text
stringlengths
57
2.88k
labels
sequencelengths
6
6
Title: Interference effects of deleterious and beneficial mutations in large asexual populations, Abstract: Linked beneficial and deleterious mutations are known to decrease the fixation probability of a favorable mutation in large asexual populations. While the hindering effect of strongly deleterious mutations on adaptive evolution has been well studied, how weak deleterious mutations, either in isolation or with superior beneficial mutations, influence the fixation of a beneficial mutation has not been fully explored. Here, using a multitype branching process, we obtain an accurate analytical expression for the fixation probability when deleterious effects are weak, and exploit this result along with the clonal interference theory to investigate the joint effect of linked beneficial and deleterious mutations on the rate of adaptation. We find that when the mutation rate is increased beyond the beneficial fitness effect, the fixation probability of the beneficial mutant decreases from Haldane's classical result towards zero. This has the consequence that above a critical mutation rate that may depend on the population size, the adaptation rate decreases exponentially with the mutation rate and is independent of the population size. In addition, we find that for a range of mutation rates, both beneficial and deleterious mutations interfere and impede the adaptation process in large populations. We also study the evolution of mutation rates in adapting asexual populations, and conclude that linked beneficial mutations have a stronger influence on mutator fixation than the deleterious mutations.
[ 0, 0, 0, 0, 1, 0 ]
Title: Grassmanians and Pseudosphere Arrangements, Abstract: We extend vector configurations to more general objects that have nicer combinatorial and topological properties, called weighted pseudosphere arrangements. These are defined as a weighted variant of arrangements of pseudospheres, as in the Topological Representation Theorem for oriented matroids. We show that in rank 3, the real Stiefel manifold, Grassmanian, and oriented Grassmanian are homotopy equivalent to the analagously defined spaces of weighted pseudosphere arrangements. We also show for all rank 3 oriented matroids, that the space of realizations by weighted pseudosphere arrangements is contractible. This is a sharp contrast with vector configurations, where the space of realizations can have the homotopy type of any primary semialgebraic set.
[ 0, 0, 1, 0, 0, 0 ]
Title: Rational homotopy theory via Sullivan models: a survey, Abstract: This survey contains the main results in rational homotopy, from the beginning to the most recent ones. It makes the status of the art, gives a short presentation of some areas where rational homotopy has been used, and contains a lot of important open problems
[ 0, 0, 1, 0, 0, 0 ]
Title: Variations on known and recent cardinality bounds, Abstract: Sapirovskii [18] proved that $|X|\leq\pi\chi(X)^{c(X)\psi(X)}$, for a regular space $X$. We introduce the $\theta$-pseudocharacter of a Urysohn space $X$, denoted by $\psi_\theta (X)$, and prove that the previous inequality holds for Urysohn spaces replacing the bounds on celluarity $c(X)\leq\kappa$ and on pseudocharacter $\psi(X)\leq\kappa$ with a bound on Urysohn cellularity $Uc(X)\leq\kappa$ (which is a weaker conditon because $Uc(X)\leq c(X)$) and on $\theta$-pseudocharacter $\psi_\theta (X)\leq\kappa$ respectivly (note that in general $\psi(\cdot)\leq\psi_\theta (\cdot)$ and in the class of regular spaces $\psi(\cdot)=\psi_\theta(\cdot)$). Further, in [6] the authors generalized the Dissanayake and Willard's inequality: $|X|\leq 2^{aL_{c}(X)\chi(X)}$, for Hausdorff spaces $X$ [25], in the class of $n$-Hausdorff spaces and de Groot's result: $|X|\leq 2^{hL(X)}$, for Hausdorff spaces [11], in the class of $T_1$ spaces (see Theorems 2.22 and 2.23 in [6]). In this paper we restate Theorem 2.22 in [6] in the class of $n$-Urysohn spaces and give a variation of Theorem 2.23 in [6] using new cardinal functions, denoted by $UW(X)$, $\psi w_\theta(X)$, $\theta\hbox{-}aL(X)$, $h\theta\hbox{-}aL(X)$, $\theta\hbox{-}aL_c(X)$ and $\theta\hbox{-}aL_{\theta}(X)$. In [5] the authors introduced the Hausdorff point separating weight of a space $X$ denoted by $Hpsw(X)$ and proved a Hausdorff version of Charlesworth's inequality $|X|\leq psw(X)^{L(X)\psi(X)}$ [7]. In this paper, we introduce the Urysohn point separating weight of a space $X$, denoted by $Upsw(X)$, and prove that $|X|\leq Upsw(X)^{\theta\hbox{-}aL_{c}(X)\psi(X)}$, for a Urysohn space $X$.
[ 0, 0, 1, 0, 0, 0 ]
Title: Spatio-temporal intermittency of the turbulent energy cascade, Abstract: In incompressible and periodic statistically stationary turbulence, exchanges of turbulent energy across scales and space are characterised by very intense and intermittent spatio-temporal fluctuations around zero of the time-derivative term, the spatial turbulent transport of fluctuating energy, and the pressure-velocity term. These fluctuations are correlated with each other and with the intense intermittent fluctuations of the interscale energy transfer rate. These correlations are caused by the sweeping effect, the link between non-linearity and non-locality, and also relate to geometrical alignments between the two-point fluctuating pressure force difference and the two-point fluctuating velocity difference in the case of the correlation between the interscale transfer rate and the pressure-velocity term. All these processes are absent from the spatio-temporal average picture of the turbulence cascade in statistically stationary and homogeneous turbulence.
[ 0, 1, 0, 0, 0, 0 ]
Title: Voltage Analytics for Power Distribution Network Topology Verification, Abstract: Distribution grids constitute complex networks of lines often times reconfigured to minimize losses, balance loads, alleviate faults, or for maintenance purposes. Topology monitoring becomes a critical task for optimal grid scheduling. While synchrophasor installations are limited in low-voltage grids, utilities have an abundance of smart meter data at their disposal. In this context, a statistical learning framework is put forth for verifying single-phase grid structures using non-synchronized voltage data. The related maximum likelihood task boils down to minimizing a non-convex function over a non-convex set. The function involves the sample voltage covariance matrix and the feasible set is relaxed to its convex hull. Asymptotically in the number of data, the actual topology yields the global minimizer of the original and the relaxed problems. Under a simplified data model, the function turns out to be convex, thus offering optimality guarantees. Prior information on line statuses is also incorporated via a maximum a-posteriori approach. The formulated tasks are tackled using solvers having complementary strengths. Numerical tests using real data on benchmark feeders demonstrate that reliable topology estimates can be acquired even with a few smart meter data, while the non-convex schemes exhibit superior line verification performance at the expense of additional computational time.
[ 0, 0, 1, 0, 0, 0 ]
Title: The comprehension construction, Abstract: In this paper we construct an analogue of Lurie's "unstraightening" construction that we refer to as the "comprehension construction". Its input is a cocartesian fibration $p \colon E \to B$ between $\infty$-categories together with a third $\infty$-category $A$. The comprehension construction then defines a map from the quasi-category of functors from $A$ to $B$ to the large quasi-category of cocartesian fibrations over $A$ that acts on $f \colon A \to B$ by forming the pullback of $p$ along $f$. To illustrate the versatility of this construction, we define the covariant and contravariant Yoneda embeddings as special cases of the comprehension functor. We then prove that the hom-wise action of the comprehension functor coincides with an "external action" of the hom-spaces of $B$ on the fibres of $p$ and use this to prove that the Yoneda embedding is fully faithful, providing an explicit equivalence between a quasi-category and the homotopy coherent nerve of a Kan-complex enriched category.
[ 0, 0, 1, 0, 0, 0 ]
Title: Deception Detection in Videos, Abstract: We present a system for covert automated deception detection in real-life courtroom trial videos. We study the importance of different modalities like vision, audio and text for this task. On the vision side, our system uses classifiers trained on low level video features which predict human micro-expressions. We show that predictions of high-level micro-expressions can be used as features for deception prediction. Surprisingly, IDT (Improved Dense Trajectory) features which have been widely used for action recognition, are also very good at predicting deception in videos. We fuse the score of classifiers trained on IDT features and high-level micro-expressions to improve performance. MFCC (Mel-frequency Cepstral Coefficients) features from the audio domain also provide a significant boost in performance, while information from transcripts is not very beneficial for our system. Using various classifiers, our automated system obtains an AUC of 0.877 (10-fold cross-validation) when evaluated on subjects which were not part of the training set. Even though state-of-the-art methods use human annotations of micro-expressions for deception detection, our fully automated approach outperforms them by 5%. When combined with human annotations of micro-expressions, our AUC improves to 0.922. We also present results of a user-study to analyze how well do average humans perform on this task, what modalities they use for deception detection and how they perform if only one modality is accessible. Our project page can be found at \url{this https URL}.
[ 1, 0, 0, 0, 0, 0 ]
Title: Extended degenerate Stirling numbers of the second kind and extended degenerate Bell polynomials, Abstract: In a recent work, the degenerate Stirling polynomials of the second kind were studied by T. Kim. In this paper, we investigate the extended degenerate Stirling numbers of the second kind and the extended degenerate Bell polynomials associated with them. As results, we give some expressions, identities and properties about the extended degener- ate Stirling numbers of the second kind and the extended degenerate Bell polynomials.
[ 0, 0, 1, 0, 0, 0 ]
Title: On The Inductive Bias of Words in Acoustics-to-Word Models, Abstract: Acoustics-to-word models are end-to-end speech recognizers that use words as targets without relying on pronunciation dictionaries or graphemes. These models are notoriously difficult to train due to the lack of linguistic knowledge. It is also unclear how the amount of training data impacts the optimization and generalization of such models. In this work, we study the optimization and generalization of acoustics-to-word models under different amounts of training data. In addition, we study three types of inductive bias, leveraging a pronunciation dictionary, word boundary annotations, and constraints on word durations. We find that constraining word durations leads to the most improvement. Finally, we analyze the word embedding space learned by the model, and find that the space has a structure dominated by the pronunciation of words. This suggests that the contexts of words, instead of their phonetic structure, should be the future focus of inductive bias in acoustics-to-word models.
[ 1, 0, 0, 0, 0, 0 ]
Title: BRAVO - Biased Locking for Reader-Writer Locks, Abstract: Designers of modern reader-writer locks confront a difficult trade-off related to reader scalability. Locks that have a compact memory representation for active readers will typically suffer under high intensity read-dominated workloads when the "reader indicator"' state is updated frequently by a diverse set of threads, causing cache invalidation and coherence traffic. Other designs, such as cohort reader-writer locks, use distributed reader indicators, one per NUMA node. This improves reader-reader scalability, but also increases the size of each lock instance. We propose a simple transformation BRAVO, that augments any existing reader-writer lock, adding just two integer fields to the lock instance. Readers make their presence known to writers by hashing their thread's identity with the lock address, forming an index into a visible readers table. Readers attempt to install the lock address into that element in the table, making their existence known to potential writers. All locks and threads in an address space can share the visible readers table. Updates by readers tend to be diffused over the table, resulting in a NUMA-friendly design. Crucially, readers of the same lock tend to write to different locations in the array, reducing coherence traffic. Specifically, BRAVO allows a simple compact lock to be augmented so as to provide scalable concurrent reading but with only a modest increase in footprint.
[ 1, 0, 0, 0, 0, 0 ]
Title: A PCA-based approach for subtracting thermal background emission in high-contrast imaging data, Abstract: Ground-based observations at thermal infrared wavelengths suffer from large background radiation due to the sky, telescope and warm surfaces in the instrument. This significantly limits the sensitivity of ground-based observations at wavelengths longer than 3 microns. We analyzed this background emission in infrared high contrast imaging data, show how it can be modelled and subtracted and demonstrate that it can improve the detection of faint sources, such as exoplanets. We applied principal component analysis to model and subtract the thermal background emission in three archival high contrast angular differential imaging datasets in the M and L filter. We describe how the algorithm works and explain how it can be applied. The results of the background subtraction are compared to the results from a conventional mean background subtraction scheme. Finally, both methods for background subtraction are also compared by performing complete data reductions. We analyze the results from the M dataset of HD100546 qualitatively. For the M band dataset of beta Pic and the L band dataset of HD169142, which was obtained with an annular groove phase mask vortex vector coronagraph, we also calculate and analyze the achieved signal to noise (S/N). We show that applying PCA is an effective way to remove spatially and temporarily varying thermal background emission down to close to the background limit. The procedure also proves to be very successful at reconstructing the background that is hidden behind the PSF. In the complete data reductions, we find at least qualitative improvements for HD100546 and HD169142, however, we fail to find a significant increase in S/N of beta Pic b. We discuss these findings and argue that in particular datasets with strongly varying observing conditions or infrequently sampled sky background will benefit from the new approach.
[ 0, 1, 0, 0, 0, 0 ]
Title: A weak law of large numbers for estimating the correlation in bivariate Brownian semistationary processes, Abstract: This article presents various weak laws of large numbers for the so-called realised covariation of a bivariate stationary stochastic process which is not a semimartingale. More precisely, we consider two cases: Bivariate moving average processes with stochastic correlation and bivariate Brownian semistationary processes with stochastic correlation. In both cases, we can show that the (possibly scaled) realised covariation converges to the integrated (possibly volatility modulated) stochastic correlation process.
[ 0, 0, 1, 1, 0, 0 ]
Title: A Unified Approach to Adaptive Regularization in Online and Stochastic Optimization, Abstract: We describe a framework for deriving and analyzing online optimization algorithms that incorporate adaptive, data-dependent regularization, also termed preconditioning. Such algorithms have been proven useful in stochastic optimization by reshaping the gradients according to the geometry of the data. Our framework captures and unifies much of the existing literature on adaptive online methods, including the AdaGrad and Online Newton Step algorithms as well as their diagonal versions. As a result, we obtain new convergence proofs for these algorithms that are substantially simpler than previous analyses. Our framework also exposes the rationale for the different preconditioned updates used in common stochastic optimization methods.
[ 1, 0, 1, 1, 0, 0 ]
Title: Discretization error cancellation in electronic structure calculation: a quantitative study, Abstract: It is often claimed that error cancellation plays an essential role in quantum chemistry and first-principle simulation for condensed matter physics and materials science. Indeed, while the energy of a large, or even medium-size, molecular system cannot be estimated numerically within chemical accuracy (typically 1 kcal/mol or 1 mHa), it is considered that the energy difference between two configurations of the same system can be computed in practice within the desired accuracy. The purpose of this paper is to provide a quantitative study of discretization error cancellation. The latter is the error component due to the fact that the model used in the calculation (e.g. Kohn-Sham LDA) must be discretized in a finite basis set to be solved by a computer. We first report comprehensive numerical simulations performed with Abinit on two simple chemical systems, the hydrogen molecule on the one hand, and a system consisting of two oxygen atoms and four hydrogen atoms on the other hand. We observe that errors on energy differences are indeed significantly smaller than errors on energies, but that these two quantities asymptotically converge at the same rate when the energy cut-off goes to infinity. We then analyze a simple one-dimensional periodic Schrödinger equation with Dirac potentials, for which analytic solutions are available. This allows us to explain the discretization error cancellation phenomenon on this test case with quantitative mathematical arguments.
[ 0, 1, 1, 0, 0, 0 ]
Title: Analysis of spectral clustering algorithms for community detection: the general bipartite setting, Abstract: We consider spectral clustering algorithms for community detection under a general bipartite stochastic block model (SBM). A modern spectral clustering algorithm consists of three steps: (1) regularization of an appropriate adjacency or Laplacian matrix (2) a form of spectral truncation and (3) a k-means type algorithm in the reduced spectral domain. We focus on the adjacency-based spectral clustering and for the first step, propose a new data-driven regularization that can restore the concentration of the adjacency matrix even for the sparse networks. This result is based on recent work on regularization of random binary matrices, but avoids using unknown population level parameters, and instead estimates the necessary quantities from the data. We also propose and study a novel variation of the spectral truncation step and show how this variation changes the nature of the misclassification rate in a general SBM. We then show how the consistency results can be extended to models beyond SBMs, such as inhomogeneous random graph models with approximate clusters, including a graphon clustering problem, as well as general sub-Gaussian biclustering. A theme of the paper is providing a better understanding of the analysis of spectral methods for community detection and establishing consistency results, under fairly general clustering models and for a wide regime of degree growths, including sparse cases where the average expected degree grows arbitrarily slowly.
[ 1, 0, 0, 1, 0, 0 ]
Title: A computational approach to calculate the heat of transport of aqueous solutions, Abstract: Thermal gradients induce concentration gradients in alkali halide solutions, and the salt migrates towards hot or cold regions depending on the average temperature of the solution. This effect has been interpreted using the heat of transport, which provides a route to rationalize thermophoretic phenomena. Early theories provide estimates of the heat of transport at infinite dilution. These values are used to interpret thermodiffusion (Soret) and thermoelectric (Seebeck) effects. However, accessing heats of transport of individual ions at finite concentration remains an outstanding question both theoretically and experimentally. Here we discuss a computational approach to calculate heats of transport of aqueous solutions at finite concentrations, and apply our method to study lithium chloride solutions at concentrations $>0.5$~M. The heats of transport are significantly different for Li$^+$ and Cl$^-$ ions, unlike what is expected at infinite dilution. We find theoretical evidence for the existence of minima in the Soret coefficient of LiCl, where the magnitude of the heat of transport is maximized. The Seebeck coefficient obtained from the ionic heats of transport varies significantly with temperature and concentration. We identify thermodynamic conditions leading to a maximization of the thermoelectric response of aqueous solutions.
[ 0, 1, 0, 0, 0, 0 ]
Title: The p-convolution forest: a method for solving graphical models with additive probabilistic equations, Abstract: Convolution trees, loopy belief propagation, and fast numerical p-convolution are combined for the first time to efficiently solve networks with several additive constraints between random variables. An implementation of this "convolution forest" approach is constructed from scratch, including an improved trimmed convolution tree algorithm and engineering details that permit fast inference in practice, and improve the ability of scientists to prototype models with additive relationships between discrete variables. The utility of this approach is demonstrated using several examples: these include illustrations on special cases of some classic NP-complete problems (subset sum and knapsack), identification of GC-rich genomic regions with a large hidden Markov model, inference of molecular composition from summary statistics of the intact molecule, and estimation of elemental abundance in the presence of overlapping isotope peaks.
[ 0, 0, 0, 1, 0, 0 ]
Title: Statistical Timing Analysis for Latch-Controlled Circuits with Reduced Iterations and Graph Transformations, Abstract: Level-sensitive latches are widely used in high- performance designs. For such circuits efficient statistical timing analysis algorithms are needed to take increasing process vari- ations into account. But existing methods solving this problem are still computationally expensive and can only provide the yield at a given clock period. In this paper we propose a method combining reduced iterations and graph transformations. The reduced iterations extract setup time constraints and identify a subgraph for the following graph transformations handling the constraints from nonpositive loops. The combined algorithms are very efficient, more than 10 times faster than other existing methods, and result in a parametric minimum clock period, which together with the hold time constraints can be used to compute the yield at any given clock period very easily.
[ 1, 0, 0, 0, 0, 0 ]
Title: A moment-angle manifold whose cohomology is not torsion free, Abstract: In this paper we give a method to construct moment-angle manifolds whose cohomologies are not torsion free. We also give method to describe the corresponding simplicial sphere by its non-faces.
[ 0, 0, 1, 0, 0, 0 ]
Title: The committee machine: Computational to statistical gaps in learning a two-layers neural network, Abstract: Heuristic tools from statistical physics have been used in the past to locate the phase transitions and compute the optimal learning and generalization errors in the teacher-student scenario in multi-layer neural networks. In this contribution, we provide a rigorous justification of these approaches for a two-layers neural network model called the committee machine. We also introduce a version of the approximate message passing (AMP) algorithm for the committee machine that allows to perform optimal learning in polynomial time for a large set of parameters. We find that there are regimes in which a low generalization error is information-theoretically achievable while the AMP algorithm fails to deliver it, strongly suggesting that no efficient algorithm exists for those cases, and unveiling a large computational gap.
[ 0, 0, 0, 1, 0, 0 ]
Title: On the anomalous {changes of seismicity and} geomagnetic field prior to the 2011 $M_w$ 9.0 Tohoku earthquake, Abstract: Xu et al. [J. Asian Earth Sci. {\bf 77}, 59-65 (2013)] It has just been reported that approximately 2 months prior to the $M_w$9.0 Tohoku earthquake that occurred in Japan on 11 March 2011 anomalous variations of the geomagnetic field have been observed in the vertical component at a measuring station about 135 km from the epicenter for about 10 days (4 to 14 January 2011). Here, we show that this observation is in striking agreement with independent recent results obtained from natural time analysis of seismicity in Japan. In particular, this analysis has revealed that an unprecedented minimum of the order parameter fluctuations of seismicity was observed around 5 January 2011, thus pointing to the initiation at that date of a strong precursory Seismic Electric Signals activity accompanied by the anomalous geomagnetic field variations. Starting from this date, natural time analysis of the subsequent seismicity indicates that a strong mainshock was expected in a few days to one week after 08:40 LT on 10 March 2011.
[ 0, 1, 0, 0, 0, 0 ]
Title: Exponentially small splitting of separatrices near a period-doubling bifurcation in area-preserving maps, Abstract: We consider the conservative Hénon family at the period-doubling bifurcation of its fixed point and demonstrate that the separatrices of the fixed saddle point nearing the bifurcation split exponentially: given that $\lambda_+$ is the smaller of the eigenvalues of the saddle point, the angle between the separatrices along the homoclinic orbit satisfies $$\sin \alpha = O(e^{-{\pi^2 \over \log |\lambda_+|}})+ O\left( e^{-2 (1-\kappa) {\pi^2 \over \log |\lambda_+|}} \right),$$ for any positive $\kappa<1$.
[ 0, 0, 1, 0, 0, 0 ]
Title: Deep Neural Networks for Multiple Speaker Detection and Localization, Abstract: We propose to use neural networks for simultaneous detection and localization of multiple sound sources in human-robot interaction. In contrast to conventional signal processing techniques, neural network-based sound source localization methods require fewer strong assumptions about the environment. Previous neural network-based methods have been focusing on localizing a single sound source, which do not extend to multiple sources in terms of detection and localization. In this paper, we thus propose a likelihood-based encoding of the network output, which naturally allows the detection of an arbitrary number of sources. In addition, we investigate the use of sub-band cross-correlation information as features for better localization in sound mixtures, as well as three different network architectures based on different motivations. Experiments on real data recorded from a robot show that our proposed methods significantly outperform the popular spatial spectrum-based approaches.
[ 1, 0, 0, 0, 0, 0 ]
Title: Active Tolerant Testing, Abstract: In this work, we give the first algorithms for tolerant testing of nontrivial classes in the active model: estimating the distance of a target function to a hypothesis class C with respect to some arbitrary distribution D, using only a small number of label queries to a polynomial-sized pool of unlabeled examples drawn from D. Specifically, we show that for the class D of unions of d intervals on the line, we can estimate the error rate of the best hypothesis in the class to an additive error epsilon from only $O(\frac{1}{\epsilon^6}\log \frac{1}{\epsilon})$ label queries to an unlabeled pool of size $O(\frac{d}{\epsilon^2}\log \frac{1}{\epsilon})$. The key point here is the number of labels needed is independent of the VC-dimension of the class. This extends the work of Balcan et al. [2012] who solved the non-tolerant testing problem for this class (distinguishing the zero-error case from the case that the best hypothesis in the class has error greater than epsilon). We also consider the related problem of estimating the performance of a given learning algorithm A in this setting. That is, given a large pool of unlabeled examples drawn from distribution D, can we, from only a few label queries, estimate how well A would perform if the entire dataset were labeled? We focus on k-Nearest Neighbor style algorithms, and also show how our results can be applied to the problem of hyperparameter tuning (selecting the best value of k for the given learning problem).
[ 1, 0, 0, 1, 0, 0 ]
Title: Dirac Line-nodes and Effect of Spin-orbit Coupling in Non-symmorphic Critical Semimetal MSiS (M=Hf, Zr), Abstract: Topological Dirac semimetals (TDSs) represent a new state of quantum matter recently discovered that offers a platform for realizing many exotic physical phenomena. A TDS is characterized by the linear touching of bulk (conduction and valance) bands at discrete points in the momentum space (i.e. 3D Dirac points), such as in Na3Bi and Cd3As2. More recently, new types of Dirac semimetals with robust Dirac line-nodes (with non-trivial topology or near the critical point between topological phase transitions) have been proposed that extends the bulk linear touching from discrete points to 1D lines. In this work, using angle-resolved photoemission spectroscopy (ARPES), we explored the electronic structure of the non-symmorphic crystals MSiS (M=Hf, Zr). Remarkably, by mapping out the band structure in the full 3D Brillouin Zone (BZ), we observed two sets of Dirac line-nodes in parallel with the kz-axis and their dispersions. Interestingly, along directions other than the line-nodes in the 3D BZ, the bulk degeneracy is lifted by spin-orbit coupling (SOC) in both compounds with larger magnitude in HfSiS. Our work not only experimentally confirms a new Dirac line-node semimetal family protected by non-symmorphic symmetry, but also helps understanding and further exploring the exotic properties as well as practical applications of the MSiS family of compounds.
[ 0, 1, 0, 0, 0, 0 ]
Title: An Arcsine Law for Markov Random Walks, Abstract: The classic arcsine law for the number $N_{n}^{>}:=n^{-1}\sum_{k=1}^{n}\mathbf{1}_{\{S_{k}>0\}}$ of positive terms, as $n\to\infty$, in an ordinary random walk $(S_{n})_{n\ge 0}$ is extended to the case when this random walk is governed by a positive recurrent Markov chain $(M_{n})_{n\ge 0}$ on a countable state space $\mathcal{S}$, that is, for a Markov random walk $(M_{n},S_{n})_{n\ge 0}$ with positive recurrent discrete driving chain. More precisely, it is shown that $n^{-1}N_{n}^{>}$ converges in distribution to a generalized arcsine law with parameter $\rho\in [0,1]$ (the classic arcsine law if $\rho=1/2$) iff the Spitzer condition $$ \lim_{n\to\infty}\frac{1}{n}\sum_{k=1}^{n}\mathbb{P}_{i}(S_{n}>0)\ =\ \rho $$ holds true for some and then all $i\in\mathcal{S}$, where $\mathbb{P}_{i}:=\mathbb{P}(\cdot|M_{0}=i)$ for $i\in\mathcal{S}$. It is also proved, under an extra assumption on the driving chain if $0<\rho<1$, that this condition is equivalent to the stronger variant $$ \lim_{n\to\infty}\mathbb{P}_{i}(S_{n}>0)\ =\ \rho. $$ For an ordinary random walk, this was shown by Doney for $0<\rho<1$ and by Bertoin and Doney for $\rho\in\{0,1\}$.
[ 0, 0, 1, 0, 0, 0 ]
Title: Linear Estimation of Treatment Effects in Demand Response: An Experimental Design Approach, Abstract: Demand response aims to stimulate electricity consumers to modify their loads at critical time periods. In this paper, we consider signals in demand response programs as a binary treatment to the customers and estimate the average treatment effect, which is the average change in consumption under the demand response signals. More specifically, we propose to estimate this effect by linear regression models and derive several estimators based on the different models. From both synthetic and real data, we show that including more information about the customers does not always improve estimation accuracy: the interaction between the side information and the demand response signal must be carefully modeled. In addition, we compare the traditional linear regression model with the modified covariate method which models the interaction between treatment effect and covariates. We analyze the variances of these estimators and discuss different cases where each respective estimator works the best. The purpose of these comparisons is not to claim the superiority of the different methods, rather we aim to provide practical guidance on the most suitable estimator to use under different settings. Our results are validated using data collected by Pecan Street and EnergyPlus.
[ 1, 0, 1, 0, 0, 0 ]
Title: Private Learning on Networks: Part II, Abstract: This paper considers a distributed multi-agent optimization problem, with the global objective consisting of the sum of local objective functions of the agents. The agents solve the optimization problem using local computation and communication between adjacent agents in the network. We present two randomized iterative algorithms for distributed optimization. To improve privacy, our algorithms add "structured" randomization to the information exchanged between the agents. We prove deterministic correctness (in every execution) of the proposed algorithms despite the information being perturbed by noise with non-zero mean. We prove that a special case of a proposed algorithm (called function sharing) preserves privacy of individual polynomial objective functions under a suitable connectivity condition on the network topology.
[ 1, 0, 1, 0, 0, 0 ]
Title: The Use of Unlabeled Data versus Labeled Data for Stopping Active Learning for Text Classification, Abstract: Annotation of training data is the major bottleneck in the creation of text classification systems. Active learning is a commonly used technique to reduce the amount of training data one needs to label. A crucial aspect of active learning is determining when to stop labeling data. Three potential sources for informing when to stop active learning are an additional labeled set of data, an unlabeled set of data, and the training data that is labeled during the process of active learning. To date, no one has compared and contrasted the advantages and disadvantages of stopping methods based on these three information sources. We find that stopping methods that use unlabeled data are more effective than methods that use labeled data.
[ 1, 0, 0, 1, 0, 0 ]
Title: RAFP-Pred: Robust Prediction of Antifreeze Proteins using Localized Analysis of n-Peptide Compositions, Abstract: In extreme cold weather, living organisms produce Antifreeze Proteins (AFPs) to counter the otherwise lethal intracellular formation of ice. Structures and sequences of various AFPs exhibit a high degree of heterogeneity, consequently the prediction of the AFPs is considered to be a challenging task. In this research, we propose to handle this arduous manifold learning task using the notion of localized processing. In particular an AFP sequence is segmented into two sub-segments each of which is analyzed for amino acid and di-peptide compositions. We propose to use only the most significant features using the concept of information gain (IG) followed by a random forest classification approach. The proposed RAFP-Pred achieved an excellent performance on a number of standard datasets. We report a high Youden's index (sensitivity+specificity-1) value of 0.75 on the standard independent test data set outperforming the AFP-PseAAC, AFP\_PSSM, AFP-Pred and iAFP by a margin of 0.05, 0.06, 0.14 and 0.68 respectively. The verification rate on the UniProKB dataset is found to be 83.19\% which is substantially superior to the 57.18\% reported for the iAFP method.
[ 0, 0, 0, 0, 1, 0 ]
Title: Second descent and rational points on Kummer varieties, Abstract: A powerful method pioneered by Swinnerton-Dyer allows one to study rational points on pencils of curves of genus 1 by combining the fibration method with a sophisticated form of descent. A variant of this method, first used by Skorobogatov and Swinnerton-Dyer in 2005, can be applied to study rational points on Kummer varieties. In this paper we extend the method to include an additional step of second descent. Assuming finiteness of the relevant Tate-Shafarevich groups, we use the extended method to show that the Brauer-Manin obstruction is the only obstruction to the Hasse principle on Kummer varieties associated to abelian varieties with all rational 2-torsion, under mild additional hypotheses.
[ 0, 0, 1, 0, 0, 0 ]
Title: When Can Neural Networks Learn Connected Decision Regions?, Abstract: Previous work has questioned the conditions under which the decision regions of a neural network are connected and further showed the implications of the corresponding theory to the problem of adversarial manipulation of classifiers. It has been proven that for a class of activation functions including leaky ReLU, neural networks having a pyramidal structure, that is no layer has more hidden units than the input dimension, produce necessarily connected decision regions. In this paper, we advance this important result by further developing the sufficient and necessary conditions under which the decision regions of a neural network are connected. We then apply our framework to overcome the limits of existing work and further study the capacity to learn connected regions of neural networks for a much wider class of activation functions including those widely used, namely ReLU, sigmoid, tanh, softlus, and exponential linear function.
[ 1, 0, 0, 1, 0, 0 ]
Title: Note on the backwards uniqueness of mean curvature flow, Abstract: In this note, we will show a backwards uniqueness theorem of the mean curvature flow with bounded second fundamental form in arbitrary codimension.
[ 0, 0, 1, 0, 0, 0 ]
Title: A Volcanic Hydrogen Habitable Zone, Abstract: The classical habitable zone is the circular region around a star in which liquid water could exist on the surface of a rocky planet. The outer edge of the traditional N2-CO2-H2O habitable zone (HZ) extends out to nearly 1.7 AU in our Solar System, beyond which condensation and scattering by CO2 outstrips its greenhouse capacity. Here, we show that volcanic outgassing of atmospheric H2 on a planet near the outer edge can extend the habitable zone out to ~2.4 AU in our solar system. This wider volcanic hydrogen habitable zone (N2-CO2-H2O-H2) can be sustained as long as volcanic H2 output offsets its escape from the top of the atmosphere. We use a single-column radiative-convective climate model to compute the HZ limits of this volcanic hydrogen habitable zone for hydrogen concentrations between 1% and 50%, assuming diffusion-limited atmospheric escape. At a hydrogen concentration of 50%, the effective stellar flux required to support the outer edge decreases by ~35% to 60% for M to A stars. The corresponding orbital distances increase by ~30% to 60%. The inner edge of this HZ only moves out by ~0.1 to 4% relative to the classical HZ because H2 warming is reduced in dense H2O atmospheres. The atmospheric scale heights of such volcanic H2 atmospheres near the outer edge of the HZ also increase, facilitating remote detection of atmospheric signatures.
[ 0, 1, 0, 0, 0, 0 ]
Title: A Penrose type inequaltiy for graphs over Reissner-Nordström-anti-deSitter manifold, Abstract: In this paper, we use the inverse mean curvature flow to establish an optimal Minkowski type inquality, weighted Alexandrov-Fenchel inequality for the mean convex star shaped hypersurfaces in Reissner-Nordström-anti-deSitter manifold and Penrose type inequality for asymptotically locally hyperbolic manifolds in which can be realized as graphs over Reissner-Nordström-anti-deSitter manifold.
[ 0, 0, 1, 0, 0, 0 ]
Title: A Novel Approach for Fast and Accurate Mean Error Distance Computation in Approximate Adders, Abstract: In error-tolerant applications, approximate adders have been exploited extensively to achieve energy efficient system designs. Mean error distance is one of the important error metrics used as a performance measure of approximate adders. In this work, a fast and efficient methodology is proposed to determine the exact mean error distance in approximate lower significant bit adders. A detailed description of the proposed algorithm along with an example has been demonstrated in this paper. Experimental analysis shows that the proposed method performs better than existing Monte Carlo simulation approach both in terms of accuracy and execution time.
[ 1, 0, 0, 0, 0, 0 ]
Title: Fluorescent Troffer-powered Internet of Things: An Experimental Study of Electric-field Energy Harvesting, Abstract: A totally new energy harvesting architecture that exploits ambient electric-field (E-field) emitting from fluorescent light fixtures is presented. A copper plate, 50 x 50 cm in size, is placed in between the ambient field to extract energy by capacitive coupling. A low voltage prototype is designed, structured and tested on a conventional ceiling-type 4-light fluorescent troffer operating in 50 Hz 220 V AC power grid. It is examined that the harvester is able to collect roughly 1.25 J of energy in 25 min when a 0.1 F of super-capacitor is employed. The equivalent circuit and the physical model of the proposed harvesting paradigm are provided, and the attainable power is evaluated in both theoretical and experimental manner. The scavenged energy is planned to be utilized for building battery-less Internet of Things (IoT) networks that are obliged to sense environmental parameters, analyze the gathered data, and remotely inform a higher authority within predefined periods.
[ 1, 1, 0, 0, 0, 0 ]
Title: Parallel Simultaneous Perturbation Optimization, Abstract: Stochastic computer simulations enable users to gain new insights into complex physical systems. Optimization is a common problem in this context: users seek to find model inputs that maximize the expected value of an objective function. The objective function, however, is time-intensive to evaluate, and cannot be directly measured. Instead, the stochastic nature of the model means that individual realizations are corrupted by noise. More formally, we consider the problem of optimizing the expected value of an expensive black-box function with continuously-differentiable mean, from which observations are corrupted by Gaussian noise. We present Parallel Simultaneous Perturbation Optimization (PSPO), which extends a well-known stochastic optimization algorithm, simultaneous perturbation stochastic approximation, in several important ways. Our modifications allow the algorithm to fully take advantage of parallel computing resources, like high-performance cloud computing. The resulting PSPO algorithm takes fewer time-consuming iterations to converge, automatically chooses the step size, and can vary the error tolerance by step. Theoretical results are supported by a numerical example. To demonstrate the performance of the algorithm, we implemented the algorithm to maximize the pseudo-likelihood of a stochastic epidemiological model to data of a measles outbreak.
[ 0, 0, 1, 0, 0, 0 ]
Title: Agent-based model for the origins of scaling in human language, Abstract: Background/Introduction: The Zipf's law establishes that if the words of a (large) text are ordered by decreasing frequency, the frequency versus the rank decreases as a power law with exponent close to -1. Previous work has stressed that this pattern arises from a conflict of interests of the participants of communication: speakers and hearers. Methods: The challenge here is to define a computational language game on a population of agents, playing games mainly based on a parameter that measures the relative participant's interests. Results: Numerical simulations suggest that at critical values of the parameter a human-like vocabulary, exhibiting scaling properties, seems to appear. Conclusions: The appearance of an intermediate distribution of frequencies at some critical values of the parameter suggests that on a population of artificial agents the emergence of scaling partly arises as a self-organized process only from local interactions between agents.
[ 1, 1, 0, 0, 0, 0 ]
Title: Credible Review Detection with Limited Information using Consistency Analysis, Abstract: Online reviews provide viewpoints on the strengths and shortcomings of products/services, influencing potential customers' purchasing decisions. However, the proliferation of non-credible reviews -- either fake (promoting/ demoting an item), incompetent (involving irrelevant aspects), or biased -- entails the problem of identifying credible reviews. Prior works involve classifiers harnessing rich information about items/users -- which might not be readily available in several domains -- that provide only limited interpretability as to why a review is deemed non-credible. This paper presents a novel approach to address the above issues. We utilize latent topic models leveraging review texts, item ratings, and timestamps to derive consistency features without relying on item/user histories, unavailable for "long-tail" items/users. We develop models, for computing review credibility scores to provide interpretable evidence for non-credible reviews, that are also transferable to other domains -- addressing the scarcity of labeled data. Experiments on real-world datasets demonstrate improvements over state-of-the-art baselines.
[ 1, 0, 0, 1, 0, 0 ]
Title: The Asymptotically Self-Similar Regime for the Einstein Vacuum Equations, Abstract: We develop a local theory for the construction of singular spacetimes in all spacetime dimensions which become asymptotically self-similar as the singularity is approached. The techniques developed also allow us to construct and classify exact self-similar solutions which correspond to the formal asymptotic expansions of Fefferman and Graham's ambient metric.
[ 0, 0, 1, 0, 0, 0 ]
Title: Kinematics and dynamics of an egg-shaped robot with a gyro driven inertia actuator, Abstract: The manuscript discusses still preliminary considerations with regard to the dynamics and kinematics of an egg shaped robot with an gyro driven inertia actuator. The method of calculation follows the idea that we would like to express the entire dynamic equations in terms of moments instead of forces. Also we avoid to derive the equations from a Lagrange function with constraints. The result of the calculations is meant to be applicable to two robot prototypes that have been build at the AES\&R Laboratory at the National Chung Cheng University in Taiwan.
[ 1, 0, 0, 0, 0, 0 ]
Title: Cloaking and anamorphism for light and mass diffusion, Abstract: We first review classical results on cloaking and mirage effects for electromagnetic waves. We then show that transformation optics allows the masking of objects or produces mirages in diffusive regimes. In order to achieve this, we consider the equation for diffusive photon density in transformed coordinates, which is valid for diffusive light in scattering media. More precisely, generalizing transformations for star domains introduced in [Diatta and Guenneau, J. Opt. 13, 024012, 2011] for matter waves, we numerically demonstrate that infinite conducting objects of different shapes scatter diffusive light in exactly the same way. We also propose a design of external light-diffusion cloak with spatially varying sign-shifting parameters that hides a finite size scatterer outside the cloak. We next analyse non-physical parameter in the transformed Fick's equation derived in [Guenneau and Puvirajesinghe, R. Soc. Interface 10, 20130106, 2013], and propose to use a non-linear transform that overcomes this problem. We finally investigate other form invariant transformed diffusion-like equations in the time domain, and touch upon conformal mappings and non-Euclidean cloaking applied to diffusion processes.
[ 0, 1, 1, 0, 0, 0 ]
Title: A statistical physics approach to learning curves for the Inverse Ising problem, Abstract: Using methods of statistical physics, we analyse the error of learning couplings in large Ising models from independent data (the inverse Ising problem). We concentrate on learning based on local cost functions, such as the pseudo-likelihood method for which the couplings are inferred independently for each spin. Assuming that the data are generated from a true Ising model, we compute the reconstruction error of the couplings using a combination of the replica method with the cavity approach for densely connected systems. We show that an explicit estimator based on a quadratic cost function achieves minimal reconstruction error, but requires the length of the true coupling vector as prior knowledge. A simple mean field estimator of the couplings which does not need such knowledge is asymptotically optimal, i.e. when the number of observations is much large than the number of spins. Comparison of the theory with numerical simulations shows excellent agreement for data generated from two models with random couplings in the high temperature region: a model with independent couplings (Sherrington-Kirkpatrick model), and a model where the matrix of couplings has a Wishart distribution.
[ 0, 1, 0, 1, 0, 0 ]
Title: Fast Kinetic Scheme : efficient MPI parallelization strategy for 3D Boltzmann equation, Abstract: In this paper we present a parallelization strategy on distributed memory systems for the Fast Kinetic Scheme --- a semi-Lagrangian scheme developed in [J. Comput. Phys., Vol. 255, 2013, pp 680-698] for solving kinetic equations. The original algorithm was proposed for the BGK approximation of the collision kernel. In this work we deal with its extension to the full Boltzmann equation in six dimensions, where the collision operator is resolved by means of fast spectral method. We present close to ideal scalability of the proposed algorithm on tera- and peta-scale systems.
[ 0, 1, 1, 0, 0, 0 ]
Title: Finding a Feasible Initial Solution for Flatness-Based Multi-Link Manipulator Motion Planning under State and Control Constraints, Abstract: In this paper, we present a method to initialize at a feasible point and unfailingly solve a non-convex optimization problem in which a set-point motion is planned for a multi-link manipulator under state and control constraints. We construct an initial feasible solution by analyzing the final time effect for feasibility problems of flatness based motion planning problems. More specifically, we first find a feasible time-optimal trajectory under state constraints without a control constraint by solving a linear programming problem. Then, we find a feasible trajectory under control constraints by scaling the trajectory. To evaluate the practical applicability of the proposed method, we did numerical experiments to solve a multi-link manipulator motion planning problem by combining the method with recursive inverse dynamics algorithms.
[ 1, 0, 1, 0, 0, 0 ]
Title: Techniques for visualizing LSTMs applied to electrocardiograms, Abstract: This paper explores four different visualization techniques for long short-term memory (LSTM) networks applied to continuous-valued time series. On the datasets analysed, we find that the best visualization technique is to learn an input deletion mask that optimally reduces the true class score. With a specific focus on single-lead electrocardiograms from the MIT-BIH arrhythmia dataset, we show that salient input features for the LSTM classifier align well with medical theory.
[ 1, 0, 0, 1, 0, 0 ]
Title: Obtaining Accurate Probabilistic Causal Inference by Post-Processing Calibration, Abstract: Discovery of an accurate causal Bayesian network structure from observational data can be useful in many areas of science. Often the discoveries are made under uncertainty, which can be expressed as probabilities. To guide the use of such discoveries, including directing further investigation, it is important that those probabilities be well-calibrated. In this paper, we introduce a novel framework to derive calibrated probabilities of causal relationships from observational data. The framework consists of three components: (1) an approximate method for generating initial probability estimates of the edge types for each pair of variables, (2) the availability of a relatively small number of the causal relationships in the network for which the truth status is known, which we call a calibration training set, and (3) a calibration method for using the approximate probability estimates and the calibration training set to generate calibrated probabilities for the many remaining pairs of variables. We also introduce a new calibration method based on a shallow neural network. Our experiments on simulated data support that the proposed approach improves the calibration of causal edge predictions. The results also support that the approach often improves the precision and recall of predictions.
[ 1, 0, 0, 1, 0, 0 ]
Title: Faster Bounding Box Annotation for Object Detection in Indoor Scenes, Abstract: This paper proposes an approach for rapid bounding box annotation for object detection datasets. The procedure consists of two stages: The first step is to annotate a part of the dataset manually, and the second step proposes annotations for the remaining samples using a model trained with the first stage annotations. We experimentally study which first/second stage split minimizes to total workload. In addition, we introduce a new fully labeled object detection dataset collected from indoor scenes. Compared to other indoor datasets, our collection has more class categories, different backgrounds, lighting conditions, occlusion and high intra-class differences. We train deep learning based object detectors with a number of state-of-the-art models and compare them in terms of speed and accuracy. The fully annotated dataset is released freely available for the research community.
[ 0, 0, 0, 1, 0, 0 ]
Title: The SeaQuest Spectrometer at Fermilab, Abstract: The SeaQuest spectrometer at Fermilab was designed to detect oppositely-charged pairs of muons (dimuons) produced by interactions between a 120 GeV proton beam and liquid hydrogen, liquid deuterium and solid nuclear targets. The primary physics program uses the Drell-Yan process to probe antiquark distributions in the target nucleon. The spectrometer consists of a target system, two dipole magnets and four detector stations. The upstream magnet is a closed-aperture solid iron magnet which also serves as the beam dump, while the second magnet is an open aperture magnet. Each of the detector stations consists of scintillator hodoscopes and a high-resolution tracking device. The FPGA-based trigger compares the hodoscope signals to a set of pre-programmed roads to determine if the event contains oppositely-signed, high-mass muon pairs.
[ 0, 1, 0, 0, 0, 0 ]
Title: Direct-Manipulation Visualization of Deep Networks, Abstract: The recent successes of deep learning have led to a wave of interest from non-experts. Gaining an understanding of this technology, however, is difficult. While the theory is important, it is also helpful for novices to develop an intuitive feel for the effect of different hyperparameters and structural variations. We describe TensorFlow Playground, an interactive, open sourced visualization that allows users to experiment via direct manipulation rather than coding, enabling them to quickly build an intuition about neural nets.
[ 1, 0, 0, 1, 0, 0 ]
Title: How close are the eigenvectors and eigenvalues of the sample and actual covariance matrices?, Abstract: How many samples are sufficient to guarantee that the eigenvectors and eigenvalues of the sample covariance matrix are close to those of the actual covariance matrix? For a wide family of distributions, including distributions with finite second moment and distributions supported in a centered Euclidean ball, we prove that the inner product between eigenvectors of the sample and actual covariance matrices decreases proportionally to the respective eigenvalue distance. Our findings imply non-asymptotic concentration bounds for eigenvectors, eigenspaces, and eigenvalues. They also provide conditions for distinguishing principal components based on a constant number of samples.
[ 0, 0, 1, 1, 0, 0 ]
Title: Wavefronts for a nonlinear nonlocal bistable reaction-diffusion equation in population dynamics, Abstract: The wavefronts of a nonlinear nonlocal bistable reaction-diffusion equation, \begin{align*} \frac{\partial u}{\partial t}=\frac{\partial^2u}{\partial x^2}+u^2(1-J_\sigma*u)-du,\quad(t,x)\in(0,\infty)\times\mathbb R, \end{align*} with $J_\sigma(x)=(1/\sigma)= J(x/\sigma)$ and $ \int_{\mathbb R} J(x)dx=1 $ are investigated in this article. It is proven that there exists a $c_*(\sigma)$ such that for all $c\geq c_*(\sigma)$, a monotone wavefront $(c,\omega)$ can be connected by the two positive equilibrium points. On the other hand, there exists a $c^*(\sigma)$ such that the model admits a semi-wavefront $(c^*(\sigma),\omega)$ with $\omega(-\infty)=0$. Furthermore, it is shown that for sufficiently small $\sigma$, the semi-wavefronts are in fact wavefronts connecting $0$ to the largest equilibrium. In addition, the wavefronts converge to those of the local problem as $\sigma\to0$.
[ 0, 0, 1, 0, 0, 0 ]
Title: Kafnets: kernel-based non-parametric activation functions for neural networks, Abstract: Neural networks are generally built by interleaving (adaptable) linear layers with (fixed) nonlinear activation functions. To increase their flexibility, several authors have proposed methods for adapting the activation functions themselves, endowing them with varying degrees of flexibility. None of these approaches, however, have gained wide acceptance in practice, and research in this topic remains open. In this paper, we introduce a novel family of flexible activation functions that are based on an inexpensive kernel expansion at every neuron. Leveraging over several properties of kernel-based models, we propose multiple variations for designing and initializing these kernel activation functions (KAFs), including a multidimensional scheme allowing to nonlinearly combine information from different paths in the network. The resulting KAFs can approximate any mapping defined over a subset of the real line, either convex or nonconvex. Furthermore, they are smooth over their entire domain, linear in their parameters, and they can be regularized using any known scheme, including the use of $\ell_1$ penalties to enforce sparseness. To the best of our knowledge, no other known model satisfies all these properties simultaneously. In addition, we provide a relatively complete overview on alternative techniques for adapting the activation functions, which is currently lacking in the literature. A large set of experiments validates our proposal.
[ 1, 0, 0, 1, 0, 0 ]
Title: Modeling rooted in-trees by finite p-groups, Abstract: The aim of this chapter is to provide an adequate graph theoretic framework for the description of periodic bifurcations which have recently been discovered in descendant trees of finite p-groups. The graph theoretic concepts of rooted in-trees with weighted vertices and edges perfectly admit an abstract formulation of the group theoretic notions of successive extensions, nuclear rank, multifurcation, and step size. Since all graphs in this chapter are infinite and dense, we use methods of pattern recognition and independent component analysis to reduce the complex structure to periodically repeating finite patterns. The method of group cohomology yields subgraph isomorphisms required for proving the periodicity of branches along mainlines. Finally the mainlines are glued together with the aid of infinite limit groups whose finite quotients form the vertices of mainlines. The skeleton of the infinite graph is a countable union of infinite mainlines, connected by periodic bifurcations. Each mainline is the backbone of a minimal subtree consisting of a periodically repeating finite pattern of branches with bounded depth. A second periodicity is caused by isomorphisms between all minimal subtrees which make up the complete infinite graph. Only the members of the first minimal tree are metabelian and the bifurcations, which were unknown up to now, open the long desired door to non-metabelian extensions whose second derived quotients are isomorphic to the metabelian groups. An application of this key result to algebraic number theory solves the problem of p-class field towers of exact length three.
[ 0, 0, 1, 0, 0, 0 ]
Title: Towards Algorithmic Typing for DOT, Abstract: The Dependent Object Types (DOT) calculus formalizes key features of Scala. The D$_{<: }$ calculus is the core of DOT. To date, presentations of D$_{<: }$ have used declarative typing and subtyping rules, as opposed to algorithmic. Unfortunately, algorithmic typing for full D$_{<: }$ is known to be an undecidable problem. We explore the design space for a restricted version of D$_{<: }$ that has decidable typechecking. Even in this simplified D$_{<: }$ , algorithmic typing and subtyping are tricky, due to the "bad bounds" problem. The Scala compiler bypasses bad bounds at the cost of a loss in expressiveness in its type system. Based on the approach taken in the Scala compiler, we present the Step Typing and Step Subtyping relations for D$_{<: }$. We prove these relations sound and decidable. They are not complete with respect to the original D$_{<: }$ rules.
[ 1, 0, 0, 0, 0, 0 ]
Title: A new statistical method for characterizing the atmospheres of extrasolar planets, Abstract: By detecting light from extrasolar planets,we can measure their compositions and bulk physical properties. The technologies used to make these measurements are still in their infancy, and a lack of self-consistency suggests that previous observations have underestimated their systemic errors.We demonstrate a statistical method, newly applied to exoplanet characterization, which uses a Bayesian formalism to account for underestimated errorbars. We use this method to compare photometry of a substellar companion, GJ 758b, with custom atmospheric models. Our method produces a probability distribution of atmospheric model parameters including temperature, gravity, cloud model (fsed), and chemical abundance for GJ 758b. This distribution is less sensitive to highly variant data, and appropriately reflects a greater uncertainty on parameter fits.
[ 0, 1, 0, 0, 0, 0 ]
Title: Prioritizing network communities, Abstract: Uncovering modular structure in networks is fundamental for systems in biology, physics, and engineering. Community detection identifies candidate modules as hypotheses, which then need to be validated through experiments, such as mutagenesis in a biological laboratory. Only a few communities can typically be validated, and it is thus important to prioritize which communities to select for downstream experimentation. Here we develop CRank, a mathematically principled approach for prioritizing network communities. CRank efficiently evaluates robustness and magnitude of structural features of each community and then combines these features into the community prioritization. CRank can be used with any community detection method. It needs only information provided by the network structure and does not require any additional metadata or labels. However, when available, CRank can incorporate domain-specific information to further boost performance. Experiments on many large networks show that CRank effectively prioritizes communities, yielding a nearly 50-fold improvement in community prioritization.
[ 0, 0, 0, 1, 1, 0 ]
Title: On Structured Prediction Theory with Calibrated Convex Surrogate Losses, Abstract: We provide novel theoretical insights on structured prediction in the context of efficient convex surrogate loss minimization with consistency guarantees. For any task loss, we construct a convex surrogate that can be optimized via stochastic gradient descent and we prove tight bounds on the so-called "calibration function" relating the excess surrogate risk to the actual risk. In contrast to prior related work, we carefully monitor the effect of the exponential number of classes in the learning guarantees as well as on the optimization complexity. As an interesting consequence, we formalize the intuition that some task losses make learning harder than others, and that the classical 0-1 loss is ill-suited for general structured prediction.
[ 1, 0, 0, 1, 0, 0 ]
Title: Improving Sharir and Welzl's bound on crossing-free matchings through solving a stronger recurrence, Abstract: Sharir and Welzl [1] derived a bound on crossing-free matchings primarily based on solving a recurrence based on the size of the matchings. We show that the recurrence given in Lemma 2.3 in Sharir and Welzl can be improve to $(2n-6s)\textbf{Ma}_{m}(P)\leq\frac{68}{3}(s+2)\textbf{Ma}_{m-1}(P)$ and $(3n-7s)\textbf{Ma}_{m}(P)\leq44.5(s+2)\textbf{Ma}_{m-1}(P)$, thereby improving the upper bound for crossing-free matchings.
[ 0, 0, 1, 0, 0, 0 ]
Title: Computing eigenfunctions and eigenvalues of boundary value problems with the orthogonal spectral renormalization method, Abstract: The spectral renormalization method was introduced in 2005 as an effective way to compute ground states of nonlinear Schrödinger and Gross-Pitaevskii type equations. In this paper, we introduce an orthogonal spectral renormalization (OSR) method to compute ground and excited states (and their respective eigenvalues) of linear and nonlinear eigenvalue problems. The implementation of the algorithm follows four simple steps: (i) reformulate the underlying eigenvalue problem as a fixed point equation, (ii) introduce a renormalization factor that controls the convergence properties of the iteration, (iii) perform a Gram-Schmidt orthogonalization process in order to prevent the iteration from converging to an unwanted mode; and (iv) compute the solution sought using a fixed-point iteration. The advantages of the OSR scheme over other known methods (such as Newton's and self-consistency) are: (i) it allows the flexibility to choose large varieties of initial guesses without diverging, (ii) easy to implement especially at higher dimensions and (iii) it can easily handle problems with complex and random potentials. The OSR method is implemented on benchmark Hermitian linear and nonlinear eigenvalue problems as well as linear and nonlinear non-Hermitian $\mathcal{PT}$-symmetric models.
[ 0, 1, 0, 0, 0, 0 ]
Title: A Discontinuity Adjustment for Subdistribution Function Confidence Bands Applied to Right-Censored Competing Risks Data, Abstract: The wild bootstrap is the resampling method of choice in survival analytic applications. Theoretic justifications rely on the assumption of existing intensity functions which is equivalent to an exclusion of ties among the event times. However, such ties are omnipresent in practical studies. It turns out that the wild bootstrap should only be applied in a modified manner that corrects for altered limit variances and emerging dependencies. This again ensures the asymptotic exactness of inferential procedures. An analogous necessity is the use of the Greenwood-type variance estimator for Nelson-Aalen estimators which is particularly preferred in tied data regimes. All theoretic arguments are transferred to bootstrapping Aalen-Johansen estimators for cumulative incidence functions in competing risks. An extensive simulation study as well as an application to real competing risks data of male intensive care unit patients suffering from pneumonia illustrate the practicability of the proposed technique.
[ 0, 0, 1, 1, 0, 0 ]
Title: Estimation of block sparsity in compressive sensing, Abstract: In this paper, we consider a soft measure of block sparsity, $k_\alpha(\mathbf{x})=\left(\lVert\mathbf{x}\rVert_{2,\alpha}/\lVert\mathbf{x}\rVert_{2,1}\right)^{\frac{\alpha}{1-\alpha}},\alpha\in[0,\infty]$ and propose a procedure to estimate it by using multivariate isotropic symmetric $\alpha$-stable random projections without sparsity or block sparsity assumptions. The limiting distribution of the estimator is given. Some simulations are conducted to illustrate our theoretical results.
[ 1, 0, 0, 1, 0, 0 ]
Title: Q-learning with UCB Exploration is Sample Efficient for Infinite-Horizon MDP, Abstract: A fundamental question in reinforcement learning is whether model-free algorithms are sample efficient. Recently, Jin et al. \cite{jin2018q} proposed a Q-learning algorithm with UCB exploration policy, and proved it has nearly optimal regret bound for finite-horizon episodic MDP. In this paper, we adapt Q-learning with UCB-exploration bonus to infinite-horizon MDP with discounted rewards \emph{without} accessing a generative model. We show that the \textit{sample complexity of exploration} of our algorithm is bounded by $\tilde{O}({\frac{SA}{\epsilon^2(1-\gamma)^7}})$. This improves the previously best known result of $\tilde{O}({\frac{SA}{\epsilon^4(1-\gamma)^8}})$ in this setting achieved by delayed Q-learning \cite{strehl2006pac}, and matches the lower bound in terms of $\epsilon$ as well as $S$ and $A$ except for logarithmic factors.
[ 1, 0, 0, 1, 0, 0 ]
Title: You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems, Abstract: Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure that it reaches significant milestones by reliably comparing state-of-the-art tools for a better understanding of their strengths and weaknesses. In this work, we identify and investigate a practical bias caused by the fault localization (FL) step in a repair pipeline. We propose to highlight the different fault localization configurations used in the literature, and their impact on APR systems when applied to the Defects4J benchmark. Then, we explore the performance variations that can be achieved by `tweaking' the FL step. Eventually, we expect to create a new momentum for (1) full disclosure of APR experimental procedures with respect to FL, (2) realistic expectations of repairing bugs in Defects4J, as well as (3) reliable performance comparison among the state-of-the-art APR systems, and against the baseline performance results of our thoroughly assessed kPAR repair tool. Our main findings include: (a) only a subset of Defects4J bugs can be currently localized by commonly-used FL techniques; (b) current practice of comparing state-of-the-art APR systems (i.e., counting the number of fixed bugs) is potentially misleading due to the bias of FL configurations; and (c) APR authors do not properly qualify their performance achievement with respect to the different tuning parameters implemented in APR systems.
[ 1, 0, 0, 0, 0, 0 ]
Title: Acquiring Common Sense Spatial Knowledge through Implicit Spatial Templates, Abstract: Spatial understanding is a fundamental problem with wide-reaching real-world applications. The representation of spatial knowledge is often modeled with spatial templates, i.e., regions of acceptability of two objects under an explicit spatial relationship (e.g., "on", "below", etc.). In contrast with prior work that restricts spatial templates to explicit spatial prepositions (e.g., "glass on table"), here we extend this concept to implicit spatial language, i.e., those relationships (generally actions) for which the spatial arrangement of the objects is only implicitly implied (e.g., "man riding horse"). In contrast with explicit relationships, predicting spatial arrangements from implicit spatial language requires significant common sense spatial understanding. Here, we introduce the task of predicting spatial templates for two objects under a relationship, which can be seen as a spatial question-answering task with a (2D) continuous output ("where is the man w.r.t. a horse when the man is walking the horse?"). We present two simple neural-based models that leverage annotated images and structured text to learn this task. The good performance of these models reveals that spatial locations are to a large extent predictable from implicit spatial language. Crucially, the models attain similar performance in a challenging generalized setting, where the object-relation-object combinations (e.g.,"man walking dog") have never been seen before. Next, we go one step further by presenting the models with unseen objects (e.g., "dog"). In this scenario, we show that leveraging word embeddings enables the models to output accurate spatial predictions, proving that the models acquire solid common sense spatial knowledge allowing for such generalization.
[ 1, 0, 0, 1, 0, 0 ]
Title: Evaporating pure, binary and ternary droplets: thermal effects and axial symmetry breaking, Abstract: The Greek aperitif Ouzo is not only famous for its specific anise-flavored taste, but also for its ability to turn from a transparent miscible liquid to a milky-white colored emulsion when water is added. Recently, it has been shown that this so-called Ouzo effect, i.e. the spontaneous emulsification of oil microdroplets, can also be triggered by the preferential evaporation of ethanol in an evaporating sessile Ouzo drop, leading to an amazingly rich drying process with multiple phase transitions [H. Tan et al., Proc. Natl. Acad. Sci. USA 113(31) (2016) 8642]. Due to the enhanced evaporation near the contact line, the nucleation of oil droplets starts at the rim which results in an oil ring encircling the drop. Furthermore, the oil droplets are advected through the Ouzo drop by a fast solutal Marangoni flow. In this article, we investigate the evaporation of mixture droplets in more detail, by successively increasing the mixture complexity from pure water over a binary water-ethanol mixture to the ternary Ouzo mixture (water, ethanol and anise oil). In particular, axisymmetric and full three-dimensional finite element method simulations have been performed on these droplets to discuss thermal effects and the complicated flow in the droplet driven by an interplay of preferential evaporation, evaporative cooling and solutal and thermal Marangoni flow. By using image analysis techniques and micro-PIV measurements, we are able to compare the numerically predicted volume evolutions and velocity fields with experimental data. The Ouzo droplet is furthermore investigated by confocal microscopy. It is shown that the oil ring predominantly emerges due to coalescence.
[ 0, 1, 0, 0, 0, 0 ]
Title: Gaussian Processes for Demand Unconstraining, Abstract: One of the key challenges in revenue management is unconstraining demand data. Existing state of the art single-class unconstraining methods make restrictive assumptions about the form of the underlying demand and can perform poorly when applied to data which breaks these assumptions. In this paper, we propose a novel unconstraining method that uses Gaussian process (GP) regression. We develop a novel GP model by constructing and implementing a new non-stationary covariance function for the GP which enables it to learn and extrapolate the underlying demand trend. We show that this method can cope with important features of realistic demand data, including nonlinear demand trends, variations in total demand, lengthy periods of constraining, non-exponential inter-arrival times, and discontinuities/changepoints in demand data. In all such circumstances, our results indicate that GPs outperform existing single-class unconstraining methods.
[ 0, 0, 0, 1, 0, 0 ]
Title: Generalization of two Bonnet's Theorems to the relative Differential Geometry of the 3-dimensional Euclidean space, Abstract: This paper is devoted to the 3-dimensional relative differential geometry of surfaces. In the Euclidean space $\R{E} ^3 $ we consider a surface $\varPhi %\colon \vect{x} = \vect{x}(u^1,u^2) $ with position vector field $\vect{x}$, which is relatively normalized by a relative normalization $\vect{y}% (u^1,u^2) $. A surface $\varPhi^*% \colon \vect{x}^* = \vect{x}^*(u^1,u^2) $ with position vector field $\vect{x}^* = \vect{x} + \mu \, \vect{y}$, where $\mu$ is a real constant, is called a relatively parallel surface to $\varPhi$. Then $\vect{y}$ is also a relative normalization of $\varPhi^*$. The aim of this paper is to formulate and prove the relative analogues of two well known theorems of O.~Bonnet which concern the parallel surfaces (see~\cite{oB1853}).
[ 0, 0, 1, 0, 0, 0 ]
Title: Some Aspects of Uniqueness Theory of Entire and Meromorphic Functions (Ph.D. thesis), Abstract: The subject of our thesis is the uniqueness theory of meromorphic functions and it is devoted to problems concerning Bruck conjecture, set sharing and related topics. The tool, we used in our discussions is classical Nevanlinna theory of meromorphic functions. In 1996, in order to find the relation between an entire function with its derivative, counterpart sharing one value CM, a famous conjecture was proposed by R. Bruck. Since then the conjecture and its analogous results have been investigated by many researchers and continuous efforts have been put on by them. In our thesis, we have obtained similar types of conclusions as that of Bruck for two differential polynomials which in turn improve several existing results under different sharing environment. A number of examples have been exhibited to justify the necessity or sharpness of some conditions, hypothesis used in the thesis. As a variation of value sharing, F. Gross first introduced the idea of set sharing, by proposing a problem, which has later became popular as Gross Problem. Inspired by the Gross' Problem, the set sharing problems were started which was later shifted towards the characterization of the polynomial backbone of different unique range sets. In our study, we introduced some new type of unique range sets and at the same time, we further explored the anatomy of these unique range sets generating polynomials as well as connected Bruck conjecture with Gross' Problem.
[ 0, 0, 1, 0, 0, 0 ]
Title: Transfer Regression via Pairwise Similarity Regularization, Abstract: Transfer learning methods address the situation where little labeled training data from the "target" problem exists, but much training data from a related "source" domain is available. However, the overwhelming majority of transfer learning methods are designed for simple settings where the source and target predictive functions are almost identical, limiting the applicability of transfer learning methods to real world data. We propose a novel, weaker, property of the source domain that can be transferred even when the source and target predictive functions diverge. Our method assumes the source and target functions share a Pairwise Similarity property, where if the source function makes similar predictions on a pair of instances, then so will the target function. We propose Pairwise Similarity Regularization Transfer, a flexible graph-based regularization framework which can incorporate this modeling assumption into standard supervised learning algorithms. We show how users can encode domain knowledge into our regularizer in the form of spatial continuity, pairwise "similarity constraints" and how our method can be scaled to large data sets using the Nystrom approximation. Finally, we present positive and negative results on real and synthetic data sets and discuss when our Pairwise Similarity transfer assumption seems to hold in practice.
[ 1, 0, 0, 0, 0, 0 ]
Title: Star formation in a galactic outflow, Abstract: Recent observations have revealed massive galactic molecular outflows that may have physical conditions (high gas densities) required to form stars. Indeed, several recent models predict that such massive galactic outflows may ignite star formation within the outflow itself. This star-formation mode, in which stars form with high radial velocities, could contribute to the morphological evolution of galaxies, to the evolution in size and velocity dispersion of the spheroidal component of galaxies, and would contribute to the population of high-velocity stars, which could even escape the galaxy. Such star formation could provide in-situ chemical enrichment of the circumgalactic and intergalactic medium (through supernova explosions of young stars on large orbits), and some models also predict that it may contribute substantially to the global star formation rate observed in distant galaxies. Although there exists observational evidence for star formation triggered by outflows or jets into their host galaxy, as a consequence of gas compression, evidence for star formation occurring within galactic outflows is still missing. Here we report new spectroscopic observations that unambiguously reveal star formation occurring in a galactic outflow at a redshift of 0.0448. The inferred star formation rate in the outflow is larger than 15 Msun/yr. Star formation may also be occurring in other galactic outflows, but may have been missed by previous observations owing to the lack of adequate diagnostics.
[ 0, 1, 0, 0, 0, 0 ]
Title: Representation theoretic realization of non-symmetric Macdonald polynomials at infinity, Abstract: We study the nonsymmetric Macdonald polynomials specialized at infinity from various points of view. First, we define a family of modules of the Iwahori algebra whose characters are equal to the nonsymmetric Macdonald polynomials specialized at infinity. Second, we show that these modules are isomorphic to the dual spaces of sections of certain sheaves on the semi-infinite Schubert varieties. Third, we prove that the global versions of these modules are homologically dual to the level one affine Demazure modules.
[ 0, 0, 1, 0, 0, 0 ]
Title: Complex spectrogram enhancement by convolutional neural network with multi-metrics learning, Abstract: This paper aims to address two issues existing in the current speech enhancement methods: 1) the difficulty of phase estimations; 2) a single objective function cannot consider multiple metrics simultaneously. To solve the first problem, we propose a novel convolutional neural network (CNN) model for complex spectrogram enhancement, namely estimating clean real and imaginary (RI) spectrograms from noisy ones. The reconstructed RI spectrograms are directly used to synthesize enhanced speech waveforms. In addition, since log-power spectrogram (LPS) can be represented as a function of RI spectrograms, its reconstruction is also considered as another target. Thus a unified objective function, which combines these two targets (reconstruction of RI spectrograms and LPS), is equivalent to simultaneously optimizing two commonly used objective metrics: segmental signal-to-noise ratio (SSNR) and logspectral distortion (LSD). Therefore, the learning process is called multi-metrics learning (MML). Experimental results confirm the effectiveness of the proposed CNN with RI spectrograms and MML in terms of improved standardized evaluation metrics on a speech enhancement task.
[ 1, 0, 0, 1, 0, 0 ]
Title: Optimal Threshold Design for Quanta Image Sensor, Abstract: Quanta Image Sensor (QIS) is a binary imaging device envisioned to be the next generation image sensor after CCD and CMOS. Equipped with a massive number of single photon detectors, the sensor has a threshold $q$ above which the number of arriving photons will trigger a binary response "1", or "0" otherwise. Existing methods in the device literature typically assume that $q=1$ uniformly. We argue that a spatially varying threshold can significantly improve the signal-to-noise ratio of the reconstructed image. In this paper, we present an optimal threshold design framework. We make two contributions. First, we derive a set of oracle results to theoretically inform the maximally achievable performance. We show that the oracle threshold should match exactly with the underlying pixel intensity. Second, we show that around the oracle threshold there exists a set of thresholds that give asymptotically unbiased reconstructions. The asymptotic unbiasedness has a phase transition behavior which allows us to develop a practical threshold update scheme using a bisection method. Experimentally, the new threshold design method achieves better rate of convergence than existing methods.
[ 1, 0, 0, 0, 0, 0 ]
Title: Statistics of $K$-groups modulo $p$ for the ring of integers of a varying quadratic number field, Abstract: For each odd prime $p$, we conjecture the distribution of the $p$-torsion subgroup of $K_{2n}(\mathcal{O}_F)$ as $F$ ranges over real quadratic fields, or over imaginary quadratic fields. We then prove that the average size of the $3$-torsion subgroup of $K_{2n}(\mathcal{O}_F)$ is as predicted by this conjecture.
[ 0, 0, 1, 0, 0, 0 ]
Title: A Feature Embedding Strategy for High-level CNN representations from Multiple ConvNets, Abstract: Following the rapidly growing digital image usage, automatic image categorization has become preeminent research area. It has broaden and adopted many algorithms from time to time, whereby multi-feature (generally, hand-engineered features) based image characterization comes handy to improve accuracy. Recently, in machine learning, pre-trained deep convolutional neural networks (DCNNs or ConvNets) have been that the features extracted through such DCNN can improve classification accuracy. Thence, in this paper, we further investigate a feature embedding strategy to exploit cues from multiple DCNNs. We derive a generalized feature space by embedding three different DCNN bottleneck features with weights respect to their Softmax cross-entropy loss. Test outcomes on six different object classification data-sets and an action classification data-set show that regardless of variation in image statistics and tasks the proposed multi-DCNN bottleneck feature fusion is well suited to image classification tasks and an effective complement of DCNN. The comparisons to existing fusion-based image classification approaches prove that the proposed method surmounts the state-of-the-art methods and produces competitive results with fully trained DCNNs as well.
[ 1, 0, 0, 0, 0, 0 ]
Title: Non-existence of a Wente's $L^\infty$ estimate for the Neumann problem, Abstract: We provide a counterexample of Wente's inequality in the context of Neumann boundary conditions. We will also show that Wente's estimates fails for general boundary conditions of Robin type.
[ 0, 0, 1, 0, 0, 0 ]
Title: Regular characters of classical groups over complete discrete valuation rings, Abstract: Let $\mathfrak{o}$ be a complete discrete valuation ring with finide residue field $\mathsf{k}$ of odd characteristic, and let $\mathbf{G}$ be a symplectic or special orthogonal group scheme over $\mathfrak{o}$. For any $\ell\in\mathbb{N}$ let $G^\ell$ denote the $\ell$-th principal congruence subgroup of $\mathbf{G}(\mathfrak{o})$. An irreducible character of the group $\mathbf{G}(\mathfrak{o})$ is said to be regular if it is trivial on a subgroup $G^{\ell+1}$ for some $\ell$, and if its restriction to $G^\ell/G^{\ell+1}\simeq \mathrm{Lie}(\mathbf{G})(\mathsf{k})$ consists of characters of minimal $\mathbf{G}(\mathsf{k}^{\rm alg})$ stabilizer dimension. In the present paper we consider the regular characters of such classical groups over $\mathfrak{o}$, and construct and enumerate all regular characters of $\mathbf{G}(\mathfrak{o})$, when the characteristic of $\mathsf{k}$ is greater than two. As a result, we compute the regular part of their representation zeta function.
[ 0, 0, 1, 0, 0, 0 ]
Title: Quantitative analysis of nonadiabatic effects in dense H$_3$S and PH$_3$ superconductors, Abstract: The comparison study of high pressure superconducting state of recently synthesized H$_3$S and PH$_3$ compounds are conducted within the framework of the strong-coupling theory. By generalization of the standard Eliashberg equations to include the lowest-order vertex correction, we have investigated the influence of the nonadiabatic effects on the Coulomb pseudopotential, electron effective mass, energy gap function and on the $2\Delta(0)/T_C$ ratio. We found that, for a fixed value of critical temperature ($178$ K for H$_3$S and $81$ K for PH$_3$), the nonadiabatic corrections reduce the Coulomb pseudopotential for H$_3$S from $0.204$ to $0.185$ and for PH$_3$ from $0.088$ to $0.083$, however, the electron effective mass and ratio $2\Delta(0)/T_C$ remain unaffected. Independently of the assumed method of analysis, the thermodynamic parameters of superconducting H$_3$S and PH$_3$ strongly deviate from the prediction of BCS theory due to the strong-coupling and retardation effects.
[ 0, 1, 0, 0, 0, 0 ]
Title: Janus: An Uncertain Cache Architecture to Cope with Side Channel Attacks, Abstract: Side channel attacks are a major class of attacks to crypto-systems. Attackers collect and analyze timing behavior, I/O data, or power consumption in these systems to undermine their effectiveness in protecting sensitive information. In this work, we propose a new cache architecture, called Janus, to enable crypto-systems to introduce randomization and uncertainty in their runtime timing behavior and power utilization profile. In the proposed cache architecture, each data block is equipped with an on-off flag to enable/disable the data block. The Janus architecture has two special instructions in its instruction set to support the on-off flag. Beside the analytical evaluation of the proposed cache architecture, we deploy it in an ARM-7 processor core to study its feasibility and practicality. Results show a significant variation in the timing behavior across all the benchmarks. The new secure processor architecture has minimal hardware overhead and significant improvement in protecting against power analysis and timing behavior attacks.
[ 1, 0, 0, 0, 0, 0 ]
Title: Predicting Adversarial Examples with High Confidence, Abstract: It has been suggested that adversarial examples cause deep learning models to make incorrect predictions with high confidence. In this work, we take the opposite stance: an overly confident model is more likely to be vulnerable to adversarial examples. This work is one of the most proactive approaches taken to date, as we link robustness with non-calibrated model confidence on noisy images, providing a data-augmentation-free path forward. The adversarial examples phenomenon is most easily explained by the trend of increasing non-regularized model capacity, while the diversity and number of samples in common datasets has remained flat. Test accuracy has incorrectly been associated with true generalization performance, ignoring that training and test splits are often extremely similar in terms of the overall representation space. The transferability property of adversarial examples was previously used as evidence against overfitting arguments, a perceived random effect, but overfitting is not always random.
[ 0, 0, 0, 1, 0, 0 ]
Title: Local-ring network automata and the impact of hyperbolic geometry in complex network link-prediction, Abstract: Topological link-prediction can exploit the entire network topology (global methods) or only the neighbourhood (local methods) of the link to predict. Global methods are believed the best. Is this common belief well-founded? Stochastic-Block-Model (SBM) is a global method believed as one of the best link-predictors, therefore it is considered a reference for comparison. But, our results suggest that SBM, whose computational time is high, cannot in general overcome the Cannistraci-Hebb (CH) network automaton model that is a simple local-learning-rule of topological self-organization proved as the current best local-based and parameter-free deterministic rule for link-prediction. To elucidate the reasons of this unexpected result, we formally introduce the notion of local-ring network automata models and their relation with the nature of common-neighbours' definition in complex network theory. After extensive tests, we recommend Structural-Perturbation-Method (SPM) as the new best global method baseline. However, even SPM overall does not outperform CH and in several evaluation frameworks we astonishingly found the opposite. In particular, CH was the best predictor for synthetic networks generated by the Popularity-Similarity-Optimization (PSO) model, and its performance in PSO networks with community structure was even better than using the original internode-hyperbolic-distance as link-predictor. Interestingly, when tested on non-hyperbolic synthetic networks the performance of CH significantly dropped down indicating that this rule of network self-organization could be strongly associated to the rise of hyperbolic geometry in complex networks. The superiority of global methods seems a "misleading belief" caused by a latent geometry bias of the few small networks used as benchmark in previous studies. We propose to found a latent geometry theory of link-prediction in complex networks.
[ 1, 0, 0, 0, 0, 0 ]
Title: Emission of Circularly Polarized Terahertz Wave from Inhomogeneous Intrinsic Josephson Junctions, Abstract: We have theoretically demonstrated the emission of circularly-polarized terahertz (THz) waves from intrinsic Josephson junctions (IJJs) which is locally heated by an external heat source such as the laser irradiation. We focus on a mesa-structured IJJ whose geometry is slightly deviate from a square and find that the local heating make it possible to emit circularly-polarized THz waves. In this mesa, the inhomogeneity of critical current density induced by the local heating excites the electromagnetic cavity modes TM (1,0) and TM (0,1), whose polarizations are orthogonal to each other. The mixture of these modes results in the generation of circularly-polarized THz waves. We also show that the circular polarization dramatically changes with the applied voltage. The emitter based on IJJs can emit circularly-polarized and continuum THz waves by the local heating, and will be useful for various technological application.
[ 0, 1, 0, 0, 0, 0 ]
Title: Opportunistic Downlink Interference Alignment for Multi-Cell MIMO Networks, Abstract: In this paper, we propose an opportunistic downlink interference alignment (ODIA) for interference-limited cellular downlink, which intelligently combines user scheduling and downlink IA techniques. The proposed ODIA not only efficiently reduces the effect of inter-cell interference from other-cell base stations (BSs) but also eliminates intra-cell interference among spatial streams in the same cell. We show that the minimum number of users required to achieve a target degrees-of-freedom (DoF) can be fundamentally reduced, i.e., the fundamental user scaling law can be improved by using the ODIA, compared with the existing downlink IA schemes. In addition, we adopt a limited feedback strategy in the ODIA framework, and then analyze the number of feedback bits required for the system with limited feedback to achieve the same user scaling law of the ODIA as the system with perfect CSI. We also modify the original ODIA in order to further improve sum-rate, which achieves the optimal multiuser diversity gain, i.e., $\log\log N$, per spatial stream even in the presence of downlink inter-cell interference, where $N$ denotes the number of users in a cell. Simulation results show that the ODIA significantly outperforms existing interference management techniques in terms of sum-rate in realistic cellular environments. Note that the ODIA operates in a non-collaborative and decoupled manner, i.e., it requires no information exchange among BSs and no iterative beamformer optimization between BSs and users, thus leading to an easier implementation.
[ 1, 0, 1, 0, 0, 0 ]
Title: The Repeated Divisor Function and Possible Correlation with Highly Composite Numbers, Abstract: Let n be a non-null positive integer and $d(n)$ is the number of positive divisors of n, called the divisor function. Of course, $d(n) \leq n$. $d(n) = 1$ if and only if $n = 1$. For $n > 2$ we have $d(n) \geq 2$ and in this paper we try to find the smallest $k$ such that $d(d(...d(n)...)) = 2$ where the divisor function is applied $k$ times. At the end of the paper we make a conjecture based on some observations.
[ 0, 0, 1, 0, 0, 0 ]
Title: A Language Hierarchy and Kitchens-Type Theorem for Self-Similar Groups, Abstract: We generalize the notion of self-similar groups of infinite tree automorphisms to allow for groups which are defined on a tree but do not act faithfully on it. The elements of such a group correspond to labeled trees which may be recognized by a tree automaton (e.g. Rabin, Büchi, etc.), or considered as elements of a tree shift (e.g. of finite type, sofic) as in symbolic dynamics. We give examples to show that the various classes of self-similar groups defined in this way do not coincide. As the main result, extending the classical result of Kitchens on one-dimensional group shifts, we provide a sufficient condition for a self-similar group whose elements form a sofic tree shift to be a tree shift of finite type. As an application, we show that the closure of certain self-similar groups of tree automorphisms are not Rabin-recognizable. \end{abstract}
[ 0, 0, 1, 0, 0, 0 ]
Title: Distance Covariance in Metric Spaces: Non-Parametric Independence Testing in Metric Spaces (Master's thesis), Abstract: The aim of this thesis is to find a solution to the non-parametric independence problem in separable metric spaces. Suppose we are given finite collection of samples from an i.i.d. sequence of paired random elements, where each marginal has values in some separable metric space. The non-parametric independence problem raises the question on how one can use these samples to reasonably draw inference on whether the marginal random elements are independent or not. We will try to answer this question by utilizing the so-called distance covariance functional in metric spaces developed by Russell Lyons. We show that, if the marginal spaces are so-called metric spaces of strong negative type (e.g. seperable Hilbert spaces), then the distance covariance functional becomes a direct indicator of independence. That is, one can directly determine whether the marginals are independent or not based solely on the value of this functional. As the functional formally takes the simultaneous distribution as argument, its value is not known in the posed non-parametric independence problem. Hence, we construct estimators of the distance covariance functional, and show that they exhibit asymptotic properties which can be used to construct asymptotically consistent statistical tests of independence. Finally, as the rejection thresholds of these statistical tests are non-traceable we argue that they can be reasonably bootstrapped.
[ 0, 0, 1, 1, 0, 0 ]
Title: Sum-Product-Quotient Networks, Abstract: We present a novel tractable generative model that extends Sum-Product Networks (SPNs) and significantly boosts their power. We call it Sum-Product-Quotient Networks (SPQNs), whose core concept is to incorporate conditional distributions into the model by direct computation using quotient nodes, e.g. $P(A|B) = \frac{P(A,B)}{P(B)}$. We provide sufficient conditions for the tractability of SPQNs that generalize and relax the decomposable and complete tractability conditions of SPNs. These relaxed conditions give rise to an exponential boost to the expressive efficiency of our model, i.e. we prove that there are distributions which SPQNs can compute efficiently but require SPNs to be of exponential size. Thus, we narrow the gap in expressivity between tractable graphical models and other Neural Network-based generative models.
[ 1, 0, 0, 1, 0, 0 ]
Title: Algebraic Description of Shape Invariance Revisited, Abstract: We revisit the algebraic description of shape invariance method in one-dimensional quantum mechanics. In this note we focus on four particular examples: the Kepler problem in flat space, the Kepler problem in spherical space, the Kepler problem in hyperbolic space, and the Rosen-Morse potential problem. Following the prescription given by Gangopadhyaya et al., we first introduce certain nonlinear algebraic systems. We then show that, if the model parameters are appropriately quantized, the bound-state problems can be solved solely by means of representation theory.
[ 0, 1, 0, 0, 0, 0 ]
Title: Joint Smoothing, Tracking, and Forecasting Based on Continuous-Time Target Trajectory Fitting, Abstract: We present a continuous time state estimation framework that unifies traditionally individual tasks of smoothing, tracking, and forecasting (STF), for a class of targets subject to smooth motion processes, e.g., the target moves with nearly constant acceleration or affected by insignificant noises. Fundamentally different from the conventional Markov transition formulation, the state process is modeled by a continuous trajectory function of time (FoT) and the STF problem is formulated as an online data fitting problem with the goal of finding the trajectory FoT that best fits the observations in a sliding time-window. Then, the state of the target, whether the past (namely, smoothing), the current (filtering) or the near-future (forecasting), can be inferred from the FoT. Our framework releases stringent statistical modeling of the target motion in real time, and is applicable to a broad range of real world targets of significance such as passenger aircraft and ships which move on scheduled, (segmented) smooth paths but little statistical knowledge is given about their real time movement and even about the sensors. In addition, the proposed STF framework inherits the advantages of data fitting for accommodating arbitrary sensor revisit time, target maneuvering and missed detection. The proposed method is compared with state of the art estimators in scenarios of either maneuvering or non-maneuvering target.
[ 1, 0, 0, 1, 0, 0 ]
Title: Parkinson's Disease Digital Biomarker Discovery with Optimized Transitions and Inferred Markov Emissions, Abstract: We search for digital biomarkers from Parkinson's Disease by observing approximate repetitive patterns matching hypothesized step and stride periodic cycles. These observations were modeled as a cycle of hidden states with randomness allowing deviation from a canonical pattern of transitions and emissions, under the hypothesis that the averaged features of hidden states would serve to informatively characterize classes of patients/controls. We propose a Hidden Semi-Markov Model (HSMM), a latent-state model, emitting 3D-acceleration vectors. Transitions and emissions are inferred from data. We fit separate models per unique device and training label. Hidden Markov Models (HMM) force geometric distributions of the duration spent at each state before transition to a new state. Instead, our HSMM allows us to specify the distribution of state duration. This modified version is more effective because we are interested more in each state's duration than the sequence of distinct states, allowing inclusion of these durations the feature vector.
[ 1, 0, 0, 1, 0, 0 ]
Title: Bifurcation to locked fronts in two component reaction-diffusion systems, Abstract: We study invasion fronts and spreading speeds in two component reaction-diffusion systems. Using a variation of Lin's method, we construct traveling front solutions and show the existence of a bifurcation to locked fronts where both components invade at the same speed. Expansions of the wave speed as a function of the diffusion constant of one species are obtained. The bifurcation can be sub or super-critical depending on whether the locked fronts exist for parameter values above or below the bifurcation value. Interestingly, in the sub-critical case numerical simulations reveal that the spreading speed of the PDE system does not depend continuously on the coefficient of diffusion.
[ 0, 1, 1, 0, 0, 0 ]
Title: Contrastive Hebbian Learning with Random Feedback Weights, Abstract: Neural networks are commonly trained to make predictions through learning algorithms. Contrastive Hebbian learning, which is a powerful rule inspired by gradient backpropagation, is based on Hebb's rule and the contrastive divergence algorithm. It operates in two phases, the forward (or free) phase, where the data are fed to the network, and a backward (or clamped) phase, where the target signals are clamped to the output layer of the network and the feedback signals are transformed through the transpose synaptic weight matrices. This implies symmetries at the synaptic level, for which there is no evidence in the brain. In this work, we propose a new variant of the algorithm, called random contrastive Hebbian learning, which does not rely on any synaptic weights symmetries. Instead, it uses random matrices to transform the feedback signals during the clamped phase, and the neural dynamics are described by first order non-linear differential equations. The algorithm is experimentally verified by solving a Boolean logic task, classification tasks (handwritten digits and letters), and an autoencoding task. This article also shows how the parameters affect learning, especially the random matrices. We use the pseudospectra analysis to investigate further how random matrices impact the learning process. Finally, we discuss the biological plausibility of the proposed algorithm, and how it can give rise to better computational models for learning.
[ 0, 0, 0, 1, 1, 0 ]
Title: Above threshold scattering about a Feshbach resonance for ultracold atoms in an optical collider, Abstract: Ultracold atomic gases have realised numerous paradigms of condensed matter physics where control over interactions has crucially been afforded by tunable Feshbach resonances. So far, the characterisation of these Feshbach resonances has almost exclusively relied on experiments in the threshold regime near zero energy. Here we use a laser-based collider to probe a narrow magnetic Feshbach resonance of rubidium above threshold. By measuring the overall atomic loss from colliding clouds as a function of magnetic field, we track the energy-dependent resonance position. At higher energy, our collider scheme broadens the loss feature, making the identification of the narrow resonance challenging. However, we observe that the collisions give rise to shifts in the centre-of-mass positions of outgoing clouds. The shifts cross zero at the resonance and this allows us to accurately determine its location well above threshold. Our inferred resonance positions are in excellent agreement with theory.
[ 0, 1, 0, 0, 0, 0 ]
Title: Gaussian Process Subset Scanning for Anomalous Pattern Detection in Non-iid Data, Abstract: Identifying anomalous patterns in real-world data is essential for understanding where, when, and how systems deviate from their expected dynamics. Yet methods that separately consider the anomalousness of each individual data point have low detection power for subtle, emerging irregularities. Additionally, recent detection techniques based on subset scanning make strong independence assumptions and suffer degraded performance in correlated data. We introduce methods for identifying anomalous patterns in non-iid data by combining Gaussian processes with novel log-likelihood ratio statistic and subset scanning techniques. Our approaches are powerful, interpretable, and can integrate information across multiple data streams. We illustrate their performance on numeric simulations and three open source spatiotemporal datasets of opioid overdose deaths, 311 calls, and storm reports.
[ 0, 0, 0, 1, 0, 0 ]
Title: UAV Aided Aerial-Ground IoT for Air Quality Sensing in Smart City: Architecture, Technologies and Implementation, Abstract: As air pollution is becoming the largest environmental health risk, the monitoring of air quality has drawn much attention in both theoretical studies and practical implementations. In this article, we present a real-time, fine-grained and power-efficient air quality monitoring system based on aerial and ground sensing. The architecture of this system consists of four layers: the sensing layer to collect data, the transmission layer to enable bidirectional communications, the processing layer to analyze and process the data, and the presentation layer to provide graphic interface for users. Three major techniques are investigated in our implementation, given by the data processing, the deployment strategy and the power control. For data processing, spacial fitting and short-term prediction are performed to eliminate the influences of the incomplete measurement and the latency of data uploading. The deployment strategies of ground sensing and aerial sensing are investigated to improve the quality of the collected data. The power control is further considered to balance between power consumption and data accuracy. Our implementation has been deployed in Peking University and Xidian University since February 2018, and has collected about 100 thousand effective data samples by June 2018.
[ 1, 0, 0, 0, 0, 0 ]
Title: Photoinduced vibronic coupling in two-level dissipative systems, Abstract: Interaction of an electron system with a strong electromagnetic wave leads to rearrangement both the electron and vibrational energy spectra of a dissipative system. For instance, the optically coupled electron levels become split in the conditions of the ac Stark effect that gives rise to appearance of the nonadiabatic coupling between the electron and vibrational motions. The nonadiabatic coupling exerts a substantial impact on the electron and phonon dynamics and must be taken into account to determine the system wave functions. In this paper, the vibronic coupling induced by the ac Stark effect is considered. It is shown that the interaction between the electron states dressed by an electromagnetic field and the forced vibrations of reservoir oscillators under the action of rapid changing of the electron density with the Rabi frequency is responsible for establishment of the photoinduced vibronic coupling. However, if the resonance conditions for the optical phonon frequency and the transition frequency of electrons in the dressed state basis are satisfied, the vibronic coupling is due to the electron-phonon interaction. Additionally, photoinduced vibronic coupling results in appearance of the doubly dressed states which are formed by both the electron-photon and electron-vibrational interactions.
[ 0, 1, 0, 0, 0, 0 ]
Title: Procedural Content Generation via Machine Learning (PCGML), Abstract: This survey explores Procedural Content Generation via Machine Learning (PCGML), defined as the generation of game content using machine learning models trained on existing content. As the importance of PCG for game development increases, researchers explore new avenues for generating high-quality content with or without human involvement; this paper addresses the relatively new paradigm of using machine learning (in contrast with search-based, solver-based, and constructive methods). We focus on what is most often considered functional game content such as platformer levels, game maps, interactive fiction stories, and cards in collectible card games, as opposed to cosmetic content such as sprites and sound effects. In addition to using PCG for autonomous generation, co-creativity, mixed-initiative design, and compression, PCGML is suited for repair, critique, and content analysis because of its focus on modeling existing content. We discuss various data sources and representations that affect the resulting generated content. Multiple PCGML methods are covered, including neural networks, long short-term memory (LSTM) networks, autoencoders, and deep convolutional networks; Markov models, $n$-grams, and multi-dimensional Markov chains; clustering; and matrix factorization. Finally, we discuss open problems in the application of PCGML, including learning from small datasets, lack of training data, multi-layered learning, style-transfer, parameter tuning, and PCG as a game mechanic.
[ 1, 0, 0, 0, 0, 0 ]