text
stringlengths
54
548k
label
stringclasses
4 values
id_
stringlengths
32
32
(1) Social Networks: RDT-M5K, IMDB-B, IMDB-M from TU Dataset {{cite:c278079a7a24df2e91f6cae9bb3cdefb1befd422}}.
m
4c01905ed99b4900a21d79d39002da12
One of the interesting features of the compact objects is the strange quark star (SQS) composed of the strange quark matter (SQM). The composition of SQS was first proposed by Itoh {{cite:c72ab620863705691fe08faf0bb4dfbf532dc806}}; simultaneously with formulation of Quantum chromo dynamics (QCD). Later, Bodmer discusse...
i
d215e12244c14a64a07a538246f7f011
In this section, we present experimental results to validate the proposed sampling method for semantic segmentation. We first describe experimental configurations in detail. Then, we validate our SDSS on two public benchmark datasets, GTA5 {{cite:5e683ec1145c73ee70ceffafc8d43873cbb35ade}} and SYNTHIA {{cite:5125fd6d2c2...
r
4ca8ac34e10b08efe97e5b2dcdf36542
Crucially, Rényi divergences account for behavioural differences in a way that is formally distinct from a change in prior beliefs. This stems from the ability to disentangle different preference modes by varying the bound's {{formula:852c8c5b-3489-45ac-a65d-648e340f8c97}} parameter. Our simple multi-armed bandit sett...
d
97d562c8b0f67e6709c49c502a0f177b
Recall (i.e. {{cite:5383f078d4a9caa496a70eac17a524208a130f46}} or {{cite:384c38cdf793b89f73b95f75107ed3250dac308b}}) that there exist sets of orthogonal polynomials forming a part of the so called 'AW scheme' that are orthogonal with respect to measures with densities mentioned below. Although our main interest is in p...
r
9125a30c85c04762f675716dd4774808
A question fundamental to this topic is: what contributes to the strength of a tie between two people? Or, more specifically, what attributes of a relationship can we use to predict a tie strength value that properly represents the closeness of two individuals within a social network? This question has no singular answ...
i
532146b43aaed24ef20679d30257f80f
The Lambda Cold Dark Matter ({{formula:034edbd8-dd63-4033-95db-a43c2b03397a}} CDM) paradigm has been successful at explaining many cosmological observations. However, on smaller scales (galactic/sub-galactic), dark matter clustering depends on particulars of the dark matter model, so even if large-scale observations ar...
i
d0af522d926e86339c3c150068fe83e0
Please note that for the scenario, where edge fluctuations happen in the first iteration, the estimators are trained offline for just finding {{formula:5b1a2417-19a3-474f-8c6b-3fdc7404222c}} . Then, the offline trained parameters are used for initialization. For the rest of iterations, the parameters of the estimators ...
m
6ef0d51c83558e06cd4d5890ce6771fa
To avoid the tensor matricization and maintain the intrinsic data structure, Kilmer et al. {{cite:c3eaeb5ed2fd0c5198a085dddc2048cb5739ea5a}} proposed tensor singular value decomposition (t-SVD) and this motivates the new tensor multi-rank and tubal rank. Another advantage of such method is that the resultant algebra an...
i
2a187f2ff991cf5b82177bef54f56b4f
We focus on incorporating differential privacy (DP) {{cite:23672d53de4900a1ddb3dd12b8884e4c2d6bd2b7}}, which (informally) requires an algorithm's output to be insensitive to the change of any single entity's data. For MTL, using task-level DP directly would require the entire set of predictive models across all tasks t...
i
88a3554670b9a74a7f19449be65f9cdd
In order to analysis low performance of Co-Teaching+{{cite:2f05e56e762785ad1f4af6f9a6ef68d5b561467e}}, we conducted a series of experiments on CIFAR-10 with 40% noise level. Firstly, we used a similar architecture as the one used in their paper (pairflip 45% noise level) and reproduced their results (39%, 43% for Co-Te...
d
d56ad4aa93fa5c1c7c87d5d23f63e507
The results of the experiments conducted are shown in fig:experiments, where we compare the estimated graphs obtained with our algorithm in (REF ), denoted as “Joint-Hid” in the legend, with other popular graphical models. The algorithms considered as baselines are: (i) the graphical Lasso algorithm, denoted as “GL” {{...
r
ebc3e94e04445df9ba0405796ae6c815
In this section, we compare our qcmlb model to other recent approaches under two schemes: with and without the attention mechanism. In particular, we compare our approach to mlb {{cite:d258db54da38ba3929a45e37961abf2e4a3bd2c5}}, mutan {{cite:c554efaded139da94912dd1d7f87336a79bbab28}} and gmlb {{cite:e7f93a93defbd44a48c...
r
f8cdfa9559d5b4333d2469855fe607e9
In this paper, we have explored survival methodology built on neural networks for discrete-time data, and how it can be applied for continuous-time prediction. We have compared two existing discrete-time survival methods that minimize the negative log-likelihood of right-censored event times, where the first method {{c...
d
710544c8455e34c8aefe6e6b53e16347
Case-Based Reasoning (CBR) {{cite:7f301e206d571105500a05e8f7db164e8b57cdd9}}, {{cite:2b8b90b4a17c0a4ae41ed8a8da0f9efa30f09a88}} is used widespread across different domains, e. g., modeling of cooking recipes {{cite:14947496bfd266b42b8b002b37ecb4499aebf92c}}, prediction of seawater temperatures {{cite:bcf1f5a98901e3909c...
i
197781e57fd0ecc64d082b6c305eaaa2
Reference-less automatic evaluation methods, on the other hand, have been proposed recently. napoles-etal-2016-theres evaluated a GEC system using the number of errors detected by the grammatical error detection system and showed that it performed as well as GLEU. asano-etal-2017-reference proposed a method for evaluat...
m
ca81523ec50ecac241f0a16447e9020d
Eq. REF shows that the minimum planet mass required to sculpt a disc depends on the orbital radius of the outermost planet, which {{cite:b088677d3f6d557d07612762d23ed51cb1340aee}} argue is roughly the inner edge of the disc. Whilst such a planet would also clear debris beyond its orbit, and would actually be located i...
m
9271bd1d64c25523d911eb49727649a5
Motivated by the articles {{cite:aa690e84132321bbb3682590a4015365757660c3}}, {{cite:c1799e0aef6afe33e0f47723d0aa48d526b998e7}}, {{cite:a883da5d389561ca4a5059d7390f75f76edae9ab}}, our primary goal in this paper is to present a version of the penalization technique that will enable us to obtain results on the existence a...
i
02c7d54df23fa5a36437187f8a0243a2
Following the setting in previous works {{cite:f89291a7d41e1e03b3b74d1cd058e45e314ebe88}}, {{cite:002c7a2f2b9d3b1db96cc27e38ef0b40529c1e79}}, {{cite:d9474197916441736c467cd9bce3963599af46fe}}, {{cite:002c7a2f2b9d3b1db96cc27e38ef0b40529c1e79}}, {{cite:d9474197916441736c467cd9bce3963599af46fe}}, {{cite:63bc7c3e706778d7ce...
r
7aa49492fcdbeaf5092838238a7b3509
Our results suggest that while an efficient normalization is not sufficient in itself to achieve good performance on ImageNet, it is still a necessary condition, together with regularization. In our results, it is always with extra regularization that PN yields the most benefits. Importantly, the fact that PN consisten...
r
fc99591e07f5f23cfbb1066c5d2ec835
Unlike recent SSL based methods {{cite:71ca1f18456cb1eb40fcae1aff2f5609c204f035}}, {{cite:64a9e522931964710d6077a2ecf4b3f53c967ccd}}, {{cite:713b8b129c05906e1fcfc844ce73e25bce4b1b51}}, {{cite:69de16f9d1f8ece2377afb840e3ca4027f7b374e}}, {{cite:3336ea291da21a5dc3ddefe6cb0742770085394a}}, {{cite:d0e09d47299cb5087ddbbaa8a3...
m
22184d7bc50325c8ee972b4b7671544c
We provide here (Table REF ) the full results of the state-of-the-art comparison (Table in paper). We report the additional CRPS metric. We observe that STRIPE S+T obtains the best results evaluated in CRPS on the Electricity dataset (equivalent to DeepAR {{cite:d86431cc5d09ff65b65ea4bae85d998e3cd9c966}}), and the sec...
r
4f844472649c0d761fc370924c4da836
While intelligent systems must typically undergo at least some amount of training to function, it can be useful for certain computational features to be built in {{cite:17b37b92c3802111add0afe6d63de7eb0073d724}}. Flexible compositional coding is of particular relevance as it provides a substrate for computing with nove...
d
e2b8b898f3b6166b3a0ff7f806c5d82d
This disk transition may be important for the evolution of misaligned, eccentric-binary+disk systems {{cite:b8fc17cc969ad6460771245553563596dd10f7b4}}, {{cite:e0f9c159f8f007f35dba4c89c8864aec1c961246}}, {{cite:ec64d11b71c1afeaeda0fe5e26af03460ace2c68}}, which could be investigated in future 3D studies. There may be imp...
d
7172bac116905a931f253f988916a841
The deep networks that are trained by the standard gradient descent algorithm are memorizing the training data, and use the memorized samples for prediction with a weighted similarity function{{cite:4f06da3e97d407f0e7c4088d02227f4ac8060fdf}}, {{cite:e28474cbb3abf55a70c4a7218d427f047af391c4}}, {{cite:d7c25e1feb7b61951f6...
m
e5edbf8dc54809f20591387c0a7f7471
The first method, referred to as I-VAE, is based on the regularization proposed by Adel et al. {{cite:fed41458abf4a02e55feade9259d2b676c20b18c}}. It uses a separate linear classifier attached to each regularized dimension to predict the attribute classes. Note that while Adel et al. use this regularization while learni...
m
7b0114b9b58906b1f9f7815b6a542117
The solution curve of general differential-algebraic equations is not efficiently followed on an infinite interval by the traditional ODE method {{cite:e48b0a861e2e4db7323b451fcaac01996cd3855b}}, {{cite:12d1d34a32897463012a0d9615b12cab14b0549e}}, {{cite:8ad8129bee016ff865abb59c5b06d851392e96d6}}, {{cite:f4122f60bee116c...
m
2b20a72c6e6cdf4ca112b0bb854891c3
However, developing such resource scheduling algorithms for DNN training clusters is highly non-trivial. In a computing cluster, DNN training jobs are submitted over time with various competing resource requirements (numbers of CPUs and GPUs, size of memory, etc.), and the training process is both resource-intensive an...
i
0896ed52fe818d3e4eba073ba2dc931a
Because our protocol is an MDI-type protocol, the density matrix of the single-photon pair component is always identical in the X and Z bases for each user, regardless of the asymmetric source parameters chosen. This makes it possible for a dynamic quantum network to add or delete new user nodes without considering the...
d
22475cb8f57a28fbfc48b66174b97a70
In order to evaluate the performance of the proposed algorithm, different types of images as text, face, natural and low-light images are studied in this section. Also Windows 10-64bit, Intel(R) Core(TM) i3-5005U CPU @2.00GHz, by matlab 2014b have been used for the calculations. The results of the algorithm are evaluat...
r
d5d5d36b9948e98fc27d87a483f65dc5
In general, the methods presented in this subsection all have the weakness that they are specific to the problem of instrumental variable regression, and do not necessarily generalize to other conditional moment problems. Conversely, our VMM approach not only enjoys strong theoretical properties for this problem, but i...
m
a673bef00928c4e12e4c38119f8e9f99
Concurrently, there have been solid advances in theory of SG-MCMC methods and their applications in practice. Sato and Nakagawa {{cite:77d3878a3d0b87042cd275c0dd9dbf19131d048d}}, for the first time, showed that the SGLD algorithm with constant step size weakly converges; Chen et al. {{cite:f0fac9bc0e00afed6c52735d4d3e7...
m
eeee8fe497c3f16caa4db931be5e0119
The fourth term of (REF ) is {{formula:f5a2b358-18e4-4604-ac54-b2dd207bab20}} . It is the smoothness loss, which encourages neighboring pixels in the in-plan direction to have similar transformation values {{cite:e165267a0a88f248612e48fa8d356f21ba2e365b}}. The loss function of {{formula:8451e884-9e37-424f-b583-9148596a...
m
9098c03738b9b2417fac974d8c01360f
The idea behind gravitational leptogenesis{{cite:fb38db8334e4cc53943119a04cf7d8da7f317f72}} is, a C and CP-violating operator {{formula:bc9a95ea-c4de-47fd-93cd-f2667fce1d14}} with {{formula:fa0b631c-a29b-44a9-b59a-b46d10e7598c}} as a real effective coupling, corresponds to a chemical potential {{formula:9d5eaf05-2ceb...
r
af05622e7039cf26592300de06232483
Finally, regarding our proposed SGD we must note that similar results might be obtained with a MCMC method where information about the gradient is taken into account. For example, {{cite:2e3649e2af0a8f7ea279ff086879958482f2e4a0}} use a Metropolis-adjusted Langevin method which basically follows a gradient-descent and a...
d
3a434cb786b56246a22998caa49d64c1
We choose this family of models in order to be consistent with early works that analyzed training and generalization properties of neural networks in the NTK regime {{cite:2c8f514609cbd24f1fb3c3a4be4c58decfa54acf}}, {{cite:95316b25dc1aa454aa615e88eafabed58c5a2782}}. We perform experiments on image classification on MNI...
r
5b5d14354ba2cd71f3886a4d5cac659d
Content-based filtering, user-based collaborative filtering {{cite:f969efaa73925f16947d9116f30eb434f3f58687}}, item-based collaborative filtering {{cite:f969efaa73925f16947d9116f30eb434f3f58687}}, matrix factorization using alternated least-squares {{cite:279fce2b3c41e8a4700cc7dd5f4508a7938f17df}}, and matrix factoriza...
m
314f6c4ec98a0c0df877db216af0508b
Table {{formula:2efab0d1-97cb-48b9-b413-774594caf731}} shows the prediction accuracy for phase shift of each element on RIS in the testing stage, where the prediction accuracy is defined as the probability that the prediction result is the same as the CEO algorithm. Here, the prediction accuracy shows the generalizati...
r
f703e25f8aac6847a67608e838e8c5b0
Ngiam et al. {{cite:312711813481a7c3fb569e00c71ec5dd54e62e8a}} were the first to address a multimodal deep learning approach in audio and video retrieval. They trained deep networks for a series of multimodal learning tasks to learn a shared representation between cross modalities and tested it on a single modality, fo...
m
6bc353b504a90c4f3b80ced656e1bcfc
The wide range of relevant time and length scales in polymeric systems makes them natural targets for multi-scale modelling.{{cite:f145425f51eddb960be51fd74eda45a2e52a94ca}}, {{cite:82347404939cd5ae38e6ef4ab9b318784d80e197}}, {{cite:49a562270f2a03d7ca9e7198577bdec45e8ff605}} In particle-based models, the resolution ran...
d
7bf58ff98bf7aa3b9859d9de3d9a4954
if the limit exists for each {{formula:16d05a98-f539-48d5-8c7f-759b8b146cfd}} - real number. The notion of asymptotic density allows define the asymptotic distribution function analogously as the distribution function of random variable in probability space. This leads to the possibility of application of results of E...
i
6acc57e7710d0c7b2f6eea6762fdf7b1
Theorem 2.4 (Local minimax lower bound) Let {{formula:24a25f77-be9e-4244-8fac-cdbce6d5146f}} . Then for any {{formula:67ebe629-0410-43bc-a3ca-4588c23923b1}} , as long as {{formula:35b80f8c-fbbe-4102-9d26-27dd3a2dde2d}} , it holds thatIndeed, the lower bound holds for blackboard interactive schemes {{cite:96a534b7e8a0e...
r
18f865cea4e4851607dd79358988f536
We have evolved a large number ({{formula:a9cfd899-e74f-4dde-8d31-8970b39e7f0e}} ) of binary systems in each model, by setting a grid of initial parameters as follows. The primary masses {{formula:37bfda44-4105-4f2a-99f3-5b1442b022e9}} vary in the range of {{formula:ed33867c-148c-46af-ad23-411634023cd9}} , the seconda...
m
66bf355dee5ad4da4bb65571dff771f7
Method and Scoping. We synthesize available literature that uses explainable ML for (offensive and defensive) cybersecurity tasks. To this aim, we collect relevant literature, construct a taxonomy based on common themes (i.e., application objectives), and classify the literature into those themes. Applying a reflexive ...
m
f793e1ca566810a523e1b3d1b23e0927
Classical Neural Networks ignore the underlying physics. In the most general form, constitutive equations in solid mechanics are tensor-valued tensor functions that define a second order stress tensor, in our case the Piola stress, as a function of a second order deformation or strain measure, in our case the deformati...
d
59a6fe9f4aad31b4213249778e943cf8
In the article {{cite:8287f1c468c3665cd418193ff83348583cf5e904}} we have presented construction of {{formula:7caff93a-d71c-4188-9630-2294eb697c79}} -dimensional integrable bi-Hamiltonian systems associated with Novikov algebras. These systems are multicomponent generalizations of the Camassa–Holm equation {{cite:1b82f1...
i
9b1dfda62f34a9d0fea70da8a8770fca
Building on DirectPred {{cite:cc1ba31928c75ade75fb6a7ff5273342e824d20c}}, we presented a simple analysis formulated in the eigenspace of representations that illustrates how BYOL/SimSiam's asymmetric similarity loss avoids representational collapse. Specifically, we showed that these architectures induce an implicit lo...
d
9c00605899e464902ae105c6bc4bca53
Both H{{formula:822e5376-e209-4bfb-a5c4-26b2857b871f}} CO and CH{{formula:4a7d35e5-d5e4-4690-8c30-b43b3f258c38}} OH lines are firmly detected. IRS 48 is the second known Herbig disk with a detection of CH{{formula:eaf9d9d8-3229-4d87-9952-01573cf02eda}} OH, following HD 100546 {{cite:02d4f1e9f33b54e46e7cd0c18c4ca471c1b5...
r
a0bcf04e1257ddbe37ec5848446a743d
Statistical or machine learning approaches have been in existence for decades. While machine-learning and statistical methods are sometimes classified separately{{cite:16193862921fc1be91b050160d144e6def7f1fc0}}, we group them together as “statistical”, as both terms encapsulate approaches that use patterns from past in...
m
3b65216fd83e820e8a15bfef9e3195b4
Search for and exploration of mesoscale quantum phase transitions in materials with non-magnetic order parameters. For instance, it is well-known since the early work of de Gennes{{cite:073fd219186558daad4530444bfe9f59f304da95}} nearly seven decades ago, that ferroelectrics are also model systems par excellence of the ...
m
16f04116da8bd8a2f9480be7d92519c4
This result extends the work of {{cite:74d2083a954c76d292d4c203104fab0b4cfd3dd3}}, who examined prompt emission only, to the temporal domain covered by XRFs and reinforces their main conclusion that the two techniques, wavelets and pulse-fitting, can be used independently to extract a minimum time scale for physical pr...
r
0077f54a739ee4525cf319933f949369
Another issue that was only briefly touched upon in section 5, is that of line emission. It is generally thought that the line emission in AGN comes from clouds in pressure equilibrium with a hot intercloud medium, the result of the X-ray heating thermal instability {{cite:ea80d8232e59a153e141c5ad6e38d44ba6994640}}. Ou...
d
26e547eb74a4d83bff2434e664091b49
From the perspective of objects, relationships, and messages, the above methods can also be divided into object contextualization methods, relationship representation methods, message-passing methods, and relationship context methods. In the scene graph parsing task, all objects and relationships are related; according...
d
582d670c18f0ddc724482b7849b9c7c2
In fig:distortedconst, the GS-128 constellation, optimized as described in {{cite:4ebe67f0a58ac5f3afce5c3ef2bb542d28374d80}}, is shown. fig:ngmiswing depicts the NGMI when transmitting this constellation using only linear precomp for different output swings of the DAC . Higher swings are associated with higher transmit...
r
a2c1b0da6fd6fa837d8545574ee19c96
A powerful approach for training models without requiring a large amount of labels is semi-supervised learning (SSL). SSL mitigates the requirement for labeled data by providing a means of leveraging unlabeled data. Since unlabeled data can often be obtained with low human labor, any performance boost conferred by SSL ...
i
b5d1f51ec7ae3be0bbac560853047713
We compare AdaProp with general KG reasoning methods in both transductive and inductive reasoning. In the transductive setting, the training and test set share the same set of entities and relations, i.e., all the entities and relations in the test set are visited during training. In the inductive setting, the training...
m
9faf28f55f26e52e449ffa4faf2dd69e
This is the main aim of this article where given the importance of the tensor current in QCD for exploring beyond the Standard Model we will compute the Green's function with that operator inserted at zero momentum at four loops. This will extend the equivalent three loop exercise of 20 years ago, {{cite:3d8a6cb64d469e...
i
8f57a24744b170a3c072318e3e28e0cb
Contributions. Interior point methods are a much used tool in convex optimization {{cite:9b53fcd561cb0dcac18f2db6f99dfa17dbf05d6d}}. We propose using the log-barrier function on the coupled inequality constraints as our inexact penalty function. The GNE problem is then converted into an NE problem whose costs go to in...
i
7725ea3a718d66fc2bbcb90fdeeaa509
where {{formula:884ed852-b90f-4807-9e6f-3610d9422743}} denotes the {{formula:0e7fd71e-0001-4da8-84e2-5776d7d63a73}} -th row of matrix {{formula:7d7f8a60-d489-45c9-b504-aaad39da8ec5}} . Standard Gaussian concentration results {{cite:a25f36e3af92f5ddcee18972955432b98a6515d4}} reveal that {{formula:e3a22a2d-7243-46a3-99...
r
1de0c99dc7798b8e20a6f73cb5980a87
Although direct sampling methods have been studied for many inverse scattering problems using far-field data there is little to no investigation for the case of near-field data. The imaging functionals are also studied for both isotropic and anisotropic scatterers. In order to construct our imaging functionals and anal...
i
f509eec6c2ba1cd6dcc054219ea34f43
a fixed `cross' trigger pattern at the top left corner of the inputs. When selected, the adversary updates the broadcasted global model using backdoor images for 6 local epochs with an initial learning rate of {{formula:84765595-238e-44e9-968a-6b989511e007}} that decreases by a factor of 10 after every 2 epochs and up...
r
354f3c611747e967bb0d379fc9adeeb5
For that purpose, we consider the fermion loop correction to the effective action in a simplified Higgs-Yukawa model. This toy model captures the essential features necessary to grasp what is going on in the realistic Higgs inflation model: As in the real world, we neglect the Higgs mass term which is much smaller than...
i
6f1a643ff1f1e224c58cf952c127dd3c
RQMC methods are finding uses in simulation optimization problems in machine learning, especially in first order SGD algorithms. We have looked at their use in a second order, L-BFGS algorithm. RQMC is known theoretically and empirically to improve the accuracy in integration problems compared to both MC and QMC. We ha...
d
15982662f8a38ae2be43103291628882
A method to contextualise knowledge graphs is to express the facts that they capture as projections of frames. Frames are cognitive structures that are used by humans for organising their knowledge, as well as for interpreting, processing or anticipating information (cf. {{cite:383dc8d066e3b6d3aaf3108e33876917f54f3734}...
i
3ea38e3d6c8d40dd0ed2163dba9c208a
In this paper, we chose MNIST {{cite:1b19c3f72cded66f1c7dbd5d533461742052f2f7}}, FMNIST {{cite:69f38e4979ff47b264e39db8a55c192794906b3f}} and UCSD {{cite:7a9b937d16e7c1ed4d6424beb8c8996bba0ff751}} for anomaly detection. These benchmark datasets are widely used in the anomaly detection literature. In the following, we p...
r
0e48edb9d2d1634a650f4ef1fb7cf0fc
Scaling to larger TSPs: We note that works such as {{cite:a0e53a462d923b4965daff1b49c87c1ca4cec3a4}}, {{cite:079f8af99f4b8dc89dece1e16cfba9b97aeb52fb}} are able to predict on larger TSPs. However, a key difference between our work and these is that these works rely on a pre-trained supervised learning model in {{cite:...
d
c44396a29f2b20954d2a078fe162092d
All of the aforementioned algorithms are analyzed on three test cases of different dimensions and complexity. The first test case is the 0D model proposed by {{cite:aef93e32fc2601efd4803289b00b638e098d31a1}} as the simplest dynamical system reproducing the frequency cross-talk encountered in many turbulent flows. The s...
i
2a0745e4990491c0ecd4a12dce764b67
where {{formula:42a57c60-ffe3-4097-be07-220be29fe475}} and {{formula:656b90f9-da0b-414d-b9bf-ed9537618fe3}} . If {{formula:60506162-551b-4023-be01-b4224f05ebd2}} is bounded from below and {{formula:71c07391-1d77-4886-af69-c40e23e86b54}} , one can obtain the rate {{formula:70a2b690-9dff-4617-8248-07d2718cb1d0}} and {...
d
ab48678231e652aceeaba10f46f2fa9c
We introduce a new graph-theoretic concept, that is motivated by the problem of network monitoring, called monitoring edge-geodetic sets. In the area of network monitoring, one wishes to detect or repair faults in a network; in many applications, the monitoring process involves distance probes {{cite:e988561c8f9d84ec77...
i
b61f4d017b24567ca00db783d0ba3bbe
We also showcase the impact of JPR in downstream question answering which takes the retrieved passages as input and generates the answers. Improved reranking leads to improved answer accuracy because we can supply fewer, higher-quality passages to a larger answer generation model that can fit on the same hardware. This...
i
247de33ab3d99c69949db58517c31b80
The past decade has witnessed rapid development and growing popularity of blockchain technologies. This has been attracting tremendous interests and enthusiasm from both research communities and industrial applications. The blockchain technologies were originated from a digital financial sector as a decentralized, immu...
i
2438295dceb37ff040310cab4e5d4ec8
The standard way most detectors are evaluated in the literature is to stay in the same domain and use similar datasets. The error rates are based on a narrow binary classification and due to this there are much better error rates. You can see this throughout the literature where there is one domain, like TweepFake{{cit...
r
819367f6878ff42cdcb7cb4520f04c19
The consistently strong performance of one-hot encoding suggests that position-wise information is crucial for function prediction. Averaging position-wise embeddings only captures the frequencies of each embedding dimension and destroys local sequence patterns which may be important for function prediction, consistent...
d
517c8c6250c8a16ff4e4200c6e8bcc46
implies that {{formula:941a93b5-05ae-45dc-bf2b-5b324a9cacff}} and {{formula:5009e852-9aac-4ab7-9e5c-9ef36c48e825}} are {{formula:ab70d8ca-a819-488b-8cf3-7b883d34f641}} -linearly dependent. Hence, {{formula:3aaf8507-ebd1-4105-a390-d5091beb3874}} -polynomials satisfying this condition are called scattered by Sheekey in...
i
bed3105655e5de5e66df2e6450f64031
In order to explore the effects of the different bacterial reproduction mechanisms, we have used a very similar methodology to that described in {{cite:42ef9dd06d98b6f5e7d3373db459615faf2ad756}}. Thus, the first stages of biofilm growth, when it can be considered two-dimensional, were modeled using an Individual Based ...
m
55991b43d361dc2a6389a9b9f1e59882
The proposed method is evaluated based on 3D cardiovascular MR images from the HVSMR 2016 challenge {{cite:5a8bbb9a8ae73da9623c24e6f53a5c85eb752440}}. The set consists of ten axial, cropped volumes from ten different patients with ground truth annotations. The images are segmented according to three labels: background,...
r
2fc8a6bf3c9dc4f8999b6b490190f981
The outburst's peak bolometric luminosity is roughly {{formula:e1c95ef4-46b6-4702-b4c7-6161eed3c300}} 30%{{formula:a66caa45-3057-4d2a-b79a-7bf5132707d0}} under an upper limit of the distance 6.3 kpc. Based on the normalization of the disk emission derived from spectral fitting, the estimated inner-disk radius is {{fo...
d
11eaf1977ce7d9b834081bf2495b39fb
In order to train the network using gradient descent, we need a differentiable version of loss (REF ). To do so, we use the re-parametrizable Gumbel-softmax relaxation {{cite:5ab754571fcc24fb1e2b63d2a9bbd46320e26de1}}, {{cite:e566e5359a7dbc909c675556f1daec7ba1e9197f}}. The Gumbel-softmax relaxation replaces categorical...
m
7828f4da6e1357474b61928bc3f2b376
Due to their close relation to rank-metric codes, {{formula:c787a207-ed5a-42e1-81d0-eaa5b9de627c}} -matroids have gained a lot of attention in recent years. They were first introduced in {{cite:656d0373bd74be79e6f6fdd604550fbcf9bbf40b}}, and their generalization to {{formula:a260abff-6309-4f47-a619-b7cc51a08db1}} -poly...
i
239ebd05a4f84a8ac82498f6b73216de
Even though autoencoders are designed to learn a lower-dimensional representation of the input while minimizing information loss, in this work, we used them to perform semantic interpolation and thereby recover spatial information in anisotropic medical images. Specifically, we used an over-complete autoencoder that ca...
d
1091cad3987dd9d78a02aefe9cfe59f4
we associate univariate B-spline basis functions {{formula:0742ee8c-347d-4ade-9ea9-4e6a3740d97a}} , where the integers {{formula:55df4157-1694-4362-8461-cd6f2a298a34}} and {{formula:d1c4a858-d8da-4f63-854c-881c86193ff9}} are the polynomial degree of the B-spline, and the number of basis functions and control points, ...
m
3524e0aea389d72f1ec1d99b1705676a
As a measure of the resemblance between the experimentally measured correlations between each pair of modes {{formula:d2e5a63a-1ee3-49f8-b114-24f4b53784b2}} and the theoretical predictions {{formula:b8b49441-9c6f-4c11-ab0b-ebce64d00d39}} for each unitary transformation, we utilize the commonly used statistical fideli...
r
62712899b6fccc79949871ceb6a8c7aa
In the case with the SH0ES calibration, we obtain tight constraints {{formula:033e6df0-301d-4c1f-b7b2-d1cbeca6c3d2}} km s{{formula:bdd64e55-4e18-4606-8635-a8f15aea2a83}} Mpc{{formula:867d9424-29be-4e21-8940-f5956b03cc0f}} and {{formula:e081fceb-8c74-41d8-bce7-5d4a5322325b}} , which produces an evidence of DE at the ...
d
7102a91f504d3bab104a5ab52910ecfd
Our goal is to build a generative model for vector graphics that does not require vector supervision, i.e., that only requires raster images at training time. Our model follows an encoder–decoder architecture (Fig. REF ). The encoder has a standard design {{cite:a0cb63b06d03ed14b894b6dbf20694fd8c1c555b}}; it maps a ras...
m
6a281135a184b21bc5dc7357a2af7287
Next we consider sampling algorithms for composite potentials of the form {{formula:5f3fe128-6b46-4e33-863e-2273e15a1a7a}} , where {{formula:b99ff3d7-ea94-4158-9318-8f3dbcd91fe6}} is convex and smooth, and {{formula:f917f2bb-6d75-45a4-a8e9-0332ba3dc60c}} is convex and non-smooth/semi-smooth. In {{cite:14543dd7d7b33c5...
i
2390edf2637635101558b152ade3f9aa
where the components of vectors {{formula:9eedf8bc-1e9c-4e1d-90ca-78463331b8e0}} and {{formula:baeeff40-a9a3-4ead-bfc2-ff4b0046bbee}} are {{formula:7610dd5c-2b4b-42de-88f1-e2c0f1d8e06b}} and {{formula:0794b9f9-5bbc-4689-8edb-2dba5d578eaf}} , respectively. The inequality follows from the Cauchy-Schwarz inequality. T...
m
4af51d727cf7d217e7ebf0b1c66d2528
In our final submission, we chose RoBERTa as a sentence encoder and sampled {{formula:688de953-778f-473f-8331-13c8408a09de}} texts per user for Task 1 and {{formula:beb9f92f-1875-495f-a0e2-0673c3d88cef}} for Task 2. We used the standard formulation of the transformer network {{cite:4c2e100f2308ddf0858b2448a5cc0e98d10...
m
ca4aa9bb58d8462ffc3bdd680c5f62d0
Last year on May 24 the SpaceX launched the first set of 60 Starlink satellites and up to now the total number is approximately 400 aiming to reach at least 12000 {{cite:967689ac2c467827ae46ade3a1d997d6df9d2403}} at the end of a decade program announced by Elon Musk. Such a huge number of satellites, distributed over a...
i
d0a612cb019942cf5b756b46be132889
The proof relies on the asymptotic behavior of {{formula:2f98ac96-ab26-40f4-8e7b-c630faaa5c1a}} and {{formula:6d2a5ce5-b479-4d5b-80f8-fc34b39c4300}} as {{formula:72341275-cfe4-457b-9c0b-8ca7c4851d3c}} , which is an idea similar to Sakamoto and Yamamoto {{cite:3c21a3bd190796097a8a53e7fa719cd1a4590833}}, Yamamoto {{cit...
i
f248876eb7ba81d977fbeee07778e751
where {{formula:bfca47ca-8919-4db6-90c5-0f421f107791}} is the spectral quality factor, {{formula:0aa6b547-3521-4d97-81ce-2b2c2c9bd780}} is the resonant frequency of the vibrational mode, and {{formula:31217939-8a70-4f75-a492-8f79c9f43a3b}} . Figure REF b shows that {{formula:e51badec-eb83-450b-a481-9d381f561ccf}} is...
r
71529d8595b0948ca972595d22361ad2
In recent work, H.Yakura and J. Sakuma {{cite:07803760aa0b68cb4c27712c50c43b76eb8f6d90}} put forth a method to generate a robust adversarial example that could attack DeepSpeech {{cite:9ef9f2300a5092069779371a179cf193dd41e69c}} under the over-the-air condition (e.g., the given adversarial example played by speaker and ...
i
6c5987f655198bc73692aa74810076e8
      It is impossible to quantify the learning rates of kernel methods for time series without presenting any restrictions on the dependence among samples {{cite:62a05573567e8385081cfa5eebef629d4261de17}}, an extreme case of which is that all samples in the data set are identical. Therefore, some mixing properties {{c...
m
c8977aa6f7a9bb5b4bdc160c91272027
Numerical evaluations presented in {{cite:60bb69197bd987af721eaf1cef0ed59ccc28fe18}}, {{cite:d77f19f43a084941449ce20aac092ae652784e0a}}, {{cite:3dac1e0621c1c20ce765dadc624655ffe27e8b22}}, {{cite:e327fcd3bc0a8bf1aa18695dd9b228ac42943efb}}, {{cite:42181b50fc20f32ea0b5812a02caa68d9d914c22}}, {{cite:961d8094111646ac05c22fb...
r
e9a017c92654139dd396afa99cb2fbd7
The sensitivity of our TMC-1 data is better than previously published line surveys of this source at the same frequencies {{cite:5ad8f3b4fb04c96eab60d3f9198a29ca17ca88a9}} by a factor 10-20. In fact, it has been possible to detect many individual lines from molecules that were reported previously only by stacking techn...
r
6e1f107b7fc00eaa02b09f7a18bc18f9
In the models under consideration, the asymmetry between the ascent and decent phase of the sunspot cycle is inherent from the pattern of the toroidal magnetic field activity. In particular, the 1D1 model has the toroidal magnetic field butterfly diagram with maximum located very close to equator. Therefore, applying t...
d
da6031b9a692088c9ecd8e2ac1b34b51
While the literature suggests that a second-price sealed-bid auction is optimal (in terms of revenue for the auctioneer) for our setting {{cite:66f294e260454a8d1a06a566e6034ab147490eeb}}, this type of auction is not widely used. Two-stage auctions, however, are common. The optimal two-stage auction design when the valu...
i
f7cffed8325a0159e31b214081176ede
DANN Component: In ML-based NIDSs, as is the case in other application areas as well, it is difficult and time-consuming to label real-world data. Consequently, synthetic datasets are often used for training and evaluation of machine learning models. However, these synthetic datasets usually do not adequately represent...
m
b8ed6ee7dbc11235db7ffac190b69adf
The MCMC results in this study successfully capture the true parameters and their uncertainties. The results contain natural biases arising from the use of prior distributions, internal variability of the climate, and use of a single noisy sample as synthetic data. Despite the sampling variability and emulator constrai...
d
a038786e26237c605004ed5bc663bbc3
this choice leads to an interpretation of (REF ) as a simplified manifold MALA proposal (SM-MALA) in which the curvature of the target {{formula:5fe879dc-586c-4f60-a6ae-9031a155263e}} is assumed constant (but remains position-specific, {{cite:5b03abd586f460ecce196db406ea592ab292ce49}}). We make a connection between a ...
m
aa75dc23381a7445854dae5d3f5eaee1
Remark For a general graph {{formula:b2e30cea-320d-4326-bb8a-f938195f7f19}} , the best-known mixing time bound is {{formula:afa2ce6e-d941-494a-9934-84eef71a763e}} due to Jerrum and Sinclair {{cite:2926ce42a87250a7560ac7b3c9a5cc7479164df0}}, refined in {{cite:5d6baa6265f296225c698f6e2238f387a94852b9}}. On the other han...
r
39b77ce72b8445fef8b24909a5021108