text stringlengths 54 548k | label stringclasses 4
values | id_ stringlengths 32 32 |
|---|---|---|
Here, we will present the behavior of the canonical potential or free energy, from Eq. (REF ). By analyzing Fig. REF , one can see that the canonical potential {{formula:0e46e3ef-cba9-4704-b705-935dcd892e60}} has a minimum for each value of the Horndeski parameter {{formula:15f2e171-ae60-4129-8e2b-99a58c90d9d7}} whic... | r | 0c714b082fc5ee1c9af7a91fb6accb6b |
The methodology in this work follows a path similar to the one proposed by Barmparis and Tsironis to discover nonlinear resonances through ML{{cite:4c58e1c794e48bf5d29ce588eef52a33a91a7f50}}. There is currently substantial interest in ML approaches that utilize directly equations of physics or mathematics{{cite:207f824... | m | f07ff0ddb740af6aefbdf1cf9669f659 |
In review {{cite:f03ef3e6fb681c8907384c186b3ec9b56d15080f}}
it has been emphasized that
the use of the QH language
helped to elucidate several deep and
long-standing unresolved conceptual as well as technical puzzles, say,
in the field of relativistic
quantum mechanics or in quantum cosmology.
In several other physical... | d | 3013177fb21fe4108800c73e87fe5e18 |
SOD. In the past few years, U-Net and feature pyramid networks (FPN) have been the most commonly used basic architectures for SOTA models (e.g., {{cite:59c7ec55429673f2de8fc1a12d530a130b366b1d}}, {{cite:1f3d2c2fd4b5ae0b38112f4a345be3595bc2de4c}}, {{cite:7613f27f7efcaaf1863aa22dae2c2cf12307c706}}, {{cite:050933f19fdc182... | m | 37c4601d59689c5ee13ccecbf14ed27b |
News recommendation is important for improving users' online news reading experience {{cite:2602f8e86f116b1cdf06172bb29ae5fe6c6f2639}}.
Many existing news recommendation methods model the new recommendation task as a sequential recommendation problem {{cite:0835519c8a6d1f0bd9726953183b6980bbe919b6}}, {{cite:d7d5afda4b7... | i | b709de5e30a8c2c2a919af98757b6748 |
see e.g. {{cite:d9e7cb67e9ad3a6fb02d6c4e1468acf600b5e919}}. Setting {{formula:0cbeb324-58d5-45e0-b48e-2d932c10d340}} we get, for the {{formula:31ba1872-d826-473c-ba65-58a041a0f286}} corresponding to the above separated {{formula:18285a33-8a02-4cf1-87ef-cc42d20b4d23}} , that
{{formula:8eb52dcb-0805-4abb-bad6-978ef8a9... | r | f27363d2430449efae3fcb139b0b8ad3 |
The other important controversy comes for the determination of the sign
of low-field currents and still it is an unresolved issue between
theoretical and experimental results. In an experiment on persistent
current Levy et al. {{cite:ffbc178a9edeaf3c9d3f0a89d1987c5647b0cbde}} have shown diamagnetic nature for
the measu... | i | ea42e167a6776b76dffadde43d0bb994 |
HDE would then have an energy density given by {{formula:c0e15663-1f08-4001-b388-663e9b583174}} , where {{formula:87a34c55-a936-4570-9ad8-24d07c1bfe00}} is a constant, {{formula:4993f1b3-f208-4a60-9912-6b703caf3d3d}} is the reduced Planck mass and {{formula:ceb5d40d-9567-4074-82aa-e39a95994f0d}} is the infrared (IR)... | i | db5915870a13b304c6cca9497b09efb2 |
Considering each branch, the first part is represented by a FCGRU cell that takes as input one sequence of the time series at each time stamp. The FCGRU cell is a modified structure of the standard GRU unit {{cite:e7cce1e40f1362dcfbd084dac244c89b00744325}}, a kind of RNN which has demonstrated its effectiveness in the ... | m | 98b4a4a32194773818b1ac319f859203 |
Initial work on error correction focused heavily on developing
quantum codes {{cite:f55e6c4c6e7faf594e4711643ac427d44d38d17f}}, {{cite:683b95d0ca55ac80c97a94cd0b358046f1a3faf4}}, {{cite:3795e97e86318732e996e7f8753bc1b9ed5170fa}}, {{cite:417391f6a2b057acda7a65c826eb0712842d3f77}}, introducing a more rigorous theoretical... | i | 261459c9870ae8cc4c4f030265e23fe6 |
Phylogenetic trees and networks are important discrete structures from biology, where they are used to model evolution; see {{cite:2c49320fd87e1e9e533069a4d665f1abe93a9893}}, {{cite:93f6f4766b6bc405c18000138e43183d78f85f72}}, {{cite:48b2c3d5bee0ac3a398a0211f1ea5eca7e15719b}}. Of these two types of structures, phylogene... | i | 46f6743ab591b47d6e65393fa8162c4f |
To address these weaknesses, we propose Fast Interpretable Greedy-Tree Sums (FIGS), a novel yet natural algorithm which is able to grow a flexible number of trees simultaneously.
This procedure is based on a simple modification to Classification and Regression Trees (CART) {{cite:56ab112db47fceb0e9440138cce9036db3c7a1a... | i | dfcfe54ce1aab3d503afe339620ca0a2 |
In this paper we assume that the Lévy measure {{formula:114f8203-789d-4e00-8d72-bc6d5793864e}} of the basis {{formula:07af2f05-fbe6-424f-bd96-9795e03860ed}}
has a regularly varying right tail;
see for instance {{cite:718fd7f11224e9de285a717f6096481d5d391928}}. The regularly varying distributions are in particular sub... | i | e88aaeb70660c0c5f95a6782e24e5acc |
Computational complexity. The most computationally expensive component of STED is computing optical flow. Our implementation uses FlowNet2, which requires 123ms to compute on an Nvidia GTX 1080 GPU {{cite:72383482120b8b6b3ead9e9d78b0b812acf3cfde}}. This model may be replaced by more efficient methods, although we found... | r | b2c58f9695a7c86cd2d21ea5e87252b8 |
In this paper we compare exact quantizations of a dust shell in two different times, viz., the coordinate time interior to the
shell and the shell's proper time. In section II, we briefly summarize (for completeness) the IDL formalism for the dust shell and
obtain the first integral of the shell's motion. If the exteri... | i | aa3670359e4895d827fb7681fc11b8dd |
In this section, the discussion of deep learning (DL) models that were used in the research on text style transfer is presented. The vast majority of the models are built upon the encoder-decoder architecture {{cite:c4ebe7a14bc41694586ed7ccda2e41efed7532b7}}, {{cite:88d3684435d66eec80cdc115174b4f0f765460ae}}, {{cite:4e... | m | 1601f25d678bad4a2bc5026035064d52 |
The results of {{cite:2f34206c99eadfd039106a36b595141ffa4a2c41}} and {{cite:5db1f8cd89984421b74b52595293381758261af6}} have been generalized to homogeneous nonlinear predictors by {{cite:11878774f15228d467bb57757f4c67f4138c87d8}} and {{cite:50aa43ea6ffb9852319be61c292a2138cc32c285}}.
They demonstrate that gradient desc... | i | 88ff0406f729cc1f832066185241d63c |
Perturbation via Unknown Data-Distribution: Prior work on audio conversion via exemplar autoencoders {{cite:1fe607326933c29076a8b159d2a288aab0544220}} showed that one can input an unknown voice sample from a different person (other than training sample) as input and yet be able to get a consistent output. We study if ... | d | 382f918932c72adfbe8960f80ad5e9c6 |
In this paper several new gate protocols have been proposed for realizing high fidelity and spatially addressable quantum operations that are insensitive to qubit position fluctuations and motion, which is one of the major challenges affecting scalable quantum processors based on atomic qubits. This includes a new robu... | d | 1cf11db5d96bf9a1de811251761e4268 |
Traditional works analyzed EEG data without taking consideration of the topological relationship of EEG electrodes{{cite:a745d0e17e502abf156049230b0ba73b220f0639}}, {{cite:71dcf26c8c9b12b0071a2938855f38c6b9240487}}, {{cite:a3dde3dfe880202ddd3a5c9a8e62bd4b22707ed2}}. The latest neuroscience, however, has suggested brain... | i | d54eacb26deb61eb91ceec4133c7eed1 |
Qualitative Results. Fig. REF shows qualitative comparisons on SYNTHIA {{formula:eedd4a51-daef-424a-9d6e-9cf91ed7b2ec}} Cityscapes. It can be observed that qualitative segmentation is well aligned with the quantitative results. Specifically, the baseline DETR {{cite:e7d0951e733aea835b65bea871404df5d2569984}} produces... | d | 65ae027585355e458f431e7d78bc0d1b |
Qualitative comparison
In fig:teaserexample and fig:qualitative-comparison, we further show visual image comparisons of the previous work and our method on different SR scales. For areas containing scale variant stripes, the previous method{{cite:1924daeed416ac3f86ccb7b025d1f3934a43ca59}} will produce checkboard artif... | r | 5665bb694686fa212e5739ba20c27b1c |
Qualitative comparison is shown in Fig. REF . ABCNet{{cite:91c92fc56bc16f0774ce9df6d61d15fbc910725a}} is easy to be confused by adjacent instances since it predicts two separate curves rather than the whole shape together. TextRay{{cite:dbdcd44e918c4deab4961037396c77969bd36c4c}} fails in highly-curved or large aspect r... | m | ed1b341e65f2ca4d52304246036a24c1 |
If we saturate the decay width of the {{formula:c91bfdba-1e72-4738-906a-24ab4e3c2bb3}} with the two-body strong decays to the {{formula:561763a1-408e-4c32-98b7-cddd7a4fd123}} , {{formula:7c29476b-fe1d-4ad1-85e0-beef8166dcdc}} and {{formula:930adb22-5e66-4e89-a860-c557e5018da2}} , we can obtain the total width
{{formu... | r | ed4ac5a45d176c311d48561bfabbad83 |
The fast rising high-tech industry leads researchers to find a better alternative for linear controllers {{cite:f9c445880b8631a7612af081e837b1f8fa012e2a}}. One of the appropriate alternatives is reset element which has gained a lot of attention due to its simple configuration {{cite:ae68f18dfbc617a1ad5216ba553ec299a6dc... | i | b81d52538d6423febcb340e94d63f81b |
To check the validity of the theory explained in the next section, we perform the molecular dynamics simulation.
The detailed information is as follows:
We solve the equation of motion for each particle in terms of the Sllod equation {{cite:230926f2d5e4d562b8e41016cccaa787d0e2bb03}}, {{cite:a42a02d65f2909c9fdcbf002b1bd... | m | fbb68968b1796f0bf8ef9c86b529dcdb |
To quantify structure, we characterize the inter-particle forces and particle configurations using the radial distribution function, {{formula:6793655d-c7b1-47a6-841c-c4e9f499e50b}} . Since the material is jammed, the motion of each particle is arrested by its neighbors {{cite:41129ec3cf475faf425a45a51905369285752385}}... | r | 833314e0eaef187f1c19726bb5c5788e |
ML can be used for tasks such as classification, object recognition, and segmentation. Classification is a task to classify input data by assigning it to one or more categories. In fashion, some models were proposed to classify photographic images into fashion style categories (Fig. REF ) {{cite:40b81fc9c19cd3e2391da0e... | m | 8a380b542d5ea10dd813049fa2085c2e |
The Elbow method is a heuristic technique for clusters number estimation {{cite:9d08fdb6d64d698a2a4f70321c5fd91c43d313a7}}, {{cite:648ec396c998a7337c9d4ed5c316f780e4d8604b}}. The overall goal for the method is to maximize the inter-class variability and minimize the intra-class variability. In this study, the data samp... | m | 01523031fab635c733e5ad6be874abf8 |
Following the standard process of membership inference attacks against ML models {{cite:62d010df48c764d3c2bc633749168e2193d6a21b}}, our attack can be divided into three stages, i.e., shadow model training, attack model training, and membership inference.
figure:attackpipeline provides a schematic overview of the attack... | m | 1825042244f62f8560fa8a57b2391d79 |
The second major outcome of the present analyse relates to the potential use of the helicity eruptivity index, {{formula:c14bc823-0a4c-47b0-b264-8fcbc876e372}} , in eruption prediction. The numerical experiments of {{cite:b91ba174e47923012037ae2c40718b734c345a12}} showed clearly that the onset of the eruptive behavior ... | d | 3265d5cf8d7ee2d7bc6a276348f4ceaf |
A fundamental property of diffusion is the concept of particle lifetime, which is a particular application of the more general concept of the first passage time {{cite:e4d3b1848348960ae78b7f20c59560eaa3ad6362}}, {{cite:297a158bed223d49a60e30a8cfe9b4bfbaa82199}}, {{cite:bb6966808863e5216a27ae45199e5f4638c11c72}}. Estima... | i | 31611af188e478112bf6cf45a4a76da6 |
2017 {{cite:779426169c30a3e47d3b1eb7bd967b0b132f0c52}} YOLO9000 Improving accuracy
| m | 7172845032af7ec309008afe01154139 |
To do so, we first transform each input image into a color LDI {{cite:4fc40d55bc7746afd5bb3efd148ea4e83a9ac546}} with inpainted color and depth in occluded regions.
We then extract deep feature maps from each color layer of these LDIs to obtain a pair of feature LDIs ({{formula:b52c871f-a9ed-4328-adda-5cc3185d5a2a}} ).... | m | 754c9887b17efcec946630e8f0429978 |
The measurement of all ground-state charm hadron species in a broad {{formula:b5aedad1-e3ef-49f4-b63f-fd87dca78091}} range allows the total charm production cross section to be derived at mid-rapidity with minimal dependence on models, as shown in Fig. REF (left) as a function of collision energy. The total {{formula... | r | 52f16cd380dc7577f4ed3e9aa5c323d5 |
Relations to temperature scaling. As introduced in Section , the logit normalization can be viewed as an input-dependent temperature on the logits.
Related to our work, previous work ODIN {{cite:0d095b6f622035d9e1395acea50cec5bb53aabbc}} proposes a variant of softmax score by employing temperature scaling with a consta... | d | 192adf55cfb185672cbd0d263c409ee6 |
For scalar problems,
standard flux limiter functions {{formula:6248a0f2-82c5-4e41-9a90-ee3cb215df51}} , such as minmod, superbee, van Leer {{cite:6c4b49c34dadfc128797bd343e4f7b0f5c4ca3dc}}, {{cite:7184bac279d84e02b33378ad485e964f2bb0720e}}, may be used:
{{formula:e48ddc8d-07c8-4cc5-b8c1-029251cd9804}}
| m | 85b8afdb29355664288f61a5b6bc0a8b |
The disadvantage of data augmentation methods: CutMix {{cite:c76ed27625f0e46acc2a80360c88fda67c855aa7}}, CutOut {{cite:319a6266adb88938db6a866f03c5b80dd5238385}}, and ClassMix {{cite:78a31bbccf7e6baffa51cec755d7f217c172d5b0}}, is that the images of Mars are relatively simple, so the mixed data is not far from other dat... | r | 48367d9371e4fee5e32c6f9dd7a2ea09 |
Recent work has shown that scaling language models with considerably more data and parameters, such as
GPT3-175B {{cite:96d9bc9d9f9d55f4ff00f083c6ceff5d261d5ae5}}, could drive significant advances in commonsense reasoning tasks.
Nevertheless, such models make predictions by only “looking up information” stored in their... | i | a71b079bfb4561f8f04f27c690cec4f1 |
QCD at strong coupling has been studied by various bottom-up models constructed from gauge/gravity duality(from both, bottom-up and top-down approaches) and at weak coupling from perturbation theory. A popular top-down holographic type IIA dual, though catering only to the IR, is the Sakai-Sugimoto model {{cite:a334108... | i | a0b7519dba8183957e46249f9e537fea |
Kronecker graphs operate by learning an initiator matrix and then performing a recursive multiplication of that initiator matrix in order to create an adjacency matrix of the approximate graph. In our case, we use KronFit {{cite:47dc00400fb4ab6b644bec1f760c5ab23d05b005}} with default parameters to learn a {{formula:1ed... | m | 8b3e4a4d115ec0d320410dc07f83f005 |
In a multi-core or many-core shared-memory environment, the speed at which
the parameters can be updated by different threads may be a limiting
factor for stochastic gradient descent (SGD) performance. This is because threads must lock the
parameter vector while they are updating it, preventing other threads from
readi... | m | 0d0455314ec5a3a9cd1a826f5d6ae54a |
A minimal matching book thickness layout and coloring of a computation {{formula:3672ccae-6ed6-4ad4-8d3f-dbc561571c1b}} needs {{formula:bdb1749a-df59-46e1-bdb4-77e2d16cfe1b}} distinct time-periods (phases), where during each phase all edges of the corresponding color can be routed simultaneously {{cite:5890cd5bb1f8db... | d | ee817ceb4b122a4d9c803b7f5ad6db3f |
For DL models, there are several interpretation methods based on example-level information.
For example, the influence function {{cite:aff7aa63320572c3d8fabb8cc20557339ef16af0}}, example-level feature selection {{cite:b9f53dc52c741b3545c74cf4eeb8cb275b6a946c}}, contextual decomposition (CD) {{cite:9a22ccba65675f2aed161... | m | e2dfd137035561c15eac4922193e8023 |
{{cite:09713f46bfdc8da67226658474d840992accd7ad}} impose assumptions that imply the confounding bridge is unique and point identified. In our model it may be neither unique nor point identified. In fact, under Assumptions 1.1-1.4 the confounding bridge is generally not unique unless {{formula:2088a152-d6a6-487a-8480-28... | d | 39dab452e3e4df5bfd9c5b812126e56b |
To assess the standard scale variation method of assigning a theory uncertainty to predictions of inclusive cross sections at the LHC, we analyze the comprehensive set of LO and NLO calculations presented in Ref. {{cite:dd9da7878c5e3bb3dae75d6fdaff2883a40ef6e8}}. For each case, we investigate to what degree the uncerta... | r | 68d0ccc906102bf5fcf40398fbcc4a54 |
Following previous work {{cite:a3186ce195a26036ecae807693641485d63d2166}}, {{cite:98423fcb7921050b00d426e518a11410b969a4d4}}, I took the covariance matrices underlying the probabilistic model to be identity matrices, {{formula:51da7715-92fc-419f-ba01-f436ad34c1bb}} , when deriving the predictive coding model. Even with... | d | 7bf69c6dac77c3f0c05b60cc2a7db250 |
In the light of AdS/CFT correspondence {{cite:af92c27b82a55d87277db2ea24228ec0fd3517c0}}, {{cite:c0bad2122a478643ce81b4d4431643b8ac6d073d}}, {{cite:b674a491ede49b336d03c8285afb4a5c3a959585}}, the quantum computational complexity has been thought of as one of the most useful probes to study the physics of black hole int... | i | 0e339852a09f97ffea26f2b5a5f21b1e |
To solve this MDP, the authors in {{cite:0196267da52ad84e6304b57a1f0479af07f62fad}} have leveraged the Bellman equation and studied the characteristics of the value function involved. Based on the particularity of the value function, the following result was found:
| r | 1e4d4a23d2c826ee2b99b1b6a02f5493 |
For Gaussian noise we compare our method against six other blind zero-shot denoisers: Noise2Self (N2S){{cite:3e735e0a3600aa8d1f05072899533d5c22c041fd}}, Noise2Void (N2V){{cite:f2b0fc1baa5ee5d71d0d01f3b248779dfa097dab}}, Self2Self {{cite:60200c297dc9d94eaf4bedba6355fd8ed2ce8c72}}, Deep Image Prior (DIP){{cite:9929e95328... | m | 7540d18d21bb4cd7d720357f657e12a6 |
Moreover, the data-driven parameter discovery of the defocusing NLS equation with the time-dependent potential under the sense of the rogue wave solution is also studied. It should be pointed out that the considered periodic boundary conditions are non-zero, which differ from the other learning solitons with zero bound... | d | 4091337a9ebdf4d8f94a5063d11299ef |
Effectiveness evaluation:
Our method was compared with well-known anomaly detection methods including the one-class SVM (OC-SVM) {{cite:28ba4bf705cb4df262933f41eb1845129b551efc}}, the statistical kernel density estimation (KDE), and the autoencoder (AE) {{cite:e270098ad31ea192a88f3de5d7b4fd7bb5ad4a59}}, the recently pr... | r | a352faed5a54a734c974f09169afb127 |
Since catastrophic forgetting is an inherent feature of current online neural networks, test-time training could benefit from the field of continual learning {{cite:35c88fdd3c051809a002aa7c2d9c66d036adbce0}}, {{cite:c680b3b137a79ef0414da357cfca082cb89fc07c}}, {{cite:f4eca553a3cec9d66dcb543a4dd7ed66bd1571d6}} which aims... | d | b56dbdedc3c53e615e2db9a31737b052 |
An inherit drawback of kernel methods for large datasets is the fact that they require the calculation of the so-called kernel matrix {{formula:81074a07-e498-4fb1-a32e-79f886358d2b}} , having elements {{formula:a34c8562-dd04-441d-b51f-a4f3fe0a308b}} , and the exploitation of {{formula:3054aabe-53cd-4a9c-aea2-98f92a065a... | m | e3f3f74e3c81d4c86859ea1e454fde1d |
When the post-change distribution has parametric uncertainties, Lai {{cite:9d24dc3c4abd7cf963c39f03e17ce5428bbcb413}} generalized this performance guarantee with the following assumptions. Suppose that {{formula:9236d538-bd17-4805-bdcb-05152d004b94}} and {{formula:ea3e0c2f-caec-40b1-ae4d-5e7d68f7644d}} satisfy
{{form... | r | e2ec3c06692b910d2b605d8a30f28415 |
The ZX-calculus has several applications in quantum information processing {{cite:3956b44647f99085b55a745313abc9828a07235f}} (e.g. measurement-based quantum computing {{cite:8eb9e7987126d846052d491d601767760071ae56}}, {{cite:9835495675d1af243cb8099c369d56c223947dc3}}, {{cite:642d32c796cff9b81b20ec9991bd870d62eadb49}}, ... | i | cb6274f53c51a7ed8e7369ac0dc87c18 |
For contrastive loss, different from {{cite:2dca87b6ef09e6ba0e6fbe48cab9037b51a9d069}}, we adjust the contrastive loss term to allow for multiple positive samples during each forward propagation so that similar images that belong to the corresponding class prototype are pulled together for more discriminative represent... | m | 71546854cb190c06e0fd55cb19b43993 |
{{formula:d3cd1021-574c-438d-9802-c16b11dc10c6}} -gram token distribution.
We compare the unigram distribution of a code-switched corpus (SEAME) with a standard monolingual corpus (PTB {{cite:85ea7f049cde2107b1ccadba6c87631cf59922f9}}). A glaring difference is observed in their distributions (Figure REF -a) with signi... | d | 116b514fd0e969dc206173fdb2120947 |
We follow the definitions in {{cite:3ab314d74bcd4e2689e95feafe79a6f0a54c03ad}}, {{cite:90c2879affe2bfdd932789e4e2ec301e01dae769}} to formalize theHFR task.
| m | dffb48815c18b31a287ed521734eb67a |
Federated learning (FL) enables various data owners to collaboratively train a model without sharing their own data {{cite:3e6ed5f03443bc642155ca52433f73c67f6c9176}}.
In a FL system, there is a server that broadcasts a global model to clients and then aggregates the local models from them to update the global model. Su... | i | 3f2c7b84b86733664ceefef2af784ce0 |
The edges and fine structural details present in the LR image are extracted by the HLIE module using the low-level information {{formula:f78e5b08-daaa-4d5d-bb32-b35cfe36cd8e}} . HLIE module comprises of 32 Residual-In-Residual (RIR) blocks, one {{formula:b177bcdd-edad-46db-ad30-3ea084157977}} convolutional layer, and ... | m | cbd58e6beb77afc8759ebcd49fde3132 |
Rotational mixing can more efficiently inhibit the settling of helium than of heavy-element
abundances because the mixing depends on the gradient of elements {{cite:4862d49a0444c69341c18527ca44dcd05e4389f0}}. It can reduce
the amount of the surface helium settling by about {{formula:fe22fdb3-07a2-438b-b54d-380e402f00b8... | d | bdca6d971ad02275e8b236034a18cb01 |
We compare our method to 13 state-of-the-art methods, including 7 traditional methods {{cite:7dfffa9d813e95c563d39f5324c3c18f0e9e4427}}, {{cite:58b420567a5fe0512f393c28acb814ee83125ff2}}, {{cite:90f492ffdd99716451998c2986c9ddfbde0588cf}}, {{cite:662e451febab6117dc0e14193d23f35f36fe698c}}, {{cite:c96fbe093e56ab6dfad599a... | m | 68a9e79870645b2fe7624f91b417c92d |
Let us estimate the
probability {{formula:5432d73c-5729-41c3-b760-0bef0437698d}} using a
probabilistic classifier—a function
{{formula:1a652cf8-7e9b-49a4-a97c-9110d1e91eb0}}
parameterized by {{formula:9e33d5d3-5832-44e8-9bb8-202012a82f1c}} .
To recover the true class-posterior probability, we minimize a
proper scorin... | m | d287fa591299995e97fc6948fe038930 |
Trading a minimax problem for an estimation problem does not come for free. First, there are some computational considerations. The HSIC is computed in quadratic time but linear time estimators of dependence {{cite:e5ca52e7379e3cbffbfa24fcccbe599d288e04f0}} or random features approximations {{cite:4cce9f82816fd3a040936... | d | 1b963eee46a10990e4a2ff25321f016c |
We first consider an example of the difference between superimposing and aligning manifolds on image domains. Earlier work {{cite:4b6669344c56df4ffac9480298e8e02341f1810e}} has demonstrated that an image of an object in the first domain can be mapped to an object of another object in the second domain while preserving ... | i | 95dbf6b4fee4beb58e3f72bd05834ad6 |
We use the same prompt at all perspectives. This can lead to repeated patterns on multiple sides of an object. The target caption could be varied across different camera poses.
Many of the prompts we tested involve multiple subjects, but we do not target complex scene generation {{cite:a17b98fa5a5ccde9bcb3f3118591d4f84... | d | 33e495a4fc2a521194028bde1dafabae |
Using OGLE IV photometry {{cite:488cc69c5bc2bf200f737ce9f84d6bb1dc305b6f}}, a systematic difference between the results for the Oo I and Oo II type samples in the Galactic bulge was detected by {{cite:1d0e390bcbc51a2d68e98b6ec6fad6580e3bc8fa}}. The median [Fe/H] value for the Oo II stars proved to be 0.1 dex more metal... | i | f6d229fa2867dd3d293bf7e3f4d028bd |
where I put
{{formula:3a26dac9-1540-49c2-9538-1464f64906fb}} {{cite:70d563998fe0b9f270e0a957f120cf7b4db41edb}} in order to have
for {{formula:b16698f9-908f-4f2e-a1a1-1493ce6bb7ac}} the physical dimension of time. The expression for the
“4-velocity" {{formula:65446de8-b132-408c-9af9-18d52a5705d2}} is as follows
{{for... | r | 52cac9b8b92aaabddc17f13b1769c8f2 |
For non-sparse graphs ({{formula:6e813087-c858-4754-8e22-0ec680b69561}} for some large constant {{formula:eb2a5549-9d8c-4159-beb8-a62f56533cb7}} ), the work of our algorithm matches the best {{formula:20e9bb1c-842c-4a5d-84ee-10e4d5b63922}} runtime for sequential algorithms {{cite:57c0f12d54d7e1b3d1e1d3ab859cc008d7dcb... | r | adfeac5dfa4fe56d808a625fb6b3a6e6 |
Subalgebra-subregion duality also leads to new insights into and perspectives on entanglement wedge reconstruction and its interpretation in terms of quantum error correction {{cite:3ea4c4dfa984dabcbe79fb734616a255c3ae4f0a}}, {{cite:9b1ba27b160beb2cd201468fb92406ec81f2a251}}.
It can also be used to obtain entanglement ... | d | f5680c89b49f149753b67a6b2b20f528 |
With such a diversity of works around the idea of interpretation, we still believe that the current discussion lacks generality and doesn't touch the core idea behind the interpretation. By rethinking the fundamental property of interpretation and starting from intuitive assumptions, we build a general framework to syn... | i | a955560f345e4a0f3c67a009209cfaf8 |
Network properties have to be tuned to task requirements for optimal performance.
It is widely assumed that criticality optimizes task performance.
However, we found that one has to phrase this statement more carefully.
While certain abstract computational properties, like the susceptibility, sensitivity or memory time... | r | d445bf445b68207fb50fe610132a064b |
In this paper we constructed a family of density-scaled filtered complexes, with a focus on the density-scaled Čech complex and the density-scaled Vietoris–Rips complex. The density-scaled filtered complexes improve our abilities to analyze point clouds with locally-varying density and to compare point clouds with diff... | d | e24012c5d80e0de2b53ac2a4836f218d |
In the following we present a sample program using +MARTY-1.4+ {{cite:61d4e348403b449d83085be6e50f151fb021d4a5}} to calculate, in general BSM scenarios, one-loop Wilson coefficients for flavor physics such as {{formula:8c1e7890-e05d-4e6f-8a27-45780fdc54ef}} and {{formula:28151782-b8d4-4cf0-8370-d6dd8a4007f4}} . These ... | i | d7fa37218c94dd88190edeb2b301b35b |
Additionaly, the area denoted by a blue circle in fig. REF ,
where bright surfaces have been identified by {{cite:7d51975b3a38dae492f493e314347218db1b718c}}, was
considered to host material enriched by up to 6% in water-ice according to
infrared spectrum modeling {{cite:f62b073d442531e5a048765e5bce054c5aa90bec}}. For s... | d | da7f84246980e15398ff30830a8beda1 |
In the experiments on the false news detection task, we found that detecting right-lean articles, in general, was not helpful among the classifiers. The reason for the difficulty in detecting right-lean articles could be a potential data bias. Social media and crowd-sourced platforms tend to lend high visibility to vir... | d | 35f7eb59629fb98a4625cb2669ea39c0 |
Many of the existing experimental constraints on dark matter (DM) crucially rely on the DM interactions with nucleons, and therefore, can be largely weakened if the DM predominantly interacts with the Standard Model (SM) leptons, but not quarks at tree-level. Such leptophilic DM (LDM) could arise naturally in many beyo... | i | 5dedb89069f792640f4cb391e1aaf370 |
The accuracy of DenseNet on the Flower dataset {{cite:28864dfe1bdc5e51e47cae1837019cc3a1669bd4}} is 98.1% which is around 5.5% higher as compared to the second-best performing state-of-the-art method (PC-ResCNN {{cite:bee031dd4d02c84bdb82fa46d0d0d457d9ecbd94}}) in Table REF . Similarly, the other traditional classifie... | r | 5a12ba2ad194510c8ab3c1309a4e79c5 |
In this paper, we propose a theoretically motivated and provably optimal solution to enforce the affine constraint of eq:constraint3 into DNNs. In particular, by focusing on convex polytopal regions {{formula:286ad19d-f342-43dd-ac43-214d0743c78c}} , we are able to exactly enforce the model to be affine on {{formula:30c... | i | 88b55cbb56fdb8c4b8536a54238c11fa |
The typical connection density in the Industry 4.0 era is about {{formula:a7419987-d70c-48e3-ad2a-185d1153e25f}} /km{{formula:ba727c63-049a-4038-81f1-3b7f6a950e26}} , however, wireless communications
have a limited spectrum bandwidth for transmission.
Therefore, transmission scheduling among the ubiquitous sensors is a... | i | 5e923800af3208e4a0cce1071724cbdf |
Early regression-based methods such as TextBoxes++ {{cite:c08cd29aa753095e0c6d5c969a9c62d1ebb48e97}} and EAST {{cite:7cdf304ac7f51b70908cb20cc502adb8934e006c}} used SSD's {{cite:e633b27055dc6ca03866e2985adbc9e8e0ca4add}} architecture to detect text regions with rotated rectangles or quadrilateral descriptions.
More rec... | m | aeb4631994be745fc971353375f7abdd |
The proposed framework assumes the existence of latent components that connect the exposures, mediators, and outcome. The identified components are linear combinations of the exposure/mediator features making the interpretation less feasible. Though an ad hoc approach is suggested to sparsify the loading profiles, inte... | d | 0bc8b31502c2ebeba1f39b349772beec |
General transformations between these two sets of constants can be found in {{cite:fc70c66e2ab3de7173a8f874669e470367174a44}} (or Appendix A of {{cite:7e31e3dffd460c1448ead67e7cfd558deaf70f8c}}). The nonlinear information coding of Lanczos coefficients plays an indispensable role in demonstrating universality of operat... | m | 55d4e8a24dd885ec0e13fc039e3665ea |
The consideration of small black hole presented here can be generalized to the Reissner-Nordström black holes {{cite:82ee1a42dd8deb7c42e1eba050cba27217601837}}, {{cite:882fd565b8f7bf2ce84dda6dd41f380c040b0ee2}}, charged dilaton black holes in non-asymptotically flat cases {{cite:e63753fc8b5797e8e6aa6d984162689d8607a1bf... | d | 2d2437571dba3aa12fc373a5b3157b09 |
For more details we refer to {{cite:24223e35e21ae65634858cec06b75991ca8b181e}}.
| i | 60c087fa174380c82bd179b1ee77311f |
We emphasize that there are conceptual differences between the flow method and the standard bulk reconstruction. (See {{cite:574f2a95d561ba1269ab6978c26dd68516275692}} for a different point of view on the standard bulk reconstruction.)
Although both methods employ formally the same smearing function to construct the bu... | d | 099cce5e4012aa85cc05d469ca65dde1 |
Theoretical guarantees for treatment effect estimates generated by (REF ) often
rely on
statistical models of the outcomes {{formula:d013bc24-ca91-4959-9f13-3f89d0babe33}} . While synthetic control has good performance
under a range of outcome models, there may still be doubt whether these models are
plausible in setti... | r | dcd4379a951aa63a1840ee7be58acbe7 |
where {{formula:aec9a90f-d2a4-4fed-8947-a4fe1efb749d}} is a two-layer fully connected neural network. The final network output is given by applying a softmax function to the vector of logits.
This approach to fusing the embeddings of the other devices to make a permutation-equivariant scoring function is maximally gen... | m | 9947919d5ca4afdedd1ab7832443252c |
then one can derive from Table REF and Fig. REF that the change in {{formula:0c9e3034-9f81-47fc-974e-739249d4b4e6}} and so in {{formula:a614bf05-deeb-44ce-87cc-531f7477702d}} from our fit is {{formula:dfd0a369-a35d-4646-9b48-f60be3ce2ab3}} in a redshift range {{formula:f83e6191-526c-4195-9d82-b07f33b0cc4f}} ({{fo... | r | 4699a7ec2563ef19ff3e139d87d4cc34 |
One interesting proposal to solve these issues was presented in
{{cite:51325f57f7a85e0c6e90ac14a9a5619d97214433}}, where a generic EoS depending solely on the form of a dark energy-like term and its derivative was found. This approach can be adapted to any polynomial,
to test the viability of cosmography since this res... | i | 956bfaf6d09fea9c73d3e513fe9e89cf |
These results raise several possibilities for interesting future work.
For example, the mixing layer is an “amplifier” flow characterized by convective instability and transient energy growth.
It is therefore highly sensitive to the nature of the upstream flow; models developed for a specific inlet forcing may not gene... | d | 0d47619e28401dae933311e861250612 |
In open-ended text generation tasks, , story generation and text generation after prompts, stochastic sampling methods are used instead of beam search to increase the diversity in output text {{cite:fc7dacdcc59562b49ed0ac1968b7e2a7a26c1dc1}}, {{cite:f8f76e7faf00da5c1f1728be458a2d3c18df9126}}, {{cite:c94586b3c217c515f16... | m | 79e8d71915b404e0f664439babe03887 |
Apart from utilizing the quantum-specific properties to enhance Shuffle-QUDIO, we can also leverage the experience from classical distributed optimization, such as Elastic Averaging SGD {{cite:60c92cbee54707273344ef53e3fdeea2af5824b1}}, decentralized SGD {{cite:a14fe75fff81013ae870f142ed5caf14e598abdc}}. It is worth no... | d | 4b112751157e5dfedec71ab1ad6ccb55 |
Consider the situation where a computationally bounded client wants to delegate her computation to a server with access to a full quantum computer. The protocol for blind computation provided in {{cite:ee5ced8143d1ce5da82e0b6db1473bf1aa0c30bd}} ensures that the client can have a server carry out a quantum computation f... | d | e9da16e47df9404ad8e6bdf4bad6e169 |
Comparison with other ML baselines: We did not find good benchmarks to compare our unsupervised, iterative inferencing algorithm against, however, for the sake of completeness, we have provided comparisons of the experiments from our paper and appendix with ML baselines such as UNet {{cite:d5bbf2fb8dc661e72e457fb648365... | d | 39b0f9efdc740ca1e839aa0feeb365b0 |
Density functional theory (DFT) calculations have been performed using a plane-wave basis with a kinetic energy cutoff of 500 eV and the projector augmented-wave (PAW) method{{cite:d1d7b771d99b097fe99db84120890a6a9bb7d916}} as implemented in the Vienna Ab initio Simulation Package (VASP). {{cite:1efa48579bfa9e24faad786... | m | aee782766fd5ef01bd361c78a07caca7 |
On the analytic side of the argument we will rely on the mean value theorem for Dirichlet polynomials {{cite:a7024517b9fcd24bb3a2cd1cf3e1a43cf73f84dc}}.
| r | b03df3ef16030875ab3bb85daaabd5ce |
First, while this paper answers the question of whether the observational studies are worth conducting, the symmetrical problem can also be
answered. If experimental data are unavailable, the bounds of PNS are {{formula:98578398-0bb9-4276-bf24-5248670cda05}} which are less informative as discussed in {{cite:885d2b930f... | d | d725d42a963193029cab32d2ff7c2b83 |
In optical fluids, it has been shown that a positive (self-defocusing) third-order nonlinearity can be induced by propagating a laser field within a hot atomic rubidium vapor {{cite:faa4c26c5d06f61484637737e82f06e30b5f2a97}}. The strength of the nonlinearity was reported to be on the order of {{formula:4ce08c8b-f05f-46... | d | 5c8deb9031b468cb3fb36076eaaff7c8 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.