title
stringlengths
7
239
abstract
stringlengths
7
2.76k
cs
int64
0
1
phy
int64
0
1
math
int64
0
1
stat
int64
0
1
quantitative biology
int64
0
1
quantitative finance
int64
0
1
Efficient Constrained Tensor Factorization by Alternating Optimization with Primal-Dual Splitting
Tensor factorization with hard and/or soft constraints has played an important role in signal processing and data analysis. However, existing algorithms for constrained tensor factorization have two drawbacks: (i) they require matrix-inversion; and (ii) they cannot (or at least is very difficult to) handle structured...
1
0
0
0
0
0
Replay spoofing detection system for automatic speaker verification using multi-task learning of noise classes
In this paper, we propose a replay attack spoofing detection system for automatic speaker verification using multitask learning of noise classes. We define the noise that is caused by the replay attack as replay noise. We explore the effectiveness of training a deep neural network simultaneously for replay attack spo...
1
0
0
1
0
0
On One Property of Tikhonov Regularization Algorithm
For linear inverse problem with Gaussian random noise we show that Tikhonov regularization algorithm is minimax in the class of linear estimators and is asymptotically minimax in the sense of sharp asymptotic in the class of all estimators. The results are valid if some a priori information on a Fourier coefficients ...
0
0
1
1
0
0
Observation of Extra Photon Recoil in a Distorted Optical Field
Light carries momentum which induces on atoms a recoil for each photon absorbed. In vacuum, for a monochromatic beam of frequency $\nu$, the global momentum per photon is bounded by general principles and is smaller than $h \nu/c$ leading to a limit on the recoil. However, locally this limit can be broken. In this pa...
0
1
0
0
0
0
Weak Poincaré Inequalities for Convergence Rate of Degenerate Diffusion Processes
For a contraction $C_0$-semigroup on a separable Hilbert space, the decay rate is estimated by using the weak Poincaré inequalities for the symmetric and anti-symmetric part of the generator. As applications, non-exponential convergence rate is characterized for a class of degenerate diffusion processes, so that the ...
0
0
1
0
0
0
rTraceroute: Réunion Traceroute Visualisation
Traceroute is the main tools to explore Internet path. It provides limited information about each node along the path. However, Traceroute cannot go further in statistics analysis, or \emph{Man-Machine Interface (MMI)}. Indeed, there are no graphical tool that is able to draw all paths used by IP routes. We present a...
1
0
0
0
0
0
Effects of heterogeneity in site-site couplings for tight-binding models on scale-invariant structures
We studied the thermodynamic behaviors of non-interacting bosons and fermions trapped by a scale-invariant branching structure of adjustable degree of heterogeneity. The full energy spectrum in tight-binding approximation was analytically solved . We found that the log-periodic oscillation of the specific heat for Fe...
0
1
0
0
0
0
Are generative deep models for novelty detection truly better?
Many deep models have been recently proposed for anomaly detection. This paper presents comparison of selected generative deep models and classical anomaly detection methods on an extensive number of non--image benchmark datasets. We provide statistical comparison of the selected models, in many configurations, archi...
0
0
0
1
0
0
Minimizing the waiting time for a one-way shuttle service
Consider a terminal in which users arrive continuously over a finite period of time at a variable rate known in advance. A fleet of shuttles has to carry the users over a fixed trip. What is the shuttle schedule that minimizes their waiting time? This is the question addressed in the present paper. We propose efficie...
0
0
1
0
0
0
Two weight bump conditions for matrix weights
In this paper we extend the theory of two weight, $A_p$ bump conditions to the setting of matrix weights. We prove two matrix weight inequalities for fractional maximal operators, fractional and singular integrals, sparse operators and averaging operators. As applications we prove quantitative, one weight estimates, ...
0
0
1
0
0
0
Legendrian ribbons and strongly quasipositive links in an open book
We show that a link in an open book can be realized as a strongly quasipositive braid if and only if it bounds a Legendrian ribbon with respect to the associated contact structure. This generalizes a result due to Baader and Ishikawa for links in the three-sphere. We highlight some related techniques for determining ...
0
0
1
0
0
0
Δ-cumulants in terms of moments
The \Delta-convolution of real probability measures, introduced by Bożejko, generalizes both free and boolean convolutions. It is linearized by the \Delta-cumulants, and Yoshida gave a combinatorial formula for moments in terms of \Delta-cumulants, that implicitly defines the latter. It relies on the definition of an...
0
0
1
0
0
0
A Fully Convolutional Network for Semantic Labeling of 3D Point Clouds
When classifying point clouds, a large amount of time is devoted to the process of engineering a reliable set of features which are then passed to a classifier of choice. Generally, such features - usually derived from the 3D-covariance matrix - are computed using the surrounding neighborhood of points. While these f...
1
0
0
1
0
0
Boundedness properties in function spaces
Some boundedness properties of function spaces (considered as topological groups) are studied.
0
0
1
0
0
0
Linear-size CDAWG: new repetition-aware indexing and grammar compression
In this paper, we propose a novel approach to combine \emph{compact directed acyclic word graphs} (CDAWGs) and grammar-based compression. This leads us to an efficient self-index, called Linear-size CDAWGs (L-CDAWGs), which can be represented with $O(\tilde e_T \log n)$ bits of space allowing for $O(\log n)$-time ran...
1
0
0
0
0
0
Topic Lifecycle on Social Networks: Analyzing the Effects of Semantic Continuity and Social Communities
Topic lifecycle analysis on Twitter, a branch of study that investigates Twitter topics from their birth through lifecycle to death, has gained immense mainstream research popularity. In the literature, topics are often treated as one of (a) hashtags (independent from other hashtags), (b) a burst of keywords in a sho...
1
0
0
0
0
0
Unstable Footwear as a Speed-Dependent Noise-Based Training Gear to Exercise Inverted Pendulum Motion During Walking
Previous research on unstable footwear has suggested that it may induce plantar mechanical noise during walking. The purpose of this study was to explore whether unstable footwear could be considered as a noise-based training gear to exercise body center of mass (CoM) motion during walking or not. Ground reaction for...
0
1
0
0
0
0
Gaussian autoregressive process with dependent innovations. Some asymptotic results
In this paper we introduce a modified version of a gaussian standard first-order autoregressive process where we allow for a dependence structure between the state variable $Y_{t-1}$ and the next innovation $\xi_t$. We call this model dependent innovations gaussian AR(1) process (DIG-AR(1)). We analyze the moment and...
0
0
1
1
0
0
Structured Peer Learning Program - An Innovative Approach to Computer Science Education
Structured Peer Learning (SPL) is a form of peer-based supplemental instruction that focuses on mentoring, guidance, and development of technical, communication, and social skills in both the students receiving assistance and the students in teaching roles. This paper explores the methodology, efficacy, and reasoning...
1
0
0
0
0
0
Analysis of the possibility for time-optimal control of the scanning system of the GREEN-WAKE's project lidar
The monograph represents analysis of the possibility for time-optimal control of a prototype of an aircraft-mounted scanning-imaging system of a Light Detection and Ranging based wake vortex detection system. The study is a part of the research project "Demonstration of Light Detection and Ranging based wake vortex d...
1
0
0
0
0
0
Machine vs Machine: Minimax-Optimal Defense Against Adversarial Examples
Recently, researchers have discovered that the state-of-the-art object classifiers can be fooled easily by small perturbations in the input unnoticeable to human eyes. It is also known that an attacker can generate strong adversarial examples if she knows the classifier parameters. Conversely, a defender can robustif...
1
0
0
1
0
0
From Attention to Participation: Reviewing and Modelling Engagement with Computers
Over the last decades, the Internet and mobile technology have consolidated the digital as a public sphere of life. Designers are asked to create engaging digital experiences. However, in some cases engagement is seen as a psychological state, while in others it emphasizes a participative vein. In this paper, I revie...
1
0
0
0
0
0
Circularizing Planet Nine through dynamical friction with an extended, cold planetesimal belt
Unexpected clustering in the orbital elements of minor bodies beyond the Kuiper belt has led to speculations that our solar system actually hosts nine planets, the eight established plus a hypothetical "Planet Nine". Several recent studies have shown that a planet with a mass of about 10 Earth masses on a distant ecc...
0
1
0
0
0
0
Tactics of Adversarial Attack on Deep Reinforcement Learning Agents
We introduce two tactics to attack agents trained by deep reinforcement learning algorithms using adversarial examples, namely the strategically-timed attack and the enchanting attack. In the strategically-timed attack, the adversary aims at minimizing the agent's reward by only attacking the agent at a small subset ...
1
0
0
1
0
0
Differentially Private Distributed Learning for Language Modeling Tasks
One of the big challenges in machine learning applications is that training data can be different from the real-world data faced by the algorithm. In language modeling, users' language (e.g. in private messaging) could change in a year and be completely different from what we observe in publicly available data. At th...
1
0
0
0
0
0
Tensor Train Neighborhood Preserving Embedding
In this paper, we propose a Tensor Train Neighborhood Preserving Embedding (TTNPE) to embed multi-dimensional tensor data into low dimensional tensor subspace. Novel approaches to solve the optimization problem in TTNPE are proposed. For this embedding, we evaluate novel trade-off gain among classification, computati...
1
0
0
1
0
0
Explicit three dimensional topology optimization via Moving Morphable Void (MMV) approach
Three dimensional (3D) topology optimization problems always involve huge numbers of Degrees of Freedom (DOFs) in finite element analysis (FEA) and design variables in numerical optimization, respectively. This will inevitably lead to large computational efforts in the solution process. In the present paper, an effic...
0
1
0
0
0
0
The index of compact simple Lie groups
Let M be an irreducible Riemannian symmetric space. The index i(M) of M is the minimal codimension of a (non-trivial) totally geodesic submanifold of M. The purpose of this note is to determine the index i(M) for all irreducible Riemannian symmetric spaces M of type (II) and (IV).
0
0
1
0
0
0
Cell Tracking via Proposal Generation and Selection
Microscopy imaging plays a vital role in understanding many biological processes in development and disease. The recent advances in automation of microscopes and development of methods and markers for live cell imaging has led to rapid growth in the amount of image data being captured. To efficiently and reliably ext...
1
0
0
0
0
0
Geometric Properties of Isostables and Basins of Attraction of Monotone Systems
In this paper, we study geometric properties of basins of attraction of monotone systems. Our results are based on a combination of monotone systems theory and spectral operator theory. We exploit the framework of the Koopman operator, which provides a linear infinite-dimensional description of nonlinear dynamical sy...
1
0
1
0
0
0
Elongation and shape changes in organisms with cell walls: a dialogue between experiments and models
The generation of anisotropic shapes occurs during morphogenesis of almost all organisms. With the recent renewal of the interest in mechanical aspects of morphogenesis, it has become clear that mechanics contributes to anisotropic forms in a subtle interaction with various molecular actors. Here, we consider plants,...
0
0
0
0
1
0
Localic completion of uniform spaces
We extend the notion of localic completion of generalised metric spaces by Steven Vickers to the setting of generalised uniform spaces. A generalised uniform space (gus) is a set X equipped with a family of generalised metrics on X, where a generalised metric on X is a map from the product of X to the upper reals sat...
1
0
1
0
0
0
Kinetic inhibition of MHD-shocks in the vicinity of a parallel magnetic field
According to magnetohydrodynamics (MHD), the encounter of two collisional magnetized plasmas at high velocity gives rise to shock waves. Investigations conducted so far have found that the same conclusion still holds in the case of collisionless plasmas. For the case of a flow-aligned field, MHD stipulates that the f...
0
1
0
0
0
0
Squeezed Convolutional Variational AutoEncoder for Unsupervised Anomaly Detection in Edge Device Industrial Internet of Things
In this paper, we propose Squeezed Convolutional Variational AutoEncoder (SCVAE) for anomaly detection in time series data for Edge Computing in Industrial Internet of Things (IIoT). The proposed model is applied to labeled time series data from UCI datasets for exact performance evaluation, and applied to real world...
1
0
0
0
0
0
Global Weisfeiler-Lehman Graph Kernels
Most state-of-the-art graph kernels only take local graph properties into account, i.e., the kernel is computed with regard to properties of the neighborhood of vertices or other small substructures. On the other hand, kernels that do take global graph propertiesinto account may not scale well to large graph database...
1
0
0
1
0
0
An analytical Model which Determines the Apparent T1 for Modified Look-Locker Inversion Recovery (MOLLI) -- Analysis of the Longitudinal Relaxation under the Influence of Discontinuous Balanced and Spoiled Gradient Echo Readouts
Quantitative nuclear magnetic resonance imaging (MRI) shifts more and more into the focus of clinical research. Especially determination of relaxation times without/and with contrast agents becomes the foundation of tissue characterization, e.g. in cardiac MRI for myocardial fibrosis. Techniques which assess longitud...
0
1
0
0
0
0
Updated Constraints on the Dark Matter Interpretation of CDMS-II-Si Data
We present an updated halo-dependent and halo-independent analysis of viable light WIMP dark matter candidates which could account for the excess observed in CDMS-II-Si. We include recent constraints from LUX, PandaX-II, and PICO-60, as well as projected sensitivities for XENON1T, SuperCDMS SNOLAB, LZ, DARWIN, DarkSi...
0
1
0
0
0
0
Emulating Simulations of Cosmic Dawn for 21cm Power Spectrum Constraints on Cosmology, Reionization, and X-ray Heating
Current and upcoming radio interferometric experiments are aiming to make a statistical characterization of the high-redshift 21cm fluctuation signal spanning the hydrogen reionization and X-ray heating epochs of the universe. However, connecting 21cm statistics to underlying physical parameters is complicated by the...
0
1
0
0
0
0
Fluctuations and Noise Signatures of Driven Magnetic Skyrmions
Magnetic skyrmions are particle-like objects with topologically-protected stability which can be set into motion with an applied current. Using a particle-based model we simulate current-driven magnetic skyrmions interacting with random quenched disorder and examine the skyrmion velocity fluctuations parallel and per...
0
1
0
0
0
0
Metallic maps between metallic Riemannian manifolds and constancy of certain maps
In this paper, we introduce metallic maps between metallic Riemannian manifolds, provide an example and obtain certain conditions for such maps to be totally geodesic. We also give a sufficient condition for a map between metallic Riemannian manifolds to be harmonic map. Then we investigate the constancy of certain m...
0
0
1
0
0
0
Hashing as Tie-Aware Learning to Rank
Hashing, or learning binary embeddings of data, is frequently used in nearest neighbor retrieval. In this paper, we develop learning to rank formulations for hashing, aimed at directly optimizing ranking-based evaluation metrics such as Average Precision (AP) and Normalized Discounted Cumulative Gain (NDCG). We first...
1
0
0
1
0
0
Models of compact stars on paraboloidal spacetime satisfying Karmarkar condition
A new exact solution of Einstein's field equations on the background of paraboloidal spacetime using Karmarkar condition is reported. The physical acceptability conditions of the model are investigated and found that the model is compatible with a number of compact star candidates like Her X-1, LMC X-4, EXO 1785-248,...
0
1
0
0
0
0
Adversarial Connective-exploiting Networks for Implicit Discourse Relation Classification
Implicit discourse relation classification is of great challenge due to the lack of connectives as strong linguistic cues, which motivates the use of annotated implicit connectives to improve the recognition. We propose a feature imitation framework in which an implicit relation network is driven to learn from anothe...
1
0
0
1
0
0
An Input Reconstruction Approach for Command Following in Linear MIMO Systems
The idea of posing a command following or tracking control problem as an input reconstruction problem is explored in the paper. For a class of square MIMO systems with known dynamics, by pretending that reference commands are actual outputs of the system, input reconstruction methods can be used to determine control ...
1
0
0
0
0
0
Simulation Framework for Cooperative Adaptive Cruise Control with Empirical DSRC Module
Wireless communication plays a vital role in the promising performance of connected and automated vehicle (CAV) technology. This paper proposes a Vissim-based microscopic traffic simulation framework with an analytical dedicated short-range communication (DSRC) module for packet reception. Being derived from ns-2, a ...
1
0
0
0
0
0
Synchronization of Kuramoto oscillators in a bidirectional frequency-dependent tree network
This paper studies the synchronization of a finite number of Kuramoto oscillators in a frequency-dependent bidirectional tree network. We assume that the coupling strength of each link in each direction is equal to the product of a common coefficient and the exogenous frequency of its corresponding head oscillator. W...
1
0
0
0
0
0
On Exchangeability in Network Models
We derive representation theorems for exchangeable distributions on finite and infinite graphs using elementary arguments based on geometric and graph-theoretic concepts. Our results elucidate some of the key differences, and their implications, between statistical network models that are finitely exchangeable and mo...
0
0
1
1
0
0
Replicator equation on networks with degree regular communities
The replicator equation is one of the fundamental tools to study evolutionary dynamics in well-mixed populations. This paper contributes to the literature on evolutionary graph theory, providing a version of the replicator equation for a family of connected networks with communities, where nodes in the same community...
0
0
0
0
1
0
Go game formal revealing by Ising model
Go gaming is a struggle for territory control between rival, black and white, stones on a board. We model the Go dynamics in a game by means of the Ising model whose interaction coefficients reflect essential rules and tactics employed in Go to build long-term strategies. At any step of the game, the energy functiona...
1
0
0
0
0
0
High resolution structural characterisation of laser-induced defect clusters inside diamond
Laser writing with ultrashort pulses provides a potential route for the manufacture of three-dimensional wires, waveguides and defects within diamond. We present a transmission electron microscopy (TEM) study of the intrinsic structure of the laser modifications and reveal a complex distribution of defects. Electron ...
0
1
0
0
0
0
Neural networks for post-processing ensemble weather forecasts
Ensemble weather predictions require statistical post-processing of systematic errors to obtain reliable and accurate probabilistic forecasts. Traditionally, this is accomplished with distributional regression models in which the parameters of a predictive distribution are estimated from a training period. We propose...
0
0
0
1
0
0
Power maps in finite groups
In recent work, Pomerance and Shparlinski have obtained results on the number of cycles in the functional graph of the map $x \mapsto x^a$ in $\mathbb{F}_p^*$. We prove similar results for other families of finite groups. In particular, we obtain estimates for the number of cycles for cyclic groups, symmetric groups,...
0
0
1
0
0
0
Permutation polynomials, fractional polynomials, and algebraic curves
In this note we prove a conjecture by Li, Qu, Li, and Fu on permutation trinomials over $\mathbb{F}_3^{2k}$. In addition, new examples and generalizations of some families of permutation polynomials of $\mathbb{F}_{3^k}$ and $\mathbb{F}_{5^k}$ are given. We also study permutation quadrinomials of type $Ax^{q(q-1)+1} ...
0
0
1
0
0
0
Recursive Whitening Transformation for Speaker Recognition on Language Mismatched Condition
Recently in speaker recognition, performance degradation due to the channel domain mismatched condition has been actively addressed. However, the mismatches arising from language is yet to be sufficiently addressed. This paper proposes an approach which employs recursive whitening transformation to mitigate the langu...
1
0
0
0
0
0
Learning Representations for Soft Skill Matching
Employers actively look for talents having not only specific hard skills but also various soft skills. To analyze the soft skill demands on the job market, it is important to be able to detect soft skill phrases from job advertisements automatically. However, a naive matching of soft skill phrases can lead to false p...
0
0
0
1
0
0
Time-reversal and spatial reflection symmetry localization anomalies in (2+1)D topological phases of matter
We study a class of anomalies associated with time-reversal and spatial reflection symmetry in (2+1)D topological phases of matter. In these systems, the topological quantum numbers of the quasiparticles, such as the fusion rules and braiding statistics, possess a $\mathbb{Z}_2$ symmetry which can be associated with ...
0
1
0
0
0
0
Extending the modeling of the anisotropic galaxy power spectrum to $k = 0.4 \ h\mathrm{Mpc}^{-1}$
We present a new model for the redshift-space power spectrum of galaxies and demonstrate its accuracy in modeling the monopole, quadrupole, and hexadecapole of the galaxy density field down to scales of $k = 0.4 \ h\mathrm{Mpc}^{-1}$. The model describes the clustering of galaxies in the context of a halo model and t...
0
1
0
0
0
0
Finite rank and pseudofinite groups
It is proven that an infinite finitely generated group cannot be elementarily equivalent to an ultraproduct of finite groups of a given Prüfer rank. Furthermore, it is shown that an infinite finitely generated group of finite Prüfer rank is not pseudofinite.
0
0
1
0
0
0
Thermographic measurements of the spin Peltier effect in metal/yttrium-iron-garnet junction systems
The spin Peltier effect (SPE), heat-current generation due to spin-current injection, in various metal (Pt, W, and Au single layers and Pt/Cu bilayer)/ferrimagnetic insulator (yttrium iron garnet: YIG) junction systems has been investigated by means of a lock-in thermography (LIT) method. The SPE is excited by a spin...
0
1
0
0
0
0
Number-theoretic aspects of 1D localization: "popcorn function" with Lifshitz tails and its continuous approximation by the Dedekind $η$
We discuss the number-theoretic properties of distributions appearing in physical systems when an observable is a quotient of two independent exponentially weighted integers. The spectral density of ensemble of linear polymer chains distributed with the law $\sim f^L$ ($0<f<1$), where $L$ is the chain length, serves ...
0
1
1
0
0
0
Super-Convergence: Very Fast Training of Neural Networks Using Large Learning Rates
In this paper, we describe a phenomenon, which we named "super-convergence", where neural networks can be trained an order of magnitude faster than with standard training methods. The existence of super-convergence is relevant to understanding why deep networks generalize well. One of the key elements of super-conver...
1
0
0
1
0
0
Space of initial conditions for a cubic Hamiltonian system
In this paper we perform the analysis that leads to the space of initial conditions for the Hamiltonian system $q' = p^2 + zq + \alpha$, $p' = -q^2 - zp - \beta$, studied by the author in an earlier article. By compactifying the phase space of the system from $\mathbb{C}^2$ to $\mathbb{CP}^2$ three base points arise ...
0
1
1
0
0
0
Electronic properties of WS$_2$ on epitaxial graphene on SiC(0001)
This work reports an electronic and micro-structural study of an appealing system for optoelectronics: tungsten disulphide WS$_2$ on epitaxial graphene (EG) on SiC(0001). The WS$_2$ is grown via chemical vapor deposition (CVD) onto the EG. Low-energy electron diffraction (LEED) measurements assign the zero-degree ori...
0
1
0
0
0
0
Electrical transport and optical band gap of NiFe$_\textrm{2}$O$_\textrm{x}$ thin films
We fabricated NiFe$_\textrm{2}$O$_\textrm{x}$ thin films on MgAl$_2$O$_4$(001) substrates by reactive dc magnetron co-sputtering varying the oxygen partial pressure during deposition. The fabrication of a variable material with oxygen deficiency leads to controllable electrical and optical properties which would be b...
0
1
0
0
0
0
Towards parallelizable sampling-based Nonlinear Model Predictive Control
This paper proposes a new sampling-based nonlinear model predictive control (MPC) algorithm, with a bound on complexity quadratic in the prediction horizon N and linear in the number of samples. The idea of the proposed algorithm is to use the sequence of predicted inputs from the previous time step as a warm start, ...
1
0
0
0
0
0
Quantum decoherence from entanglement during inflation
We study the primary entanglement effect on the decoherence of fields reduced density matrix which are in interaction with another fields or independent mode functions. We show that the primary entanglement has a significant role in decoherence of the system quantum state. We find that the existence of entanglement c...
0
1
0
0
0
0
Breast density classification with deep convolutional neural networks
Breast density classification is an essential part of breast cancer screening. Although a lot of prior work considered this problem as a task for learning algorithms, to our knowledge, all of them used small and not clinically realistic data both for training and evaluation of their models. In this work, we explore t...
1
0
0
1
0
0
Spatial Integration by a Dielectric Slab Waveguide and its Planar Graphene-based Counterpart
Motivated by the recent progress in analog computing [Science 343, 160 (2014)], a new approach to perform spatial integration is presented using a dielectric slab waveguide. Our approach is indeed based on the fact that the transmission coefficient of a simple dielectric slab waveguide at its mode excitation angle ma...
0
1
0
0
0
0
Modeling the Biological Pathology Continuum with HSIC-regularized Wasserstein Auto-encoders
A crucial challenge in image-based modeling of biomedical data is to identify trends and features that separate normality and pathology. In many cases, the morphology of the imaged object exhibits continuous change as it deviates from normality, and thus a generative model can be trained to model this morphological c...
1
0
0
1
0
0
Control Problems with Vanishing Lie Bracket Arising from Complete Odd Circulant Evolutionary Games
We study an optimal control problem arising from a generalization of rock-paper-scissors in which the number of strategies may be selected from any positive odd number greater than 1 and in which the payoff to the winner is controlled by a control variable $\gamma$. Using the replicator dynamics as the equations of m...
1
0
0
0
0
0
Teaching DevOps in Corporate Environments: An experience report
This paper describes our experience of training a team of developers of an East-European phone service provider. The training experience was structured in two sessions of two days each conducted in different weeks with a gap of about fifteen days. The first session was dedicated to the Continuous Integration Delivery...
1
0
0
0
0
0
WKB solutions of difference equations and reconstruction by the topological recursion
The purpose of this article is to analyze the connection between Eynard-Orantin topological recursion and formal WKB solutions of a $\hbar$-difference equation: $\Psi(x+\hbar)=\left(e^{\hbar\frac{d}{dx}}\right) \Psi(x)=L(x;\hbar)\Psi(x)$ with $L(x;\hbar)\in GL_2( (\mathbb{C}(x))[\hbar])$. In particular, we extend the...
0
1
1
0
0
0
Diagrammatic Exciton Basis Theory of the Photophysics of Pentacene Dimers
Covalently linked acene dimers are of interest as candidates for intramolecular singlet fission. We report many-electron calculations of the energies and wavefunctions of the optical singlets, the lowest triplet exciton and the triplet-triplet biexciton, as well as the final states of excited state absorptions from t...
0
1
0
0
0
0
Developing and evaluating an interactive tutorial on degenerate perturbation theory
We discuss an investigation of student difficulties with degenerate perturbation theory (DPT) carried out in advanced quantum mechanics courses by administering free-response and multiple-choice questions and conducting individual interviews with students. We find that students share many common difficulties related ...
0
1
0
0
0
0
Time optimal sampled-data controls for heat equations
In this paper, we first design a time optimal control problem for the heat equation with sampled-data controls, and then use it to approximate a time optimal control problem for the heat equation with distributed controls. Our design is reasonable from perspective of sampled-data controls. And it might provide a righ...
0
0
1
0
0
0
Malware distributions and graph structure of the Web
Knowledge about the graph structure of the Web is important for understanding this complex socio-technical system and for devising proper policies supporting its future development. Knowledge about the differences between clean and malicious parts of the Web is important for understanding potential treats to its user...
1
0
0
0
0
0
Depth creates no more spurious local minima
We show that for any convex differentiable loss function, a deep linear network has no spurious local minima as long as it is true for the two layer case. When applied to the quadratic loss, our result immediately implies the powerful result in [Kawaguchi 2016] that there is no spurious local minima in deep linear ne...
1
0
0
1
0
0
On the Application of ISO 26262 in Control Design for Automated Vehicles
Research on automated vehicles has experienced an explosive growth over the past decade. A main obstacle to their practical realization, however, is a convincing safety concept. This question becomes ever more important as more sophisticated algorithms are used and the vehicle automation level increases. The field of...
1
0
0
0
0
0
Semi-wavefront solutions in models of collective movements with density-dependent diffusivity
This paper deals with a nonhomogeneous scalar parabolic equation with possibly degenerate diffusion term; the process has only one stationary state. The equation can be interpreted as modeling collective movements (crowd dynamics, for instance). We first prove the existence of semi-wavefront solutions for every wave ...
0
0
1
0
0
0
Self-Regulated Transport in Photonic Crystals with Phase-Changing Defects
Phase changing materials (PCM) are widely used for optical data recording, sensing, all-optical switching, and optical limiting. Our focus here is on the case when the change in the transmission characteristics of the optical material is caused by the input light itself. Specifically, the light-induced heating trigge...
0
1
0
0
0
0
Assessing randomness in case assignment: the case study of the Brazilian Supreme Court
Sortition, i.e., random appointment for public duty, has been employed by societies throughout the years, especially for duties related to the judicial system, as a firewall designated to prevent illegitimate interference between parties in a legal case and agents of the legal system. In judicial systems of modern we...
0
0
0
1
0
0
Particle picture representation of the non-symmetric Rosenblatt process and Hermite processes of any order
We provide a particle picture representation for the non-symmetric Rosenblatt process and for Hermite processes of any order, extending the result of Bojdecki, Gorostiza and Talarczyk in~\cite{FILT}. We show that these processes can be obtained as limits in the sense of finite-dimensional distributions of certain fun...
0
0
1
0
0
0
Houdini: Fooling Deep Structured Prediction Models
Generating adversarial examples is a critical step for evaluating and improving the robustness of learning machines. So far, most existing methods only work for classification and are not designed to alter the true performance measure of the problem at hand. We introduce a novel flexible approach named Houdini for ge...
1
0
0
1
0
0
Don't relax: early stopping for convex regularization
We consider the problem of designing efficient regularization algorithms when regularization is encoded by a (strongly) convex functional. Unlike classical penalization methods based on a relaxation approach, we propose an iterative method where regularization is achieved via early stopping. Our results show that the...
1
0
1
0
0
0
Interplay between social influence and competitive strategical games in multiplex networks
We present a model that takes into account the coupling between evolutionary game dynamics and social influence. Importantly, social influence and game dynamics take place in different domains, which we model as different layers of a multiplex network. We show that the coupling between these dynamical processes can l...
1
1
0
0
0
0
Data Augmentation for Low-Resource Neural Machine Translation
The quality of a Neural Machine Translation system depends substantially on the availability of sizable parallel corpora. For low-resource language pairs this is not the case, resulting in poor translation quality. Inspired by work in computer vision, we propose a novel data augmentation approach that targets low-fre...
1
0
0
0
0
0
A Lagrangian approach to modeling heat flux driven close-contact melting
Close-contact melting refers to the process of a heat source melting its way into a phase-change material. Of special interest is the close-contact melting velocity, or more specifically the relative velocity between the heat source and the phase-change material. In this work, we present a novel numerical approach to...
0
1
0
0
0
0
Spectral Graph Analysis: A Unified Explanation and Modern Perspectives
Complex networks or graphs are ubiquitous in sciences and engineering: biological networks, brain networks, transportation networks, social networks, and the World Wide Web, to name a few. Spectral graph theory provides a set of useful techniques and models for understanding `patterns of interconnectedness' in a grap...
0
0
1
1
0
0
ARMDN: Associative and Recurrent Mixture Density Networks for eRetail Demand Forecasting
Accurate demand forecasts can help on-line retail organizations better plan their supply-chain processes. The challenge, however, is the large number of associative factors that result in large, non-stationary shifts in demand, which traditional time series and regression approaches fail to model. In this paper, we p...
0
0
0
1
0
0
Extreme Dimension Reduction for Handling Covariate Shift
In the covariate shift learning scenario, the training and test covariate distributions differ, so that a predictor's average loss over the training and test distributions also differ. In this work, we explore the potential of extreme dimension reduction, i.e. to very low dimensions, in improving the performance of i...
1
0
0
1
0
0
Landau-Zener transitions for Majorana fermions
One-dimensional systems obtained as low-energy limits of hybrid superconductor-topological insulator devices provide means of production, transport, and destruction of Majorana bound states (MBSs) by variations of the magnetic flux. When two or more pairs of MBSs are present in the intermediate state, there is a poss...
0
1
0
0
0
0
Deep Hyperspherical Learning
Convolution as inner product has been the founding basis of convolutional neural networks (CNNs) and the key to end-to-end visual representation learning. Benefiting from deeper architectures, recent CNNs have demonstrated increasingly strong representation abilities. Despite such improvement, the increased depth and...
1
0
0
1
0
0
Robotic Pick-and-Place of Novel Objects in Clutter with Multi-Affordance Grasping and Cross-Domain Image Matching
This paper presents a robotic pick-and-place system that is capable of grasping and recognizing both known and novel objects in cluttered environments. The key new feature of the system is that it handles a wide range of object categories without needing any task-specific training data for novel objects. To achieve t...
1
0
0
0
0
0
Toward an enumerative geometry with quadratic forms
We develop various aspects of classical enumerative geometry, including Euler characteristics and formulas for counting degenerate fibres in a pencil, with the classical numerical formulas being replaced by identitites in the Grothendieck-Witt group of quadratic forms with coefficients in the base-field.
0
0
1
0
0
0
Robust reputation-based ranking on multipartite rating networks
The spread of online reviews, ratings and opinions and its growing influence on people's behavior and decisions boosted the interest to extract meaningful information from this data deluge. Hence, crowdsourced ratings of products and services gained a critical role in business, governments, and others. We propose a n...
1
0
0
0
0
0
Duality and upper bounds in optimal stochastic control governed by partial differential equations
A dual control problem is presented for the optimal stochastic control of a system governed by partial differential equations. Relationships between the optimal values of the original and the dual problems are investigated and two duality theorems are proved. The dual problem serves to provide upper bounds for the op...
0
0
1
0
0
0
On Sampling from Massive Graph Streams
We propose Graph Priority Sampling (GPS), a new paradigm for order-based reservoir sampling from massive streams of graph edges. GPS provides a general way to weight edge sampling according to auxiliary and/or size variables so as to accomplish various estimation goals of graph properties. In the context of subgraph ...
1
0
1
1
0
0
Optimal Investment, Demand and Arbitrage under Price Impact
This paper studies the optimal investment problem with random endowment in an inventory-based price impact model with competitive market makers. Our goal is to analyze how price impact affects optimal policies, as well as both pricing rules and demand schedules for contingent claims. For exponential market makers pre...
0
0
0
0
0
1
Amplitude Mediated Chimera States with Active and Inactive Oscillators
The emergence and nature of amplitude mediated chimera states, spatio-temporal patterns of co-existing coherent and incoherent regions, are investigated for a globally coupled system of active and inactive Ginzburg-Landau oscillators. The existence domain of such states is found to shrink and shift in parametric spac...
0
1
0
0
0
0
Astronomical random numbers for quantum foundations experiments
Photons from distant astronomical sources can be used as a classical source of randomness to improve fundamental tests of quantum nonlocality, wave-particle duality, and local realism through Bell's inequality and delayed-choice quantum eraser tests inspired by Wheeler's cosmic-scale Mach-Zehnder interferometer gedan...
0
1
0
0
0
0