title stringlengths 7 239 | abstract stringlengths 7 2.76k | cs int64 0 1 | phy int64 0 1 | math int64 0 1 | stat int64 0 1 | quantitative biology int64 0 1 | quantitative finance int64 0 1 |
|---|---|---|---|---|---|---|---|
Incorporation of prior knowledge of the signal behavior into the reconstruction to accelerate the acquisition of MR diffusion data | Diffusion MRI measurements using hyperpolarized gases are generally acquired
during patient breath hold, which yields a compromise between achievable image
resolution, lung coverage and number of b-values. In this work, we propose a
novel method that accelerates the acquisition of MR diffusion data by
undersampling i... | 1 | 1 | 0 | 0 | 0 | 0 |
Rabi noise spectroscopy of individual two-level tunneling defects | Understanding the nature of two-level tunneling defects is important for
minimizing their disruptive effects in various nano-devices. By exploiting the
resonant coupling of these defects to a superconducting qubit, one can probe
and coherently manipulate them individually. In this work we utilize a phase
qubit to ind... | 0 | 1 | 0 | 0 | 0 | 0 |
Learning rate adaptation for federated and differentially private learning | We propose an algorithm for the adaptation of the learning rate for
stochastic gradient descent (SGD) that avoids the need for validation set use.
The idea for the adaptiveness comes from the technique of extrapolation: to get
an estimate for the error against the gradient flow which underlies SGD, we
compare the res... | 0 | 0 | 0 | 1 | 0 | 0 |
Holomorphic Hermite polynomials in two variables | Generalizations of the Hermite polynomials to many variables and/or to the
complex domain have been located in mathematical and physical literature for
some decades. Polynomials traditionally called complex Hermite ones are mostly
understood as polynomials in $z$ and $\bar{z}$ which in fact makes them
polynomials in ... | 0 | 0 | 1 | 0 | 0 | 0 |
Equilibria, information and frustration in heterogeneous network games with conflicting preferences | Interactions between people are the basis on which the structure of our
society arises as a complex system and, at the same time, are the starting
point of any physical description of it. In the last few years, much
theoretical research has addressed this issue by combining the physics of
complex networks with a desc... | 1 | 1 | 0 | 0 | 0 | 0 |
Scalable Generalized Dynamic Topic Models | Dynamic topic models (DTMs) model the evolution of prevalent themes in
literature, online media, and other forms of text over time. DTMs assume that
word co-occurrence statistics change continuously and therefore impose
continuous stochastic process priors on their model parameters. These dynamical
priors make infere... | 0 | 0 | 0 | 1 | 0 | 0 |
Session Types for Orchestrated Interactions | In the setting of the pi-calculus with binary sessions, we aim at relaxing
the notion of duality of session types by the concept of retractable compliance
developed in contract theory. This leads to extending session types with a new
type operator of "speculative selection" including choices not necessarily
offered b... | 1 | 0 | 0 | 0 | 0 | 0 |
An Agent-Based Approach for Optimizing Modular Vehicle Fleet Operation | Modularity in military vehicle designs enables on-base assembly, disassembly,
and reconfiguration of vehicles, which can be beneficial in promoting fleet
adaptability and life cycle cost savings. To properly manage the fleet
operation and to control the resupply, demand prediction, and scheduling
process, this paper ... | 1 | 0 | 0 | 0 | 0 | 0 |
Delta-epsilon functions and uniform continuity on metric spaces | Under certain general conditions, an explicit formula to compute the greatest
delta-epsilon function of a continuous function is given. From this formula, a
new way to analyze the uniform continuity of a continuous function is given.
Several examples illustrating the theory are discussed.
| 0 | 0 | 1 | 0 | 0 | 0 |
Deterministic Dispersion of Mobile Robots in Dynamic Rings | In this work, we study the problem of dispersion of mobile robots on dynamic
rings. The problem of dispersion of $n$ robots on an $n$ node graph, introduced
by Augustine and Moses Jr. [1], requires robots to coordinate with each other
and reach a configuration where exactly one robot is present on each node. This
pro... | 1 | 0 | 0 | 0 | 0 | 0 |
A brain signature highly predictive of future progression to Alzheimer's dementia | Early prognosis of Alzheimer's dementia is hard. Mild cognitive impairment
(MCI) typically precedes Alzheimer's dementia, yet only a fraction of MCI
individuals will progress to dementia, even when screened using biomarkers. We
propose here to identify a subset of individuals who share a common brain
signature highly... | 0 | 0 | 0 | 1 | 0 | 0 |
Deep scattering transform applied to note onset detection and instrument recognition | Automatic Music Transcription (AMT) is one of the oldest and most
well-studied problems in the field of music information retrieval. Within this
challenging research field, onset detection and instrument recognition take
important places in transcription systems, as they respectively help to
determine exact onset tim... | 1 | 0 | 0 | 1 | 0 | 0 |
Gaschütz Lemma for Compact Groups | We prove the Gaschütz Lemma holds for all metrisable compact groups.
| 0 | 0 | 1 | 0 | 0 | 0 |
Driven flow with exclusion and spin-dependent transport in graphenelike structures | We present a simplified description for spin-dependent electronic transport
in honeycomb-lattice structures with spin-orbit interactions, using
generalizations of the stochastic non-equilibrium model known as the totally
asymmetric simple exclusion process. Mean field theory and numerical
simulations are used to stud... | 0 | 1 | 0 | 0 | 0 | 0 |
MOG: Mapper on Graphs for Relationship Preserving Clustering | The interconnected nature of graphs often results in difficult to interpret
clutter. Typically techniques focus on either decluttering by clustering nodes
with similar properties or grouping edges with similar relationship. We propose
using mapper, a powerful topological data analysis tool, to summarize the
structure... | 0 | 0 | 0 | 1 | 0 | 0 |
Variation Evolving for Optimal Control Computation, A Compact Way | A compact version of the Variation Evolving Method (VEM) is developed for the
optimal control computation. It follows the idea that originates from the
continuous-time dynamics stability theory in the control field. The optimal
solution is analogized to the equilibrium point of a dynamic system and is
anticipated to ... | 1 | 0 | 0 | 0 | 0 | 0 |
Transforming Sensor Data to the Image Domain for Deep Learning - an Application to Footstep Detection | Convolutional Neural Networks (CNNs) have become the state-of-the-art in
various computer vision tasks, but they are still premature for most sensor
data, especially in pervasive and wearable computing. A major reason for this
is the limited amount of annotated training data. In this paper, we propose the
idea of lev... | 1 | 0 | 0 | 0 | 0 | 0 |
The Price of Differential Privacy For Online Learning | We design differentially private algorithms for the problem of online linear
optimization in the full information and bandit settings with optimal
$\tilde{O}(\sqrt{T})$ regret bounds. In the full-information setting, our
results demonstrate that $\epsilon$-differential privacy may be ensured for
free -- in particular... | 1 | 0 | 0 | 1 | 0 | 0 |
Simulation chain and signal classification for acoustic neutrino detection in seawater | Acoustic neutrino detection is a promising approach to extend the energy
range of neutrino telescopes to energies beyond $10^{18}$\,eV. Currently
operational and planned water-Cherenkov neutrino telescopes, most notably
KM3NeT, include acoustic sensors in addition to the optical ones. These
acoustic sensors could be ... | 0 | 1 | 0 | 0 | 0 | 0 |
Parameter Space Noise for Exploration | Deep reinforcement learning (RL) methods generally engage in exploratory
behavior through noise injection in the action space. An alternative is to add
noise directly to the agent's parameters, which can lead to more consistent
exploration and a richer set of behaviors. Methods such as evolutionary
strategies use par... | 1 | 0 | 0 | 1 | 0 | 0 |
Deep Illumination: Approximating Dynamic Global Illumination with Generative Adversarial Network | We present Deep Illumination, a novel machine learning technique for
approximating global illumination (GI) in real-time applications using a
Conditional Generative Adversarial Network. Our primary focus is on generating
indirect illumination and soft shadows with offline rendering quality at
interactive rates. Inspi... | 1 | 0 | 0 | 0 | 0 | 0 |
Fraternal Dropout | Recurrent neural networks (RNNs) are important class of architectures among
neural networks useful for language modeling and sequential prediction.
However, optimizing RNNs is known to be harder compared to feed-forward neural
networks. A number of techniques have been proposed in literature to address
this problem. ... | 1 | 0 | 0 | 1 | 0 | 0 |
Finite-sample bounds for the multivariate Behrens-Fisher distribution with proportional covariances | The Behrens-Fisher problem is a well-known hypothesis testing problem in
statistics concerning two-sample mean comparison. In this article, we confirm
one conjecture in Eaton and Olshen (1972), which provides stochastic bounds for
the multivariate Behrens-Fisher test statistic under the null hypothesis. We
also exten... | 0 | 0 | 1 | 1 | 0 | 0 |
Evidence for mixed rationalities in preference formation | Understanding the mechanisms underlying the formation of cultural traits,
such as preferences, opinions and beliefs is an open challenge. Trait formation
is intimately connected to cultural dynamics, which has been the focus of a
variety of quantitative models. Recently, some studies have emphasized the
importance of... | 1 | 1 | 0 | 0 | 0 | 0 |
A Variance Maximization Criterion for Active Learning | Active learning aims to train a classifier as fast as possible with as few
labels as possible. The core element in virtually any active learning strategy
is the criterion that measures the usefulness of the unlabeled data based on
which new points to be labeled are picked. We propose a novel approach which we
refer t... | 1 | 0 | 0 | 1 | 0 | 0 |
Polarization, plasmon, and Debye screening in doped 3D ani-Weyl semimetal | We compute the polarization function in a doped three-dimensional
anisotropic-Weyl semimetal, in which the fermion energy dispersion is linear in
two components of the momenta and quadratic in the third. Through detailed
calculations, we find that the long wavelength plasmon mode depends on the
fermion density $n_e$ ... | 0 | 1 | 0 | 0 | 0 | 0 |
Identifying Product Order with Restricted Boltzmann Machines | Unsupervised machine learning via a restricted Boltzmann machine is an useful
tool in distinguishing an ordered phase from a disordered phase. Here we study
its application on the two-dimensional Ashkin-Teller model, which features a
partially ordered product phase. We train the neural network with spin
configuration... | 0 | 1 | 0 | 0 | 0 | 0 |
A finite temperature study of ideal quantum gases in the presence of one dimensional quasi-periodic potential | We study the thermodynamics of ideal Bose gas as well as the transport
properties of non interacting bosons and fermions in a one dimensional
quasi-periodic potential, namely Aubry-André (AA) model at finite
temperature. For bosons in finite size systems, the effect of quasi-periodic
potential on the crossover phenom... | 0 | 1 | 0 | 0 | 0 | 0 |
High-Frequency Analysis of Effective Interactions and Bandwidth for Transient States after Monocycle Pulse Excitation of Extended Hubbard Model | Using a high-frequency expansion in periodically driven extended Hubbard
models, where the strengths and ranges of density-density interactions are
arbitrary, we obtain the effective interactions and bandwidth, which depend
sensitively on the polarization of the driving field. Then, we numerically
calculate modulatio... | 0 | 1 | 0 | 0 | 0 | 0 |
Fast binary embeddings, and quantized compressed sensing with structured matrices | This paper deals with two related problems, namely distance-preserving binary
embeddings and quantization for compressed sensing . First, we propose fast
methods to replace points from a subset $\mathcal{X} \subset \mathbb{R}^n$,
associated with the Euclidean metric, with points in the cube $\{\pm 1\}^m$ and
we assoc... | 0 | 0 | 0 | 1 | 0 | 0 |
The Many Faces of Link Fraud | Most past work on social network link fraud detection tries to separate
genuine users from fraudsters, implicitly assuming that there is only one type
of fraudulent behavior. But is this assumption true? And, in either case, what
are the characteristics of such fraudulent behaviors? In this work, we set up
honeypots ... | 1 | 0 | 0 | 0 | 0 | 0 |
Diophantine approximation by special primes | We show that whenever $\delta>0$, $\eta$ is real and constants $\lambda_i$
satisfy some necessary conditions, there are infinitely many prime triples
$p_1,\, p_2,\, p_3$ satisfying the inequality $|\lambda_1p_1 + \lambda_2p_2 +
\lambda_3p_3+\eta|<(\max p_j)^{-1/12+\delta}$ and such that, for each
$i\in\{1,2,3\}$, $p_... | 0 | 0 | 1 | 0 | 0 | 0 |
A Compositional Treatment of Iterated Open Games | Compositional Game Theory is a new, recently introduced model of economic
games based upon the computer science idea of compositionality. In it, complex
and irregular games can be built up from smaller and simpler games, and the
equilibria of these complex games can be defined recursively from the
equilibria of their... | 1 | 0 | 0 | 0 | 0 | 0 |
Bayesian inference for spectral projectors of covariance matrix | Let $X_1, \ldots, X_n$ be i.i.d. sample in $\mathbb{R}^p$ with zero mean and
the covariance matrix $\mathbf{\Sigma^*}$. The classic principal component
analysis estimates the projector $\mathbf{P^*_{\mathcal{J}}}$ onto the direct
sum of some eigenspaces of $\mathbf{\Sigma^*}$ by its empirical counterpart
$\mathbf{\wi... | 0 | 0 | 1 | 1 | 0 | 0 |
Handling Incomplete Heterogeneous Data using VAEs | Variational autoencoders (VAEs), as well as other generative models, have
been shown to be efficient and accurate to capture the latent structure of vast
amounts of complex high-dimensional data. However, existing VAEs can still not
directly handle data that are heterogenous (mixed continuous and discrete) or
incompl... | 0 | 0 | 0 | 1 | 0 | 0 |
Geometric mean of probability measures and geodesics of Fisher information metric | The space of all probability measures having positive density function on a
connected compact smooth manifold $M$, denoted by $\mathcal{P}(M)$, carries the
Fisher information metric $G$. We define the geometric mean of probability
measures by the aid of which we investigate information geometry of
$\mathcal{P}(M)$, e... | 0 | 0 | 1 | 0 | 0 | 0 |
On automorphism groups of Toeplitz subshifts | In this article we study automorphisms of Toeplitz subshifts. Such groups are
abelian and any finitely generated torsion subgroup is finite and cyclic. When
the complexity is non superlinear, we prove that the automorphism group is,
modulo a finite cyclic group, generated by a unique root of the shift. In the
subquad... | 0 | 0 | 1 | 0 | 0 | 0 |
How to Generate Pseudorandom Permutations Over Other Groups | Recent results by Alagic and Russell have given some evidence that the
Even-Mansour cipher may be secure against quantum adversaries with quantum
queries, if considered over other groups than $(\mathbb{Z}/2)^n$. This prompts
the question as to whether or not other classical schemes may be generalized to
arbitrary gro... | 1 | 0 | 1 | 0 | 0 | 0 |
Measures of Tractography Convergence | In the present work, we use information theory to understand the empirical
convergence rate of tractography, a widely-used approach to reconstruct
anatomical fiber pathways in the living brain. Based on diffusion MRI data,
tractography is the starting point for many methods to study brain
connectivity. Of the availab... | 0 | 0 | 0 | 1 | 1 | 0 |
Network Flow Based Post Processing for Sales Diversity | Collaborative filtering is a broad and powerful framework for building
recommendation systems that has seen widespread adoption. Over the past decade,
the propensity of such systems for favoring popular products and thus creating
echo chambers have been observed. This has given rise to an active area of
research that... | 1 | 0 | 0 | 0 | 0 | 0 |
Lattice Model for Production of Gas | We define a lattice model for rock, absorbers, and gas that makes it possible
to examine the flow of gas to a complicated absorbing boundary over long
periods of time. The motivation is to deduce the geometry of the boundary from
the time history of gas absorption. We find a solution to this model using
Green's funct... | 0 | 1 | 0 | 0 | 0 | 0 |
Adaptive Representation Selection in Contextual Bandit | We consider an extension of the contextual bandit setting, motivated by
several practical applications, where an unlabeled history of contexts can
become available for pre-training before the online decision-making begins. We
propose an approach for improving the performance of contextual bandit in such
setting, via ... | 0 | 0 | 0 | 1 | 0 | 0 |
Algebraic surfaces with zero-dimensional cohomology support locus | Using the theory of cohomology support locus, we give a necessary condition
for the Albanese map of a smooth projective surface being a submersion. More
precisely, assuming the cohomology support locus of any finite abelian cover of
a smooth projective surface consists of finitely many points, we prove that the
surfa... | 0 | 0 | 1 | 0 | 0 | 0 |
Insight into the temperature dependent properties of the ferromagnetic Kondo lattice YbNiSn | Analyzing temperature dependent photoemission (PE) data of the ferromagnetic
Kondo-lattice (KL) system YbNiSn in the light of the Periodic Anderson model
(PAM) we show that the KL behavior is not limited to temperatures below a
temperature T_K, defined empirically from resistivity and specificic heat
measurements. As... | 0 | 1 | 0 | 0 | 0 | 0 |
Some Ageing Properties of Dynamic Additive Mean Residual Life Model | Although proportional hazard rate model is a very popular model to analyze
failure time data, sometimes it becomes important to study the additive hazard
rate model. Again, sometimes the concept of the hazard rate function is
abstract, in comparison to the concept of mean residual life function. A new
model called `d... | 0 | 0 | 1 | 1 | 0 | 0 |
From Monte Carlo to Las Vegas: Improving Restricted Boltzmann Machine Training Through Stopping Sets | We propose a Las Vegas transformation of Markov Chain Monte Carlo (MCMC)
estimators of Restricted Boltzmann Machines (RBMs). We denote our approach
Markov Chain Las Vegas (MCLV). MCLV gives statistical guarantees in exchange
for random running times. MCLV uses a stopping set built from the training data
and has maxim... | 1 | 0 | 0 | 1 | 0 | 0 |
CD meets CAT | We show that if a noncollapsed $CD(K,n)$ space $X$ with $n\ge 2$ has
curvature bounded above by $\kappa$ in the sense of Alexandrov then $K\le
(n-1)\kappa$ and $X$ is an Alexandrov space of curvature bounded below by
$K-\kappa (n-2)$. We also show that if a $CD(K,n)$ space $Y$ with finite $n$
has curvature bounded ab... | 0 | 0 | 1 | 0 | 0 | 0 |
Cost Models for Selecting Materialized Views in Public Clouds | Data warehouse performance is usually achieved through physical data
structures such as indexes or materialized views. In this context, cost models
can help select a relevant set ofsuch performance optimization structures.
Nevertheless, selection becomes more complex in the cloud. The criterion to
optimize is indeed ... | 1 | 0 | 0 | 0 | 0 | 0 |
Dealing with Integer-valued Variables in Bayesian Optimization with Gaussian Processes | Bayesian optimization (BO) methods are useful for optimizing functions that
are expensive to evaluate, lack an analytical expression and whose evaluations
can be contaminated by noise. These methods rely on a probabilistic model of
the objective function, typically a Gaussian process (GP), upon which an
acquisition f... | 0 | 0 | 0 | 1 | 0 | 0 |
Second-order constrained variational problems on Lie algebroids: applications to optimal control | The aim of this work is to study, from an intrinsic and geometric point of
view, second-order constrained variational problems on Lie algebroids, that is,
optimization problems defined by a cost functional which depends on
higher-order derivatives of admissible curves on a Lie algebroid. Extending the
classical Skinn... | 0 | 0 | 1 | 0 | 0 | 0 |
The Galactic Cosmic Ray Electron Spectrum from 3 to 70 MeV Measured by Voyager 1 Beyond the Heliopause, What This Tells Us About the Propagation of Electrons and Nuclei In and Out of the Galaxy at Low Energies | The cosmic ray electrons measured by Voyager 1 between 3-70 MeV beyond the
heliopause have intensities several hundred times those measured at the Earth
by PAMELA at nearly the same energies. This paper compares this new V1 data
with data from the earth-orbiting PAMELA experiment up to energies greater than
10 GeV wh... | 0 | 1 | 0 | 0 | 0 | 0 |
Online Scheduling of Spark Workloads with Mesos using Different Fair Allocation Algorithms | In the following, we present example illustrative and experimental results
comparing fair schedulers allocating resources from multiple servers to
distributed application frameworks. Resources are allocated so that at least
one resource is exhausted in every server. Schedulers considered include DRF
(DRFH) and Best-F... | 1 | 0 | 0 | 0 | 0 | 0 |
On the representation dimension and finitistic dimension of special multiserial algebras | For monomial special multiserial algebras, which in general are of wild
representation type, we construct radical embeddings into algebras of finite
representation type. As a consequence, we show that the representation
dimension of monomial and self-injective special multiserial algebras is less
or equal to three. T... | 0 | 0 | 1 | 0 | 0 | 0 |
Would You Like to Motivate Software Testers? Ask Them How | Context. Considering the importance of software testing to the development of
high quality and reliable software systems, this paper aims to investigate how
can work-related factors influence the motivation of software testers. Method.
We applied a questionnaire that was developed using a previous theory of
motivatio... | 1 | 0 | 0 | 0 | 0 | 0 |
POMDP Structural Results for Controlled Sensing | This article provides a short review of some structural results in controlled
sensing when the problem is formulated as a partially observed Markov decision
process. In particular, monotone value functions, Blackwell dominance and
quickest detection are described.
| 1 | 0 | 0 | 0 | 0 | 0 |
Low Rank Matrix Recovery with Simultaneous Presence of Outliers and Sparse Corruption | We study a data model in which the data matrix D can be expressed as D = L +
S + C, where L is a low rank matrix, S an element-wise sparse matrix and C a
matrix whose non-zero columns are outlying data points. To date, robust PCA
algorithms have solely considered models with either S or C, but not both. As
such, exis... | 1 | 0 | 0 | 1 | 0 | 0 |
Power-Sum Denominators | The power sum $1^n + 2^n + \cdots + x^n$ has been of interest to
mathematicians since classical times. Johann Faulhaber, Jacob Bernoulli, and
others who followed expressed power sums as polynomials in $x$ of degree $n+1$
with rational coefficients. Here we consider the denominators of these
polynomials, and prove som... | 0 | 0 | 1 | 0 | 0 | 0 |
A resource-frugal probabilistic dictionary and applications in bioinformatics | Indexing massive data sets is extremely expensive for large scale problems.
In many fields, huge amounts of data are currently generated, however
extracting meaningful information from voluminous data sets, such as computing
similarity between elements, is far from being trivial. It remains nonetheless
a fundamental ... | 1 | 0 | 0 | 0 | 0 | 0 |
Fast learning rate of deep learning via a kernel perspective | We develop a new theoretical framework to analyze the generalization error of
deep learning, and derive a new fast learning rate for two representative
algorithms: empirical risk minimization and Bayesian deep learning. The series
of theoretical analyses of deep learning has revealed its high expressive power
and uni... | 1 | 0 | 1 | 1 | 0 | 0 |
Closed-loop field development optimization with multipoint geostatistics and statistical assessment | Closed-loop field development (CLFD) optimization is a comprehensive
framework for optimal development of subsurface resources. CLFD involves three
major steps: 1) optimization of full development plan based on current set of
models, 2) drilling new wells and collecting new spatial and temporal
(production) data, 3) ... | 1 | 0 | 0 | 1 | 0 | 0 |
Reduction and regular $t$-balanced Cayley maps on split metacyclic 2-groups | A regular $t$-balanced Cayley map (RBCM$_t$ for short) on a group $\Gamma$ is
an embedding of a Cayley graph on $\Gamma$ into a surface with some special
symmetric properties. We propose a reduction method to study RBCM$_t$'s, and as
a first practice, we completely classify RBCM$_t$'s for a class of split
metacyclic ... | 0 | 0 | 1 | 0 | 0 | 0 |
Perovskite Substrates Boost the Thermopower of Cobaltate Thin Films at High Temperatures | Transition metal oxides are promising candidates for thermoelectric
applications, because they are stable at high temperature and because strong
electronic correlations can generate large Seebeck coefficients, but their
thermoelectric power factors are limited by the low electrical conductivity. We
report transport m... | 0 | 1 | 0 | 0 | 0 | 0 |
Motion of a rod pushed at one point in a weightless environment in space | We analyze the motion of a rod floating in a weightless environment in space
when a force is applied at some point on the rod in a direction perpendicular
to its length. If the force applied is at the centre of mass, then the rod gets
a linear motion perpendicular to its length. However, if the same force is
applied ... | 0 | 1 | 0 | 0 | 0 | 0 |
Dimension theory and components of algebraic stacks | We prove some basic results on the dimension theory of algebraic stacks, and
on the multiplicities of their irreducible components, for which we do not know
a reference.
| 0 | 0 | 1 | 0 | 0 | 0 |
When is a polynomial ideal binomial after an ambient automorphism? | Can an ideal I in a polynomial ring k[x] over a field be moved by a change of
coordinates into a position where it is generated by binomials $x^a - cx^b$
with c in k, or by unital binomials (i.e., with c = 0 or 1)? Can a variety be
moved into a position where it is toric? By fibering the G-translates of I over
an alg... | 1 | 0 | 1 | 0 | 0 | 0 |
Annihilators in $\mathbb{N}^k$-graded and $\mathbb{Z}^k$-graded rings | It has been shown by McCoy that a right ideal of a polynomial ring with
several indeterminates has a non-trivial homogeneous right annihilator of
degree 0 provided its right annihilator is non-trivial to begin with. In this
note, it is documented that any $\mathbb{N}$-graded ring $R$ has a slightly
weaker property: t... | 0 | 0 | 1 | 0 | 0 | 0 |
q-Neurons: Neuron Activations based on Stochastic Jackson's Derivative Operators | We propose a new generic type of stochastic neurons, called $q$-neurons, that
considers activation functions based on Jackson's $q$-derivatives with
stochastic parameters $q$. Our generalization of neural network architectures
with $q$-neurons is shown to be both scalable and very easy to implement. We
demonstrate ex... | 0 | 0 | 0 | 1 | 0 | 0 |
Liveness-Driven Random Program Generation | Randomly generated programs are popular for testing compilers and program
analysis tools, with hundreds of bugs in real-world C compilers found by random
testing. However, existing random program generators may generate large amounts
of dead code (computations whose result is never used). This leaves relatively
littl... | 1 | 0 | 0 | 0 | 0 | 0 |
Modeling and optimal control of HIV/AIDS prevention through PrEP | Pre-exposure prophylaxis (PrEP) consists in the use of an antiretroviral
medication to prevent the acquisition of HIV infection by uninfected
individuals and has recently demonstrated to be highly efficacious for HIV
prevention. We propose a new epidemiological model for HIV/AIDS transmission
including PrEP. Existenc... | 0 | 0 | 1 | 0 | 0 | 0 |
STARIMA-based Traffic Prediction with Time-varying Lags | Based on the observation that the correlation between observed traffic at two
measurement points or traffic stations may be time-varying, attributable to the
time-varying speed which subsequently causes variations in the time required to
travel between the two points, in this paper, we develop a modified Space-Time
A... | 1 | 0 | 1 | 0 | 0 | 0 |
Electric Vehicle Charging Station Placement Method for Urban Areas | For accommodating more electric vehicles (EVs) to battle against fossil fuel
emission, the problem of charging station placement is inevitable and could be
costly if done improperly. Some researches consider a general setup, using
conditions such as driving ranges for planning. However, most of the EV growths
in the ... | 1 | 0 | 0 | 0 | 0 | 0 |
The Steinberg linkage class for a reductive algebraic group | Let G be a reductive algebraic group over a field of positive characteristic
and denote by C(G) the category of rational G-modules. In this note we
investigate the subcategory of C(G) consisting of those modules whose
composition factors all have highest weights linked to the Steinberg weight.
This subcategory is den... | 0 | 0 | 1 | 0 | 0 | 0 |
Detection and Resolution of Rumours in Social Media: A Survey | Despite the increasing use of social media platforms for information and news
gathering, its unmoderated nature often leads to the emergence and spread of
rumours, i.e. pieces of information that are unverified at the time of posting.
At the same time, the openness of social media platforms provides opportunities
to ... | 1 | 0 | 0 | 0 | 0 | 0 |
On harmonic analysis of spherical convolutions on semisimple Lie groups | This paper contains a non-trivial generalization of the Harish-Chandra
transforms on a connected semisimple Lie group $G,$ with finite center, into
what we term spherical convolutions. Among other results we show that its
integral over the collection of bounded spherical functions at the identity
element $e \in G$ is... | 0 | 0 | 1 | 0 | 0 | 0 |
Relaxation-based viscosity mapping for magnetic particle imaging | Magnetic Particle Imaging (MPI) has been shown to provide remarkable contrast
for imaging applications such as angiography, stem cell tracking, and cancer
imaging. Recently, there is growing interest in the functional imaging
capabilities of MPI, where color MPI techniques have explored separating
different nanoparti... | 0 | 1 | 0 | 0 | 0 | 0 |
Detecting Statistically Significant Communities | Community detection is a key data analysis problem across different fields.
During the past decades, numerous algorithms have been proposed to address this
issue. However, most work on community detection does not address the issue of
statistical significance. Although some research efforts have been made towards
min... | 1 | 0 | 0 | 0 | 0 | 0 |
On the effectivity of spectra representing motivic cohomology theories | Let k be an infinite perfect field. We provide a general criterion for a
spectrum in the stable homotopy category over k to be effective, i.e. to be in
the localizing subcategory generated by the suspension spectra of smooth
schemes. As a consequence, we show that two recent versions of generalized
motivic cohomology... | 0 | 0 | 1 | 0 | 0 | 0 |
Aggregated Momentum: Stability Through Passive Damping | Momentum is a simple and widely used trick which allows gradient-based
optimizers to pick up speed along low curvature directions. Its performance
depends crucially on a damping coefficient $\beta$. Large $\beta$ values can
potentially deliver much larger speedups, but are prone to oscillations and
instability; hence... | 0 | 0 | 0 | 1 | 0 | 0 |
On the Number of Bins in Equilibria for Signaling Games | We investigate the equilibrium behavior for the decentralized quadratic cheap
talk problem in which an encoder and a decoder, viewed as two decision makers,
have misaligned objective functions. In prior work, we have shown that the
number of bins under any equilibrium has to be at most countable, generalizing
a class... | 1 | 0 | 0 | 0 | 0 | 0 |
The Dantzig selector for a linear model of diffusion processes | In this paper, a linear model of diffusion processes with unknown drift and
diagonal diffusion matrices is discussed. We will consider the estimation
problems for unknown parameters based on the discrete time observation in
high-dimensional and sparse settings. To estimate drift matrices, the Dantzig
selector which w... | 0 | 0 | 1 | 1 | 0 | 0 |
A Spatio-Temporal Multivariate Shared Component Model with an Application in Iran Cancer Data | Among the proposals for joint disease mapping, the shared component model has
become more popular. Another recent advance to strengthen inference of disease
data has been the extension of purely spatial models to include time and
space-time interaction. Such analyses have additional benefits over purely
spatial model... | 0 | 0 | 0 | 1 | 0 | 0 |
The dynamo effect in decaying helical turbulence | We show that in decaying hydromagnetic turbulence with initial kinetic
helicity, a weak magnetic field eventually becomes fully helical. The sign of
magnetic helicity is opposite to that of the kinetic helicity - regardless of
whether or not the initial magnetic field was helical. The magnetic field
undergoes inverse... | 0 | 1 | 0 | 0 | 0 | 0 |
Geometrically finite amalgamations of hyperbolic 3-manifold groups are not LERF | We prove that, for any two finite volume hyperbolic $3$-manifolds, the
amalgamation of their fundamental groups along any nontrivial geometrically
finite subgroup is not LERF. This generalizes the author's previous work on
nonLERFness of amalgamations of hyperbolic $3$-manifold groups along abelian
subgroups. A conse... | 0 | 0 | 1 | 0 | 0 | 0 |
Dining Philosophers, Leader Election and Ring Size problems, in the quantum setting | We provide the first quantum (exact) protocol for the Dining Philosophers
problem (DP), a central problem in distributed algorithms. It is well known
that the problem cannot be solved exactly in the classical setting. We then use
our DP protocol to provide a new quantum protocol for the tightly related
problem of exa... | 1 | 0 | 0 | 0 | 0 | 0 |
An Online Secretary Framework for Fog Network Formation with Minimal Latency | Fog computing is seen as a promising approach to perform distributed,
low-latency computation for supporting Internet of Things applications.
However, due to the unpredictable arrival of available neighboring fog nodes,
the dynamic formation of a fog network can be challenging. In essence, a given
fog node must smart... | 1 | 0 | 0 | 0 | 0 | 0 |
Computer-assisted proof of heteroclinic connections in the one-dimensional Ohta-Kawasaki model | We present a computer-assisted proof of heteroclinic connections in the
one-dimensional Ohta-Kawasaki model of diblock copolymers. The model is a
fourth-order parabolic partial differential equation subject to homogeneous
Neumann boundary conditions, which contains as a special case the celebrated
Cahn-Hilliard equat... | 1 | 0 | 1 | 0 | 0 | 0 |
Dust and Gas in Star Forming Galaxies at z~3 - Extending Galaxy Uniformity to 11.5 Billion Years | We present millimetre dust emission measurements of two Lyman Break Galaxies
at z~3 and construct for the first time fully sampled infrared spectral energy
distributions (SEDs), from mid-IR to the Rayleigh-Jeans tail, of individually
detected, unlensed, UV-selected, main sequence (MS) galaxies at $z=3$. The SED
model... | 0 | 1 | 0 | 0 | 0 | 0 |
Flow speed has little impact on propulsive characteristics of oscillating foils | Experiments are reported on the performance of a pitching and heaving
two-dimensional foil in a water channel in either continuous or intermittent
motion. We find that the thrust and power are independent of the mean
freestream velocity for two-fold changes in the mean velocity (four-fold in the
dynamic pressure), an... | 0 | 1 | 0 | 0 | 0 | 0 |
Switching and Data Injection Attacks on Stochastic Cyber-Physical Systems: Modeling, Resilient Estimation and Attack Mitigation | In this paper, we consider the problem of attack-resilient state estimation,
that is to reliably estimate the true system states despite two classes of
attacks: (i) attacks on the switching mechanisms and (ii) false data injection
attacks on actuator and sensor signals, in the presence of unbounded stochastic
process... | 1 | 0 | 1 | 0 | 0 | 0 |
Generating Sentence Planning Variations for Story Telling | There has been a recent explosion in applications for dialogue interaction
ranging from direction-giving and tourist information to interactive story
systems. Yet the natural language generation (NLG) component for many of these
systems remains largely handcrafted. This limitation greatly restricts the
range of appli... | 1 | 0 | 0 | 0 | 0 | 0 |
Detection of planet candidates around K giants, HD 40956, HD 111591, and HD 113996 | Aims. The purpose of this paper is to detect and investigate the nature of
long-term radial velocity (RV) variations of K-type giants and to confirm
planetary companions around the stars.
Methods. We have conducted two planet search programs by precise RV
measurement using the 1.8 m telescope at Bohyunsan Optical Ast... | 0 | 1 | 0 | 0 | 0 | 0 |
Perfect Half Space Games | We introduce perfect half space games, in which the goal of Player 2 is to
make the sums of encountered multi-dimensional weights diverge in a direction
which is consistent with a chosen sequence of perfect half spaces (chosen
dynamically by Player 2). We establish that the bounding games of Jurdziński
et al. (ICALP ... | 1 | 0 | 0 | 0 | 0 | 0 |
Energy-efficient Analog Sensing for Large-scale, High-density Persistent Wireless Monitoring | The research challenge of current Wireless Sensor Networks~(WSNs) is to
design energy-efficient, low-cost, high-accuracy, self-healing, and scalable
systems for applications such as environmental monitoring. Traditional WSNs
consist of low density, power-hungry digital motes that are expensive and
cannot remain funct... | 1 | 0 | 0 | 0 | 0 | 0 |
Computation of ground-state properties in molecular systems: back-propagation with auxiliary-field quantum Monte Carlo | We address the computation of ground-state properties of chemical systems and
realistic materials within the auxiliary-field quantum Monte Carlo method. The
phase constraint to control the fermion phase problem requires the random walks
in Slater determinant space to be open-ended with branching. This in turn makes
i... | 0 | 1 | 0 | 0 | 0 | 0 |
Demonstration of the Relationship between Sensitivity and Identifiability for Inverse Uncertainty Quantification | Inverse Uncertainty Quantification (UQ), or Bayesian calibration, is the
process to quantify the uncertainties of random input parameters based on
experimental data. The introduction of model discrepancy term is significant
because "over-fitting" can theoretically be avoided. But it also poses
challenges in the pract... | 0 | 0 | 0 | 1 | 0 | 0 |
The GENIUS Approach to Robust Mendelian Randomization Inference | Mendelian randomization (MR) is a popular instrumental variable (IV)
approach. A key IV identification condition known as the exclusion restriction
requires no direct effect of an IV on the outcome not through the exposure
which is unrealistic in most MR analyses. As a result, possible violation of
the exclusion rest... | 0 | 0 | 0 | 1 | 0 | 0 |
Evaluation of Trace Alignment Quality and its Application in Medical Process Mining | Trace alignment algorithms have been used in process mining for discovering
the consensus treatment procedures and process deviations. Different alignment
algorithms, however, may produce very different results. No widely-adopted
method exists for evaluating the results of trace alignment. Existing
reference-free eva... | 1 | 0 | 0 | 0 | 0 | 0 |
Size Constraints on Majorana Beamsplitter Interferometer: Majorana Coupling and Surface-Bulk Scattering | Topological insulator surfaces in proximity to superconductors have been
proposed as a way to produce Majorana fermions in condensed matter physics. One
of the simplest proposed experiments with such a system is Majorana
interferometry. Here, we consider two possibly conflicting constraints on the
size of such an int... | 0 | 1 | 0 | 0 | 0 | 0 |
Counting Arithmetical Structures on Paths and Cycles | Let $G$ be a finite, simple, connected graph. An arithmetical structure on
$G$ is a pair of positive integer vectors $\mathbf{d},\mathbf{r}$ such that
$(\mathrm{diag}(\mathbf{d})-A)\mathbf{r}=0$, where $A$ is the adjacency matrix
of $G$. We investigate the combinatorics of arithmetical structures on path and
cycle gr... | 0 | 0 | 1 | 0 | 0 | 0 |
From synaptic interactions to collective dynamics in random neuronal networks models: critical role of eigenvectors and transient behavior | The study of neuronal interactions is currently at the center of several
neuroscience big collaborative projects (including the Human Connectome, the
Blue Brain, the Brainome, etc.) which attempt to obtain a detailed map of the
entire brain matrix. Under certain constraints, mathematical theory can advance
prediction... | 0 | 0 | 0 | 0 | 1 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.