text
null
inputs
dict
prediction
null
prediction_agent
null
annotation
list
annotation_agent
null
multi_label
bool
1 class
explanation
null
id
stringlengths
1
5
metadata
null
status
stringclasses
2 values
event_timestamp
null
metrics
null
null
{ "abstract": " Humans can learn in a continuous manner. Old rarely utilized knowledge can be\noverwritten by new incoming information while important, frequently used\nknowledge is prevented from being erased. In artificial learning systems,\nlifelong learning so far has focused mainly on accumulating knowledge ove...
null
null
[ "Computer Science", "Statistics" ]
null
true
null
101
null
Validated
null
null
null
{ "abstract": " In this paper, we study the generalized polynomial chaos (gPC) based\nstochastic Galerkin method for the linear semiconductor Boltzmann equation\nunder diffusive scaling and with random inputs from an anisotropic collision\nkernel and the random initial condition. While the numerical scheme and the\n...
null
null
null
null
true
null
102
null
Default
null
null
null
{ "abstract": " Over the last decade, wireless networks have experienced an impressive growth\nand now play a main role in many telecommunications systems. As a consequence,\nscarce radio resources, such as frequencies, became congested and the need for\neffective and efficient assignment methods arose. In this work...
null
null
[ "Computer Science", "Mathematics" ]
null
true
null
103
null
Validated
null
null
null
{ "abstract": " We report on a combined study of the de Haas-van Alphen effect and angle\nresolved photoemission spectroscopy on single crystals of the metallic\ndelafossite PdRhO$_2$ rounded off by \\textit{ab initio} band structure\ncalculations. A high sensitivity torque magnetometry setup with SQUID readout\nand...
null
null
null
null
true
null
104
null
Default
null
null
null
{ "abstract": " Atar, Chowdhary and Dupuis have recently exhibited a variational formula for\nexponential integrals of bounded measurable functions in terms of Rényi\ndivergences. We develop a variational characterization of the Rényi\ndivergences between two probability distributions on a measurable sace in terms\n...
null
null
null
null
true
null
105
null
Default
null
null
null
{ "abstract": " Bilayer van der Waals (vdW) heterostructures such as MoS2/WS2 and MoSe2/WSe2\nhave attracted much attention recently, particularly because of their type II\nband alignments and the formation of interlayer exciton as the lowest-energy\nexcitonic state. In this work, we calculate the electronic and opt...
null
null
null
null
true
null
106
null
Default
null
null
null
{ "abstract": " We construct the algebraic cobordism theory of bundles and divisors on\nvarieties. It has a simple basis (over Q) from projective spaces and its rank\nis equal to the number of Chern numbers. An application of this algebraic\ncobordism theory is the enumeration of singular subvarieties with give tang...
null
null
null
null
true
null
107
null
Default
null
null
null
{ "abstract": " People with profound motor deficits could perform useful physical tasks for\nthemselves by controlling robots that are comparable to the human body. Whether\nthis is possible without invasive interfaces has been unclear, due to the\nrobot's complexity and the person's limitations. We developed a nove...
null
null
null
null
true
null
108
null
Default
null
null
null
{ "abstract": " Object detection in wide area motion imagery (WAMI) has drawn the attention\nof the computer vision research community for a number of years. WAMI proposes\na number of unique challenges including extremely small object sizes, both\nsparse and densely-packed objects, and extremely large search spaces...
null
null
null
null
true
null
109
null
Default
null
null
null
{ "abstract": " Monte Carlo Tree Search (MCTS), most famously used in game-play artificial\nintelligence (e.g., the game of Go), is a well-known strategy for constructing\napproximate solutions to sequential decision problems. Its primary innovation\nis the use of a heuristic, known as a default policy, to obtain Mo...
null
null
null
null
true
null
110
null
Default
null
null
null
{ "abstract": " We study the Fermi-edge singularity, describing the response of a degenerate\nelectron system to optical excitation, in the framework of the functional\nrenormalization group (fRG). Results for the (interband) particle-hole\nsusceptibility from various implementations of fRG (one- and two-\nparticle-...
null
null
null
null
true
null
111
null
Default
null
null
null
{ "abstract": " Retrosynthesis is a technique to plan the chemical synthesis of organic\nmolecules, for example drugs, agro- and fine chemicals. In retrosynthesis, a\nsearch tree is built by analysing molecules recursively and dissecting them\ninto simpler molecular building blocks until one obtains a set of known\n...
null
null
null
null
true
null
112
null
Default
null
null
null
{ "abstract": " The class of stochastically self-similar sets contains many famous examples\nof random sets, e.g. Mandelbrot percolation and general fractal percolation.\nUnder the assumption of the uniform open set condition and some mild\nassumptions on the iterated function systems used, we show that the\nquasi-A...
null
null
null
null
true
null
113
null
Default
null
null
null
{ "abstract": " We report on the influence of spin-orbit coupling (SOC) in the Fe-based\nsuperconductors (FeSCs) via application of circularly-polarized spin and\nangle-resolved photoemission spectroscopy. We combine this technique in\nrepresentative members of both the Fe-pnictides and Fe-chalcogenides with ab\nini...
null
null
null
null
true
null
114
null
Default
null
null
null
{ "abstract": " In this work we examine how the updates addressing Meltdown and Spectre\nvulnerabilities impact the performance of HPC applications. To study this we\nuse the application kernel module of XDMoD to test the performance before and\nafter the application of the vulnerability patches. We tested the perfo...
null
null
[ "Computer Science" ]
null
true
null
115
null
Validated
null
null
null
{ "abstract": " Gene regulatory networks are powerful abstractions of biological systems.\nSince the advent of high-throughput measurement technologies in biology in the\nlate 90s, reconstructing the structure of such networks has been a central\ncomputational problem in systems biology. While the problem is certain...
null
null
null
null
true
null
116
null
Default
null
null
null
{ "abstract": " Glaucoma is the second leading cause of blindness all over the world, with\napproximately 60 million cases reported worldwide in 2010. If undiagnosed in\ntime, glaucoma causes irreversible damage to the optic nerve leading to\nblindness. The optic nerve head examination, which involves measurement of...
null
null
null
null
true
null
117
null
Default
null
null
null
{ "abstract": " The life of the modern world essentially depends on the work of the large\nartificial homogeneous networks, such as wired and wireless communication\nsystems, networks of roads and pipelines. The support of their effective\ncontinuous functioning requires automatic screening and permanent optimizatio...
null
null
null
null
true
null
118
null
Default
null
null
null
{ "abstract": " This paper considers the actor-critic contextual bandit for the mobile health\n(mHealth) intervention. The state-of-the-art decision-making methods in mHealth\ngenerally assume that the noise in the dynamic system follows the Gaussian\ndistribution. Those methods use the least-square-based algorithm ...
null
null
[ "Computer Science", "Statistics" ]
null
true
null
119
null
Validated
null
null
null
{ "abstract": " In 1933 Kolmogorov constructed a general theory that defines the modern\nconcept of conditional expectation. In 1955 Renyi fomulated a new axiomatic\ntheory for probability motivated by the need to include unbounded measures. We\nintroduce a general concept of conditional expectation in Renyi spaces....
null
null
null
null
true
null
120
null
Default
null
null
null
{ "abstract": " Recently a new fault tolerant and simple mechanism was designed for solving\ncommit consensus problem. It is based on replicated validation of messages sent\nbetween transaction participants and a special dispatcher validator manager\nnode. This paper presents a correctness, safety proofs and perform...
null
null
null
null
true
null
121
null
Default
null
null
null
{ "abstract": " This work presents a new method to quantify connectivity in transportation\nnetworks. Inspired by the field of topological data analysis, we propose a\nnovel approach to explore the robustness of road network connectivity in the\npresence of congestion on the roadway. The robustness of the pattern is...
null
null
null
null
true
null
122
null
Default
null
null
null
{ "abstract": " The first transiting planetesimal orbiting a white dwarf was recently\ndetected in K2 data of WD1145+017 and has been followed up intensively. The\nmultiple, long, and variable transits suggest the transiting objects are dust\nclouds, probably produced by a disintegrating asteroid. In addition, the s...
null
null
[ "Physics" ]
null
true
null
123
null
Validated
null
null
null
{ "abstract": " In this review article, we discuss recent studies on drops and bubbles in\nHele-Shaw cells, focusing on how scaling laws exhibit crossovers from the\nthree-dimensional counterparts and focusing on topics in which viscosity plays\nan important role. By virtue of progresses in analytical theory and hig...
null
null
null
null
true
null
124
null
Default
null
null
null
{ "abstract": " Stacking-based deep neural network (S-DNN), in general, denotes a deep neural\nnetwork (DNN) resemblance in terms of its very deep, feedforward network\narchitecture. The typical S-DNN aggregates a variable number of individually\nlearnable modules in series to assemble a DNN-alike alternative to the...
null
null
null
null
true
null
125
null
Default
null
null
null
{ "abstract": " In spite of Anderson's theorem, disorder is known to affect superconductivity\nin conventional s-wave superconductors. In most superconductors, the degree of\ndisorder is fixed during sample preparation. Here we report measurements of the\nsuperconducting properties of the two-dimensional gas that fo...
null
null
null
null
true
null
126
null
Default
null
null
null
{ "abstract": " We investigate beam loading and emittance preservation for a high-charge\nelectron beam being accelerated in quasi-linear plasma wakefields driven by a\nshort proton beam. The structure of the studied wakefields are similar to those\nof a long, modulated proton beam, such as the AWAKE proton driver. ...
null
null
[ "Physics" ]
null
true
null
127
null
Validated
null
null
null
{ "abstract": " In this paper, we propose a practical receiver for multicarrier signals\nsubjected to a strong memoryless nonlinearity. The receiver design is based on\na generalized approximate message passing (GAMP) framework, and this allows\nreal-time algorithm implementation in software or hardware with moderat...
null
null
[ "Computer Science" ]
null
true
null
128
null
Validated
null
null
null
{ "abstract": " According to astrophysical observations value of recession velocity in a\ncertain point is proportional to a distance to this point. The proportionality\ncoefficient is the Hubble constant measured with 5% accuracy. It is used in\nmany cosmological theories describing dark energy, dark matter, baryon...
null
null
null
null
true
null
129
null
Default
null
null
null
{ "abstract": " Dynamic languages often employ reflection primitives to turn dynamically\ngenerated text into executable code at run-time. These features make standard\nstatic analysis extremely hard if not impossible because its essential data\nstructures, i.e., the control-flow graph and the system of recursive eq...
null
null
null
null
true
null
130
null
Default
null
null
null
{ "abstract": " Reductions for transition systems have been recently introduced as a uniform\nand principled method for comparing the expressiveness of system models with\nrespect to a range of properties, especially bisimulations. In this paper we\nstudy the expressiveness (w.r.t. bisimulations) of models for quant...
null
null
null
null
true
null
131
null
Default
null
null
null
{ "abstract": " Poynting's theorem is used to obtain an expression for the turbulent\npower-spectral density as function of frequency and wavenumber in low-frequency\nmagnetic turbulence. No reference is made to Elsasser variables as is usually\ndone in magnetohydrodynamic turbulence mixing mechanical and electromag...
null
null
null
null
true
null
132
null
Default
null
null
null
{ "abstract": " Let M be a compact Riemannian manifold and let $\\mu$,d be the associated\nmeasure and distance on M. Robert McCann obtained, generalizing results for the\nEuclidean case by Yann Brenier, the polar factorization of Borel maps S : M ->\nM pushing forward $\\mu$ to a measure $\\nu$: each S factors uniq...
null
null
[ "Mathematics" ]
null
true
null
133
null
Validated
null
null
null
{ "abstract": " We examine the representation of numbers as the sum of two squares in\n$\\mathbb{Z}_n$ for a general positive integer $n$. Using this information we\nmake some comments about the density of positive integers which can be\nrepresented as the sum of two squares and powers of $2$ in $\\mathbb{N}$.\n", ...
null
null
[ "Mathematics" ]
null
true
null
134
null
Validated
null
null
null
{ "abstract": " Regression for spatially dependent outcomes poses many challenges, for\ninference and for computation. Non-spatial models and traditional spatial\nmixed-effects models each have their advantages and disadvantages, making it\ndifficult for practitioners to determine how to carry out a spatial regressi...
null
null
null
null
true
null
135
null
Default
null
null
null
{ "abstract": " One of the most important parameters in ionospheric plasma research also\nhaving a wide practical application in wireless satellite telecommunications is\nthe total electron content (TEC) representing the columnal electron number\ndensity. The F region with high electron density provides the biggest\...
null
null
null
null
true
null
136
null
Default
null
null
null
{ "abstract": " For the particles undergoing the anomalous diffusion with different waiting\ntime distributions for different internal states, we derive the Fokker-Planck\nand Feymann-Kac equations, respectively, describing positions of the particles\nand functional distributions of the trajectories of particles; in...
null
null
[ "Mathematics", "Statistics" ]
null
true
null
137
null
Validated
null
null
null
{ "abstract": " Stabilizing the magnetic signal of single adatoms is a crucial step towards\ntheir successful usage in widespread technological applications such as\nhigh-density magnetic data storage devices. The quantum mechanical nature of\nthese tiny objects, however, introduces intrinsic zero-point spin-fluctua...
null
null
null
null
true
null
138
null
Default
null
null
null
{ "abstract": " We study a minimal model for the growth of a phenotypically heterogeneous\npopulation of cells subject to a fluctuating environment in which they can\nreplicate (by exploiting available resources) and modify their phenotype within\na given landscape (thereby exploring novel configurations). The model...
null
null
[ "Quantitative Biology" ]
null
true
null
139
null
Validated
null
null
null
{ "abstract": " Electronic Health Records (EHR) are data generated during routine clinical\ncare. EHR offer researchers unprecedented phenotypic breadth and depth and have\nthe potential to accelerate the pace of precision medicine at scale. A main EHR\nuse-case is creating phenotyping algorithms to define disease s...
null
null
[ "Computer Science" ]
null
true
null
140
null
Validated
null
null
null
{ "abstract": " Mission critical data dissemination in massive Internet of things (IoT)\nnetworks imposes constraints on the message transfer delay between devices. Due\nto low power and communication range of IoT devices, data is foreseen to be\nrelayed over multiple device-to-device (D2D) links before reaching the...
null
null
null
null
true
null
141
null
Default
null
null
null
{ "abstract": " We develope a two-species exclusion process with a distinct pair of entry and\nexit sites for each species of rigid rods. The relatively slower forward\nstepping of the rods in an extended bottleneck region, located in between the\ntwo entry sites, controls the extent of interference of the co-direct...
null
null
null
null
true
null
142
null
Default
null
null
null
{ "abstract": " We introduce a large class of random Young diagrams which can be regarded as\na natural one-parameter deformation of some classical Young diagram ensembles;\na deformation which is related to Jack polynomials and Jack characters. We show\nthat each such a random Young diagram converges asymptotically...
null
null
null
null
true
null
143
null
Default
null
null
null
{ "abstract": " We explicitly compute the critical exponents associated with logarithmic\ncorrections (the so-called hatted exponents) starting from the renormalization\ngroup equations and the mean field behavior for a wide class of models at the\nupper critical behavior (for short and long range $\\phi^n$-theories...
null
null
null
null
true
null
144
null
Default
null
null
null
{ "abstract": " We obtain a Bernstein-type inequality for sums of Banach-valued random\nvariables satisfying a weak dependence assumption of general type and under\ncertain smoothness assumptions of the underlying Banach norm. We use this\ninequality in order to investigate in the asymptotical regime the error upper...
null
null
null
null
true
null
145
null
Default
null
null
null
{ "abstract": " The temperature-dependent evolution of the Kondo lattice is a long-standing\ntopic of theoretical and experimental investigation and yet it lacks a truly\nmicroscopic description of the relation of the basic $f$-$d$ hybridization\nprocesses to the fundamental temperature scales of Kondo screening and...
null
null
null
null
true
null
146
null
Default
null
null
null
{ "abstract": " Hegarty conjectured for $n\\neq 2, 3, 5, 7$ that $\\mathbb{Z}/n\\mathbb{Z}$ has\na permutation which destroys all arithmetic progressions mod $n$. For $n\\ge\nn_0$, Hegarty and Martinsson demonstrated that $\\mathbb{Z}/n\\mathbb{Z}$ has an\narithmetic-progression destroying permutation. However $n_0\...
null
null
null
null
true
null
147
null
Default
null
null
null
{ "abstract": " An immersion $f : {\\mathcal D} \\rightarrow \\mathcal C$ between cell complexes\nis a local homeomorphism onto its image that commutes with the characteristic\nmaps of the cell complexes. We study immersions between finite-dimensional\nconnected $\\Delta$-complexes by replacing the fundamental group...
null
null
null
null
true
null
148
null
Default
null
null
null
{ "abstract": " Resolving the relationship between biodiversity and ecosystem functioning has\nbeen one of the central goals of modern ecology. Early debates about the\nrelationship were finally resolved with the advent of a statistical\npartitioning scheme that decomposed the biodiversity effect into a \"selection\...
null
null
null
null
true
null
149
null
Default
null
null
null
{ "abstract": " The principle of democracy is that the people govern through elected\nrepresentatives. Therefore, a democracy is healthy as long as the elected\npoliticians do represent the people. We have analyzed data from the Brazilian\nelectoral court (Tribunal Superior Eleitoral, TSE) concerning money donations...
null
null
null
null
true
null
150
null
Default
null
null
null
{ "abstract": " With the increasing commoditization of computer vision, speech recognition\nand machine translation systems and the widespread deployment of learning-based\nback-end technologies such as digital advertising and intelligent\ninfrastructures, AI (Artificial Intelligence) has moved from research labs to...
null
null
null
null
true
null
151
null
Default
null
null
null
{ "abstract": " We rework and generalize equivariant infinite loop space theory, which shows\nhow to construct G-spectra from G-spaces with suitable structure. There is a\nnaive version which gives naive G-spectra for any topological group G, but our\nfocus is on the construction of genuine G-spectra when G is finit...
null
null
null
null
true
null
152
null
Default
null
null
null
{ "abstract": " We prove that any open subset $U$ of a semi-simple simply connected\nquasi-split linear algebraic group $G$ with ${codim} (G\\setminus U, G)\\geq 2$\nover a number field satisfies strong approximation by establishing a fibration\nof $G$ over a toric variety. We also prove a similar result of strong\n...
null
null
null
null
true
null
153
null
Default
null
null
null
{ "abstract": " We show that nonlocal minimal cones which are non-singular subgraphs outside\nthe origin are necessarily halfspaces.\nThe proof is based on classical ideas of~\\cite{DG1} and on the computation of\nthe linearized nonlocal mean curvature operator, which is proved to satisfy a\nsuitable maximum princip...
null
null
null
null
true
null
154
null
Default
null
null
null
{ "abstract": " Let $f_1,\\ldots,f_k : \\mathbb{N} \\rightarrow \\mathbb{C}$ be multiplicative\nfunctions taking values in the closed unit disc. Using an analytic approach in\nthe spirit of Halász' mean value theorem, we compute multidimensional\naverages of the shape $$x^{-l} \\sum_{\\mathbf{n} \\in [x]^l} \\prod_{...
null
null
null
null
true
null
155
null
Default
null
null
null
{ "abstract": " The apparent gas permeability of the porous medium is an important parameter\nin the prediction of unconventional gas production, which was first\ninvestigated systematically by Klinkenberg in 1941 and found to increase with\nthe reciprocal mean gas pressure (or equivalently, the Knudsen number).\nAl...
null
null
null
null
true
null
156
null
Default
null
null
null
{ "abstract": " In previous papers, threshold probabilities for the properties of a random\ndistance graph to contain strictly balanced graphs were found. We extend this\nresult to arbitrary graphs and prove that the number of copies of a strictly\nbalanced graph has asymptotically Poisson distribution at the thresh...
null
null
null
null
true
null
157
null
Default
null
null
null
{ "abstract": " Runtime enforcement can be effectively used to improve the reliability of\nsoftware applications. However, it often requires the definition of ad hoc\npolicies and enforcement strategies, which might be expensive to identify and\nimplement. This paper discusses how to exploit lifecycle events to obta...
null
null
null
null
true
null
158
null
Default
null
null
null
{ "abstract": " The atomic norm provides a generalization of the $\\ell_1$-norm to continuous\nparameter spaces. When applied as a sparse regularizer for line spectral\nestimation the solution can be obtained by solving a convex optimization\nproblem. This problem is known as atomic norm soft thresholding (AST). It ...
null
null
null
null
true
null
159
null
Default
null
null
null
{ "abstract": " We study the problem of causal structure learning over a set of random\nvariables when the experimenter is allowed to perform at most $M$ experiments\nin a non-adaptive manner. We consider the optimal learning strategy in terms of\nminimizing the portions of the structure that remains unknown given t...
null
null
null
null
true
null
160
null
Default
null
null
null
{ "abstract": " We present a novel data-driven nested optimization framework that addresses\nthe problem of coupling between plant and controller optimization. This\noptimization strategy is tailored towards instances where a closed-form\nexpression for the system dynamic response is unobtainable and simulations or\...
null
null
null
null
true
null
161
null
Default
null
null
null
{ "abstract": " We explore the topological properties of quantum spin-1/2 chains with two\nIsing symmetries. This class of models does not possess any of the symmetries\nthat are required to protect the Haldane phase. Nevertheless, we show that\nthere are 4 symmetry-protected topological phases, in addition to 6 pha...
null
null
null
null
true
null
162
null
Default
null
null
null
{ "abstract": " Most of the codes that have an algebraic decoding algorithm are derived from\nthe Reed Solomon codes. They are obtained by taking equivalent codes, for\nexample the generalized Reed Solomon codes, or by using the so-called subfield\nsubcode method, which leads to Alternant codes and Goppa codes over ...
null
null
null
null
true
null
163
null
Default
null
null
null
{ "abstract": " Motivated by the study of Nishinou-Nohara-Ueda on the Floer thoery of\nGelfand-Cetlin systems over complex partial flag manifolds, we provide a\ncomplete description of the topology of Gelfand-Cetlin fibers. We prove that\nall fibers are \\emph{smooth} isotropic submanifolds and give a complete\ndesc...
null
null
null
null
true
null
164
null
Default
null
null
null
{ "abstract": " Ensemble data assimilation methods such as the Ensemble Kalman Filter (EnKF)\nare a key component of probabilistic weather forecasting. They represent the\nuncertainty in the initial conditions by an ensemble which incorporates\ninformation coming from the physical model with the latest observations....
null
null
null
null
true
null
165
null
Default
null
null
null
{ "abstract": " In this paper, we consider the Tensor Robust Principal Component Analysis\n(TRPCA) problem, which aims to exactly recover the low-rank and sparse\ncomponents from their sum. Our model is based on the recently proposed\ntensor-tensor product (or t-product) [13]. Induced by the t-product, we first\nrig...
null
null
null
null
true
null
166
null
Default
null
null
null
{ "abstract": " Galaxies in the local Universe are known to follow bimodal distributions in\nthe global stellar populations properties. We analyze the distribution of the\nlocal average stellar-population ages of 654,053 sub-galactic regions resolved\non ~1-kpc scales in a volume-corrected sample of 394 galaxies, dr...
null
null
null
null
true
null
167
null
Default
null
null
null
{ "abstract": " We introduce a minimal model for the evolution of functional\nprotein-interaction networks using a sequence-based mutational algorithm, and\napply the model to study neutral drift in networks that yield oscillatory\ndynamics. Starting with a functional core module, random evolutionary drift\nincrease...
null
null
null
null
true
null
168
null
Default
null
null
null
{ "abstract": " The handwritten string recognition is still a challengeable task, though the\npowerful deep learning tools were introduced. In this paper, based on TAO-FCN,\nwe proposed an end-to-end system for handwritten string recognition. Compared\nwith the conventional methods, there is no preprocess nor manual...
null
null
[ "Computer Science" ]
null
true
null
169
null
Validated
null
null
null
{ "abstract": " We note that the necessary and sufficient conditions established by Marcel\nRiesz for the inclusion of regular Nörlund summation methods are in fact\napplicable quite generally.\n", "title": "Marcel Riesz on Nörlund Means" }
null
null
null
null
true
null
170
null
Default
null
null
null
{ "abstract": " These lectures notes were written for a summer school on Mathematics for\npost-quantum cryptography in Thiès, Senegal. They try to provide a guide for\nMasters' students to get through the vast literature on elliptic curves,\nwithout getting lost on their way to learning isogeny based cryptography. T...
null
null
null
null
true
null
171
null
Default
null
null
null
{ "abstract": " It has been shown recently that changing the fluidic properties of a drug can\nimprove its efficacy in ablating solid tumors. We develop a modeling framework\nfor tumor ablation, and present the simplest possible model for drug diffusion\nin a spherical tumor with leaky boundaries and assuming cell d...
null
null
null
null
true
null
172
null
Default
null
null
null
{ "abstract": " To identify the estimand in missing data problems and observational studies,\nit is common to base the statistical estimation on the \"missing at random\" and\n\"no unmeasured confounder\" assumptions. However, these assumptions are\nunverifiable using empirical data and pose serious threats to the v...
null
null
null
null
true
null
173
null
Default
null
null
null
{ "abstract": " In this paper, we provide an analysis of self-organized network management,\nwith an end-to-end perspective of the network. Self-organization as applied to\ncellular networks is usually referred to Self-organizing Networks (SONs), and\nit is a key driver for improving Operations, Administration, and ...
null
null
null
null
true
null
174
null
Default
null
null
null
{ "abstract": " Understanding smart grid cyber attacks is key for developing appropriate\nprotection and recovery measures. Advanced attacks pursue maximized impact at\nminimized costs and detectability. This paper conducts risk analysis of\ncombined data integrity and availability attacks against the power system s...
null
null
null
null
true
null
175
null
Default
null
null
null
{ "abstract": " We propose a family of near-metrics based on local graph diffusion to capture\nsimilarity for a wide class of data sets. These quasi-metametrics, as their\nnames suggest, dispense with one or two standard axioms of metric spaces,\nspecifically distinguishability and symmetry, so that similarity betwe...
null
null
null
null
true
null
176
null
Default
null
null
null
{ "abstract": " Recommender system is an important component of many web services to help\nusers locate items that match their interests. Several studies showed that\nrecommender systems are vulnerable to poisoning attacks, in which an attacker\ninjects fake data to a given system such that the system makes recommen...
null
null
null
null
true
null
177
null
Default
null
null
null
{ "abstract": " This paper describes the Stockholm University/University of Groningen\n(SU-RUG) system for the SIGMORPHON 2017 shared task on morphological\ninflection. Our system is based on an attentional sequence-to-sequence neural\nnetwork model using Long Short-Term Memory (LSTM) cells, with joint training of\n...
null
null
null
null
true
null
178
null
Default
null
null
null
{ "abstract": " Neuroscientists classify neurons into different types that perform similar\ncomputations at different locations in the visual field. Traditional methods\nfor neural system identification do not capitalize on this separation of 'what'\nand 'where'. Learning deep convolutional feature spaces that are s...
null
null
null
null
true
null
179
null
Default
null
null
null
{ "abstract": " The extremely low efficiency is regarded as the bottleneck of Wireless Power\nTransfer (WPT) technology. To tackle this problem, either enlarging the\ntransfer power or changing the infrastructure of WPT system could be an\nintuitively proposed way. However, the drastically important issue on the use...
null
null
[ "Computer Science" ]
null
true
null
180
null
Validated
null
null
null
{ "abstract": " A numerical method for particle-laden fluids interacting with a deformable\nsolid domain and mobile rigid parts is proposed and implemented in a full\nengineering system. The fluid domain is modeled with a lattice Boltzmann\nrepresentation, the particles and rigid parts are modeled with a discrete\ne...
null
null
null
null
true
null
181
null
Default
null
null
null
{ "abstract": " We construct a Schwinger-Keldysh effective field theory for relativistic\nhydrodynamics for charged matter in a thermal background using a superspace\nformalism. Superspace allows us to efficiently impose the symmetries of the\nproblem and to obtain a simple expression for the effective action. We sh...
null
null
null
null
true
null
182
null
Default
null
null
null
{ "abstract": " Observables have a dual nature in both classical and quantum kinematics: they\nare at the same time \\emph{quantities}, allowing to separate states by means of\ntheir numerical values, and \\emph{generators of transformations}, establishing\nrelations between different states. In this work, we show h...
null
null
null
null
true
null
183
null
Default
null
null
null
{ "abstract": " Let $(M,g)$ be a smooth compact Riemannian manifold of dimension $n$ with\nsmooth boundary $\\partial M$. Suppose that $(M,g)$ admits a scalar-flat\nconformal metric. We prove that the supremum of the isoperimetric quotient over\nthe scalar-flat conformal class is strictly larger than the best consta...
null
null
null
null
true
null
184
null
Default
null
null
null
{ "abstract": " Random feature maps are ubiquitous in modern statistical machine learning,\nwhere they generalize random projections by means of powerful, yet often\ndifficult to analyze nonlinear operators. In this paper, we leverage the\n\"concentration\" phenomenon induced by random matrix theory to perform a\nsp...
null
null
null
null
true
null
185
null
Default
null
null
null
{ "abstract": " The calculation of minimum energy paths for transitions such as atomic and/or\nspin re-arrangements is an important task in many contexts and can often be\nused to determine the mechanism and rate of transitions. An important challenge\nis to reduce the computational effort in such calculations, espe...
null
null
null
null
true
null
186
null
Default
null
null
null
{ "abstract": " Social media has changed the ways of communication, where everyone is\nequipped with the power to express their opinions to others in online\ndiscussion platforms. Previously, a number of stud- ies have been presented to\nidentify opinion leaders in online discussion networks. Feng (\"Are you\nconnec...
null
null
null
null
true
null
187
null
Default
null
null
null
{ "abstract": " Let $E_n(f)_{\\alpha,\\beta,\\gamma}$ denote the error of best approximation by\npolynomials of degree at most $n$ in the space\n$L^2(\\varpi_{\\alpha,\\beta,\\gamma})$ on the triangle $\\{(x,y): x, y \\ge 0, x+y\n\\le 1\\}$, where $\\varpi_{\\alpha,\\beta,\\gamma}(x,y) := x^\\alpha y ^\\beta\n(1-x-y...
null
null
null
null
true
null
188
null
Default
null
null
null
{ "abstract": " Due to the increasing dependency of critical infrastructure on synchronized\nclocks, network time synchronization protocols have become an attractive target\nfor attackers. We identify data origin authentication as the key security\nobjective and suggest to employ recently proposed high-performance d...
null
null
null
null
true
null
189
null
Default
null
null
null
{ "abstract": " We implement an efficient numerical method to calculate response functions of\ncomplex impurities based on the Density Matrix Renormalization Group (DMRG) and\nuse it as the impurity-solver of the Dynamical Mean Field Theory (DMFT). This\nmethod uses the correction vector to obtain precise Green's fu...
null
null
null
null
true
null
190
null
Default
null
null
null
{ "abstract": " Bulk and surface electronic structures, calculated using density functional\ntheory and a tight-binding model Hamiltonian, reveal the existence of two\ntopologically invariant (TI) surface states in the family of cubic Bi\nperovskites (ABiO$_3$; A = Na, K, Rb, Cs, Mg, Ca, Sr and Ba). The two TI\nstat...
null
null
null
null
true
null
191
null
Default
null
null
null
{ "abstract": " It is often recommended that identifiers for ontology terms should be\nsemantics-free or meaningless. In practice, ontology developers tend to use\nnumeric identifiers, starting at 1 and working upwards. In this paper we\npresent a critique of current ontology semantics-free identifiers;\nmonotonical...
null
null
null
null
true
null
192
null
Default
null
null
null
{ "abstract": " Deep learning methods have achieved high performance in sound recognition\ntasks. Deciding how to feed the training data is important for further\nperformance improvement. We propose a novel learning method for deep sound\nrecognition: Between-Class learning (BC learning). Our strategy is to learn a\...
null
null
null
null
true
null
193
null
Default
null
null
null
{ "abstract": " We propose a linear-time, single-pass, top-down algorithm for multiple\ntesting on directed acyclic graphs (DAGs), where nodes represent hypotheses and\nedges specify a partial ordering in which hypotheses must be tested. The\nprocedure is guaranteed to reject a sub-DAG with bounded false discovery r...
null
null
[ "Mathematics", "Statistics" ]
null
true
null
194
null
Validated
null
null
null
{ "abstract": " In this paper, we consider a Hamiltonian system combining a nonlinear Schr\\\"\nodinger equation (NLS) and an ordinary differential equation (ODE). This system\nis a simplified model of the NLS around soliton solutions. Following Nakanishi\n\\cite{NakanishiJMSJ}, we show scattering of $L^2$ small $H^...
null
null
null
null
true
null
195
null
Default
null
null
null
{ "abstract": " We relate the concepts used in decentralized ledger technology to studies of\nepisodic memory in the mammalian brain. Specifically, we introduce the standard\nconcepts of linked list, hash functions, and sharding, from computer science.\nWe argue that these concepts may be more relevant to studies of...
null
null
[ "Quantitative Biology" ]
null
true
null
196
null
Validated
null
null
null
{ "abstract": " Time-varying network topologies can deeply influence dynamical processes\nmediated by them. Memory effects in the pattern of interactions among\nindividuals are also known to affect how diffusive and spreading phenomena take\nplace. In this paper we analyze the combined effect of these two ingredient...
null
null
null
null
true
null
197
null
Default
null
null
null
{ "abstract": " A long-standing obstacle to progress in deep learning is the problem of\nvanishing and exploding gradients. Although, the problem has largely been\novercome via carefully constructed initializations and batch normalization,\narchitectures incorporating skip-connections such as highway and resnets\npe...
null
null
null
null
true
null
198
null
Default
null
null
null
{ "abstract": " We study the band structure topology and engineering from the interplay\nbetween local moments and itinerant electrons in the context of pyrochlore\niridates. For the metallic iridate Pr$_2$Ir$_2$O$_7$, the Ir $5d$ conduction\nelectrons interact with the Pr $4f$ local moments via the $f$-$d$ exchange...
null
null
null
null
true
null
199
null
Default
null
null
null
{ "abstract": " Boundary value problems for Sturm-Liouville operators with potentials from\nthe class $W_2^{-1}$ on a star-shaped graph are considered. We assume that the\npotentials are known on all the edges of the graph except two, and show that\nthe potentials on the remaining edges can be constructed by fractio...
null
null
[ "Mathematics" ]
null
true
null
200
null
Validated
null
null