Search is not available for this dataset
abstract
stringclasses
0 values
embedding
list
The field of Question Answering (QA) has made remarkable progress in recent years, thanks to the advent of large pre-trained language models, newer realistic benchmark datasets with leaderboards, and novel algorithms for key components such as retrievers and readers. In this paper, we introduce PRIMEQA: a one-stop an...
[ 0.007428977172821, 0.0016600299859410002, 0.003536138217896, -0.025339465588331, -0.032734144479036005, 0.013163626194000001, -0.006568093784153001, 0.004054040182381, -0.030100047588348004, -0.027328757569193, 0.012031787075102001, 0.032157935202121, -0.014295464381575002, 0.0012004348682...
This Letter presents a neural estimator for entropy production, or NEEP, that estimates entropy production (EP) from trajectories of relevant variables without detailed information on the system dynamics. For steady state, we rigorously prove that the estimator, which can be built up from different choices of deep ne...
[ -0.018650626763701002, -0.013603105209767001, 0.021334463730454, -0.022315358743071, 0.015435471199452001, -0.007561064790934001, 0.0015147674130270002, 0.020476181060075, -0.033731885254383004, -0.010633173398673, 0.0018698308849700001, 0.04329561069607701, -0.018568884581327, 0.025448773...
This paper proposes a non-interactive end-to-end solution for secure fusion and matching of biometric templates using fully homomorphic encryption (FHE). Given a pair of encrypted feature vectors, we perform the following ciphertext operations, i) feature concatenation, ii) fusion and dimensionality reduction through...
[ -0.030518766492605, 0.018731167539954, -0.011019140481948, -0.016466960310935003, 0.012755032628774001, 0.015026100911200001, -0.010140903294086, -0.011863072402775001, -0.014683039858937002, -0.036309648305177, 0.038066122680902, 0.016549294814467, -0.018319493159651, -0.009372444823384, ...
We propose a methodology for testing linear hypothesis in high-dimensional linear models. The proposed test does not impose any restriction on the size of the model, i.e. model sparsity or the loading vector representing the hypothesis. Providing asymptotically valid methods for testing general linear functions of th...
[ -0.013722210191190002, 0.025326881557703, -0.007662148214876, -0.014446632005274001, -0.011235495097935, 0.007731803692877, 0.010211553424596, 0.005366986617445, -0.016828862950205, -0.024379562586545, 0.014021730981767, 0.011242460459470001, -0.0008685219218020001, 0.004461459815502, 0....
Graph neural networks (GNNs) have been increasingly deployed in various applications that involve learning on non-Euclidean data. However, recent studies show that GNNs are vulnerable to graph adversarial attacks. Although there are several defense methods to improve GNN robustness by eliminating adversarial componen...
[ -0.010087934322655001, -0.00008165009057847783, 0.013455236330628001, -0.0030075178947290004, 0.038758903741836, 0.022201837971806002, -0.002097577787935, -0.017549093812704003, -0.029313692823052004, -0.05410039052367201, 0.010835447348654001, 0.024367531761527002, -0.0021674388553940003, ...
The internet has changed the way we live, work and take decisions. As it is the major modern resource for research, detailed data on internet usage exhibits vast amounts of behavioral information. This paper aims to answer the question whether this information can be facilitated to predict future returns of stocks on...
[ -0.020343817770481002, -0.006520542316138, 0.017638595774769002, -0.031779531389474, 0.006353173870593001, 0.003876802278682, -0.017297027632594, -0.0035796377342190004, -0.028418498113751002, -0.040960893034935004, -0.0021945773623880003, 0.037108000367879, -0.016914470121264, 0.012849805...
Sequence models assign probabilities to variable-length sequences such as natural language texts. The ability of sequence models to capture temporal dependence can be characterized by the temporal scaling of correlation and mutual information. In this paper, we study the mutual information of recurrent neural network...
[ -0.030254831537604002, -0.030061421915888002, 0.027035938575863002, -0.025074210017919003, -0.0035608140751710003, -0.007701857946813001, 0.011210865341126001, -0.002600672189146, -0.019617287442088002, -0.04826958104968, 0.004783440846949, 0.034288808703422005, 0.014105106703937002, 0.010...
Many imaging problems can be formulated as mapping problems. A general mapping problem aims to obtain an optimal mapping that minimizes an energy functional subject to the given constraints. Existing methods to solve the mapping problems are often inefficient and can sometimes get trapped in local minima. An extra ch...
[ 0.002645762637257, 0.013592092320322002, 0.017039809376001, -0.016354378312826, 0.005130449309945001, 0.028788091614842002, -0.007567155640572001, -0.015024642460048001, 0.000368419045116, -0.025909282267093003, 0.007203877437859001, 0.029418688267469004, -0.0040543228387830005, 0.01006897...
The problem of chemotherapy treatment optimization can be defined in order to minimize the size of the tumor without endangering the patient's health; therefore, chemotherapy requires to achieve a number of objectives, simultaneously. For this reason, the optimization problem turns to a multi-objective problem. In th...
[ -0.00009378712280000002, 0.007658920719999999, 0.009662022809999999, -0.0186309312, -0.0119700963, 0.036319226, 0.0014806669199999999, -0.00173105474, -0.0306911319, -0.0185477566, 0.00875404198, 0.019656742, -0.00963429827, 0.022221267200000002, -0.007437123919999999, 0.00842134747999...
In recent years Bayesian networks (BNs) with a mixture of continuous and discrete variables have received an increasing level of attention. We present an architecture for exact belief update in Conditional Linear Gaussian BNs (CLG BNs). The architecture is an extension of lazy propagation using operations of Lauritze...
[ -0.017823442816734, 0.006389536429196, 0.0008109526825130001, -0.012288647703826, 0.0012427017791190001, 0.0021210878621780002, -0.015441379509866002, 0.020794017240405003, -0.025572158396244, -0.017515176907181, 0.0010263893054790001, 0.019715081900358002, -0.019631009548902, 0.0303502976...
Manipulation tasks often require robots to be continuously in contact with an object. Therefore tactile perception systems need to handle continuous contact data. Shear deformation causes the tactile sensor to output path-dependent readings in contrast to discrete contact readings. As such, in some continuous-contact...
[ -0.016901863738894, 0.01093980949372, -0.00245196558535, -0.0074736615642900005, 0.011214007623493, 0.030457103624939003, -0.018364256247878002, 0.0014316315064200002, -0.03605356067419, -0.044490430504083, 0.029557170346379003, 0.024677846580743002, 0.012296739034354002, 0.011319468729197...