content stringlengths 1 15.9M |
|---|
\section{Introduction}
Stern {\cite{stern-scalar-2020}} showed an interesting formula relating the
level set of harmonic functions and the scalar curvature of a 3-manifold. With
Bray {\cite{bray-scalar-2019}}, they generalized the result to 3-manifold with
boundary where a harmonic 1-form with vanishing normal compone... |
\section*{Acknowledgments}
M.G. and M.Z. acknowledge funding from the Alexander von Humboldt Foundation. T.L. acknowledges funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (Grant agreement No. 949431). This work is supported by the German Researc... |
\section{Introduction}
\label{sec:intro}
Transient dynamics, those that occur over short timescales, can often be vastly different from the asymptotic or long term dynamics of ecological systems. However, throughout the history of mathematical biology much of the work has focused on determining the asymptotic dynamics... |
\section*{Abstract}
The article studies the transport equation that governes the motion of a fluid in a bounded domain, under the hypothesis of zero velocity at the boundary and supposing the incompressible nature of the fluid. Together with existence and uniqueness results, we study the DiPerna-Lions stability proble... |
\section{Introduction and statement of results}
The study of representations of integers as sums of polygonal numbers has a long and storied history. For $m\in\mathbb N_{\geq 3}$ and $\ell\in\mathbb N_0$, let $p_m(\ell)$ be the \begin{it}$\ell$-th $m$-gonal number\end{it}
\begin{equation*}
p_m(\ell):=\frac12 (m-2)\... |
\section{Introduction}
Implementations of automated driving functions in prototypes and test drives have already been demonstrated in the past. Still, despite several announcements by the automotive industry, Level 3 automated driving systems (L3-ADS) \cite{J3016} or higher have not yet been introduced to the market. ... |
\section*{Comments}
\section{Introduction}
\label{sec:introduction}
In this paper we study both the chemical and Euclidean distances in the
\textit{ellipses model} introduced in~\cite{teixeira2017ellipses}. It is a
Boolean percolation in the plane with defects given by random ellipses centered
... |
\section{CATHODOLUMINESCENCE HYPERSPECTRAL FITTING}
\label{hyp_fit_sec}
As mentioned in the main text, \gls{qw} \gls{cl} integrated intensity and peak energy maps were obtained from hyperspectral maps by fitting the \gls{cl} spectrum at each pixel. All fitting was done using the \textit{hyperspy} package for Python.\c... |
\section*{Acknowledgments}
We are grateful for helpful discussions with Andrei Alexandru, Tom Cohen, Daniel Hackett, Julian Mu$\tilde{\mathrm{n}}$oz, Jessie Shelton, and Xiaojun Yao. We especially thank Benjamin Svetitsky for his collaboration in early stages of this project. We also thank Yonit Hochberg, Graham Kribs,... |
\section{Introduction}
\label{sec:intro}
Clustering is the process of finding underlying group structure in heterogeneous data.
Although many methods exist for clustering, one of the most prevalent in the literature is model-based, and makes use of the $G$ component finite mixture model.
The finite mixture model assum... |
\section{Introduction}
The current note is based on \cite{Grumiller:2019fmp} which mainly shows that any non-extremal\footnote{The metric can be brought into a Rindler form.} (finite temperature) horizon has an infinite set of near horizon symmetries and associated soft hair excitations in the sense of Hawking, Perry a... |
\section{Conclusion}
\label{sc:concl}
In this paper, we design DeepIDEA, a novel intrusion detection and classification system based on imbalanced deep learning. To deal with the imbalanced class problem, we design a new loss function named attack-sharing loss to eliminate the bias towards the majority/benign class. We... |
\section{Chapter 1: Introduction.}
\setcounter{equation}{0}
\subsection{An equivalence problem in $\mathbb R^D$.}
We begin with an equivalence problem in $\mathbb R^D$.
\begin{itemize}
\item eee
\item eee
\end{itemize}
Visual-object recognition is the ability to perceive properties (such as shape, color and textu... |
\section{Introduction}
Betweenness and similar measures are important concepts in network analysis \citep{borgatti2009network}. For example, the closeness centrality of a node quantifies the degree of closeness of the node to other nodes by summing up the lengths of shortest path, also known as geodesic, from the node... |
\section{Acknowledgements}
We acknowledge support from the Singapore National Research Foundation (NRF) NRF-Investigatorship (No. NRFNRFI2015-04) and Singapore MOE Academic Research Fund Tier 3 Grant MOE2018-T3-1-002. M.\,Raju thanks the National University of Singapore E6NanoFab laboratory and the Data Storage Instit... |
\section{Introduction}
Bright submillimetre galaxies \citep[SMGs;][]{1997ApJ...490L...5S, 1998Natur.394..241H} are prime laboratories for investigating the physical processes involved in high redshift star formation.
With total luminosities that imply star-formation rates (SFRs) of hundreds to thousands of solar masse... |
\section{Introduction}
Approximately 10\% of main sequence and pre-main sequence stars with radiative envelopes host strong ($\sim$kG scale), organized (predominantly dipolar) magnetic fields \citep{2017MNRAS.465.2432G,2019MNRAS.483.2300S}. Since radiative envelopes cannot support a contemporaneous convective dynamo, ... |
\section{Introduction and main results}
Fix $t\geq0.$ Let $\Omega_t$ be a bounded domain in $\mathbb R.$ Given $T>0.$ Set $\widehat{Q}_T=\Omega_t\times(0,T)$ and denote by $\widehat{\Sigma}_T$ the lateral boundary of $\widehat{Q}_T.$ Consider the following wave equation with a nonlinear dissipation in the non-cylindr... |
\section{Introduction}
To facilitate applications like extended reality (XR) that demand high-throughput low-latency communication, networks of the future are expected to provide at least a 1000-fold increase in network throughput \cite{Qualcomm2013}.
Despite high sensitivity to blockages, millimeter wave (mmWave) and... |
\section{Motivation and Introduction}
\label{sec:introduction}
\noindent
Confining particles to a given spatial region opens the doorway for their controlled
preparation and processing. It allows for an efficient detection as
well as measurement of the properties and interactions of ensembles of particles.
This hold... |
\section{Introduction}
Hereditary hemolytic anemias are a group of disorders caused by genetic mutations that affect shape and density of red blood cells. Red blood cells have various channels and pumps helping them to release ions such as calcium and potassium in and out of the cell. An intact membrane structure allow... |
\section{Introduction}
Arithmetic properties of motives defined over a global field are a central theme of modern number theory
and one of the main topic is their relation with (or interpretation as) special values of $L$-functions.
Iwasawa theory combines an algebraic approach, which studies the variation of moti... |
\section{Background and Motivation}
\subsection{Socio-Technical Data}
An average software user wants their products to be bug-free\cite{simmonds2018complexity}.
However, due to the complex nature of software systems, it is hard to develop bug-free software~\cite{simmonds2018complexity}.
Some development patterns hav... |
\section{Introduction}
Solar energy has been the fastest-growing type of renewable energy worldwide in recent years \cite{panwar2011role, haegel2017terawatt,alam2013approach}. The recent improvement of solar photovoltaic (PV) makes the small-scale or distributed solar such as rooftop-PV possible. However, the intermitt... |
\section{Introduction}
Application of strain is one of the effective ways to engineer the band structure of materials. We can tune the properties of materials by strain through the control of the band structure. For example, strained silicon technology has been successful in improving device performance~\cite{Strain-E... |
\section{Introduction}
A heat engine is a device that produces work from heat, operating cyclically \cite{Callen}. A quantum heat engine is a heat engine whose working fluid is a quantum object, e.g., a few-level system \cite{ScovilDuBois, Kosloff2014, Kosloff1992}. Recent works have explored the differences and potent... |
\section*{PROGRAM SUMMARY}
\label{sec:summary}
{\em Computer for which the program is designed and others on which it is operable:} any with standard C++, tested on Linux and Mac OS systems \\ \\
{\em Programming Language used:} C++ \\ \\
{\em High-speed storage required:} No \\ \\
{\em Separate documentation avail... |
\section{Introduction}\label{sec:intro}
Many natural and engineering systems can exhibit complex dynamics with a wide range of temporal and spatial features. In the analysis of these systems, a first step is to seek and extract dominant features or modes \cite{ROM_FluidFlow_Review_Taira2017,PEHERSTORFER2016196,ROM_GPR... |
\section{Introduction}
Model Predictive Control (MPC), known as Receding Horizon Control (RHC), can optimize system criteria and deal with state and control input constraints effectively in industrial control process. MPC has inspired many research efforts and showed potential impacts in the academic area and the proce... |
\section{Introduction}
Solving combinatorial optimization problems to optimality is a central object of study in Operations Research, Computer Science, and Mathematics. One way to solve a combinatorial optimization problem is to model it as an integer program (IP),
namely a problem of the form
%
\begin{align}
\be... |
\section{Introduction} \label{sec:intr}
Consider the boundary value problem $L(q_0, q_1)$ in the form
\begin{gather} \label{eqv}
-y'' + (2 \lambda q_1(x) + q_0(x)) y = \lambda^2 y, \quad x \in (0, \pi), \\ \label{bc}
y(0) = y(\pi) = 0,
\end{gather}
where $\lambda$ is the spectral parameter, $q_j$ are complex-v... |
\section{Introduction}
\label{sec:intro}
Smartphone-based contact tracing protocols~\cite{ahmed2020_access} have been adopted by many countries to help fight the spread of \mbox{\textsc{Covid-19}}. Most practical implementations today follow a common {\em modus operandi}: mobile devices continuously broadcast pseudo-ra... |
\section{Introduction}\label{sec:intro}
The Hopfield model is the prototype for neural networks meant for associative memory tasks. Its popularity is mainly due to its similarities with biological neural networks and to the fact that it can be faced analytically exploiting statistical-mechanics tools typical of disorde... |
\section{Introduction}
Main purpose of this paper is twofold. First, we want to study the Bolza problem of Herglotz' type. We will emphasize on the Jacobi condition and the structure of the cut locus with respect to the associated value function. Second, we will analyze the propagation of singularities from and to non... |
\section{#1} \setcounter{equation}{0}}
\newcommand{\norm}[3]{\|#3\|_{#1,#2}}
\setcounter{secnumdepth}{2}
\newcommand{\Degin}[2]{{d^{\,\text{in}}_{{#1},{#2}}}}
\newcommand{\Degout}[2]{{d^{\,\text{out}}_{{#1},{#2}}}}
\newcommand{\degin}[1]{{d^{\,\text{in}}_{{#1}}}}
\newcommand{\degout}[1]{{d^{\,\text{out}}_{{#1}}}}
\newc... |
\section{Introduction}
\label{sec:intro}
The next generation of neutrino physics experiments heavily utilises LArTPC detectors, which measure particle interactions with precise spatial resolution. The wealth of rich information provided by a LArTPC means automated particle reconstruction can prove challenging, and in ... |
\section{Introduction}
Reinforcement learning (RL) has gained growing popularity in many human-computer interaction (HCI) applications \cite{scheffler2002automatic,bassen2020reinforcement,yom2017encouraging}.
In digital health interventions, for example, RL is a natural choice for personalization as RL agents can... |
\section{Introduction and statement of results}
\subsection{Semi-modular forms}
In a landmark 2000 paper \cite{B-O}, Bloch and Okounkov introduced an operator from statistical physics, the $q$-bracket, under the action of which
certain partition-theoretic $q$-series
transform to quasi-modular forms, a class of function... |
\chapter{Grasp stability analysis --- Theory and Praxis}\label{sec:bridge}
In Chapter~\ref{sec:related} we argued that the notion of a grasp's stability
is of foundational importance to the majority of manipulation tasks and hence
many competing definitions of stability have been proposed by the grasp
modeling comm... |
\section{Introduction}
Let $\zeta(s)$ be the Riemann zeta-function. In this paper we are interested in its log-derivative
$$
\dfrac{\zeta'}{\zeta}(s) = \sum_{n\geq 1} \dfrac{\Lambda(n)}{n^{s}} \quad ({\rm Re}\, s>1)
$$
and its growth behaviour in the strip $1/2<{\rm Re}\, s < 1$ (above $\Lambda(n)$ is the von Mangold... |
\section{Introduction.}
{Let $K$ be a field. We say that a polynomial $f\in K[x]$ is \textit{separable} if its roots in an algebraic closure of $K$ are distinct. This is equivalent to $(f,f')=K[x]$, where $f'$ denotes the formal derivative of $f$. More abstractly, this is also equivalent to $A=K[x]/f$ being a separabl... |
\section{Introduction}\label{sec:introduction}
RDF knowledge bases (KBs) are used in many domains, e.g bibliographic, medical, and biological data. Most knowledge bases face the problem that they are potentially incomplete, incorrect or outdated. Considering how much new data is generated daily it is highly desirable t... |
\section{Setting-up the proof of Theorem \ref{theorem:bogomolov}}
\label{section:bogomolov}
\label{section::first}
As in the statement of the theorem, let $S$ be a base variety, let $E_j \rightarrow S$ ($1\leq j \leq g$) be families of elliptic curves, and set $$\pi: A = E_1 \times_S \cdots \times_S E_g \rightarrow S.... |
\section{Introduction}
In the current understanding of long gamma ray bursts (GRBs), a collapsing core of a massive star (e.g., a Wolf Rayet star) leads to the observed GRB phenomenon \citep{1993ApJ...418..386L, 1993AAS...182.5505W, 1999ApJ...524..262M} while two compact stars gravitationally merge to produce a short G... |
\section{Introduction}
Optimal transport theory has a long and distinguished history in mathematics dating back to the seminal work of \citet{monge1781memoire} and \citet{kantorovich1942transfer}. While originally envisaged for applications in civil engineering, logistics and economics, optimal transport problems prov... |
\subsection{Graphs with bounded degree and planar graphs}
\label{degree-section}
In this subsection, we will prove the following theorem:
\begin{theorem}
\label{degree-lower-bound}
For each $\Delta \geq 4$ and odd $d \geq 1$,
there exists a graph with max... |
\section{Introduction}
Let $\Delta\in S_{12}(\mathrm{SL}_2(\mathbb{Z}))$ be the unique normalized cuspidal modular form of weight twelve and level one defined by Ramanujan's tau function $\tau:\mathbb{N}\rightarrow \mathbb{Z}$, given explicitly by the $q$-expansion
\[
\Delta(z)=\sum_{n\ge1}\tau(n)q^n=q\prod_{n\ge1}\l... |
\section{Introduction}
Deep neural networks have demonstrated impressive performances in many areas.
These areas encompass not only classical computer vision tasks, like object
detection or semantic segmentation, but also safety- and security-critical
tasks, such as skin cancer detection \cite{perez2... |
\section{Introduction.} \label{sec:introduction}
The main purpose of the present work is to provide an exact formula for the second moment of the empirical correlation of two independent Gaussian random walks, and to apply the method of proof to the question of how fast that correlation converges to that of two indepe... |
\section{\label{sec:intro}Introduction}
Double wedge configuration for studying hypersonic flows over solid surfaces is an ingenious idealization. It is geometrically simple yet produces a diversity of complex flow physics. Double wedge configuration is useful for understanding the high thermo-mechanical loads generate... |
\section{Introduction}
The \textit{credit assignment} problem in reinforcement learning~\citep{minsky1961steps,sutton1985temporal,sutton1988learning} is concerned with identifying the contribution of past actions on observed future outcomes. Of particular interest to the reinforcement-learning (RL) problem~\citep{sutt... |
\section{Introduction}
It is a well established fact that discrete (quantum or classical) groups provide a source of interesting examples to the theory of von Neumann algebras. One of the most prominent examples of von Neumann algebras associated with groups are the free group factors. Let $F_n$ the free group with gen... |
\section{Introduction}\label{0}
\begin{figure*}\begin{subfigure}[b]{0.3\textwidth}\begin{center} \ensuremath{\begin{parray}\column{B}{@{}>{}l<{}@{}}\column[0em]{1}{@{}>{}l<{}@{}}\column[1em]{2}{@{}>{}l<{}@{}}\column{3}{@{}>{}l<{}@{}}\column{E}{@{}>{}l<{}@{}}%
\>[1]{}{\mathsf{ex}_{1}\mskip 3.0mu\allowbreak{}\mathnorma... |
\section{Introduction}
\setcounter{equation}{0}
According to the standard cosmological model, the early universe, in the course of its expansion and cooling, undergoes phase transitions with spontaneous symmetry breaking. Topological defects of various kinds (monopoles, strings, domain walls) are formed in the afte... |
\section{Introduction}
Strontium Ruthenate, \ce{Sr2RuO4}, has played a leading role in discussions of unconventional superconductivity since its discovery almost three decades ago\cite{maeno_superconductivity_1994,Mackenziereview,Sigrist2005,Maenoreview,Kallin2012,Mackenzie2017}. Much of the interest in the community c... |
\section{Introduction}
The {\it Juno} spacecraft recently found an ``anomaly'' in Jupiter's
tidal Love number: the measured $k_2=0.565\pm 0.006$ (Durante et
al.~2020) appears to be smaller than the theoretical hydrostatic value
$k_2^{\rm (hs)} =0.590$ (Wahl et al.~2020) by $4\%$. This discrepancy
may be explained in ... |
\subsection{Conversational Search}
Conversational search is a domain in Information Retrieval, describing a specific form of human-computer interaction. The defining feature of this field is that the device responds to the human, creating a two-way, mixed-initiative interaction system \cite{Radlinski_framework, Kiesel... |
\section{Introduction}
{In the past decade, the advent of ride-hailing platforms such as Lyft and Uber has revolutionized urban mobility. While commuter transit needs in cities were traditionally satisfied by personal vehicles or mass transit systems, ride-hailing platforms have grown immensely in popularity and gaine... |
\section{Introduction}
\label{sec:intro}
Chest radiography is one of the most common imaging modalities for diagnosing pathologies in lungs and heart, with multitudes of scans performed annually. Resulting high number of images require efficient screening. However, shortage of radiological experts, long working hours, ... |
\section{Introduction}
The study of the characteristics of the Higgs boson is one of the
primary tasks of the LHC program: the forthcoming Run3 and the High-Luminosity
phase will increase the
accuracy in the measurement of Higgs production cross sections and
decay rates, allowing for a more stringent test of the Standa... |
\section{Introduction}
Let $\mathbb{C}^{m\times n}$ be the space of $m\times n$ complex matrices.
For $A\in \Bbb C^{n\times n}$, we denote the eigenvalues
of $A$ by $\lambda_1(A), \lambda_2(A), \dots, \lambda_n(A)$
and the singular values of $A$ by
$\sigma_1(A), \sigma_2(A), \dots, \sigma_n(A)$. If $\lambda_1... |
\section*{Acknowledgments}
\section{Theoretical Analysis}
\label{sec:analysis}
\section{Corner Cases of Point Cloud Registration}
\label{sec:app:cornercases}
We show two examples of corner cases of point cloud registration where the configuration is not general and violates the $s_1>s_2>s_3>0$ assumption in Section~... |
\section*{Introduction}
\label{Intro}
Information processing in today's computers is done almost exclusively by charges (electric currents). Photons, albeit they are ideal for information transmission, never became a mainstream technology for computing. Despite their numerous advantages, photonic devices have practical... |
\section{Dependent type theory}
\label{secTypesForTheWorkingMathematician}
The term \textit{dependent type theory} refers to any one of a number of logical systems derived from those proposed by Per Martin-L\"{o}f in the 1970s (see e.g.~\cite{MartinLof1975DTT} and \cite{MartinLof1984Intuitionistic}), which in turn ... |
\section{Introduction and main results}
In this paper, we assume that the reader is familiar with the basic notations of Nevanlinna's value distribution theory, see \cite{h3,y1,y2}. In the following, a meromorphic function $f(z)$ means meromorphic on $\mathbb{C}^{n}, n\in \mathbb{N}^{+}$. By $S(r,f)$, we denote any qua... |
\section{Observed and predicted SXR radiances in the quiet Sun}
\begin{figure*}[!htbp]
\centerline{\includegraphics[width=16cm, angle=0]{mansonb.eps}}
\centerline{\includegraphics[width=16cm, angle=0]{mh73b.eps}}
\caption{Predicted SXR quiet Sun radiances, obtained from the
irradiance spectra of
\cite{mans... |
\section{Introduction}
\vspace{-0.3cm}
Studying fundamental structural and dynamic properties of neuronal networks critically depends on advanced optical microscopy imaging systems.
In contrast to conventional optical microscopy that records only lateral information as a 2D projection of light rays, light-field mi... |
\section{Introduction}
In recent years, cavity (or circuit) electromechanics has been established as a powerful implementation of cavity optomechanics.~\cite{Marquardt2014} Rather than relying on a light field circulating inside an optical cavity, an electromagnetic circuit is employed to realize a cavity mode in the m... |
\section*{References}
|
\section{Introduction}
Albeit the rapid advance of neural network architectures, convolution remains the building mainstay of deep neural networks. Drawn inspiration from the classical image filtering methodology, convolution kernels enjoy two remarkable properties that contribute to its magnetism and popularity, name... |
\section{Introduction}
The Kauffman bracket of an unoriented link projection $D$ is the element of $\mathbb{Z}[A^{-1},A]$ determined by
$$\langle D \rangle = A \langle D_{cc}\rangle +A^{-1}\langle D_c\rangle, \quad \langle K\sqcup U\rangle = -A^2-A^{-2}, \quad \langle U\rangle =1$$
where $K_{cc}$, respectively $K_c$, ... |
\section{Introduction}
Several methods exist for solving supervised learning problems of regression
and classification~\citep{HTF09,Bis06}. The main goal is to estimate a model of
the
data generation process to \emph{predict} at best the target value
corresponding to a combination of
features not see... |
\section{Introduction}
\label{sec:intro}
Long-wavelength (infrared and longer) transient sources have been predicted to be a powerful source of information on a wide class of high-energy astrophysical objects, including gamma-ray burst afterglows, the jet launch area of active galactic nuclei (AGN), tidal-disruption... |
\section{Introduction}
The encryption functions of the AES are the composition of a sequence of round transformations made by a confusion and a diffusion layer followed by a key addition with the so-called round key, derived by
the user master key by means of the public key-scheduling algorithm.
While the confusion-di... |
\section{Semi-classical Fourier transform}\label{appendix:qft}
We here discuss the semi-classical Fourier transform presented in~\cite{NiuPRL1996SemiclassicalFourierTransform} and show that its cost is negligible.
The standard way to perform the Fourier transform on $n_e$~qubits is shown in
\autoref{subfig:fourier_tran... |
\section{INTRODUCTION} \label{sec:introduction}
As an observable black hole (BH) over a wide redshift range, quasars, the most powerful active galactic nuclei (AGNs), have been playing a pivotal role in understanding the formation and the growth of BH along the cosmic time.
The quasar demography at a given redshift, ... |
\section{Notation Table}
\mbox{}
\nomenclature[A,01]{$\tau_i$}{The ad type of Player i}
\nomenclature[A,02]{$v_i$}{Valuation of Player i }
\nomenclature[A,04]{$b_i$}{Bid of Player i}
\nomenclature[A,03]{$b_i(v_i)$}{Bid mapping of player $i$}
\nomenclature[B,01]{$\mathcal{A}$}{An allocation algorithm}
\nomenclature[B... |
\section{Introduction}
Speckle patterns are granular intensity patterns that are the result of the interference of coherent light reflecting off a rough surface. Despite their random nature, they are rich in information and can be sensitive to various effects, which make them an interesting tool for metrology. Among m... |
\section*{Introduction}
Ground-state electronic properties of metallic solids have traditionally been
computed using density functional theory~(DFT)~\cite{Kohn1965,Kresse1996,Burke2012,Jones2015},
which is partially justified by the fact that many popular functionals are parameterized by
numerically exact results on t... |
\section{\label{sec:Introduction}Introduction}
Recent advances in machine learning (ML), particularly deep learning (DL), have been successfully applied to computer vision \cite{simonyan2014very, Szegedy2014GoingConvolutions, Voulodimos2018DeepReview}, natural language processing \cite{Sutskever2014SequenceNetworks}, ... |
\section{Electronic Submission}
\label{submission}
Submission to ICML 2022 will be entirely electronic, via a web site
(not email). Information about the submission process and \LaTeX\ templates
are available on the conference web site at:
\begin{center}
\textbf{\texttt{http://icml.cc/}}
\end{center}
The guidelines b... |
\section{Introduction}
Deep neural networks (DNNs) have been at the core of many application breakthroughs \cite{alexnet_2012, nature_dl_2015, nature_alphago_2017, bert_2019}. They are transitioning from the cloud to the edge because of privacy issues, the need for real-time responses, and lack of network connectivity... |
\subsection{Twin boundary structure:}
\label{sec:TB_structures}
\Fig{TEM}a shows a high-resolution scanning transmission electron \blue{microscopy} (HRSTEM) image of the atomic structure of a \tb TB in a Ti-$0.3$ wt.\%O alloy that has been deformed at cryogenic temperatures \cite{chong2020}. The image has been obtai... |
\section{Introduction}
Many computer vision tasks have achieved great success with the advent of deep neural networks in recent years. However, the success of deep networks relies on a large amount of labeled data \cite{imagenet}, which is often expensive and time-consuming to collect.
Domain adaptation (DA) \cite{DA... |
\section{Introduction}
The emergence of machine learning as a society-changing technology in the last decade has triggered concerns about our inability to understand the reasoning of increasingly complex models. The field of Interpretable Machine Learning (IML)\footnote{The literature sometimes differentiates \textit{... |
\section*{This is an unnumbered first-level section head}
This is an example of an unnumbered first-level heading.
\specialsection*{THIS IS A SPECIAL SECTION HEAD}
This is an example of a special section head%
\footnote{Here is an example of a footnote. Notice that this footnote
text is running on so that it can sta... |
\section{Introduction}
The present manuscript is part of a recent series of papers \cite{eAl21,aBu20} dedicated to
astrodynamical properties of Molniya spacecraft.
It is well-known that the Molniya orbit provides a valuable
dynamical alternative to the geosynchronous orbit, suitable for
communication satellites to d... |
\section{Introduction}
Visual image sensors, e.g., digital cameras, have become an important
component to many autonomous and semi-autonomous navigational systems.
In many of these contexts, image processing algorithms process sensed
images to generate autonomous odometry estimates for the vehicle;
referred to as visu... |
\section*{Declaration}
\begin{itemize}
\item \textbf{Funding} : Radha Kopparti is supported by a PhD studentship from City, University of London
\item \textbf{Conflicts of interest/Competing interests} : No conflicts of interest
\item \textbf{Availability of data and material} : All the datasets used in th... |
\section{Introduction}
The dynamics of a quantum system depends not only on itself, but also on how it is probed, showcasing the remarkable extrinsic character of quantum mechanics.
This unavoidable backaction due to measurements can be directly probed in the laboratory~\cite{Murch2008,Purdy2013,Teufel2016,Minev2018}... |
\section{Introduction}
Relativistic wave equations for bound systems represent a relevant,
controversial and extremely extended area of investigation in theoretical physics.
The aim of this work is to propose a three-dimensional reduction of the Dirac
and Breit equations in order
to describe in a relativistic way... |
\section{Introduction}
In the medical imaging community, challenges have become a prominent forum to benchmark the latest methodological advances for complex machine learning problems \citep{maier2018rankings}.
Across many semantic segmentation challenges \citep{menze2014multimodal,sekuboyina2020verse,bilic2019liver,ba... |
\section{Introduction}
A typical design process involves tedious trial and error procedures, wherein a designer modifies design configurations based on functional, geometric, or aesthetics requirements. From the structural or materials design in engineering applications to the shape design of everyday objects, this des... |
\section{Introduction}
In recent years, there has been a growing interest in developing and analyzing probabilistic counterparts of traditional numerical methods spanning most areas of computational mathematics. This gave rise to the field of Probabilistic Numerics (PN), whose founding principles and aims are summariz... |
\section*{\refname}}{}{}{}
\usepackage[margin=1.0in,hmarginratio=1:1,top=32mm,columnsep=15pt]{geometry}
\usepackage{color}
\definecolor{dark-gray}{gray}{0.1}
\usepackage{times}
\usepackage{microtype}
\usepackage[mathscr]{euscript}
\usepackage{amsmath}
\usepackage{amssymb}
\usepackage[Symbol]{upgreek... |
\section{INTRODUCTION}
In engineering design synthesis creativity and innovation are among designers' and engineers' most important objectives. Creativity in design has been a major topic of research; such creativity has been correlated with design and designers' success ~\cite{creativity_assessment}. Design synthesis ... |
\section{Introduction}
Geometric magnetic frustration is often explored for the unique quantum phenomena it may create, ranging from enabling superconducting states\cite{SupercondMagFrust, Supercond2} to generating a quantum spin liquid (QSL)\cite{QSLColloquium}. While superconductivity needs no introduction, we'll bri... |
\section{Introduction}
Following Lindenstrass and Tzafriri \cite{LT}, we say a Banach space $Y$ has the \emph{lifting property} (LP) if for every bounded operator $\psi$ from a Banach space $X$ onto a Banach space $W$ and for every $S\in \L(Y,W)$, there is $\hat{S} \in \L(Y,X)$ such that $S=\psi \circ \hat{S}$. We ... |
\section{Introduction}
The study of trees in tournaments has been motivated largely by Sumner's universal tournament conjecture from 1971, which states that every $(2n-2)$-vertex tournament should contain a copy of every $n$-vertex oriented tree (see, e.g.,~\cite{reid1983embedding}). In 1991, H\"aggkvist and Thomason~\... |
\section{Introduction}
The absence of shear stiffness is one of key physical-mechanical properties of equilibrium classical liquids distinguishing liquids from solids~\cite{Frenkel_book,Bol_Phys_Enciclopedy,Phys_Enc}. This property is manifested in the inability of liquids to maintain a definite volume form if there ar... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.