text stringlengths 54 548k | label stringclasses 4
values | id_ stringlengths 32 32 |
|---|---|---|
Despite the tremendous success of Deep Neural Networks (DNNs) for image recognition, DNNs have been shown to be vulnerable to attacks {{cite:bdf35356ea8eb43314f12948eeec87a595151ace}}, {{cite:8a805deee4b564b0fb51eeb6d141df2ebc1e45a8}}, {{cite:dba5004391437e1def82329934629542049700cf}}, {{cite:0f64380a951497a174d7824a11... | i | 6732d189886cafbdc9ce4a8d932df877 |
{{formula:9f919751-9ec7-44f1-b5cd-c813f574ae19}} -Nearest Neighbors ({{formula:6c34af98-f8f8-4bb5-83da-b1ccc339f442}} -NN): the {{formula:eb7fad2f-8abf-4ba8-9ff3-90966953b383}} -NN is a non-parametric supervised learning method that outputs a class membership by assigning the most common class label among its {{formul... | m | b7b327ee32d2c86cedf636b0f5d29497 |
Let me continue on the spatially compactified setup.
We have discussed that the system is non-perturbative and confining at small sizes of compact dimension
beyond the {{formula:cd6f3824-bf84-4ba1-9415-8e6f737a57a2}} critical point.
Presence of (fundamental) fermions makes it difficult to define confinement {{cite:3f8... | d | 78d4fdd140f5b62c2d4f7ee058176f8f |
Non-minimal CHMs are very predictive in comparison to their renormalizable counterparts built in a bottom-up approach.
In CHMs the light scalars are indeed the pseudo-Nambu-Goldstone Bosons (pNGBs) of a spontaneously-broken global symmetry of a new strongly-coupled sector. The derivative and gauge interactions are henc... | i | d95561fa0e6a4d9407fa1bd2f50ed74a |
From last decade, rare decays induced by flavor changing neutral
currents (FCNCs) {{formula:71730585-8c73-47da-a353-43a1d60e04c6}} have become the main focus
of the studies due to the CLEO measurement of the radiative decay {{formula:d96fba39-cb8f-45ca-a4ba-1eee1cd721b9}} {{cite:f41743e1a3f596b8e9d99dc2b1e0fbb261909b... | i | 97d3eeab36f7c811134079bc230508c1 |
We performed a simple exponential analysis on QoIs {{cite:1d56cf66b07965d1d0d1377f80cdf20c4bda8907}} to see the scaling exponent dependence on input parameters.
For example, Fig. REF provides the relationship between scaling exponent and input parameters for degree of mixing for species {{formula:ffddcbc3-7702-4850-8b... | r | 548f27d3490a2fc69250d3f8df4f73e3 |
In this paper, we studied and proposed various approaches that can help to avoid catastrophic forgetting in the output layer. We have seen that layers that do not rely on a bias or a norm to make a prediction can better avoid interference, such as the Coslayer or the proposed variation of WeigthNorm; On the other hand,... | d | dae83c876168f84aedf58a38414fb6fa |
Here, we consider the case where the transition probability of the Markov chain {{formula:f5482f55-e4c1-49aa-a9cd-cc005d730378}} depends on an unknown parameter {{formula:6b4ff2c3-e08d-47a6-bd01-b152c29d3e45}} . In general, the standard approach in Bayesian control problems is to reformulate the problem into a partial... | i | a5b0928d4078d2642a5a5121ac64ae68 |
Language expressions are quite sensitive to individual words or clauses, where noises against those would likely generate incorrect or biased training data with wrong labels {{cite:cc2fea61907e414fc22c237f6f1464a440491843}}.
Following prior success in applying adversarial training to NLP models {{cite:b9752029be0590660... | m | 2c409f4516c91366688649690579c3ff |
In this paper, we are going to study the distribution problem of closed geodesics on closed Finsler and Riemannian surfaces. This problem can be traced back to the work of Hadamard {{cite:7dfbb5bf2b8fc676a9dd43c949ca3e672de0eb41}} at the end of the 19th century. Combining the Poincaré recurrence theorem, he showed that... | r | 28ed2d1b2fda029ee3983fcef26bf2ed |
The formal statement of the theorem and its proof follow closely the classical work of Hájek and Le Cam {{cite:63a7be5240e450dfea7bf64c0d0679a704b6c055}}, {{cite:0fbdb8847ee2f91993ba1c59a416f5fef9f40718}} on statistical lower bounds and the more recent work of Duchi and Ruan {{cite:067d9db0b5182538e82665e12f1ec20d2a498... | r | fff31b99de30b5a1cc5c376dc4ea8f6f |
In top-{{formula:345df008-872e-41dd-8b65-f1f1c56f1960}} variation of our method, {{formula:69c9ff4a-7077-4acb-8679-2bd9bb0bab36}} is equal to the total size of {{formula:68580e20-9c26-418f-aa16-342538357dd6}} . Note that since {{formula:d533f593-95e0-4237-8b27-dad6b14c5b3d}} itself is included in the nearest neighbo... | m | f4fdba6082146e4d1c740525ccaf2f6a |
We compare the proposed MODE-based method with two gridless alternatives, i.e., root-MUSIC {{cite:99f062f985feaf5fe2e6fc7cef338e5169f20dd2}} and root-ESPRIT {{cite:7ef650bffd091e2a1c5a11ef86ed30fed1505644}}.
To quantify the estimation accuracy, we evaluate the normalized mean squared error (NMSE), i.e.,
{{formula:81c5d... | r | 38606ac182d6b5a08bf5f9fb0a1d09a2 |
The uplink CSI and downlink CSI are generated by QuaDRiGa {{cite:b011bb7077a42083baf56d0131ed537a7efbf431}} according to the 3rd Generation Partnership Project (3GPP) TR 38.901 {{cite:4e67be92630025f213daf1c28aee6dbd0c6fc8d8}}. We create an open indoor scenario in which the downlink center frequency is 5.2 GHz and the ... | r | d90f221130b69a7184e36abac7306d43 |
Similar to many of the prior work in local computation algorithms, and following a connection first used by Paras and Ron{{cite:79a507bc4f2f974d090e9b1995d4364dec0bf342}} (see also Lovasz {{cite:73ed4c8c617c42b063241b557e5a026dd62c74e8}}), the core ingredient of our LCA is to simulate a local distributed algorithm for ... | m | f669386c9069cad758f954122f1a2538 |
In the case of PDFs, much progress has been achieved in past few decades.
However, there are still some different issues which must be studied
to make more precise predictions for hadronic collisions, specifically, at the CERN Large Hadron Collider (LHC) and the Relativistic Heavy Ion Collider (RHIC). One of the import... | i | 61a6d04536ca26865643270603b1fbed |
Computational complexity is the study of the innate amount of resources required to complete some task.
We assign complexity classes to sets of tasks that require similar amounts of resources; from here, the goal is to understand the relationship between complexity classes.
There has been some success proving that two ... | i | 306ce44f853650f7737a8c2dc0ea1caf |
The key similartiy between {{cite:1a64d8d150e8b25a1dd9316b6cce30ad9c63f41e}} and {{cite:6e250e8849be141542b07daf1593ef4ee98b8123}} is the set of controls making the set invariant,
{{formula:b8c8338b-2f9c-4532-b092-926853ee805b}} in Equation (REF ) and {{formula:20ce37d3-554d-4fd4-ad2c-eabaa0866c53}} in Equation (REF ... | r | 50a3673043536e47d8539934719188d4 |
For any {{formula:9bb73721-f0c0-4bec-b648-15f6489a4115}} , denote {{formula:9026623c-b2f4-4b4c-ac96-421716da8844}} , {{formula:9c11f730-5578-4041-bca3-56fe472d0ebd}} , {{formula:e07299e0-1bbd-4b36-830e-02e957a13819}} , and {{formula:cc8ecbc6-f16f-49a9-858c-4b303f9fc910}} the open line segment connecting the two inters... | m | f99ff91a8925c4c88ab4b267b87ed6c6 |
Stochastic analysis on interacting particle systems is important to provide useful models describing equilibrium and non-equilibrium phenomena studied in statistical physics {{cite:97b29e267dee0dfe76a03a399bfa047d0a056f38}}. Determinantal process is a stochastic system of interacting particles which is integrable in th... | i | 4343193a3d12a6ff1c463c509f90f550 |
These properties are of crucial importance for the geometric aspects of the theta correspondence and singular theta lifts for arbitrary signature, see {{cite:d3f8637f7ddaf13435cbad25e0be2699596b904d}} and {{cite:3059b440a665bc496de91bd42b99c05e4df1b449}} (in our case of {{formula:af78a7cd-dcb3-4833-bf16-2df4a6bd1863}} ... | r | 8cb183a6f993d5ca014495a89e5f9199 |
Fully genuinely multipartite entanglement. A general isolated {{formula:86ae7af8-1a29-4495-9fcb-6c766a5dca47}} -dimensional quantum system is represented by a normalized vector {{formula:45625412-9cd8-44b3-9504-e2c1d0e65012}} in Hilbert space {{formula:91091298-6ad7-4c2f-b756-0ac48b3c5fa2}} . Instead, an open system i... | r | 1cfa4adf6d7614eb00ad491d7e42d29f |
We presented a collection of state-of-the art metaphor detection models achieving accuracy higher than 90% for the Greek language. This extends the work of {{cite:5705626e35ca7921fa2a110058e7761baf330a0a}} and, to the best of our knowledge, sets a new state-of-the-art for metaphor detection in Greek, dealing simultaneo... | d | 90c548b814658875382c5c0aea37f1bd |
Fine-tuning vs. linear probing.
Fine-tuning (FT) and linear probing (LP) are popular transfer learning algorithms.
There is substantial evidence of FT outperforming LP in-distribution (ID) including recent large-scale investigations {{cite:78367ca96ab076cc994bfcc0e8cb04c769ffe675}}, {{cite:d20d52313de27d37f2aa8bfe9225f... | d | d2b7ac720a1a79163fdfdb8ed8b0cbaf |
A simple but powerful method to ensure the existence of (ultra)distributional boundary values of holomorphic functions consists in combining Stokes' theorem (more precisely, the formula {{cite:08113d35b4f3b546847a1630df022ba703422e0f}}) with almost analytic extensions. This technique was used for the first time by Hörm... | i | 9535a16e452304927753cf2103299825 |
Ours (RAFT) achieves significantly higher PSNR and SSIM than Baseline. Although the disparity maps between input SAIs are also provided to Baseline, its performance is still limited by the fixed and content-independent weights employed in the commonly-used warping operation, which demonstrates the advantage of learned... | m | b3053e354c778fe889caf8cc6604e29b |
It is to be noted that, to the best of our knowledge only S. Manna et al. {{cite:73a56c97236207f8e3741ca251c011b6b1038885}} and SSLM {{cite:3672af4453a5f6dfc346935a101670a63fdfc543}} has used MRNet for their experiments. Thus, it has not been possible to compare with other self-supervised methods. Although the work {{c... | m | 963fe72d2d0c338b97cf8572b15bba40 |
In this paper, we first defined a completely new end to end non-intrusive time-domain reduced order nonlinear model construction method. This latter, being a mixed interpolatory - operator inference approach, stands as the principal methodological contribution of the paper. The global rationale consists in a constructi... | d | f49f2934012f22a6e66c002ea82f6c88 |
We start proving the generalized Spitzer-Baxter identities stated in Thm. REF . The proof follows the line of that for the classical Spitzer-Baxter identity as in {{cite:9e4c2cc08f4d418eb1ec8f5e4b09d2e627a2ee9d}}, Paragraph 8.4.
| r | 4fa53b15d1f947c4331ef87ccc24cee3 |
To verify the significance of differences between pairs of algorithms (RFE{{formula:30c0a447-34ea-4019-b1cb-8f628a09da9f}} vs. 3-SRFE, RFE{{formula:bf26298a-ee64-4a66-84ce-4ac2e52d718d}} vs. 5-SRFE, etc.) we performed the non-parametric Wilcoxon signed ranks test {{cite:7568341a82d03f9d3b9d4110ef498989a602d26c}} for ... | r | 8b2e79bb40e7b4f692c9c83e73aa282f |
From the burst lightcurves of LE and ME, the burst rises tend to have a convex shape, suggesting ignition near the equator {{cite:ead50cad8411873d18ccb4d35f7849a45808d315}}.
This scenario is somewhat incompatible with the hot spot near the poles.
The inconsistency above may indicate another channel of accretion onto a ... | d | 92d665e95b529fabd46d6f9ff2daa39a |
Table REF shows the results. It is seen that our method shows significant improvement over the previous methods {{cite:a6d47df7a42c2215da8dd15c7a5664cc85f9f4ba}}, {{cite:90dadc4236c8be2ea76d496c9289f88d07539f23}}, {{cite:e1833b4014ec71aedc9aa0d631f6f88b3602d51e}}, {{cite:663d128e17a879a42e6fd2e36ce32beabaf2cdfc}} on a... | r | 626eb75c0a8e1a6f1890676990889684 |
Singular value decomposition (SVD) and spectral methods have been widely used in statistics, probability, machine learning, and applied mathematics as well as many applications. Examples include low-rank matrix denoising {{cite:e6bee291df084c93fa18c1f8b36e3762c318a374}}, {{cite:4ebae9f3c89f008a56b803e54c4f262bc98bcef5}... | i | d6a16dbd5c9fc5061a63aebea7997722 |
Invariant Risk Minimization (IRM): The goal of IRM is to extract representations that are invariant across environments: {{formula:511c5250-fefb-4e2f-a571-7861261c965b}} , each encoding different spurious correlations {{cite:1cad39484b237379ea3b8fe0f498ea46a961e59e}}, {{cite:ce305c20c9828ee35893cca193d3149ff8d4e13b}}, ... | m | 2ea02ecd51b621b68a9f11ff6eed242c |
Vessel enhancement approaches consist of filters that improve the contrast between vessels and background. We chose four well-known handcrafted filters for blood vessel segmentation, based on implementation availability and previous applications to the enhancement of tubular-like structures in retinal images: Frangi {{... | m | 623a464bc29f95871e0af248509a11e0 |
(3) Which scale to process and represent data.
Local-scale methods {{cite:da8c140463ad64d1fd9a339a2fd7881db03c5e5b}}, {{cite:ee108fab0954497aef1bd36c1862f76e55a987e3}} use the idea that complex structures can be reduced to a collection of simpler geometric primitives. These methods learn local models which are used to ... | i | 631256cabcc407c5762292df0a5998b9 |
Skill Discovery.
The key difference from prior skill discovery work is the lack of episodes.
The most relevant work to ours is DADS {{cite:3b8d1d0ecb661adb19abca1e954490a138b2b447}}.
Unlike DADS, we plan over the model with action predictions, which allows for accurate planning even if the discriminator is not accurate... | d | 591c9f78714cbe393af75c3e3b3475cd |
Let {{formula:ef3c8380-c515-4fb0-beea-031c3d5375b8}} denote a batch of images sampled from the dataset, {{formula:7bdd6e09-625e-45ee-910b-66feee469787}} denote the distribution of image augmentation for the {{formula:a98537e1-4cd1-4848-ac2d-3905a600dff3}} 'th task (e.g., cropping), and {{formula:27950d0c-32a0-48b1-b8... | m | 09098dacd56c042fcd9ef512a991c0be |
Learning to discover novel classes. L2DNC was proposed in recent years, aiming to cluster unlabeled novel-class data according to their underlying categories. Compared with unsupervised learning {{cite:44e1e02b6dab13df6122922cb3ddfb651e1aca2d}}, L2DNC also requires labeled known-class data to help cluster novel-class d... | d | ad363c2014303a09a1a29f4ebee6449c |
{{formula:c0286e31-9453-404c-97fc-32f676521590}} , MIS in {{formula:1f20f787-ced2-49df-89cf-fb521e9080f8}} -free graphs has a polynomial Turing kernel.
The problem is polynomial for {{formula:6ab2a232-2a25-46ae-8240-498a3c66c9ee}} and {{formula:b1ed86f8-7328-444f-8466-8a766a1420fa}} , hence we suppose {{formula:a633... | r | 57bed4b96d282c82151e3cbfb43c0128 |
However, dimensionality reduction algorithms such as GMRA have historically been limited by the von-Neumann architectures they execute on: primarily constrained by small system memory (DRAM) capacity. In contrast, modern research has become dominated by “big data”, with datasets such as ImageNet {{cite:54d7da478960802b... | i | 735e9b1d44d15f9ecc4536671b67d65b |
Adaptation of deep learning (DL) to graphs and other non-Euclidean objects has recently witnessed an ever increasing interest, leading to the new subfield of geometric deep learning (GDL). In particular, geometric deep learning is an emerging direction in machine learning which generalizes concepts of deep learning for... | i | eb9ba41064399304cba416a46e4f08a3 |
NMS eliminates the redundant bounding boxes completely, which may lead to false negatives when there are overlaps between the ground truth bounding boxes. Soft-NMS {{cite:52015a0e8a70ac94a7bcf9be2b694ccaf363ab54}} alleviates the problem by keeping all the bounding boxes and only mapping the confidence scores of the to-... | m | 39da54a05cdfd9e3c3c291614f67c0ff |
The severe limitations of the direct solution necessitate the development of techniques that would enable one to split the system and solve the smaller Stokes and Darcy problems separately while exchanging information through the boundary conditions only. We develop a numerical scheme based on the sequential Dirichlet-... | m | 3d72c1805ba563a198b9bf106e1628ed |
Topology in condensed matter systems has been a major theme of research in the past decades {{cite:e931f47c272e01d6b93be842f0bda04bc465e8e3}}, {{cite:576d738ad74a75117db2c8d2048165fb38504e6e}}, {{cite:a21d931aa21d61d7e825a4c5dd93456c2cc2d7a8}}, {{cite:c886c3c43713602aebd9d766549d37fba2c64ba3}}. Starting with the discov... | i | 3febf84cddb0d86d6314722c8d60fc24 |
We illustrate the methods just described by checking that the distributions studied
here behave in line with the large deviation principle {{cite:6d5a08af38b9ec6a7bdcb35c940b7b45f69c616d}}, {{cite:98e76468bef6367e02815515c23c7eb808708cbf}}, {{cite:8c1a416ba29bb06cfb8efae1fd1a99b27aac397a}}.
We do this by evaluating the... | m | 10ce8b564a7459c0dadccf9cf70a32c2 |
Figure REF demonstrates the workflow of the proposed methodology. For a video sequence like {{formula:b425db7b-a14b-4ff1-9598-a7e5003ef8a5}} with {{formula:2395d845-1b80-47d4-849c-8800f70169ca}} frames, the input into the proposed gait recognition system are the intensity {{formula:8d73f30c-3e66-4179-9038-932d63db1... | m | fb2d2e8b97438e7f5746bb457dc1c888 |
This research made use of the Common Astronomy Software Applications package (CASA), {{cite:ef3b53ead07cca558b309e533366d1097f047e9e}}.
This research made use of Astropy (http://www.astropy.org) a community-developed core Python package for Astronomy {{cite:6e3aa189184d35fdca70fa7223b6f03aaeda5b83}}.
| d | b4f4b95ff83c00658079c487bc80e6de |
(a)
The polynomial {{formula:5aed834f-bf8b-42c8-83b4-7751e4d9879e}} is commutatively nonzero. That
is, it is nonzero on {{formula:5542e146-1785-44b7-8d72-b9126f326337}} (or on {{formula:e117875b-dfe9-4a2a-b82e-4031e9f1f3a4}} for a small extension
field {{formula:7d4570dd-c849-4d06-866a-fc7c412e2a88}} ). In this case... | r | 7401be516d70f273769cb736eee48afd |
In this section, we present five numerical examples to show the application of the new DEM model in elastoplasticity problems. In the first four examples, the geometry of interest is a cantilever beam of dimensions 4{{formula:8b98aaae-34fa-41dc-ad9a-394d121701f5}} 1{{formula:14c64a6e-dbe0-4606-806d-86026f01152e}} 1 m{{... | r | 8c8e98e5cc0289bd5bd606517acfacd2 |
3D Convolutional LSTM.
To further compare with RNN-based fusion, we remove the multi-scale context-aware fusion from Pix2Vox++/A and add a 3D convolutional LSTM {{cite:fa7d448cafd986b9779eb48280becf19dc5ff645}} after the encoder.
To fit the 3D convolutional LSTM input, we add an additional fully connected layer with a ... | m | 4eb6344fb88d54deedfa6a8138a9429c |
Drop-column FI only gives a general view of the trained GB model, but the underlying functioning of the algorithm remain unresolved.
In order to get a glimpse into the GB itself, Shapley values can open a view into its depth.
{{cite:730d14b9999e1b71ce1829d9fe4285332a604e28}} proposed a measure to identify the bonus due... | r | 1650c3cfb85435bd728ec7bc467e7072 |
We shall give particular attention to Chern-Simons (CS) modified gravity {{cite:4cad9f82c5788f549047509ed49d08a821738092}}, {{cite:9cb55bc933dc50facc8d4e7dbdd3f2151939c4f7}} in this work. This modification in this theory consists of adding to the Einstein-Hilbert action a Pontryagin term coupled to a pseudoscalar field... | i | 5d8db75466ae1a5396ea4feb3dabb303 |
Suppose that {{formula:befb338c-2376-4884-814a-5627597e9005}} can be extended to an open neighborhood of the manifold {{formula:417eb934-2c1e-4261-a3b9-38b0662a3e76}} in {{formula:10058a7e-ee1e-4a77-8c99-0f3e04d05d93}} .
If we were to naively apply the standard UKF devised in Euclidean space, we would discretize the ... | m | 16445da2e527e83520dde7c7217bcdeb |
The proposed model is implemented with Pytorch and evaluated for object detection in the autonomous driving application using the IVS 3cls {{cite:1f28a701acf612fd87f672a90aa2097087ca6165}} dataset. IVS 3cls is a cityscape object detection dataset with about 11,000 samples, including 10,000 training images and 1,000 tes... | r | 37cf25ed036e12b4f46e88d768f71594 |
In this work, our ultimate goal is a universal re-ID representation that generalizes well across different test domains. We gain insights from the success of the face recognition community {{cite:66219e784181abd8434a9addfc2f21f1b3f28a3e}}, {{cite:a6dd0f4af2397f0e7b1ff83777f1896bcc80e939}}, {{cite:6a1fb20ba028912c9d51c4... | i | 38d582e267e98cd164930a7bbb282903 |
The existence of a relativistic enstrophy current suggests, via the gauge-gravity duality {{cite:636639fa04c43c635bd2729da7ae78b85855762e}}, that AdS{{formula:a68a1073-0751-4886-b5c3-94a5de2dda36}} black branes possess an approximate symmetry associated with approximate enstrophy conservation.
Since the enstrophy curr... | i | 4b23ffee39f13765f20623afd37b7a83 |
Attentive readers might notice that the first and second attacks are
specifically designed for Krum and TrimmedMean.
Careful readers may wonder about the feasibility of designing an attack particularly
for FilterL2.
We argue that it is non-trivial to design such an attack using the same idea
from {{cite:80b2e532ca8500f... | m | 62ec2f54bac834ad696db34d2bb3d94c |
We confirm the observations made by Niklaus and Blau {{cite:7cce2e61d364c79864323a7119e4d02c427e74cd}}, that pixel-perfect and perceptual metrics may be at odds with one another. Despite our slightly lower PSNR/SSIM scores, users still consistently prefered our outputs to those of AnimeInterp. We see a possible explana... | d | 14334233f7c537480c33162a15df9930 |
A similar but different approach was also used in the Google team's supremacy experiment {{cite:a6ce24c063612d937b73bceeb71f691491281d3a}}.
To characterize their 53-qubit chip, they divided qubis on it into two small sets, which are called patches, by actually removing all interactions between them.
Their verification ... | d | 0773a606760db4c9591637d2379d8fff |
Conventional statistical methods for NSCLC survival analysis only use the textual modality and involve modelling time to an event. They can be divided into three types: non-parametric, semi-parametric and parametric methods. Kaplan-Meier analysis (KM) {{cite:fc6a5eea05a6937c990e1b0565215ca796f5eec9}} is a typical non-... | m | 3e45a94115054f2ae59679be28455da6 |
We trained Word2Vec {{cite:b0a67cfc2221bbac4da8a220af1a08900fbddec4}} and GloVe {{cite:93c901246cfdd0c86106106d4ac3730d18b1f7ba}} embeddings from LOINC codes grouped by visit and order. Codes within the same order were shuffled. The shuffling is suggested in {{cite:6c6a9130978b5a48bde0c24d56f6bab83f4bf234}} and motivat... | m | 21a706b2b6a112fcbfedee66223d8803 |
Fig. REF , where threadlike structures can be seen,
illustrates this well. These patterns are made of embeddings from close
overlapping patches within the same input image. This prior spatial organization
may be the cause of the low performance of our method. This is especially true
as the classifier on the representat... | d | f482d078080d6d43160bfa383f44e69a |
By Theorem REF , we see that {{formula:b80e8765-91b4-4f14-88fc-2ad93d2c6bdc}} has
a distribution with standard regularly varying tails so that
{{formula:72953382-d3e4-4c3c-a198-ff3843679f25}} has the same tail index {{formula:9c4b68e5-b4c4-43c8-a276-efcfb498ba66}} as given in
(REF ).
Given in- and out-degree sequenc... | m | 5b1c75adf6ee493f036dba5cbb9d4ae4 |
To further understand what the models learn during the different training methods, the generated embeddings are inspected visually. This is performed by training a UMAP model {{cite:8f6f9cae0122f3b2f7fa65d6235e3212dfb92530}} to project the embeddings down to two dimensions. UMAP is a manifold learning technique used fo... | r | 7ba15180c527fd0b86a33079f86242e5 |
As the assignment of word forms to clusters is context-independent, the approach also cannot deal with homonymy.
We believe this could be solved by switching from context-independent word embeddings to contextual word embeddings, such as
BERT {{cite:42d245b26ebbba59d67fc79a7bc5502e7d7b87c5}}.
{{table:3cbfc962-f9f8-461a... | d | e7340d15735caa777d966bd459fa94b6 |
The process of computing cross-correlation for all the neural patch pairs between the hole and the remaining region (e.g., boundary) is computationally prohibitive. To alleviate this, the strategy in {{cite:0f5a8d23a280dd17c299be411754ee78e3c9b41f}}, {{cite:675c8ae264c5e0da9bfeab781c8968031fa84cb7}} was used to speed u... | r | c2c8177f0bd14e58cb632cee65276513 |
Lately, AttentionXML {{cite:8c823371a73febb7782a0ff510f2f1e0b9914b54}} incorporates Glove embedding {{cite:5c67c1e40d94e1c7094f938e811baa753bdd9654}} and the attention mechanism {{cite:2a45063b08aa5765136c368ce80736408db9119a}} into XML to learn semantic information from raw text data using LSTM {{cite:6641908a52fd360b... | m | 084631082c4281b4dd50f17aca8c7f8a |
In this work, we introduced an orthogonal polynomial-based DPP paradigm for sampling minibatches in SGD that entails variance reduction in the resulting gradient estimator. We substantiated our proposal by detailed theoretical analysis and numerical experiments. Our work raises natural questions and leaves avenues for ... | d | b58d00402959116cfb2c1a500f06f006 |
Here {{formula:e4f80b93-7c1b-4198-88d0-056c0ae6fd55}} is the covariant derivative of {{formula:da847e07-059b-4f59-b921-4960c573e956}} in the direction of {{formula:d9481c3b-72ef-434d-9c31-459ebc667116}} (see {{cite:adf3e2fd7f94c86ef83a21453d330bb2fb8faa92}}) and since {{formula:a0de09d6-fd28-40b5-a104-4853b97bba1e}}... | r | 06c8ed989392354ca5c30b015ae06610 |
Specifically, applying proximal methods to the objective function {{formula:fd5aa8cb-6509-4e24-8bf6-64154c7653c2}} of eq:sparseobj, the smooth term {{formula:3661173c-df5f-443d-a4fb-a45ea437a4c3}} is approximated by a quadratic function while the term {{formula:a4a30bc5-2b05-4023-8101-0eae6dda3fdd}} remains unchange... | m | c8d36bf51e8d64cc46476e8c9469f20a |
Under these circumstances, it seems wise to take a less ambitious approach. In the search of some dark matter signal, both effective field theories (EFT) (see e.g. {{cite:12b1e07bb051d2d25fd226b5345af688b461398b}}, {{cite:e7317a57e77965400a9f940a9837fbdc0ed80df9}}, {{cite:004df600be9c46741c64cf5d14604f830fb3f201}}, {{c... | i | b23bcd96c12d07f3bf963bd27d3117ca |
We have found that a combination of invariants, the 2D invariant {{formula:ca372547-b10e-4258-b23f-e55657e069d0}} proposed by Simsek and Mintert {{cite:dbc7486ee4939a29c52cb7acf288494723d5b5dd}},
and the 2D linear invariants used in Tobalina et al. {{cite:d2c9ed558e5c6257e57f5d17961ae0c7ff48c50c}}, allow for fast inve... | d | 834423f2a260dbf7c7e64af367e91be8 |
We demonstrate the performance of DURA on several semantic matching KGE models, including CP {{cite:08ceab19731630e21f429c510b77059412802aed}}, RESCAL {{cite:b33daa39f3478ea0bf2609cda4cbfda76387a626}}, and ComplEx {{cite:9e60197a907c4afcaed3f318fc729dec1042e908}}.
Note that we reimplement CP, ComplEx, and RESCAL under ... | r | 706eb6fd238b763a34c346e4446995ef |
Recent chit-chat with the neural model, like Meena and Blender, shows impressive conversational performance {{cite:94eabeb347724d576faa9c1c9d7cd34c5ca2c83b}}, {{cite:16cf350fff9fcdefd9ecb24c0a8d931ea26130a8}}, {{cite:ac4b4262cbf9ecd0a73cb571874d40b383e3844d}}. However, such a conversation system uses a lot of data, and... | d | 07b6a74253a09069d10c63df56f8f8fa |
By the continuity of {{formula:b5c88a79-0873-40b0-8106-51490fffa5e6}} and {{cite:f9633c467df2fb10e78b189386cff20a1c7702b4}}, we conclude that {{formula:f91eccf9-59b6-4f55-a1f2-d02703ffa1d3}}
By {{cite:f9633c467df2fb10e78b189386cff20a1c7702b4}}, {{formula:297d2f26-0f5b-40b8-a2e7-0906732c1d65}} is closed. Therefore, s... | r | 258032a5eddffc462a5093ea8161eebc |
We now turn to symmetric polynomials. A polynomial {{formula:c1c5a001-ab9d-4091-8d1a-4501942a7a05}} is called symmetric if it is invariant under permutations of the {{formula:eef79ae4-6abd-450d-8e11-f69af10e868e}} 's, i.e., {{formula:83515dcf-72dd-422d-bef9-e41a3721b31c}} . Symmetric polynomials have been intensely st... | r | de30e9ad79f9bb684d23e22b8f28d04c |
As baseline research, several state-of-the-art models i.e. BERT {{cite:c8492ab2de912774f3c92966e71f5d8932e6b5a1}}, USE {{cite:e8119f0c771f705034593e4bb27be1d9795c3c59}}, and ULMFit {{cite:da5a4e009608779c5790228a2e26c8265e67054d}} have been trained using the proposed Arabic dataset to make-sense of the provided couple ... | r | 442ad0d8b96460b778700f21b45c9ca5 |
In general, the quadratic problem of finding a set of points {{formula:d8073276-7e5e-459d-b633-f083cb3d96e1}} satisfying the constraints in {{formula:fd97587b-3340-4955-a181-d205caa7b1ed}} is a difficult problem and there are many attempted solutions, all involving nonconvex optimization techniques, that date back to... | r | 0dbe03b3622d0f91b8d2f3e5b77cbbb5 |
A natural tool for developing such intervention strategies is optimal control with the objective of minimizing the risk of an outbreak, which is defined as the expected accumulated impact of the event over the time horizon. Typical models for spreading processes are the Susceptible-Infected-Susceptible (SIS) model and ... | i | 615d972c5030bf613aa155a759f9a2d0 |
If the sampling has a coverage radius {{formula:96a1c2e0-158a-457d-af7b-b8c3268f64e8}} for some {{formula:f02db898-8135-4003-9c7d-3ccc5f96c831}} the conditions of (REF ) hold.
To satisfy the conditions of (REF ) as well and thereby ensure angle bounds on all triangles in a Delaunay triangulation we first sample along... | m | 595b420ba6aea8ced73c7f73e4ea459d |
Coreference resolution.
In table:maincorefresults, we compare the performance of our method to text-only baselines and a weakly supervised multimodal baseline (MAF) {{cite:d37fc837e222f4b85e5850e8eeba67c34838ed2d}} in CR.
For the text-only baselines, we consider a rule-based method {{cite:be17d9b6ddcd069cebdab8aeb641b... | r | de5e6580e36349e77ec497d2f5d60174 |
where {{formula:14d17301-1a0a-428c-b663-0475050bb1b1}} and {{formula:58acbc3b-8703-4d76-9f87-dd4d5b0da072}} . We adopt a position angle of {{formula:808797ae-2fe1-401d-81ca-6788ece828b6}} for the major axis of M31
{{cite:7d9965292d11dc327b48d221a71db5aaeef450dd}}. We divided the GCs and GC candidates into four age gr... | r | 784454adf81b8e7e3a1995ce19867ba1 |
GCN-based Methods: GCN {{cite:e5ab94474987d25c195946fd54f75985fb9ad98d}} and GAT
{{cite:38708570ff42add63c62a76f2ccd838d715b187c}}.
Propagation-based Methods: LP {{cite:f670e4ae9f73ded77868d5568bc0f2745f731cfb}}, APPNP
{{cite:91b4a2c05b06a1b4ad786fb1733182d85b705c4d}}, C&S {{cite:84d1592ed2d767b2e35b6e9b0bccdf808ba6a... | m | d7ae6a2c1f25389c6db445f2cddad63c |
Exploration and state coverage: how well does AS explore the underlying state space in a stochastic, partially-observed world, as compared to alternative methods? Given our theoretical results in Section , we hypothesize that methods based on novelty-seeking will become distracted by noisy elements, while AS will full... | r | 1e1bc1954db1adebf80d2b07a31d8fb0 |
Recently, this idea has received increasing attention in neuroscience. Neuroscientists have identified the fundamental role of information thermodynamics in supporting brain functions {{cite:a10f7a0b169684f8edcfd53e5db26b9ba6fbeeb0}}, {{cite:4709281616d4a2603da8e6f2294b9c10db903cd1}}, {{cite:6eac81882c82d6c414389d221f6... | d | 541e52f8c1471a073d799d8984dbc3d4 |
MIT-Adobe FiveK {{cite:0a7221f3effc09104679bfecf7956ed483af545d}} dataset contains 5000 images, each of which was manually enhanced by five different experts (A/B/C/D/E). Following the previous settings {{cite:656977a8d72e747a67df48675582ece83d988c3b}}, {{cite:752e2ecd9091b48ad540723190d03cbbc763111e}}, {{cite:7d3150a1... | r | 578f726204f2b42666711356277a91e6 |
In principle one could also use optimization methods to explicitly minimize {{formula:55440d8c-97e1-4a0b-8a14-d50e55edf8e1}} for any of our choices of {{formula:6cf7e4a3-24e0-46f5-b2d8-d4490068ec92}} . In fact, line search and trust-region strategies for global convergence implicitly minimize this function {{cite:97f5... | m | aac6ac2a1b44fb5c68e77aead4d07924 |
Future directions: In the recent past, with the introduction of precise segmentation capabilities to visual trackers, the connection to video segmentation has become apparent.
Some top visual tracking methods perform well on video segmentation benchmarks {{cite:37891a70e3f0782b487075cd282788b261bc9e2e}}, {{cite:6dad09e... | d | 3b184405e8f8f418f40d4d86a1c7f719 |
Remark. Contrary to NiftyMIC {{cite:ab0649ecd4f5442b66322e7a9a9c728ff34cc344}}, MIALSRTK {{cite:1d967993c4a273e6903073e206cca13c04ea80e3}} places its regularization parameter {{formula:1b4ba50b-1e0b-485e-8e94-e7951b00967b}} on the data term. For the sake of consistency, we will only use the formulation of Equation REF... | m | 1bf833138b24d3d20224ec659871f142 |
In this section, for clarity of presentation, we illustrate how a specific ROM closure model (i.e., the D2-VMS-ROM outlined in Section ) increases the ROM accuracy for the 2D flow past a circular cylinder {{cite:b6ae1f0d02791c9f2cda952bc001084e8a6ea0fc}}, which is a simple test problem commonly used in the ROM communit... | r | 849e32c3afedbeb1bf2840ba7b9b7302 |
In addition to improving the detection accuracy, reducing the computational cost to achieve real-time on-board processing is also very important for UAV-based object detection approaches. One way to improve latency is to skip unnecessary computation. For instance, {{cite:f5683516360ac602ae83bc27cbd5341c3d8967a0}} propo... | m | b6112238c11623d778efbdac2cfc02ad |
The comparison with EBHIS data at {{formula:63e90f54-d7d3-4afa-90d4-087a2f731493}} shown in figure REF shows the A/F star data line up with the main {{formula:cc8060c3-0312-4a42-9b11-2a35328bffe3}} km s{{formula:dd9680eb-4023-4add-b25e-1b006790952a}} H i emission peak, while the peak at {{formula:68ce189c-81e6-4164... | r | 040da41be9239575c88222fe005f071a |
In this method, one of the objective functions is chosen to be optimized and all the other objective functions are converted into constraints by setting an upper bound for each one of them {{cite:a0128fa379042a49890fc572095cdfcb9b0e5123}}. BOPGVEC can be formulated as follows:
{{formula:e3db0297-1375-43e0-9039-36057473... | m | ca618bbfddfc8860460c89842e23c0d0 |
In all the cases above mentioned, Derrick's theorem is violated by imposing that the static scalar field is situated on a background geometry with axial symmetry and no backreaction. Furthermore, the models mentioned so far also have in common the fact that they use real scalar fields in asymptotically flat background ... | i | 804759dc71a5552934396b4b39cbe8dd |
We employ open source plane-wave code Quantum ESPRESSO {{cite:4cc280315043f67f458a9cfee6372d64a3915bce}} for structural relaxation and phonon calculations of carbon defects in monolayer hBN. We use the optimized norm-conserving Vanderbilt (ONCV) pseudopotentials {{cite:2ea97e3c6e0ef67858bd3c20fb4960e9a555162e}} and a 5... | m | 4df5d7073a2d300d913e65b59a1d9c83 |
To test our circuit pruning methods for feature preservation, we pruned circuits for features in an Imagenet {{cite:defe1686a38f8f9efbfafb15507efeb6046104d0}} trained Alexnet {{cite:936097ad33bf3c417d9f8bc17ae680c28c515458}}. We tested two versions of this model, one trained in the typical manner, as is available throu... | m | effd60584d1ae4c1f7d05af89a0dd494 |
We demonstrated above how the pressure term in a perfect fluid
makes additional contribution to the energy-momentum of the system. During the Lorentz contraction of the system, when the system is accelerated from one inertial frame to another, work is done against pressure, which makes a finite contribution to the tota... | d | ae2884239c8fa7b62a74a6bdfd3db948 |
Related work The only other interpolation scheme we are aware of, that is proven to be statistically consistent in arbitrary dimensions under general conditions, is the recently proposed weighted interpolating nearest neighbors method (wiNN) {{cite:b47e1bc0e7f520fcc76856093fe5084d7e81db84}}, which is also a NW estimato... | i | 125d8ffce1c88f11446b08e83b88fc48 |
and
{{formula:600ae26c-d1f1-44bc-8882-4d4f1e01c7d6}} . By the definition of the minimal operator {{formula:77054a66-b93d-4455-8ad0-6f0f00476302}} , each vector {{formula:7f910226-f45d-47b5-a2ef-c2ca12a85594}} is approximated
by finite vectors {{formula:38c43f5f-a182-47d8-b21d-f4429e1b4cc2}} in the graph norm of {{for... | r | a754e9328e720638854b251f6c329db3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.