title stringlengths 7 239 | abstract stringlengths 7 2.76k | cs int64 0 1 | phy int64 0 1 | math int64 0 1 | stat int64 0 1 | quantitative biology int64 0 1 | quantitative finance int64 0 1 |
|---|---|---|---|---|---|---|---|
Blocks with the hyperfocal subgroup $Z_{2^n}\times Z_{2^n}$ | In this paper, we calculate the numbers of irreducible ordinary characters
and irreducible Brauer characters in a block of a finite group $G$, whose
associated fusion system over a 2-subgroup $P$ of $G$ (which is a defect group
of the block) has the hyperfocal subgroup $\mathbb Z_{2^n}\times \mathbb
Z_{2^n}$ for some... | 0 | 0 | 1 | 0 | 0 | 0 |
Asymptotic Analysis via Stochastic Differential Equations of Gradient Descent Algorithms in Statistical and Computational Paradigms | This paper investigates asymptotic behaviors of gradient descent algorithms
(particularly accelerated gradient descent and stochastic gradient descent) in
the context of stochastic optimization arose in statistics and machine learning
where objective functions are estimated from available data. We show that these
alg... | 0 | 0 | 0 | 1 | 0 | 0 |
Pigeonring: A Principle for Faster Thresholded Similarity Search | The pigeonhole principle states that if n items are contained in m boxes,
then at least one box has no more than n/m items. It is utilized to solve many
data management problems, especially for thresholded similarity searches.
Despite many pigeonhole principle-based solutions proposed in the last few
decades, the con... | 1 | 0 | 0 | 0 | 0 | 0 |
Circle compactification and 't Hooft anomaly | Anomaly matching constrains low-energy physics of strongly-coupled field
theories, but it is not useful at finite temperature due to contamination from
high-energy states. The known exception is an 't Hooft anomaly involving
one-form symmetries as in pure $SU(N)$ Yang-Mills theory at $\theta=\pi$.
Recent development ... | 0 | 1 | 0 | 0 | 0 | 0 |
High-speed 100 MHz strain monitor using fiber Bragg grating and optical filter for magnetostriction measurements under ultrahigh magnetic fields | A high-speed 100 MHz strain monitor using a fiber Bragg grating, an optical
filter, and a mode-locked optical fiber laser has been devised, which has a
resolution of $\Delta L/L\sim10^{-4}$. The strain monitor is sufficiently fast
and robust for the magnetostriction measurements of magnetic materials under
ultrahigh ... | 0 | 1 | 0 | 0 | 0 | 0 |
Functional limit laws for the increments of Lévy processes | We present a functional form of the Erdös-Renyi law of large numbers for
Levy processes.
| 0 | 0 | 1 | 1 | 0 | 0 |
R$^3$PUF: A Highly Reliable Memristive Device based Reconfigurable PUF | We present a memristive device based R$ ^3 $PUF construction achieving highly
desired PUF properties, which are not offered by most current PUF designs: (1)
High reliability, almost 100\% that is crucial for PUF-based cryptographic key
generations, significantly reducing, or even eliminating the expensive overhead
of... | 1 | 0 | 0 | 0 | 0 | 0 |
FML-based Dynamic Assessment Agent for Human-Machine Cooperative System on Game of Go | In this paper, we demonstrate the application of Fuzzy Markup Language (FML)
to construct an FML-based Dynamic Assessment Agent (FDAA), and we present an
FML-based Human-Machine Cooperative System (FHMCS) for the game of Go. The
proposed FDAA comprises an intelligent decision-making and learning mechanism,
an intelli... | 1 | 0 | 0 | 0 | 0 | 0 |
ALMA reveals starburst-like interstellar medium conditions in a compact star-forming galaxy at z ~ 2 using [CI] and CO | We present ALMA detections of the [CI] 1-0, CO J=3-2, and CO J=4-3 emission
lines, as well as the ALMA band 4 continuum for a compact star-forming galaxy
(cSFG) at z=2.225, 3D-HST GS30274. As is typical for cSFGs, this galaxy has a
stellar mass of $1.89 \pm 0.47\,\times 10^{11}\,\rm{M}_\odot$, with a star
formation r... | 0 | 1 | 0 | 0 | 0 | 0 |
Faster Betweenness Centrality Updates in Evolving Networks | Finding central nodes is a fundamental problem in network analysis.
Betweenness centrality is a well-known measure which quantifies the importance
of a node based on the fraction of shortest paths going though it. Due to the
dynamic nature of many today's networks, algorithms that quickly update
centrality scores hav... | 1 | 0 | 0 | 0 | 0 | 0 |
Constraining Reionization with the $z \sim 5-6$ Lyman-$α$ Forest Power Spectrum: the Outlook after Planck | The latest measurements of CMB electron scattering optical depth reported by
Planck significantly reduces the allowed space of HI reionization models,
pointing towards a later ending and/or less extended phase transition than
previously believed. Reionization impulsively heats the intergalactic medium
(IGM) to $\sim1... | 0 | 1 | 0 | 0 | 0 | 0 |
Third-Person Imitation Learning | Reinforcement learning (RL) makes it possible to train agents capable of
achiev- ing sophisticated goals in complex and uncertain environments. A key
difficulty in reinforcement learning is specifying a reward function for the
agent to optimize. Traditionally, imitation learning in RL has been used to
overcome this p... | 1 | 0 | 0 | 0 | 0 | 0 |
Model Trees for Identifying Exceptional Players in the NHL Draft | Drafting strong players is crucial for the team success. We describe a new
data-driven interpretable approach for assessing draft prospects in the
National Hockey League. Successful previous approaches have built a predictive
model based on player features, or derived performance predictions from the
observed perform... | 1 | 0 | 0 | 0 | 0 | 0 |
Collapsed Dark Matter Structures | The distributions of dark matter and baryons in the Universe are known to be
very different: the dark matter resides in extended halos, while a significant
fraction of the baryons have radiated away much of their initial energy and
fallen deep into the potential wells. This difference in morphology leads to
the widel... | 0 | 1 | 0 | 0 | 0 | 0 |
Locally free actions of groupoids and proper topological correspondences | Let $(G,\alpha)$ and $(H,\beta)$ be locally compact Hausdorff groupoids with
Haar systems, and let $(X,\lambda)$ be a topological correspondence from
$(G,\alpha)$ to $(H,\beta)$ which induce the ${C}^*$-correspondence
$\mathcal{H}(X)\colon {C}^*(G,\alpha)\to {C}^*(H,\beta)$. We give sufficient
topological conditions ... | 0 | 0 | 1 | 0 | 0 | 0 |
Adaptive Lock-Free Data Structures in Haskell: A General Method for Concurrent Implementation Swapping | A key part of implementing high-level languages is providing built-in and
default data structures. Yet selecting good defaults is hard. A mutable data
structure's workload is not known in advance, and it may shift over its
lifetime - e.g., between read-heavy and write-heavy, or from heavy contention
by multiple threa... | 1 | 0 | 0 | 0 | 0 | 0 |
Output feedback exponential stabilization of a nonlinear 1-D wave equation with boundary input | This paper develops systematically the output feedback exponential
stabilization for a one-dimensional unstable/anti-stable wave equation where
the control boundary suffers from both internal nonlinear uncertainty and
external disturbance. Using only two displacement signals, we propose a
disturbance estimator that n... | 0 | 0 | 1 | 0 | 0 | 0 |
A Microphotonic Astrocomb | One of the essential prerequisites for detection of Earth-like extra-solar
planets or direct measurements of the cosmological expansion is the accurate
and precise wavelength calibration of astronomical spectrometers. It has
already been realized that the large number of exactly known optical
frequencies provided by ... | 0 | 1 | 0 | 0 | 0 | 0 |
Scale out for large minibatch SGD: Residual network training on ImageNet-1K with improved accuracy and reduced time to train | For the past 5 years, the ILSVRC competition and the ImageNet dataset have
attracted a lot of interest from the Computer Vision community, allowing for
state-of-the-art accuracy to grow tremendously. This should be credited to the
use of deep artificial neural network designs. As these became more complex,
the storag... | 1 | 0 | 0 | 1 | 0 | 0 |
Alphabet-dependent Parallel Algorithm for Suffix Tree Construction for Pattern Searching | Suffix trees have recently become very successful data structures in handling
large data sequences such as DNA or Protein sequences. Consequently parallel
architectures have become ubiquitous. We present a novel alphabet-dependent
parallel algorithm which attempts to take advantage of the perverseness of the
multicor... | 1 | 0 | 0 | 0 | 0 | 0 |
A coupled mitral valve -- left ventricle model with fluid-structure interaction | Understanding the interaction between the valves and walls of the heart is
important in assessing and subsequently treating heart dysfunction. With
advancements in cardiac imaging, nonlinear mechanics and computational
techniques, it is now possible to explore the mechanics of valve-heart
interactions using anatomica... | 1 | 1 | 0 | 0 | 0 | 0 |
Performance of an Algorithm for Estimation of Flux, Background and Location on One-Dimensional Signals | Optimal estimation of signal amplitude, background level, and photocentre
location is crucial to the combined extraction of astrometric and photometric
information from focal plane images, and in particular from the one-dimensional
measurements performed by Gaia on intermediate to faint magnitude stars. Our
goal is t... | 0 | 1 | 0 | 0 | 0 | 0 |
Depth Creates No Bad Local Minima | In deep learning, \textit{depth}, as well as \textit{nonlinearity}, create
non-convex loss surfaces. Then, does depth alone create bad local minima? In
this paper, we prove that without nonlinearity, depth alone does not create bad
local minima, although it induces non-convex loss surface. Using this insight,
we grea... | 1 | 0 | 1 | 1 | 0 | 0 |
Some Formulas for Numbers of Restricted Words | We define a quantity $c_m(n,k)$ as a generalization of the notion of the
composition of the positive integer $n$ into $k$ parts. We proceed to derive
some known properties of this quantity. In particular, we relate two partial
Bell polynomials, in which the sequence of the variables of one polynomial is
the invert tr... | 0 | 0 | 1 | 0 | 0 | 0 |
Mean Birds: Detecting Aggression and Bullying on Twitter | In recent years, bullying and aggression against users on social media have
grown significantly, causing serious consequences to victims of all
demographics. In particular, cyberbullying affects more than half of young
social media users worldwide, and has also led to teenage suicides, prompted by
prolonged and/or co... | 1 | 0 | 0 | 0 | 0 | 0 |
Towards an open standard for assessing the severity of robot security vulnerabilities, the Robot Vulnerability Scoring System (RVSS) | Robots are typically not created with security as a main concern. Contrasting
to typical IT systems, cyberphysical systems rely on security to handle safety
aspects. In light of the former, classic scoring methods such as the Common
Vulnerability Scoring System (CVSS) are not able to accurately capture the
severity o... | 1 | 0 | 0 | 0 | 0 | 0 |
Fully Distributed and Asynchronized Stochastic Gradient Descent for Networked Systems | This paper considers a general data-fitting problem over a networked system,
in which many computing nodes are connected by an undirected graph. This kind
of problem can find many real-world applications and has been studied
extensively in the literature. However, existing solutions either need a
central controller f... | 1 | 0 | 0 | 0 | 0 | 0 |
Priv'IT: Private and Sample Efficient Identity Testing | We develop differentially private hypothesis testing methods for the small
sample regime. Given a sample $\cal D$ from a categorical distribution $p$ over
some domain $\Sigma$, an explicitly described distribution $q$ over $\Sigma$,
some privacy parameter $\varepsilon$, accuracy parameter $\alpha$, and
requirements $... | 1 | 0 | 1 | 1 | 0 | 0 |
Radiative Transfer for Exoplanet Atmospheres | Remote sensing of the atmospheres of distant worlds motivates a firm
understanding of radiative transfer. In this review, we provide a pedagogical
cookbook that describes the principal ingredients needed to perform a radiative
transfer calculation and predict the spectrum of an exoplanet atmosphere,
including solving... | 0 | 1 | 0 | 0 | 0 | 0 |
Computational Results for Extensive-Form Adversarial Team Games | We provide, to the best of our knowledge, the first computational study of
extensive-form adversarial team games. These games are sequential, zero-sum
games in which a team of players, sharing the same utility function, faces an
adversary. We define three different scenarios according to the communication
capabilitie... | 1 | 0 | 0 | 0 | 0 | 0 |
A Parametric MPC Approach to Balancing the Cost of Abstraction for Differential-Drive Mobile Robots | When designing control strategies for differential-drive mobile robots, one
standard tool is the consideration of a point at a fixed distance along a line
orthogonal to the wheel axis instead of the full pose of the vehicle. This
abstraction supports replacing the non-holonomic, three-state unicycle model
with a much... | 1 | 0 | 0 | 0 | 0 | 0 |
A norm knockout method on indirect reciprocity to reveal indispensable norms | Although various norms for reciprocity-based cooperation have been suggested
that are evolutionarily stable against invasion from free riders, the process
of alternation of norms and the role of diversified norms remain unclear in the
evolution of cooperation. We clarify the co-evolutionary dynamics of norms and
coop... | 1 | 1 | 0 | 0 | 0 | 0 |
Online control of the false discovery rate with decaying memory | In the online multiple testing problem, p-values corresponding to different
null hypotheses are observed one by one, and the decision of whether or not to
reject the current hypothesis must be made immediately, after which the next
p-value is observed. Alpha-investing algorithms to control the false discovery
rate (F... | 1 | 0 | 1 | 1 | 0 | 0 |
Multi-agent Reinforcement Learning Embedded Game for the Optimization of Building Energy Control and Power System Planning | Most of the current game-theoretic demand-side management methods focus
primarily on the scheduling of home appliances, and the related numerical
experiments are analyzed under various scenarios to achieve the corresponding
Nash-equilibrium (NE) and optimal results. However, not much work is conducted
for academic or... | 1 | 0 | 0 | 1 | 0 | 0 |
A locally quasi-convex abelian group without Mackey topology | We give the first example of a locally quasi-convex (even countable reflexive
and $k_\omega$) abelian group $G$ which does not admit the strongest compatible
locally quasi-convex group topology. Our group $G$ is the Graev free abelian
group $A_G(\mathbf{s})$ over a convergent sequence $\mathbf{s}$.
| 0 | 0 | 1 | 0 | 0 | 0 |
How accurate is density functional theory at predicting dipole moments? An assessment using a new database of 200 benchmark values | Dipole moments are a simple, global measure of the accuracy of the electron
density of a polar molecule. Dipole moments also affect the interactions of a
molecule with other molecules as well as electric fields. To directly assess
the accuracy of modern density functionals for calculating dipole moments, we
have deve... | 0 | 1 | 0 | 0 | 0 | 0 |
Understanding the Impact of Early Citers on Long-Term Scientific Impact | This paper explores an interesting new dimension to the challenging problem
of predicting long-term scientific impact (LTSI) usually measured by the number
of citations accumulated by a paper in the long-term. It is well known that
early citations (within 1-2 years after publication) acquired by a paper
positively af... | 1 | 0 | 0 | 0 | 0 | 0 |
Cause-Effect Deep Information Bottleneck For Incomplete Covariates | Estimating the causal effects of an intervention in the presence of
confounding is a frequently occurring problem in applications such as medicine.
The task is challenging since there may be multiple confounding factors, some
of which may be missing, and inferences must be made from high-dimensional,
noisy measuremen... | 0 | 0 | 0 | 1 | 0 | 0 |
On the restricted almost unbiased Liu estimator in the Logistic regression model | It is known that when the multicollinearity exists in the logistic regression
model, variance of maximum likelihood estimator is unstable. As a remedy, in
the context of biased shrinkage ridge estimation, Chang (2015) introduced an
almost unbiased Liu estimator in the logistic regression model. Making use of
his appr... | 0 | 0 | 1 | 1 | 0 | 0 |
Camera-trap images segmentation using multi-layer robust principal component analysis | The segmentation of animals from camera-trap images is a difficult task. To
illustrate, there are various challenges due to environmental conditions and
hardware limitation in these images. We proposed a multi-layer robust principal
component analysis (multi-layer RPCA) approach for background subtraction. Our
method... | 1 | 0 | 0 | 0 | 0 | 0 |
The Bi-Lipschitz Equisingularity of Essentially Isolated Determinantal Singularities | The bi-Lipschitz geometry is one of the main subjects in the modern approach
of Singularity Theory. However, it rises from works of important mathematicians
of the last century, especially Zariski. In this work we investigate the
Bi-Lipschitz equisingularity of families of Essentially Isolated Determinantal
Singulari... | 0 | 0 | 1 | 0 | 0 | 0 |
Braid group symmetries of Grassmannian cluster algebras | We define an action of the extended affine d-strand braid group on the open
positroid stratum in the Grassmannian Gr(k,n), for d the greatest common
divisor of k and n. The action is by quasi-automorphisms of the cluster
structure on the Grassmannian, determining a homomorphism from the extended
affine braid group to... | 0 | 0 | 1 | 0 | 0 | 0 |
Bi-$s^*$-concave distributions | We introduce a new shape-constrained class of distribution functions on R,
the bi-$s^*$-concave class. In parallel to results of Dümbgen, Kolesnyk, and
Wilke (2017) for what they called the class of bi-log-concave distribution
functions, we show that every s-concave density f has a bi-$s^*$-concave
distribution funct... | 0 | 0 | 1 | 1 | 0 | 0 |
A central limit theorem for the realised covariation of a bivariate Brownian semistationary process | This article presents a weak law of large numbers and a central limit theorem
for the scaled realised covariation of a bivariate Brownian semistationary
process. The novelty of our results lies in the fact that we derive the
suitable asymptotic theory both in a multivariate setting and outside the
classical semimarti... | 0 | 0 | 1 | 1 | 0 | 0 |
First principles investigations of electronic, magnetic and bonding peculiarities of uranium nitride-fluoride UNF | Based on geometry optimization and magnetic structure investigations within
density functional theory, unique uranium nitride fluoride UNF, isoelectronic
with UO2, is shown to present peculiar differentiated physical properties. Such
specificities versus the oxide are related with the mixed anionic sublattices
and th... | 0 | 1 | 0 | 0 | 0 | 0 |
Eight-cluster structure of chloroplast genomes differs from similar one observed for bacteria | Previously, a seven-cluster pattern claiming to be a universal one in
bacterial genomes has been reported. Keeping in mind the most popular theory of
chloroplast origin, we checked whether a similar pattern is observed in
chloroplast genomes. Surprisingly, eight cluster structure has been found, for
chloroplasts. The... | 0 | 0 | 0 | 0 | 1 | 0 |
Remote Document Encryption - encrypting data for e-passport holders | We show how any party can encrypt data for an e-passport holder such that
only with physical possession of the e-passport decryption is possible. The
same is possible for electronic identity cards and driver licenses. We also
indicate possible applications. Dutch passports allow for 160 bit security,
theoretically gi... | 1 | 0 | 0 | 0 | 0 | 0 |
Full likelihood inference for max-stable data | We show how to perform full likelihood inference for max-stable multivariate
distributions or processes based on a stochastic Expectation-Maximisation
algorithm, which combines statistical and computational efficiency in
high-dimensions. The good performance of this methodology is demonstrated by
simulation based on ... | 0 | 0 | 0 | 1 | 0 | 0 |
Nef vector bundles on a projective space with first Chern class 3 and second Chern class 8 | We describe nef vector bundles on a projective space with first Chern class
three and second Chern class eight over an algebraically closed field of
characteristic zero by giving them a minimal resolution in terms of a full
strong exceptional collection of line bundles.
| 0 | 0 | 1 | 0 | 0 | 0 |
Performance of irradiated thin n-in-p planar pixel sensors for the ATLAS Inner Tracker upgrade | The ATLAS collaboration will replace its tracking detector with new all
silicon pixel and strip systems. This will allow to cope with the higher
radiation and occupancy levels expected after the 5-fold increase in the
luminosity of the LHC accelerator complex (HL-LHC). In the new tracking
detector (ITk) pixel modules... | 0 | 1 | 0 | 0 | 0 | 0 |
Assessment of sound spatialisation algorithms for sonic rendering with headsets | Given an input sound signal and a target virtual sound source, sound
spatialisation algorithms manipulate the signal so that a listener perceives it
as though it were emitted from the target source. There exist several
established spatialisation approaches that deliver satisfactory results when
loudspeakers are used ... | 1 | 0 | 0 | 0 | 0 | 0 |
Identification of individual coherent sets associated with flow trajectories using Coherent Structure Coloring | We present a method for identifying the coherent structures associated with
individual Lagrangian flow trajectories even where only sparse particle
trajectory data is available. The method, based on techniques in spectral graph
theory, uses the Coherent Structure Coloring vector and associated eigenvectors
to analyze... | 0 | 1 | 0 | 1 | 0 | 0 |
Gaussian Processes for HRF estimation for BOLD fMRI | We present a non-parametric joint estimation method for fMRI task activation
values and the hemodynamic response function (HRF). The HRF is modeled as a
Gaussian process, making continuous evaluation possible for jittered paradigms
and providing a variance estimate at each point.
| 0 | 0 | 0 | 1 | 0 | 0 |
Iterated Elliptic and Hypergeometric Integrals for Feynman Diagrams | We calculate 3-loop master integrals for heavy quark correlators and the
3-loop QCD corrections to the $\rho$-parameter. They obey non-factorizing
differential equations of second order with more than three singularities,
which cannot be factorized in Mellin-$N$ space either. The solution of the
homogeneous equations... | 1 | 0 | 0 | 0 | 0 | 0 |
Stein Variational Message Passing for Continuous Graphical Models | We propose a novel distributed inference algorithm for continuous graphical
models, by extending Stein variational gradient descent (SVGD) to leverage the
Markov dependency structure of the distribution of interest. Our approach
combines SVGD with a set of structured local kernel functions defined on the
Markov blank... | 1 | 0 | 0 | 1 | 0 | 0 |
PEBP1/RKIP: from multiple functions to a common role in cellular processes | PEBPs (PhosphatidylEthanolamine Binding Proteins) form a protein family
widely present in the living world since they are encountered in
microorganisms, plants and animals. In all organisms PEBPs appear to regulate
important mechanisms that govern cell cycle, proliferation, differentiation and
motility. In humans, th... | 0 | 0 | 0 | 0 | 1 | 0 |
A Characterization Theorem for a Modal Description Logic | Modal description logics feature modalities that capture dependence of
knowledge on parameters such as time, place, or the information state of
agents. E.g., the logic S5-ALC combines the standard description logic ALC with
an S5-modality that can be understood as an epistemic operator or as
representing (undirected)... | 1 | 0 | 1 | 0 | 0 | 0 |
Emergence of magnetic long-range order in kagome quantum antiferromagnets | The existence of a spin-liquid ground state of the $s=1/2$ Heisenberg kagome
antiferromagnet (KAFM) is well established. Meanwhile, also for the $s=1$
Heisenberg KAFM evidence for the absence of magnetic long-range order (LRO) was
found. Magnetic LRO in Heisenberg KAFMs can emerge by increasing the spin
quantum numbe... | 0 | 1 | 0 | 0 | 0 | 0 |
The multidimensional truncated Moment Problem: Atoms, Determinacy, and Core Variety | This paper is about the moment problem on a finite-dimensional vector space
of continuous functions. We investigate the structure of the convex cone of
moment functionals (supporting hyperplanes, exposed faces, inner points) and
treat various important special topics on moment functionals (determinacy, set
of atoms o... | 0 | 0 | 1 | 0 | 0 | 0 |
PROOF OF VALUE ALIENATION (PoVA) - a concept of a cryptocurrency issuance protocol | In this paper, we will describe a concept of a cryptocurrency issuance
protocol which supports digital currencies in a Proof-of-Work (< PoW >) like
manner. However, the methods assume alternative utilization of assets used for
cryptocurrency creation (rather than purchasing electricity necessary for <
mining >).
| 0 | 0 | 0 | 0 | 0 | 1 |
Top-Rank Enhanced Listwise Optimization for Statistical Machine Translation | Pairwise ranking methods are the basis of many widely used discriminative
training approaches for structure prediction problems in natural language
processing(NLP). Decomposing the problem of ranking hypotheses into pairwise
comparisons enables simple and efficient solutions. However, neglecting the
global ordering o... | 1 | 0 | 0 | 0 | 0 | 0 |
Performance Limits of Stochastic Sub-Gradient Learning, Part II: Multi-Agent Case | The analysis in Part I revealed interesting properties for subgradient
learning algorithms in the context of stochastic optimization when gradient
noise is present. These algorithms are used when the risk functions are
non-smooth and involve non-differentiable components. They have been long
recognized as being slow ... | 1 | 0 | 1 | 1 | 0 | 0 |
Aggregating incoherent agents who disagree | In this paper, we explore how we should aggregate the degrees of belief of of
a group of agents to give a single coherent set of degrees of belief, when at
least some of those agents might be probabilistically incoherent. There are a
number of way of aggregating degrees of belief, and there are a number of ways
of fi... | 1 | 0 | 0 | 1 | 0 | 0 |
On Fundamental Limits of Robust Learning | We consider the problems of robust PAC learning from distributed and
streaming data, which may contain malicious errors and outliers, and analyze
their fundamental complexity questions. In particular, we establish lower
bounds on the communication complexity for distributed robust learning
performed on multiple machi... | 1 | 0 | 0 | 1 | 0 | 0 |
Robust Multi-view Pedestrian Tracking Using Neural Networks | In this paper, we present a real-time robust multi-view pedestrian detection
and tracking system for video surveillance using neural networks which can be
used in dynamic environments. The proposed system consists of two phases:
multi-view pedestrian detection and tracking. First, pedestrian detection
utilizes backgr... | 1 | 0 | 0 | 0 | 0 | 0 |
A Hybrid Algorithm for Period Analysis from Multi-band Data with Sparse and Irregular Sampling for Arbitrary Light Curve Shapes | Ongoing and future surveys with repeat imaging in multiple bands are
producing (or will produce) time-spaced measurements of brightness, resulting
in the identification of large numbers of variable sources in the sky. A large
fraction of these are periodic variables: compilations of these are of
scientific interest f... | 0 | 1 | 0 | 0 | 0 | 0 |
A behavioral interpretation of belief functions | Shafer's belief functions were introduced in the seventies of the previous
century as a mathematical tool in order to model epistemic probability. One of
the reasons that they were not picked up by mainstream probability was the lack
of a behavioral interpretation. In this paper we provide such a behavioral
interpret... | 0 | 0 | 1 | 0 | 0 | 0 |
Radiation Hardness of Fiber Bragg Grating Thermometers | Photonics sensing has long been valued for its tolerance to harsh
environments where traditional sensing technologies fail. As photonic
components continue to evolve and find new applications, their tolerance to
radiation is emerging as an important line of inquiry. Here we report on our
investigation of the impact o... | 0 | 1 | 0 | 0 | 0 | 0 |
On the inherent competition between valid and spurious inductive inferences in Boolean data | Inductive inference is the process of extracting general rules from specific
observations. This problem also arises in the analysis of biological networks,
such as genetic regulatory networks, where the interactions are complex and the
observations are incomplete. A typical task in these problems is to extract
genera... | 0 | 0 | 0 | 0 | 1 | 0 |
Computing Stable Models of Normal Logic Programs Without Grounding | We present a method for computing stable models of normal logic programs,
i.e., logic programs extended with negation, in the presence of predicates with
arbitrary terms. Such programs need not have a finite grounding, so traditional
methods do not apply. Our method relies on the use of a non-Herbrand universe,
as we... | 1 | 0 | 0 | 0 | 0 | 0 |
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes | This paper presents a comprehensive survey of existing authentication and
privacy-preserving schemes for 4G and 5G cellular networks. We start by
providing an overview of existing surveys that deal with 4G and 5G
communications, applications, standardization, and security. Then, we give a
classification of threat mod... | 1 | 0 | 0 | 0 | 0 | 0 |
Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams | Analysis of an organization's computer network activity is a key component of
early detection and mitigation of insider threat, a growing concern for many
organizations. Raw system logs are a prototypical example of streaming data
that can quickly scale beyond the cognitive power of a human analyst. As a
prospective ... | 1 | 0 | 0 | 1 | 0 | 0 |
Singular branched covers of four-manifolds | Consider a dihedral cover $f: Y\to X$ with $X$ and $Y$ four-manifolds and $f$
branched along an oriented surface embedded in $X$ with isolated cone
singularities. We prove that only a slice knot can arise as the unique
singularity on an irregular dihedral cover $f: Y\to S^4$ if $Y$ is homotopy
equivalent to $\mathbb{... | 0 | 0 | 1 | 0 | 0 | 0 |
A Sample Complexity Measure with Applications to Learning Optimal Auctions | We introduce a new sample complexity measure, which we refer to as
split-sample growth rate. For any hypothesis $H$ and for any sample $S$ of size
$m$, the split-sample growth rate $\hat{\tau}_H(m)$ counts how many different
hypotheses can empirical risk minimization output on any sub-sample of $S$ of
size $m/2$. We ... | 1 | 0 | 1 | 1 | 0 | 0 |
MDNet: A Semantically and Visually Interpretable Medical Image Diagnosis Network | The inability to interpret the model prediction in semantically and visually
meaningful ways is a well-known shortcoming of most existing computer-aided
diagnosis methods. In this paper, we propose MDNet to establish a direct
multimodal mapping between medical images and diagnostic reports that can read
images, gener... | 1 | 0 | 0 | 0 | 0 | 0 |
I0 and rank-into-rank axioms | Just a survey on I0: The basics, some things known but never published, some
things published but not known.
| 0 | 0 | 1 | 0 | 0 | 0 |
Low-Dose CT with a Residual Encoder-Decoder Convolutional Neural Network (RED-CNN) | Given the potential X-ray radiation risk to the patient, low-dose CT has
attracted a considerable interest in the medical imaging field. The current
main stream low-dose CT methods include vendor-specific sinogram domain
filtration and iterative reconstruction, but they need to access original raw
data whose formats ... | 1 | 1 | 0 | 0 | 0 | 0 |
Primes In Arithmetic Progressions And Primitive Roots | Let $x\geq 1$ be a large number, and let $1 \leq a <q $ be integers such that
$\gcd(a,q)=1$ and $q=O(\log^c)$ with $c>0$ constant. This note proves that the
counting function for the number of primes $p \in \{p=qn+a: n \geq1 \}$ with a
fixed primitive root $u\ne \pm 1, v^2$ has the asymptotic formula
$\pi_u(x,q,a)=\d... | 0 | 0 | 1 | 0 | 0 | 0 |
Photometric redshift estimation via deep learning | The need to analyze the available large synoptic multi-band surveys drives
the development of new data-analysis methods. Photometric redshift estimation
is one field of application where such new methods improved the results,
substantially. Up to now, the vast majority of applied redshift estimation
methods have util... | 0 | 1 | 0 | 0 | 0 | 0 |
Effect of antipsychotics on community structure in functional brain networks | Schizophrenia, a mental disorder that is characterized by abnormal social
behavior and failure to distinguish one's own thoughts and ideas from reality,
has been associated with structural abnormalities in the architecture of
functional brain networks. Using various methods from network analysis, we
examine the effec... | 0 | 0 | 0 | 1 | 1 | 0 |
Unsupervised Learning of Mixture Models with a Uniform Background Component | Gaussian Mixture Models are one of the most studied and mature models in
unsupervised learning. However, outliers are often present in the data and
could influence the cluster estimation. In this paper, we study a new model
that assumes that data comes from a mixture of a number of Gaussians as well as
a uniform "bac... | 0 | 0 | 0 | 1 | 0 | 0 |
Sound emitted by some grassland animals as an indicator of motion in the surroundings | It is argued based on the results of both numerical modelling and the
experiments performed on an artificial substitute of a meadow that the sound
emitted by animals living in a dense surrounding such as a meadow or shrubs can
be used as a tool for detection of motion. Some characteristics of the sound
emitted by the... | 0 | 1 | 0 | 0 | 0 | 0 |
Monochromaticity of coherent Smith-Purcell radiation from finite size grating | Investigation of coherent Smith-Purcell Radiation (SPR) spectral
characteristics was performed both experimentally and by numerical simulation.
The measurement of SPR spectral line shapes of different diffraction orders was
carried out at KEK LUCX facility. A pair of room-temperature Schottky barrier
diode (SBD) dete... | 0 | 1 | 0 | 0 | 0 | 0 |
Search for water vapor in the high-resolution transmission spectrum of HD189733b in the visible | Ground-based telescopes equipped with state-of-the-art spectrographs are able
to obtain high-resolution transmission and emission spectra of exoplanets that
probe the structure and composition of their atmospheres. Various atomic and
molecular species, such as Na, CO, H2O have been already detected. Molecular
species... | 0 | 1 | 0 | 0 | 0 | 0 |
The Capacity of Some Classes of Polyhedra | K. Borsuk in 1979, in the Topological Conference in Moscow, introduced the
concept of the capacity of a compactum. In this paper, we compute the capacity
of the product of two spheres of the same or different dimensions and the
capacity of lense spaces. Also, we present an upper bound for the capacity of a
$\mathbb{Z... | 0 | 0 | 1 | 0 | 0 | 0 |
Network Transplanting (extended abstract) | This paper focuses on a new task, i.e., transplanting a
category-and-task-specific neural network to a generic, modular network without
strong supervision. We design a functionally interpretable structure for the
generic network. Like building LEGO blocks, we teach the generic network a new
category by directly trans... | 1 | 0 | 0 | 1 | 0 | 0 |
Extracting Build Changes with BUILDDIFF | Build systems are an essential part of modern software engineering projects.
As software projects change continuously, it is crucial to understand how the
build system changes because neglecting its maintenance can lead to expensive
build breakage. Recent studies have investigated the (co-)evolution of build
configur... | 1 | 0 | 0 | 0 | 0 | 0 |
Integrating car path optimization with train formation plan: a non-linear binary programming model and simulated annealing based heuristics | An essential issue that a freight transportation system faced is how to
deliver shipments (OD pairs) on a capacitated physical network optimally; that
is, to determine the best physical path for each OD pair and assign each OD
pair into the most reasonable freight train service sequence. Instead of
pre-specifying or ... | 0 | 0 | 1 | 0 | 0 | 0 |
Modeling of networks and globules of charged domain walls observed in pump and pulse induced states | Experiments on optical and STM injection of carriers in layered
$\mathrm{MX_2}$ materials revealed the formation of nanoscale patterns with
networks and globules of domain walls. This is thought to be responsible for
the metallization transition of the Mott insulator and for stabilization of a
"hidden" state. In resp... | 0 | 1 | 0 | 0 | 0 | 0 |
cGAN-based Manga Colorization Using a Single Training Image | The Japanese comic format known as Manga is popular all over the world. It is
traditionally produced in black and white, and colorization is time consuming
and costly. Automatic colorization methods generally rely on greyscale values,
which are not present in manga. Furthermore, due to copyright protection,
colorized... | 1 | 0 | 0 | 0 | 0 | 0 |
Cooperation and Environment Characterize the Low-Lying Optical Spectrum of Liquid Water | The optical spectrum of liquid water is analyzed by subsystem time-dependent
density functional theory. We provide simple explanations for several important
(and so far elusive) features. Due to the disordered environment surrounding
each water molecule, the joint density of states of the liquid is much broader
than ... | 0 | 1 | 0 | 0 | 0 | 0 |
Possible particle-hole instabilities in interacting type-II Weyl semimetals | Type II Weyl semimetal, a three dimensional gapless topological phase, has
drawn enormous interest recently. These topological semimetals enjoy overtilted
dispersion and Weyl nodes that separate the particle and hole pocket. Using
perturbation renormalization group, we identify possible renormalization of the
interac... | 0 | 1 | 0 | 0 | 0 | 0 |
Turbulent shear layers in confining channels | We present a simple model for the development of shear layers between
parallel flows in confining channels. Such flows are important across a wide
range of topics from diffusers, nozzles and ducts to urban air flow and
geophysical fluid dynamics. The model approximates the flow in the shear layer
as a linear profile ... | 0 | 1 | 0 | 0 | 0 | 0 |
Crystal and Magnetic Structures in Layered, Transition Metal Dihalides and Trihalides | Materials composed of two dimensional layers bonded to one another through
weak van der Waals interactions often exhibit strongly anisotropic behaviors
and can be cleaved into very thin specimens and sometimes into monolayer
crystals. Interest in such materials is driven by the study of low dimensional
physics and th... | 0 | 1 | 0 | 0 | 0 | 0 |
Ramsey theorem for designs | We prove that for any choice of parameters $k,t,\lambda$ the class of all
finite ordered designs with parameters $k,t,\lambda$ is a Ramsey class.
| 1 | 0 | 1 | 0 | 0 | 0 |
Oracle inequalities for the stochastic differential equations | This paper is a survey of recent results on the adaptive robust non
parametric methods for the continuous time regression model with the semi -
martingale noises with jumps. The noises are modeled by the Lévy processes,
the Ornstein -- Uhlenbeck processes and semi-Markov processes. We represent the
general model sele... | 0 | 0 | 1 | 0 | 0 | 0 |
Empirical Risk Minimization as Parameter Choice Rule for General Linear Regularization Methods | We consider the statistical inverse problem to recover $f$ from noisy
measurements $Y = Tf + \sigma \xi$ where $\xi$ is Gaussian white noise and $T$
a compact operator between Hilbert spaces. Considering general reconstruction
methods of the form $\hat f_\alpha = q_\alpha \left(T^*T\right)T^*Y$ with an
ordered filter... | 0 | 0 | 1 | 1 | 0 | 0 |
Disturbance-to-State Stabilization and Quantized Control for Linear Hyperbolic Systems | We consider a system of linear hyperbolic PDEs where the state at one of the
boundary points is controlled using the measurements of another boundary point.
Because of the disturbances in the measurement, the problem of designing
dynamic controllers is considered so that the closed-loop system is robust with
respect ... | 1 | 0 | 1 | 0 | 0 | 0 |
Energy dependent stereodynamics of the Ne($^3$P$_2$)+Ar reaction | The stereodynamics of the Ne($^3$P$_2$)+Ar Penning and Associative ionization
reactions have been studied using a crossed molecular beam apparatus. The
experiment uses a curved magnetic hexapole to polarise the Ne($^3$P$_2$) which
is then oriented with a shaped magnetic field in the region where it intersects
with a ... | 0 | 1 | 0 | 0 | 0 | 0 |
Qubit dynamics at tunneling Fermi-edge singularity in $\it{a.c.}$ response | We consider tunneling of spinless electrons from a single-channel emitter
into an empty collector through an interacting resonant level of the quantum
dot. When all Coulomb screening of sudden charge variations of the dot during
the tunneling is realized by the emitter channel, the system is described with
an exactly... | 0 | 1 | 0 | 0 | 0 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.