title
stringlengths
7
239
abstract
stringlengths
7
2.76k
cs
int64
0
1
phy
int64
0
1
math
int64
0
1
stat
int64
0
1
quantitative biology
int64
0
1
quantitative finance
int64
0
1
Evidence for universality in the initial planetesimal mass function
Planetesimals may form from the gravitational collapse of dense particle clumps initiated by the streaming instability. We use simulations of aerodynamically coupled gas-particle mixtures to investigate whether the properties of planetesimals formed in this way depend upon the sizes of the particles that participate ...
0
1
0
0
0
0
On covering systems of integers
A covering system of the integers is a finite collection of modular residue classes $\{a_m \bmod{m}\}_{m \in S}$ whose union is all integers. Given a finite set $S$ of moduli, it is often difficult to tell whether there is a choice of residues modulo elements of $S$ covering the integers. Hough has shown that if the ...
0
0
1
0
0
0
Asymptotically safe cosmology - a status report
Asymptotic Safety, based on a non-Gaussian fixed point of the gravitational renormalization group flow, provides an elegant mechanism for completing the gravitational force at sub-Planckian scales. At high energies the fixed point controls the scaling of couplings such that unphysical divergences are absent while the...
0
1
0
0
0
0
Generalized Earley Parser: Bridging Symbolic Grammars and Sequence Data for Future Prediction
Future predictions on sequence data (e.g., videos or audios) require the algorithms to capture non-Markovian and compositional properties of high-level semantics. Context-free grammars are natural choices to capture such properties, but traditional grammar parsers (e.g., Earley parser) only take symbolic sentences as...
0
0
0
1
0
0
COCrIP: Compliant OmniCrawler In-pipeline Robot
This paper presents a modular in-pipeline climbing robot with a novel compliant foldable OmniCrawler mechanism. The circular cross-section of the OmniCrawler module enables a holonomic motion to facilitate the alignment of the robot in the direction of bends. Additionally, the crawler mechanism provides a fair amount...
1
0
0
0
0
0
An Inversion-Based Learning Approach for Improving Impromptu Trajectory Tracking of Robots with Non-Minimum Phase Dynamics
This paper presents a learning-based approach for impromptu trajectory tracking for non-minimum phase systems, i.e., systems with unstable inverse dynamics. Inversion-based feedforward approaches are commonly used for improving tracking performance; however, these approaches are not directly applicable to non-minimum...
1
0
0
0
0
0
Decay Estimates for 1-D Parabolic PDEs with Boundary Disturbances
In this work decay estimates are derived for the solutions of 1-D linear parabolic PDEs with disturbances at both boundaries and distributed disturbances. The decay estimates are given in the L2 and H1 norms of the solution and discontinuous disturbances are allowed. Although an eigenfunction expansion for the soluti...
1
0
1
0
0
0
GEANT4 Simulation of Nuclear Interaction Induced Soft Errors in Digital Nanoscale Electronics: Interrelation Between Proton and Heavy Ion Impacts
A simple and self-consistent approach has been proposed for simulation of the proton-induced soft error rate based on the heavy ion induced single event upset cross-section data and vice versa. The approach relies on the GEANT4 assisted Monte Carlo simulation of the secondary particle LET spectra produced by nuclear ...
0
1
0
0
0
0
Analysis and Measurement of the Transfer Matrix of a 9-cell 1.3-GHz Superconducting Cavity
Superconducting linacs are capable of producing intense, stable, high-quality electron beams that have found widespread applications in science and industry. The 9-cell 1.3-GHz superconducting standing-wave accelerating RF cavity originally developed for $e^+/e^-$ linear-collider applications [B. Aunes, {\em et al.} ...
0
1
0
0
0
0
Size-aware Sharding For Improving Tail Latencies in In-memory Key-value Stores
This paper introduces the concept of size-aware sharding to improve tail latencies for in-memory key-value stores, and describes its implementation in the Minos key-value store. Tail latencies are crucial in distributed applications with high fan-out ratios, because overall response time is determined by the slowest ...
1
0
0
0
0
0
Abell 2744 may be a supercluster aligned along the sightline
To explain the unusual richness and compactness of the Abell 2744, we propose a hypothesis that it may be a rich supercluster aligned along the sightline, and present a supporting evidence obtained numerically from the MultiDark Planck 2 simulations with a linear box size of $1\,h^{-1}$Gpc. Applying the friends-of-fr...
0
1
0
0
0
0
Classification of Pressure Gradient of Human Common Carotid Artery and Ascending Aorta on the Basis of Age and Gender
The current work is done to see which artery has more chance of having cardiovascular diseases by measuring value of pressure gradient in the common carotid artery (CCA) and ascending aorta according to age and gender. Pressure gradient is determined in the CCA and ascending aorta of presumed healthy volunteers, havi...
0
1
0
0
0
0
Second-order and local characteristics of network intensity functions
The last decade has witnessed an increase of interest in the spatial analysis of structured point patterns over networks whose analysis is challenging because of geometrical complexities and unique methodological problems. In this context, it is essential to incorporate the network specificity into the analysis as th...
0
0
0
1
0
0
Modeling of hysteresis loop and its applications in ferroelectric materials
In order to understand the physical hysteresis loops clearly, we constructed a novel model, which is combined with the electric field, the temperature, and the stress as one synthetically parameter. This model revealed the shape of hysteresis loop was determined by few variables in ferroelectric materials: the satura...
0
1
0
0
0
0
Online Factorization and Partition of Complex Networks From Random Walks
Finding the reduced-dimensional structure is critical to understanding complex networks. Existing approaches such as spectral clustering are applicable only when the full network is explicitly observed. In this paper, we focus on the online factorization and partition of implicit large-scale networks based on observa...
1
0
1
1
0
0
Powerful genome-wide design and robust statistical inference in two-sample summary-data Mendelian randomization
Two-sample summary-data Mendelian randomization (MR) has become a popular research design to estimate the causal effect of risk exposures. With the sample size of GWAS continuing to increase, it is now possible to utilize genetic instruments that are only weakly associated with the exposure. To maximize the statistic...
0
0
0
1
0
0
A Benchmark on Reliability of Complex Discrete Systems: Emergency Power Supply of a Nuclear Power Plant
This paper contains two parts: the description of a real electrical system, with many redundancies, reconfigurations and repairs, then the description of a reliability model of this system, based on the BDMP (Boolean logic Driven Markov Processes) formalism and partial results of a reliability and availability calcul...
1
0
0
0
0
0
Riemannian Gaussian distributions on the space of positive-definite quaternion matrices
Recently, Riemannian Gaussian distributions were defined on spaces of positive-definite real and complex matrices. The present paper extends this definition to the space of positive-definite quaternion matrices. In order to do so, it develops the Riemannian geometry of the space of positive-definite quaternion matric...
0
0
1
1
0
0
Analisis of the power flow in Low Voltage DC grids
Power flow in a low voltage direct current grid (LVDC) is a non-linear problem just as its counterpart ac. This paper demonstrates that, unlike in ac grids, convergence and uniqueness of the solution can be guaranteed in this type of grids. The result is not a linearization nor an approximation, but an analysis of th...
0
0
1
0
0
0
Multi-scale bilinear restriction estimates for general phases
We prove (adjoint) bilinear restriction estimates for general phases at different scales in the full non-endpoint mixed norm range, and give bounds with a sharp and explicit dependence on the phases. These estimates have applications to high-low frequency interactions for solutions to partial differential equations, ...
0
0
1
0
0
0
Program algebra for Turing-machine programs
This note presents an algebraic theory of instruction sequences with instructions for Turing tapes as basic instructions, the behaviours produced by the instruction sequences concerned under execution, and the interaction between such behaviours and the Turing tapes provided by an execution environment. This theory p...
1
0
0
0
0
0
CTD: Fast, Accurate, and Interpretable Method for Static and Dynamic Tensor Decompositions
How can we find patterns and anomalies in a tensor, or multi-dimensional array, in an efficient and directly interpretable way? How can we do this in an online environment, where a new tensor arrives each time step? Finding patterns and anomalies in a tensor is a crucial problem with many applications, including buil...
1
0
0
1
0
0
Memory Augmented Control Networks
Planning problems in partially observable environments cannot be solved directly with convolutional networks and require some form of memory. But, even memory networks with sophisticated addressing schemes are unable to learn intelligent reasoning satisfactorily due to the complexity of simultaneously learning to acc...
1
0
0
0
0
0
Community Recovery in a Preferential Attachment Graph
A message passing algorithm is derived for recovering communities within a graph generated by a variation of the Barabási-Albert preferential attachment model. The estimator is assumed to know the arrival times, or order of attachment, of the vertices. The derivation of the algorithm is based on belief propagation un...
1
0
0
1
0
0
The descriptive look at the size of subsets of groups
We explore the Borel complexity of some basic families of subsets of a countable group (large, small, thin, sparse and other) defined by the size of their elements. Applying the obtained results to the Stone-Čech compactification $\beta G$ of $G$, we prove, in particular, that the closure of the minimal ideal of $\be...
0
0
1
0
0
0
The Impact of Antenna Height Difference on the Performance of Downlink Cellular Networks
Capable of significantly reducing cell size and enhancing spatial reuse, network densification is shown to be one of the most dominant approaches to expand network capacity. Due to the scarcity of available spectrum resources, nevertheless, the over-deployment of network infrastructures, e.g., cellular base stations ...
1
0
0
0
0
0
Spin-wave propagation in cubic anisotropic materials
The information carrier of modern technologies is the electron charge whose transport inevitably generates Joule heating. Spin-waves, the collective precessional motion of electron spins, do not involve moving charges and thus avoid Joule heating. In this respect, magnonic devices in which the information is carried ...
0
1
0
0
0
0
Relaxing Exclusive Control in Boolean Games
In the typical framework for boolean games (BG) each player can change the truth value of some propositional atoms, while attempting to make her goal true. In standard BG goals are propositional formulas, whereas in iterated BG goals are formulas of Linear Temporal Logic. Both notions of BG are characterised by the f...
1
0
0
0
0
0
Representing de Rham cohomology classes on an open Riemann surface by holomorphic forms
Let $X$ be a connected open Riemann surface. Let $Y$ be an Oka domain in the smooth locus of an analytic subvariety of $\mathbb C^n$, $n\geq 1$, such that the convex hull of $Y$ is all of $\mathbb C^n$. Let $\mathscr O_*(X, Y)$ be the space of nondegenerate holomorphic maps $X\to Y$. Take a holomorphic $1$-form $\the...
0
0
1
0
0
0
Unidirectional control of optically induced spin waves
Unidirectional control of optically induced spin waves in a rare-earth iron garnet crystal is demonstrated. We observed the interference of two spin-wave packets with different initial phases generated by circularly polarized light pulses. This interference results in unidirectional propagation if the spin-wave sourc...
0
1
0
0
0
0
Value Prediction Network
This paper proposes a novel deep reinforcement learning (RL) architecture, called Value Prediction Network (VPN), which integrates model-free and model-based RL methods into a single neural network. In contrast to typical model-based RL methods, VPN learns a dynamics model whose abstract states are trained to make op...
1
0
0
0
0
0
Scalable Generalized Linear Bandits: Online Computation and Hashing
Generalized Linear Bandits (GLBs), a natural extension of the stochastic linear bandits, has been popular and successful in recent years. However, existing GLBs scale poorly with the number of rounds and the number of arms, limiting their utility in practice. This paper proposes new, scalable solutions to the GLB pro...
1
0
0
1
0
0
Dome of magnetic order inside the nematic phase of sulfur-substituted FeSe under pressure
The pressure dependence of the structural, magnetic and superconducting transitions and of the superconducting upper critical field were studied in sulfur-substituted Fe(Se$_{1-x}$S$_{x}$). Resistance measurements were performed on single crystals with three substitution levels ($x$=0.043, 0.096, 0.12) under hydrosta...
0
1
0
0
0
0
ConceptNet at SemEval-2017 Task 2: Extending Word Embeddings with Multilingual Relational Knowledge
This paper describes Luminoso's participation in SemEval 2017 Task 2, "Multilingual and Cross-lingual Semantic Word Similarity", with a system based on ConceptNet. ConceptNet is an open, multilingual knowledge graph that focuses on general knowledge that relates the meanings of words and phrases. Our submission to Se...
1
0
0
0
0
0
The symmetrized topological complexity of the circle
We determine the symmetrized topological complexity of the circle, using primarily just general topology.
0
0
1
0
0
0
Intertwining operators among twisted modules associated to not-necessarily-commuting automorphisms
We introduce intertwining operators among twisted modules or twisted intertwining operators associated to not-necessarily-commuting automorphisms of a vertex operator algebra. Let $V$ be a vertex operator algebra and let $g_{1}$, $g_{2}$ and $g_{3}$ be automorphisms of $V$. We prove that for $g_{1}$-, $g_{2}$- and $g...
0
0
1
0
0
0
Enabling Visual Design Verification Analytics - From Prototype Visualizations to an Analytics Tool using the Unity Game Engine
The ever-increasing architectural complexity in contemporary ASIC projects turns Design Verification (DV) into a highly advanced endeavor. Pressing needs for short time-to-market has made automation a key solution in DV. However, recurring execution of large regression suites inevitably leads to challenging amounts o...
1
0
0
0
0
0
Self-regulation promotes cooperation in social networks
Cooperative behavior in real social dilemmas is often perceived as a phenomenon emerging from norms and punishment. To overcome this paradigm, we highlight the interplay between the influence of social networks on individuals, and the activation of spontaneous self-regulating mechanisms, which may lead them to behave...
1
0
0
0
0
0
Magnetic properties of nanoparticles compacts with controlled broadening of the particle size distribution
Binary random compacts with different proportions of small (volume V) and large (volume 2V) bare maghemite nanoparticles (NPs) are used to investigate the effect of controllably broadening the particle size distribution on the magnetic properties of magnetic NP assemblies with strong dipolar interaction. A series of ...
0
1
0
0
0
0
A Generative Model for Exploring Structure Regularities in Attributed Networks
Many real-world networks known as attributed networks contain two types of information: topology information and node attributes. It is a challenging task on how to use these two types of information to explore structural regularities. In this paper, by characterizing potential relationship between link communities a...
1
0
0
0
0
0
On the maximal halfspace depth of permutation-invariant distributions on the simplex
We compute the maximal halfspace depth for a class of permutation-invariant distributions on the probability simplex. The derivations are based on stochastic ordering results that so far were only showed to be relevant for the Behrens-Fisher problem.
0
0
1
1
0
0
Theoretical Evaluation of Li et al.'s Approach for Improving a Binary Watermark-Based Scheme in Remote Sensing Data Communications
This letter is about a principal weakness of the published article by Li et al. in 2014. It seems that the mentioned work has a terrible conceptual mistake while presenting its theoretical approach. In fact, the work has tried to design a new attack and its effective solution for a basic watermarking algorithm by Zhu...
1
0
0
0
0
0
Bioinformatics and Medicine in the Era of Deep Learning
Many of the current scientific advances in the life sciences have their origin in the intensive use of data for knowledge discovery. In no area this is so clear as in bioinformatics, led by technological breakthroughs in data acquisition technologies. It has been argued that bioinformatics could quickly become the fi...
0
0
0
1
1
0
A Weakly Supervised Approach to Train Temporal Relation Classifiers and Acquire Regular Event Pairs Simultaneously
Capabilities of detecting temporal relations between two events can benefit many applications. Most of existing temporal relation classifiers were trained in a supervised manner. Instead, we explore the observation that regular event pairs show a consistent temporal relation despite of their various contexts, and the...
1
0
0
0
0
0
Privacy with Estimation Guarantees
We study the central problem in data privacy: how to share data with an analyst while providing both privacy and utility guarantees to the user that owns the data. In this setting, we present an estimation-theoretic analysis of the privacy-utility trade-off (PUT). Here, an analyst is allowed to reconstruct (in a mean...
1
0
0
0
0
0
A line of CFTs: from generalized free fields to SYK
We point out that there is a simple variant of the SYK model, which we call cSYK, that is $SL(2,R)$ invariant for all values of the coupling. The modification consists of replacing the UV part of the SYK action with a quadratic bilocal term. The corresponding bulk dual is a non-gravitational theory in a rigid AdS$_2$...
0
1
0
0
0
0
Miura transformations for discrete Painlevé equations coming from the affine E$_8$ Weyl group
We derive integrable equations starting from autonomous mappings with a general form inspired by the additive systems associated to the affine Weyl group E$_8^{(1)}$. By deautonomisation we obtain two hitherto unknown systems, one of which turns out to be a linearisable one, and we show that both these systems arise ...
0
1
1
0
0
0
Virtual Molecular Dynamics
Molecular dynamics is based on solving Newton's equations for many-particle systems that evolve along complex, highly fluctuating trajectories. The orbital instability and short-time complexity of Newtonian orbits is in sharp contrast to the more coherent behavior of collective modes such as density profiles. The not...
0
1
0
0
0
0
Regression with genuinely functional errors-in-covariates
Contamination of covariates by measurement error is a classical problem in multivariate regression, where it is well known that failing to account for this contamination can result in substantial bias in the parameter estimators. The nature and degree of this effect on statistical inference is also understood to cruc...
0
0
0
1
0
0
The distance between a naive cumulative estimator and its least concave majorant
We consider the process $\widehat\Lambda_n-\Lambda_n$, where $\Lambda_n$ is a cadlag step estimator for the primitive $\Lambda$ of a nonincreasing function $\lambda$ on $[0,1]$, and $\widehat\Lambda_n$ is the least concave majorant of $\Lambda_n$. We extend the results in Kulikov and Lopuhaä (2006, 2008) to the gener...
0
0
1
1
0
0
Controllability of impulse controlled systems of heat equations coupled by constant matrices
This paper studies the approximate and null controllability for impulse controlled systems of heat equations coupled by a pair (A,B) of constant matrices. We present a necessary and sufficient condition for the approximate controllability, which is exactly Kalman's controllability rank condition of (A,B). We prove th...
0
0
1
0
0
0
Nearly Optimal Constructions of PIR and Batch Codes
In this work we study two families of codes with availability, namely private information retrieval (PIR) codes and batch codes. While the former requires that every information symbol has $k$ mutually disjoint recovering sets, the latter asks this property for every multiset request of $k$ information symbols. The m...
1
0
0
0
0
0
Submillimeter Array CO(2-1) Imaging of the NGC 6946 Giant Molecular Clouds
We present a CO(2-1) mosaic map of the spiral galaxy NGC 6946 by combining data from the Submillimeter Array and the IRAM 30 m telescope. We identify 390 giant molecular clouds (GMCs) from the nucleus to 4.5 kpc in the disk. GMCs in the inner 1 kpc are generally more luminous and turbulent, some of which have luminos...
0
1
0
0
0
0
Optical and Near-Infrared Spectra of sigma Orionis Isolated Planetary-mass Objects
We have obtained low-resolution optical (0.7-0.98 micron) and near-infrared (1.11-1.34 micron and 0.8-2.5 micron) spectra of twelve isolated planetary-mass candidates (J = 18.2-19.9 mag) of the 3-Myr sigma Orionis star cluster with a view to determining the spectroscopic properties of very young, substellar dwarfs an...
0
1
0
0
0
0
The Blackbird Dataset: A large-scale dataset for UAV perception in aggressive flight
The Blackbird unmanned aerial vehicle (UAV) dataset is a large-scale, aggressive indoor flight dataset collected using a custom-built quadrotor platform for use in evaluation of agile perception.Inspired by the potential of future high-speed fully-autonomous drone racing, the Blackbird dataset contains over 10 hours ...
1
0
0
0
0
0
An integration of fast alignment and maximum-likelihood methods for electron subtomogram averaging and classification
Motivation: Cellular Electron CryoTomography (CECT) is an emerging 3D imaging technique that visualizes subcellular organization of single cells at submolecular resolution and in near-native state. CECT captures large numbers of macromolecular complexes of highly diverse structures and abundances. However, the struct...
0
0
0
1
1
0
Local and global existence of solutions to a strongly damped wave equation of the $p$-Laplacian type
This article focuses on a quasilinear wave equation of $p$-Laplacian type: $$ u_{tt} - \Delta_p u - \Delta u_t=0$$ in a bounded domain $\Omega\subset\mathbb{R}^3$ with a sufficiently smooth boundary $\Gamma=\partial\Omega$ subject to a generalized Robin boundary condition featuring boundary damping and a nonlinear so...
0
0
1
0
0
0
Quasi-flat representations of uniform groups and quantum groups
Given a discrete group $\Gamma=<g_1,\ldots,g_M>$ and a number $K\in\mathbb N$, a unitary representation $\rho:\Gamma\to U_K$ is called quasi-flat when the eigenvalues of each $\rho(g_i)\in U_K$ are uniformly distributed among the $K$-th roots of unity. The quasi-flat representations of $\Gamma$ form altogether a para...
0
0
1
0
0
0
Nonparametric Preference Completion
We consider the task of collaborative preference completion: given a pool of items, a pool of users and a partially observed item-user rating matrix, the goal is to recover the \emph{personalized ranking} of each user over all of the items. Our approach is nonparametric: we assume that each item $i$ and each user $u$...
1
0
0
1
0
0
Real-Time Reconstruction of Counting Process through Queues
For the emerging Internet of Things (IoT), one of the most critical problems is the real-time reconstruction of signals from a set of aged measurements. During the reconstruction, distortion occurs between the observed signal and the reconstructed signal due to sampling and transmission. In this paper, we focus on mi...
1
0
0
0
0
0
Discrepancy-Based Algorithms for Non-Stationary Rested Bandits
We study the multi-armed bandit problem where the rewards are realizations of general non-stationary stochastic processes, a setting that generalizes many existing lines of work and analyses. In particular, we present a theoretical analysis and derive regret guarantees for rested bandits in which the reward distribut...
1
0
0
0
0
0
Kondo lattice heavy fermion behavior in CeRh2Ga2
The physical properties of an intermetallic compound CeRh2Ga2 have been investigated by magnetic susceptibility \chi(T), isothermal magnetization M(H), heat capacity C_p(T), electrical resistivity \rho(T), thermal conductivity \kappa(T) and thermopower S(T) measurements. CeRh2Ga2 is found to crystallize with CaBe2Ge2...
0
1
0
0
0
0
Khovanov homology and periodic links
Based on the results of the second author, we define an equivariant version of Lee and Bar-Natan homology for periodic links and show that there exists an equivariant spectral sequence from the equivariant Khovanov homology to equivariant Lee homology. As a result we obtain new obstructions for a link to be periodic....
0
0
1
0
0
0
A Note on Spectral Clustering and SVD of Graph Data
Spectral clustering and Singular Value Decomposition (SVD) are both widely used technique for analyzing graph data. In this note, I will present their connections using simple linear algebra, aiming to provide some in-depth understanding for future research.
1
0
0
0
0
0
An explicit analysis of the entropic penalty in linear programming
Solving linear programs by using entropic penalization has recently attracted new interest in the optimization community, since this strategy forms the basis for the fastest-known algorithms for the optimal transport problem, with many applications in modern large-scale machine learning. Crucial to these applications...
0
0
0
1
0
0
Deconstructing the Tail at Scale Effect Across Network Protocols
Network latencies have become increasingly important for the performance of web servers and cloud computing platforms. Identifying network-related tail latencies and reasoning about their potential causes is especially important to gauge application run-time in online data-intensive applications, where the 99th perce...
1
0
0
0
0
0
Deep Neural Generative Model of Functional MRI Images for Psychiatric Disorder Diagnosis
Accurate diagnosis of psychiatric disorders plays a critical role in improving quality of life for patients and potentially supports the development of new treatments. Many studies have been conducted on machine learning techniques that seek brain imaging data for specific biomarkers of disorders. These studies have ...
1
0
0
1
0
0
Deep Learning for Patient-Specific Kidney Graft Survival Analysis
An accurate model of patient-specific kidney graft survival distributions can help to improve shared-decision making in the treatment and care of patients. In this paper, we propose a deep learning method that directly models the survival function instead of estimating the hazard function to predict survival times fo...
1
0
0
1
0
0
When is a Network a Network? Multi-Order Graphical Model Selection in Pathways and Temporal Networks
We introduce a framework for the modeling of sequential data capturing pathways of varying lengths observed in a network. Such data are important, e.g., when studying click streams in information networks, travel patterns in transportation systems, information cascades in social networks, biological pathways or time-...
1
1
0
0
0
0
Outlier-robust moment-estimation via sum-of-squares
We develop efficient algorithms for estimating low-degree moments of unknown distributions in the presence of adversarial outliers. The guarantees of our algorithms improve in many cases significantly over the best previous ones, obtained in recent works of Diakonikolas et al, Lai et al, and Charikar et al. We also s...
1
0
0
1
0
0
Clustering High Dimensional Dynamic Data Streams
We present data streaming algorithms for the $k$-median problem in high-dimensional dynamic geometric data streams, i.e. streams allowing both insertions and deletions of points from a discrete Euclidean space $\{1, 2, \ldots \Delta\}^d$. Our algorithms use $k \epsilon^{-2} poly(d \log \Delta)$ space/time and maintai...
1
0
0
0
0
0
Edge contact angle and modified Kelvin equation for condensation in open pores
We consider capillary condensation transitions occurring in open slits of width $L$ and finite height $H$ immersed in a reservoir of vapour. In this case the pressure at which condensation occurs is closer to saturation compared to that occurring in an infinite slit ($H=\infty$) due to the presence of two menisci whi...
0
1
0
0
0
0
Thresholds for hanger slackening and cable shortening in the Melan equation for suspension bridges
The Melan equation for suspension bridges is derived by assuming small displacements of the deck and inextensible hangers. We determine the thresholds for the validity of the Melan equation when the hangers slacken, thereby violating the inextensibility assumption. To this end, we preliminarily study the possible sho...
0
1
1
0
0
0
Bendable Cuboid Robot Path Planning with Collision Avoidance using Generalized $L_p$ Norms
Optimal path planning problems for rigid and deformable (bendable) cuboid robots are considered by providing an analytic safety constraint using generalized $L_p$ norms. For regular cuboid robots, level sets of weighted $L_p$ norms generate implicit approximations of their surfaces. For bendable cuboid robots a weigh...
1
0
0
0
0
0
Quotients of triangulated categories and Equivalences of Buchweitz, Orlov and Amiot--Guo--Keller
We give a sufficient condition for a Verdier quotient $\ct/\cs$ of a triangulated category $\ct$ by a thick subcategory $\cs$ to be realized inside of $\ct$ as an ideal quotient. As applications, we deduce three significant results by Buchweitz, Orlov and Amiot--Guo--Keller.
0
0
1
0
0
0
Sorting sums of binary decision summands
A sum where each of the $N$ summands can be independently chosen from two choices yields $2^N$ possible summation outcomes. There is an $\mathcal{O}(K^2)$-algorithm that finds the $K$ smallest/largest of these sums by evading the enumeration of all sums.
1
0
0
0
0
0
A Pursuit of Temporal Accuracy in General Activity Detection
Detecting activities in untrimmed videos is an important but challenging task. The performance of existing methods remains unsatisfactory, e.g., they often meet difficulties in locating the beginning and end of a long complex action. In this paper, we propose a generic framework that can accurately detect a wide vari...
1
0
0
0
0
0
Adjusting systematic bias in high dimensional principal component scores
Principal component analysis continues to be a powerful tool in dimension reduction of high dimensional data. We assume a variance-diverging model and use the high-dimension, low-sample-size asymptotics to show that even though the principal component directions are not consistent, the sample and prediction principal...
0
0
1
1
0
0
Dynamical Exploration of Amplitude Bistability in Engineered Quantum Systems
Nonlinear systems, whose outputs are not directly proportional to their inputs, are well known to exhibit many interesting and important phenomena which have profoundly changed our technological landscape over the last 50 years. Recently the ability to engineer quantum metamaterials through hybridisation has allowed ...
0
1
0
0
0
0
Map Memorization and Forgetting in the IARA Autonomous Car
In this work, we present a novel strategy for correcting imperfections in occupancy grid maps called map decay. The objective of map decay is to correct invalid occupancy probabilities of map cells that are unobservable by sensors. The strategy was inspired by an analogy between the memory architecture believed to ex...
1
0
0
0
0
0
Effective Subgroup Separability of Finitely Generated Nilpotent Groups
This paper studies effective separability for subgroups of finitely generated nilpotent groups and more broadly effective subgroup separability of finitely generated nilpotent groups. We provide upper and lower bounds that are polynomial with respect to the logarithm of the word length for infinite index subgroups of...
0
0
1
0
0
0
External Prior Guided Internal Prior Learning for Real-World Noisy Image Denoising
Most of existing image denoising methods learn image priors from either external data or the noisy image itself to remove noise. However, priors learned from external data may not be adaptive to the image to be denoised, while priors learned from the given noisy image may not be accurate due to the interference of co...
1
0
0
0
0
0
A Study of MAC Address Randomization in Mobile Devices and When it Fails
MAC address randomization is a privacy technique whereby mobile devices rotate through random hardware addresses in order to prevent observers from singling out their traffic or physical location from other nearby devices. Adoption of this technology, however, has been sporadic and varied across device manufacturers....
1
0
0
0
0
0
Completion of the integrable coupling systems
In this paper, we proposed an procedure to construct the completion of the integrable system by adding a perturbation to the generalized matrix problem, which can be used to continuous integrable couplings, discrete integrable couplings and super integrable couplings. As example, we construct the completion of the Ka...
0
1
0
0
0
0
On the wildness of cambrian lattices
In this note, we investigate the representation type of the cambrian lattices and some other related lattices. The result is expressed as a very simple trichotomy. When the rank of the underlined Coxeter group is at most 2, the lattices are of finite representation type. When the Coxeter group is a reducible group of...
0
0
1
0
0
0
Random Projections For Large-Scale Regression
Fitting linear regression models can be computationally very expensive in large-scale data analysis tasks if the sample size and the number of variables are very large. Random projections are extensively used as a dimension reduction tool in machine learning and statistics. We discuss the applications of random proje...
0
0
1
1
0
0
Properties of linear groups with restricted unipotent elements
We consider linear groups which do not contain unipotent elements of infinite order, which includes all linear groups in positive characteristic, and show that this class of groups has good properties which resemble those held by groups of non positive curvature and which do not hold for arbitrary characteristic zero...
0
0
1
0
0
0
Sparse Approximation of 3D Meshes using the Spectral Geometry of the Hamiltonian Operator
The discrete Laplace operator is ubiquitous in spectral shape analysis, since its eigenfunctions are provably optimal in representing smooth functions defined on the surface of the shape. Indeed, subspaces defined by its eigenfunctions have been utilized for shape compression, treating the coordinates as smooth funct...
1
0
0
0
0
0
Improved Convergence Rates for Distributed Resource Allocation
In this paper, we develop a class of decentralized algorithms for solving a convex resource allocation problem in a network of $n$ agents, where the agent objectives are decoupled while the resource constraints are coupled. The agents communicate over a connected undirected graph, and they want to collaboratively det...
1
0
1
0
0
0
Sensory Metrics of Neuromechanical Trust
Today digital sources supply an unprecedented component of human sensorimotor data, the consumption of which is correlated with poorly understood maladies such as Internet Addiction Disorder and Internet Gaming Disorder. This paper offers a mathematical understanding of human sensorimotor processing as multiscale, co...
0
1
0
0
0
0
Quantum algorithms for training Gaussian Processes
Gaussian processes (GPs) are important models in supervised machine learning. Training in Gaussian processes refers to selecting the covariance functions and the associated parameters in order to improve the outcome of predictions, the core of which amounts to evaluating the logarithm of the marginal likelihood (LML)...
0
0
0
1
0
0
Detecting Oriented Text in Natural Images by Linking Segments
Most state-of-the-art text detection methods are specific to horizontal Latin text and are not fast enough for real-time applications. We introduce Segment Linking (SegLink), an oriented text detection method. The main idea is to decompose text into two locally detectable elements, namely segments and links. A segmen...
1
0
0
0
0
0
Factorizable Module Algebras
The aim of this paper is to introduce and study a large class of $\mathfrak{g}$-module algebras which we call factorizable by generalizing the Gauss factorization of (square or rectangular) matrices. This class includes coordinate algebras of corresponding reductive groups $G$, their parabolic subgroups, basic affine...
0
0
1
0
0
0
Simultaneous Feature and Body-Part Learning for Real-Time Robot Awareness of Human Behaviors
Robot awareness of human actions is an essential research problem in robotics with many important real-world applications, including human-robot collaboration and teaming. Over the past few years, depth sensors have become a standard device widely used by intelligent robots for 3D perception, which can also offer hum...
1
0
0
0
0
0
Off-diagonal estimates of some Bergman-type operators on tube domains over symmetric cones
We obtain some necessary and sufficient conditions for the boundedness of a family of positive operators defined on symmetric cones, we then deduce off-diagonal boundedness of associated Bergman-type operators in tube domains over symmetric cones.
0
0
1
0
0
0
Provenance and Pseudo-Provenance for Seeded Learning-Based Automated Test Generation
Many methods for automated software test generation, including some that explicitly use machine learning (and some that use ML more broadly conceived) derive new tests from existing tests (often referred to as seeds). Often, the seed tests from which new tests are derived are manually constructed, or at least simpler...
1
0
0
1
0
0
Learning Solving Procedure for Artificial Neural Network
It is expected that progress toward true artificial intelligence will be achieved through the emergence of a system that integrates representation learning and complex reasoning (LeCun et al. 2015). In response to this prediction, research has been conducted on implementing the symbolic reasoning of a von Neumann com...
1
0
0
0
0
0
On primordial black holes from an inflection point
Recently, it has been claimed that inflationary models with an inflection point in the scalar potential can produce a large resonance in the power spectrum of curvature perturbation. In this paper however we show that the previous analyses are incorrect. The reason is twofold: firstly, the inflaton is over-shot from ...
0
1
0
0
0
0
Dropout as a Low-Rank Regularizer for Matrix Factorization
Regularization for matrix factorization (MF) and approximation problems has been carried out in many different ways. Due to its popularity in deep learning, dropout has been applied also for this class of problems. Despite its solid empirical performance, the theoretical properties of dropout as a regularizer remain ...
1
0
0
1
0
0
Introduction to a Temporal Graph Benchmark
A temporal graph is a data structure, consisting of nodes and edges in which the edges are associated with time labels. To analyze the temporal graph, the first step is to find a proper graph dataset/benchmark. While many temporal graph datasets exist online, none could be found that used the interval labels in which...
1
1
0
0
0
0