content stringlengths 1 15.9M |
|---|
\section{Introduction}\label{sect: intro}
The discovery that a black hole behaves as a thermal object has led to a clue in linking general relativity, thermodynamics, and quantum field theory~\cite{Hawking:1974sw,Bekenstein:1973ur,Bardeen:1973gs}. Rooted from the idea that the Hawking radiation process has a quantum or... |
\section{Introduction}
\IEEEPARstart{T}{his} demo file is intended to serve as a ``starter file''
for IEEE journal papers produced under \LaTeX\ using
IEEEtran.cls version 1.8b and later.
I wish you the best of success.
\hfill mds
\hfill August 26, 2015
\subsection{Subsection Heading Here}
Subsection text here.
\... |
\section{Introduction}
Organization of the medical data is always a challenging task for betterment of modern healthcare system. It is evident that mostly the medical data is exclusive only for the healthcare organizations which is only practised by elite hospitals. Following this, the idea of the proposed platform is ... |
\section{Introduction}
\label{sec:intro}
Both sugar maple (\emph{Acer saccharum}) and red maple (\emph{Acer
rubrum}) have a remarkable ability to generate positive xylem (or
sapwood) pressure
in response to freeze--thaw cycles, during a season when the tree is
leafless and mostly dormant. The resulting exudation p... |
\section{Introduction}
\label{sec:intro}
Traffic-related issues are constantly increasing, and tomorrow's cities cannot be considered intelligent if they do not enable smart mobility. Smart mobility applications, such as smart parking and road traffic management, are nowadays widely employed worldwide, making our citie... |
\section{Introduction}
Understanding phases of matter and realizing transitions between them have been a central theme in quantum many-body physics~\cite{Yang54, Cooper56, Higgs1964}. Quantum phases of matter are a macroscopic property, which reflects the underlying microscopic structure of the system~\cite{landau19... |
\section{INTRODUCTION}
Gyrokinetics is the theoretical framework to study {micro}turbulence in magnetized plasmas. It takes advantage of scale separation between {turbulent fluctuations} and background quantities (such as magnetic geometry and plasma profiles), and provides a reduction of phase-space dimensionalit... |
\section{Introduction}
Multi-armed bandit (MAB) algorithms are designed to identify the best arm among multiple arms without prior knowledge of type of arm distribution and their statistics \cite{Book12_RegretAnalysis_Bubeck,mab2,mab3,mab1,TAC1987_AsyptoticallyEfficient_AnantharamWalrand}. They achieve this by optimiz... |
\section{Method}
\label{sec:method}
We present a two-step approach to leverage the structural information from the auxiliary information and then integrate this structural information into the self-supervised learning process. The first step (Section~\ref{subsec:cluster_construct}) clusters data according to a... |
\section{Introduction}
Minimal free resolutions of ideals in the coordinate ring of a toric variety are well-studied in commutative algebra and algebraic geometry as a method of obtaining information about the corresponding subvariety. It has been observed, however, that minimal free resolutions can be longer than ne... |
\section{abstract}
This short paper addresses quasi synchronization
of heterogeneous complex dynamical networks. The similarity and difference between synchronization of homogeneous systems and quasi synchronization
of heterogeneous complex dynamical networks will be revealed.
Key words Quasi synchronization, com... |
\section{Introduction}
\label{intro}
Coronal mass ejections (CMEs) are large eruptions of magnetized plasma from the Sun into the heliosphere, and the key agent of geomagnetic storms. It is very likely that most CMEs contain magnetic flux ropes (MFRs; e.g., \citealt{Chen2017}), at least for a substantial period of th... |
\section{Introduction}
Two of the most convincing pieces of evidence for the existence of supermassive black holes are also based on two unique methods for measuring black hole mass ($\Mbh$\xspace). The most robust black hole mass measurement is that based on proper motion studies of stars in the Galactic Center around... |
\section{Introduction}
The purpose of this paper is to highlight four levels of fixed-points in mean-field interacting particle systems, and to discuss the relationships among them. No new result is established. However, the unified perspective and the insights from the connections between the fixed-points are worthy ... |
\section{Introduction} \label{sec:intro}
Data hiding \cite{SurveyDH} is the art of hiding secret data within a cover image or other multimedia signals imperceptibly
and has gained popularity in applications such as secret communication \cite{Stegastamp,VideoSte,LFM}, copy-right protection \cite{DMIP}, and content authe... |
\section{Proof of Theorem 1}
\begin{theorem}{1}
Let $X \to Y$ be the causal direction following the data generation mechanism $X=N_X,Y = \alpha X + N_Y$. The least-square loss will fail to identify the correct causal direction if the causal strength $\alpha$, the noise variances $\sigma_{N_X}^{2}$ and $\sigma_... |
\section{Introduction}
Despite the remarkable progress we have witnessed in neural-network-based machine learning, the stories of failures continue to accumulate \cite{geirhos2020shortcut}. Many of these failures are attributed to models exploiting spurious correlations or shortcuts (i.e. factors that are not used t... |
\section{Introduction}
\vspace{-0.5em}
Two-player zero-sum games have been a central interest of the recent development of multi-agent reinforcement learning (MARL) \cite{yang2020overview,baker2019emergent,vinyals2019grandmaster}.
In solving such games, a MARL agent has a clear objective: to minimise the worst cas... |
\section{Introduction}\label{sec:intro}
Deep convolutional neural networks (CNNs) have achieved remarkable success in various computer vision tasks, under the development of algorithms~\cite{resnet,fasterrcnn,xu2021renas}, computation power, and large-scale datasets~\cite{imagenet,coco}. However, the outstanding perfor... |
\section{INTRODUCTION}
\label{sec: Introduction}
Cepheids are intermediate to high-mass stars ($\sim$3--13\,M$_{\odot}$) which undergo core helium-burning phase. They are amongst the most important class of intrinsic variable stars in the local universe. Cepheids exhibit pulsations of period roughly in the range 1--... |
\section{Background}
The majorization-minimization (MM) principle for constructing optimization algorithms \citep{BeckerYangLange97MM,Lange00OptTrans,hunter2004tutorial} finds broad range of applications in
\begin{itemize}
\item statistics: multidimensional scaling \citep{BorgGroenen2005modern}, quantile regression \c... |
\section{Proof of Lemma \ref{lem:tau-decomposition}} \label{sec:proof-of-first-order-lemma}
We begin by stating the first order optimality conditions for \cref{eq:convex-program}:
\begin{subequations}\label{eq:convex-conditions-mdim}
\begin{align}\label{eq:convex-condition-tau-mdim}
\inner{Z_l}{O - \hat M - \sum_{m=1}^... |
\section{Introduction}
Object detection has been an important computer vision task for over 20 years \cite{zou2019object}. In recent years, with the growing demand for public security, the detection of ships has become an important task in both military and civilian fields \cite{shao2018seaships}, including sea contr... |
\section{Introduction}
\label{Sec:Intro}
\subsection{Introduction and background}
\label{SubSec:Background}
\emph{Branching random walk (BRW)} was introduced by Hammersley \cite{Hamm74} in the early '70s. Over the last five decades, it has received a lot of attention from various researchers in probability theory... |
\section{Introduction}
Randomized algorithms are designed under the assumption that randomness used within the algorithms is uniformly distributed. However, random sources in nature are often not necessarily uniform (aka weak). Thus, it is important to understand how to extract uniform randomness from weak-sources. Ext... |
\section{Introduction}
A transcendental meromorphic map $f:\mathbb{C} \rightarrow \widehat{\mathbb{C}}$ with a single essential singularity is called general meromorphic if it has at least two poles or exactly one pole that is not an omitted value. We choose the essential singularity to be at $\infty$. The Fatou set,... |
\section{Introduction}
\IEEEPARstart{U}{ltrasound} Computed Tomography (USCT) is an imaging technique that utilizes tomographic principles to obtain quantitative estimates of acoustic properties such as speed-of-sound (SOS), density, and acoustic attenuation (AA) \cite{pratt2007sound,wang2015waveform,schreiman1984ultr... |
\section{Introduction}
\begin{figure}
\begin{center}
\includegraphics[scale=0.19]{ft_and_pt_distil.png}
\caption{Previous works (left) typically focus on combining \emph{fine-tuned} models derived from a single pre-trained model using distillation. We propose \textsc{MergeDistill}{} to combine \emph{pre-trained} teac... |
\section{Introduction}
The live streaming industry has been burgeoning around the world in recent years. This includes live streaming games which, in turn, encompasses content like esports (e.g., League of Legends, Dota2, CS:GO, Apex Legends), sports games (e.g., football, tennis), and other games like chess, poker,... |
\section{Introduction}
Demand for superior predictions of scientific and engineering problems is ever increasing. Improvement of available computational resources and both development and application of numerical methodologies work synergistically to meet the aforementioned demand. In particular, numerical schemes a... |
\section{\@startsection {section}{1}{\z@}{-3.5ex plus -1ex minus
-.2ex}{2.3ex plus .2ex}{\large\bf}}
\makeatother
\def\begin{equation}{\begin{equation}}
\def\end{equation}{\end{equation}}
\def\partial{\partial}
\def\displaystyle{\displaystyle}
\begin{document}
\thispagestyle{empty}
\title[Qualitative properties f... |
\section{Introduction}
One of the most distinctive aspects of human communication is that it goes beyond vocal production --- humans have devised many ways to make their ideas both visible and durable.
From etchings on cave walls to modern digital displays, some of the most significant inventions in human history inc... |
\section{Introduction}
In recent years, Convolutional Neural Networks (CNNs)~\cite{Ref:LeCunBDHHHJ89,Ref:Krizhevsky12,Ref:SimonyanZ14a} have become the dominant models for vision recognition tasks, such as image classification, thanks to their powerful representation learning ability and outstanding performance. Howev... |
\section{Introduction}\label{sec:intro}
Reinforcement learning (RL) has achieved tremendous successes recently in a wide range of applications, including playing the game of Go \citep{silver2017mastering2}, playing video games (e.g., Atari \citep{mnih2015human} and Starcraft \citep{vinyals2019grandmaster}), robotics ... |
\section{Introduction}
An intuitive definition of the discrete Frechet metric between closed curves involves two frogs connected with a string.
Suppose that there are two cycles of $m$ and $n$ stones respectively.
The frogs may pick a starting stone (each frog from its respective cycle of stones).
Then, at each moment... |
\section{Introduction}
The COVID-19 pandemic sparked a proliferation of “exposure notification” or “contact tracing” smartphone apps designed to alert users if they came within close proximity of an individual infected with COVID-19 \cite{NHS-App-Impact-Paper, TraceTogether-App-Site, CA-Notify-App-Site, COVID-Watch-Ar... |
\section{Introduction}
Internet-of-Things (IoT) devices are envisioned to account for 50 percent (14.7 billion) of the global connected devices by 2023, among which nearly one third is expected to be wireless IoT devices \cite{Cisco2023}. In order to accommodate spectrum utilization for such ubiquitous but massive IoT... |
\section{Introduction}
In this paper we consider following two Cauchy problems for massless honeycomb lattice power type Dirac equations($\ell=1$) and Hartree type Dirac equations$(\ell=2)$:
\begin{eqnarray}\label{maineq}
\left\{ \begin{array}{c}
(\partial_t + \al\cdot D ) \psi = -i\kappa \mathcal N_\ell(\psi,... |
\section{Introduction}
The term 'Neural Combinatorial Optimization' proposed by \cite{bello} et al. is a framework to tackle combinatorial optimization problems using neural networks and reinforcement learning. This framework solves Traveling Salesman Problem (TSP) with up to 100 customer nodes on a Euclidean graph whi... |
\section{Introduction}
\label{section:introduction}
Attentional mechanisms are a central component in many deep architectures~\citep{bahdanau2014neural, luong-etal-2015-effective}, which allow a model to selectively focus on specific information in the context. Transformer \citep{DBLP:journals/corr/VaswaniSPUJGKP17} a... |
\section{Introduction and statement of main results}
A {\em Kepler orbit} is a plane conic -- ellipse, parabola or hyperbola --
with a focus at the origin (in case of a hyperbola only the branch bending around the origin is taken).
Kepler orbits form a 3-parameter family of plane curves, traced by the motion... |
\section{Introduction}\label{sec:intro}
Somewhat surprisingly, learning in a Markov Decision Process is most often considered under the performance criteria of \emph{consistency} or \emph{regret minimization} (see e.g.~\cite{Sutton1998,csaba10,torCsaba2020} and references therein). Regret minimization (see e.g.~\cite... |
\section{Introduction}
\makeatletter
Sensitive information sharing is a challenging problem in information systems. It is often handled by obfuscating the available information before sharing it with other parties. In \cite{makhdoumi2014information}, this problem has been formalized as the \textbf{privacy funnel (PF)} ... |
\section{Introduction}
}
Throughout the paper we assume that $d$ is a positive integer, which is not a perfect square. Every real number $\alpha$ has a continued fraction expansion of the form:
$$
\alpha=a_0+\cfrac{1}{a_1+\cfrac{1}{a_2+\cfrac{1}{a_3+\cdots}}}
$$
for some non-negative integers $a_1,a_2, \ldots$. W... |
\section{Introduction}
\input{sections/intro}
\section{Related Work}
\input{sections/relate}
\section{Methodology}
\input{sections/method}
\subsection{Theoretical Analysis}
\input{sections/theory}
\section{Experiments}
\input{sections/exp}
\section{Conclusion \& Limitation}
\input{sections/conc}
\vspace{-3mm}
\ne... |
\section{#1}\setcounter{equation}{0}}
\renewcommand{\qed}{\hbox{\rule[-2pt]{3pt}{6pt}}}
\newcommand{\newsection}[1]{\setcounter{equation}{0}\setcounter{theorem}{0}
\section{#1}}
\renewcommand{\theequation}{\thesection.\arabic{equation}}
\renewcommand{ |
\section{Appendix}
\subsection{Models}
\begin{itemize}
\item \bert: Off the shelf "bert-base-uncased" from the huggingface transformers library \cite{Wolf2019HuggingFacesTS}
\item \qasquad: Both SQuAD QA models are trained with the huggingface question answering training script \footnote{ ht... |
\section{Introduction}
Let $G=(V,E)$ be a simple graph of order $n+1$ and size $m \geq n$. Consider an injective labeling $\gamma:V\to\{0,\dots,m\}$ of its vertices and assign to each edge $e=uv$ the number $\gamma'(e)=|\gamma(u)-\gamma(v)|$. If every edge is assigned to a different number, we say that $\gamma$ is a {... |
\section{Introduction}
Let $(M,g)$ be an $n$-dimensional connected and
complete Riemannian manifold endowed with the Levi-Civita connection $\nabla$. Let $\Delta$ denote the Laplace-Beltrami operator, and
let $p(t,x,y)$ denote its heat kernel, by which we mean the minimal positive fundamental solution to the equa... |
\section{Introduction}
Image based computational pathology has developed into an ever-evolving field for computer vision researchers. New methods are being introduced frequently in this field for natural everyday scenes, face recognition, video analysis and other forms of biometrics. Despite that, the rate of developme... |
\section{Additional Results}
\subsection{Additional Correlation Results}
\label{appendix:corr}
Table \ref{tab:corr_with_pvalues} shows Spearman rank correlation scores with p-values.
\begin{table*}[t]
\centering
\small
\begin{tabular}{@{}l||c|c|c||c|c|c@{}}
\multicolumn{7}{c}{Spearman Rank Correlation (p-value... |
\section{Introduction}
Generative modeling can be thought of as inverting an inference process.
If the inference process is invertible, then one can focus on transforming the data into a tractable distribution \citep{dinh2016density}.
If the inference process is deterministic yet non-invertible, one could learn to inv... |
\section{Introduction}
\setcounter{equation}{0}
This note originates looking into the recent and very interesting paper by M. Goldman and F. Otto \cite{2020-goldman-otto-variational} containing a new proof of the regularity of optimal maps for the Monge problem when the cost is quadratic.
Our intention has been to inv... |
\subsection{Garbling scheme and properties}
\label{app:gcproperties}
As per Yao's garbling circuit paradigm~\cite{FOCS:Yao82b}, every wire in the circuit is assigned two $\kappa$-bit strings, called ``keys'', one each for bit value $0$ and $1$ on that wire. Let $(\key{\vl{x}}{0},\key{\vl{x}}{1})$ denote the zero-key a... |
\section*{Introduction}
This paper is motivated by the problem of evaluation and control of the quality of three-phase electric power, which can be represented by a triangle in the Euclidean plane. The vertices of this triangle correspond to the three phases of the electric power, and the lengths of sides of the tri... |
\section{Introduction}
With the commercialization of the fifth-generation (5G) wireless networks, the sixth generation (6G) wireless communication technology has recently attracted increasing attention by industry and academia \cite{9003618}. \textcolor{blue}{The reconfigurable intelligent surface (R... |
\section{Introduction}
\label{sec:intro}
Over the past ten years, notable improvements in multiple-input multiple-output (MIMO) technology for wireless communications systems have been achieved. The main advantage of MIMO is that it increases the overall throughput of the system without needing additional bandwidth. F... |
\section{Introduction}
Topological systems promise to be materials with various implementations \cite{Hasan2010, Xiao2011}; in condensed matter physics. These materials gained interest in recent years due to their peculiar properties like efficient transport in electronic hetero-structures \cite{HANG2021}, high therma... |
\section*{Introduction}
Diabetic retinopathy (DR), a frequent complication of diabetes, remains the leading cause of new cases of blindness, among working-age adults in the United States\cite{CDC}, and it is expected to affect approximately 14.6 million people in United States by the year 2050\cite{NIHwebpage}. DR resu... |
\section{Introduction}
Let $(X,Y)$ be a bivariate normal random vector with zero mean vector, variances $(\sigma_X^2,\sigma_Y^2)$ and correlation coefficient $\rho$. The distribution of the product $Z=XY$ arises in numerous applications, with recent examples including statistics of Lagrangian power in two-dimensional ... |
\section{Introduction}
Suicide has been identified as one of the leading causes of deaths and approximately $1.5\%$ of people die by suicide every year \cite{worldsuicide,fazel2020suicide}. Despite years of clinical research on suicide, researoners have concluded that suicide cannot be predicted using the standard cli... |
\section{Experimental setup}
\label{appendix: experiment}
This section provides the experimental setup details of Section 3 in the main text, including hyper-parameters, optimizers, code snippets, total amount of computational resource, as well as more experimental results.
Code, data, and instructions needed to repr... |
\section{Introduction}\label{sec:model}
Manipulation of heat at the nanoscale, particularly thermal rectification by heat diodes, is currently a subject of intense theoretical~\cite{PhysRevLett.88.094302, classical1, PhysRevLett.93.184301, spin_boson_thermal_rectifier, PhysRevB.74.214305, Scheibner_2008, PhysRevLett... |
\section{Introduction}
Many systems change involving slow and fast components in the natural world. For instance, dynamics of chemical reaction networks often take place on notably different times
scales, from the order of nanoseconds ($10^{-9}$ s) to the order of several days; When you are looking at the interaction ... |
\section{Introduction}
Though deep neural networks (DNNs)~\cite{simonyan2014very,he2016deep} have revolutionized various computer vision tasks~\cite{chen2017deeplab,ren2015faster, simonyan2014very,he2016deep}, they often generalize poorly to new domains due to \textit{domain gaps}. Unsupervised domain adaptation (UDA) ... |
\section{Introduction}
Secure Multi-Party Computation (MPC) is a powerful tool for achieving Privacy-Preserving Machine Learning (PPML). For example, instantiating PPML based on Secure Multi-Party Computation \cite{CDN2015} enables multiple parties to work together to train an ML model over their combined data, without... |
\section{Introduction}\label{sec:introduction}}
\IEEEPARstart{O}{ver} the past a few years, convolutional neural networks (CNNs), invented by LeCun {\it et al.} three decades ago \cite{lecun1989backpropagation}, have achieved great success in solving many computer vision problems. Without using handcrafted features, a... |
\section{Introduction}
\label{submission}
Lossy compression is a fundamental problem in modern digital world for efficient transmission and storage of image, video and audio data. Recently, due in part to the roaring success of deep learning, the research of deep neural networks (DNNs) based compression has attracted ... |
\section{Introduction}
Modern problems of interest involve big data generated from social \cite{freeman2000visualizing}, citation \cite{zhang2018name}, biological \cite{fout2017protein} and physical networks \cite{liang2014wireless}, which can be modeled as graph signals. Analyzing graph signals requires information p... |
\chapter*{Requirements for this Document}
Candidates shall submit a dissertation of not more than 30,000 words, plus not more than 30
pages of diagrams, tables, listing etc., and (where applicable) the source code, on a subject
selected by the candidate in consultation with the supervisor and approved by the direc... |
\subsubsection*{References}}
\usepackage{mathtools}
\usepackage{booktabs}
\usepackage{tikz}
\title{Improving Approximate Optimal Transport Distances using Quantization}
\author[1, 2]{\href{mailto:<EMAIL>}{Gaspard Beugnot \thanks{This work was conducted in large part during an internship at MIT.}}{}}
\author[1]{\h... |
\section{Introduction}
The issue that this paper addresses arises at the end of \cite[Section 1]{D4} where the author asserts that the compositum of all $D_4$ extensions of $\mathbb Q$, called $F$ in that paper and $\mathbb Q_{D_4}$ here, and the compositum of all generalized $D_4$ extensions of $\mathbb Q$, see \cite... |
\section{Introduction}
The vast-majority of input techniques for mobile devices demands the use of hands as an input source, which may constraints user experiences. For example, it would be inconvenient for a user to interact with a smartwatch to reject a phone call while both hands are occupied (e.g. carrying objects... |
\section{Introduction and Motivation}
Storytelling is central to human communication. People use stories to communicate effectively with one another. As humans, we engage with well-told stories and comprehend more information from stories \cite{suzuki_dialogues_2018}. However, when it comes to automatic storytelling, ... |
\section{Introduction}
\newcommand{\xhdr}[1]{\paragraph{\bf {#1}}}
Random graphs have long played a central role in the area of
network analysis, and one of their crucial uses has been as
{\em null models}: a way of producing families of synthetic
graphs that match observed network data on specific basic properties.... |
\section{Introduction}
\label{intro}
\textit{Cloud computing} is inexorably becoming the technology of choice among big and small businesses to deploy and manage their IT infrastructures and applications \cite{wang2016spatial}. Infrastructure-as-a-Service (\textit{IaaS}) is a key cloud service delivery model. Lar... |
\section{Introduction}
In 1983, Weinstein~\cite{Weinstein1983} proved a fundamental fact about Poisson brackets, nowadays known as his ``splitting theorem'': if $p$ is a point in a Poisson manifold $\mathsf{X}$ at which the matrix of the Poisson bracket has rank $2k$, then $p$ has a neighbourhood that decomposes as a... |
\section{Introduction}
We study \emph{structured} matrix pencils of the form~$s[E,0] - [A,B]$ with $E,A\in\mb{R}^{\ell\times n}$ and $B\in\mb{R}^{\ell\times m}$ for which we write $[E,A,B]\in \Sigma_{\ell,n,m}$. Such pencils are typically associated with differential-algebraic control systems of the form
\begin{equati... |
\section{Introduction: Aggregation in Graph Neural Networks and its Limitations}
Graph neural networks (GNNs)---neural models that operate on graphs and form node embeddings from its topological neighborhoods---have shown promises in a wide range of domains including social and physical modeling.~\cite{DBLP:journals/co... |
\section{Introduction}
Solar energetic particles (SEPs) are one of the major causes of geomagnetic disturbances on Earth (\cite{cane1987}; \citealt{gosling1993}; \citealt{reames1999}; \citealt{kahler2001}; \citealt{Aschwanden12}). The timescales, spectra, composition and charge states, and the associated radio... |
\section{Introduction}\label{introduction}
The quantum Yang--Baxter equation is a fundamental equation arising in theoretical physics and has deep connections with mathematics specially braid groups and knot theory. A solution of the quantum Yang--Baxter equation is a linear map $R:V \otimes V \to V\otimes V$ satisfyin... |
\section{Introduction}
The study of mass distribution in galaxies allows to obtain valuable information about the universe structure on a large scale and the process of stellar evolution. For this reason, the rotation curves and the GLE present in galaxies are relevant, because they allow the analysis of the distrib... |
\chapter*{#1}
\addcontentsline{toc}{chapter}{#1}}
\def\prefacesection#1{%
\chapter*{#1}
\addcontentsline{toc}{chapter}{#1}}
\if@twoside
\ifodd\c@page\else
\null\thispagestyle{chapterverso}\newpage
\if@twocolumn\null\newpage\fi
\fi
\fi
\def\ps@chapterverso{\ps@empty}%
\newcommand{\tnorm}[1]{{\l... |
\section{INTRODUCTION} \label{sec: intro}
Preview control has been a subject of study in the
field of control theory for many decades.
The main idea behind preview control is to incorporate known or estimated information on the future values of the disturbances or references (i.e., ``preview" information) in the comp... |
\section{Discussion}
The winning solutions mentioned above have achieved promising results on the CelebA-Spoof Challenge, these solutions focus on different aspects in developing a robust and efficient face anti-spoofing model. To briefly sum up, among their solutions, there are two key points are essential for impro... |
\section{Introduction}\noindent
In this paper, we investigate the decay properties of axially symmetric solutions to the steady Magnetohydrodynamics equations (MHD), which are listed as follows.
\begin{equation}\lab{s-mhd}
\left\{
\begin{array}{l}
\textbf{u}\cdot\nabla \textbf{u}+\nabla... |
\section{Introduction}
Cosmic-ray (CR) secondary nuclei such as lithium, beryllium, and boron are considered to be produced via spallation of heavier nuclei such as carbon, nitrogen, and oxygen, which are mainly produced at Galactic supernova remnants (SNRs), during their propagation in the interstellar medium (ISM). ... |
\section{Introduction}
The flavor evolution of neutrinos in dense astrophysical environments have, by now, a long history. It has been pointed out by Pantelone, Raffelt, and Sigl~\cite{Pantaleone:1992eq,Sigl:1993} and others that, through forward scattering, neutrinos can exchange their flavors. Given an anisotropic ... |
\section{Introduction}
Ambiguity, or uncertainty about uncertainty, in stochastic systems is one of the most fundamental challenges in the practical implementation of stochastic optimal controllers~\cite{Petersen2000, Tzortzis2015}.
The true probability distribution of underlying uncertainty is unknown in ambiguous ... |
\section{Introduction}
While mass loss is one of the key mechanisms regulating the evolution of massive stars, a complete understanding of it is still missing, specially during the final phases before the supernova (SN) explosion \citep[e.g.,][]{smith14}. The mass loss history $\lesssim 100-1000$ yrs before core-coll... |
\section{Introduction}
For a positive semi-definite matrix $\mat{A} \in \mathbb{R}^{m \times m}$,
a \emph{determinantal point process (DPP)}~\cite{macchi1975coincidence,borodin2005eynard}
is defined as a probability distribution on the power set $2^{[m]}$,
whose probability mass for each subset $S \subseteq [m]$ is
pro... |
\section{Conclusion} \label{conclusion}
This paper has proposed a distributed optimization framework to generate probabilistic forecasts for a set of time series subject to hierarchical constraints. In our approach, the forecasting model is trained in a bottom-up fashion. At any stage, the model training involves simul... |
\section{Introduction}
In the development of adS/CFT correspondence \cite{Maldacena, Gubser:1998bc, Witten:1998qj},
a remarkable one is the Ryu-Takayanagi proposal for the holographic entanglement entropy \cite{RT2006}.
This is regarded as a natural extension of the Bekenstein-Hawking entropy for the black hole ... |
\section{Introduction}
The perspective in computer real-time graphics hasn't changed since the dawn of CGI. It is based on a concept as old as the fifteenth century Renaissance, a linear projection \cite{Alberti1970OnPaining,Argan1946BrunelleschiPerspective,McArdle2013VisualSphereEuclid}. This situation is similar t... |
\section{Background}
\vspace{-0.05cm}
\noindent We focus on the class of problems with $N$ independent tasks that evolve over time, proposed in~\cite{mohseni2020efficient}. The robot should interleave its actions to find an optimal sequence of actions to attend to all the tasks. A POMDP that includes a single task and ... |
\section{Introduction}
Large factor models assume that a few factors can capture the common driving forces of a large number of economic variables.
Although factor models are useful, practitioners have to be cautious about the potential structural changes. For example, either the number of factors or the factor loa... |
\section{Introduction/Background/Motivation}
\section{Introduction}
Our primary focus in this paper is link prediction, which aims to infer unobserved/missing links or predicting the future ones based on the connections of currently observed partial networks. Link prediction is a fundamental problem in network scienc... |
\section{Introduction}
The study of vanishing of local cohomology modules has a long and rich history. In \cite[p.~79]{HartshorneLocalCohomology}, Grothendieck stated the following problem.
\begin{problem}[Grothendieck]
\label{Grothendieck problem}
Let $R$ be a commutative noetherian local ring, $\mathfrak{a}$ be an ... |
\section{Introduction}
In this note, a \emph{Calabi--Yau manifold} is a simply-connected compact complex manifold with trivial canonical
class and $H^i(M, \mco_M) =0$ for $0< i < \dim M$.
$K3$ surfaces are Calabi–Yau twofolds in this definition and they are all K\"ahler (\cite{Si}), forming a single irreducible ... |
\section{Introduction}
With its roots in kinetic theory, the lattice Boltzmann method (LBM) describes the evolution of fluid flow via the propagation and collision of discretized particle distribution functions (populations) $f_i(\bm x, t)$, which
are associated with a set of discrete velocities and constructed to re... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.