text
stringlengths 57
2.88k
| labels
sequencelengths 6
6
|
---|---|
Title: On Mimura's extension problem,
Abstract: We determine the group strucure of the $23$-rd homotopy group $\pi_{23}(G_2 :
2)$, where $G_2$ is the Lie group of exceptional type, which hasn't been
determined for $50$ years. | [
0,
0,
1,
0,
0,
0
] |
Title: On critical and supercritical pseudo-relativistic nonlinear Schrödinger equations,
Abstract: In this paper, we investigate existence and non-existence of a nontrivial
solution to the pseudo-relativistic nonlinear Schrödinger equation $$\left(
\sqrt{-c^2\Delta + m^2 c^4}-mc^2\right) u + \mu u = |u|^{p-1}u\quad
\textrm{in}~\mathbb{R}^n~(n \geq 2)$$ involving an
$H^{1/2}$-critical/supercritical power-type nonlinearity, i.e., $p \geq
\frac{n+1}{n-1}$. We prove that in the non-relativistic regime, there exists a
nontrivial solution provided that the nonlinearity is
$H^{1/2}$-critical/supercritical but it is $H^1$-subcritical. On the other
hand, we also show that there is no nontrivial bounded solution either $(i)$ if
the nonlinearity is $H^{1/2}$-critical/supercritical in the ultra-relativistic
regime or $(ii)$ if the nonlinearity is $H^1$-critical/supercritical in all
cases. | [
0,
0,
1,
0,
0,
0
] |
Title: Eye Tracker Accuracy: Quantitative Evaluation of the Invisible Eye Center Location,
Abstract: Purpose. We present a new method to evaluate the accuracy of an eye tracker
based eye localization system. Measuring the accuracy of an eye tracker's
primary intention, the estimated point of gaze, is usually done with volunteers
and a set of fixation points used as ground truth. However, verifying the
accuracy of the location estimate of a volunteer's eye center in 3D space is
not easily possible. This is because the eye center is an intangible point
hidden by the iris. Methods. We evaluate the eye location accuracy by using an
eye phantom instead of eyes of volunteers. For this, we developed a testing
stage with a realistic artificial eye and a corresponding kinematic model,
which we trained with {\mu}CT data. This enables us to precisely evaluate the
eye location estimate of an eye tracker. Results. We show that the proposed
testing stage with the corresponding kinematic model is suitable for such a
validation. Further, we evaluate a particular eye tracker based navigation
system and show that this system is able to successfully determine the eye
center with sub-millimeter accuracy. Conclusions. We show the suitability of
the evaluated eye tracker for eye interventions, using the proposed testing
stage and the corresponding kinematic model. The results further enable
specific enhancement of the navigation system to potentially get even better
results. | [
1,
0,
0,
0,
0,
0
] |
Title: Theoretical Foundations of Forward Feature Selection Methods based on Mutual Information,
Abstract: Feature selection problems arise in a variety of applications, such as
microarray analysis, clinical prediction, text categorization, image
classification and face recognition, multi-label learning, and classification
of internet traffic. Among the various classes of methods, forward feature
selection methods based on mutual information have become very popular and are
widely used in practice. However, comparative evaluations of these methods have
been limited by being based on specific datasets and classifiers. In this
paper, we develop a theoretical framework that allows evaluating the methods
based on their theoretical properties. Our framework is grounded on the
properties of the target objective function that the methods try to
approximate, and on a novel categorization of features, according to their
contribution to the explanation of the class; we derive upper and lower bounds
for the target objective function and relate these bounds with the feature
types. Then, we characterize the types of approximations taken by the methods,
and analyze how these approximations cope with the good properties of the
target objective function. Additionally, we develop a distributional setting
designed to illustrate the various deficiencies of the methods, and provide
several examples of wrong feature selections. Based on our work, we identify
clearly the methods that should be avoided, and the methods that currently have
the best performance. | [
1,
0,
0,
1,
0,
0
] |
Title: Robust quantum switch with Rydberg excitations,
Abstract: We develop an approach to realize a quantum switch for Rydberg excitation in
atoms with $Y$-typed level configuration. We find that the steady population on
two different Rydberg states can be reversibly exchanged in a controllable way
by properly tuning the Rydberg-Rydberg interaction. Moreover, our numerical
simulations verify that the switching scheme is robust against spontaneous
decay, environmental disturbance, as well as the duration of operation on the
interaction, and also a high switching efficiency is quite attainable, which
makes it have potential applications in quantum information processing and
other Rydberg-based quantum technologies. | [
0,
1,
0,
0,
0,
0
] |
Title: Non-robust phase transitions in the generalized clock model on trees,
Abstract: Pemantle and Steif provided a sharp threshold for the existence of a RPT
(robust phase transition) for the continuous rotator model and the Potts model
in terms of the branching number and the second eigenvalue of the transfer
operator, where a robust phase transition is said to occur if an arbitrarily
weak coupling with symmetry-breaking boundary conditions suffices to induce
symmetry breaking in the bulk. They further showed that for the Potts model RPT
occurs at a different threshold than PT (phase transition in the sense of
multiple Gibbs measures), and conjectured that RPT and PT should occur at the
same threshold in the continuous rotator model. We consider the class of 4- and
5-state rotation-invariant spin models with reflection symmetry on general
trees which contains the Potts model and the clock model with
scalarproduct-interaction as limiting cases. The clock model can be viewed as a
particular discretization which is obtained from the classical rotator model on
the continuous one-dimensional sphere. We analyze the transition between PT=RPT
and PT is unequal to RPT, in terms of the eigenvalues of the transfer matrix of
the model at the critical threshold value for the existence of RPT. The
transition between the two regimes depends sensitively on the third largest
eigenvalue. | [
0,
0,
1,
0,
0,
0
] |
Title: The Role of Gender in Social Network Organization,
Abstract: The digital traces we leave behind when engaging with the modern world offer
an interesting lens through which we study behavioral patterns as expression of
gender. Although gender differentiation has been observed in a number of
settings, the majority of studies focus on a single data stream in isolation.
Here we use a dataset of high resolution data collected using mobile phones, as
well as detailed questionnaires, to study gender differences in a large cohort.
We consider mobility behavior and individual personality traits among a group
of more than $800$ university students. We also investigate interactions among
them expressed via person-to-person contacts, interactions on online social
networks, and telecommunication. Thus, we are able to study the differences
between male and female behavior captured through a multitude of channels for a
single cohort. We find that while the two genders are similar in a number of
aspects, there are robust deviations that include multiple facets of social
interactions, suggesting the existence of inherent behavioral differences.
Finally, we quantify how aspects of an individual's characteristics and social
behavior reveals their gender by posing it as a classification problem. We ask:
How well can we distinguish between male and female study participants based on
behavior alone? Which behavioral features are most predictive? | [
1,
0,
0,
0,
0,
0
] |
Title: The Schur Lie-Multiplier of Leibinz Algebras,
Abstract: For a free presentation $0 \to R \to F \to G \to 0$ of a Leibniz algebra $G$,
the Baer invariant ${\cal M}^{\sf Lie}(G) = \frac{R \cap [F, F]_{Lie}}{[F,
R]_{Lie}}$ is called the Schur multiplier of $G$ relative to the Liezation
functor or Schur Lie-multiplier. For a two-sided ideal $N$ of a Leibniz algebra
$G$, we construct a four-term exact sequence relating the Schur Lie-multiplier
of $G$ and $G/N$, which is applied to study and characterize Lie-nilpotency,
Lie-stem covers and Lie-capability of Leibniz algebras. | [
0,
0,
1,
0,
0,
0
] |
Title: Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries,
Abstract: This work presents a new tool to verify the correctness of cryptographic
implementations with respect to cache attacks. Our methodology discovers
vulnerabilities that are hard to find with other techniques, observed as
exploitable leakage. The methodology works by identifying secret dependent
memory and introducing forced evictions inside potentially vulnerable code to
obtain cache traces that are analyzed using Mutual Information. If dependence
is observed, the cryptographic implementation is classified as to leak
information.
We demonstrate the viability of our technique in the design of the three main
cryptographic primitives, i.e., AES, RSA and ECC, in eight popular up to date
cryptographic libraries, including OpenSSL, Libgcrypt, Intel IPP and NSS. Our
results show that cryptographic code designers are far away from incorporating
the appropriate countermeasures to avoid cache leakages, as we found that 50%
of the default implementations analyzed leaked information that lead to key
extraction. We responsibly notified the designers of all the leakages found and
suggested patches to solve these vulnerabilities. | [
1,
0,
0,
0,
0,
0
] |
Title: Effects of anisotropy in spin molecular-orbital coupling on effective spin models of trinuclear organometallic complexes,
Abstract: We consider layered decorated honeycomb lattices at two-thirds filling, as
realized in some trinuclear organometallic complexes. Localized $S=1$ moments
with a single-spin anisotropy emerge from the interplay of Coulomb repulsion
and spin molecular-orbit coupling (SMOC). Magnetic anisotropies with bond
dependent exchange couplings occur in the honeycomb layers when the direct
intracluster exchange and the spin molecular-orbital coupling are both present.
We find that the effective spin exchange model within the layers is an XXZ +
120$^\circ$ honeycomb quantum compass model. The intrinsic non-spherical
symmetry of the multinuclear complexes leads to very different transverse and
longitudinal spin molecular-orbital couplings, which greatly enhances the
single-spin and exchange coupling anisotropies. The interlayer coupling is
described by a XXZ model with anisotropic biquadratic terms. As the correlation
strength increases the systems becomes increasingly one-dimensional. Thus, if
the ratio of SMOC to the interlayer hopping is small this stabilizes the
Haldane phase. However, as the ratio increases there is a quantum phase
transition to the topologically trivial `$D$-phase'. We also predict a quantum
phase transition from a Haldane phase to a magnetically ordered phase at
sufficiently strong external magnetic fields. | [
0,
1,
0,
0,
0,
0
] |
Title: Design and experimental test of an optical vortex coronagraph,
Abstract: The optical vortex coronagraph (OVC) is one of the promising ways for direct
imaging exoplanets because of its small inner working angle and high
throughput. This paper presents the design and laboratory demonstration
performance at 633nm and 1520nm of the OVC based on liquid crystal polymers
(LCP). Two LCPs has been manufactured in partnership with a commercial vendor.
The OVC can deliver a good performance in laboratory test and achieve the
contrast of the order 10^-6 at angular distance 3{\lambda}/D, which is able to
image the giant exoplanets at a young stage in combination with extreme
adaptive optics. | [
0,
1,
0,
0,
0,
0
] |
Title: Symbolic Computation via Program Transformation,
Abstract: Symbolic computation is an important approach in automated program analysis.
Most state-of-the-art tools perform symbolic computation as interpreters and
directly maintain symbolic data. In this paper, we show that it is feasible,
and in fact practical, to use a compiler-based strategy instead. Using compiler
tooling, we propose and implement a transformation which takes a standard
program and outputs a program that performs semantically equivalent, but
partially symbolic, computation. The transformed program maintains symbolic
values internally and operates directly on them hence the program can be
processed by a tool without support for symbolic manipulation.
The main motivation for the transformation is in symbolic verification, but
there are many other possible use-cases, including test generation and concolic
testing. Moreover using the transformation simplifies tools, since the symbolic
computation is handled by the program directly. We have implemented the
transformation at the level of LLVM bitcode. The paper includes an experimental
evaluation, based on an explicit-state software model checker as a verification
backend. | [
1,
0,
0,
0,
0,
0
] |
Title: Simulating Dirac models with ultracold atoms in optical lattices,
Abstract: We present a general model allowing "quantum simulation" of one-dimensional
Dirac models with 2- and 4-component spinors using ultracold atoms in driven 1D
tilted optical latices. The resulting Dirac physics is illustrated by one of
its well-known manifestations, Zitterbewegung. This general model can be
extended and applied with great flexibility to more complex situations. | [
0,
1,
0,
0,
0,
0
] |
Title: Network analysis of Japanese global business using quasi-exhaustive micro-data for Japanese overseas subsidiaries,
Abstract: Network analysis techniques remain rarely used for understanding
international management strategies. Our paper highlights their value as
research tool in this field of social science using a large set of micro-data
(20,000) to investigate the presence of networks of subsidiaries overseas. The
research question is the following: to what extent did/do global Japanese
business networks mirror organizational models existing in Japan? In
particular, we would like to assess how much the links building such business
networks are shaped by the structure of big-size industrial conglomerates of
firms headquartered in Japan, also described as HK. The major part of the
academic community in the fields of management and industrial organization
considers that formal links can be identified among firms belonging to HK. Miwa
and Ramseyer (Miwa and Ramseyer 2002; Ramseyer 2006) challenge this claim and
argue that the evidence supporting the existence of HK is weak. So far,
quantitative empirical investigation has been conducted exclusively using data
for firms incorporated in Japan. Our study tests the Miwa-Ramseyer hypothesis
(MRH) at the global level using information on the network of Japanese
subsidiaries overseas. The results obtained lead us to reject the MRH for the
global dataset, as well as for subsets restricted to the two main
regions/countries of destination of Japanese foreign investment. The results
are robust to the weighting of the links, with different specifications, and
are observed in most industrial sectors. The global Japanese network became
increasingly complex during the late 20th century as a consequence of increase
in the number of Japanese subsidiaries overseas but the key features of the
structure remained rather stable. We draw implications of these findings for
academic research in international business and for professionals involved in
corporate strategy. | [
1,
0,
0,
0,
0,
0
] |
Title: A Privacy-preserving Community-based P2P OSNs Using Broadcast Encryption Supporting Recommendation Mechanism,
Abstract: Online Social Networks (OSNs) have become one of the most important
activities on the Internet, such as Facebook and Google+. However, security and
privacy have become major concerns in existing C/S based OSNs. In this paper,
we propose a novel scheme called a Privacy-preserving Community-based P2P OSNs
Using Broadcast Encryption Supporting Recommendation Mechanism (PCBE) that
supports cross-platform availability in stringent privacy requirements. For the
first time, we introduce recommendation mechanism into a privacy-preserving P2P
based OSNs, in which we firstly employ the Open Directory Project to generate
user interest model. We firstly introduce broadcast encryption into P2P
community-based social networks together with reputation mechanism to decrease
the system overhead. We formulate the security requirements and design goals
for privacy- preserving P2P based OSNs supporting recommendation mechanism. The
RESTful web-services help to ensure cross-platform availability and
transmission security. As a result, thorough security analysis and performance
evaluation on experiments demonstrate that the PCBE scheme indeed accords with
our proposed design goals. | [
1,
0,
0,
0,
0,
0
] |
Title: Don't Jump Through Hoops and Remove Those Loops: SVRG and Katyusha are Better Without the Outer Loop,
Abstract: The stochastic variance-reduced gradient method (SVRG) and its accelerated
variant (Katyusha) have attracted enormous attention in the machine learning
community in the last few years due to their superior theoretical properties
and empirical behaviour on training supervised machine learning models via the
empirical risk minimization paradigm. A key structural element in both of these
methods is the inclusion of an outer loop at the beginning of which a full pass
over the training data is made in order to compute the exact gradient, which is
then used to construct a variance-reduced estimator of the gradient. In this
work we design {\em loopless variants} of both of these methods. In particular,
we remove the outer loop and replace its function by a coin flip performed in
each iteration designed to trigger, with a small probability, the computation
of the gradient. We prove that the new methods enjoy the same superior
theoretical convergence properties as the original methods. However, we
demonstrate through numerical experiments that our methods have substantially
superior practical behavior. | [
1,
0,
0,
1,
0,
0
] |
Title: Hierarchical Temporal Representation in Linear Reservoir Computing,
Abstract: Recently, studies on deep Reservoir Computing (RC) highlighted the role of
layering in deep recurrent neural networks (RNNs). In this paper, the use of
linear recurrent units allows us to bring more evidence on the intrinsic
hierarchical temporal representation in deep RNNs through frequency analysis
applied to the state signals. The potentiality of our approach is assessed on
the class of Multiple Superimposed Oscillator tasks. Furthermore, our
investigation provides useful insights to open a discussion on the main aspects
that characterize the deep learning framework in the temporal domain. | [
1,
0,
0,
1,
0,
0
] |
Title: Bombieri-Vinogradov for multiplicative functions, and beyond the $x^{1/2}$-barrier,
Abstract: Part-and-parcel of the study of "multiplicative number theory" is the study
of the distribution of multiplicative functions in arithmetic progressions.
Although appropriate analogies to the Bombieri-Vingradov Theorem have been
proved for particular examples of multiplicative functions, there has not
previously been headway on a general theory; seemingly none of the different
proofs of the Bombieri-Vingradov Theorem for primes adapt well to this
situation. In this article we find out why such a result has been so elusive,
and discover what can be proved along these lines and develop some limitations.
For a fixed residue class $a$ we extend such averages out to moduli $\leq
x^{\frac {20}{39}-\delta}$. | [
0,
0,
1,
0,
0,
0
] |
Title: Three-component fermions with surface Fermi arcs in topological semimetal tungsten carbide,
Abstract: Topological Dirac and Weyl semimetals not only host quasiparticles analogous
to the elementary fermionic particles in high-energy physics, but also have
nontrivial band topology manifested by exotic Fermi arcs on the surface. Recent
advances suggest new types of topological semimetals, in which spatial
symmetries protect gapless electronic excitations without high-energy analogy.
Here we observe triply-degenerate nodal points (TPs) near the Fermi level of
WC, in which the low-energy quasiparticles are described as three-component
fermions distinct from Dirac and Weyl fermions. We further observe the surface
states whose constant energy contours are pairs of Fermi arcs connecting the
surface projection of the TPs, proving the nontrivial topology of the newly
identified semimetal state. | [
0,
1,
0,
0,
0,
0
] |
Title: Detecting stochastic inclusions in electrical impedance tomography,
Abstract: This work considers the inclusion detection problem of electrical impedance
tomography with stochastic conductivities. It is shown that a conductivity
anomaly with a random conductivity can be identified by applying the
Factorization Method or the Monotonicity Method to the mean value of the
corresponding Neumann-to-Dirichlet map provided that the anomaly has high
enough contrast in the sense of expectation. The theoretical results are
complemented by numerical examples in two spatial dimensions. | [
0,
0,
1,
0,
0,
0
] |
Title: On compact Hermitian manifolds with flat Gauduchon connections,
Abstract: Given a Hermitian manifold $(M^n,g)$, the Gauduchon connections are the one
parameter family of Hermitian connections joining the Chern connection and the
Bismut connection. We will call $\nabla^s = (1-\frac{s}{2})\nabla^c +
\frac{s}{2}\nabla^b$ the $s$-Gauduchon connection of $M$, where $\nabla^c$ and
$\nabla^b$ are respectively the Chern and Bismut connections. It is natural to
ask when a compact Hermitian manifold could admit a flat $s$-Gauduchon
connection. This is related to a question asked by Yau \cite{Yau}. The cases
with $s=0$ (a flat Chern connection) or $s=2$ (a flat Bismut connection) are
classified respectively by Boothby \cite{Boothby} in the 1950s or by Q. Wang
and the authors recently \cite{WYZ}. In this article, we observe that if either
$s\geq 4+2\sqrt{3} \approx 7.46$ or $s\leq 4-2\sqrt{3}\approx 0.54$ and $s\neq
0$, then $g$ is Kähler. We also show that, when $n=2$, $g$ is always Kähler
unless $s=2$. Note that non-Kähler compact Bismut flat surfaces are exactly
those isosceles Hopf surfaces by \cite{WYZ}. | [
0,
0,
1,
0,
0,
0
] |
Title: A Support Tensor Train Machine,
Abstract: There has been growing interest in extending traditional vector-based machine
learning techniques to their tensor forms. An example is the support tensor
machine (STM) that utilizes a rank-one tensor to capture the data structure,
thereby alleviating the overfitting and curse of dimensionality problems in the
conventional support vector machine (SVM). However, the expressive power of a
rank-one tensor is restrictive for many real-world data. To overcome this
limitation, we introduce a support tensor train machine (STTM) by replacing the
rank-one tensor in an STM with a tensor train. Experiments validate and confirm
the superiority of an STTM over the SVM and STM. | [
1,
0,
0,
1,
0,
0
] |
Title: Diffusion under confinement: hydrodynamic finite-size effects in simulation,
Abstract: We investigate finite-size effects on diffusion in confined fluids using
molecular dynamics simulations and hydrodynamic calculations. Specifically, we
consider a Lennard-Jones fluid in slit pores without slip at the interface and
show that the use of periodic boundary conditions in the directions along the
surfaces results in dramatic finite-size effects, in addition to that of the
physically relevant confining length. As in the simulation of bulk fluids,
these effects arise from spurious hydrodynamic interactions between periodic
images and from the constraint of total momentum conservation. We derive
analytical expressions for the correction to the diffusion coefficient in the
limits of both elongated and flat systems, which are in excellent agreement
with the molecular simulation results except for the narrowest pores, where the
discreteness of the fluid particles starts to play a role. The present work
implies that the diffusion coefficients for wide nanopores computed using
elongated boxes suffer from finite-size artifacts which had not been previously
appreciated. In addition, our analytical expression provides the correction to
be applied to the simulation results for finite (possibly small) systems. It
applies not only to molecular but also to all mesoscopic hydrodynamic
simulations, including Lattice-Boltzmann, Multi-Particle Collision Dynamics or
Dissipative Particle Dynamics, which are often used to investigate confined
soft matter involving colloidal particles and polymers. | [
0,
1,
0,
0,
0,
0
] |
Title: SPLBoost: An Improved Robust Boosting Algorithm Based on Self-paced Learning,
Abstract: It is known that Boosting can be interpreted as a gradient descent technique
to minimize an underlying loss function. Specifically, the underlying loss
being minimized by the traditional AdaBoost is the exponential loss, which is
proved to be very sensitive to random noise/outliers. Therefore, several
Boosting algorithms, e.g., LogitBoost and SavageBoost, have been proposed to
improve the robustness of AdaBoost by replacing the exponential loss with some
designed robust loss functions. In this work, we present a new way to robustify
AdaBoost, i.e., incorporating the robust learning idea of Self-paced Learning
(SPL) into Boosting framework. Specifically, we design a new robust Boosting
algorithm based on SPL regime, i.e., SPLBoost, which can be easily implemented
by slightly modifying off-the-shelf Boosting packages. Extensive experiments
and a theoretical characterization are also carried out to illustrate the
merits of the proposed SPLBoost. | [
1,
0,
0,
1,
0,
0
] |
Title: Influence of thermal boundary conditions on the current-driven resistive transition in $\mathbf{VO_2}$ microbridges,
Abstract: We investigate the resistive switching behaviour of $\mathrm{VO_2}$
microbridges under current bias as a function of temperature and thermal
coupling with the heat bath. Upon increasing the electrical current bias, the
formation of the metallic phase can progress smoothly or through sharp jumps.
The magnitude and threshold current values of these sharp resistance drops show
random behaviour and are dramatically influenced by thermal dissipation
conditions. Our results also evidence how the propagation of the metallic phase
induced by electrical current in $\mathrm{VO_2}$, and thus the shape of the
resulting high-conductivity path, are not predictable. We discuss the origin of
the switching events through a simple electro-thermal model based on the domain
structure of $\mathrm{VO_2}$ films that can be useful to improve the stability
and controllability of future $\mathrm{VO_2}$-based devices. | [
0,
1,
0,
0,
0,
0
] |
Title: Learning Traffic as Images: A Deep Convolutional Neural Network for Large-Scale Transportation Network Speed Prediction,
Abstract: This paper proposes a convolutional neural network (CNN)-based method that
learns traffic as images and predicts large-scale, network-wide traffic speed
with a high accuracy. Spatiotemporal traffic dynamics are converted to images
describing the time and space relations of traffic flow via a two-dimensional
time-space matrix. A CNN is applied to the image following two consecutive
steps: abstract traffic feature extraction and network-wide traffic speed
prediction. The effectiveness of the proposed method is evaluated by taking two
real-world transportation networks, the second ring road and north-east
transportation network in Beijing, as examples, and comparing the method with
four prevailing algorithms, namely, ordinary least squares, k-nearest
neighbors, artificial neural network, and random forest, and three deep
learning architectures, namely, stacked autoencoder, recurrent neural network,
and long-short-term memory network. The results show that the proposed method
outperforms other algorithms by an average accuracy improvement of 42.91%
within an acceptable execution time. The CNN can train the model in a
reasonable time and, thus, is suitable for large-scale transportation networks. | [
1,
0,
0,
1,
0,
0
] |
Title: The ZX calculus is a language for surface code lattice surgery,
Abstract: Quantum computing is moving rapidly to the point of deployment of technology.
Functional quantum devices will require the ability to correct error in order
to be scalable and effective. A leading choice of error correction, in
particular for modular or distributed architectures, is the surface code with
logical two-qubit operations realised via "lattice surgery". These operations
consist of "merges" and "splits" acting non-unitarily on the logical states and
are not easily captured by standard circuit notation. This raises the question
of how best to reason about lattice surgery in order efficiently to use quantum
states and operations in architectures with complex resource management issues.
In this paper we demonstrate that the operations of the ZX calculus, a form of
quantum diagrammatic reasoning designed using category theory, match exactly
the operations of lattice surgery. Red and green "spider" nodes match rough and
smooth merges and splits, and follow the axioms of a dagger special associative
Frobenius algebra. Some lattice surgery operations can require non-trivial
correction operations, which are captured natively in the use of the ZX
calculus in the form of ensembles of diagrams. We give a first taste of the
power of the calculus as a language for surgery by considering two operations
(magic state use and producing a CNOT) and show how ZX diagram re-write rules
give lattice surgery procedures for these operations that are novel, efficient,
and highly configurable. | [
1,
0,
0,
0,
0,
0
] |
Title: Learning One-hidden-layer Neural Networks with Landscape Design,
Abstract: We consider the problem of learning a one-hidden-layer neural network: we
assume the input $x\in \mathbb{R}^d$ is from Gaussian distribution and the
label $y = a^\top \sigma(Bx) + \xi$, where $a$ is a nonnegative vector in
$\mathbb{R}^m$ with $m\le d$, $B\in \mathbb{R}^{m\times d}$ is a full-rank
weight matrix, and $\xi$ is a noise vector. We first give an analytic formula
for the population risk of the standard squared loss and demonstrate that it
implicitly attempts to decompose a sequence of low-rank tensors simultaneously.
Inspired by the formula, we design a non-convex objective function $G(\cdot)$
whose landscape is guaranteed to have the following properties: 1. All local
minima of $G$ are also global minima.
2. All global minima of $G$ correspond to the ground truth parameters.
3. The value and gradient of $G$ can be estimated using samples.
With these properties, stochastic gradient descent on $G$ provably converges
to the global minimum and learn the ground-truth parameters. We also prove
finite sample complexity result and validate the results by simulations. | [
1,
0,
0,
1,
0,
0
] |
Title: Growth and electronic structure of graphene on semiconducting Ge(110),
Abstract: The direct growth of graphene on semiconducting or insulating substrates
might help to overcome main drawbacks of metal-based synthesis, like metal-atom
contaminations of graphene, transfer issues, etc. Here we present the growth of
graphene on n-doped semiconducting Ge(110) by using an atomic carbon source and
the study of the structural and electronic properties of the obtained
interface. We found that graphene interacts weakly with the underlying Ge(110)
substrate that keeps graphene's electronic structure almost intact promoting
this interface for future graphene-semiconductor applications. The effect of
dopants in Ge on the electronic properties of graphene is also discussed. | [
0,
1,
0,
0,
0,
0
] |
Title: Alternative Lagrangians obtained by scalar deformations,
Abstract: We study non-conservative like SODEs admitting explicit Lagrangian
descriptions. Such systems are equivalent to the system of Lagrange equations
of some Lagrangian $L$, including a covariant force field which represents
non-conservative forces. We find necessary and sufficient conditions for the
existence of a differentiable function $\Phi:\mathbb{R}\rightarrow\mathbb{R}$
such that the initial system is equivalent to the system of Euler-Lagrange
equations of the deformed Lagrangian $\Phi(L)$. We give various examples of
such deformations. | [
0,
0,
1,
0,
0,
0
] |
Title: Accelerated Primal-Dual Policy Optimization for Safe Reinforcement Learning,
Abstract: Constrained Markov Decision Process (CMDP) is a natural framework for
reinforcement learning tasks with safety constraints, where agents learn a
policy that maximizes the long-term reward while satisfying the constraints on
the long-term cost. A canonical approach for solving CMDPs is the primal-dual
method which updates parameters in primal and dual spaces in turn. Existing
methods for CMDPs only use on-policy data for dual updates, which results in
sample inefficiency and slow convergence. In this paper, we propose a policy
search method for CMDPs called Accelerated Primal-Dual Optimization (APDO),
which incorporates an off-policy trained dual variable in the dual update
procedure while updating the policy in primal space with on-policy likelihood
ratio gradient. Experimental results on a simulated robot locomotion task show
that APDO achieves better sample efficiency and faster convergence than
state-of-the-art approaches for CMDPs. | [
0,
0,
0,
1,
0,
0
] |
Title: Toward Common Components for Open Workflow Systems,
Abstract: The role of scalable high-performance workflows and flexible workflow
management systems that can support multiple simulations will continue to
increase in importance. For example, with the end of Dennard scaling, there is
a need to substitute a single long running simulation with multiple repeats of
shorter simulations, or concurrent replicas. Further, many scientific problems
involve ensembles of simulations in order to solve a higher-level problem or
produce statistically meaningful results. However most supercomputing software
development and performance enhancements have focused on optimizing single-
simulation performance. On the other hand, there is a strong inconsistency in
the definition and practice of workflows and workflow management systems. This
inconsistency often centers around the difference between several different
types of workflows, including modeling and simulation, grid, uncertainty
quantification, and purely conceptual workflows. This work explores this
phenomenon by examining the different types of workflows and workflow
management systems, reviewing the perspective of a large supercomputing
facility, examining the common features and problems of workflow management
systems, and finally presenting a proposed solution based on the concept of
common building blocks. The implications of the continuing proliferation of
workflow management systems and the lack of interoperability between these
systems are discussed from a practical perspective. In doing so, we have begun
an investigation of the design and implementation of open workflow systems for
supercomputers based upon common components. | [
1,
0,
0,
0,
0,
0
] |
Title: On the Sampling Problem for Kernel Quadrature,
Abstract: The standard Kernel Quadrature method for numerical integration with random
point sets (also called Bayesian Monte Carlo) is known to converge in root mean
square error at a rate determined by the ratio $s/d$, where $s$ and $d$ encode
the smoothness and dimension of the integrand. However, an empirical
investigation reveals that the rate constant $C$ is highly sensitive to the
distribution of the random points. In contrast to standard Monte Carlo
integration, for which optimal importance sampling is well-understood, the
sampling distribution that minimises $C$ for Kernel Quadrature does not admit a
closed form. This paper argues that the practical choice of sampling
distribution is an important open problem. One solution is considered; a novel
automatic approach based on adaptive tempering and sequential Monte Carlo.
Empirical results demonstrate a dramatic reduction in integration error of up
to 4 orders of magnitude can be achieved with the proposed method. | [
1,
0,
0,
1,
0,
0
] |
Title: Zeroth order regular approximation approach to electric dipole moment interactions of the electron,
Abstract: A quasi-relativistic two-component approach for an efficient calculation of
$\mathcal{P,T}$-odd interactions caused by a permanent electric dipole moment
of the electron (eEDM) is presented. The approach uses a (two-component)
complex generalized Hartree-Fock (cGHF) and a complex generalized Kohn-Sham
(cGKS) scheme within the zeroth order regular approximation (ZORA). In
applications to select heavy-elemental polar diatomic molecular radicals, which
are promising candidates for an eEDM experiment, the method is compared to
relativistic four-component electron-correlation calculations and confirms
values for the effective electrical field acting on the unpaired electron for
RaF, BaF, YbF and HgF. The calculations show that purely relativistic effects,
involving only the lower component of the Dirac bi-spinor, are well described
by treating only the upper component explicitly. | [
0,
1,
0,
0,
0,
0
] |
Title: Trace your sources in large-scale data: one ring to find them all,
Abstract: An important preprocessing step in most data analysis pipelines aims to
extract a small set of sources that explain most of the data. Currently used
algorithms for blind source separation (BSS), however, often fail to extract
the desired sources and need extensive cross-validation. In contrast, their
rarely used probabilistic counterparts can get away with little
cross-validation and are more accurate and reliable but no simple and scalable
implementations are available. Here we present a novel probabilistic BSS
framework (DECOMPOSE) that can be flexibly adjusted to the data, is extensible
and easy to use, adapts to individual sources and handles large-scale data
through algorithmic efficiency. DECOMPOSE encompasses and generalises many
traditional BSS algorithms such as PCA, ICA and NMF and we demonstrate
substantial improvements in accuracy and robustness on artificial and real
data. | [
0,
0,
0,
1,
0,
0
] |
Title: The rigorous derivation of the linear Landau equation from a particle system in a weak-coupling limit,
Abstract: We consider a system of N particles interacting via a short-range smooth
potential, in a intermediate regime between the weak-coupling and the
low-density. We provide a rigorous derivation of the Linear Landau equation
from this particle system. The strategy of the proof consists in showing the
asymptotic equivalence between the one-particle marginal and the solution of
the linear Boltzmann equation with vanishing mean free path.Then, following the
ideas of Landau, we prove the asympotic equivalence between the solutions of
the Boltzmann and Landau linear equation in the grazing collision limit. | [
0,
0,
1,
0,
0,
0
] |
Title: Fractal dimension and lower bounds for geometric problems,
Abstract: We study the complexity of geometric problems on spaces of low fractal
dimension. It was recently shown by [Sidiropoulos & Sridhar, SoCG 2017] that
several problems admit improved solutions when the input is a pointset in
Euclidean space with fractal dimension smaller than the ambient dimension. In
this paper we prove nearly-matching lower bounds, thus establishing
nearly-optimal bounds for various problems as a function of the fractal
dimension.
More specifically, we show that for any set of $n$ points in $d$-dimensional
Euclidean space, of fractal dimension $\delta\in (1,d)$, for any $\epsilon >0$
and $c\geq 1$, any $c$-spanner must have treewidth at least $\Omega \left(
\frac{n^{1-1/(\delta - \epsilon)}}{c^{d-1}} \right)$, matching the previous
upper bound. The construction used to prove this lower bound on the treewidth
of spanners can also be used to derive lower bounds on the running time of
algorithms for various problems, assuming the Exponential Time Hypothesis. We
provide two prototypical results of this type. For any $\delta \in (1,d)$ and
any $\epsilon >0$ we show that:
1) $d$-dimensional Euclidean TSP on $n$ points with fractal dimension at most
$\delta$ cannot be solved in time $2^{O\left(n^{1-1/(\delta - \epsilon)}
\right)}$. The best-known upper bound is $2^{O(n^{1-1/\delta} \log n)}$.
2) The problem of finding $k$-pairwise non-intersecting $d$-dimensional unit
balls/axis parallel unit cubes with centers having fractal dimension at most
$\delta$ cannot be solved in time $f(k)n^{O \left(k^{1-1/(\delta -
\epsilon)}\right)}$ for any computable function $f$. The best-known upper bound
is $n^{O(k^{1-1/\delta} \log n)}$.
The above results nearly match previously known upper bounds from
[Sidiropoulos & Sridhar, SoCG 2017], and generalize analogous lower bounds for
the case of ambient dimension due to [Marx & Sidiropoulos, SoCG 2014]. | [
1,
0,
0,
0,
0,
0
] |
Title: Global Convergence of Langevin Dynamics Based Algorithms for Nonconvex Optimization,
Abstract: We present a unified framework to analyze the global convergence of Langevin
dynamics based algorithms for nonconvex finite-sum optimization with $n$
component functions. At the core of our analysis is a direct analysis of the
ergodicity of the numerical approximations to Langevin dynamics, which leads to
faster convergence rates. Specifically, we show that gradient Langevin dynamics
(GLD) and stochastic gradient Langevin dynamics (SGLD) converge to the almost
minimizer within $\tilde O\big(nd/(\lambda\epsilon) \big)$ and $\tilde
O\big(d^7/(\lambda^5\epsilon^5) \big)$ stochastic gradient evaluations
respectively, where $d$ is the problem dimension, and $\lambda$ is the spectral
gap of the Markov chain generated by GLD. Both of the results improve upon the
best known gradient complexity results. Furthermore, for the first time we
prove the global convergence guarantee for variance reduced stochastic gradient
Langevin dynamics (VR-SGLD) to the almost minimizer after $\tilde
O\big(\sqrt{n}d^5/(\lambda^4\epsilon^{5/2})\big)$ stochastic gradient
evaluations, which outperforms the gradient complexities of GLD and SGLD in a
wide regime. Our theoretical analyses shed some light on using Langevin
dynamics based algorithms for nonconvex optimization with provable guarantees. | [
1,
0,
1,
1,
0,
0
] |
Title: Eigenvalue Analysis via Kernel Density Estimation,
Abstract: In this paper, we propose an eigenvalue analysis -- of system dynamics models
-- based on the Mutual Information measure, which in turn will be estimated via
the Kernel Density Estimation method. We postulate that the proposed approach
represents a novel and efficient multivariate eigenvalue sensitivity analysis. | [
1,
0,
0,
0,
0,
0
] |
Title: The Saga of KPR: Theoretical and Experimental developments,
Abstract: In this article, we present a brief narration of the origin and the overview
of the recent developments done on the Kolkata Paise Restaurant (KPR) problem,
which can serve as a prototype for a broader class of resource allocation
problems in the presence of a large number of competing agents, typically
studied using coordination and anti-coordination games. We discuss the KPR and
its several extensions, as well as its applications in many economic and social
phenomena. We end the article with some discussions on our ongoing experimental
analysis of the same problem. We demonstrate that this provides an interesting
picture of how people analyze complex situations, and design their strategies
or react to them. | [
1,
0,
0,
0,
0,
0
] |
Title: The computational complexity of integer programming with alternations,
Abstract: We prove that integer programming with three quantifier alternations is
$NP$-complete, even for a fixed number of variables. This complements earlier
results by Lenstra and Kannan, which together say that integer programming with
at most two quantifier alternations can be done in polynomial time for a fixed
number of variables. As a byproduct of the proof, we show that for two
polytopes $P,Q \subset \mathbb{R}^4$ , counting the projection of integer
points in $Q \backslash P$ is $\#P$-complete. This contrasts the 2003 result by
Barvinok and Woods, which allows counting in polynomial time the projection of
integer points in $P$ and $Q$ separately. | [
1,
0,
1,
0,
0,
0
] |
Title: Robust Kronecker-Decomposable Component Analysis for Low-Rank Modeling,
Abstract: Dictionary learning and component analysis are part of one of the most
well-studied and active research fields, at the intersection of signal and
image processing, computer vision, and statistical machine learning. In
dictionary learning, the current methods of choice are arguably K-SVD and its
variants, which learn a dictionary (i.e., a decomposition) for sparse coding
via Singular Value Decomposition. In robust component analysis, leading methods
derive from Principal Component Pursuit (PCP), which recovers a low-rank matrix
from sparse corruptions of unknown magnitude and support. However, K-SVD is
sensitive to the presence of noise and outliers in the training set.
Additionally, PCP does not provide a dictionary that respects the structure of
the data (e.g., images), and requires expensive SVD computations when solved by
convex relaxation. In this paper, we introduce a new robust decomposition of
images by combining ideas from sparse dictionary learning and PCP. We propose a
novel Kronecker-decomposable component analysis which is robust to gross
corruption, can be used for low-rank modeling, and leverages separability to
solve significantly smaller problems. We design an efficient learning algorithm
by drawing links with a restricted form of tensor factorization. The
effectiveness of the proposed approach is demonstrated on real-world
applications, namely background subtraction and image denoising, by performing
a thorough comparison with the current state of the art. | [
1,
0,
0,
1,
0,
0
] |
Title: Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks,
Abstract: Despite the wide use of machine learning in adversarial settings including
computer security, recent studies have demonstrated vulnerabilities to evasion
attacks---carefully crafted adversarial samples that closely resemble
legitimate instances, but cause misclassification. In this paper, we examine
the adequacy of the leading approach to generating adversarial samples---the
gradient descent approach. In particular (1) we perform extensive experiments
on three datasets, MNIST, USPS and Spambase, in order to analyse the
effectiveness of the gradient-descent method against non-linear support vector
machines, and conclude that carefully reduced kernel smoothness can
significantly increase robustness to the attack; (2) we demonstrate that
separated inter-class support vectors lead to more secure models, and propose a
quantity similar to margin that can efficiently predict potential
susceptibility to gradient-descent attacks, before the attack is launched; and
(3) we design a new adversarial sample construction algorithm based on
optimising the multiplicative ratio of class decision functions. | [
1,
0,
0,
1,
0,
0
] |
Title: The way to uncover community structure with core and diversity,
Abstract: Communities are ubiquitous in nature and society. Individuals that share
common properties often self-organize to form communities. Avoiding the
shortages of computation complexity, pre-given information and unstable results
in different run, in this paper, we propose a simple and effcient method to
deepen our understanding of the emergence and diversity of communities in
complex systems. By introducing the rational random selection, our method
reveals the hidden deterministic and normal diverse community states of
community structure. To demonstrate this method, we test it with real-world
systems. The results show that our method could not only detect community
structure with high sensitivity and reliability, but also provide instructional
information about the hidden deterministic community world and our normal
diverse community world by giving out the core-community, the real-community,
the tide and the diversity. This is of paramount importance in understanding,
predicting, and controlling a variety of collective behaviors in complex
systems. | [
1,
1,
0,
0,
0,
0
] |
Title: Stochastic comparisons of the largest claim amounts from two sets of interdependent heterogeneous portfolios,
Abstract: Let $ X_{\lambda_1},\ldots,X_{\lambda_n}$ be dependent non-negative random
variables and $Y_i=I_{p_i} X_{\lambda_i}$, $i=1,\ldots,n$, where
$I_{p_1},\ldots,I_{p_n}$ are independent Bernoulli random variables independent
of $X_{\lambda_i}$'s, with ${\rm E}[I_{p_i}]=p_i$, $i=1,\ldots,n$. In actuarial
sciences, $Y_i$ corresponds to the claim amount in a portfolio of risks. In
this paper, we compare the largest claim amounts of two sets of interdependent
portfolios, in the sense of usual stochastic order, when the variables in one
set have the parameters $\lambda_1,\ldots,\lambda_n$ and $p_1,\ldots,p_n$ and
the variables in the other set have the parameters
$\lambda^{*}_1,\ldots,\lambda^{*}_n$ and $p^*_1,\ldots,p^*_n$. For
illustration, we apply the results to some important models in actuary. | [
0,
0,
0,
0,
0,
1
] |
Title: An Achilles' Heel of Term-Resolution,
Abstract: Term-resolution provides an elegant mechanism to prove that a quantified
Boolean formula (QBF) is true. It is a dual to Q-resolution (also referred to
as clause-resolution) and is practically highly important as it enables
certifying answers of DPLL-based QBF solvers. While term-resolution and
Q-resolution are very similar, they're not completely symmetric. In particular,
Q-resolution operates on clauses and term-resolution operates on models of the
matrix. This paper investigates what impact this asymmetry has. We'll see that
there is a large class of formulas (formulas with "big models") whose
term-resolution proofs are exponential. As a possible remedy, the paper
suggests to prove true QBFs by refuting their negation ({\em negate-refute}),
rather than proving them by term-resolution. The paper shows that from the
theoretical perspective this is indeed a favorable approach. In particular,
negation-refutation can p-simulates term-resolution and there is an exponential
separation between the two calculi. These observations further our
understanding of proof systems for QBFs and provide a strong theoretical
underpinning for the effort towards non-CNF QBF solvers. | [
1,
0,
0,
0,
0,
0
] |
Title: Tunneling estimates and approximate controllability for hypoelliptic equations,
Abstract: This article is concerned with quantitative unique continuation estimates for
equations involving a "sum of squares" operator $\mathcal{L}$ on a compact
manifold $\mathcal{M}$ assuming: $(i)$ the Chow-Rashevski-Hörmander condition
ensuring the hypoellipticity of $\mathcal{L}$, and $(ii)$ the analyticity of
$\mathcal{M}$ and the coefficients of $\mathcal{L}$.
The first result is the tunneling estimate $\|\varphi\|_{L^2(\omega)} \geq
Ce^{- \lambda^{\frac{k}{2}}}$ for normalized eigenfunctions $\varphi$ of
$\mathcal{L}$ from a nonempty open set $\omega\subset \mathcal{M}$, where $k$
is the hypoellipticity index of $\mathcal{L}$ and $\lambda$ the eigenvalue.
The main result is a stability estimate for solutions to the hypoelliptic
wave equation $(\partial_t^2+\mathcal{L})u=0$: for $T>2 \sup_{x \in
\mathcal{M}}(dist(x,\omega))$ (here, $dist$ is the sub-Riemannian distance),
the observation of the solution on $(0,T)\times \omega$ determines the data.
The constant involved in the estimate is $Ce^{c\Lambda^k}$ where $\Lambda$ is
the typical frequency of the data.
We then prove the approximate controllability of the hypoelliptic heat
equation $(\partial_t+\mathcal{L})v=1_\omega f$ in any time, with appropriate
(exponential) cost, depending on $k$. In case $k=2$ (Grushin, Heisenberg...),
we further show approximate controllability to trajectories with polynomial
cost in large time.
We also explain how the analyticity assumption can be relaxed, and a boundary
$\partial \mathcal{M}$ can be added in some situations.
Most results turn out to be optimal on a family of Grushin-type operators.
The main proof relies on the general strategy developed by the authors in
arXiv:1506.04254. | [
0,
0,
1,
0,
0,
0
] |
Title: Optimal Resonant Beam Charging for Electronic Vehicles in Internet of Intelligent Vehicles,
Abstract: To enable electric vehicles (EVs) to access to the internet of intelligent
vehicles (IoIV), charging EVs wirelessly anytime and anywhere becomes an urgent
need. The resonant beam charging (RBC) technology can provide high-power and
long-range wireless energy for EVs. However, the RBC system is unefficient. To
improve the RBC power transmission efficiency, the adaptive resonant beam
charging (ARBC) technology was introduced. In this paper, after analyzing the
modular model of the ARBC system, we obtain the closed-form formula of the
end-to-end power transmission efficiency. Then, we prove that the optimal power
transmission efficiency uniquely exists. Moreover, we analyze the relationships
among the optimal power transmission efficiency, the source power, the output
power, and the beam transmission efficiency, which provide the guidelines for
the optimal ARBC system design and implementation. Hence, perpetual energy can
be supplied to EVs in IoIV virtually. | [
1,
0,
0,
0,
0,
0
] |
Title: An Adaptive Version of Brandes' Algorithm for Betweenness Centrality,
Abstract: Betweenness centrality---measuring how many shortest paths pass through a
vertex---is one of the most important network analysis concepts for assessing
the relative importance of a vertex. The well-known algorithm of Brandes [2001]
computes, on an $n$-vertex and $m$-edge graph, the betweenness centrality of
all vertices in $O(nm)$ worst-case time. In follow-up work, significant
empirical speedups were achieved by preprocessing degree-one vertices and by
graph partitioning based on cut vertices. We further contribute an algorithmic
treatment of degree-two vertices, which turns out to be much richer in
mathematical structure than the case of degree-one vertices. Based on these
three algorithmic ingredients, we provide a strengthened worst-case running
time analysis for betweenness centrality algorithms. More specifically, we
prove an adaptive running time bound $O(kn)$, where $k < m$ is the size of a
minimum feedback edge set of the input graph. | [
1,
0,
0,
0,
0,
0
] |
Title: Kinetic cascade in solar-wind turbulence: 3D3V hybrid-kinetic simulations with electron inertia,
Abstract: Understanding the nature of the turbulent fluctuations below the ion
gyroradius in solar-wind turbulence is a great challenge. Recent studies have
been mostly in favor of kinetic Alfvén wave (KAW) type of fluctuations, but
other kinds of fluctuations with characteristics typical of magnetosonic,
whistler and ion Bernstein modes, could also play a role depending on the
plasma parameters. Here we investigate the properties of the sub-proton-scale
cascade with high-resolution hybrid-kinetic simulations of freely-decaying
turbulence in 3D3V phase space, including electron inertia effects. Two proton
plasma beta are explored: the "intermediate" $\beta_p=1$ and "low"
$\beta_p=0.2$ regimes, both typically observed in solar wind and corona. The
magnetic energy spectum exhibits $k_\perp^{-8/3}$ and $k_\|^{-7/2}$ power laws
at $\beta_p=1$, while they are slightly steeper at $\beta_p=0.2$. Nevertheless,
both regimes develop a spectral anisotropy consistent with $k_\|\sim
k_\perp^{2/3}$ at $k_\perp\rho_p>1$, and pronounced small-scale intermittency.
In this context, we find that the kinetic-scale cascade is dominated by
KAW-like fluctuations at $\beta_p=1$, whereas the low-$\beta$ case presents a
more complex scenario suggesting the simultaneous presence of different types
of fluctuations. In both regimes, however, a non-negligible role of ion
Bernstein type of fluctuations at the smallest scales seems to emerge. | [
0,
1,
0,
0,
0,
0
] |
Title: Gamma-Band Correlations in Primary Visual Cortex,
Abstract: Neural field theory is used to quantitatively analyze the two-dimensional
spatiotemporal correlation properties of gamma-band (30 -- 70 Hz) oscillations
evoked by stimuli arriving at the primary visual cortex (V1), and modulated by
patchy connectivities that depend on orientation preference (OP). Correlation
functions are derived analytically under different stimulus and measurement
conditions. The predictions reproduce a range of published experimental
results, including the existence of two-point oscillatory temporal
cross-correlations with zero time-lag between neurons with similar OP, the
influence of spatial separation of neurons on the strength of the correlations,
and the effects of differing stimulus orientations. | [
0,
0,
0,
0,
1,
0
] |
Title: A Branch-and-Bound Algorithm for Checkerboard Extraction in Camera-Laser Calibration,
Abstract: We address the problem of camera-to-laser-scanner calibration using a
checkerboard and multiple image-laser scan pairs. Distinguishing which laser
points measure the checkerboard and which lie on the background is essential to
any such system. We formulate the checkerboard extraction as a combinatorial
optimization problem with a clear cut objective function. We propose a
branch-and-bound technique that deterministically and globally optimizes the
objective. Unlike what is available in the literature, the proposed method is
not heuristic and does not require assumptions such as constraints on the
background or relying on discontinuity of the range measurements to partition
the data into line segments. The proposed approach is generic and can be
applied to both 3D or 2D laser scanners as well as the cases where multiple
checkerboards are present. We demonstrate the effectiveness of the proposed
approach by providing numerical simulations as well as experimental results. | [
1,
0,
0,
0,
0,
0
] |
Title: On the mapping of Points of Interest through StreetView imagery and paid crowdsourcing,
Abstract: The use of volunteers has emerged as low-cost alternative to generate
accurate geographical information, an approach known as Volunteered Geographic
Information (VGI). However, VGI is limited by the number and availability of
volunteers in the area to be mapped, hindering scalability for large areas and
making difficult to map within a time-frame. Fortunately, the availability of
street-view imagery enables the virtual exploration of urban environments,
making possible the recruitment of contributors not necessarily located in the
area to be mapped. In this paper, we describe the design, implementation, and
evaluation of the Virtual City Explorer (VCE), a system to collect the
coordinates of Points of Interest within a bounded area on top of a street view
service with the use of paid crowdworkers. Our evaluation suggests that paid
crowdworkers are effective for finding PoIs, and cover almost all the area.
With respect to completeness, our approach does not find all PoIs found by
experts or VGI communities, but is able to find PoIs that were not found by
them, suggesting complementarity. We also studied the impact of making PoIs
already discovered by a certain number of workers \emph{taboo} for incoming
workers, finding that it encourages more exploration from workers , increase
the number of detected PoIs , and reduce costs. | [
1,
0,
0,
0,
0,
0
] |
Title: Complex tensor factorisation with PARAFAC2 for the estimation of brain connectivity from the EEG,
Abstract: Objective: The coupling between neuronal populations and its magnitude have
been shown to be informative for various clinical applications. One method to
estimate brain connectivity is with electroencephalography (EEG) from which the
cross-spectrum between different sensor locations is derived. We wish to test
the efficacy of tensor factorisation in the estimation of brain connectivity.
Methods: Complex tensor factorisation based on PARAFAC2 is used to decompose
the EEG into scalp components described by the spatial, spectral, and complex
trial profiles. An EEG model in the complex domain was derived that shows the
suitability of PARAFAC2. A connectivity metric was also derived on the complex
trial profiles of the extracted components. Results: Results on a benchmark EEG
dataset confirmed that PARAFAC2 can estimate connectivity better than
traditional tensor analysis such as PARAFAC within a range of signal-to-noise
ratios. The analysis of EEG from patients with mild cognitive impairment or
Alzheimer's disease showed that PARAFAC2 identifies loss of brain connectivity
better than traditional approaches and agreeing with prior pathological
knowledge. Conclusion: The complex PARAFAC2 algorithm is suitable for EEG
connectivity estimation since it allows to extract meaningful coupled sources
and provides better estimates than complex PARAFAC. Significance: A new
paradigm that employs complex tensor factorisation has demonstrated to be
successful in identifying brain connectivity and the location of couples
sources for both a benchmark and a real-world EEG dataset. This can enable
future applications and has the potential to solve some the issues that
deteriorate the performance of traditional connectivity metrics. | [
1,
0,
0,
0,
0,
0
] |
Title: A New Approach of Exploiting Self-Adjoint Matrix Polynomials of Large Random Matrices for Anomaly Detection and Fault Location,
Abstract: Synchronized measurements of a large power grid enable an unprecedented
opportunity to study the spatialtemporal correlations. Statistical analytics
for those massive datasets start with high-dimensional data matrices.
Uncertainty is ubiquitous in a future's power grid. These data matrices are
recognized as random matrices. This new point of view is fundamental in our
theoretical analysis since true covariance matrices cannot be estimated
accurately in a high-dimensional regime. As an alternative, we consider
large-dimensional sample covariance matrices in the asymptotic regime to
replace the true covariance matrices. The self-adjoint polynomials of
large-dimensional random matrices are studied as statistics for big data
analytics. The calculation of the asymptotic spectrum distribution (ASD) for
such a matrix polynomial is understandably challenging. This task is made
possible by a recent breakthrough in free probability, an active research
branch in random matrix theory. This is the very reason why the work of this
paper is inspired initially. The new approach is interesting in many aspects.
The mathematical reason may be most critical. The real-world problems can be
solved using this approach, however. | [
0,
0,
0,
1,
0,
0
] |
Title: Bayesian Pool-based Active Learning With Abstention Feedbacks,
Abstract: We study pool-based active learning with abstention feedbacks, where a
labeler can abstain from labeling a queried example with some unknown
abstention rate. This is an important problem with many useful applications. We
take a Bayesian approach to the problem and develop two new greedy algorithms
that learn both the classification problem and the unknown abstention rate at
the same time. These are achieved by simply incorporating the estimated
abstention rate into the greedy criteria. We prove that both of our algorithms
have near-optimality guarantees: they respectively achieve a
${(1-\frac{1}{e})}$ constant factor approximation of the optimal expected or
worst-case value of a useful utility function. Our experiments show the
algorithms perform well in various practical scenarios. | [
1,
0,
0,
1,
0,
0
] |
Title: Multiconfigurational Short-Range Density-Functional Theory for Open-Shell Systems,
Abstract: Many chemical systems cannot be described by quantum chemistry methods based
on a singlereference wave function. Accurate predictions of energetic and
spectroscopic properties require a delicate balance between describing the most
important configurations (static correlation) and obtaining dynamical
correlation efficiently. The former is most naturally done through a
multiconfigurational (MC) wave function, whereas the latter can be done by,
e.g., perturbation theory. We have employed a different strategy, namely, a
hybrid between multiconfigurational wave functions and density-functional
theory (DFT) based on range separation. The method is denoted by MC short-range
(sr) DFT and is more efficient than perturbative approaches as it capitalizes
on the efficient treatment of the (short-range) dynamical correlation by DFT
approximations. In turn, the method also improves DFT with standard
approximations through the ability of multiconfigurational wave functions to
recover large parts of the static correlation. Until now, our implementation
was restricted to closed-shell systems, and to lift this restriction, we
present here the generalization of MC-srDFT to open-shell cases. The additional
terms required to treat open-shell systems are derived and implemented in the
DALTON program. This new method for open-shell systems is illustrated on
dioxygen and [Fe(H2O)6]3+. | [
0,
1,
0,
0,
0,
0
] |
Title: Shape recognition of volcanic ash by simple convolutional neural network,
Abstract: Shape analyses of tephra grains result in understanding eruption mechanism of
volcanoes. However, we have to define and select parameter set such as
convexity for the precise discrimination of tephra grains. Selection of the
best parameter set for the recognition of tephra shapes is complicated.
Actually, many shape parameters have been suggested. Recently, neural network
has made a great success in the field of machine learning. Convolutional neural
network can recognize the shape of images without human bias and shape
parameters. We applied the simple convolutional neural network developed for
the handwritten digits to the recognition of tephra shapes. The network was
trained by Morphologi tephra images, and it can recognize the tephra shapes
with approximately 90% of accuracy. | [
1,
1,
0,
0,
0,
0
] |
Title: The Uranie platform: an Open-source software for optimisation, meta-modelling and uncertainty analysis,
Abstract: The high-performance computing resources and the constant improvement of both
numerical simulation accuracy and the experimental measurements with which they
are confronted, bring a new compulsory step to strengthen the credence given to
the simulation results: uncertainty quantification. This can have different
meanings, according to the requested goals (rank uncertainty sources, reduce
them, estimate precisely a critical threshold or an optimal working point) and
it could request mathematical methods with greater or lesser complexity. This
paper introduces the Uranie platform, an Open-source framework which is
currently developed at the Alternative Energies and Atomic Energy Commission
(CEA), in the nuclear energy division, in order to deal with uncertainty
propagation, surrogate models, optimisation issues, code calibration... This
platform benefits from both its dependencies, but also from personal
developments, to offer an efficient data handling model, a C++ and Python
interpreter, advanced graphical tools, several parallelisation solutions...
These methods are very generic and can then be applied to many kinds of code
(as Uranie considers them as black boxes) so to many fields of physics as well.
In this paper, the example of thermal exchange between a plate-sheet and a
fluid is introduced to show how Uranie can be used to perform a large range of
analysis. The code used to produce the figures of this paper can be found in
this https URL along with the sources of the
platform. | [
0,
0,
0,
1,
0,
0
] |
Title: Learning Convolutional Text Representations for Visual Question Answering,
Abstract: Visual question answering is a recently proposed artificial intelligence task
that requires a deep understanding of both images and texts. In deep learning,
images are typically modeled through convolutional neural networks, and texts
are typically modeled through recurrent neural networks. While the requirement
for modeling images is similar to traditional computer vision tasks, such as
object recognition and image classification, visual question answering raises a
different need for textual representation as compared to other natural language
processing tasks. In this work, we perform a detailed analysis on natural
language questions in visual question answering. Based on the analysis, we
propose to rely on convolutional neural networks for learning textual
representations. By exploring the various properties of convolutional neural
networks specialized for text data, such as width and depth, we present our
"CNN Inception + Gate" model. We show that our model improves question
representations and thus the overall accuracy of visual question answering
models. We also show that the text representation requirement in visual
question answering is more complicated and comprehensive than that in
conventional natural language processing tasks, making it a better task to
evaluate textual representation methods. Shallow models like fastText, which
can obtain comparable results with deep learning models in tasks like text
classification, are not suitable in visual question answering. | [
1,
0,
0,
1,
0,
0
] |
Title: Cross-stream migration of active particles,
Abstract: For natural microswimmers, the interplay of swimming activity and external
flow can promote robust motion, e.g. propulsion against ("upstream rheotaxis")
or perpendicular to the direction of flow. These effects are generally
attributed to their complex body shapes and flagellar beat patterns. Here,
using catalytic Janus particles as a model experimental system, we report on a
strong directional response that occurs for spherical active particles in a
channel flow. The particles align their propulsion axes to be nearly
perpendicular to both the direction of flow and the normal vector of a nearby
bounding surface. We develop a deterministic theoretical model of spherical
microswimmers near a planar wall that captures the experimental observations.
We show how the directional response emerges from the interplay of shear flow
and near-surface swimming activity. Finally, adding the effect of thermal
noise, we obtain probability distributions for the swimmer orientation that
semi-quantitatively agree with the experimental distributions. | [
0,
1,
0,
0,
0,
0
] |
Title: Analysis of the Polya-Gamma block Gibbs sampler for Bayesian logistic linear mixed models,
Abstract: In this article, we construct a two-block Gibbs sampler using Polson et al.
(2013) data augmentation technique with Polya-Gamma latent variables for
Bayesian logistic linear mixed models under proper priors. Furthermore, we
prove the uniform ergodicity of this Gibbs sampler, which guarantees the
existence of the central limit theorems for MCMC based estimators. | [
0,
0,
1,
1,
0,
0
] |
Title: Direct and Simultaneous Observation of Ultrafast Electron and Hole Dynamics in Germanium,
Abstract: Understanding excited carrier dynamics in semiconductors is crucial for the
development of photovoltaics and efficient photonic devices. However,
overlapping spectral features in optical/NIR pump-probe spectroscopy often
render assignments of separate electron and hole carrier dynamics ambiguous.
Here, ultrafast electron and hole dynamics in germanium nanocrystalline thin
films are directly and simultaneously observed by attosecond transient
absorption spectroscopy (ATAS) in the extreme ultraviolet at the germanium
M_{4,5}-edge (~30 eV). We decompose the ATAS spectra into contributions of
electronic state blocking and photo-induced band shifts at a carrier density of
8*10^{20}cm^{-3}. Separate electron and hole relaxation times are observed as a
function of hot carrier energies. A first order electron and hole decay of ~1
ps suggests a Shockley-Read-Hall recombination mechanism. The simultaneous
observation of electrons and holes with ATAS paves the way for investigating
few to sub-femtosecond dynamics of both holes and electrons in complex
semiconductor materials and across junctions. | [
0,
1,
0,
0,
0,
0
] |
Title: Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics,
Abstract: Robots have gained relevance in society, increasingly performing critical
tasks. Nonetheless, robot security is being underestimated. Robotics security
is a complex landscape, which often requires a cross-disciplinar perspective to
which classical security lags behind. To address this issue, we present the
Robot Security Framework (RSF), a methodology to perform systematic security
assessments in robots. We propose, adapt and develop specific terminology and
provide guidelines to enable a holistic security assessment following four main
layers (Physical, Network, Firmware and Application). We argue that modern
robotics should regard as equally relevant internal and external communication
security. Finally, we advocate against "security by obscurity". We conclude
that the field of security in robotics deserves further research efforts. | [
1,
0,
0,
0,
0,
0
] |
Title: Statistical Verification of Computational Rapport Model,
Abstract: Rapport plays an important role during communication because it can help
people understand each other's feelings or ideas and leads to a smooth
communication. Computational rapport model has been proposed based on theory in
previous work. But there lacks solid verification. In this paper, we apply
structural equation model (SEM) to the theoretical model on both dyads of
friend and stranger. The results indicate some unfavorable paths. Based on the
results and more literature, we modify the original model to integrate more
nonverbal behaviors, including gaze and smile. Fit indices and other
examination show the goodness of our new models, which can give us more insight
into rapport management during conversation. | [
1,
0,
0,
0,
0,
0
] |
Title: Least models of second-order set theories,
Abstract: The main theorems of this paper are (1) there is no least transitive model of
Kelley--Morse set theory $\mathsf{KM}$ and (2) there is a least
$\beta$-model---that is, a transitive model which is correct about which of its
classes are well-founded---of Gödel--Bernays set theory $\mathsf{GBC}$ +
Elementary Transfinite Recursion. Along the way I characterize when a countable
model of $\mathsf{ZFC}$ has a least $\mathsf{GBC}$-realization and show that no
countable model of $\mathsf{ZFC}$ has a least $\mathsf{KM}$-realization. I also
show that fragments of Elementary Transfinite Recursion have least
$\beta$-models and, for sufficiently weak fragments, least transitive models.
These fragments can be separated from each other and from the full principle of
Elementary Transfinite Recursion by consistency strength. The main question
left unanswered by this article is whether there is a least transitive model of
$\mathsf{GBC}$ + Elementary Transfinite Recursion. | [
0,
0,
1,
0,
0,
0
] |
Title: Characterizing K2 Candidate Planetary Systems Orbiting Low-Mass Stars I: Classifying Low-mass Host Stars Observed During Campaigns 1-7,
Abstract: We present near-infrared spectra for 144 candidate planetary systems
identified during Campaigns 1-7 of the NASA K2 Mission. The goal of the survey
was to characterize planets orbiting low-mass stars, but our IRTF/SpeX and
Palomar/TripleSpec spectroscopic observations revealed that 49% of our targets
were actually giant stars or hotter dwarfs reddened by interstellar extinction.
For the 72 stars with spectra consistent with classification as cool dwarfs
(spectral types K3 - M4), we refined their stellar properties by applying
empirical relations based on stars with interferometric radius measurements.
Although our revised temperatures are generally consistent with those reported
in the Ecliptic Plane Input Catalog (EPIC), our revised stellar radii are
typically 0.13 solar radii (39%) larger than the EPIC values, which were based
on model isochrones that have been shown to underestimate the radii of cool
dwarfs. Our improved stellar characterizations will enable more efficient
prioritization of K2 targets for follow-up studies. | [
0,
1,
0,
0,
0,
0
] |
Title: Binary orbits from combined astrometric and spectroscopic data,
Abstract: An efficient Bayesian technique for estimation problems in fundamental
stellar astronomy is tested on simulated data for a binary observed both
astrometrically and spectroscopically. Posterior distributions are computed for
the components' masses and for the binary's parallax. One thousand independent
repetitions of the simulation demonstrate that the 1- and 2-$\!\sigma$
credibility intervals for these fundamental quantities have close to the
correct coverage fractions. In addition, the simulations allow the
investigation of the statistical properties of a Bayesian goodness-of-fit
criterion and of the corresponding p-value. The criterion has closely similar
properties to the traditional chi^{2} test for minimum-chi^{2} solutions. | [
0,
1,
0,
0,
0,
0
] |
Title: Gyrotropic Zener tunneling and nonlinear IV curves in the zero-energy Landau level of graphene in a strong magnetic field,
Abstract: We have investigated tunneling current through a suspended graphene Corbino
disk in high magnetic fields at the Dirac point, i.e. at filling factor $\nu$ =
0. At the onset of the dielectric breakdown the current through the disk grows
exponentially before ohmic behaviour, but in a manner distinct from thermal
activation. We find that Zener tunneling between Landau sublevels dominates,
facilitated by tilting of the source-drain bias potential. According to our
analytic modelling, the Zener tunneling is strongly affected by the gyrotropic
force (Lorentz force) due to the high magnetic field | [
0,
1,
0,
0,
0,
0
] |
Title: Accurate, Efficient and Scalable Graph Embedding,
Abstract: The Graph Convolutional Network (GCN) model and its variants are powerful
graph embedding tools for facilitating classification and clustering on graphs.
However, a major challenge is to reduce the complexity of layered GCNs and make
them parallelizable and scalable on very large graphs --- state-of the art
techniques are unable to achieve scalability without losing accuracy and
efficiency. In this paper, we propose novel parallelization techniques for
graph sampling-based GCNs that achieve superior scalable performance on very
large graphs without compromising accuracy. Specifically, our GCN guarantees
work-efficient training and produces order of magnitude savings in computation
and communication. To scale GCN training on tightly-coupled shared memory
systems, we develop parallelization strategies for the key steps in training:
For the graph sampling step, we exploit parallelism within and across multiple
sampling instances, and devise an efficient data structure for concurrent
accesses that provides theoretical guarantee of near-linear speedup with number
of processing units. For the feature propagation step within the sampled graph,
we improve cache utilization and reduce DRAM communication by data
partitioning. We prove that our partitioning strategy is a 2-approximation for
minimizing the communication time compared to the optimal strategy. We
demonstrate that our parallel graph embedding outperforms state-of-the-art
methods in scalability (with respect to number of processors, graph size and
GCN model size), efficiency and accuracy on several large datasets. On a
40-core Xeon platform, our parallel training achieves 64$\times$ speedup (with
AVX) in the sampling step and 25$\times$ speedup in the feature propagation
step, compared to the serial implementation, resulting in a net speedup of
21$\times$. | [
1,
0,
0,
0,
0,
0
] |
Title: A principled methodology for comparing relatedness measures for clustering publications,
Abstract: There are many different relatedness measures, based for instance on citation
relations or textual similarity, that can be used to cluster scientific
publications. We propose a principled methodology for evaluating the accuracy
of clustering solutions obtained using these relatedness measures. We formally
show that the proposed methodology has an important consistency property. The
empirical analyses that we present are based on publications in the fields of
cell biology, condensed matter physics, and economics. Using the BM25
text-based relatedness measure as evaluation criterion, we find that
bibliographic coupling relations yield more accurate clustering solutions than
direct citation relations and co-citation relations. The so-called extended
direct citation approach performs similarly to or slightly better than
bibliographic coupling in terms of the accuracy of the resulting clustering
solutions. The other way around, using a citation-based relatedness measure as
evaluation criterion, BM25 turns out to yield more accurate clustering
solutions than other text-based relatedness measures. | [
1,
0,
0,
0,
0,
0
] |
Title: A Game-Theoretic Approach for Runtime Capacity Allocation in MapReduce,
Abstract: Nowadays many companies have available large amounts of raw, unstructured
data. Among Big Data enabling technologies, a central place is held by the
MapReduce framework and, in particular, by its open source implementation,
Apache Hadoop. For cost effectiveness considerations, a common approach entails
sharing server clusters among multiple users. The underlying infrastructure
should provide every user with a fair share of computational resources,
ensuring that Service Level Agreements (SLAs) are met and avoiding wastes. In
this paper we consider two mathematical programming problems that model the
optimal allocation of computational resources in a Hadoop 2.x cluster with the
aim to develop new capacity allocation techniques that guarantee better
performance in shared data centers. Our goal is to get a substantial reduction
of power consumption while respecting the deadlines stated in the SLAs and
avoiding penalties associated with job rejections. The core of this approach is
a distributed algorithm for runtime capacity allocation, based on Game Theory
models and techniques, that mimics the MapReduce dynamics by means of
interacting players, namely the central Resource Manager and Class Managers. | [
1,
0,
0,
0,
0,
0
] |
Title: Holographic Butterfly Effect and Diffusion in Quantum Critical Region,
Abstract: We investigate the butterfly effect and charge diffusion near the quantum
phase transition in holographic approach. We argue that their criticality is
controlled by the holographic scaling geometry with deformations induced by a
relevant operator at finite temperature. Specifically, in the quantum critical
region controlled by a single fixed point, the butterfly velocity decreases
when deviating from the critical point. While, in the non-critical region, the
behavior of the butterfly velocity depends on the specific phase at low
temperature. Moreover, in the holographic Berezinskii-Kosterlitz-Thouless
transition, the universal behavior of the butterfly velocity is absent.
Finally, the tendency of our holographic results matches with the numerical
results of Bose-Hubbard model. A comparison between our result and that in the
$O(N)$ nonlinear sigma model is also given. | [
0,
1,
0,
0,
0,
0
] |
Title: High-temperature charge density wave correlations in La$_{1.875}$Ba$_{0.125}$CuO$_{4}$ without spin-charge locking,
Abstract: Although all superconducting cuprates display charge-ordering tendencies,
their low-temperature properties are distinct, impeding efforts to understand
the phenomena within a single conceptual framework. While some systems exhibit
stripes of charge and spin, with a locked periodicity, others host charge
density waves (CDWs) without any obviously related spin order. Here we use
resonant inelastic x-ray scattering (RIXS) to follow the evolution of charge
correlations in the canonical stripe ordered cuprate
La$_{1.875}$Ba$_{0.125}$CuO$_{4}$ (LBCO~$1/8$) across its ordering transition.
We find that high-temperature charge correlations are unlocked from the
wavevector of the spin correlations, signaling analogies to CDW phases in
various other cuprates. This indicates that stripe order at low temperatures is
stabilized by the coupling of otherwise independent charge and spin density
waves, with important implications for the relation between charge and spin
correlations in the cuprates. | [
0,
1,
0,
0,
0,
0
] |
Title: A unified deep artificial neural network approach to partial differential equations in complex geometries,
Abstract: In this paper we use deep feedforward artificial neural networks to
approximate solutions to partial differential equations in complex geometries.
We show how to modify the backpropagation algorithm to compute the partial
derivatives of the network output with respect to the space variables which is
needed to approximate the differential operator. The method is based on an
ansatz for the solution which requires nothing but feedforward neural networks
and an unconstrained gradient based optimization method such as gradient
descent or a quasi-Newton method.
We show an example where classical mesh based methods cannot be used and
neural networks can be seen as an attractive alternative. Finally, we highlight
the benefits of deep compared to shallow neural networks and device some other
convergence enhancing techniques. | [
1,
0,
0,
1,
0,
0
] |
Title: Gradient Flows in Uncertainty Propagation and Filtering of Linear Gaussian Systems,
Abstract: The purpose of this work is mostly expository and aims to elucidate the
Jordan-Kinderlehrer-Otto (JKO) scheme for uncertainty propagation, and a
variant, the Laugesen-Mehta-Meyn-Raginsky (LMMR) scheme for filtering. We point
out that these variational schemes can be understood as proximal operators in
the space of density functions, realizing gradient flows. These schemes hold
the promise of leading to efficient ways for solving the Fokker-Planck equation
as well as the equations of non-linear filtering. Our aim in this paper is to
develop in detail the underlying ideas in the setting of linear stochastic
systems with Gaussian noise and recover known results. | [
1,
0,
1,
0,
0,
0
] |
Title: Investigating Simulation-Based Metrics for Characterizing Linear Iterative Reconstruction in Digital Breast Tomosynthesis,
Abstract: Simulation-based image quality metrics are adapted and investigated for
characterizing the parameter dependences of linear iterative image
reconstruction for DBT. Three metrics based on 2D DBT simulation are
investigated: (1) a root-mean-square-error (RMSE) between the test phantom and
reconstructed image, (2) a gradient RMSE where the comparison is made after
taking a spatial gradient of both image and phantom, and (3) a
region-of-interest (ROI) Hotelling observer (HO) for
signal-known-exactly/background-known-exactly (SKE/BKE) and
signal-known-exactly/background-known-statistically (SKE/BKS) detection tasks.
Two simulation studies are performed using the aforementioned metrics, varying
voxel aspect ratio and regularization strength for two types of Tikhonov
regularized least-squares optimization. The RMSE metrics are applied to a 2D
test phantom and the ROI-HO metric is applied to two tasks relevant to DBT:
large, low contrast lesion detection and small, high contrast
microcalcification detection. The RMSE metric trends are compared with visual
assessment of the reconstructed test phantom. The ROI-HO metric trends are
compared with 3D reconstructed images from ACR phantom data acquired with a
Hologic Selenia Dimensions DBT system. Sensitivity of image RMSE to mean pixel
value is found to limit its applicability to the assessment of DBT image
reconstruction. Image gradient RMSE is insensitive to mean pixel value and
appears to track better with subjective visualization of the reconstructed
bar-pattern phantom. The ROI-HO metric shows an increasing trend with
regularization strength for both forms of Tikhonov-regularized least-squares;
however, this metric saturates at intermediate regularization strength
indicating a point of diminishing returns for signal detection. Visualization
with reconstructed ACR phantom images appears to show a similar dependence with
regularization strength. | [
0,
1,
0,
0,
0,
0
] |
Title: Temporal Difference Learning with Neural Networks - Study of the Leakage Propagation Problem,
Abstract: Temporal-Difference learning (TD) [Sutton, 1988] with function approximation
can converge to solutions that are worse than those obtained by Monte-Carlo
regression, even in the simple case of on-policy evaluation. To increase our
understanding of the problem, we investigate the issue of approximation errors
in areas of sharp discontinuities of the value function being further
propagated by bootstrap updates. We show empirical evidence of this leakage
propagation, and show analytically that it must occur, in a simple Markov
chain, when function approximation errors are present. For reversible policies,
the result can be interpreted as the tension between two terms of the loss
function that TD minimises, as recently described by [Ollivier, 2018]. We show
that the upper bounds from [Tsitsiklis and Van Roy, 1997] hold, but they do not
imply that leakage propagation occurs and under what conditions. Finally, we
test whether the problem could be mitigated with a better state representation,
and whether it can be learned in an unsupervised manner, without rewards or
privileged information. | [
0,
0,
0,
1,
0,
0
] |
Title: First Order Theories of Some Lattices of Open Sets,
Abstract: We show that the first order theory of the lattice of open sets in some
natural topological spaces is $m$-equivalent to second order arithmetic. We
also show that for many natural computable metric spaces and computable domains
the first order theory of the lattice of effectively open sets is undecidable.
Moreover, for several important spaces (e.g., $\mathbb{R}^n$, $n\geq1$, and the
domain $P\omega$) this theory is $m$-equivalent to first order arithmetic. | [
1,
0,
1,
0,
0,
0
] |
Title: Efficient Privacy Preserving Viola-Jones Type Object Detection via Random Base Image Representation,
Abstract: A cloud server spent a lot of time, energy and money to train a Viola-Jones
type object detector with high accuracy. Clients can upload their photos to the
cloud server to find objects. However, the client does not want the leakage of
the content of his/her photos. In the meanwhile, the cloud server is also
reluctant to leak any parameters of the trained object detectors. 10 years ago,
Avidan & Butman introduced Blind Vision, which is a method for securely
evaluating a Viola-Jones type object detector. Blind Vision uses standard
cryptographic tools and is painfully slow to compute, taking a couple of hours
to scan a single image. The purpose of this work is to explore an efficient
method that can speed up the process. We propose the Random Base Image (RBI)
Representation. The original image is divided into random base images. Only the
base images are submitted randomly to the cloud server. Thus, the content of
the image can not be leaked. In the meanwhile, a random vector and the secure
Millionaire protocol are leveraged to protect the parameters of the trained
object detector. The RBI makes the integral-image enable again for the great
acceleration. The experimental results reveal that our method can retain the
detection accuracy of that of the plain vision algorithm and is significantly
faster than the traditional blind vision, with only a very low probability of
the information leakage theoretically. | [
1,
0,
0,
0,
0,
0
] |
Title: Lagrangian Statistics for Navier-Stokes Turbulence under Fourier-mode reduction: Fractal and Homogeneous Decimations,
Abstract: We study small-scale and high-frequency turbulent fluctuations in
three-dimensional flows under Fourier-mode reduction. The Navier-Stokes
equations are evolved on a restricted set of modes, obtained as a projection on
a fractal or homogeneous Fourier set. We find a strong sensitivity (reduction)
of the high-frequency variability of the Lagrangian velocity fluctuations on
the degree of mode decimation, similarly to what is already reported for
Eulerian statistics. This is quantified by a tendency towards a quasi-Gaussian
statistics, i.e., to a reduction of intermittency, at all scales and
frequencies. This can be attributed to a strong depletion of vortex filaments
and of the vortex stretching mechanism. Nevertheless, we found that Eulerian
and Lagrangian ensembles are still connected by a dimensional bridge-relation
which is independent of the degree of Fourier-mode decimation. | [
0,
1,
0,
0,
0,
0
] |
Title: Conjunctive management of surface and groundwater under severe drought: A case study in southern Iran,
Abstract: Hormozgan Province, located in the south of Iran, faces several challenges
regarding water resources management. The first one is the discharge of a
massive volume of water to the Persian Gulf because of the concentration of the
annual rainfalls in a short period of time and the narrow distance between the
headwater and the coast. The second one is the unbalanced development of
economic sectors in comparison with distribution of fresh water resources.
Finally, long-term drought is also common in this area. The construction of a
carry-over dam (Esteghlal Dam) and several conveyance pipelines and withdrawing
of the surface water and groundwater resources were considered as the solution
to deal with those challenges. During recent drought, severe overdraft and
inefficient use of recourses confirmed the fact that all done before are not
enough. During this period, there was a tendency to store water in reservoir in
order to meet the demand of the urban sector. Therefore, the agricultural
demand was the first victim of water allocation policy. It caused over
exploitation of the groundwater resources (to meet the agricultural demand) and
considerable losses (evaporation and leakage) from the reservoir. All of the
above-mentioned problems confirm the necessity of the development of a
conjunctive use policy. In this paper, all demand related to the Esteghlal Dam
and the Minab Aquifer (Bandarabbas City and agriculture in the Minab Plain)
were considered as the case study. The main objective was to find the best
applicable conjunctive policy which as well guarantees the conservation of the
Minab Aquifer. Alternative water allocation policies have been developed based
on the present capacities and the experience of local operating staff. | [
0,
1,
0,
0,
0,
0
] |
Title: Classification in biological networks with hypergraphlet kernels,
Abstract: Biological and cellular systems are often modeled as graphs in which vertices
represent objects of interest (genes, proteins, drugs) and edges represent
relational ties among these objects (binds-to, interacts-with, regulates). This
approach has been highly successful owing to the theory, methodology and
software that support analysis and learning on graphs. Graphs, however, often
suffer from information loss when modeling physical systems due to their
inability to accurately represent multiobject relationships. Hypergraphs, a
generalization of graphs, provide a framework to mitigate information loss and
unify disparate graph-based methodologies. In this paper, we present a
hypergraph-based approach for modeling physical systems and formulate vertex
classification, edge classification and link prediction problems on
(hyper)graphs as instances of vertex classification on (extended, dual)
hypergraphs in a semi-supervised setting. We introduce a novel kernel method on
vertex- and edge-labeled (colored) hypergraphs for analysis and learning. The
method is based on exact and inexact (via hypergraph edit distances)
enumeration of small simple hypergraphs, referred to as hypergraphlets, rooted
at a vertex of interest. We extensively evaluate this method and show its
potential use in a positive-unlabeled setting to estimate the number of missing
and false positive links in protein-protein interaction networks. | [
1,
0,
0,
1,
0,
0
] |
Title: Pair Correlation and Gap Distributions for Substitution Tilings and Generalized Ulam Sets in the Plane,
Abstract: We study empirical statistical and gap distributions of several important
tilings of the plane. In particular, we consider the slope distributions, the
angle distributions, pair correlation, squared-distance pair correlation, angle
gap distributions, and slope gap distributions for the Ammann Chair tiling, the
recently discovered fifteenth pentagonal tiling, and a few pertinent tilings
related to these famous examples. We also consider the spatial statistics of
generalized Ulam sets in two dimensions. Additionally, we carefully prove a
tight asymptotic formula for the time steps in which Ulam set points at certain
prescribed geometric positions in their plots in the plane formally enter the
recursively-defined sets.
The software we have developed to these generate numerical approximations to
the distributions for the tilings we consider here is written in Python under
the Sage environment and is released as open-source software which is available
freely on our websites. In addition to the small subset of tilings and other
point sets in the plane we study within the article, our program supports many
other tiling variants and is easily extended for researchers to explore related
tilings and iterative sets. | [
0,
0,
1,
0,
0,
0
] |
Title: Pay-with-a-Selfie, a human-centred digital payment system,
Abstract: Mobile payment systems are increasingly used to simplify the way in which
money transfers and transactions can be performed. We argue that, to achieve
their full potential as economic boosters in developing countries, mobile
payment systems need to rely on new metaphors suitable for the business models,
lifestyle, and technology availability conditions of the targeted communities.
The Pay-with-a-Group-Selfie (PGS) project, funded by the Melinda & Bill Gates
Foundation, has developed a micro-payment system that supports everyday small
transactions by extending the reach of, rather than substituting, existing
payment frameworks. PGS is based on a simple gesture and a readily
understandable metaphor. The gesture - taking a selfie - has become part of the
lifestyle of mobile phone users worldwide, including non-technology-savvy ones.
The metaphor likens computing two visual shares of the selfie to ripping a
banknote in two, a technique used for decades for delayed payment in cash-only
markets. PGS is designed to work with devices with limited computational power
and when connectivity is patchy or not always available. Thanks to visual
cryptography techniques PGS uses for computing the shares, the original selfie
can be recomposed simply by stacking the shares, preserving the analogy with
re-joining the two parts of the banknote. | [
1,
0,
0,
0,
0,
0
] |
Title: LCDet: Low-Complexity Fully-Convolutional Neural Networks for Object Detection in Embedded Systems,
Abstract: Deep convolutional Neural Networks (CNN) are the state-of-the-art performers
for object detection task. It is well known that object detection requires more
computation and memory than image classification. Thus the consolidation of a
CNN-based object detection for an embedded system is more challenging. In this
work, we propose LCDet, a fully-convolutional neural network for generic object
detection that aims to work in embedded systems. We design and develop an
end-to-end TensorFlow(TF)-based model. Additionally, we employ 8-bit
quantization on the learned weights. We use face detection as a use case. Our
TF-Slim based network can predict different faces of different shapes and sizes
in a single forward pass. Our experimental results show that the proposed
method achieves comparative accuracy comparing with state-of-the-art CNN-based
face detection methods, while reducing the model size by 3x and memory-BW by
~4x comparing with one of the best real-time CNN-based object detector such as
YOLO. TF 8-bit quantized model provides additional 4x memory reduction while
keeping the accuracy as good as the floating point model. The proposed model
thus becomes amenable for embedded implementations. | [
1,
0,
0,
0,
0,
0
] |
Title: Phase transitions of a 2D deformed-AKLT model,
Abstract: We study spin-2 deformed-AKLT models on the square lattice, specifically a
two-parameter family of $O(2)$-symmetric ground-state wavefunctions as defined
by Niggemann, Klümper, and Zittartz, who found previously that the phase
diagram consists of a Néel-ordered phase and a disordered phase which
contains the AKLT point. Using tensor-network methods, we not only confirm the
Néel phase but also find an XY phase with quasi-long-range order and a region
adjacent to it, within the AKLT phase, with very large correlation length, and
investigate the consequences of a perfectly factorizable point at the corner of
that phase. | [
0,
1,
0,
0,
0,
0
] |
Title: Statistical estimation of superhedging prices,
Abstract: We consider statistical estimation of superhedging prices using historical
stock returns in a frictionless market with d traded assets. We introduce a
simple plugin estimator based on empirical measures, show it is consistent but
lacks suitable robustness. This is addressed by our improved estimators which
use a larger set of martingale measures defined through a tradeoff between the
radius of Wasserstein balls around the empirical measure and the allowed norm
of martingale densities. We also study convergence rates, convergence of
superhedging strategies, and our study extends, in part, to the case of a
market with traded options and to a multiperiod setting. | [
0,
0,
0,
0,
0,
1
] |
Title: Ore's theorem on subfactor planar algebras,
Abstract: This paper proves that an irreducible subfactor planar algebra with a
distributive biprojection lattice admits a minimal 2-box projection generating
the identity biprojection. It is a generalization of a theorem of Ore on
intervals of finite groups, conjectured by the author since 2013. We deduce a
link between combinatorics and representations in finite groups theory, related
to an open problem of K.S. Brown in algebraic combinatorics. | [
0,
0,
1,
0,
0,
0
] |
Title: Machine Learning CICY Threefolds,
Abstract: The latest techniques from Neural Networks and Support Vector Machines (SVM)
are used to investigate geometric properties of Complete Intersection
Calabi-Yau (CICY) threefolds, a class of manifolds that facilitate string model
building. An advanced neural network classifier and SVM are employed to (1)
learn Hodge numbers and report a remarkable improvement over previous efforts,
(2) query for favourability, and (3) predict discrete symmetries, a highly
imbalanced problem to which both Synthetic Minority Oversampling Technique
(SMOTE) and permutations of the CICY matrix are used to decrease the class
imbalance and improve performance. In each case study, we employ a genetic
algorithm to optimise the hyperparameters of the neural network. We demonstrate
that our approach provides quick diagnostic tools capable of shortlisting
quasi-realistic string models based on compactification over smooth CICYs and
further supports the paradigm that classes of problems in algebraic geometry
can be machine learned. | [
0,
0,
0,
1,
0,
0
] |
Title: Weak lensing deflection of three-point correlation functions,
Abstract: Weak gravitational lensing alters the apparent separations between observed
sources, potentially affecting clustering statistics. We derive a general
expression for the lensing deflection which is valid for any three-point
statistic, and investigate its effect on the three-point clustering correlation
function. We find that deflection of the clustering correlation function is
greatest at around $z=2$. It is most prominent in regions where the correlation
function varies rapidly, in particular at the baryon acoustic oscillation scale
where it smooths out the peaks and troughs, reducing the peak-to-trough
difference by about 0.1 percent at $z=1$ and around 2.3 percent at $z=10$. The
modification due to lensing deflection is typically at the per cent level of
the expected errors in a Euclid-like survey and therefore undetectable. | [
0,
1,
0,
0,
0,
0
] |
Title: Solitonic dynamics and excitations of the nonlinear Schrodinger equation with third-order dispersion in non-Hermitian PT-symmetric potentials,
Abstract: Solitons are of the important significant in many fields of nonlinear science
such as nonlinear optics, Bose-Einstein condensates, plamas physics, biology,
fluid mechanics, and etc.. The stable solitons have been captured not only
theoretically and experimentally in both linear and nonlinear Schrodinger (NLS)
equations in the presence of non-Hermitian potentials since the concept of the
parity-time (PT)-symmetry was introduced in 1998. In this paper, we present
novel bright solitons of the NLS equation with third-order dispersion in some
complex PT-symmetric potentials (e.g., physically relevant PT-symmetric
Scarff-II-like and harmonic-Gaussian potentials). We find stable nonlinear
modes even if the respective linear PT-symmetric phases are broken. Moreover,
we also use the adiabatic changes of the control parameters to excite the
initial modes related to exact solitons to reach stable nonlinear modes. The
elastic interactions of two solitons are exhibited in the third-order NLS
equation with PT-symmetric potentials. Our results predict the dynamical
phenomena of soliton equations in the presence of third-order dispersion and
PT-symmetric potentials arising in nonlinear fiber optics and other physically
relevant fields. | [
0,
1,
1,
0,
0,
0
] |
Title: Supporting Ruled Polygons,
Abstract: We explore several problems related to ruled polygons. Given a ruling of a
polygon $P$, we consider the Reeb graph of $P$ induced by the ruling. We define
the Reeb complexity of $P$, which roughly equates to the minimum number of
points necessary to support $P$. We give asymptotically tight bounds on the
Reeb complexity that are also tight up to a small additive constant. When
restricted to the set of parallel rulings, we show that the Reeb complexity can
be computed in polynomial time. | [
1,
0,
0,
0,
0,
0
] |
Title: Deep Learning for Real-time Gravitational Wave Detection and Parameter Estimation: Results with Advanced LIGO Data,
Abstract: The recent Nobel-prize-winning detections of gravitational waves from merging
black holes and the subsequent detection of the collision of two neutron stars
in coincidence with electromagnetic observations have inaugurated a new era of
multimessenger astrophysics. To enhance the scope of this emergent field of
science, we pioneered the use of deep learning with convolutional neural
networks, that take time-series inputs, for rapid detection and
characterization of gravitational wave signals. This approach, Deep Filtering,
was initially demonstrated using simulated LIGO noise. In this article, we
present the extension of Deep Filtering using real data from LIGO, for both
detection and parameter estimation of gravitational waves from binary black
hole mergers using continuous data streams from multiple LIGO detectors. We
demonstrate for the first time that machine learning can detect and estimate
the true parameters of real events observed by LIGO. Our results show that Deep
Filtering achieves similar sensitivities and lower errors compared to
matched-filtering while being far more computationally efficient and more
resilient to glitches, allowing real-time processing of weak time-series
signals in non-stationary non-Gaussian noise with minimal resources, and also
enables the detection of new classes of gravitational wave sources that may go
unnoticed with existing detection algorithms. This unified framework for data
analysis is ideally suited to enable coincident detection campaigns of
gravitational waves and their multimessenger counterparts in real-time. | [
1,
1,
0,
0,
0,
0
] |
Title: Self-doping effect arising from electron correlations in multi-layer cuprates,
Abstract: A self-doping effect between outer and inner CuO$_2$ planes (OPs and IPs) in
multi-layer cuprate superconductors is studied. When one considers a
three-layer tight-binding model of the Hg-based three-layer cuprate derived
from the first principle calculations, the electron concentration gets to be
large in the OP compared to IP. This is inconsistent with the experimental fact
that more hole carriers tend to be introduced into the OP than IP.We
investigate a three-layer Hubbard model with the two-particle self-consistent
approach for multi-layer systems to incorporate electron correlations. We
observe that the double occupancy (antiferromagnetic instability) in the IP
decreases (increases) more than the OP, and also reveal that more electrons
tend to be introduced into the IP than OP to obtain the energy gain from the
on-site Hubbard interaction. These results are consistent with the experimental
facts, and this electron distribution between the OP and IP can be interpreted
as a self-doping effect arising from strong electron correlations. | [
0,
1,
0,
0,
0,
0
] |
Title: Increased Prediction Accuracy in the Game of Cricket using Machine Learning,
Abstract: Player selection is one the most important tasks for any sport and cricket is
no exception. The performance of the players depends on various factors such as
the opposition team, the venue, his current form etc. The team management, the
coach and the captain select 11 players for each match from a squad of 15 to 20
players. They analyze different characteristics and the statistics of the
players to select the best playing 11 for each match. Each batsman contributes
by scoring maximum runs possible and each bowler contributes by taking maximum
wickets and conceding minimum runs. This paper attempts to predict the
performance of players as how many runs will each batsman score and how many
wickets will each bowler take for both the teams. Both the problems are
targeted as classification problems where number of runs and number of wickets
are classified in different ranges. We used naïve bayes, random forest,
multiclass SVM and decision tree classifiers to generate the prediction models
for both the problems. Random Forest classifier was found to be the most
accurate for both the problems. | [
1,
0,
0,
0,
0,
0
] |
Title: Learning Probabilistic Programs Using Backpropagation,
Abstract: Probabilistic modeling enables combining domain knowledge with learning from
data, thereby supporting learning from fewer training instances than purely
data-driven methods. However, learning probabilistic models is difficult and
has not achieved the level of performance of methods such as deep neural
networks on many tasks. In this paper, we attempt to address this issue by
presenting a method for learning the parameters of a probabilistic program
using backpropagation. Our approach opens the possibility to building deep
probabilistic programming models that are trained in a similar way to neural
networks. | [
1,
0,
0,
1,
0,
0
] |
Title: Turbulent gas accretion between supermassive black holes and star-forming rings in the circumnuclear disk,
Abstract: While supermassive black holes are known to co-evolve with their host galaxy,
the precise nature and origin of this co-evolution is not clear. We here
explore the possible connection between star formation and black hole growth in
the circumnuclear disk (CND) to probe this connection in the vicinity close to
the black hole. We adopt here the circumnuclear disk model developed by
Kawakatu & Wada (2008) and Wutschik et al. (2013), and explore both the
dependence on the star formation recipe as well as the role of the
gravitational field, which can be dominated by the central black hole, the CND
itself or the host galaxy. A specific emphasis is put on the turbulence
regulated star formation model by Krumholz et al. (2005) to explore the impact
of a realistic star formation recipe. It is shown that this model helps to
introduce realistic fluctuations in the black hole and star formation rate,
without overestimating them. Consistent with previous works, we show that the
final black hole masses are rather insensitive to the masses of the initial
seeds, even for seed masses of up to 10^6 M_sol. In addition, we apply our
model to the formation of high-redshift quasars, as well as to the nearby
system NGC 6951, where a tentative comparison is made in spite of the presence
of a bar in the galaxy. We show that our model can reproduce the high black
hole masses of the high-redshift quasars within a sufficiently short time,
provided a high mass supply rate from the host galaxy. In addition, it
reproduces several of the properties observed in NGC 6951. With respect to the
latter system, our analysis suggests that supernova feedback may be important
to create the observed fluctuations in the star formation history as a result
of negative feedback effects. | [
0,
1,
0,
0,
0,
0
] |
Title: Grayscale Image Authentication using Neural Hashing,
Abstract: Many different approaches for neural network based hash functions have been
proposed. Statistical analysis must correlate security of them. This paper
proposes novel neural hashing approach for gray scale image authentication. The
suggested system is rapid, robust, useful and secure. Proposed hash function
generates hash values using neural network one-way property and non-linear
techniques. As a result security and performance analysis are performed and
satisfying results are achieved. These features are dominant reasons for
preferring against traditional ones. | [
1,
0,
0,
0,
0,
0
] |
Title: Binary Image Selection (BISON): Interpretable Evaluation of Visual Grounding,
Abstract: Providing systems the ability to relate linguistic and visual content is one
of the hallmarks of computer vision. Tasks such as image captioning and
retrieval were designed to test this ability, but come with complex evaluation
measures that gauge various other abilities and biases simultaneously. This
paper presents an alternative evaluation task for visual-grounding systems:
given a caption the system is asked to select the image that best matches the
caption from a pair of semantically similar images. The system's accuracy on
this Binary Image SelectiON (BISON) task is not only interpretable, but also
measures the ability to relate fine-grained text content in the caption to
visual content in the images. We gathered a BISON dataset that complements the
COCO Captions dataset and used this dataset in auxiliary evaluations of
captioning and caption-based retrieval systems. While captioning measures
suggest visual grounding systems outperform humans, BISON shows that these
systems are still far away from human performance. | [
1,
0,
0,
0,
0,
0
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.