text stringlengths 54 548k | label stringclasses 4
values | id_ stringlengths 32 32 |
|---|---|---|
(1) Social Networks: RDT-M5K, IMDB-B, IMDB-M from TU Dataset {{cite:c278079a7a24df2e91f6cae9bb3cdefb1befd422}}.
| m | 4c01905ed99b4900a21d79d39002da12 |
One of the interesting features of the compact objects is the
strange quark star (SQS) composed of the strange quark matter (SQM).
The composition of SQS was first proposed by Itoh {{cite:c72ab620863705691fe08faf0bb4dfbf532dc806}}; simultaneously
with formulation of Quantum chromo dynamics (QCD).
Later, Bodmer discusse... | i | d215e12244c14a64a07a538246f7f011 |
In this section, we present experimental results to validate the proposed sampling method for semantic segmentation.
We first describe experimental configurations in detail.
Then, we validate our SDSS on two public benchmark datasets, GTA5 {{cite:5e683ec1145c73ee70ceffafc8d43873cbb35ade}} and SYNTHIA {{cite:5125fd6d2c2... | r | 4ca8ac34e10b08efe97e5b2dcdf36542 |
Crucially, Rényi divergences account for behavioural differences in a way that is formally distinct from a change in prior beliefs. This stems from the ability to disentangle different preference modes by varying the bound's {{formula:852c8c5b-3489-45ac-a65d-648e340f8c97}} parameter. Our simple multi-armed bandit sett... | d | 97d562c8b0f67e6709c49c502a0f177b |
Recall (i.e. {{cite:5383f078d4a9caa496a70eac17a524208a130f46}} or {{cite:384c38cdf793b89f73b95f75107ed3250dac308b}}) that there exist sets of orthogonal
polynomials forming a part of the so called 'AW scheme' that are orthogonal
with respect to measures with densities mentioned below. Although our main
interest is in p... | r | 9125a30c85c04762f675716dd4774808 |
A question fundamental to this topic is: what contributes to the strength of a tie between two people? Or, more specifically, what attributes of a relationship can we use to predict a tie strength value that properly represents the closeness of two individuals within a social network? This question has no singular answ... | i | 532146b43aaed24ef20679d30257f80f |
The Lambda Cold Dark Matter ({{formula:034edbd8-dd63-4033-95db-a43c2b03397a}} CDM) paradigm has been successful at explaining many cosmological observations.
However, on smaller scales (galactic/sub-galactic), dark matter clustering depends on particulars of the dark matter model, so even if large-scale observations ar... | i | d0af522d926e86339c3c150068fe83e0 |
Please note that for the scenario, where edge fluctuations happen in the first iteration, the estimators are trained offline for just finding {{formula:5b1a2417-19a3-474f-8c6b-3fdc7404222c}} . Then, the offline trained parameters are used for initialization. For the rest of iterations, the parameters of the estimators ... | m | 6ef0d51c83558e06cd4d5890ce6771fa |
To avoid the tensor matricization and maintain the intrinsic data structure, Kilmer et al. {{cite:c3eaeb5ed2fd0c5198a085dddc2048cb5739ea5a}} proposed tensor singular value decomposition (t-SVD) and this motivates the new tensor multi-rank and tubal rank. Another advantage of such method is that the resultant algebra an... | i | 2a187f2ff991cf5b82177bef54f56b4f |
We focus on incorporating differential privacy (DP) {{cite:23672d53de4900a1ddb3dd12b8884e4c2d6bd2b7}}, which (informally) requires an algorithm's output to be insensitive to the change of any single entity's data. For MTL, using task-level DP directly would require the entire set of predictive models across all tasks t... | i | 88a3554670b9a74a7f19449be65f9cdd |
In order to analysis low performance of Co-Teaching+{{cite:2f05e56e762785ad1f4af6f9a6ef68d5b561467e}}, we conducted a series of experiments on CIFAR-10 with 40% noise level. Firstly, we used a similar architecture as the one used in their paper (pairflip 45% noise level) and reproduced their results (39%, 43% for Co-Te... | d | d56ad4aa93fa5c1c7c87d5d23f63e507 |
The results of the experiments conducted are shown in fig:experiments, where we compare the estimated graphs obtained with our algorithm in (REF ), denoted as “Joint-Hid” in the legend, with other popular graphical models.
The algorithms considered as baselines are: (i) the graphical Lasso algorithm, denoted as “GL” {{... | r | ebc3e94e04445df9ba0405796ae6c815 |
In this section, we compare our qcmlb model to other recent approaches under
two schemes: with and without the attention mechanism. In particular, we compare our
approach to mlb {{cite:d258db54da38ba3929a45e37961abf2e4a3bd2c5}}, mutan {{cite:c554efaded139da94912dd1d7f87336a79bbab28}} and gmlb {{cite:e7f93a93defbd44a48c... | r | f8cdfa9559d5b4333d2469855fe607e9 |
In this paper, we have explored survival methodology built on neural networks for discrete-time data, and how it can be applied for continuous-time prediction.
We have compared two existing discrete-time survival methods that minimize the negative log-likelihood of right-censored event times, where the first method {{c... | d | 710544c8455e34c8aefe6e6b53e16347 |
Case-Based Reasoning (CBR) {{cite:7f301e206d571105500a05e8f7db164e8b57cdd9}}, {{cite:2b8b90b4a17c0a4ae41ed8a8da0f9efa30f09a88}} is used widespread across different domains, e. g., modeling of cooking recipes {{cite:14947496bfd266b42b8b002b37ecb4499aebf92c}}, prediction of seawater temperatures {{cite:bcf1f5a98901e3909c... | i | 197781e57fd0ecc64d082b6c305eaaa2 |
Reference-less automatic evaluation methods, on the other hand, have been proposed recently.
napoles-etal-2016-theres evaluated a GEC system using the number of errors detected by the grammatical error detection system and showed that it performed as well as GLEU.
asano-etal-2017-reference proposed a method for evaluat... | m | ca81523ec50ecac241f0a16447e9020d |
Eq. REF shows that the minimum planet mass required to sculpt a disc depends on the orbital radius of the outermost planet, which {{cite:b088677d3f6d557d07612762d23ed51cb1340aee}} argue is roughly the inner edge of the disc. Whilst such a planet would also clear debris beyond its orbit, and would actually be located i... | m | 9271bd1d64c25523d911eb49727649a5 |
Motivated by the articles {{cite:aa690e84132321bbb3682590a4015365757660c3}}, {{cite:c1799e0aef6afe33e0f47723d0aa48d526b998e7}}, {{cite:a883da5d389561ca4a5059d7390f75f76edae9ab}}, our primary goal in this paper is to present a version of the penalization technique that will enable us to obtain results on the existence a... | i | 02c7d54df23fa5a36437187f8a0243a2 |
Following the setting in previous works {{cite:f89291a7d41e1e03b3b74d1cd058e45e314ebe88}}, {{cite:002c7a2f2b9d3b1db96cc27e38ef0b40529c1e79}}, {{cite:d9474197916441736c467cd9bce3963599af46fe}}, {{cite:002c7a2f2b9d3b1db96cc27e38ef0b40529c1e79}}, {{cite:d9474197916441736c467cd9bce3963599af46fe}}, {{cite:63bc7c3e706778d7ce... | r | 7aa49492fcdbeaf5092838238a7b3509 |
Our results suggest that while an efficient normalization is not sufficient in itself to achieve good performance on ImageNet, it is still a necessary condition, together with regularization. In our results, it is always with extra regularization that PN yields the most benefits. Importantly, the fact that PN consisten... | r | fc99591e07f5f23cfbb1066c5d2ec835 |
Unlike recent SSL based methods {{cite:71ca1f18456cb1eb40fcae1aff2f5609c204f035}}, {{cite:64a9e522931964710d6077a2ecf4b3f53c967ccd}}, {{cite:713b8b129c05906e1fcfc844ce73e25bce4b1b51}}, {{cite:69de16f9d1f8ece2377afb840e3ca4027f7b374e}}, {{cite:3336ea291da21a5dc3ddefe6cb0742770085394a}}, {{cite:d0e09d47299cb5087ddbbaa8a3... | m | 22184d7bc50325c8ee972b4b7671544c |
We provide here (Table REF ) the full results of the state-of-the-art comparison (Table in paper). We report the additional CRPS metric. We observe that STRIPE S+T obtains the best results evaluated in CRPS on the Electricity dataset (equivalent to DeepAR {{cite:d86431cc5d09ff65b65ea4bae85d998e3cd9c966}}), and the sec... | r | 4f844472649c0d761fc370924c4da836 |
While intelligent systems must typically undergo at least some amount of training to function, it can be useful for certain computational features to be built in {{cite:17b37b92c3802111add0afe6d63de7eb0073d724}}. Flexible compositional coding is of particular relevance as it provides a substrate for computing with nove... | d | e2b8b898f3b6166b3a0ff7f806c5d82d |
This disk transition may be important for the evolution of misaligned, eccentric-binary+disk systems {{cite:b8fc17cc969ad6460771245553563596dd10f7b4}}, {{cite:e0f9c159f8f007f35dba4c89c8864aec1c961246}}, {{cite:ec64d11b71c1afeaeda0fe5e26af03460ace2c68}}, which could be investigated in future 3D studies. There may be imp... | d | 7172bac116905a931f253f988916a841 |
The deep networks that are trained by the standard gradient descent algorithm are memorizing the training data, and use the memorized samples for prediction with a weighted similarity function{{cite:4f06da3e97d407f0e7c4088d02227f4ac8060fdf}}, {{cite:e28474cbb3abf55a70c4a7218d427f047af391c4}}, {{cite:d7c25e1feb7b61951f6... | m | e5edbf8dc54809f20591387c0a7f7471 |
The first method, referred to as I-VAE, is based on the regularization proposed by Adel et al. {{cite:fed41458abf4a02e55feade9259d2b676c20b18c}}. It uses a separate linear classifier attached to each regularized dimension to predict the attribute classes. Note that while Adel et al. use this regularization while learni... | m | 7b0114b9b58906b1f9f7815b6a542117 |
The solution curve of general differential-algebraic equations is not efficiently
followed on an infinite interval by the traditional ODE method
{{cite:e48b0a861e2e4db7323b451fcaac01996cd3855b}}, {{cite:12d1d34a32897463012a0d9615b12cab14b0549e}}, {{cite:8ad8129bee016ff865abb59c5b06d851392e96d6}}, {{cite:f4122f60bee116c... | m | 2b20a72c6e6cdf4ca112b0bb854891c3 |
However, developing such resource scheduling algorithms for DNN training clusters is highly non-trivial.
In a computing cluster, DNN training jobs are submitted over time with various competing resource requirements (numbers of CPUs and GPUs, size of memory, etc.), and the training process is both resource-intensive an... | i | 0896ed52fe818d3e4eba073ba2dc931a |
Because our protocol is an MDI-type protocol, the density matrix of the single-photon pair component is always identical in the X and Z bases for each user, regardless of the asymmetric source parameters chosen. This makes it possible for a dynamic quantum network to add or delete new user nodes without considering the... | d | 22475cb8f57a28fbfc48b66174b97a70 |
In order to evaluate the performance of the proposed algorithm, different
types of images as text, face, natural and low-light images are studied in this section.
Also Windows 10-64bit, Intel(R) Core(TM) i3-5005U CPU @2.00GHz, by matlab 2014b
have been used for the calculations.
The results of the algorithm are evaluat... | r | d5d5d36b9948e98fc27d87a483f65dc5 |
In general, the methods presented in this subsection all have the weakness that they are specific to the problem of instrumental variable regression, and do not necessarily generalize to other conditional moment problems. Conversely, our VMM approach not only enjoys strong theoretical properties for this problem, but i... | m | a673bef00928c4e12e4c38119f8e9f99 |
Concurrently, there have been solid advances in theory of SG-MCMC methods and their applications in practice. Sato and Nakagawa {{cite:77d3878a3d0b87042cd275c0dd9dbf19131d048d}}, for the first time, showed that the SGLD algorithm with constant step size weakly converges; Chen et al. {{cite:f0fac9bc0e00afed6c52735d4d3e7... | m | eeee8fe497c3f16caa4db931be5e0119 |
The fourth term of (REF ) is {{formula:f5a2b358-18e4-4604-ac54-b2dd207bab20}} . It is the smoothness loss, which encourages neighboring pixels in the in-plan direction to have similar transformation values {{cite:e165267a0a88f248612e48fa8d356f21ba2e365b}}. The loss function of {{formula:8451e884-9e37-424f-b583-9148596a... | m | 9098c03738b9b2417fac974d8c01360f |
The idea behind gravitational leptogenesis{{cite:fb38db8334e4cc53943119a04cf7d8da7f317f72}} is, a C and CP-violating operator {{formula:bc9a95ea-c4de-47fd-93cd-f2667fce1d14}} with {{formula:fa0b631c-a29b-44a9-b59a-b46d10e7598c}} as a real effective coupling, corresponds to a chemical potential {{formula:9d5eaf05-2ceb... | r | af05622e7039cf26592300de06232483 |
Finally, regarding our proposed SGD we must note that similar results might be obtained with a MCMC method where information about the gradient is taken into account. For example, {{cite:2e3649e2af0a8f7ea279ff086879958482f2e4a0}} use a Metropolis-adjusted Langevin method which basically follows a gradient-descent and a... | d | 3a434cb786b56246a22998caa49d64c1 |
We choose this family of models in order to be consistent with early works that analyzed training and generalization properties of neural networks in the NTK regime {{cite:2c8f514609cbd24f1fb3c3a4be4c58decfa54acf}}, {{cite:95316b25dc1aa454aa615e88eafabed58c5a2782}}. We perform experiments on image classification on MNI... | r | 5b5d14354ba2cd71f3886a4d5cac659d |
Content-based filtering, user-based collaborative filtering {{cite:f969efaa73925f16947d9116f30eb434f3f58687}}, item-based collaborative filtering {{cite:f969efaa73925f16947d9116f30eb434f3f58687}}, matrix factorization using alternated least-squares {{cite:279fce2b3c41e8a4700cc7dd5f4508a7938f17df}}, and matrix factoriza... | m | 314f6c4ec98a0c0df877db216af0508b |
Table {{formula:2efab0d1-97cb-48b9-b413-774594caf731}} shows the prediction accuracy for phase shift of each element on RIS in the testing stage, where the prediction accuracy is defined as the probability that the prediction result is the same as the CEO algorithm. Here, the prediction accuracy shows the generalizati... | r | f703e25f8aac6847a67608e838e8c5b0 |
Ngiam et al. {{cite:312711813481a7c3fb569e00c71ec5dd54e62e8a}} were the first to address a multimodal deep learning approach in audio and video retrieval. They trained deep networks for a series of multimodal learning tasks to learn a shared representation between cross modalities and tested it on a single modality, fo... | m | 6bc353b504a90c4f3b80ced656e1bcfc |
The wide range of relevant time and length scales in polymeric systems makes them natural targets for multi-scale modelling.{{cite:f145425f51eddb960be51fd74eda45a2e52a94ca}}, {{cite:82347404939cd5ae38e6ef4ab9b318784d80e197}}, {{cite:49a562270f2a03d7ca9e7198577bdec45e8ff605}} In particle-based models, the resolution ran... | d | 7bf58ff98bf7aa3b9859d9de3d9a4954 |
if the limit exists for each {{formula:16d05a98-f539-48d5-8c7f-759b8b146cfd}} - real number. The notion of asymptotic density allows define the asymptotic distribution function analogously as the distribution function of random variable in probability space. This leads to the possibility of application of results of E... | i | 6acc57e7710d0c7b2f6eea6762fdf7b1 |
Theorem 2.4 (Local minimax lower bound)
Let {{formula:24a25f77-be9e-4244-8fac-cdbce6d5146f}} . Then for any {{formula:67ebe629-0410-43bc-a3ca-4588c23923b1}} , as long as {{formula:35b80f8c-fbbe-4102-9d26-27dd3a2dde2d}} , it holds thatIndeed, the lower bound holds for blackboard interactive schemes {{cite:96a534b7e8a0e... | r | 18f865cea4e4851607dd79358988f536 |
We have evolved a large number ({{formula:a9cfd899-e74f-4dde-8d31-8970b39e7f0e}} ) of binary systems in each model, by setting a grid of initial parameters
as follows. The primary masses {{formula:37bfda44-4105-4f2a-99f3-5b1442b022e9}} vary in the range of {{formula:ed33867c-148c-46af-ad23-411634023cd9}} , the seconda... | m | 66bf355dee5ad4da4bb65571dff771f7 |
Method and Scoping.
We synthesize available literature that uses explainable ML for (offensive and defensive) cybersecurity tasks. To this aim, we collect relevant literature, construct a taxonomy based on common themes (i.e., application objectives), and classify the literature into those themes. Applying a reflexive ... | m | f793e1ca566810a523e1b3d1b23e0927 |
Classical Neural Networks ignore the underlying physics.
In the most general form, constitutive equations in solid mechanics are tensor-valued tensor functions that define a second order stress tensor, in our case the Piola stress, as a function of a second order deformation or strain measure, in our case the deformati... | d | 59a6fe9f4aad31b4213249778e943cf8 |
In the article {{cite:8287f1c468c3665cd418193ff83348583cf5e904}} we have presented construction of {{formula:7caff93a-d71c-4188-9630-2294eb697c79}} -dimensional integrable bi-Hamiltonian systems associated with Novikov algebras. These systems are multicomponent generalizations of the Camassa–Holm equation {{cite:1b82f1... | i | 9b1dfda62f34a9d0fea70da8a8770fca |
Building on DirectPred {{cite:cc1ba31928c75ade75fb6a7ff5273342e824d20c}}, we presented a simple analysis formulated in the eigenspace of representations that illustrates how BYOL/SimSiam's asymmetric similarity loss avoids representational collapse.
Specifically, we showed that these architectures induce an implicit lo... | d | 9c00605899e464902ae105c6bc4bca53 |
Both H{{formula:822e5376-e209-4bfb-a5c4-26b2857b871f}} CO and CH{{formula:4a7d35e5-d5e4-4690-8c30-b43b3f258c38}} OH lines are firmly detected. IRS 48 is the second known Herbig disk with a detection of CH{{formula:eaf9d9d8-3229-4d87-9952-01573cf02eda}} OH, following HD 100546 {{cite:02d4f1e9f33b54e46e7cd0c18c4ca471c1b5... | r | a0bcf04e1257ddbe37ec5848446a743d |
Statistical or machine learning approaches have been in existence for decades.
While machine-learning and statistical methods are sometimes classified separately{{cite:16193862921fc1be91b050160d144e6def7f1fc0}}, we group them together as “statistical”, as both terms encapsulate approaches that use patterns from past in... | m | 3b65216fd83e820e8a15bfef9e3195b4 |
Search for and exploration of mesoscale quantum phase transitions in materials with non-magnetic order parameters. For instance, it is well-known since the early work of de Gennes{{cite:073fd219186558daad4530444bfe9f59f304da95}} nearly seven decades ago, that ferroelectrics are also model systems par excellence of the ... | m | 16f04116da8bd8a2f9480be7d92519c4 |
This result extends the work of {{cite:74d2083a954c76d292d4c203104fab0b4cfd3dd3}}, who examined prompt emission only, to the temporal domain covered by XRFs and reinforces their main conclusion that
the two techniques, wavelets and pulse-fitting, can be used independently to extract a minimum time scale for physical pr... | r | 0077f54a739ee4525cf319933f949369 |
Another issue that was only briefly touched upon in section 5, is
that of line emission. It is generally thought that the line
emission in AGN comes from clouds in pressure equilibrium with a hot
intercloud medium, the result of the X-ray heating thermal
instability {{cite:ea80d8232e59a153e141c5ad6e38d44ba6994640}}. Ou... | d | 26e547eb74a4d83bff2434e664091b49 |
From the perspective of objects, relationships, and messages, the above methods can also be divided into object contextualization methods, relationship representation methods, message-passing methods, and relationship context methods. In the scene graph parsing task, all objects and relationships are related; according... | d | 582d670c18f0ddc724482b7849b9c7c2 |
In fig:distortedconst, the GS-128 constellation, optimized as described in {{cite:4ebe67f0a58ac5f3afce5c3ef2bb542d28374d80}}, is shown.
fig:ngmiswing depicts the NGMI when transmitting this constellation using only linear precomp for different output swings of the DAC . Higher swings are associated with higher transmit... | r | a2c1b0da6fd6fa837d8545574ee19c96 |
A powerful approach for training models without requiring a large amount of labels is semi-supervised learning (SSL).
SSL mitigates the requirement for labeled data by providing a means of leveraging unlabeled data. Since unlabeled data can often be obtained with low human labor, any performance boost conferred by SSL ... | i | b5d1f51ec7ae3be0bbac560853047713 |
We compare AdaProp
with general KG reasoning methods
in both transductive and inductive reasoning.
In the transductive setting,
the training and test set share the same set of entities and relations,
i.e., all the entities and relations in the test set are visited during training.
In the inductive setting,
the training... | m | 9faf28f55f26e52e449ffa4faf2dd69e |
This is the main aim of this article where given the importance of the tensor
current in QCD for exploring beyond the Standard Model we will compute the
Green's function with that operator inserted at zero momentum at four loops.
This will extend the equivalent three loop exercise of 20 years ago,
{{cite:3d8a6cb64d469e... | i | 8f57a24744b170a3c072318e3e28e0cb |
Contributions.
Interior point methods are a much used tool in convex optimization {{cite:9b53fcd561cb0dcac18f2db6f99dfa17dbf05d6d}}. We propose using the log-barrier function on the coupled inequality constraints as our inexact penalty function. The GNE problem is then converted into an NE problem whose costs go to in... | i | 7725ea3a718d66fc2bbcb90fdeeaa509 |
where {{formula:884ed852-b90f-4807-9e6f-3610d9422743}} denotes the {{formula:0e7fd71e-0001-4da8-84e2-5776d7d63a73}} -th row of matrix {{formula:7d7f8a60-d489-45c9-b504-aaad39da8ec5}} .
Standard Gaussian concentration results {{cite:a25f36e3af92f5ddcee18972955432b98a6515d4}} reveal that {{formula:e3a22a2d-7243-46a3-99... | r | 1de0c99dc7798b8e20a6f73cb5980a87 |
Although direct sampling methods have been studied for many inverse scattering problems using far-field data there is little to no investigation for the case of near-field data.
The imaging functionals are also studied for both isotropic and anisotropic scatterers.
In order to construct our imaging functionals and anal... | i | f509eec6c2ba1cd6dcc054219ea34f43 |
a fixed `cross' trigger pattern at the top left corner of the inputs. When selected, the adversary updates the broadcasted global model using backdoor images for 6 local epochs with an initial learning rate of {{formula:84765595-238e-44e9-968a-6b989511e007}} that decreases by a factor of 10 after every 2 epochs and up... | r | 354f3c611747e967bb0d379fc9adeeb5 |
For that purpose, we consider the fermion loop correction to the effective action in a simplified Higgs-Yukawa model.
This toy model captures the essential features necessary to grasp what is going on in the realistic Higgs inflation model:
As in the real world, we neglect the Higgs mass term which is much smaller than... | i | 6f1a643ff1f1e224c58cf952c127dd3c |
RQMC methods are finding uses in simulation optimization problems
in machine learning, especially in
first order SGD algorithms.
We have looked at their use in a second order, L-BFGS
algorithm. RQMC is known theoretically and empirically
to improve the accuracy in integration problems
compared to both MC and QMC.
We ha... | d | 15982662f8a38ae2be43103291628882 |
A method to contextualise knowledge graphs is to express the facts that they capture as projections of frames. Frames are cognitive structures that are used by humans for organising their knowledge, as well as for interpreting, processing or anticipating information (cf. {{cite:383dc8d066e3b6d3aaf3108e33876917f54f3734}... | i | 3ea38e3d6c8d40dd0ed2163dba9c208a |
In this paper, we chose MNIST {{cite:1b19c3f72cded66f1c7dbd5d533461742052f2f7}}, FMNIST {{cite:69f38e4979ff47b264e39db8a55c192794906b3f}} and UCSD {{cite:7a9b937d16e7c1ed4d6424beb8c8996bba0ff751}} for anomaly detection. These benchmark datasets are widely used in the anomaly detection literature. In the following, we p... | r | 0e48edb9d2d1634a650f4ef1fb7cf0fc |
Scaling to larger TSPs: We note that works such as {{cite:a0e53a462d923b4965daff1b49c87c1ca4cec3a4}}, {{cite:079f8af99f4b8dc89dece1e16cfba9b97aeb52fb}} are able to predict on larger TSPs. However, a key difference between our work and these is that these works rely on a pre-trained supervised learning model in {{cite:... | d | c44396a29f2b20954d2a078fe162092d |
All of the aforementioned algorithms are analyzed on three test cases of different dimensions and complexity.
The first test case is the 0D model proposed by {{cite:aef93e32fc2601efd4803289b00b638e098d31a1}} as the simplest dynamical system reproducing the frequency cross-talk encountered in many turbulent flows. The s... | i | 2a0745e4990491c0ecd4a12dce764b67 |
where {{formula:42a57c60-ffe3-4097-be07-220be29fe475}} and {{formula:656b90f9-da0b-414d-b9bf-ed9537618fe3}} . If {{formula:60506162-551b-4023-be01-b4224f05ebd2}} is bounded from below and {{formula:71c07391-1d77-4886-af69-c40e23e86b54}} , one can obtain the rate {{formula:70a2b690-9dff-4617-8248-07d2718cb1d0}} and {... | d | ab48678231e652aceeaba10f46f2fa9c |
We introduce a new graph-theoretic concept, that is motivated by the problem of network monitoring, called monitoring edge-geodetic sets. In the area of network monitoring, one wishes to detect or repair faults in a network; in many applications, the monitoring process involves distance probes {{cite:e988561c8f9d84ec77... | i | b61f4d017b24567ca00db783d0ba3bbe |
We also showcase the impact of JPR in downstream question answering which takes the retrieved passages as input and generates the answers. Improved reranking leads to improved answer accuracy because we can supply fewer, higher-quality passages to a larger answer generation model that can fit on the same hardware.
This... | i | 247de33ab3d99c69949db58517c31b80 |
The past decade has witnessed rapid development and growing popularity of
blockchain technologies. This has been attracting tremendous interests and
enthusiasm from both research communities and industrial applications. The
blockchain technologies were originated from a digital financial sector as a
decentralized, immu... | i | 2438295dceb37ff040310cab4e5d4ec8 |
The standard way most detectors are evaluated in the literature is to stay in the same domain and use similar datasets. The error rates are based on a narrow binary classification and due to this there are much better error rates. You can see this throughout the literature where there is one domain, like TweepFake{{cit... | r | 819367f6878ff42cdcb7cb4520f04c19 |
The consistently strong performance of one-hot encoding suggests that position-wise information is crucial for function prediction. Averaging position-wise embeddings only captures the frequencies of each embedding dimension and destroys local sequence patterns which may be important for function prediction, consistent... | d | 517c8c6250c8a16ff4e4200c6e8bcc46 |
implies that {{formula:941a93b5-05ae-45dc-bf2b-5b324a9cacff}} and {{formula:5009e852-9aac-4ab7-9e5c-9ef36c48e825}} are {{formula:ab70d8ca-a819-488b-8cf3-7b883d34f641}} -linearly dependent. Hence, {{formula:3aaf8507-ebd1-4105-a390-d5091beb3874}} -polynomials satisfying this condition are called scattered by Sheekey in... | i | bed3105655e5de5e66df2e6450f64031 |
In order to explore the effects of the different bacterial reproduction mechanisms, we have used a very similar methodology to that described in {{cite:42ef9dd06d98b6f5e7d3373db459615faf2ad756}}. Thus, the first stages of biofilm growth, when it can be considered two-dimensional, were modeled using an Individual Based ... | m | 55991b43d361dc2a6389a9b9f1e59882 |
The proposed method is evaluated based on 3D cardiovascular MR images from the HVSMR 2016 challenge {{cite:5a8bbb9a8ae73da9623c24e6f53a5c85eb752440}}. The set consists of ten axial, cropped volumes from ten different patients with ground truth annotations. The images are segmented according to three labels: background,... | r | 2fc8a6bf3c9dc4f8999b6b490190f981 |
The outburst's peak bolometric luminosity is roughly {{formula:e1c95ef4-46b6-4702-b4c7-6161eed3c300}} 30%{{formula:a66caa45-3057-4d2a-b79a-7bf5132707d0}}
under an upper limit of the distance 6.3 kpc.
Based on the normalization of the disk emission derived from spectral fitting, the estimated inner-disk radius is {{fo... | d | 11eaf1977ce7d9b834081bf2495b39fb |
In order to train the network using gradient descent, we need a differentiable version of loss (REF ).
To do so, we use the re-parametrizable Gumbel-softmax relaxation {{cite:5ab754571fcc24fb1e2b63d2a9bbd46320e26de1}}, {{cite:e566e5359a7dbc909c675556f1daec7ba1e9197f}}.
The Gumbel-softmax relaxation replaces categorical... | m | 7828f4da6e1357474b61928bc3f2b376 |
Due to their close relation to rank-metric codes, {{formula:c787a207-ed5a-42e1-81d0-eaa5b9de627c}} -matroids have gained a lot of attention in recent years.
They were first introduced in {{cite:656d0373bd74be79e6f6fdd604550fbcf9bbf40b}}, and their generalization to {{formula:a260abff-6309-4f47-a619-b7cc51a08db1}} -poly... | i | 239ebd05a4f84a8ac82498f6b73216de |
Even though autoencoders are designed to learn a lower-dimensional representation of the input while minimizing information loss, in this work, we used them to perform semantic interpolation and thereby recover spatial information in anisotropic medical images. Specifically, we used an over-complete autoencoder that ca... | d | 1091cad3987dd9d78a02aefe9cfe59f4 |
we associate univariate B-spline basis functions {{formula:0742ee8c-347d-4ade-9ea9-4e6a3740d97a}} , where the integers {{formula:55df4157-1694-4362-8461-cd6f2a298a34}} and {{formula:d1c4a858-d8da-4f63-854c-881c86193ff9}} are the polynomial degree of the B-spline, and the number of basis functions and control points, ... | m | 3524e0aea389d72f1ec1d99b1705676a |
As a measure of the resemblance between the experimentally measured correlations between each pair of modes {{formula:d2e5a63a-1ee3-49f8-b114-24f4b53784b2}} and the theoretical predictions {{formula:b8b49441-9c6f-4c11-ab0b-ebce64d00d39}} for each unitary transformation, we utilize the commonly used statistical fideli... | r | 62712899b6fccc79949871ceb6a8c7aa |
In the case with the SH0ES calibration, we obtain tight constraints {{formula:033e6df0-301d-4c1f-b7b2-d1cbeca6c3d2}} km s{{formula:bdd64e55-4e18-4606-8635-a8f15aea2a83}} Mpc{{formula:867d9424-29be-4e21-8940-f5956b03cc0f}} and {{formula:e081fceb-8c74-41d8-bce7-5d4a5322325b}} , which produces an evidence of DE at the ... | d | 7102a91f504d3bab104a5ab52910ecfd |
Our goal is to build a generative model for vector graphics that does not
require vector supervision, i.e., that only requires raster images at training
time.
Our model follows an encoder–decoder architecture (Fig. REF ).
The encoder has a standard design {{cite:a0cb63b06d03ed14b894b6dbf20694fd8c1c555b}}; it maps a ras... | m | 6a281135a184b21bc5dc7357a2af7287 |
Next we consider sampling algorithms for composite potentials of the form {{formula:5f3fe128-6b46-4e33-863e-2273e15a1a7a}} , where {{formula:b99ff3d7-ea94-4158-9318-8f3dbcd91fe6}} is convex and smooth, and {{formula:f917f2bb-6d75-45a4-a8e9-0332ba3dc60c}} is convex and non-smooth/semi-smooth.
In {{cite:14543dd7d7b33c5... | i | 2390edf2637635101558b152ade3f9aa |
where the components of vectors {{formula:9eedf8bc-1e9c-4e1d-90ca-78463331b8e0}} and {{formula:baeeff40-a9a3-4ead-bfc2-ff4b0046bbee}} are
{{formula:7610dd5c-2b4b-42de-88f1-e2c0f1d8e06b}} and {{formula:0794b9f9-5bbc-4689-8edb-2dba5d578eaf}} , respectively.
The inequality follows from the Cauchy-Schwarz inequality. T... | m | 4af51d727cf7d217e7ebf0b1c66d2528 |
In our final submission, we chose RoBERTa as a sentence encoder and sampled {{formula:688de953-778f-473f-8331-13c8408a09de}} texts per user for Task 1 and {{formula:beb9f92f-1875-495f-a0e2-0673c3d88cef}} for Task 2. We used the standard formulation of the transformer network {{cite:4c2e100f2308ddf0858b2448a5cc0e98d10... | m | ca4aa9bb58d8462ffc3bdd680c5f62d0 |
Last year on May 24 the SpaceX launched the first set of 60 Starlink satellites and up to now the total number is approximately 400 aiming to reach at least 12000 {{cite:967689ac2c467827ae46ade3a1d997d6df9d2403}} at the end of a decade program announced by Elon Musk. Such a huge number of satellites, distributed over a... | i | d0a612cb019942cf5b756b46be132889 |
The proof relies on the asymptotic behavior of {{formula:2f98ac96-ab26-40f4-8e7b-c630faaa5c1a}} and {{formula:6d2a5ce5-b479-4d5b-80f8-fc34b39c4300}} as
{{formula:72341275-cfe4-457b-9c0b-8ca7c4851d3c}} , which is an idea similar to Sakamoto and Yamamoto {{cite:3c21a3bd190796097a8a53e7fa719cd1a4590833}},
Yamamoto {{cit... | i | f248876eb7ba81d977fbeee07778e751 |
where {{formula:bfca47ca-8919-4db6-90c5-0f421f107791}} is the spectral quality factor, {{formula:0aa6b547-3521-4d97-81ce-2b2c2c9bd780}} is the resonant frequency of the vibrational mode, and {{formula:31217939-8a70-4f75-a492-8f79c9f43a3b}} . Figure REF b shows that {{formula:e51badec-eb83-450b-a481-9d381f561ccf}} is... | r | 71529d8595b0948ca972595d22361ad2 |
In recent work, H.Yakura and J. Sakuma {{cite:07803760aa0b68cb4c27712c50c43b76eb8f6d90}} put forth a method to generate a robust adversarial example that could attack DeepSpeech {{cite:9ef9f2300a5092069779371a179cf193dd41e69c}} under the over-the-air condition (e.g., the given adversarial example played by speaker and ... | i | 6c5987f655198bc73692aa74810076e8 |
It is impossible to quantify the learning rates of kernel methods for time series without presenting any restrictions on the dependence among samples {{cite:62a05573567e8385081cfa5eebef629d4261de17}}, an extreme case of which is that all samples in the data set are identical. Therefore, some mixing properties {{c... | m | c8977aa6f7a9bb5b4bdc160c91272027 |
Numerical evaluations presented in {{cite:60bb69197bd987af721eaf1cef0ed59ccc28fe18}}, {{cite:d77f19f43a084941449ce20aac092ae652784e0a}}, {{cite:3dac1e0621c1c20ce765dadc624655ffe27e8b22}}, {{cite:e327fcd3bc0a8bf1aa18695dd9b228ac42943efb}}, {{cite:42181b50fc20f32ea0b5812a02caa68d9d914c22}}, {{cite:961d8094111646ac05c22fb... | r | e9a017c92654139dd396afa99cb2fbd7 |
The sensitivity of our TMC-1 data is better than
previously published line surveys of this source at the same frequencies {{cite:5ad8f3b4fb04c96eab60d3f9198a29ca17ca88a9}} by a factor 10-20.
In fact, it has been possible to detect many individual lines from molecules
that were reported previously only by stacking techn... | r | 6e1f107b7fc00eaa02b09f7a18bc18f9 |
In the models under consideration, the asymmetry between the ascent
and decent phase of the sunspot cycle is inherent from the pattern
of the toroidal magnetic field activity. In particular, the 1D1 model
has the toroidal magnetic field butterfly diagram with maximum located
very close to equator. Therefore, applying t... | d | da6031b9a692088c9ecd8e2ac1b34b51 |
While the literature suggests that a second-price sealed-bid auction is optimal (in terms of revenue for the auctioneer) for our setting {{cite:66f294e260454a8d1a06a566e6034ab147490eeb}}, this type of auction is not widely used.
Two-stage auctions, however, are common.
The optimal two-stage auction design when the valu... | i | f7cffed8325a0159e31b214081176ede |
DANN Component:
In ML-based NIDSs, as is the case in other application areas as well, it is difficult and time-consuming to label real-world data. Consequently, synthetic datasets are often used for training and evaluation of machine learning models.
However, these synthetic datasets usually do not adequately represent... | m | b8ed6ee7dbc11235db7ffac190b69adf |
The MCMC results in this study successfully capture the true
parameters and their uncertainties. The results contain natural biases arising from the use of prior distributions, internal variability of the climate, and use of a
single noisy sample as synthetic data. Despite the sampling variability and emulator constrai... | d | a038786e26237c605004ed5bc663bbc3 |
this choice leads to an interpretation of (REF ) as a simplified manifold MALA proposal (SM-MALA) in which the curvature of the target {{formula:5fe879dc-586c-4f60-a6ae-9031a155263e}} is assumed constant (but remains position-specific, {{cite:5b03abd586f460ecce196db406ea592ab292ce49}}). We make a connection between a ... | m | aa75dc23381a7445854dae5d3f5eaee1 |
Remark For a general graph {{formula:b2e30cea-320d-4326-bb8a-f938195f7f19}} , the best-known mixing time bound is {{formula:afa2ce6e-d941-494a-9934-84eef71a763e}} due to Jerrum and Sinclair {{cite:2926ce42a87250a7560ac7b3c9a5cc7479164df0}}, refined in {{cite:5d6baa6265f296225c698f6e2238f387a94852b9}}. On the other han... | r | 39b77ce72b8445fef8b24909a5021108 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.