title
stringlengths
7
239
abstract
stringlengths
7
2.76k
cs
int64
0
1
phy
int64
0
1
math
int64
0
1
stat
int64
0
1
quantitative biology
int64
0
1
quantitative finance
int64
0
1
Compact Convolutional Neural Networks for Classification of Asynchronous Steady-state Visual Evoked Potentials
Steady-State Visual Evoked Potentials (SSVEPs) are neural oscillations from the parietal and occipital regions of the brain that are evoked from flickering visual stimuli. SSVEPs are robust signals measurable in the electroencephalogram (EEG) and are commonly used in brain-computer interfaces (BCIs). However, methods...
0
0
0
1
1
0
Long-range proximity effect in Nb-based heterostructures induced by a magnetically inhomogeneous permalloy layer
Odd-frequency triplet Cooper pairs are believed to be the carriers of long-range superconducting correlations in ferromagnets. Such triplet pairs are generated by inhomogeneous magnetism at the interface between a superconductor (S) and a ferromagnet (F). So far, reproducible long-range effects were reported only in ...
0
1
0
0
0
0
ASK/PSK-correspondence and the r-map
We formulate a correspondence between affine and projective special Kähler manifolds of the same dimension. As an application, we show that, under this correspondence, the affine special Kähler manifolds in the image of the rigid r-map are mapped to one-parameter deformations of projective special Kähler manifolds in...
0
0
1
0
0
0
Trust Region Value Optimization using Kalman Filtering
Policy evaluation is a key process in reinforcement learning. It assesses a given policy using estimation of the corresponding value function. When using a parameterized function to approximate the value, it is common to optimize the set of parameters by minimizing the sum of squared Bellman Temporal Differences erro...
1
0
0
1
0
0
Simplified Long Short-term Memory Recurrent Neural Networks: part I
We present five variants of the standard Long Short-term Memory (LSTM) recurrent neural networks by uniformly reducing blocks of adaptive parameters in the gating mechanisms. For simplicity, we refer to these models as LSTM1, LSTM2, LSTM3, LSTM4, and LSTM5, respectively. Such parameter-reduced variants enable speedin...
1
0
0
0
0
0
Contracts as specifications for dynamical systems in driving variable form
This paper introduces assume/guarantee contracts on continuous-time control systems, hereby extending contract theories for discrete systems to certain new model classes and specifications. Contracts are regarded as formal characterizations of control specifications, providing an alternative to specifications in term...
1
0
0
0
0
0
Visualizing the Phase-Space Dynamics of an External Cavity Semiconductor Laser
We map the phase-space trajectories of an external-cavity semiconductor laser using phase portraits. This is both a visualization tool as well as a thoroughly quantitative approach enabling unprecedented insight into the dynamical regimes, from continuous-wave through coherence collapse as feedback is increased. Name...
0
1
0
0
0
0
On decision regions of narrow deep neural networks
We show that for neural network functions that have width less or equal to the input dimension all connected components of decision regions are unbounded. The result holds for continuous and strictly monotonic activation functions as well as for ReLU activation. This complements recent results on approximation capabi...
0
0
0
1
0
0
An adelic arithmeticity theorem for lattices in products
We prove that, under mild assumptions, a lattice in a product of semi-simple Lie group and a totally disconnected locally compact group is, in a certain sense, arithmetic. We do not assume the lattice to be finitely generated or the ambient group to be compactly generated.
0
0
1
0
0
0
Quadratic automaton algebras and intermediate growth
We present an example of a quadratic algebra given by three generators and three relations, which is automaton (the set of normal words forms a regular language) and such that its ideal of relations does not possess a finite Gröbner basis with respect to any choice of generators and any choice of a well-ordering of m...
0
0
1
0
0
0
Homotopy types of gauge groups related to $S^3$-bundles over $S^4$
Let $M_{l,m}$ be the total space of the $S^3$-bundle over $S^4$ classified by the element $l\sigma+m\rho\in{\pi_4(SO(4))}$, $l,m\in\mathbb Z$. In this paper we study the homotopy theory of gauge groups of principal $G$-bundles over manifolds $M_{l,m}$ when $G$ is a simply connected simple compact Lie group such that ...
0
0
1
0
0
0
Optical quality assurance of GEM foils
An analysis software was developed for the high aspect ratio optical scanning system in the Detec- tor Laboratory of the University of Helsinki and the Helsinki Institute of Physics. The system is used e.g. in the quality assurance of the GEM-TPC detectors being developed for the beam diagnostics system of the SuperF...
0
1
0
0
0
0
On the Global Continuity of the Roots of Families of Monic Polynomials (in Russian)
We raise a question on the existence of continuous roots of families of monic polynomials (by the root of a family of polynomials we mean a function of the coefficients of polynomials of a given family that maps each tuple of coefficients to a root of the polynomial with these coefficients). We prove that the family ...
0
0
1
0
0
0
On Number of Rich Words
Any finite word $w$ of length $n$ contains at most $n+1$ distinct palindromic factors. If the bound $n+1$ is reached, the word $w$ is called rich. The number of rich words of length $n$ over an alphabet of cardinality $q$ is denoted $R_n(q)$. For binary alphabet, Rubinchik and Shur deduced that ${R_n(2)}\leq c 1.605^...
0
0
1
0
0
0
A Geometric Analysis of Power System Loadability Regions
Understanding the feasible power flow region is of central importance to power system analysis. In this paper, we propose a geometric view of the power system loadability problem. By using rectangular coordinates for complex voltages, we provide an integrated geometric understanding of active and reactive power flow ...
1
0
1
0
0
0
Model Selection Confidence Sets by Likelihood Ratio Testing
The traditional activity of model selection aims at discovering a single model superior to other candidate models. In the presence of pronounced noise, however, multiple models are often found to explain the same data equally well. To resolve this model selection ambiguity, we introduce the general approach of model ...
0
0
1
1
0
0
Analysis of Dirichlet forms on graphs
In this thesis, we study connections between metric and combinatorial graphs from a Dirichlet space point of view.
0
0
1
0
0
0
Designing and building the mlpack open-source machine learning library
mlpack is an open-source C++ machine learning library with an emphasis on speed and flexibility. Since its original inception in 2007, it has grown to be a large project implementing a wide variety of machine learning algorithms, from standard techniques such as decision trees and logistic regression to modern techni...
1
0
0
0
0
0
A Vietoris-Smale mapping theorem for the homotopy of hyperdefinable sets
Results of Smale (1957) and Dugundji (1969) allow to compare the homotopy groups of two topological spaces $X$ and $Y$ whenever a map $f:X\to Y$ with strong connectivity conditions on the fibers is given. We apply similar techniques in o-minimal expansions of fields to compare the o-minimal homotopy of a definable se...
0
0
1
0
0
0
Characterization of multivariate Bernoulli distributions with given margins
We express each Fréchet class of multivariate Bernoulli distributions with given margins as the convex hull of a set of densities, which belong to the same Fréchet class. This characterisation allows us to establish whether a given correlation matrix is compatible with the assigned margins and, if it is, to easily co...
0
0
1
1
0
0
Note on character varieties and cluster algebras
We use Bonahon-Wong's trace map to study character varieties of the once-punctured torus and of the 4-punctured sphere. We clarify a relationship with cluster algebra associated with ideal triangulations of surfaces, and we show that the Goldman Poisson algebra of loops on surfaces is recovered from the Poisson struc...
0
0
1
0
0
0
Privacy-Preserving Multi-Period Demand Response: A Game Theoretic Approach
We study a multi-period demand response problem in the smart grid with multiple companies and their consumers. We model the interactions by a Stackelberg game, where companies are the leaders and consumers are the followers. It is shown that this game has a unique equilibrium at which the companies set prices to maxi...
1
0
0
0
0
0
An ALMA survey of submillimetre galaxies in the COSMOS field: The extent of the radio-emitting region revealed by 3 GHz imaging with the Very Large Array
We determine the radio size distribution of a large sample of 152 SMGs in COSMOS that were detected with ALMA at 1.3 mm. For this purpose, we used the observations taken by the VLA-COSMOS 3 GHz Large Project. One hundred and fifteen of the 152 target SMGs were found to have a 3 GHz counterpart. The median value of th...
0
1
0
0
0
0
Negative differential resistance and magnetoresistance in zigzag borophene nanoribbons
We investigate the transport properties of pristine zigzag-edged borophene nanoribbons (ZBNRs) of different widths, using the fist-principles calculations. We choose ZBNRs with widths of 5 and 6 as odd and even widths. The differences of the quantum transport properties are found, where even-N BNRs and odd-N BNRs hav...
0
1
0
0
0
0
Incremental Eigenpair Computation for Graph Laplacian Matrices: Theory and Applications
The smallest eigenvalues and the associated eigenvectors (i.e., eigenpairs) of a graph Laplacian matrix have been widely used in spectral clustering and community detection. However, in real-life applications the number of clusters or communities (say, $K$) is generally unknown a-priori. Consequently, the majority of...
1
0
0
1
0
0
Audio-replay attack detection countermeasures
This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017. In this study we focused on comparison of different spoofing detection approaches. These were GMM based methods, high level features extractio...
1
0
0
1
0
0
Joint Scheduling and Transmission Power Control in Wireless Ad Hoc Networks
In this paper, we study how to determine concurrent transmissions and the transmission power level of each link to maximize spectrum efficiency and minimize energy consumption in a wireless ad hoc network. The optimal joint transmission packet scheduling and power control strategy are determined when the node density...
1
0
0
0
0
0
Proceedings 15th International Conference on Automata and Formal Languages
The 15th International Conference on Automata and Formal Languages (AFL 2017) was held in Debrecen, Hungary, from September 4 to 6, 2017. The conference was organized by the Faculty of Informatics of the University of Debrecen and the Faculty of Informatics of the Eötvös Loránd University of Budapest. Topics of inter...
1
0
0
0
0
0
Correlative cellular ptychography with functionalized nanoparticles at the Fe L-edge
Precise localization of nanoparticles within a cell is crucial to the understanding of cell-particle interactions and has broad applications in nanomedicine. Here, we report a proof-of-principle experiment for imaging individual functionalized nanoparticles within a mammalian cell by correlative microscopy. Using a c...
0
1
0
0
0
0
A Dynamic-Adversarial Mining Approach to the Security of Machine Learning
Operating in a dynamic real world environment requires a forward thinking and adversarial aware design for classifiers, beyond fitting the model to the training data. In such scenarios, it is necessary to make classifiers - a) harder to evade, b) easier to detect changes in the data distribution over time, and c) be ...
0
0
0
1
0
0
Software stage-effort estimation based on association rule mining and fuzzy set theory
Relaying on early effort estimation to predict the required number of resources is not often sufficient, and could lead to under or over estimation. It is widely acknowledge that that software development process should be refined regularly and that software prediction made at early stage of software development is y...
1
0
0
0
0
0
Phase Transitions in Approximate Ranking
We study the problem of approximate ranking from observations of pairwise interactions. The goal is to estimate the underlying ranks of $n$ objects from data through interactions of comparison or collaboration. Under a general framework of approximate ranking models, we characterize the exact optimal statistical erro...
0
0
1
1
0
0
Finding Influential Training Samples for Gradient Boosted Decision Trees
We address the problem of finding influential training samples for a particular case of tree ensemble-based models, e.g., Random Forest (RF) or Gradient Boosted Decision Trees (GBDT). A natural way of formalizing this problem is studying how the model's predictions change upon leave-one-out retraining, leaving out ea...
0
0
0
1
0
0
Vulnerability and co-susceptibility determine the size of network cascades
In a network, a local disturbance can propagate and eventually cause a substantial part of the system to fail, in cascade events that are easy to conceptualize but extraordinarily difficult to predict. Here, we develop a statistical framework that can predict cascade size distributions by incorporating two ingredient...
1
1
0
0
0
0
Transfer learning for music classification and regression tasks
In this paper, we present a transfer learning approach for music classification and regression tasks. We propose to use a pre-trained convnet feature, a concatenated feature vector using the activations of feature maps of multiple layers in a trained convolutional network. We show how this convnet feature can serve a...
1
0
0
0
0
0
Dynamic Transition in Symbiotic Evolution Induced by Growth Rate Variation
In a standard bifurcation of a dynamical system, the stationary points (or more generally attractors) change qualitatively when varying a control parameter. Here we describe a novel unusual effect, when the change of a parameter, e.g. a growth rate, does not influence the stationary states, but nevertheless leads to ...
0
1
0
0
0
0
Scale-invariant magnetoresistance in a cuprate superconductor
The anomalous metallic state in high-temperature superconducting cuprates is masked by the onset of superconductivity near a quantum critical point. Use of high magnetic fields to suppress superconductivity has enabled a detailed study of the ground state in these systems. Yet, the direct effect of strong magnetic fi...
0
1
0
0
0
0
Thermoelectric Devices: Principles and Future Trends
The principles of the thermoelectric phenomenon, including Seebeck effect, Peltier effect, and Thomson effect are discussed. The dependence of the thermoelectric devices on the figure of merit, Seebeck coefficient, electrical conductivity, and thermal conductivity are explained in details. The paper provides an overv...
0
1
0
0
0
0
Exploring one particle orbitals in large Many-Body Localized systems
Strong disorder in interacting quantum systems can give rise to the phenomenon of Many-Body Localization (MBL), which defies thermalization due to the formation of an extensive number of quasi local integrals of motion. The one particle operator content of these integrals of motion is related to the one particle orbi...
0
1
0
0
0
0
On transient waves in linear viscoelasticity
The aim of this paper is to present a comprehensive review of method of the wave-front expansion, also known in the literature as the Buchen-Mainardi algorithm. In particular, many applications of this technique to the fundamental models of both ordinary and fractional linear viscoelasticity are thoroughly presented ...
0
1
0
0
0
0
Detection of an Optical Counterpart to the ALFALFA Ultra-compact High Velocity Cloud AGC 249525
We report on the detection at $>$98% confidence of an optical counterpart to AGC 249525, an Ultra-Compact High Velocity Cloud (UCHVC) discovered by the ALFALFA blind neutral hydrogen survey. UCHVCs are compact, isolated HI clouds with properties consistent with their being nearby low-mass galaxies, but without identi...
0
1
0
0
0
0
Boosting the power factor with resonant states: a model study
A particularly promising pathway to enhance the efficiency of thermoelectric materials lies in the use of resonant states, as suggested by experimentalists and theorists alike. In this paper, we go over the mechanisms used in the literature to explain how resonant levels affect the thermoelectric properties, and we s...
0
1
0
0
0
0
Activation cross-section data for alpha-particle induced nuclear reactions on natural ytterbium for some longer lived radioisotopes
Additional experimental cross sections were deduced for the long half-life activation products (172Hf and 173Lu) from the alpha particle induced reactions on ytterbium up to 38 MeV from late, long measurements and for 175Yb, 167Tm from a re-evaluation of earlier measured spectra. The cross-sections are compared with ...
0
0
0
1
0
0
Congestion-Aware Distributed Network Selection for Integrated Cellular and Wi-Fi Networks
Intelligent network selection plays an important role in achieving an effective data offloading in the integrated cellular and Wi-Fi networks. However, previously proposed network selection schemes mainly focused on offloading as much data traffic to Wi-Fi as possible, without systematically considering the Wi-Fi net...
1
0
0
0
0
0
Deep Learning Based Large-Scale Automatic Satellite Crosswalk Classification
High-resolution satellite imagery have been increasingly used on remote sensing classification problems. One of the main factors is the availability of this kind of data. Even though, very little effort has been placed on the zebra crossing classification problem. In this letter, crowdsourcing systems are exploited i...
1
0
0
1
0
0
Complexity of the Regularized Newton Method
Newton's method for finding an unconstrained minimizer for strictly convex functions, generally speaking, does not converge from any starting point. We introduce and study the damped regularized Newton's method (DRNM). It converges globally for any strictly convex function, which has a minimizer in $R^n$. Locally DRN...
0
0
1
0
0
0
Quantifying Program Bias
With the range and sensitivity of algorithmic decisions expanding at a break-neck speed, it is imperative that we aggressively investigate whether programs are biased. We propose a novel probabilistic program analysis technique and apply it to quantifying bias in decision-making programs. Specifically, we (i) present...
1
0
0
0
0
0
A Theory of Exoplanet Transits with Light Scattering
Exoplanet transit spectroscopy enables the characterization of distant worlds, and will yield key results for NASA's James Webb Space Telescope. However, transit spectra models are often simplified, omitting potentially important processes like refraction and multiple scattering. While the former process has seen rec...
0
1
0
0
0
0
Tuning Majorana zero modes with temperature in $π$-phase Josephson junctions
We study a superconductor-normal state-superconductor (SNS) Josephson junction along the edge of a quantum spin Hall insulator (QSHI) with a superconducting $\pi$-phase across the junction. We solve self-consistently for the superconducting order parameter and find both real junctions, where the order parameter is fu...
0
1
0
0
0
0
A repulsive skyrmion chain as guiding track for a race track memory
A skyrmion racetrack design is proposed that allows for thermally stable skyrmions to code information and dynamical pinning sites that move with the applied current. This concept solves the problem of intrinsic distributions of pinning times and pinning currents of skyrmions at static geometrical or magnetic pinning...
0
1
0
0
0
0
Compressive Sensing-Based Detection with Multimodal Dependent Data
Detection with high dimensional multimodal data is a challenging problem when there are complex inter- and intra- modal dependencies. While several approaches have been proposed for dependent data fusion (e.g., based on copula theory), their advantages come at a high price in terms of computational complexity. In thi...
1
0
0
1
0
0
Factors in Recommending Contrarian Content on Social Media
Polarization is a troubling phenomenon that can lead to societal divisions and hurt the democratic process. It is therefore important to develop methods to reduce it. We propose an algorithmic solution to the problem of reducing polarization. The core idea is to expose users to content that challenges their point of ...
1
0
0
0
0
0
Generating the Log Law of the Wall with Superposition of Standing Waves
Turbulence remains an unsolved multidisciplinary science problem. As one of the most well-known examples in turbulent flows, knowledge of the logarithmic mean velocity profile (MVP), so called the log law of the wall, plays an important role everywhere turbulent flow meets the solid wall, such as fluids in any kind o...
0
1
0
0
0
0
Adaptive p-value weighting with power optimality
Weighting the p-values is a well-established strategy that improves the power of multiple testing procedures while dealing with heterogeneous data. However, how to achieve this task in an optimal way is rarely considered in the literature. This paper contributes to fill the gap in the case of group-structured null hy...
0
0
1
1
0
0
Topical homophily in online social systems
Understanding the dynamics of social interactions is crucial to comprehend human behavior. The emergence of online social media has enabled access to data regarding people relationships at a large scale. Twitter, specifically, is an information oriented network, with users sharing and consuming information. In this w...
1
0
0
0
0
0
Perceptual Context in Cognitive Hierarchies
Cognition does not only depend on bottom-up sensor feature abstraction, but also relies on contextual information being passed top-down. Context is higher level information that helps to predict belief states at lower levels. The main contribution of this paper is to provide a formalisation of perceptual context and ...
1
0
0
0
0
0
Coherence for braided and symmetric pseudomonoids
Presentations for unbraided, braided and symmetric pseudomonoids are defined. Biequivalences characterising the semistrict bicategories generated by these presentations are proven. It is shown that these biequivalences categorify results in the theory of monoids and commutative monoids, and generalise standard cohere...
1
0
1
0
0
0
Linear Optimal Power Flow Using Cycle Flows
Linear optimal power flow (LOPF) algorithms use a linearization of the alternating current (AC) load flow equations to optimize generator dispatch in a network subject to the loading constraints of the network branches. Common algorithms use the voltage angles at the buses as optimization variables, but alternatives ...
1
1
0
0
0
0
Toward construction of a consistent field theory with Poincare covariance in terms of step-function-type basis functions showing confinement/deconfinement, mass-gap and Regge trajectory for non-pure/pure non-Abelian gauge fields
This article is a review by the authors concerning the construction of a Poincar${\rm \acute{e}}$ covariant (owing to spacetime continuum) field-theoretic formalism in terms of step-function-type basis functions without ultraviolet divergences. This formalism analytically derives confinement/deconfinement, mass-gap a...
0
1
0
0
0
0
The Exact Solution to Rank-1 L1-norm TUCKER2 Decomposition
We study rank-1 {L1-norm-based TUCKER2} (L1-TUCKER2) decomposition of 3-way tensors, treated as a collection of $N$ $D \times M$ matrices that are to be jointly decomposed. Our contributions are as follows. i) We prove that the problem is equivalent to combinatorial optimization over $N$ antipodal-binary variables. i...
1
0
0
1
0
0
A Statistical Comparative Planetology Approach to the Hunt for Habitable Exoplanets and Life Beyond the Solar System
The search for habitable exoplanets and life beyond the Solar System is one of the most compelling scientific opportunities of our time. Nevertheless, the high cost of building facilities that can address this topic and the keen public interest in the results of such research requires the rigorous development of expe...
0
1
0
0
0
0
Fast Generation for Convolutional Autoregressive Models
Convolutional autoregressive models have recently demonstrated state-of-the-art performance on a number of generation tasks. While fast, parallel training methods have been crucial for their success, generation is typically implemented in a naïve fashion where redundant computations are unnecessarily repeated. This r...
1
0
0
1
0
0
Variable domain N-linked glycosylation and negative surface charge are key features of monoclonal ACPA: implications for B-cell selection
Autoreactive B cells have a central role in the pathogenesis of rheumatoid arthritis (RA), and recent findings have proposed that anti-citrullinated protein autoantibodies (ACPA) may be directly pathogenic. Herein, we demonstrate the frequency of variable-region glycosylation in single-cell cloned mAbs. A total of 14...
0
0
0
0
1
0
Periodic Airy process and equilibrium dynamics of edge fermions in a trap
We establish an exact mapping between (i) the equilibrium (imaginary time) dynamics of non-interacting fermions trapped in a harmonic potential at temperature $T=1/\beta$ and (ii) non-intersecting Ornstein-Uhlenbeck (OU) particles constrained to return to their initial positions after time $\beta$. Exploiting the det...
0
1
1
0
0
0
Quantum machine learning: a classical perspective
Recently, increased computational power and data availability, as well as algorithmic advances, have led machine learning techniques to impressive results in regression, classification, data-generation and reinforcement learning tasks. Despite these successes, the proximity to the physical limits of chip fabrication ...
1
0
0
1
0
0
Robot Assisted Tower Construction - A Resource Distribution Task to Study Human-Robot Collaboration and Interaction with Groups of People
Research on human-robot collaboration or human-robot teaming, has focused predominantly on understanding and enabling collaboration between a single robot and a single human. Extending human-robot collaboration research beyond the dyad, raises novel questions about how a robot should distribute resources among group ...
1
0
0
0
0
0
Counterexample Guided Inductive Optimization
This paper describes three variants of a counterexample guided inductive optimization (CEGIO) approach based on Satisfiability Modulo Theories (SMT) solvers. In particular, CEGIO relies on iterative executions to constrain a verification procedure, in order to perform inductive generalization, based on counterexample...
1
0
0
0
0
0
Bounds for the difference between two Čebyšev functionals
In this work, a generalization of pre-Grüss inequality is established. Several bounds for the difference between two Čebyšev functional are proved.
0
0
1
0
0
0
Converting Your Thoughts to Texts: Enabling Brain Typing via Deep Feature Learning of EEG Signals
An electroencephalography (EEG) based Brain Computer Interface (BCI) enables people to communicate with the outside world by interpreting the EEG signals of their brains to interact with devices such as wheelchairs and intelligent robots. More specifically, motor imagery EEG (MI-EEG), which reflects a subjects active...
1
0
0
0
0
0
Model Checking of Cache for WCET Analysis Refinement
On real-time systems running under timing constraints, scheduling can be performed when one is aware of the worst case execution time (WCET) of tasks. Usually, the WCET of a task is unknown and schedulers make use of safe over-approximations given by static WCET analysis. To reduce the over-approximation, WCET analys...
1
0
0
0
0
0
Rational Solutions of the Painlevé-II Equation Revisited
The rational solutions of the Painlevé-II equation appear in several applications and are known to have many remarkable algebraic and analytic properties. They also have several different representations, useful in different ways for establishing these properties. In particular, Riemann-Hilbert representations have p...
0
1
1
0
0
0
PHAST: Protein-like heteropolymer analysis by statistical thermodynamics
PHAST is a software package written in standard Fortran, with MPI and CUDA extensions, able to efficiently perform parallel multicanonical Monte Carlo simulations of single or multiple heteropolymeric chains, as coarse-grained models for proteins. The outcome data can be straightforwardly analyzed within its microcan...
0
1
0
0
0
0
An Information-Theoretic Analysis for Thompson Sampling with Many Actions
Information-theoretic Bayesian regret bounds of Russo and Van Roy capture the dependence of regret on prior uncertainty. However, this dependence is through entropy, which can become arbitrarily large as the number of actions increases. We establish new bounds that depend instead on a notion of rate-distortion. Among...
0
0
0
1
0
0
Optimal portfolio selection in an Itô-Markov additive market
We study a portfolio selection problem in a continuous-time Itô-Markov additive market with prices of financial assets described by Markov additive processes which combine Lévy processes and regime switching models. Thus the model takes into account two sources of risk: the jump diffusion risk and the regime switchin...
0
0
0
0
0
1
SPIRITS: Uncovering Unusual Infrared Transients With Spitzer
We present an ongoing, systematic search for extragalactic infrared transients, dubbed SPIRITS --- SPitzer InfraRed Intensive Transients Survey. In the first year, using Spitzer/IRAC, we searched 190 nearby galaxies with cadence baselines of one month and six months. We discovered over 1958 variables and 43 transient...
0
1
0
0
0
0
Is the annual growth rate in balance of trade time series for Ireland nonlinear
We describe the Time Series Multivariate Adaptive Regressions Splines (TSMARS) method. This method is useful for identifying nonlinear structure in a time series. We use TSMARS to model the annual change in the balance of trade for Ireland from 1970 to 2007. We compare the TSMARS estimate with long memory ARFIMA esti...
0
0
0
1
0
0
Sparse-View X-Ray CT Reconstruction Using $\ell_1$ Prior with Learned Transform
A major challenge in X-ray computed tomography (CT) is reducing radiation dose while maintaining high quality of reconstructed images. To reduce the radiation dose, one can reduce the number of projection views (sparse-view CT); however, it becomes difficult to achieve high quality image reconstruction as the number ...
1
1
0
1
0
0
Adversarial classification: An adversarial risk analysis approach
Classification problems in security settings are usually contemplated as confrontations in which one or more adversaries try to fool a classifier to obtain a benefit. Most approaches to such adversarial classification problems have focused on game theoretical ideas with strong underlying common knowledge assumptions,...
0
0
0
1
0
0
Volume growth in the component of fibered twists
For a Liouville domain $W$ whose boundary admits a periodic Reeb flow, we can consider the connected component $[\tau] \in \pi_0(\text{Symp}^c(\widehat W))$ of fibered twists. In this paper, we investigate an entropy-type invariant, called the slow volume growth, of the component $[\tau]$ and give a uniform lower bou...
0
0
1
0
0
0
Scalar Reduction of a Neural Field Model with Spike Frequency Adaptation
We study a deterministic version of a one- and two-dimensional attractor neural network model of hippocampal activity first studied by Itskov et al 2011. We analyze the dynamics of the system on the ring and torus domain with an even periodized weight matrix, assum- ing weak and slow spike frequency adaptation and a ...
0
0
0
0
1
0
Revisiting Elementary Denotational Semantics
Operational semantics have been enormously successful, in large part due to its flexibility and simplicity, but they are not compositional. Denotational semantics, on the other hand, are compositional but the lattice-theoretic models are complex and difficult to scale to large languages. However, there are elementary...
1
0
0
0
0
0
Dirac Composite Fermion - A Particle-Hole Spinor
The particle-hole (PH) symmetry at half-filled Landau level requires the relationship between the flux number N_phi and the particle number N on a sphere to be exactly N_phi - 2(N-1) = 1. The wave functions of composite fermions with 1/2 "orbital spin", which contributes to the shift "1" in the N_phi and N relationsh...
0
1
0
0
0
0
Safe Adaptive Importance Sampling
Importance sampling has become an indispensable strategy to speed up optimization algorithms for large-scale applications. Improved adaptive variants - using importance values defined by the complete gradient information which changes during optimization - enjoy favorable theoretical properties, but are typically com...
1
0
0
0
0
0
Secure Grouping Protocol Using a Deck of Cards
We consider a problem, which we call secure grouping, of dividing a number of parties into some subsets (groups) in the following manner: Each party has to know the other members of his/her group, while he/she may not know anything about how the remaining parties are divided (except for certain public predetermined c...
1
0
0
0
0
0
Categorically closed topological groups
Let $\mathcal C$ be a subcategory of the category of topologized semigroups and their partial continuous homomorphisms. An object $X$ of the category ${\mathcal C}$ is called ${\mathcal C}$-closed if for each morphism $f:X\to Y$ of the category ${\mathcal C}$ the image $f(X)$ is closed in $Y$. In the paper we detect ...
0
0
1
0
0
0
Extracting significant signal of news consumption from social networks: the case of Twitter in Italian political elections
According to the Eurobarometer report about EU media use of May 2018, the number of European citizens who consult on-line social networks for accessing information is considerably increasing. In this work we analyze approximately $10^6$ tweets exchanged during the last Italian elections. By using an entropy-based nul...
1
0
0
0
0
0
Annealed Generative Adversarial Networks
We introduce a novel framework for adversarial training where the target distribution is annealed between the uniform distribution and the data distribution. We posited a conjecture that learning under continuous annealing in the nonparametric regime is stable irrespective of the divergence measures in the objective ...
1
0
0
1
0
0
Attitude Control of Spacecraft Formations Subject To Distributed Communication Delays
This paper considers the problem of achieving attitude consensus in spacecraft formations with bounded, time-varying communication delays between spacecraft connected as specified by a strongly connected topology. A state feedback con- troller is proposed and investigated using a time domain approach (via LMIs) and a...
1
0
0
0
0
0
Cloud Radiative Effect Study Using Sky Camera
The analysis of clouds in the earth's atmosphere is important for a variety of applications, viz. weather reporting, climate forecasting, and solar energy generation. In this paper, we focus our attention on the impact of cloud on the total solar irradiance reaching the earth's surface. We use weather station to reco...
1
1
0
0
0
0
On Testing Machine Learning Programs
Nowadays, we are witnessing a wide adoption of Machine learning (ML) models in many safety-critical systems, thanks to recent breakthroughs in deep learning and reinforcement learning. Many people are now interacting with systems based on ML every day, e.g., voice recognition systems used by virtual personal assistan...
1
0
0
0
0
0
Scalable and Efficient Statistical Inference with Estimating Functions in the MapReduce Paradigm for Big Data
The theory of statistical inference along with the strategy of divide-and-conquer for large- scale data analysis has recently attracted considerable interest due to great popularity of the MapReduce programming paradigm in the Apache Hadoop software framework. The central analytic task in the development of statistic...
0
0
0
1
0
0
Instability of pulses in gradient reaction-diffusion systems: A symplectic approach
In a scalar reaction-diffusion equation, it is known that the stability of a steady state can be determined from the Maslov index, a topological invariant that counts the state's critical points. In particular, this implies that pulse solutions are unstable. We extend this picture to pulses in reaction-diffusion syst...
0
0
1
0
0
0
Consistency of the plug-in functional predictor of the Ornstein-Uhlenbeck process in Hilbert and Banach spaces
New results on functional prediction of the Ornstein-Uhlenbeck process in an autoregressive Hilbert-valued and Banach-valued frameworks are derived. Specifically, consistency of the maximum likelihood estimator of the autocorrelation operator, and of the associated plug-in predictor is obtained in both frameworks.
0
0
1
1
0
0
Analysis of Sequence Polymorphism of LINEs and SINEs in Entamoeba histolytica
The goal of this dissertation is to study the sequence polymorphism in retrotransposable elements of Entamoeba histolytica. The Quasispecies theory, a concept of equilibrium (stationary), has been used to understand the behaviour of these elements. Two datasets of retrotransposons of Entamoeba histolytica have been u...
0
0
0
0
1
0
Classification of digital affine noncommutative geometries
It is known that connected translation invariant $n$-dimensional noncommutative differentials $d x^i$ on the algebra $k[x^1,\cdots,x^n]$ of polynomials in $n$-variables over a field $k$ are classified by commutative algebras $V$ on the vector space spanned by the coordinates. This data also applies to construct diffe...
0
0
1
0
0
0
The vectorial Ribaucour transformation for submanifolds of constant sectional curvature
We obtain a reduction of the vectorial Ribaucour transformation that preserves the class of submanifolds of constant sectional curvature of space forms, which we call the $L$-transformation. It allows to construct a family of such submanifolds starting with a given one and a vector-valued solution of a system of line...
0
0
1
0
0
0
Social Networks through the Prism of Cognition
Human relations are driven by social events - people interact, exchange information, share knowledge and emotions, or gather news from mass media. These events leave traces in human memory. The initial strength of a trace depends on cognitive factors such as emotions or attention span. Each trace continuously weakens...
1
0
0
0
0
0
Metriplectic Integrators for the Landau Collision Operator
We present a novel framework for addressing the nonlinear Landau collision integral in terms of finite element and other subspace projection methods. We employ the underlying metriplectic structure of the Landau collision integral and, using a Galerkin discretization for the velocity space, we transform the infinite-...
0
1
0
0
0
0
Eliminating higher-multiplicity intersections in the metastable dimension range
The $r$-fold analogues of Whitney trick were `in the air' since 1960s. However, only in this century they were stated, proved and applied to obtain interesting results, most notably by Mabillard and Wagner. Here we prove and apply a version of the $r$-fold Whitney trick when general position $r$-tuple intersections h...
1
0
1
0
0
0
Lagrangian Transport Through Surfaces in Compressible Flows
A material-based, i.e., Lagrangian, methodology for exact integration of flux by volume-preserving flows through a surface has been developed recently in [Karrasch, SIAM J. Appl. Math., 76 (2016), pp. 1178-1190]. In the present paper, we first generalize this framework to general compressible flows, thereby solving t...
1
1
1
0
0
0