title stringlengths 7 239 | abstract stringlengths 7 2.76k | cs int64 0 1 | phy int64 0 1 | math int64 0 1 | stat int64 0 1 | quantitative biology int64 0 1 | quantitative finance int64 0 1 |
|---|---|---|---|---|---|---|---|
The Urban Last Mile Problem: Autonomous Drone Delivery to Your Balcony | Drone delivery has been a hot topic in the industry in the past few years.
However, existing approaches either focus on rural areas or rely on centralized
drop-off locations from where the last mile delivery is performed. In this
paper we tackle the problem of autonomous last mile delivery in urban
environments using... | 1 | 0 | 0 | 0 | 0 | 0 |
Extragalactic VLBI surveys in the MeerKAT era | The past decade has seen significant advances in cm-wave VLBI extragalactic
observations due to a wide range of technical successes, including the increase
in processed field-of-view and bandwidth. The future inclusion of MeerKAT into
global VLBI networks would provide further enhancement, particularly the
dramatic s... | 0 | 1 | 0 | 0 | 0 | 0 |
Equicontinuity, orbit closures and invariant compact open sets for group actions on zero-dimensional spaces | Let $X$ be a locally compact zero-dimensional space, let $S$ be an
equicontinuous set of homeomorphisms such that $1 \in S = S^{-1}$, and suppose
that $\overline{Gx}$ is compact for each $x \in X$, where $G = \langle S
\rangle$. We show in this setting that a number of conditions are equivalent:
(a) $G$ acts minimall... | 0 | 0 | 1 | 0 | 0 | 0 |
The Ramsey property for Banach spaces, Choquet simplices, and their noncommutative analogs | We show that the Gurarij space $\mathbb{G}$ and its noncommutative analog
$\mathbb{NG}$ both have extremely amenable automorphism group. We also compute
the universal minimal flows of the automorphism groups of the Poulsen simplex
$\mathbb{P}$ and its noncommutative analogue $\mathbb{NP}$. The former is
$\mathbb{P}$ ... | 0 | 0 | 1 | 0 | 0 | 0 |
Evasion Attacks against Machine Learning at Test Time | In security-sensitive applications, the success of machine learning depends
on a thorough vetting of their resistance to adversarial data. In one
pertinent, well-motivated attack scenario, an adversary may attempt to evade a
deployed system at test time by carefully manipulating attack samples. In this
work, we prese... | 1 | 0 | 0 | 0 | 0 | 0 |
Evaluation of Lightweight Block Ciphers in Hardware Implementation: A Comprehensive Survey | The conventional cryptography solutions are ill-suited to strict memory, size
and power limitations of resource-constrained devices, so lightweight
cryptography solutions have been specifically developed for this type of
applications. In this domain of cryptography, the term lightweight never refers
to inadequately l... | 1 | 0 | 0 | 0 | 0 | 0 |
The Sample Complexity of Online One-Class Collaborative Filtering | We consider the online one-class collaborative filtering (CF) problem that
consists of recommending items to users over time in an online fashion based on
positive ratings only. This problem arises when users respond only occasionally
to a recommendation with a positive rating, and never with a negative one. We
study... | 1 | 0 | 0 | 1 | 0 | 0 |
Coherent long-distance displacement of individual electron spins | Controlling nanocircuits at the single electron spin level is a possible
route for large-scale quantum information processing. In this context,
individual electron spins have been identified as versatile quantum information
carriers to interconnect different nodes of a spin-based semiconductor quantum
circuit. Despit... | 0 | 1 | 0 | 0 | 0 | 0 |
Transparency and Explanation in Deep Reinforcement Learning Neural Networks | Autonomous AI systems will be entering human society in the near future to
provide services and work alongside humans. For those systems to be accepted
and trusted, the users should be able to understand the reasoning process of
the system, i.e. the system should be transparent. System transparency enables
humans to ... | 0 | 0 | 0 | 1 | 0 | 0 |
Refactoring Software Packages via Community Detection from Stability Point of View | As the complexity and size of software projects increases in real-world
environments, maintaining and creating maintainable and dependable code becomes
harder and more costly. Refactoring is considered as a method for enhancing the
internal structure of code for improving many software properties such as
maintainabil... | 1 | 0 | 0 | 0 | 0 | 0 |
Mechanism Design in Social Networks | This paper studies an auction design problem for a seller to sell a commodity
in a social network, where each individual (the seller or a buyer) can only
communicate with her neighbors. The challenge to the seller is to design a
mechanism to incentivize the buyers, who are aware of the auction, to further
propagate t... | 1 | 0 | 0 | 0 | 0 | 0 |
Prototype Matching Networks for Large-Scale Multi-label Genomic Sequence Classification | One of the fundamental tasks in understanding genomics is the problem of
predicting Transcription Factor Binding Sites (TFBSs). With more than hundreds
of Transcription Factors (TFs) as labels, genomic-sequence based TFBS
prediction is a challenging multi-label classification task. There are two
major biological mech... | 1 | 0 | 0 | 1 | 0 | 0 |
Quantum Multicriticality near the Dirac-Semimetal to Band-Insulator Critical Point in Two Dimensions: A Controlled Ascent from One Dimension | We compute the effects of generic short-range interactions on gapless
electrons residing at the quantum critical point separating a two-dimensional
Dirac semimetal (DSM) and a symmetry-preserving band insulator (BI). The
electronic dispersion at this critical point is anisotropic ($E_{\mathbf k}=\pm
\sqrt{v^2 k^2_x +... | 0 | 1 | 0 | 0 | 0 | 0 |
Wider frequency domain for negative refraction index in a quantized composite right-left handed transmission line | The refraction index of the quantized lossy composite right-left handed
transmission line (CRLH-TL) is deduced in the thermal coherence state. The
results show that the negative refraction index (herein the left-handedness)
can be implemented by the electric circuit dissipative factors(i.e., the
resistances \(R\) and... | 0 | 1 | 0 | 0 | 0 | 0 |
Model Averaging and its Use in Economics | The method of model averaging has become an important tool to deal with model
uncertainty, for example in situations where a large amount of different
theories exist, as are common in economics. Model averaging is a natural and
formal response to model uncertainty in a Bayesian framework, and most of the
paper deals ... | 0 | 0 | 0 | 1 | 0 | 0 |
Dropout Feature Ranking for Deep Learning Models | Deep neural networks (DNNs) achieve state-of-the-art results in a variety of
domains. Unfortunately, DNNs are notorious for their non-interpretability, and
thus limit their applicability in hypothesis-driven domains such as biology and
healthcare. Moreover, in the resource-constraint setting, it is critical to
design... | 1 | 0 | 0 | 1 | 0 | 0 |
Per-instance Differential Privacy | We consider a refinement of differential privacy --- per instance
differential privacy (pDP), which captures the privacy of a specific individual
with respect to a fixed data set. We show that this is a strict generalization
of the standard DP and inherits all its desirable properties, e.g.,
composition, invariance t... | 1 | 0 | 0 | 1 | 0 | 0 |
Dual quadratic differentials and entire minimal graphs in Heisenberg space | We define holomorphic quadratic differentials for spacelike surfaces with
constant mean curvature in the Lorentzian homogeneous spaces
$\mathbb{L}(\kappa,\tau)$ with isometry group of dimension 4, which are dual to
the Abresch-Rosenberg differentials in the Riemannian counterparts
$\mathbb{E}(\kappa,\tau)$, and obtai... | 0 | 0 | 1 | 0 | 0 | 0 |
Adaptive Modular Exponentiation Methods v.s. Python's Power Function | In this paper we use Python to implement two efficient modular exponentiation
methods: the adaptive m-ary method and the adaptive sliding-window method of
window size k, where both m's are adaptively chosen based on the length of
exponent. We also conduct the benchmark for both methods. Evaluation results
show that c... | 1 | 0 | 0 | 0 | 0 | 0 |
Bayesian radiocarbon modelling for beginners | Due to freely available, tailored software, Bayesian statistics is fast
becoming the dominant paradigm in archaeological chronology construction. Such
software provides users with powerful tools for Bayesian inference for
chronological models with little need to undertake formal study of statistical
modelling or comp... | 0 | 0 | 0 | 1 | 0 | 0 |
Suspended Load Path Tracking Control Using a Tilt-rotor UAV Based on Zonotopic State Estimation | This work addresses the problem of path tracking control of a suspended load
using a tilt-rotor UAV. The main challenge in controlling this kind of system
arises from the dynamic behavior imposed by the load, which is usually coupled
to the UAV by means of a rope, adding unactuated degrees of freedom to the
whole sys... | 1 | 0 | 0 | 0 | 0 | 0 |
Decay Estimates and Strichartz Estimates of Fourth-order Schrödinger Operator | We study time decay estimates of the fourth-order Schrödinger operator
$H=(-\Delta)^{2}+V(x)$ in $\mathbb{R}^{d}$ for $d=3$ and $d\geq5$. We analyze
the low energy and high energy behaviour of resolvent $R(H; z)$, and then
derive the Jensen-Kato dispersion decay estimate and local decay estimate for
$e^{-itH}P_{ac}$ ... | 0 | 0 | 1 | 0 | 0 | 0 |
On the Uniqueness of FROG Methods | The problem of recovering a signal from its power spectrum, called phase
retrieval, arises in many scientific fields. One of many examples is
ultra-short laser pulse characterization in which the electromagnetic field is
oscillating with ~10^15 Hz and phase information cannot be measured directly
due to limitations o... | 1 | 0 | 1 | 0 | 0 | 0 |
Riesz sequences and generalized arithmetic progressions | The purpose of this note is to verify that the results attained in [6] admit
an extension to the multidimensional setting. Namely, for subsets of the two
dimensional torus we find the sharp growth rate of the step(s) of a generalized
arithmetic progression in terms of its size which may be found in an
exponential sys... | 0 | 0 | 1 | 0 | 0 | 0 |
Positive Scalar Curvature and Minimal Hypersurface Singularities | In this paper we develop methods to extend the minimal hypersurface approach
to positive scalar curvature problems to all dimensions. This includes a proof
of the positive mass theorem in all dimensions without a spin assumption. It
also includes statements about the structure of compact manifolds of positive
scalar ... | 0 | 0 | 1 | 0 | 0 | 0 |
Moving Beyond Sub-Gaussianity in High-Dimensional Statistics: Applications in Covariance Estimation and Linear Regression | Concentration inequalities form an essential toolkit in the study of
high-dimensional statistical methods. Most of the relevant statistics
literature is based on the assumptions of sub-Gaussian/sub-exponential random
vectors. In this paper, we bring together various probability inequalities for
sums of independent ra... | 0 | 0 | 0 | 1 | 0 | 0 |
The additive groups of $\mathbb{Z}$ and $\mathbb{Q}$ with predicates for being square-free | We consider the four structures $(\mathbb{Z}; \mathrm{Sqf}^\mathbb{Z})$,
$(\mathbb{Z}; <, \mathrm{Sqf}^\mathbb{Z})$, $(\mathbb{Q};
\mathrm{Sqf}^\mathbb{Q})$, and $(\mathbb{Q}; <, \mathrm{Sqf}^\mathbb{Q})$ where
$\mathbb{Z}$ is the additive group of integers, $\mathrm{Sqf}^\mathbb{Z}$ is
the set of $a \in \mathbb{Z}$ ... | 0 | 0 | 1 | 0 | 0 | 0 |
Particle-hole symmetry of charge excitation spectra in the paramagnetic phase of the Hubbard model | The Kotliar and Ruckenstein slave-boson representation of the Hubbard model
allows to obtain an approximation of the charge dynamical response function
resulting from the Gaussian fluctuations around the paramagnetic saddle-point
in analytical form. Numerical evaluation in the thermodynamical limit yields
charge exci... | 0 | 1 | 0 | 0 | 0 | 0 |
OLÉ: Orthogonal Low-rank Embedding, A Plug and Play Geometric Loss for Deep Learning | Deep neural networks trained using a softmax layer at the top and the
cross-entropy loss are ubiquitous tools for image classification. Yet, this
does not naturally enforce intra-class similarity nor inter-class margin of the
learned deep representations. To simultaneously achieve these two goals,
different solutions... | 1 | 0 | 0 | 1 | 0 | 0 |
Decidability problems in automaton semigroups | We consider decidability problems in self-similar semigroups, and in
particular in semigroups of automatic transformations of $X^*$. We describe
algorithms answering the word problem, and bound its complexity under some
additional assumptions. We give a partial algorithm that decides in a group
generated by an automa... | 1 | 0 | 1 | 0 | 0 | 0 |
Migration of a Carbon Adatom on a Charged Single-Walled Carbon Nanotube | We find that negative charges on an armchair single-walled carbon nanotube
(SWCNT) can significantly enhance the migration of a carbon adatom on the
external surfaces of SWCNTs, along the direction of the tube axis. Nanotube
charging results in stronger binding of adatoms to SWCNTs and consequent longer
lifetimes of ... | 0 | 1 | 0 | 0 | 0 | 0 |
Function Norms and Regularization in Deep Networks | Deep neural networks (DNNs) have become increasingly important due to their
excellent empirical performance on a wide range of problems. However,
regularization is generally achieved by indirect means, largely due to the
complex set of functions defined by a network and the difficulty in measuring
function complexity... | 1 | 0 | 0 | 1 | 0 | 0 |
Efficiently Clustering Very Large Attributed Graphs | Attributed graphs model real networks by enriching their nodes with
attributes accounting for properties. Several techniques have been proposed for
partitioning these graphs into clusters that are homogeneous with respect to
both semantic attributes and to the structure of the graph. However, time and
space complexit... | 1 | 1 | 0 | 0 | 0 | 0 |
Thermochemistry and vertical mixing in the tropospheres of Uranus and Neptune: How convection inhibition can affect the derivation of deep oxygen abundances | Thermochemical models have been used in the past to constrain the deep oxygen
abundance in the gas and ice giant planets from tropospheric CO spectroscopic
measurements. Knowing the oxygen abundance of these planets is a key to better
understand their formation. These models have widely used dry and/or moist
adiabats... | 0 | 1 | 0 | 0 | 0 | 0 |
Attentive cross-modal paratope prediction | Antibodies are a critical part of the immune system, having the function of
directly neutralising or tagging undesirable objects (the antigens) for future
destruction. Being able to predict which amino acids belong to the paratope,
the region on the antibody which binds to the antigen, can facilitate antibody
design ... | 0 | 0 | 0 | 1 | 1 | 0 |
Tomonaga-Luttinger spin liquid in the spin-1/2 inequilateral diamond-chain compound K$_3$Cu$_3$AlO$_2$(SO$_4$)$_4$ | K$_3$Cu$_3$AlO$_2$(SO$_4$)$_4$ is a highly one-dimensional spin-1/2
inequilateral diamond-chain antiferromagnet. Spinon continuum and spin-singlet
dimer excitations are observed in the inelastic neutron scattering spectra,
which is in excellent agreement with a theoretical prediction: a dimer-monomer
composite struct... | 0 | 1 | 0 | 0 | 0 | 0 |
Weak Convergence of Stationary Empirical Processes | We offer an umbrella type result which extends weak convergence of the
classical empirical process on the line to that of more general processes
indexed by functions of bounded variation. This extension is not contingent on
the type of dependence of the underlying sequence of random variables. As a
consequence we est... | 0 | 0 | 1 | 1 | 0 | 0 |
Syntax Error Recovery in Parsing Expression Grammars | Parsing Expression Grammars (PEGs) are a formalism used to describe top-down
parsers with backtracking. As PEGs do not provide a good error recovery
mechanism, PEG-based parsers usually do not recover from syntax errors in the
input, or recover from syntax errors using ad-hoc, implementation-specific
features. The la... | 1 | 0 | 0 | 0 | 0 | 0 |
Collaborative Pressure Ulcer Prevention: An Automated Skin Damage and Pressure Ulcer Assessment Tool for Nursing Professionals, Patients, Family Members and Carers | This paper describes the Pressure Ulcers Online Website, which is a first
step solution towards a new and innovative platform for helping people to
detect, understand and manage pressure ulcers. It outlines the reasons why the
project has been developed and provides a central point of contact for pressure
ulcer analy... | 0 | 0 | 0 | 1 | 0 | 0 |
Brain networks reveal the effects of antipsychotic drugs on schizophrenia patients and controls | The study of brain networks, including derived from functional neuroimaging
data, attracts broad interest and represents a rapidly growing
interdisciplinary field. Comparing networks of healthy volunteers with those of
patients can potentially offer new, quantitative diagnostic methods, and a
framework for better und... | 0 | 0 | 0 | 0 | 1 | 0 |
New approach to Minkowski fractional inequalities using generalized k-fractional integral operator | In this paper, we obtain new results related to Minkowski fractional integral
inequality using generalized k-fractional integral operator which is in terms
of the Gauss hypergeometric function.
| 0 | 0 | 1 | 0 | 0 | 0 |
Segmentation of nearly isotropic overlapped tracks in photomicrographs using successive erosions as watershed markers | The major challenges of automatic track counting are distinguishing tracks
and material defects, identifying small tracks and defects of similar size, and
detecting overlapping tracks. Here we address the latter issue using WUSEM, an
algorithm which combines the watershed transform, morphological erosions and
labelin... | 1 | 1 | 0 | 0 | 0 | 0 |
A Bayesian Hyperprior Approach for Joint Image Denoising and Interpolation, with an Application to HDR Imaging | Recently, impressive denoising results have been achieved by Bayesian
approaches which assume Gaussian models for the image patches. This improvement
in performance can be attributed to the use of per-patch models. Unfortunately
such an approach is particularly unstable for most inverse problems beyond
denoising. In ... | 1 | 0 | 0 | 1 | 0 | 0 |
Development and evaluation of a deep learning model for protein-ligand binding affinity prediction | Structure based ligand discovery is one of the most successful approaches for
augmenting the drug discovery process. Currently, there is a notable shift
towards machine learning (ML) methodologies to aid such procedures. Deep
learning has recently gained considerable attention as it allows the model to
"learn" to ext... | 1 | 0 | 0 | 1 | 0 | 0 |
The Bayesian update: variational formulations and gradient flows | The Bayesian update can be viewed as a variational problem by characterizing
the posterior as the minimizer of a functional. The variational viewpoint is
far from new and is at the heart of popular methods for posterior
approximation. However, some of its consequences seem largely unexplored. We
focus on the followin... | 0 | 0 | 1 | 1 | 0 | 0 |
Magnetic diode at $T$ = 300 K | We report the finding of unidirectional electronic properties, analogous to a
semiconductor diode, in two-dimensional artificial permalloy honeycomb lattice
of ultra-small bond, with a typical length of ~ 12 nm. The unidirectional
transport behavior, characterized by the asymmetric colossal enhancement in
differentia... | 0 | 1 | 0 | 0 | 0 | 0 |
Efficient mixture model for clustering of sparse high dimensional binary data | In this paper we propose a mixture model, SparseMix, for clustering of sparse
high dimensional binary data, which connects model-based with centroid-based
clustering. Every group is described by a representative and a probability
distribution modeling dispersion from this representative. In contrast to
classical mixt... | 1 | 0 | 0 | 1 | 0 | 0 |
Normalized Total Gradient: A New Measure for Multispectral Image Registration | Image registration is a fundamental issue in multispectral image processing.
In filter wheel based multispectral imaging systems, the non-coplanar placement
of the filters always causes the misalignment of multiple channel images. The
selective characteristic of spectral response in multispectral imaging raises
two c... | 1 | 0 | 0 | 0 | 0 | 0 |
Graphical-model based estimation and inference for differential privacy | Many privacy mechanisms reveal high-level information about a data
distribution through noisy measurements. It is common to use this information
to estimate the answers to new queries. In this work, we provide an approach to
solve this estimation problem efficiently using graphical models, which is
particularly effec... | 1 | 0 | 0 | 1 | 0 | 0 |
Hierarchical Kriging for multi-fidelity aero-servo-elastic simulators - Application to extreme loads on wind turbines | In the present work, we consider multi-fidelity surrogate modelling to fuse
the output of multiple aero-servo-elastic computer simulators of varying
complexity. In many instances, predictions from multiple simulators for the
same quantity of interest on a wind turbine are available. In this type of
situation, there i... | 0 | 0 | 0 | 1 | 0 | 0 |
Unifying PAC and Regret: Uniform PAC Bounds for Episodic Reinforcement Learning | Statistical performance bounds for reinforcement learning (RL) algorithms can
be critical for high-stakes applications like healthcare. This paper introduces
a new framework for theoretically measuring the performance of such algorithms
called Uniform-PAC, which is a strengthening of the classical Probably
Approximat... | 1 | 0 | 0 | 1 | 0 | 0 |
Alternative Semantic Representations for Zero-Shot Human Action Recognition | A proper semantic representation for encoding side information is key to the
success of zero-shot learning. In this paper, we explore two alternative
semantic representations especially for zero-shot human action recognition:
textual descriptions of human actions and deep features extracted from still
images relevant... | 1 | 0 | 0 | 0 | 0 | 0 |
Being Corrupt Requires Being Clever, But Detecting Corruption Doesn't | We consider a variation of the problem of corruption detection on networks
posed by Alon, Mossel, and Pemantle '15. In this model, each vertex of a graph
can be either truthful or corrupt. Each vertex reports about the types
(truthful or corrupt) of all its neighbors to a central agency, where truthful
nodes report t... | 1 | 0 | 0 | 0 | 0 | 0 |
Computing the homology of basic semialgebraic sets in weak exponential time | We describe and analyze an algorithm for computing the homology (Betti
numbers and torsion coefficients) of basic semialgebraic sets which works in
weak exponential time. That is, out of a set of exponentially small measure in
the space of data the cost of the algorithm is exponential in the size of the
data. All alg... | 1 | 0 | 1 | 0 | 0 | 0 |
Deterministic and Randomized Diffusion based Iterative Generalized Hard Thresholding (DiFIGHT) for Distributed Sparse Signal Recovery | In this paper, we propose a distributed iterated hard thresholding algorithm
termed DiFIGHT over a network that is built on the diffusion mechanism and also
propose a modification of the proposed algorithm termed MoDiFIGHT, that has low
complexity in terms of communication in the network. We additionally propose
four... | 1 | 0 | 0 | 0 | 0 | 0 |
Iterated doubles of the Joker and their realisability | Let $\mathcal{A}(1)^*$ be the subHopf algebra of the mod~$2$ Steenrod algebra
$\mathcal{A}^*$ generated by $\mathrm{Sq}^1$ and $\mathrm{Sq}^2$. The
\emph{Joker} is the cyclic $\mathcal{A}(1)^*$-module
$\mathcal{A}(1)^*/\mathcal{A}(1)^*\{\mathrm{Sq}^3\}$ which plays a special
rôle in the study of $\mathcal{A}(1)^*$-mo... | 0 | 0 | 1 | 0 | 0 | 0 |
On subtrees of the representation tree in rational base numeration systems | Every rational number p/q defines a rational base numeration system in which
every integer has a unique finite representation, up to leading zeroes. This
work is a contribution to the study of the set of the representations of
integers. This prefix-closed subset of the free monoid is naturally represented
as a highly... | 1 | 0 | 0 | 0 | 0 | 0 |
A Practical Method for Solving Contextual Bandit Problems Using Decision Trees | Many efficient algorithms with strong theoretical guarantees have been
proposed for the contextual multi-armed bandit problem. However, applying these
algorithms in practice can be difficult because they require domain expertise
to build appropriate features and to tune their parameters. We propose a new
method for t... | 1 | 0 | 0 | 1 | 0 | 0 |
Trainable back-propagated functional transfer matrices | Connections between nodes of fully connected neural networks are usually
represented by weight matrices. In this article, functional transfer matrices
are introduced as alternatives to the weight matrices: Instead of using real
weights, a functional transfer matrix uses real functions with trainable
parameters to rep... | 1 | 0 | 0 | 1 | 0 | 0 |
Multiple Exciton Generation in Chiral Carbon Nanotubes: Density Functional Theory Based Computation | We use Boltzmann transport equation (BE) to study time evolution of a
photo-excited state in a nanoparticle including phonon-mediated exciton
relaxation and the multiple exciton generation (MEG) processes, such as
exciton-to-biexciton multiplication and biexciton-to-exciton recombination. BE
collision integrals are c... | 0 | 1 | 0 | 0 | 0 | 0 |
Turaev-Viro invariants, colored Jones polynomials and volume | We obtain a formula for the Turaev-Viro invariants of a link complement in
terms of values of the colored Jones polynomial of the link. As an application
we give the first examples for which the volume conjecture of Chen and the
third named author\,\cite{Chen-Yang} is verified. Namely, we show that the
asymptotics of... | 0 | 0 | 1 | 0 | 0 | 0 |
Credit card fraud detection through parenclitic network analysis | The detection of frauds in credit card transactions is a major topic in
financial research, of profound economic implications. While this has hitherto
been tackled through data analysis techniques, the resemblances between this
and other problems, like the design of recommendation systems and of diagnostic
/ prognost... | 1 | 1 | 0 | 0 | 0 | 0 |
On the Consistency of Graph-based Bayesian Learning and the Scalability of Sampling Algorithms | A popular approach to semi-supervised learning proceeds by endowing the input
data with a graph structure in order to extract geometric information and
incorporate it into a Bayesian framework. We introduce new theory that gives
appropriate scalings of graph parameters that provably lead to a well-defined
limiting po... | 1 | 0 | 0 | 1 | 0 | 0 |
Bayesian Optimization for Parameter Tuning of the XOR Neural Network | When applying Machine Learning techniques to problems, one must select model
parameters to ensure that the system converges but also does not become stuck
at the objective function's local minimum. Tuning these parameters becomes a
non-trivial task for large models and it is not always apparent if the user has
found ... | 1 | 0 | 0 | 1 | 0 | 0 |
A differential model for growing sandpiles on networks | We consider a system of differential equations of Monge-Kantorovich type
which describes the equilibrium configurations of granular material poured by a
constant source on a network. Relying on the definition of viscosity solution
for Hamilton-Jacobi equations on networks, recently introduced by P.-L. Lions
and P. E.... | 0 | 0 | 1 | 0 | 0 | 0 |
DCT-like Transform for Image Compression Requires 14 Additions Only | A low-complexity 8-point orthogonal approximate DCT is introduced. The
proposed transform requires no multiplications or bit-shift operations. The
derived fast algorithm requires only 14 additions, less than any existing DCT
approximation. Moreover, in several image compression scenarios, the proposed
transform could... | 1 | 0 | 0 | 1 | 0 | 0 |
On realizability of sign patterns by real polynomials | The classical Descartes' rule of signs limits the number of positive roots of
a real polynomial in one variable by the number of sign changes in the sequence
of its coefficients. One can ask the question which pairs of nonnegative
integers $(p,n)$, chosen in accordance with this rule and with some other
natural condi... | 0 | 0 | 1 | 0 | 0 | 0 |
HAlign-II: efficient ultra-large multiple sequence alignment and phylogenetic tree reconstruction with distributed and parallel computing | Multiple sequence alignment (MSA) plays a key role in biological sequence
analyses, especially in phylogenetic tree construction. Extreme increase in
next-generation sequencing results in shortage of efficient ultra-large
biological sequence alignment approaches for coping with different sequence
types. Distributed a... | 1 | 0 | 0 | 0 | 0 | 0 |
Search for Evergreens in Science: A Functional Data Analysis | Evergreens in science are papers that display a continual rise in annual
citations without decline, at least within a sufficiently long time period.
Aiming to better understand evergreens in particular and patterns of citation
trajectory in general, this paper develops a functional data analysis method to
cluster cit... | 1 | 0 | 0 | 1 | 0 | 0 |
Tied Hidden Factors in Neural Networks for End-to-End Speaker Recognition | In this paper we propose a method to model speaker and session variability
and able to generate likelihood ratios using neural networks in an end-to-end
phrase dependent speaker verification system. As in Joint Factor Analysis, the
model uses tied hidden variables to model speaker and session variability and a
MAP ad... | 1 | 0 | 0 | 0 | 0 | 0 |
An Optimal Control Formulation of Pulse-Based Control Using Koopman Operator | In many applications, and in systems/synthetic biology, in particular, it is
desirable to compute control policies that force the trajectory of a bistable
system from one equilibrium (the initial point) to another equilibrium (the
target point), or in other words to solve the switching problem. It was
recently shown ... | 1 | 0 | 1 | 0 | 0 | 0 |
A Converse to Banach's Fixed Point Theorem and its CLS Completeness | Banach's fixed point theorem for contraction maps has been widely used to
analyze the convergence of iterative methods in non-convex problems. It is a
common experience, however, that iterative maps fail to be globally contracting
under the natural metric in their domain, making the applicability of Banach's
theorem ... | 1 | 0 | 1 | 1 | 0 | 0 |
Improved Discrete RRT for Coordinated Multi-robot Planning | This paper addresses the problem of coordination of a fleet of mobile robots
- the problem of finding an optimal set of collision-free trajectories for
individual robots in the fleet. Many approaches have been introduced during the
last decades, but a minority of them is practically applicable, i.e. fast,
producing n... | 1 | 0 | 0 | 0 | 0 | 0 |
A note on the stratification by automorphisms of smooth plane curves of genus 6 | In this note, we give a so-called representative classification for the
strata by automorphism group of smooth $\bar{k}$-plane curves of genus $6$,
where $\bar{k}$ is a fixed separable closure of a field $k$ of characteristic
$p = 0$ or $p > 13$. We start with a classification already obtained by the
first author and... | 0 | 0 | 1 | 0 | 0 | 0 |
Relativistic verifiable delegation of quantum computation | The importance of being able to verify quantum computation delegated to
remote servers increases with recent development of quantum technologies. In
some of the proposed protocols for this task, a client delegates her quantum
computation to non-communicating servers. The fact that the servers do not
communicate is no... | 1 | 0 | 0 | 0 | 0 | 0 |
Finiteness of étale fundamental groups by reduction modulo $p$ | We introduce a spreading out technique to deduce finiteness results for
étale fundamental groups of complex varieties by characteristic $p$ methods,
and apply this to recover a finiteness result proven recently for local
fundamental groups in characteristic $0$ using birational geometry.
| 0 | 0 | 1 | 0 | 0 | 0 |
Morphological Error Detection in 3D Segmentations | Deep learning algorithms for connectomics rely upon localized classification,
rather than overall morphology. This leads to a high incidence of erroneously
merged objects. Humans, by contrast, can easily detect such errors by acquiring
intuition for the correct morphology of objects. Biological neurons have
complicat... | 1 | 0 | 0 | 1 | 0 | 0 |
Structural Feature Selection for Event Logs | We consider the problem of classifying business process instances based on
structural features derived from event logs. The main motivation is to provide
machine learning based techniques with quick response times for interactive
computer assisted root cause analysis. In particular, we create structural
features from... | 1 | 0 | 0 | 1 | 0 | 0 |
Counting $G$-Extensions by Discriminant | The problem of analyzing the number of number field extensions $L/K$ with
bounded (relative) discriminant has been the subject of renewed interest in
recent years, with significant advances made by Schmidt, Ellenberg-Venkatesh,
Bhargava, Bhargava-Shankar-Wang, and others. In this paper, we use the geometry
of numbers... | 0 | 0 | 1 | 0 | 0 | 0 |
Robust and Efficient Transfer Learning with Hidden-Parameter Markov Decision Processes | We introduce a new formulation of the Hidden Parameter Markov Decision
Process (HiP-MDP), a framework for modeling families of related tasks using
low-dimensional latent embeddings. Our new framework correctly models the joint
uncertainty in the latent parameters and the state space. We also replace the
original Gaus... | 1 | 0 | 0 | 1 | 0 | 0 |
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling | Sampling from the lattice Gaussian distribution plays an important role in
various research fields. In this paper, the Markov chain Monte Carlo
(MCMC)-based sampling technique is advanced in several fronts. Firstly, the
spectral gap for the independent Metropolis-Hastings-Klein (MHK) algorithm is
derived, which is th... | 1 | 0 | 0 | 0 | 0 | 0 |
$S$-Leaping: An adaptive, accelerated stochastic simulation algorithm, bridging $τ$-leaping and $R$-leaping | We propose the $S$-leaping algorithm for the acceleration of Gillespie's
stochastic simulation algorithm that combines the advantages of the two main
accelerated methods; the $\tau$-leaping and $R$-leaping algorithms. These
algorithms are known to be efficient under different conditions; the
$\tau$-leaping is efficie... | 0 | 0 | 0 | 0 | 1 | 0 |
Diclofenac sodium ion exchange resin complex loaded melt cast films for sustained release ocular delivery | The goal of the present study is to develop polymeric matrix films loaded
with a combination of free diclofenac sodium (DFSfree) and DFS:Ion exchange
resin complexes (DFS:IR) for immediate and sustained release profiles,
respectively. Effect of ratio of DFS and IR on the DFS:IR complexation
efficiency was studied usi... | 0 | 1 | 0 | 0 | 0 | 0 |
Method of precision increase by averaging with application to numerical differentiation | If several independent algorithms for a computer-calculated quantity exist,
then one can expect their results (which differ because of numerical errors) to
follow approximately Gaussian distribution. The mean of this distribution,
interpreted as the value of the quantity of interest, can be determined with
better pre... | 0 | 0 | 1 | 0 | 0 | 0 |
On-line Building Energy Optimization using Deep Reinforcement Learning | Unprecedented high volumes of data are becoming available with the growth of
the advanced metering infrastructure. These are expected to benefit planning
and operation of the future power system, and to help the customers transition
from a passive to an active role. In this paper, we explore for the first time
in the... | 1 | 0 | 1 | 0 | 0 | 0 |
A KL-LUCB Bandit Algorithm for Large-Scale Crowdsourcing | This paper focuses on best-arm identification in multi-armed bandits with
bounded rewards. We develop an algorithm that is a fusion of lil-UCB and
KL-LUCB, offering the best qualities of the two algorithms in one method. This
is achieved by proving a novel anytime confidence bound for the mean of bounded
distribution... | 0 | 0 | 1 | 1 | 0 | 0 |
Refractive index tomography with structured illumination | This work introduces a novel reinterpretation of structured illumination (SI)
microscopy for coherent imaging that allows three-dimensional imaging of
complex refractive index (RI). To do so, we show that coherent SI is
mathematically equivalent to a superposition of angled illuminations. It
follows that raw acquisit... | 0 | 1 | 0 | 0 | 0 | 0 |
Foreign English Accent Adjustment by Learning Phonetic Patterns | State-of-the-art automatic speech recognition (ASR) systems struggle with the
lack of data for rare accents. For sufficiently large datasets, neural engines
tend to outshine statistical models in most natural language processing
problems. However, a speech accent remains a challenge for both approaches.
Phonologists ... | 1 | 0 | 0 | 1 | 0 | 0 |
The geometry of hypothesis testing over convex cones: Generalized likelihood tests and minimax radii | We consider a compound testing problem within the Gaussian sequence model in
which the null and alternative are specified by a pair of closed, convex cones.
Such cone testing problem arise in various applications, including detection of
treatment effects, trend detection in econometrics, signal detection in radar
pro... | 1 | 0 | 1 | 1 | 0 | 0 |
Permutation methods for factor analysis and PCA | Researchers often have datasets measuring features $x_{ij}$ of samples, such
as test scores of students. In factor analysis and PCA, these features are
thought to be influenced by unobserved factors, such as skills. Can we
determine how many components affect the data? This is an important problem,
because it has a l... | 0 | 0 | 1 | 1 | 0 | 0 |
Adapting the CVA model to Leland's framework | We consider the framework proposed by Burgard and Kjaer (2011) that derives
the PDE which governs the price of an option including bilateral counterparty
risk and funding. We extend this work by relaxing the assumption of absence of
transaction costs in the hedging portfolio by proposing a cost proportional to
the am... | 0 | 0 | 0 | 0 | 0 | 1 |
Blue Sky Ideas in Artificial Intelligence Education from the EAAI 2017 New and Future AI Educator Program | The 7th Symposium on Educational Advances in Artificial Intelligence
(EAAI'17, co-chaired by Sven Koenig and Eric Eaton) launched the EAAI New and
Future AI Educator Program to support the training of early-career university
faculty, secondary school faculty, and future educators (PhD candidates or
postdocs who inten... | 1 | 0 | 0 | 0 | 0 | 0 |
Network Analysis of Particles and Grains | The arrangements of particles and forces in granular materials have a complex
organization on multiple spatial scales that ranges from local structures to
mesoscale and system-wide ones. This multiscale organization can affect how a
material responds or reconfigures when exposed to external perturbations or
loading. ... | 0 | 1 | 1 | 0 | 0 | 0 |
Perfect Sequences and Arrays over the Unit Quaternions | We introduce several new constructions for perfect periodic autocorrelation
sequences and arrays over the unit quaternions. This paper uses both
mathematical proofs and com- puter experiments to prove the (bounded) array
constructions have perfect periodic auto- correlation. Furthermore, the first
sequence constructi... | 1 | 0 | 1 | 0 | 0 | 0 |
Schwarzian conditions for linear differential operators with selected differential Galois groups (unabridged version) | We show that non-linear Schwarzian differential equations emerging from
covariance symmetry conditions imposed on linear differential operators with
hypergeometric function solutions, can be generalized to arbitrary order linear
differential operators with polynomial coefficients having selected
differential Galois g... | 0 | 1 | 0 | 0 | 0 | 0 |
Robust Bayesian Filtering and Smoothing Using Student's t Distribution | State estimation in heavy-tailed process and measurement noise is an
important challenge that must be addressed in, e.g., tracking scenarios with
agile targets and outlier-corrupted measurements. The performance of the Kalman
filter (KF) can deteriorate in such applications because of the close relation
to the Gaussi... | 1 | 0 | 0 | 1 | 0 | 0 |
Multi-pass configuration for Improved Squeezed Vacuum Generation in Hot Rb Vapor | We study a squeezed vacuum field generated in hot Rb vapor via the
polarization self-rotation effect. Our previous experiments showed that the
amount of observed squeezing may be limited by the contamination of the
squeezed vacuum output with higher-order spatial modes, also generated inside
the cell. Here, we demons... | 0 | 1 | 0 | 0 | 0 | 0 |
Improved Computation of Involutive Bases | In this paper, we describe improved algorithms to compute Janet and Pommaret
bases. To this end, based on the method proposed by Moller et al., we present a
more efficient variant of Gerdt's algorithm (than the algorithm presented by
Gerdt-Hashemi-M.Alizadeh) to compute minimal involutive bases. Further, by
using the... | 1 | 0 | 1 | 0 | 0 | 0 |
Dynamic Stochastic Approximation for Multi-stage Stochastic Optimization | In this paper, we consider multi-stage stochastic optimization problems with
convex objectives and conic constraints at each stage. We present a new
stochastic first-order method, namely the dynamic stochastic approximation
(DSA) algorithm, for solving these types of stochastic optimization problems.
We show that DSA... | 1 | 0 | 1 | 1 | 0 | 0 |
Stability Analysis of Piecewise Affine Systems with Multi-model Model Predictive Control | Constrained model predictive control (MPC) is a widely used control strategy,
which employs moving horizon-based on-line optimisation to compute the optimum
path of the manipulated variables. Nonlinear MPC can utilize detailed models
but it is computationally expensive; on the other hand linear MPC may not be
adequat... | 1 | 0 | 0 | 0 | 0 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.