ID
int64
1
16.8k
TITLE
stringlengths
7
239
ABSTRACT
stringlengths
7
2.59k
Computer Science
int64
0
1
Physics
int64
0
1
Mathematics
int64
0
1
Statistics
int64
0
1
Quantitative Biology
int64
0
1
Quantitative Finance
int64
0
1
101
Memory Aware Synapses: Learning what (not) to forget
Humans can learn in a continuous manner. Old rarely utilized knowledge can be overwritten by new incoming information while important, frequently used knowledge is prevented from being erased. In artificial learning systems, lifelong learning so far has focused mainly on accumulating knowledge over tasks and overcomi...
1
0
0
1
0
0
102
Uniform Spectral Convergence of the Stochastic Galerkin Method for the Linear Semiconductor Boltzmann Equation with Random Inputs and Diffusive Scalings
In this paper, we study the generalized polynomial chaos (gPC) based stochastic Galerkin method for the linear semiconductor Boltzmann equation under diffusive scaling and with random inputs from an anisotropic collision kernel and the random initial condition. While the numerical scheme and the proof of uniform-in-K...
0
0
1
0
0
0
103
On Improving the Capacity of Solving Large-scale Wireless Network Design Problems by Genetic Algorithms
Over the last decade, wireless networks have experienced an impressive growth and now play a main role in many telecommunications systems. As a consequence, scarce radio resources, such as frequencies, became congested and the need for effective and efficient assignment methods arose. In this work, we present a Genet...
1
0
1
0
0
0
104
Quasi two-dimensional Fermi surface topography of the delafossite PdRhO$_2$
We report on a combined study of the de Haas-van Alphen effect and angle resolved photoemission spectroscopy on single crystals of the metallic delafossite PdRhO$_2$ rounded off by \textit{ab initio} band structure calculations. A high sensitivity torque magnetometry setup with SQUID readout and synchrotron-based pho...
0
1
0
0
0
0
105
A Variational Characterization of Rényi Divergences
Atar, Chowdhary and Dupuis have recently exhibited a variational formula for exponential integrals of bounded measurable functions in terms of Rényi divergences. We develop a variational characterization of the Rényi divergences between two probability distributions on a measurable sace in terms of relative entropies...
1
0
1
1
0
0
106
Interlayer coupling and gate-tunable excitons in transition metal dichalcogenide heterostructures
Bilayer van der Waals (vdW) heterostructures such as MoS2/WS2 and MoSe2/WSe2 have attracted much attention recently, particularly because of their type II band alignments and the formation of interlayer exciton as the lowest-energy excitonic state. In this work, we calculate the electronic and optical properties of s...
0
1
0
0
0
0
107
Enumeration of singular varieties with tangency conditions
We construct the algebraic cobordism theory of bundles and divisors on varieties. It has a simple basis (over Q) from projective spaces and its rank is equal to the number of Chern numbers. An application of this algebraic cobordism theory is the enumeration of singular subvarieties with give tangent conditions with ...
0
0
1
0
0
0
108
In-home and remote use of robotic body surrogates by people with profound motor deficits
People with profound motor deficits could perform useful physical tasks for themselves by controlling robots that are comparable to the human body. Whether this is possible without invasive interfaces has been unclear, due to the robot's complexity and the person's limitations. We developed a novel, augmented reality...
1
0
0
0
0
0
109
ClusterNet: Detecting Small Objects in Large Scenes by Exploiting Spatio-Temporal Information
Object detection in wide area motion imagery (WAMI) has drawn the attention of the computer vision research community for a number of years. WAMI proposes a number of unique challenges including extremely small object sizes, both sparse and densely-packed objects, and extremely large search spaces (large video frames...
1
0
0
0
0
0
110
Monte Carlo Tree Search with Sampled Information Relaxation Dual Bounds
Monte Carlo Tree Search (MCTS), most famously used in game-play artificial intelligence (e.g., the game of Go), is a well-known strategy for constructing approximate solutions to sequential decision problems. Its primary innovation is the use of a heuristic, known as a default policy, to obtain Monte Carlo estimates ...
1
0
1
0
0
0
111
Fermi-edge singularity and the functional renormalization group
We study the Fermi-edge singularity, describing the response of a degenerate electron system to optical excitation, in the framework of the functional renormalization group (fRG). Results for the (interband) particle-hole susceptibility from various implementations of fRG (one- and two- particle-irreducible, multi-ch...
0
1
0
0
0
0
112
Towards "AlphaChem": Chemical Synthesis Planning with Tree Search and Deep Neural Network Policies
Retrosynthesis is a technique to plan the chemical synthesis of organic molecules, for example drugs, agro- and fine chemicals. In retrosynthesis, a search tree is built by analysing molecules recursively and dissecting them into simpler molecular building blocks until one obtains a set of known building blocks. The ...
1
1
0
0
0
0
113
The quasi-Assouad dimension for stochastically self-similar sets
The class of stochastically self-similar sets contains many famous examples of random sets, e.g. Mandelbrot percolation and general fractal percolation. Under the assumption of the uniform open set condition and some mild assumptions on the iterated function systems used, we show that the quasi-Assouad dimension of s...
0
0
1
0
0
0
114
Influence of Spin Orbit Coupling in the Iron-Based Superconductors
We report on the influence of spin-orbit coupling (SOC) in the Fe-based superconductors (FeSCs) via application of circularly-polarized spin and angle-resolved photoemission spectroscopy. We combine this technique in representative members of both the Fe-pnictides and Fe-chalcogenides with ab initio density functiona...
0
1
0
0
0
0
115
Effect of Meltdown and Spectre Patches on the Performance of HPC Applications
In this work we examine how the updates addressing Meltdown and Spectre vulnerabilities impact the performance of HPC applications. To study this we use the application kernel module of XDMoD to test the performance before and after the application of the vulnerability patches. We tested the performance difference fo...
1
0
0
0
0
0
116
Gene regulatory network inference: an introductory survey
Gene regulatory networks are powerful abstractions of biological systems. Since the advent of high-throughput measurement technologies in biology in the late 90s, reconstructing the structure of such networks has been a central computational problem in systems biology. While the problem is certainly not solved in its...
0
0
0
0
1
0
117
Optic Disc and Cup Segmentation Methods for Glaucoma Detection with Modification of U-Net Convolutional Neural Network
Glaucoma is the second leading cause of blindness all over the world, with approximately 60 million cases reported worldwide in 2010. If undiagnosed in time, glaucoma causes irreversible damage to the optic nerve leading to blindness. The optic nerve head examination, which involves measurement of cup-to-disc ratio, ...
1
0
0
1
0
0
118
Automatic Analysis, Decomposition and Parallel Optimization of Large Homogeneous Networks
The life of the modern world essentially depends on the work of the large artificial homogeneous networks, such as wired and wireless communication systems, networks of roads and pipelines. The support of their effective continuous functioning requires automatic screening and permanent optimization with processing of...
1
0
1
0
0
0
119
Robust Contextual Bandit via the Capped-$\ell_{2}$ norm
This paper considers the actor-critic contextual bandit for the mobile health (mHealth) intervention. The state-of-the-art decision-making methods in mHealth generally assume that the noise in the dynamic system follows the Gaussian distribution. Those methods use the least-square-based algorithm to estimate the expe...
1
0
0
1
0
0
120
Improper posteriors are not improper
In 1933 Kolmogorov constructed a general theory that defines the modern concept of conditional expectation. In 1955 Renyi fomulated a new axiomatic theory for probability motivated by the need to include unbounded measures. We introduce a general concept of conditional expectation in Renyi spaces. In this theory impr...
0
0
1
1
0
0
121
Fault Tolerant Consensus Agreement Algorithm
Recently a new fault tolerant and simple mechanism was designed for solving commit consensus problem. It is based on replicated validation of messages sent between transaction participants and a special dispatcher validator manager node. This paper presents a correctness, safety proofs and performance analysis of thi...
1
0
0
0
0
0
122
Congestion Barcodes: Exploring the Topology of Urban Congestion Using Persistent Homology
This work presents a new method to quantify connectivity in transportation networks. Inspired by the field of topological data analysis, we propose a novel approach to explore the robustness of road network connectivity in the presence of congestion on the roadway. The robustness of the pattern is summarized in a con...
1
0
1
0
0
0
123
Once in a blue moon: detection of 'bluing' during debris transits in the white dwarf WD1145+017
The first transiting planetesimal orbiting a white dwarf was recently detected in K2 data of WD1145+017 and has been followed up intensively. The multiple, long, and variable transits suggest the transiting objects are dust clouds, probably produced by a disintegrating asteroid. In addition, the system contains circu...
0
1
0
0
0
0
124
Viscous dynamics of drops and bubbles in Hele-Shaw cells: drainage, drag friction, coalescence, and bursting
In this review article, we discuss recent studies on drops and bubbles in Hele-Shaw cells, focusing on how scaling laws exhibit crossovers from the three-dimensional counterparts and focusing on topics in which viscosity plays an important role. By virtue of progresses in analytical theory and high-speed imaging, dyn...
0
1
0
0
0
0
125
Stacking-based Deep Neural Network: Deep Analytic Network on Convolutional Spectral Histogram Features
Stacking-based deep neural network (S-DNN), in general, denotes a deep neural network (DNN) resemblance in terms of its very deep, feedforward network architecture. The typical S-DNN aggregates a variable number of individually learnable modules in series to assemble a DNN-alike alternative to the targeted object rec...
1
0
0
0
0
0
126
Superconductivity and Frozen Electronic States at the (111) LaAlO$_3$/SrTiO$_3$ Interface
In spite of Anderson's theorem, disorder is known to affect superconductivity in conventional s-wave superconductors. In most superconductors, the degree of disorder is fixed during sample preparation. Here we report measurements of the superconducting properties of the two-dimensional gas that forms at the interface...
0
1
0
0
0
0
127
Emittance preservation of an electron beam in a loaded quasi-linear plasma wakefield
We investigate beam loading and emittance preservation for a high-charge electron beam being accelerated in quasi-linear plasma wakefields driven by a short proton beam. The structure of the studied wakefields are similar to those of a long, modulated proton beam, such as the AWAKE proton driver. We show that by prop...
0
1
0
0
0
0
128
Detection of Nonlinearly Distorted OFDM Signals via Generalized Approximate Message Passing
In this paper, we propose a practical receiver for multicarrier signals subjected to a strong memoryless nonlinearity. The receiver design is based on a generalized approximate message passing (GAMP) framework, and this allows real-time algorithm implementation in software or hardware with moderate complexity. We dem...
1
0
0
0
0
0
129
Nonlinear fractal meaning of the Hubble constant
According to astrophysical observations value of recession velocity in a certain point is proportional to a distance to this point. The proportionality coefficient is the Hubble constant measured with 5% accuracy. It is used in many cosmological theories describing dark energy, dark matter, baryons, and their relatio...
0
1
0
0
0
0
130
SEA: String Executability Analysis by Abstract Interpretation
Dynamic languages often employ reflection primitives to turn dynamically generated text into executable code at run-time. These features make standard static analysis extremely hard if not impossible because its essential data structures, i.e., the control-flow graph and the system of recursive equations associated w...
1
0
0
0
0
0
131
On the trade-off between labels and weights in quantitative bisimulation
Reductions for transition systems have been recently introduced as a uniform and principled method for comparing the expressiveness of system models with respect to a range of properties, especially bisimulations. In this paper we study the expressiveness (w.r.t. bisimulations) of models for quantitative computations...
1
0
0
0
0
0
132
Poynting's theorem in magnetic turbulence
Poynting's theorem is used to obtain an expression for the turbulent power-spectral density as function of frequency and wavenumber in low-frequency magnetic turbulence. No reference is made to Elsasser variables as is usually done in magnetohydrodynamic turbulence mixing mechanical and electromagnetic turbulence. We...
0
1
0
0
0
0
133
Polar factorization of conformal and projective maps of the sphere in the sense of optimal mass transport
Let M be a compact Riemannian manifold and let $\mu$,d be the associated measure and distance on M. Robert McCann obtained, generalizing results for the Euclidean case by Yann Brenier, the polar factorization of Borel maps S : M -> M pushing forward $\mu$ to a measure $\nu$: each S factors uniquely a.e. into the comp...
0
0
1
0
0
0
134
Representing numbers as the sum of squares and powers in the ring $\mathbb{Z}_n$
We examine the representation of numbers as the sum of two squares in $\mathbb{Z}_n$ for a general positive integer $n$. Using this information we make some comments about the density of positive integers which can be represented as the sum of two squares and powers of $2$ in $\mathbb{N}$.
0
0
1
0
0
0
135
Spatial Regression and the Bayesian Filter
Regression for spatially dependent outcomes poses many challenges, for inference and for computation. Non-spatial models and traditional spatial mixed-effects models each have their advantages and disadvantages, making it difficult for practitioners to determine how to carry out a spatial regression analysis. We disc...
0
0
0
1
0
0
136
Behaviour of electron content in the ionospheric D-region during solar X-ray flares
One of the most important parameters in ionospheric plasma research also having a wide practical application in wireless satellite telecommunications is the total electron content (TEC) representing the columnal electron number density. The F region with high electron density provides the biggest contribution to TEC ...
0
1
0
0
0
0
137
Fractional compound Poisson processes with multiple internal states
For the particles undergoing the anomalous diffusion with different waiting time distributions for different internal states, we derive the Fokker-Planck and Feymann-Kac equations, respectively, describing positions of the particles and functional distributions of the trajectories of particles; in particular, the equ...
0
0
1
1
0
0
138
Zero-point spin-fluctuations of single adatoms
Stabilizing the magnetic signal of single adatoms is a crucial step towards their successful usage in widespread technological applications such as high-density magnetic data storage devices. The quantum mechanical nature of these tiny objects, however, introduces intrinsic zero-point spin-fluctuations that tend to d...
0
1
0
0
0
0
139
Exploration-exploitation tradeoffs dictate the optimal distributions of phenotypes for populations subject to fitness fluctuations
We study a minimal model for the growth of a phenotypically heterogeneous population of cells subject to a fluctuating environment in which they can replicate (by exploiting available resources) and modify their phenotype within a given landscape (thereby exploring novel configurations). The model displays an explora...
0
0
0
0
1
0
140
Evaluating openEHR for storing computable representations of electronic health record phenotyping algorithms
Electronic Health Records (EHR) are data generated during routine clinical care. EHR offer researchers unprecedented phenotypic breadth and depth and have the potential to accelerate the pace of precision medicine at scale. A main EHR use-case is creating phenotyping algorithms to define disease status, onset and sev...
1
0
0
0
0
0
141
Optimizing Mission Critical Data Dissemination in Massive IoT Networks
Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple device-to-device (D2D) links before reaching the destination. The co...
1
0
0
0
0
0
142
Interference of two co-directional exclusion processes in the presence of a static bottleneck: a biologically motivated model
We develope a two-species exclusion process with a distinct pair of entry and exit sites for each species of rigid rods. The relatively slower forward stepping of the rods in an extended bottleneck region, located in between the two entry sites, controls the extent of interference of the co-directional flow of the tw...
0
1
0
0
0
0
143
Gaussian fluctuations of Jack-deformed random Young diagrams
We introduce a large class of random Young diagrams which can be regarded as a natural one-parameter deformation of some classical Young diagram ensembles; a deformation which is related to Jack polynomials and Jack characters. We show that each such a random Young diagram converges asymptotically to some limit shape...
0
0
1
0
0
0
144
Revisiting (logarithmic) scaling relations using renormalization group
We explicitly compute the critical exponents associated with logarithmic corrections (the so-called hatted exponents) starting from the renormalization group equations and the mean field behavior for a wide class of models at the upper critical behavior (for short and long range $\phi^n$-theories) and below it. This ...
0
1
0
0
0
0
145
Concentration of weakly dependent Banach-valued sums and applications to statistical learning methods
We obtain a Bernstein-type inequality for sums of Banach-valued random variables satisfying a weak dependence assumption of general type and under certain smoothness assumptions of the underlying Banach norm. We use this inequality in order to investigate in the asymptotical regime the error upper bounds for the broa...
0
0
1
1
0
0
146
Evolution of the Kondo lattice electronic structure above the transport coherence temperature
The temperature-dependent evolution of the Kondo lattice is a long-standing topic of theoretical and experimental investigation and yet it lacks a truly microscopic description of the relation of the basic $f$-$d$ hybridization processes to the fundamental temperature scales of Kondo screening and Fermi-liquid lattic...
0
1
0
0
0
0
147
On A Conjecture Regarding Permutations Which Destroy Arithmetic Progressions
Hegarty conjectured for $n\neq 2, 3, 5, 7$ that $\mathbb{Z}/n\mathbb{Z}$ has a permutation which destroys all arithmetic progressions mod $n$. For $n\ge n_0$, Hegarty and Martinsson demonstrated that $\mathbb{Z}/n\mathbb{Z}$ has an arithmetic-progression destroying permutation. However $n_0\approx 1.4\times 10^{14}$ ...
0
0
1
0
0
0
148
Inverse monoids and immersions of cell complexes
An immersion $f : {\mathcal D} \rightarrow \mathcal C$ between cell complexes is a local homeomorphism onto its image that commutes with the characteristic maps of the cell complexes. We study immersions between finite-dimensional connected $\Delta$-complexes by replacing the fundamental group of the base space by an...
0
0
1
0
0
0
149
Not even wrong: The spurious link between biodiversity and ecosystem functioning
Resolving the relationship between biodiversity and ecosystem functioning has been one of the central goals of modern ecology. Early debates about the relationship were finally resolved with the advent of a statistical partitioning scheme that decomposed the biodiversity effect into a "selection" effect and a "comple...
0
0
0
0
1
0
150
Evidence of Fraud in Brazil's Electoral Campaigns Via the Benford's Law
The principle of democracy is that the people govern through elected representatives. Therefore, a democracy is healthy as long as the elected politicians do represent the people. We have analyzed data from the Brazilian electoral court (Tribunal Superior Eleitoral, TSE) concerning money donations for the electoral c...
1
0
0
1
0
0
151
A Berkeley View of Systems Challenges for AI
With the increasing commoditization of computer vision, speech recognition and machine translation systems and the widespread deployment of learning-based back-end technologies such as digital advertising and intelligent infrastructures, AI (Artificial Intelligence) has moved from research labs to production. These c...
1
0
0
0
0
0
152
Equivariant infinite loop space theory, I. The space level story
We rework and generalize equivariant infinite loop space theory, which shows how to construct G-spectra from G-spaces with suitable structure. There is a naive version which gives naive G-spectra for any topological group G, but our focus is on the construction of genuine G-spectra when G is finite. We give new infor...
0
0
1
0
0
0
153
Arithmetic purity of strong approximation for homogeneous spaces
We prove that any open subset $U$ of a semi-simple simply connected quasi-split linear algebraic group $G$ with ${codim} (G\setminus U, G)\geq 2$ over a number field satisfies strong approximation by establishing a fibration of $G$ over a toric variety. We also prove a similar result of strong approximation with Brau...
0
0
1
0
0
0
154
Flatness results for nonlocal minimal cones and subgraphs
We show that nonlocal minimal cones which are non-singular subgraphs outside the origin are necessarily halfspaces. The proof is based on classical ideas of~\cite{DG1} and on the computation of the linearized nonlocal mean curvature operator, which is proved to satisfy a suitable maximum principle. With this, we obta...
0
0
1
0
0
0
155
Effective Asymptotic Formulae for Multilinear Averages of Multiplicative Functions
Let $f_1,\ldots,f_k : \mathbb{N} \rightarrow \mathbb{C}$ be multiplicative functions taking values in the closed unit disc. Using an analytic approach in the spirit of Halász' mean value theorem, we compute multidimensional averages of the shape $$x^{-l} \sum_{\mathbf{n} \in [x]^l} \prod_{1 \leq j \leq k} f_j(L_j(\ma...
0
0
1
0
0
0
156
On the apparent permeability of porous media in rarefied gas flows
The apparent gas permeability of the porous medium is an important parameter in the prediction of unconventional gas production, which was first investigated systematically by Klinkenberg in 1941 and found to increase with the reciprocal mean gas pressure (or equivalently, the Knudsen number). Although the underlying...
0
1
0
0
0
0
157
Small subgraphs and their extensions in a random distance graph
In previous papers, threshold probabilities for the properties of a random distance graph to contain strictly balanced graphs were found. We extend this result to arbitrary graphs and prove that the number of copies of a strictly balanced graph has asymptotically Poisson distribution at the threshold.
0
0
1
0
0
0
158
Increasing the Reusability of Enforcers with Lifecycle Events
Runtime enforcement can be effectively used to improve the reliability of software applications. However, it often requires the definition of ad hoc policies and enforcement strategies, which might be expensive to identify and implement. This paper discusses how to exploit lifecycle events to obtain useful enforcemen...
1
0
0
0
0
0
159
A Fast Interior Point Method for Atomic Norm Soft Thresholding
The atomic norm provides a generalization of the $\ell_1$-norm to continuous parameter spaces. When applied as a sparse regularizer for line spectral estimation the solution can be obtained by solving a convex optimization problem. This problem is known as atomic norm soft thresholding (AST). It can be cast as a semi...
1
0
0
0
0
0
160
Optimal Experiment Design for Causal Discovery from Fixed Number of Experiments
We study the problem of causal structure learning over a set of random variables when the experimenter is allowed to perform at most $M$ experiments in a non-adaptive manner. We consider the optimal learning strategy in terms of minimizing the portions of the structure that remains unknown given the limited number of...
1
0
0
1
0
0
161
Economically Efficient Combined Plant and Controller Design Using Batch Bayesian Optimization: Mathematical Framework and Airborne Wind Energy Case Study
We present a novel data-driven nested optimization framework that addresses the problem of coupling between plant and controller optimization. This optimization strategy is tailored towards instances where a closed-form expression for the system dynamic response is unobtainable and simulations or experiments are nece...
1
0
0
0
0
0
162
The 10 phases of spin chains with two Ising symmetries
We explore the topological properties of quantum spin-1/2 chains with two Ising symmetries. This class of models does not possess any of the symmetries that are required to protect the Haldane phase. Nevertheless, we show that there are 4 symmetry-protected topological phases, in addition to 6 phases that spontaneous...
0
1
0
0
0
0
163
Generalized subspace subcodes with application in cryptology
Most of the codes that have an algebraic decoding algorithm are derived from the Reed Solomon codes. They are obtained by taking equivalent codes, for example the generalized Reed Solomon codes, or by using the so-called subfield subcode method, which leads to Alternant codes and Goppa codes over the underlying prime...
1
0
0
0
0
0
164
Lagrangian fibers of Gelfand-Cetlin systems
Motivated by the study of Nishinou-Nohara-Ueda on the Floer thoery of Gelfand-Cetlin systems over complex partial flag manifolds, we provide a complete description of the topology of Gelfand-Cetlin fibers. We prove that all fibers are \emph{smooth} isotropic submanifolds and give a complete description of the fiber t...
0
0
1
0
0
0
165
A local ensemble transform Kalman particle filter for convective scale data assimilation
Ensemble data assimilation methods such as the Ensemble Kalman Filter (EnKF) are a key component of probabilistic weather forecasting. They represent the uncertainty in the initial conditions by an ensemble which incorporates information coming from the physical model with the latest observations. High-resolution num...
0
1
0
1
0
0
166
Tensor Robust Principal Component Analysis with A New Tensor Nuclear Norm
In this paper, we consider the Tensor Robust Principal Component Analysis (TRPCA) problem, which aims to exactly recover the low-rank and sparse components from their sum. Our model is based on the recently proposed tensor-tensor product (or t-product) [13]. Induced by the t-product, we first rigorously deduce the te...
0
0
0
1
0
0
167
Resolving the age bimodality of galaxy stellar populations on kpc scales
Galaxies in the local Universe are known to follow bimodal distributions in the global stellar populations properties. We analyze the distribution of the local average stellar-population ages of 654,053 sub-galactic regions resolved on ~1-kpc scales in a volume-corrected sample of 394 galaxies, drawn from the CALIFA-...
0
1
0
0
0
0
168
Hidden long evolutionary memory in a model biochemical network
We introduce a minimal model for the evolution of functional protein-interaction networks using a sequence-based mutational algorithm, and apply the model to study neutral drift in networks that yield oscillatory dynamics. Starting with a functional core module, random evolutionary drift increases network complexity ...
0
1
0
0
0
0
169
On Study of the Reliable Fully Convolutional Networks with Tree Arranged Outputs (TAO-FCN) for Handwritten String Recognition
The handwritten string recognition is still a challengeable task, though the powerful deep learning tools were introduced. In this paper, based on TAO-FCN, we proposed an end-to-end system for handwritten string recognition. Compared with the conventional methods, there is no preprocess nor manually designed rules em...
1
0
0
0
0
0
170
Marcel Riesz on Nörlund Means
We note that the necessary and sufficient conditions established by Marcel Riesz for the inclusion of regular Nörlund summation methods are in fact applicable quite generally.
0
0
1
0
0
0
171
Mathematics of Isogeny Based Cryptography
These lectures notes were written for a summer school on Mathematics for post-quantum cryptography in Thiès, Senegal. They try to provide a guide for Masters' students to get through the vast literature on elliptic curves, without getting lost on their way to learning isogeny based cryptography. They are by no means ...
1
0
0
0
0
0
172
Modeling of drug diffusion in a solid tumor leading to tumor cell death
It has been shown recently that changing the fluidic properties of a drug can improve its efficacy in ablating solid tumors. We develop a modeling framework for tumor ablation, and present the simplest possible model for drug diffusion in a spherical tumor with leaky boundaries and assuming cell death eventually lead...
0
0
0
0
1
0
173
Sensitivity analysis for inverse probability weighting estimators via the percentile bootstrap
To identify the estimand in missing data problems and observational studies, it is common to base the statistical estimation on the "missing at random" and "no unmeasured confounder" assumptions. However, these assumptions are unverifiable using empirical data and pose serious threats to the validity of the qualitati...
0
0
1
1
0
0
174
From 4G to 5G: Self-organized Network Management meets Machine Learning
In this paper, we provide an analysis of self-organized network management, with an end-to-end perspective of the network. Self-organization as applied to cellular networks is usually referred to Self-organizing Networks (SONs), and it is a key driver for improving Operations, Administration, and Maintenance (OAM) ac...
1
0
0
0
0
0
175
Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation
Understanding smart grid cyber attacks is key for developing appropriate protection and recovery measures. Advanced attacks pursue maximized impact at minimized costs and detectability. This paper conducts risk analysis of combined data integrity and availability attacks against the power system state estimation. We ...
1
0
0
0
0
0
176
A New Family of Near-metrics for Universal Similarity
We propose a family of near-metrics based on local graph diffusion to capture similarity for a wide class of data sets. These quasi-metametrics, as their names suggest, dispense with one or two standard axioms of metric spaces, specifically distinguishability and symmetry, so that similarity between data points of ar...
1
0
0
1
0
0
177
Poisoning Attacks to Graph-Based Recommender Systems
Recommender system is an important component of many web services to help users locate items that match their interests. Several studies showed that recommender systems are vulnerable to poisoning attacks, in which an attacker injects fake data to a given system such that the system makes recommendations as the attac...
0
0
0
1
0
0
178
SU-RUG at the CoNLL-SIGMORPHON 2017 shared task: Morphological Inflection with Attentional Sequence-to-Sequence Models
This paper describes the Stockholm University/University of Groningen (SU-RUG) system for the SIGMORPHON 2017 shared task on morphological inflection. Our system is based on an attentional sequence-to-sequence neural network model using Long Short-Term Memory (LSTM) cells, with joint training of morphological inflect...
1
0
0
0
0
0
179
Neural system identification for large populations separating "what" and "where"
Neuroscientists classify neurons into different types that perform similar computations at different locations in the visual field. Traditional methods for neural system identification do not capitalize on this separation of 'what' and 'where'. Learning deep convolutional feature spaces that are shared among many neu...
1
0
0
1
0
0
180
On the Deployment of Distributed Antennas for Wireless Power Transfer with Safety Electromagnetic Radiation Level Requirement
The extremely low efficiency is regarded as the bottleneck of Wireless Power Transfer (WPT) technology. To tackle this problem, either enlarging the transfer power or changing the infrastructure of WPT system could be an intuitively proposed way. However, the drastically important issue on the user exposure of electr...
1
0
0
0
0
0
181
A simulation technique for slurries interacting with moving parts and deformable solids with applications
A numerical method for particle-laden fluids interacting with a deformable solid domain and mobile rigid parts is proposed and implemented in a full engineering system. The fluid domain is modeled with a lattice Boltzmann representation, the particles and rigid parts are modeled with a discrete element representation...
1
0
0
0
0
0
182
Dissipative hydrodynamics in superspace
We construct a Schwinger-Keldysh effective field theory for relativistic hydrodynamics for charged matter in a thermal background using a superspace formalism. Superspace allows us to efficiently impose the symmetries of the problem and to obtain a simple expression for the effective action. We show that the theory w...
0
1
0
0
0
0
183
The Two-fold Role of Observables in Classical and Quantum Kinematics
Observables have a dual nature in both classical and quantum kinematics: they are at the same time \emph{quantities}, allowing to separate states by means of their numerical values, and \emph{generators of transformations}, establishing relations between different states. In this work, we show how this two-fold role ...
0
1
0
0
0
0
184
On the isoperimetric quotient over scalar-flat conformal classes
Let $(M,g)$ be a smooth compact Riemannian manifold of dimension $n$ with smooth boundary $\partial M$. Suppose that $(M,g)$ admits a scalar-flat conformal metric. We prove that the supremum of the isoperimetric quotient over the scalar-flat conformal class is strictly larger than the best constant of the isoperimetr...
0
0
1
0
0
0
185
On the Spectrum of Random Features Maps of High Dimensional Data
Random feature maps are ubiquitous in modern statistical machine learning, where they generalize random projections by means of powerful, yet often difficult to analyze nonlinear operators. In this paper, we leverage the "concentration" phenomenon induced by random matrix theory to perform a spectral analysis on the ...
0
0
0
1
0
0
186
Minimum energy path calculations with Gaussian process regression
The calculation of minimum energy paths for transitions such as atomic and/or spin re-arrangements is an important task in many contexts and can often be used to determine the mechanism and rate of transitions. An important challenge is to reduce the computational effort in such calculations, especially when ab initi...
0
1
0
1
0
0
187
Evaluating Roles of Central Users in Online Communication Networks: A Case Study of #PanamaLeaks
Social media has changed the ways of communication, where everyone is equipped with the power to express their opinions to others in online discussion platforms. Previously, a number of stud- ies have been presented to identify opinion leaders in online discussion networks. Feng ("Are you connected? Evaluating inform...
1
1
0
1
0
0
188
Best polynomial approximation on the triangle
Let $E_n(f)_{\alpha,\beta,\gamma}$ denote the error of best approximation by polynomials of degree at most $n$ in the space $L^2(\varpi_{\alpha,\beta,\gamma})$ on the triangle $\{(x,y): x, y \ge 0, x+y \le 1\}$, where $\varpi_{\alpha,\beta,\gamma}(x,y) := x^\alpha y ^\beta (1-x-y)^\gamma$ for $\alpha,\beta,\gamma > -...
0
0
1
0
0
0
189
SecureTime: Secure Multicast Time Synchronization
Due to the increasing dependency of critical infrastructure on synchronized clocks, network time synchronization protocols have become an attractive target for attackers. We identify data origin authentication as the key security objective and suggest to employ recently proposed high-performance digital signature sch...
1
0
0
0
0
0
190
Solving the multi-site and multi-orbital Dynamical Mean Field Theory using Density Matrix Renormalization
We implement an efficient numerical method to calculate response functions of complex impurities based on the Density Matrix Renormalization Group (DMRG) and use it as the impurity-solver of the Dynamical Mean Field Theory (DMFT). This method uses the correction vector to obtain precise Green's functions on the real ...
0
1
0
0
0
0
191
Topologically Invariant Double Dirac States in Bismuth based Perovskites: Consequence of Ambivalent Charge States and Covalent Bonding
Bulk and surface electronic structures, calculated using density functional theory and a tight-binding model Hamiltonian, reveal the existence of two topologically invariant (TI) surface states in the family of cubic Bi perovskites (ABiO$_3$; A = Na, K, Rb, Cs, Mg, Ca, Sr and Ba). The two TI states, one lying in the ...
0
1
0
0
0
0
192
Identitas: A Better Way To Be Meaningless
It is often recommended that identifiers for ontology terms should be semantics-free or meaningless. In practice, ontology developers tend to use numeric identifiers, starting at 1 and working upwards. In this paper we present a critique of current ontology semantics-free identifiers; monotonically increasing numbers...
1
0
0
0
0
0
193
Learning from Between-class Examples for Deep Sound Recognition
Deep learning methods have achieved high performance in sound recognition tasks. Deciding how to feed the training data is important for further performance improvement. We propose a novel learning method for deep sound recognition: Between-Class learning (BC learning). Our strategy is to learn a discriminative featu...
1
0
0
1
0
0
194
DAGGER: A sequential algorithm for FDR control on DAGs
We propose a linear-time, single-pass, top-down algorithm for multiple testing on directed acyclic graphs (DAGs), where nodes represent hypotheses and edges specify a partial ordering in which hypotheses must be tested. The procedure is guaranteed to reject a sub-DAG with bounded false discovery rate (FDR) while sati...
0
0
1
1
0
0
195
On nonlinear profile decompositions and scattering for a NLS-ODE model
In this paper, we consider a Hamiltonian system combining a nonlinear Schr\" odinger equation (NLS) and an ordinary differential equation (ODE). This system is a simplified model of the NLS around soliton solutions. Following Nakanishi \cite{NakanishiJMSJ}, we show scattering of $L^2$ small $H^1$ radial solutions. Th...
0
0
1
0
0
0
196
Blockchain and human episodic memory
We relate the concepts used in decentralized ledger technology to studies of episodic memory in the mammalian brain. Specifically, we introduce the standard concepts of linked list, hash functions, and sharding, from computer science. We argue that these concepts may be more relevant to studies of the neural mechanis...
0
0
0
0
1
0
197
Epidemic Spreading and Aging in Temporal Networks with Memory
Time-varying network topologies can deeply influence dynamical processes mediated by them. Memory effects in the pattern of interactions among individuals are also known to affect how diffusive and spreading phenomena take place. In this paper we analyze the combined effect of these two ingredients on epidemic dynami...
1
0
0
0
1
0
198
The Shattered Gradients Problem: If resnets are the answer, then what is the question?
A long-standing obstacle to progress in deep learning is the problem of vanishing and exploding gradients. Although, the problem has largely been overcome via carefully constructed initializations and batch normalization, architectures incorporating skip-connections such as highway and resnets perform much better tha...
1
0
0
1
0
0
199
Pr$_2$Ir$_2$O$_7$: when Luttinger semimetal meets Melko-Hertog-Gingras spin ice state
We study the band structure topology and engineering from the interplay between local moments and itinerant electrons in the context of pyrochlore iridates. For the metallic iridate Pr$_2$Ir$_2$O$_7$, the Ir $5d$ conduction electrons interact with the Pr $4f$ local moments via the $f$-$d$ exchange. While the Ir elect...
0
1
0
0
0
0
200
A 2-edge partial inverse problem for the Sturm-Liouville operators with singular potentials on a star-shaped graph
Boundary value problems for Sturm-Liouville operators with potentials from the class $W_2^{-1}$ on a star-shaped graph are considered. We assume that the potentials are known on all the edges of the graph except two, and show that the potentials on the remaining edges can be constructed by fractional parts of two spe...
0
0
1
0
0
0