two restrictions and writing them in vector form (cf. {{cite:6dadb5439a35b4bdd7fdb8c6271185ec5ac5ad9e}}, p. 240), the set of clearing payment vectors is seen to coincide with the set of fixed points of the mapping {{formula:d2da39f8-b46c-4f8d-be...
r
de3e7f22b5377e081925f0a1e08d93be
CNN-LSTM {{cite:9876b48cbbba9a7b7d19419695a9a1c95071d9b7}}, which is a prediction-based method built by firstly defining a network comprised of Conv2D and MaxPooling2D layers ordered into a stack of the required depth. The result is then fed into the LSTM and FC layers as prediction. LSTM-AE {{cite:9bd0529c01efe8836b...
m
f5c6fa6aed5aeb6d4c453d8d4cd7e94b
The properties of different types of polarons were well studied a long time ago. A number of review papers (see for example {{cite:390b0191c59f31eb19123283d8bc2990a8c79d89}}, {{cite:70b61c07782c814347960aa98178ef106a44dec4}}, {{cite:f2633a988b360c21858a0237fd5c28565d5bbf2e}}, {{cite:5138645df9e1ff1d28cbbe8a95ab868203ed...
i
112a01d38421c38035a6ea89580d616e
Compared to end-to-end ML solutions to PDEs {{cite:be3386a44f4543069268a1ce1e83407077227b92}}, CROM employs the neural network strictly as a spatial representation (see sec:net-inf,sec:net-inv) and solves the PDE using classical PDE-integration numerical methods (see sec:PDE-time-stepping). As such, we believe CROM wil...
d
683d6c033437bd6dd0520b19749f7c1f
This ensures the vanishing of both surface magnetic charges ({{formula:95967285-3596-4002-8c97-72740a214235}} ) and volume magnetic charges ({{formula:5b7bb6aa-f1dc-453c-86a7-969920af04ed}} ). Here {{formula:c24ce302-19e1-4378-8671-e066312899cf}} is the wavenumber of the modulation ({{formula:0f8948dc-ff54-41e6-89cc-c...
r
0e3a882bddcf0429b218d3c244a329d2
Accuracy indicates how accurate the model has performed. The average classification accuracy achieved by the proposed model was 98.24%. The novel 1D-CNN+LSTM model implemented in this study exhibited a high-performance accuracy for the classification of different arrhythmia types. Its implementation is straightforward ...
r
64f962664351a8afb8b2218a2dd96ee5
One of the biggest application areas of inverse statistical mechanics is the modeling of biological processes. These applications are fuelled by the large amount of available data resulting from the impressive progress in experimental techniques in biology. This is especially visible in the case of biological sequences...
i
92e4e8e32d2a9165dcd5a4ec232b7dc8
Abusive language detection is a relatively new field of research, with “very limited” work from as recently as 2016 {{cite:6383a0cc901f265472c58506855ba14b3e490c67}}. Early methods featured Naive Bayes {{cite:17361459b1c6acc71b0cde03593c246aa9fa7187}}, SVMs {{cite:764dbd250a401206f7097569fefeae76230af6cf}}, Random Fore...
m
f851f21464a2ffea47545d7213a0c2f0
To dive deeper into the probability density function of the largest eigenvalue, denoted as {{formula:54818697-e410-49f4-abed-5156fb717408}} , let us take, for sake of discussion, the values of {{formula:e144138d-7951-4661-a382-24e368aaf536}} and {{formula:10f2a5e3-4708-494e-a630-40fc7731bbc9}} , and investigate how th...
r
4db8e4174c30cdd37bc5c6f3e6595c8c
Comparison to other contrastive learning methods. We compare the CrossCLR loss with popular contrastive losses: MaxMargin {{cite:43118da06a1d22175501c2dffaf313bb0e96602d}}, {{cite:07d5e5da65810d7e42a0f4c9f71f486226393430}}, {{cite:38ff5e6fec35527351d782c0039a92b29ac22eba}}, {{cite:08c05e270eb5b70f39585eb782a06c37cc25b2...
r
3da233d2f1cdfafc725d2c877ae0f092
In Figure REF , we show some visualized results compared with OSVOS {{cite:21bc28716f6d2cf10825a5527626bb973577910e}} and PML {{cite:a5327ec35d484641fc81470814f892c3fe40a46d}}. For the breakdance, scooter-black and dance-jump sequences, which contain fast moving and abrupt rotation, OSVOS {{cite:21bc28716f6d2cf10825a55...
r
1821902622f7c2b3149dc823140df5df
{{cite:4049e07d11b8413b9f3fe220a09e0239f26f375e}} proposes another gradient-based attribution method, SmoothGrad, to identify pixels that strongly influence the final decisions of image classifiers. By adding noise to the original image, we get a set of similar images. Then by averaging the gradients for each image to ...
m
70850074cb31693bc106301b5fca6776
These methods use a spatial encoder to process the raw trajectory data, and then use recurrent neural networks to estimate the future trajectories. To extract the spatial context from the trajectories, {{cite:460c29bbf27f4e98e202149790a919a15e9e794d}}, {{cite:bd8ba4fb283193adf3f0e74d1aa35261a9be30ca}} and {{cite:782f9d...
m
478b70b25c05524f55d51b05ce5b26ba
Quantum mechanical models of electron transfer have proven extremely successful in describing key features of electronic transitions in systems such as biomolecules and solar cells. One of the simplest models that has been effective in such applications is the spin-boson model, where a two-state system (representing tw...
i
2ddded47360bfaf8eb89bbfde2dd3de4
We have also studied steady state properties of the driven system, starting from a domain wall initial state, by computing transport properties, auto-correlation function and the number entropy. We find all of these quantities reflect a change from localized to delocalized regime as a function of drive frequency. Howev...
d
b1fcd4ff64ad316b2ad1493229bf736b
We compare our proposed framework with several baselines. The first one is a Relevance-aware Ranking (RR) algorithm {{cite:cdb3ad222a774539d8f811efaba9f9037ff1e716}}, which jointly considers the user-item preference scores and item-item similarity scores for ranking. As we implement the diversity scoring function follo...
m
ae4d1fa4b6c8bb1c1f6477ad8b6157d5
The method proposed in this work comprises of the following three stages: (i) pre-processing stage: the HSI data set is reconstructed by NSW and then projected linearly to a lower-dimensional space by PCA. The step effectively use spatial information and reduce the Gaussian white noise in HSIs {{cite:0ee46d658da809eaaa...
m
2c6d9db29ebd2ee5f79c7d97aa6075d6
pocoMC implements the Preconditioned Monte Carlo (PMC) algorithm. PMC combines the popular Sequential Monte Carlo (SMC) {{cite:087fdbd436370d10d5073235747ea6534bd0ee5e}} method with a Normalising Flow (NF) {{cite:d79cd6bd5cf5fdb05e10a328ce2336923c49facf}}. The latter works as a preconditioner for the target distributio...
m
bfb35b976c48a77769fd625fcb66dcd3
Classical general relativity gives the concept of a black hole from which nothing can escape. In 1974 Hawking {{cite:8c73ec85d556d9bdfd415aa94961b149b3e06035}} startled the physics community by proving that black holes are not black; they radiate energy continuously. Later on in 1975, he {{cite:cb1818f905a1f2dbfd8090db...
i
f9e84983cf8d537e1d1469e2d01cd21f
The focus of this work has been the attempt to develop a general method that can approximate the stochastic dynamics on a wide range of graphs by adapting methods from statistical physics and epidemiology. In doing this, we have provided a derivation of existing (homogenised) pair-approximation models from the master e...
d
1954de30cc010123db1abd28dc0e1222
Another interesting issue to be considered is the 5d uplift. While {{formula:2206c35f-b5a0-489d-8436-01a52b1a4492}} , {{formula:fd3c9895-360c-4f64-a748-a17a365c0726}} gauge theories correspond to the non-relativistic integrable systems realized on the Seiberg-Witten geometry, the {{formula:fbf1cecc-b6ae-4788-a059-5c16...
d
1e54a2c8a606199efe7ebcfe29c47fd7
The early-time scaling {{formula:789351be-1bb0-4a1a-8335-292968a3a853}} of momentum anisotropies in transport calculations was already observed in special cases before: in numerical simulations with a given initial phase distribution in Ref. {{cite:c76145a49cab19edacca38221712b2bff224fe9e}}, and in analytical calculat...
d
92669b209ed59eb3aeeeb120d11f341a
The scenario presented here has many interesting cosmological consequences. It places strict constraints on scalar fields in our inflationary model: even supermassive scalar fields may easily be overproduced during preheating. Our scenario is also an example of a model where supermassive DM can be produced simultaneous...
d
8a58f76e39299d68f3ec4cb2f20c7226
We employ a relatively simple neural network tagger for all of the tagging tasks in this study. The tagger used is a bi-directional Long Short-Term Memory model (Bi-LSTM, {{cite:5ffdee4a9db4efcfc696ca9f3c7c46bef7c98d25}}, {{cite:3d418f0002d37de99237d2b4424f93c4cdddba68}}). We use a single hidden layer for each directio...
m
7e391f1cf0bbb3b6939ef1e6556a10dd
where the regularization function {{formula:be339b1a-836a-471b-a447-60e4d27f5ba9}} steers the solution towards a preferred sparse structure, and the regularization parameter {{formula:da34b9a5-d033-4417-9d6f-2e0b53aa1f19}} is to balance the trade-off between the data fitting cost and the regularization function for ...
m
4db5146c3222defb647500415c74b4bc
where for a measure {{formula:3da8f74c-228d-4db5-8716-5e32651178ba}} the slice {{formula:31bfa0c0-659d-4d24-837a-a3f7a1116252}} is defined by the relation {{formula:c9c654aa-9fa7-4c35-bf9d-ebb3f670aac8}} and for a measure {{formula:ab3c6033-4d98-4eb3-b53b-3a3f3f17d080}} the slice {{formula:233773cc-4f66-400b-b55f-...
r
a5f9c7ae845b6a09032cb607646c1be9
As Figure REF shows, given an arbitrary number of image and (or) text queries, our goal is to retrieve the images that contain all the semantic concepts specified in the queries. Inspired by the recent advances in compositional learning for visual recognition {{cite:a012c7324f47ceeb73807847a07d0b11b4ef86f0}}, {{cite:f...
i
6f40b0395cdfb3331900e0e74b4c5f53
Results show that both HQI with and without state abstraction consistently outperforms the FQI when there is limited training data. When the dataset is large enough, they all converge to the same optimal performance, which is around {{formula:d6fc2629-2cbc-4639-80a1-217bb9d78418}} . We also notice that, occasionally, H...
r
1db25e9d5f60455713d5a0db1fae4431
Seidel and Thomas {{cite:39f07df6c18faae567c7a1ff29db9164380112d9}} define autoequivalences {{formula:14bf4395-7cef-4f96-98ec-65e6700e725b}} associated to spherical objects called spherical twists, we denote by {{formula:9222f6a8-8e94-4b61-98b2-79c2fd0b2dbc}} the subgroup of {{formula:014c25fa-d493-4060-8956-9b1aea71...
r
f1fd45152b19d4d7eee8d27b103f3e78
When {{formula:d83b9b2f-6be7-426c-9a55-f6a791154088}} , {{cite:c22dc34ac70c06e8e0992df6b025c1c5d3325a23}} show that the LSD of {{formula:1ca6f546-a089-47a4-934f-458ba25ce6d8}} is the standard Marc̆enko-Pastur law which has the density function {{formula:5f156bdf-1707-4e86-8cff-03e395187525}}
d
06eca2f5f2395ae3dd51215c19b23d60
The exponential growth of mobile devices and mobile services provides a huge amount of data for AI-based mobile applications, e.g., healthcare and e-commerce services. However, effectively constructing a global model from a large amount of mobile users' data faces critical challenges. First, due to the privacy concern,...
i
8fe31d43c04b0d62f4d7bd6f6f089b4b
The long-form video understanding benchmark (LVU) {{cite:80391a32cd1810aba6410c408d82d18e69c43b9a}} is constructed using the publicly available MovieClip dataset {{cite:1346121cb9e5edb83d0a554d568a433912d11caa}}, which contains {{formula:93f6126c-e41d-4730-9f4e-256e59b6a82b}} 30K videos from {{formula:0da8c650-f8e0-4aa...
r
39001ca772e7ec60ccf1fff9e8bfc451
In {{cite:3f54b7b407ac7e4f13e9e05f09d9e8aa9622ad30}} we have outlined the basic theory of synchronizing dynamical systems (or henceforth just “synchronizing systems”). The theory of synchronizing systems is fundamentally based on techniques established in the study of Smale spaces. Smale spaces are dynamical systems wh...
i
672a0e704c86b491a7d4256567c699cc
While these theoretical predictions were confirmed via the Monte Carlo {{cite:43a8107f49f630d91cba3dbf4eab525549e68875}} simulations of the Ising model, for moderately high values of {{formula:249aea6d-76ea-4dc7-adc2-9508d1ebb543}} , striking deviations were reported for {{formula:01782e0f-7936-4cae-bae6-d34e0f6647ad}}...
i
1708b0a2ab31b6e37c27b23e1070f1d6
The physics related to the Higgs boson has become the frontier of the high energy physics since its discovery a decade ago {{cite:56eff8fa2d3e4a2e32052f0e6bd1bcc070de3d57}}, {{cite:b913cd4c42c43eeb4f7d4d97a48407a0994e3cc7}}. In the Standard Model (SM) of particle physics, the Higgs boson is known as the direct evidence...
i
cfceaa3cdcac6762f2ab43d9c1d0bcd0
We focused on analyzing the effectiveness of our method from two perspectives, final model performance and ability of the method to efficiently trade a computational budget for improved performance. We compare IGF directly to standard finetuning, which we define as basic batched stochastic gradient descent with Adam {{...
r
0b042fc8a72cacf6ab519cf5b75290eb
Applying reinforcement learning (RL) to applications with unknown safety constraints is challenging as RL is inherently an exploratory process and requires agents to learn the whole environment first. Though there has been a surge of attempts to incorporate safety in RL {{cite:d1fe5510ae8f880824f126d8296fb81e81edf80b}}...
i
87f2cd61485484fef17af81752fc5224
A current mainstream data structuring method includes two steps as shown in Part A of  REF : 1) uniform subsampling such as Farthest Point Sampling (FPS) {{cite:930608b0e8a30304d0c9c63fa9284e1a27a1079f}}, 2) local grouping such as ball query, kNN or cube query. The subsampling step obtains a subset of points in the poi...
i
cc900182330b77b44a327477695c8616
{{cite:1d45177ce477e7912a388f6ceada1d96b5fb8604}} has provided an important extension based on the partial linear model. It is of great interest to extend them to accommodate general nonlinear models based on nonparametric {{formula:7857198f-e3ef-4e8b-9157-7a7a436d9f9b}} . {{cite:c0863d0e90083b672e80c7b721728b442e69285...
d
143ae0eda0f8fe377e9fb021b6d15f0f
In Fig. REF , we present some of the previous physical observables taking into account only the 1.47 k BPs that are in agreement with the above mentioned experimental bounds {{cite:3c5dbe17c98b727bc103b15fced9d58bdc18e9f9}}, {{cite:b8be1362ed6c9a3cd1e6d94b622b0d02fca26643}}, {{cite:1498e7605c4f8d98d6870ef7c4b7846fd0a7f...
d
354393a911ffa21bdb291701ab800b9d
Subsequently, we may decide to make an arbitrary unitary transformation to any other basis of Hilbert space .We may interpret the evolution operator exactly as dictated by Copenhagen. In general, the transformed evolution operator seems to handle probabilities and uncertainties in the usual quantum mechanical way, but ...
d
9b1e7b8b3d3ebff6cbecbea088ae80ed
Input Sentence: Each raw sentence from the dataset is presented to the proposed model one by one for further processing. Before that each sentence goes through some pre-processing steps: all urls and codes are removed. Tokenization: Each processed sentence is tokenized using the BERT Tokenizer. Each tokenized sentenc...
m
ffd11ed63207894d902f5c51be3ac8bd
In this section, we present the numerical results for the invariant mass distribution of {{formula:577a1e59-feb4-4c5c-afef-dd165c86ac65}} and {{formula:566e5d7b-0a6c-405b-9032-d2149281ec08}} of the {{formula:206bd0ae-b267-4652-aa24-65ec758a5352}} decay. To compare the theoretical invariant mass distributions with th...
r
7842c5a0fea460acc0445e365a26507e
where {{formula:beb3b0a6-a4ff-4612-9304-a486446bc531}} is a kernel parameterized by {{formula:f311f7ae-1a2c-4149-99cb-d6182c9bbd8e}} , and {{formula:f8ed8a38-ae00-4e36-abfc-70a1062c2bb5}} is a random probability measure with a Dirichlet process prior. See Chapter 5 of {{cite:56b3f18e7900d0e51dc0100f5ba4c2969e421170}}...
d
447cb9fb84f4853a9fd2d12caa15be0c
Redshifts of celestial objects have been a vital component in the field of astronomy and we use them to measure various attributes such as the rotation of the galaxy and the distance from us. Traditionally, they have been measured by spectroscopy. While spectroscopy is effective in determining redshifts of galaxies, it...
m
180c76cdc2767e6e0e11eff3b5f97248
Following the other works {{cite:c2414039b7b2471934077f1d32293814da2bec1d}}, {{cite:accc97068cb592104b66dd066c6f65ed049f08e2}}, {{cite:3d12866c9f7c2d95752241102432ca69d492b0ef}}, we demonstrate that our model can handle complex images with a large number of classes. We further evaluate our model on the COCO-Stuff 10K d...
r
637d7b0158a0cad4661fddba153df3d0
Trackformer {{cite:66692ebafba26cfab5e08dac7db78d8b0dd01da3}} is most similar in spirit to our MQT method. Their detection queries are analogous to our static det queries, and their tracking queries are analogous to our both queries. In the ablation studies (Tbl 5 (a); Tbl 3 in supp. material) we show the effectiveness...
m
40324eca7269ebcfc6f1b9e08ae22466
Among the model agnostic global FI methods, the Permutation FI (PFI) {{cite:bcf071409468fd32a13f91dd46a429cba4bb4140}} is perhaps the most common approach. Its rationale is as follow. By randomly permuting the {{formula:ed3037fe-4a87-4ccb-ac3a-a0b4b787332c}} feature, its original association with the response variable...
m
2399d55c969567b3e371e39db88c8c54
With much higher statistics, the STAR collaboration has not only repeated measurements at 200GeV {{cite:91d1ec358d9502af004b8acb2de09e7e4a84acaa}} but also started a systematic study on fine structures of GPE such as dependences on the centrality, the transverse momentum, the rapidity and also for different hyperons {{...
r
8686ed172625c424d0aabd7a4d5ff26c
Some methods try to generate the formal query to produce the answer directly using neural networks. In {{cite:4ad8e1ae73db1d4a4f9e154de011c8f8285a88b2}}, a recurrent neural network model directly predicts the head and relation entity for simple questions. Using the head and relation entitites, the answer entity can be ...
m
f2a1d3634595eff0aa968907156c50d9
Note that our problem is fundamentally different from the conventional bandwidth allocation and delay assignment problems reported in the literature of computer networking {{cite:1839b48ad3e172c89312d40f52b31cd0e58e3c70}}, {{cite:980cbb8e71e840e2424e13507c3e87b9bfb2a377}}. The utility functions in these papers are stat...
i
3d49feed50a5bcd88d5ca8bb74c9aad8
With the ever increasing size and complexity of datasets and applications, there will always be a demand for more reliable and efficient defense methods that are scalable. So far the trend is that many defense methods were shown to have excellent empirical properties at the time of their creation, but then very often t...
m
e4ab9aef502ef5ccfb15a113c0377078
We also compare our results with state-of-the-art embedding approaches such as BIER {{cite:5b0e9ff3107db74a2bd4b189c0e1106280bcf80b}},ABE {{cite:e77b5cfa49078f0340c32b5a7daf20c28cd8e8a6}},FaseAP {{cite:7d0b6e3e837e46f973de2bb2a3f1791da003c654}} Multi-Similarity {{cite:34ec892a16beb3ae2eee01ca58de91f222da9902}} and Easy...
r
ff64a1d49348a03ae5ed514df737e110
Theorem 12.4 {{cite:220a1f67c5f6b06ad1e6297df733afeb5bd118c9}}, {{cite:35ed07377e2fe5e70e99f1523665ea9a2e39c6a4}}, {{cite:4197c1a915cbc563799944e6b64447d2a9486bcf}} Let (REF ) be irreducible and co-operative in some set {{formula:95395a67-b8ab-4141-92f9-1fa3396c004d}} . Then the solution {{formula:74c7452e-cb7a-421a-94...
r
9bcbff4ff57d4900b2290c01b17e0b65
Self-supervision-based pretraining methods take more time than the supervised AT method since self-supervised pretraining approaches typically require more epochs than fully supervised methods to converge. In the self-supervision-based pretraining approaches, AP-DPE{{cite:d04d77de09722545966da60dfd3a37c099ebddc8}} ta...
m
4469b32d96656bc86631c1edd5d13449
blackTo investigate the effectiveness of the proposed LBS on the lightweight models, we apply our methods to MobileNetV3 on CIFAR-100. Following LSQ+ {{cite:af938ca390c51eca07dc661001770974ef60e8eb}}, we introduce a learnable offset to handle the negative activations in hard-swish. We show the results in Table REF . Fr...
r
b6d9681e5565a75d269326bf8e80f261
Some seemingly obvious solutions are not always effective. For example, buying the most accurate data from all users may exceed the payoff for making the correct open/cancel decision, resulting in a negative profit. Alternatively, spending a fixed, prespecified amount on purchasing raises the issue of predetermining th...
i
46d150b22dfbcbd6493242101e86c571
Matching evaluation. We compared our network with the Predator network {{cite:6e062908dac9ff7e3586bd144444cf807b498163}}, the closest method to our proposed framework. To adapt the network to deformable scenes, we used ground truth matches to supervise its loss functions instead of the ground truth rigid transformation...
r
0ee92e32fba1ee16825c32ce2c7ee7c7
Inspired by the success of gradient-guided attack methods (, FGSM {{cite:e75c62d0e6884e5f4d4125f19f4bedfc1f0e83bd}}) on natural images, we first generate the adversarial point clouds by pointwise gradient guided perturbation. Given attack budget {{formula:e499168d-165e-4629-96a8-17973be64dc9}} under the Chamfer distan...
m
6b5039d1d98a03019d01716c5a1fffb0
This result is completely consistent with the 2020 White Paper estimate of {{formula:94352749-bede-4232-987c-1f61d9725cd8}}  {{cite:3f1d03c2eda8fa4d9c24b02584cfa136ad2e6396}}, and has half its uncertainty.
r
19b7801f0ddb0109c12a801caf543fe0
We applied RSA to study the ability of different neural network models – multi- or uni-modal – to explain the fMRI activity patterns in various brain regions. Based on recent findings {{cite:9751ddf5e641f386e9ec4a7d6add56c2927be2e7}}, our hypothesis was that CLIP (and similar multimodal networks) would be specifically ...
d
78ac08e8db2177918827aa1188471a29