content
stringlengths
1
15.9M
\section{Introduction} A derivation from a Banach algebra $A$ to a Banach $A$-bimodule $X$ with the continuous module operations is a bounded linear mapping $d:A\rightarrow X$ such that $$d(ab)=d(a)b+ad(b)\ \ \ (a,b\in A).$$ For each $x\in X$ the mapping $\delta_x:a\rightarrow ax-xa$, $(a \in A)$ is a bound...
\section*{Acknowledgment} \noindent The authors would like to thank the anonymous reviewers for their comments and suggestions which helped improve this paper, as well as suggestions of potential interesting examples of Cartesian difference categories to study in the future (which we discuss in the conclusion). \s...
\section{Introduction}\label{intro} How magnetism fits into the picture of galaxy evolution over cosmic time is a subject of debate among astronomers. The link between magnetic fields and galaxy evolution is theorized \citep[e.g.][]{Lou1998} but observational constraints have been lacking, due to technical limitations...
\section{Introduction: the controversy} \label{sec:intro} Due to its cleanness, it is hard to overstate the experimental importance of the decay of the Higgs particle into two photons. It goes mainly via virtual $W$-bosons, the heavier charged particles of flavourdynamics. The amplitude of this contribution was calcul...
\section{Introduction} \label{sec:introduction} \thispagestyle{FirstPage} Supervised learning has been well-studied for tackling audio classification problems, such as acoustic scene classification~\cite{Barchiesi2015Acoustic} and environmental sound classification~\cite{Piczak2015Environmental, Piczak201...
\section{Introduction} \label{introduction} Question Answering (QA) has attracted extensive interest in the fields of Computer Vision (CV) and Natural Language Processing, such as Visual Question Answering (VQA) \citep{yu2019deep, khademi2020multimodal} in CV and Machine Reading Comprehension (MRC) \citep{nie2019reveal...
\section{Introduction} \label{sec:intro} Visual tracking plays an active role in a wide range of applications, including driverless vehicles, robotics, surveillance, human-computer interaction, surveillance, motion analysis. Recent years have witnessed significant developments in visual tracking, where an enormous amou...
\section{#1}\lb{#2}} \def\sscn#1#2{\subsection{#1}\lb{#2}} \def\begin{flushleft}{\begin{flushleft}} \def\end{flushleft}{\end{flushleft}} \def\begin{flushright}{\begin{flushright}} \def\end{flushright}{\end{flushright}} \def\begin{center}{\begin{center}} \def\end{center}{\end{center}} \def\begin{equation}{\begin{equati...
\section{Introduction} The precise shaping of the time structure of laser pulses has been the basis for time-resolved spectroscopy and ultrafast science \cite{Zewail1645,krausz2009attosecond}. Engineering the local polarization state and/or the spatial phase of the wavefront offers further opportunities for applicati...
\section{Introduction} Consider a (rigid) body, $\mathscr B$, translating with constant nonzero velocity, $v_\infty$, in a viscous (Navier-Stokes) liquid, $\mathscr L$, that occupies the whole space outside $\mathscr B$. Without loss of generality, we assume that $v_\infty$ is directed along the positive $x_1$-axis...
\section{Introduction} \noindent First identified in 1873,\cite{vdW} the van der Waals (vdW) interactions are forces that today attract more interest than ever. They are present everywhere, but their manifestations still pose challenging questions which are relevant for such varied systems as soft matter, surfaces, and...
\section*{Introduction} An Ulrich sheaf on a closed subscheme $X$ of ${\mathds {P}}^N$ of dimension $n$ and degree $d$ is a non-zero coherent sheaf ${\mathcal F}$ on $X$ satisfying ${\mathrm H}^*(X,{\mathcal F}(-j))=0$ for $1 \le j \le n$. In particular, the cohomology table $\{ h^i (X, {\mathcal F}(j)) \}$ of ${\mat...
\section{Introduction} \subsection{Background and Motivation} It has been a common concept throughout the history of mathematics to translate problems in one area of research to another area of research to solve them there. An especially fruitful example of this translating approach has been the study of {\em...
\section{DAISY-CHAIN IMPLEMENTATION IN FPGA} \label{sec:FPGA} \begin{figure}[htb!] \begin{center} \includegraphics[width=0.45\textwidth]{Figures/BlockDaisyChain.eps} \end{center} \vspace{-5mm} \caption{Block diagram of new Network Processor.} \label{fig:blockdaisychain} \end{figure} We improved the \textit{Net...
\section{Introduction} The galactic cosmic rays are believed mainly come from supernova remnants. After injected from the sources, cosmic rays propagate in the interstellar space. When cosmic rays enter the heliosphere, the interaction with the solar wind and the embedded magnetic field results in the intensity and the...
\section{Introduction} Ontology Reuse (OR) is a critical aspect for the evolution of the Semantic Web since its origins \cite{gruber1993translation,neches1991enabling,studer1998knowledge,katsumi2016ontology}. OR aims to foster semantic interoperability between data sources and facilitate data integration tasks. As a co...
\section{Introduction} In the field of modern celestial mechanics and dynamical astronomy, one of the most intriguing and important problems is the dynamics of few bodies, in particular being the case of a circularly restricted three body problem \citep{Szebehely67}. This problem has been applied in various fields in...
\section{Introduction} \label{sec:introduction} Histopathological image understanding has been revolutionized by recent machine learning advancements, especially deep learning ($\mathrm{DL}$) \cite{Bera2019,Serag2019}. $\mathrm{DL}$ has catered to increasing diagnostic throughput as well as a need for high predictive p...
\section{Introduction }\label{intro} The Cucker-Smale model \cite{CS1,CS2} is a particles system which exhibits the so-called flocking phenomenon, namely the dynamical property of alignment of all the velocities and gathering of all the positions asymptotically when the time of evolution diverges. Its study has...
\section*{\refname}} \def\section*{\refname}{\section*{\refname}} \DeclareMathOperator{\Tr}{Tr} \begin{document} \title{Glueballs in the Klebanov-Strassler Theory: Pseudoscalars vs Scalars} \author{Cornélio Rodrigues Filho}\email{<EMAIL>} \affiliation{Departamento de F\'\i sica Teorica e Experimental, Universidade Fe...
\section{Introduction \& Motivation} \label{s:intro} Due to rapid growth of mobile devices in recent years, many mobile applications have become popular, such as image recognition\cite{6648564}, virtual reality (VR)\cite{biocca2013communication}, and augmented reality (AR)\cite{azuma1997survey}, which are generally com...
\section{\label{sec:level1}Introduction} Ever since people realized that quantum computers are much more powerful than their classical counterparts\cite{Feynman1982,SHOR1994Algorithms}, researchers have been working hard on the problem for years, which has been making considerable progress and leads to a dramatic incre...
\section{Introduction} \label{sec:intro} Since the discovery of the $J/\Psi$ charmonium in 1974\cite{Aubert,Augustin}, the quarkonium production has attracted much attention experimentally and theoretically as it provides an excellent way to investigate both the perturbation and non-perturbation regimes of quantum chro...
\section{Introduction} Road casualties have been described as a global epidemic, representing the leading cause of death among young people worldwide (see, e.g. \textcite{mackay_traffic_1972, nantulya_neglected_2002}). Car crashes and other types of collisions are responsible for more than 1 million deaths each yea...
\section{Introduction} \par{\bf Code-based Cryptography.} Many cryptosystems as public-key encryption schemes \cite{M78,A11,MTSB12}, authentication protocols \cite{S93} or pseudorandom generators \cite{FS96} are built relying on the hardness of finding the closest codeword, a task called {\em decoding}. In the case ...
\section{Introduction} Due to the need for social distancing led by the COVID-19 pandemic, people and organizations have had to rely on digital technologies to stay connected and work remotely~\cite{pandey2020impact}. This has resulted in a surge in the usage of online conferencing tools. Most organizations rely on th...
\section{Introduction} \label{intro} The increasing accuracy of \textit{first-principles} calculations of heat transport, along with the growing availability of computing resources, has enabled the systematic prediction of lattice thermal conductivity in semiconductors and two-dimensional (2D) materials~\cite{lindsay2...
\section{Introduction} \label{sec:intro} Stochastic gradient methods including stochastic gradient descent (SGD)~\citep{SGD-1951} and its accelerated variants (e.g., SGD with momentum \citep{polyak1964some,sutskever2013importance}) have become the algorithmic workhorse in much of machine learning. The step-size (learn...
\section{Compression Experiments}\label{sec:EXPERIMENTS} We validate the PBA algorithm experimentally by comparing the performance of a PBA-derived fixed-rate compressor against the performance of baseline fixed-rate compressors. The code of our implementation can be found at \url{https://github.com/SourbhBh/PBA}. A...
\section{Introduction} ASR models are typically designed to assume that all input sources to the model are always available for each sample. The inputs could be acoustic data from a single audio channel, from multiple channels, or acoustic data combined with context vector embeddings from prior utterances in a conve...
\section{Introduction} Deep convolutional neural networks (DCNNs), initially inspired by the primate visual cortex architecture, have taken big strides in solving computer vision tasks in the last decade. State-of-the-art networks can learn to classify images with high accuracy from huge labeled datasets~\cite{krizhevs...
\section{Introduction} Rapid progress in text-to-speech (TTS) was initiated by autoregressive models. These models replaced traditional methods \cite{griffin1984signal, yoshimura1999simultaneous, kawahara1999restructuring, suk2011subject, lee2018high} and are typically sequence-to-sequence in an encoder-decoder framewo...
\section{Introduction}\label{S1} \IEEEPARstart{}{}Millimeter-Wave (MmWave) multiple-input multiple-output (MIMO) techniques have a high promise for next-generation wireless communication systems due to the abundance of bandwidth\cite{1,2}. The short wave-lengths of mmWave frequencies allow a large number of antennas t...
\section{Introduction} The plasma, which is termed as the fourth state of the matter, is a collection of negatively charged electrons and positively charged ions. These charged species (electrons and ions) are not free but strongly affected by the electromagnetic field of surrounding charged species and capable of exhi...
\section{Introduction} Recommender systems have become increasingly important for online marketplaces to achieve their business success. Among common recommendation tasks, Click-Through-Rate (CTR) prediction has generated significant research interest because it is a practically important business performance measure i...
\section{Introduction} It is widely known that the solar atmosphere is dominated by magnetic fields and almost all the activities taking place in the atmosphere are associated with the evolution of magnetic fields (e.g.,\citealp{tho11,wie14,van15,cai19}). Therefore, the question of the origin of magnetic fields is the...
\section{\label{sec:Intro} Introduction} Neutrinos were originally formulated, within the weak interactions of the Standard Model (SM), to be massless fermions. However, hints of massive neutrinos appeared in the second half of the 20th century with the solar neutrino problem\cite{Bahcall:2002ng}. Eventually, updated s...
\section{Introduction} \label{sec:introduction} When we visualize directed graphs (digraphs for short) that model hierarchical relations with node-link diagrams, we traditionally turn edge directions into geometric directions by letting each edge point upward. Aiming for visual clarity, we would like such an upward...
\section{Introduction} \label{sec:intro} Speech technology has rapidly proliferated and integrated deeply into our daily life \cite{akccay2020speech,10.1145/1873951.1874246,xie2019utterance,braga2019automatic,toth2018speech}. While these applications bring convenience to our life, several growing concerns have gained...
\section{\label{sec:level1}Introduction} Systems with strong spin-orbit coupling (SOC) effects have attracted significant attention in the field of spintronics, owing to their potential to generate a large spin current. However, the spin of these systems is expected to relax quickly, owing to the SOC effect \cite{Ellio...
\section{Introduction} Segmentation tasks based on remotely-sensed imagery rely heavily on the availability of good quality semantic or polygon labels to be useful \citep{wang:weaklysupervised2020, zhu:pickqualityeval2019}. Specifically, \cite{ahn:semanticaffinity2018} notes that the performance of ConvNets for seg...
\section{Conclusion} \label{sec:conclusion} In this work, we investigate the advantageous diversity of the ensemble model against adversarial attacks. By studying the robustness of ensemble DNNs and the Pearson correlation coefficient among models trained with filters, we propose the "minimum correlation coefficients...
\section{I. Introduction} One-dimensional material systems continue attracting considerable attention due to their rich physical properties, where the charge, spin, orbital, and lattice degrees of freedom are intertwinned in a reduced dimensional phase space~\cite{Yunoki:prl,Dagotto:rmp94,Grioni:JPCM,Monceau:ap}. Remar...
\section{Introduction} Recommender systems have been an important tool for online commerce platforms to assist users in filtering for the best content while shaping their interests at the same time. To achieve this objective, collaborative filtering has been among the most popular techniques and was successfully deploy...
\section{Introduction} \label{sec:intro} The slice filtration, a filtration of genuine \(G\)-spectra, was developed by Hill, Hopkins, and Ravenel in their solution to the Kervaire invariant-one problem \cite{HHR} and is a generalization of Dugger's filtration \cite{D}. It was modeled after Voevodsky's motivic slice fi...
\section{Dataset Statistics} Here we list the statistics of 7 public dataset in Table \ref{data}. \begin{table}[h] \centering \begin{tabular}{ccccc} \toprule & Nodes & Edges & Classes & Features \\ \midrule Cora & 2,708 & 5,429 & 7 & 1,433 \\ Citeseer & 3,327 & 4,732 & 6 & 3,703 \\...
\section{Introduction} The geometry of weight manifolds and functional spaces represented by artificial neural networks is an important window to ‘understanding’ machine learning. Many open questions in machine learning, when viewed through the lens of geometry, can be related to finding points or paths of equivalent ...
\subsection{Motivation} Deep learning (DL) provides efficient solutions for a number of problems that were difficult to solve with traditional computing techniques; \hbox{e.g.}\xspace, automatic driving, speech recognition and machine translation. They are widely supported by DL libraries, such as TensorFlow~\cite{Ten...
\section{Introduction} \begin{figure}[ht] \centering \begin{tabular}{p{3.65cm}<{\centering} p{3.65cm}<{\centering}} w/o FAA & w/ FAA \\ \end{tabular} \centering \begin{minipage}[h]{0.49\linewidth} \centering\includegraphics[width=.99\linewidth]{figures/figure_1_a.pdf} \end{minipage} \begin{minipage}[h]{0.49\linewidth}...
\section{\label{Introduction}Introduction} Many systems in the real world can be simplified as networks, where each node (vertex) represents an individual and an edge exists between two nodes if the two corresponding individuals interact in some way. Examples include friendships in social networks of interactions amon...
\section{Introduction} A further understanding of causality beyond observational data is critical across many domains including statistics, computer science, education, public policy, economics, and health care. Although randomized controlled trials (RCT) are usually considered as the gold standard for causal inference...
\section{Introduction}\label{sec:introduction} Image deblurring is an important problem in the field of image restoration and has attracted wide attention with a long history \cite{josa1972_richardson_bayesian_deblurring, siggraph2006_fergus_removing_shake, tip1998_chan1998_tv_deblur}. The goal of deblurring is to rec...
\section{Introduction} In this paper, we study the stochastic reaction-diffusion equation on the whole line $ {\mathbb R}$ driven by multiplicative space-time white noise given as follows: \begin{numcases}{} \mathrm{d}u(t,x) = \frac{1}{2}\Delta u(t,x) \,\mathrm{d}t+ b(u(t,x)) \,\mathrm{d}t \nonumber\\ ~~~~~~~~~~~~~ ...
\section{\textcolor{PREPRINTCOL}{#1}}} \def\ssec#1{\subsection{\textcolor{PREPRINTCOL}{#1}}} \def\sssec#1{\subsubsection{\textcolor{PREPRINTCOL}{#1}}} \def\usec#1{\section*{\textcolor{PREPRINTCOL}{#1}}} \def\shd#1{{\bf \color{PREPRINTCOL}#1}} \begin{document} \preprint{Redd and Cancio, preprint 2020} \title{ Asymp...
\section{Introduction} Haze is a common atmospheric phenomenon that not only has a serious adverse effect on human visual perception, but also has a serious impact on the performance of modern computer vision systems for various visual tasks, such as image classification, object detection and video surveillance. Since ...
\section{Introduction} In the early universe, primordial curvature perturbations can generate overdense regions. The gravitational collapse of the overdense areas may form primordial black holes (PBHs) after the horizon re-entry \cite{Hawking:1971,Carr:1974}. In contrast to the stellar black holes (BHs), PBHs have a br...
\section{Introduction} \label{intro} \begin{figure}[!htb] \centering \adjincludegraphics[Clip=0 0 0 {0.404\height}, width=0.8\linewidth]{images/detector.jpg} \caption{The central detector of JUNO. An acrylic sphere with a diameter of 35.4 meters filled with 20 kt of liquid scintillator. The detector contains \num{1...
\section{Introduction} \label{sec-intro} Recently, transformer models have been introduced into the field of computer vision and achieved high performance in many tasks such as object recognition~\cite{dosovitskiy2020image}, image process~\cite{chen2020pre}, and video analysis~\cite{kim2018spatio}. Compared with the...
\section{Introduction}\label{1} Topological insulators are band insulators with topologically protected boundary states and insulating bulk states~\cite{Moore2010,Hasan2010,Qi2011,Shen2012,Wang2017,Qin2020,Chen2021prl,Chen2021prr}. A well-known topological insulator paradigm is the quantum Hall insulator (QHI) phase~\...
\section{Introduction} Efficient numerical methods for electromagnetic wave propagation are central to a wide range of applications in science and technology \cite{assous_ciarlet_labrunie_2018a,griffiths_1999a}. For wave phenomena with harmonic time dependence, governed by a single angular frequency $\omega > 0$, the...
\section{Introduction} \label{introduction} \begin{figure} \begin{center} \includegraphics[width=1\linewidth]{graph/results-style-illustration1.pdf}\\ \end{center} \caption{Illustration of our motivation. If we want to put a police car into these images with different visual \emph{style} , we must ensure that...
\section{Introduction} \label{sec-intro} Magnetic reconnection is an important plasma physical process because it can rapidly convert magnetic energy to particle kinetic energy; it does so by rearranging the magnetic field configuration, ``breaking'' and subsequently ``reconnecting'' magnetic field lines \citep[for a ...
\section{Introduction} \label{sec:intro} Near term quantum devices have a small number of noisy qubits that can support execution of shallow depth circuits (i.e., those with few operational cycles) only. Variational Quantum Algorithms (VQA) aim to leverage the power as well as the limitations imposed by these devices ...
\subsection{Motion Planning Transformer (MPT)} \begin{figure}[t] \centering \includegraphics[width=\textwidth]{figs/transformer_fig5} \caption{Overview of MPT Module. (Start from the top left and move clockwise) The input map, and the start and goal encoded map are concatenated together and passed thr...
\section{Introduction} Network data, consisting of nodes (objects) and edges (objects' relationships), is ubiquitous in many real-world problems, such as social networks, protein-protein interaction networks, citation networks and so on. Recently, network embedding \cite{cai_comprehensive_2017,wu_comprehensive_2019,che...
\section{Introduction} Experimental control and data acquisition systems are widespread in many fields of scientific and industrial research where test and measurement systems need to be controlled and experimental data have to be gathered. For the application of controlling experiments in the field of atomic, molecul...
\section*{Introduction} This paper is the second, after \cite{dkss:1}, part of our project devoted to a systematic development of the theory of perverse schobers which are (enhanced, triangulated) categorical analogs of perverse sheaves, see \cite {kapranov-schechtman:schobers} for a general discussion. It can be rea...
\section{#1} \vspace{0mm}} \newcommand{\SubSection}[1]{\vspace{0mm} \subsection{#1} \vspace{-1mm}} \newcommand{\SubSubSection}[1]{\vspace{-1mm} \subsubsection{#1} \vspace{-1mm}} \newcommand{\Paragraph}[1]{\vspace{1.25mm}\noindent\textbf{#1.}\hspace{0.5mm}} \newcommand{{\color{green}\checkmark}}{{\color{green}\checkmark...
\section{Introduction}\label{sec1} On March 3 2021, LHC announced that 59 new hadrons were reported over the past decade \cite{LHCb59:2021}. The present situation of hadronic states is far beyond what Gell-Mann and Zweig thought possible \cite{GellMann:1964nj,Zweig:1981pd,Zweig:1964jf}. Among these observed states, th...
\section{Introduction} Triangle counting is a fundamental problem in network analysis. There has been a rich line of work on counting triangles in graphs~\cite{itai1978finding,alon1997finding,latapy2008main,seshadhri2013triadic,al2018triangle}. The triangle counts appear in form of different parameters such as \emph{cl...
\section{Introduction} Multi-agent systems (MASs) have received considerable attention in recent years, and they have been applied in a wide variety of areas, such as automotive control system \cite{Pham2019b}, unmanned aerial vehicles \cite{Pham2020c}, sensor network \cite{Pham2020d}, etc. Besides, MASs are vulnerable...
\section{Exponential weight mixing}\label{sec: exp weights} \begin{proof}[Proof of Theorem~\ref{thm:exp weights}] From \eqref{eq:exp weights}, we have \begin{eqnarray*} \pi_r&\propto&\exp\left(-\sum_{(i,j)\in\Omega} \left(A_{ij}-\hat{P}^{(r)}_{ij}\right)^2\right)\\ &\propto&\exp\left(-\sum_{(i,j)\in\Omega} \left(A_{...
\section{Introduction} \label{sec:intro} \input{introduction} \section{DP Preliminaries} \label{sec:prelims} \input{prelims} \section{Privacy Loss Random Variables (PRVs)} \label{sec:PRV} \input{PRV} \section{Numerical composition of privacy curves} \label{sec:numerical_composition} \...
\section{Experiment Details} \subsection{VQ-VAE Architecture} For our image compression experiments, we used a convolutional VQ-VAE architecture similar to the one used in \citep{ramesh2021zero} with residual connections. Both the input and the side information to this network have the shape $128 \times 256$ (i.e. v...
\section{Introduction} \begin{figure}[t] \centering \subfigure{\includegraphics[width=1.0\linewidth]{figures/figure_1.pdf}} \vspace{-2mm} \caption{ Illustration of our proposed semi-supervised domain adaptive semantic segmentation (SSDAS): With a few labeled target samples as anchors, SSDAS achieves semi-supervised dom...
\section{Introduction} { Understanding the evolution of a system in response to stimuli is {\em the} central problem in many areas. The Machine Learning (ML) approach to this problem has been to learn a collection of latent variables and construct a dynamical model of the system directly from observational data. Wh...
\section{Introduction} In recent years, advances in machine learning and improvements in computer performance have made it possible to make highly accurate predictions for a variety of tasks. However, there is generally a trade-off between prediction accuracy and interpretability, and methods that have high prediction ...
\section{Introduction}\label{sec:intro} The \textit{multi-armed bandit (MAB)} problem is a classical sequential decision-making problem in which an agent tries to maximize a cumulative stochastic reward~\cite{thompson1933likelihood, robbins1952some} under uncertainty. This problem, which is applicable to various areas ...
\section{Introduction} \label{sec:intro} A huge experimental programme on accelerator-based neutrino oscillation experiments has been developed in recent years with the scope of improving our knowledge of neutrino properties and of potentially answering one of the fundamental open questions of modern physics, that is ...
\section{Introduction and definitions} In 2017 \cite{klaassen} a definition of spiral tilings was given, thereby answering a question posed by Gr\"unbaum and Shephard in the late 1970s. The author had the pleasure to discuss the topic via e-mail with Branko Gr\"unbaum in his 87th year. During this correspondence th...
\section{Introduction} Motivated by the model uncertainty in finance, Peng \cite{Peng2005, P07a, P08a} established the theory of $G$-expectation which is a consistent sublinear expectation and does not require a probability space. The representation of $G$-expectation as the supremum of expectations over a set o...
\section{Introduction} Drug discovery is the process of using multi-disciplinary knowledge such as biology, chemistry and pharmacology to discover proficient medications amongst candidates according to safety and efficacy requirements. Modern drug discovery often features a cost-ineffective virtual screening process to...
\section{Introduction} "Spooky action at the distance" between particles was firstly noted in the famous Einstein-Podolsky-Rosen (EPR) argument against the completeness of the Copenhagen interpretation of quantum mechanics~\cite{PhysRev.47.777}. In response to the EPR work, Schrödinger described a peculiar phenomenon, ...
\section{Introduction} Machine learning~(ML) techniques are being adapted in an increasingly large variety of scientific and engineering disciplines. The field of computational fluid dynamics may be particularly suitable, with various ML applications possible. The fluid dynamical simulations play an important role in...
\section{Introduction} Let $M$ be a differentiable manifold. An {\it almost complex structure} on $M$ is an endomorphism $f$ of the tangent bundle $TM$ such that $f^2+I=0$, where $I$ denotes the identity endomorphism. It is easy to see that in order to support an almost complex structure, $M$ has to be even-dimensional...
\section{Missing Proofs} \label{app:proofs} We provide the complete proofs of the theorems stated in the main paper. We defer the proofs of the technical results to \cref{app:tech}. \subsection{Proof of \cref{th:performance decomposition}} \PerformanceDecomposition* First we prove the equality using a new p...
\section{Introduction} Task-oriented dialogue (ToD) systems are designed to assist humans in performing daily activities, such as ticket booking, travel planning, and online shopping. These systems are the core modules of virtual assistants (e.g., Apple Siri and Amazon Alexa), and they provide natural language interfac...
\section{Introduction} \label{sec:intro} With the rapid rise in user-generated web content, the scale and complexity of online hate have reached unprecedented levels in recent years. ADL (Anti-Defamation League) conducted a nationally representative survey of Americans in December 2018 and the report shows that over h...
\section{Introduction} Roughly speaking, the Carath\'eodory's procedure in constructing the Lebesgue measure in $\mathbb{R}$ is the following: first, it is built a outer measure on $\mathbb{R}$ from the length of the closed intervals of $\mathbb{R}$. Once the outer measure is constructed, the next step is to define ...
\subsection{Notations} Let the set of users and items be denoted as $\mathcal{U}=\{u_1, u_2,...,u_n\}$ and $\mathcal{I}=\{ i_1, i_2,...,i_m \}$, where $n$ is the number of users and $m$ is the number of items. Let $\textbf{R} \in \{0,1\}^{n \times m}$ be the user-item interaction matrix, where $r_{ui}=1$ if the use...
\section{Introduction} For a knot $K\subset S^3$ and a slope $\frac pq\in\mathbb Q\cup\{\infty\}$, let $S^3_{p/q}(K)$ be the manifold obtained by the $\frac pq$--surgery on $K$. A slope $\frac pq$ is said to be {\it characterizing} for a given knot $K_0\subset S^3$ if whenever $S^3_{p/q}(K)\cong S^3_{p/q}(K_0)$ for ...
\section{Introduction} Topological string amplitude is the generating function of Gromov-Witten invariants which are usually rational numbers according to their definitions \cite{HKKPTVVZ}. In 1998, Gopakumar and Vafa \cite{GV0,GV1} found that topological string amplitude is also the generating function of a serie...
\section{Introduction} Cohomological Hall algebra of a quiver (with potential) was introduced by Kontesivech and Soibelman in \cite{KS}, which became a central tool in the study of quantized Donaldson-Thomas invariants. The underlying space of the cohomological Hall algebra of a finite quiver is the equivariant cohom...
\section{Introduction}\label{sec:intro} Given a kernel $K$, domain $\mathcal{X} \subset \mathbb{R}^d$, and accuracy $\varepsilon > 0$, the low-rank approximation problem is to find a kernel $K_r$ of rank $r$, for $r$ as small as possible, satisfying \[ \sup_{x,y \in \mathcal{X}} \abs{K(x,y) - K_r(x,y)} \leq \varep...
\section{Nearly-Properly Learning GMMs: Full Version}\label{sec:GMM-full} In this section, we complete the proof of our main result for learning GMMs, Theorem \ref{thm:main-gmm}. The high-level outline of the proof is similar to the proof of Theorem \ref{thm:fourier-main}, We localize the distribution by multiplyin...
\section{Introduction} Many real-world problems involve the cooperation of multiple agents, such as unmanned aerial vehicles~\citep{pham2018cooperative, zhao2018multi} and sensor networks~\citep{stranders2009decentralised}. Like in single-agent settings, learning control policies for multi-agent teams largely relies on...
\section{Introduction} \label{intro} Cluster analysis seeks to partition data into distinct subsets, or clusters, such that observations in the same cluster are more similar than observations from different clusters. There are numerous methods for cluster analysis with applications in many fields \citep{dubes1976, jai...
\section{Introduction} \IEEEPARstart{C}oNFIDENCE-based motion planning~\cite{nakka2019nsoc,blackmore2010probabilistic,blackmore2011chance,toit2012robot} and control algorithms~\cite{tsukamoto2020,zhu2019chance}, that incorporate uncertainties in the dynamic model and environment to guarantee safety and performance with...
\section{Introduction} Analysis and control of the multi-agent system (MASs) have attracted the interest of many researchers in the control community. The MASs is generally referred to as a system composed of a set of dynamical agents that interact through a communication network to reach a coordinated behavior or oper...
\section{Introduction} \label{sec:intro} The expected presence of physics beyond the Standard Model (BSM) is motivated by the observation of non-vanishing neutrino masses, the overwhelming evidence for dark matter (DM), and the need for an effective mechanism to explain the baryon asymmetry; in addition, theoretical ...