id float64 2.21k 2.31k | content stringlengths 78 1.92k ⌀ | category stringclasses 8
values |
|---|---|---|
2,312.04057 | We present a study of blue straggler stars (BSSs) of open cluster NGC 7142 using AstroSat/UVIT data and other archival data. Using a machine learning-based algorithm, ML-MOC, on Gaia DR3 data, we find 546 sources as cluster members. Based on the location on the Gaia color-magnitude diagram, we identify ten BSS candidat... | astro-ph |
2,312.02915 | We study the design of scheduling logic and control logic for networked control systems (NCSs) where plants communicate with their remotely located controllers over a shared band-limited communication network. Due to a limited capacity of the network, only a subset of the plants can exchange information with their cont... | cs |
2,312.03916 | We introduce a family of identities that express general linear non-unitary evolution operators as a linear combination of unitary evolution operators, each solving a Hamiltonian simulation problem. This formulation can exponentially enhance the accuracy of the recently introduced linear combination of Hamiltonian simu... | cs |
2,312.02863 | The incompressibility method is a counting argument in the framework of algorithmic complexity that permits discovering properties that are satisfied by most objects of a class. This paper gives a preliminary insight into Kolmogorov's complexity of groupoids and some algebras. The incompressibility method shows that al... | math |
2,312.03758 | Predicting stock market is vital for investors and policymakers, acting as a barometer of the economic health. We leverage social media data, a potent source of public sentiment, in tandem with macroeconomic indicators as government-compiled statistics, to refine stock market predictions. However, prior research using ... | cs |
2,312.02738 | This paper focuses in providing a Melnikov-like function that controls the existence of periodic solutions bifurcating from period annuli present in some families of the second-order discontinuous differential equation given by $\ddot{x}+\alpha\; \text{sgn}(x)=\eta x+\varepsilon \;f(t,x,\dot{x})$. This family has garne... | math |
2,312.04028 | Accurate representations of 3D faces are of paramount importance in various computer vision and graphics applications. However, the challenges persist due to the limitations imposed by data discretization and model linearity, which hinder the precise capture of identity and expression clues in current studies. This pap... | cs |
2,312.06257 | Some variations of $\pi$-regular and nil clean rings were recently introduced in [5, 7, 6], respectively. In this paper, we examine the structure and relationships between these classes of rings. Specifically, we prove that (m, n)-regularly nil clean rings are left-right symmetric and also show that the inclusions (D-r... | math |
2,312.04661 | Robust estimators for Generalized Linear Models (GLMs) are not easy to develop because of the nature of the distributions involved. Recently, there has been an increasing interest in this topic, especially in the presence of a possibly large number of explanatory variables. Transformed M-estimators (MT) are a natural w... | stat |
2,312.02696 | Diffusion models currently dominate the field of data-driven image synthesis with their unparalleled scaling to large datasets. In this paper, we identify and rectify several causes for uneven and ineffective training in the popular ADM diffusion model architecture, without altering its high-level structure. Observing ... | stat |
2,312.03443 | Image-based crop growth modeling can substantially contribute to precision agriculture by revealing spatial crop development over time, which allows an early and location-specific estimation of relevant future plant traits, such as leaf area or biomass. A prerequisite for realistic and sharp crop image generation is th... | cs |
2,312.02424 | This paper proposes a highly accurate trajectory estimation method for outdoor mobile robots using global navigation satellite system (GNSS) time differences of carrier phase (TDCP) measurements. By using GNSS TDCP, the relative 3D position can be estimated with millimeter precision. However, when a phenomenon called c... | cs |
2,312.02615 | Novelty detection is a fundamental task of machine learning which aims to detect abnormal ($\textit{i.e.}$ out-of-distribution (OOD)) samples. Since diffusion models have recently emerged as the de facto standard generative framework with surprising generation results, novelty detection via diffusion models has also ga... | cs |
2,312.04398 | The burgeoning navigation services using digital maps provide great convenience to drivers. Nevertheless, the presence of anomalies in lane rendering map images occasionally introduces potential hazards, as such anomalies can be misleading to human drivers and consequently contribute to unsafe driving conditions. In re... | eess |
2,312.0411 | The COVID-19 pandemic has exerted a profound impact on the global economy and continues to exact a significant toll on human lives. The COVID-19 case growth rate stands as a key epidemiological parameter to estimate and monitor for effective detection and containment of the resurgence of outbreaks. A fundamental challe... | stat |
2,312.02697 | In this work, we focus on addressing the long-horizon manipulation tasks in densely cluttered scenes. Such tasks require policies to effectively manage severe occlusions among objects and continually produce actions based on visual observations. We propose a vision-based Hierarchical policy for Cluttered-scene Long-hor... | cs |
2,312.03721 | There has been increasing interest in evaluations of language models for a variety of risks and characteristics. Evaluations relying on natural language understanding for grading can often be performed at scale by using other language models. We test the robustness of these model-graded evaluations to injections on dif... | cs |
2,312.04417 | Multiwinner voting captures a wide variety of settings, from parliamentary elections in democratic systems to product placement in online shopping platforms. There is a large body of work dealing with axiomatic characterizations, computational complexity, and algorithmic analysis of multiwinner voting rules. Although m... | cs |
2,312.04102 | Residential electric water heaters have significant load shifting capabilities due to their thermal heat capacity and large energy consumption. Model predictive control (MPC) has been shown to be an effective control strategy to enable water heater load shifting in home energy management systems. In this work, we analy... | cs |
2,312.04049 | This is part II of a paper on modeling, design, drive, and control of an actuator with magnetic restoration. In part I, nonlinear and linearized models incorporating eddy currents and friction impacts were developed and employed in the identification and were verified by FEM and an experimental prototype. A drive circu... | eess |
2,312.02207 | Transferability of adversarial examples on image classification has been systematically explored, which generates adversarial examples in black-box mode. However, the transferability of adversarial examples on semantic segmentation has been largely overlooked. In this paper, we propose an effective two-stage adversaria... | cs |
2,312.04632 | One of the primary scientific objectives of the Laser Interferometer Space Antenna (LISA) is to probe the expansion of the Universe using gravitational wave observations. Indeed, as gravitational waves from the coalescence of a massive black hole binary (MBHB) carry direct information of the luminosity distances, an ac... | astro-ph |
2,312.0576 | Segment Anything Model (SAM) has shown impressive zero-shot transfer performance for various computer vision tasks recently. However, its heavy computation costs remain daunting for practical applications. MobileSAM proposes to replace the heavyweight image encoder in SAM with TinyViT by employing distillation, which r... | cs |
2,312.06513 | Combining a variant of the Farkas lemma with the Flow Decomposition Theorem we show that the regions of any deformation of a graphical arrangement may be bijectively labeled with a set of weighted digraphs containing directed cycles of negative weight only. Bounded regions correspond to strongly connected digraphs. The... | math |
2,312.05705 | Second-order methods for deep learning -- such as KFAC -- can be useful for neural net training. However, they are often memory-inefficient and numerically unstable for low-precision training since their preconditioning Kronecker factors are dense, and require high-precision matrix inversion or decomposition. Consequen... | stat |
2,312.04188 | We report on recent results from our successful and pioneering observational program with ALMA to study emerging ultracom pact HII regions of pre-Planetary Nebulae (pPNe) using mm-wavelength recombination lines (mRRLs) as new optimal tracers. We focus on our study of two poster-child pPNe, namely, M2-9 and CRL618. We r... | astro-ph |
2,312.06235 | Randomizing the mapping of addresses to cache entries has proven to be an effective technique for hardening caches against contention-based attacks like Prime+Prome. While attacks and defenses are still evolving, it is clear that randomized caches significantly increase the security against such attacks. However, one a... | cs |
2,312.02775 | Let $\lfloor t\rfloor$ denote the integer part of $t\in\mathbb{R}$ and $\|x\|$ the distance from $x$ to the nearest integer. Suppose that $1/2<\gamma_2<\gamma_1<1$ are two fixed constants. In this paper, it is proved that, whenever $\alpha$ is an irrational number and $\beta$ is any real number, there exist infinitely ... | math |
2,312.03497 | This paper engages in a speculative exploration of the concept of an artificial agent capable of conducting research. Initially, it examines how the act of research can be conceptually characterized, aiming to provide a starting point for discussions about what it means to create such agents. The focus then shifts to t... | cs |
2,312.05287 | Identifying the number of clusters serves as a preliminary goal for many data analysis tasks. A common approach to this problem is to vary the number of clusters in a clustering algorithm (e.g., 'k' in $k$-means) and pick the value that best explains the data. However, the count estimates can be unreliable especially w... | cs |
2,312.05559 | This paper is concerned with the numerical approximation of initial-boundary-value problems of a three-parameter family of Bona-Smith systems, derived as a model for the propagation of surface waves under a physical Boussinesq regime. The work proposed here is focused on the corresponding problem with Dirichlet boundar... | math |
2,312.0617 | We study the spectral properties of flipped Toeplitz matrices of the form $H_n(f)=Y_nT_n(f)$, where $T_n(f)$ is the $n\times n$ Toeplitz matrix generated by the function $f$ and $Y_n$ is the $n\times n$ exchange (or flip) matrix having $1$ on the main anti-diagonal and $0$ elsewhere. In particular, under suitable assum... | cs |
2,312.05757 | Heterogeneous graph neural networks have become popular in various domains. However, their generalizability and interpretability are limited due to the discrepancy between their inherent inference flows and human reasoning logic or underlying causal relationships for the learning problem. This study introduces a novel ... | cs |
2,312.02359 | Languages with gradual information-flow control combine static and dynamic techniques to prevent security leaks. Gradual languages should satisfy the gradual guarantee: programs that only differ in the precision of their type annotations should behave the same modulo cast errors. Unfortunately, Toro et al. [2018] ident... | cs |
2,312.06134 | In this paper, we empirically study the optimization dynamics of multi-task learning, particularly focusing on those that govern a collection of tasks with significant data imbalance. We present a simple yet effective method of pre-training on high-resource tasks, followed by fine-tuning on a mixture of high/low-resour... | cs |
2,312.02603 | Visual inspection is a crucial yet time-consuming task across various industries. Numerous established methods employ machine learning in inspection tasks, necessitating specific training data that includes predefined inspection poses and training images essential for the training of models. The acquisition of such dat... | cs |
2,312.03082 | The excess radio background detected by ARCADE 2 represents a puzzle within the standard cosmological model. There is no clear viable astrophysical solution and, therefore, it might indicate the presence of new physics. Radiative decays of a relic neutrino $\nu_i$ into a sterile neutrino $\nu_{\rm s}$, assumed to be qu... | astro-ph |
2,312.03756 | Emotion Recognition in Conversations (ERC) is a critical aspect of affective computing, and it has many practical applications in healthcare, education, chatbots, and social media platforms. Earlier approaches for ERC analysis involved modeling both speaker and long-term contextual information using graph neural networ... | cs |
2,312.03504 | We exhibit closed hyperbolic surfaces of genus $10$ and $17$ such that the multiplicity of the first nonzero eigenvalue of their Laplacian is larger than the maximum conjectured by Yves Colin de Verdière in 1986. In order to determine these multiplicities, we apply the twisted Selberg trace formula to the representatio... | math |
2,312.04095 | Recent data-privacy laws have sparked interest in machine unlearning, which involves removing the effect of specific training samples from a learnt model as if they were never present in the original training dataset. The challenge of machine unlearning is to discard information about the ``forget'' data in the learnt ... | cs |
2,312.06231 | Functional magnetic resonance imaging analytical workflows are highly flexible with no definite consensus on how to choose a pipeline. While methods have been developed to explore this analytical space, there is still a lack of understanding of the relationships between the different pipelines. We use community detecti... | cs |
2,312.04918 | Structural pruning has become an integral part of neural network optimization, used to achieve architectural configurations which can be deployed and run more efficiently on embedded devices. Previous results showed that pruning is possible with minimum performance loss by utilizing a reinforcement learning agent which... | cs |
2,312.03604 | This paper presents a novel control strategy for medium voltage DC (MVDC) naval shipboard microgrids (MGs), employing a nonlinear model predictive controller (NMPC) enhanced with stabilizing features and an intricate droop control architecture. This combination quickly regulates the output voltage and adeptly allocates... | eess |
2,312.05143 | Transmission system operators employ reserves to deal with unexpected variations of demand and generation to guarantee the security of supply. The French transmission system operator RTE dynamically sizes the required margins using a probabilistic approach relying on continuous forecasts of the main drivers of the unce... | math |
2,312.05459 | Federated Learning is susceptible to various kinds of attacks like Data Poisoning, Model Poisoning and Man in the Middle attack. We perceive Federated Learning as a hierarchical structure, a federation of nodes with validators as the head. The process of validation is done through consensus by employing Novelty Detecti... | cs |
2,312.06499 | The fairness of Natural Language Processing (NLP) models has emerged as a crucial concern. Information theory indicates that to achieve fairness, a model should not be able to predict sensitive variables, such as gender, ethnicity, and age. However, information related to these variables often appears implicitly in lan... | cs |
2,312.04969 | An accurate delay and Doppler estimation method for a radar system using time and frequency-shifted pulses with pseudo-random numbers is proposed. The ambiguity function of the transmitted signal has a strong peak at the origin and is close to zero if delay and Doppler are more than the inverses of the bandwidth and ti... | math |
2,312.06169 | With the development of spaceflight and the exploration of extraterrestrial planets, exoplanet crater detection has gradually gained attention. However, with the current scarcity of relevant datasets, high sample background complexity, and large inter-domain differences, few existing detection models can achieve good r... | cs |
2,312.04925 | The inertia bound and ratio bound (also known as the Cvetković bound and Hoffman bound) are two fundamental inequalities in spectral graph theory, giving upper bounds on the independence number $\alpha(G)$ of a graph $G$ in terms of spectral information about a weighted adjacency matrix of $G$. For both inequalities, g... | quant-ph |
2,312.03313 | Birkar constructs projective coarse moduli spaces of good minimal models with semi-log canonical (slc) singularities polarized by effective divisors. When considering good minimal models with Kawamata log terminal (klt) singularities polarized by possibly non-effective divisors, we prove that they belong to a bounded f... | math |
2,312.04803 | We present SuperNormal, a fast, high-fidelity approach to multi-view 3D reconstruction using surface normal maps. With a few minutes, SuperNormal produces detailed surfaces on par with 3D scanners. We harness volume rendering to optimize a neural signed distance function (SDF) powered by multi-resolution hash encoding.... | cs |
2,312.025 | A computational method is proposed to calculate bound and resonant states by solving the Klein-Gordon and Dirac equations for real and complex energies, respectively. The method is an extension of a non-relativistic one, where the potential is represented in a Coulomb-Sturmian basis. This basis facilitates the exact an... | quant-ph |
2,312.04601 | We develop methods for estimating Fréchet bounds on (possibly high-dimensional) distribution classes in which some variables are continuous-valued. We establish the statistical correctness of the computed bounds under uncertainty in the marginal constraints and demonstrate the usefulness of our algorithms by evaluating... | cs |
2,312.03594 | Achieving high-quality versatile image inpainting, where user-specified regions are filled with plausible content according to user intent, presents a significant challenge. Existing methods face difficulties in simultaneously addressing context-aware image inpainting and text-guided object inpainting due to the distin... | cs |
2,312.04645 | The recently observed population of 540 free-floating Jupiter-mass objects, including 40 dynamically soft pairs in the Trapezium cluster have raised interesting questions on their formation and evolution. We test various scenarios for the origin and survivability of these free floating Jupiter-mass objects and Jupiter-... | astro-ph |
2,312.03447 | Ambiguous optical illusions have been a paradigmatic object of fascination, research and inspiration in arts, psychology and video games. However, accurate computational models of perception of ambiguous figures have been elusive. In this paper, we design and train a deep neural network model to simulate the human's pe... | cs |
2,312.03717 | We formulate a definition of the existence property that works with "structural" set theories, in the mode of ETCS (the elementary theory of the category of sets). We show that a range of structural set theories, when formulated using constructive logic, satisfy the disjunction, numerical existence, and existence prope... | math |
2,312.06536 | We present a comparison of the flux normalization of HAWC sources using 17 months of data that was processed using two different versions of the official data reconstruction used for HAWC analyses. Pass4 (P4) has been used so far for most of the results published by HAWC. The most recent reconstruction version, Pass5 (... | astro-ph |
2,312.04382 | In this paper, we propose the Adversarial Denoising Diffusion Model (ADDM). The ADDM is based on the Denoising Diffusion Probabilistic Model (DDPM) but complementarily trained by adversarial learning. The proposed adversarial learning is achieved by classifying model-based denoised samples and samples to which random G... | cs |
2,312.05621 | Instruction fine-tuning has conventionally been employed to adapt Large Language Models (LLMs) to a variety of tasks. Nonetheless, this technique often necessitates substantial computational resources, making it impractical for deployment by individuals or small-scale entities. Recently, Low-Rank Adaptation (LoRA) has ... | cs |
2,312.04251 | We present a pure linear cutting-plane relaxation approach for rapidly proving tight lower bounds for the Alternating Current Optimal Power Flow Problem (ACOPF). Our method leverages outer-envelope linear cuts for well-known second-order cone relaxations for ACOPF together with modern cut management techniques. These t... | math |
2,312.03211 | HD 148937 is a peculiar massive star (Of?p) with a strong magnetic field (1kG). The hourglass-shaped emission nebula NGC 6164/5 surrounds this star. This nebula is presumed to originate from episodic mass-loss events of the central O-type star, but the detailed formation mechanism is not yet well understood. Grasping i... | astro-ph |
2,312.05844 | We establish some functional identities of theta functions, an elementary proof of classical fourth-order identities, Landen transformations, and q series from the eigenvectors of the discrete Fourier transform. Also, we derive connection between Rogers-Ramanujan type identity and theta function identity. | math |
2,312.05952 | This paper studies the optimal control problem for discrete-time nonlinear systems and an approximate dynamic programming-based Model Predictive Control (MPC) scheme is proposed for minimizing a quadratic performance measure. In the proposed approach, the value function is approximated as a quadratic function for which... | cs |
2,312.02579 | A novel very simple method for finding roots of polynomials over finite fields has been proposed. The essence of the proposed method is to search the roots via nested cycles over the subgroups of the multiplicative group of the Galois field. The modified Chien search is actually used in the inner cycles, but the intern... | cs |
2,312.04472 | Consider a rooted tree on the top of which we let cars arrive on its vertices. Each car tries to park on its arriving vertex but if it is already occupied, it drives towards the root of the tree and parks as soon as possible. In this article, we establish a natural coupling between the parking process on trees with pre... | math |
2,312.06033 | This work studies multiple-antenna wireless communication systems based on super-resolution arrays (SRAs). We consider the uplink of a multiple-antenna system in which users communicate with a multiple-antenna base station equipped with SRAs. In particular, we develop linear minimum mean-square error (MMSE) receive fil... | math |
2,312.0407 | Symbolic Regression (SR) searches for mathematical expressions which best describe numerical datasets. This allows to circumvent interpretation issues inherent to artificial neural networks, but SR algorithms are often computationally expensive. This work proposes a new Transformer model aiming at Symbolic Regression p... | cs |
2,312.02847 | We introduce a new Projected Rayleigh Quotient Iteration aimed at improving the convergence behaviour of classic Rayleigh Quotient iteration (RQI) by incorporating approximate information about the target eigenvector at each step. While classic RQI exhibits local cubic convergence for Hermitian matrices, its global beh... | cs |
2,312.06585 | Fine-tuning language models~(LMs) on human-generated data remains a prevalent practice. However, the performance of such models is often limited by the quantity and diversity of high-quality human data. In this paper, we explore whether we can go beyond human data on tasks where we have access to scalar feedback, for e... | cs |
2,312.02401 | Content moderation at scale faces the challenge of considering local cultural distinctions when assessing content. While global policies aim to maintain decision-making consistency and prevent arbitrary rule enforcement, they often overlook regional variations in interpreting natural language as expressed in content. I... | stat |
2,312.05748 | Neural radiance fields (NeRF) is a promising approach for generating photorealistic images and representing complex scenes. However, when processing data sequentially, it can suffer from catastrophic forgetting, where previous data is easily forgotten after training with new data. Existing incremental learning methods ... | cs |
2,312.03124 | This article introduces a novel Maximum Power Point Tracking (MPPT) algorithm and cost-effective hardware for long-term operational stability measurements in perovskite solar cells (PSCs). Harnessing the untapped potential of solar energy sources is crucial for achieving a sustainable future, and accurate MPPT is vital... | eess |
2,312.02839 | A practical and scalable multicast beamformer design in multi-input multi-output~(MIMO) coded caching~(CC) systems is introduced in this paper. The proposed approach allows multicast transmission to multiple groups with partially overlapping user sets using receiver dimensions to distinguish between different group-spe... | eess |
2,312.06137 | Emerging non-volatile memory (NVM)-based Computing-in-Memory (CiM) architectures show substantial promise in accelerating deep neural networks (DNNs) due to their exceptional energy efficiency. However, NVM devices are prone to device variations. Consequently, the actual DNN weights mapped to NVM devices can differ con... | cs |
2,312.03491 | In text-to-speech (TTS) synthesis, diffusion models have achieved promising generation quality. However, because of the pre-defined data-to-noise diffusion process, their prior distribution is restricted to a noisy representation, which provides little information of the generation target. In this work, we present a no... | cs |
2,312.04253 | Cosmological studies have now entered Stage IV according to the Dark Energy Task Force prescription, thanks to new missions (Euclid, Rubin Observatory, SRG/eROSITA) that are expected to provide the required ultimate accuracy in the dark energy (DE) equation of state (EoS). However, none of these projects have the power... | astro-ph |
2,312.06071 | In climate science and meteorology, local precipitation predictions are limited by the immense computational costs induced by the high spatial resolution that simulation methods require. A common workaround is statistical downscaling (aka superresolution), where a low-resolution prediction is super-resolved using stati... | stat |
2,312.02344 | Image-to-Image translation (I2I) is a subtype of Machine Learning (ML) that has tremendous potential in applications where two domains of images and the need for translation between the two exist, such as the removal of fog. For example, this could be useful for autonomous vehicles, which currently struggle with advers... | cs |
2,312.04125 | Post-mortem iris recognition is an emerging application of iris-based human identification in a forensic setup, able to correctly identify deceased subjects even three weeks post-mortem. This technique thus is considered as an important component of future forensic toolkits. The current advancements in this field are s... | cs |
2,312.02799 | In the theory of cellular automata, an oscillator is a pattern that repeats itself after a fixed number of generations; that number is called its period. A cellular automaton is called omniperiodic if there exist oscillators of all periods. At the turn of the millennium, only twelve oscillator periods remained to be fo... | math |
2,312.0593 | Nailfold capillaroscopy is a well-established method for assessing health conditions, but the untapped potential of automated medical image analysis using machine learning remains despite recent advancements. In this groundbreaking study, we present a pioneering effort in constructing a comprehensive dataset-321 images... | cs |
2,312.06195 | Intellectual Property (IP) theft is a cause for major financial and reputational damage, reportedly in the range of hundreds of billions of dollars annually in the U.S. alone. Field Programmable Gate Arrays (FPGAs) are particularly exposed to IP theft, because their configuration file contains the IP in a proprietary f... | cs |
2,312.02433 | With the fast-paced development of multimodal large language models (MLLMs), we can now converse with AI systems in natural languages to understand images. However, the reasoning power and world knowledge embedded in the large language models have been much less investigated and exploited for image perception tasks. In... | cs |
2,312.03475 | Recently, artificial intelligence for drug discovery has raised increasing interest in both machine learning and chemistry domains. The fundamental building block for drug discovery is molecule geometry and thus, the molecule's geometrical representation is the main bottleneck to better utilize machine learning techniq... | q-bio |
2,312.04671 | The purpose of this paper is to help the anesthesiologist to find the epidural depth automatically to make the first attempt to enter the path of the needle into the patient's body while it is clogged with bone and avoid causing a puncture in the surrounding areas of the patient`s back. In this regard, a morphology-bas... | eess |
2,312.05023 | Achieving human-level dexterity in robotic grasping remains a challenging endeavor. Robotic hands frequently encounter slippage and deformation during object manipulation, issues rarely encountered by humans due to their sensory receptors, experiential learning, and motor memory. The emulation of the human grasping ref... | cs |
2,312.02605 | In recent years, end-to-end learnt video codecs have demonstrated their potential to compete with conventional coding algorithms in term of compression efficiency. However, most learning-based video compression models are associated with high computational complexity and latency, in particular at the decoder side, whic... | cs |
2,312.05756 | In recent years, machine learning (ML) has brought effective approaches and novel techniques to economic decision, investment forecasting, and risk management, etc., coping the variable and intricate nature of economic and financial environments. For the investment in stock market, this research introduces a pioneering... | cs |
2,312.02687 | In this paper, we investigate whether the symbolic and ordinary powers of a binomial edge ideal $J_{G}$ are equal. We show that the equality $J_{G}^{t}=J_{G}^{(t)}$ holds for every $t \geq 1$ when $|Ass(J_{G})|=2$. Moreover, if $G$ is a caterpillar tree, then one has the same equality. Finally, we characterize the gene... | math |
2,312.02825 | In this work we make us of Livens principle (sometimes also referred to as Hamilton-Pontryagin principle) in order to obtain a novel structure-preserving integrator for mechanical systems. In contrast to the canonical Hamiltonian equations of motion, the Euler-Lagrange equations pertaining to Livens principle circumven... | cs |
2,312.02743 | Bohr's complementarity principle (BCP) has long been a fundamental concept in quantum mechanics (QM), positing that, within a given experimental setup, a quantum system (quanton) can exhibit either its wave-like character, denoted as $W$, or its particle-like character, denoted as $P$, but not both simultaneously. Mode... | quant-ph |
2,312.02264 | We demonstrate the emergence of scaling laws in the benchmark top versus QCD jet classification problem in collider physics. Six distinct physically-motivated classifiers exhibit power-law scaling of the binary cross-entropy test loss as a function of training set size, with distinct power law indices. This result high... | cs |
2,312.03438 | The heteroscedastic probabilistic principal component analysis (PCA) technique, a variant of the classic PCA that considers data heterogeneity, is receiving more and more attention in the data science and signal processing communities. In this paper, to estimate the underlying low-dimensional linear subspace (simply ca... | eess |
2,312.04855 | Recent advancements in gravitational wave astronomy have seen the application of convolutional neural networks (CNNs) in signal detection from compact binary coalescences. This study presents a comparative analysis of two CNN architectures: one-dimensional (1D) and two-dimensional (2D) along with an ensemble model comb... | astro-ph |
2,312.03029 | Creating high-fidelity 3D head avatars has always been a research hotspot, but there remains a great challenge under lightweight sparse view setups. In this paper, we propose Gaussian Head Avatar represented by controllable 3D Gaussians for high-fidelity head avatar modeling. We optimize the neutral 3D Gaussians and a ... | cs |
2,312.02637 | In this work, we provide a comprehensive overview of the microwave-induced manipulation of electronic spin states in negatively charged group-IV color centers in diamond with a particular emphasis on the influence of strain. Central to our investigation is the consideration of the full vectorial attributes of the magne... | quant-ph |
2,312.04812 | Mixed-integer convex quadratic programs with indicator variables (MIQP) encompass a wide range of applications, from statistical learning to energy, finance, and logistics. The outer approximation (OA) algorithm has been proven efficient in solving MIQP, and the key to the success of an OA algorithm is the strength of ... | math |
2,312.03761 | We consider the problem of estimating differences in two Gaussian graphical models (GGMs) which are known to have similar structure. The GGM structure is encoded in its precision (inverse covariance) matrix. In many applications one is interested in estimating the difference in two precision matrices to characterize un... | eess |
2,312.03455 | Perceptual metrics are traditionally used to evaluate the quality of natural signals, such as images and audio. They are designed to mimic the perceptual behaviour of human observers and usually reflect structures found in natural signals. This motivates their use as loss functions for training generative models such t... | eess |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 42