text
stringlengths
54
548k
label
stringclasses
4 values
id_
stringlengths
32
32
This continual learning idea has inspired various machine learning strategies. In domain adaptation {{cite:79d890b7f3a3c8a44f6295426d9ebda069155ab7}}, the goal is to transfer the knowledge from a given task (i.e., source domain) to another task with few labeled or unlabeled observations (i.e., target domain). In the ca...
i
ff27d3e1254256a581ab8e120cee3b9b
Availability of simulation data for a finite time interval or the need to approximate the system behaviour over a finite time interval led to the development of finite time model reduction methods. These include methods such as Proper Orthogonal Decomposition (POD) {{cite:a2fa5412b08d21453eae56e8e825518c3fa7dfaa}}, Tim...
i
f1392065bf8fad96fdf5b871df84e797
Recently, researchers have explored this issue popularly. Zhou and Feng {{cite:c6ee5ec0694665b690615ee80db83f0ac8269cde}} proposed a deep forest framework, which was the first attempt to construct a multi-layered model using tree ensembles. They introduced fine-grained scanning and cascading operations and constructed ...
i
f8d3988883603bc5489f719f314f0c55
It has also been suggested that high ionization parameters are the result of high SFRs, which lead to a larger reservoir of ionizing photons {{cite:2d4143943f26847d34a0e4d96c2f74071d1d1f88}}, {{cite:e291f317ca584697b986f904ba8f74b398304a4d}}. This would be in agreement with the observed enhancement in SFR in the rims o...
d
24666ec91d9300322c818236e62aef5e
One branch of EBM works uses MCMC-based Maximum Likelihood with persistent initialization of MCMC states. Persistent initialization uses samples of prior short run EBM trajectories to initialize the current sampling trajectory. This approach is introduced by Persistent Contrastive Divergence (PCD) {{cite:7de59328f63024...
m
52443106b0ef9570b01bd255b091e459
Irony is a pragmatic phenomenon that can be defined as a sort of incongruity between the literal meaning of an utterance and its intended meaning {{cite:326b73667ab93345fd169e209aaef11e791b00e3}}, {{cite:7557cc0800b4a64d913b078c5d0bcd02492d838b}}, {{cite:0a46e7ddb7a38efcb8027f6f64b2ab1c42ec56a2}}. In text processing, t...
i
cf07fdac897c80cab44c40ea1e0314f1
DAIN with MobileNet V2 The CNN module of the two stream network can be replaced by other state-of-the-art deep learning methods to further improve results. To demonstrate this, we change the CNN module to ImageNet pre-trained MobileNet V2 {{cite:5804c7845a3ce1c2758fa778a8674384e1e829fa}}. Combining feature maps generat...
r
600f149fd9f8d0b506710da10ebacb89
ABC approaches also rely on the definition of a set of summary statistics. In this paper, we derived these summary statistics based on their biological meaning. More automated methods have been developed in the literature {{cite:97c5b22250cc3dde4eb0491af7e5f8dcb88475ef}}, {{cite:453544cb74d00ec148dc33b6e107eaf9ee92c6be...
d
a316874a42bd973de08f47fcdc16aa28
In contrast to Theorem REF and Theorem REF below, th:main-partition does not assume {{formula:324db518-bffa-45b3-a1ff-ced549ba7133}} is countable. The reason is that the former two theorems use Kronecker factors via Furstenberg's correspondence principle, and the theory of factors requires the group to be countable...
r
1ba35622283e4f72f938208deb10c2d2
In this paper, we have have studied the asymptotic safety of the simple Higgs-Yukawa model with non-minimal coupling, in the symmetric phase {{formula:af216d45-3238-4ea1-9569-ab94b2dedcf2}} . In the Higgs inflation using the SM criticality, the typical value of the Higgs field becomes close to the Planck scale {{cite:d...
d
eb05288d4b8bf89a6df1ca8b34a55665
From the results of Top-{{formula:57da03be-7f1c-49b9-a609-41b49b6a7a4b}} , Nucleus, and Contrastive, we see that solely using the unsupervised language model without conditioning on image inputs can hardly generate meaningful captions.For stochastic sampling methods (i.e., Top-{{formula:69e27629-d6fd-4d52-8e17-4e13ac25...
r
c8d6377dfd895e38c9debd3ad3297747
Mass estimates and kinematics of PNe that experienced a CE phase can be directly contrasted with theoretical predictions {{cite:46bce06320919ddf6dda74b37f77379556fff0ae}}, {{cite:7fb05e415470048c2b06dd5c7206e90b629f9216}}, {{cite:3c865365e5ff6bb916c70cfa81a571db404a9d77}}, {{cite:15092025f33480b4aca2910f26b6154370a6e6b...
d
4b7df6f504dc483dd16e7d55634af3c4
The three games differ, however, in whether the cooperative outcome obtained through mechanism design is stable even when the planning agent is turned off. Without additional incentives, mutual cooperation is not a Nash equilibrium in the Prisoner's Dilemma and in Chicken {{cite:be2b831fb601ef3141d398f9a3db1190b6dd778c...
r
8c6c70699c17aea0794c656c170a3532
We limit our evaluation to only autoencoders as we find comparison with methods that rely on SSL {{cite:57f65f7580e255896d0218527d1caeef15ae7904}}, {{cite:e0dd32ea7dbd3a1828d3957cc7d2c65f0e8d5879}}, {{cite:7c37186717980f1744da96827d8ce0fabf5c5759}}, pretrained feature extractors {{cite:379786b5145acc277a0770e2d69b24ef9...
m
a2b3b7e21fbc2d5fd16993663ade94fe
Second, noting the lack of DS robustness in CNN-based prior models for driving TTA, we posit that simpler prior models may (a) suffice to improve task performance under the considered acquisition-related DS, while (b) themselves being more robust to DS as compared to CNN-based priors. With this motivation, we model the...
m
98f0140b327b29eee95408a2e5a88b4a
Alternatively, we adopt a racial bias analysis methodology that uses facial phenotype attributes for face verification (one-to-one facial matching) task {{cite:a42081ed3d53fd25b3591d9ee8cfb201069a1f5e}}. The study categorises representative racial characteristics on the face and audits these attributes: skin types, eye...
m
98800328ad500278968caa2ef9854473
The proof of this result can be found in {{cite:15aa922ed0998f708980297c94f010de4f78110e}}. {{formula:577ef935-2ffc-4294-8c2a-80c1865e47b5}} Lemma 4.4 For {{formula:4ec88b58-fa34-4b0a-b537-0c0e72d7aad9}} , there exist a constant {{formula:dbbb21aa-56a5-4c5a-9990-691f8d962b03}} , such that {{formula:0569b316-9274-422c-...
r
486c1e49fb80e25c8deba9c30b04fc55
Ensemble methods are very easy to apply, since no complex implementation or major modification of the standard deterministic model have to be realized. Furthermore, ensemble members are trained independently from each other, which makes the training easily parallelizable. Also, trained ensembles can be extended easily,...
m
18511da3796892e5651f3c2135190588
By incorporating the changes described in the previous sections we arrived at a single model type, with a single set of hyper-parameters, that was trained to reach new state-of-the-art performance on CLRS-30 {{cite:497c87b29196d728d54ec5bfc7179f5d8eecc74f}}. Tables REF and REF show the micro-F{{formula:99268113-80b3-...
r
b6b1c85122af4f693cffd07265f31d35
For comparison, we compare our model with the standard Barabasi–Albert Model {{cite:d6794f9b3e184b2760d0e34236f05222c4c1732d}}. The Barabasi–Albert (BA) Model is a method for generating scale-free networks using a preferential attachment mechanism. Since our model also applies preferential attachment mechanism so it wo...
r
3b8e3829809ea7ce9c9cd04a308e9b61
In the third observing run, the Advanced LIGO detectors operated with roughly 250 kW of resonating power inside the arm cavities {{cite:51ed94c66ed4d1a7ec8135233f0ebfe2236a4d79}}—still only one third of their 750 kW design power. Recent tests in both detectors have shown that as the injected laser power is increased, t...
i
8cfed0db71b4d4bf01197d671b040547
The impact of limited liquidity on optimal trade execution has been extensively analysed in the mathematical finance and stochastic control literature in recent years. The majority of the optimal portfolio liquidation literature allows for one of two possible price impacts. The first approach, pioneered by Bertsimas an...
i
ab3a5d240dbcf737f4b1c392a39ad580
Concentration inequalities are a powerful set of methods in statistical theory with key applications in machine learning. This is due to the fact that in many machine learning applications, a learner often estimates some quantity solely based on samples from an unknown distribution, and would like to know the magnitude...
i
a7ba94233ff1a613a291520b95f5335b
Previous researches have shown that the self-force effect and other interactions would prevent the black holes from being overcharged and overspun {{cite:663963f98598c428993b9be347c40c31916733ef}}, {{cite:bb09fa5aca657f44703b43a05b1e30978ba8bfd5}}, {{cite:2398f6648ef6667822794aba2438b46c1de30a25}}, {{cite:f05186d75af21...
d
e93a1b165b7f40a720b25a1b93bc1939
We believe that this disparity can be explained by a strong bias in selecting videos for this dataset. In their paper introducing the challenge, {{cite:418156b90a065ee931d6e7928400aba08711b859}} explain that the videos are machine-generated and selected for precision “While the labels are machine-generated, they have h...
d
8b1a80ac989bd9422615708e7d3c4952
In the case of distributive lattices and Heyting algebras the lattice of all upsets is isomorphic to the canonical extension. The representation of lattices as clopen filters leads to two kinds of completions of a lattice: (1) by taking point generated upsets of the dual space of {{formula:f0201a4e-b25c-47b8-b0ed-8ddf8...
i
7a2696dd27db9ad4a04f15a752ab09f7
One advantage of subspace-based methods is that the calculation is simple and efficient. Similarly, the linear correlation alignment (CORAL) minimized domain shift by aligning the second-order statistics of source and target distributions {{cite:6941f561a4a526b4c65458bf1c891f492338b97d}}; it solved the following optimi...
m
f7e869b32c7e2bbe420550623dd83291
By the spectral theorem {{cite:f89378ede14e393f6f95134842780dff592d2110}}, this can be expressed as {{formula:0f2c226e-74fd-43a6-9c6e-e51c0900ba1d}}
r
52f53a1fa4fd6a351ad3a81228f1f211
Another critical issue in Bayesian and other model-based clustering is the issue of model misspecification. In particular, clusters may not have Gaussian shapes or may not even match with more elaborate kernels, such as skewed Gaussians {{cite:eb3b8a11a6a8b762fc71f8e0e214a0a1853094fa}}. There is an evolving literature ...
d
7f9f4d009660026045fe8df5e56abc71
To measure the rotation rate we applied the following procedure. In order to decrease the uncertainties due to noise in the magnetic field maps, the linear size of the cropped patches was reduced by a factor of two by binning 2{{formula:ada37b3f-eab0-4da1-8c4b-aaf80c278728}} 2 pixels. Then the flux-weighted centroid po...
m
a8d24792cf0956852d2570546968b097
When there are finite number of algebraic singularities on the circle of convergence, the final result can be extended by adding up the contributions from all singular points; see Szegő {{cite:2ae9759d9cd4b4ec0dfbcd5fceb751e024304293}} and Wong {{cite:ca47722ff6d9c0818ec55473995350a2cd208e89}}.
m
186730d97e850bc3fb4fccc870219c71
The voter model describes a simple process for opinion dynamics and consensus in a population of agents that can hold one of two different opinions ({{formula:038dd91d-b514-4b2f-963d-74e0fb2b34f4}} and {{formula:55c53baa-5034-4062-b24c-73a3291ab217}} ) {{cite:cf0aad0f42217308378d36b8a0c33f785fde7aff}}, {{cite:5459aa0e...
i
fa0ecd6e0cde9cbde2d6d3f1655366ca
A significant uncertainty in this study is due to the poor knowledge of the Galactic magnetic field. Different observations, like Faraday rotation measures (RM) and the intensity of total and polarized diffuse synchrotron emission, are used to constrain different magnetic field components.As described in {{cite:0c35191...
d
5f99076fca69bd495ff9e6e0585597f1
Ablation Study.   In Table REF , we show results on the test set of AICITY22 Track 4 made during the challenge. We can see that ViT, U-Net and CBT metric based approaches leads to the best results. We can see that the base ViT model has a relative improvement of 107.1% which is significantly better that the Baseline Ef...
r
26e426991c0684087d28436a8a6e4e91
Except for GB 1508+5714, these objects have {{formula:ea77d2c1-d95c-4981-8bc5-7e0b3778ae40}} . When considering spinning BHs, which have a high radiative efficiency, there is a great challenge for the formation of such large BH masses even from seeds with masses {{formula:243b8df3-bc1d-4266-b79c-d4a67e16f7a9}} (e.g., ...
d
8c0a8ffa063b23b3ed1bf3054a540f9c
We have shown that substitute model black box attacks are not so effective against 01 loss models when the substitute model is convex or 01 loss. There are however other black box attack methods that rely on just labels and try to estimate the minimum distortion of adversarial examples (an NP-hard problem) {{cite:90247...
d
31584ceb54375053ac614fc0ee542c48
We measured the detection results using the official WOD detetion metrics: BEV and 3D average precision (AP), heading error weighted BEV, and 3D average precision (APH) for L1 (easy) and L2 (hard) difficulty levels {{cite:7ce05daf2f3271dfc82aef5bb151df03e8d63bcc}}. The official metrics used to rank in the leaderboard u...
r
81c04501e4d162235c3219ca7baef58f
Gauge equivariant neural networks {{cite:0ebb9360fe05932f82ff0fd545a6bdcf63eac8bd}}, {{cite:1e66a30ea22123bb722b2a51231e49a4eb272a13}}, {{cite:676fac48b85dc0c6d3beecdc4fbfdeb5a746ef0b}}, {{cite:96f94ee662b88f0d55fbb2a430824cce71690dbe}} are instead designed to respect local symmetries. For example, computations involvi...
i
5818b2c55cc0a493f259e5229561f2dd
We have performed an extensive numerical scan sampling over {{formula:32b04189-e7d5-4c54-83d4-16da496e74a0}} points using the free parameters in MFS. From this scan, about four thousand ({{formula:b57c5a14-1761-4a8b-a7bf-1a575b43af31}} ) points survive which satisfy the latest measurement of {{formula:e6d47292-77cc-42...
r
4ae5bc99ff90f66130d2038f5d806140
Moreover, to demonstrate the effectiveness of our blob-level curvature-based SDF description for robust change detection, we provide another baseline (FPFH in Table REF ) with a point-wise variant of the proposed method by replacing the 3D voxel validation step REF with the point-based FPFH {{cite:b9909dca7bd15831acd5...
r
264137daceb5e078a780e491a3eb698d
Recently, there has been a line of work that argues for the geometry of the loss landscape as a major contributor to generalization performance for deep learning models. A number of researchers have argued that flatter minima lead to models that generalize better {{cite:85f471751f20ad891c1bd72eed0a8266a271afed}}, {{cit...
i
6ff1074ba4536eb1d45d23007c9a6e6e
More recently, deep learning methods have become predominant for guided super-resolution. These approaches work by parametrising the non-linear mapping from the two inputs — guide and source — to the target as a convolutional neural network, and learning its weights directly. The deep joint image filter {{cite:c85beb8c...
m
25c3b8479924605b8ef01e7e2c19fbf9
[leftmargin=*] Political books {{cite:829a78be455016cf3a41f7987a505e5a86f82c75}} ({{formula:470a5822-1f10-40ee-b92e-00b72eafd837}} ) – network of Amazon book sales about U.S. politics, published close to the presidential election in 2004. Two books are connected if they were frequently co-purchased by customers. Vertex...
r
2bee8c15bba8193d0351edbcdf9ad546
Reachable sets originate from the evolution of set of states in system dynamics. Therefore there are two major system model based methods to approximate reachable sets numerically, i.e., set shape approximation{{cite:9a9e2cade972f4fc42d4c123543eb84521c14f37}}, {{cite:aafcec79c8faf5a362e4996d3045defaf5adae76}} and syste...
m
6cf941151090971e9ec54fb3af5e0ebd
Influence of average pooling. In contrast to the original memory networks {{cite:ff116feeae98805127d239aa351b8fe4dc09993c}}, we add an average pooling layer inside the memory layer, which takes advantage of the spatial organization of the information in the video imprint. Figure REF demonstrates the influence of addin...
r
cc6fca14a3d844d870281354bac32e77
The recent work of {{cite:bebdb4eee447dcf00946fa84f30d36cf2a8d6e05}} proved that the {{formula:d6b05974-93bf-48e4-afe3-81364c7f028b}} norm of the error is bounded as {{formula:0e39cdb6-714e-40fd-80d1-3953071dcbe7}} , for a two layer neural network with ReLU activation functions in kernel regimes. {{cite:ea544b9e264044...
d
b5ce89dbe7b3a3fdd0a1b8a001236ed7
The aim of this analysis is to model the energy distribution of the sample of 254 FRBs detected at CHIME. The FRB population model used here is presented in {{cite:756ff4895e3984302e52a0b77398759f1fd98e9a}}, and the reader is referred there for details. We have modelled the intrinsic properties of an FRB using its spec...
m
1ced39b8d460f35500651985d5b2ebc0
Avenues of research have begun to open up on how to prevent this hallucination and how to inject additional knowledge from external sources into the transformer-based language models. One promising avenue is through the integration of knowledge graphs such as Freebase{{cite:fee0b520d5553853e71bae65ba8f83a523ca5f0e}}, W...
i
60806d93f9afa24faf95522fc367f383
The motivation for this paper comes from the close connection between spaces of vanishing traces and the pointwise multiplier property of the characteristic function of the underlying domain under consideration, and more particularly, the importance of this connection for interpolation for spaces with vanishing boundar...
i
bf62dfa0408d019c5dffc6ecd71cae3c
Similarly as it has been demonstrated for liquid-infused porous structures with regard to confinement-controlled phase selection {{cite:dffc925c26a9350b015a5f431ee9ebec8c41c327}}, {{cite:fce43892a6fb494797ff5ab7b3792a670c2aeda5}}, adaptable surface wetting {{cite:cf53fc5254d24fa3d5d33deaa4072c98f4b89e18}}, {{cite:23bd6...
d
3f45bddd81cc9ce795057deb304036b2
Nevertheless, beyond all the problems surrounding quantum gravity, there is an extra fundamental question concerning the application of quantum theory to cosmology. As we know, in the usual Copenhagen interpretation {{cite:35d074dc8a311409ee13f326ede3a0aeba19cd86}}, {{cite:071aa89e6bc40f0935b45dca03cb83b0ac07256f}}, {{...
i
97677cfea5025979709017b25da459de
Secondly, we will prove that inequivalent families of solutions correspond to inequivalent embeddings (not related by conjugation in {{formula:62eaafc0-9db5-4dcf-9460-1b5b9beab01a}} ). The problem of determine all possible three dimensional subgroups of a simple Lie group has been solved by E. B. Dynkin in {{cite:1931a...
r
1484f2a91d2432a03363b23986baaf26
The possibilities of detection of wormholes have been studied in {{cite:6dc480fc95ba2218234116e1dbc8c21cc6327d4b}}, {{cite:09c8afcdf561885fe29da8d23e9f2c216a875312}}, {{cite:73fccd62353811c0d6cfa442606d4fe6b73ce7ff}}, {{cite:871e26e0ac1c2a3c3e4a463dcaa26a3e633128cd}}, {{cite:e73b725f5d460beba4194252bb2229bd798b24cf}}. ...
d
40d61b791982ac0ea9447636d5369682
Deep Reinforcement Learning (RL) is a powerful general-purpose framework for learning behavior policies from high-dimensional interaction data, and has led to a multitude of impressive feats in application areas such as game-playing {{cite:57c18c783fac11fdfa5da7ab99fd01727f1e0dfc}} and robotics {{cite:905244778d73c649...
i
dce22aa33a834588645c01f3f38281ad
One-stage methods directly predict the bounding boxes and most of them adopt the extract-and-fuse pipeline. RCCF {{cite:a1501f404714adb8c47e329d0fc66da424edd075}} uses a cross-modality correlation filtering on visual and textual features, and ReSC {{cite:d4f200eb1b083133e2373abb586e1d65db6edaca}} proposes a recursive s...
m
419b5ab9d934664d199dfa86a9b9c9ba
We can see that {{formula:2a4861b4-e856-4543-86cc-133b66e13528}} -descent condition (REF ) means that the graphs of quadratic functions {{formula:7c94d4ff-50b6-4865-826e-27d74988a12a}} lie above that of {{formula:a8627ccb-1f10-409a-9b33-294d7a37546d}} for all {{formula:9b307e2a-2db9-4dcd-806c-336978f79411}} This co...
m
15fafabab1a7bd4f18b60fc382aabb7c
Influence of Encoder Backbones. Table REF -(b) compares the performance of our model with different architectures, pretrained weights, and resolutions. First, we replace the video transformer in PAVER with TimeSformer {{cite:13e4f71d78487e0934df38521e50fc9d8a552008}}. It shows inferior performance mainly because the mo...
r
bf68e51b1d59cdb6f6c5409107efd06a
On the other hand, associated to the Legendrian link {{formula:e96acc6e-ceaf-4080-9fc5-549956e46614}} with additional data {{formula:31070553-8ae5-45d7-b786-5a82808a91e2}} , Floer theory assigns a differential graded algebra {{formula:57b8fd20-ef04-42ab-8464-2036cb5e8fa8}} (Section REF ), the Chekanov-Eliashberg DGA ...
r
a849526d19b77b587ad038a33b290c77
In the last decades, evolutionary theory on complex networks has attracted significant attention from scientists in many areas, from economy to physics {{cite:b60ec111054bd36e75780c16ef59fdaff6208979}}, {{cite:eea36a7f0418e128028229e54c41d1b51eb5a5af}}. Prisoner's dilemma (PD) is a game in which two players acting self...
i
6c1b1b5b057b905632fea7bdb50b7ee2
In training, we use the smooth {{formula:4eebafe4-3251-41a8-a792-845d2ae04da0}} loss due to its robustness at disparity discontinuities and low sensitivity to outliers {{cite:fd38973d76af2ab5322ec47659f70ce32c0a0e04}}, {{cite:0f02b3654d5035b9f3f85e930f3c6bb6be492747}}. Given the ground-truth disparity map {{formula:7c...
m
4b0365942953fcce238be67414b41469
Fact 2.1 {{cite:c299bc34d714ca852fe369989f99494152b4f1ae}} Let {{formula:4db27963-4631-456b-bdc6-069909d01421}} , {{formula:9a8563b8-b4f0-43b2-b5dc-fbd8f83c4dc0}} , {{formula:5e67d72b-19ce-4601-99fd-9e2eb2108f30}} , and {{formula:fb71e76d-edbe-4cc9-8469-3b63fc321d99}} be sequences in {{formula:05339640-0cf6-4b22-88e6...
r
cf19359624cb1af41d2bc75d209e2ce2
One of theoretical issues to study valley excitons is to include external-field interactions to the exciton model. For a Wannier exciton, which consists of an electron and a hole bound by the Coulomb interaction, the system is similar to a hydrogen atom in external fields. The electric-field interaction can be included...
i
48cfc7957f64669ad206f081edd16951
First-principles calculations were performed using the Vienna ab-initio simulation package (VASP) {{cite:bb4638e85e31040e0b348a59f395094754a481de}} within the framework of projected augmented waves {{cite:9ae73d52ca6a27936ef8b5364e8064b7055983fe}} and Quantum-ESPRESSO (QE) realized in the basis of plane waves.{{cite:02...
m
45c16d9fe01dc4f10ec9ba35c6753f71
The MLR-SNet learning algorithm can be summarized in Algorithm REF . All computations of gradients can be efficiently implemented by automatic differentiation libraries, like PyTorch {{cite:a393b564db5438411d81e146547aa1fd91d8f07a}}, and generalized to any DNN architectures. It can be seen that the MLR-SNet can be grad...
m
848166f2121362ad006e070555486a6d
We ultimately envision a continually learning robot that uses symbols to learn skills and skills to learn symbols in a virtuous cycle of self-improvement. One plausible path toward realizing this vision would start with a set of manually designed symbols, as we did in this work, or skills, as done by {{cite:38c8acb7542...
r
7d4536be32c8615c72bf85956d31ac68
Taking all these limitations into consideration, we propose a novel forgery localization method named Contrastive Forgery Localization Network or CFL-Net, based on recently proposed contrastive loss {{cite:3ee10550cdd499febab1ba27f026349483c1ed6e}}. Our method relies on the general assumption in underlying forged regio...
i
5e39322803db8ed267c30712bae7caff
where {{formula:086d8185-ab82-430c-8561-b8ab378b59df}} is a common close-set classification loss function such as the cross-entropy loss; {{formula:9a415433-74a4-4b62-be90-37e59dd83286}} represents a continuous surrogate loss for AUC optimization such as the square loss {{formula:692d5581-9766-488b-98b2-1ed18cb0d6e5}...
m
afecd7a4179061cd9f77b16705a4f013
Partially neglected for a long time, dendrites have been recently shown to treat synaptic input in a surprising variety of modes{{cite:5a436e960d50bc3595046c3119f5163b23bbff51}}. One particularly striking example is found in pyramidal cells of deep cortical layers. In these cells, a coincidence between a back-propagati...
i
8c63645a98bfe35c36909ac789869cdc
Furthermore, removing {{formula:9df59517-32bf-40ac-a0ee-d3f42f9e7716}} when computing the centroid of the true speaker makes training stable and helps avoid trivial solutions {{cite:b590fc5069d124484f30022c30969c291d58237a}}. So, while we still take the arithmetic mean of the embedding vectors when calculating negativ...
m
59be7bec3f701db5a828ce4785a8aad5
In artificial intelligence research, artificial neural networks (ANNs) have made huge progress in the past decade with summation point neurons as the fundamental building block. Some question whether the trend of "just scaling up" by adding more computation and parameters will lead to more intelligent models. A neuron ...
d
727b6aa6adc97c9035b7f41ed738e02d
With the advent of gravitational wave (GW) interferometry {{cite:7ef4062e6f0f1d21bbe435c3346971fbe41d4714}}, {{cite:98f5747240568489222a5f8db2969b2c15256110}}, {{cite:c9b10b5a509a43f39e52e063e86639d403e14f5b}}, {{cite:c98281891997931cbe68a85218de006cc011455c}}, {{cite:f9ae7eb00d7f8d585272e8b8e108f4f5cd683b3d}}, {{cite:...
i
d576541bca043384747315e2412898c8
In this section, we describe our SPT-augmented CNN-based method for robust and accurate LV quantification. At a high level, we decompose each slice in a CMR image sequence into a steerable pyramid with three orientations at two scales. We then use a five-layer CNN to map the pyramid representation of each slice to thre...
m
946627f189998ebeb45ea84059259afd
We incorporate the LR and HR image features in two other methods, which were also discussed in {{cite:90f61354b09a6503bdb417892ae85bda807be93c}}. In summary, the image features {{formula:1f7a6b1c-518e-49aa-9573-c22668fbd655}} and {{formula:e7541abc-9a21-4e51-a830-f29b926c13ba}} are merged in the following three metho...
m
672218470349eb08b273d1e347278fb4
where {{formula:9939da94-4bad-47c1-9f27-f311ef56470c}} is the azimuthal angle of the {{formula:6e84eb23-f363-4dd9-8dda-bf512663e05b}} particle and {{formula:830dbb2e-2375-438b-b2a3-85dc5e4de7bc}} is the measured multiplicity. After calculating {{formula:4ad4dfbd-b1f3-4c6d-b2cb-63aeecfb740b}} , events can be sorted i...
r
be0efb2b5aec59b6651e26c200e7dfdd
The method is as follows: for each crystal structure in the input database, designated as a potential “endpoint,” we find all other compounds that share its anonymous formula (e.g. “ABC2”), and perform a pairwise comparison between all materials to detect commensurate structures using the StructureMatcher in pymatgen{{...
m
ce1fba536cbb46d211d62b0c0cf12507
The study shows that contextual embeddings generated by transformer architectures generally perform better than static (e.g., FastText embeddings {{cite:2fb889b16b12a7ae586e3663ec3e48b163397e2f}}) and among them BERT showcases the best performance. Since all of the keyword detection experiments are conducted on scienti...
m
eac79daca796f76cfc880e7f0ddf030e
with respect to a suitable integration measure {{formula:f4f5a50f-a41a-4b04-9123-a7d56a724fc5}} on {{formula:5366e879-4e06-49f8-833b-5a60ec47fece}} These CS are constructed for that space with {{formula:d680a63a-12b3-469f-b025-042869359676}} having either a discrete or continuous basis in different ways {{cite:0735c...
i
88470ecfa2a701f6962c8fdd52fdf16d
Understanding how opinions are formed is as important as ever, as the spread of misinformation becomes more prevalent every day. Assume there is some new innovation being either good or bad that is introduced to a group of people who want to form their (binary) opinion about it. Following a key insight by Rogers {{cite...
i
e50acde1fd3bf380d076388cb10bd5fa
In this paper, we generalized the study on the EN electrodynamics by taking into account the dilaton scalar field in the action. We first proposed the suitable Lagrangian for EN electrodynamics coupled to the dilaton field and in the presence of two Liouville-type dilaton potential for the dilaton field in all higher d...
d
0dfa266239e16cb5c304f11b6590ef6c
A classical code {{formula:1922586a-d335-4577-894e-078783477abb}} is testable if the syndrome of a proposed code word {{formula:fd31b6f1-4365-45c3-939f-5171ae0251d8}} reveals more than whether {{formula:ac8739fc-5135-40f0-87e8-f9ca7df98edd}} belongs to the code: the relative weight of the syndrome is also proportion...
i
89e50911cc0e34145c9ac4beb9ab63c8
We used the experimental setup illustrated in Fig. REF to test the robustness of our algorithm with regard to baseline elimination and wave delineation. In the first step, time locations of the R peaks were determined, which in our case were either already known (from simulated data) or provided by the database used {...
r
7c214f2c02b08e082536978987da2049
Although we focus on how information geometry can supplement traditional maximum likelihood based inference and uncertainty quantification, primarily through visualisation, it should be noted that concepts from information geometry have also found application in the inference context from a computational efficiency sta...
d
dbafb6d38e3ed53c2bb339482a01fecc
Estimating the linear model parameters depends on the models and the strategies used to reduce overfitting. With algebraic methods such as the Centroid Classifier and generative probabilistic models such as MNB, the label-dependent parameters {{formula:aa3a4f9a-e1e4-40b1-9e76-b8ffd6d51efe}} are estimated for each labe...
m
4ef0f35b1da73854ffb0f5bf6ed4e27b
Tensor decomposition has shown to be a great tool for image clustering and latent feature extraction due to its natural representation of images as higher order tensors {{cite:f1f1ebcb03707cde206f46ffcc3733fe5c10ed56}}; for example, brain FRMI {{cite:18bddd1fdc480a763e593bd7a6df16d3d2b26a2c}}, head and neck cancer {{ci...
i
458c2050fe82b1ec2f04805e7d789692
The first-principles calculations presented in this paper are performed using the projected augmented-wave method,{{cite:9e1777fb49845d8bac222dde168e2e8ae217742e}} as implemented in the VASP code.{{cite:b5f5391319ba605a5bb17ebb906ccdb7030c3222}} The exchange correlation potential is calculated using the generalized gra...
m
2df16f2d2c2d4af5894729d7be7da9fc
Rendering speed comparison: We compare the inference speed of our method with the baselines in terms of number of image frames generated per second. In table:recontablesynthetic and table:recontablellff, the inference speed for NeRF {{cite:e40efd1fc0fe3eb7897f54ad976907ce113f93ec}}, NeRF-SH (no-cache and plenoctree) {{...
d
9089c7a5bb478e50d62cd2003d68e6ea
A number of prior works on learning {{formula:c16de6c4-63fc-4af5-9a75-1beb9d72239a}} (e.g. DualDICE {{cite:f046090670e3096d0cb624fb89f8a009db1d5c94}}, GenDICE {{cite:4b055b63b82477700f9657185c92c93945fb40f2}}) can be viewed as variants of the above minimax objective, with some additional regularization terms on {{form...
d
de37cce854bd39efceb82619ddba38d9
Use {{cite:d8faccf18d41215182bdcc1c8e38d6c34757b44b}} and the fact that an {{formula:91d0f909-214c-453b-bba6-803a759b0a5d}} –cofinite module has finite Bass numbers.
r
7e85b6c9097b1ec267ca62aed1630d59
This is the first study to use ML models to better understand and interpret the clinical meanings of characterized WAI regions that are closely associated with middle ear transfer function and further facilitate its clinical application. Two feature selection methods (i.e., random forest and statistical significant tes...
d
2c571114830ba21b51ccf14763c2078e
Our goal is to learn a general-purpose data representation {{formula:d430df65-1030-44b0-b5fc-42d95b039031}} that maps data {{formula:81567739-3ab2-468b-aba7-9ec9869b63e3}} to feature vectors {{formula:bab84b23-a56f-4103-bc5a-3caca5dc8de4}} . In the supervised setting, representations are learned end-to-end as compone...
m
e91526aaeb427f839945e470efbce0d0
Dynamic graph streams, which allow for sequences of both edge insertions and deletions, prove to be more difficult. Edges that arrive in the stream are not necessarily in the final graph as they may later be deleted. In fact, it is well-known in the community that it is impossible to deterministically return a single e...
i
a27d012251b053c3518d997837e66f6d
Optimization-based Carlini and Wagner (C&W) {{cite:7571881b6b81c06a9992a462f08d2e1848f0e5f8}} attacks are more powerful as they are more imperceptible and have less distortion in the produced attack than other methods. Besides, the implementation of C&W attacks can sometimes be tricky and needs to select parameters eff...
m
4bf9f370594037a9a1f11f86ec2acf45
Object detection is an essential yet a challenging task in computer vision field, despite the recent advances using deep learning based techniques. While object detection demonstrated significant success in many applications, those applications are mostly limited in domains using ground taken images. ImageNet {{cite:9a...
i
5bf5268765e42471abcc969f07759a78
Remark 2.2 The well-posedness and convergence of the AH scheme was shown in {{cite:d0179a36f6c5c7e13b996d18c6bbb929b8664c74}}, under some assumptions on the parameter choices for {{formula:b94a2151-cbdb-4548-b035-cc7f1b5fed3b}} and {{formula:1ea6f7e2-0f30-4791-bf97-f17499cf5edf}} . Under similar choices and additional...
m
e5151797c38472404b786a637cc59f30
However, as discussed in Section 3.3.1, because of the higher-order Balmer lines and Balmer continuum in the {{formula:0219cb00-4aab-4693-b24f-17c98a4abbf6}} filter, the unreddened slope in an {{formula:ee24514b-c989-4c87-9609-e795f0e22223}} vs. {{formula:6bf5eb9e-5f87-4b77-9f24-053d65c92d70}} plot will not be 1.07 ...
m
928094b6e81f6e12e79bceda87c7800b
A Lie superalgebra (see {{cite:304c7114e8b14b26bff1a8cc03fd9b72e8504aba}}, {{cite:40872c0a866a938bd825720c04ff071c1e6b8375}}) is a superspace {{formula:f8755cad-8e20-4d8c-bcc6-e37c372660e6}} with a bilinear mapping {{formula:74e53601-0aba-40ff-9c81-4ed4a79ce810}} satisfying the following identities:
r
4d0e5acee8e46b21ce28fd3480cd0a70
To further substantiate our study, the values of the Hurst exponent {{formula:9c70d9a9-309e-4a6f-b60d-532e58775dbf}} and of the fractal dimension {{formula:2d55efe1-9510-4934-ac29-2a8d4cfeb8e4}} of the satellite images as those in Figs. REF -REF will be validated against the the relationships linking {{formula:c3e60...
d
eaab8d1bd6882a20393bf6ea1cf42993
VSOD. Recent development of large-scale video datasets such as VOS {{cite:3440c0efb40b44213248a4693febf2dbf6ecfac1}} and DAVSOD {{cite:73dd9337b699bf4c59ffdd1f8e8767bb784ed727}} have facilitated the development of deep learning-based VSOD. {{cite:86d4d87e75d6cf857009ce767cd94fc316e9286d}}, {{cite:9bc485f6257b39c2ae0a88...
m
65e5879c64d5f865b761cd4d7c3380f1
The reduced-basis (RB) low-fidelity model {{formula:1eaec3f3-541d-4ad8-a868-691a8688e40e}} is constructed using a greedy strategy, as described, for example, in {{cite:65bbcddad9a7aa3c1a8d3c1db90626e804ea5262}}. We employ the implementation provided by RBMatlab. It has been shown that greedy RB low-fidelity models hav...
m
147fab12627004eef6db33df928e5c87
Experiment #1 shows that although saliency maps are predictable, GradCAM scoring 43.9% accuracy despite no context being provided, the utility of its predictability cannot be ascertained. Among the methods, GradCAM and Excitation Backprop having the highest accuracy can also be attributed to the fact that GradCAM has h...
d
44889853b48331f63b27c77fa5cc1c1e