text
stringlengths
54
548k
label
stringclasses
4 values
id_
stringlengths
32
32
Despite the tremendous success of Deep Neural Networks (DNNs) for image recognition, DNNs have been shown to be vulnerable to attacks {{cite:bdf35356ea8eb43314f12948eeec87a595151ace}}, {{cite:8a805deee4b564b0fb51eeb6d141df2ebc1e45a8}}, {{cite:dba5004391437e1def82329934629542049700cf}}, {{cite:0f64380a951497a174d7824a11...
i
6732d189886cafbdc9ce4a8d932df877
{{formula:9f919751-9ec7-44f1-b5cd-c813f574ae19}} -Nearest Neighbors ({{formula:6c34af98-f8f8-4bb5-83da-b1ccc339f442}} -NN): the {{formula:eb7fad2f-8abf-4ba8-9ff3-90966953b383}} -NN is a non-parametric supervised learning method that outputs a class membership by assigning the most common class label among its {{formul...
m
b7b327ee32d2c86cedf636b0f5d29497
Let me continue on the spatially compactified setup. We have discussed that the system is non-perturbative and confining at small sizes of compact dimension beyond the {{formula:cd6f3824-bf84-4ba1-9415-8e6f737a57a2}} critical point. Presence of (fundamental) fermions makes it difficult to define confinement {{cite:3f8...
d
78d4fdd140f5b62c2d4f7ee058176f8f
Non-minimal CHMs are very predictive in comparison to their renormalizable counterparts built in a bottom-up approach. In CHMs the light scalars are indeed the pseudo-Nambu-Goldstone Bosons (pNGBs) of a spontaneously-broken global symmetry of a new strongly-coupled sector. The derivative and gauge interactions are henc...
i
d95561fa0e6a4d9407fa1bd2f50ed74a
From last decade, rare decays induced by flavor changing neutral currents (FCNCs) {{formula:71730585-8c73-47da-a353-43a1d60e04c6}} have become the main focus of the studies due to the CLEO measurement of the radiative decay {{formula:d96fba39-cb8f-45ca-a4ba-1eee1cd721b9}} {{cite:f41743e1a3f596b8e9d99dc2b1e0fbb261909b...
i
97d3eeab36f7c811134079bc230508c1
We performed a simple exponential analysis on QoIs {{cite:1d56cf66b07965d1d0d1377f80cdf20c4bda8907}} to see the scaling exponent dependence on input parameters. For example, Fig. REF provides the relationship between scaling exponent and input parameters for degree of mixing for species {{formula:ffddcbc3-7702-4850-8b...
r
548f27d3490a2fc69250d3f8df4f73e3
In this paper, we studied and proposed various approaches that can help to avoid catastrophic forgetting in the output layer. We have seen that layers that do not rely on a bias or a norm to make a prediction can better avoid interference, such as the Coslayer or the proposed variation of WeigthNorm; On the other hand,...
d
dae83c876168f84aedf58a38414fb6fa
Here, we consider the case where the transition probability of the Markov chain {{formula:f5482f55-e4c1-49aa-a9cd-cc005d730378}} depends on an unknown parameter {{formula:6b4ff2c3-e08d-47a6-bd01-b152c29d3e45}} . In general, the standard approach in Bayesian control problems is to reformulate the problem into a partial...
i
a5b0928d4078d2642a5a5121ac64ae68
Language expressions are quite sensitive to individual words or clauses, where noises against those would likely generate incorrect or biased training data with wrong labels {{cite:cc2fea61907e414fc22c237f6f1464a440491843}}. Following prior success in applying adversarial training to NLP models {{cite:b9752029be0590660...
m
2c409f4516c91366688649690579c3ff
In this paper, we are going to study the distribution problem of closed geodesics on closed Finsler and Riemannian surfaces. This problem can be traced back to the work of Hadamard {{cite:7dfbb5bf2b8fc676a9dd43c949ca3e672de0eb41}} at the end of the 19th century. Combining the Poincaré recurrence theorem, he showed that...
r
28ed2d1b2fda029ee3983fcef26bf2ed
The formal statement of the theorem and its proof follow closely the classical work of Hájek and Le Cam {{cite:63a7be5240e450dfea7bf64c0d0679a704b6c055}}, {{cite:0fbdb8847ee2f91993ba1c59a416f5fef9f40718}} on statistical lower bounds and the more recent work of Duchi and Ruan {{cite:067d9db0b5182538e82665e12f1ec20d2a498...
r
fff31b99de30b5a1cc5c376dc4ea8f6f
In top-{{formula:345df008-872e-41dd-8b65-f1f1c56f1960}} variation of our method, {{formula:69c9ff4a-7077-4acb-8679-2bd9bb0bab36}} is equal to the total size of {{formula:68580e20-9c26-418f-aa16-342538357dd6}} . Note that since {{formula:d533f593-95e0-4237-8b27-dad6b14c5b3d}} itself is included in the nearest neighbo...
m
f4fdba6082146e4d1c740525ccaf2f6a
We compare the proposed MODE-based method with two gridless alternatives, i.e., root-MUSIC {{cite:99f062f985feaf5fe2e6fc7cef338e5169f20dd2}} and root-ESPRIT {{cite:7ef650bffd091e2a1c5a11ef86ed30fed1505644}}. To quantify the estimation accuracy, we evaluate the normalized mean squared error (NMSE), i.e., {{formula:81c5d...
r
38606ac182d6b5a08bf5f9fb0a1d09a2
The uplink CSI and downlink CSI are generated by QuaDRiGa {{cite:b011bb7077a42083baf56d0131ed537a7efbf431}} according to the 3rd Generation Partnership Project (3GPP) TR 38.901 {{cite:4e67be92630025f213daf1c28aee6dbd0c6fc8d8}}. We create an open indoor scenario in which the downlink center frequency is 5.2 GHz and the ...
r
d90f221130b69a7184e36abac7306d43
Similar to many of the prior work in local computation algorithms, and following a connection first used by Paras and Ron{{cite:79a507bc4f2f974d090e9b1995d4364dec0bf342}} (see also Lovasz {{cite:73ed4c8c617c42b063241b557e5a026dd62c74e8}}), the core ingredient of our LCA is to simulate a local distributed algorithm for ...
m
f669386c9069cad758f954122f1a2538
In the case of PDFs, much progress has been achieved in past few decades. However, there are still some different issues which must be studied to make more precise predictions for hadronic collisions, specifically, at the CERN Large Hadron Collider (LHC) and the Relativistic Heavy Ion Collider (RHIC). One of the import...
i
61a6d04536ca26865643270603b1fbed
Computational complexity is the study of the innate amount of resources required to complete some task. We assign complexity classes to sets of tasks that require similar amounts of resources; from here, the goal is to understand the relationship between complexity classes. There has been some success proving that two ...
i
306ce44f853650f7737a8c2dc0ea1caf
The key similartiy between {{cite:1a64d8d150e8b25a1dd9316b6cce30ad9c63f41e}} and {{cite:6e250e8849be141542b07daf1593ef4ee98b8123}} is the set of controls making the set invariant, {{formula:b8c8338b-2f9c-4532-b092-926853ee805b}} in Equation (REF ) and {{formula:20ce37d3-554d-4fd4-ad2c-eabaa0866c53}} in Equation (REF ...
r
50a3673043536e47d8539934719188d4
For any {{formula:9bb73721-f0c0-4bec-b648-15f6489a4115}} , denote {{formula:9026623c-b2f4-4b4c-ac96-421716da8844}} , {{formula:9c11f730-5578-4041-bca3-56fe472d0ebd}} , {{formula:e07299e0-1bbd-4b36-830e-02e957a13819}} , and {{formula:cc8ecbc6-f16f-49a9-858c-4b303f9fc910}} the open line segment connecting the two inters...
m
f99ff91a8925c4c88ab4b267b87ed6c6
Stochastic analysis on interacting particle systems is important to provide useful models describing equilibrium and non-equilibrium phenomena studied in statistical physics {{cite:97b29e267dee0dfe76a03a399bfa047d0a056f38}}. Determinantal process is a stochastic system of interacting particles which is integrable in th...
i
4343193a3d12a6ff1c463c509f90f550
These properties are of crucial importance for the geometric aspects of the theta correspondence and singular theta lifts for arbitrary signature, see {{cite:d3f8637f7ddaf13435cbad25e0be2699596b904d}} and {{cite:3059b440a665bc496de91bd42b99c05e4df1b449}} (in our case of {{formula:af78a7cd-dcb3-4833-bf16-2df4a6bd1863}} ...
r
8cb183a6f993d5ca014495a89e5f9199
Fully genuinely multipartite entanglement. A general isolated {{formula:86ae7af8-1a29-4495-9fcb-6c766a5dca47}} -dimensional quantum system is represented by a normalized vector {{formula:45625412-9cd8-44b3-9504-e2c1d0e65012}} in Hilbert space {{formula:91091298-6ad7-4c2f-b756-0ac48b3c5fa2}} . Instead, an open system i...
r
1cfa4adf6d7614eb00ad491d7e42d29f
We presented a collection of state-of-the art metaphor detection models achieving accuracy higher than 90% for the Greek language. This extends the work of {{cite:5705626e35ca7921fa2a110058e7761baf330a0a}} and, to the best of our knowledge, sets a new state-of-the-art for metaphor detection in Greek, dealing simultaneo...
d
90c548b814658875382c5c0aea37f1bd
Fine-tuning vs. linear probing. Fine-tuning (FT) and linear probing (LP) are popular transfer learning algorithms. There is substantial evidence of FT outperforming LP in-distribution (ID) including recent large-scale investigations {{cite:78367ca96ab076cc994bfcc0e8cb04c769ffe675}}, {{cite:d20d52313de27d37f2aa8bfe9225f...
d
d2b7ac720a1a79163fdfdb8ed8b0cbaf
A simple but powerful method to ensure the existence of (ultra)distributional boundary values of holomorphic functions consists in combining Stokes' theorem (more precisely, the formula {{cite:08113d35b4f3b546847a1630df022ba703422e0f}}) with almost analytic extensions. This technique was used for the first time by Hörm...
i
9535a16e452304927753cf2103299825
Ours (RAFT) achieves significantly higher PSNR and SSIM than Baseline. Although the disparity maps between input SAIs are also provided to Baseline, its performance is still limited by the fixed and content-independent weights employed in the commonly-used warping operation, which demonstrates the advantage of learned...
m
b3053e354c778fe889caf8cc6604e29b
It is to be noted that, to the best of our knowledge only S. Manna et al. {{cite:73a56c97236207f8e3741ca251c011b6b1038885}} and SSLM {{cite:3672af4453a5f6dfc346935a101670a63fdfc543}} has used MRNet for their experiments. Thus, it has not been possible to compare with other self-supervised methods. Although the work {{c...
m
963fe72d2d0c338b97cf8572b15bba40
In this paper, we first defined a completely new end to end non-intrusive time-domain reduced order nonlinear model construction method. This latter, being a mixed interpolatory - operator inference approach, stands as the principal methodological contribution of the paper. The global rationale consists in a constructi...
d
f49f2934012f22a6e66c002ea82f6c88
We start proving the generalized Spitzer-Baxter identities stated in Thm. REF . The proof follows the line of that for the classical Spitzer-Baxter identity as in {{cite:9e4c2cc08f4d418eb1ec8f5e4b09d2e627a2ee9d}}, Paragraph 8.4.
r
4fa53b15d1f947c4331ef87ccc24cee3
To verify the significance of differences between pairs of algorithms (RFE{{formula:30c0a447-34ea-4019-b1cb-8f628a09da9f}} vs. 3-SRFE, RFE{{formula:bf26298a-ee64-4a66-84ce-4ac2e52d718d}} vs. 5-SRFE, etc.) we performed the non-parametric Wilcoxon signed ranks test {{cite:7568341a82d03f9d3b9d4110ef498989a602d26c}} for ...
r
8b2e79bb40e7b4f692c9c83e73aa282f
From the burst lightcurves of LE and ME, the burst rises tend to have a convex shape, suggesting ignition near the equator {{cite:ead50cad8411873d18ccb4d35f7849a45808d315}}. This scenario is somewhat incompatible with the hot spot near the poles. The inconsistency above may indicate another channel of accretion onto a ...
d
92d665e95b529fabd46d6f9ff2daa39a
Table REF shows the results. It is seen that our method shows significant improvement over the previous methods {{cite:a6d47df7a42c2215da8dd15c7a5664cc85f9f4ba}}, {{cite:90dadc4236c8be2ea76d496c9289f88d07539f23}}, {{cite:e1833b4014ec71aedc9aa0d631f6f88b3602d51e}}, {{cite:663d128e17a879a42e6fd2e36ce32beabaf2cdfc}} on a...
r
626eb75c0a8e1a6f1890676990889684
Singular value decomposition (SVD) and spectral methods have been widely used in statistics, probability, machine learning, and applied mathematics as well as many applications. Examples include low-rank matrix denoising {{cite:e6bee291df084c93fa18c1f8b36e3762c318a374}}, {{cite:4ebae9f3c89f008a56b803e54c4f262bc98bcef5}...
i
d6a16dbd5c9fc5061a63aebea7997722
Invariant Risk Minimization (IRM): The goal of IRM is to extract representations that are invariant across environments: {{formula:511c5250-fefb-4e2f-a571-7861261c965b}} , each encoding different spurious correlations {{cite:1cad39484b237379ea3b8fe0f498ea46a961e59e}}, {{cite:ce305c20c9828ee35893cca193d3149ff8d4e13b}}, ...
m
2ea02ecd51b621b68a9f11ff6eed242c
Vessel enhancement approaches consist of filters that improve the contrast between vessels and background. We chose four well-known handcrafted filters for blood vessel segmentation, based on implementation availability and previous applications to the enhancement of tubular-like structures in retinal images: Frangi {{...
m
623a464bc29f95871e0af248509a11e0
(3) Which scale to process and represent data. Local-scale methods {{cite:da8c140463ad64d1fd9a339a2fd7881db03c5e5b}}, {{cite:ee108fab0954497aef1bd36c1862f76e55a987e3}} use the idea that complex structures can be reduced to a collection of simpler geometric primitives. These methods learn local models which are used to ...
i
631256cabcc407c5762292df0a5998b9
Skill Discovery. The key difference from prior skill discovery work is the lack of episodes. The most relevant work to ours is DADS {{cite:3b8d1d0ecb661adb19abca1e954490a138b2b447}}. Unlike DADS, we plan over the model with action predictions, which allows for accurate planning even if the discriminator is not accurate...
d
591c9f78714cbe393af75c3e3b3475cd
Let {{formula:ef3c8380-c515-4fb0-beea-031c3d5375b8}} denote a batch of images sampled from the dataset, {{formula:7bdd6e09-625e-45ee-910b-66feee469787}} denote the distribution of image augmentation for the {{formula:a98537e1-4cd1-4848-ac2d-3905a600dff3}} 'th task (e.g., cropping), and {{formula:27950d0c-32a0-48b1-b8...
m
09098dacd56c042fcd9ef512a991c0be
Learning to discover novel classes. L2DNC was proposed in recent years, aiming to cluster unlabeled novel-class data according to their underlying categories. Compared with unsupervised learning {{cite:44e1e02b6dab13df6122922cb3ddfb651e1aca2d}}, L2DNC also requires labeled known-class data to help cluster novel-class d...
d
ad363c2014303a09a1a29f4ebee6449c
{{formula:c0286e31-9453-404c-97fc-32f676521590}} , MIS in {{formula:1f20f787-ced2-49df-89cf-fb521e9080f8}} -free graphs has a polynomial Turing kernel. The problem is polynomial for {{formula:6ab2a232-2a25-46ae-8240-498a3c66c9ee}} and {{formula:b1ed86f8-7328-444f-8466-8a766a1420fa}} , hence we suppose {{formula:a633...
r
57bed4b96d282c82151e3cbfb43c0128
However, dimensionality reduction algorithms such as GMRA have historically been limited by the von-Neumann architectures they execute on: primarily constrained by small system memory (DRAM) capacity. In contrast, modern research has become dominated by “big data”, with datasets such as ImageNet {{cite:54d7da478960802b...
i
735e9b1d44d15f9ecc4536671b67d65b
Adaptation of deep learning (DL) to graphs and other non-Euclidean objects has recently witnessed an ever increasing interest, leading to the new subfield of geometric deep learning (GDL). In particular, geometric deep learning is an emerging direction in machine learning which generalizes concepts of deep learning for...
i
eb9ba41064399304cba416a46e4f08a3
NMS eliminates the redundant bounding boxes completely, which may lead to false negatives when there are overlaps between the ground truth bounding boxes. Soft-NMS {{cite:52015a0e8a70ac94a7bcf9be2b694ccaf363ab54}} alleviates the problem by keeping all the bounding boxes and only mapping the confidence scores of the to-...
m
39da54a05cdfd9e3c3c291614f67c0ff
The severe limitations of the direct solution necessitate the development of techniques that would enable one to split the system and solve the smaller Stokes and Darcy problems separately while exchanging information through the boundary conditions only. We develop a numerical scheme based on the sequential Dirichlet-...
m
3d72c1805ba563a198b9bf106e1628ed
Topology in condensed matter systems has been a major theme of research in the past decades {{cite:e931f47c272e01d6b93be842f0bda04bc465e8e3}}, {{cite:576d738ad74a75117db2c8d2048165fb38504e6e}}, {{cite:a21d931aa21d61d7e825a4c5dd93456c2cc2d7a8}}, {{cite:c886c3c43713602aebd9d766549d37fba2c64ba3}}. Starting with the discov...
i
3febf84cddb0d86d6314722c8d60fc24
We illustrate the methods just described by checking that the distributions studied here behave in line with the large deviation principle {{cite:6d5a08af38b9ec6a7bdcb35c940b7b45f69c616d}}, {{cite:98e76468bef6367e02815515c23c7eb808708cbf}}, {{cite:8c1a416ba29bb06cfb8efae1fd1a99b27aac397a}}. We do this by evaluating the...
m
10ce8b564a7459c0dadccf9cf70a32c2
Figure REF demonstrates the workflow of the proposed methodology. For a video sequence like {{formula:b425db7b-a14b-4ff1-9598-a7e5003ef8a5}} with {{formula:2395d845-1b80-47d4-849c-8800f70169ca}} frames, the input into the proposed gait recognition system are the intensity {{formula:8d73f30c-3e66-4179-9038-932d63db1...
m
fb2d2e8b97438e7f5746bb457dc1c888
This research made use of the Common Astronomy Software Applications package (CASA), {{cite:ef3b53ead07cca558b309e533366d1097f047e9e}}. This research made use of Astropy (http://www.astropy.org) a community-developed core Python package for Astronomy {{cite:6e3aa189184d35fdca70fa7223b6f03aaeda5b83}}.
d
b4f4b95ff83c00658079c487bc80e6de
(a) The polynomial {{formula:5aed834f-bf8b-42c8-83b4-7751e4d9879e}} is commutatively nonzero. That is, it is nonzero on {{formula:5542e146-1785-44b7-8d72-b9126f326337}} (or on {{formula:e117875b-dfe9-4a2a-b82e-4031e9f1f3a4}} for a small extension field {{formula:7d4570dd-c849-4d06-866a-fc7c412e2a88}} ). In this case...
r
7401be516d70f273769cb736eee48afd
In this section, we present five numerical examples to show the application of the new DEM model in elastoplasticity problems. In the first four examples, the geometry of interest is a cantilever beam of dimensions 4{{formula:8b98aaae-34fa-41dc-ad9a-394d121701f5}} 1{{formula:14c64a6e-dbe0-4606-806d-86026f01152e}} 1 m{{...
r
8c8e98e5cc0289bd5bd606517acfacd2
3D Convolutional LSTM. To further compare with RNN-based fusion, we remove the multi-scale context-aware fusion from Pix2Vox++/A and add a 3D convolutional LSTM {{cite:fa7d448cafd986b9779eb48280becf19dc5ff645}} after the encoder. To fit the 3D convolutional LSTM input, we add an additional fully connected layer with a ...
m
4eb6344fb88d54deedfa6a8138a9429c
Drop-column FI only gives a general view of the trained GB model, but the underlying functioning of the algorithm remain unresolved. In order to get a glimpse into the GB itself, Shapley values can open a view into its depth. {{cite:730d14b9999e1b71ce1829d9fe4285332a604e28}} proposed a measure to identify the bonus due...
r
1650c3cfb85435bd728ec7bc467e7072
We shall give particular attention to Chern-Simons (CS) modified gravity {{cite:4cad9f82c5788f549047509ed49d08a821738092}}, {{cite:9cb55bc933dc50facc8d4e7dbdd3f2151939c4f7}} in this work. This modification in this theory consists of adding to the Einstein-Hilbert action a Pontryagin term coupled to a pseudoscalar field...
i
5d8db75466ae1a5396ea4feb3dabb303
Suppose that {{formula:befb338c-2376-4884-814a-5627597e9005}} can be extended to an open neighborhood of the manifold {{formula:417eb934-2c1e-4261-a3b9-38b0662a3e76}} in {{formula:10058a7e-ee1e-4a77-8c99-0f3e04d05d93}} . If we were to naively apply the standard UKF devised in Euclidean space, we would discretize the ...
m
16445da2e527e83520dde7c7217bcdeb
The proposed model is implemented with Pytorch and evaluated for object detection in the autonomous driving application using the IVS 3cls {{cite:1f28a701acf612fd87f672a90aa2097087ca6165}} dataset. IVS 3cls is a cityscape object detection dataset with about 11,000 samples, including 10,000 training images and 1,000 tes...
r
37cf25ed036e12b4f46e88d768f71594
In this work, our ultimate goal is a universal re-ID representation that generalizes well across different test domains. We gain insights from the success of the face recognition community {{cite:66219e784181abd8434a9addfc2f21f1b3f28a3e}}, {{cite:a6dd0f4af2397f0e7b1ff83777f1896bcc80e939}}, {{cite:6a1fb20ba028912c9d51c4...
i
38d582e267e98cd164930a7bbb282903
The existence of a relativistic enstrophy current suggests, via the gauge-gravity duality {{cite:636639fa04c43c635bd2729da7ae78b85855762e}}, that AdS{{formula:a68a1073-0751-4886-b5c3-94a5de2dda36}} black branes possess an approximate symmetry associated with approximate enstrophy conservation. Since the enstrophy curr...
i
4b23ffee39f13765f20623afd37b7a83
Attentive readers might notice that the first and second attacks are specifically designed for Krum and TrimmedMean. Careful readers may wonder about the feasibility of designing an attack particularly for FilterL2. We argue that it is non-trivial to design such an attack using the same idea from {{cite:80b2e532ca8500f...
m
62ec2f54bac834ad696db34d2bb3d94c
We confirm the observations made by Niklaus and Blau {{cite:7cce2e61d364c79864323a7119e4d02c427e74cd}}, that pixel-perfect and perceptual metrics may be at odds with one another. Despite our slightly lower PSNR/SSIM scores, users still consistently prefered our outputs to those of AnimeInterp. We see a possible explana...
d
14334233f7c537480c33162a15df9930
A similar but different approach was also used in the Google team's supremacy experiment {{cite:a6ce24c063612d937b73bceeb71f691491281d3a}}. To characterize their 53-qubit chip, they divided qubis on it into two small sets, which are called patches, by actually removing all interactions between them. Their verification ...
d
0773a606760db4c9591637d2379d8fff
Conventional statistical methods for NSCLC survival analysis only use the textual modality and involve modelling time to an event. They can be divided into three types: non-parametric, semi-parametric and parametric methods. Kaplan-Meier analysis (KM)  {{cite:fc6a5eea05a6937c990e1b0565215ca796f5eec9}} is a typical non-...
m
3e45a94115054f2ae59679be28455da6
We trained Word2Vec {{cite:b0a67cfc2221bbac4da8a220af1a08900fbddec4}} and GloVe {{cite:93c901246cfdd0c86106106d4ac3730d18b1f7ba}} embeddings from LOINC codes grouped by visit and order. Codes within the same order were shuffled. The shuffling is suggested in {{cite:6c6a9130978b5a48bde0c24d56f6bab83f4bf234}} and motivat...
m
21a706b2b6a112fcbfedee66223d8803
Fig. REF , where threadlike structures can be seen, illustrates this well. These patterns are made of embeddings from close overlapping patches within the same input image. This prior spatial organization may be the cause of the low performance of our method. This is especially true as the classifier on the representat...
d
f482d078080d6d43160bfa383f44e69a
By Theorem REF , we see that {{formula:b80e8765-91b4-4f14-88fc-2ad93d2c6bdc}} has a distribution with standard regularly varying tails so that {{formula:72953382-d3e4-4c3c-a198-ff3843679f25}} has the same tail index {{formula:9c4b68e5-b4c4-43c8-a276-efcfb498ba66}} as given in (REF ). Given in- and out-degree sequenc...
m
5b1c75adf6ee493f036dba5cbb9d4ae4
To further understand what the models learn during the different training methods, the generated embeddings are inspected visually. This is performed by training a UMAP model {{cite:8f6f9cae0122f3b2f7fa65d6235e3212dfb92530}} to project the embeddings down to two dimensions. UMAP is a manifold learning technique used fo...
r
7ba15180c527fd0b86a33079f86242e5
As the assignment of word forms to clusters is context-independent, the approach also cannot deal with homonymy. We believe this could be solved by switching from context-independent word embeddings to contextual word embeddings, such as BERT {{cite:42d245b26ebbba59d67fc79a7bc5502e7d7b87c5}}. {{table:3cbfc962-f9f8-461a...
d
e7340d15735caa777d966bd459fa94b6
The process of computing cross-correlation for all the neural patch pairs between the hole and the remaining region (e.g., boundary) is computationally prohibitive. To alleviate this, the strategy in {{cite:0f5a8d23a280dd17c299be411754ee78e3c9b41f}}, {{cite:675c8ae264c5e0da9bfeab781c8968031fa84cb7}} was used to speed u...
r
c2c8177f0bd14e58cb632cee65276513
Lately, AttentionXML {{cite:8c823371a73febb7782a0ff510f2f1e0b9914b54}} incorporates Glove embedding {{cite:5c67c1e40d94e1c7094f938e811baa753bdd9654}} and the attention mechanism {{cite:2a45063b08aa5765136c368ce80736408db9119a}} into XML to learn semantic information from raw text data using LSTM {{cite:6641908a52fd360b...
m
084631082c4281b4dd50f17aca8c7f8a
In this work, we introduced an orthogonal polynomial-based DPP paradigm for sampling minibatches in SGD that entails variance reduction in the resulting gradient estimator. We substantiated our proposal by detailed theoretical analysis and numerical experiments. Our work raises natural questions and leaves avenues for ...
d
b58d00402959116cfb2c1a500f06f006
Here {{formula:e4f80b93-7c1b-4198-88d0-056c0ae6fd55}} is the covariant derivative of {{formula:da847e07-059b-4f59-b921-4960c573e956}} in the direction of {{formula:d9481c3b-72ef-434d-9c31-459ebc667116}} (see {{cite:adf3e2fd7f94c86ef83a21453d330bb2fb8faa92}}) and since {{formula:a0de09d6-fd28-40b5-a104-4853b97bba1e}}...
r
06c8ed989392354ca5c30b015ae06610
Specifically, applying proximal methods to the objective function {{formula:fd5aa8cb-6509-4e24-8bf6-64154c7653c2}} of eq:sparseobj, the smooth term {{formula:3661173c-df5f-443d-a4fb-a45ea437a4c3}} is approximated by a quadratic function while the term {{formula:a4a30bc5-2b05-4023-8101-0eae6dda3fdd}} remains unchange...
m
c8d36bf51e8d64cc46476e8c9469f20a
Under these circumstances, it seems wise to take a less ambitious approach. In the search of some dark matter signal, both effective field theories (EFT) (see e.g. {{cite:12b1e07bb051d2d25fd226b5345af688b461398b}}, {{cite:e7317a57e77965400a9f940a9837fbdc0ed80df9}}, {{cite:004df600be9c46741c64cf5d14604f830fb3f201}}, {{c...
i
b23bcd96c12d07f3bf963bd27d3117ca
We have found that a combination of invariants, the 2D invariant {{formula:ca372547-b10e-4258-b23f-e55657e069d0}} proposed by Simsek and Mintert {{cite:dbc7486ee4939a29c52cb7acf288494723d5b5dd}}, and the 2D linear invariants used in Tobalina et al. {{cite:d2c9ed558e5c6257e57f5d17961ae0c7ff48c50c}}, allow for fast inve...
d
834423f2a260dbf7c7e64af367e91be8
We demonstrate the performance of DURA on several semantic matching KGE models, including CP {{cite:08ceab19731630e21f429c510b77059412802aed}}, RESCAL {{cite:b33daa39f3478ea0bf2609cda4cbfda76387a626}}, and ComplEx {{cite:9e60197a907c4afcaed3f318fc729dec1042e908}}. Note that we reimplement CP, ComplEx, and RESCAL under ...
r
706eb6fd238b763a34c346e4446995ef
Recent chit-chat with the neural model, like Meena and Blender, shows impressive conversational performance {{cite:94eabeb347724d576faa9c1c9d7cd34c5ca2c83b}}, {{cite:16cf350fff9fcdefd9ecb24c0a8d931ea26130a8}}, {{cite:ac4b4262cbf9ecd0a73cb571874d40b383e3844d}}. However, such a conversation system uses a lot of data, and...
d
07b6a74253a09069d10c63df56f8f8fa
By the continuity of {{formula:b5c88a79-0873-40b0-8106-51490fffa5e6}} and {{cite:f9633c467df2fb10e78b189386cff20a1c7702b4}}, we conclude that {{formula:f91eccf9-59b6-4f55-a1f2-d02703ffa1d3}} By {{cite:f9633c467df2fb10e78b189386cff20a1c7702b4}}, {{formula:297d2f26-0f5b-40b8-a2e7-0906732c1d65}} is closed. Therefore, s...
r
258032a5eddffc462a5093ea8161eebc
We now turn to symmetric polynomials. A polynomial {{formula:c1c5a001-ab9d-4091-8d1a-4501942a7a05}} is called symmetric if it is invariant under permutations of the {{formula:eef79ae4-6abd-450d-8e11-f69af10e868e}} 's, i.e., {{formula:83515dcf-72dd-422d-bef9-e41a3721b31c}} . Symmetric polynomials have been intensely st...
r
de30e9ad79f9bb684d23e22b8f28d04c
As baseline research, several state-of-the-art models i.e. BERT {{cite:c8492ab2de912774f3c92966e71f5d8932e6b5a1}}, USE {{cite:e8119f0c771f705034593e4bb27be1d9795c3c59}}, and ULMFit {{cite:da5a4e009608779c5790228a2e26c8265e67054d}} have been trained using the proposed Arabic dataset to make-sense of the provided couple ...
r
442ad0d8b96460b778700f21b45c9ca5
In general, the quadratic problem of finding a set of points {{formula:d8073276-7e5e-459d-b633-f083cb3d96e1}} satisfying the constraints in {{formula:fd97587b-3340-4955-a181-d205caa7b1ed}} is a difficult problem and there are many attempted solutions, all involving nonconvex optimization techniques, that date back to...
r
0dbe03b3622d0f91b8d2f3e5b77cbbb5
A natural tool for developing such intervention strategies is optimal control with the objective of minimizing the risk of an outbreak, which is defined as the expected accumulated impact of the event over the time horizon. Typical models for spreading processes are the Susceptible-Infected-Susceptible (SIS) model and ...
i
615d972c5030bf613aa155a759f9a2d0
If the sampling has a coverage radius {{formula:96a1c2e0-158a-457d-af7b-b8c3268f64e8}} for some {{formula:f02db898-8135-4003-9c7d-3ccc5f96c831}} the conditions of (REF ) hold. To satisfy the conditions of (REF ) as well and thereby ensure angle bounds on all triangles in a Delaunay triangulation we first sample along...
m
595b420ba6aea8ced73c7f73e4ea459d
Coreference resolution. In table:maincorefresults, we compare the performance of our method to text-only baselines and a weakly supervised multimodal baseline (MAF) {{cite:d37fc837e222f4b85e5850e8eeba67c34838ed2d}} in CR. For the text-only baselines, we consider a rule-based method {{cite:be17d9b6ddcd069cebdab8aeb641b...
r
de5e6580e36349e77ec497d2f5d60174
where {{formula:14d17301-1a0a-428c-b663-0475050bb1b1}} and {{formula:58acbc3b-8703-4d76-9f87-dd4d5b0da072}} . We adopt a position angle of {{formula:808797ae-2fe1-401d-81ca-6788ece828b6}} for the major axis of M31 {{cite:7d9965292d11dc327b48d221a71db5aaeef450dd}}. We divided the GCs and GC candidates into four age gr...
r
784454adf81b8e7e3a1995ce19867ba1
GCN-based Methods: GCN {{cite:e5ab94474987d25c195946fd54f75985fb9ad98d}} and GAT {{cite:38708570ff42add63c62a76f2ccd838d715b187c}}. Propagation-based Methods: LP {{cite:f670e4ae9f73ded77868d5568bc0f2745f731cfb}}, APPNP {{cite:91b4a2c05b06a1b4ad786fb1733182d85b705c4d}}, C&S {{cite:84d1592ed2d767b2e35b6e9b0bccdf808ba6a...
m
d7ae6a2c1f25389c6db445f2cddad63c
Exploration and state coverage: how well does AS explore the underlying state space in a stochastic, partially-observed world, as compared to alternative methods? Given our theoretical results in Section , we hypothesize that methods based on novelty-seeking will become distracted by noisy elements, while AS will full...
r
1e1bc1954db1adebf80d2b07a31d8fb0
Recently, this idea has received increasing attention in neuroscience. Neuroscientists have identified the fundamental role of information thermodynamics in supporting brain functions {{cite:a10f7a0b169684f8edcfd53e5db26b9ba6fbeeb0}}, {{cite:4709281616d4a2603da8e6f2294b9c10db903cd1}}, {{cite:6eac81882c82d6c414389d221f6...
d
541e52f8c1471a073d799d8984dbc3d4
MIT-Adobe FiveK {{cite:0a7221f3effc09104679bfecf7956ed483af545d}} dataset contains 5000 images, each of which was manually enhanced by five different experts (A/B/C/D/E). Following the previous settings {{cite:656977a8d72e747a67df48675582ece83d988c3b}}, {{cite:752e2ecd9091b48ad540723190d03cbbc763111e}}, {{cite:7d3150a1...
r
578f726204f2b42666711356277a91e6
In principle one could also use optimization methods to explicitly minimize {{formula:55440d8c-97e1-4a0b-8a14-d50e55edf8e1}} for any of our choices of {{formula:6cf7e4a3-24e0-46f5-b2d8-d4490068ec92}} . In fact, line search and trust-region strategies for global convergence implicitly minimize this function {{cite:97f5...
m
aac6ac2a1b44fb5c68e77aead4d07924
Future directions: In the recent past, with the introduction of precise segmentation capabilities to visual trackers, the connection to video segmentation has become apparent. Some top visual tracking methods perform well on video segmentation benchmarks {{cite:37891a70e3f0782b487075cd282788b261bc9e2e}}, {{cite:6dad09e...
d
3b184405e8f8f418f40d4d86a1c7f719
Remark. Contrary to NiftyMIC {{cite:ab0649ecd4f5442b66322e7a9a9c728ff34cc344}}, MIALSRTK {{cite:1d967993c4a273e6903073e206cca13c04ea80e3}} places its regularization parameter {{formula:1b4ba50b-1e0b-485e-8e94-e7951b00967b}} on the data term. For the sake of consistency, we will only use the formulation of Equation REF...
m
1bf833138b24d3d20224ec659871f142
In this section, for clarity of presentation, we illustrate how a specific ROM closure model (i.e., the D2-VMS-ROM outlined in Section ) increases the ROM accuracy for the 2D flow past a circular cylinder {{cite:b6ae1f0d02791c9f2cda952bc001084e8a6ea0fc}}, which is a simple test problem commonly used in the ROM communit...
r
849e32c3afedbeb1bf2840ba7b9b7302
In addition to improving the detection accuracy, reducing the computational cost to achieve real-time on-board processing is also very important for UAV-based object detection approaches. One way to improve latency is to skip unnecessary computation. For instance, {{cite:f5683516360ac602ae83bc27cbd5341c3d8967a0}} propo...
m
b6112238c11623d778efbdac2cfc02ad
The comparison with EBHIS data at {{formula:63e90f54-d7d3-4afa-90d4-087a2f731493}} shown in figure REF shows the A/F star data line up with the main {{formula:cc8060c3-0312-4a42-9b11-2a35328bffe3}}  km s{{formula:dd9680eb-4023-4add-b25e-1b006790952a}} H i emission peak, while the peak at {{formula:68ce189c-81e6-4164...
r
040da41be9239575c88222fe005f071a
In this method, one of the objective functions is chosen to be optimized and all the other objective functions are converted into constraints by setting an upper bound for each one of them {{cite:a0128fa379042a49890fc572095cdfcb9b0e5123}}. BOPGVEC can be formulated as follows: {{formula:e3db0297-1375-43e0-9039-36057473...
m
ca618bbfddfc8860460c89842e23c0d0
In all the cases above mentioned, Derrick's theorem is violated by imposing that the static scalar field is situated on a background geometry with axial symmetry and no backreaction. Furthermore, the models mentioned so far also have in common the fact that they use real scalar fields in asymptotically flat background ...
i
804759dc71a5552934396b4b39cbe8dd
We employ open source plane-wave code Quantum ESPRESSO {{cite:4cc280315043f67f458a9cfee6372d64a3915bce}} for structural relaxation and phonon calculations of carbon defects in monolayer hBN. We use the optimized norm-conserving Vanderbilt (ONCV) pseudopotentials {{cite:2ea97e3c6e0ef67858bd3c20fb4960e9a555162e}} and a 5...
m
4df5d7073a2d300d913e65b59a1d9c83
To test our circuit pruning methods for feature preservation, we pruned circuits for features in an Imagenet {{cite:defe1686a38f8f9efbfafb15507efeb6046104d0}} trained Alexnet {{cite:936097ad33bf3c417d9f8bc17ae680c28c515458}}. We tested two versions of this model, one trained in the typical manner, as is available throu...
m
effd60584d1ae4c1f7d05af89a0dd494
We demonstrated above how the pressure term in a perfect fluid makes additional contribution to the energy-momentum of the system. During the Lorentz contraction of the system, when the system is accelerated from one inertial frame to another, work is done against pressure, which makes a finite contribution to the tota...
d
ae2884239c8fa7b62a74a6bdfd3db948
Related work The only other interpolation scheme we are aware of, that is proven to be statistically consistent in arbitrary dimensions under general conditions, is the recently proposed weighted interpolating nearest neighbors method (wiNN) {{cite:b47e1bc0e7f520fcc76856093fe5084d7e81db84}}, which is also a NW estimato...
i
125d8ffce1c88f11446b08e83b88fc48
and {{formula:600ae26c-d1f1-44bc-8882-4d4f1e01c7d6}} . By the definition of the minimal operator {{formula:77054a66-b93d-4455-8ad0-6f0f00476302}} , each vector {{formula:7f910226-f45d-47b5-a2ef-c2ca12a85594}} is approximated by finite vectors {{formula:38c43f5f-a182-47d8-b21d-f4429e1b4cc2}} in the graph norm of {{for...
r
a754e9328e720638854b251f6c329db3