text stringlengths 54 548k | label stringclasses 4
values | id_ stringlengths 32 32 |
|---|---|---|
This continual learning idea has inspired various machine learning strategies. In domain adaptation {{cite:79d890b7f3a3c8a44f6295426d9ebda069155ab7}}, the goal is to transfer the knowledge from a given task (i.e., source domain) to another task with few labeled or unlabeled observations (i.e., target domain). In the ca... | i | ff27d3e1254256a581ab8e120cee3b9b |
Availability of simulation data for a finite time interval or the need to approximate the system behaviour over a finite time interval led to the development of finite time model reduction methods. These include methods such as Proper Orthogonal Decomposition (POD) {{cite:a2fa5412b08d21453eae56e8e825518c3fa7dfaa}}, Tim... | i | f1392065bf8fad96fdf5b871df84e797 |
Recently, researchers have explored this issue popularly. Zhou and Feng {{cite:c6ee5ec0694665b690615ee80db83f0ac8269cde}} proposed a deep forest framework, which was the first attempt to construct a multi-layered model using tree ensembles. They introduced fine-grained scanning and cascading operations and constructed ... | i | f8d3988883603bc5489f719f314f0c55 |
It has also been suggested that high ionization parameters are the result of high SFRs, which lead to a larger reservoir of ionizing photons {{cite:2d4143943f26847d34a0e4d96c2f74071d1d1f88}}, {{cite:e291f317ca584697b986f904ba8f74b398304a4d}}. This would be in agreement with the observed enhancement in SFR in the rims o... | d | 24666ec91d9300322c818236e62aef5e |
One branch of EBM works uses MCMC-based Maximum Likelihood with persistent initialization of MCMC states. Persistent initialization uses samples of prior short run EBM trajectories to initialize the current sampling trajectory. This approach is introduced by Persistent Contrastive Divergence (PCD) {{cite:7de59328f63024... | m | 52443106b0ef9570b01bd255b091e459 |
Irony is a pragmatic phenomenon that can be defined as a sort of incongruity between the literal meaning of an utterance and its intended meaning {{cite:326b73667ab93345fd169e209aaef11e791b00e3}}, {{cite:7557cc0800b4a64d913b078c5d0bcd02492d838b}}, {{cite:0a46e7ddb7a38efcb8027f6f64b2ab1c42ec56a2}}. In text processing, t... | i | cf07fdac897c80cab44c40ea1e0314f1 |
DAIN with MobileNet V2
The CNN module of the two stream network can be replaced by other state-of-the-art deep learning methods to further improve results. To demonstrate this, we change the CNN module to ImageNet pre-trained MobileNet V2 {{cite:5804c7845a3ce1c2758fa778a8674384e1e829fa}}. Combining feature maps generat... | r | 600f149fd9f8d0b506710da10ebacb89 |
ABC approaches also rely on the definition of a set of summary statistics. In this paper, we derived these summary statistics based on their biological meaning. More automated methods have been developed in the literature {{cite:97c5b22250cc3dde4eb0491af7e5f8dcb88475ef}}, {{cite:453544cb74d00ec148dc33b6e107eaf9ee92c6be... | d | a316874a42bd973de08f47fcdc16aa28 |
In contrast to Theorem REF and Theorem REF below, th:main-partition does not assume {{formula:324db518-bffa-45b3-a1ff-ced549ba7133}} is countable. The reason is that the former two theorems use Kronecker factors via Furstenberg's correspondence principle, and the theory of factors requires the group to be countable... | r | 1ba35622283e4f72f938208deb10c2d2 |
In this paper, we have have studied the asymptotic safety of the simple Higgs-Yukawa model with non-minimal coupling, in the symmetric phase {{formula:af216d45-3238-4ea1-9569-ab94b2dedcf2}} .
In the Higgs inflation using the SM criticality, the typical value of the Higgs field becomes close to the Planck scale {{cite:d... | d | eb05288d4b8bf89a6df1ca8b34a55665 |
From the results of Top-{{formula:57da03be-7f1c-49b9-a609-41b49b6a7a4b}} , Nucleus, and Contrastive, we see that solely using the unsupervised language model without conditioning on image inputs can hardly generate meaningful captions.For stochastic sampling methods (i.e., Top-{{formula:69e27629-d6fd-4d52-8e17-4e13ac25... | r | c8d6377dfd895e38c9debd3ad3297747 |
Mass estimates and kinematics of PNe that experienced a CE phase can be directly contrasted with theoretical predictions {{cite:46bce06320919ddf6dda74b37f77379556fff0ae}}, {{cite:7fb05e415470048c2b06dd5c7206e90b629f9216}}, {{cite:3c865365e5ff6bb916c70cfa81a571db404a9d77}}, {{cite:15092025f33480b4aca2910f26b6154370a6e6b... | d | 4b7df6f504dc483dd16e7d55634af3c4 |
The three games differ, however, in whether the cooperative outcome obtained through mechanism design is stable even when the planning agent is turned off. Without additional incentives, mutual cooperation is not a Nash equilibrium in the Prisoner's Dilemma and in Chicken {{cite:be2b831fb601ef3141d398f9a3db1190b6dd778c... | r | 8c6c70699c17aea0794c656c170a3532 |
We limit our evaluation to only autoencoders as we find comparison with methods that rely on SSL {{cite:57f65f7580e255896d0218527d1caeef15ae7904}}, {{cite:e0dd32ea7dbd3a1828d3957cc7d2c65f0e8d5879}}, {{cite:7c37186717980f1744da96827d8ce0fabf5c5759}}, pretrained feature extractors {{cite:379786b5145acc277a0770e2d69b24ef9... | m | a2b3b7e21fbc2d5fd16993663ade94fe |
Second, noting the lack of DS robustness in CNN-based prior models for driving TTA, we posit that simpler prior models may (a) suffice to improve task performance under the considered acquisition-related DS, while (b) themselves being more robust to DS as compared to CNN-based priors.
With this motivation, we model the... | m | 98f0140b327b29eee95408a2e5a88b4a |
Alternatively, we adopt a racial bias analysis methodology that uses facial phenotype attributes for face verification (one-to-one facial matching) task {{cite:a42081ed3d53fd25b3591d9ee8cfb201069a1f5e}}. The study categorises representative racial characteristics on the face and audits these attributes: skin types, eye... | m | 98800328ad500278968caa2ef9854473 |
The proof of this result can be found in {{cite:15aa922ed0998f708980297c94f010de4f78110e}}.
{{formula:577ef935-2ffc-4294-8c2a-80c1865e47b5}}
Lemma 4.4
For {{formula:4ec88b58-fa34-4b0a-b537-0c0e72d7aad9}} ,
there exist a
constant {{formula:dbbb21aa-56a5-4c5a-9990-691f8d962b03}} , such that
{{formula:0569b316-9274-422c-... | r | 486c1e49fb80e25c8deba9c30b04fc55 |
Ensemble methods are very easy to apply, since no complex implementation or major modification of the standard deterministic model have to be realized. Furthermore, ensemble members are trained independently from each other, which makes the training easily parallelizable. Also, trained ensembles can be extended easily,... | m | 18511da3796892e5651f3c2135190588 |
By incorporating the changes described in the previous sections we arrived at a single model type, with a single set of hyper-parameters, that was trained to reach new state-of-the-art performance on CLRS-30 {{cite:497c87b29196d728d54ec5bfc7179f5d8eecc74f}}.
Tables REF and REF show the micro-F{{formula:99268113-80b3-... | r | b6b1c85122af4f693cffd07265f31d35 |
For comparison, we compare our model with the standard Barabasi–Albert Model {{cite:d6794f9b3e184b2760d0e34236f05222c4c1732d}}. The Barabasi–Albert (BA) Model is a method for generating scale-free networks using a preferential attachment mechanism. Since our model also applies preferential attachment mechanism so it wo... | r | 3b8e3829809ea7ce9c9cd04a308e9b61 |
In the third observing run, the Advanced LIGO detectors operated with roughly 250 kW of resonating power inside the arm cavities {{cite:51ed94c66ed4d1a7ec8135233f0ebfe2236a4d79}}—still only one third of their 750 kW design power. Recent tests in both detectors have shown that as the injected laser power is increased, t... | i | 8cfed0db71b4d4bf01197d671b040547 |
The impact of limited liquidity on optimal trade execution has been extensively analysed in the mathematical finance and stochastic control literature in recent years.
The majority of the optimal portfolio liquidation literature allows for one of two possible price impacts. The first approach, pioneered by Bertsimas an... | i | ab3a5d240dbcf737f4b1c392a39ad580 |
Concentration inequalities are a powerful set of methods in statistical theory with key applications in machine learning. This is due to the fact that in many machine learning applications, a learner often estimates some quantity solely based on samples from an unknown distribution, and would like to know the magnitude... | i | a7ba94233ff1a613a291520b95f5335b |
Previous researches have shown that the self-force effect and other interactions would prevent the black holes from being overcharged and overspun {{cite:663963f98598c428993b9be347c40c31916733ef}}, {{cite:bb09fa5aca657f44703b43a05b1e30978ba8bfd5}}, {{cite:2398f6648ef6667822794aba2438b46c1de30a25}}, {{cite:f05186d75af21... | d | e93a1b165b7f40a720b25a1b93bc1939 |
We believe that this disparity can be explained by a strong bias in selecting videos for this dataset. In their paper introducing the challenge,
{{cite:418156b90a065ee931d6e7928400aba08711b859}} explain that the videos are machine-generated and selected for precision
“While the labels are machine-generated, they have h... | d | 8b1a80ac989bd9422615708e7d3c4952 |
In the case of distributive lattices and Heyting algebras the lattice of all upsets is isomorphic to the canonical extension.
The representation of lattices as clopen filters leads to two kinds of completions of a lattice: (1) by taking point generated upsets of the dual space of {{formula:f0201a4e-b25c-47b8-b0ed-8ddf8... | i | 7a2696dd27db9ad4a04f15a752ab09f7 |
One advantage of subspace-based methods is that the calculation is simple and efficient. Similarly, the linear correlation alignment (CORAL) minimized domain shift by aligning the second-order statistics of source and target distributions
{{cite:6941f561a4a526b4c65458bf1c891f492338b97d}}; it solved the following optimi... | m | f7e869b32c7e2bbe420550623dd83291 |
By the spectral theorem {{cite:f89378ede14e393f6f95134842780dff592d2110}}, this can be expressed
as
{{formula:0f2c226e-74fd-43a6-9c6e-e51c0900ba1d}}
| r | 52f53a1fa4fd6a351ad3a81228f1f211 |
Another critical issue in Bayesian and other model-based clustering is the issue of model misspecification. In particular, clusters may not have Gaussian shapes or may not even match with more elaborate kernels, such as skewed Gaussians {{cite:eb3b8a11a6a8b762fc71f8e0e214a0a1853094fa}}. There is an evolving literature ... | d | 7f9f4d009660026045fe8df5e56abc71 |
To measure the rotation rate we applied the following procedure. In order to decrease the uncertainties due to noise in the magnetic field maps, the linear size of the cropped patches was reduced by a factor of two by binning 2{{formula:ada37b3f-eab0-4da1-8c4b-aaf80c278728}} 2 pixels. Then the flux-weighted centroid po... | m | a8d24792cf0956852d2570546968b097 |
When there are finite number of algebraic singularities on the circle of convergence, the final result can be extended by
adding up the contributions from all singular points; see Szegő {{cite:2ae9759d9cd4b4ec0dfbcd5fceb751e024304293}} and Wong {{cite:ca47722ff6d9c0818ec55473995350a2cd208e89}}.
| m | 186730d97e850bc3fb4fccc870219c71 |
The voter model describes a simple process for opinion dynamics and consensus in a population of agents that can hold one of two different opinions ({{formula:038dd91d-b514-4b2f-963d-74e0fb2b34f4}} and {{formula:55c53baa-5034-4062-b24c-73a3291ab217}} ) {{cite:cf0aad0f42217308378d36b8a0c33f785fde7aff}}, {{cite:5459aa0e... | i | fa0ecd6e0cde9cbde2d6d3f1655366ca |
A significant uncertainty in this study is due to the poor knowledge of the Galactic magnetic field. Different observations, like Faraday rotation measures (RM) and the intensity of total and polarized diffuse synchrotron emission, are used to constrain different magnetic field components.As described in {{cite:0c35191... | d | 5f99076fca69bd495ff9e6e0585597f1 |
Ablation Study. In Table REF , we show results on the test set of AICITY22 Track 4 made during the challenge. We can see that ViT, U-Net and CBT metric based approaches leads to the best results. We can see that the base ViT model has a relative improvement of 107.1% which is significantly better that the Baseline Ef... | r | 26e426991c0684087d28436a8a6e4e91 |
Except for GB 1508+5714, these objects have {{formula:ea77d2c1-d95c-4981-8bc5-7e0b3778ae40}} . When considering spinning BHs, which have a high radiative efficiency, there is a great challenge for the formation of such large BH masses even from seeds with masses {{formula:243b8df3-bc1d-4266-b79c-d4a67e16f7a9}} (e.g., ... | d | 8c0a8ffa063b23b3ed1bf3054a540f9c |
We have shown that substitute model black box attacks are not so effective against 01 loss models when the substitute model is convex or 01 loss. There are however other black box attack methods that rely on just labels and try to estimate the minimum distortion of adversarial examples (an NP-hard problem) {{cite:90247... | d | 31584ceb54375053ac614fc0ee542c48 |
We measured the detection results using the official WOD detetion metrics: BEV and 3D average precision (AP), heading error weighted BEV, and 3D average precision (APH) for L1 (easy) and L2 (hard) difficulty levels {{cite:7ce05daf2f3271dfc82aef5bb151df03e8d63bcc}}. The official metrics used to rank in the leaderboard u... | r | 81c04501e4d162235c3219ca7baef58f |
Gauge equivariant neural networks {{cite:0ebb9360fe05932f82ff0fd545a6bdcf63eac8bd}}, {{cite:1e66a30ea22123bb722b2a51231e49a4eb272a13}}, {{cite:676fac48b85dc0c6d3beecdc4fbfdeb5a746ef0b}}, {{cite:96f94ee662b88f0d55fbb2a430824cce71690dbe}} are instead designed to respect local symmetries. For example, computations involvi... | i | 5818b2c55cc0a493f259e5229561f2dd |
We have performed an extensive numerical scan sampling over {{formula:32b04189-e7d5-4c54-83d4-16da496e74a0}} points using the free parameters in MFS. From this scan, about four thousand ({{formula:b57c5a14-1761-4a8b-a7bf-1a575b43af31}} ) points survive which satisfy the latest measurement of {{formula:e6d47292-77cc-42... | r | 4ae5bc99ff90f66130d2038f5d806140 |
Moreover, to demonstrate the effectiveness of our blob-level curvature-based SDF description for robust change detection, we provide another baseline (FPFH in Table REF ) with a point-wise variant of the proposed method by replacing the 3D voxel validation step REF with the point-based FPFH {{cite:b9909dca7bd15831acd5... | r | 264137daceb5e078a780e491a3eb698d |
Recently, there has been a line of work that argues for the geometry of the loss landscape as a major contributor to generalization performance for deep learning models. A number of researchers have argued that flatter minima lead to models that generalize better {{cite:85f471751f20ad891c1bd72eed0a8266a271afed}}, {{cit... | i | 6ff1074ba4536eb1d45d23007c9a6e6e |
More recently, deep learning methods have become predominant for guided super-resolution. These approaches work by parametrising the non-linear mapping from the two inputs — guide and source — to the target as a convolutional neural network, and learning its weights directly.
The deep joint image filter {{cite:c85beb8c... | m | 25c3b8479924605b8ef01e7e2c19fbf9 |
[leftmargin=*]
Political books {{cite:829a78be455016cf3a41f7987a505e5a86f82c75}} ({{formula:470a5822-1f10-40ee-b92e-00b72eafd837}} ) – network of Amazon book sales about U.S. politics, published close to the presidential election in 2004. Two books are connected if they were frequently co-purchased by customers. Vertex... | r | 2bee8c15bba8193d0351edbcdf9ad546 |
Reachable sets originate from the evolution of set of states in system dynamics. Therefore there are two major system model based methods to approximate reachable sets numerically, i.e., set shape approximation{{cite:9a9e2cade972f4fc42d4c123543eb84521c14f37}}, {{cite:aafcec79c8faf5a362e4996d3045defaf5adae76}} and syste... | m | 6cf941151090971e9ec54fb3af5e0ebd |
Influence of average pooling. In contrast to the original memory networks {{cite:ff116feeae98805127d239aa351b8fe4dc09993c}}, we add an average pooling layer inside the memory layer, which takes advantage of the spatial organization of the information in the video imprint. Figure REF demonstrates the influence of addin... | r | cc6fca14a3d844d870281354bac32e77 |
The recent work of
{{cite:bebdb4eee447dcf00946fa84f30d36cf2a8d6e05}} proved that the {{formula:d6b05974-93bf-48e4-afe3-81364c7f028b}} norm of the error is bounded as {{formula:0e39cdb6-714e-40fd-80d1-3953071dcbe7}} , for a two layer neural network with ReLU activation functions in kernel regimes. {{cite:ea544b9e264044... | d | b5ce89dbe7b3a3fdd0a1b8a001236ed7 |
The aim of this analysis is to model the energy distribution of the sample of 254 FRBs detected at CHIME. The FRB population model used here is presented in {{cite:756ff4895e3984302e52a0b77398759f1fd98e9a}}, and the reader is referred there for details. We have modelled the intrinsic properties of an FRB using its spec... | m | 1ced39b8d460f35500651985d5b2ebc0 |
Avenues of research have begun to open up on how to prevent this hallucination and how to inject additional knowledge from external sources into the transformer-based language models. One promising avenue is through the integration of knowledge graphs such as Freebase{{cite:fee0b520d5553853e71bae65ba8f83a523ca5f0e}}, W... | i | 60806d93f9afa24faf95522fc367f383 |
The motivation for this paper comes from the close connection between spaces of vanishing traces and the pointwise multiplier property of the
characteristic function of the underlying domain under consideration, and more particularly, the importance of this connection for interpolation for spaces with vanishing boundar... | i | bf62dfa0408d019c5dffc6ecd71cae3c |
Similarly as it has been demonstrated for liquid-infused porous structures with regard to confinement-controlled phase selection {{cite:dffc925c26a9350b015a5f431ee9ebec8c41c327}}, {{cite:fce43892a6fb494797ff5ab7b3792a670c2aeda5}}, adaptable surface wetting {{cite:cf53fc5254d24fa3d5d33deaa4072c98f4b89e18}}, {{cite:23bd6... | d | 3f45bddd81cc9ce795057deb304036b2 |
Nevertheless, beyond all the problems surrounding quantum gravity, there is an extra fundamental question concerning the application of quantum theory to cosmology. As we know, in the usual Copenhagen interpretation {{cite:35d074dc8a311409ee13f326ede3a0aeba19cd86}}, {{cite:071aa89e6bc40f0935b45dca03cb83b0ac07256f}}, {{... | i | 97677cfea5025979709017b25da459de |
Secondly, we will prove that inequivalent families of solutions
correspond to inequivalent embeddings (not related by conjugation in {{formula:62eaafc0-9db5-4dcf-9460-1b5b9beab01a}} ).
The problem of determine all possible three dimensional subgroups of a
simple Lie group has been solved by E. B. Dynkin in {{cite:1931a... | r | 1484f2a91d2432a03363b23986baaf26 |
The possibilities of detection of wormholes have been studied in {{cite:6dc480fc95ba2218234116e1dbc8c21cc6327d4b}}, {{cite:09c8afcdf561885fe29da8d23e9f2c216a875312}}, {{cite:73fccd62353811c0d6cfa442606d4fe6b73ce7ff}}, {{cite:871e26e0ac1c2a3c3e4a463dcaa26a3e633128cd}}, {{cite:e73b725f5d460beba4194252bb2229bd798b24cf}}. ... | d | 40d61b791982ac0ea9447636d5369682 |
Deep Reinforcement Learning (RL) is a powerful general-purpose framework for learning behavior policies from high-dimensional interaction data, and has led to a multitude of impressive feats in application areas such as game-playing {{cite:57c18c783fac11fdfa5da7ab99fd01727f1e0dfc}} and robotics {{cite:905244778d73c649... | i | dce22aa33a834588645c01f3f38281ad |
One-stage methods directly predict the bounding boxes and most of them adopt the extract-and-fuse pipeline. RCCF {{cite:a1501f404714adb8c47e329d0fc66da424edd075}} uses a cross-modality correlation filtering on visual and textual features, and ReSC {{cite:d4f200eb1b083133e2373abb586e1d65db6edaca}} proposes a recursive s... | m | 419b5ab9d934664d199dfa86a9b9c9ba |
We can see that {{formula:2a4861b4-e856-4543-86cc-133b66e13528}} -descent condition (REF ) means that the graphs of quadratic functions {{formula:7c94d4ff-50b6-4865-826e-27d74988a12a}} lie above that of {{formula:a8627ccb-1f10-409a-9b33-294d7a37546d}} for all {{formula:9b307e2a-2db9-4dcd-806c-336978f79411}} This co... | m | 15fafabab1a7bd4f18b60fc382aabb7c |
Influence of Encoder Backbones.
Table REF -(b) compares the performance of our model with different architectures, pretrained weights, and resolutions.
First, we replace the video transformer in PAVER with TimeSformer {{cite:13e4f71d78487e0934df38521e50fc9d8a552008}}. It shows
inferior performance mainly because the mo... | r | bf68e51b1d59cdb6f6c5409107efd06a |
On the other hand, associated to the Legendrian link {{formula:e96acc6e-ceaf-4080-9fc5-549956e46614}} with additional data {{formula:31070553-8ae5-45d7-b786-5a82808a91e2}} , Floer theory assigns a differential graded algebra {{formula:57b8fd20-ef04-42ab-8464-2036cb5e8fa8}} (Section REF ), the Chekanov-Eliashberg DGA ... | r | a849526d19b77b587ad038a33b290c77 |
In the last decades, evolutionary theory on complex networks has attracted significant attention from scientists in many areas, from economy to physics {{cite:b60ec111054bd36e75780c16ef59fdaff6208979}}, {{cite:eea36a7f0418e128028229e54c41d1b51eb5a5af}}. Prisoner's dilemma (PD) is a game in which two players acting self... | i | 6c1b1b5b057b905632fea7bdb50b7ee2 |
In training, we use the smooth {{formula:4eebafe4-3251-41a8-a792-845d2ae04da0}} loss due to its robustness at disparity discontinuities and low sensitivity to outliers {{cite:fd38973d76af2ab5322ec47659f70ce32c0a0e04}}, {{cite:0f02b3654d5035b9f3f85e930f3c6bb6be492747}}. Given the ground-truth disparity map {{formula:7c... | m | 4b0365942953fcce238be67414b41469 |
Fact 2.1 {{cite:c299bc34d714ca852fe369989f99494152b4f1ae}}
Let {{formula:4db27963-4631-456b-bdc6-069909d01421}} , {{formula:9a8563b8-b4f0-43b2-b5dc-fbd8f83c4dc0}} , {{formula:5e67d72b-19ce-4601-99fd-9e2eb2108f30}} , and {{formula:fb71e76d-edbe-4cc9-8469-3b63fc321d99}} be sequences in {{formula:05339640-0cf6-4b22-88e6... | r | cf19359624cb1af41d2bc75d209e2ce2 |
One of theoretical issues to study valley excitons is to include external-field
interactions to the exciton model. For a Wannier exciton, which consists of an
electron and a hole bound by the Coulomb interaction, the system is
similar to a hydrogen atom in external fields. The electric-field interaction
can be included... | i | 48cfc7957f64669ad206f081edd16951 |
First-principles calculations were performed using the Vienna ab-initio simulation package (VASP) {{cite:bb4638e85e31040e0b348a59f395094754a481de}} within the framework of projected augmented waves {{cite:9ae73d52ca6a27936ef8b5364e8064b7055983fe}} and Quantum-ESPRESSO (QE) realized in the basis of plane waves.{{cite:02... | m | 45c16d9fe01dc4f10ec9ba35c6753f71 |
The MLR-SNet learning algorithm can be summarized in Algorithm REF . All computations of gradients can be efficiently implemented by automatic differentiation libraries, like PyTorch {{cite:a393b564db5438411d81e146547aa1fd91d8f07a}}, and generalized to any DNN architectures. It can be seen that the MLR-SNet can be grad... | m | 848166f2121362ad006e070555486a6d |
We ultimately envision a continually learning robot that uses symbols to learn skills and skills to learn symbols in a virtuous cycle of self-improvement.
One plausible path toward realizing this vision would start with a set of manually designed symbols, as we did in this work, or skills, as done by {{cite:38c8acb7542... | r | 7d4536be32c8615c72bf85956d31ac68 |
Taking all these limitations into consideration, we propose a novel forgery localization method named Contrastive Forgery Localization Network or CFL-Net, based on recently proposed contrastive loss {{cite:3ee10550cdd499febab1ba27f026349483c1ed6e}}. Our method relies on the general assumption in underlying forged regio... | i | 5e39322803db8ed267c30712bae7caff |
where {{formula:086d8185-ab82-430c-8561-b8ab378b59df}} is a common close-set classification loss function such as the cross-entropy loss; {{formula:9a415433-74a4-4b62-be90-37e59dd83286}} represents a continuous surrogate loss for AUC optimization such as the square loss {{formula:692d5581-9766-488b-98b2-1ed18cb0d6e5}... | m | afecd7a4179061cd9f77b16705a4f013 |
Partially neglected for a long time, dendrites have been recently shown to treat synaptic input in a surprising variety of modes{{cite:5a436e960d50bc3595046c3119f5163b23bbff51}}. One particularly striking example is found in pyramidal cells of deep cortical layers. In these cells, a coincidence between a back-propagati... | i | 8c63645a98bfe35c36909ac789869cdc |
Furthermore, removing {{formula:9df59517-32bf-40ac-a0ee-d3f42f9e7716}} when computing the
centroid of the true speaker makes training stable and helps avoid
trivial solutions {{cite:b590fc5069d124484f30022c30969c291d58237a}}. So, while we still take the arithmetic mean of the embedding vectors when calculating negativ... | m | 59be7bec3f701db5a828ce4785a8aad5 |
In artificial intelligence research, artificial neural networks (ANNs) have made huge progress in the past decade with summation point neurons as the fundamental building block.
Some question whether the trend of "just scaling up" by adding more computation and parameters will lead to more intelligent models.
A neuron ... | d | 727b6aa6adc97c9035b7f41ed738e02d |
With the advent of gravitational wave (GW) interferometry {{cite:7ef4062e6f0f1d21bbe435c3346971fbe41d4714}}, {{cite:98f5747240568489222a5f8db2969b2c15256110}}, {{cite:c9b10b5a509a43f39e52e063e86639d403e14f5b}}, {{cite:c98281891997931cbe68a85218de006cc011455c}}, {{cite:f9ae7eb00d7f8d585272e8b8e108f4f5cd683b3d}}, {{cite:... | i | d576541bca043384747315e2412898c8 |
In this section, we describe our SPT-augmented CNN-based method for robust and accurate LV quantification. At a high level, we decompose each slice in a CMR image sequence into a steerable pyramid with three orientations at two scales. We then use a five-layer CNN to map the pyramid representation of each slice to thre... | m | 946627f189998ebeb45ea84059259afd |
We incorporate the LR and HR image features in two other methods, which were also discussed in {{cite:90f61354b09a6503bdb417892ae85bda807be93c}}. In summary, the image features {{formula:1f7a6b1c-518e-49aa-9573-c22668fbd655}} and {{formula:e7541abc-9a21-4e51-a830-f29b926c13ba}} are merged in the following three metho... | m | 672218470349eb08b273d1e347278fb4 |
where {{formula:9939da94-4bad-47c1-9f27-f311ef56470c}} is the azimuthal angle of the {{formula:6e84eb23-f363-4dd9-8dda-bf512663e05b}} particle and {{formula:830dbb2e-2375-438b-b2a3-85dc5e4de7bc}} is the measured multiplicity. After calculating {{formula:4ad4dfbd-b1f3-4c6d-b2cb-63aeecfb740b}} , events can be sorted i... | r | be0efb2b5aec59b6651e26c200e7dfdd |
The method is as follows: for each crystal structure in the input database, designated as a potential “endpoint,” we find all other compounds that share its anonymous formula (e.g. “ABC2”), and perform a pairwise comparison between all materials to detect commensurate structures using the StructureMatcher in pymatgen{{... | m | ce1fba536cbb46d211d62b0c0cf12507 |
The study shows that contextual embeddings generated by transformer architectures generally perform better than static (e.g., FastText embeddings {{cite:2fb889b16b12a7ae586e3663ec3e48b163397e2f}}) and among them BERT showcases the best performance. Since all of the keyword detection experiments are conducted on scienti... | m | eac79daca796f76cfc880e7f0ddf030e |
with respect to a suitable integration measure {{formula:f4f5a50f-a41a-4b04-9123-a7d56a724fc5}}
on {{formula:5366e879-4e06-49f8-833b-5a60ec47fece}} These CS are constructed for that space with {{formula:d680a63a-12b3-469f-b025-042869359676}} having either a
discrete or continuous basis in different ways {{cite:0735c... | i | 88470ecfa2a701f6962c8fdd52fdf16d |
Understanding how opinions are formed is as important as ever, as the spread of misinformation becomes more prevalent every day. Assume there is some new innovation being either good or bad that is introduced to a group of people who want to form their (binary) opinion about it. Following a key insight by Rogers {{cite... | i | e50acde1fd3bf380d076388cb10bd5fa |
In this paper, we generalized the study on the EN electrodynamics
by taking into account the dilaton scalar field in the action. We
first proposed the suitable Lagrangian for EN electrodynamics
coupled to the dilaton field and in the presence of two
Liouville-type dilaton potential for the dilaton field in all
higher d... | d | 0dfa266239e16cb5c304f11b6590ef6c |
A classical code {{formula:1922586a-d335-4577-894e-078783477abb}} is testable if the syndrome of a proposed code word {{formula:fd31b6f1-4365-45c3-939f-5171ae0251d8}} reveals more than whether {{formula:ac8739fc-5135-40f0-87e8-f9ca7df98edd}} belongs to the code: the relative weight of the syndrome is also proportion... | i | 89e50911cc0e34145c9ac4beb9ab63c8 |
We used the experimental setup illustrated in Fig. REF to test the robustness of our algorithm with regard to baseline elimination and wave delineation. In the first step, time locations of the R peaks were determined, which in our case were either already known (from simulated data) or provided by the database used {... | r | 7c214f2c02b08e082536978987da2049 |
Although we focus on how information geometry can supplement traditional maximum likelihood based inference and uncertainty quantification, primarily through visualisation, it should be noted that concepts from information geometry have also found application in the inference context from a computational efficiency sta... | d | dbafb6d38e3ed53c2bb339482a01fecc |
Estimating the linear model parameters depends on the models and the strategies used to reduce overfitting. With algebraic methods such as the Centroid Classifier
and generative probabilistic models such as MNB, the label-dependent parameters {{formula:aa3a4f9a-e1e4-40b1-9e76-b8ffd6d51efe}} are estimated for each labe... | m | 4ef0f35b1da73854ffb0f5bf6ed4e27b |
Tensor decomposition has shown to be a great tool for image clustering and latent feature extraction due to its natural representation of images as higher order tensors {{cite:f1f1ebcb03707cde206f46ffcc3733fe5c10ed56}}; for example, brain FRMI {{cite:18bddd1fdc480a763e593bd7a6df16d3d2b26a2c}}, head and neck cancer {{ci... | i | 458c2050fe82b1ec2f04805e7d789692 |
The first-principles calculations presented in this paper are performed using the projected augmented-wave method,{{cite:9e1777fb49845d8bac222dde168e2e8ae217742e}} as implemented in the VASP code.{{cite:b5f5391319ba605a5bb17ebb906ccdb7030c3222}} The exchange correlation potential is calculated using the generalized gra... | m | 2df16f2d2c2d4af5894729d7be7da9fc |
Rendering speed comparison: We compare the inference speed of our method with the baselines in terms of number of image frames generated per second. In table:recontablesynthetic and table:recontablellff, the inference speed for NeRF {{cite:e40efd1fc0fe3eb7897f54ad976907ce113f93ec}}, NeRF-SH (no-cache and plenoctree) {{... | d | 9089c7a5bb478e50d62cd2003d68e6ea |
A number of prior works on learning {{formula:c16de6c4-63fc-4af5-9a75-1beb9d72239a}} (e.g. DualDICE {{cite:f046090670e3096d0cb624fb89f8a009db1d5c94}}, GenDICE {{cite:4b055b63b82477700f9657185c92c93945fb40f2}}) can be viewed as variants of the above minimax objective, with some additional regularization terms on {{form... | d | de37cce854bd39efceb82619ddba38d9 |
Use {{cite:d8faccf18d41215182bdcc1c8e38d6c34757b44b}} and the fact that an {{formula:91d0f909-214c-453b-bba6-803a759b0a5d}} –cofinite module has finite Bass numbers.
| r | 7e85b6c9097b1ec267ca62aed1630d59 |
This is the first study to use ML models to better understand and interpret the clinical meanings of characterized WAI regions that are closely associated with middle ear transfer function and further facilitate its clinical application. Two feature selection methods (i.e., random forest and statistical significant tes... | d | 2c571114830ba21b51ccf14763c2078e |
Our goal is to learn a general-purpose data representation {{formula:d430df65-1030-44b0-b5fc-42d95b039031}} that maps data {{formula:81567739-3ab2-468b-aba7-9ec9869b63e3}} to feature vectors {{formula:bab84b23-a56f-4103-bc5a-3caca5dc8de4}} .
In the supervised setting, representations are learned end-to-end as compone... | m | e91526aaeb427f839945e470efbce0d0 |
Dynamic graph streams, which allow for sequences of both edge insertions and deletions, prove to be more difficult.
Edges that arrive in the stream are not necessarily in the final graph as they may later be deleted.
In fact, it is well-known in the community that it is impossible to deterministically return a single e... | i | a27d012251b053c3518d997837e66f6d |
Optimization-based Carlini and Wagner (C&W) {{cite:7571881b6b81c06a9992a462f08d2e1848f0e5f8}} attacks are more powerful as they are more imperceptible and have less distortion in the produced attack than other methods.
Besides, the implementation of C&W attacks can sometimes be tricky and needs to select parameters eff... | m | 4bf9f370594037a9a1f11f86ec2acf45 |
Object detection is an essential yet a challenging task in computer vision field, despite the recent advances using deep learning based techniques. While object detection demonstrated significant success in many applications, those applications are mostly limited in domains using ground taken images. ImageNet {{cite:9a... | i | 5bf5268765e42471abcc969f07759a78 |
Remark 2.2 The well-posedness and convergence of the AH scheme was shown in {{cite:d0179a36f6c5c7e13b996d18c6bbb929b8664c74}}, under some assumptions on the parameter choices for {{formula:b94a2151-cbdb-4548-b035-cc7f1b5fed3b}} and {{formula:1ea6f7e2-0f30-4791-bf97-f17499cf5edf}} . Under similar choices
and additional... | m | e5151797c38472404b786a637cc59f30 |
However, as discussed in Section 3.3.1, because of the higher-order Balmer lines and Balmer continuum in the {{formula:0219cb00-4aab-4693-b24f-17c98a4abbf6}} filter, the unreddened slope in an {{formula:ee24514b-c989-4c87-9609-e795f0e22223}} vs. {{formula:6bf5eb9e-5f87-4b77-9f24-053d65c92d70}} plot will not be 1.07 ... | m | 928094b6e81f6e12e79bceda87c7800b |
A Lie superalgebra (see {{cite:304c7114e8b14b26bff1a8cc03fd9b72e8504aba}}, {{cite:40872c0a866a938bd825720c04ff071c1e6b8375}}) is a superspace {{formula:f8755cad-8e20-4d8c-bcc6-e37c372660e6}} with a bilinear mapping {{formula:74e53601-0aba-40ff-9c81-4ed4a79ce810}} satisfying the following identities:
| r | 4d0e5acee8e46b21ce28fd3480cd0a70 |
To further substantiate our study, the values of the Hurst exponent {{formula:9c70d9a9-309e-4a6f-b60d-532e58775dbf}} and of the fractal dimension {{formula:2d55efe1-9510-4934-ac29-2a8d4cfeb8e4}} of the satellite images as those in Figs. REF -REF will be validated against the the relationships linking {{formula:c3e60... | d | eaab8d1bd6882a20393bf6ea1cf42993 |
VSOD. Recent development of large-scale video datasets such as VOS {{cite:3440c0efb40b44213248a4693febf2dbf6ecfac1}} and DAVSOD {{cite:73dd9337b699bf4c59ffdd1f8e8767bb784ed727}} have facilitated the development of deep learning-based VSOD. {{cite:86d4d87e75d6cf857009ce767cd94fc316e9286d}}, {{cite:9bc485f6257b39c2ae0a88... | m | 65e5879c64d5f865b761cd4d7c3380f1 |
The reduced-basis (RB) low-fidelity model {{formula:1eaec3f3-541d-4ad8-a868-691a8688e40e}} is constructed using a greedy strategy, as described, for example, in {{cite:65bbcddad9a7aa3c1a8d3c1db90626e804ea5262}}.
We employ the implementation provided by RBMatlab.
It has been shown that greedy RB low-fidelity models hav... | m | 147fab12627004eef6db33df928e5c87 |
Experiment #1 shows that although saliency maps are predictable, GradCAM scoring 43.9% accuracy despite no context being provided, the utility of its predictability cannot be ascertained. Among the methods, GradCAM and Excitation Backprop having the highest accuracy can also be attributed to the fact that GradCAM has h... | d | 44889853b48331f63b27c77fa5cc1c1e |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.