content
stringlengths
1
15.9M
\section{Introduction} Autonomous driving has gained significant attention within the automotive research community in recent years \cite{eskandarian2019research, montanaro2018towards, kuutti2019deep}. The potential benefits in improved fuel efficiency, passenger safety, traffic flow, and ride sharing mean self-drivi...
\section{Introduction} \subsection{Motivation} The Ising model, invented by Lenz in 1920 to explain magnetism, is a cornerstone in statistical physics. Consider any graph $G$ with vertex set $V$ and edge set $E$. Each vertex carries one of two possible spins $\pm 1$ and the interactions between vertices are represen...
\section{Introduction} Let $e(z) := e^{2\pi i z}$ and let $K(M)$ denote the best constant such that \begin{align}\label{dres} \nms{\sum_{n = 1}^{M}a_{n}e(nx_1 + n^{2}x_2)}_{L^{6}([0, 1]^2)} \leq K(M)(\sum_{n = 1}^{M}|a_n|^{2})^{1/2} \end{align} for all sequences of complex numbers $\{a_n\}_{n = 1}^{M}$. Trivially, $K(M...
\section{Introduction} Computing shortest paths is certainly one of the most fundamental graph problems and has numerous theoretical and practical applications. The two classical variants of the shortest paths problem are \emph{single-source shortest paths} (SSSP) and \emph{all-pairs shortest path} (APSP). A common gen...
\section{Introduction} \label{sec:intro} The detection of low-energy neutrino bursts is particularly relevant in the search for supernovae. Prompt detection would allow providing early warning for the subsequent electromagnetic observations, that is crucial to understand the underlying mechanisms. The usual method co...
\section{Introduction} In many practical applications from science and engineering fields, it is common to model certain physical complex phenomena by means of dynamical systems. In some cases, the number of variables that characterize such systems is very high and does not permit feasible online simulation, nor per...
\section{Introduction} Low frequency (LF) Quasi-Periodic Oscillations (QPOs) in stellar-mass black hole binaries (BHB) have been known for many years (see reviews by \citealt{Motta2016} and \citealt{Ingram2020}). These QPOs are distinct peaks in the Power Density Spectra (PDS) of X-ray light curves of these sources. Ba...
\section{Introduction} \begin{figure}[ht] \centering \includegraphics[width=1\linewidth]{Figures/Problem_Trimmed.png} \caption{Problem illustration. Mathematically, an observed motion sequence traces out a trajectory on the skeletal pose manifold. The problem of human motion prediction amounts to extrapolating this ...
\section{Introduction} Management of the heat flux to the divertor targets is a major challenge for developing a full-power tokamak fusion reactor, and especially so for a commercial power plant. The exhaust power is fixed for a given design - dictated by the reactor's rated power output and energy gain factor $Q$ - b...
\section{Introduction} Radiation Therapy (RT) is one of the most commonly found cancer treatments and uses various types of highly concentrated beams to kill identified cancer cells. Today roughly 50\% of patients diagnosed with cancer will receive RT sometime during the course of their illness~\cite{baskar2012cancer}....
\section{Introduction} Given an undirected graph $G(V,E)$, a \emph{spanner} is a subgraph $H$ which approximately preserves distances in $G$ up to some error. Spanners are an important primitive in the literature on network design and shortest path algorithms, with applications in motion planning in robotics~\cit...
\section{Introduction}\label{sec:introduction}} \IEEEPARstart{A} lot of computer vision tasks exhibit multi-instance property, i.e. each input data sample is represented by a bag of instances and learning is performed at the bag level instead of the instance level \cite{zhou2004multi,foulds2010review}. For example,...
\section{Introduction} Graph Neural Networks (GNNs) have been developed rapidly for modeling graph-structured data and achieved remarkable progress in graph representation learning as well as downstream learning tasks, such as bioinformatics and social networks analysis~\cite{kipf2016semi,hamilton2017inductive,xu201...
\section{Geometry of regularized Linear Programs}\label{section::appendix_geometry_regularized_linear} We start by fleshing out the connection between strong convexity and smoothness charted in Lemma~\ref{lemma::equivalence_smoothness_strong_convexity}: \equivalencesmoothnessstrongconvexity* \begin{proof} Let $\ma...
\section{Positioning of this work} Recent advances on Natural Language Processing (NLP) are largely based on the use of embeddings. It started with performing SVD on vectorial representation of words (see for instance \cite{laham1998learning}) before turning to less linear analysis like the use of Self Organizing Map...
\section{Introduction} Almost a century after the 1927 Solvay Conference, the question of the ultimate ontology of quantum mechanics remains unsettled. Essentially all formulations of quantum theory rely on the use of a wave function or state vector (or mathematically equivalent structures). But researchers do not agr...
\section{\label{sec:introduction}Introduction} Electron scattering has a long history as a powerful technique for probing hadron and nuclear structure~\cite{Walecka:2001gs}. In the case of parity-violating electron scattering, it has also been used to test the electroweak sector of the standard model, and thereby to s...
\section{Introduction} \label{sec:intro} For marine science and ocean engineering, significant applications such as the surveillance of coral reefs, underwater robotic inspection, and inspection of submarine cables, require clear underwater images. However, raw underwater images with low visual quality can not meet the...
\section{Introduction} Interfaces are arguably the most important elements of the microstructure of materials. Since they play a key role in material properties, their control is essential to the design of engineering materials. Simulation of microstructure evolution is complex because of the wide range of length- and...
\section{Introduction} The field of parameterized algorithmics~\cite{CyganFKLMPPS15,DowneyF13} develops fixed-parameter tractable (FPT) algorithms to solve NP-hard problems exactly, which are provably efficient on inputs whose parameter value is small. \bmp{The purpose of this work is to unify two lines of research in...
\section{Introduction} A {\em polyhedral surface} consists of a set of interior-disjoint polygons embedded in $\mathbb{R}^3$, where each edge may be shared by at most two polygons. Polyhedral surfaces have been long studied in computational geometry, and have well-established applications in for instance computer gra...
\section{From Random Walks to Rough Volatility} Since we will never really know {\it why} the prices of financial assets move, we should at least make a model of {\it how} they move. This was the motivation of Bachelier in 1900, when he wrote in the introduction of his thesis that {\it contradictory opinions in regard...
\section{Introduction} \label{sec:intro} Spherical collapse is ubiquitous in astronomy and has been used to model the formation of stars up to the formation of galaxy halos. Going back many years (e.g. \citealt{LMS65,Tomita, Gunn}), the model of a uniform density sphere collapsing homologously (no shell crosses another...
\section{Introduction} \label{sec:intro} Under the paradigm of the \gls{IoT}, the number of connecting devices is increasing dramatically. IoT devices are mostly battery limited and transmit short packets in a sporadic and uncoordinated manner~\cite{Chen2020_massiveAccess,Wu2020_massiveAccess}. This calls for new theo...
\section{Introduction} Molecular communication is a novel communication technology that is inspired by the nature. It enables information transmission via micro-machinery by exploiting several biologically-inspired methods. One of the basic approaches of this technology is molecular communication via diffusion (MCvD) ...
\section{Introduction} The metal-insulator transition (MIT) in various strongly correlated transition-metal oxides is essential for recently proposed device applications, for instance memristors for next-generation neuromorphic computing{\cite{zhou2015mott,andrews2019building,zhang2020understanding, Ganesh.NPJ.Nature}}...
\section{Introduction} \label{sec:intro} With the discovery of the Higgs boson at the LHC~\cite{ATLAS:2012ulh, CMS:2012rpq}, one of the imperative tasks remaining is to understand the nature of the electroweak (EW) symmetry breaking and various aspects of it. Whether the EW symmetry breaking vacuum that our current un...
\subsection{Style} Papers to be submitted to ICLR 2021 must be prepared according to the instructions presented here. Authors are required to use the ICLR \LaTeX{} style files obtainable at the ICLR website. Please make sure you use the current files and not previous versions. Tweaking the style files may be grounds...
\section{Introduction} The close interplay between coding theory and finite geometry has emerged multiple times in the last 60 years, starting from the works of Prange \cite{Prange} and Rudolph \cite{Rudolph}, where they proposed to construct linear codes starting from projective planes. Their idea was to use the in...
\section{Proofs of impossibility results} \subsection{Proof of Theorem \ref{thm:distribution_free}} Let $(X_i, C_i, T_i)_{i=1}^{n+1}\stackrel{i.i.d.}{\sim} (X, C, T)$. For notational convenience, we put $Z_i = (X_i, C_i, T_i)$. To avoid confusion, we expand $\hat{L}(x)$ into $\hat{L}(Z_1, \ldots, Z_n; x)$. Note that ...
\section{Introduction} The notion of Private Information Retrieval (PIR) was first introduced by Chor \textit{et al.} in \cite{chor95}, and since then, the field has immensely grown \cite{henry11,shah14,sun17,sun17b,banawan18,kumar19,attia20}. PIR systems allow a user to query a cluster of servers and retrieve t...
\section*{Binary tree resonators} We first explore one-dimensional hierarchical mechanical resonators in the form of binary tree beams. Each binary tree resonator is defined by two self-similar trees joined at their $\t{0^{th}}$ generation segments. The length of the $\t{0^{th}}$ generation segment, $2 l_0$, determin...
\section{Introduction} \label{intro} Humans show their characteristics through not only the words they use, but also the way they speak and their facial expressions. Therefore, in multimodal affective computing tasks, such as emotion recognition, there are usually three modalities: textual, acoustic, and visual. One o...
\section{Introduction} This paper was inspired by my studies of previous works dealing with Clifford algebra of multivectors for general, not necessarily symmetric or non-degenerate, bilinear forms. Here I will mention only a few of these works that were the main basis of my own research: Z. Oziewicz \cite{oziewicz97}...
\section{Introduction} Rydberg atoms trapped in optical lattices provide a versatile experimental platform to study quantum many-body systems~\cite{Labuhn16,Bernien17,Guardado-Sanchez18,Lienhard18,Ebadi20,Scholl20,Bluvstein21,Morgado20}. Such atomic arrays leverage the strong interactions afforded by exciting neutral a...
\section{Training procedure of ContraD} \label{ap:alg} \input{alg_contraD} \FloatBarrier \vspace{-0.05in} \section{Results on AFHQ datasets} \label{ap:afhq} \vspace{-0.05in} We evaluate our training method on the Animal Faces-HQ (AFHQ) dataset \cite{choi2020starganv2}, which consists of $\sim$15,000 samples of an...
\section*{INTRODUCTION} NASA's Stardust mission successfully returned cometary and interstellar dust collectors to Earth in 2006, after an encounter with the comet 81P/Wild 2 in 2004, and exposure to the interstellar dust stream in 2000 and 2002. The cometary and interstellar dust particles it collected have been exte...
\section{Introduction} In the current era of noisy intermediate scale quantum computers~\cite{Preskill:2018aa}, quantum architectures are limited by connectivity, gate fidelity, and various other sources of errors that limit both circuit depth and width. In response, various models of quantum computation have been d...
\section{Introduction} Digital artwork spans a broad range of content depicted in diverse visual styles. Learning a representation suitable for searching artwork based on visual style is an open challenge, particularly when discriminating between subtle, {\em fine-grained} \cite{finegrained_cvpr11, finegrained_ieee17,...
\section{Introduction} High-transition-temperature (high-$T_{\mathrm{c}}${}) superconductivity emerges in layered compounds such as copper oxides and iron pnictides. Copper oxides are characterized by a highly two-dimensional nature, which is definitely one of the key ingredients to give rise to high-$T_{\mathrm{c}}${...
\section{Introduction} B[e] supergiant s (B[e]SG s) are a class of rare stars which are not predicted by any stellar evolution models. They are characterized by hybrid spectra of hot stars with infrared excess, strong emission in Hydrogen Balmer and Helium lines, strong permitted and forbidden emission lines from a num...
\section{Introduction} \label{sec:introduction} \noindent Upcoming CMB experiments will target the tensor-to-scalar ratio \sm{r} to a sensitivity of \sm{\sigma_r\sim 10^{-3}} \cite{Matsumura:2013aja,Abazajian:2016yjj,Finelli:2016cyd,Delabrouille:2017rct, Ade:2018sbj,Hanany:2019lle,Shandera:2019ufi,Abazajian:2019eic...
\section{Introduction} \subsection{Summary} In this paper we give an explicit description of the minimal regular model of a bihyperelliptic curve $Y$ with semistable reduction over a local field $K$ of residue characteristic $p>2$. A \textit{bihyperelliptic curve} is a smooth curve with maps to two distinct hyperell...
\section{Introduction} The most basic configuration of germanium detector is the coaxial configuration in which p-type and n-type both can be designed as shown in Fig.~\ref{coax}(a) and Fig.~\ref{coax}(b) . Outer dead layer (p+) of the n-type coaxial germanium detectors are made up of very thin layer ( 0.1 $\mu m$ - 1....
\section*{Introduction} \noindent \noindent A guiding principle in Gorenstein homological algebra is to seek analogues of results about absolute homological dimensions. For example, the Gorenstein global dimension of a ring can equally well be computed in terms of the Gorenstein projective or Gorenstein injective dim...
\section{Conclusion}\label{sec:conc} In this paper we proposed an overflow/underflow-free bit-width optimization method for fixed-point OS-ELM digital circuits. In the proposed method affine arithmetic is used to estimate the intervals of intermediate variables and compute the optimal number of integer bits that never...
\section{Introduction} \label{Intro} Using a quantum state of the electromagnetic field as a probe, the presence of a target can be detected with lower probability of error than with any classical state of equal energy \cite{lloyd2008enhanced, tan2008quantum}. This approach, known as quantum illumination, exploits en...
\section{Introduction} Let ${\mathbb {H}}^n={\mathbb {R}}^{2n} \times {\mathbb {R}}$ be the Heisenberg group of real Euclidean dimension $2n+1$. Writing $x=({\ubar x},x_{2n+1})$ with ${\ubar x}\in {\mathbb {R}}^{2n}$, the group law is given by \[x \cdot y =(\ubar x+\ubar y, x_{2n+1}+y_{2n+1} + {\ubar x}^\intercal J...
\section{Introduction} Extreme examples of variability in active galactic nuclei (AGN) are increasingly common, thanks to ground-based monitoring and soft and hard X-ray monitoring with Swift (e.g., Frederick et al.\ 2020, Kaastra et al.\ 2014). This poses some problems, but also some opportunities. A growing number ...
\section{Introduction} \label{sec:intro} To gain a better understanding of the evolution of the Galaxy and therefore the Universe, it is necessary to know the evolution of the most basic units that comprise it: the chemical elements. The variety of chemical elements found in the spectra of stars is a result of multip...
\section*{} Using data collected by NASA's Transiting Exoplanet Survey Satellite \citep[\emph{TESS};][]{Ricker2015} during its first year of operations, combined with ground-based follow-up observations, \citet[][hereafter N21]{Newton2021} discovered a system of three transiting planets orbiting the star TOI\,451, a ...
\section{Introduction} We begin by providing a definition of the set-to-sequence field and outline its importance in various areas of application. \subsection{What is Set-to-Sequence?} Set-to-sequence encompasses a group of problems where input takes the form of unordered collections of elements and the output is an...
\subsection{PoseNet vs. Classical Frame-to-Frame Odometry} \label{posenet_vs_frame_to_frame} \begin{table} \centering \begin{tabular}{l|c|c} & \texttt{00-08}* & \texttt{09-10} \\ \toprule \toprule PoseNet (ICP loss) & 2.24 & 7.65\\ \hline PoseNet (Weighted ICP loss) & 1.49 & 7.19\\ \hline NI + P-F2F & 40.1 & 30.4\...
\section*{Acknowledgments} We thank Ilia Tutunnikov for many useful discussions on the topic. This work was carried out under the auspices of the Canadian Center for Chirality Research on Origins and Separation (CHIROS). It was partially supported by the Israel Science Foundation (Grant No. 746/15). I.A. acknowledges s...
\section{Introduction} Genetic information is transmitted through genome and exhibits a hierarchical structure in the nucleus. The cell nucleus and the genome are organized into spatially separated sub-compartments \cite{erdel2018formation}. For eukaryotes, genetic information is stored in DNA which is also integr...
\section{Introduction} Enrollment in undergraduate Computer Science (CS) courses is growing rapidly, and these classes are quickly evolving to accommodate the significant increase of students~\cite{Kay98Intro}. To handle the large influx of students, researchers and practitioners have developed a variety of bots to a...
\section*{\refname}% \@mkboth{\MakeUppercase\refname}{\MakeUppercase\refname}% \list{\@biblabel{\@arabic\c@enumiv}}% {\settowidth\labelwidth{\@biblabel{#1}}% \leftmargin\labelwidth \advance\leftmargin20p \advance\leftmargin\labelsep \setlength\itemi...
\section{Introduction} \label{sec:intro} Microstructure characterization and reconstruction (MCR) is an essential component in inverse material design, a concept to accelerate materials engineering~\cite{olson1997, fullwood_microstructure_2010, mcdowell2016, kalidindi2019, bock2019c}. The key for inverse material desig...
\section{Introduction} \vspace{-3pt}\noindent The promise of quantum computing in speeding up computations continues to attract research into exploring quantum algorithms for problems that arise in computer science, mathematics, and other scientific fields of study beyond searching and factorization. Indeed, several q...
\section{Introduction} Scalar mesons -- mesons with the quantum numbers of the vacuum -- are most fascinating objects in the field of strong interactions. The lowest-mass scalar meson $f_0(500)$, traditionally often called $\sigma$, reflects the symmetry breaking of strong interactions and plays the role of the Hig...
\section{Introduction} An important application of the classical martingale representation theorem is in finance for calculating the hedging strategy when the risky asset price can be modeled as a diffusion process with a strictly positive volatility. For a portfolio of assets that are diffusions in $\mathbb{R}^n$, t...
\section{Introduction} For a graph $F$ on $[k] := \{1, \dotsc, k\}$, we say that $B$ is the \textit{$n$-blow-up of $F$} if there exists an ordered partition $(V_1, \dotsc, V_k)$ of $V(B)$ such that $|V_1| = \dotsm = |V_k| = n$ and we have that $uu' \in E(B)$ if and only if $u \in V_i$ and $u' \in V_{j}$ for some $ij...
\section{Details on ACL baselines} \label{app:acl-details} In this section, we give details about our implementations of ACL methods, as well as their hyperparameters tuning. \subsection{Implementation details} \paragraph{Random} We use as baseline a random teacher, which samples tasks using a uniform distribution ov...
\section{Preliminaries} \label{sec:prelims} In this section we formally define the estimation tasks we want to solve (Definition~\ref{def:estimator}). This requires setting up the notion of a `rounding promise' (Definition~\ref{def:roundingpromise}) which highlights an inherent complication with coherent estimation th...
\section{Introduction} \label{intro} Humans have the cognitive capacity to process multi-modal data (e.g. vision, language) and make cross-references between parts of the two modalities in real-time effortlessly. They are also very capable of identifying such cross-references in degenerate cases where one modality suf...
\section{Introduction} \label{sec:Introduction} Using power meters to study cycling performance combines two distinct realms absent of an explicit relation: mechanical measurements and physical conditions. A hypothetical relation between them is offered by mathematical modelling. For instance from power metres alone, i...
\section{Introduction} The Human Evaluation Datasheet (HEDS) is a template for describing single human evaluation experiments (see Section~\ref{sec:kind} for explanation of this term). It uses multiple-choice questions where possible, for ease of comparability across experiments. The HEDS template is intended to be ge...
\section{Introduction} \vspace{-0.75em} There is a conceptual gap~\cite{FR07} in the systems engineering domain between the expertise of participating domain experts (biologists, chemists, mechanical engineers, etc.) and the challenges of systems engineering. Consequently, with the advance of various systems engineer...
\section{Introduction} A {\em triple system } $H=(V,E)$ has vertex set $V$ and $E$ consists of some triples of $V$ (repeated triples are excluded). For any fixed family ${\cal{H}}$ of triple systems, the Tur\'an number ${\rm ex}(n,{\cal{H}})$ is the maximum number of triples in a triple system of $n$ vertices that i...
\section*{Statement of Significance} Our research studies whether amplification effects of sampling can be exploited systematically to improve the accuracy of the privatized estimate. Specifically, assuming the agency has information for the full population, we investigate under which circumstances accuracy gains cou...
\section{Introduction}\label{sec:intro} The Hubble constant $H_0$ quantifies the current expansion rate of our Universe. It can be predicted based on observations of anisotropies in the cosmic microwave background (CMB) and other early universe physics such as baryon acoustic oscillations (BAO). Assuming the standard ...
\section{Introduction}\label{sec1} The six Painlev\'e equations were discovered by \cite{Fuchs,Gam, Pain} as a result of the search for second-order ordinary differential equations in the complex plane, whose only movable singularities are poles, and are not generally solvable in terms of elementary functions. These e...
\section{Introduction}\label{intro_sec} \subsection{Fragmenting rectangles} A fragmentation process describes the breaking up of a structure into pieces, and occurs naturally in many situations. Mathematically, fragmentation processes have been a subject of active research in probability for at least 20 years, incorp...
\section{Introduction} The Fibonacci numbers, $F_n$, and the Lucas numbers, $L_n$, are defined, for all integers $n$ by the Binet formulas: \begin{equation} F_n = \frac{{\alpha ^n - \beta ^n }}{{\alpha - \beta }},\quad L_n = \alpha ^n + \beta ^n\,, \end{equation} where $\alpha$ and $\beta$ are the zeros of th...
\section{Introduction} This paper is a tribute to the genius of the legendary Indian mathematician Srinivasa Ramanujan (22 December 1887 - 26 April 1920) in the centenary year of his death. The life story of Ramanujan is so well known that it needs no elaboration not even a summarisation. In his short life period he m...
\section{Introduction} Software quality assurance forms an important part of the software development cycle. Its importance is accepted throughout the software engineering community. Verification and validation of an application are essential steps in software testing. The increasing complexity of present-day sof...
\section{Introduction} \IEEEPARstart{S}{oftware} engineering research requires real software artifacts either to study their properties or to evaluate new techniques. Software datasets have emerged in the community as an effort to standardize and increase the reproducibility of software studies and the comparison bet...
\section{Introduction} With the rapid economic development and improvement of living standards, the high-quality demands of medical health and care are gradually increasing. The full set of qualified health services are provided in highly urbanized areas, which are very well covered by communication networks. However,...
\section{Introduction}\label{sec:intro} Geometric packing problems have many important applications in cutting stock \cite{gilmore1965multistage}, VLSI design \cite{Hochbaum1985}, logistics \cite{CKPT17}, smart-grids \cite{GGIK16}, etc. Two-dimensional geometric knapsack (2GK), a multidimensional generalization of the...
\section{Introduction}\label{sec:intro} We are entering the prime time era of photometric cosmological surveys. A number of these surveys have reported results over the past few years, including the Dark Energy Survey (DES)\footnote{\url{https://www.darkenergysurvey.org}.} \citep{1708.01530}, the Hyper Suprime-Cam ...
\section{Introduction} The goal of this paper and its companion paper \cite{NVW} is the kinetic description of interacting particle systems in the mathematical framework of scaling limits. The main emphasis is on the physically important case of long-range interaction, including the Coulomb case. The currently availa...
\section{Introduction}\label{sec:intro} Remote sensing (RS) ship detection has attracted extensive attention in recent years due to its large potential in both civilian and military applications (e.g., port management, target surveillance). As a key factor of ship detection, high-resolution (HR) images can provide abun...
\section{Introduction} With the developments of intelligent context-aware systems (CAS), the safety and quality of modern operating rooms have significantly been improved~\cite{maier2017surgical}. One underlying task of CAS is surgical phase recognition, which facilitates surgery monitoring~\cite{bricon2007context}, s...
\section*{Acknowledgments} The authors thank Jennifer Cano, Antoine Georges, Chandra Varma, Tomo Uemura, T. Senthil, Ivan Bozovic, Matt Yankowitz, Sankar Das Sarma, Qimiao Si, Alex Wietek and Jie Wang for fruitful discussions. AG, AJM and LW are supported in part by Programmable Quantum Materials, an Energy Frontier ...
\section{Introduction} A number of general purpose filters are available for Bayesian filtering in the literature. The parameterized Bayesian filters include the Extended Kalman Filters \cite{Kal}, the Cubature Kalman Filters \cite{AH}, the Unscented Kalman Filters \cite{JU}, the Gauss–Hermite filters \cite{DSG}, the ...
\section{Introduction} Over the last decade AMS-02 has acquired precise measurements of cosmic-ray electrons and positrons as well as multiple nuclei from protons to iron \cite{Aguilar:2021tos}. These data are provided with unprecedented precision at the level of a few percent in a large energy range between 1~GeV a...
\section{Introduction} In their seminal paper \cite{FS}, Friedman and Stanley define and develop a notion of {\em Borel reducibility} among classes of structures with universe $\omega$ in a fixed, countable language $L$ that are Borel and invariant under permutations of $\omega$. It is well known (see e.g., \cite{Kec...
\subsection{Simple ZSL} We individually tune model hyperparameters for three different types of auxiliary data: class names with word2vec features, Wikipedia articles with either ALBERT-base or ALBERT-xxlarge features. We use Adam optimizer and a random search to generate 40 different hyperparameter settings an...
\section{Introduction.} Suppose that on a probability space we observe $X+Y$, where $X$ and $Y$ are independent random variables, $X$ being a square-integrable random variable of interest, and $Y$ being an additive noise perturbation. The prediction error \begin{equation} E\{X-E(X|X+Y)\}^2 ={\rm var}X- {\rm var}E(X|X+Y...
\section{Introduction}\label{sec:intro} Moduli spaces of semistable sheaves on a complex projective K3 surface $X$ are a well studied class of algebraic varieties, and they are among the only known examples of compact hyperk\"{a}hler (or irreducible holomorphic symplectic) varieties. Classically, we consider the moduli...
\section{Introduction} \label{sec:intro} A \emph{hypergraph} is a generalization of a graph in which an edge can connect any number of nodes. Formally, a hypergraph $H$ is a tuple $(V,E)$ where $V$ is the set of \emph{nodes} and $E$ is a set of nonempty subsets of $V$ called {\em hyperedges}. Nodes and hyperedges may...
\section{Introduction} The Muskat equation is an important model in the analysis of free surface flows, which describes the dynamics of two incompressible and immiscible fluids with different densities and viscosities separated by a porous media whose velocities obey Darcy's law (see \cite{darcy1856fontaines},\cite{M...
\section{Introduction} Quantum chromodynamics (QCD) has been proven to be the fundamental theory of strong interaction between quarks and gluons, although it is still ambiguously at the low-energy region. The study of multiquarks could enrich our knowledge of hadron structures and hadron interactions, and provide more...
\section{Introduction} Non-centrosymmetric B20 chiral magnets have been reported to have the interesting property of breaking inversion symmetry, leading to various types of magnetic structures, ranging from spin spirals over skyrmions~\cite{Muhlbauer2009,Neubauer2009, Yu2010, Yu2011} and bobbers~\cite{Zheng2018,Ryba...
\section{Introduction} Convolutional neural networks (CNNs) have achieved great success in various vision tasks \citep{DBLP:conf/cvpr/SzegedyVISW16,redmon2016you,DBLP:conf/iccv/HeGDG17}. The key to such success is the powerful ability of feature representations to input images, where network units\footnote{Regarding t...
\section{Introduction} Understanding the epoch of reionization, when the first stars and galaxies in the Universe ionized the hydrogen and helium in the intergalactic medium, is a key priority in observational cosmology today by virtue of its inherent connection between large-scale cosmological structure and early Uni...
\section{Introduction} Artificial Intelligence (AI) covers different technologies for searching, reasoning, planning, problem solving, and learning with the overall aim of \enquote{automating intellectual tasks normally performed by humans}~\cite{francois_chollet_deep_2017}. Its rise in popularity in recent years is ...
\section{Introduction} As a long-established concept in quantum physics, supersymmetry (SUSY) finds applications in a wide range of fields from particle physics to condensed matter in both relativistic and nonrelativistic settings \cite{gol1989extension, ramond1971dual, neveu1971factorizable, sourlas1985introduction, b...
\section*{funding} J.J. acknowledges the financial support of the MINECO Project MOVELIGHT (PGC2018-099637-B-100 AEI/FEDER UE). \section*{Disclosures} The authors declare no conflicts of interest
\section{Introduction} \label{intro} Respondent-level data, also known as microdata, are extremely important to many disciplines including social and behavioral sciences. However, these microdata sometimes contain sensitive information about records in the dataset. Therefore, including such information in its original...