title
stringlengths
7
239
abstract
stringlengths
7
2.76k
cs
int64
0
1
phy
int64
0
1
math
int64
0
1
stat
int64
0
1
quantitative biology
int64
0
1
quantitative finance
int64
0
1
Visible transitions in Ag-like and Cd-like lanthanide ions
We present visible spectra of Ag-like ($4d^{10}4f$) and Cd-like ($4d^{10}4f^2$) ions of Ho (atomic number $Z=67$), Er (68), and Tm (69) observed with a compact electron beam ion trap. For Ag-like ions, prominent emission corresponding to the M1 transitions between the ground state fine structure splitting $4f_{5/2}$-...
0
1
0
0
0
0
A gradient flow approach to linear Boltzmann equations
We introduce a gradient flow formulation of linear Boltzmann equations. Under a diffusive scaling we derive a diffusion equation by using the machinery of gradient flows.
0
0
1
0
0
0
Constraints on neutrino masses from Lyman-alpha forest power spectrum with BOSS and XQ-100
We present constraints on masses of active and sterile neutrinos. We use the one-dimensional Ly$\alpha$-forest power spectrum from the Baryon Oscillation Spectroscopic Survey (BOSS) of the Sloan Digital Sky Survey (SDSS-III) and from the VLT/XSHOOTER legacy survey (XQ-100). In this paper, we present our own measureme...
0
1
0
0
0
0
BubbleView: an interface for crowdsourcing image importance maps and tracking visual attention
In this paper, we present BubbleView, an alternative methodology for eye tracking using discrete mouse clicks to measure which information people consciously choose to examine. BubbleView is a mouse-contingent, moving-window interface in which participants are presented with a series of blurred images and click to re...
1
0
0
0
0
0
Effects of Disorder on the Pressure-Induced Mott Transition in $κ$-BEDT-TTF)$_2$Cu[N(CN)$_2$]Cl
We present a study of the influence of disorder on the Mott metal-insulator transition for the organic charge-transfer salt $\kappa$-(BEDT-TTF)$_2$Cu[N(CN)$_2$]Cl. To this end, disorder was introduced into the system in a controlled way by exposing the single crystals to x-ray irradiation. The crystals were then fine...
0
1
0
0
0
0
Dark Energy Survey Year 1 Results: Multi-Probe Methodology and Simulated Likelihood Analyses
We present the methodology for and detail the implementation of the Dark Energy Survey (DES) 3x2pt DES Year 1 (Y1) analysis, which combines configuration-space two-point statistics from three different cosmological probes: cosmic shear, galaxy-galaxy lensing, and galaxy clustering, using data from the first year of D...
0
1
0
0
0
0
Neural-Guided Deductive Search for Real-Time Program Synthesis from Examples
Synthesizing user-intended programs from a small number of input-output examples is a challenging problem with several important applications like spreadsheet manipulation, data wrangling and code refactoring. Existing synthesis systems either completely rely on deductive logic techniques that are extensively hand-en...
1
0
0
0
0
0
Coupled Electron-Ion Monte Carlo simulation of hydrogen molecular crystals
We performed simulations for solid molecular hydrogen at high pressures (250GPa$\leq$P$\leq$500GPa) along two isotherms at T=200 K (phases III and VI) and at T=414 K (phase IV). At T=200K we considered likely candidates for phase III, the C2c and Cmca12 structures, while at T=414K in phase IV we studied the Pc48 stru...
0
1
0
0
0
0
Spline Based Search Method For Unmodeled Transient Gravitational Wave Chirps
A method is described for the detection and estimation of transient chirp signals that are characterized by smoothly evolving, but otherwise unmodeled, amplitude envelopes and instantaneous frequencies. Such signals are particularly relevant for gravitational wave searches, where they may arise in a wide range of ast...
0
1
0
0
0
0
Quantum mechanics from an epistemic state space
We derive the Hilbert space formalism of quantum mechanics from epistemic principles. A key assumption is that a physical theory that relies on entities or distinctions that are unknowable in principle gives rise to wrong predictions. An epistemic formalism is developed, where concepts like individual and collective ...
0
1
0
0
0
0
Self-duality and scattering map for the hyperbolic van Diejen systems with two coupling parameters (with an appendix by S. Ruijsenaars)
In this paper, we construct global action-angle variables for a certain two-parameter family of hyperbolic van Diejen systems. Following Ruijsenaars' ideas on the translation invariant models, the proposed action-angle variables come from a thorough analysis of the commutation relation obeyed by the Lax matrix, where...
0
1
1
0
0
0
Inference for heavy tailed stationary time series based on sliding blocks
The block maxima method in extreme value theory consists of fitting an extreme value distribution to a sample of block maxima extracted from a time series. Traditionally, the maxima are taken over disjoint blocks of observations. Alternatively, the blocks can be chosen to slide through the observation period, yieldin...
0
0
1
1
0
0
Active tuning of high-Q dielectric metasurfaces
We demonstrate the active tuning of all-dielectric metasurfaces exhibiting high-quality factor (high-Q) resonances. The active control is provided by embedding the asymmetric silicon meta-atoms with liquid crystals, which allows the relative index of refraction to be controlled through heating. It is found that high ...
0
1
0
0
0
0
Semi-Supervised QA with Generative Domain-Adaptive Nets
We study the problem of semi-supervised question answering----utilizing unlabeled text to boost the performance of question answering models. We propose a novel training framework, the Generative Domain-Adaptive Nets. In this framework, we train a generative model to generate questions based on the unlabeled text, an...
1
0
0
0
0
0
Rationality proofs by curve counting
We propose an approach for showing rationality of an algebraic variety $X$. We try to cover $X$ by rational curves of certain type and count how many curves pass through a generic point. If the answer is $1$, then we can sometimes reduce the question of rationality of $X$ to the question of rationality of a closed su...
0
0
1
0
0
0
Explainable Artificial Intelligence: Understanding, Visualizing and Interpreting Deep Learning Models
With the availability of large databases and recent improvements in deep learning methodology, the performance of AI systems is reaching or even exceeding the human level on an increasing number of complex tasks. Impressive examples of this development can be found in domains such as image classification, sentiment a...
1
0
0
1
0
0
The study on quantum material WTe2
WTe2 and its sister alloys have attracted tremendous attentions recent years due to the large non-saturating magnetoresistance and topological non-trivial properties. Herein, we briefly review the electrical property studies on this new quantum material.
0
1
0
0
0
0
Learning Social Image Embedding with Deep Multimodal Attention Networks
Learning social media data embedding by deep models has attracted extensive research interest as well as boomed a lot of applications, such as link prediction, classification, and cross-modal search. However, for social images which contain both link information and multimodal contents (e.g., text description, and vi...
1
0
0
1
0
0
DOC: Deep Open Classification of Text Documents
Traditional supervised learning makes the closed-world assumption that the classes appeared in the test data must have appeared in training. This also applies to text learning or text classification. As learning is used increasingly in dynamic open environments where some new/test documents may not belong to any of t...
1
0
0
0
0
0
When Is the First Spurious Variable Selected by Sequential Regression Procedures?
Applied statisticians use sequential regression procedures to produce a ranking of explanatory variables and, in settings of low correlations between variables and strong true effect sizes, expect that variables at the very top of this ranking are truly relevant to the response. In a regime of certain sparsity levels...
0
0
1
1
0
0
Interpreting Blackbox Models via Model Extraction
Interpretability has become incredibly important as machine learning is increasingly used to inform consequential decisions. We propose to construct global explanations of complex, blackbox models in the form of a decision tree approximating the original model---as long as the decision tree is a good approximation, t...
1
0
0
0
0
0
Extending holomorphic motions and monodromy
Let $E$ be a closed set in the Riemann sphere $\widehat{\mathbb{C}}$. We consider a holomorphic motion $\phi$ of $E$ over a complex manifold $M$, that is, a holomorphic family of injections on $E$ parametrized by $M$. It is known that if $M$ is the unit disk $\Delta$ in the complex plane, then any holomorphic motion ...
0
0
1
0
0
0
A/D Converter Architectures for Energy-Efficient Vision Processor
AI applications have emerged in current world. Among AI applications, computer-vision (CV) related applications have attracted high interest. Hardware implementation of CV processors necessitates a high performance but low-power image detector. The key to energy-efficiency work lies in analog-digital converting, wher...
1
0
0
0
0
0
Quotients in monadic programming: Projective algebras are equivalent to coalgebras
In monadic programming, datatypes are presented as free algebras, generated by data values, and by the algebraic operations and equations capturing some computational effects. These algebras are free in the sense that they satisfy just the equations imposed by their algebraic theory, and remain free of any additional...
1
0
1
0
0
0
Density Independent Algorithms for Sparsifying $k$-Step Random Walks
We give faster algorithms for producing sparse approximations of the transition matrices of $k$-step random walks on undirected, weighted graphs. These transition matrices also form graphs, and arise as intermediate objects in a variety of graph algorithms. Our improvements are based on a better understanding of proc...
1
0
0
0
0
0
On a generalized $k$-FL sequence and its applications
We introduce a generalized $k$-FL sequence and special kind of pairs of real numbers that are related to it, and give an application on the integral solutions of a certain equation using those pairs. Also, we associate skew circulant and circulant matrices to each generalized $k$-FL sequence, and study the determinan...
0
0
1
0
0
0
Supervised Metric Learning with Generalization Guarantees
The crucial importance of metrics in machine learning algorithms has led to an increasing interest in optimizing distance and similarity functions, an area of research known as metric learning. When data consist of feature vectors, a large body of work has focused on learning a Mahalanobis distance. Less work has bee...
1
0
0
0
0
0
Symbolic dynamics for Kuramoto-Sivashinsky PDE on the line --- a computer-assisted proof
The Kuramoto-Sivashinsky PDE on the line with odd and periodic boundary conditions and with parameter $\nu=0.1212$ is considered. We give a computer-assisted proof the existence of symbolic dynamics and countable infinity of periodic orbits with arbitrary large periods.
0
1
0
0
0
0
Individual Dynamical Masses of Ultracool Dwarfs
We present the full results of our decade-long astrometric monitoring programs targeting 31 ultracool binaries with component spectral types M7-T5. Joint analysis of resolved imaging from Keck Observatory and Hubble Space Telescope and unresolved astrometry from CFHT/WIRCam yields parallactic distances for all system...
0
1
0
0
0
0
Beta Dips in the Gaia Era: Simulation Predictions of the Galactic Velocity Anisotropy Parameter for Stellar Halos
The velocity anisotropy parameter, beta, is a measure of the kinematic state of orbits in the stellar halo which holds promise for constraining the merger history of the Milky Way (MW). We determine global trends for beta as a function of radius from three suites of simulations, including accretion only and cosmologi...
0
1
0
0
0
0
Computational Flows in Arithmetic
A computational flow is a pair consisting of a sequence of computational problems of a certain sort and a sequence of computational reductions among them. In this paper we will develop a theory for these computational flows and we will use it to make a sound and complete interpretation for bounded theories of arithme...
1
0
1
0
0
0
Injective homomorphisms of mapping class groups of non-orientable surfaces
Let $N$ be a compact, connected, non-orientable surface of genus $\rho$ with $n$ boundary components, with $\rho \ge 5$ and $n \ge 0$, and let $\mathcal{M} (N)$ be the mapping class group of $N$. We show that, if $\mathcal{G}$ is a finite index subgroup of $\mathcal{M} (N)$ and $\varphi: \mathcal{G} \to \mathcal{M} (...
0
0
1
0
0
0
Transport in a disordered $ν=2/3$ fractional quantum Hall junction
Electric and thermal transport properties of a $\nu=2/3$ fractional quantum Hall junction are analyzed. We investigate the evolution of the electric and thermal two-terminal conductances, $G$ and $G^Q$, with system size $L$ and temperature $T$. This is done both for the case of strong interaction between the 1 and 1/...
0
1
0
0
0
0
Giant Field Enhancement in Longitudinal Epsilon Near Zero Films
We report that a longitudinal epsilon-near-zero (LENZ) film leads to giant field enhancement and strong radiation emission of sources in it and that these features are superior to what found in previous studies related to isotropic ENZ. LENZ films are uniaxially anisotropic films where relative permittivity along the...
0
1
0
0
0
0
Analysis and optimal individual pitch control decoupling by inclusion of an azimuth offset in the multi-blade coordinate transformation
With the trend of increasing wind turbine rotor diameters, the mitigation of blade fatigue loadings is of special interest to extend the turbine lifetime. Fatigue load reductions can be partly accomplished using Individual Pitch Control (IPC) facilitated by the so-called Multi-Blade Coordinate (MBC) transformation. T...
1
0
0
0
0
0
Deep Learning-aided Application Scheduler for Vehicular Safety Communication
802.11p based V2X communication uses stochastic medium access control, which cannot prevent broadcast packet collision, in particular during high channel load. Wireless congestion control has been designed to keep the channel load at an optimal point. However, vehicles' lack of precise and granular knowledge about tr...
1
0
0
0
0
0
Convergence rates in the central limit theorem for weighted sums of Bernoulli random fields
We prove moment inequalities for a class of functionals of i.i.d. random fields. We then derive rates in the central limit theorem for weighted sums of such randoms fields via an approximation by $m$-dependent random fields.
0
0
1
1
0
0
On Adaptive Estimation for Dynamic Bernoulli Bandits
The multi-armed bandit (MAB) problem is a classic example of the exploration-exploitation dilemma. It is concerned with maximising the total rewards for a gambler by sequentially pulling an arm from a multi-armed slot machine where each arm is associated with a reward distribution. In static MABs, the reward distribu...
1
0
0
1
0
0
Near Optimal Sketching of Low-Rank Tensor Regression
We study the least squares regression problem \begin{align*} \min_{\Theta \in \mathcal{S}_{\odot D,R}} \|A\Theta-b\|_2, \end{align*} where $\mathcal{S}_{\odot D,R}$ is the set of $\Theta$ for which $\Theta = \sum_{r=1}^{R} \theta_1^{(r)} \circ \cdots \circ \theta_D^{(r)}$ for vectors $\theta_d^{(r)} \in \mathbb{R}^{p...
1
0
0
1
0
0
Fast computation of p-values for the permutation test based on Pearson's correlation coefficient and other statistical tests
Permutation tests are among the simplest and most widely used statistical tools. Their p-values can be computed by a straightforward sampling of permutations. However, this way of computing p-values is often so slow that it is replaced by an approximation, which is accurate only for part of the interesting range of p...
0
0
0
1
0
0
Convergence analysis of the information matrix in Gaussian belief propagation
Gaussian belief propagation (BP) has been widely used for distributed estimation in large-scale networks such as the smart grid, communication networks, and social networks, where local measurements/observations are scattered over a wide geographical area. However, the convergence of Gaus- sian BP is still an open is...
1
0
0
0
0
0
Vortex pairs in a spin-orbit coupled Bose-Einstein condensate
Static and dynamic properties of vortices in a two-component Bose-Einstein condensate with Rashba spin-orbit coupling are investigated. The mass current around a vortex core in the plane-wave phase is found to be deformed by the spin-orbit coupling, and this makes the dynamics of the vortex pairs quite different from...
0
1
0
0
0
0
GlobeNet: Convolutional Neural Networks for Typhoon Eye Tracking from Remote Sensing Imagery
Advances in remote sensing technologies have made it possible to use high-resolution visual data for weather observation and forecasting tasks. We propose the use of multi-layer neural networks for understanding complex atmospheric dynamics based on multichannel satellite images. The capability of our model was evalu...
1
0
0
0
0
0
The Incremental Multiresolution Matrix Factorization Algorithm
Multiresolution analysis and matrix factorization are foundational tools in computer vision. In this work, we study the interface between these two distinct topics and obtain techniques to uncover hierarchical block structure in symmetric matrices -- an important aspect in the success of many vision problems. Our new...
1
0
0
1
0
0
Carlsson's rank conjecture and a conjecture on square-zero upper triangular matrices
Let $k$ be an algebraically closed field and $A$ the polynomial algebra in $r$ variables with coefficients in $k$. In case the characteristic of $k$ is $2$, Carlsson conjectured that for any $DG$-$A$-module $M$ of dimension $N$ as a free $A$-module, if the homology of $M$ is nontrivial and finite dimensional as a $k$...
0
0
1
0
0
0
Effect of Anodizing Parameters on Corrosion Resistance of Coated Purified Magnesium
Magnesium and its alloys are being considered for biodegradable biomaterials. However, high and uncontrollable corrosion rates have limited the use of magnesium and its alloys in biological environments. In this research, high purified magnesium (HP-Mg) was coated with stearic acid in order to improve the corrosion r...
0
1
0
0
0
0
The probabilistic nature of McShane's identity: planar tree coding of simple loops
In this article, we discuss a probabilistic interpretation of McShane's identity as describing a finite measure on the space of embedded paths though a point.
0
0
1
0
0
0
RT-DAP: A Real-Time Data Analytics Platform for Large-scale Industrial Process Monitoring and Control
In most process control systems nowadays, process measurements are periodically collected and archived in historians. Analytics applications process the data, and provide results offline or in a time period that is considerably slow in comparison to the performance of the manufacturing process. Along with the prolife...
1
0
0
0
0
0
BFGS convergence to nonsmooth minimizers of convex functions
The popular BFGS quasi-Newton minimization algorithm under reasonable conditions converges globally on smooth convex functions. This result was proved by Powell in 1976: we consider its implications for functions that are not smooth. In particular, an analogous convergence result holds for functions, like the Euclide...
0
0
1
0
0
0
A collaborative citizen science platform for real-time volunteer computing and games
Volunteer computing (VC) or distributed computing projects are common in the citizen cyberscience (CCS) community and present extensive opportunities for scientists to make use of computing power donated by volunteers to undertake large-scale scientific computing tasks. Volunteer computing is generally a non-interact...
1
0
0
0
0
0
Quasiparticle interference in multiband superconductors with strong coupling
We develop a theory of the quasiparticle interference (QPI) in multiband superconductors based on strong-coupling Eliashberg approach within the Born approximation. In the framework of this theory, we study dependencies of the QPI response function in the multiband superconductors with nodeless s-wave superconductive...
0
1
0
0
0
0
Trading Strategies Generated by Path-dependent Functionals of Market Weights
Almost twenty years ago, E.R. Fernholz introduced portfolio generating functions which can be used to construct a variety of portfolios, solely in the terms of the individual companies' market weights. I. Karatzas and J. Ruf recently developed another methodology for the functional construction of portfolios, which l...
0
0
0
0
0
1
General Bayesian Inference over the Stiefel Manifold via the Givens Representation
We introduce an approach based on the Givens representation that allows for a routine, reliable, and flexible way to infer Bayesian models with orthogonal matrix parameters. This class of models most notably includes models from multivariate statistics such factor models and probabilistic principal component analysis...
0
0
0
1
0
0
Sine wave gating Silicon single-photon detectors for multiphoton entanglement experiments
Silicon single-photon detectors (SPDs) are the key devices for detecting single photons in the visible wavelength range. Here we present high detection efficiency silicon SPDs dedicated to the generation of multiphoton entanglement based on the technique of high-frequency sine wave gating. The silicon single-photon a...
0
1
0
0
0
0
A Tutorial on Fisher Information
In many statistical applications that concern mathematical psychologists, the concept of Fisher information plays an important role. In this tutorial we clarify the concept of Fisher information as it manifests itself across three different statistical paradigms. First, in the frequentist paradigm, Fisher information...
0
0
1
1
0
0
A statistical approach to identify superluminous supernovae and probe their diversity
We investigate the identification of hydrogen-poor superluminous supernovae (SLSNe I) using a photometric analysis, without including an arbitrary magnitude threshold. We assemble a homogeneous sample of previously classified SLSNe I from the literature, and fit their light curves using Gaussian processes. From the f...
0
1
0
0
0
0
Low fertility rate reversal: a feature of interactions between Biological and Economic systems
An empirical relation indicates that an increase of living standard decreases the Total Fertility Rate (TFR), but this trend was broken in highly developed countries in 2005. The reversal of the TFR was associated with the continuous economic and social development expressed by the Human Development Index (HDI). We h...
0
1
0
0
0
0
Analysis of $p$-Laplacian Regularization in Semi-Supervised Learning
We investigate a family of regression problems in a semi-supervised setting. The task is to assign real-valued labels to a set of $n$ sample points, provided a small training subset of $N$ labeled points. A goal of semi-supervised learning is to take advantage of the (geometric) structure provided by the large number...
1
0
1
1
0
0
Spectral stability of shifted states on star graphs
We consider the nonlinear Schrödinger (NLS) equation with the subcritical power nonlinearity on a star graph consisting of $N$ edges and a single vertex under generalized Kirchhoff boundary conditions. The stationary NLS equation may admit a family of solitary waves parameterized by a translational parameter, which w...
0
1
0
0
0
0
Estimation of the multifractional function and the stability index of linear multifractional stable processes
In this paper we are interested in multifractional stable processes where the self-similarity index $H$ is a function of time, in other words $H$ becomes time changing, and the stability index $\alpha$ is a constant. Using $\beta$- negative power variations ($-1/2<\beta<0$), we propose estimators for the value of the...
0
0
1
1
0
0
Observation of "Topological" Microflares in the Solar Atmosphere
We report on observation of the unusual kind of solar microflares, presumably associated with the so-called "topological trigger" of magnetic reconnection, which was theoretically suggested long time ago by Gorbachev et al. (Sov. Ast. 1988, v.32, p.308) but has not been clearly identified so far by observations. As c...
0
1
0
0
0
0
Commutative positive varieties of languages
We study the commutative positive varieties of languages closed under various operations: shuffle, renaming and product over one-letter alphabets.
1
0
1
0
0
0
A generalized model of social and biological contagion
We present a model of contagion that unifies and generalizes existing models of the spread of social influences and micro-organismal infections. Our model incorporates individual memory of exposure to a contagious entity (e.g., a rumor or disease), variable magnitudes of exposure (dose sizes), and heterogeneity in th...
0
1
0
0
0
0
Luminous Efficiency Estimates of Meteors -I. Uncertainty analysis
The luminous efficiency of meteors is poorly known, but critical for determining the meteoroid mass. We present an uncertainty analysis of the luminous efficiency as determined by the classical ablation equations, and suggest a possible method for determining the luminous efficiency of real meteor events. We find tha...
0
1
0
0
0
0
Application of Van Der Waals Density Functionals to Two Dimensional Systems Based on a Mixed Basis Approach
A van der Waals (vdW) density functional was implemented in the mixed basis approach previously developed for studying two dimensional systems, in which the vdW interaction plays an important role. The basis functions here are taken to be the localized B-splines for the finite non-periodic dimension and plane waves f...
0
1
0
0
0
0
Secondary atmospheres on HD 219134 b and c
We analyze the interiors of HD~219134~b and c, which are among the coolest super Earths detected thus far. Without using spectroscopic measurements, we aim at constraining if the possible atmospheres are hydrogen-rich or hydrogen-poor. In a first step, we employ a full probabilistic Bayesian inference analysis in ord...
0
1
0
0
0
0
Classification of rank two Lie conformal algebras
We give a complete classification (up to isomorphism) of Lie conformal algebras which are free of rank two as $\C[\partial]$-modules, and determine their automorphism groups.
0
0
1
0
0
0
Smooth equivalence of deformations of domains in complex euclidean spaces
We prove that two smooth families of 2-connected domains in $\cc$ are smoothly equivalent if they are equivalent under a possibly discontinuous family of biholomorphisms. We construct, for $m \geq 3$, two smooth families of smoothly bounded $m$-connected domains in $\cc$, and for $n\geq2$, two families of strictly ps...
0
0
1
0
0
0
A lower bound of the hyperbolic dimension for meromorphic functions having a logarithmic Hölder tract
We improve existing lower bounds of the hyperbolic dimension for meromophic functions that have a logarithmic tract {\Omega} which is a Hölder domain. These bounds are given in terms of the fractal behavior, measured with integral means, of the boundary of {\Omega} at infinity.
0
0
1
0
0
0
Invariant Causal Prediction for Nonlinear Models
An important problem in many domains is to predict how a system will respond to interventions. This task is inherently linked to estimating the system's underlying causal structure. To this end, Invariant Causal Prediction (ICP) (Peters et al., 2016) has been proposed which learns a causal model exploiting the invari...
0
0
0
1
0
0
Geometric Ergodicity of the MUCOGARCH(1,1) process
For the multivariate COGARCH(1,1) volatility process we show sufficient conditions for the existence of a unique stationary distribution, for the geometric ergodicity and for the finiteness of moments of the stationary distribution. One of the conditions demands a sufficiently fast exponential decay of the MUCOGARCH(...
0
0
1
0
0
0
Cognitive networks: brains, internet, and civilizations
In this short essay, we discuss some basic features of cognitive activity at several different space-time scales: from neural networks in the brain to civilizations. One motivation for such comparative study is its heuristic value. Attempts to better understand the functioning of "wetware" involved in cognitive activ...
1
0
0
0
0
0
Expect the unexpected: Harnessing Sentence Completion for Sarcasm Detection
The trigram `I love being' is expected to be followed by positive words such as `happy'. In a sarcastic sentence, however, the word `ignored' may be observed. The expected and the observed words are, thus, incongruous. We model sarcasm detection as the task of detecting incongruity between an observed and an expected...
1
0
0
0
0
0
Sensitivity Analysis of Deep Neural Networks
Deep neural networks (DNNs) have achieved superior performance in various prediction tasks, but can be very vulnerable to adversarial examples or perturbations. Therefore, it is crucial to measure the sensitivity of DNNs to various forms of perturbations in real applications. We introduce a novel perturbation manifol...
1
0
0
1
0
0
An application of the Hylleraas-B-splines basis set: High accuracy calculations of the static dipole polarizabilities of helium
The Hylleraas-B-splines basis set is introduced in this paper, which can be used to obtain the eigenvalues and eigenstates of helium-like system's Hamiltonian. Comparing with traditional B-splines basis, the rate of convergence of our results has been significantly improved. Through combine this method and pseudo-sta...
0
1
0
0
0
0
Jupiter's South Equatorial Belt cycle in 2009-2011: II, The SEB Revival
A Revival of the South Equatorial Belt (SEB) is an organised disturbance on a grand scale. It starts with a single vigorous outbreak from which energetic storms and disturbances spread around the planet in the different zonal currents. The Revival that began in 2010 was better observed than any before it. The observa...
0
1
0
0
0
0
Improved Regularization Techniques for End-to-End Speech Recognition
Regularization is important for end-to-end speech models, since the models are highly flexible and easy to overfit. Data augmentation and dropout has been important for improving end-to-end models in other domains. However, they are relatively under explored for end-to-end speech models. Therefore, we investigate the...
1
0
0
1
0
0
On the limits of coercivity in permanent magnets
The maximum coercivity that can be achieved for a given hard magnetic alloy is estimated by computing the energy barrier for the nucleation of a reversed domain in an idealized microstructure without any structural defects and without any soft magnetic secondary phases. For Sm$_{1-z}$Zr$_z$(Fe$_{1-y}$Co$_y$)$_{12-x}$...
0
1
0
0
0
0
$N$-soliton formula and blowup result of the Wadati-Konno-Ichikawa equation
We formulate the $N$ soliton solution of the Wadati-Konno-Ichikawa equation that is determined by purely algebraic equations. Derivation is based on the matrix Riemann-Hilbert problem. We give examples of one soliton solution that include smooth soliton, bursting soliton, and loop type soliton. In addition, we give a...
0
1
1
0
0
0
Introduction of Improved Repairing Locality into Secret Sharing Schemes with Perfect Security
Repairing locality is an appreciated feature for distributed storage, in which a damaged or lost data share can be repaired by accessing a subset of other shares much smaller than is required for decoding the complete data. However for Secret Sharing (SS) schemes, it has been proven theoretically that local repairing...
1
0
0
0
0
0
A counterexample to a conjecture of Kiyota, Murai and Wada
Kiyota, Murai and Wada conjectured in 2002 that the largest eigenvalue of the Cartan matrix C of a block of a finite group is rational if and only if all eigenvalues of C are rational. We provide a counterexample to this conjecture and discuss related questions.
0
0
1
0
0
0
Minimal Hermite-type eigenbasis of the discrete Fourier transform
There exist many ways to build an orthonormal basis of $\mathbb{R}^N$, consisting of the eigenvectors of the discrete Fourier transform (DFT). In this paper we show that there is only one such orthonormal eigenbasis of the DFT that is optimal in the sense of an appropriate uncertainty principle. Moreover, we show tha...
0
0
1
0
0
0
Disagreement-Based Combinatorial Pure Exploration: Sample Complexity Bounds and an Efficient Algorithm
We design new algorithms for the combinatorial pure exploration problem in the multi-arm bandit framework. In this problem, we are given $K$ distributions and a collection of subsets $\mathcal{V} \subset 2^{[K]}$ of these distributions, and we would like to find the subset $v \in \mathcal{V}$ that has largest mean, w...
1
0
0
1
0
0
Insulator to Metal Transition in WO$_3$ Induced by Electrolyte Gating
Tungsten oxide and its associated bronzes (compounds of tungsten oxide and an alkali metal) are well known for their interesting optical and electrical characteristics. We have modified the transport properties of thin WO$_3$ films by electrolyte gating using both ionic liquids and polymer electrolytes. We are able t...
0
1
0
0
0
0
Extensions and Exact Solutions to the Quaternion-Based RMSD Problem
We examine the problem of transforming matching collections of data points into optimal correspondence. The classic RMSD (root-mean-square deviation) method calculates a 3D rotation that minimizes the RMSD of a set of test data points relative to a reference set of corresponding points. Similar literature in aeronaut...
0
0
0
0
1
0
Particles, Cutoffs and Inequivalent Representations. Fraser andWallace on Quantum Field Theory
We critically review the recent debate between Doreen Fraser and David Wallace on the interpretation of quantum field theory, with the aim of identifying where the core of the disagreement lies. We show that, despite appearances, their conflict does not concern the existence of particles or the occurrence of unitaril...
0
1
0
0
0
0
Dynamic Analysis of Executables to Detect and Characterize Malware
It is needed to ensure the integrity of systems that process sensitive information and control many aspects of everyday life. We examine the use of machine learning algorithms to detect malware using the system calls generated by executables-alleviating attempts at obfuscation as the behavior is monitored rather than...
1
0
0
1
0
0
Network support of talented people
Network support is a key success factor for talented people. As an example, the Hungarian Talent Support Network involves close to 1500 Talent Points and more than 200,000 people. This network started the Hungarian Templeton Program identifying and helping 315 exceptional cognitive talents. This network is a part of ...
1
1
0
0
0
0
How to Escape Saddle Points Efficiently
This paper shows that a perturbed form of gradient descent converges to a second-order stationary point in a number iterations which depends only poly-logarithmically on dimension (i.e., it is almost "dimension-free"). The convergence rate of this procedure matches the well-known convergence rate of gradient descent ...
1
0
1
1
0
0
Geert Hofstede et al's set of national cultural dimensions - popularity and criticisms
This article outlines different stages in development of the national culture model, created by Geert Hofstede and his affiliates. This paper reveals and synthesizes the contemporary review of the application spheres of this framework. Numerous applications of the dimensions set are used as a source of identifying si...
0
0
0
0
0
1
Deep and Confident Prediction for Time Series at Uber
Reliable uncertainty estimation for time series prediction is critical in many fields, including physics, biology, and manufacturing. At Uber, probabilistic time series forecasting is used for robust prediction of number of trips during special events, driver incentive allocation, as well as real-time anomaly detecti...
0
0
0
1
0
0
Coverage Analysis of a Vehicular Network Modeled as Cox Process Driven by Poisson Line Process
In this paper, we consider a vehicular network in which the wireless nodes are located on a system of roads. We model the roadways, which are predominantly straight and randomly oriented, by a Poisson line process (PLP) and the locations of nodes on each road as a homogeneous 1D Poisson point process (PPP). Assuming ...
1
0
0
0
0
0
Database Engines: Evolution of Greenness
Context: Information Technology consumes up to 10\% of the world's electricity generation, contributing to CO2 emissions and high energy costs. Data centers, particularly databases, use up to 23% of this energy. Therefore, building an energy-efficient (green) database engine could reduce energy consumption and CO2 em...
1
0
0
0
0
0
Parseval Networks: Improving Robustness to Adversarial Examples
We introduce Parseval networks, a form of deep neural networks in which the Lipschitz constant of linear, convolutional and aggregation layers is constrained to be smaller than 1. Parseval networks are empirically and theoretically motivated by an analysis of the robustness of the predictions made by deep neural netw...
1
0
0
1
0
0
Production of 82Se enriched Zinc Selenide (ZnSe) crystals for the study of neutrinoless double beta decay
High purity Zinc Selenide (ZnSe) crystals are produced starting from elemental Zn and Se to be used for the search of the neutrinoless double beta decay (0{\nu}DBD) of 82Se. In order to increase the number of emitting nuclides, enriched 82Se is used. Dedicated production lines for the synthesis and conditioning of th...
0
1
0
0
0
0
Computing Human-Understandable Strategies
Algorithms for equilibrium computation generally make no attempt to ensure that the computed strategies are understandable by humans. For instance the strategies for the strongest poker agents are represented as massive binary files. In many situations, we would like to compute strategies that can actually be impleme...
0
0
0
1
0
0
A statistical model for aggregating judgments by incorporating peer predictions
We propose a probabilistic model to aggregate the answers of respondents answering multiple-choice questions. The model does not assume that everyone has access to the same information, and so does not assume that the consensus answer is correct. Instead, it infers the most probable world state, even if only a minori...
0
0
0
1
0
0
The Inner 25 AU Debris Distribution in the epsilon Eri System
Debris disk morphology is wavelength dependent due to the wide range of particle sizes and size-dependent dynamics influenced by various forces. Resolved images of nearby debris disks reveal complex disk structures that are difficult to distinguish from their spectral energy distributions. Therefore, multi-wavelength...
0
1
0
0
0
0
Model-Based Clustering of Nonparametric Weighted Networks
Water pollution is a major global environmental problem, and it poses a great environmental risk to public health and biological diversity. This work is motivated by assessing the potential environmental threat of coal mining through increased sulfate concentrations in river networks, which do not belong to any simpl...
0
0
0
1
0
0
FPGA-Based Tracklet Approach to Level-1 Track Finding at CMS for the HL-LHC
During the High Luminosity LHC, the CMS detector will need charged particle tracking at the hardware trigger level to maintain a manageable trigger rate and achieve its physics goals. The tracklet approach is a track-finding algorithm based on a road-search algorithm that has been implemented on commercially availabl...
0
1
0
0
0
0