text
stringlengths 57
2.88k
| labels
sequencelengths 6
6
|
---|---|
Title: A Hybrid Approach to Video Source Identification,
Abstract: Multimedia Forensics allows to determine whether videos or images have been
captured with the same device, and thus, eventually, by the same person.
Currently, the most promising technology to achieve this task, exploits the
unique traces left by the camera sensor into the visual content. Anyway, image
and video source identification are still treated separately from one another.
This approach is limited and anachronistic if we consider that most of the
visual media are today acquired using smartphones, that capture both images and
videos. In this paper we overcome this limitation by exploring a new approach
that allows to synergistically exploit images and videos to study the device
from which they both come. Indeed, we prove it is possible to identify the
source of a digital video by exploiting a reference sensor pattern noise
generated from still images taken by the same device of the query video. The
proposed method provides comparable or even better performance, when compared
to the current video identification strategies, where a reference pattern is
estimated from video frames. We also show how this strategy can be effective
even in case of in-camera digitally stabilized videos, where a non-stabilized
reference is not available, by solving some state-of-the-art limitations. We
explore a possible direct application of this result, that is social media
profile linking, i.e. discovering relationships between two or more social
media profiles by comparing the visual contents - images or videos - shared
therein. | [
1,
0,
0,
0,
0,
0
] |
Title: Boosting the Actor with Dual Critic,
Abstract: This paper proposes a new actor-critic-style algorithm called Dual
Actor-Critic or Dual-AC. It is derived in a principled way from the Lagrangian
dual form of the Bellman optimality equation, which can be viewed as a
two-player game between the actor and a critic-like function, which is named as
dual critic. Compared to its actor-critic relatives, Dual-AC has the desired
property that the actor and dual critic are updated cooperatively to optimize
the same objective function, providing a more transparent way for learning the
critic that is directly related to the objective function of the actor. We then
provide a concrete algorithm that can effectively solve the minimax
optimization problem, using techniques of multi-step bootstrapping, path
regularization, and stochastic dual ascent algorithm. We demonstrate that the
proposed algorithm achieves the state-of-the-art performances across several
benchmarks. | [
1,
0,
0,
0,
0,
0
] |
Title: Counting Dominating Sets of Graphs,
Abstract: Counting dominating sets in a graph $G$ is closely related to the
neighborhood complex of $G$. We exploit this relation to prove that the number
of dominating sets $d(G)$ of a graph is determined by the number of complete
bipartite subgraphs of its complement. More precisely, we state the following.
Let $G$ be a simple graph of order $n$ such that its complement has exactly
$a(G)$ subgraphs isomorphic to $K_{2p,2q}$ and exactly $b(G)$ subgraphs
isomorphic to $K_{2p+1,2q+1}$. Then $d(G) = 2^n -1 + 2[a(G)-b(G)]$. We also
show some new relations between the domination polynomial and the neighborhood
polynomial of a graph. | [
0,
0,
1,
0,
0,
0
] |
Title: High SNR Consistent Compressive Sensing,
Abstract: High signal to noise ratio (SNR) consistency of model selection criteria in
linear regression models has attracted a lot of attention recently. However,
most of the existing literature on high SNR consistency deals with model order
selection. Further, the limited literature available on the high SNR
consistency of subset selection procedures (SSPs) is applicable to linear
regression with full rank measurement matrices only. Hence, the performance of
SSPs used in underdetermined linear models (a.k.a compressive sensing (CS)
algorithms) at high SNR is largely unknown. This paper fills this gap by
deriving necessary and sufficient conditions for the high SNR consistency of
popular CS algorithms like $l_0$-minimization, basis pursuit de-noising or
LASSO, orthogonal matching pursuit and Dantzig selector. Necessary conditions
analytically establish the high SNR inconsistency of CS algorithms when used
with the tuning parameters discussed in literature. Novel tuning parameters
with SNR adaptations are developed using the sufficient conditions and the
choice of SNR adaptations are discussed analytically using convergence rate
analysis. CS algorithms with the proposed tuning parameters are numerically
shown to be high SNR consistent and outperform existing tuning parameters in
the moderate to high SNR regime. | [
1,
0,
0,
1,
0,
0
] |
Title: Traffic Surveillance Camera Calibration by 3D Model Bounding Box Alignment for Accurate Vehicle Speed Measurement,
Abstract: In this paper, we focus on fully automatic traffic surveillance camera
calibration, which we use for speed measurement of passing vehicles. We improve
over a recent state-of-the-art camera calibration method for traffic
surveillance based on two detected vanishing points. More importantly, we
propose a novel automatic scene scale inference method. The method is based on
matching bounding boxes of rendered 3D models of vehicles with detected
bounding boxes in the image. The proposed method can be used from arbitrary
viewpoints, since it has no constraints on camera placement. We evaluate our
method on the recent comprehensive dataset for speed measurement BrnoCompSpeed.
Experiments show that our automatic camera calibration method by detection of
two vanishing points reduces error by 50% (mean distance ratio error reduced
from 0.18 to 0.09) compared to the previous state-of-the-art method. We also
show that our scene scale inference method is more precise, outperforming both
state-of-the-art automatic calibration method for speed measurement (error
reduction by 86% -- 7.98km/h to 1.10km/h) and manual calibration (error
reduction by 19% -- 1.35km/h to 1.10km/h). We also present qualitative results
of the proposed automatic camera calibration method on video sequences obtained
from real surveillance cameras in various places, and under different lighting
conditions (night, dawn, day). | [
1,
0,
0,
0,
0,
0
] |
Title: Technical Report for Real-Time Certified Probabilistic Pedestrian Forecasting,
Abstract: The success of autonomous systems will depend upon their ability to safely
navigate human-centric environments. This motivates the need for a real-time,
probabilistic forecasting algorithm for pedestrians, cyclists, and other agents
since these predictions will form a necessary step in assessing the risk of any
action. This paper presents a novel approach to probabilistic forecasting for
pedestrians based on weighted sums of ordinary differential equations that are
learned from historical trajectory information within a fixed scene. The
resulting algorithm is embarrassingly parallel and is able to work at real-time
speeds using a naive Python implementation. The quality of predicted locations
of agents generated by the proposed algorithm is validated on a variety of
examples and considerably higher than existing state of the art approaches over
long time horizons. | [
1,
0,
1,
0,
0,
0
] |
Title: DSBGK Method to Incorporate the CLL Reflection Model and to Simulate Gas Mixtures,
Abstract: Molecular reflections on usual wall surfaces can be statistically described
by the Maxwell diffuse reflection model, which has been successfully applied in
the DSBGK simulations. We develop the DSBGK algorithm to implement the
Cercignani-Lampis-Lord (CLL) reflection model, which is widely applied to
polished surfaces and used particularly in modeling space shuttles to predict
the heat and force loads exerted by the high-speed flows around the surfaces.
We also extend the DSBGK method to simulate gas mixtures and high contrast of
number densities of different components can be handled at a cost of memory
usage much lower than that needed by the DSMC simulations because the average
numbers of simulated molecules of different components per cell can be equal in
the DSBGK simulations. | [
0,
1,
0,
0,
0,
0
] |
Title: Efficient sampling of conditioned Markov jump processes,
Abstract: We consider the task of generating draws from a Markov jump process (MJP)
between two time points at which the process is known. Resulting draws are
typically termed bridges and the generation of such bridges plays a key role in
simulation-based inference algorithms for MJPs. The problem is challenging due
to the intractability of the conditioned process, necessitating the use of
computationally intensive methods such as weighted resampling or Markov chain
Monte Carlo. An efficient implementation of such schemes requires an
approximation of the intractable conditioned hazard/propensity function that is
both cheap and accurate. In this paper, we review some existing approaches to
this problem before outlining our novel contribution. Essentially, we leverage
the tractability of a Gaussian approximation of the MJP and suggest a
computationally efficient implementation of the resulting conditioned hazard
approximation. We compare and contrast our approach with existing methods using
three examples. | [
0,
0,
0,
1,
0,
0
] |
Title: An enthalpy-based multiple-relaxation-time lattice Boltzmann method for solid-liquid phase change heat transfer in metal foams,
Abstract: In this paper, an enthalpy-based multiple-relaxation-time (MRT) lattice
Boltzmann (LB) method is developed for solid-liquid phase change heat transfer
in metal foams under local thermal non-equilibrium (LTNE) condition. The
enthalpy-based MRT-LB method consists of three different MRT-LB models: one for
flow field based on the generalized non-Darcy model, and the other two for
phase change material (PCM) and metal foam temperature fields described by the
LTNE model. The moving solid-liquid phase interface is implicitly tracked
through the liquid fraction, which is simultaneously obtained when the energy
equations of PCM and metal foam are solved. The present method has several
distinctive features. First, as compared with previous studies, the present
method avoids the iteration procedure, thus it retains the inherent merits of
the standard LB method and is superior over the iteration method in terms of
accuracy and computational efficiency. Second, a volumetric LB scheme instead
of the bounce-back scheme is employed to realize the no-slip velocity condition
in the interface and solid phase regions, which is consistent with the actual
situation. Last but not least, the MRT collision model is employed, and with
additional degrees of freedom, it has the ability to reduce the numerical
diffusion across phase interface induced by solid-liquid phase change.
Numerical tests demonstrate that the present method can be served as an
accurate and efficient numerical tool for studying metal foam enhanced
solid-liquid phase change heat transfer in latent heat storage. Finally,
comparisons and discussions are made to offer useful information for practical
applications of the present method. | [
0,
1,
0,
0,
0,
0
] |
Title: Failure of Smooth Pasting Principle and Nonexistence of Equilibrium Stopping Rules under Time-Inconsistency,
Abstract: This paper considers a time-inconsistent stopping problem in which the
inconsistency arises from non-constant time preference rates. We show that the
smooth pasting principle, the main approach that has been used to construct
explicit solutions for conventional time-consistent optimal stopping problems,
may fail under time-inconsistency. Specifically, we prove that the smooth
pasting principle solves a time-inconsistent problem within the intra-personal
game theoretic framework if and only if a certain inequality on the model
primitives is satisfied. We show that the violation of this inequality can
happen even for very simple non-exponential discount functions. Moreover, we
demonstrate that the stopping problem does not admit any intra-personal
equilibrium whenever the smooth pasting principle fails. The "negative" results
in this paper caution blindly extending the classical approaches for
time-consistent stopping problems to their time-inconsistent counterparts. | [
0,
0,
0,
0,
0,
1
] |
Title: Perils of Zero-Interaction Security in the Internet of Things,
Abstract: The Internet of Things (IoT) demands authentication systems which can provide
both security and usability. Recent research utilizes the rich sensing
capabilities of smart devices to build security schemes operating without human
interaction, such as zero-interaction pairing (ZIP) and zero-interaction
authentication (ZIA). Prior work proposed a number of ZIP and ZIA schemes and
reported promising results. However, those schemes were often evaluated under
conditions which do not reflect realistic IoT scenarios. In addition, drawing
any comparison among the existing schemes is impossible due to the lack of a
common public dataset and unavailability of scheme implementations.
In this paper, we address these challenges by conducting the first
large-scale comparative study of ZIP and ZIA schemes, carried out under
realistic conditions. We collect and release the most comprehensive dataset in
the domain to date, containing over 4250 hours of audio recordings and 1
billion sensor readings from three different scenarios, and evaluate five
state-of-the-art schemes based on these data. Our study reveals that the
effectiveness of the existing proposals is highly dependent on the scenario
they are used in. In particular, we show that these schemes are subject to
error rates between 0.6% and 52.8%. | [
1,
0,
0,
0,
0,
0
] |
Title: Coarse-grained simulation of auxetic, two-dimensional crystal dynamics,
Abstract: The increasing number of protein-based metamaterials demands reliable and
efficient methods to study the physicochemical properties they may display. In
this regard, we develop a simulation strategy based on Molecular Dynamics (MD)
that addresses the geometric degrees of freedom of an auxetic two-dimensional
protein crystal. This model consists of a network of impenetrable rigid squares
linked through massless rigid rods, thus featuring a large number of both
holonomic and nonholonomic constraints. Our MD methodology is optimized to
study highly constrained systems and allows for the simulation of long-time
dynamics with reasonably large timesteps. The data extracted from the
simulations shows a persistent motional interdependence among the protein
subunits in the crystal. We characterize the dynamical correlations featured by
these subunits and identify two regimes characterized by their locality or
nonlocality, depending on the geometric parameters of the crystal. From the
same data, we also calculate the Poisson\rq{}s (longitudinal to axial strain)
ratio of the crystal, and learn that, due to holonomic constraints (rigidness
of the rod links), the crystal remains auxetic even after significant changes
in the original geometry. The nonholonomic ones (collisions between subunits)
increase the number of inhomogeneous deformations of the crystal, thus driving
it away from an isotropic response. Our work provides the first simulation of
the dynamics of protein crystals and offers insights into promising mechanical
properties afforded by these materials. | [
0,
1,
0,
0,
0,
0
] |
Title: Predicting wind pressures around circular cylinders using machine learning techniques,
Abstract: Numerous studies have been carried out to measure wind pressures around
circular cylinders since the early 20th century due to its engineering
significance. Consequently, a large amount of wind pressure data sets have
accumulated, which presents an excellent opportunity for using machine learning
(ML) techniques to train models to predict wind pressures around circular
cylinders. Wind pressures around smooth circular cylinders are a function of
mainly the Reynolds number (Re), turbulence intensity (Ti) of the incident
wind, and circumferential angle of the cylinder. Considering these three
parameters as the inputs, this study trained two ML models to predict mean and
fluctuating pressures respectively. Three machine learning algorithms including
decision tree regressor, random forest, and gradient boosting regression trees
(GBRT) were tested. The GBRT models exhibited the best performance for
predicting both mean and fluctuating pressures, and they are capable of making
accurate predictions for Re ranging from 10^4 to 10^6 and Ti ranging from 0% to
15%. It is believed that the GBRT models provide very efficient and economical
alternative to traditional wind tunnel tests and computational fluid dynamic
simulations for determining wind pressures around smooth circular cylinders
within the studied Re and Ti range. | [
1,
0,
0,
1,
0,
0
] |
Title: Randomly coloring simple hypergraphs with fewer colors,
Abstract: We study the problem of constructing a (near) uniform random proper
$q$-coloring of a simple $k$-uniform hypergraph with $n$ vertices and maximum
degree $\Delta$. (Proper in that no edge is mono-colored and simple in that two
edges have maximum intersection of size one). We show that if $q\geq
\max\{C_k\log n,500k^3\Delta^{1/(k-1)}\}$ then the Glauber Dynamics will become
close to uniform in $O(n\log n)$ time, given a random (improper) start. This
improves on the results in Frieze and Melsted [5]. | [
1,
0,
0,
0,
0,
0
] |
Title: Contributed Discussion to Uncertainty Quantification for the Horseshoe by Stéphanie van der Pas, Botond Szabó and Aad van der Vaart,
Abstract: We begin by introducing the main ideas of the paper under discussion. We
discuss some interesting issues regarding adaptive component-wise credible
intervals. We then briefly touch upon the concepts of self-similarity and
excessive bias restriction. This is then followed by some comments on the
extensive simulation study carried out in the paper. | [
0,
0,
1,
1,
0,
0
] |
Title: Learning Models from Data with Measurement Error: Tackling Underreporting,
Abstract: Measurement error in observational datasets can lead to systematic bias in
inferences based on these datasets. As studies based on observational data are
increasingly used to inform decisions with real-world impact, it is critical
that we develop a robust set of techniques for analyzing and adjusting for
these biases. In this paper we present a method for estimating the distribution
of an outcome given a binary exposure that is subject to underreporting. Our
method is based on a missing data view of the measurement error problem, where
the true exposure is treated as a latent variable that is marginalized out of a
joint model. We prove three different conditions under which the outcome
distribution can still be identified from data containing only error-prone
observations of the exposure. We demonstrate this method on synthetic data and
analyze its sensitivity to near violations of the identifiability conditions.
Finally, we use this method to estimate the effects of maternal smoking and
opioid use during pregnancy on childhood obesity, two import problems from
public health. Using the proposed method, we estimate these effects using only
subject-reported drug use data and substantially refine the range of estimates
generated by a sensitivity analysis-based approach. Further, the estimates
produced by our method are consistent with existing literature on both the
effects of maternal smoking and the rate at which subjects underreport smoking. | [
1,
0,
0,
1,
0,
0
] |
Title: A simple introduction to Karmarkar's Algorithm for Linear Programming,
Abstract: An extremely simple, description of Karmarkar's algorithm with very few
technical terms is given. | [
1,
0,
0,
0,
0,
0
] |
Title: Asymptotics of the bound state induced by $δ$-interaction supported on a weakly deformed plane,
Abstract: In this paper we consider the three-dimensional Schrödinger operator with
a $\delta$-interaction of strength $\alpha > 0$ supported on an unbounded
surface parametrized by the mapping $\mathbb{R}^2\ni x\mapsto (x,\beta f(x))$,
where $\beta \in [0,\infty)$ and $f\colon \mathbb{R}^2\rightarrow\mathbb{R}$,
$f\not\equiv 0$, is a $C^2$-smooth, compactly supported function. The surface
supporting the interaction can be viewed as a local deformation of the plane.
It is known that the essential spectrum of this Schrödinger operator
coincides with $[-\frac14\alpha^2,+\infty)$. We prove that for all sufficiently
small $\beta > 0$ its discrete spectrum is non-empty and consists of a unique
simple eigenvalue. Moreover, we obtain an asymptotic expansion of this
eigenvalue in the limit $\beta \rightarrow 0+$. In particular, this eigenvalue
tends to $-\frac14\alpha^2$ exponentially fast as $\beta\rightarrow 0+$. | [
0,
0,
1,
0,
0,
0
] |
Title: Análise comparativa de pesquisas de origens e destinos: uma abordagem baseada em Redes Complexas,
Abstract: In this paper, a comparative study was conducted between complex networks
representing origin and destination survey data. Similarities were found
between the characteristics of the networks of Brazilian cities with networks
of foreign cities. Power laws were found in the distributions of edge weights
and this scale - free behavior can occur due to the economic characteristics of
the cities. | [
1,
0,
0,
0,
0,
0
] |
Title: Development of probabilistic dam breach model using Bayesian inference,
Abstract: Dam breach models are commonly used to predict outflow hydrographs of
potentially failing dams and are key ingredients for evaluating flood risk. In
this paper a new dam breach modeling framework is introduced that shall improve
the reliability of hydrograph predictions of homogeneous earthen embankment
dams. Striving for a small number of parameters, the simplified physics-based
model describes the processes of failing embankment dams by breach enlargement,
driven by progressive surface erosion. Therein the erosion rate of dam material
is modeled by empirical sediment transport formulations. Embedding the model
into a Bayesian multilevel framework allows for quantitative analysis of
different categories of uncertainties. To this end, data available in
literature of observed peak discharge and final breach width of historical dam
failures was used to perform model inversion by applying Markov Chain Monte
Carlo simulation. Prior knowledge is mainly based on non-informative
distribution functions. The resulting posterior distribution shows that the
main source of uncertainty is a correlated subset of parameters, consisting of
the residual error term and the epistemic term quantifying the breach erosion
rate. The prediction intervals of peak discharge and final breach width are
congruent with values known from literature. To finally predict the outflow
hydrograph for real case applications, an alternative residual model was
formulated that assumes perfect data and a perfect model. The fully
probabilistic fashion of hydrograph prediction has the potential to improve the
adequate risk management of downstream flooding. | [
0,
0,
0,
1,
0,
0
] |
Title: One-Step Time-Dependent Future Video Frame Prediction with a Convolutional Encoder-Decoder Neural Network,
Abstract: There is an inherent need for autonomous cars, drones, and other robots to
have a notion of how their environment behaves and to anticipate changes in the
near future. In this work, we focus on anticipating future appearance given the
current frame of a video. Existing work focuses on either predicting the future
appearance as the next frame of a video, or predicting future motion as optical
flow or motion trajectories starting from a single video frame. This work
stretches the ability of CNNs (Convolutional Neural Networks) to predict an
anticipation of appearance at an arbitrarily given future time, not necessarily
the next video frame. We condition our predicted future appearance on a
continuous time variable that allows us to anticipate future frames at a given
temporal distance, directly from the input video frame. We show that CNNs can
learn an intrinsic representation of typical appearance changes over time and
successfully generate realistic predictions at a deliberate time difference in
the near future. | [
1,
0,
0,
0,
0,
0
] |
Title: Myopic Bayesian Design of Experiments via Posterior Sampling and Probabilistic Programming,
Abstract: We design a new myopic strategy for a wide class of sequential design of
experiment (DOE) problems, where the goal is to collect data in order to to
fulfil a certain problem specific goal. Our approach, Myopic Posterior Sampling
(MPS), is inspired by the classical posterior (Thompson) sampling algorithm for
multi-armed bandits and leverages the flexibility of probabilistic programming
and approximate Bayesian inference to address a broad set of problems.
Empirically, this general-purpose strategy is competitive with more specialised
methods in a wide array of DOE tasks, and more importantly, enables addressing
complex DOE goals where no existing method seems applicable. On the theoretical
side, we leverage ideas from adaptive submodularity and reinforcement learning
to derive conditions under which MPS achieves sublinear regret against natural
benchmark policies. | [
0,
0,
0,
1,
0,
0
] |
Title: Data-Driven Sparse Structure Selection for Deep Neural Networks,
Abstract: Deep convolutional neural networks have liberated its extraordinary power on
various tasks. However, it is still very challenging to deploy state-of-the-art
models into real-world applications due to their high computational complexity.
How can we design a compact and effective network without massive experiments
and expert knowledge? In this paper, we propose a simple and effective
framework to learn and prune deep models in an end-to-end manner. In our
framework, a new type of parameter -- scaling factor is first introduced to
scale the outputs of specific structures, such as neurons, groups or residual
blocks. Then we add sparsity regularizations on these factors, and solve this
optimization problem by a modified stochastic Accelerated Proximal Gradient
(APG) method. By forcing some of the factors to zero, we can safely remove the
corresponding structures, thus prune the unimportant parts of a CNN. Comparing
with other structure selection methods that may need thousands of trials or
iterative fine-tuning, our method is trained fully end-to-end in one training
pass without bells and whistles. We evaluate our method, Sparse Structure
Selection with several state-of-the-art CNNs, and demonstrate very promising
results with adaptive depth and width selection. | [
1,
0,
0,
0,
0,
0
] |
Title: Scaling laws and bounds for the turbulent G.O. Roberts dynamo,
Abstract: Numerical simulations of the G.O. Roberts dynamo are presented. Dynamos both
with and without a significant mean field are obtained. Exact bounds are
derived for the total energy which conform with the Kolmogorov phenomenology of
turbulence. Best fits to numerical data show the same functional dependences as
the inequalities obtained from optimum theory. | [
0,
1,
0,
0,
0,
0
] |
Title: On Popov's formula involving the Von Mangoldt function,
Abstract: We offer a generalization of a formula of Popov involving the Von Mangoldt
function. Some commentary on its relation to other results in analytic number
theory is mentioned as well as an analogue involving the m$\ddot{o}$bius
function. | [
0,
0,
1,
0,
0,
0
] |
Title: Multi-hop assortativities for networks classification,
Abstract: Several social, medical, engineering and biological challenges rely on
discovering the functionality of networks from their structure and node
metadata, when it is available. For example, in chemoinformatics one might want
to detect whether a molecule is toxic based on structure and atomic types, or
discover the research field of a scientific collaboration network. Existing
techniques rely on counting or measuring structural patterns that are known to
show large variations from network to network, such as the number of triangles,
or the assortativity of node metadata. We introduce the concept of multi-hop
assortativity, that captures the similarity of the nodes situated at the
extremities of a randomly selected path of a given length. We show that
multi-hop assortativity unifies various existing concepts and offers a
versatile family of 'fingerprints' to characterize networks. These fingerprints
allow in turn to recover the functionalities of a network, with the help of the
machine learning toolbox. Our method is evaluated empirically on established
social and chemoinformatic network benchmarks. Results reveal that our
assortativity based features are competitive providing highly accurate results
often outperforming state of the art methods for the network classification
task. | [
1,
0,
0,
1,
0,
0
] |
Title: Rotating Rayleigh-Taylor turbulence,
Abstract: The turbulent Rayleigh--Taylor system in a rotating reference frame is
investigated by direct numerical simulations within the Oberbeck-Boussinesq
approximation. On the basis of theoretical arguments, supported by our
simulations, we show that the Rossby number decreases in time, and therefore
the Coriolis force becomes more important as the system evolves and produces
many effects on Rayleigh--Taylor turbulence. We find that rotation reduces the
intensity of turbulent velocity fluctuations and therefore the growth rate of
the temperature mixing layer. Moreover, in presence of rotation the conversion
of potential energy into turbulent kinetic energy is found to be less effective
and the efficiency of the heat transfer is reduced. Finally, during the
evolution of the mixing layer we observe the development of a
cyclone-anticyclone asymmetry. | [
0,
1,
0,
0,
0,
0
] |
Title: A global model for predicting the arrival of imported dengue infections,
Abstract: With approximately half of the world's population at risk of contracting
dengue, this mosquito-borne disease is of global concern. International
travellers significantly contribute to dengue's rapid and large-scale spread by
importing the disease from endemic into non-endemic countries. To prevent
future outbreaks and dengue from establishing in non-endemic countries,
knowledge about the arrival time and location of infected travellers is
crucial. We propose a network model that predicts the monthly number of dengue
infected air passengers arriving at any given airport. We consider
international air travel volumes, monthly dengue incidence rates and temporal
infection dynamics. Our findings shed light onto dengue importation routes and
reveal country-specific reporting rates that have been until now largely
unknown. | [
1,
0,
0,
0,
1,
0
] |
Title: Observation of surface plasmon polaritons in 2D electron gas of surface electron accumulation in InN nanostructures,
Abstract: Recently, heavily doped semiconductors are emerging as an alternate for low
loss plasmonic materials. InN, belonging to the group III nitrides, possesses
the unique property of surface electron accumulation (SEA) which provides two
dimensional electron gas (2DEG) system. In this report, we demonstrated the
surface plasmon properties of InN nanoparticles originating from SEA using the
real space mapping of the surface plasmon fields for the first time. The SEA is
confirmed by Raman studies which are further corroborated by photoluminescence
and photoemission spectroscopic studies. The frequency of 2DEG corresponding to
SEA is found to be in the THz region. The periodic fringes are observed in the
near-field scanning optical microscopic images of InN nanostructures. The
observed fringes are attributed to the interference of propagated and back
reflected surface plasmon polaritons (SPPs). The observation of SPPs is solely
attributed to the 2DEG corresponding to the SEA of InN. In addition, resonance
kind of behavior with the enhancement of the near-field intensity is observed
in the near-field images of InN nanostructures. Observation of SPPs indicates
that InN with SEA can be a promising THz plasmonic material for the light
confinement. | [
0,
1,
0,
0,
0,
0
] |
Title: Partial Information Stochastic Differential Games for Backward Stochastic Systems Driven By Lévy Processes,
Abstract: In this paper, we consider a partial information two-person zero-sum
stochastic differential game problem where the system is governed by a backward
stochastic differential equation driven by Teugels martingales associated with
a Lévy process and an independent Brownian motion. One sufficient (a
verification theorem) and one necessary conditions for the existence of optimal
controls are proved. To illustrate the general results, a linear quadratic
stochastic differential game problem is discussed. | [
0,
0,
1,
0,
0,
0
] |
Title: Inter-Session Modeling for Session-Based Recommendation,
Abstract: In recent years, research has been done on applying Recurrent Neural Networks
(RNNs) as recommender systems. Results have been promising, especially in the
session-based setting where RNNs have been shown to outperform state-of-the-art
models. In many of these experiments, the RNN could potentially improve the
recommendations by utilizing information about the user's past sessions, in
addition to its own interactions in the current session. A problem for
session-based recommendation, is how to produce accurate recommendations at the
start of a session, before the system has learned much about the user's current
interests. We propose a novel approach that extends a RNN recommender to be
able to process the user's recent sessions, in order to improve
recommendations. This is done by using a second RNN to learn from recent
sessions, and predict the user's interest in the current session. By feeding
this information to the original RNN, it is able to improve its
recommendations. Our experiments on two different datasets show that the
proposed approach can significantly improve recommendations throughout the
sessions, compared to a single RNN working only on the current session. The
proposed model especially improves recommendations at the start of sessions,
and is therefore able to deal with the cold start problem within sessions. | [
1,
0,
0,
0,
0,
0
] |
Title: Multiscale Modeling of Shock Wave Localization in Porous Energetic Material,
Abstract: Shock wave interactions with defects, such as pores, are known to play a key
role in the chemical initiation of energetic materials. The shock response of
hexanitrostilbene is studied through a combination of large scale reactive
molecular dynamics and mesoscale hydrodynamic simulations. In order to extend
our simulation capability at the mesoscale to include weak shock conditions (<
6 GPa), atomistic simulations of pore collapse are used to define a strain rate
dependent strength model. Comparing these simulation methods allows us to
impose physically-reasonable constraints on the mesoscale model parameters. In
doing so, we have been able to study shock waves interacting with pores as a
function of this viscoplastic material response. We find that the pore collapse
behavior of weak shocks is characteristically different to that of strong
shocks. | [
0,
1,
0,
0,
0,
0
] |
Title: The Diverse Club: The Integrative Core of Complex Networks,
Abstract: A complex system can be represented and analyzed as a network, where nodes
represent the units of the network and edges represent connections between
those units. For example, a brain network represents neurons as nodes and axons
between neurons as edges. In many networks, some nodes have a
disproportionately high number of edges. These nodes also have many edges
between each other, and are referred to as the rich club. In many different
networks, the nodes of this club are assumed to support global network
integration. However, another set of nodes potentially exhibits a connectivity
structure that is more advantageous to global network integration. Here, in a
myriad of different biological and man-made networks, we discover the diverse
club--a set of nodes that have edges diversely distributed across the network.
The diverse club exhibits, to a greater extent than the rich club, properties
consistent with an integrative network function--these nodes are more highly
interconnected and their edges are more critical for efficient global
integration. Moreover, we present a generative evolutionary network model that
produces networks with a diverse club but not a rich club, thus demonstrating
that these two clubs potentially evolved via distinct selection pressures.
Given the variety of different networks that we analyzed--the c. elegans, the
macaque brain, the human brain, the United States power grid, and global air
traffic--the diverse club appears to be ubiquitous in complex networks. These
results warrant the distinction and analysis of two critical clubs of nodes in
all complex systems. | [
0,
1,
0,
0,
0,
0
] |
Title: Bayesian Semisupervised Learning with Deep Generative Models,
Abstract: Neural network based generative models with discriminative components are a
powerful approach for semi-supervised learning. However, these techniques a)
cannot account for model uncertainty in the estimation of the model's
discriminative component and b) lack flexibility to capture complex stochastic
patterns in the label generation process. To avoid these problems, we first
propose to use a discriminative component with stochastic inputs for increased
noise flexibility. We show how an efficient Gibbs sampling procedure can
marginalize the stochastic inputs when inferring missing labels in this model.
Following this, we extend the discriminative component to be fully Bayesian and
produce estimates of uncertainty in its parameter values. This opens the door
for semi-supervised Bayesian active learning. | [
0,
0,
0,
1,
0,
0
] |
Title: Stability of Valuations: Higher Rational Rank,
Abstract: Given a klt singularity $x\in (X, D)$, we show that a quasi-monomial
valuation $v$ with a finitely generated associated graded ring is the minimizer
of the normalized volume function $\widehat{\rm vol}_{(X,D),x}$, if and only if
$v$ induces a degeneration to a K-semistable log Fano cone singularity.
Moreover, such a minimizer is unique among all quasi-monomial valuations up to
rescaling. As a consequence, we prove that for a klt singularity $x\in X$ on
the Gromov-Hausdorff limit of Kähler-Einstein Fano manifolds, the
intermediate K-semistable cone associated to its metric tangent cone is
uniquely determined by the algebraic structure of $x\in X$, hence confirming a
conjecture by Donaldson-Sun. | [
0,
0,
1,
0,
0,
0
] |
Title: Higgs mode and its decay in a two dimensional antiferromagnet,
Abstract: Condensed-matter analogs of the Higgs boson in particle physics allow
insights into its behavior in different symmetries and dimensionalities.
Evidence for the Higgs mode has been reported in a number of different
settings, including ultracold atomic gases, disordered superconductors, and
dimerized quantum magnets. However, decay processes of the Higgs mode (which
are eminently important in particle physics) have not yet been studied in
condensed matter due to the lack of a suitable material system coupled to a
direct experimental probe. A quantitative understanding of these processes is
particularly important for low-dimensional systems where the Higgs mode decays
rapidly and has remained elusive to most experimental probes. Here, we discover
and study the Higgs mode in a two-dimensional antiferromagnet using
spin-polarized inelastic neutron scattering. Our spin-wave spectra of
Ca$_2$RuO$_4$ directly reveal a well-defined, dispersive Higgs mode, which
quickly decays into transverse Goldstone modes at the antiferromagnetic
ordering wavevector. Through a complete mapping of the transverse modes in the
reciprocal space, we uniquely specify the minimal model Hamiltonian and
describe the decay process. We thus establish a novel condensed matter platform
for research on the dynamics of the Higgs mode. | [
0,
1,
0,
0,
0,
0
] |
Title: Robust and Efficient Boosting Method using the Conditional Risk,
Abstract: Well-known for its simplicity and effectiveness in classification, AdaBoost,
however, suffers from overfitting when class-conditional distributions have
significant overlap. Moreover, it is very sensitive to noise that appears in
the labels. This article tackles the above limitations simultaneously via
optimizing a modified loss function (i.e., the conditional risk). The proposed
approach has the following two advantages. (1) It is able to directly take into
account label uncertainty with an associated label confidence. (2) It
introduces a "trustworthiness" measure on training samples via the Bayesian
risk rule, and hence the resulting classifier tends to have finite sample
performance that is superior to that of the original AdaBoost when there is a
large overlap between class conditional distributions. Theoretical properties
of the proposed method are investigated. Extensive experimental results using
synthetic data and real-world data sets from UCI machine learning repository
are provided. The empirical study shows the high competitiveness of the
proposed method in predication accuracy and robustness when compared with the
original AdaBoost and several existing robust AdaBoost algorithms. | [
0,
0,
0,
1,
0,
0
] |
Title: High Dimensional Robust Estimation of Sparse Models via Trimmed Hard Thresholding,
Abstract: We study the problem of sparsity constrained $M$-estimation with arbitrary
corruptions to both {\em explanatory and response} variables in the
high-dimensional regime, where the number of variables $d$ is larger than the
sample size $n$. Our main contribution is a highly efficient gradient-based
optimization algorithm that we call Trimmed Hard Thresholding -- a robust
variant of Iterative Hard Thresholding (IHT) by using trimmed mean in gradient
computations. Our algorithm can deal with a wide class of sparsity constrained
$M$-estimation problems, and we can tolerate a nearly dimension independent
fraction of arbitrarily corrupted samples. More specifically, when the
corrupted fraction satisfies $\epsilon \lesssim {1} /\left({\sqrt{k} \log
(nd)}\right)$, where $k$ is the sparsity of the parameter, we obtain accurate
estimation and model selection guarantees with optimal sample complexity.
Furthermore, we extend our algorithm to sparse Gaussian graphical model
(precision matrix) estimation via a neighborhood selection approach. We
demonstrate the effectiveness of robust estimation in sparse linear, logistic
regression, and sparse precision matrix estimation on synthetic and real-world
US equities data. | [
1,
0,
1,
1,
0,
0
] |
Title: An efficient data structure for counting all linear extensions of a poset, calculating its jump number, and the likes,
Abstract: Achieving the goals in the title (and others) relies on a cardinality-wise
scanning of the ideals of the poset. Specifically, the relevant numbers
attached to the k+1 element ideals are inferred from the corresponding numbers
of the k-element (order) ideals. Crucial in all of this is a compressed
representation (using wildcards) of the ideal lattice. The whole scheme invites
distributed computation. | [
1,
0,
0,
0,
0,
0
] |
Title: Perception-in-the-Loop Adversarial Examples,
Abstract: We present a scalable, black box, perception-in-the-loop technique to find
adversarial examples for deep neural network classifiers. Black box means that
our procedure only has input-output access to the classifier, and not to the
internal structure, parameters, or intermediate confidence values.
Perception-in-the-loop means that the notion of proximity between inputs can be
directly queried from human participants rather than an arbitrarily chosen
metric. Our technique is based on covariance matrix adaptation evolution
strategy (CMA-ES), a black box optimization approach. CMA-ES explores the
search space iteratively in a black box manner, by generating populations of
candidates according to a distribution, choosing the best candidates according
to a cost function, and updating the posterior distribution to favor the best
candidates. We run CMA-ES using human participants to provide the fitness
function, using the insight that the choice of best candidates in CMA-ES can be
naturally modeled as a perception task: pick the top $k$ inputs perceptually
closest to a fixed input. We empirically demonstrate that finding adversarial
examples is feasible using small populations and few iterations. We compare the
performance of CMA-ES on the MNIST benchmark with other black-box approaches
using $L_p$ norms as a cost function, and show that it performs favorably both
in terms of success in finding adversarial examples and in minimizing the
distance between the original and the adversarial input. In experiments on the
MNIST, CIFAR10, and GTSRB benchmarks, we demonstrate that CMA-ES can find
perceptually similar adversarial inputs with a small number of iterations and
small population sizes when using perception-in-the-loop. Finally, we show that
networks trained specifically to be robust against $L_\infty$ norm can still be
susceptible to perceptually similar adversarial examples. | [
1,
0,
0,
1,
0,
0
] |
Title: Deep Fluids: A Generative Network for Parameterized Fluid Simulations,
Abstract: This paper presents a novel generative model to synthesize fluid simulations
from a set of reduced parameters. A convolutional neural network is trained on
a collection of discrete, parameterizable fluid simulation velocity fields. Due
to the capability of deep learning architectures to learn representative
features of the data, our generative model is able to accurately approximate
the training data set, while providing plausible interpolated in-betweens. The
proposed generative model is optimized for fluids by a novel loss function that
guarantees divergence-free velocity fields at all times. In addition, we
demonstrate that we can handle complex parameterizations in reduced spaces, and
advance simulations in time by integrating in the latent space with a second
network. Our method models a wide variety of fluid behaviors, thus enabling
applications such as fast construction of simulations, interpolation of fluids
with different parameters, time re-sampling, latent space simulations, and
compression of fluid simulation data. Reconstructed velocity fields are
generated up to 700x faster than traditional CPU solvers, while achieving
compression rates of over 1300x. | [
0,
0,
0,
1,
0,
0
] |
Title: Mean squared displacement and sinuosity of three-dimensional random search movements,
Abstract: Correlated random walks (CRW) have been used for a long time as a null model
for animal's random search movement in two dimensions (2D). An increasing
number of studies focus on animals' movement in three dimensions (3D), but the
key properties of CRW, such as the way the mean squared displacement is related
to the path length, are well known only in 1D and 2D. In this paper I derive
such properties for 3D CRW, in a consistent way with the expression of these
properties in 2D. This should allow 3D CRW to act as a null model when
analyzing actual 3D movements similarly to what is done in 2D | [
0,
0,
0,
0,
1,
0
] |
Title: Local Algorithms for Hierarchical Dense Subgraph Discovery,
Abstract: Finding the dense regions of a graph and relations among them is a
fundamental problem in network analysis. Core and truss decompositions reveal
dense subgraphs with hierarchical relations. The incremental nature of
algorithms for computing these decompositions and the need for global
information at each step of the algorithm hinders scalable parallelization and
approximations since the densest regions are not revealed until the end. In a
previous work, Lu et al. proposed to iteratively compute the $h$-indices of
neighbor vertex degrees to obtain the core numbers and prove that the
convergence is obtained after a finite number of iterations. This work
generalizes the iterative $h$-index computation for truss decomposition as well
as nucleus decomposition which leverages higher-order structures to generalize
core and truss decompositions. In addition, we prove convergence bounds on the
number of iterations. We present a framework of local algorithms to obtain the
core, truss, and nucleus decompositions. Our algorithms are local, parallel,
offer high scalability, and enable approximations to explore time and quality
trade-offs. Our shared-memory implementation verifies the efficiency,
scalability, and effectiveness of our local algorithms on real-world networks. | [
1,
0,
0,
0,
0,
0
] |
Title: Analysis and mitigation of interface losses in trenched superconducting coplanar waveguide resonators,
Abstract: Improving the performance of superconducting qubits and resonators generally
results from a combination of materials and fabrication process improvements
and design modifications that reduce device sensitivity to residual losses. One
instance of this approach is to use trenching into the device substrate in
combination with superconductors and dielectrics with low intrinsic losses to
improve quality factors and coherence times. Here we demonstrate titanium
nitride coplanar waveguide resonators with mean quality factors exceeding two
million and controlled trenching reaching 2.2 $\mu$m into the silicon
substrate. Additionally, we measure sets of resonators with a range of sizes
and trench depths and compare these results with finite-element simulations to
demonstrate quantitative agreement with a model of interface dielectric loss.
We then apply this analysis to determine the extent to which trenching can
improve resonator performance. | [
0,
1,
0,
0,
0,
0
] |
Title: A Ball Breaking Away from a Fluid,
Abstract: We consider the withdrawal of a ball from a fluid reservoir to understand the
longevity of the connection between that ball and the fluid it breaks away
from, at intermediate Reynolds numbers. Scaling arguments based on the
processes observed as the ball interacts with the fluid surface were applied to
the `pinch-off time', when the ball breaks its connection with the fluid from
which it has been withdrawn, measured experimentally. At the lowest Reynolds
numbers tested, pinch-off occurs in a `surface seal' close to the reservoir
surface, where at larger Reynolds numbers pinch-off occurs in an `ejecta seal'
close to the ball. Our scaling analysis shows that the connection between ball
and fluid is controlled by the fluid film draining from the ball as it
continues to be winched away from the fluid reservoir. The draining flow itself
depends on the amount of fluid coating the ball on exit from the reservoir. We
consider the possibilities that this coating was created through: a surface
tension driven Landau Levitch Derjaguin wetting of the surface; a
visco-inertial quick coating; or alternatively through the inertia of the fluid
moving with the ball through the reservoir. We show that although the pinch-off
mechanism is controlled by viscosity, the coating mechanism is governed by a
different length and timescale, dictated by the inertial added mass of the ball
when submersed. | [
0,
1,
0,
0,
0,
0
] |
Title: A parallel orbital-updating based plane-wave basis method for electronic structure calculations,
Abstract: Motivated by the recently proposed parallel orbital-updating approach in real
space method, we propose a parallel orbital-updating based plane-wave basis
method for electronic structure calculations, for solving the corresponding
eigenvalue problems. In addition, we propose two new modified parallel
orbital-updating methods. Compared to the traditional plane-wave methods, our
methods allow for two-level parallelization, which is particularly interesting
for large scale parallelization. Numerical experiments show that these new
methods are more reliable and efficient for large scale calculations on modern
supercomputers | [
0,
1,
1,
0,
0,
0
] |
Title: Dynamics of the multi-soliton waves in the sine-Gordon model with two identical point impurities,
Abstract: The particular type of four-kink multi-solitons (or quadrons) adiabatic
dynamics of the sine-Gordon equation in a model with two identical point
attracting impurities has been studied. This model can be used for describing
magnetization localized waves in multilayer ferromagnet. The quadrons structure
and properties has been numerically investigated. The cases of both large and
small distances between impurities has been viewed. The dependence of the
localized in impurity region nonlinear high-amplitude waves frequencies on the
distance between the impurities has been found. For an analytical description
of two bound localized on impurities nonlinear waves dynamics, using
perturbation theory, the system of differential equations for harmonic
oscillators with elastic link has been found. The analytical model
qualitatively describes the results of the sine-Gordon equation numerical
simulation. | [
0,
1,
0,
0,
0,
0
] |
Title: Multi-User Multi-Armed Bandits for Uncoordinated Spectrum Access,
Abstract: A multi-user multi-armed bandit (MAB) framework is used to develop algorithms
for uncoordinated spectrum access. The number of users is assumed to be unknown
to each user. A stochastic setting is first considered, where the rewards on a
channel are the same for each user. In contrast to prior work, it is assumed
that the number of users can possibly exceed the number of channels, and that
rewards can be non-zero even under collisions. The proposed algorithm consists
of an estimation phase and an allocation phase. It is shown that if every user
adopts the algorithm, the system wide regret is constant with time with high
probability. The regret guarantees hold for any number of users and channels,
in particular, even when the number of users is less than the number of
channels. Next, an adversarial multi-user MAB framework is considered, where
the rewards on the channels are user-dependent. It is assumed that the number
of users is less than the number of channels, and that the users receive zero
reward on collision. The proposed algorithm combines the Exp3.P algorithm
developed in prior work for single user adversarial bandits with a collision
resolution mechanism to achieve sub-linear regret. It is shown that if every
user employs the proposed algorithm, the system wide regret is of the order
$O(T^\frac{3}{4})$ over a horizon of time $T$. The algorithms in both
stochastic and adversarial scenarios are extended to the dynamic case where the
number of users in the system evolves over time and are shown to lead to
sub-linear regret. | [
0,
0,
0,
1,
0,
0
] |
Title: A Comparative Analysis of Contact Models in Trajectory Optimization for Manipulation,
Abstract: In this paper, we analyze the effects of contact models on contact-implicit
trajectory optimization for manipulation. We consider three different
approaches: (1) a contact model that is based on complementarity constraints,
(2) a smooth contact model, and our proposed method (3) a variable smooth
contact model. We compare these models in simulation in terms of physical
accuracy, quality of motions, and computation time. In each case, the
optimization process is initialized by setting all torque variables to zero,
namely, without a meaningful initial guess. For simulations, we consider a
pushing task with varying complexity for a 7 degrees-of-freedom robot arm. Our
results demonstrate that the optimization based on the proposed variable smooth
contact model provides a good trade-off between the physical fidelity and
quality of motions at the cost of increased computation time. | [
1,
0,
0,
0,
0,
0
] |
Title: Is It Safe to Uplift This Patch? An Empirical Study on Mozilla Firefox,
Abstract: In rapid release development processes, patches that fix critical issues, or
implement high-value features are often promoted directly from the development
channel to a stabilization channel, potentially skipping one or more
stabilization channels. This practice is called patch uplift. Patch uplift is
risky, because patches that are rushed through the stabilization phase can end
up introducing regressions in the code. This paper examines patch uplift
operations at Mozilla, with the aim to identify the characteristics of uplifted
patches that introduce regressions. Through statistical and manual analyses, we
quantitatively and qualitatively investigate the reasons behind patch uplift
decisions and the characteristics of uplifted patches that introduced
regressions. Additionally, we interviewed three Mozilla release managers to
understand organizational factors that affect patch uplift decisions and
outcomes. Results show that most patches are uplifted because of a wrong
functionality or a crash. Uplifted patches that lead to faults tend to have
larger patch size, and most of the faults are due to semantic or memory errors
in the patches. Also, release managers are more inclined to accept patch uplift
requests that concern certain specific components, and-or that are submitted by
certain specific developers. | [
1,
0,
0,
0,
0,
0
] |
Title: Common change point estimation in panel data from the least squares and maximum likelihood viewpoints,
Abstract: We establish the convergence rates and asymptotic distributions of the common
break change-point estimators, obtained by least squares and maximum likelihood
in panel data models and compare their asymptotic variances. Our model
assumptions accommodate a variety of commonly encountered probability
distributions and, in particular, models of particular interest in econometrics
beyond the commonly analyzed Gaussian model, including the zero-inflated
Poisson model for count data, and the probit and tobit models. We also provide
novel results for time dependent data in the signal-plus-noise model, with
emphasis on a wide array of noise processes, including Gaussian process,
MA$(\infty)$ and $m$-dependent processes. The obtained results show that
maximum likelihood estimation requires a stronger signal-to-noise model
identifiability condition compared to its least squares counterpart. Finally,
since there are three different asymptotic regimes that depend on the behavior
of the norm difference of the model parameters before and after the change
point, which cannot be realistically assumed to be known, we develop a novel
data driven adaptive procedure that provides valid confidence intervals for the
common break, without requiring a priori knowledge of the asymptotic regime the
problem falls in. | [
0,
0,
1,
1,
0,
0
] |
Title: Outage analysis in two-way communication with RF energy harvesting relay and co-channel interference,
Abstract: The study of relays with the scope of energy-harvesting (EH) looks
interesting as a means of enabling sustainable, wireless communication without
the need to recharge or replace the battery driving the relays. However,
reliability of such communication systems becomes an important design challenge
when such relays scavenge energy from the information bearing RF signals
received from the source, using the technique of simultaneous wireless
information and power transfer (SWIPT). To this aim, this work studies
bidirectional communication in a decode-and-forward (DF) relay assisted
cooperative wireless network in presence of co-channel interference (CCI). In
order to quantify the reliability of the bidirectional communication systems, a
closed form expression for the outage probability of the system is derived for
both power splitting (PS) and time switching (TS) mode of operation of the
relay. Simulation results are used to validate the accuracy of our analytical
results and illustrate the dependence of the outage probability on various
system parameters, like PS factor, TS factor, and distance of the relay from
both the users. Results of performance comparison between PS relaying (PSR) and
TS relaying (TSR) schemes are also presented. Besides, simulation results are
also used to illustrate the spectral-efficiency and the energy-efficiency of
the proposed system. The results show that, both in terms of spectral
efficiency and the energy-efficiency, the two-way communication system in
presence of moderate CCI power, performs better than the similar system without
CCI. Additionally, it is also found that PSR is superior to TSR protocol in
terms of peak energy-efficiency. | [
1,
0,
0,
0,
0,
0
] |
Title: KGAN: How to Break The Minimax Game in GAN,
Abstract: Generative Adversarial Networks (GANs) were intuitively and attractively
explained under the perspective of game theory, wherein two involving parties
are a discriminator and a generator. In this game, the task of the
discriminator is to discriminate the real and generated (i.e., fake) data,
whilst the task of the generator is to generate the fake data that maximally
confuses the discriminator. In this paper, we propose a new viewpoint for GANs,
which is termed as the minimizing general loss viewpoint. This viewpoint shows
a connection between the general loss of a classification problem regarding a
convex loss function and a f-divergence between the true and fake data
distributions. Mathematically, we proposed a setting for the classification
problem of the true and fake data, wherein we can prove that the general loss
of this classification problem is exactly the negative f-divergence for a
certain convex function f. This allows us to interpret the problem of learning
the generator for dismissing the f-divergence between the true and fake data
distributions as that of maximizing the general loss which is equivalent to the
min-max problem in GAN if the Logistic loss is used in the classification
problem. However, this viewpoint strengthens GANs in two ways. First, it allows
us to employ any convex loss function for the discriminator. Second, it
suggests that rather than limiting ourselves in NN-based discriminators, we can
alternatively utilize other powerful families. Bearing this viewpoint, we then
propose using the kernel-based family for discriminators. This family has two
appealing features: i) a powerful capacity in classifying non-linear nature
data and ii) being convex in the feature space. Using the convexity of this
family, we can further develop Fenchel duality to equivalently transform the
max-min problem to the max-max dual problem. | [
1,
0,
0,
1,
0,
0
] |
Title: The solitary g-mode frequencies in early B-type stars,
Abstract: We present possible explanations of pulsations in early B-type main sequence
stars which arise purely from the excitation of gravity modes. There are three
stars with this type of oscillations detected from the BRITE light curves:
$\kappa$ Cen, a Car, $\kappa$ Vel. We show that by changing metallicity or the
opacity profile it is possible in some models to dump pressure modes keeping
gravity modes unstable. Other possible scenario involves pulsations of a lower
mass companion. | [
0,
1,
0,
0,
0,
0
] |
Title: The microarchitecture of a multi-threaded RISC-V compliant processing core family for IoT end-nodes,
Abstract: Internet-of-Things end-nodes demand low power processing platforms
characterized by heterogeneous dedicated units, controlled by a processor core
running concurrent control threads. Such architecture scheme fits one of the
main target application domain of the RISC-V instruction set. We present an
open-source processing core compliant with RISC-V on the software side and with
the popular Pulpino processor platform on the hardware side, while supporting
interleaved multi-threading for IoT applications. The latter feature is a novel
contribution in this application domain. We report details about the
microarchitecture design along with performance data. | [
1,
0,
0,
0,
0,
0
] |
Title: Optimal Input Placement in Lattice Graphs,
Abstract: The control of dynamical, networked systems continues to receive much
attention across the engineering and scientific research fields. Of particular
interest is the proper way to determine which nodes of the network should
receive external control inputs in order to effectively and efficiently control
portions of the network. Published methods to accomplish this task either find
a minimal set of driver nodes to guarantee controllability or a larger set of
driver nodes which optimizes some control metric. Here, we investigate the
control of lattice systems which provides analytical insight into the
relationship between network structure and controllability. First we derive a
closed form expression for the individual elements of the controllability
Gramian of infinite lattice systems. Second, we focus on nearest neighbor
lattices for which the distance between nodes appears in the expression for the
controllability Gramian. We show that common control energy metrics scale
exponentially with respect to the maximum distance between a driver node and a
target node. | [
1,
0,
0,
0,
0,
0
] |
Title: Construction of constant mean curvature n-noids using the DPW method,
Abstract: We construct constant mean curvature surfaces in euclidean space with genus
zero and n ends asymptotic to Delaunay surfaces using the DPW method. | [
0,
0,
1,
0,
0,
0
] |
Title: Information Retrieval and Recommendation System for Astronomical Observatories,
Abstract: We present a machine learning based information retrieval system for
astronomical observatories that tries to address user defined queries related
to an instrument. In the modern instrumentation scenario where heterogeneous
systems and talents are simultaneously at work, the ability to supply with the
right information helps speeding up the detector maintenance operations.
Enhancing the detector uptime leads to increased coincidence observation and
improves the likelihood for the detection of astrophysical signals. Besides,
such efforts will efficiently disseminate technical knowledge to a wider
audience and will help the ongoing efforts to build upcoming detectors like the
LIGO-India etc even at the design phase to foresee possible challenges. The
proposed method analyses existing documented efforts at the site to
intelligently group together related information to a query and to present it
on-line to the user. The user in response can further go into interesting links
and find already developed solutions or probable ways to address the present
situation optimally. A web application that incorporates the above idea has
been implemented and tested for LIGO Livingston, LIGO Hanford and Virgo
observatories. | [
0,
1,
0,
0,
0,
0
] |
Title: Database Learning: Toward a Database that Becomes Smarter Every Time,
Abstract: In today's databases, previous query answers rarely benefit answering future
queries. For the first time, to the best of our knowledge, we change this
paradigm in an approximate query processing (AQP) context. We make the
following observation: the answer to each query reveals some degree of
knowledge about the answer to another query because their answers stem from the
same underlying distribution that has produced the entire dataset. Exploiting
and refining this knowledge should allow us to answer queries more
analytically, rather than by reading enormous amounts of raw data. Also,
processing more queries should continuously enhance our knowledge of the
underlying distribution, and hence lead to increasingly faster response times
for future queries.
We call this novel idea---learning from past query answers---Database
Learning. We exploit the principle of maximum entropy to produce answers, which
are in expectation guaranteed to be more accurate than existing sample-based
approximations. Empowered by this idea, we build a query engine on top of Spark
SQL, called Verdict. We conduct extensive experiments on real-world query
traces from a large customer of a major database vendor. Our results
demonstrate that Verdict supports 73.7% of these queries, speeding them up by
up to 23.0x for the same accuracy level compared to existing AQP systems. | [
1,
0,
0,
0,
0,
0
] |
Title: Graph Theoretical Models of Closed n-Dimensional Manifolds: Digital Models of a Moebius Strip, a Torus, a Projective Plane a Klein Bottle and n-Dimensional Spheres,
Abstract: In this paper, we show how to construct graph theoretical models of
n-dimensional continuous objects and manifolds. These models retain topological
properties of their continuous counterparts. An LCL collection of n-cells in
Euclidean space is introduced and investigated. If an LCL collection of n-cells
is a cover of a continuous n-dimensional manifold then the intersection graph
of this cover is a digital closed n-dimensional manifold with the same topology
as its continuous counterpart. As an example, we prove that the digital model
of a continuous n-dimensional sphere is a digital n-sphere with at least 2n+2
points, the digital model of a continuous projective plane is a digital
projective plane with at least eleven points, the digital model of a continuous
Klein bottle is the digital Klein bottle with at least sixteen points, the
digital model of a continuous torus is the digital torus with at least sixteen
points and the digital model of a continuous Moebius band is the digital
Moebius band with at least twelve points. | [
1,
0,
1,
0,
0,
0
] |
Title: Completely $p$-primitive binary quadratic forms,
Abstract: Let $f(x,y)=ax^2+bxy+cy^2$ be a binary quadratic form with integer
coefficients. For a prime $p$ not dividing the discriminant of $f$, we say $f$
is completely $p$-primitive if for any non-zero integer $N$, the diophantine
equation $f(x,y)=N$ has always an integer solution $(x,y)=(m,n)$ with
$(m,n,p)=1$ whenever it has an integer solution. In this article, we study
various properties of completely $p$-primitive binary quadratic forms. In
particular, we give a necessary and sufficient condition for a definite binary
quadratic form $f$ to be completely $p$-primitive. | [
0,
0,
1,
0,
0,
0
] |
Title: Analysis of Multivariate Data and Repeated Measures Designs with the R Package MANOVA.RM,
Abstract: The numerical availability of statistical inference methods for a modern and
robust analysis of longitudinal- and multivariate data in factorial experiments
is an essential element in research and education. While existing approaches
that rely on specific distributional assumptions of the data (multivariate
normality and/or characteristic covariance matrices) are implemented in
statistical software packages, there is a need for user-friendly software that
can be used for the analysis of data that do not fulfill the aforementioned
assumptions and provide accurate p-value and confidence interval estimates.
Therefore, newly developed statistical methods for the analysis of repeated
measures designs and multivariate data that neither assume multivariate
normality nor specific covariance matrices have been implemented in the freely
available R-package MANOVA.RM. The package is equipped with a graphical user
interface for plausible applications in academia and other educational purpose.
Several motivating examples illustrate the application of the methods. | [
0,
0,
0,
1,
0,
0
] |
Title: Multiple Illumination Phaseless Super-Resolution (MIPS) with Applications To Phaseless DOA Estimation and Diffraction Imaging,
Abstract: Phaseless super-resolution is the problem of recovering an unknown signal
from measurements of the magnitudes of the low frequency Fourier transform of
the signal. This problem arises in applications where measuring the phase, and
making high-frequency measurements, are either too costly or altogether
infeasible. The problem is especially challenging because it combines the
difficult problems of phase retrieval and classical super-resolution | [
1,
0,
1,
0,
0,
0
] |
Title: Precise measurement of hyperfine structure in the $ \rm {3\,S_{1/2}} $ state of $ \rm{^7Li} $,
Abstract: We report a precise measurement of hyperfine structure in the $ \rm
{3\,S_{1/2}} $ state of the odd isotope of Li, namely $ \rm {^7Li} $. The state
is excited from the ground $ \rm {2\,S_{1/2}} $ state (which has the same
parity) using two single-photon transitions via the intermediate $ \rm
{2\,P_{3/2}} $ state. The value of the hyperfine constant we measure is $ A =
93.095(52)$ MHz, which resolves two discrepant values reported in the
literature measured using other techniques. Our value is also consistent with
theoretical calculations. | [
0,
1,
0,
0,
0,
0
] |
Title: Algebraic models of the Euclidean plane,
Abstract: We introduce a new invariant, the real (logarithmic)-Kodaira dimension, that
allows to distinguish smooth real algebraic surfaces up to birational
diffeomorphism. As an application, we construct infinite families of smooth
rational real algebraic surfaces with trivial homology groups, whose real loci
are diffeomorphic to $\mathbb{R}^2$, but which are pairwise not birationally
diffeomorphic. There are thus infinitely many non-trivial models of the
euclidean plane, contrary to the compact case. | [
0,
0,
1,
0,
0,
0
] |
Title: Decentralization of Multiagent Policies by Learning What to Communicate,
Abstract: Effective communication is required for teams of robots to solve
sophisticated collaborative tasks. In practice it is typical for both the
encoding and semantics of communication to be manually defined by an expert;
this is true regardless of whether the behaviors themselves are bespoke,
optimization based, or learned. We present an agent architecture and training
methodology using neural networks to learn task-oriented communication
semantics based on the example of a communication-unaware expert policy. A
perimeter defense game illustrates the system's ability to handle dynamically
changing numbers of agents and its graceful degradation in performance as
communication constraints are tightened or the expert's observability
assumptions are broken. | [
1,
0,
0,
0,
0,
0
] |
Title: A Theory of Complex Stochastic Systems with Two Types of Counteracting Entities,
Abstract: Many complex systems share two characteristics: 1) they are stochastic in
nature, and 2) they are characterized by a large number of factors. At the same
time, various natural complex systems appear to have two types of intertwined
constituents that exhibit counteracting effects on their equilibrium. In this
study, we employ these few characteristics to lay the groundwork for analyzing
such complex systems. The equilibrium point of these systems is generally
studied either through the kinetic notion of equilibrium or its energetic
notion, but not both. We postulate that these systems attempt to regulate the
state vector of their constituents such that both the kinetic and the energetic
notions of equilibrium are met. Based on this postulate, we prove: 1) the
existence of a point such that the kinetic notion of equilibrium is met for the
less abundant constituents and, at the same time, the state vector of more
abundant entities is regulated to minimize the energetic notion of equilibrium;
2) the effect of unboundedly increasing less (more) abundant constituents
stabilizes (destabilizes) the system; and 3) the (unrestricted) equilibrium of
the system is the point at which the number of stabilizing and destabilizing
entities increase unboundedly with the same rate. | [
0,
1,
0,
0,
0,
0
] |
Title: Stability of the Poincaré bundle,
Abstract: Let X be an irreducible smooth projective curve, of genus at least two, over
an algebraically closed field k. Let $\mathcal{M}^d_G$ denote the moduli stack
of principal G-bundles over X of fixed topological type $d \in \pi_1(G)$, where
G is any almost simple affine algebraic group over k. We prove that the
universal bundle over $X \times \mathcal{M}^d_G$ is stable with respect to any
polarization on $X \times \mathcal{M}^d_G$. A similar result is proved for the
Poincaré adjoint bundle over $X \times M_G^{d, rs}$, where $M_G^{d, rs}$ is
the coarse moduli space of regularly stable principal G-bundles over X of fixed
topological type d. | [
0,
0,
1,
0,
0,
0
] |
Title: Morse geodesics in torsion groups,
Abstract: In this paper we exhibit Morse geodesics, often called "hyperbolic
directions", in infinite unbounded torsion groups. The groups studied are
lacunary hyperbolic groups and constructed using graded small cancellation
conditions. In all previously known examples, Morse geodesics were found in
groups which also contained Morse elements, infinite order elements whose
cyclic subgroup gives a Morse quasi-geodesic. Our result presents the first
example of a group which contains Morse geodesics but no Morse elements. In
fact, we show that there is an isometrically embedded $7$-regular tree inside
such groups where every infinite, simple path is a Morse geodesic. | [
0,
0,
1,
0,
0,
0
] |
Title: Global and local thermometry schemes in coupled quantum systems,
Abstract: We study the ultimate bounds on the estimation of temperature for an
interacting quantum system. We consider two coupled bosonic modes that are
assumed to be thermal and using quantum estimation theory establish the role
the Hamiltonian parameters play in thermometry. We show that in the case of a
conserved particle number the interaction between the modes leads to a decrease
in the overall sensitivity to temperature, while interestingly, if particle
exchange is allowed with the thermal bath the converse is true. We explain this
dichotomy by examining the energy spectra. Finally, we devise experimentally
implementable thermometry schemes that rely only on locally accessible
information from the total system, showing that almost Heisenberg limited
precision can still be achieved, and we address the (im)possibility for
multiparameter estimation in the system. | [
0,
1,
0,
0,
0,
0
] |
Title: The statistical significance filter leads to overconfident expectations of replicability,
Abstract: We show that publishing results using the statistical significance
filter---publishing only when the p-value is less than 0.05---leads to a
vicious cycle of overoptimistic expectation of the replicability of results.
First, we show analytically that when true statistical power is relatively low,
computing power based on statistically significant results will lead to
overestimates of power. Then, we present a case study using 10 experimental
comparisons drawn from a recently published meta-analysis in psycholinguistics
(Jäger et al., 2017). We show that the statistically significant results
yield an illusion of replicability. This illusion holds even if the researcher
doesn't conduct any formal power analysis but just uses statistical
significance to informally assess robustness (i.e., replicability) of results. | [
0,
0,
1,
1,
0,
0
] |
Title: Simulating and Reconstructing Neurodynamics with Epsilon-Automata Applied to Electroencephalography (EEG) Microstate Sequences,
Abstract: We introduce new techniques to the analysis of neural spatiotemporal dynamics
via applying $\epsilon$-machine reconstruction to electroencephalography (EEG)
microstate sequences. Microstates are short duration quasi-stable states of the
dynamically changing electrical field topographies recorded via an array of
electrodes from the human scalp, and cluster into four canonical classes. The
sequence of microstates observed under particular conditions can be considered
an information source with unknown underlying structure. $\epsilon$-machines
are discrete dynamical system automata with state-dependent probabilities on
different future observations (in this case the next measured EEG microstate).
They artificially reproduce underlying structure in an optimally predictive
manner as generative models exhibiting dynamics emulating the behaviour of the
source. Here we present experiments using both simulations and empirical data
supporting the value of associating these discrete dynamical systems with
mental states (e.g. mind-wandering, focused attention, etc.) and with clinical
populations. The neurodynamics of mental states and clinical populations can
then be further characterized by properties of these dynamical systems,
including: i) statistical complexity (determined by the number of states of the
corresponding $\epsilon$-automaton); ii) entropy rate; iii) characteristic
sequence patterning (syntax, probabilistic grammars); iv) duration, persistence
and stability of dynamical patterns; and v) algebraic measures such as
Krohn-Rhodes complexity or holonomy length of the decompositions of these. The
potential applications include the characterization of mental states in
neurodynamic terms for mental health diagnostics, well-being interventions,
human-machine interface, and others on both subject-specific and
group/population-level. | [
1,
1,
0,
0,
0,
0
] |
Title: The LCES HIRES/Keck Precision Radial Velocity Exoplanet Survey,
Abstract: We describe a 20-year survey carried out by the Lick-Carnegie Exoplanet
Survey Team (LCES), using precision radial velocities from HIRES on the Keck-I
telescope to find and characterize extrasolar planetary systems orbiting nearby
F, G, K, and M dwarf stars. We provide here 60,949 precision radial velocities
for 1,624 stars contained in that survey. We tabulate a list of 357 significant
periodic signals that are of constant period and phase, and not coincident in
period and/or phase with stellar activity indices. These signals are thus
strongly suggestive of barycentric reflex motion of the star induced by one or
more candidate exoplanets in Keplerian motion about the host star. Of these
signals, 225 have already been published as planet claims, 60 are classified as
significant unpublished planet candidates that await photometric follow-up to
rule out activity-related causes, and 54 are also unpublished, but are
classified as "significant" signals that require confirmation by additional
data before rising to classification as planet candidates. Of particular
interest is our detection of a candidate planet with a minimum mass of 3.9
Earth masses and an orbital period of 9.9 days orbiting Lalande 21185, the
fourth-closest main sequence star to the Sun. For each of our exoplanetary
candidate signals, we provide the period and semi-amplitude of the Keplerian
orbital fit, and a likelihood ratio estimate of its statistical significance.
We also tabulate 18 Keplerian-like signals that we classify as likely arising
from stellar activity. | [
0,
1,
0,
0,
0,
0
] |
Title: Artificial Intelligence Based Malware Analysis,
Abstract: Artificial intelligence methods have often been applied to perform specific
functions or tasks in the cyber-defense realm. However, as adversary methods
become more complex and difficult to divine, piecemeal efforts to understand
cyber-attacks, and malware-based attacks in particular, are not providing
sufficient means for malware analysts to understand the past, present and
future characteristics of malware.
In this paper, we present the Malware Analysis and Attributed using Genetic
Information (MAAGI) system. The underlying idea behind the MAAGI system is that
there are strong similarities between malware behavior and biological organism
behavior, and applying biologically inspired methods to corpora of malware can
help analysts better understand the ecosystem of malware attacks. Due to the
sophistication of the malware and the analysis, the MAAGI system relies heavily
on artificial intelligence techniques to provide this capability. It has
already yielded promising results over its development life, and will hopefully
inspire more integration between the artificial intelligence and cyber--defense
communities. | [
1,
0,
0,
0,
0,
0
] |
Title: A New Achievable Rate Region for Multiple-Access Channel with States,
Abstract: The problem of reliable communication over the multiple-access channel (MAC)
with states is investigated. We propose a new coding scheme for this problem
which uses quasi-group codes (QGC). We derive a new computable single-letter
characterization of the achievable rate region. As an example, we investigate
the problem of doubly-dirty MAC with modulo-$4$ addition. It is shown that the
sum-rate $R_1+R_2=1$ bits per channel use is achievable using the new scheme.
Whereas, the natural extension of the Gel'fand-Pinsker scheme, sum-rates
greater than $0.32$ are not achievable. | [
1,
0,
0,
0,
0,
0
] |
Title: Analytic heating rate of neutron star merger ejecta derived from Fermi's theory of beta decay,
Abstract: Macronovae (kilonovae) that arise in binary neutron star mergers are powered
by radioactive beta decay of hundreds of $r$-process nuclides. We derive, using
Fermi's theory of beta decay, an analytic estimate of the nuclear heating rate.
We show that the heating rate evolves as a power law ranging between $t^{-6/5}$
to $t^{-4/3}$. The overall magnitude of the heating rate is determined by the
mean values of nuclear quantities, e.g., the nuclear matrix elements of beta
decay. These values are specified by using nuclear experimental data. We
discuss the role of higher order beta transitions and the robustness of the
power law. The robust and simple form of the heating rate suggests that
observations of the late-time bolometric light curve $\propto t^{-\frac{4}{3}}$
would be a direct evidence of a $r$-process driven macronova. Such observations
could also enable us to estimate the total amount of $r$-process nuclei
produced in the merger. | [
0,
1,
0,
0,
0,
0
] |
Title: On well-posedness of a velocity-vorticity formulation of the Navier-Stokes equations with no-slip boundary conditions,
Abstract: We study well-posedness of a velocity-vorticity formulation of the
Navier--Stokes equations, supplemented with no-slip velocity boundary
conditions, a no-penetration vorticity boundary condition, along with a natural
vorticity boundary condition depending on a pressure functional. In the
stationary case we prove existence and uniqueness of a suitable weak solution
to the system under a small data condition. The topic of the paper is driven by
recent developments of vorticity based numerical methods for the Navier--Stokes
equations. | [
0,
0,
1,
0,
0,
0
] |
Title: Generative Adversarial Networks for Electronic Health Records: A Framework for Exploring and Evaluating Methods for Predicting Drug-Induced Laboratory Test Trajectories,
Abstract: Generative Adversarial Networks (GANs) represent a promising class of
generative networks that combine neural networks with game theory. From
generating realistic images and videos to assisting musical creation, GANs are
transforming many fields of arts and sciences. However, their application to
healthcare has not been fully realized, more specifically in generating
electronic health records (EHR) data. In this paper, we propose a framework for
exploring the value of GANs in the context of continuous laboratory time series
data. We devise an unsupervised evaluation method that measures the predictive
power of synthetic laboratory test time series. Further, we show that when it
comes to predicting the impact of drug exposure on laboratory test data,
incorporating representation learning of the training cohorts prior to training
GAN models is beneficial. | [
1,
0,
0,
1,
0,
0
] |
Title: Properties of Kinetic Transition Networks for Atomic Clusters and Glassy Solids,
Abstract: A database of minima and transition states corresponds to a network where the
minima represent nodes and the transition states correspond to edges between
the pairs of minima they connect via steepest-descent paths. Here we construct
networks for small clusters bound by the Morse potential for a selection of
physically relevant parameters, in two and three dimensions. The properties of
these unweighted and undirected networks are analysed to examine two features:
whether they are small-world, where the shortest path between nodes involves
only a small number or edges; and whether they are scale-free, having a degree
distribution that follows a power law. Small-world character is present, but
statistical tests show that a power law is not a good fit, so the networks are
not scale-free. These results for clusters are compared with the corresponding
properties for the molecular and atomic structural glass formers
ortho-terphenyl and binary Lennard-Jones. These glassy systems do not show
small-world properties, suggesting that such behaviour is linked to the
structure-seeking landscapes of the Morse clusters. | [
0,
1,
0,
1,
0,
0
] |
Title: Tube Convolutional Neural Network (T-CNN) for Action Detection in Videos,
Abstract: Deep learning has been demonstrated to achieve excellent results for image
classification and object detection. However, the impact of deep learning on
video analysis (e.g. action detection and recognition) has been limited due to
complexity of video data and lack of annotations. Previous convolutional neural
networks (CNN) based video action detection approaches usually consist of two
major steps: frame-level action proposal detection and association of proposals
across frames. Also, these methods employ two-stream CNN framework to handle
spatial and temporal feature separately. In this paper, we propose an
end-to-end deep network called Tube Convolutional Neural Network (T-CNN) for
action detection in videos. The proposed architecture is a unified network that
is able to recognize and localize action based on 3D convolution features. A
video is first divided into equal length clips and for each clip a set of tube
proposals are generated next based on 3D Convolutional Network (ConvNet)
features. Finally, the tube proposals of different clips are linked together
employing network flow and spatio-temporal action detection is performed using
these linked video proposals. Extensive experiments on several video datasets
demonstrate the superior performance of T-CNN for classifying and localizing
actions in both trimmed and untrimmed videos compared to state-of-the-arts. | [
1,
0,
0,
0,
0,
0
] |
Title: Expropriations, Property Confiscations and New Offshore Entities: Evidence from the Panama Papers,
Abstract: Using the Panama Papers, we show that the beginning of media reporting on
expropriations and property confiscations in a country increases the
probability that offshore entities are incorporated by agents from the same
country in the same month. This result is robust to the use of country-year
fixed effects and the exclusion of tax havens. Further analysis shows that the
effect is driven by countries with non-corrupt and effective governments, which
supports the notion that offshore entities are incorporated when reasonably
well-intended and well-functioning governments become more serious about
fighting organized crime by confiscating proceeds of crime. | [
0,
0,
0,
0,
0,
1
] |
Title: Concave Flow on Small Depth Directed Networks,
Abstract: Small depth networks arise in a variety of network related applications,
often in the form of maximum flow and maximum weighted matching. Recent works
have generalized such methods to include costs arising from concave functions.
In this paper we give an algorithm that takes a depth $D$ network and strictly
increasing concave weight functions of flows on the edges and computes a $(1 -
\epsilon)$-approximation to the maximum weight flow in time $mD \epsilon^{-1}$
times an overhead that is logarithmic in the various numerical parameters
related to the magnitudes of gradients and capacities.
Our approach is based on extending the scaling algorithm for approximate
maximum weighted matchings by [Duan-Pettie JACM`14] to the setting of small
depth networks, and then generalizing it to concave functions. In this more
restricted setting of linear weights in the range $[w_{\min}, w_{\max}]$, it
produces a $(1 - \epsilon)$-approximation in time $O(mD \epsilon^{-1} \log(
w_{\max} /w_{\min}))$. The algorithm combines a variety of tools and provides a
unified approach towards several problems involving small depth networks. | [
1,
0,
0,
0,
0,
0
] |
Title: A supernova at 50 pc: Effects on the Earth's atmosphere and biota,
Abstract: Recent 60Fe results have suggested that the estimated distances of supernovae
in the last few million years should be reduced from 100 pc to 50 pc. Two
events or series of events are suggested, one about 2.7 million years to 1.7
million years ago, and another may at 6.5 to 8.7 million years ago. We ask what
effects such supernovae are expected to have on the terrestrial atmosphere and
biota. Assuming that the Local Bubble was formed before the event being
considered, and that the supernova and the Earth were both inside a weak,
disordered magnetic field at that time, TeV-PeV cosmic rays at Earth will
increase by a factor of a few hundred. Tropospheric ionization will increase
proportionately, and the overall muon radiation load on terrestrial organisms
will increase by a factor of 150. All return to pre-burst levels within 10kyr.
In the case of an ordered magnetic field, effects depend strongly on the field
orientation. The upper bound in this case is with a largely coherent field
aligned along the line of sight to the supernova, in which case TeV-PeV cosmic
ray flux increases are 10^4; in the case of a transverse field they are below
current levels. We suggest a substantial increase in the extended effects of
supernovae on Earth and in the lethal distance estimate; more work is
needed.This paper is an explicit followup to Thomas et al. (2016). We also here
provide more detail on the computational procedures used in both works. | [
0,
1,
0,
0,
0,
0
] |
Title: Plugo: a VLC Systematic Perspective of Large-scale Indoor Localization,
Abstract: Indoor localization based on Visible Light Communication (VLC) has been in
favor with both the academia and industry for years. In this paper, we present
a prototyping photodiode-based VLC system towards large-scale localization.
Specially, we give in-depth analysis of the design constraints and
considerations for large-scale indoor localization research. After that we
identify the key enablers for such systems: 1) distributed architecture, 2)
one-way communication, and 3) random multiple access. Accordingly, we propose
Plugo -- a photodiode-based VLC system conforming to the aforementioned
criteria. We present a compact design of the VLC-compatible LED bulbs featuring
plug-and-go use-cases. The basic framed slotted Additive Links On-line Hawaii
Area (ALOHA) is exploited to achieve random multiple access over the shared
optical medium. We show its effectiveness in beacon broadcasting by
experiments, and further demonstrate its scalability to large-scale scenarios
through simulations. Finally, preliminary localization experiments are
conducted using fingerprinting-based methods in a customized testbed, achieving
an average accuracy of 0.14 m along with a 90-percentile accuracy of 0.33 m. | [
1,
0,
0,
0,
0,
0
] |
Title: Deep Convolutional Networks as shallow Gaussian Processes,
Abstract: We show that the output of a (residual) convolutional neural network (CNN)
with an appropriate prior over the weights and biases is a Gaussian process
(GP) in the limit of infinitely many convolutional filters, extending similar
results for dense networks. For a CNN, the equivalent kernel can be computed
exactly and, unlike "deep kernels", has very few parameters: only the
hyperparameters of the original CNN. Further, we show that this kernel has two
properties that allow it to be computed efficiently; the cost of evaluating the
kernel for a pair of images is similar to a single forward pass through the
original CNN with only one filter per layer. The kernel equivalent to a
32-layer ResNet obtains 0.84% classification error on MNIST, a new record for
GPs with a comparable number of parameters. | [
0,
0,
0,
1,
0,
0
] |
Title: "i have a feeling trump will win..................": Forecasting Winners and Losers from User Predictions on Twitter,
Abstract: Social media users often make explicit predictions about upcoming events.
Such statements vary in the degree of certainty the author expresses toward the
outcome:"Leonardo DiCaprio will win Best Actor" vs. "Leonardo DiCaprio may win"
or "No way Leonardo wins!". Can popular beliefs on social media predict who
will win? To answer this question, we build a corpus of tweets annotated for
veridicality on which we train a log-linear classifier that detects positive
veridicality with high precision. We then forecast uncertain outcomes using the
wisdom of crowds, by aggregating users' explicit predictions. Our method for
forecasting winners is fully automated, relying only on a set of contenders as
input. It requires no training data of past outcomes and outperforms sentiment
and tweet volume baselines on a broad range of contest prediction tasks. We
further demonstrate how our approach can be used to measure the reliability of
individual accounts' predictions and retrospectively identify surprise
outcomes. | [
1,
0,
0,
0,
0,
0
] |
Title: Low energy bands and transport properties of chromium arsenide,
Abstract: We apply a method that combines the tight-binding approximation and the
Lowdin down-folding procedure to evaluate the electronic band structure of the
newly discovered pressure-induced superconductor CrAs. By integrating out all
low-lying arsenic degrees of freedom, we derive an effective Hamiltonian model
describing the Cr d bands near the Fermi level. We calculate and make
predictions for the energy spectra, the Fermi surface, the density of states
and transport and magnetic properties of this compound. Our results are
consistent with local-density approximation calculations as well as they show
good agreement with available experimental data for resistivity and Cr magnetic
moment. | [
0,
1,
0,
0,
0,
0
] |
Title: High Dynamic Range Imaging Technology,
Abstract: In this lecture note, we describe high dynamic range (HDR) imaging systems;
such systems are able to represent luminances of much larger brightness and,
typically, also a larger range of colors than conventional standard dynamic
range (SDR) imaging systems. The larger luminance range greatly improve the
overall quality of visual content, making it appears much more realistic and
appealing to observers. HDR is one of the key technologies of the future
imaging pipeline, which will change the way the digital visual content is
represented and manipulated today. | [
1,
0,
0,
0,
0,
0
] |
Title: Classification of pro-$p$ PD$^2$ pairs and the pro-$p$ curve complex,
Abstract: We classify pro-$p$ Poincaré duality pairs in dimension two. We then use
this classification to build a pro-$p$ analogue of the curve complex and
establish its basic properties. We conclude with some statements concerning
separability properties of the mapping class group. | [
0,
0,
1,
0,
0,
0
] |
Title: Recursive Multikernel Filters Exploiting Nonlinear Temporal Structure,
Abstract: In kernel methods, temporal information on the data is commonly included by
using time-delayed embeddings as inputs. Recently, an alternative formulation
was proposed by defining a gamma-filter explicitly in a reproducing kernel
Hilbert space, giving rise to a complex model where multiple kernels operate on
different temporal combinations of the input signal. In the original
formulation, the kernels are then simply combined to obtain a single kernel
matrix (for instance by averaging), which provides computational benefits but
discards important information on the temporal structure of the signal.
Inspired by works on multiple kernel learning, we overcome this drawback by
considering the different kernels separately. We propose an efficient strategy
to adaptively combine and select these kernels during the training phase. The
resulting batch and online algorithms automatically learn to process highly
nonlinear temporal information extracted from the input signal, which is
implicitly encoded in the kernel values. We evaluate our proposal on several
artificial and real tasks, showing that it can outperform classical approaches
both in batch and online settings. | [
1,
0,
0,
1,
0,
0
] |
Title: On bifibrations of model categories,
Abstract: In this article, we develop a notion of Quillen bifibration which combines
the two notions of Grothendieck bifibration and of Quillen model structure. In
particular, given a bifibration $p:\mathcal E\to\mathcal B$, we describe when a
family of model structures on the fibers $\mathcal E_A$ and on the basis
category $\mathcal B$ combines into a model structure on the total category
$\mathcal E$, such that the functor $p$ preserves cofibrations, fibrations and
weak equivalences. Using this Grothendieck construction for model structures,
we revisit the traditional definition of Reedy model structures, and possible
generalizations, and exhibit their bifibrational nature. | [
1,
0,
1,
0,
0,
0
] |
Title: Deep Learning Sparse Ternary Projections for Compressed Sensing of Images,
Abstract: Compressed sensing (CS) is a sampling theory that allows reconstruction of
sparse (or compressible) signals from an incomplete number of measurements,
using of a sensing mechanism implemented by an appropriate projection matrix.
The CS theory is based on random Gaussian projection matrices, which satisfy
recovery guarantees with high probability; however, sparse ternary {0, -1, +1}
projections are more suitable for hardware implementation. In this paper, we
present a deep learning approach to obtain very sparse ternary projections for
compressed sensing. Our deep learning architecture jointly learns a pair of a
projection matrix and a reconstruction operator in an end-to-end fashion. The
experimental results on real images demonstrate the effectiveness of the
proposed approach compared to state-of-the-art methods, with significant
advantage in terms of complexity. | [
1,
0,
0,
1,
0,
0
] |
Title: Learning a Predictive Model for Music Using PULSE,
Abstract: Predictive models for music are studied by researchers of algorithmic
composition, the cognitive sciences and machine learning. They serve as base
models for composition, can simulate human prediction and provide a
multidisciplinary application domain for learning algorithms. A particularly
well established and constantly advanced subtask is the prediction of
monophonic melodies. As melodies typically involve non-Markovian dependencies
their prediction requires a capable learning algorithm. In this thesis, I apply
the recent feature discovery and learning method PULSE to the realm of symbolic
music modeling. PULSE is comprised of a feature generating operation and
L1-regularized optimization. These are used to iteratively expand and cull the
feature set, effectively exploring feature spaces that are too large for common
feature selection approaches. I design a general Python framework for PULSE,
propose task-optimized feature generating operations and various
music-theoretically motivated features that are evaluated on a standard corpus
of monophonic folk and chorale melodies. The proposed method significantly
outperforms comparable state-of-the-art models. I further discuss the free
parameters of the learning algorithm and analyze the feature composition of the
learned models. The models learned by PULSE afford an easy inspection and are
musicologically interpreted for the first time. | [
1,
0,
0,
0,
0,
0
] |
Title: Learning Nonlinear Brain Dynamics: van der Pol Meets LSTM,
Abstract: Many real-world data sets, especially in biology, are produced by highly
multivariate and nonlinear complex dynamical systems. In this paper, we focus
on brain imaging data, including both calcium imaging and functional MRI data.
Standard vector-autoregressive models are limited by their linearity
assumptions, while nonlinear general-purpose, large-scale temporal models, such
as LSTM networks, typically require large amounts of training data, not always
readily available in biological applications; furthermore, such models have
limited interpretability. We introduce here a novel approach for learning a
nonlinear differential equation model aimed at capturing brain dynamics.
Specifically, we propose a variable-projection optimization approach to
estimate the parameters of the multivariate (coupled) van der Pol oscillator,
and demonstrate that such a model can accurately represent nonlinear dynamics
of the brain data. Furthermore, in order to improve the predictive accuracy
when forecasting future brain-activity time series, we use this analytical
model as an unlimited source of simulated data for pretraining LSTM; such
model-specific data augmentation approach consistently improves LSTM
performance on both calcium and fMRI imaging data. | [
0,
0,
0,
1,
1,
0
] |
Title: Abstract Interpretation with Unfoldings,
Abstract: We present and evaluate a technique for computing path-sensitive interference
conditions during abstract interpretation of concurrent programs. In lieu of
fixed point computation, we use prime event structures to compactly represent
causal dependence and interference between sequences of transformers. Our main
contribution is an unfolding algorithm that uses a new notion of independence
to avoid redundant transformer application, thread-local fixed points to reduce
the size of the unfolding, and a novel cutoff criterion based on subsumption to
guarantee termination of the analysis. Our experiments show that the abstract
unfolding produces an order of magnitude fewer false alarms than a mature
abstract interpreter, while being several orders of magnitude faster than
solver-based tools that have the same precision. | [
1,
0,
0,
0,
0,
0
] |
Title: Perturbation theory for cosmologies with non-linear structure,
Abstract: The next generation of cosmological surveys will operate over unprecedented
scales, and will therefore provide exciting new opportunities for testing
general relativity. The standard method for modelling the structures that these
surveys will observe is to use cosmological perturbation theory for linear
structures on horizon-sized scales, and Newtonian gravity for non-linear
structures on much smaller scales. We propose a two-parameter formalism that
generalizes this approach, thereby allowing interactions between large and
small scales to be studied in a self-consistent and well-defined way. This uses
both post-Newtonian gravity and cosmological perturbation theory, and can be
used to model realistic cosmological scenarios including matter, radiation and
a cosmological constant. We find that the resulting field equations can be
written as a hierarchical set of perturbation equations. At leading-order,
these equations allow us to recover a standard set of Friedmann equations, as
well as a Newton-Poisson equation for the inhomogeneous part of the Newtonian
energy density in an expanding background. For the perturbations in the
large-scale cosmology, however, we find that the field equations are sourced by
both non-linear and mode-mixing terms, due to the existence of small-scale
structures. These extra terms should be expected to give rise to new
gravitational effects, through the mixing of gravitational modes on small and
large scales - effects that are beyond the scope of standard linear
cosmological perturbation theory. We expect our formalism to be useful for
accurately modelling gravitational physics in universes that contain non-linear
structures, and for investigating the effects of non-linear gravity in the era
of ultra-large-scale surveys. | [
0,
1,
0,
0,
0,
0
] |
Title: Phase Synchronization on Spacially Embeded Duplex Networks with Total Cost Constraint,
Abstract: Synchronization on multiplex networks have attracted increasing attention in
the past few years. We investigate collective behaviors of Kuramoto oscillators
on single layer and duplex spacial networks with total cost restriction, which
was introduced by Li et. al [Li G., Reis S. D., Moreira A. A., Havlin S.,
Stanley H. E. and Jr A. J., {\it Phys. Rev. Lett.} 104, 018701 (2010)] and
termed as the Li network afterwards. In the Li network model, with the increase
of its spacial exponent, the network's structure will vary from the random type
to the small-world one, and finally to the regular lattice.We first explore how
the spacial exponent influences the synchronizability of Kuramoto oscillators
on single layer Li networks and find that the closer the Li network is to a
regular lattice, the more difficult for it to evolve into synchronization. Then
we investigate synchronizability of duplex Li networks and find that the
existence of inter-layer interaction can greatly enhance inter-layer and global
synchronizability. When the inter-layer coupling strength is larger than a
certain critical value, whatever the intra-layer coupling strength is, the
inter-layer synchronization will always occur. Furthermore, on single layer Li
networks, nodes with larger degrees more easily reach global synchronization,
while on duplex Li networks, this phenomenon becomes much less obvious.
Finally, we study the impact of inter-link density on global synchronization
and obtain that sparse inter-links can lead to the emergence of global
synchronization for duplex Li networks just as dense inter-links do. In a word,
inter-layer interaction plays a vital role in determining synchronizability for
duplex spacial networks with total cost constraint. | [
0,
1,
0,
0,
0,
0
] |
Title: Neutral Carbon Emission in luminous infrared galaxies The \CI\ Lines as Total Molecular Gas Tracers,
Abstract: We present a statistical study on the [C I]($^{3} \rm P_{1} \rightarrow {\rm
^3 P}_{0}$), [C I] ($^{3} \rm P_{2} \rightarrow {\rm ^3 P}_{1}$) lines
(hereafter [C I] (1$-$0) and [C I] (2$-$1), respectively) and the CO (1$-$0)
line for a sample of (ultra)luminous infrared galaxies [(U)LIRGs]. We explore
the correlations between the luminosities of CO (1$-$0) and [C I] lines, and
find that $L'_\mathrm{CO(1-0)}$ correlates almost linearly with both $L'_
\mathrm{[CI](1-0)}$ and $L'_\mathrm{[CI](2-1)}$, suggesting that [C I] lines
can trace total molecular gas mass at least for (U)LIRGs. We also investigate
the dependence of $L'_\mathrm{[CI](1-0)}$/$L'_\mathrm{CO(1-0)}$,
$L'_\mathrm{[CI](2-1)}$/$L'_\mathrm{CO(1-0)}$ and
$L'_\mathrm{[CI](2-1)}$/$L'_\mathrm{[CI](1-0)}$ on the far-infrared color of
60-to-100 $\mu$m, and find non-correlation, a weak correlation and a modest
correlation, respectively. Under the assumption that these two carbon
transitions are optically thin, we further calculate the [C I] line excitation
temperatures, atomic carbon masses, and the mean [C I] line flux-to-H$_2$ mass
conversion factors for our sample. The resulting $\mathrm{H_2}$ masses using
these [C I]-based conversion factors roughly agree with those derived from
$L'_\mathrm{CO(1-0)}$ and CO-to-H$_2$ conversion factor. | [
0,
1,
0,
0,
0,
0
] |
Title: Composition Factors of Tensor Products of Symmetric Powers,
Abstract: We determine the composition factors of the tensor product $S(E)\otimes S(E)$
of two copies of the symmetric algebra of the natural module $E$ of a general
linear group over an algebraically closed field of positive characteristic. Our
main result may be regarded as a substantial generalisation of the tensor
product theorem of Krop and Sullivan, on composition factors of $S(E)$. We
earlier answered the question of which polynomially injective modules are
infinitesimally injective in terms of the "divisibility index". We are now able
to give an explicit description of the divisibility index for polynomial
modules for general linear groups of degree at most $3$. | [
0,
0,
1,
0,
0,
0
] |
Title: Attention-Based Guided Structured Sparsity of Deep Neural Networks,
Abstract: Network pruning is aimed at imposing sparsity in a neural network
architecture by increasing the portion of zero-valued weights for reducing its
size regarding energy-efficiency consideration and increasing evaluation speed.
In most of the conducted research efforts, the sparsity is enforced for network
pruning without any attention to the internal network characteristics such as
unbalanced outputs of the neurons or more specifically the distribution of the
weights and outputs of the neurons. That may cause severe accuracy drop due to
uncontrolled sparsity. In this work, we propose an attention mechanism that
simultaneously controls the sparsity intensity and supervised network pruning
by keeping important information bottlenecks of the network to be active. On
CIFAR-10, the proposed method outperforms the best baseline method by 6% and
reduced the accuracy drop by 2.6x at the same level of sparsity. | [
0,
0,
0,
1,
0,
0
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.