text stringlengths 54 548k | label stringclasses 4
values | id_ stringlengths 32 32 |
|---|---|---|
Wang et al. tackled multi-label classification by employing ranking and thresholding heuristics to refine the set of predictions {{cite:f72e629fe2521bcc091ad13a39a0d227592418b8}}. In this work a joint image-label embedding is produced to capture semantic label dependency as well as image-label relevance {{cite:f72e629f... | m | 76e525fc2411d3b5c5e3cca942f57dca |
If the ring is large, the problem can be well approximated by
the straight-line infinite crystal lattice {{cite:b1ca0d0969bfad7b262634699f10a5661f6cfbe4}}
with the period {{formula:c30c8819-2269-4708-9fad-eb40efe1b4db}} . Then, {{formula:2408117c-7099-4010-b623-e02434460e13}} and
expressing the Bloch functions via the... | d | c13ba72285f944eb6a64241fce838076 |
We have applied the model to the observations of the Milky Way disk and empirically determined the metallicity yield {{formula:e21d030f-ce68-4e8d-8227-931643403c78}} . We obtained {{formula:1fa1dd22-9da1-479e-882a-746953bfcc5f}} , where {{formula:ba41ed6b-b33a-4e18-ab92-f1b28f7e5f01}} is the metallicity mass fraction ... | d | fcdc5af55f8a56fac459f840d7c70346 |
To further understand the magnetic interactions in BMTO, DFT calculations have been performed using the plane-wave-pseudopotential approach as implemented in Quantum ESPRESSO {{cite:a0673a23166b1fab9e9ea2e7e86364e6f33bb5e7}}. The experimentally obtained structure has been considered for the calculations. The ultra-soft... | m | 198943782c5ba4f4f409875d30e88b1e |
This work proposes a generative model for macroscale communication in the brain that we show predicts directed, instantaneous, and task-specific communication dynamics. We compare our model on a synthetic task that tests the requirements we set out for our model and find that our model can accurately uncover the commun... | d | 25cede75751ef8df6c6398fa033302b4 |
Coulomb and Riesz gases are a classical field with applications in spherical packing {{cite:9b6bb4ee42a22918e24f67ea8ca3eecad27cdd01}}, {{cite:bbc9f8a329f74611fd6d25b38e100b3e1e33033f}}, {{cite:cad98bbedba45943aae0b292cda9195072bc6bf7}}, {{cite:637b731f7868db3fbc3ff0c21c45a028edbb1725}}, {{cite:0a9f89e72d3d66b379412f84... | i | a463d2330e04ac0b161dea863478e180 |
In either case, inflation could play an important role as part of a more comprehensive picture.
While inflation does not make universes like ours more
numerous in the space of all possible universes, it might provide a more
reasonable target for a true theory of initial conditions, from quantum cosmology or
elsewhere. ... | d | 6b3efd949559bf37a1fae844dad27976 |
In {{cite:408375308d27cca23a90f41540083f0b1bb38448}}, the traditional detection based methods are replaced by the density estimation based crowd counting methods, which can detect the density of crowd with high performance
and high precision. However, the encoder and decoder of traditional CNN based
density estimation ... | m | 0eb51ed8be0600e92756ac1bed9d80bc |
Here, few aspects need to be clarified. First, the field redefinition derived here is purely dissipative correction taken care by the medium interaction and should
not be confused with that due to thermodynamic frame choice mentioned in {{cite:ec071adc613a5347a18cc8748d882814acdabf1e}}, {{cite:c6b4c12135713c677916afba9... | d | 1b326951266cae337f7fbf1011880dfd |
Automatic Threshold Detection. In certain scenarios there may not be a good setting for the tolerance parameter. In this case automated methods like {{cite:77f4cacc83d97bb781400ccd1b523ded81f02add}}, {{cite:76b3c4412bcbb65f2100b2392eb79817433ff913}} can be used to perform an iterative optimization of the fairness hyper... | d | 7a6713b7bebc099f63a6f966fc27650f |
A final consideration to be mentioned here is that the stochastic
nature of the turbulent spectrum of the velocity field was not taken into
account, namely, in this paper, the seed to generate the random numbers was
the same for all simulations and it was fixed from the beginning. However, it has
been shown elsewhere t... | d | 4a411497196001139dde33ba1cb05af3 |
There are many natural examples where Condition G is met. E.g. if
{{formula:499d289d-fa36-4891-a19a-e9cbca10c360}} is the ideal ring of an algebraic number field {{formula:0d8bd02e-679f-4ced-8ee7-e7eeab2972a3}} , then a
well-known result, see e.g. Lemma 4.9. on p. 143 of {{cite:bdd3ad2891322902712885ba617d2d64ac9bc280... | d | 8f2370922254f6c3dbfbc3f837fe3ce5 |
We train MoE models based on the Transformer-base architecture {{cite:9efc7b64af64bf1362cc490cd7feaeb289a1ff35}} on the WMT-10 dataset for more than 100k steps using different methods. The results are shown in Table REF .
We see that both Gate-Drop and Gate-Expert-Drop have higher throughput than the baseline method wi... | r | f740a6ca4d03c22ad49e3e542dc98f2a |
As an additional refinement, the aggregate robustness scores can be replaced with more precise plots of model robustness across the perturbation parameter space (e.g., {{cite:a67b508596cdfc0899f8d2ba32b5a14d69841955}}, {{cite:d0c67cbb61bcd05718b0e4c58514bf58044a7057}}). This can provide detailed insights into the speci... | d | bc8f800b955f8a9cafeae37a715c9193 |
An interesting question is whether the framework introduced above holds for loop amplitudes. There are a couple of ambitwistor formulas for loop amplitudes {{cite:a2ebc65514ef43c93c490ff601c3f58610f57187}}, {{cite:12e460695a2dc8f76617869a3eda04ed6456b85b}}, the most successful being the ones based on nodal surfaces {{c... | d | a9a52884dae423074af25a3cbb10dc3a |
We show a more experimentally realizable setup to construct a characteristic system satisfying the criteria (i)-(iii).
To this end we hereafter focus on the uniform hopping case, {{formula:4086b7ec-49c9-4136-b70d-bdb006d191b4}} . Then, all CLS many-body states {{formula:70f2a635-b1ad-4216-b631-f069586adae6}} are degen... | m | 8700ade3ccbbbff3b785d649321f61f7 |
We have made use of the generalized method{{cite:3e6952646eed320ebbced686ac88e58a5b13f31a}}, {{cite:5363b70683f343d72855f2de6d7e7c77db6deb3d}} of handling such quark triangle diagrams in the framework of {{formula:c62021b2-81ad-46fd-aa4e-9dcd9e87ae03}} BSE under Covariant Instantaneous Ansatz, which is a Lorentz-invar... | d | 76492437080e87a4bb7e829a7a8491ed |
The following geometric lemma can be obtained by directly replacing
the energy density associated to the harmonic map with {{formula:24173437-133d-4001-bcd1-909eb090a62d}} in
{{cite:17b14d852fcbf1ef2d697c450ae6886277220171}} or the Yang-Mills case in {{cite:6454c0dfd32a8e3e666f58a541bc5b076234832a}}
| r | 3c8e7349745f0d79b69606f3bf4fd501 |
Taking a look at the first table, it can be appreciated that a mild dynamics of the vacuum is very much welcome, specially in the case where the time evolution of {{formula:5093e7aa-2179-4247-a691-843fb04ab500}} is activated close to the moment when the contribution of this quantity becomes relevant, namely at {{formu... | d | 75b0dfb07a27afe4d2949d73a02bac8c |
Persistent homologyThis article is intended for readers with and without a background in persistent homology and TDA. Therefore we include an Appendix defining common terms all highlighted in italics first time they are mentioned refers to a TDA technique wherein combinatorial structures are successively built from a d... | i | d0599f0315dd8a93435a0b8d79b3409d |
where {{formula:000000e3-f56c-4d75-93b5-cd2e64b06123}}{{formula:38043e3f-2e87-4e45-b271-a964565928ff}} is the curvature at the saddle point of the barrier.
The curvatures {{formula:49860255-911b-407c-b52b-eac2f27a4391}}{{formula:243cb307-611f-484d-8517-72f186f0e1ca}} and {{formula:f9355a2b-36fe-426d-81be-7a9d95572f97... | m | a6be38cc9f43a688b1d0e59de02c24a4 |
Fast R-CNN*: We compare with Fast R-CNN {{cite:36c7843dd9a13d9b1feb3134eb21ec33fd30649b}} to quantify the importance of contextual representations in CoVA. We use the DOM tree instead of selective search {{cite:1ed79cc4cc00abdf170b9dc4cc726e7965b3ea28}} for bounding box proposals. Since the proposals are exactly locali... | m | 7ccd327a84d8c2b14f93ae9b3b7fde51 |
Add basis.
From the term {{formula:77af083a-8f9b-4a0a-ad83-5110f8c45d78}} .
We first focus on the Vlasov equation and consider the discretization of {{formula:27c461e0-cadf-4777-a121-11aaf25b1666}} . The treatment of {{formula:c4252c83-c78e-4d99-8080-0e6c07370e97}} is the same.
Similar to the 1D1V case, to account f... | m | 970a3947c434727dc2dd42a03321ea88 |
Unlike RISE {{cite:e158f009635edce5771202dcb7b4d816a858d96e}}, which generates masks randomly (it is worth noting that that at large number of masks the effect of this is minimal, though we imagine that this is not the case when the number of masks is small) and methods which learn secondary models through gradient des... | d | bbde575dc986768389fa1b3b8f4eb6e3 |
To investigate the characteristics of the gamma-ray emission, we used Fermi-LAT (P8R3, {{cite:8ac9c3314c41106e542ce3a8c5f7cb39f2aefcd0}}, {{cite:35900214d0f7ee3452528bd3dcab2f34420798d0}}) data spanning from 2008 August 4 to 2019 April 24 (or 239557417 - 577782027 seconds in Fermi Mission Elapsed Time), in the energy r... | r | 2d5e04c86e54fe5dd46dc3b581793545 |
Recently there has been much interesting progress in application of resurgence theory and exact WKB analysis to quantum mechanics (e.g.{{cite:5c8c91375f7ecb009fb53d97c269ef8d74025709}}, {{cite:32aeec46d92239d09bfeefe1c9d6f627af36f628}}, {{cite:7588efc918a35a1de9c8984e99784add3da987a4}}, {{cite:edfa1ded2d82f8d95033c2d8a... | i | 47ba2df428e0e2cd10f9d7656403882a |
Although in previous section we have explored both the plane wave and Gaussian basis, there are two characteristics we have maintained constant over all the previous methods: all simulations were done in the Schrödinger picture and in second quantization. This changes in later articles {{cite:2fd60f257d212f3caa50237a2d... | m | cd0a23e819b3c55d711bf38ae120c856 |
The second statement in Theorem REF indicates that {{formula:e583d109-c127-44f2-b7c4-4add05d1a273}} is analytically stable, not only with respect to the Poisson metric,
but also the background metric {{formula:a48cfcc6-74f0-42cd-9cbb-83514c2e402a}} . It may be mentioned that it is facilitated by the feature of the st... | r | 4abb09d732099302ff4d89d97b8f38c8 |
The third attack we considered is a backdoor attack from {{cite:282add41b9ad94b2ce6a19580adf5588c2bbb276}}.
The attack aims to insert a backdoor functionality while preserving high accuracy on the validation set.
Similarly, the search for the attack gradient is formalized as an optimization
problem and the authors twea... | m | 1a48186bc121482705104f09533c68e8 |
We present the developed framework that leverages recent advances in Implicit Neural Representations (INR) {{cite:5d8d232a62652b3ee7f3e1949cf4d063664473f7}}, {{cite:ad9c461b35bc915b36a48211339f907f2e4ec711}}, {{cite:470f28675c2a356113d4713e99df7e8ab5f6f6a5}}, {{cite:7361d24d7e10b9cd3f6832a04160e576bb646763}} and draws ... | m | c25006e19f4d115f665458b8341ac889 |
There are several possible formulations on {{formula:0d33471c-93a8-41a2-a0ff-f3da416b06cd}} in the literature, and the one we present {{formula:b94022d8-80f1-4e00-9e95-6dc331b3b3f5}} is known as the Fletcher-Reeves formula {{cite:e43b6c86ebb079aac7925b99e9ecc4ff90135a22}}; see {{cite:3280219d4e9dac8e5121a4813d1351e32... | m | b19f8ca4978a2043918f73d21a4a1876 |
In Figs. REF , REF and REF we show the
the fits of (REF ) (solid lines) and (REF ) (dashed lines)
to the data on multiplicity
distributions from the LHC. For each figure we adjusted three numbers
{{formula:25c70448-7996-4107-b0fa-10fb95c69064}} , {{formula:cf0074c1-dfd9-4c92-aac2-9d25225dea13}} and {{formula:7a551a9... | r | 7f301a1bfaa3d99c1714323c13352172 |
There are two works that are most relevant to our paper. {{cite:a596bbb21a7029c582674414af63aeb5547021a1}} extracts adversarial examples to watermark neural networks. Their experiment was conducted on MNIST dataset {{cite:29076913a85715898dbe2792ff4ea7955e6ac846}} which only contains binary images of handwritten digits... | m | e1492a919d7bd1a5f576d0f5a0e6b406 |
It is far easier to verify a proof than to find one. This intuitively clear
fact has been given precise meanings in several settings, leading to such landmark results as the IP {{formula:6018de6f-5e0a-45d2-b0b6-3ab4fb356c5b}}
PSPACE {{cite:0f56f48f7389ee66a3b780ad96329fe230a14619}} and PCP Theorems {{cite:7166c1ad9564... | i | bf6b1686206592356f2d9b3e485976f2 |
In this paper we have used a combination of phenomenological and microscopic theoretical reasoning to build a coherent picture of the superconductivity and related phenomena in TTG. We argued that the superconducting state is a superposition of spin singlet and spin triplet pairings. We showed how this explains the con... | d | 7b3b5d941a6ae94c218173c525af8511 |
Each combination of model and dataset prompted a group of experiments, in which we varied the maximum learning rate {{formula:ab31437b-743e-49fa-964a-b9b32e53ed28}} , reached after 50 linear warming-up steps ({{formula:3b859a15-69e7-4100-8215-748df91f1426}} , {{formula:382cfacd-e92f-4be4-bef7-6495038c795d}} , {{formula... | r | 4c68c85280b2c5b24f5332adee4b9a2e |
Example 2.5 (Training of two-layer neural networks)
Here we present a particular example related to the training of two-layer neural networks. The universal representation theorem, see e.g. {{cite:053d5088cdcf6afd5b76c305c30d869ade47fb47}}, states that any given continuous function {{formula:518cbd4e-da97-4339-b099-5c... | r | 9a53ad494f700ea46693a1b2d2b1da09 |
The HUMBI dataset {{cite:7fd8013ee7e870ddd55af92bf5b4768a879ce3be}} has a high diversity of human subjects in terms of body shape, age, ethnicity, clothing and accessories. We train on this data in order to evaluate the robustness and generalization capabilities of our method.
Figures REF and REF show some results on... | r | 424d52b522dcbba0405fa65bbf075d09 |
Fig. REF illustrates the critical scales for suppression of superconductivity with DC current {{formula:6a262cdf-e1be-4ebb-bdd9-b775d3c6f2c6}} and magnetic field {{formula:3ae5d156-903d-4ac6-9092-bc614f5501f4}} .
Fig. REF a shows a strong non-linearity in 4-terminal DC measurements. {{formula:c8933381-84f0-4c23-b8cb-... | r | 5905a6cf5c6620c9df39e43881e77fe2 |
Although discourse relations have been the subject of growing attention in corpus linguistic studies as well as in NLP and computational linguistics research, the gap between linguistic and computational approaches remains wide. In recent years, we have seen the emergence of “Transformers” which are deep neural network... | d | 87c4a3bf28083412395cf1037d9512b1 |
Finally, the FLAME module derived two sets of masses ({{formula:f7dde472-6912-4d4d-8c68-32e51c36d6fc}} ), ages ({{formula:d6e16c68-c00f-4387-ab5f-5ba95f99849e}} ) and evolutionary phases for most Gaia sources, based on either GSP-Phot or GSP-Spec results. These evolutionnary parameters were obtained by first computing ... | i | 4765f658b7a0faa06b6ede0de8a332c1 |
Related to this issue is the choice of invariants used. A relatively simple polynomial invariant based on quandles was used in this paper, but is certainly not the only choice. There are many enhancements of such quandle invariants for knots, and applying them to knotted graphs would be relatively straightfoward. A sam... | d | 02d1f36a18d2fe727565a0f0c6a1c265 |
According to {{cite:b590fc5069d124484f30022c30969c291d58237a}}, the GE2E loss {{formula:faa3981c-c020-4d3c-82b2-2523f9109472}} is the sum of all losses over the similarity matrix ({{formula:1cc87e62-f9a1-47db-b3ec-3590aaf4a174}} , and {{formula:759efb54-64de-4a96-8f08-2e4d4ccb6bf5}} ),
{{formula:2b2821e1-51b3-4ad6-9... | m | 716d3b73813b920797a3f1a08cba744f |
Integrating MixMIM to other backbones. While previous works {{cite:779908c5b31ac485add34dcc49a0e8699e8bda5d}}, {{cite:36c5a6a838de0e257f8c45a3f0a3d1bc3ccc17dc}} may be restricted to a specific architecture, our proposed MixMIM can generalize to various visual backbones, including plain ViT {{cite:a748eeaab5073c911208d1... | r | 7c68cdf8c7da7b8a2c74e3ff4b4f8266 |
As computing resources are limited at the edge, researchers have been actively investigating the computation offloading problem, optimizing the allocation of MEC resources to different users. {{cite:e8640aa221cfa321f0a923076b892acd89b2c5f5}}, {{cite:5eb95abc905b12abfb84d0fbfb20a93b2b8816c5}}, {{cite:ed17768a2faed37b5ac... | i | 21f0ea181e33c8b9f525ef0cd4476fba |
In the targeted case case, black-box attacks were unsuccessful. the predicted heart segmentations did not resemble heart symbol shape and had low overlap with the target adversarial segmentation (Table REF and Figure REF ).
We believe using higher noise level {{formula:a24085b8-6437-4bb1-a6a9-7bb6363a58a3}} is unlike... | d | efbad7847c3b7be333da1bf23a3de577 |
To the contrary, we find that conservatives were far more likely to comment on left-leaning videos than liberals were to comment on right-leaning videos. More conservatives made at least one cross-partisan comment (82.3% vs. 62.2%) and the median fraction of cross-partisan comments among conservatives was 22.2%, while ... | d | ffd214edb1c066c0faa9e682a4ce8b8a |
Table REF reports the average SSIM and PSNR scores with respect to different datasets under 2{{formula:88d1cea4-8695-4c62-af5e-db5ec3a150a1}} and 4{{formula:bb288755-dfcd-4420-8ca4-9a83a5e655fe}} enlargement. As can be seen, our approach yields the best results on all datasets. This demonstrates that our model can e... | r | bb0e94adb2c81f9c2697dc061bdc6dbb |
This formulation is not feasible for posthoc explanation methods {{cite:06b54620b47de945e4e875f2334647b7962bd94b}}. Hence, we define explanation continuity as the Levenshtein distance between two sequences of feature attributions obtained from the explanation method. Levenshtein distance between two sequences measures ... | m | 0657f59c0507c1736eb07b01038471d6 |
The mechanism is not difficult to find, though. For example, a light spectator field will transfer the isocurvature perturbations to adiabatic ones, which is called the curvaton mechanism {{cite:b5ade9f9d87189a4c0c52856e5c439fb9fd6a4af}}, {{cite:d21ac52d1cd2d702bc235bb74ae97c3aae6d2bfd}}. Since the curvaton field is mu... | i | 0f2fa927be54b68c54f5e3f63e27794d |
What design notes did we learn from applying pruning to neural ODEs? Our framework suggested that to obtain a generalizable sparse neural ODE representation, the choice of activation function is important. In particular activations that are Lipschitz continuous, monotonous, and bounded are better design choices for den... | d | d6ea17c045a63bcf208cdcda962c3014 |
The overall framework of the proposed DeepWORD is shown in Figure REF , which consists of two parts, the detection network and the relationship prediction network. The detection network is CenterNet {{cite:d345ca22752ba42f29244e6502842980aad80d56}}, whose main task is to detect the vehicle vehicle and tires from the im... | m | f85f34390e26a941220057583b5a38e5 |
We will compare the results based on the overall accuracy obtained. We will also see how the methods compare in terms of inference latency. In a real system, the network that can classify with reliable accuracy faster does not need to look at the entire duration of the input, therefore, can result in a power efficient ... | r | 3747c23b88bdf2eb6db5c6bbccce3e07 |
The well-established tube model of entangled polymer melts is a mean-field model in which polymer molecules diffuse within an effective tube arising from confining constraints from the surrounding chains.{{cite:45880605eadc7883934b38dbdf1f0141abb10d04}} This snake-like motion is termed reptation. The GLaMM model,{{cite... | i | a005d908da702d6b2070d216d9325d70 |
The data used in this paper are the Joint Light-curve Analysis (JLA) sample{{cite:039557bd477638671bb4d916d15417ea69e8b154}},
which contains 740 spectroscopically confirmed SN Ia in a redshift range of {{formula:c977ed28-4c75-4be4-8c3b-c40257ed4eb7}}
from the Sloan Digital Sky Survey II (SDSS-II), the Supernova Legacy... | m | b881078599f0a095f5ec630e488e881c |
Offline Q-learning performs well across dataset compositions in a variety of
simulated {{cite:1c6dfe18f8c9a74bec4390eebc08ac402b2d70cd}}, {{cite:2e1a5c2dc6c618d533273eed8cac7330a0d56a96}} and real-world domains {{cite:427cdeaa65a4edb91095eb25fd0b11b689da245e}}, {{cite:eba0c6dd1eede0be8ac677aea038cd0a39cf8958}},
however... | i | 8501ffb69c318b4a85fa12c93f286ebb |
We first introduce the standard sequential RANSAC pipeline for geometric model fitting (homography or plane structure in this work), with semantic cues as input with image sequences. However, we would like to cope with possible misclassification from the instance segmentation network, and therefore we do not simply use... | m | d56bbc4c1ce873b27a38de214da61346 |
We present the results obtained
without
the combined SHOES-Holicow determination of {{formula:bafb139b-d5fc-4214-97ac-56ae440ec495}} in Fig. REF and Table REF for the data set P18 + BAO + FS + SNWe have checked that the addition of a prior on {{formula:3a76298e-3e13-46bc-ac5e-f00448c10135}} to this data set does no... | r | f1c4cb41e3ba56280b3c342755f05670 |
The first inequality leads to {{formula:b0b64f2d-7eef-4e5b-8c0f-4b699a3f827d}} . Thus, the upper bound on the number of workers is {{formula:2ebba50f-f677-4523-bb37-fb24dbc26de0}} . Since {{formula:df47fe8c-5755-4c59-8c15-d4cf3bfae468}} , the second inequality can be written as follows: {{formula:22d55249-36c1-4163-b86... | d | 64e4b09ca0621b281ef182d5016d67c9 |
Our {{formula:c912ac4e-2488-48c6-b1bc-5e1bf13e624f}} -GNF with `The First Law of Causal Inference' are implemented and publishedThe {{formula:5b9d45da-32d0-4bb2-a32b-70a5c55d44a1}} -GNF code in supplemental materials will also be published at https://github.com/username/rhoGNF by adapting the baseline code of GNF {{cit... | r | 0673cf63aae908f9529bd4294bbe0d88 |
Higher spin gauge theories have attracted renewd interests
in the study of the AdS/CFT correspondence {{cite:722d8c25a713659df142b1f49caf3c08347a045a}}.
Higher spin gauge theories have been conjectured to be dual to simple conformal field theories.{{formula:a95df862-8da5-47b5-8ff2-8f9e74dbe611}}A bosonic higher spin ga... | d | a5371fda55cc6e2ee1452874402822a0 |
Following the work of {{cite:da0f53a395f9bebafd9af538c6d673aeba565d77}}, we have shown that we can reconstruct continuous surfaces based on (small) point clouds, where their implicit prior leads to surfaces that are smooth and interpolate well in space. This contrasts with, e.g., slice interpolation as is often used to... | d | 4075fd0234b3acb0058c861fe23e7e48 |
Note that we use {{formula:5fa6897f-2e10-4915-8ecc-31ee7bda3655}} to denote the {{formula:b2d57620-1e98-40bd-9af8-0e4d6b32cef8}} -norm of a vector {{formula:dd8ad38d-8b8b-4bf1-b91a-6b3dfa8e7f0f}} .
It is clear that {{formula:d68c3f5e-c280-446c-9a87-2739f125caf6}} is a Banach space. Moreover, since functions in {{form... | r | 837c1069263429294194c3462a725fda |
During the survey, we found that some methods start using Generative Adversarial Network (GAN) for data augmentation recently, which achieve better results than traditional methods. For example, DAGAN {{cite:75a5a28f8a8154253d4350bab5f6adb20e98ab6f}} succeed in generating augmented images for human face as shown in Fig... | i | d3dcf4d5f7d1b19c4df6f954761f54af |
The block bootstrap technique is one of the nonparametric methods that can be used to simulate from a stationary time series {{cite:28c892d556acc58803fa9ba420980d28faef6b48}}. In this method, blocks of the original time series are created using a block length parameter. The simulated series is obtained by resampling bl... | m | 178cff62150a0ebd7bbf770049692622 |
where we have separated the linear operator {{formula:20ec5857-28e5-4890-90d3-4515dd876f49}} and the nonlinear operator {{formula:93bf95fb-07f8-4e81-9633-57ab1f9b4af8}} , with {{formula:3d2156eb-b683-45f1-a248-073f3484e9dd}} and {{formula:206d2251-dc47-4ad7-a734-d38f4acafae5}} denotes the convolution. Additionally, ... | r | dba88ca1334171a3b1cf2e2c96b2a68c |
Dynamical effects in the coupled-ring lattice are another avenue for further study. For example, the transmittance jumps in Fig. REF (b) may form hysteresis loops under an additional slow modulation of the input intensity. Such designs may also be useful for limiting unwanted dynamical reciprocity {{cite:9843855eb05d13... | d | 4d7cb2f46958553051f9a4f2c28f6336 |
We are unaware of any prior work assessing transformer-based {{cite:664caee730e42a85e0f9ef6a444a351889fb4720}} DNNs with EEG data (raw or otherwise). This is perhaps consistent with the ineffectiveness we observed with the randomly initialized full architecture (3.) and could imply that effective use of this powerful e... | d | 829cf5be00a04ee1972b6e9c1bcef84a |
In {{cite:bb29e3971e603ede7e22c4f7d86a8c0d65b7cb7a}}, the authors introduce Multi-Head Attention has several attention layers in parallel. The output of attention layers is a weighted sum of the value, which the weight is computed by softmax function of Scaled Dot-Product Attention {{cite:bb29e3971e603ede7e22c4f7d86a8c... | m | 0652f50bf7451bd14d38ef2b130771ff |
We compare the proposed LaptSNE algorithm with vanilla t-SNE. COIL20, COIL100 and PenDigits are small datasets with no more than 10000 samples. MNIST and Fashion-MNIST are large datasets with thousands of samples. The scikit-learn package was used to implement both algorithms {{cite:db345ea12817ad9aadee1ac936306bef730f... | r | ce36d2274efb6116fbb5a0ffa355c19a |
The typical time-latitude diagrams for the dynamo models were shown
in Figures REF and REF . The shape of the simulated
sunspot cycles in 1D1 model can be seen on the right panel Figure
REF . The simulated sunspot cycles for the 2D1 and 2D2 models
are shown on the the Figure REF . We can conclude that the
shape of the... | r | c032827db4e923fcea13494224aea3c6 |
2) We now prove the claims on the superlevel sets using the {{formula:4e95953a-13fb-46dd-92ce-6d6bfb3b036a}} and {{formula:4315b986-8032-435d-a910-2f6fe0d7d0f6}} s of a sequence of sets in the Kuratowski sense (see {{cite:cf8db30002630d177ba640b8be3d9e8727095370}}). Setting the latent space {{formula:babcf5dc-227a-4f... | r | bb8579c52999183fd7bf1ea9f9e86bfc |
Following the method of {{cite:c58af16d0510c9e4917d6af34eefdacd38a8fd0d}}, {{cite:c1851f521c1d89fae4e2eee5af4f3a966b680f8d}} to remove the stiff term from this equation, we multiply through by a multiplicative factor {{formula:95e72d29-0f06-427b-be2c-762e58cdd962}} and introduce a new function {{formula:d92429f1-d9af... | m | 38cf615fc4b3b787fe33ebd4011283bb |
In this section, the values of {{formula:d747cab2-4cdc-418d-960a-86956422399f}} and {{formula:8d4a6113-2706-44f6-9aa3-3465a7a12702}} obtained in Section and summarized in Table REF , will be compared with those reported in previous works {{cite:adcbed41ab2e464741b48d113327dff6bf266ad0}}, {{cite:0ef089fb81a28e80a96bb... | d | 6c7642f661a5a2663c00e8a5faab18e1 |
The GP then performs inference as seen in section REF .
However, before inference can be done, the transformation and kernel parameters, {{formula:8eaa4e59-866b-476c-b3ef-b695eff66dde}} must be learned.
In practical use, the covariance matrix {{formula:4ae587a3-f196-4ee2-bd54-bb186f2d4365}} is approximated using the ... | m | 4d79f94f001eda9a30d62e810ed7ce55 |
Here, {{formula:51b53222-b042-4386-b53d-9e0054cb836e}} and {{formula:e2858397-03a0-4f21-a5a4-a897af88ed83}} denote the expected loss with hypothesis {{formula:58f3de40-c4e2-42b1-873d-4e9853f4d888}} in the source and target domains, respectively. Considering that the disagreement between labeling function {{formula:3... | m | cbe74b1218e3521f9a413c3f6ed3aa07 |
The process mining discipline emerged around 20 years ago {{cite:e81dd76f2b6ac7095af047df1c89325771b838c2}},
and today there are over 35 commercial process mining tools (e.g., Celonis, Disco, UiPath/ProcessGold, myInvenio, PAFnow, Minit, QPR, Mehrwerk, Puzzledata, LanaLabs, StereoLogic, Everflow, TimelinePI, Signavio, ... | i | 5a8e10556a80c3b4290fb0b01302f41d |
proposed by {{cite:e3acc2841c34549abf1e0215704025c9d01b4c99}} and the Gaussian ansatz
{{formula:df835035-92f6-4be6-b41d-ac19b1ca1250}}
| r | f96150bf313542374bf90ac6c5ba2a98 |
In this section, we present the experimental analysis to examine the performance of our proposed CUSBoost algorithm. We have used datasets from KEEL-dataset repository {{cite:8cd9062133632b3af3abd25cfe36cdc79db345b5}} with different imbalance ratio. Table REF show the datasets details .
{{table:68d788a0-fd7e-4de7-9f4d... | r | b015db11c0d7ea8fd14f8eb1f37a2e91 |
Readers are referred to Proposition 6 in {{cite:1fe7cfd95fa0be0f4eb3adf6063770b98750bf9a}} for more detail.
We should note that the important premises for us to use this available result are that the objective function of (REF ) is convex, continuously differentiable in {{formula:e7abcd0a-a223-47d1-8f78-e452c4c3cb22}} ... | m | 5b0ba9a50388bab81f8b818a3b11dbd8 |
In this paper we have shown how the known relation {{cite:d0932d6350b54519c5cc0af8758ae942c91035b4}}, {{cite:55984649241cbab8226248d94ee28c321956f160}}, {{cite:8227587682c074decb1c6f6f792b92e2c1b4de9d}} between modular invariants in 2d RCFT, Lagrangian commutative special Frobenius algebras, and topological boundary co... | d | 9bcbd9c8bd53abd9d9eff9475ea000f4 |
A secondary advantage of using 2.5D inputs may be that ConvNets that are pre-trained on larger data bases available in the computer vision domain (such as ImageNet) could be used. Potentially allowing the ConvNet optimization to start from an initialization that is better than starting from Gaussian random parameters {... | d | 073f55fe8bc1fd0201a813a0754e7dc8 |
Thus, a conceptually simpler {{formula:e2ad3a4d-01e2-4401-bdbd-59240c94ba89}} and perhaps more attractive {{formula:852ba499-6435-4d17-9371-58eaf04efaf9}} approach to realize our predictions is to consider a gain medium consisting of a continuously pumped superconducting qubit which is weakly coupled to the same reso... | d | 7fcc88374394ef7abef1855351db99b9 |
One of them is the ICARUS-NESSiE experiment (SPSC-P-347) {{cite:0cead21dd17c91a8673fa14068e92222f02289df}}. It is a joint proposal for the search of sterile neutrinos with a
short-baseline neutrino beam based at CERN. In the following, the new short-baseline neutrino beam facility at CERN and the NESSiE detector concep... | i | fcd53a96c32b70bf60a4a252e508fe90 |
On the methodological front, our work introduces new tools to the study of adaptive experiments. We show weak convergence to the diffusion limit for sequentially randomized Markov experiments using the martingale framework developed by {{cite:a73cbee75e4abc9565a29c7360401d0f6b112459}}, which hinges on showing that an a... | r | da9cc212cec2da7a3cd1125df9cabe77 |
We now restate thm:kexpr and show the proof. Note that thm:kexpr is different from Theorem 2.1 in {{cite:19637bfacec46394fc4730b429e325a0c6d58c9a}} because we allow repeated elements in {{formula:ec2f4bd2-ba92-442f-9a33-61d3ac826388}} as shown in eq:equaapp while they focus on all possible permutations of the input se... | r | d5dcfe6427d998ae919976d1f342e205 |
Binarizing the synaptic weights is another important improvement which helps optimization in hardware implementations of deep SNNs {{cite:0eb6b3515a68e089fe29c7809541e2919e8ec30a}}, {{cite:1aa51f561aaaa3e6f13e984f14fc00364cb4f8a6}}.
Current Binary SNNs are the converted version of pre-trained BANNs {{cite:3e287b55c5339... | d | 9c5503e2d65a8ecb742468887baef5e4 |
One issue preventing our protocols from further acceleration is the Kerr nonlinearity correction term {{formula:f7433801-5297-4290-977f-b5ae8fc088a7}} to the resonator mode dispersive Hamiltonian {{cite:f695c79f3c6ef681f51a6b70c61d58674f7cec1c}}.
While our methods are designed to work in the linear regime, increasing ... | d | 503c648e206291394df82019571bf93a |
To drive the system to a nonequilibrium state, we incorporate reservoirs with differing chemical potentials at its boundaries. We assume a weak coupling to the system (Born approximation), high-temperature memory-less reservoirs (Markov approximation), and that the bandwidths of the reservoirs are much larger than thos... | r | af18b9597200bc693b6f476d107517de |
With the explosive growth of user-generated images, it is also desirable to perform online continual learning for BIQA, where there is no distinct boundaries between tasks (or datasets) during training. Under this setting, Desideratum iii@ that requires no direct access to previous data seems too strict to satisfy. It ... | d | 2bb9fc8351c467f8041e83798344e44e |
In spite of this fact some physical effects of the pairs of complex poles can still be traced down in
the behavior of the trace anomaly on curved backgrounds. Under certain consistency conditions {{formula:a88659f4-573c-4b3e-b828-cd9f2a906238}} -theorem establishes
that the coefficient of the Gauss-Bonnet term of the a... | d | 13eb745b83aaf8e40dd712b42f306d0a |
Ab initio calculations: Density functional theory (DFT) calculations with the projected augmented wave (PAW) method were implemented in the Vienna ab initio simulation package (VASP) {{cite:57008cf014a7d5d9de27950203374546b61bf426}}, {{cite:b5144da82804f6e78839dfa91a8898253ae759a3}} with generalized gradient approximat... | m | 9a974649403c7a0e1602cc53e1433632 |
There are many potential avenues for further work. One might look for
non-spherically symmetric solutions of Euclidean biadjoint theory, and
also interpret the spectrum of existing solutions we have found in
various numbers of dimension, including their relationship with the
Lorentzian solutions of
refs. {{cite:df28138... | d | 0f884e470a79335583a9a98ea15ef29a |
For future work we suggest investigating the combination of our approach with other UQ approaches such as out of distribution detection {{cite:24d9f574c56c05a11529cd2424a443bbc614dbed}}. For this, we believe that it is possible to generalize our approach to consider also soft segmentations by adapting Equation REF ade... | d | 47904f3adb5096dfc989981cce6e34a3 |
In this sense, the TCC is a weaker condition than the de Sitter swampland condition (REF ) which rules out such cosmologies. Interestingly, the above time scale is the same at which the back-reaction of infrared cosmological perturbations indicates an instability of de Sitter space (see e.g. {{cite:21edf102f57e3b92084b... | d | 7f64b07e4a7658db9c2d70b0c0f09f45 |
In this paper, we shall study Linear Complementary Dual codes (LCD codes), which are linear codes that have a trivial intersection with their orthogonal. LCD codes were first introduced by Massey in
{{cite:350f7ee0fb7b661c1aac8152390d0b0906023601}} and were used to give an optimum linear coding solution for the two
use... | i | 5be0693f598d3e958d80333fb65e6203 |
In this section, we will compare the performance of spikemax losses with spike-rate loss on three different neuromorphic classification tasks. We use SLAYER-PyTorch {{cite:751cdbbf0f8dc2f61bff8a2f69882762677a3383}} as our SNN backpropagation framework. Our loss methods are implemented on top of it.
| r | b00f59df1a080d622dc097b878ff794f |
Together with the above, and motivated by recent concrete examples present in the literature, where the bound for the viscosity/entropy density ratio (REF ) can be violated (see {{cite:c84eff8174657b95a97caf4d4576036249e3470a}}, {{cite:1797c50a4f21a599118f75268a870a556270f268}}, {{cite:aa89024d0cd7ae238a2b648690604ca3f... | d | fc3edfeb7aaeafc62a55e79f6e89c069 |
for some universal constant {{formula:fc0fe0d1-cbdc-41a4-adcf-f64def80ceb2}} . Using Theorem 12.2 in {{cite:486266ddc844ed18a51ae0a6f599db41141f88bb}}, we have
for {{formula:72481de3-4c35-4a3f-aa97-6e211fc24608}} , where {{formula:7b2256b9-c132-45ce-8688-91a60c74fa1e}} ,
{{formula:82989bb9-9b1b-46af-8224-a294f6a3fc97}}... | r | 1ef9b45b0c3a11e7e21d5385387fccdf |
In this article we study the general characteristics of two type IIIb solar radio bursts and one U burst with stria structures present (typical of type IIIb bursts) observed on 22 August 2017 with the LOw-Frequency ARray (LOFAR; {{cite:e3899373814e7b3494f6229407fa257840a757af}}) telescope in the frequency range of 20 –... | i | f06c7b1356ac6aaedda0d9d7855c92ae |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.