text
stringlengths 57
2.88k
| labels
sequencelengths 6
6
|
---|---|
Title: A Graph Model with Indirect Co-location Links,
Abstract: Graph models are widely used to analyse diffusion processes embedded in
social contacts and to develop applications. A range of graph models are
available to replicate the underlying social structures and dynamics
realistically. However, most of the current graph models can only consider
concurrent interactions among individuals in the co-located interaction
networks. However, they do not account for indirect interactions that can
transmit spreading items to individuals who visit the same locations at
different times but within a certain time limit. The diffusion phenomena
occurring through direct and indirect interactions is called same place
different time (SPDT) diffusion. This paper introduces a model to synthesize
co-located interaction graphs capturing both direct interactions, where
individuals meet at a location, and indirect interactions, where individuals
visit the same location at different times within a set timeframe. We analyze
60 million location updates made by 2 million users from a social networking
application to characterize the graph properties, including the space-time
correlations and its time evolving characteristics, such as bursty or ongoing
behaviors. The generated synthetic graph reproduces diffusion dynamics of a
realistic contact graph, and reduces the prediction error by up to 82% when
compare to other contact graph models demonstrating its potential for
forecasting epidemic spread. | [
1,
0,
0,
0,
0,
0
] |
Title: Homogenization of nonlinear elliptic systems in nonreflexive Musielak-Orlicz spaces,
Abstract: We study the homogenization process for families of strongly nonlinear
elliptic systems with the homogeneous Dirichlet boundary conditions. The growth
and the coercivity of the elliptic operator is assumed to be indicated by a
general inhomogeneous anisotropic $N-$function, which may be possibly also
dependent on the spatial variable, i.e., the homogenization process will change
the characteristic function spaces at each step. Such a problem is well known
and there exists many positive results for the function satisfying $\Delta_2$
and $\nabla_2$ conditions an being in addition Hölder continuous with
respect to the spatial variable. We shall show that cases these conditions can
be neglected and will deal with a rather general problem in general function
space setting. | [
0,
0,
1,
0,
0,
0
] |
Title: A Generalization of Permanent Inequalities and Applications in Counting and Optimization,
Abstract: A polynomial $p\in\mathbb{R}[z_1,\dots,z_n]$ is real stable if it has no
roots in the upper-half complex plane. Gurvits's permanent inequality gives a
lower bound on the coefficient of the $z_1z_2\dots z_n$ monomial of a real
stable polynomial $p$ with nonnegative coefficients. This fundamental
inequality has been used to attack several counting and optimization problems.
Here, we study a more general question: Given a stable multilinear polynomial
$p$ with nonnegative coefficients and a set of monomials $S$, we show that if
the polynomial obtained by summing up all monomials in $S$ is real stable, then
we can lowerbound the sum of coefficients of monomials of $p$ that are in $S$.
We also prove generalizations of this theorem to (real stable) polynomials that
are not multilinear. We use our theorem to give a new proof of Schrijver's
inequality on the number of perfect matchings of a regular bipartite graph,
generalize a recent result of Nikolov and Singh, and give deterministic
polynomial time approximation algorithms for several counting problems. | [
1,
0,
1,
0,
0,
0
] |
Title: H-infinity Filtering for Cloud-Aided Semi-active Suspension with Delayed Information,
Abstract: This chapter presents an H-infinity filtering framework for cloud-aided
semiactive suspension system with time-varying delays. In this system, road
profile information is downloaded from a cloud database to facilitate onboard
estimation of suspension states. Time-varying data transmission delays are
considered and assumed to be bounded. A quarter-car linear suspension model is
used and an H-infinity filter is designed with both onboard sensor measurements
and delayed road profile information from the cloud. The filter design
procedure is designed based on linear matrix inequalities (LMIs). Numerical
simulation results are reported that illustrates the fusion of cloud-based and
on-board information that can be achieved in Vehicleto- Cloud-to-Vehicle
(V2C2V) implementation. | [
1,
0,
0,
0,
0,
0
] |
Title: Deep Spatio-Temporal Random Fields for Efficient Video Segmentation,
Abstract: In this work we introduce a time- and memory-efficient method for structured
prediction that couples neuron decisions across both space at time. We show
that we are able to perform exact and efficient inference on a densely
connected spatio-temporal graph by capitalizing on recent advances on deep
Gaussian Conditional Random Fields (GCRFs). Our method, called VideoGCRF is (a)
efficient, (b) has a unique global minimum, and (c) can be trained end-to-end
alongside contemporary deep networks for video understanding. We experiment
with multiple connectivity patterns in the temporal domain, and present
empirical improvements over strong baselines on the tasks of both semantic and
instance segmentation of videos. | [
0,
0,
0,
1,
0,
0
] |
Title: A Coherent vorticity preserving eddy viscosity correction for Large-Eddy Simulation,
Abstract: This paper introduces a new approach to Large-Eddy Simulation (LES) where
subgrid-scale (SGS) dissipation is applied proportionally to the degree of
local spectral broadening, hence mitigated or deactivated in regions dominated
by large-scale and/or laminar vortical motion. The proposed Coherent vorticity
preserving (CvP) LES methodology is based on the evaluation of the ratio of the
test-filtered to resolved (or grid-filtered) enstrophy $\sigma$. Values of
$\sigma$ close to 1 indicate low sub-test-filter turbulent activity, justifying
local deactivation of the SGS dissipation. The intensity of the SGS dissipation
is progressively increased for $\sigma < 1$ which corresponds to a small-scale
spectral broadening. The SGS dissipation is then fully activated in developed
turbulence characterized by $\sigma \le \sigma_{eq}$, where the value
$\sigma_{eq}$ is derived assuming a Kolmogorov spectrum. The proposed approach
can be applied to any eddy-viscosity model, is algorithmically simple and
computationally inexpensive. LES of Taylor-Green vortex breakdown demonstrates
that the CvP methodology improves the performance of traditional, non-dynamic
dissipative SGS models, capturing the peak of total turbulent kinetic energy
dissipation during transition. Similar accuracy is obtained by adopting
Germano's dynamic procedure albeit at more than twice the computational
overhead. A CvP-LES of a pair of unstable periodic helical vortices is shown to
predict accurately the experimentally observed growth rate using coarse
resolutions. The ability of the CvP methodology to dynamically sort the
coherent, large-scale motion from the smaller, broadband scales during
transition is demonstrated via flow visualizations. LES of compressible channel
are carried out and show a good match with a reference DNS. | [
1,
1,
0,
0,
0,
0
] |
Title: A Universal Marginalizer for Amortized Inference in Generative Models,
Abstract: We consider the problem of inference in a causal generative model where the
set of available observations differs between data instances. We show how
combining samples drawn from the graphical model with an appropriate masking
function makes it possible to train a single neural network to approximate all
the corresponding conditional marginal distributions and thus amortize the cost
of inference. We further demonstrate that the efficiency of importance sampling
may be improved by basing proposals on the output of the neural network. We
also outline how the same network can be used to generate samples from an
approximate joint posterior via a chain decomposition of the graph. | [
1,
0,
0,
1,
0,
0
] |
Title: Fulde-Ferrell-Larkin-Ovchinnikov state in spin-orbit-coupled superconductors,
Abstract: We show that in the presence of magnetic field, two superconducting phases
with the center-of-mass momentum of Cooper pair parallel to the magnetic field
are induced in spin-orbit-coupled superconductor Li$_2$Pd$_3$B. Specifically,
at small magnetic field, the center-of-mass momentum is induced due to the
energy-spectrum distortion and no unpairing region with vanishing singlet
correlation appears. We refer to this superconducting state as the drift-BCS
state. By further increasing the magnetic field, the superconducting state
falls into the Fulde-Ferrell-Larkin-Ovchinnikov state with the emergence of the
unpairing regions. The observed abrupt enhancement of the center-of-mass
momenta and suppression on the order parameters during the crossover indicate
the first-order phase transition. Enhanced Pauli limit and hence enlarged
magnetic-field regime of the Fulde-Ferrell-Larkin-Ovchinnikov state, due to the
spin-flip terms of the spin-orbit coupling, are revealed. We also address the
triplet correlations induced by the spin-orbit coupling, and show that the
Cooper-pair spin polarizations, generated by the magnetic field and
center-of-mass momentum with the triplet correlations, exhibit totally
different magnetic-field dependences between the drift-BCS and
Fulde-Ferrell-Larkin-Ovchinnikov states. | [
0,
1,
0,
0,
0,
0
] |
Title: Smart Grids Data Analysis: A Systematic Mapping Study,
Abstract: Data analytics and data science play a significant role in nowadays society.
In the context of Smart Grids (SG), the collection of vast amounts of data has
seen the emergence of a plethora of data analysis approaches. In this paper, we
conduct a Systematic Mapping Study (SMS) aimed at getting insights about
different facets of SG data analysis: application sub-domains (e.g., power load
control), aspects covered (e.g., forecasting), used techniques (e.g.,
clustering), tool-support, research methods (e.g., experiments/simulations),
replicability/reproducibility of research. The final goal is to provide a view
of the current status of research. Overall, we found that each sub-domain has
its peculiarities in terms of techniques, approaches and research methodologies
applied. Simulations and experiments play a crucial role in many areas. The
replicability of studies is limited concerning the provided implemented
algorithms, and to a lower extent due to the usage of private datasets. | [
1,
0,
0,
0,
0,
0
] |
Title: On the K-theory of C*-algebras for substitution tilings (a pedestrian version),
Abstract: Under suitable conditions, a substitution tiling gives rise to a Smale space,
from which three equivalence relations can be constructed, namely the stable,
unstable, and asymptotic equivalence relations. We denote with $S$, $U$, and
$A$ their corresponding $C^*$-algebras in the sense of Renault. In this article
we show that the $K$-theories of $S$ and $U$ can be computed from the
cohomology and homology of a single cochain complex with connecting maps for
tilings of the line and of the plane. Moreover, we provide formulas to compute
the $K$-theory for these three $C^*$-algebras. Furthermore, we show that the
$K$-theory groups for tilings of dimension 1 are always torsion free. For
tilings of dimension 2, only $K_0(U)$ and $K_1(S)$ can contain torsion. | [
0,
0,
1,
0,
0,
0
] |
Title: Gorenstein homological properties of tensor rings,
Abstract: Let $R$ be a two-sided noetherian ring and $M$ be a nilpotent $R$-bimodule,
which is finitely generated on both sides. We study Gorenstein homological
properties of the tensor ring $T_R(M)$. Under certain conditions, the ring $R$
is Gorenstein if and only if so is $T_R(M)$. We characterize Gorenstein
projective $T_R(M)$-modules in terms of $R$-modules. | [
0,
0,
1,
0,
0,
0
] |
Title: Compositional Human Pose Regression,
Abstract: Regression based methods are not performing as well as detection based
methods for human pose estimation. A central problem is that the structural
information in the pose is not well exploited in the previous regression
methods. In this work, we propose a structure-aware regression approach. It
adopts a reparameterized pose representation using bones instead of joints. It
exploits the joint connection structure to define a compositional loss function
that encodes the long range interactions in the pose. It is simple, effective,
and general for both 2D and 3D pose estimation in a unified setting.
Comprehensive evaluation validates the effectiveness of our approach. It
significantly advances the state-of-the-art on Human3.6M and is competitive
with state-of-the-art results on MPII. | [
1,
0,
0,
0,
0,
0
] |
Title: Remarks on Inner Functions and Optimal Approximants,
Abstract: We discuss the concept of inner function in reproducing kernel Hilbert spaces
with an orthogonal basis of monomials and examine connections between inner
functions and optimal polynomial approximants to $1/f$, where $f$ is a function
in the space. We revisit some classical examples from this perspective, and
show how a construction of Shapiro and Shields can be modified to produce inner
functions. | [
0,
0,
1,
0,
0,
0
] |
Title: Asymptotic Confidence Regions for High-dimensional Structured Sparsity,
Abstract: In the setting of high-dimensional linear regression models, we propose two
frameworks for constructing pointwise and group confidence sets for penalized
estimators which incorporate prior knowledge about the organization of the
non-zero coefficients. This is done by desparsifying the estimator as in van de
Geer et al. [18] and van de Geer and Stucky [17], then using an appropriate
estimator for the precision matrix $\Theta$. In order to estimate the precision
matrix a corresponding structured matrix norm penalty has to be introduced.
After normalization the result is an asymptotic pivot.
The asymptotic behavior is studied and simulations are added to study the
differences between the two schemes. | [
0,
0,
1,
1,
0,
0
] |
Title: Building a Structured Query Engine,
Abstract: Finding patterns in data and being able to retrieve information from those
patterns is an important task in Information retrieval. Complex search
requirements which are not fulfilled by simple string matching and require
exploring certain patterns in data demand a better query engine that can
support searching via structured queries. In this article, we built a
structured query engine which supports searching data through structured
queries on the lines of ElasticSearch. We will show how we achieved real time
indexing and retrieving of data through a RESTful API and how complex queries
can be created and processed using efficient data structures we created for
storing the data in structured way. Finally, we will conclude with an example
of movie recommendation system built on top of this query engine. | [
1,
0,
0,
0,
0,
0
] |
Title: Optimal Timing of Decisions: A General Theory Based on Continuation Values,
Abstract: Building on insights of Jovanovic (1982) and subsequent authors, we develop a
comprehensive theory of optimal timing of decisions based around continuation
value functions and operators that act on them. Optimality results are provided
under general settings, with bounded or unbounded reward functions. This
approach has several intrinsic advantages that we exploit in developing the
theory. One is that continuation value functions are smoother than value
functions, allowing for sharper analysis of optimal policies and more efficient
computation. Another is that, for a range of problems, the continuation value
function exists in a lower dimensional space than the value function,
mitigating the curse of dimensionality. In one typical experiment, this reduces
the computation time from over a week to less than three minutes. | [
0,
0,
1,
0,
0,
0
] |
Title: OSIRIS-REx Contamination Control Strategy and Implementation,
Abstract: OSIRIS-REx will return pristine samples of carbonaceous asteroid Bennu. This
article describes how pristine was defined based on expectations of Bennu and
on a realistic understanding of what is achievable with a constrained schedule
and budget, and how that definition flowed to requirements and implementation.
To return a pristine sample, the OSIRIS- REx spacecraft sampling hardware was
maintained at level 100 A/2 and <180 ng/cm2 of amino acids and hydrazine on the
sampler head through precision cleaning, control of materials, and vigilance.
Contamination is further characterized via witness material exposed to the
spacecraft assembly and testing environment as well as in space. This
characterization provided knowledge of the expected background and will be used
in conjunction with archived spacecraft components for comparison with the
samples when they are delivered to Earth for analysis. Most of all, the
cleanliness of the OSIRIS-REx spacecraft was achieved through communication
among scientists, engineers, managers, and technicians. | [
0,
1,
0,
0,
0,
0
] |
Title: Linear Stochastic Approximation: Constant Step-Size and Iterate Averaging,
Abstract: We consider $d$-dimensional linear stochastic approximation algorithms (LSAs)
with a constant step-size and the so called Polyak-Ruppert (PR) averaging of
iterates. LSAs are widely applied in machine learning and reinforcement
learning (RL), where the aim is to compute an appropriate $\theta_{*} \in
\mathbb{R}^d$ (that is an optimum or a fixed point) using noisy data and $O(d)$
updates per iteration. In this paper, we are motivated by the problem (in RL)
of policy evaluation from experience replay using the \emph{temporal
difference} (TD) class of learning algorithms that are also LSAs. For LSAs with
a constant step-size, and PR averaging, we provide bounds for the mean squared
error (MSE) after $t$ iterations. We assume that data is \iid with finite
variance (underlying distribution being $P$) and that the expected dynamics is
Hurwitz. For a given LSA with PR averaging, and data distribution $P$
satisfying the said assumptions, we show that there exists a range of constant
step-sizes such that its MSE decays as $O(\frac{1}{t})$.
We examine the conditions under which a constant step-size can be chosen
uniformly for a class of data distributions $\mathcal{P}$, and show that not
all data distributions `admit' such a uniform constant step-size. We also
suggest a heuristic step-size tuning algorithm to choose a constant step-size
of a given LSA for a given data distribution $P$. We compare our results with
related work and also discuss the implication of our results in the context of
TD algorithms that are LSAs. | [
1,
0,
0,
1,
0,
0
] |
Title: Curse of Heterogeneity: Computational Barriers in Sparse Mixture Models and Phase Retrieval,
Abstract: We study the fundamental tradeoffs between statistical accuracy and
computational tractability in the analysis of high dimensional heterogeneous
data. As examples, we study sparse Gaussian mixture model, mixture of sparse
linear regressions, and sparse phase retrieval model. For these models, we
exploit an oracle-based computational model to establish conjecture-free
computationally feasible minimax lower bounds, which quantify the minimum
signal strength required for the existence of any algorithm that is both
computationally tractable and statistically accurate. Our analysis shows that
there exist significant gaps between computationally feasible minimax risks and
classical ones. These gaps quantify the statistical price we must pay to
achieve computational tractability in the presence of data heterogeneity. Our
results cover the problems of detection, estimation, support recovery, and
clustering, and moreover, resolve several conjectures of Azizyan et al. (2013,
2015); Verzelen and Arias-Castro (2017); Cai et al. (2016). Interestingly, our
results reveal a new but counter-intuitive phenomenon in heterogeneous data
analysis that more data might lead to less computation complexity. | [
0,
0,
0,
1,
0,
0
] |
Title: Single-trial P300 Classification using PCA with LDA, QDA and Neural Networks,
Abstract: The P300 event-related potential (ERP), evoked in scalp-recorded
electroencephalography (EEG) by external stimuli, has proven to be a reliable
response for controlling a BCI. The P300 component of an event related
potential is thus widely used in brain-computer interfaces to translate the
subjects' intent by mere thoughts into commands to control artificial devices.
The main challenge in the classification of P300 trials in
electroencephalographic (EEG) data is the low signal-to-noise ratio (SNR) of
the P300 response. To overcome the low SNR of individual trials, it is common
practice to average together many consecutive trials, which effectively
diminishes the random noise. Unfortunately, when more repeated trials are
required for applications such as the P300 speller, the communication rate is
greatly reduced. This has resulted in a need for better methods to improve
single-trial classification accuracy of P300 response. In this work, we use
Principal Component Analysis (PCA) as a preprocessing method and use Linear
Discriminant Analysis (LDA)and neural networks for classification. The results
show that a combination of PCA with these methods provided as high as 13\%
accuracy gain for single-trial classification while using only 3 to 4 principal
components. | [
1,
0,
0,
1,
0,
0
] |
Title: Automatic segmentation of trees in dynamic outdoor environments,
Abstract: Segmentation in dynamic outdoor environments can be difficult when the
illumination levels and other aspects of the scene cannot be controlled.
Specifically in orchard and vineyard automation contexts, a background material
is often used to shield a camera's field of view from other rows of crops. In
this paper, we describe a method that uses superpixels to determine low texture
regions of the image that correspond to the background material, and then show
how this information can be integrated with the color distribution of the image
to compute optimal segmentation parameters to segment objects of interest.
Quantitative and qualitative experiments demonstrate the suitability of this
approach for dynamic outdoor environments, specifically for tree reconstruction
and apple flower detection applications. | [
1,
0,
0,
0,
0,
0
] |
Title: Stochastic and Chance-Constrained Conic Distribution System Expansion Planning Using Bilinear Benders Decomposition,
Abstract: Second order conic programming (SOCP) has been used to model various
applications in power systems, such as operation and expansion planning. In
this paper, we present a two-stage stochastic mixed integer SOCP (MISOCP) model
for the distribution system expansion planning problem that considers
uncertainty and also captures the nonlinear AC power flow. To avoid costly
investment plans due to some extreme scenarios, we further present a
chance-constrained variant that could lead to cost-effective solutions. To
address the computational challenge, we extend the basic Benders decomposition
method and develop a bilinear variant to compute stochastic and
chance-constrained MISOCP formulations. A set of numerical experiments is
performed to illustrate the performance of our models and computational
methods. In particular, results show that our Benders decomposition algorithms
drastically outperform a professional MISOCP solver in handling stochastic
scenarios by orders of magnitude. | [
0,
0,
1,
0,
0,
0
] |
Title: Multi-Hop Extensions of Energy-Efficient Wireless Sensor Network Time Synchronization,
Abstract: We present the multi-hop extensions of the recently proposed energy-efficient
time synchronization scheme for wireless sensor networks, which is based on the
asynchronous source clock frequency recovery and reversed two-way message
exchanges. We consider two hierarchical extensions based on packet relaying and
time-translating gateways, respectively, and analyze their performance with
respect to the number of layers and the delay variations through simulations.
The simulation results demonstrate that the time synchronization performance of
the packet relaying, which has lower complexity, is close to that of
time-translating gateways. | [
1,
0,
0,
0,
0,
0
] |
Title: Value added or misattributed? A multi-institution study on the educational benefit of labs for reinforcing physics content,
Abstract: Instructional labs are widely seen as a unique, albeit expensive, way to
teach scientific content. We measured the effectiveness of introductory lab
courses at achieving this educational goal across nine different lab courses at
three very different institutions. These institutions and courses encompassed a
broad range of student populations and instructional styles. The nine courses
studied had two key things in common: the labs aimed to reinforce the content
presented in lectures, and the labs were optional. By comparing the performance
of students who did and did not take the labs (with careful normalization for
selection effects), we found universally and precisely no added value to
learning from taking the labs as measured by course exam performance. This work
should motivate institutions and departments to reexamine the goals and conduct
of their lab courses, given their resource-intensive nature. We show why these
results make sense when looking at the comparative mental processes of students
involved in research and instructional labs, and offer alternative goals and
instructional approaches that would make lab courses more educationally
valuable. | [
0,
1,
0,
0,
0,
0
] |
Title: NeuroNER: an easy-to-use program for named-entity recognition based on neural networks,
Abstract: Named-entity recognition (NER) aims at identifying entities of interest in a
text. Artificial neural networks (ANNs) have recently been shown to outperform
existing NER systems. However, ANNs remain challenging to use for non-expert
users. In this paper, we present NeuroNER, an easy-to-use named-entity
recognition tool based on ANNs. Users can annotate entities using a graphical
web-based user interface (BRAT): the annotations are then used to train an ANN,
which in turn predict entities' locations and categories in new texts. NeuroNER
makes this annotation-training-prediction flow smooth and accessible to anyone. | [
1,
0,
0,
1,
0,
0
] |
Title: Opinion dynamics model based on cognitive biases,
Abstract: We present an introduction to a novel model of an individual and group
opinion dynamics, taking into account different ways in which different sources
of information are filtered due to cognitive biases. The agent based model,
using Bayesian updating of the individual belief distribution, is based on the
recent psychology work by Dan Kahan. Open nature of the model allows to study
the effects of both static and time-dependent biases and information processing
filters. In particular, the paper compares the effects of two important
psychological mechanisms: the confirmation bias and the politically motivated
reasoning. Depending on the effectiveness of the information filtering (agent
bias), the agents confronted with an objective information source may either
reach a consensus based on the truth, or remain divided despite the evidence.
In general, the model might provide an understanding into the increasingly
polarized modern societies, especially as it allows mixing of different types
of filters: psychological, social, and algorithmic. | [
1,
1,
0,
0,
0,
0
] |
Title: ImageNet-trained CNNs are biased towards texture; increasing shape bias improves accuracy and robustness,
Abstract: Convolutional Neural Networks (CNNs) are commonly thought to recognise
objects by learning increasingly complex representations of object shapes. Some
recent studies suggest a more important role of image textures. We here put
these conflicting hypotheses to a quantitative test by evaluating CNNs and
human observers on images with a texture-shape cue conflict. We show that
ImageNet-trained CNNs are strongly biased towards recognising textures rather
than shapes, which is in stark contrast to human behavioural evidence and
reveals fundamentally different classification strategies. We then demonstrate
that the same standard architecture (ResNet-50) that learns a texture-based
representation on ImageNet is able to learn a shape-based representation
instead when trained on "Stylized-ImageNet", a stylized version of ImageNet.
This provides a much better fit for human behavioural performance in our
well-controlled psychophysical lab setting (nine experiments totalling 48,560
psychophysical trials across 97 observers) and comes with a number of
unexpected emergent benefits such as improved object detection performance and
previously unseen robustness towards a wide range of image distortions,
highlighting advantages of a shape-based representation. | [
0,
0,
0,
0,
1,
0
] |
Title: Learning Distributed Representations of Texts and Entities from Knowledge Base,
Abstract: We describe a neural network model that jointly learns distributed
representations of texts and knowledge base (KB) entities. Given a text in the
KB, we train our proposed model to predict entities that are relevant to the
text. Our model is designed to be generic with the ability to address various
NLP tasks with ease. We train the model using a large corpus of texts and their
entity annotations extracted from Wikipedia. We evaluated the model on three
important NLP tasks (i.e., sentence textual similarity, entity linking, and
factoid question answering) involving both unsupervised and supervised
settings. As a result, we achieved state-of-the-art results on all three of
these tasks. Our code and trained models are publicly available for further
academic research. | [
1,
0,
0,
0,
0,
0
] |
Title: Moduli Spaces of Unordered $n\ge5$ Points on the Riemann Sphere and Their Singularities,
Abstract: For $n\ge5$, it is well known that the moduli space $\mathfrak{M_{0,\:n}}$ of
unordered $n$ points on the Riemann sphere is a quotient space of the Zariski
open set $K_n$ of $\mathbb C^{n-3}$ by an $S_n$ action. The stabilizers of this
$S_n$ action at certain points of this Zariski open set $K_n$ correspond to the
groups fixing the sets of $n$ points on the Riemann sphere. Let $\alpha$ be a
subset of $n$ distinct points on the Riemann sphere. We call the group of all
linear fractional transformations leaving $\alpha$ invariant the stabilizer of
$\alpha$, which is finite by observation. For each non-trivial finite subgroup
$G$ of the group ${\rm PSL}(2,{\Bbb C})$ of linear fractional transformations,
we give the necessary and sufficient condition for finite subsets of the
Riemann sphere under which the stabilizers of them are conjugate to $G$. We
also prove that there does exist some finite subset of the Riemann sphere whose
stabilizer coincides with $G$. Next we obtain the irreducible decompositions of
the representations of the stabilizers on the tangent spaces at the
singularities of $\mathfrak{M_{0,\:n}}$. At last, on $\mathfrak{M_{0,\:5}}$ and
$\mathfrak{M_{0,\:6}}$, we work out explicitly the singularities and the
representations of their stabilizers on the tangent spaces at them. | [
0,
0,
1,
0,
0,
0
] |
Title: A Framework for Time-Consistent, Risk-Sensitive Model Predictive Control: Theory and Algorithms,
Abstract: In this paper we present a framework for risk-sensitive model predictive
control (MPC) of linear systems affected by stochastic multiplicative
uncertainty. Our key innovation is to consider a time-consistent, dynamic risk
evaluation of the cumulative cost as the objective function to be minimized.
This framework is axiomatically justified in terms of time-consistency of risk
assessments, is amenable to dynamic optimization, and is unifying in the sense
that it captures a full range of risk preferences from risk-neutral (i.e.,
expectation) to worst case. Within this framework, we propose and analyze an
online risk-sensitive MPC algorithm that is provably stabilizing. Furthermore,
by exploiting the dual representation of time-consistent, dynamic risk
measures, we cast the computation of the MPC control law as a convex
optimization problem amenable to real-time implementation. Simulation results
are presented and discussed. | [
1,
0,
1,
0,
0,
0
] |
Title: Common Knowledge in a Logic of Gossips,
Abstract: Gossip protocols aim at arriving, by means of point-to-point or group
communications, at a situation in which all the agents know each other secrets.
Recently a number of authors studied distributed epistemic gossip protocols.
These protocols use as guards formulas from a simple epistemic logic, which
makes their analysis and verification substantially easier.
We study here common knowledge in the context of such a logic. First, we
analyze when it can be reduced to iterated knowledge. Then we show that the
semantics and truth for formulas without nested common knowledge operator are
decidable. This implies that implementability, partial correctness and
termination of distributed epistemic gossip protocols that use non-nested
common knowledge operator is decidable, as well. Given that common knowledge is
equivalent to an infinite conjunction of nested knowledge, these results are
non-trivial generalizations of the corresponding decidability results for the
original epistemic logic, established in (Apt & Wojtczak, 2016).
K. R. Apt & D. Wojtczak (2016): On Decidability of a Logic of Gossips. In
Proc. of JELIA 2016, pp. 18-33, doi:10.1007/ 978-3-319-48758-8_2. | [
1,
0,
0,
0,
0,
0
] |
Title: Network-theoretic approach to sparsified discrete vortex dynamics,
Abstract: We examine discrete vortex dynamics in two-dimensional flow through a
network-theoretic approach. The interaction of the vortices is represented with
a graph, which allows the use of network-theoretic approaches to identify key
vortex-to-vortex interactions. We employ sparsification techniques on these
graph representations based on spectral theory for constructing sparsified
models and evaluating the dynamics of vortices in the sparsified setup.
Identification of vortex structures based on graph sparsification and sparse
vortex dynamics are illustrated through an example of point-vortex clusters
interacting amongst themselves. We also evaluate the performance of
sparsification with increasing number of point vortices. The
sparsified-dynamics model developed with spectral graph theory requires reduced
number of vortex-to-vortex interactions but agrees well with the full nonlinear
dynamics. Furthermore, the sparsified model derived from the sparse graphs
conserves the invariants of discrete vortex dynamics. We highlight the
similarities and differences between the present sparsified-dynamics model and
the reduced-order models. | [
0,
1,
0,
0,
0,
0
] |
Title: Bäcklund Transformation and Quasi-Integrable Deformation of Mixed Fermi-Pasta-Ulam and Frenkel-Kontorova Models,
Abstract: In this paper we study a non-linear partial differential equation (PDE),
proposed by N. Kudryashov [arXiv:1611.06813v1[nlin.SI]], using continuum limit
approximation of mixed Fermi-Pasta-Ulam and Frenkel-Kontorova Models. This
generalized semi-discrete equation can be considered as a model for the
description of non-linear dislocation waves in crystal lattice and the
corresponding continuous system can be called mixed generalized potential KdV
and sine-Gordon equation. We obtain the Bäcklund transformation of this
equation in Riccati form in inverse method. We further study the
quasi-integrable deformation of this model. | [
0,
1,
1,
0,
0,
0
] |
Title: Symmetries of handlebodies and their fixed points: Dihedral extended Schottky groups,
Abstract: A Schottky structure on a handlebody $M$ of genus $g$ is provided by a
Schottky group of rank $g$. A symmetry (an orientation-reversing involution) of
$M$ is known to have at most $(g+1)$ connected components of fixed points. Each
of these components is either a point or a compact bordered surface (either
orientable or not) whose boundary is contained in the border of $M$. In this
paper, we derive sharp upper bounds for the total number of connected
components of the sets of fixed points of given two or three symmetries of $M$.
In order to obtain such an upper bound, we obtain a geometrical structure
description of those extended Kleinian groups $K$ containing a Schottky group
$\Gamma$ as finite index normal subgroup so that $K/\Gamma$ is a dihedral group
(called dihedral Schottky groups). Our upper bounds turn out to be different to
the corresponding ones at the level of closed Riemann surfaces. In contrast to
the case of Riemann surfaces, we observe that $M$ cannot have two different
maximal symmetries. | [
0,
0,
1,
0,
0,
0
] |
Title: A Robust Multi-Batch L-BFGS Method for Machine Learning,
Abstract: This paper describes an implementation of the L-BFGS method designed to deal
with two adversarial situations. The first occurs in distributed computing
environments where some of the computational nodes devoted to the evaluation of
the function and gradient are unable to return results on time. A similar
challenge occurs in a multi-batch approach in which the data points used to
compute function and gradients are purposely changed at each iteration to
accelerate the learning process. Difficulties arise because L-BFGS employs
gradient differences to update the Hessian approximations, and when these
gradients are computed using different data points the updating process can be
unstable. This paper shows how to perform stable quasi-Newton updating in the
multi-batch setting, studies the convergence properties for both convex and
nonconvex functions, and illustrates the behavior of the algorithm in a
distributed computing platform on binary classification logistic regression and
neural network training problems that arise in machine learning. | [
1,
0,
1,
1,
0,
0
] |
Title: Enhanced version of AdaBoostM1 with J48 Tree learning method,
Abstract: Machine Learning focuses on the construction and study of systems that can
learn from data. This is connected with the classification problem, which
usually is what Machine Learning algorithms are designed to solve. When a
machine learning method is used by people with no special expertise in machine
learning, it is important that the method be robust in classification, in the
sense that reasonable performance is obtained with minimal tuning of the
problem at hand. Algorithms are evaluated based on how robust they can classify
the given data. In this paper, we propose a quantifiable measure of robustness,
and describe a particular learning method that is robust according to this
measure in the context of classification problem. We proposed Adaptive Boosting
(AdaBoostM1) with J48(C4.5 tree) as a base learner with tuning weight threshold
(P) and number of iterations (I) for boosting algorithm. To benchmark the
performance, we used the baseline classifier, AdaBoostM1 with Decision Stump as
base learner without tuning parameters. By tuning parameters and using J48 as
base learner, we are able to reduce the overall average error rate ratio
(errorC/errorNB) from 2.4 to 0.9 for development sets of data and 2.1 to 1.2
for evaluation sets of data. | [
0,
0,
0,
1,
0,
0
] |
Title: A Game of Tax Evasion: evidences from an agent-based model,
Abstract: This paper presents a simple agent-based model of an economic system,
populated by agents playing different games according to their different view
about social cohesion and tax payment. After a first set of simulations,
correctly replicating results of existing literature, a wider analysis is
presented in order to study the effects of a dynamic-adaptation rule, in which
citizens may possibly decide to modify their individual tax compliance
according to individual criteria, such as, the strength of their ethical
commitment, the satisfaction gained by consumption of the public good and the
perceived opinion of neighbors. Results show the presence of thresholds levels
in the composition of society - between taxpayers and evaders - which explain
the extent of damages deriving from tax evasion. | [
0,
0,
0,
0,
0,
1
] |
Title: Variability response functions for statically determinate beams with arbitrary nonlinear constitutive laws,
Abstract: The variability response function (VRF) is generalized to statically
determinate Euler Bernoulli beams with arbitrary stress-strain laws following
Cauchy elastic behavior. The VRF is a Green's function that maps the spectral
density function (SDF) of a statistically homogeneous random field describing
the correlation structure of input uncertainty to the variance of a response
quantity. The appeal of such Green's functions is that the variance can be
determined for any correlation structure by a trivial computation of a
convolution integral. The method introduced in this work derives VRFs in closed
form for arbitrary nonlinear Cauchy-elastic constitutive laws and is
demonstrated through three examples. It is shown why and how higher order
spectra of the random field affect the response variance for nonlinear
constitutive laws. In the general sense, the VRF for a statically determinate
beam is found to be a matrix kernel whose inner product by a matrix of higher
order SDFs and statistical moments is integrated to give the response variance.
The resulting VRF matrix is unique regardless of the random field's marginal
probability density function (PDF) and SDFs. | [
0,
1,
0,
0,
0,
0
] |
Title: Accurate Motion Estimation through Random Sample Aggregated Consensus,
Abstract: We reconsider the classic problem of estimating accurately a 2D
transformation from point matches between images containing outliers. RANSAC
discriminates outliers by randomly generating minimalistic sampled hypotheses
and verifying their consensus over the input data. Its response is based on the
single hypothesis that obtained the largest inlier support. In this article we
show that the resulting accuracy can be improved by aggregating all generated
hypotheses. This yields RANSAAC, a framework that improves systematically over
RANSAC and its state-of-the-art variants by statistically aggregating
hypotheses. To this end, we introduce a simple strategy that allows to rapidly
average 2D transformations, leading to an almost negligible extra computational
cost. We give practical applications on projective transforms and
homography+distortion models and demonstrate a significant performance gain in
both cases. | [
1,
0,
0,
0,
0,
0
] |
Title: A Topologist's View of Kinematic Maps and Manipulation Complexity,
Abstract: In this paper we combine a survey of the most important topological
properties of kinematic maps that appear in robotics, with the exposition of
some basic results regarding the topological complexity of a map. In
particular, we discuss mechanical devices that consist of rigid parts connected
by joints and show how the geometry of the joints determines the forward
kinematic map that relates the configuration of joints with the pose of the
end-effector of the device. We explain how to compute the dimension of the
joint space and describe topological obstructions for a kinematic map to be a
fibration or to admit a continuous section. In the second part of the paper we
define the complexity of a continuous map and show how the concept can be
viewed as a measure of the difficulty to find a robust manipulation plan for a
given mechanical device. We also derive some basic estimates for the complexity
and relate it to the degree of instability of a manipulation plan. | [
1,
0,
1,
0,
0,
0
] |
Title: Faster Tensor Canonicalization,
Abstract: The Butler-Portugal algorithm for obtaining the canonical form of a tensor
expression with respect to slot symmetries and dummy-index renaming suffers, in
certain cases with a high degree of symmetry, from $O(n!)$ explosion in both
computation time and memory. We present a modified algorithm which alleviates
this problem in the most common cases---tensor expressions with subsets of
indices which are totally symmetric or totally antisymmetric---in polynomial
time. We also present an implementation of the label-renaming mechanism which
improves upon that of the original Butler-Portugal algorithm, thus providing a
significant speed increase for the average case as well as the highly-symmetric
special case. The worst-case behavior remains $O(n!)$, although it occurs in
more limited situations unlikely to appear in actual computations. We comment
on possible strategies to take if the nature of a computation should make these
situations more likely. | [
1,
0,
0,
0,
0,
0
] |
Title: Mass Preconditioning for the Exact One-Flavor Action in Lattice QCD with Domain-Wall Fermion,
Abstract: The mass-preconditioning (MP) technique has become a standard tool to enhance
the efficiency of the hybrid Monte-Carlo simulation (HMC) of lattice QCD with
dynamical quarks, for 2-flavors QCD with degenerate quark masses, as well as
its extension to the case of one-flavor by taking the square-root of the
fermion determinant of 2-flavors with degenerate masses. However, for lattice
QCD with domain-wall fermion, the fermion determinant of any single fermion
flavor can be expressed as a functional integral with an exact pseudofermion
action $ \phi^\dagger H^{-1} \phi $, where $ H^{-1} $ is a positive-definite
Hermitian operator without taking square-root, and with the chiral structure
\cite{Chen:2014hyy}. Consequently, the mass-preconditioning for the exact
one-flavor action (EOFA) does not necessarily follow the conventional (old) MP
pattern. In this paper, we present a new mass-preconditioning for the EOFA,
which is more efficient than the old MP which we have used in Refs.
\cite{Chen:2014hyy,Chen:2014bbc}. We perform numerical tests in lattice QCD
with $ N_f = 1 $ and $ N_f = 1+1+1+1 $ optimal domain-wall quarks, with one
mass-preconditioner applied to one of the exact one-flavor actions, and we find
that the efficiency of the new MP is more than 20\% higher than that of the old
MP. | [
0,
1,
0,
0,
0,
0
] |
Title: Weighted Low Rank Approximation for Background Estimation Problems,
Abstract: Classical principal component analysis (PCA) is not robust to the presence of
sparse outliers in the data. The use of the $\ell_1$ norm in the Robust PCA
(RPCA) method successfully eliminates the weakness of PCA in separating the
sparse outliers. In this paper, by sticking a simple weight to the Frobenius
norm, we propose a weighted low rank (WLR) method to avoid the often
computationally expensive algorithms relying on the $\ell_1$ norm. As a proof
of concept, a background estimation model has been presented and compared with
two $\ell_1$ norm minimization algorithms. We illustrate that as long as a
simple weight matrix is inferred from the data, one can use the weighted
Frobenius norm and achieve the same or better performance. | [
0,
0,
1,
0,
0,
0
] |
Title: Controlling Chiral Domain Walls in Antiferromagnets Using Spin-Wave Helicity,
Abstract: In antiferromagnets, the Dzyaloshinskii-Moriya interaction lifts the
degeneracy of left- and right-circularly polarized spin waves. This
relativistic coupling increases the efficiency of spin-wave-induced domain wall
motion and leads to higher drift velocities. We show that in biaxial
antiferromagnets, the spin-wave helicity controls both the direction and
magnitude of the magnonic force on chiral domain walls. By contrast, in
uniaxial antiferromagnets, the magnonic force is propulsive with a helicity
dependent strength. | [
0,
1,
0,
0,
0,
0
] |
Title: Multiple Topological Electronic Phases in Superconductor MoC,
Abstract: The search for a superconductor with non-s-wave pairing is important not only
for understanding unconventional mechanisms of superconductivity but also for
finding new types of quasiparticles such as Majorana bound states. Materials
with both topological band structure and superconductivity are promising
candidates as $p+ip$ superconducting states can be generated through pairing
the spin-polarized topological surface states. In this work, the electronic and
phonon properties of the superconductor molybdenum carbide (MoC) are studied
with first-principles methods. Our calculations show that nontrivial band
topology and superconductivity coexist in both structural phases of MoC,
namely, the cubic $\alpha$ and hexagonal $\gamma$ phases. The $\alpha$ phase is
a strong topological insulator and the $\gamma$ phase is a topological nodal
line semimetal with drumhead surface states. In addition, hole doping can
stabilize the crystal structure of the $\alpha$ phase and elevate the
transition temperature in the $\gamma$ phase. Therefore, MoC in different
structural forms can be a practical material platform for studying topological
superconductivity and elusive Majorana fermions. | [
0,
1,
0,
0,
0,
0
] |
Title: Performance Scaling Law for Multi-Cell Multi-User Massive MIMO,
Abstract: This work provides a comprehensive scaling law based performance analysis for
multi-cell multi-user massive multiple-input-multiple-output (MIMO) downlink
systems. Imperfect channel state information (CSI), pilot contamination, and
channel spatial correlation are all considered. First, a sum- rate lower bound
is derived by exploiting the asymptotically deterministic property of the
received signal power, while keeping the random nature of other components in
the signal-to-interference-plus-noise-ratio (SINR) intact. Via a general
scaling model on important network parameters, including the number of users,
the channel training energy and the data transmission power, with respect to
the number of base station antennas, the asymptotic scaling law of the
effective SINR is obtained, which reveals quantitatively the tradeoff of the
network parameters. More importantly, pilot contamination and pilot
contamination elimination (PCE) are considered in the analytical framework. In
addition, the applicability of the derived asymptotic scaling law in practical
systems with large but finite antenna numbers are discussed. Finally,
sufficient conditions on the parameter scalings for the SINR to be
asymptotically deterministic in the sense of mean square convergence are
provided, which covers existing results on such analysis as special cases and
shows the effect of PCE explicitly. | [
1,
0,
0,
0,
0,
0
] |
Title: Pressure-tuning of bond-directional exchange interactions and magnetic frustration in hyperhoneycomb iridate $β$-$\mathrm{Li_2IrO_3}$,
Abstract: We explore the response of Ir $5d$ orbitals to pressure in
$\beta$-$\mathrm{Li_2IrO_3}$, a hyperhoneycomb iridate in proximity to a Kitaev
quantum spin liquid (QSL) ground state. X-ray absorption spectroscopy reveals a
reconstruction of the electronic ground state below 2 GPa, the same pressure
range where x-ray magnetic circular dichroism shows an apparent collapse of
magnetic order. The electronic reconstruction, which manifests a reduction in
the effective spin-orbit (SO) interaction in $5d$ orbitals, pushes
$\beta$-$\mathrm{Li_2IrO_3}$ further away from the pure $J_{\rm eff}=1/2$
limit. Although lattice symmetry is preserved across the electronic transition,
x-ray diffraction shows a highly anisotropic compression of the hyperhoneycomb
lattice which affects the balance of bond-directional Ir-Ir exchange
interactions driven by spin-orbit coupling at Ir sites. An enhancement of
symmetric anisotropic exchange over Kitaev and Heisenberg exchange interactions
seen in theoretical calculations that use precisely this anisotropic Ir-Ir bond
compression provides one possible route to realization of a QSL state in this
hyperhoneycomb iridate at high pressures. | [
0,
1,
0,
0,
0,
0
] |
Title: Computationally Efficient Estimation of the Spectral Gap of a Markov Chain,
Abstract: We consider the problem of estimating from sample paths the absolute spectral
gap $\gamma_*$ of a reversible, irreducible and aperiodic Markov chain
$(X_t)_{t \in \mathbb{N}}$ over a finite state $\Omega$. We propose the ${\tt
UCPI}$ (Upper Confidence Power Iteration) algorithm for this problem, a
low-complexity algorithm which estimates the spectral gap in time ${\cal O}(n)$
and memory space ${\cal O}((\ln n)^2)$ given $n$ samples. This is in stark
contrast with most known methods which require at least memory space ${\cal
O}(|\Omega|)$, so that they cannot be applied to large state spaces.
Furthermore, ${\tt UCPI}$ is amenable to parallel implementation. | [
0,
0,
0,
1,
0,
0
] |
Title: Bounded solutions for a class of Hamiltonian systems,
Abstract: We obtain bounded for all $t$ solutions of ordinary differential equations as
limits of the solutions of the corresponding Dirichlet problems on $(-L,L)$,
with $L \rightarrow \infty$. We derive a priori estimates for the Dirichlet
problems, allowing passage to the limit, via a diagonal sequence. This approach
carries over to the PDE case. | [
0,
0,
1,
0,
0,
0
] |
Title: Cosmological perturbation effects on gravitational-wave luminosity distance estimates,
Abstract: Waveforms of gravitational waves provide information about a variety of
parameters for the binary system merging. However, standard calculations have
been performed assuming a FLRW universe with no perturbations. In reality this
assumption should be dropped: we show that the inclusion of cosmological
perturbations translates into corrections to the estimate of astrophysical
parameters derived for the merging binary systems. We compute corrections to
the estimate of the luminosity distance due to velocity, volume, lensing and
gravitational potential effects. Our results show that the amplitude of the
corrections will be negligible for current instruments, mildly important for
experiments like the planned DECIGO, and very important for future ones such as
the Big Bang Observer. | [
0,
1,
0,
0,
0,
0
] |
Title: Faster Clustering via Non-Backtracking Random Walks,
Abstract: This paper presents VEC-NBT, a variation on the unsupervised graph clustering
technique VEC, which improves upon the performance of the original algorithm
significantly for sparse graphs. VEC employs a novel application of the
state-of-the-art word2vec model to embed a graph in Euclidean space via random
walks on the nodes of the graph. In VEC-NBT, we modify the original algorithm
to use a non-backtracking random walk instead of the normal backtracking random
walk used in VEC. We introduce a modification to a non-backtracking random
walk, which we call a begrudgingly-backtracking random walk, and show
empirically that using this model of random walks for VEC-NBT requires shorter
walks on the graph to obtain results with comparable or greater accuracy than
VEC, especially for sparser graphs. | [
1,
0,
0,
1,
0,
0
] |
Title: Finding Submodularity Hidden in Symmetric Difference,
Abstract: A set function $f$ on a finite set $V$ is submodular if $f(X) + f(Y) \geq f(X
\cup Y) + f(X \cap Y)$ for any pair $X, Y \subseteq V$. The symmetric
difference transformation (SD-transformation) of $f$ by a canonical set $S
\subseteq V$ is a set function $g$ given by $g(X) = f(X \vartriangle S)$ for $X
\subseteq V$,where $X \vartriangle S = (X \setminus S) \cup (S \setminus X)$
denotes the symmetric difference between $X$ and $S$. Submodularity and
SD-transformations are regarded as the counterparts of convexity and affine
transformations in a discrete space, respectively. However, submodularity is
not preserved under SD-transformations, in contrast to the fact that convexity
is invariant under affine transformations. This paper presents a
characterization of SD-stransformations preserving submodularity. Then, we are
concerned with the problem of discovering a canonical set $S$, given the
SD-transformation $g$ of a submodular function $f$ by $S$, provided that $g(X)$
is given by a function value oracle. A submodular function $f$ on $V$ is said
to be strict if $f(X) + f(Y) > f(X \cup Y) + f(X \cap Y)$ holds whenever both
$X \setminus Y$ and $Y \setminus X$ are nonempty. We show that the problem is
solved by using ${\rm O}(|V|)$ oracle calls when $f$ is strictly submodular,
although it requires exponentially many oracle calls in general. | [
1,
0,
0,
0,
0,
0
] |
Title: Adaptive Quantization for Deep Neural Network,
Abstract: In recent years Deep Neural Networks (DNNs) have been rapidly developed in
various applications, together with increasingly complex architectures. The
performance gain of these DNNs generally comes with high computational costs
and large memory consumption, which may not be affordable for mobile platforms.
Deep model quantization can be used for reducing the computation and memory
costs of DNNs, and deploying complex DNNs on mobile equipment. In this work, we
propose an optimization framework for deep model quantization. First, we
propose a measurement to estimate the effect of parameter quantization errors
in individual layers on the overall model prediction accuracy. Then, we propose
an optimization process based on this measurement for finding optimal
quantization bit-width for each layer. This is the first work that
theoretically analyse the relationship between parameter quantization errors of
individual layers and model accuracy. Our new quantization algorithm
outperforms previous quantization optimization methods, and achieves 20-40%
higher compression rate compared to equal bit-width quantization at the same
model prediction accuracy. | [
1,
0,
0,
1,
0,
0
] |
Title: High-temperature terahertz optical diode effect without magnetic order in polar FeZnMo$_3$O$_8$,
Abstract: We present a terahertz spectroscopic study of polar ferrimagnet
FeZnMo$_3$O$_8$. Our main finding is a giant high-temperature optical diode
effect, or nonreciprocal directional dichroism, where the transmitted light
intensity in one direction is over 100 times lower than intensity transmitted
in the opposite direction. The effect takes place in the paramagnetic phase
with no long-range magnetic order in the crystal, which contrasts sharply with
all existing reports of the terahertz optical diode effect in other
magnetoelectric materials, where the long-range magnetic ordering is a
necessary prerequisite. In \fzmo, the effect occurs resonantly with a strong
magnetic dipole active transition centered at 1.27 THz and assigned as electron
spin resonance between the eigenstates of the single-ion anisotropy
Hamiltonian. We propose that the optical diode effect in paramagnetic
FeZnMo$_3$O$_8$ is driven by signle-ion terms in magnetoelectric free energy. | [
0,
1,
0,
0,
0,
0
] |
Title: Character Networks and Book Genre Classification,
Abstract: We compare the social character networks of biographical, legendary and
fictional texts, in search for marks of genre differentiation. We examine the
degree distribution of character appearance and find a power law that does not
depend on the literary genre or historical content. We also analyze local and
global complex networks measures, in particular, correlation plots between the
recently introduced Lobby (or Hirsh $H(1)$) index and Degree, Betweenness and
Closeness centralities. Assortativity plots, which previous literature claims
to separate fictional from real social networks, were also studied. We've found
no relevant differences in the books for these network measures and we give a
plausible explanation why the previous assortativity result is not correct. | [
1,
1,
0,
0,
0,
0
] |
Title: Forecasting the Impact of Stellar Activity on Transiting Exoplanet Spectra,
Abstract: Exoplanet host star activity, in the form of unocculted star spots or
faculae, alters the observed transmission and emission spectra of the
exoplanet. This effect can be exacerbated when combining data from different
epochs if the stellar photosphere varies between observations due to activity.
redHere we present a method to characterize and correct for relative changes
due to stellar activity by exploiting multi-epoch ($\ge$2 visits/transits)
observations to place them in a consistent reference frame. Using measurements
from portions of the planet's orbit where negligible planet transmission or
emission can be assumed, we determine changes to the stellar spectral
amplitude. With the analytical methods described here, we predict the impact of
stellar variability on transit observations. Supplementing these forecasts with
Kepler-measured stellar variabilities for F-, G-, K-, and M-dwarfs, and
predicted transit precisions by JWST's NIRISS, NIRCam, and MIRI, we conclude
that stellar activity does not impact infrared transiting exoplanet
observations of most presently-known or predicted TESS targets by current or
near-future platforms, such as JWST. | [
0,
1,
0,
0,
0,
0
] |
Title: Strong isomorphism in Marinatto-Weber type quantum games,
Abstract: Our purpose is to focus attention on a new criterion for quantum schemes by
bringing together the notions of quantum game and game isomorphism. A quantum
game scheme is required to generate the classical game as a special case. Now,
given a quantum game scheme and two isomorphic classical games, we additionally
require the resulting quantum games to be isomorphic as well. We show how this
isomorphism condition influences the players' strategy sets. We are concerned
with the Marinatto-Weber type quantum game scheme and the strong isomorphism
between games in strategic form. | [
1,
0,
0,
0,
0,
0
] |
Title: Mean teachers are better role models: Weight-averaged consistency targets improve semi-supervised deep learning results,
Abstract: The recently proposed Temporal Ensembling has achieved state-of-the-art
results in several semi-supervised learning benchmarks. It maintains an
exponential moving average of label predictions on each training example, and
penalizes predictions that are inconsistent with this target. However, because
the targets change only once per epoch, Temporal Ensembling becomes unwieldy
when learning large datasets. To overcome this problem, we propose Mean
Teacher, a method that averages model weights instead of label predictions. As
an additional benefit, Mean Teacher improves test accuracy and enables training
with fewer labels than Temporal Ensembling. Without changing the network
architecture, Mean Teacher achieves an error rate of 4.35% on SVHN with 250
labels, outperforming Temporal Ensembling trained with 1000 labels. We also
show that a good network architecture is crucial to performance. Combining Mean
Teacher and Residual Networks, we improve the state of the art on CIFAR-10 with
4000 labels from 10.55% to 6.28%, and on ImageNet 2012 with 10% of the labels
from 35.24% to 9.11%. | [
1,
0,
0,
1,
0,
0
] |
Title: WOMBAT: A Scalable and High Performance Astrophysical MHD Code,
Abstract: We present a new code for astrophysical magneto-hydrodynamics specifically
designed and optimized for high performance and scaling on modern and future
supercomputers. We describe a novel hybrid OpenMP/MPI programming model that
emerged from a collaboration between Cray, Inc. and the University of
Minnesota. This design utilizes MPI-RMA optimized for thread scaling, which
allows the code to run extremely efficiently at very high thread counts ideal
for the latest generation of the multi-core and many-core architectures. Such
performance characteristics are needed in the era of "exascale" computing. We
describe and demonstrate our high-performance design in detail with the intent
that it may be used as a model for other, future astrophysical codes intended
for applications demanding exceptional performance. | [
0,
1,
0,
0,
0,
0
] |
Title: Securing Virtual Network Function Placement with High Availability Guarantees,
Abstract: Virtual Network Functions as a Service (VNFaaS) is currently under attentive
study by telecommunications and cloud stakeholders as a promising business and
technical direction consisting of providing network functions as a service on a
cloud (NFV Infrastructure), instead of delivering standalone network
appliances, in order to provide higher scalability and reduce maintenance
costs. However, the functioning of such NFVI hosting the VNFs is fundamental
for all the services and applications running on top of it, forcing to
guarantee a high availability level. Indeed the availability of an VNFaaS
relies on the failure rate of its single components, namely the servers, the
virtualization software, and the communication network. The proper assignment
of the virtual machines implementing network functions to NFVI servers and
their protection is essential to guarantee high availability. We model the High
Availability Virtual Network Function Placement (HA-VNFP) as the problem of
finding the best assignment of virtual machines to servers guaranteeing
protection by replication. We propose a probabilistic approach to measure the
real availability of a system and design both efficient and effective
algorithms that can be used by stakeholders for both online and offline
planning. | [
1,
0,
0,
0,
0,
0
] |
Title: A decentralized proximal-gradient method with network independent step-sizes and separated convergence rates,
Abstract: This paper considers the problem of decentralized optimization with a
composite objective containing smooth and non-smooth terms. To solve the
problem, a proximal-gradient scheme is studied. Specifically, the smooth and
nonsmooth terms are dealt with by gradient update and proximal update,
respectively. The studied algorithm is closely related to a previous
decentralized optimization algorithm, PG-EXTRA [37], but has a few advantages.
First of all, in our new scheme, agents use uncoordinated step-sizes and the
stable upper bounds on step-sizes are independent from network topology. The
step-sizes depend on local objective functions, and they can be as large as
that of the gradient descent. Secondly, for the special case without non-smooth
terms, linear convergence can be achieved under the strong convexity
assumption. The dependence of the convergence rate on the objective functions
and the network are separated, and the convergence rate of our new scheme is as
good as one of the two convergence rates that match the typical rates for the
general gradient descent and the consensus averaging. We also provide some
numerical experiments to demonstrate the efficacy of the introduced algorithms
and validate our theoretical discoveries. | [
0,
0,
1,
1,
0,
0
] |
Title: Generative Models for Spear Phishing Posts on Social Media,
Abstract: Historically, machine learning in computer security has prioritized defense:
think intrusion detection systems, malware classification, and botnet traffic
identification. Offense can benefit from data just as well. Social networks,
with their access to extensive personal data, bot-friendly APIs, colloquial
syntax, and prevalence of shortened links, are the perfect venues for spreading
machine-generated malicious content. We aim to discover what capabilities an
adversary might utilize in such a domain. We present a long short-term memory
(LSTM) neural network that learns to socially engineer specific users into
clicking on deceptive URLs. The model is trained with word vector
representations of social media posts, and in order to make a click-through
more likely, it is dynamically seeded with topics extracted from the target's
timeline. We augment the model with clustering to triage high value targets
based on their level of social engagement, and measure success of the LSTM's
phishing expedition using click-rates of IP-tracked links. We achieve state of
the art success rates, tripling those of historic email attack campaigns, and
outperform humans manually performing the same task. | [
0,
0,
0,
1,
0,
0
] |
Title: SkipFlow: Incorporating Neural Coherence Features for End-to-End Automatic Text Scoring,
Abstract: Deep learning has demonstrated tremendous potential for Automatic Text
Scoring (ATS) tasks. In this paper, we describe a new neural architecture that
enhances vanilla neural network models with auxiliary neural coherence
features. Our new method proposes a new \textsc{SkipFlow} mechanism that models
relationships between snapshots of the hidden representations of a long
short-term memory (LSTM) network as it reads. Subsequently, the semantic
relationships between multiple snapshots are used as auxiliary features for
prediction. This has two main benefits. Firstly, essays are typically long
sequences and therefore the memorization capability of the LSTM network may be
insufficient. Implicit access to multiple snapshots can alleviate this problem
by acting as a protection against vanishing gradients. The parameters of the
\textsc{SkipFlow} mechanism also acts as an auxiliary memory. Secondly,
modeling relationships between multiple positions allows our model to learn
features that represent and approximate textual coherence. In our model, we
call this \textit{neural coherence} features. Overall, we present a unified
deep learning architecture that generates neural coherence features as it reads
in an end-to-end fashion. Our approach demonstrates state-of-the-art
performance on the benchmark ASAP dataset, outperforming not only feature
engineering baselines but also other deep learning models. | [
1,
0,
0,
0,
0,
0
] |
Title: Reduction of topological $\mathbb{Z}$ classification in cold atomic systems,
Abstract: One of the most challenging problems in correlated topological systems is a
realization of the reduction of topological classification, but very few
experimental platforms have been proposed so far. We here demonstrate that
ultracold dipolar fermions (e.g., $^{167}$Er, $^{161}$Dy, and $^{53}$Cr) loaded
in an optical lattice of two-leg ladder geometry can be the first promising
testbed for the reduction $\mathbb{Z}\to\mathbb{Z}_4$, where solid evidence for
the reduction is available thanks to their high controllability. We further
give a detailed account of how to experimentally access this phenomenon; around
the edges, the destruction of one-particle gapless excitations can be observed
by the local radio frequency spectroscopy, while that of gapless spin
excitations can be observed by a time-dependent spin expectation value of a
superposed state of the ground state and the first excited state. We clarify
that even when the reduction occurs, a gapless edge mode is recovered around a
dislocation, which can be another piece of evidence for the reduction. | [
0,
1,
0,
0,
0,
0
] |
Title: Characterizing the ionospheric current pattern response to southward and northward IMF turnings with dynamical SuperMAG correlation networks,
Abstract: We characterize the response of the quiet time (no substorms or storms)
large-scale ionospheric transient equivalent currents to north-south and
south-north IMF turnings by using a dynamical network of ground-based
magnetometers. Canonical correlation between all pairs of SuperMAG magnetometer
stations in the Northern Hemisphere (magnetic latitude (MLAT) 50-82$^{\circ}$)
is used to establish the extent of near-simultaneous magnetic response between
regions of magnetic local time-MLAT. Parameters and maps that describe
spatial-temporal correlation are used to characterize the system and its
response to the turnings aggregated over several hundred events. We find that
regions that experience large increases in correlation post turning coincide
with typical locations of a two-cell convection system and are influenced by
the interplanetary magnetic field $\mathit{B}_{y}$. The time between the
turnings reaching the magnetopause and a network response is found to be
$\sim$8-10 min and correlation in the dayside occurs 2-8 min before that in the
nightside. | [
0,
1,
0,
0,
0,
0
] |
Title: On a question of Buchweitz about ranks of syzygies of modules of finite length,
Abstract: Let R be a local ring of dimension d. Buchweitz asks if the rank of the d-th
syzygy of a module of finite lengh is greater than or equal to the rank of the
d-th syzygy of the residue field, unless the module has finite projective
dimension. Assuming that R is Gorenstein, we prove that if the question is
affrmative, then R is a hypersurface. If moreover R has dimension two, then we
show that the converse also holds true. | [
0,
0,
1,
0,
0,
0
] |
Title: Resolution and Relevance Trade-offs in Deep Learning,
Abstract: Deep learning has been successfully applied to various tasks, but its
underlying mechanism remains unclear. Neural networks associate similar inputs
in the visible layer to the same state of hidden variables in deep layers. The
fraction of inputs that are associated to the same state is a natural measure
of similarity and is simply related to the cost in bits required to represent
these inputs. The degeneracy of states with the same information cost provides
instead a natural measure of noise and is simply related the entropy of the
frequency of states, that we call relevance. Representations with minimal
noise, at a given level of similarity (resolution), are those that maximise the
relevance. A signature of such efficient representations is that frequency
distributions follow power laws. We show, in extensive numerical experiments,
that deep neural networks extract a hierarchy of efficient representations from
data, because they i) achieve low levels of noise (i.e. high relevance) and ii)
exhibit power law distributions. We also find that the layer that is most
efficient to reliably generate patterns of training data is the one for which
relevance and resolution are traded at the same price, which implies that
frequency distribution follows Zipf's law. | [
1,
0,
0,
0,
0,
0
] |
Title: Approches d'analyse distributionnelle pour améliorer la désambiguïsation sémantique,
Abstract: Word sense disambiguation (WSD) improves many Natural Language Processing
(NLP) applications such as Information Retrieval, Machine Translation or
Lexical Simplification. WSD is the ability of determining a word sense among
different ones within a polysemic lexical unit taking into account the context.
The most straightforward approach uses a semantic proximity measure between the
word sense candidates of the target word and those of its context. Such a
method very easily entails a combinatorial explosion. In this paper, we propose
two methods based on distributional analysis which enable to reduce the
exponential complexity without losing the coherence. We present a comparison
between the selection of distributional neighbors and the linearly nearest
neighbors. The figures obtained show that selecting distributional neighbors
leads to better results. | [
1,
0,
0,
0,
0,
0
] |
Title: Non-degenerate parametric resonance in tunable superconducting cavity,
Abstract: We develop a theory for non-degenerate parametric resonance in a tunable
superconducting cavity. We focus on nonlinear effects that are caused by
nonlinear Josephson elements connected to the cavity. We analyze parametric
amplification in a strong nonlinear regime at the parametric instability
threshold, and calculate maximum gain values. Above the threshold, in the
parametric oscillator regime the linear cavity response diverges at the
oscillator frequency at all pump strengths. We show that this divergence is
related to the continuous degeneracy of the free oscillator state with respect
to the phase. Applying on-resonance input lifts the degeneracy and removes the
divergence. We also investigate the quantum noise squeezing. It is shown that
in the strong amplification regime the noise undergoes four-mode squeezing, and
that in this regime the output signal to noise ratio can significantly exceed
the input value. We also analyze the intermode frequency conversion and
identify parameters at which full conversion is achieved. | [
0,
1,
0,
0,
0,
0
] |
Title: Bridging Semantic Gaps between Natural Languages and APIs with Word Embedding,
Abstract: Developers increasingly rely on text matching tools to analyze the relation
between natural language words and APIs. However, semantic gaps, namely textual
mismatches between words and APIs, negatively affect these tools. Previous
studies have transformed words or APIs into low-dimensional vectors for
matching; however, inaccurate results were obtained due to the failure of
modeling words and APIs simultaneously. To resolve this problem, two main
challenges are to be addressed: the acquisition of massive words and APIs for
mining and the alignment of words and APIs for modeling. Therefore, this study
proposes Word2API to effectively estimate relatedness of words and APIs.
Word2API collects millions of commonly used words and APIs from code
repositories to address the acquisition challenge. Then, a shuffling strategy
is used to transform related words and APIs into tuples to address the
alignment challenge. Using these tuples, Word2API models words and APIs
simultaneously. Word2API outperforms baselines by 10%-49.6% of relatedness
estimation in terms of precision and NDCG. Word2API is also effective on
solving typical software tasks, e.g., query expansion and API documents
linking. A simple system with Word2API-expanded queries recommends up to 21.4%
more related APIs for developers. Meanwhile, Word2API improves comparison
algorithms by 7.9%-17.4% in linking questions in Question&Answer communities to
API documents. | [
1,
0,
0,
0,
0,
0
] |
Title: Feedback optimal controllers for the Heston model,
Abstract: We prove the existence of an optimal feedback controller for a stochastic
optimization problem constituted by a variation of the Heston model, where a
stochastic input process is added in order to minimize a given performance
criterion. The stochastic feedback controller is searched by solving a
nonlinear backward parabolic equation for which one proves the existence of a
martingale solution. | [
0,
0,
1,
0,
0,
0
] |
Title: Total-positivity preservers,
Abstract: We prove that the only entrywise transforms of rectangular matrices which
preserve total positivity or total non-negativity are either constant or
linear. This follows from an extended classification of preservers of these two
properties for matrices of fixed dimension. We also prove that the same
assertions hold upon working only with symmetric matrices; for total-positivity
preservers our proofs proceed through solving two totally positive completion
problems. | [
0,
0,
1,
0,
0,
0
] |
Title: A revision of the subtract-with-borrow random number generators,
Abstract: The most popular and widely used subtract-with-borrow generator, also known
as RANLUX, is reimplemented as a linear congruential generator using large
integer arithmetic with the modulus size of 576 bits. Modern computers, as well
as the specific structure of the modulus inferred from RANLUX, allow for the
development of a fast modular multiplication -- the core of the procedure. This
was previously believed to be slow and have too high cost in terms of computing
resources. Our tests show a significant gain in generation speed which is
comparable with other fast, high quality random number generators. An
additional feature is the fast skipping of generator states leading to a
seeding scheme which guarantees the uniqueness of random number sequences. | [
1,
1,
0,
0,
0,
0
] |
Title: Bias voltage effects on tunneling magnetoresistance in Fe/MgAl${}_2$O${}_4$/Fe(001) junctions: Comparative study with Fe/MgO/Fe(001) junctions,
Abstract: We investigate bias voltage effects on the spin-dependent transport
properties of Fe/MgAl${}_2$O${}_4$/Fe(001) magnetic tunneling junctions (MTJs)
by comparing them with those of Fe/MgO/Fe(001) MTJs. By means of the
nonequilibrium Green's function method and the density functional theory, we
calculate bias voltage dependences of magnetoresistance (MR) ratios in both the
MTJs. We find that in both the MTJs, the MR ratio decreases as the bias voltage
increases and finally vanishes at a critical bias voltage $V_{\rm c}$. We also
find that the critical bias voltage $V_{\rm c}$ of the MgAl${}_2$O${}_4$-based
MTJ is clearly larger than that of the MgO-based MTJ. Since the in-plane
lattice constant of the Fe/MgAl${}_2$O${}_4$/Fe(001) supercell is twice that of
the Fe/MgO/Fe(001) one, the Fe electrodes in the MgAl${}_2$O${}_4$-based MTJs
have an identical band structure to that obtained by folding the Fe band
structure of the MgO-based MTJs in the Brillouin zone of the in-plane wave
vector. We show that such a difference in the Fe band structure is the origin
of the difference in the critical bias voltage $V_{\rm c}$ between the
MgAl${}_2$O${}_4$- and MgO-based MTJs. | [
0,
1,
0,
0,
0,
0
] |
Title: Listen to Your Face: Inferring Facial Action Units from Audio Channel,
Abstract: Extensive efforts have been devoted to recognizing facial action units (AUs).
However, it is still challenging to recognize AUs from spontaneous facial
displays especially when they are accompanied with speech. Different from all
prior work that utilized visual observations for facial AU recognition, this
paper presents a novel approach that recognizes speech-related AUs exclusively
from audio signals based on the fact that facial activities are highly
correlated with voice during speech. Specifically, dynamic and physiological
relationships between AUs and phonemes are modeled through a continuous time
Bayesian network (CTBN); then AU recognition is performed by probabilistic
inference via the CTBN model.
A pilot audiovisual AU-coded database has been constructed to evaluate the
proposed audio-based AU recognition framework. The database consists of a
"clean" subset with frontal and neutral faces and a challenging subset
collected with large head movements and occlusions. Experimental results on
this database show that the proposed CTBN model achieves promising recognition
performance for 7 speech-related AUs and outperforms the state-of-the-art
visual-based methods especially for those AUs that are activated at low
intensities or "hardly visible" in the visual channel. Furthermore, the CTBN
model yields more impressive recognition performance on the challenging subset,
where the visual-based approaches suffer significantly. | [
1,
0,
0,
0,
0,
0
] |
Title: Icing on the Cake: An Easy and Quick Post-Learnig Method You Can Try After Deep Learning,
Abstract: We found an easy and quick post-learning method named "Icing on the Cake" to
enhance a classification performance in deep learning. The method is that we
train only the final classifier again after an ordinary training is done. | [
0,
0,
0,
1,
0,
0
] |
Title: Minimal Effort Back Propagation for Convolutional Neural Networks,
Abstract: As traditional neural network consumes a significant amount of computing
resources during back propagation, \citet{Sun2017mePropSB} propose a simple yet
effective technique to alleviate this problem. In this technique, only a small
subset of the full gradients are computed to update the model parameters. In
this paper we extend this technique into the Convolutional Neural Network(CNN)
to reduce calculation in back propagation, and the surprising results verify
its validity in CNN: only 5\% of the gradients are passed back but the model
still achieves the same effect as the traditional CNN, or even better. We also
show that the top-$k$ selection of gradients leads to a sparse calculation in
back propagation, which may bring significant computational benefits for high
computational complexity of convolution operation in CNN. | [
1,
0,
0,
1,
0,
0
] |
Title: Hölder continuous solutions of the Monge-Ampère equation on compact Hermitian manifolds,
Abstract: We show that a positive Borel measure of positive finite total mass, on
compact Hermitian manifolds, admits a Holder continuous quasi-plurisubharmonic
solution to the Monge-Ampere equation if and only if it is dominated locally by
Monge-Ampere measures of Holder continuous plurisubharmonic functions. | [
0,
0,
1,
0,
0,
0
] |
Title: Comparative Climates of TRAPPIST-1 planetary system: results from a simple climate-vegetation model,
Abstract: The recent discovery of the planetary system hosted by the ultracool dwarf
star TRAPPIST-1 could open new perspectives into the investigation of planetary
climates of Earth-sized exoplanets, their atmospheres and their possible
habitability. In this paper, we use a simple climate-vegetation energy-balance
model to study the climate of the seven TRAPPIST-1 planets and the climate
dependence on the global albedo, on the fraction of vegetation that could cover
their surfaces and on the different greenhouse conditions. The model allows us
to investigate whether liquid water could be maintained on the planetary
surfaces (i.e., by defining a "surface water zone") in different planetary
conditions, with or without the presence of greenhouse effect.
It is shown that planet TRAPPIST-1d seems to be the most stable from an
Earth-like perspective, since it resides in the surface water zone for a wide
range of reasonable values of the model parameters. Moreover, according to the
model outer planets (f, g and h) cannot host liquid water on their surfaces,
even for Earth-like conditions, entering a snowball state. Although very
simple, the model allows to extract the main features of the TRAPPIST-1
planetary climates. | [
0,
1,
0,
0,
0,
0
] |
Title: Width Hierarchies for Quantum and Classical Ordered Binary Decision Diagrams with Repeated Test,
Abstract: We consider quantum, nondterministic and probabilistic versions of known
computational model Ordered Read-$k$-times Branching Programs or Ordered Binary
Decision Diagrams with repeated test ($k$-QOBDD, $k$-NOBDD and $k$-POBDD). We
show width hierarchy for complexity classes of Boolean function computed by
these models and discuss relation between different variants of $k$-OBDD. | [
1,
0,
0,
0,
0,
0
] |
Title: Stall force of a cargo driven by N interacting motor proteins,
Abstract: We study a generic one-dimensional model for an intracellular cargo driven by
N motor proteins against an external applied force. The model includes
motor-cargo and motor-motor interactions. The cargo motion is described by an
over-damped Langevin equation, while motor dynamics is specified by hopping
rates which follow a local detailed balance condition with respect to change in
energy per hopping event. Based on this model, we show that the stall force,
the mean external force corresponding to zero mean cargo velocity, is
completely independent of the details of the interactions and is, therefore,
always equal to the sum of the stall forces of the individual motors. This
exact result is arrived on the basis of a simple assumption: the (macroscopic)
state of stall of the cargo is analogous to a state of thermodynamic
equilibrium, and is characterized by vanishing net probability current between
any two microstates, with the latter specified by motor positions relative to
the cargo. The corresponding probability distribution of the microstates under
stall is also determined. These predictions are in complete agreement with
numerical simulations, carried out using specific forms of interaction
potentials. | [
0,
1,
0,
0,
0,
0
] |
Title: Separation of time scales and direct computation of weights in deep neural networks,
Abstract: Artificial intelligence is revolutionizing our lives at an ever increasing
pace. At the heart of this revolution is the recent advancements in deep neural
networks (DNN), learning to perform sophisticated, high-level tasks. However,
training DNNs requires massive amounts of data and is very computationally
intensive. Gaining analytical understanding of the solutions found by DNNs can
help us devise more efficient training algorithms, replacing the commonly used
mthod of stochastic gradient descent (SGD). We analyze the dynamics of SGD and
show that, indeed, direct computation of the solutions is possible in many
cases. We show that a high performing setup used in DNNs introduces a
separation of time-scales in the training dynamics, allowing SGD to train
layers from the lowest (closest to input) to the highest. We then show that for
each layer, the distribution of solutions found by SGD can be estimated using a
class-based principal component analysis (PCA) of the layer's input. This
finding allows us to forgo SGD entirely and directly derive the DNN parameters
using this class-based PCA, which can be well estimated using significantly
less data than SGD. We implement these results on image datasets MNIST, CIFAR10
and CIFAR100 and find that, in fact, layers derived using our class-based PCA
perform comparable or superior to neural networks of the same size and
architecture trained using SGD. We also confirm that the class-based PCA often
converges using a fraction of the data required for SGD. Thus, using our method
training time can be reduced both by requiring less training data than SGD, and
by eliminating layers in the costly backpropagation step of the training. | [
1,
0,
0,
1,
0,
0
] |
Title: $q$-deformed quadrature operator and optical tomogram,
Abstract: In this letter, we define the homodyne $q$-deformed quadrature operator.
Analytic expression for the wavefunctions of $q$-deformed oscillator in the
quadrature basis are found. Furthermore, we compute the explicit analytical
expression for the tomogram of the $q$-deformed coherent states by finding the
eigenstates of the $q$-deformed quadrature operator. | [
0,
1,
1,
0,
0,
0
] |
Title: Asymptotic measures and links in simplicial complexes,
Abstract: We introduce canonical measures on a locally finite simplicial complex $K$
and study their asymptotic behavior under infinitely many barycentric
subdivisions. We also compute the face polynomial of the asymptotic link and
dual block of a simplex in the $d^{th}$ barycentric subdivision $Sd^d(K)$ of
$K$, $d\gg0$. It is almost everywhere constant. When $K$ is finite, we study
the limit face polynomial of $Sd^d(K)$ after F.Brenti-V.Welker and
E.Delucchi-A.Pixton-L.Sabalka. | [
0,
0,
1,
0,
0,
0
] |
Title: Usability of Humanly Computable Passwords,
Abstract: Reusing passwords across multiple websites is a common practice that
compromises security. Recently, Blum and Vempala have proposed password
strategies to help people calculate, in their heads, passwords for different
sites without dependence on third-party tools or external devices. Thus far,
the security and efficiency of these "mental algorithms" has been analyzed only
theoretically. But are such methods usable? We present the first usability
study of humanly computable password strategies, involving a learning phase (to
learn a password strategy), then a rehearsal phase (to login to a few
websites), and multiple follow-up tests. In our user study, with training,
participants were able to calculate a deterministic eight-character password
for an arbitrary new website in under 20 seconds. | [
1,
0,
0,
0,
0,
0
] |
Title: Performance analysis of smart digital signage system based on software-defined IoT and invisible image sensor communication,
Abstract: Everything in the world is being connected, and things are becoming
interactive. The future of the interactive world depends on the future Internet
of Things (IoT). Software-defined networking (SDN) technology, a new paradigm
in the networking area, can be useful in creating an IoT because it can handle
interactivity by controlling physical devices, transmission of data among them,
and data acquisition. However, digital signage can be one of the promising
technologies in this era of technology that is progressing toward the
interactive world, connecting users to the IoT network through device-to-device
communication technology. This article illustrates a novel prototype that is
mainly focused on a smart digital signage system comprised of software-defined
IoT (SD-IoT) and invisible image sensor communication technology. We have
proposed an SDN scheme with a view to initiating its flexibility and
compatibility for an IoT network-based smart digital signage system. The idea
of invisible communication can make the users of the technology trendier to it,
and the usage of unused resources such as images and videos can be ensured. In
addition, this communication has paved the way for interactivity between the
user and digital signage, where the digital signage and the camera of a
smartphone can be operated as a transmitter and a receiver, respectively. The
proposed scheme might be applicable to real-world applications because SDN has
the flexibility to adapt with the alteration of network status without any
hardware modifications while displays and smartphones are available everywhere.
A performance analysis of this system showed the advantages of an SD-IoT
network over an Internet protocol-based IoT network considering a queuing
analysis for a dynamic link allocation process in the case of user access to
the IoT network. | [
1,
0,
0,
0,
0,
0
] |
Title: What pebbles are made of: Interpretation of the V883 Ori disk,
Abstract: Recently, an Atacama Large Millimeter/submillimeter Array (ALMA) observation
of the water snow line in the protoplanetary disk around the FU Orionis star
V883 Ori was reported. The radial variation of the spectral index at
mm-wavelengths around the snow line was interpreted as being due to a pileup of
particles interior to the snow line. However, radial transport of solids in the
outer disk operates on timescales much longer than the typical timescale of an
FU Ori outburst ($10^{1}$--$10^{2}$ yr). Consequently, a steady-state pileup is
unlikely. We argue that it is only necessary to consider water evaporation and
re-coagulation of silicates to explain the recent ALMA observation of V883 Ori
because these processes are short enough to have had their impact since the
outburst. Our model requires the inner disk to have already been optically
thick before the outburst, and our results suggest that the carbon content of
pebbles is low. | [
0,
1,
0,
0,
0,
0
] |
Title: More on products of Baire spaces,
Abstract: New results on the Baire product problem are presented. It is shown that an
arbitrary product of almost locally ccc Baire spaces is Baire; moreover, the
product of a Baire space and a 1st countable space which is $\beta$-unfavorable
in the strong Choquet game is Baire. | [
0,
0,
1,
0,
0,
0
] |
Title: Social versus Moral preferences in the Ultimatum Game: A theoretical model and an experiment,
Abstract: In the Ultimatum Game (UG) one player, named "proposer", has to decide how to
allocate a certain amount of money between herself and a "responder". If the
offer is greater than or equal to the responder's minimum acceptable offer
(MAO), then the money is split as proposed, otherwise, neither the proposer nor
the responder get anything. The UG has intrigued generations of behavioral
scientists because people in experiments blatantly violate the equilibrium
predictions that self-interested proposers offer the minimum available non-zero
amount, and self-interested responders accept. Why are these predictions
violated? Previous research has mainly focused on the role of social
preferences. Little is known about the role of general moral preferences for
doing the right thing, preferences that have been shown to play a major role in
other social interactions (e.g., Dictator Game and Prisoner's Dilemma). Here I
develop a theoretical model and an experiment designed to pit social
preferences against moral preferences. I find that, although people recognize
that offering half and rejecting low offers are the morally right things to do,
moral preferences have no causal impact on UG behavior. The experimental data
are indeed well fit by a model according to which: (i) high UG offers are
motivated by inequity aversion and, to a lesser extent, self-interest; (ii)
high MAOs are motivated by inequity aversion. | [
0,
0,
0,
0,
1,
0
] |
Title: A simple recipe for making accurate parametric inference in finite sample,
Abstract: Constructing tests or confidence regions that control over the error rates in
the long-run is probably one of the most important problem in statistics. Yet,
the theoretical justification for most methods in statistics is asymptotic. The
bootstrap for example, despite its simplicity and its widespread usage, is an
asymptotic method. There are in general no claim about the exactness of
inferential procedures in finite sample. In this paper, we propose an
alternative to the parametric bootstrap. We setup general conditions to
demonstrate theoretically that accurate inference can be claimed in finite
sample. | [
0,
0,
1,
1,
0,
0
] |
Title: Panel collapse and its applications,
Abstract: We describe a procedure called panel collapse for replacing a CAT(0) cube
complex $\Psi$ by a "lower complexity" CAT(0) cube complex $\Psi_\bullet$
whenever $\Psi$ contains a codimension-$2$ hyperplane that is extremal in one
of the codimension-$1$ hyperplanes containing it. Although $\Psi_\bullet$ is
not in general a subcomplex of $\Psi$, it is a subspace consisting of a
subcomplex together with some cubes that sit inside $\Psi$ "diagonally". The
hyperplanes of $\Psi_\bullet$ extend to hyperplanes of $\Psi$. Applying this
procedure, we prove: if a group $G$ acts cocompactly on a CAT(0) cube complex
$\Psi$, then there is a CAT(0) cube complex $\Omega$ so that $G$ acts
cocompactly on $\Omega$ and for each hyperplane $H$ of $\Omega$, the stabiliser
in $G$ of $H$ acts on $H$ essentially.
Using panel collapse, we obtain a new proof of Stallings's theorem on groups
with more than one end. As another illustrative example, we show that panel
collapse applies to the exotic cubulations of free groups constructed by Wise.
Next, we show that the CAT(0) cube complexes constructed by Cashen-Macura can
be collapsed to trees while preserving all of the necessary group actions. (It
also illustrates that our result applies to actions of some non-discrete
groups.) We also discuss possible applications to quasi-isometric rigidity for
certain classes of graphs of free groups with cyclic edge groups. Panel
collapse is also used in forthcoming work of the first-named author and Wilton
to study fixed-point sets of finite subgroups of $\mathrm{Out}(F_n)$ on the
free splitting complex. | [
0,
0,
1,
0,
0,
0
] |
Title: Detecting Heavy Flows in the SDN Match and Action Model,
Abstract: Efficient algorithms and techniques to detect and identify large flows in a
high throughput traffic stream in the SDN match-and-action model are presented.
This is in contrast to previous work that either deviated from the match and
action model by requiring additional switch level capabilities or did not
exploit the SDN data plane. Our construction has two parts; (a) how to sample
in an SDN match and action model, (b) how to detect large flows efficiently and
in a scalable way, in the SDN model.
Our large flow detection methods provide high accuracy and present a good and
practical tradeoff between switch - controller traffic, and the number of
entries required in the switch flow table. Based on different parameters, we
differentiate between heavy flows, elephant flows and bulky flows and present
efficient algorithms to detect flows of the different types.
Additionally, as part of our heavy flow detection scheme, we present sampling
methods to sample packets with arbitrary probability $p$ per packet or per byte
that traverses an SDN switch.
Finally, we show how our algorithms can be adapted to a distributed
monitoring SDN setting with multiple switches, and easily scale with the number
of monitoring switches. | [
1,
0,
0,
0,
0,
0
] |
Title: Optimal Resource Allocation with Node and Link Capacity Constraints in Complex Networks,
Abstract: With the tremendous increase of the Internet traffic, achieving the best
performance with limited resources is becoming an extremely urgent problem. In
order to address this concern, in this paper, we build an optimization problem
which aims to maximize the total utility of traffic flows with the capacity
constraint of nodes and links in the network. Based on Duality Theory, we
propose an iterative algorithm which adjusts the rates of traffic flows and
capacity of nodes and links simultaneously to maximize the total utility.
Simulation results show that our algorithm performs better than the NUP
algorithm on BA and ER network models, which has shown to get the best
performance so far. Since our research combines the topology information with
capacity constraint, it may give some insights for resource allocation in real
communication networks. | [
1,
1,
0,
0,
0,
0
] |
Title: On the complexity of solving a decision problem with flow-depending costs: the case of the IJsselmeer dikes,
Abstract: We consider a fundamental integer programming (IP) model for cost-benefit
analysis flood protection through dike building in the Netherlands, due to
Verweij and Zwaneveld.
Experimental analysis with data for the Ijsselmeer lead to integral optimal
solution of the linear programming relaxation of the IP model.
This naturally led to the question of integrality of the polytope associated
with the IP model.
In this paper we first give a negative answer to this question by
establishing non-integrality of the polytope.
Second, we establish natural conditions that guarantee the linear programming
relaxation of the IP model to be integral.
We then test the most recent data on flood probabilities, damage and
investment costs of the IJsselmeer for these conditions.
Third, we show that the IP model can be solved in polynomial time when the
number of dike segments, or the number of feasible barrier heights, are
constant. | [
0,
0,
0,
0,
0,
1
] |
Title: Integrating Human-Provided Information Into Belief State Representation Using Dynamic Factorization,
Abstract: In partially observed environments, it can be useful for a human to provide
the robot with declarative information that represents probabilistic relational
constraints on properties of objects in the world, augmenting the robot's
sensory observations. For instance, a robot tasked with a search-and-rescue
mission may be informed by the human that two victims are probably in the same
room. An important question arises: how should we represent the robot's
internal knowledge so that this information is correctly processed and combined
with raw sensory information? In this paper, we provide an efficient belief
state representation that dynamically selects an appropriate factoring,
combining aspects of the belief when they are correlated through information
and separating them when they are not. This strategy works in open domains, in
which the set of possible objects is not known in advance, and provides
significant improvements in inference time over a static factoring, leading to
more efficient planning for complex partially observed tasks. We validate our
approach experimentally in two open-domain planning problems: a 2D discrete
gridworld task and a 3D continuous cooking task. A supplementary video can be
found at this http URL. | [
1,
0,
0,
0,
0,
0
] |
Title: On Integral Upper Limits Assuming Power Law Spectra and the Sensitivity in High-Energy Astronomy,
Abstract: The high-energy non-thermal universe is dominated by power law-like spectra.
Therefore results in high-energy astronomy are often reported as parameters of
power law fits, or, in the case of a non-detection, as an upper limit assuming
the underlying unseen spectrum behaves as a power law. In this paper I
demonstrate a simple and powerful one-to-one relation of the integral upper
limit in the two dimensional power law parameter space into the spectrum
parameter space and use this method to unravel the so far convoluted question
of the sensitivity of astroparticle telescopes. | [
0,
1,
0,
0,
0,
0
] |
Title: When a triangle is isosceles?,
Abstract: In 1840 Jacob Steiner on Christian Rudolf's request proved that a triangle
with two equal bisectors is isosceles. But what about changing the bisectors to
cevians? Cevian is any line segment in a triangle with one endpoint on a vertex
of the triangle and other endpoint on the opposite side. Not for any pairs of
equal cevians the triangle is isosceles. Theorem. If for a triangle ABC there
are equal cevians issuing from A and B, which intersect on the bisector or on
the median of the angle C, then AC=BC (so the triangle ABC is isosceles).
Proposition. Let ABC be an isosceles triangle. Define circle C to be the circle
symmetric relative to AB to the circumscribed circle of the triangle ABC. Then
the locus of intersection points of pairs of equal cevians is the union of the
base AB, the triangle's axis of symmetry, and the circle C. | [
0,
0,
1,
0,
0,
0
] |
Title: Anomaly detecting and ranking of the cloud computing platform by multi-view learning,
Abstract: Anomaly detecting as an important technical in cloud computing is applied to
support smooth running of the cloud platform. Traditional detecting methods
based on statistic, analysis, etc. lead to the high false-alarm rate due to
non-adaptive and sensitive parameters setting. We presented an online model for
anomaly detecting using machine learning theory. However, most existing methods
based on machine learning linked all features from difference sub-systems into
a long feature vector directly, which is difficult to both exploit the
complement information between sub-systems and ignore multi-view features
enhancing the classification performance. Aiming to this problem, the proposed
method automatic fuses multi-view features and optimize the discriminative
model to enhance the accuracy. This model takes advantage of extreme learning
machine (ELM) to improve detection efficiency. ELM is the single hidden layer
neural network, which is transforming iterative solution the output weights to
solution of linear equations and avoiding the local optimal solution. Moreover,
we rank anomies according to the relationship between samples and the
classification boundary, and then assigning weights for ranked anomalies,
retraining the classification model finally. Our method exploits the complement
information between sub-systems sufficiently, and avoids the influence from
imbalance dataset, therefore, deal with various challenges from the cloud
computing platform. We deploy the privately cloud platform by Openstack,
verifying the proposed model and comparing results to the state-of-the-art
methods with better efficiency and simplicity. | [
1,
0,
0,
1,
0,
0
] |
Title: A graph model of message passing processes,
Abstract: In the paper we consider a graph model of message passing processes and
present a method verification of message passing processes. The method is
illustrated by an example of a verification of sliding window protocol. | [
1,
0,
0,
0,
0,
0
] |
Title: Learning the Sparse and Low Rank PARAFAC Decomposition via the Elastic Net,
Abstract: In this article, we derive a Bayesian model to learning the sparse and low
rank PARAFAC decomposition for the observed tensor with missing values via the
elastic net, with property to find the true rank and sparse factor matrix which
is robust to the noise. We formulate efficient block coordinate descent
algorithm and admax stochastic block coordinate descent algorithm to solve it,
which can be used to solve the large scale problem. To choose the appropriate
rank and sparsity in PARAFAC decomposition, we will give a solution path by
gradually increasing the regularization to increase the sparsity and decrease
the rank. When we find the sparse structure of the factor matrix, we can fixed
the sparse structure, using a small to regularization to decreasing the
recovery error, and one can choose the proper decomposition from the solution
path with sufficient sparse factor matrix with low recovery error. We test the
power of our algorithm on the simulation data and real data, which show it is
powerful. | [
0,
0,
1,
1,
0,
0
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.