ID int64 1 16.8k | TITLE stringlengths 7 239 | ABSTRACT stringlengths 7 2.59k | Computer Science int64 0 1 | Physics int64 0 1 | Mathematics int64 0 1 | Statistics int64 0 1 | Quantitative Biology int64 0 1 | Quantitative Finance int64 0 1 |
|---|---|---|---|---|---|---|---|---|
101 | Memory Aware Synapses: Learning what (not) to forget | Humans can learn in a continuous manner. Old rarely utilized knowledge can be
overwritten by new incoming information while important, frequently used
knowledge is prevented from being erased. In artificial learning systems,
lifelong learning so far has focused mainly on accumulating knowledge over
tasks and overcomi... | 1 | 0 | 0 | 1 | 0 | 0 |
102 | Uniform Spectral Convergence of the Stochastic Galerkin Method for the Linear Semiconductor Boltzmann Equation with Random Inputs and Diffusive Scalings | In this paper, we study the generalized polynomial chaos (gPC) based
stochastic Galerkin method for the linear semiconductor Boltzmann equation
under diffusive scaling and with random inputs from an anisotropic collision
kernel and the random initial condition. While the numerical scheme and the
proof of uniform-in-K... | 0 | 0 | 1 | 0 | 0 | 0 |
103 | On Improving the Capacity of Solving Large-scale Wireless Network Design Problems by Genetic Algorithms | Over the last decade, wireless networks have experienced an impressive growth
and now play a main role in many telecommunications systems. As a consequence,
scarce radio resources, such as frequencies, became congested and the need for
effective and efficient assignment methods arose. In this work, we present a
Genet... | 1 | 0 | 1 | 0 | 0 | 0 |
104 | Quasi two-dimensional Fermi surface topography of the delafossite PdRhO$_2$ | We report on a combined study of the de Haas-van Alphen effect and angle
resolved photoemission spectroscopy on single crystals of the metallic
delafossite PdRhO$_2$ rounded off by \textit{ab initio} band structure
calculations. A high sensitivity torque magnetometry setup with SQUID readout
and synchrotron-based pho... | 0 | 1 | 0 | 0 | 0 | 0 |
105 | A Variational Characterization of Rényi Divergences | Atar, Chowdhary and Dupuis have recently exhibited a variational formula for
exponential integrals of bounded measurable functions in terms of Rényi
divergences. We develop a variational characterization of the Rényi
divergences between two probability distributions on a measurable sace in terms
of relative entropies... | 1 | 0 | 1 | 1 | 0 | 0 |
106 | Interlayer coupling and gate-tunable excitons in transition metal dichalcogenide heterostructures | Bilayer van der Waals (vdW) heterostructures such as MoS2/WS2 and MoSe2/WSe2
have attracted much attention recently, particularly because of their type II
band alignments and the formation of interlayer exciton as the lowest-energy
excitonic state. In this work, we calculate the electronic and optical
properties of s... | 0 | 1 | 0 | 0 | 0 | 0 |
107 | Enumeration of singular varieties with tangency conditions | We construct the algebraic cobordism theory of bundles and divisors on
varieties. It has a simple basis (over Q) from projective spaces and its rank
is equal to the number of Chern numbers. An application of this algebraic
cobordism theory is the enumeration of singular subvarieties with give tangent
conditions with ... | 0 | 0 | 1 | 0 | 0 | 0 |
108 | In-home and remote use of robotic body surrogates by people with profound motor deficits | People with profound motor deficits could perform useful physical tasks for
themselves by controlling robots that are comparable to the human body. Whether
this is possible without invasive interfaces has been unclear, due to the
robot's complexity and the person's limitations. We developed a novel,
augmented reality... | 1 | 0 | 0 | 0 | 0 | 0 |
109 | ClusterNet: Detecting Small Objects in Large Scenes by Exploiting Spatio-Temporal Information | Object detection in wide area motion imagery (WAMI) has drawn the attention
of the computer vision research community for a number of years. WAMI proposes
a number of unique challenges including extremely small object sizes, both
sparse and densely-packed objects, and extremely large search spaces (large
video frames... | 1 | 0 | 0 | 0 | 0 | 0 |
110 | Monte Carlo Tree Search with Sampled Information Relaxation Dual Bounds | Monte Carlo Tree Search (MCTS), most famously used in game-play artificial
intelligence (e.g., the game of Go), is a well-known strategy for constructing
approximate solutions to sequential decision problems. Its primary innovation
is the use of a heuristic, known as a default policy, to obtain Monte Carlo
estimates ... | 1 | 0 | 1 | 0 | 0 | 0 |
111 | Fermi-edge singularity and the functional renormalization group | We study the Fermi-edge singularity, describing the response of a degenerate
electron system to optical excitation, in the framework of the functional
renormalization group (fRG). Results for the (interband) particle-hole
susceptibility from various implementations of fRG (one- and two-
particle-irreducible, multi-ch... | 0 | 1 | 0 | 0 | 0 | 0 |
112 | Towards "AlphaChem": Chemical Synthesis Planning with Tree Search and Deep Neural Network Policies | Retrosynthesis is a technique to plan the chemical synthesis of organic
molecules, for example drugs, agro- and fine chemicals. In retrosynthesis, a
search tree is built by analysing molecules recursively and dissecting them
into simpler molecular building blocks until one obtains a set of known
building blocks. The ... | 1 | 1 | 0 | 0 | 0 | 0 |
113 | The quasi-Assouad dimension for stochastically self-similar sets | The class of stochastically self-similar sets contains many famous examples
of random sets, e.g. Mandelbrot percolation and general fractal percolation.
Under the assumption of the uniform open set condition and some mild
assumptions on the iterated function systems used, we show that the
quasi-Assouad dimension of s... | 0 | 0 | 1 | 0 | 0 | 0 |
114 | Influence of Spin Orbit Coupling in the Iron-Based Superconductors | We report on the influence of spin-orbit coupling (SOC) in the Fe-based
superconductors (FeSCs) via application of circularly-polarized spin and
angle-resolved photoemission spectroscopy. We combine this technique in
representative members of both the Fe-pnictides and Fe-chalcogenides with ab
initio density functiona... | 0 | 1 | 0 | 0 | 0 | 0 |
115 | Effect of Meltdown and Spectre Patches on the Performance of HPC Applications | In this work we examine how the updates addressing Meltdown and Spectre
vulnerabilities impact the performance of HPC applications. To study this we
use the application kernel module of XDMoD to test the performance before and
after the application of the vulnerability patches. We tested the performance
difference fo... | 1 | 0 | 0 | 0 | 0 | 0 |
116 | Gene regulatory network inference: an introductory survey | Gene regulatory networks are powerful abstractions of biological systems.
Since the advent of high-throughput measurement technologies in biology in the
late 90s, reconstructing the structure of such networks has been a central
computational problem in systems biology. While the problem is certainly not
solved in its... | 0 | 0 | 0 | 0 | 1 | 0 |
117 | Optic Disc and Cup Segmentation Methods for Glaucoma Detection with Modification of U-Net Convolutional Neural Network | Glaucoma is the second leading cause of blindness all over the world, with
approximately 60 million cases reported worldwide in 2010. If undiagnosed in
time, glaucoma causes irreversible damage to the optic nerve leading to
blindness. The optic nerve head examination, which involves measurement of
cup-to-disc ratio, ... | 1 | 0 | 0 | 1 | 0 | 0 |
118 | Automatic Analysis, Decomposition and Parallel Optimization of Large Homogeneous Networks | The life of the modern world essentially depends on the work of the large
artificial homogeneous networks, such as wired and wireless communication
systems, networks of roads and pipelines. The support of their effective
continuous functioning requires automatic screening and permanent optimization
with processing of... | 1 | 0 | 1 | 0 | 0 | 0 |
119 | Robust Contextual Bandit via the Capped-$\ell_{2}$ norm | This paper considers the actor-critic contextual bandit for the mobile health
(mHealth) intervention. The state-of-the-art decision-making methods in mHealth
generally assume that the noise in the dynamic system follows the Gaussian
distribution. Those methods use the least-square-based algorithm to estimate
the expe... | 1 | 0 | 0 | 1 | 0 | 0 |
120 | Improper posteriors are not improper | In 1933 Kolmogorov constructed a general theory that defines the modern
concept of conditional expectation. In 1955 Renyi fomulated a new axiomatic
theory for probability motivated by the need to include unbounded measures. We
introduce a general concept of conditional expectation in Renyi spaces. In this
theory impr... | 0 | 0 | 1 | 1 | 0 | 0 |
121 | Fault Tolerant Consensus Agreement Algorithm | Recently a new fault tolerant and simple mechanism was designed for solving
commit consensus problem. It is based on replicated validation of messages sent
between transaction participants and a special dispatcher validator manager
node. This paper presents a correctness, safety proofs and performance analysis
of thi... | 1 | 0 | 0 | 0 | 0 | 0 |
122 | Congestion Barcodes: Exploring the Topology of Urban Congestion Using Persistent Homology | This work presents a new method to quantify connectivity in transportation
networks. Inspired by the field of topological data analysis, we propose a
novel approach to explore the robustness of road network connectivity in the
presence of congestion on the roadway. The robustness of the pattern is
summarized in a con... | 1 | 0 | 1 | 0 | 0 | 0 |
123 | Once in a blue moon: detection of 'bluing' during debris transits in the white dwarf WD1145+017 | The first transiting planetesimal orbiting a white dwarf was recently
detected in K2 data of WD1145+017 and has been followed up intensively. The
multiple, long, and variable transits suggest the transiting objects are dust
clouds, probably produced by a disintegrating asteroid. In addition, the system
contains circu... | 0 | 1 | 0 | 0 | 0 | 0 |
124 | Viscous dynamics of drops and bubbles in Hele-Shaw cells: drainage, drag friction, coalescence, and bursting | In this review article, we discuss recent studies on drops and bubbles in
Hele-Shaw cells, focusing on how scaling laws exhibit crossovers from the
three-dimensional counterparts and focusing on topics in which viscosity plays
an important role. By virtue of progresses in analytical theory and high-speed
imaging, dyn... | 0 | 1 | 0 | 0 | 0 | 0 |
125 | Stacking-based Deep Neural Network: Deep Analytic Network on Convolutional Spectral Histogram Features | Stacking-based deep neural network (S-DNN), in general, denotes a deep neural
network (DNN) resemblance in terms of its very deep, feedforward network
architecture. The typical S-DNN aggregates a variable number of individually
learnable modules in series to assemble a DNN-alike alternative to the targeted
object rec... | 1 | 0 | 0 | 0 | 0 | 0 |
126 | Superconductivity and Frozen Electronic States at the (111) LaAlO$_3$/SrTiO$_3$ Interface | In spite of Anderson's theorem, disorder is known to affect superconductivity
in conventional s-wave superconductors. In most superconductors, the degree of
disorder is fixed during sample preparation. Here we report measurements of the
superconducting properties of the two-dimensional gas that forms at the
interface... | 0 | 1 | 0 | 0 | 0 | 0 |
127 | Emittance preservation of an electron beam in a loaded quasi-linear plasma wakefield | We investigate beam loading and emittance preservation for a high-charge
electron beam being accelerated in quasi-linear plasma wakefields driven by a
short proton beam. The structure of the studied wakefields are similar to those
of a long, modulated proton beam, such as the AWAKE proton driver. We show that
by prop... | 0 | 1 | 0 | 0 | 0 | 0 |
128 | Detection of Nonlinearly Distorted OFDM Signals via Generalized Approximate Message Passing | In this paper, we propose a practical receiver for multicarrier signals
subjected to a strong memoryless nonlinearity. The receiver design is based on
a generalized approximate message passing (GAMP) framework, and this allows
real-time algorithm implementation in software or hardware with moderate
complexity. We dem... | 1 | 0 | 0 | 0 | 0 | 0 |
129 | Nonlinear fractal meaning of the Hubble constant | According to astrophysical observations value of recession velocity in a
certain point is proportional to a distance to this point. The proportionality
coefficient is the Hubble constant measured with 5% accuracy. It is used in
many cosmological theories describing dark energy, dark matter, baryons, and
their relatio... | 0 | 1 | 0 | 0 | 0 | 0 |
130 | SEA: String Executability Analysis by Abstract Interpretation | Dynamic languages often employ reflection primitives to turn dynamically
generated text into executable code at run-time. These features make standard
static analysis extremely hard if not impossible because its essential data
structures, i.e., the control-flow graph and the system of recursive equations
associated w... | 1 | 0 | 0 | 0 | 0 | 0 |
131 | On the trade-off between labels and weights in quantitative bisimulation | Reductions for transition systems have been recently introduced as a uniform
and principled method for comparing the expressiveness of system models with
respect to a range of properties, especially bisimulations. In this paper we
study the expressiveness (w.r.t. bisimulations) of models for quantitative
computations... | 1 | 0 | 0 | 0 | 0 | 0 |
132 | Poynting's theorem in magnetic turbulence | Poynting's theorem is used to obtain an expression for the turbulent
power-spectral density as function of frequency and wavenumber in low-frequency
magnetic turbulence. No reference is made to Elsasser variables as is usually
done in magnetohydrodynamic turbulence mixing mechanical and electromagnetic
turbulence. We... | 0 | 1 | 0 | 0 | 0 | 0 |
133 | Polar factorization of conformal and projective maps of the sphere in the sense of optimal mass transport | Let M be a compact Riemannian manifold and let $\mu$,d be the associated
measure and distance on M. Robert McCann obtained, generalizing results for the
Euclidean case by Yann Brenier, the polar factorization of Borel maps S : M ->
M pushing forward $\mu$ to a measure $\nu$: each S factors uniquely a.e. into
the comp... | 0 | 0 | 1 | 0 | 0 | 0 |
134 | Representing numbers as the sum of squares and powers in the ring $\mathbb{Z}_n$ | We examine the representation of numbers as the sum of two squares in
$\mathbb{Z}_n$ for a general positive integer $n$. Using this information we
make some comments about the density of positive integers which can be
represented as the sum of two squares and powers of $2$ in $\mathbb{N}$.
| 0 | 0 | 1 | 0 | 0 | 0 |
135 | Spatial Regression and the Bayesian Filter | Regression for spatially dependent outcomes poses many challenges, for
inference and for computation. Non-spatial models and traditional spatial
mixed-effects models each have their advantages and disadvantages, making it
difficult for practitioners to determine how to carry out a spatial regression
analysis. We disc... | 0 | 0 | 0 | 1 | 0 | 0 |
136 | Behaviour of electron content in the ionospheric D-region during solar X-ray flares | One of the most important parameters in ionospheric plasma research also
having a wide practical application in wireless satellite telecommunications is
the total electron content (TEC) representing the columnal electron number
density. The F region with high electron density provides the biggest
contribution to TEC ... | 0 | 1 | 0 | 0 | 0 | 0 |
137 | Fractional compound Poisson processes with multiple internal states | For the particles undergoing the anomalous diffusion with different waiting
time distributions for different internal states, we derive the Fokker-Planck
and Feymann-Kac equations, respectively, describing positions of the particles
and functional distributions of the trajectories of particles; in particular,
the equ... | 0 | 0 | 1 | 1 | 0 | 0 |
138 | Zero-point spin-fluctuations of single adatoms | Stabilizing the magnetic signal of single adatoms is a crucial step towards
their successful usage in widespread technological applications such as
high-density magnetic data storage devices. The quantum mechanical nature of
these tiny objects, however, introduces intrinsic zero-point spin-fluctuations
that tend to d... | 0 | 1 | 0 | 0 | 0 | 0 |
139 | Exploration-exploitation tradeoffs dictate the optimal distributions of phenotypes for populations subject to fitness fluctuations | We study a minimal model for the growth of a phenotypically heterogeneous
population of cells subject to a fluctuating environment in which they can
replicate (by exploiting available resources) and modify their phenotype within
a given landscape (thereby exploring novel configurations). The model displays
an explora... | 0 | 0 | 0 | 0 | 1 | 0 |
140 | Evaluating openEHR for storing computable representations of electronic health record phenotyping algorithms | Electronic Health Records (EHR) are data generated during routine clinical
care. EHR offer researchers unprecedented phenotypic breadth and depth and have
the potential to accelerate the pace of precision medicine at scale. A main EHR
use-case is creating phenotyping algorithms to define disease status, onset and
sev... | 1 | 0 | 0 | 0 | 0 | 0 |
141 | Optimizing Mission Critical Data Dissemination in Massive IoT Networks | Mission critical data dissemination in massive Internet of things (IoT)
networks imposes constraints on the message transfer delay between devices. Due
to low power and communication range of IoT devices, data is foreseen to be
relayed over multiple device-to-device (D2D) links before reaching the
destination. The co... | 1 | 0 | 0 | 0 | 0 | 0 |
142 | Interference of two co-directional exclusion processes in the presence of a static bottleneck: a biologically motivated model | We develope a two-species exclusion process with a distinct pair of entry and
exit sites for each species of rigid rods. The relatively slower forward
stepping of the rods in an extended bottleneck region, located in between the
two entry sites, controls the extent of interference of the co-directional flow
of the tw... | 0 | 1 | 0 | 0 | 0 | 0 |
143 | Gaussian fluctuations of Jack-deformed random Young diagrams | We introduce a large class of random Young diagrams which can be regarded as
a natural one-parameter deformation of some classical Young diagram ensembles;
a deformation which is related to Jack polynomials and Jack characters. We show
that each such a random Young diagram converges asymptotically to some limit
shape... | 0 | 0 | 1 | 0 | 0 | 0 |
144 | Revisiting (logarithmic) scaling relations using renormalization group | We explicitly compute the critical exponents associated with logarithmic
corrections (the so-called hatted exponents) starting from the renormalization
group equations and the mean field behavior for a wide class of models at the
upper critical behavior (for short and long range $\phi^n$-theories) and below
it. This ... | 0 | 1 | 0 | 0 | 0 | 0 |
145 | Concentration of weakly dependent Banach-valued sums and applications to statistical learning methods | We obtain a Bernstein-type inequality for sums of Banach-valued random
variables satisfying a weak dependence assumption of general type and under
certain smoothness assumptions of the underlying Banach norm. We use this
inequality in order to investigate in the asymptotical regime the error upper
bounds for the broa... | 0 | 0 | 1 | 1 | 0 | 0 |
146 | Evolution of the Kondo lattice electronic structure above the transport coherence temperature | The temperature-dependent evolution of the Kondo lattice is a long-standing
topic of theoretical and experimental investigation and yet it lacks a truly
microscopic description of the relation of the basic $f$-$d$ hybridization
processes to the fundamental temperature scales of Kondo screening and
Fermi-liquid lattic... | 0 | 1 | 0 | 0 | 0 | 0 |
147 | On A Conjecture Regarding Permutations Which Destroy Arithmetic Progressions | Hegarty conjectured for $n\neq 2, 3, 5, 7$ that $\mathbb{Z}/n\mathbb{Z}$ has
a permutation which destroys all arithmetic progressions mod $n$. For $n\ge
n_0$, Hegarty and Martinsson demonstrated that $\mathbb{Z}/n\mathbb{Z}$ has an
arithmetic-progression destroying permutation. However $n_0\approx 1.4\times
10^{14}$ ... | 0 | 0 | 1 | 0 | 0 | 0 |
148 | Inverse monoids and immersions of cell complexes | An immersion $f : {\mathcal D} \rightarrow \mathcal C$ between cell complexes
is a local homeomorphism onto its image that commutes with the characteristic
maps of the cell complexes. We study immersions between finite-dimensional
connected $\Delta$-complexes by replacing the fundamental group of the base
space by an... | 0 | 0 | 1 | 0 | 0 | 0 |
149 | Not even wrong: The spurious link between biodiversity and ecosystem functioning | Resolving the relationship between biodiversity and ecosystem functioning has
been one of the central goals of modern ecology. Early debates about the
relationship were finally resolved with the advent of a statistical
partitioning scheme that decomposed the biodiversity effect into a "selection"
effect and a "comple... | 0 | 0 | 0 | 0 | 1 | 0 |
150 | Evidence of Fraud in Brazil's Electoral Campaigns Via the Benford's Law | The principle of democracy is that the people govern through elected
representatives. Therefore, a democracy is healthy as long as the elected
politicians do represent the people. We have analyzed data from the Brazilian
electoral court (Tribunal Superior Eleitoral, TSE) concerning money donations
for the electoral c... | 1 | 0 | 0 | 1 | 0 | 0 |
151 | A Berkeley View of Systems Challenges for AI | With the increasing commoditization of computer vision, speech recognition
and machine translation systems and the widespread deployment of learning-based
back-end technologies such as digital advertising and intelligent
infrastructures, AI (Artificial Intelligence) has moved from research labs to
production. These c... | 1 | 0 | 0 | 0 | 0 | 0 |
152 | Equivariant infinite loop space theory, I. The space level story | We rework and generalize equivariant infinite loop space theory, which shows
how to construct G-spectra from G-spaces with suitable structure. There is a
naive version which gives naive G-spectra for any topological group G, but our
focus is on the construction of genuine G-spectra when G is finite.
We give new infor... | 0 | 0 | 1 | 0 | 0 | 0 |
153 | Arithmetic purity of strong approximation for homogeneous spaces | We prove that any open subset $U$ of a semi-simple simply connected
quasi-split linear algebraic group $G$ with ${codim} (G\setminus U, G)\geq 2$
over a number field satisfies strong approximation by establishing a fibration
of $G$ over a toric variety. We also prove a similar result of strong
approximation with Brau... | 0 | 0 | 1 | 0 | 0 | 0 |
154 | Flatness results for nonlocal minimal cones and subgraphs | We show that nonlocal minimal cones which are non-singular subgraphs outside
the origin are necessarily halfspaces.
The proof is based on classical ideas of~\cite{DG1} and on the computation of
the linearized nonlocal mean curvature operator, which is proved to satisfy a
suitable maximum principle.
With this, we obta... | 0 | 0 | 1 | 0 | 0 | 0 |
155 | Effective Asymptotic Formulae for Multilinear Averages of Multiplicative Functions | Let $f_1,\ldots,f_k : \mathbb{N} \rightarrow \mathbb{C}$ be multiplicative
functions taking values in the closed unit disc. Using an analytic approach in
the spirit of Halász' mean value theorem, we compute multidimensional
averages of the shape $$x^{-l} \sum_{\mathbf{n} \in [x]^l} \prod_{1 \leq j \leq
k} f_j(L_j(\ma... | 0 | 0 | 1 | 0 | 0 | 0 |
156 | On the apparent permeability of porous media in rarefied gas flows | The apparent gas permeability of the porous medium is an important parameter
in the prediction of unconventional gas production, which was first
investigated systematically by Klinkenberg in 1941 and found to increase with
the reciprocal mean gas pressure (or equivalently, the Knudsen number).
Although the underlying... | 0 | 1 | 0 | 0 | 0 | 0 |
157 | Small subgraphs and their extensions in a random distance graph | In previous papers, threshold probabilities for the properties of a random
distance graph to contain strictly balanced graphs were found. We extend this
result to arbitrary graphs and prove that the number of copies of a strictly
balanced graph has asymptotically Poisson distribution at the threshold.
| 0 | 0 | 1 | 0 | 0 | 0 |
158 | Increasing the Reusability of Enforcers with Lifecycle Events | Runtime enforcement can be effectively used to improve the reliability of
software applications. However, it often requires the definition of ad hoc
policies and enforcement strategies, which might be expensive to identify and
implement. This paper discusses how to exploit lifecycle events to obtain
useful enforcemen... | 1 | 0 | 0 | 0 | 0 | 0 |
159 | A Fast Interior Point Method for Atomic Norm Soft Thresholding | The atomic norm provides a generalization of the $\ell_1$-norm to continuous
parameter spaces. When applied as a sparse regularizer for line spectral
estimation the solution can be obtained by solving a convex optimization
problem. This problem is known as atomic norm soft thresholding (AST). It can
be cast as a semi... | 1 | 0 | 0 | 0 | 0 | 0 |
160 | Optimal Experiment Design for Causal Discovery from Fixed Number of Experiments | We study the problem of causal structure learning over a set of random
variables when the experimenter is allowed to perform at most $M$ experiments
in a non-adaptive manner. We consider the optimal learning strategy in terms of
minimizing the portions of the structure that remains unknown given the limited
number of... | 1 | 0 | 0 | 1 | 0 | 0 |
161 | Economically Efficient Combined Plant and Controller Design Using Batch Bayesian Optimization: Mathematical Framework and Airborne Wind Energy Case Study | We present a novel data-driven nested optimization framework that addresses
the problem of coupling between plant and controller optimization. This
optimization strategy is tailored towards instances where a closed-form
expression for the system dynamic response is unobtainable and simulations or
experiments are nece... | 1 | 0 | 0 | 0 | 0 | 0 |
162 | The 10 phases of spin chains with two Ising symmetries | We explore the topological properties of quantum spin-1/2 chains with two
Ising symmetries. This class of models does not possess any of the symmetries
that are required to protect the Haldane phase. Nevertheless, we show that
there are 4 symmetry-protected topological phases, in addition to 6 phases that
spontaneous... | 0 | 1 | 0 | 0 | 0 | 0 |
163 | Generalized subspace subcodes with application in cryptology | Most of the codes that have an algebraic decoding algorithm are derived from
the Reed Solomon codes. They are obtained by taking equivalent codes, for
example the generalized Reed Solomon codes, or by using the so-called subfield
subcode method, which leads to Alternant codes and Goppa codes over the
underlying prime... | 1 | 0 | 0 | 0 | 0 | 0 |
164 | Lagrangian fibers of Gelfand-Cetlin systems | Motivated by the study of Nishinou-Nohara-Ueda on the Floer thoery of
Gelfand-Cetlin systems over complex partial flag manifolds, we provide a
complete description of the topology of Gelfand-Cetlin fibers. We prove that
all fibers are \emph{smooth} isotropic submanifolds and give a complete
description of the fiber t... | 0 | 0 | 1 | 0 | 0 | 0 |
165 | A local ensemble transform Kalman particle filter for convective scale data assimilation | Ensemble data assimilation methods such as the Ensemble Kalman Filter (EnKF)
are a key component of probabilistic weather forecasting. They represent the
uncertainty in the initial conditions by an ensemble which incorporates
information coming from the physical model with the latest observations.
High-resolution num... | 0 | 1 | 0 | 1 | 0 | 0 |
166 | Tensor Robust Principal Component Analysis with A New Tensor Nuclear Norm | In this paper, we consider the Tensor Robust Principal Component Analysis
(TRPCA) problem, which aims to exactly recover the low-rank and sparse
components from their sum. Our model is based on the recently proposed
tensor-tensor product (or t-product) [13]. Induced by the t-product, we first
rigorously deduce the te... | 0 | 0 | 0 | 1 | 0 | 0 |
167 | Resolving the age bimodality of galaxy stellar populations on kpc scales | Galaxies in the local Universe are known to follow bimodal distributions in
the global stellar populations properties. We analyze the distribution of the
local average stellar-population ages of 654,053 sub-galactic regions resolved
on ~1-kpc scales in a volume-corrected sample of 394 galaxies, drawn from the
CALIFA-... | 0 | 1 | 0 | 0 | 0 | 0 |
168 | Hidden long evolutionary memory in a model biochemical network | We introduce a minimal model for the evolution of functional
protein-interaction networks using a sequence-based mutational algorithm, and
apply the model to study neutral drift in networks that yield oscillatory
dynamics. Starting with a functional core module, random evolutionary drift
increases network complexity ... | 0 | 1 | 0 | 0 | 0 | 0 |
169 | On Study of the Reliable Fully Convolutional Networks with Tree Arranged Outputs (TAO-FCN) for Handwritten String Recognition | The handwritten string recognition is still a challengeable task, though the
powerful deep learning tools were introduced. In this paper, based on TAO-FCN,
we proposed an end-to-end system for handwritten string recognition. Compared
with the conventional methods, there is no preprocess nor manually designed
rules em... | 1 | 0 | 0 | 0 | 0 | 0 |
170 | Marcel Riesz on Nörlund Means | We note that the necessary and sufficient conditions established by Marcel
Riesz for the inclusion of regular Nörlund summation methods are in fact
applicable quite generally.
| 0 | 0 | 1 | 0 | 0 | 0 |
171 | Mathematics of Isogeny Based Cryptography | These lectures notes were written for a summer school on Mathematics for
post-quantum cryptography in Thiès, Senegal. They try to provide a guide for
Masters' students to get through the vast literature on elliptic curves,
without getting lost on their way to learning isogeny based cryptography. They
are by no means ... | 1 | 0 | 0 | 0 | 0 | 0 |
172 | Modeling of drug diffusion in a solid tumor leading to tumor cell death | It has been shown recently that changing the fluidic properties of a drug can
improve its efficacy in ablating solid tumors. We develop a modeling framework
for tumor ablation, and present the simplest possible model for drug diffusion
in a spherical tumor with leaky boundaries and assuming cell death eventually
lead... | 0 | 0 | 0 | 0 | 1 | 0 |
173 | Sensitivity analysis for inverse probability weighting estimators via the percentile bootstrap | To identify the estimand in missing data problems and observational studies,
it is common to base the statistical estimation on the "missing at random" and
"no unmeasured confounder" assumptions. However, these assumptions are
unverifiable using empirical data and pose serious threats to the validity of
the qualitati... | 0 | 0 | 1 | 1 | 0 | 0 |
174 | From 4G to 5G: Self-organized Network Management meets Machine Learning | In this paper, we provide an analysis of self-organized network management,
with an end-to-end perspective of the network. Self-organization as applied to
cellular networks is usually referred to Self-organizing Networks (SONs), and
it is a key driver for improving Operations, Administration, and Maintenance
(OAM) ac... | 1 | 0 | 0 | 0 | 0 | 0 |
175 | Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation | Understanding smart grid cyber attacks is key for developing appropriate
protection and recovery measures. Advanced attacks pursue maximized impact at
minimized costs and detectability. This paper conducts risk analysis of
combined data integrity and availability attacks against the power system state
estimation. We ... | 1 | 0 | 0 | 0 | 0 | 0 |
176 | A New Family of Near-metrics for Universal Similarity | We propose a family of near-metrics based on local graph diffusion to capture
similarity for a wide class of data sets. These quasi-metametrics, as their
names suggest, dispense with one or two standard axioms of metric spaces,
specifically distinguishability and symmetry, so that similarity between data
points of ar... | 1 | 0 | 0 | 1 | 0 | 0 |
177 | Poisoning Attacks to Graph-Based Recommender Systems | Recommender system is an important component of many web services to help
users locate items that match their interests. Several studies showed that
recommender systems are vulnerable to poisoning attacks, in which an attacker
injects fake data to a given system such that the system makes recommendations
as the attac... | 0 | 0 | 0 | 1 | 0 | 0 |
178 | SU-RUG at the CoNLL-SIGMORPHON 2017 shared task: Morphological Inflection with Attentional Sequence-to-Sequence Models | This paper describes the Stockholm University/University of Groningen
(SU-RUG) system for the SIGMORPHON 2017 shared task on morphological
inflection. Our system is based on an attentional sequence-to-sequence neural
network model using Long Short-Term Memory (LSTM) cells, with joint training of
morphological inflect... | 1 | 0 | 0 | 0 | 0 | 0 |
179 | Neural system identification for large populations separating "what" and "where" | Neuroscientists classify neurons into different types that perform similar
computations at different locations in the visual field. Traditional methods
for neural system identification do not capitalize on this separation of 'what'
and 'where'. Learning deep convolutional feature spaces that are shared among
many neu... | 1 | 0 | 0 | 1 | 0 | 0 |
180 | On the Deployment of Distributed Antennas for Wireless Power Transfer with Safety Electromagnetic Radiation Level Requirement | The extremely low efficiency is regarded as the bottleneck of Wireless Power
Transfer (WPT) technology. To tackle this problem, either enlarging the
transfer power or changing the infrastructure of WPT system could be an
intuitively proposed way. However, the drastically important issue on the user
exposure of electr... | 1 | 0 | 0 | 0 | 0 | 0 |
181 | A simulation technique for slurries interacting with moving parts and deformable solids with applications | A numerical method for particle-laden fluids interacting with a deformable
solid domain and mobile rigid parts is proposed and implemented in a full
engineering system. The fluid domain is modeled with a lattice Boltzmann
representation, the particles and rigid parts are modeled with a discrete
element representation... | 1 | 0 | 0 | 0 | 0 | 0 |
182 | Dissipative hydrodynamics in superspace | We construct a Schwinger-Keldysh effective field theory for relativistic
hydrodynamics for charged matter in a thermal background using a superspace
formalism. Superspace allows us to efficiently impose the symmetries of the
problem and to obtain a simple expression for the effective action. We show
that the theory w... | 0 | 1 | 0 | 0 | 0 | 0 |
183 | The Two-fold Role of Observables in Classical and Quantum Kinematics | Observables have a dual nature in both classical and quantum kinematics: they
are at the same time \emph{quantities}, allowing to separate states by means of
their numerical values, and \emph{generators of transformations}, establishing
relations between different states. In this work, we show how this two-fold
role ... | 0 | 1 | 0 | 0 | 0 | 0 |
184 | On the isoperimetric quotient over scalar-flat conformal classes | Let $(M,g)$ be a smooth compact Riemannian manifold of dimension $n$ with
smooth boundary $\partial M$. Suppose that $(M,g)$ admits a scalar-flat
conformal metric. We prove that the supremum of the isoperimetric quotient over
the scalar-flat conformal class is strictly larger than the best constant of
the isoperimetr... | 0 | 0 | 1 | 0 | 0 | 0 |
185 | On the Spectrum of Random Features Maps of High Dimensional Data | Random feature maps are ubiquitous in modern statistical machine learning,
where they generalize random projections by means of powerful, yet often
difficult to analyze nonlinear operators. In this paper, we leverage the
"concentration" phenomenon induced by random matrix theory to perform a
spectral analysis on the ... | 0 | 0 | 0 | 1 | 0 | 0 |
186 | Minimum energy path calculations with Gaussian process regression | The calculation of minimum energy paths for transitions such as atomic and/or
spin re-arrangements is an important task in many contexts and can often be
used to determine the mechanism and rate of transitions. An important challenge
is to reduce the computational effort in such calculations, especially when ab
initi... | 0 | 1 | 0 | 1 | 0 | 0 |
187 | Evaluating Roles of Central Users in Online Communication Networks: A Case Study of #PanamaLeaks | Social media has changed the ways of communication, where everyone is
equipped with the power to express their opinions to others in online
discussion platforms. Previously, a number of stud- ies have been presented to
identify opinion leaders in online discussion networks. Feng ("Are you
connected? Evaluating inform... | 1 | 1 | 0 | 1 | 0 | 0 |
188 | Best polynomial approximation on the triangle | Let $E_n(f)_{\alpha,\beta,\gamma}$ denote the error of best approximation by
polynomials of degree at most $n$ in the space
$L^2(\varpi_{\alpha,\beta,\gamma})$ on the triangle $\{(x,y): x, y \ge 0, x+y
\le 1\}$, where $\varpi_{\alpha,\beta,\gamma}(x,y) := x^\alpha y ^\beta
(1-x-y)^\gamma$ for $\alpha,\beta,\gamma > -... | 0 | 0 | 1 | 0 | 0 | 0 |
189 | SecureTime: Secure Multicast Time Synchronization | Due to the increasing dependency of critical infrastructure on synchronized
clocks, network time synchronization protocols have become an attractive target
for attackers. We identify data origin authentication as the key security
objective and suggest to employ recently proposed high-performance digital
signature sch... | 1 | 0 | 0 | 0 | 0 | 0 |
190 | Solving the multi-site and multi-orbital Dynamical Mean Field Theory using Density Matrix Renormalization | We implement an efficient numerical method to calculate response functions of
complex impurities based on the Density Matrix Renormalization Group (DMRG) and
use it as the impurity-solver of the Dynamical Mean Field Theory (DMFT). This
method uses the correction vector to obtain precise Green's functions on the
real ... | 0 | 1 | 0 | 0 | 0 | 0 |
191 | Topologically Invariant Double Dirac States in Bismuth based Perovskites: Consequence of Ambivalent Charge States and Covalent Bonding | Bulk and surface electronic structures, calculated using density functional
theory and a tight-binding model Hamiltonian, reveal the existence of two
topologically invariant (TI) surface states in the family of cubic Bi
perovskites (ABiO$_3$; A = Na, K, Rb, Cs, Mg, Ca, Sr and Ba). The two TI
states, one lying in the ... | 0 | 1 | 0 | 0 | 0 | 0 |
192 | Identitas: A Better Way To Be Meaningless | It is often recommended that identifiers for ontology terms should be
semantics-free or meaningless. In practice, ontology developers tend to use
numeric identifiers, starting at 1 and working upwards. In this paper we
present a critique of current ontology semantics-free identifiers;
monotonically increasing numbers... | 1 | 0 | 0 | 0 | 0 | 0 |
193 | Learning from Between-class Examples for Deep Sound Recognition | Deep learning methods have achieved high performance in sound recognition
tasks. Deciding how to feed the training data is important for further
performance improvement. We propose a novel learning method for deep sound
recognition: Between-Class learning (BC learning). Our strategy is to learn a
discriminative featu... | 1 | 0 | 0 | 1 | 0 | 0 |
194 | DAGGER: A sequential algorithm for FDR control on DAGs | We propose a linear-time, single-pass, top-down algorithm for multiple
testing on directed acyclic graphs (DAGs), where nodes represent hypotheses and
edges specify a partial ordering in which hypotheses must be tested. The
procedure is guaranteed to reject a sub-DAG with bounded false discovery rate
(FDR) while sati... | 0 | 0 | 1 | 1 | 0 | 0 |
195 | On nonlinear profile decompositions and scattering for a NLS-ODE model | In this paper, we consider a Hamiltonian system combining a nonlinear Schr\"
odinger equation (NLS) and an ordinary differential equation (ODE). This system
is a simplified model of the NLS around soliton solutions. Following Nakanishi
\cite{NakanishiJMSJ}, we show scattering of $L^2$ small $H^1$ radial solutions.
Th... | 0 | 0 | 1 | 0 | 0 | 0 |
196 | Blockchain and human episodic memory | We relate the concepts used in decentralized ledger technology to studies of
episodic memory in the mammalian brain. Specifically, we introduce the standard
concepts of linked list, hash functions, and sharding, from computer science.
We argue that these concepts may be more relevant to studies of the neural
mechanis... | 0 | 0 | 0 | 0 | 1 | 0 |
197 | Epidemic Spreading and Aging in Temporal Networks with Memory | Time-varying network topologies can deeply influence dynamical processes
mediated by them. Memory effects in the pattern of interactions among
individuals are also known to affect how diffusive and spreading phenomena take
place. In this paper we analyze the combined effect of these two ingredients on
epidemic dynami... | 1 | 0 | 0 | 0 | 1 | 0 |
198 | The Shattered Gradients Problem: If resnets are the answer, then what is the question? | A long-standing obstacle to progress in deep learning is the problem of
vanishing and exploding gradients. Although, the problem has largely been
overcome via carefully constructed initializations and batch normalization,
architectures incorporating skip-connections such as highway and resnets
perform much better tha... | 1 | 0 | 0 | 1 | 0 | 0 |
199 | Pr$_2$Ir$_2$O$_7$: when Luttinger semimetal meets Melko-Hertog-Gingras spin ice state | We study the band structure topology and engineering from the interplay
between local moments and itinerant electrons in the context of pyrochlore
iridates. For the metallic iridate Pr$_2$Ir$_2$O$_7$, the Ir $5d$ conduction
electrons interact with the Pr $4f$ local moments via the $f$-$d$ exchange.
While the Ir elect... | 0 | 1 | 0 | 0 | 0 | 0 |
200 | A 2-edge partial inverse problem for the Sturm-Liouville operators with singular potentials on a star-shaped graph | Boundary value problems for Sturm-Liouville operators with potentials from
the class $W_2^{-1}$ on a star-shaped graph are considered. We assume that the
potentials are known on all the edges of the graph except two, and show that
the potentials on the remaining edges can be constructed by fractional parts of
two spe... | 0 | 0 | 1 | 0 | 0 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.