title
stringlengths
7
239
abstract
stringlengths
7
2.76k
cs
int64
0
1
phy
int64
0
1
math
int64
0
1
stat
int64
0
1
quantitative biology
int64
0
1
quantitative finance
int64
0
1
Statistical Inference with Local Optima
We study the statistical properties of an estimator derived by applying a gradient ascent method with multiple initializations to a multi-modal likelihood function. We derive the population quantity that is the target of this estimator and study the properties of confidence intervals (CIs) constructed from asymptotic...
0
0
0
1
0
0
Discovery of Shifting Patterns in Sequence Classification
In this paper, we investigate the multi-variate sequence classification problem from a multi-instance learning perspective. Real-world sequential data commonly show discriminative patterns only at specific time periods. For instance, we can identify a cropland during its growing season, but it looks similar to a barr...
1
0
0
1
0
0
Virtual Network Migration on the GENI Wide-Area SDN-Enabled Infrastructure
A virtual network (VN) contains a collection of virtual nodes and links assigned to underlying physical resources in a network substrate. VN migration is the process of remapping a VN's logical topology to a new set of physical resources to provide failure recovery, energy savings, or defense against attack. Providin...
1
0
0
0
0
0
Communication-efficient Algorithm for Distributed Sparse Learning via Two-way Truncation
We propose a communicationally and computationally efficient algorithm for high-dimensional distributed sparse learning. At each iteration, local machines compute the gradient on local data and the master machine solves one shifted $l_1$ regularized minimization problem. The communication cost is reduced from constan...
0
0
0
1
0
0
A Bayesian Estimation for the Fractional Order of the Differential Equation that Models Transport in Unconventional Hydrocarbon Reservoirs
The extraction of natural gas from the earth has been shown to be governed by differential equations concerning flow through a porous material. Recently, models such as fractional differential equations have been developed to model this phenomenon. One key issue with these models is estimating the fraction of the dif...
0
0
0
1
0
0
Numerical simulations of magnetic billiards in a convex domain in $\mathbb{R}^2$
We present numerical simulations of magnetic billiards inside a convex domain in the plane.
0
1
1
0
0
0
On Lasso refitting strategies
A well-know drawback of l_1-penalized estimators is the systematic shrinkage of the large coefficients towards zero. A simple remedy is to treat Lasso as a model-selection procedure and to perform a second refitting step on the selected support. In this work we formalize the notion of refitting and provide oracle bou...
0
0
1
1
0
0
Supercharacters and the discrete Fourier, cosine, and sine transforms
Using supercharacter theory, we identify the matrices that are diagonalized by the discrete cosine and discrete sine transforms, respectively. Our method affords a combinatorial interpretation for the matrix entries.
0
0
1
0
0
0
A connection between MAX $κ$-CUT and the inhomogeneous Potts spin glass in the large degree limit
We study the asymptotic behavior of the Max $\kappa$-cut on a family of sparse, inhomogeneous random graphs. In the large degree limit, the leading term is a variational problem, involving the ground state of a constrained inhomogeneous Potts spin glass. We derive a Parisi type formula for the free energy of this mod...
0
0
1
0
0
0
Kernel method for persistence diagrams via kernel embedding and weight factor
Topological data analysis is an emerging mathematical concept for characterizing shapes in multi-scale data. In this field, persistence diagrams are widely used as a descriptor of the input data, and can distinguish robust and noisy topological properties. Nowadays, it is highly desired to develop a statistical frame...
0
0
1
1
0
0
Time Complexity of Constraint Satisfaction via Universal Algebra
The exponential-time hypothesis (ETH) states that 3-SAT is not solvable in subexponential time, i.e. not solvable in O(c^n) time for arbitrary c > 1, where n denotes the number of variables. Problems like k-SAT can be viewed as special cases of the constraint satisfaction problem (CSP), which is the problem of determ...
1
0
0
0
0
0
Novel Structured Low-rank algorithm to recover spatially smooth exponential image time series
We propose a structured low rank matrix completion algorithm to recover a time series of images consisting of linear combination of exponential parameters at every pixel, from under-sampled Fourier measurements. The spatial smoothness of these parameters is exploited along with the exponential structure of the time s...
1
0
0
0
0
0
Vector bundles and modular forms for Fuchsian groups of genus zero
This article lays the foundations for the study of modular forms transforming with respect to representations of Fuchsian groups of genus zero. More precisely, we define geometrically weighted graded modules of such modular forms, where the graded structure comes from twisting with all isomorphism classes of line bun...
0
0
1
0
0
0
Indoor UAV scheduling with Restful Task Assignment Algorithm
Research in UAV scheduling has obtained an emerging interest from scientists in the optimization field. When the scheduling itself has established a strong root since the 19th century, works on UAV scheduling in indoor environment has come forth in the latest decade. Several works on scheduling UAV operations in indo...
1
0
0
0
0
0
Magnetic behavior of new compounds, Gd3RuSn6 and Tb3RuSn6
We report temperature (T) dependence of dc magnetization, electrical resistivity (rho(T)), and heat-capacity of rare-earth (R) compounds, Gd3RuSn6 and Tb3RuSn6, which are found to crystallize in the Yb3CoSn6-type orthorhombic structure (space group: Cmcm). The results establish that there is an onset of antiferromagn...
0
1
0
0
0
0
Stochastic Assume-Guarantee Contracts for Cyber-Physical System Design Under Probabilistic Requirements
We develop an assume-guarantee contract framework for the design of cyber-physical systems, modeled as closed-loop control systems, under probabilistic requirements. We use a variant of signal temporal logic, namely, Stochastic Signal Temporal Logic (StSTL) to specify system behaviors as well as contract assumptions ...
1
0
0
0
0
0
Ergodic Exploration of Distributed Information
This paper presents an active search trajectory synthesis technique for autonomous mobile robots with nonlinear measurements and dynamics. The presented approach uses the ergodicity of a planned trajectory with respect to an expected information density map to close the loop during search. The ergodic control algorit...
1
0
0
0
0
0
Manipulating magnetism by ultrafast control of the exchange interaction
In recent years, the optical control of exchange interactions has emerged as an exciting new direction in the study of the ultrafast optical control of magnetic order. Here we review recent theoretical works on antiferromagnetic systems, devoted to i) simulating the ultrafast control of exchange interactions, ii) mod...
0
1
0
0
0
0
Towards Visual Explanations for Convolutional Neural Networks via Input Resampling
The predictive power of neural networks often costs model interpretability. Several techniques have been developed for explaining model outputs in terms of input features; however, it is difficult to translate such interpretations into actionable insight. Here, we propose a framework to analyze predictions in terms o...
1
0
0
1
0
0
FBG-Based Control of a Continuum Manipulator Interacting With Obstacles
Tracking and controlling the shape of continuum dexterous manipulators (CDM) in constraint environments is a challenging task. The imposed constraints and interaction with unknown obstacles may conform the CDM's shape and therefore demands for shape sensing methods which do not rely on direct line of sight. To addres...
1
0
0
0
0
0
Generalized variational inequalities for maximal monotone operators
In this paper we present some new results on the existence of solutions of generalized variational inequalities in real reflexive Banach spaces with Fréchet differentiable norms. Moreover, we also give some theorems about the structure of solution sets. The results obtained in this paper improve and extend the ones a...
0
0
1
0
0
0
Chord Label Personalization through Deep Learning of Integrated Harmonic Interval-based Representations
The increasing accuracy of automatic chord estimation systems, the availability of vast amounts of heterogeneous reference annotations, and insights from annotator subjectivity research make chord label personalization increasingly important. Nevertheless, automatic chord estimation systems are historically exclusive...
1
0
0
0
0
0
Classification of Questions and Learning Outcome Statements (LOS) Into Blooms Taxonomy (BT) By Similarity Measurements Towards Extracting Of Learning Outcome from Learning Material
Blooms Taxonomy (BT) have been used to classify the objectives of learning outcome by dividing the learning into three different domains; the cognitive domain, the effective domain and the psychomotor domain. In this paper, we are introducing a new approach to classify the questions and learning outcome statements (L...
1
0
0
0
0
0
Symmetric Rank Covariances: a Generalised Framework for Nonparametric Measures of Dependence
The need to test whether two random vectors are independent has spawned a large number of competing measures of dependence. We are interested in nonparametric measures that are invariant under strictly increasing transformations, such as Kendall's tau, Hoeffding's D, and the more recently discovered Bergsma--Dassios ...
0
0
1
1
0
0
Linear magnetoresistance in the charge density wave state of quasi-two-dimensional rare-earth tritellurides
We report measurements of the magnetoresistance in the charge density wave (CDW) state of rare-earth tritellurides, namely TbTe$_3$ and HoTe$_3$. The magnetic field dependence of magnetoresistance exhibits a temperature dependent crossover between a conventional quadratic law at high $T$ and low $B$ and an unusual li...
0
1
0
0
0
0
Two classes of number fields with a non-principal Euclidean ideal
This paper introduces two classes of totally real quartic number fields, one of biquadratic extensions and one of cyclic extensions, each of which has a non-principal Euclidean ideal. It generalizes techniques of Graves used to prove that the number field $\mathbb{Q}(\sqrt{2},\sqrt{35})$ has a non-principal Euclidean...
0
0
1
0
0
0
Diamond-colored distributive lattices, move-minimizing games, and fundamental Weyl symmetric functions: The type $\mathsf{A}$ case
We present some elementary but foundational results concerning diamond-colored modular and distributive lattices and connect these structures to certain one-player combinatorial "move-minimizing games," in particular, a so-called "domino game." The objective of this game is to find, if possible, the least number of "...
0
0
1
0
0
0
Hidden Truncation Hyperbolic Distributions, Finite Mixtures Thereof, and Their Application for Clustering
A hidden truncation hyperbolic (HTH) distribution is introduced and finite mixtures thereof are applied for clustering. A stochastic representation of the HTH distribution is given and a density is derived. A hierarchical representation is described, which aids in parameter estimation. Finite mixtures of HTH distribu...
0
0
0
1
0
0
No evidence for a significant AGN contribution to cosmic hydrogen reionization
We reinvestigate a claimed sample of 22 X-ray detected active galactic nuclei (AGN) at redshifts z > 4, which has reignited the debate as to whether young galaxies or AGN reionized the Universe. These sources lie within the GOODS-S/CANDELS field, and we examine both the robustness of the claimed X-ray detections (wit...
0
1
0
0
0
0
Finding Crash-Consistency Bugs with Bounded Black-Box Crash Testing
We present a new approach to testing file-system crash consistency: bounded black-box crash testing (B3). B3 tests the file system in a black-box manner using workloads of file-system operations. Since the space of possible workloads is infinite, B3 bounds this space based on parameters such as the number of file-sys...
1
0
0
0
0
0
Periodic solutions to the Cahn-Hilliard equation in the plane
In this paper we construct entire solutions to the Cahn-Hilliard equation $-\Delta(-\Delta u+W^{'}(u))+W^{"}(u)(-\Delta u+W^{'}(u))=0$ in the Euclidean plane, where $W(u)$ is the standard double-well potential $\frac{1}{4} (1-u^2)^2$. Such solutions have a non-trivial profile that shadows a Willmore planar curve, and...
0
0
1
0
0
0
On the kinetic equation in Zakharov's wave turbulence theory for capillary waves
The wave turbulence equation is an effective kinetic equation that describes the dynamics of wave spectrum in weakly nonlinear and dispersive media. Such a kinetic model has been derived by physicists in the sixties, though the well-posedness theory remains open, due to the complexity of resonant interaction kernels....
0
1
1
0
0
0
Regularizing Model Complexity and Label Structure for Multi-Label Text Classification
Multi-label text classification is a popular machine learning task where each document is assigned with multiple relevant labels. This task is challenging due to high dimensional features and correlated labels. Multi-label text classifiers need to be carefully regularized to prevent the severe over-fitting in the hig...
1
0
0
1
0
0
Network Design with Probabilistic Capacities
We consider a network design problem with random arc capacities and give a formulation with a probabilistic capacity constraint on each cut of the network. To handle the exponentially-many probabilistic constraints a separation procedure that solves a nonlinear minimum cut problem is introduced. For the case with ind...
0
0
1
0
0
0
Nanopteron solutions of diatomic Fermi-Pasta-Ulam-Tsingou lattices with small mass-ratio
Consider an infinite chain of masses, each connected to its nearest neighbors by a (nonlinear) spring. This is a Fermi-Pasta-Ulam-Tsingou lattice. We prove the existence of traveling waves in the setting where the masses alternate in size. In particular we address the limit where the mass ratio tends to zero. The pro...
0
0
1
0
0
0
Steering Orbital Optimization out of Local Minima and Saddle Points Toward Lower Energy
The general procedure underlying Hartree-Fock and Kohn-Sham density functional theory calculations consists in optimizing orbitals for a self-consistent solution of the Roothaan-Hall equations in an iterative process. It is often ignored that multiple self-consistent solutions can exist, several of which may correspo...
0
1
0
0
0
0
Mapping stellar content to dark matter halos - III.Environmental dependence and conformity of galaxy colours
Recent studies suggest that the quenching properties of galaxies are correlated over several mega-parsecs. The large-scale "galactic conformity" phenomenon around central galaxies has been regarded as a potential signature of "galaxy assembly bias" or "pre-heating", both of which interpret conformity as a result of d...
0
1
0
0
0
0
Blue Supergiant X-ray Binaries in the Nearby Dwarf Galaxy IC 10
In young starburst galaxies, the X-ray population is expected to be dominated by the relics of the most massive and short-lived stars, black-hole and neutron-star high mass X-ray binaries (XRBs). In the closest such galaxy, IC 10, we have made a multi-wavelength census of these objects. Employing a novel statistical ...
0
1
0
0
0
0
ConsiDroid: A Concolic-based Tool for Detecting SQL Injection Vulnerability in Android Apps
In this paper, we present a concolic execution technique for detecting SQL injection vulnerabilities in Android apps, with a new tool we called ConsiDroid. We extend the source code of apps with mocking technique, such that the execution of original source code is not affected. The extended source codes can be treate...
1
0
0
0
0
0
Mesh Model (MeMo): A Systematic Approach to Agile System Engineering
Innovation and entrepreneurship have a very special role to play in creating sustainable development in the world. Engineering design plays a major role in innovation. These are not new facts. However this added to the fact that in current time knowledge seem to increase at an exponential rate, growing twice every fe...
1
0
0
0
0
0
Alternative derivation of exact law for compressible and isothermal magnetohydrodynamics turbulence
The exact law for fully developed homogeneous compressible magnetohydrodynamics (CMHD) turbulence is derived. For an isothermal plasma, without the assumption of isotropy, the exact law is expressed as a function of the plasma velocity field, the compressible Alfvén velocity and the scalar density, instead of the Els...
0
1
0
0
0
0
CMS-HF Calorimeter Upgrade for Run II
CMS-HF Calorimeters have been undergoing a major upgrade for the last couple of years to alleviate the problems encountered during Run I, especially in the PMT and the readout systems. In this poster, the problems caused by the old PMTs installed in the detectors and their solutions will be explained. Initially, regu...
0
1
0
0
0
0
Is Flat Fielding Safe for Precision CCD Astronomy?
The ambitious goals of precision cosmology with wide-field optical surveys such as the Dark Energy Survey (DES) and the Large Synoptic Survey Telescope (LSST) demand, as their foundation, precision CCD astronomy. This in turn requires an understanding of previously uncharacterized sources of systematic error in CCD s...
0
1
0
0
0
0
Gas removal in the Ursa Minor galaxy: linking hydrodynamics and chemical evolution models
We present results from a non-cosmological, three-dimensional hydrodynamical simulation of the gas in the dwarf spheroidal galaxy Ursa Minor. Assuming an initial baryonic-to-dark-matter ratio derived from the cosmic microwave background radiation, we evolved the galactic gas distribution over 3 Gyr, taking into accou...
0
1
0
0
0
0
Identifiability and Estimation of Structural Vector Autoregressive Models for Subsampled and Mixed Frequency Time Series
Causal inference in multivariate time series is challenging due to the fact that the sampling rate may not be as fast as the timescale of the causal interactions. In this context, we can view our observed series as a subsampled version of the desired series. Furthermore, due to technological and other limitations, se...
0
0
0
1
0
0
Towards Practical Differential Privacy for SQL Queries
Differential privacy promises to enable general data analytics while protecting individual privacy, but existing differential privacy mechanisms do not support the wide variety of features and databases used in real-world SQL-based analytics systems. This paper presents the first practical approach for differential p...
1
0
0
0
0
0
Adapting Engineering Education to Industrie 4.0 Vision
Industrie 4.0 is originally a future vision described in the high-tech strategy of the German government that is conceived upon the information and communication technologies like Cyber-Physical Systems, Internet of Things, Physical Internet and Internet of Services to achieve a high degree of flexibility in producti...
1
0
0
0
0
0
A Survey on QoE-oriented Wireless Resources Scheduling
Future wireless systems are expected to provide a wide range of services to more and more users. Advanced scheduling strategies thus arise not only to perform efficient radio resource management, but also to provide fairness among the users. On the other hand, the users' perceived quality, i.e., Quality of Experience...
1
0
0
0
0
0
Wandering domains for diffeomorphisms of the k-torus: a remark on a theorem by Norton and Sullivan
We show that there is no C^{k+1} diffeomorphism of the k-torus which is semiconjugate to a minimal translation and has a wandering domain all of whose iterates are Euclidean balls.
0
0
1
0
0
0
Orthogonal Statistical Learning
We provide excess risk guarantees for statistical learning in the presence of an unknown nuisance component. We analyze a two-stage sample splitting meta-algorithm that takes as input two arbitrary estimation algorithms: one for the target model and one for the nuisance model. We show that if the population risk sati...
1
0
1
1
0
0
Disentangling group and link persistence in Dynamic Stochastic Block models
We study the inference of a model of dynamic networks in which both communities and links keep memory of previous network states. By considering maximum likelihood inference from single snapshot observations of the network, we show that link persistence makes the inference of communities harder, decreasing the detect...
1
1
0
1
0
0
A Reactive and Efficient Walking Pattern Generator for Robust Bipedal Locomotion
Available possibilities to prevent a biped robot from falling down in the presence of severe disturbances are mainly Center of Pressure (CoP) modulation, step location and timing adjustment, and angular momentum regulation. In this paper, we aim at designing a walking pattern generator which employs an optimal combin...
1
0
0
0
0
0
Frequentist Consistency of Variational Bayes
A key challenge for modern Bayesian statistics is how to perform scalable inference of posterior distributions. To address this challenge, variational Bayes (VB) methods have emerged as a popular alternative to the classical Markov chain Monte Carlo (MCMC) methods. VB methods tend to be faster while achieving compara...
1
0
1
1
0
0
Quantum variance on quaternion algebras, II
A method for determining quantum variance asymptotics on compact quotients attached to non-split quaternion algebras is developed in general and applied to "microlocal lifts" in the non-archimedean setting. The results obtained are in the spirit of recent work of Sarnak--Zhao. The arguments involve a careful analytic...
0
0
1
0
0
0
An intracardiac electrogram model to bridge virtual hearts and implantable cardiac devices
Virtual heart models have been proposed to enhance the safety of implantable cardiac devices through closed loop validation. To communicate with a virtual heart, devices have been driven by cardiac signals at specific sites. As a result, only the action potentials of these sites are sensed. However, the real device i...
1
1
0
0
0
0
A note on conditional versus joint unconditional weak convergence in bootstrap consistency results
The consistency of a bootstrap or resampling scheme is classically validated by weak convergence of conditional laws. However, when working with stochastic processes in the space of bounded functions and their weak convergence in the Hoffmann-J{\o}rgensen sense, an obstacle occurs: due to possible non-measurability, ...
0
0
1
1
0
0
Dynamic scaling analysis of the long-range RKKY Ising spin glass Dy$_{x}$Y$_{1-x}$Ru$_{2}$Si$_{2}$
Dynamic scaling analyses of linear and nonlinear ac susceptibilities in a model magnet of the long-rang RKKY Ising spin glass (SG) Dy$_{x}$Y$_{1-x}$Ru$_{2}$Si$_{2}$ were examined. The obtained set of the critical exponents, $\gamma$ $\sim$ 1, $\beta$ $\sim$ 1, $\delta$ $\sim$ 2, and $z\nu$ $\sim$ 3.4, indicates the S...
0
1
0
0
0
0
A Bayesian hierarchical model for related densities using Polya trees
Bayesian hierarchical models are used to share information between related samples and obtain more accurate estimates of sample-level parameters, common structure, and variation between samples. When the parameter of interest is the distribution or density of a continuous variable, a hierarchical model for distributi...
0
0
0
1
0
0
Groups of fast homeomorphisms of the interval and the ping-pong argument
We adapt the Ping-Pong Lemma, which historically was used to study free products of groups, to the setting of the homeomorphism group of the unit interval. As a consequence, we isolate a large class of generating sets for subgroups of $\mathrm{Homeo}_+(I)$ for which certain finite dynamical data can be used to determ...
0
0
1
0
0
0
The CodRep Machine Learning on Source Code Competition
CodRep is a machine learning competition on source code data. It is carefully designed so that anybody can enter the competition, whether professional researchers, students or independent scholars, without specific knowledge in machine learning or program analysis. In particular, it aims at being a common playground ...
1
0
0
0
0
0
Flag representations of mixed volumes and mixed functionals of convex bodies
Mixed volumes $V(K_1,\dots, K_d)$ of convex bodies $K_1,\dots ,K_d$ in Euclidean space $\mathbb{R}^d$ are of central importance in the Brunn-Minkowski theory. Representations for mixed volumes are available in special cases, for example as integrals over the unit sphere with respect to mixed area measures. More gener...
0
0
1
0
0
0
Learning Hard Alignments with Variational Inference
There has recently been significant interest in hard attention models for tasks such as object recognition, visual captioning and speech recognition. Hard attention can offer benefits over soft attention such as decreased computational cost, but training hard attention models can be difficult because of the discrete ...
1
0
0
1
0
0
A New Sparse and Robust Adaptive Lasso Estimator for the Independent Contamination Model
Many problems in signal processing require finding sparse solutions to under-determined, or ill-conditioned, linear systems of equations. When dealing with real-world data, the presence of outliers and impulsive noise must also be accounted for. In past decades, the vast majority of robust linear regression estimator...
0
0
1
1
0
0
Systematic Quantum Mechanical Region Determination in QM/MM Simulation
Hybrid quantum mechanical-molecular mechanical (QM/MM) simulations are widely used in enzyme simulation. Over ten convergence studies of QM/MM methods have revealed over the past several years that key energetic and structural properties approach asymptotic limits with only very large (ca. 500-1000 atom) QM regions. ...
0
1
0
0
0
0
Comparison of electricity market designs for stable decentralized power grids
In this study, we develop a theoretical model of strategic equilibrium bidding and price-setting behaviour by heterogeneous and boundedly rational electricity producers and a grid operator in a single electricity market under uncertain information about production capabilities and electricity demand. We compare eight...
0
1
0
0
0
0
Look Mum, no VM Exits! (Almost)
Multi-core CPUs are a standard component in many modern embedded systems. Their virtualisation extensions enable the isolation of services, and gain popularity to implement mixed-criticality or otherwise split systems. We present Jailhouse, a Linux-based, OS-agnostic partitioning hypervisor that uses novel architectu...
1
0
0
0
0
0
Harnessing Structures in Big Data via Guaranteed Low-Rank Matrix Estimation
Low-rank modeling plays a pivotal role in signal processing and machine learning, with applications ranging from collaborative filtering, video surveillance, medical imaging, to dimensionality reduction and adaptive filtering. Many modern high-dimensional data and interactions thereof can be modeled as lying approxim...
0
0
0
1
0
0
Automatic Segmentation of the Left Ventricle in Cardiac CT Angiography Using Convolutional Neural Network
Accurate delineation of the left ventricle (LV) is an important step in evaluation of cardiac function. In this paper, we present an automatic method for segmentation of the LV in cardiac CT angiography (CCTA) scans. Segmentation is performed in two stages. First, a bounding box around the LV is detected using a comb...
1
1
0
0
0
0
Maximal Jacobian-based Saliency Map Attack
The Jacobian-based Saliency Map Attack is a family of adversarial attack methods for fooling classification models, such as deep neural networks for image classification tasks. By saturating a few pixels in a given image to their maximum or minimum values, JSMA can cause the model to misclassify the resulting adversa...
0
0
0
1
0
0
Least-Squares Temporal Difference Learning for the Linear Quadratic Regulator
Reinforcement learning (RL) has been successfully used to solve many continuous control tasks. Despite its impressive results however, fundamental questions regarding the sample complexity of RL on continuous problems remain open. We study the performance of RL in this setting by considering the behavior of the Least...
1
0
0
1
0
0
VERITAS long term monitoring of Gamma-Ray emission from the BL Lacertae object
BL Lacertae is the prototype of the blazar subclass known as BL Lac type objects. BL Lacertae object itself is a low-frequency-peaked BL Lac(LBL). Very high energy (VHE) gamma ray emission from this source was discovered in 2005 by MAGIC observatory while the source was at a flaring state. Since then, VHE gamma rays ...
0
1
0
0
0
0
Spin Susceptibility of the Topological Superconductor UPt3 from Polarized Neutron Diffraction
Experiment and theory indicate that UPt3 is a topological superconductor in an odd-parity state, based in part from temperature independence of the NMR Knight shift. However, quasiparticle spin-flip scattering near a surface, where the Knight shift is measured, might be responsible. We use polarized neutron scatterin...
0
1
0
0
0
0
Nano-jet Related to Bessel Beams and to Super-Resolutions in Micro-sphere Optical Experiments
The appearance of a Nano-jet in the micro-sphere optical experiments is analyzed by relating this effect to non-diffracting Bessel beams. By inserting a circular aperture with a radius which is in the order of subwavelength in the EM waist, and sending the transmitted light into a confocal microscope, EM fluctuations...
0
1
0
0
0
0
Factorization systems on (stable) derivators
We define triangulated factorization systems on triangulated categories, and prove that a suitable subclass thereof (the normal triangulated torsion theories) corresponds bijectively to $t$-structures on the same category. This result is then placed in the framework of derivators regarding a triangulated category as ...
0
0
1
0
0
0
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
Cloud storage services have become accessible and used by everyone. Nevertheless, stored data are dependable on the behavior of the cloud servers, and losses and damages often occur. One solution is to regularly audit the cloud servers in order to check the integrity of the stored data. The Dynamic Provable Data Poss...
1
0
0
0
0
0
Robustness of persistent currents in two-dimensional Dirac systems with disorders
We consider two-dimensional (2D) Dirac quantum ring systems formed by the infinite mass constraint. When an Aharonov-Bohm magnetic flux is present, e.g., through the center of the ring domain, persistent currents, i.e., permanent currents without dissipation, can arise. In real materials, impurities and defects are i...
0
1
0
0
0
0
On the arithmetically Cohen-Macaulay property for sets of points in multiprojective spaces
We study the arithmetically Cohen-Macaulay (ACM) property for finite sets of points in multiprojective spaces, especially $(\mathbb P^1)^n$. A combinatorial characterization, the $(\star)$-property, is known in $\mathbb P^1 \times \mathbb P^1$. We propose a combinatorial property, $(\star_n)$, that directly generaliz...
0
0
1
0
0
0
Fitting 3D Shapes from Partial and Noisy Point Clouds with Evolutionary Computing
Point clouds obtained from photogrammetry are noisy and incomplete models of reality. We propose an evolutionary optimization methodology that is able to approximate the underlying object geometry on such point clouds. This approach assumes a priori knowledge on the 3D structure modeled and enables the identification...
1
0
0
0
1
0
Unique Information and Secret Key Decompositions
The unique information ($UI$) is an information measure that quantifies a deviation from the Blackwell order. We have recently shown that this quantity is an upper bound on the one-way secret key rate. In this paper, we prove a triangle inequality for the $UI$, which implies that the $UI$ is never greater than one of...
1
0
0
0
0
0
Decomposition Algorithm for Distributionally Robust Optimization using Wasserstein Metric
We study distributionally robust optimization (DRO) problems where the ambiguity set is defined using the Wasserstein metric. We show that this class of DRO problems can be reformulated as semi-infinite programs. We give an exchange method to solve the reformulated problem for the general nonlinear model, and a centr...
0
0
1
0
0
0
PD-ML-Lite: Private Distributed Machine Learning from Lighweight Cryptography
Privacy is a major issue in learning from distributed data. Recently the cryptographic literature has provided several tools for this task. However, these tools either reduce the quality/accuracy of the learning algorithm---e.g., by adding noise---or they incur a high performance penalty and/or involve trusting exter...
1
0
0
1
0
0
ISS Property with Respect to Boundary Disturbances for a Class of Riesz-Spectral Boundary Control Systems
This paper deals with the establishment of Input-to-State Stability (ISS) properties for infinite dimensional systems with respect to both boundary and distributed disturbances. First, an ISS estimate is established with respect to finite dimensional boundary disturbances for a class of Riesz-spectral boundary contro...
1
0
0
0
0
0
English-Japanese Neural Machine Translation with Encoder-Decoder-Reconstructor
Neural machine translation (NMT) has recently become popular in the field of machine translation. However, NMT suffers from the problem of repeating or missing words in the translation. To address this problem, Tu et al. (2017) proposed an encoder-decoder-reconstructor framework for NMT using back-translation. In thi...
1
0
0
0
0
0
Consistency Guarantees for Permutation-Based Causal Inference Algorithms
Bayesian networks, or directed acyclic graph (DAG) models, are widely used to represent complex causal systems. Since the basic task of learning a Bayesian network from data is NP-hard, a standard approach is greedy search over the space of DAGs or Markov equivalent DAGs. Since the space of DAGs on p nodes and the as...
0
0
1
1
0
0
TriviaQA: A Large Scale Distantly Supervised Challenge Dataset for Reading Comprehension
We present TriviaQA, a challenging reading comprehension dataset containing over 650K question-answer-evidence triples. TriviaQA includes 95K question-answer pairs authored by trivia enthusiasts and independently gathered evidence documents, six per question on average, that provide high quality distant supervision f...
1
0
0
0
0
0
Optimizing Node Discovery on Networks: Problem Definitions, Fast Algorithms, and Observations
Many people dream to become famous, YouTube video makers also wish their videos to have a large audience, and product retailers always hope to expose their products to customers as many as possible. Do these seemingly different phenomena share a common structure? We find that fame, popularity, or exposure, could be m...
1
0
0
0
0
0
Some properties of h-MN-convexity and Jensen's type inequalities
In this work, we introduce the class of $h$-${\rm{MN}}$-convex functions by generalizing the concept of ${\rm{MN}}$-convexity and combining it with $h$-convexity. Namely, Let $I,J$ be two intervals subset of $\left(0,\infty\right)$ such that $\left(0,1\right)\subseteq J$ and $\left[a,b\right]\subseteq I$. Consider a ...
0
0
1
0
0
0
Impact of Traditional Sparse Optimizations on a Migratory Thread Architecture
Achieving high performance for sparse applications is challenging due to irregular access patterns and weak locality. These properties preclude many static optimizations and degrade cache performance on traditional systems. To address these challenges, novel systems such as the Emu architecture have been proposed. Th...
1
0
0
0
0
0
Finding Bottlenecks: Predicting Student Attrition with Unsupervised Classifier
With pressure to increase graduation rates and reduce time to degree in higher education, it is important to identify at-risk students early. Automated early warning systems are therefore highly desirable. In this paper, we use unsupervised clustering techniques to predict the graduation status of declared majors in ...
1
0
0
1
0
0
Chemical evolution of 244Pu in the solar vicinity and its implication for the properties of r-process production
Meteoritic abundances of r-process elements are analyzed to deduce the history of chemical enrichment by r-process from the beginning of disk formation to the present time in the solar vicinity, by combining the abundance information from short-lived radioactive nuclei such as 244Pu with that from stable r-process nu...
0
1
0
0
0
0
SAVITR: A System for Real-time Location Extraction from Microblogs during Emergencies
We present SAVITR, a system that leverages the information posted on the Twitter microblogging site to monitor and analyse emergency situations. Given that only a very small percentage of microblogs are geo-tagged, it is essential for such a system to extract locations from the text of the microblogs. We employ natur...
1
0
0
0
0
0
Fractional Driven Damped Oscillator
The resonances associated with a fractional damped oscillator which is driven by an oscillatory external force are studied. It is shown that such resonances can be manipulated by tuning up either the coefficient of the fractional damping or the order of the corresponding fractional derivatives.
0
1
0
0
0
0
Bootstrap confidence sets for spectral projectors of sample covariance
Let $X_{1},\ldots,X_{n}$ be i.i.d. sample in $\mathbb{R}^{p}$ with zero mean and the covariance matrix $\mathbf{\Sigma}$. The problem of recovering the projector onto an eigenspace of $\mathbf{\Sigma}$ from these observations naturally arises in many applications. Recent technique from [Koltchinskii, Lounici, 2015] h...
0
0
1
1
0
0
Locally recoverable codes from algebraic curves and surfaces
A locally recoverable code is a code over a finite alphabet such that the value of any single coordinate of a codeword can be recovered from the values of a small subset of other coordinates. Building on work of Barg, Tamo, and Vlăduţ, we present several constructions of locally recoverable codes from algebraic curve...
1
0
1
0
0
0
Specification properties on uniform spaces
In the following text we introduce specification property (stroboscopical property) for dynamical systems on uniform space. We focus on two classes of dynamical systems: generalized shifts and dynamical systems with Alexandroff compactification of a discrete space as phase space. We prove that for a discrete finite t...
0
0
1
0
0
0
Tidal tails around the outer halo globular clusters Eridanus and Palomar 15
We report the discovery of tidal tails around the two outer halo globular clusters, Eridanus and Palomar 15, based on $gi$-band images obtained with DECam at the CTIO 4-m Blanco Telescope. The tidal tails are among the most remote stellar streams presently known in the Milky Way halo. Cluster members have been determ...
0
1
0
0
0
0
Learning by Playing - Solving Sparse Reward Tasks from Scratch
We propose Scheduled Auxiliary Control (SAC-X), a new learning paradigm in the context of Reinforcement Learning (RL). SAC-X enables learning of complex behaviors - from scratch - in the presence of multiple sparse reward signals. To this end, the agent is equipped with a set of general auxiliary tasks, that it attem...
1
0
0
1
0
0
An Infinite Hidden Markov Model With Similarity-Biased Transitions
We describe a generalization of the Hierarchical Dirichlet Process Hidden Markov Model (HDP-HMM) which is able to encode prior information that state transitions are more likely between "nearby" states. This is accomplished by defining a similarity function on the state space and scaling transition probabilities by p...
1
0
0
1
0
0
Methods for Estimation of Convex Sets
In the framework of shape constrained estimation, we review methods and works done in convex set estimation. These methods mostly build on stochastic and convex geometry, empirical process theory, functional analysis, linear programming, extreme value theory, etc. The statistical problems that we review include densi...
0
0
1
1
0
0
Dynamics of Charged Bulk Viscous Collapsing Cylindrical Source With Heat Flux
In this paper, we have explored the effects of dissipation on the dynamics of charged bulk viscous collapsing cylindrical source which allows the out follow of heat flux in the form of radiations. Misner-Sharp formulism has been implemented to drive the dynamical equation in term of proper time and radial derivatives...
0
1
0
0
0
0