title
stringlengths
7
239
abstract
stringlengths
7
2.76k
cs
int64
0
1
phy
int64
0
1
math
int64
0
1
stat
int64
0
1
quantitative biology
int64
0
1
quantitative finance
int64
0
1
Blocks with the hyperfocal subgroup $Z_{2^n}\times Z_{2^n}$
In this paper, we calculate the numbers of irreducible ordinary characters and irreducible Brauer characters in a block of a finite group $G$, whose associated fusion system over a 2-subgroup $P$ of $G$ (which is a defect group of the block) has the hyperfocal subgroup $\mathbb Z_{2^n}\times \mathbb Z_{2^n}$ for some...
0
0
1
0
0
0
Asymptotic Analysis via Stochastic Differential Equations of Gradient Descent Algorithms in Statistical and Computational Paradigms
This paper investigates asymptotic behaviors of gradient descent algorithms (particularly accelerated gradient descent and stochastic gradient descent) in the context of stochastic optimization arose in statistics and machine learning where objective functions are estimated from available data. We show that these alg...
0
0
0
1
0
0
Pigeonring: A Principle for Faster Thresholded Similarity Search
The pigeonhole principle states that if n items are contained in m boxes, then at least one box has no more than n/m items. It is utilized to solve many data management problems, especially for thresholded similarity searches. Despite many pigeonhole principle-based solutions proposed in the last few decades, the con...
1
0
0
0
0
0
Circle compactification and 't Hooft anomaly
Anomaly matching constrains low-energy physics of strongly-coupled field theories, but it is not useful at finite temperature due to contamination from high-energy states. The known exception is an 't Hooft anomaly involving one-form symmetries as in pure $SU(N)$ Yang-Mills theory at $\theta=\pi$. Recent development ...
0
1
0
0
0
0
High-speed 100 MHz strain monitor using fiber Bragg grating and optical filter for magnetostriction measurements under ultrahigh magnetic fields
A high-speed 100 MHz strain monitor using a fiber Bragg grating, an optical filter, and a mode-locked optical fiber laser has been devised, which has a resolution of $\Delta L/L\sim10^{-4}$. The strain monitor is sufficiently fast and robust for the magnetostriction measurements of magnetic materials under ultrahigh ...
0
1
0
0
0
0
Functional limit laws for the increments of Lévy processes
We present a functional form of the Erdös-Renyi law of large numbers for Levy processes.
0
0
1
1
0
0
R$^3$PUF: A Highly Reliable Memristive Device based Reconfigurable PUF
We present a memristive device based R$ ^3 $PUF construction achieving highly desired PUF properties, which are not offered by most current PUF designs: (1) High reliability, almost 100\% that is crucial for PUF-based cryptographic key generations, significantly reducing, or even eliminating the expensive overhead of...
1
0
0
0
0
0
FML-based Dynamic Assessment Agent for Human-Machine Cooperative System on Game of Go
In this paper, we demonstrate the application of Fuzzy Markup Language (FML) to construct an FML-based Dynamic Assessment Agent (FDAA), and we present an FML-based Human-Machine Cooperative System (FHMCS) for the game of Go. The proposed FDAA comprises an intelligent decision-making and learning mechanism, an intelli...
1
0
0
0
0
0
ALMA reveals starburst-like interstellar medium conditions in a compact star-forming galaxy at z ~ 2 using [CI] and CO
We present ALMA detections of the [CI] 1-0, CO J=3-2, and CO J=4-3 emission lines, as well as the ALMA band 4 continuum for a compact star-forming galaxy (cSFG) at z=2.225, 3D-HST GS30274. As is typical for cSFGs, this galaxy has a stellar mass of $1.89 \pm 0.47\,\times 10^{11}\,\rm{M}_\odot$, with a star formation r...
0
1
0
0
0
0
Faster Betweenness Centrality Updates in Evolving Networks
Finding central nodes is a fundamental problem in network analysis. Betweenness centrality is a well-known measure which quantifies the importance of a node based on the fraction of shortest paths going though it. Due to the dynamic nature of many today's networks, algorithms that quickly update centrality scores hav...
1
0
0
0
0
0
Constraining Reionization with the $z \sim 5-6$ Lyman-$α$ Forest Power Spectrum: the Outlook after Planck
The latest measurements of CMB electron scattering optical depth reported by Planck significantly reduces the allowed space of HI reionization models, pointing towards a later ending and/or less extended phase transition than previously believed. Reionization impulsively heats the intergalactic medium (IGM) to $\sim1...
0
1
0
0
0
0
Third-Person Imitation Learning
Reinforcement learning (RL) makes it possible to train agents capable of achiev- ing sophisticated goals in complex and uncertain environments. A key difficulty in reinforcement learning is specifying a reward function for the agent to optimize. Traditionally, imitation learning in RL has been used to overcome this p...
1
0
0
0
0
0
Model Trees for Identifying Exceptional Players in the NHL Draft
Drafting strong players is crucial for the team success. We describe a new data-driven interpretable approach for assessing draft prospects in the National Hockey League. Successful previous approaches have built a predictive model based on player features, or derived performance predictions from the observed perform...
1
0
0
0
0
0
Collapsed Dark Matter Structures
The distributions of dark matter and baryons in the Universe are known to be very different: the dark matter resides in extended halos, while a significant fraction of the baryons have radiated away much of their initial energy and fallen deep into the potential wells. This difference in morphology leads to the widel...
0
1
0
0
0
0
Locally free actions of groupoids and proper topological correspondences
Let $(G,\alpha)$ and $(H,\beta)$ be locally compact Hausdorff groupoids with Haar systems, and let $(X,\lambda)$ be a topological correspondence from $(G,\alpha)$ to $(H,\beta)$ which induce the ${C}^*$-correspondence $\mathcal{H}(X)\colon {C}^*(G,\alpha)\to {C}^*(H,\beta)$. We give sufficient topological conditions ...
0
0
1
0
0
0
Adaptive Lock-Free Data Structures in Haskell: A General Method for Concurrent Implementation Swapping
A key part of implementing high-level languages is providing built-in and default data structures. Yet selecting good defaults is hard. A mutable data structure's workload is not known in advance, and it may shift over its lifetime - e.g., between read-heavy and write-heavy, or from heavy contention by multiple threa...
1
0
0
0
0
0
Output feedback exponential stabilization of a nonlinear 1-D wave equation with boundary input
This paper develops systematically the output feedback exponential stabilization for a one-dimensional unstable/anti-stable wave equation where the control boundary suffers from both internal nonlinear uncertainty and external disturbance. Using only two displacement signals, we propose a disturbance estimator that n...
0
0
1
0
0
0
A Microphotonic Astrocomb
One of the essential prerequisites for detection of Earth-like extra-solar planets or direct measurements of the cosmological expansion is the accurate and precise wavelength calibration of astronomical spectrometers. It has already been realized that the large number of exactly known optical frequencies provided by ...
0
1
0
0
0
0
Scale out for large minibatch SGD: Residual network training on ImageNet-1K with improved accuracy and reduced time to train
For the past 5 years, the ILSVRC competition and the ImageNet dataset have attracted a lot of interest from the Computer Vision community, allowing for state-of-the-art accuracy to grow tremendously. This should be credited to the use of deep artificial neural network designs. As these became more complex, the storag...
1
0
0
1
0
0
Alphabet-dependent Parallel Algorithm for Suffix Tree Construction for Pattern Searching
Suffix trees have recently become very successful data structures in handling large data sequences such as DNA or Protein sequences. Consequently parallel architectures have become ubiquitous. We present a novel alphabet-dependent parallel algorithm which attempts to take advantage of the perverseness of the multicor...
1
0
0
0
0
0
A coupled mitral valve -- left ventricle model with fluid-structure interaction
Understanding the interaction between the valves and walls of the heart is important in assessing and subsequently treating heart dysfunction. With advancements in cardiac imaging, nonlinear mechanics and computational techniques, it is now possible to explore the mechanics of valve-heart interactions using anatomica...
1
1
0
0
0
0
Performance of an Algorithm for Estimation of Flux, Background and Location on One-Dimensional Signals
Optimal estimation of signal amplitude, background level, and photocentre location is crucial to the combined extraction of astrometric and photometric information from focal plane images, and in particular from the one-dimensional measurements performed by Gaia on intermediate to faint magnitude stars. Our goal is t...
0
1
0
0
0
0
Depth Creates No Bad Local Minima
In deep learning, \textit{depth}, as well as \textit{nonlinearity}, create non-convex loss surfaces. Then, does depth alone create bad local minima? In this paper, we prove that without nonlinearity, depth alone does not create bad local minima, although it induces non-convex loss surface. Using this insight, we grea...
1
0
1
1
0
0
Some Formulas for Numbers of Restricted Words
We define a quantity $c_m(n,k)$ as a generalization of the notion of the composition of the positive integer $n$ into $k$ parts. We proceed to derive some known properties of this quantity. In particular, we relate two partial Bell polynomials, in which the sequence of the variables of one polynomial is the invert tr...
0
0
1
0
0
0
Mean Birds: Detecting Aggression and Bullying on Twitter
In recent years, bullying and aggression against users on social media have grown significantly, causing serious consequences to victims of all demographics. In particular, cyberbullying affects more than half of young social media users worldwide, and has also led to teenage suicides, prompted by prolonged and/or co...
1
0
0
0
0
0
Towards an open standard for assessing the severity of robot security vulnerabilities, the Robot Vulnerability Scoring System (RVSS)
Robots are typically not created with security as a main concern. Contrasting to typical IT systems, cyberphysical systems rely on security to handle safety aspects. In light of the former, classic scoring methods such as the Common Vulnerability Scoring System (CVSS) are not able to accurately capture the severity o...
1
0
0
0
0
0
Fully Distributed and Asynchronized Stochastic Gradient Descent for Networked Systems
This paper considers a general data-fitting problem over a networked system, in which many computing nodes are connected by an undirected graph. This kind of problem can find many real-world applications and has been studied extensively in the literature. However, existing solutions either need a central controller f...
1
0
0
0
0
0
Priv'IT: Private and Sample Efficient Identity Testing
We develop differentially private hypothesis testing methods for the small sample regime. Given a sample $\cal D$ from a categorical distribution $p$ over some domain $\Sigma$, an explicitly described distribution $q$ over $\Sigma$, some privacy parameter $\varepsilon$, accuracy parameter $\alpha$, and requirements $...
1
0
1
1
0
0
Radiative Transfer for Exoplanet Atmospheres
Remote sensing of the atmospheres of distant worlds motivates a firm understanding of radiative transfer. In this review, we provide a pedagogical cookbook that describes the principal ingredients needed to perform a radiative transfer calculation and predict the spectrum of an exoplanet atmosphere, including solving...
0
1
0
0
0
0
Computational Results for Extensive-Form Adversarial Team Games
We provide, to the best of our knowledge, the first computational study of extensive-form adversarial team games. These games are sequential, zero-sum games in which a team of players, sharing the same utility function, faces an adversary. We define three different scenarios according to the communication capabilitie...
1
0
0
0
0
0
A Parametric MPC Approach to Balancing the Cost of Abstraction for Differential-Drive Mobile Robots
When designing control strategies for differential-drive mobile robots, one standard tool is the consideration of a point at a fixed distance along a line orthogonal to the wheel axis instead of the full pose of the vehicle. This abstraction supports replacing the non-holonomic, three-state unicycle model with a much...
1
0
0
0
0
0
A norm knockout method on indirect reciprocity to reveal indispensable norms
Although various norms for reciprocity-based cooperation have been suggested that are evolutionarily stable against invasion from free riders, the process of alternation of norms and the role of diversified norms remain unclear in the evolution of cooperation. We clarify the co-evolutionary dynamics of norms and coop...
1
1
0
0
0
0
Online control of the false discovery rate with decaying memory
In the online multiple testing problem, p-values corresponding to different null hypotheses are observed one by one, and the decision of whether or not to reject the current hypothesis must be made immediately, after which the next p-value is observed. Alpha-investing algorithms to control the false discovery rate (F...
1
0
1
1
0
0
Multi-agent Reinforcement Learning Embedded Game for the Optimization of Building Energy Control and Power System Planning
Most of the current game-theoretic demand-side management methods focus primarily on the scheduling of home appliances, and the related numerical experiments are analyzed under various scenarios to achieve the corresponding Nash-equilibrium (NE) and optimal results. However, not much work is conducted for academic or...
1
0
0
1
0
0
A locally quasi-convex abelian group without Mackey topology
We give the first example of a locally quasi-convex (even countable reflexive and $k_\omega$) abelian group $G$ which does not admit the strongest compatible locally quasi-convex group topology. Our group $G$ is the Graev free abelian group $A_G(\mathbf{s})$ over a convergent sequence $\mathbf{s}$.
0
0
1
0
0
0
How accurate is density functional theory at predicting dipole moments? An assessment using a new database of 200 benchmark values
Dipole moments are a simple, global measure of the accuracy of the electron density of a polar molecule. Dipole moments also affect the interactions of a molecule with other molecules as well as electric fields. To directly assess the accuracy of modern density functionals for calculating dipole moments, we have deve...
0
1
0
0
0
0
Understanding the Impact of Early Citers on Long-Term Scientific Impact
This paper explores an interesting new dimension to the challenging problem of predicting long-term scientific impact (LTSI) usually measured by the number of citations accumulated by a paper in the long-term. It is well known that early citations (within 1-2 years after publication) acquired by a paper positively af...
1
0
0
0
0
0
Cause-Effect Deep Information Bottleneck For Incomplete Covariates
Estimating the causal effects of an intervention in the presence of confounding is a frequently occurring problem in applications such as medicine. The task is challenging since there may be multiple confounding factors, some of which may be missing, and inferences must be made from high-dimensional, noisy measuremen...
0
0
0
1
0
0
On the restricted almost unbiased Liu estimator in the Logistic regression model
It is known that when the multicollinearity exists in the logistic regression model, variance of maximum likelihood estimator is unstable. As a remedy, in the context of biased shrinkage ridge estimation, Chang (2015) introduced an almost unbiased Liu estimator in the logistic regression model. Making use of his appr...
0
0
1
1
0
0
Camera-trap images segmentation using multi-layer robust principal component analysis
The segmentation of animals from camera-trap images is a difficult task. To illustrate, there are various challenges due to environmental conditions and hardware limitation in these images. We proposed a multi-layer robust principal component analysis (multi-layer RPCA) approach for background subtraction. Our method...
1
0
0
0
0
0
The Bi-Lipschitz Equisingularity of Essentially Isolated Determinantal Singularities
The bi-Lipschitz geometry is one of the main subjects in the modern approach of Singularity Theory. However, it rises from works of important mathematicians of the last century, especially Zariski. In this work we investigate the Bi-Lipschitz equisingularity of families of Essentially Isolated Determinantal Singulari...
0
0
1
0
0
0
Braid group symmetries of Grassmannian cluster algebras
We define an action of the extended affine d-strand braid group on the open positroid stratum in the Grassmannian Gr(k,n), for d the greatest common divisor of k and n. The action is by quasi-automorphisms of the cluster structure on the Grassmannian, determining a homomorphism from the extended affine braid group to...
0
0
1
0
0
0
Bi-$s^*$-concave distributions
We introduce a new shape-constrained class of distribution functions on R, the bi-$s^*$-concave class. In parallel to results of Dümbgen, Kolesnyk, and Wilke (2017) for what they called the class of bi-log-concave distribution functions, we show that every s-concave density f has a bi-$s^*$-concave distribution funct...
0
0
1
1
0
0
A central limit theorem for the realised covariation of a bivariate Brownian semistationary process
This article presents a weak law of large numbers and a central limit theorem for the scaled realised covariation of a bivariate Brownian semistationary process. The novelty of our results lies in the fact that we derive the suitable asymptotic theory both in a multivariate setting and outside the classical semimarti...
0
0
1
1
0
0
First principles investigations of electronic, magnetic and bonding peculiarities of uranium nitride-fluoride UNF
Based on geometry optimization and magnetic structure investigations within density functional theory, unique uranium nitride fluoride UNF, isoelectronic with UO2, is shown to present peculiar differentiated physical properties. Such specificities versus the oxide are related with the mixed anionic sublattices and th...
0
1
0
0
0
0
Eight-cluster structure of chloroplast genomes differs from similar one observed for bacteria
Previously, a seven-cluster pattern claiming to be a universal one in bacterial genomes has been reported. Keeping in mind the most popular theory of chloroplast origin, we checked whether a similar pattern is observed in chloroplast genomes. Surprisingly, eight cluster structure has been found, for chloroplasts. The...
0
0
0
0
1
0
Remote Document Encryption - encrypting data for e-passport holders
We show how any party can encrypt data for an e-passport holder such that only with physical possession of the e-passport decryption is possible. The same is possible for electronic identity cards and driver licenses. We also indicate possible applications. Dutch passports allow for 160 bit security, theoretically gi...
1
0
0
0
0
0
Full likelihood inference for max-stable data
We show how to perform full likelihood inference for max-stable multivariate distributions or processes based on a stochastic Expectation-Maximisation algorithm, which combines statistical and computational efficiency in high-dimensions. The good performance of this methodology is demonstrated by simulation based on ...
0
0
0
1
0
0
Nef vector bundles on a projective space with first Chern class 3 and second Chern class 8
We describe nef vector bundles on a projective space with first Chern class three and second Chern class eight over an algebraically closed field of characteristic zero by giving them a minimal resolution in terms of a full strong exceptional collection of line bundles.
0
0
1
0
0
0
Performance of irradiated thin n-in-p planar pixel sensors for the ATLAS Inner Tracker upgrade
The ATLAS collaboration will replace its tracking detector with new all silicon pixel and strip systems. This will allow to cope with the higher radiation and occupancy levels expected after the 5-fold increase in the luminosity of the LHC accelerator complex (HL-LHC). In the new tracking detector (ITk) pixel modules...
0
1
0
0
0
0
Assessment of sound spatialisation algorithms for sonic rendering with headsets
Given an input sound signal and a target virtual sound source, sound spatialisation algorithms manipulate the signal so that a listener perceives it as though it were emitted from the target source. There exist several established spatialisation approaches that deliver satisfactory results when loudspeakers are used ...
1
0
0
0
0
0
Identification of individual coherent sets associated with flow trajectories using Coherent Structure Coloring
We present a method for identifying the coherent structures associated with individual Lagrangian flow trajectories even where only sparse particle trajectory data is available. The method, based on techniques in spectral graph theory, uses the Coherent Structure Coloring vector and associated eigenvectors to analyze...
0
1
0
1
0
0
Gaussian Processes for HRF estimation for BOLD fMRI
We present a non-parametric joint estimation method for fMRI task activation values and the hemodynamic response function (HRF). The HRF is modeled as a Gaussian process, making continuous evaluation possible for jittered paradigms and providing a variance estimate at each point.
0
0
0
1
0
0
Iterated Elliptic and Hypergeometric Integrals for Feynman Diagrams
We calculate 3-loop master integrals for heavy quark correlators and the 3-loop QCD corrections to the $\rho$-parameter. They obey non-factorizing differential equations of second order with more than three singularities, which cannot be factorized in Mellin-$N$ space either. The solution of the homogeneous equations...
1
0
0
0
0
0
Stein Variational Message Passing for Continuous Graphical Models
We propose a novel distributed inference algorithm for continuous graphical models, by extending Stein variational gradient descent (SVGD) to leverage the Markov dependency structure of the distribution of interest. Our approach combines SVGD with a set of structured local kernel functions defined on the Markov blank...
1
0
0
1
0
0
PEBP1/RKIP: from multiple functions to a common role in cellular processes
PEBPs (PhosphatidylEthanolamine Binding Proteins) form a protein family widely present in the living world since they are encountered in microorganisms, plants and animals. In all organisms PEBPs appear to regulate important mechanisms that govern cell cycle, proliferation, differentiation and motility. In humans, th...
0
0
0
0
1
0
A Characterization Theorem for a Modal Description Logic
Modal description logics feature modalities that capture dependence of knowledge on parameters such as time, place, or the information state of agents. E.g., the logic S5-ALC combines the standard description logic ALC with an S5-modality that can be understood as an epistemic operator or as representing (undirected)...
1
0
1
0
0
0
Emergence of magnetic long-range order in kagome quantum antiferromagnets
The existence of a spin-liquid ground state of the $s=1/2$ Heisenberg kagome antiferromagnet (KAFM) is well established. Meanwhile, also for the $s=1$ Heisenberg KAFM evidence for the absence of magnetic long-range order (LRO) was found. Magnetic LRO in Heisenberg KAFMs can emerge by increasing the spin quantum numbe...
0
1
0
0
0
0
The multidimensional truncated Moment Problem: Atoms, Determinacy, and Core Variety
This paper is about the moment problem on a finite-dimensional vector space of continuous functions. We investigate the structure of the convex cone of moment functionals (supporting hyperplanes, exposed faces, inner points) and treat various important special topics on moment functionals (determinacy, set of atoms o...
0
0
1
0
0
0
PROOF OF VALUE ALIENATION (PoVA) - a concept of a cryptocurrency issuance protocol
In this paper, we will describe a concept of a cryptocurrency issuance protocol which supports digital currencies in a Proof-of-Work (< PoW >) like manner. However, the methods assume alternative utilization of assets used for cryptocurrency creation (rather than purchasing electricity necessary for < mining >).
0
0
0
0
0
1
Top-Rank Enhanced Listwise Optimization for Statistical Machine Translation
Pairwise ranking methods are the basis of many widely used discriminative training approaches for structure prediction problems in natural language processing(NLP). Decomposing the problem of ranking hypotheses into pairwise comparisons enables simple and efficient solutions. However, neglecting the global ordering o...
1
0
0
0
0
0
Performance Limits of Stochastic Sub-Gradient Learning, Part II: Multi-Agent Case
The analysis in Part I revealed interesting properties for subgradient learning algorithms in the context of stochastic optimization when gradient noise is present. These algorithms are used when the risk functions are non-smooth and involve non-differentiable components. They have been long recognized as being slow ...
1
0
1
1
0
0
Aggregating incoherent agents who disagree
In this paper, we explore how we should aggregate the degrees of belief of of a group of agents to give a single coherent set of degrees of belief, when at least some of those agents might be probabilistically incoherent. There are a number of way of aggregating degrees of belief, and there are a number of ways of fi...
1
0
0
1
0
0
On Fundamental Limits of Robust Learning
We consider the problems of robust PAC learning from distributed and streaming data, which may contain malicious errors and outliers, and analyze their fundamental complexity questions. In particular, we establish lower bounds on the communication complexity for distributed robust learning performed on multiple machi...
1
0
0
1
0
0
Robust Multi-view Pedestrian Tracking Using Neural Networks
In this paper, we present a real-time robust multi-view pedestrian detection and tracking system for video surveillance using neural networks which can be used in dynamic environments. The proposed system consists of two phases: multi-view pedestrian detection and tracking. First, pedestrian detection utilizes backgr...
1
0
0
0
0
0
A Hybrid Algorithm for Period Analysis from Multi-band Data with Sparse and Irregular Sampling for Arbitrary Light Curve Shapes
Ongoing and future surveys with repeat imaging in multiple bands are producing (or will produce) time-spaced measurements of brightness, resulting in the identification of large numbers of variable sources in the sky. A large fraction of these are periodic variables: compilations of these are of scientific interest f...
0
1
0
0
0
0
A behavioral interpretation of belief functions
Shafer's belief functions were introduced in the seventies of the previous century as a mathematical tool in order to model epistemic probability. One of the reasons that they were not picked up by mainstream probability was the lack of a behavioral interpretation. In this paper we provide such a behavioral interpret...
0
0
1
0
0
0
Radiation Hardness of Fiber Bragg Grating Thermometers
Photonics sensing has long been valued for its tolerance to harsh environments where traditional sensing technologies fail. As photonic components continue to evolve and find new applications, their tolerance to radiation is emerging as an important line of inquiry. Here we report on our investigation of the impact o...
0
1
0
0
0
0
On the inherent competition between valid and spurious inductive inferences in Boolean data
Inductive inference is the process of extracting general rules from specific observations. This problem also arises in the analysis of biological networks, such as genetic regulatory networks, where the interactions are complex and the observations are incomplete. A typical task in these problems is to extract genera...
0
0
0
0
1
0
Computing Stable Models of Normal Logic Programs Without Grounding
We present a method for computing stable models of normal logic programs, i.e., logic programs extended with negation, in the presence of predicates with arbitrary terms. Such programs need not have a finite grounding, so traditional methods do not apply. Our method relies on the use of a non-Herbrand universe, as we...
1
0
0
0
0
0
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat mod...
1
0
0
0
0
0
Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams
Analysis of an organization's computer network activity is a key component of early detection and mitigation of insider threat, a growing concern for many organizations. Raw system logs are a prototypical example of streaming data that can quickly scale beyond the cognitive power of a human analyst. As a prospective ...
1
0
0
1
0
0
Singular branched covers of four-manifolds
Consider a dihedral cover $f: Y\to X$ with $X$ and $Y$ four-manifolds and $f$ branched along an oriented surface embedded in $X$ with isolated cone singularities. We prove that only a slice knot can arise as the unique singularity on an irregular dihedral cover $f: Y\to S^4$ if $Y$ is homotopy equivalent to $\mathbb{...
0
0
1
0
0
0
A Sample Complexity Measure with Applications to Learning Optimal Auctions
We introduce a new sample complexity measure, which we refer to as split-sample growth rate. For any hypothesis $H$ and for any sample $S$ of size $m$, the split-sample growth rate $\hat{\tau}_H(m)$ counts how many different hypotheses can empirical risk minimization output on any sub-sample of $S$ of size $m/2$. We ...
1
0
1
1
0
0
MDNet: A Semantically and Visually Interpretable Medical Image Diagnosis Network
The inability to interpret the model prediction in semantically and visually meaningful ways is a well-known shortcoming of most existing computer-aided diagnosis methods. In this paper, we propose MDNet to establish a direct multimodal mapping between medical images and diagnostic reports that can read images, gener...
1
0
0
0
0
0
I0 and rank-into-rank axioms
Just a survey on I0: The basics, some things known but never published, some things published but not known.
0
0
1
0
0
0
Low-Dose CT with a Residual Encoder-Decoder Convolutional Neural Network (RED-CNN)
Given the potential X-ray radiation risk to the patient, low-dose CT has attracted a considerable interest in the medical imaging field. The current main stream low-dose CT methods include vendor-specific sinogram domain filtration and iterative reconstruction, but they need to access original raw data whose formats ...
1
1
0
0
0
0
Primes In Arithmetic Progressions And Primitive Roots
Let $x\geq 1$ be a large number, and let $1 \leq a <q $ be integers such that $\gcd(a,q)=1$ and $q=O(\log^c)$ with $c>0$ constant. This note proves that the counting function for the number of primes $p \in \{p=qn+a: n \geq1 \}$ with a fixed primitive root $u\ne \pm 1, v^2$ has the asymptotic formula $\pi_u(x,q,a)=\d...
0
0
1
0
0
0
Photometric redshift estimation via deep learning
The need to analyze the available large synoptic multi-band surveys drives the development of new data-analysis methods. Photometric redshift estimation is one field of application where such new methods improved the results, substantially. Up to now, the vast majority of applied redshift estimation methods have util...
0
1
0
0
0
0
Effect of antipsychotics on community structure in functional brain networks
Schizophrenia, a mental disorder that is characterized by abnormal social behavior and failure to distinguish one's own thoughts and ideas from reality, has been associated with structural abnormalities in the architecture of functional brain networks. Using various methods from network analysis, we examine the effec...
0
0
0
1
1
0
Unsupervised Learning of Mixture Models with a Uniform Background Component
Gaussian Mixture Models are one of the most studied and mature models in unsupervised learning. However, outliers are often present in the data and could influence the cluster estimation. In this paper, we study a new model that assumes that data comes from a mixture of a number of Gaussians as well as a uniform "bac...
0
0
0
1
0
0
Sound emitted by some grassland animals as an indicator of motion in the surroundings
It is argued based on the results of both numerical modelling and the experiments performed on an artificial substitute of a meadow that the sound emitted by animals living in a dense surrounding such as a meadow or shrubs can be used as a tool for detection of motion. Some characteristics of the sound emitted by the...
0
1
0
0
0
0
Monochromaticity of coherent Smith-Purcell radiation from finite size grating
Investigation of coherent Smith-Purcell Radiation (SPR) spectral characteristics was performed both experimentally and by numerical simulation. The measurement of SPR spectral line shapes of different diffraction orders was carried out at KEK LUCX facility. A pair of room-temperature Schottky barrier diode (SBD) dete...
0
1
0
0
0
0
Search for water vapor in the high-resolution transmission spectrum of HD189733b in the visible
Ground-based telescopes equipped with state-of-the-art spectrographs are able to obtain high-resolution transmission and emission spectra of exoplanets that probe the structure and composition of their atmospheres. Various atomic and molecular species, such as Na, CO, H2O have been already detected. Molecular species...
0
1
0
0
0
0
The Capacity of Some Classes of Polyhedra
K. Borsuk in 1979, in the Topological Conference in Moscow, introduced the concept of the capacity of a compactum. In this paper, we compute the capacity of the product of two spheres of the same or different dimensions and the capacity of lense spaces. Also, we present an upper bound for the capacity of a $\mathbb{Z...
0
0
1
0
0
0
Network Transplanting (extended abstract)
This paper focuses on a new task, i.e., transplanting a category-and-task-specific neural network to a generic, modular network without strong supervision. We design a functionally interpretable structure for the generic network. Like building LEGO blocks, we teach the generic network a new category by directly trans...
1
0
0
1
0
0
Extracting Build Changes with BUILDDIFF
Build systems are an essential part of modern software engineering projects. As software projects change continuously, it is crucial to understand how the build system changes because neglecting its maintenance can lead to expensive build breakage. Recent studies have investigated the (co-)evolution of build configur...
1
0
0
0
0
0
Integrating car path optimization with train formation plan: a non-linear binary programming model and simulated annealing based heuristics
An essential issue that a freight transportation system faced is how to deliver shipments (OD pairs) on a capacitated physical network optimally; that is, to determine the best physical path for each OD pair and assign each OD pair into the most reasonable freight train service sequence. Instead of pre-specifying or ...
0
0
1
0
0
0
Modeling of networks and globules of charged domain walls observed in pump and pulse induced states
Experiments on optical and STM injection of carriers in layered $\mathrm{MX_2}$ materials revealed the formation of nanoscale patterns with networks and globules of domain walls. This is thought to be responsible for the metallization transition of the Mott insulator and for stabilization of a "hidden" state. In resp...
0
1
0
0
0
0
cGAN-based Manga Colorization Using a Single Training Image
The Japanese comic format known as Manga is popular all over the world. It is traditionally produced in black and white, and colorization is time consuming and costly. Automatic colorization methods generally rely on greyscale values, which are not present in manga. Furthermore, due to copyright protection, colorized...
1
0
0
0
0
0
Cooperation and Environment Characterize the Low-Lying Optical Spectrum of Liquid Water
The optical spectrum of liquid water is analyzed by subsystem time-dependent density functional theory. We provide simple explanations for several important (and so far elusive) features. Due to the disordered environment surrounding each water molecule, the joint density of states of the liquid is much broader than ...
0
1
0
0
0
0
Possible particle-hole instabilities in interacting type-II Weyl semimetals
Type II Weyl semimetal, a three dimensional gapless topological phase, has drawn enormous interest recently. These topological semimetals enjoy overtilted dispersion and Weyl nodes that separate the particle and hole pocket. Using perturbation renormalization group, we identify possible renormalization of the interac...
0
1
0
0
0
0
Turbulent shear layers in confining channels
We present a simple model for the development of shear layers between parallel flows in confining channels. Such flows are important across a wide range of topics from diffusers, nozzles and ducts to urban air flow and geophysical fluid dynamics. The model approximates the flow in the shear layer as a linear profile ...
0
1
0
0
0
0
Crystal and Magnetic Structures in Layered, Transition Metal Dihalides and Trihalides
Materials composed of two dimensional layers bonded to one another through weak van der Waals interactions often exhibit strongly anisotropic behaviors and can be cleaved into very thin specimens and sometimes into monolayer crystals. Interest in such materials is driven by the study of low dimensional physics and th...
0
1
0
0
0
0
Ramsey theorem for designs
We prove that for any choice of parameters $k,t,\lambda$ the class of all finite ordered designs with parameters $k,t,\lambda$ is a Ramsey class.
1
0
1
0
0
0
Oracle inequalities for the stochastic differential equations
This paper is a survey of recent results on the adaptive robust non parametric methods for the continuous time regression model with the semi - martingale noises with jumps. The noises are modeled by the Lévy processes, the Ornstein -- Uhlenbeck processes and semi-Markov processes. We represent the general model sele...
0
0
1
0
0
0
Empirical Risk Minimization as Parameter Choice Rule for General Linear Regularization Methods
We consider the statistical inverse problem to recover $f$ from noisy measurements $Y = Tf + \sigma \xi$ where $\xi$ is Gaussian white noise and $T$ a compact operator between Hilbert spaces. Considering general reconstruction methods of the form $\hat f_\alpha = q_\alpha \left(T^*T\right)T^*Y$ with an ordered filter...
0
0
1
1
0
0
Disturbance-to-State Stabilization and Quantized Control for Linear Hyperbolic Systems
We consider a system of linear hyperbolic PDEs where the state at one of the boundary points is controlled using the measurements of another boundary point. Because of the disturbances in the measurement, the problem of designing dynamic controllers is considered so that the closed-loop system is robust with respect ...
1
0
1
0
0
0
Energy dependent stereodynamics of the Ne($^3$P$_2$)+Ar reaction
The stereodynamics of the Ne($^3$P$_2$)+Ar Penning and Associative ionization reactions have been studied using a crossed molecular beam apparatus. The experiment uses a curved magnetic hexapole to polarise the Ne($^3$P$_2$) which is then oriented with a shaped magnetic field in the region where it intersects with a ...
0
1
0
0
0
0
Qubit dynamics at tunneling Fermi-edge singularity in $\it{a.c.}$ response
We consider tunneling of spinless electrons from a single-channel emitter into an empty collector through an interacting resonant level of the quantum dot. When all Coulomb screening of sudden charge variations of the dot during the tunneling is realized by the emitter channel, the system is described with an exactly...
0
1
0
0
0
0