text
stringlengths
189
1.92k
split
stringclasses
1 value
Autonomous vehicles require road information for their operation, usually in form of HD maps. Since offline maps eventually become outdated or may only be partially available, online HD map construction methods have been proposed to infer map information from live sensor data. A key issue remains how to exploit such pa...
arXiv
In this work, we propose novel offline and online Inverse Differential Game (IDG) methods for nonlinear Differential Games (DG), which identify the cost functions of all players from control and state trajectories constituting a feedback Nash equilibrium. The offline approach computes the sets of all equivalent cost fu...
arXiv
In this paper, we investigate the parking process on a uniform random rooted binary tree with $n$ vertices. Viewing each vertex as a single parking space, a random number of cars independently arrive at and attempt to park on each vertex one at a time. If a car attempts to park on an occupied vertex, it traverses the u...
arXiv
We study the problem of clock synchronization in a networked system with arbitrary starts for all nodes. We consider a synchronous network of $n$ nodes, where each node has a local clock that is an integer counter. Eventually, clocks must be all equal and increase by one in each round modulo some period $P$. The purpos...
arXiv
We consider the Hospital/Residents (HR) problem in the presence of ties in preference lists. Among the three notions of stability, viz. weak, strong, and super stability, we focus on the notion of strong stability. Strong stability has many desirable properties both theoretically and practically; however, its existence...
arXiv
We produce twisted derived equivalences between torsors under abelian varieties and their moduli spaces of simple semi-homogeneous sheaves. We also establish the natural converse to this result and show that a large class of twisted derived equivalences, including all derived equivalences, between torsors arise in this...
arXiv
We consider $\mathbb{Z}_q$-valued clock models on a regular tree, for general classes of ferromagnetic nearest neighbor interactions which have a discrete rotational symmetry. It has been proved recently that, at strong enough coupling, families of homogeneous Markov chain Gibbs states $\mu_A$ coexist whose single-site...
arXiv
Many magnetic white dwarfs exhibit a polarised spectrum that periodically varies as the star rotates because the magnetic field is not symmetric about the rotation axis. In this work, we report the discovery that while weakly magnetic white dwarfs of all ages with M < 1Mo show polarimetric variability with a period bet...
arXiv
Super $L_\infty$-algebras unify extended super-symmetry with rational classifying spaces for higher flux densities: The super-invariant super-fluxes which control super $p$-branes and their supergravity target super-spaces are, together with their (non-linear) Bianchi identities, neatly encoded in (non-abelian) super-$...
arXiv
A well-known result of Shalom says that lattices in SO$(n,1)$ are $L^p$ measure equivalent for all $p<n-1$. His proof actually yields the following stronger statement: the natural coupling resulting from a suitable choice of fundamental domains from a uniform lattice $\Lambda$ to a uniform one $\Gamma$ is $(L^{\infty},...
arXiv
A central computational task in database theory, finite model theory, and computer science at large is the evaluation of a first-order sentence on a finite structure. In the context of this task, the \emph{width} of a sentence, defined as the maximum number of free variables over all subformulas, has been established a...
arXiv
We evaluate the consistency of hadronic interaction models in the CORSIKA simulation package with publicly available fluorescence telescope data from the Pierre Auger Observatory. By comparing the first few central moments of the extended air shower depth maximum distributions, as extracted from measured events, to tho...
arXiv
An angular analysis of the $B_s^0 \rightarrow \phi e^+e^-$ decay is performed using the proton-proton collision dataset collected between 2011 and 2018 by the LHCb experiment, corresponding to an integrated luminosity of $9\,{\rm fb}^{-1}$ at centre-of-mass energies of 7, 8 and $13\,{\rm TeV}$. The analysis is performe...
arXiv
Large language models (LLMs) and LLM-based Agents have been applied to fix bugs automatically, demonstrating the capability in addressing software defects by engaging in development environment interaction, iterative validation and code modification. However, systematic analysis of these agent and non-agent systems rem...
arXiv
Can outreach inspire and lead to research and vice versa? In this work, we introduce our approach to the gamification of research in mathematics and computer science through three illustrative examples. We discuss our primary motivations and provide insights into what makes our proposed gamification effective for three...
arXiv
The symmetrized Asymptotic Mean Value Laplacian $\tilde{\Delta}$, obtained as limit of approximating operators $\tilde{\Delta}_r$, is an extension of the classical Euclidean Laplace operator to the realm of metric measure spaces. We show that, as $r \downarrow 0$, the operators $\tilde{\Delta}_r$ eventually admit isola...
arXiv
Spatio-Temporal predictive Learning is a self-supervised learning paradigm that enables models to identify spatial and temporal patterns by predicting future frames based on past frames. Traditional methods, which use recurrent neural networks to capture temporal patterns, have proven their effectiveness but come with ...
arXiv
In many situations humans have to reason with inconsistent knowledge. These inconsistencies may occur due to not fully reliable sources of information. In order to reason with inconsistent knowledge, it is not possible to view a set of premisses as absolute truths as is done in predicate logic. Viewing the set of premi...
arXiv
The obtention of quantum-grade rare-earth doped oxide thin films that can be integrated with optical cavities and microwave resonators is of great interest for the development of scalable quantum devices. Among the different growth methods, Chemical Vapour Deposition (CVD) offers high flexibility and has demonstrated t...
arXiv
Top-quark pair production is observed in lead-lead (Pb+Pb) collisions at $\sqrt{s_\mathrm{NN}}=5.02$ TeV at the Large Hadron Collider with the ATLAS detector. The data sample was recorded in 2015 and 2018, amounting to an integrated luminosity of 1.9 nb$^{-1}$. Events with exactly one electron and one muon and at least...
arXiv
Text-to-image generation and text-guided image manipulation have received considerable attention in the field of image generation tasks. However, the mainstream evaluation methods for these tasks have difficulty in evaluating whether all the information from the input text is accurately reflected in the generated image...
arXiv
We construct a holographic model to study the striped superconductor on ionic lattices. This model features a phase diagram with three distinct phases, namely the charge density wave (CDW) phase, ordinary superconducting phase (SC) and the striped superconducting phase (SSC). The effect of the ionic lattices on the pha...
arXiv
During the past decade, Deep Neural Networks (DNNs) proved their value on a large variety of subjects. However despite their high value and public accessibility, the protection of the intellectual property of DNNs is still an issue and an emerging research field. Recent works have successfully extracted fully-connected...
arXiv
Let $\overline X$ be a smooth rigid variety over $C=\mathbb C_p$ admitting a lift $X$ over $B_{dR}^+$. In this paper, we use the stacky language to prove a nilpotent $p$-adic Riemann-Hilbert correspondence. After introducing the moduli stack of $\mathbb B^+_{dR}$-local systems and $t$-connections, we prove that there i...
arXiv
Multimodal learning, which involves integrating information from various modalities such as text, images, audio, and video, is pivotal for numerous complex tasks like visual question answering, cross-modal retrieval, and caption generation. Traditional approaches rely on modality-specific encoders and late fusion techn...
arXiv
Various technologies, including computer vision models, are employed for the automatic monitoring of manual assembly processes in production. These models detect and classify events such as the presence of components in an assembly area or the connection of components. A major challenge with detection and classificatio...
arXiv
In the past few years, Artificial Intelligence (AI)-based weather forecasting methods have widely demonstrated strong competitiveness among the weather forecasting systems. However, these methods are insufficient for high-spatial-resolution short-term nowcasting within 6 hours, which is crucial for warning short-durati...
arXiv
Blazars are a subclass of active galactic nuclei (AGNs) with relativistic jets pointing toward the observer. They are notable for their flux variability at all observed wavelengths and timescales. Together with simultaneous measurements at lower energies, the very-high-energy (VHE) emission observed during blazar flare...
arXiv
In this paper, we analyse an extension of the children's higher-or-lower number guessing game with two guessing players, where players alternate guessing a secret integer between 1 and n, and it is revealed whether these guesses are higher or lower than the secret number, with the first player to guess the number being...
arXiv
Important advances have recently been made in the search for materials with complex multi-phase landscapes that host photoinduced metastable collective states with exotic functionalities. In almost all cases so far, the desired phases are accessed by exploiting light-matter interactions via the imaginary part of the di...
arXiv
Longitudinal analyses are increasingly used in clinical studies as they allow the study of subtle changes over time within the same subjects. In most of these studies, it is necessary to align all the images studied to a common reference by registering them to a template. In the study of white matter using the recently...
arXiv
We study internal diffusion limited aggregation on $\mathbb{Z}$, where a cluster is grown by sequentially adding the first site outside the cluster visited by each random walk dispatched from the origin. We assume that the increment distribution $X$ of the driving random walks has $\mathbb{E} X =0$, but may be neither ...
arXiv
We study functions $f : [0, 1]^d \rightarrow [0, 1]^d$ that are both monotone and contracting, and we consider the problem of finding an $\varepsilon$-approximate fixed point of $f$. We show that the problem lies in the complexity class UEOPL. We give an algorithm that finds an $\varepsilon$-approximate fixed point of ...
arXiv
We evaluate the Green's function for the insertion of the second moment of the twist-$2$ flavour nonsinglet Wilson operator in a quark $2$-point function in all three different single scale external momentum configurations at four loops in the MSbar scheme and the chiral limit. One configuration is where the operator i...
arXiv
Although image-based virtual try-on has made considerable progress, emerging approaches still encounter challenges in producing high-fidelity and robust fitting images across diverse scenarios. These methods often struggle with issues such as texture-aware maintenance and size-aware fitting, which hinder their overall ...
arXiv
Jointly optimizing power allocation and device association is crucial in Internet-of-Things (IoT) networks to ensure devices achieve their data throughput requirements. Device association, which assigns IoT devices to specific access points (APs), critically impacts resource allocation. Many existing works often assume...
arXiv
Multi-view learning often faces challenges in effectively leveraging images captured from different angles and locations. This challenge is particularly pronounced when addressing inconsistencies and uncertainties between views. In this paper, we propose a novel Multi-View Uncertainty-Weighted Mutual Distillation (MV-U...
arXiv
We introduce FedEvPrompt, a federated learning approach that integrates principles of evidential deep learning, prompt tuning, and knowledge distillation for distributed skin lesion classification. FedEvPrompt leverages two sets of prompts: b-prompts (for low-level basic visual knowledge) and t-prompts (for task-specif...
arXiv
Federated domain generalization (FedDG) aims to improve the global model generalization in unseen domains by addressing data heterogeneity under privacy-preserving constraints. A common strategy in existing FedDG studies involves sharing domain-specific knowledge among clients, such as spectrum information, class proto...
arXiv
Quantitative Information Flow (QIF) provides a robust information-theoretical framework for designing secure systems with minimal information leakage. While previous research has addressed the design of such systems under hard constraints (e.g. application limitations) and soft constraints (e.g. utility), scenarios oft...
arXiv
Having a better understanding of how locational marginal prices (LMPs) change helps in price forecasting and market strategy making. This paper investigates the fundamental distribution of the congestion part of LMPs in high-dimensional Euclidean space using an unsupervised approach. LMP models based on the lossless an...
arXiv
In 2009, Calegari constructed smooth homotopy 4-spheres from monodromies of fibered knots. We prove that all these are diffeomorphic to the standard 4-sphere. Our method uses 5-dimensional handlebody techniques and results on mapping class groups of 3-dimensional handlebodies. As an application, we present potential co...
arXiv
Physics-Informed Neural Networks (PINNs) have emerged as an influential technology, merging the swift and automated capabilities of machine learning with the precision and dependability of simulations grounded in theoretical physics. PINNs are often employed to solve algebraic or differential equations to replace some ...
arXiv
We report the discovery of a rare isolated group of five dwarf galaxies located at z = 0.0086 ($D$ = 36 Mpc). All member galaxies are star-forming, blue, and gas-rich with $g-r$ indices ranging from 0.2 to 0.6 mag, and two of them show signs of ongoing mutual interaction. The most massive member of the group has a stel...
arXiv
Determining the creep compliances of orthotropic composite materials requires experiments in at least three different uniaxial and biaxial loading directions. Up to date, data respecting multiple climates and all anatomical directions are sparse for hygro-responsive materials like Norway spruce. Consequently, simulatio...
arXiv
The constant workspace algorithms use a constant number of words in addition to the read-only input to the algorithm stored in an array. In this paper, we devise algorithms to efficiently compute relative hulls in the plane using a constant workspace. Specifically, we devise algorithms for the following three problems:...
arXiv
Effective usage of approximate circuits for various performance trade-offs requires accurate computation of error. Several average and worst case error metrics have been proposed in the literature. We propose a framework for exact computation of these error metrics, including the error rate (ER), mean absolute error (M...
arXiv
The goal of multi-object tracking (MOT) is to detect and track all objects in a scene across frames, while maintaining a unique identity for each object. Most existing methods rely on the spatial motion features and appearance embedding features of the detected objects in consecutive frames. Effectively and robustly re...
arXiv
The NSGA-II is the most prominent multi-objective evolutionary algorithm (cited more than 50,000 times). Very recently, a mathematical runtime analysis has proven that this algorithm can have enormous difficulties when the number of objectives is larger than two (Zheng, Doerr. IEEE Transactions on Evolutionary Computat...
arXiv
We aim to provide more insights into the applicability to solar coronal seismology of the much-studied discrete leaky modes (DLMs) in classic analyses. Under linear ideal pressureless MHD, we examine two-dimensional (2D) axial fundamental kink motions that arise when localized velocity exciters impact some symmetric sl...
arXiv
We present analytical and numerical calculations for the photon polarization tensor at finite temperature and density in a constant magnetic field. We first discuss the tensor decomposition in the presence of the magnetic field which breaks rotational symmetry. Then, we analytically perform all the momentum integration...
arXiv
The installation of high-capacity fast chargers for electric vehicles (EVs) is posing a significant risk to the distribution grid as the increased demand from widespread residential EV charging could exceed the technical limits of the distribution system. Addressing this issue is critical, given that current infrastruc...
arXiv
We explore birational geometry of matroids by investigating automorphisms of their coarse Bergman fans. Combinatorial Cremona maps provide such automorphisms of Bergman fans which are not induced by matroid automorphisms. We investigate the structure of matroids allowing combinatorial Cremona maps and prove a realizabi...
arXiv
Purpose: Journal Impact Factors and other citation-based indicators are widely used and abused to help select journals to publish in or to estimate the value of a published article. Nevertheless, citation rates primarily reflect scholarly impact rather than other quality dimensions, including societal impact, originali...
arXiv
A measurement of the $B^{0}$ meson lifetime and related properties using $B^0 \to J/\psi K^{*0}$ decays in data from 13 TeV proton-proton collisions with an integrated luminosity of 140 fb$^{-1}$ recorded by the ATLAS detector at the LHC is presented. The measured effective lifetime is $$ \tau = 1.5053 \pm 0.0012 ~\mat...
arXiv
Classification in the sense of similarity is an important issue. In this paper, we study similarity classification in Topological Data Analysis. We define a pseudometric $d_{S}^{(p)}$ to measure the distance between barcodes generated by persistent homology groups of topological spaces, and we provide that our pseudome...
arXiv
This paper addresses the collision detection problem in population protocols. The network consists of state machines called agents. At each time step, exactly one pair of agents is chosen uniformly at random to have an interaction, changing the states of the two agents. The collision detection problem involves each age...
arXiv
Autonomous manipulation in everyday tasks requires flexible action generation to handle complex, diverse real-world environments, such as objects with varying hardness and softness. Imitation Learning (IL) enables robots to learn complex tasks from expert demonstrations. However, a lot of existing methods rely on posit...
arXiv
This article is concerned with ``up to $C^{2, \alpha}$-regularity results'' about a mixed local-nonlocal nonlinear elliptic equation which is driven by the superposition of Laplacian and fractional Laplacian operators. First of all, an estimate on the $L^\infty$ norm of weak solutions is established for more general ...
arXiv
Variable Subset Forecasting (VSF) refers to a unique scenario in multivariate time series forecasting, where available variables in the inference phase are only a subset of the variables in the training phase. VSF presents significant challenges as the entire time series may be missing, and neither inter- nor intra-var...
arXiv
A $k$-star is a complete bipartite graph $K_{1,k}$. A partial $k$-star design of order $n$ is a pair $(V,\mathcal{A})$ where $V$ is a set of $n$ vertices and $\mathcal{A}$ is a set of edge-disjoint $k$-stars whose vertex sets are subsets of $V$. If each edge of the complete graph with vertex set $V$ is in some star in ...
arXiv
We present the first HI mass function (HIMF) measurement for the recent FAST All Sky HI (FASHI) survey and the most complete measurements of HIMF in the local universe so far by combining the HI catalogues from HI Parkes All Sky Survey (HIPASS), Arecibo Legacy Fast ALFA (ALFALFA) and FASHI surveys at redshift 0 < z < 0...
arXiv
Visual navigation takes inspiration from humans, who navigate in previously unseen environments using vision without detailed environment maps. Inspired by this, we introduce a novel no-RL, no-graph, no-odometry approach to visual navigation using feudal learning to build a three tiered agent. Key to our approach is a ...
arXiv
Today navigation applications (e.g., Waze and Google Maps) enable human users to learn and share the latest traffic observations, yet such information sharing simply aids selfish users to predict and choose the shortest paths to jam each other. Prior routing game studies focus on myopic users in oversimplified one-shot...
arXiv
Compute-and-forward (CF) is a relaying strategy which allows the relay to decode a linear combination of the transmitted messages. This work studies the optimal power allocation problem for the CF scheme in fast fading channels for maximizing the symmetric computation rate, which is a non-convex optimization problem wi...
arXiv
Mutation testing was proposed to identify weaknesses in test suites by repeatedly generating artificially faulty versions of the software (mutants) and determining if the test suite is sufficient to detect them (kill them). When the tests are insufficient, each surviving mutant provides an opportunity to improve the te...
arXiv
We study the booklink, a braid-like embedding with local maxima and minima, and the bridge-braid spectrum of a link, which captures the smallest number of braid-strands in a booklink with a prescribed number of critical points. This spectrum spans the gap between the classical bridge and braid indices. We apply a folia...
arXiv
Let ${\mathcal M}_g$ be the moduli space of compact connected Riemann surfaces of genus $g\geq 2$ and let $\widehat{{\mathcal M}_g}$ be its Deligne-Mumford compactification, which is stratified by the topological type of the stable Riemann surfaces. We consider the equisymmetric loci in $\mathcal M_g$ corresponding to ...
arXiv
For a hypergraph $\mathbb{H}$ on $[n]$, the hypergraphic poset $P_\mathbb{H}$ is the transitive closure of the oriented skeleton of the hypergraphic polytope $\triangle_\mathbb{H}$ (the Minkowski sum of the standard simplices $\triangle_H$ for all $H \in \mathbb{H}$). Hypergraphic posets include the weak order for the ...
arXiv
Optimal control theory extending from the calculus of variations has not been used to study the wind turbine power system (WTPS) control problem, which aims at achieving two targets: (i) maximizing power generation in lower wind speed conditions; and (ii) maintaining the output power at the rated level in high wind spe...
arXiv
While deep learning has revolutionized computer-aided drug discovery, the AI community has predominantly focused on model innovation and placed less emphasis on establishing best benchmarking practices. We posit that without a sound model evaluation framework, the AI community's efforts cannot reach their full potentia...
arXiv
We computed for the first time the $\tau$ data-driven Euclidean windows for the hadronic vacuum polarization contribution to the muon g-2. We showed that $\tau$-based results agree with the available lattice window evaluations and with the full result. On the intermediate window, where all lattice evaluations are rathe...
arXiv
A recent result by Kardo\v{s}, M\'a\v{c}ajov\'a and Zerafa [J. Comb. Theory, Ser. B. 160 (2023) 1--14] related to the famous Berge-Fulkerson conjecture implies that given an arbitrary set of odd pairwise edge-disjoint cycles, say $\mathcal O$, in a bridgeless cubic graph, there exists a $1$-factor intersecting all cycl...
arXiv
We consider fair resource allocation in sequential decision-making environments modeled as weakly coupled Markov decision processes, where resource constraints couple the action spaces of $N$ sub-Markov decision processes (sub-MDPs) that would otherwise operate independently. We adopt a fairness definition using the ge...
arXiv
Guessing Codeword Decoding (GCD) is a recently proposed soft-input forward error correction decoder for arbitrary linear forward error correction codes. Inspired by recent proposals that leverage binary linear codebook structure to reduce the number of queries made by Guessing Random Additive Noise Decoding (GRAND), fo...
arXiv
Self-assembly of nanoscale synthetic subunits is a promising bottom-up strategy for fabrication of functional materials. Here, we introduce a design principle for DNA origami nanoparticles of 50-nm size, exploiting modularity, to make a family of versatile subunits that can target an abundant variety of self-assembled ...
arXiv
In a recent paper (Gonzalez et al., 2023), we investigated the motion of grains within a granular bed sheared by a viscous fluid, and showed how segregation and hardening occur in the fluid- (bedload) and solid-like (creep) regions. In this paper, we inquire further into the mechanisms leading to grain segregation in a...
arXiv
This study aimed to identify and analyze the characteristics of highly cited publications in the field of artificial intelligence within the Science Citation Index Expanded from 1991 to 2022. The assessment focused on documents that garnered 100 citations or more from the Web of Science Core Collection, spanning from t...
arXiv
Machine learning (ML) defenses protect against various risks to security, privacy, and fairness. Real-life models need simultaneous protection against multiple different risks which necessitates combining multiple defenses. But combining defenses with conflicting interactions in an ML model can be ineffective, incurrin...
arXiv
We build and discuss a low energy effective field theory for anisotropic anti-ferromagnets in presence of an external magnetic field. Such an effective theory is simple yet rich, and features a number of phenomena such as the appearance of gapped Goldstones, pseudo-Goldstones and a "spin flop" phase transition, all wit...
arXiv
Given a source image of a clothed person (an image subject), AI-based nudification applications can produce nude (undressed) images of that person. Moreover, not only do such applications exist, but there is ample evidence of the use of such applications in the real world and without the consent of an image subject. St...
arXiv
The quantum approximate optimization algorithm (QAOA) is a near-term quantum algorithm aimed at solving combinatorial optimization problems. Since its introduction, various generalizations have emerged, spanning modifications to the initial state, phase unitaries, and mixer unitaries. In this work, we present an analyt...
arXiv
We present the first set of high-resolution, hydrodynamical cosmological simulations of galaxy formation in a Fuzzy Dark Matter (FDM) framework. These simulations were performed with a new version of the GASOLINE2 code, known as FUZZY-GASOLINE, which can simulate quantum FDM effects alongside a comprehensive baryonic m...
arXiv
The mass of galaxy clusters is a critical quantity for probing cluster cosmology and testing theories of gravity, but its measurement could be biased given assumptions are inevitable. In this paper, we employ and compare two mass proxies for galaxy clusters: thermodynamics of the intracluster medium and kinematics of m...
arXiv
We propose a model for a finite-size particle detector, which allows us to derive its stress-energy tensor. This tensor is obtained from a covariant Lagrangian that describes not only the quantum field that models the detector, $\phi_{\text{d}}$, but also the systems responsible for its localization: a complex scalar f...
arXiv
Given any positive integer $r$, Nahm's problem is to determine all $r\times r$ rational positive definite matrix $A$, $r$-dimensional rational vector $B$ and rational scalar $C$ such that the rank $r$ Nahm sum associated with $(A,B,C)$ is modular. Around 2007, Zagier conjectured that if the rank $r$ Nahm sum for $(A,B,...
arXiv
One potential route toward fault-tolerant universal quantum computation is to use non-Abelian topological codes. In this work, we investigate how to achieve this goal with the quantum double model $\mathcal{D}(S_3)$ -- a specific non-Abelian topological code. By embedding each on-site Hilbert space into a qubit-qutrit ...
arXiv
In the high energy limit, $s\gg -t$, amplitudes in planar gauge theories Reggeize, with power law behavior $\big( \frac{s}{-t} \big)^{\alpha(t)}$ governed by the Regge trajectory $\alpha(t)$. Beyond the planar limit this simplicity is violated by "Regge cuts", for which practical organizational principles are still bei...
arXiv
In this article, we introduce and analyse some statistical properties of a class of models of random landscapes of the form ${\cal H}({\bf x})=\frac{\mu}{2}{\bf x}^2+\sum_{l=1}^M \phi_l({\bf k}_l\cdot {\bf x}), \, \, {\bf x}\in \mathbb{R}^N,\,\, \mu>0 $ where both the functions $\phi_l(z)$ and vectors ${\bf k}_l$ are r...
arXiv
Several statistical models for regression of a function $F$ on $\mathbb{R}^d$ without the statistical and computational curse of dimensionality exist, for example by imposing and exploiting geometric assumptions on the distribution of the data (e.g. that its support is low-dimensional), or strong smoothness assumptions...
arXiv
Background: Open-Source Pre-Trained Models (PTMs) and datasets provide extensive resources for various Machine Learning (ML) tasks, yet these resources lack a classification tailored to Software Engineering (SE) needs. Aims: We apply an SE-oriented classification to PTMs and datasets on a popular open-source ML reposit...
arXiv
In this article, we study the effect of invisible neutrino decay of the third neutrino state for accelerator neutrino experiments at two different baselines, 1300 km with a liquid argon time projection chamber (LArTPC) detector (similar to DUNE) and 2588 km with a water Cherenkov detector (similar to P2O). For such bas...
arXiv
The concept of Vapnik-Chervonenkis (VC) density is pivotal across various mathematical fields, including model theory, discrete geometry, and probability theory. In this paper, we introduce a topological generalization of VC-density. Let $Y$ be a topological space and $\mathcal{X},\mathcal{Z}^{(0)},\ldots,\mathcal{Z}^{...
arXiv
We holographically study quantum chaos in hyperscaling-violating Lifshitz (HVL) theories (with charge). Particularly, we present a detailed computation of the out-of-time ordered correlator (OTOC) via the shockwave analysis in the bulk HVL geometry with a planar horizon topology. We also compute the butterfly velocity ...
arXiv
The ATLAS collaboration at the LHC has published inclusive cross-section measurements for the single-top and \ttbar production modes at center-of-mass energies of $\sqrt{s} = 5.02, 8.16$, $13$, and $13.6$ TeV. Single-top measurements are conducted in the $t$-channel and $tW$ channel. In addition to the nominal cross-se...
arXiv
During language model decoding, it is known that using higher temperature sampling gives more creative responses, while lower temperatures are more factually accurate. However, such models are commonly applied to general instruction following, which involves both creative and fact seeking tasks, using a single fixed te...
arXiv
We present complete results for the hadronic vacuum polarization (HVP) contribution to the muon anomalous magnetic moment $a_\mu$ in the short- and intermediate-distance window regions, which account for roughly 10% and 35% of the total HVP contribution to $a_\mu$, respectively. In particular, we perform lattice-QCD ca...
arXiv
Supersymmetry (SUSY) addresses several problems of the Standard Model, such as the naturalness problem and gauge coupling unification, and can provide cosmologically viable dark matter candidates. SUSY must be broken at high energy scales with mechanisms like gravity, anomaly, gauge mediation, etc. This paper revisits ...
arXiv
We present a polynomial-time reduction from max-average constraints to the feasibility problem for semidefinite programs. This shows that Condon's simple stochastic games, stochastic mean payoff games, and in particular mean payoff games and parity games can all be reduced to semidefinite programming.
arXiv
Specifying all desirable properties of a language model is challenging, but certain requirements seem essential. Given samples from an unknown language, the trained model should produce valid strings not seen in training and be expressive enough to capture the language's full richness. Otherwise, outputting invalid str...
arXiv