text null | inputs dict | prediction null | prediction_agent null | annotation list | annotation_agent null | multi_label bool 1
class | explanation null | id stringlengths 1 5 | metadata null | status stringclasses 2
values | event_timestamp null | metrics null |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
null | {
"abstract": " Humans can learn in a continuous manner. Old rarely utilized knowledge can be\noverwritten by new incoming information while important, frequently used\nknowledge is prevented from being erased. In artificial learning systems,\nlifelong learning so far has focused mainly on accumulating knowledge ove... | null | null | [
"Computer Science",
"Statistics"
] | null | true | null | 101 | null | Validated | null | null |
null | {
"abstract": " In this paper, we study the generalized polynomial chaos (gPC) based\nstochastic Galerkin method for the linear semiconductor Boltzmann equation\nunder diffusive scaling and with random inputs from an anisotropic collision\nkernel and the random initial condition. While the numerical scheme and the\n... | null | null | null | null | true | null | 102 | null | Default | null | null |
null | {
"abstract": " Over the last decade, wireless networks have experienced an impressive growth\nand now play a main role in many telecommunications systems. As a consequence,\nscarce radio resources, such as frequencies, became congested and the need for\neffective and efficient assignment methods arose. In this work... | null | null | [
"Computer Science",
"Mathematics"
] | null | true | null | 103 | null | Validated | null | null |
null | {
"abstract": " We report on a combined study of the de Haas-van Alphen effect and angle\nresolved photoemission spectroscopy on single crystals of the metallic\ndelafossite PdRhO$_2$ rounded off by \\textit{ab initio} band structure\ncalculations. A high sensitivity torque magnetometry setup with SQUID readout\nand... | null | null | null | null | true | null | 104 | null | Default | null | null |
null | {
"abstract": " Atar, Chowdhary and Dupuis have recently exhibited a variational formula for\nexponential integrals of bounded measurable functions in terms of Rényi\ndivergences. We develop a variational characterization of the Rényi\ndivergences between two probability distributions on a measurable sace in terms\n... | null | null | null | null | true | null | 105 | null | Default | null | null |
null | {
"abstract": " Bilayer van der Waals (vdW) heterostructures such as MoS2/WS2 and MoSe2/WSe2\nhave attracted much attention recently, particularly because of their type II\nband alignments and the formation of interlayer exciton as the lowest-energy\nexcitonic state. In this work, we calculate the electronic and opt... | null | null | null | null | true | null | 106 | null | Default | null | null |
null | {
"abstract": " We construct the algebraic cobordism theory of bundles and divisors on\nvarieties. It has a simple basis (over Q) from projective spaces and its rank\nis equal to the number of Chern numbers. An application of this algebraic\ncobordism theory is the enumeration of singular subvarieties with give tang... | null | null | null | null | true | null | 107 | null | Default | null | null |
null | {
"abstract": " People with profound motor deficits could perform useful physical tasks for\nthemselves by controlling robots that are comparable to the human body. Whether\nthis is possible without invasive interfaces has been unclear, due to the\nrobot's complexity and the person's limitations. We developed a nove... | null | null | null | null | true | null | 108 | null | Default | null | null |
null | {
"abstract": " Object detection in wide area motion imagery (WAMI) has drawn the attention\nof the computer vision research community for a number of years. WAMI proposes\na number of unique challenges including extremely small object sizes, both\nsparse and densely-packed objects, and extremely large search spaces... | null | null | null | null | true | null | 109 | null | Default | null | null |
null | {
"abstract": " Monte Carlo Tree Search (MCTS), most famously used in game-play artificial\nintelligence (e.g., the game of Go), is a well-known strategy for constructing\napproximate solutions to sequential decision problems. Its primary innovation\nis the use of a heuristic, known as a default policy, to obtain Mo... | null | null | null | null | true | null | 110 | null | Default | null | null |
null | {
"abstract": " We study the Fermi-edge singularity, describing the response of a degenerate\nelectron system to optical excitation, in the framework of the functional\nrenormalization group (fRG). Results for the (interband) particle-hole\nsusceptibility from various implementations of fRG (one- and two-\nparticle-... | null | null | null | null | true | null | 111 | null | Default | null | null |
null | {
"abstract": " Retrosynthesis is a technique to plan the chemical synthesis of organic\nmolecules, for example drugs, agro- and fine chemicals. In retrosynthesis, a\nsearch tree is built by analysing molecules recursively and dissecting them\ninto simpler molecular building blocks until one obtains a set of known\n... | null | null | null | null | true | null | 112 | null | Default | null | null |
null | {
"abstract": " The class of stochastically self-similar sets contains many famous examples\nof random sets, e.g. Mandelbrot percolation and general fractal percolation.\nUnder the assumption of the uniform open set condition and some mild\nassumptions on the iterated function systems used, we show that the\nquasi-A... | null | null | null | null | true | null | 113 | null | Default | null | null |
null | {
"abstract": " We report on the influence of spin-orbit coupling (SOC) in the Fe-based\nsuperconductors (FeSCs) via application of circularly-polarized spin and\nangle-resolved photoemission spectroscopy. We combine this technique in\nrepresentative members of both the Fe-pnictides and Fe-chalcogenides with ab\nini... | null | null | null | null | true | null | 114 | null | Default | null | null |
null | {
"abstract": " In this work we examine how the updates addressing Meltdown and Spectre\nvulnerabilities impact the performance of HPC applications. To study this we\nuse the application kernel module of XDMoD to test the performance before and\nafter the application of the vulnerability patches. We tested the perfo... | null | null | [
"Computer Science"
] | null | true | null | 115 | null | Validated | null | null |
null | {
"abstract": " Gene regulatory networks are powerful abstractions of biological systems.\nSince the advent of high-throughput measurement technologies in biology in the\nlate 90s, reconstructing the structure of such networks has been a central\ncomputational problem in systems biology. While the problem is certain... | null | null | null | null | true | null | 116 | null | Default | null | null |
null | {
"abstract": " Glaucoma is the second leading cause of blindness all over the world, with\napproximately 60 million cases reported worldwide in 2010. If undiagnosed in\ntime, glaucoma causes irreversible damage to the optic nerve leading to\nblindness. The optic nerve head examination, which involves measurement of... | null | null | null | null | true | null | 117 | null | Default | null | null |
null | {
"abstract": " The life of the modern world essentially depends on the work of the large\nartificial homogeneous networks, such as wired and wireless communication\nsystems, networks of roads and pipelines. The support of their effective\ncontinuous functioning requires automatic screening and permanent optimizatio... | null | null | null | null | true | null | 118 | null | Default | null | null |
null | {
"abstract": " This paper considers the actor-critic contextual bandit for the mobile health\n(mHealth) intervention. The state-of-the-art decision-making methods in mHealth\ngenerally assume that the noise in the dynamic system follows the Gaussian\ndistribution. Those methods use the least-square-based algorithm ... | null | null | [
"Computer Science",
"Statistics"
] | null | true | null | 119 | null | Validated | null | null |
null | {
"abstract": " In 1933 Kolmogorov constructed a general theory that defines the modern\nconcept of conditional expectation. In 1955 Renyi fomulated a new axiomatic\ntheory for probability motivated by the need to include unbounded measures. We\nintroduce a general concept of conditional expectation in Renyi spaces.... | null | null | null | null | true | null | 120 | null | Default | null | null |
null | {
"abstract": " Recently a new fault tolerant and simple mechanism was designed for solving\ncommit consensus problem. It is based on replicated validation of messages sent\nbetween transaction participants and a special dispatcher validator manager\nnode. This paper presents a correctness, safety proofs and perform... | null | null | null | null | true | null | 121 | null | Default | null | null |
null | {
"abstract": " This work presents a new method to quantify connectivity in transportation\nnetworks. Inspired by the field of topological data analysis, we propose a\nnovel approach to explore the robustness of road network connectivity in the\npresence of congestion on the roadway. The robustness of the pattern is... | null | null | null | null | true | null | 122 | null | Default | null | null |
null | {
"abstract": " The first transiting planetesimal orbiting a white dwarf was recently\ndetected in K2 data of WD1145+017 and has been followed up intensively. The\nmultiple, long, and variable transits suggest the transiting objects are dust\nclouds, probably produced by a disintegrating asteroid. In addition, the s... | null | null | [
"Physics"
] | null | true | null | 123 | null | Validated | null | null |
null | {
"abstract": " In this review article, we discuss recent studies on drops and bubbles in\nHele-Shaw cells, focusing on how scaling laws exhibit crossovers from the\nthree-dimensional counterparts and focusing on topics in which viscosity plays\nan important role. By virtue of progresses in analytical theory and hig... | null | null | null | null | true | null | 124 | null | Default | null | null |
null | {
"abstract": " Stacking-based deep neural network (S-DNN), in general, denotes a deep neural\nnetwork (DNN) resemblance in terms of its very deep, feedforward network\narchitecture. The typical S-DNN aggregates a variable number of individually\nlearnable modules in series to assemble a DNN-alike alternative to the... | null | null | null | null | true | null | 125 | null | Default | null | null |
null | {
"abstract": " In spite of Anderson's theorem, disorder is known to affect superconductivity\nin conventional s-wave superconductors. In most superconductors, the degree of\ndisorder is fixed during sample preparation. Here we report measurements of the\nsuperconducting properties of the two-dimensional gas that fo... | null | null | null | null | true | null | 126 | null | Default | null | null |
null | {
"abstract": " We investigate beam loading and emittance preservation for a high-charge\nelectron beam being accelerated in quasi-linear plasma wakefields driven by a\nshort proton beam. The structure of the studied wakefields are similar to those\nof a long, modulated proton beam, such as the AWAKE proton driver. ... | null | null | [
"Physics"
] | null | true | null | 127 | null | Validated | null | null |
null | {
"abstract": " In this paper, we propose a practical receiver for multicarrier signals\nsubjected to a strong memoryless nonlinearity. The receiver design is based on\na generalized approximate message passing (GAMP) framework, and this allows\nreal-time algorithm implementation in software or hardware with moderat... | null | null | [
"Computer Science"
] | null | true | null | 128 | null | Validated | null | null |
null | {
"abstract": " According to astrophysical observations value of recession velocity in a\ncertain point is proportional to a distance to this point. The proportionality\ncoefficient is the Hubble constant measured with 5% accuracy. It is used in\nmany cosmological theories describing dark energy, dark matter, baryon... | null | null | null | null | true | null | 129 | null | Default | null | null |
null | {
"abstract": " Dynamic languages often employ reflection primitives to turn dynamically\ngenerated text into executable code at run-time. These features make standard\nstatic analysis extremely hard if not impossible because its essential data\nstructures, i.e., the control-flow graph and the system of recursive eq... | null | null | null | null | true | null | 130 | null | Default | null | null |
null | {
"abstract": " Reductions for transition systems have been recently introduced as a uniform\nand principled method for comparing the expressiveness of system models with\nrespect to a range of properties, especially bisimulations. In this paper we\nstudy the expressiveness (w.r.t. bisimulations) of models for quant... | null | null | null | null | true | null | 131 | null | Default | null | null |
null | {
"abstract": " Poynting's theorem is used to obtain an expression for the turbulent\npower-spectral density as function of frequency and wavenumber in low-frequency\nmagnetic turbulence. No reference is made to Elsasser variables as is usually\ndone in magnetohydrodynamic turbulence mixing mechanical and electromag... | null | null | null | null | true | null | 132 | null | Default | null | null |
null | {
"abstract": " Let M be a compact Riemannian manifold and let $\\mu$,d be the associated\nmeasure and distance on M. Robert McCann obtained, generalizing results for the\nEuclidean case by Yann Brenier, the polar factorization of Borel maps S : M ->\nM pushing forward $\\mu$ to a measure $\\nu$: each S factors uniq... | null | null | [
"Mathematics"
] | null | true | null | 133 | null | Validated | null | null |
null | {
"abstract": " We examine the representation of numbers as the sum of two squares in\n$\\mathbb{Z}_n$ for a general positive integer $n$. Using this information we\nmake some comments about the density of positive integers which can be\nrepresented as the sum of two squares and powers of $2$ in $\\mathbb{N}$.\n",
... | null | null | [
"Mathematics"
] | null | true | null | 134 | null | Validated | null | null |
null | {
"abstract": " Regression for spatially dependent outcomes poses many challenges, for\ninference and for computation. Non-spatial models and traditional spatial\nmixed-effects models each have their advantages and disadvantages, making it\ndifficult for practitioners to determine how to carry out a spatial regressi... | null | null | null | null | true | null | 135 | null | Default | null | null |
null | {
"abstract": " One of the most important parameters in ionospheric plasma research also\nhaving a wide practical application in wireless satellite telecommunications is\nthe total electron content (TEC) representing the columnal electron number\ndensity. The F region with high electron density provides the biggest\... | null | null | null | null | true | null | 136 | null | Default | null | null |
null | {
"abstract": " For the particles undergoing the anomalous diffusion with different waiting\ntime distributions for different internal states, we derive the Fokker-Planck\nand Feymann-Kac equations, respectively, describing positions of the particles\nand functional distributions of the trajectories of particles; in... | null | null | [
"Mathematics",
"Statistics"
] | null | true | null | 137 | null | Validated | null | null |
null | {
"abstract": " Stabilizing the magnetic signal of single adatoms is a crucial step towards\ntheir successful usage in widespread technological applications such as\nhigh-density magnetic data storage devices. The quantum mechanical nature of\nthese tiny objects, however, introduces intrinsic zero-point spin-fluctua... | null | null | null | null | true | null | 138 | null | Default | null | null |
null | {
"abstract": " We study a minimal model for the growth of a phenotypically heterogeneous\npopulation of cells subject to a fluctuating environment in which they can\nreplicate (by exploiting available resources) and modify their phenotype within\na given landscape (thereby exploring novel configurations). The model... | null | null | [
"Quantitative Biology"
] | null | true | null | 139 | null | Validated | null | null |
null | {
"abstract": " Electronic Health Records (EHR) are data generated during routine clinical\ncare. EHR offer researchers unprecedented phenotypic breadth and depth and have\nthe potential to accelerate the pace of precision medicine at scale. A main EHR\nuse-case is creating phenotyping algorithms to define disease s... | null | null | [
"Computer Science"
] | null | true | null | 140 | null | Validated | null | null |
null | {
"abstract": " Mission critical data dissemination in massive Internet of things (IoT)\nnetworks imposes constraints on the message transfer delay between devices. Due\nto low power and communication range of IoT devices, data is foreseen to be\nrelayed over multiple device-to-device (D2D) links before reaching the... | null | null | null | null | true | null | 141 | null | Default | null | null |
null | {
"abstract": " We develope a two-species exclusion process with a distinct pair of entry and\nexit sites for each species of rigid rods. The relatively slower forward\nstepping of the rods in an extended bottleneck region, located in between the\ntwo entry sites, controls the extent of interference of the co-direct... | null | null | null | null | true | null | 142 | null | Default | null | null |
null | {
"abstract": " We introduce a large class of random Young diagrams which can be regarded as\na natural one-parameter deformation of some classical Young diagram ensembles;\na deformation which is related to Jack polynomials and Jack characters. We show\nthat each such a random Young diagram converges asymptotically... | null | null | null | null | true | null | 143 | null | Default | null | null |
null | {
"abstract": " We explicitly compute the critical exponents associated with logarithmic\ncorrections (the so-called hatted exponents) starting from the renormalization\ngroup equations and the mean field behavior for a wide class of models at the\nupper critical behavior (for short and long range $\\phi^n$-theories... | null | null | null | null | true | null | 144 | null | Default | null | null |
null | {
"abstract": " We obtain a Bernstein-type inequality for sums of Banach-valued random\nvariables satisfying a weak dependence assumption of general type and under\ncertain smoothness assumptions of the underlying Banach norm. We use this\ninequality in order to investigate in the asymptotical regime the error upper... | null | null | null | null | true | null | 145 | null | Default | null | null |
null | {
"abstract": " The temperature-dependent evolution of the Kondo lattice is a long-standing\ntopic of theoretical and experimental investigation and yet it lacks a truly\nmicroscopic description of the relation of the basic $f$-$d$ hybridization\nprocesses to the fundamental temperature scales of Kondo screening and... | null | null | null | null | true | null | 146 | null | Default | null | null |
null | {
"abstract": " Hegarty conjectured for $n\\neq 2, 3, 5, 7$ that $\\mathbb{Z}/n\\mathbb{Z}$ has\na permutation which destroys all arithmetic progressions mod $n$. For $n\\ge\nn_0$, Hegarty and Martinsson demonstrated that $\\mathbb{Z}/n\\mathbb{Z}$ has an\narithmetic-progression destroying permutation. However $n_0\... | null | null | null | null | true | null | 147 | null | Default | null | null |
null | {
"abstract": " An immersion $f : {\\mathcal D} \\rightarrow \\mathcal C$ between cell complexes\nis a local homeomorphism onto its image that commutes with the characteristic\nmaps of the cell complexes. We study immersions between finite-dimensional\nconnected $\\Delta$-complexes by replacing the fundamental group... | null | null | null | null | true | null | 148 | null | Default | null | null |
null | {
"abstract": " Resolving the relationship between biodiversity and ecosystem functioning has\nbeen one of the central goals of modern ecology. Early debates about the\nrelationship were finally resolved with the advent of a statistical\npartitioning scheme that decomposed the biodiversity effect into a \"selection\... | null | null | null | null | true | null | 149 | null | Default | null | null |
null | {
"abstract": " The principle of democracy is that the people govern through elected\nrepresentatives. Therefore, a democracy is healthy as long as the elected\npoliticians do represent the people. We have analyzed data from the Brazilian\nelectoral court (Tribunal Superior Eleitoral, TSE) concerning money donations... | null | null | null | null | true | null | 150 | null | Default | null | null |
null | {
"abstract": " With the increasing commoditization of computer vision, speech recognition\nand machine translation systems and the widespread deployment of learning-based\nback-end technologies such as digital advertising and intelligent\ninfrastructures, AI (Artificial Intelligence) has moved from research labs to... | null | null | null | null | true | null | 151 | null | Default | null | null |
null | {
"abstract": " We rework and generalize equivariant infinite loop space theory, which shows\nhow to construct G-spectra from G-spaces with suitable structure. There is a\nnaive version which gives naive G-spectra for any topological group G, but our\nfocus is on the construction of genuine G-spectra when G is finit... | null | null | null | null | true | null | 152 | null | Default | null | null |
null | {
"abstract": " We prove that any open subset $U$ of a semi-simple simply connected\nquasi-split linear algebraic group $G$ with ${codim} (G\\setminus U, G)\\geq 2$\nover a number field satisfies strong approximation by establishing a fibration\nof $G$ over a toric variety. We also prove a similar result of strong\n... | null | null | null | null | true | null | 153 | null | Default | null | null |
null | {
"abstract": " We show that nonlocal minimal cones which are non-singular subgraphs outside\nthe origin are necessarily halfspaces.\nThe proof is based on classical ideas of~\\cite{DG1} and on the computation of\nthe linearized nonlocal mean curvature operator, which is proved to satisfy a\nsuitable maximum princip... | null | null | null | null | true | null | 154 | null | Default | null | null |
null | {
"abstract": " Let $f_1,\\ldots,f_k : \\mathbb{N} \\rightarrow \\mathbb{C}$ be multiplicative\nfunctions taking values in the closed unit disc. Using an analytic approach in\nthe spirit of Halász' mean value theorem, we compute multidimensional\naverages of the shape $$x^{-l} \\sum_{\\mathbf{n} \\in [x]^l} \\prod_{... | null | null | null | null | true | null | 155 | null | Default | null | null |
null | {
"abstract": " The apparent gas permeability of the porous medium is an important parameter\nin the prediction of unconventional gas production, which was first\ninvestigated systematically by Klinkenberg in 1941 and found to increase with\nthe reciprocal mean gas pressure (or equivalently, the Knudsen number).\nAl... | null | null | null | null | true | null | 156 | null | Default | null | null |
null | {
"abstract": " In previous papers, threshold probabilities for the properties of a random\ndistance graph to contain strictly balanced graphs were found. We extend this\nresult to arbitrary graphs and prove that the number of copies of a strictly\nbalanced graph has asymptotically Poisson distribution at the thresh... | null | null | null | null | true | null | 157 | null | Default | null | null |
null | {
"abstract": " Runtime enforcement can be effectively used to improve the reliability of\nsoftware applications. However, it often requires the definition of ad hoc\npolicies and enforcement strategies, which might be expensive to identify and\nimplement. This paper discusses how to exploit lifecycle events to obta... | null | null | null | null | true | null | 158 | null | Default | null | null |
null | {
"abstract": " The atomic norm provides a generalization of the $\\ell_1$-norm to continuous\nparameter spaces. When applied as a sparse regularizer for line spectral\nestimation the solution can be obtained by solving a convex optimization\nproblem. This problem is known as atomic norm soft thresholding (AST). It ... | null | null | null | null | true | null | 159 | null | Default | null | null |
null | {
"abstract": " We study the problem of causal structure learning over a set of random\nvariables when the experimenter is allowed to perform at most $M$ experiments\nin a non-adaptive manner. We consider the optimal learning strategy in terms of\nminimizing the portions of the structure that remains unknown given t... | null | null | null | null | true | null | 160 | null | Default | null | null |
null | {
"abstract": " We present a novel data-driven nested optimization framework that addresses\nthe problem of coupling between plant and controller optimization. This\noptimization strategy is tailored towards instances where a closed-form\nexpression for the system dynamic response is unobtainable and simulations or\... | null | null | null | null | true | null | 161 | null | Default | null | null |
null | {
"abstract": " We explore the topological properties of quantum spin-1/2 chains with two\nIsing symmetries. This class of models does not possess any of the symmetries\nthat are required to protect the Haldane phase. Nevertheless, we show that\nthere are 4 symmetry-protected topological phases, in addition to 6 pha... | null | null | null | null | true | null | 162 | null | Default | null | null |
null | {
"abstract": " Most of the codes that have an algebraic decoding algorithm are derived from\nthe Reed Solomon codes. They are obtained by taking equivalent codes, for\nexample the generalized Reed Solomon codes, or by using the so-called subfield\nsubcode method, which leads to Alternant codes and Goppa codes over ... | null | null | null | null | true | null | 163 | null | Default | null | null |
null | {
"abstract": " Motivated by the study of Nishinou-Nohara-Ueda on the Floer thoery of\nGelfand-Cetlin systems over complex partial flag manifolds, we provide a\ncomplete description of the topology of Gelfand-Cetlin fibers. We prove that\nall fibers are \\emph{smooth} isotropic submanifolds and give a complete\ndesc... | null | null | null | null | true | null | 164 | null | Default | null | null |
null | {
"abstract": " Ensemble data assimilation methods such as the Ensemble Kalman Filter (EnKF)\nare a key component of probabilistic weather forecasting. They represent the\nuncertainty in the initial conditions by an ensemble which incorporates\ninformation coming from the physical model with the latest observations.... | null | null | null | null | true | null | 165 | null | Default | null | null |
null | {
"abstract": " In this paper, we consider the Tensor Robust Principal Component Analysis\n(TRPCA) problem, which aims to exactly recover the low-rank and sparse\ncomponents from their sum. Our model is based on the recently proposed\ntensor-tensor product (or t-product) [13]. Induced by the t-product, we first\nrig... | null | null | null | null | true | null | 166 | null | Default | null | null |
null | {
"abstract": " Galaxies in the local Universe are known to follow bimodal distributions in\nthe global stellar populations properties. We analyze the distribution of the\nlocal average stellar-population ages of 654,053 sub-galactic regions resolved\non ~1-kpc scales in a volume-corrected sample of 394 galaxies, dr... | null | null | null | null | true | null | 167 | null | Default | null | null |
null | {
"abstract": " We introduce a minimal model for the evolution of functional\nprotein-interaction networks using a sequence-based mutational algorithm, and\napply the model to study neutral drift in networks that yield oscillatory\ndynamics. Starting with a functional core module, random evolutionary drift\nincrease... | null | null | null | null | true | null | 168 | null | Default | null | null |
null | {
"abstract": " The handwritten string recognition is still a challengeable task, though the\npowerful deep learning tools were introduced. In this paper, based on TAO-FCN,\nwe proposed an end-to-end system for handwritten string recognition. Compared\nwith the conventional methods, there is no preprocess nor manual... | null | null | [
"Computer Science"
] | null | true | null | 169 | null | Validated | null | null |
null | {
"abstract": " We note that the necessary and sufficient conditions established by Marcel\nRiesz for the inclusion of regular Nörlund summation methods are in fact\napplicable quite generally.\n",
"title": "Marcel Riesz on Nörlund Means"
} | null | null | null | null | true | null | 170 | null | Default | null | null |
null | {
"abstract": " These lectures notes were written for a summer school on Mathematics for\npost-quantum cryptography in Thiès, Senegal. They try to provide a guide for\nMasters' students to get through the vast literature on elliptic curves,\nwithout getting lost on their way to learning isogeny based cryptography. T... | null | null | null | null | true | null | 171 | null | Default | null | null |
null | {
"abstract": " It has been shown recently that changing the fluidic properties of a drug can\nimprove its efficacy in ablating solid tumors. We develop a modeling framework\nfor tumor ablation, and present the simplest possible model for drug diffusion\nin a spherical tumor with leaky boundaries and assuming cell d... | null | null | null | null | true | null | 172 | null | Default | null | null |
null | {
"abstract": " To identify the estimand in missing data problems and observational studies,\nit is common to base the statistical estimation on the \"missing at random\" and\n\"no unmeasured confounder\" assumptions. However, these assumptions are\nunverifiable using empirical data and pose serious threats to the v... | null | null | null | null | true | null | 173 | null | Default | null | null |
null | {
"abstract": " In this paper, we provide an analysis of self-organized network management,\nwith an end-to-end perspective of the network. Self-organization as applied to\ncellular networks is usually referred to Self-organizing Networks (SONs), and\nit is a key driver for improving Operations, Administration, and ... | null | null | null | null | true | null | 174 | null | Default | null | null |
null | {
"abstract": " Understanding smart grid cyber attacks is key for developing appropriate\nprotection and recovery measures. Advanced attacks pursue maximized impact at\nminimized costs and detectability. This paper conducts risk analysis of\ncombined data integrity and availability attacks against the power system s... | null | null | null | null | true | null | 175 | null | Default | null | null |
null | {
"abstract": " We propose a family of near-metrics based on local graph diffusion to capture\nsimilarity for a wide class of data sets. These quasi-metametrics, as their\nnames suggest, dispense with one or two standard axioms of metric spaces,\nspecifically distinguishability and symmetry, so that similarity betwe... | null | null | null | null | true | null | 176 | null | Default | null | null |
null | {
"abstract": " Recommender system is an important component of many web services to help\nusers locate items that match their interests. Several studies showed that\nrecommender systems are vulnerable to poisoning attacks, in which an attacker\ninjects fake data to a given system such that the system makes recommen... | null | null | null | null | true | null | 177 | null | Default | null | null |
null | {
"abstract": " This paper describes the Stockholm University/University of Groningen\n(SU-RUG) system for the SIGMORPHON 2017 shared task on morphological\ninflection. Our system is based on an attentional sequence-to-sequence neural\nnetwork model using Long Short-Term Memory (LSTM) cells, with joint training of\n... | null | null | null | null | true | null | 178 | null | Default | null | null |
null | {
"abstract": " Neuroscientists classify neurons into different types that perform similar\ncomputations at different locations in the visual field. Traditional methods\nfor neural system identification do not capitalize on this separation of 'what'\nand 'where'. Learning deep convolutional feature spaces that are s... | null | null | null | null | true | null | 179 | null | Default | null | null |
null | {
"abstract": " The extremely low efficiency is regarded as the bottleneck of Wireless Power\nTransfer (WPT) technology. To tackle this problem, either enlarging the\ntransfer power or changing the infrastructure of WPT system could be an\nintuitively proposed way. However, the drastically important issue on the use... | null | null | [
"Computer Science"
] | null | true | null | 180 | null | Validated | null | null |
null | {
"abstract": " A numerical method for particle-laden fluids interacting with a deformable\nsolid domain and mobile rigid parts is proposed and implemented in a full\nengineering system. The fluid domain is modeled with a lattice Boltzmann\nrepresentation, the particles and rigid parts are modeled with a discrete\ne... | null | null | null | null | true | null | 181 | null | Default | null | null |
null | {
"abstract": " We construct a Schwinger-Keldysh effective field theory for relativistic\nhydrodynamics for charged matter in a thermal background using a superspace\nformalism. Superspace allows us to efficiently impose the symmetries of the\nproblem and to obtain a simple expression for the effective action. We sh... | null | null | null | null | true | null | 182 | null | Default | null | null |
null | {
"abstract": " Observables have a dual nature in both classical and quantum kinematics: they\nare at the same time \\emph{quantities}, allowing to separate states by means of\ntheir numerical values, and \\emph{generators of transformations}, establishing\nrelations between different states. In this work, we show h... | null | null | null | null | true | null | 183 | null | Default | null | null |
null | {
"abstract": " Let $(M,g)$ be a smooth compact Riemannian manifold of dimension $n$ with\nsmooth boundary $\\partial M$. Suppose that $(M,g)$ admits a scalar-flat\nconformal metric. We prove that the supremum of the isoperimetric quotient over\nthe scalar-flat conformal class is strictly larger than the best consta... | null | null | null | null | true | null | 184 | null | Default | null | null |
null | {
"abstract": " Random feature maps are ubiquitous in modern statistical machine learning,\nwhere they generalize random projections by means of powerful, yet often\ndifficult to analyze nonlinear operators. In this paper, we leverage the\n\"concentration\" phenomenon induced by random matrix theory to perform a\nsp... | null | null | null | null | true | null | 185 | null | Default | null | null |
null | {
"abstract": " The calculation of minimum energy paths for transitions such as atomic and/or\nspin re-arrangements is an important task in many contexts and can often be\nused to determine the mechanism and rate of transitions. An important challenge\nis to reduce the computational effort in such calculations, espe... | null | null | null | null | true | null | 186 | null | Default | null | null |
null | {
"abstract": " Social media has changed the ways of communication, where everyone is\nequipped with the power to express their opinions to others in online\ndiscussion platforms. Previously, a number of stud- ies have been presented to\nidentify opinion leaders in online discussion networks. Feng (\"Are you\nconnec... | null | null | null | null | true | null | 187 | null | Default | null | null |
null | {
"abstract": " Let $E_n(f)_{\\alpha,\\beta,\\gamma}$ denote the error of best approximation by\npolynomials of degree at most $n$ in the space\n$L^2(\\varpi_{\\alpha,\\beta,\\gamma})$ on the triangle $\\{(x,y): x, y \\ge 0, x+y\n\\le 1\\}$, where $\\varpi_{\\alpha,\\beta,\\gamma}(x,y) := x^\\alpha y ^\\beta\n(1-x-y... | null | null | null | null | true | null | 188 | null | Default | null | null |
null | {
"abstract": " Due to the increasing dependency of critical infrastructure on synchronized\nclocks, network time synchronization protocols have become an attractive target\nfor attackers. We identify data origin authentication as the key security\nobjective and suggest to employ recently proposed high-performance d... | null | null | null | null | true | null | 189 | null | Default | null | null |
null | {
"abstract": " We implement an efficient numerical method to calculate response functions of\ncomplex impurities based on the Density Matrix Renormalization Group (DMRG) and\nuse it as the impurity-solver of the Dynamical Mean Field Theory (DMFT). This\nmethod uses the correction vector to obtain precise Green's fu... | null | null | null | null | true | null | 190 | null | Default | null | null |
null | {
"abstract": " Bulk and surface electronic structures, calculated using density functional\ntheory and a tight-binding model Hamiltonian, reveal the existence of two\ntopologically invariant (TI) surface states in the family of cubic Bi\nperovskites (ABiO$_3$; A = Na, K, Rb, Cs, Mg, Ca, Sr and Ba). The two TI\nstat... | null | null | null | null | true | null | 191 | null | Default | null | null |
null | {
"abstract": " It is often recommended that identifiers for ontology terms should be\nsemantics-free or meaningless. In practice, ontology developers tend to use\nnumeric identifiers, starting at 1 and working upwards. In this paper we\npresent a critique of current ontology semantics-free identifiers;\nmonotonical... | null | null | null | null | true | null | 192 | null | Default | null | null |
null | {
"abstract": " Deep learning methods have achieved high performance in sound recognition\ntasks. Deciding how to feed the training data is important for further\nperformance improvement. We propose a novel learning method for deep sound\nrecognition: Between-Class learning (BC learning). Our strategy is to learn a\... | null | null | null | null | true | null | 193 | null | Default | null | null |
null | {
"abstract": " We propose a linear-time, single-pass, top-down algorithm for multiple\ntesting on directed acyclic graphs (DAGs), where nodes represent hypotheses and\nedges specify a partial ordering in which hypotheses must be tested. The\nprocedure is guaranteed to reject a sub-DAG with bounded false discovery r... | null | null | [
"Mathematics",
"Statistics"
] | null | true | null | 194 | null | Validated | null | null |
null | {
"abstract": " In this paper, we consider a Hamiltonian system combining a nonlinear Schr\\\"\nodinger equation (NLS) and an ordinary differential equation (ODE). This system\nis a simplified model of the NLS around soliton solutions. Following Nakanishi\n\\cite{NakanishiJMSJ}, we show scattering of $L^2$ small $H^... | null | null | null | null | true | null | 195 | null | Default | null | null |
null | {
"abstract": " We relate the concepts used in decentralized ledger technology to studies of\nepisodic memory in the mammalian brain. Specifically, we introduce the standard\nconcepts of linked list, hash functions, and sharding, from computer science.\nWe argue that these concepts may be more relevant to studies of... | null | null | [
"Quantitative Biology"
] | null | true | null | 196 | null | Validated | null | null |
null | {
"abstract": " Time-varying network topologies can deeply influence dynamical processes\nmediated by them. Memory effects in the pattern of interactions among\nindividuals are also known to affect how diffusive and spreading phenomena take\nplace. In this paper we analyze the combined effect of these two ingredient... | null | null | null | null | true | null | 197 | null | Default | null | null |
null | {
"abstract": " A long-standing obstacle to progress in deep learning is the problem of\nvanishing and exploding gradients. Although, the problem has largely been\novercome via carefully constructed initializations and batch normalization,\narchitectures incorporating skip-connections such as highway and resnets\npe... | null | null | null | null | true | null | 198 | null | Default | null | null |
null | {
"abstract": " We study the band structure topology and engineering from the interplay\nbetween local moments and itinerant electrons in the context of pyrochlore\niridates. For the metallic iridate Pr$_2$Ir$_2$O$_7$, the Ir $5d$ conduction\nelectrons interact with the Pr $4f$ local moments via the $f$-$d$ exchange... | null | null | null | null | true | null | 199 | null | Default | null | null |
null | {
"abstract": " Boundary value problems for Sturm-Liouville operators with potentials from\nthe class $W_2^{-1}$ on a star-shaped graph are considered. We assume that the\npotentials are known on all the edges of the graph except two, and show that\nthe potentials on the remaining edges can be constructed by fractio... | null | null | [
"Mathematics"
] | null | true | null | 200 | null | Validated | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.