title
stringlengths
7
239
abstract
stringlengths
7
2.76k
cs
int64
0
1
phy
int64
0
1
math
int64
0
1
stat
int64
0
1
quantitative biology
int64
0
1
quantitative finance
int64
0
1
A Conic Integer Programming Approach to Constrained Assortment Optimization under the Mixed Multinomial Logit Model
We consider the constrained assortment optimization problem under the mixed multinomial logit model. Even moderately sized instances of this problem are challenging to solve directly using standard mixed-integer linear optimization formulations. This has motivated recent research exploring customized optimization str...
0
0
1
0
0
0
Voyager 1 Measurements Beyond the Heliopause of Galactic Cosmic Ray Helium, Boron, Carbon, Oxygen, Magnesium, Silicon and Iron Nuclei with Energies 0.5 to >1.5 GeV/nuc
We have obtained the energy spectra of cosmic ray He, B, C, O, Mg, S and Fe nuclei in the range 0.5-1.5 GeV/nuc and above using the penetrating particle mode of the High Energy Telescope, part of the Cosmic Ray Science (CRS) experiment on Voyagers 1 and 2. The data analysis procedures are the same as those used to ob...
0
1
0
0
0
0
Block Mean Approximation for Efficient Second Order Optimization
Advanced optimization algorithms such as Newton method and AdaGrad benefit from second order derivative or second order statistics to achieve better descent directions and faster convergence rates. At their heart, such algorithms need to compute the inverse or inverse square root of a matrix whose size is quadratic o...
0
0
0
1
0
0
A Minimum Discounted Reward Hamilton-Jacobi Formulation for Computing Reachable Sets
We propose a novel formulation for approximating reachable sets through a minimum discounted reward optimal control problem. The formulation yields a continuous solution that can be obtained by solving a Hamilton-Jacobi equation. Furthermore, the numerical approximation to this solution can be obtained as the unique ...
1
0
0
0
0
0
Imbedding results in Musielak-Orlicz spaces with an application to anisotropic nonlinear Neumann problems
We prove a continuous embedding that allows us to obtain a boundary trace imbedding result for anisotropic Musielak-Orlicz spaces, which we then apply to obtain an existence result for Neumann problems with nonlinearities on the boundary associated to some anisotropic nonlinear elliptic equations in Musielak-Orlicz s...
0
0
1
0
0
0
Defend against advanced persistent threats: An optimal control approach
The new cyber attack pattern of advanced persistent threat (APT) has posed a serious threat to modern society. This paper addresses the APT defense problem, i.e., the problem of how to effectively defend against an APT campaign. Based on a novel APT attack-defense model, the effectiveness of an APT defense strategy i...
1
0
0
0
0
0
Challenges in Designing Datasets and Validation for Autonomous Driving
Autonomous driving is getting a lot of attention in the last decade and will be the hot topic at least until the first successful certification of a car with Level 5 autonomy. There are many public datasets in the academic community. However, they are far away from what a robust industrial production system needs. Th...
1
0
0
1
0
0
Improving Adversarial Robustness via Promoting Ensemble Diversity
Though deep neural networks have achieved significant progress on various tasks, often enhanced by model ensemble, existing high-performance models can be vulnerable to adversarial attacks. Many efforts have been devoted to enhancing the robustness of individual networks and then constructing a straightforward ensemb...
1
0
0
1
0
0
Majorana stripe order on the surface of a three-dimensional topological insulator
The issue on the effect of interactions in topological states concerns not only interacting topological phases but also novel symmetry-breaking phases and phase transitions. Here we study the interaction effect on Majorana zero modes (MZMs) bound to a square vortex lattice in two-dimensional (2D) topological supercon...
0
1
0
0
0
0
Academic Engagement and Commercialization in an Institutional Transition Environment: Evidence from Shanghai Maritime University
Does academic engagement accelerate or crowd out the commercialization of university knowledge? Research on this topic seldom considers the impact of the institutional environment, especially when a formal institution for encouraging the commercial activities of scholars has not yet been established. This study inves...
0
0
0
0
0
1
Affine-Gradient Based Local Binary Pattern Descriptor for Texture Classiffication
We present a novel Affine-Gradient based Local Binary Pattern (AGLBP) descriptor for texture classification. It is very hard to describe complicated texture using single type information, such as Local Binary Pattern (LBP), which just utilizes the sign information of the difference between the pixel and its local nei...
1
0
0
0
0
0
Decomposition theorems for asymptotic property C and property A
We combine aspects of the notions of finite decomposition complexity and asymptotic property C into a notion that we call finite APC-decomposition complexity. Any space with finite decomposition complexity has finite APC-decomposition complexity and any space with asymptotic property C has finite APC-decomposition co...
0
0
1
0
0
0
Three dimensional free-surface flow over arbitrary bottom topography
We consider steady nonlinear free surface flow past an arbitrary bottom topography in three dimensions, concentrating on the shape of the wave pattern that forms on the surface of the fluid. Assuming ideal fluid flow, the problem is formulated using a boundary integral method and discretised to produce a nonlinear sy...
0
1
0
0
0
0
Spin-polaron formation and magnetic state diagram in La doped $CaMnO_3$
$La_xCa_{1-x}MnO_3$ (LCMO) has been studied in the framework of density functional theory (DFT) using Hubbard-U correction. We show that the formation of spin-polarons of different configurations is possible in the G-type antiferromagentic phase. We also show that the spin-polaron (SP) solutions are stabilized due to...
0
1
0
0
0
0
Power-law citation distributions are not scale-free
We analyze time evolution of statistical distributions of citations to scientific papers published in one year. While these distributions can be fitted by a power-law dependence we find that they are nonstationary and the exponent of the power law fit decreases with time and does not come to saturation. We attribute ...
1
0
0
0
0
0
Atmospheric stellar parameters for large surveys using FASMA, a new spectral synthesis package
In the era of vast spectroscopic surveys focusing on Galactic stellar populations, astronomers want to exploit the large quantity and good quality of data to derive their atmospheric parameters without losing precision from automatic procedures. In this work, we developed a new spectral package, FASMA, to estimate th...
0
1
0
0
0
0
Bingham flow in porous media with obstacles of different size
By using the unfolding operators for periodic homogenization, we give a general compactness result for a class of functions defined on bounded domains presenting perforations of two different size. Then we apply this result to the homogenization of the flow of a Bingham fluid in a porous medium with solid obstacles o...
0
0
1
0
0
0
Eigenstate entanglement in the Sachdev-Ye-Kitaev model
In the Sachdev-Ye-Kitaev model, we argue that the entanglement entropy of any eigenstate (including the ground state) obeys a volume law, whose coefficient can be calculated analytically from the energy and subsystem size. We expect that the argument applies to a broader class of chaotic models with all-to-all intera...
0
1
0
0
0
0
Finite presheaves and $A$-finite generation of unstable algebras mod nilpotents
Inspired by the work of Henn, Lannes and Schwartz on unstable algebras over the Steenrod algebra modulo nilpotents, a characterization of unstable algebras that are $A$-finitely generated up to nilpotents is given in terms of the associated presheaf, by introducing the notion of a finite presheaf. In particular, this...
0
0
1
0
0
0
Ejection of rocky and icy material from binary star systems: Implications for the origin and composition of 1I/`Oumuamua
In single star systems like our own Solar system, comets dominate the mass budget of bodies that are ejected into interstellar space, since they form further away and are less tightly bound. However 1I/`Oumuamua, the first interstellar object detected, appears asteroidal in its spectra and in its lack of detectable a...
0
1
0
0
0
0
Two-photon excitation of rubidium atoms inside porous glass
We study the two-photon laser excitation to the 5D$_{5/2}$ energy level of $^{85}$Rb atoms contained in the interstices of a porous material made from sintered ground glass with typical pore dimensions in the 10 - 100 $\mu$m range. The excitation spectra show unusual flat-top lineshapes which are shown to be the cons...
0
1
0
0
0
0
Readout of the atomtronic quantum interference device
A Bose-Einstein condensate confined in ring shaped lattices interrupted by a weak link and pierced by an effective magnetic flux defines the atomic counterpart of the superconducting quantum interference device: the atomtronic quantum interference device (AQUID). In this paper, we report on the detection of current s...
0
1
0
0
0
0
Apprentice: Using Knowledge Distillation Techniques To Improve Low-Precision Network Accuracy
Deep learning networks have achieved state-of-the-art accuracies on computer vision workloads like image classification and object detection. The performant systems, however, typically involve big models with numerous parameters. Once trained, a challenging aspect for such top performing models is deployment on resou...
1
0
0
0
0
0
An IDE-Based Context-Aware Meta Search Engine
Traditional web search forces the developers to leave their working environments and look for solutions in the web browsers. It often does not consider the context of their programming problems. The context-switching between the web browser and the working environment is time-consuming and distracting, and the keywor...
1
0
0
0
0
0
Sharing Data Homomorphically Encrypted with Different Encryption Keys
In this paper, we propose the first homomorphic based proxy re-encryption (HPRE) solution that allows different users to share data they outsourced homomorphically encrypted using their respective public keys with the possibility to process such data remotely. More clearly, this scheme makes possible to switch the pu...
1
0
0
0
0
0
Low temperature features in the heat capacity of unary metals and intermetallics for the example of bulk aluminum and Al$_3$Sc
We explore the competition and coupling of vibrational and electronic contributions to the heat capacity of Al and Al$_3$Sc at temperatures below 50 K combining experimental calorimetry with highly converged finite temperature density functional theory calculations. We find that semilocal exchange correlation functio...
0
1
0
0
0
0
Designing spin and orbital exchange Hamiltonians with ultrashort electric field transients
We demonstrate how electric fields with arbitrary time profile can be used to control the time-dependent parameters of spin and orbital exchange Hamiltonians. Analytic expressions for the exchange constants are derived from a time-dependent Schrieffer-Wolff transformation, and the validity of the resulting effective ...
0
1
0
0
0
0
A Novel Comprehensive Approach for Estimating Concept Semantic Similarity in WordNet
Computation of semantic similarity between concepts is an important foundation for many research works. This paper focuses on IC computing methods and IC measures, which estimate the semantic similarities between concepts by exploiting the topological parameters of the taxonomy. Based on analyzing representative IC c...
1
0
0
0
0
0
Tannakian duality for affine homogeneous spaces
Associated to any closed quantum subgroup $G\subset U_N^+$ and any index set $I\subset\{1,\ldots,N\}$ is a certain homogeneous space $X_{G,I}\subset S^{N-1}_{\mathbb C,+}$, called affine homogeneous space. We discuss here the abstract axiomatization of the algebraic manifolds $X\subset S^{N-1}_{\mathbb C,+}$ which ca...
0
0
1
0
0
0
Strong comparison principle for the fractional $p$-Laplacian and applications to starshaped rings
In the following we show the strong comparison principle for the fractional $p$-Laplacian, i.e. we analyze functions $v,w$ which satisfy $v\geq w$ in $\mathbb{R}^N$ and \[ (-\Delta)^s_pv+q(x)|v|^{p-2}v\geq (-\Delta)^s_pw+q(x)|w|^{p-2}w \quad \text{in $D$,} \] where $s\in(0,1)$, $p>1$, $D\subset \mathbb{R}^N$ is an op...
0
0
1
0
0
0
The uniformity and time-invariance of the intra-cluster metal distribution in galaxy clusters from the IllustrisTNG simulations
The distribution of metals in the intra-cluster medium encodes important information about the enrichment history and formation of galaxy clusters. Here we explore the metal content of clusters in IllustrisTNG - a new suite of galaxy formation simulations building on the Illustris project. Our cluster sample contains...
0
1
0
0
0
0
Improving Native Ads CTR Prediction by Large Scale Event Embedding and Recurrent Networks
Click through rate (CTR) prediction is very important for Native advertisement but also hard as there is no direct query intent. In this paper we propose a large-scale event embedding scheme to encode the each user browsing event by training a Siamese network with weak supervision on the users' consecutive events. Th...
0
0
0
1
0
0
On the Communication Cost of Determining an Approximate Nearest Lattice Point
We consider the closest lattice point problem in a distributed network setting and study the communication cost and the error probability for computing an approximate nearest lattice point, using the nearest-plane algorithm, due to Babai. Two distinct communication models, centralized and interactive, are considered....
1
0
0
0
0
0
One shot entanglement assisted classical and quantum communication over noisy quantum channels: A hypothesis testing and convex split approach
Capacity of a quantum channel characterizes the limits of reliable communication through a noisy quantum channel. This fundamental information theoretic question is very well studied specially in the setting of many independent uses of the channel. An important scenario, both from practical and conceptual point of vi...
1
0
0
0
0
0
Conformally variational Riemannian invariants
Conformally variational Riemannian invariants (CVIs), such as the scalar curvature, are homogeneous scalar invariants which arise as the gradient of a Riemannian functional. We establish a wide range of stability and rigidity results involving CVIs, generalizing many such results for the scalar curvature.
0
0
1
0
0
0
Caching Meets Millimeter Wave Communications for Enhanced Mobility Management in 5G Networks
One of the most promising approaches to overcome the uncertainty and dynamic channel variations of millimeter wave (mmW) communications is to deploy dual-mode base stations that integrate both mmW and microwave ($\mu$W) frequencies. If properly designed, such dual-mode base stations can enhance mobility and handover ...
1
0
0
0
0
0
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
Data poisoning is an attack on machine learning models wherein the attacker adds examples to the training set to manipulate the behavior of the model at test time. This paper explores poisoning attacks on neural nets. The proposed attacks use "clean-labels"; they don't require the attacker to have any control over th...
0
0
0
1
0
0
Sorting Phenomena in a Mathematical Model For Two Mutually Attracting/Repelling Species
Macroscopic models for systems involving diffusion, short-range repulsion, and long-range attraction have been studied extensively in the last decades. In this paper we extend the analysis to a system for two species interacting with each other according to different inner- and intra-species attractions. Under suitab...
0
0
1
0
0
0
Ab initio design of drug carriers for zoledronate guest molecule using phosphonated and sulfonated calix[4]arene and calix[4]resorcinarene host molecules
Monomolecular drug carriers based on calix[n]-arenes and -resorcinarenes containing the interior cavity can enhance the affinity and specificity of the osteoporosis inhibitor drug zoledronate (ZOD). In this work we investigate the suitability of nine different calix[4]-arenes and -resorcinarenes based macrocycles as ...
0
1
0
0
0
0
Skeleton-based Action Recognition of People Handling Objects
In visual surveillance systems, it is necessary to recognize the behavior of people handling objects such as a phone, a cup, or a plastic bag. In this paper, to address this problem, we propose a new framework for recognizing object-related human actions by graph convolutional networks using human and object poses. I...
1
0
0
0
0
0
Active classification with comparison queries
We study an extension of active learning in which the learning algorithm may ask the annotator to compare the distances of two examples from the boundary of their label-class. For example, in a recommendation system application (say for restaurants), the annotator may be asked whether she liked or disliked a specific...
1
0
0
0
0
0
Behavior of digital sequences through exotic numeration systems
Many digital functions studied in the literature, e.g., the summatory function of the base-$k$ sum-of-digits function, have a behavior showing some periodic fluctuation. Such functions are usually studied using techniques from analytic number theory or linear algebra. In this paper we develop a method based on exotic...
1
0
0
0
0
0
Quantum cognition goes beyond-quantum: modeling the collective participant in psychological measurements
In psychological measurements, two levels should be distinguished: the 'individual level', relative to the different participants in a given cognitive situation, and the 'collective level', relative to the overall statistics of their outcomes, which we propose to associate with a notion of 'collective participant'. W...
0
0
0
0
1
0
Geometry of Projective Perfectoid and Integer Partitions
Line bundles of rational degree are defined using Perfectoid spaces, and their co-homology computed via standard Čech complex along with Kunneth formula. A new concept of `braided dimension' is introduced, which helps convert the curse of infinite dimensionality into a boon, which is then used to do Bezout type compu...
0
0
1
0
0
0
Determinantal Generalizations of Instrumental Variables
Linear structural equation models relate the components of a random vector using linear interdependencies and Gaussian noise. Each such model can be naturally associated with a mixed graph whose vertices correspond to the components of the random vector. The graph contains directed edges that represent the linear rel...
0
0
1
1
0
0
Computational insights and the observation of SiC nanograin assembly: towards 2D silicon carbide
While an increasing number of two-dimensional (2D) materials, including graphene and silicene, have already been realized, others have only been predicted. An interesting example is the two-dimensional form of silicon carbide (2D-SiC). Here, we present an observation of atomically thin and hexagonally bonded nanosize...
0
1
0
0
0
0
Non-Homogeneous Hydrodynamic Systems and Quasi-Stäckel Hamiltonians
In this paper we present a novel construction of non-homogeneous hydrodynamic equations from what we call quasi-Stäckel systems, that is non-commutatively integrable systems constructed from appropriate maximally superintegrable Stäckel systems. We describe the relations between Poisson algebras generated by quasi-St...
0
1
0
0
0
0
Latest results of the Tunka Radio Extension (ISVHECRI2016)
The Tunka Radio Extension (Tunka-Rex) is an antenna array consisting of 63 antennas at the location of the TAIGA facility (Tunka Advanced Instrument for cosmic ray physics and Gamma Astronomy) in Eastern Siberia, nearby Lake Baikal. Tunka-Rex is triggered by the air-Cherenkov array Tunka-133 during clear and moonless...
0
1
0
0
0
0
The Rabi frequency on the $H^3Δ_1$ to $C^1Π$ transition in ThO: influence of interaction with electric and magnetic fields
Calculations of the correlations between the Rabi frequency on the $H^3\Delta_1$ to $C^1\Pi$ transition in ThO molecule and experimental setup parameters in the electron electric dipole moment (eEDM) search experiment is performed. Calculations are required for estimations of systematic errors in the experiment due t...
0
1
0
0
0
0
Deriving mesoscopic models of collective behaviour for finite populations
Animal groups exhibit emergent properties that are a consequence of local interactions. Linking individual-level behaviour to coarse-grained descriptions of animal groups has been a question of fundamental interest. Here, we present two complementary approaches to deriving coarse-grained descriptions of collective be...
0
0
0
0
1
0
First Indirect X-Ray Imaging Tests With An 88-mm Diameter Single Crystal
Using the 1-BM-C beamline at the Advanced Photon Source (APS), we have performed the initial indirect x-ray imaging point-spread-function (PSF) test of a unique 88-mm diameter YAG:Ce single crystal of only 100-micron thickness. The crystal was bonded to a fiber optic plate (FOP) for mechanical support and to allow th...
0
1
0
0
0
0
A randomized Halton algorithm in R
Randomized quasi-Monte Carlo (RQMC) sampling can bring orders of magnitude reduction in variance compared to plain Monte Carlo (MC) sampling. The extent of the efficiency gain varies from problem to problem and can be hard to predict. This article presents an R function rhalton that produces scrambled versions of Hal...
1
0
0
1
0
0
Leveraging Node Attributes for Incomplete Relational Data
Relational data are usually highly incomplete in practice, which inspires us to leverage side information to improve the performance of community detection and link prediction. This paper presents a Bayesian probabilistic approach that incorporates various kinds of node attributes encoded in binary form in relational...
1
0
0
1
0
0
pMR: A high-performance communication library
On many parallel machines, the time LQCD applications spent in communication is a significant contribution to the total wall-clock time, especially in the strong-scaling limit. We present a novel high-performance communication library that can be used as a de facto drop-in replacement for MPI in existing software. It...
1
1
0
0
0
0
Extending a Function Just by Multiplying and Dividing Function Values: Smoothness and Prime Identities
We describe a purely-multiplicative method for extending an analytic function. It calculates the value of an analytic function at a point, merely by multiplying together function values and reciprocals of function values at other points closer to the origin. The function values are taken at the points of geometric se...
0
0
1
0
0
0
Towards Modeling the Interaction of Spatial-Associative Neural Network Representations for Multisensory Perception
Our daily perceptual experience is driven by different neural mechanisms that yield multisensory interaction as the interplay between exogenous stimuli and endogenous expectations. While the interaction of multisensory cues according to their spatiotemporal properties and the formation of multisensory feature-based r...
0
0
0
0
1
0
Dex-Net 2.0: Deep Learning to Plan Robust Grasps with Synthetic Point Clouds and Analytic Grasp Metrics
To reduce data collection time for deep learning of robust robotic grasp plans, we explore training from a synthetic dataset of 6.7 million point clouds, grasps, and analytic grasp metrics generated from thousands of 3D models from Dex-Net 1.0 in randomized poses on a table. We use the resulting dataset, Dex-Net 2.0,...
1
0
0
0
0
0
Effects of temperature and strain rate on mechanical behaviors of Stone-Wales defective monolayer black phosphorene
The mechanical behaviors of monolayer black phosphorene (MBP) are explored by molecular dynamics (MD) simulations using reactive force field. It is revealed that the temperature and strain rate have significant influence on mechanical behaviors of MBP, and they are further weakened by SW (Stone-Wales) defects. In gen...
0
1
0
0
0
0
Ward identities for charge and heat currents of particle-particle and particle-hole pairs
The Ward identities for the charge and heat currents are derived for particle-particle and particle-hole pairs. They are the exact constraints on the current-vertex functions imposed by conservation laws and should be satisfied by consistent theories. While the Ward identity for the charge current of electrons is wel...
0
1
0
0
0
0
Ultrafast imprinting of topologically protected magnetic textures via pulsed electrons
Short electron pulses are demonstrated to trigger and control magnetic excitations, even at low electron current densities. We show that the tangential magnetic field surrounding a picosecond electron pulse can imprint topologically protected magnetic textures such as skyrmions in a sample with a residual Dzyaloshins...
0
1
0
0
0
0
Recurrent Environment Simulators
Models that can simulate how environments change in response to actions can be used by agents to plan and act efficiently. We improve on previous environment simulators from high-dimensional pixel observations by introducing recurrent neural networks that are able to make temporally and spatially coherent predictions...
1
0
0
1
0
0
Exceeding the Shockley-Queisser limit within the detailed balance framework
The Shockley-Queisser limit is one of the most fundamental results in the field of photovoltaics. Based on the principle of detailed balance, it defines an upper limit for a single junction solar cell that uses an absorber material with a specific band gap. Although methods exist that allow a solar cell to exceed the...
0
1
0
0
0
0
Effect of disorder on the optical response of NiPt and Ni$_3$Pt alloys
In this communication we present a detailed study of the effect of chemical disorder on the optical response of Ni$_{1-x}$Pt$_x$ (0.1$\leq$ x $\leq$0.75) and Ni$_{3(1-x)/3}$Pt$_x$ (0.1$\leq$ x $\leq$0.3). We shall propose a formalism which will combine a Kubo-Greenwood approach with a DFT based tight-binding linear m...
0
1
0
0
0
0
Train on Validation: Squeezing the Data Lemon
Model selection on validation data is an essential step in machine learning. While the mixing of data between training and validation is considered taboo, practitioners often violate it to increase performance. Here, we offer a simple, practical method for using the validation set for training, which allows for a con...
0
0
0
1
0
0
Local migration quantification method for scratch assays
Motivation: The scratch assay is a standard experimental protocol used to characterize cell migration. It can be used to identify genes that regulate migration and evaluate the efficacy of potential drugs that inhibit cancer invasion. In these experiments, a scratch is made on a cell monolayer and recolonisation of t...
0
0
0
0
1
0
Assessing the level of merging errors for coauthorship data: a Bayesian model
Robust analysis of coauthorship networks is based on high quality data. However, ground-truth data are usually unavailable. Empirical data suffer several types of errors, a typical one of which is called merging error, identifying different persons as one entity. Specific features of authors have been used to reduce ...
1
0
0
0
0
0
Blood-based metabolic signatures in Alzheimer's disease
Introduction: Identification of blood-based metabolic changes might provide early and easy-to-obtain biomarkers. Methods: We included 127 AD patients and 121 controls with CSF-biomarker-confirmed diagnosis (cut-off tau/A$\beta_{42}$: 0.52). Mass spectrometry platforms determined the concentrations of 53 amine, 22 org...
0
0
0
1
0
0
The Indecomposable Solutions of Linear Congruences
This article considers the minimal non-zero (= indecomposable) solutions of the linear congruence $1\cdot x_1 + \cdots + (m-1)\cdot x_{m-1} \equiv 0 \pmod m$ for unknown non-negative integers $x_1, \ldots, x_n$, and characterizes the solutions that attain the Eggleton-Erdős bound. Furthermore it discusses the asympto...
0
0
1
0
0
0
Weak multiplier Hopf algebras III. Integrals and duality
Let $(A,\Delta)$ be a weak multiplier Hopf algebra. It is a pair of a non-degenerate algebra $A$, with or without identity, and a coproduct $\Delta$ on $A$, satisfying certain properties. The main difference with multiplier Hopf algebras is that now, the canonical maps $T_1$ and $T_2$ on $A\otimes A$, defined by $$T_...
0
0
1
0
0
0
Monte-Carlo Tree Search by Best Arm Identification
Recent advances in bandit tools and techniques for sequential learning are steadily enabling new applications and are promising the resolution of a range of challenging related problems. We study the game tree search problem, where the goal is to quickly identify the optimal move in a given game tree by sequentially ...
1
0
0
1
0
0
Efficient Model-Based Deep Reinforcement Learning with Variational State Tabulation
Modern reinforcement learning algorithms reach super-human performance on many board and video games, but they are sample inefficient, i.e. they typically require significantly more playing experience than humans to reach an equal performance level. To improve sample efficiency, an agent may build a model of the envi...
0
0
0
1
0
0
Griffiths Singularities in the Random Quantum Ising Antiferromagnet: A Tree Tensor Network Renormalization Group Study
The antiferromagnetic Ising chain in both transverse and longitudinal magnetic fields is one of the paradigmatic models of a quantum phase transition. The antiferromagnetic system exhibits a zero-temperature critical line separating an antiferromagnetic phase and a paramagnetic phase; the critical line connects an in...
0
1
0
0
0
0
Which Neural Net Architectures Give Rise To Exploding and Vanishing Gradients?
We give a rigorous analysis of the statistical behavior of gradients in a randomly initialized fully connected network N with ReLU activations. Our results show that the empirical variance of the squares of the entries in the input-output Jacobian of N is exponential in a simple architecture-dependent constant beta, ...
0
0
0
1
0
0
Curriculum-Based Neighborhood Sampling For Sequence Prediction
The task of multi-step ahead prediction in language models is challenging considering the discrepancy between training and testing. At test time, a language model is required to make predictions given past predictions as input, instead of the past targets that are provided during training. This difference, known as e...
0
0
0
1
0
0
Randomized Composable Coresets for Matching and Vertex Cover
A common approach for designing scalable algorithms for massive data sets is to distribute the computation across, say $k$, machines and process the data using limited communication between them. A particularly appealing framework here is the simultaneous communication model whereby each machine constructs a small re...
1
0
0
0
0
0
simode: R Package for statistical inference of ordinary differential equations using separable integral-matching
In this paper we describe simode: Separable Integral Matching for Ordinary Differential Equations. The statistical methodologies applied in the package focus on several minimization procedures of an integral-matching criterion function, taking advantage of the mathematical structure of the differential equations like...
0
0
0
1
0
0
Positive scalar curvature and the Euler class
We prove the following generalization of the classical Lichnerowicz vanishing theorem: if $F$ is an oriented flat vector bundle over a closed spin manifold $M$ such that $TM$ carries a metric of positive scalar curvature, then $<\widehat A(TM)e(F),[M]>=0$, where $e(F)$ is the Euler class of $F$.
0
0
1
0
0
0
Online Service with Delay
In this paper, we introduce the online service with delay problem. In this problem, there are $n$ points in a metric space that issue service requests over time, and a server that serves these requests. The goal is to minimize the sum of distance traveled by the server and the total delay in serving the requests. Thi...
1
0
0
0
0
0
Comparison of dynamic mechanical properties of non-superheated and superheated A357 alloys
The influence of superheat treatment on the microstructure and dynamic mechanical properties of A357 alloys has been investigated. The study of microstructure was performed by the optical microscope. Dynamic mechanical properties (storage modulus, loss modulus, and damping capacity) were measured by the dynamic mecha...
0
1
0
0
0
0
On the accuracy and usefulness of analytic energy models for contemporary multicore processors
This paper presents refinements to the execution-cache-memory performance model and a previously published power model for multicore processors. The combination of both enables a very accurate prediction of performance and energy consumption of contemporary multicore processors as a function of relevant parameters su...
1
0
0
0
0
0
A Simple Solution for Maximum Range Flight
Within the standard framework of quasi-steady flight, this paper derives a speed that realizes the maximal obtainable range per unit of fuel. If this speed is chosen at each instant of a flight plan $h(x)$ giving altitude $h$ as a function of distance $x$, a variational problem for finding an optimal $h(x)$ can be fo...
0
0
1
0
0
0
Multiscale Residual Mixture of PCA: Dynamic Dictionaries for Optimal Basis Learning
In this paper we are interested in the problem of learning an over-complete basis and a methodology such that the reconstruction or inverse problem does not need optimization. We analyze the optimality of the presented approaches, their link to popular already known techniques s.a. Artificial Neural Networks,k-means ...
1
0
0
1
0
0
On factorizations of graphical maps
We study the categories governing infinity (wheeled) properads. The graphical category, which was already known to be generalized Reedy, is in fact an Eilenberg-Zilber category. A minor alteration to the definition of the wheeled graphical category allows us to show that it is a generalized Reedy category. Finally, w...
0
0
1
0
0
0
Raking-ratio empirical process with auxiliary information learning
The raking-ratio method is a statistical and computational method which adjusts the empirical measure to match the true probability of sets in a finite partition. We study the asymptotic behavior of the raking-ratio empirical process indexed by a class of functions when the auxiliary information is given by the learn...
0
0
1
1
0
0
Improving drug sensitivity predictions in precision medicine through active expert knowledge elicitation
Predicting the efficacy of a drug for a given individual, using high-dimensional genomic measurements, is at the core of precision medicine. However, identifying features on which to base the predictions remains a challenge, especially when the sample size is small. Incorporating expert knowledge offers a promising a...
1
0
0
1
0
0
On Vague Computers
Vagueness is something everyone is familiar with. In fact, most people think that vagueness is closely related to language and exists only there. However, vagueness is a property of the physical world. Quantum computers harness superposition and entanglement to perform their computational tasks. Both superposition an...
1
0
0
0
0
0
Exploiting OxRAM Resistive Switching for Dynamic Range Improvement of CMOS Image Sensors
We present a unique application of OxRAM devices in CMOS Image Sensors (CIS) for dynamic range (DR) improvement. We propose a modified 3T-APS (Active Pixel Sensor) circuit that incorporates OxRAM in 1T-1R configuration. DR improvement is achieved by resistive compression of the pixel output signal through autonomous ...
1
0
0
0
0
0
Magnetic control of Goos-Hanchen shifts in a yttrium-iron-garnet film
We investigate the Goos-Hanchen (G-H) shifts reflected and transmitted by a yttrium-iron-garnet (YIG) film for both normal and oblique incidence. It is found that the nonreciprocity effect of the MO material does not only result in a nonvanishing reflected shift at normal incidence, but also leads to a slab-thickness...
0
1
0
0
0
0
Effective mass of quasiparticles from thermodynamics
We discuss the potential advantages of calculating the effective mass of quasiparticles in the interacting electron liquid from the low-temperature free energy vis-a-vis the conventional approach, in which the effective mass is obtained from approximate calculations of the self-energy, or from a quantum Monte Carlo e...
0
1
0
0
0
0
Dynamics over Signed Networks
A signed network is a network with each link associated with a positive or negative sign. Models for nodes interacting over such signed networks, where two different types of interactions take place along the positive and negative links, respectively, arise from various biological, social, political, and economic sys...
1
0
0
0
0
0
On the Estimation of Entropy in the FastICA Algorithm
The fastICA algorithm is a popular dimension reduction technique used to reveal patterns in data. Here we show that the approximations used in fastICA can result in patterns not being successfully recognised. We demonstrate this problem using a two-dimensional example where a clear structure is immediately visible to...
0
0
0
1
0
0
Spatial-Temporal Imaging of Anisotropic Photocarrier Dynamics in Black Phosphorus
As an emerging single elemental layered material with a low symmetry in-plane crystal lattice, black phosphorus (BP) has attracted significant research interest owing to its unique electronic and optoelectronic properties, including its widely tunable bandgap, polarization dependent photoresponse and highly anisotrop...
0
1
0
0
0
0
The maximal order of iterated multiplicative functions
Following Wigert, a great number of authors including Ramanujan, Gronwall, Erdős, Ivić, Heppner, J. Knopfmacher, Nicolas, Schwarz, Wirsing, Freiman, Shiu et al. determined the maximal order of several multiplicative functions, generalizing Wigert's result \[\max_{n\leq x} \log d(n)= (\log 2+o(1))\frac{\log x}{\log \l...
0
0
1
0
0
0
Extending applicability of bimetric theory: chameleon bigravity
This article extends bimetric formulations of massive gravity to make the mass of the graviton to depend on its environment. This minimal extension offers a novel way to reconcile massive gravity with local tests of general relativity without invoking the Vainshtein mechanism. On cosmological scales, it is argued tha...
0
1
0
0
0
0
The Scaling Limit of High-Dimensional Online Independent Component Analysis
We analyze the dynamics of an online algorithm for independent component analysis in the high-dimensional scaling limit. As the ambient dimension tends to infinity, and with proper time scaling, we show that the time-varying joint empirical measure of the target feature vector and the estimates provided by the algori...
1
1
0
1
0
0
Direct characterization of a nonlinear photonic circuit's wave function with laser light
Integrated photonics is a leading platform for quantum technologies including nonclassical state generation \cite{Vergyris:2016-35975:SRP, Solntsev:2014-31007:PRX, Silverstone:2014-104:NPHOT, Solntsev:2016:RPH}, demonstration of quantum computational complexity \cite{Lamitral_NJP2016} and secure quantum communication...
0
1
0
0
0
0
The Accuracy of Confidence Intervals for Field Normalised Indicators
When comparing the average citation impact of research groups, universities and countries, field normalisation reduces the influence of discipline and time. Confidence intervals for these indicators can help with attempts to infer whether differences between sets of publications are due to chance factors. Although bo...
1
0
0
0
0
0
Generalized Theta Functions. I
Generalizations of classical theta functions are proposed that include any even number of analytic parameters for which conditions of quasi-periodicity are fulfilled and that are representations of extended Heisenberg group. Differential equations for generalized theta functions and finite non-unitary representations...
0
1
0
0
0
0
Constructing grids for molecular quantum dynamics using an autoencoder
A challenge for molecular quantum dynamics (QD) calculations is the curse of dimensionality with respect to the nuclear degrees of freedom. A common approach that works especially well for fast reactive processes is to reduce the dimensionality of the system to a few most relevant coordinates. Identifying these can b...
0
1
0
0
0
0
3D Pursuit-Evasion for AUVs
In this paper, we consider the problem of pursuit-evasion using multiple Autonomous Underwater Vehicles (AUVs) in a 3D water volume, with and without simple obstacles. Pursuit-evasion is a well studied topic in robotics, but the results are mostly set in 2D environments, using unlimited line of sight sensing. We prop...
1
0
0
0
0
0