Dataset Viewer
Auto-converted to Parquet Duplicate
id
large_stringlengths
9
16
title
large_stringlengths
1
381
abstract
large_stringlengths
6
5.67k
categories
large_stringlengths
5
125
update_date
timestamp[ms]date
2007-05-23 00:00:00
2026-01-24 00:00:00
authors
large_stringlengths
4
60.7k
classification_label
large_stringclasses
2 values
is_new_dataset
bool
2 classes
confidence_score
float64
0.5
0.72
classification_date
large_stringdate
2026-01-30 10:28:21
2026-01-30 10:28:21
model_version
large_stringclasses
1 value
embedding
large listlengths
embedding_model
large_stringclasses
0 values
1908.02905
Finite determination of accessibility and geometric structure of singular points for nonlinear systems
Exploiting tools from algebraic geometry, the problem of finiteness of determination of accessibility/strong accessibility is investigated for polynomial systems and also for analytic systems that are immersible into polynomial systems. The results are constructive, and algorithms are given to find the maximum depth of Lie brackets necessary for deciding accessibility/strong accessibility of the system at any point, called here accessibility/strong accessibility index of the system, and is known as the degree of non-holonomy in the literature. Alternatively, upper bounds on the accessibility/strong accessibility index are obtained, which can be computed easier. In each approach, the entire set of accessibility/strong accessibility singular points are obtained.
math.OC cs.CC math.AG
2019-08-09T00:00:00
Mohammad Amin Sarafrazi, \"Ulle Kotta and Zbigniew Bartosiewicz
no_new_dataset
false
0.71081
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02914
Mitigating Noisy Inputs for Question Answering
Natural language processing systems are often downstream of unreliable inputs: machine translation, optical character recognition, or speech recognition. For instance, virtual assistants can only answer your questions after understanding your speech. We investigate and mitigate the effects of noise from Automatic Speech Recognition systems on two factoid Question Answering (QA) tasks. Integrating confidences into the model and forced decoding of unknown words are empirically shown to improve the accuracy of downstream neural QA systems. We create and train models on a synthetic corpus of over 500,000 noisy sentences and evaluate on two human corpora from Quizbowl and Jeopardy! competitions.
cs.CL
2019-08-09T00:00:00
Denis Peskov, Joe Barrow, Pedro Rodriguez, Graham Neubig, Jordan Boyd-Graber
new_dataset
true
0.705217
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02916
Transverse Microwave Convective Instability at Transition Crossing
An analytical model of transverse convective instability of a bunch at transition crossing is presented for the microwave case, when the wake is sufficiently short compared with the bunch length. The space charge is assumed to be strong, as it typically is for the low and medium energy synchrotrons. A simple formula for the intensity threshold is obtained and its prediction is compared with available CERN PS data; without a single fitting parameter, a good agreement is demonstrated.
physics.acc-ph
2019-08-09T00:00:00
Alexey Burov
no_new_dataset
false
0.712107
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02924
Bayesian Feature Pyramid Networks for Automatic Multi-Label Segmentation of Chest X-rays and Assessment of Cardio-Thoratic Ratio
Cardiothoratic ratio (CTR) estimated from chest radiographs is a marker indicative of cardiomegaly, the presence of which is in the criteria for heart failure diagnosis. Existing methods for automatic assessment of CTR are driven by Deep Learning-based segmentation. However, these techniques produce only point estimates of CTR but clinical decision making typically assumes the uncertainty. In this paper, we propose a novel method for chest X-ray segmentation and CTR assessment in an automatic manner. In contrast to the previous art, we, for the first time, propose to estimate CTR with uncertainty bounds. Our method is based on Deep Convolutional Neural Network with Feature Pyramid Network (FPN) decoder. We propose two modifications of FPN: replace the batch normalization with instance normalization and inject the dropout which allows to obtain the Monte-Carlo estimates of the segmentation maps at test time. Finally, using the predicted segmentation mask samples, we estimate CTR with uncertainty. In our experiments we demonstrate that the proposed method generalizes well to three different test sets. Finally, we make the annotations produced by two radiologists for all our datasets publicly available.
eess.IV cs.CV
2019-08-09T00:00:00
Roman Solovyev and Iaroslav Melekhov and Timo Lesonen and Elias Vaattovaara and Osmo Tervonen and Aleksei Tiulpin
no_new_dataset
false
0.710075
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02938
Neural Document Expansion with User Feedback
This paper presents a neural document expansion approach (NeuDEF) that enriches document representations for neural ranking models. NeuDEF harvests expansion terms from queries which lead to clicks on the document and weights these expansion terms with learned attention. It is plugged into a standard neural ranker and learned end-to-end. Experiments on a commercial search log demonstrate that NeuDEF significantly improves the accuracy of state-of-the-art neural rankers and expansion methods on queries with different frequencies. Further studies show the contribution of click queries and learned expansion weights, as well as the influence of document popularity of NeuDEF's effectiveness.
cs.IR
2019-08-09T00:00:00
Yue Yin, Chenyan Xiong, Cheng Luo, Zhiyuan Liu
no_new_dataset
false
0.709262
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02940
Intrinsically-Typed Mechanized Semantics for Session Types
Session types have emerged as a powerful paradigm for structuring communication-based programs. They guarantee type soundness and session fidelity for concurrent programs with sophisticated communication protocols. As type soundness proofs for languages with session types are tedious and technically involved, it is rare to see mechanized soundness proofs for these systems. We present an executable intrinsically typed small-step semantics for a realistic functional session type calculus. The calculus includes linearity, recursion, and recursive sessions with subtyping. Asynchronous communication is modeled with an encoding. The semantics is implemented in Agda as an intrinsically typed, interruptible CEK machine. This implementation proves type preservation and a particular notion of progress by construction.
cs.PL
2019-08-09T00:00:00
Peter Thiemann
no_new_dataset
false
0.703506
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02941
VisJSClassificator -- Manual Visual Collaborative Classification Graph-based Tool
Analysts need to classify, search and correlate numerous images. Automatic classification tools improve the efficiency of such tasks. However, classified data is a prerequisite to develop these tools. Labelling tools are of great use in case of already known classes, but seemed limited for Open Set Classification. This paper presents a manual and collaborative classification tool, which uses graph representation.
cs.CR cs.HC
2019-08-09T00:00:00
Vincent Falconieri
no_new_dataset
false
0.709329
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02943
Towards Generating Stylized Image Captions via Adversarial Training
While most image captioning aims to generate objective descriptions of images, the last few years have seen work on generating visually grounded image captions which have a specific style (e.g., incorporating positive or negative sentiment). However, because the stylistic component is typically the last part of training, current models usually pay more attention to the style at the expense of accurate content description. In addition, there is a lack of variability in terms of the stylistic aspects. To address these issues, we propose an image captioning model called ATTEND-GAN which has two core components: first, an attention-based caption generator to strongly correlate different parts of an image with different parts of a caption; and second, an adversarial training mechanism to assist the caption generator to add diverse stylistic components to the generated captions. Because of these components, ATTEND-GAN can generate correlated captions as well as more human-like variability of stylistic patterns. Our system outperforms the state-of-the-art as well as a collection of our baseline models. A linguistic analysis of the generated captions demonstrates that captions generated using ATTEND-GAN have a wider range of stylistic adjectives and adjective-noun pairs.
cs.CV cs.CL
2019-08-09T00:00:00
Omid Mohamad Nezami, Mark Dras, Stephen Wan, Cecile Paris, Len Hamey
no_new_dataset
false
0.709568
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02946
Bootstrapping a stable computation token
We outline a token model for Truebit, a retrofitting, blockchain enhancement which enables secure, community-based computation. The model addresses the challenge of stable task pricing, as raised in the Truebit whitepaper, without appealing to external oracles, exchanges, or hierarchical nodes. The system's sustainable economics and fair market pricing derive from a mintable token format which leverages existing tokens for liquidity. Finally, we introduce a governance layer whose lifecycles culminates with permanent dissolution into utility tokens, thereby tending the network towards autonomous decentralization.
cs.CR cs.GT econ.TH
2019-08-09T00:00:00
Jason Teutsch, Sami M\"akel\"a, Surya Bakshi
no_new_dataset
false
0.706196
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02947
Graph Node Embeddings using Domain-Aware Biased Random Walks
The recent proliferation of publicly available graph-structured data has sparked an interest in machine learning algorithms for graph data. Since most traditional machine learning algorithms assume data to be tabular, embedding algorithms for mapping graph data to real-valued vector spaces has become an active area of research. Existing graph embedding approaches are based purely on structural information and ignore any semantic information from the underlying domain. In this paper, we demonstrate that semantic information can play a useful role in computing graph embeddings. Specifically, we present a framework for devising embedding strategies aware of domain-specific interpretations of graph nodes and edges, and use knowledge of downstream machine learning tasks to identify relevant graph substructures. Using two real-life domains, we show that our framework yields embeddings that are simple to implement and yet achieve equal or greater accuracy in machine learning tasks compared to domain independent approaches.
cs.LG cs.SI stat.ML
2019-08-09T00:00:00
Sourav Mukherjee, Tim Oates, Ryan Wright
no_new_dataset
false
0.710443
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02950
Semi Supervised Phrase Localization in a Bidirectional Caption-Image Retrieval Framework
We introduce a novel deep neural network architecture that links visual regions to corresponding textual segments including phrases and words. To accomplish this task, our architecture makes use of the rich semantic information available in a joint embedding space of multi-modal data. From this joint embedding space, we extract the associative localization maps that develop naturally, without explicitly providing supervision during training for the localization task. The joint space is learned using a bidirectional ranking objective that is optimized using a $N$-Pair loss formulation. This training mechanism demonstrates the idea that localization information is learned inherently while optimizing a Bidirectional Retrieval objective. The model's retrieval and localization performance is evaluated on MSCOCO and Flickr30K Entities datasets. This architecture outperforms the state of the art results in the semi-supervised phrase localization setting.
cs.CV eess.IV
2019-08-09T00:00:00
Deepan Das, Noor Mohammed Ghouse, Shashank Verma, Yin Li
no_new_dataset
false
0.710336
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02964
Contributed Discussion of "A Bayesian Conjugate Gradient Method"
We would like to congratulate the authors of "A Bayesian Conjugate Gradient Method" on their insightful paper, and welcome this publication which we firmly believe will become a fundamental contribution to the growing field of probabilistic numerical methods and in particular the sub-field of Bayesian numerical methods. In this short piece, which will be published as a comment alongside the main paper, we first initiate a discussion on the choice of priors for solving linear systems, then propose an extension of the Bayesian conjugate gradient (BayesCG) algorithm for solving several related linear systems simultaneously.
stat.CO cs.NA math.NA stat.ML
2019-08-09T00:00:00
Francois-Xavier Briol, Francisco A. Diaz De la O, Peter O. Hristov
no_new_dataset
false
0.710746
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02968
Subgroups of an abelian group, related ideals of the group ring, and quotients by those ideals
Let $RG$ be the group ring of an abelian group $G$ over a commutative ring $R$ with identity. An injection $\Phi$ from the subgroups of $G$ to the non-unit ideals of $RG$ is well-known. It is defined by $\Phi(N)=I(R,N)RG$ where $I(R,N)$ is the augmentation ideal of $RN$, and each ideal $\Phi(N)$ has a property : $RG/\Phi(N)$ is $R$-algebra isomorphic to $R(G/N)$. Let $T$ be the set of non-unit ideals of $RG$. While the image of $\Phi$ is rather a small subset of $T$, we give conditions on $R$ and $G$ for the image of $\Phi$ to have some distribution in $T$. In the last section, we give criteria for choosing an element $x$ of $RG$ satisfying $RG/xRG$ is $R$-algebra isomorphic to $R(G/N)$ for a subgroup $N$ of $G$.
math.AC cs.IT math.IT
2019-08-09T00:00:00
Hideyasu Kawai
no_new_dataset
false
0.7038
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02974
Incremental Reinforcement Learning --- a New Continuous Reinforcement Learning Frame Based on Stochastic Differential Equation methods
Continuous reinforcement learning such as DDPG and A3C are widely used in robot control and autonomous driving. However, both methods have theoretical weaknesses. While DDPG cannot control noises in the control process, A3C does not satisfy the continuity conditions under the Gaussian policy. To address these concerns, we propose a new continues reinforcement learning method based on stochastic differential equations and we call it Incremental Reinforcement Learning (IRL). This method not only guarantees the continuity of actions within any time interval, but controls the variance of actions in the training process. In addition, our method does not assume Markov control in agents' action control and allows agents to predict scene changes for action selection. With our method, agents no longer passively adapt to the environment. Instead, they positively interact with the environment for maximum rewards.
cs.LG stat.ML
2019-08-09T00:00:00
Tianhao Chen, Limei Cheng, Yang Liu, Wenchuan Jia and Shugen Ma
no_new_dataset
false
0.711302
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02993
A phase field approach for damage propagation in periodic microstructured materials
In the present work, the evolution of damage in periodic composite materials is investigated through a novel finite element-based multiscale computational approach. The methodology is developed by means of the original combination of homogenization methods with the phase field approach of fracture. This last is applied at the macroscale level on the equivalent homogeneous continuum, whose constitutive properties are obtained in closed form via a two-scale asymptotic homogenization scheme. The formulation allows considering different assumptions on the evolution of damage at the microscale (e.g., damage in the matrix and not in the inclusion/fiber), as well as the role played by the microstructural topology. Numerical results show that the proposed formulation leads to an apparent tensile strength and a post-peak branch of unnotched and notched specimens dependent not only on the internal length scale of the phase field approach, as for homogeneous materials, but also on the inclusion volumetric content and its shape. Down-scaling relations allow the full reconstruction of the microscopic fields at any point of the macroscopic model, as a simple post-processing operation.
math.NA cond-mat.mtrl-sci cs.NA
2019-08-09T00:00:00
Francesca Fantoni, Andrea Bacigalupo, Marco Paggi, Jos\`e Reinoso
no_new_dataset
false
0.710302
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.02999
Learning Vision-based Flight in Drone Swarms by Imitation
Decentralized drone swarms deployed today either rely on sharing of positions among agents or detecting swarm members with the help of visual markers. This work proposes an entirely visual approach to coordinate markerless drone swarms based on imitation learning. Each agent is controlled by a small and efficient convolutional neural network that takes raw omnidirectional images as inputs and predicts 3D velocity commands that match those computed by a flocking algorithm. We start training in simulation and propose a simple yet effective unsupervised domain adaptation approach to transfer the learned controller to the real world. We further train the controller with data collected in our motion capture hall. We show that the convolutional neural network trained on the visual inputs of the drone can learn not only robust inter-agent collision avoidance but also cohesion of the swarm in a sample-efficient manner. The neural controller effectively learns to localize other agents in the visual input, which we show by visualizing the regions with the most influence on the motion of an agent. We remove the dependence on sharing positions among swarm members by taking only local visual information into account for control. Our work can therefore be seen as the first step towards a fully decentralized, vision-based swarm without the need for communication or visual markers.
cs.RO cs.CV cs.LG cs.MA
2019-08-09T00:00:00
Fabian Schilling and Julien Lecoeur and Fabrizio Schiano and Dario Floreano
no_new_dataset
false
0.70989
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03000
Feature selection of neural networks is skewed towards the less abstract cue
Artificial neural networks (ANNs) have become an important tool for image classification with many applications in research and industry. However, it remains largely unknown how relevant image features are selected and how data properties affect this process. In particular, we are interested whether the abstraction level of image cues correlating with class membership influences feature selection. We perform experiments with binary images that contain a combination of cues, representing two different levels of abstractions: one is a pattern drawn from a random distribution where class membership correlates with the statistics of the pattern, the other a combination of symbol-like entities, where the symbolic code correlates with class membership. When the network is trained with data in which both cues are equally significant, we observe that the cues at the lower abstraction level, i.e., the pattern, is learned, while the symbolic information is largely ignored, even in networks with many layers. Symbol-like entities are only learned if the importance of low-level cues is reduced compared to the high-level ones. These findings raise important questions about the relevance of features that are learned by deep ANNs and how learning could be shifted towards symbolic features.
cs.CV cs.LG
2019-08-09T00:00:00
Marcell Wolnitza and Babette Dellen
no_new_dataset
false
0.711551
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03003
Cold Isostatic Pressing to Improve the Mechanical Performance of Additively Manufactured Metallic Components
Additive manufacturing is becoming a technique with great prospects for the production of components with new designs or shapes that are difficult to obtain by conventional manufacturing methods. One of the most promising techniques for printing metallic components is binder jetting, due to its time efficiency and its ability to generate complex parts. In this process, a liquid binding agent is selectively deposited to adhere the powder particles of the printing material. Once the metallic piece is generated, it undergoes a subsequent process of curing and sintering to increase its density (hot isostatic pressing). In this work, we propose subjecting the manufactured component to an additional post-processing treatment involving the application of a high hydrostatic pressure (5000 bar) at room temperature. This post-processing technique, so-called cold isostatic pressing (CIP), is shown to increase the yield load and the maximum carrying capacity of an additively manufactured AISI 316L stainless steel. The mechanical properties, with and without CIP processing, are estimated by means of the small punch test, a suitable experimental technique to assess the mechanical response of small samples. In addition, we investigate the porosity and microstructure of the material according to the orientations of layer deposition during the manufacturing process. Our observations reveal a homogeneous distribution independent of these orientations, evidencing thus an isotropic behaviour of the material.
physics.app-ph cond-mat.mtrl-sci
2019-08-09T00:00:00
Isidoro Iv\'an Cuesta, Emilio Mart\'inez-Pa\~neda, Andr\'es D\'iaz, Jes\'us Manuel Alegre
no_new_dataset
false
0.71161
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03043
A Test Suite and Manual Evaluation of Document-Level NMT at WMT19
As the quality of machine translation rises and neural machine translation (NMT) is moving from sentence to document level translations, it is becoming increasingly difficult to evaluate the output of translation systems. We provide a test suite for WMT19 aimed at assessing discourse phenomena of MT systems participating in the News Translation Task. We have manually checked the outputs and identified types of translation errors that are relevant to document-level translation.
cs.CL
2019-08-09T00:00:00
Kate\v{r}ina Rysov\'a, Magdal\'ena Rysov\'a, Tom\'a\v{s} Musil, Lucie Pol\'akov\'a, Ond\v{r}ej Bojar
no_new_dataset
false
0.703476
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03047
Editing Text in the Wild
In this paper, we are interested in editing text in natural images, which aims to replace or modify a word in the source image with another one while maintaining its realistic look. This task is challenging, as the styles of both background and text need to be preserved so that the edited image is visually indistinguishable from the source image. Specifically, we propose an end-to-end trainable style retention network (SRNet) that consists of three modules: text conversion module, background inpainting module and fusion module. The text conversion module changes the text content of the source image into the target text while keeping the original text style. The background inpainting module erases the original text, and fills the text region with appropriate texture. The fusion module combines the information from the two former modules, and generates the edited text images. To our knowledge, this work is the first attempt to edit text in natural images at the word level. Both visual effects and quantitative results on synthetic and real-world dataset (ICDAR 2013) fully confirm the importance and necessity of modular decomposition. We also conduct extensive experiments to validate the usefulness of our method in various real-world applications such as text image synthesis, augmented reality (AR) translation, information hiding, etc.
cs.CV
2019-08-09T00:00:00
Liang Wu, Chengquan Zhang, Jiaming Liu, Junyu Han, Jingtuo Liu, Errui Ding, Xiang Bai
no_new_dataset
false
0.712594
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03054
Pitch-Synchronous Single Frequency Filtering Spectrogram for Speech Emotion Recognition
Convolutional neural networks (CNN) are widely used for speech emotion recognition (SER). In such cases, the short time fourier transform (STFT) spectrogram is the most popular choice for representing speech, which is fed as input to the CNN. However, the uncertainty principles of the short-time Fourier transform prevent it from capturing time and frequency resolutions simultaneously. On the other hand, the recently proposed single frequency filtering (SFF) spectrogram promises to be a better alternative because it captures both time and frequency resolutions simultaneously. In this work, we explore the SFF spectrogram as an alternative representation of speech for SER. We have modified the SFF spectrogram by taking the average of the amplitudes of all the samples between two successive glottal closure instants (GCI) locations. The duration between two successive GCI locations gives the pitch, motivating us to name the modified SFF spectrogram as pitch-synchronous SFF spectrogram. The GCI locations were detected using zero frequency filtering approach. The proposed pitch-synchronous SFF spectrogram produced accuracy values of 63.95% (unweighted) and 70.4% (weighted) on the IEMOCAP dataset. These correspond to an improvement of +7.35% (unweighted) and +4.3% (weighted) over state-of-the-art result on the STFT sepctrogram using CNN. Specially, the proposed method recognized 22.7% of the happy emotion samples correctly, whereas this number was 0% for state-of-the-art results. These results also promise a much wider use of the proposed pitch-synchronous SFF spectrogram for other speech-based applications.
eess.AS cs.LG cs.SD stat.ML
2019-08-09T00:00:00
Shruti Gupta, Md. Shah Fahad, Akshay Deepak
no_new_dataset
false
0.711859
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03055
What goes around comes around: Cycle-Consistency-based Short-Term Motion Prediction for Anomaly Detection using Generative Adversarial Networks
Anomaly detection plays in many fields of research, along with the strongly related task of outlier detection, a very important role. Especially within the context of the automated analysis of video material recorded by surveillance cameras, abnormal situations can be of very different nature. For this purpose this work investigates Generative-Adversarial-Network-based methods (GAN) for anomaly detection related to surveillance applications. The focus is on the usage of static camera setups, since this kind of camera is one of the most often used and belongs to the lower price segment. In order to address this task, multiple subtasks are evaluated, including the influence of existing optical flow methods for the incorporation of short-term temporal information, different forms of network setups and losses for GANs, and the use of morphological operations for further performance improvement. With these extension we achieved up to 2.4% better results. Furthermore, the final method reduced the anomaly detection error for GAN-based methods by about 42.8%.
cs.CV
2019-08-09T00:00:00
Thomas Golda, Nils Murzyn, Chengchao Qu, Kristian Kroschel
no_new_dataset
false
0.712099
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03060
Oscillatory evolution of collective behavior in evolutionary games played with reinforcement learning
Large-scale cooperation underpins the evolution of ecosystems and the human society, and the collective behaviors by self-organization of multi-agent systems are the key for understanding. As artificial intelligence (AI) prevails in almost all branches of science, it would be of great interest to see what new insights of collective behavior could be obtained from a multi-agent AI system. Here, we introduce a typical reinforcement learning (RL) algorithm -- Q learning into evolutionary game dynamics, where agents pursue optimal action on the basis of the introspectiveness rather than the birth-death or imitation processes in the traditional evolutionary game (EG). We investigate the cooperation prevalence numerically for a general $2\times 2$ game setting. We find that the cooperation prevalence in the multi-agent AI is amazing of an equal level as in the traditional EG in most cases. However, in the snowdrift games with RL we also reveal that explosive cooperation appears in the form of periodic oscillation, and we study the impact of the payoff structure on its emergence. Finally, we show that the periodic oscillation can also be observed in some other EGs with the RL algorithm, such as the rock-paper-scissors game. Our results offer a reference point to understand emergence of cooperation and oscillatory behaviors in nature and society from AI's perspective.
physics.soc-ph nlin.AO
2019-08-09T00:00:00
Si-Ping Zhang, Ji-Qiang Zhang, Li Chen, Xu-Dong Liu
no_new_dataset
false
0.709581
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03061
Nested Bloch waves in elastic structures with configurational forces
Small axial and flexural oscillations are analyzed for a periodic and infinite structure, constrained by sliding sleeves and composed of elastic beams. A nested Bloch-Floquet technique is introduced to treat the non-linear coupling between longitudinal and transverse displacements induced by the configurational forces generated at the sliding sleeve ends. The action of configurational forces is shown to play an important role from two perspectives. First, the band gap structure for purely longitudinal vibration is broken so that axial propagation may occur at frequencies that are forbidden in the absence of a transverse oscillation and, second, a flexural oscillation may induce axial resonance, a situation in which the longitudinal vibrations tend to become unbounded. The presented results disclose the possibility of exploiting configurational forces in the design of mechanical devices towards longitudinal actuation from flexural vibrations of small amplitude at given frequency.
physics.class-ph cond-mat.mtrl-sci
2019-08-09T00:00:00
Francesco Dal Corso, Domenico Tallarico, Natalia V. Movchan, Alexander B. Movchan, Davide Bigoni
no_new_dataset
false
0.710357
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03067
Key Fact as Pivot: A Two-Stage Model for Low Resource Table-to-Text Generation
Table-to-text generation aims to translate the structured data into the unstructured text. Most existing methods adopt the encoder-decoder framework to learn the transformation, which requires large-scale training samples. However, the lack of large parallel data is a major practical problem for many domains. In this work, we consider the scenario of low resource table-to-text generation, where only limited parallel data is available. We propose a novel model to separate the generation into two stages: key fact prediction and surface realization. It first predicts the key facts from the tables, and then generates the text with the key facts. The training of key fact prediction needs much fewer annotated data, while surface realization can be trained with pseudo parallel corpus. We evaluate our model on a biography generation dataset. Our model can achieve $27.34$ BLEU score with only $1,000$ parallel data, while the baseline model only obtain the performance of $9.71$ BLEU score.
cs.CL
2019-08-09T00:00:00
Shuming Ma, Pengcheng Yang, Tianyu Liu, Peng Li, Jie Zhou, Xu Sun
no_new_dataset
false
0.711907
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03070
Optimal p-ary cyclic codes with two zeros
As a subclass of linear codes, cyclic codes have efficient encoding and decoding algorithms, so they are widely used in many areas such as consumer electronics, data storage systems and communication systems. In this paper, we give a general construction of optimal p-ary cyclic codes which leads to three explicit constructions. In addition, another class of p-ary optimal cyclic codes are presented.
cs.IT math.IT
2019-08-09T00:00:00
Yan Liu, Xiwang Cao
no_new_dataset
false
0.709596
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03081
Comparison of Bounds for Optimal PMU Placement for State Estimation in Distribution Grids
The lack of measurements in distribution grids poses a severe challenge for their monitoring: since there may not be enough sensors to achieve numerical observability, load forecasts (pseudo-measurements) are typically used, and thus an accurate state estimation is not guaranteed. However, an estimation is required to control distribution grids given the increasing amount of distributed generation. Therefore, we consider the problem of optimal sensor placement to improve the state estimation accuracy in large-scale, 3-phase coupled, unbalanced distribution grids. This is a combinatorial optimization problem whose optimal solution is unpractical to obtain for large networks. We explore the properties of different metrics in the context of optimal experimental design, like convexity and modularity, to propose and compare several tight lower and upper bounds on the performance of the optimal solution. Moreover, we show how to use these bounds to choose near-optimal solutions. We test the method on two IEEE benchmark test feeders, the 123-bus and the 8500-node feeders, to show the effectiveness of the approach.
eess.SY cs.SY
2019-08-09T00:00:00
Miguel Picallo, Adolfo Anta, Bart De Schutter
no_new_dataset
false
0.710878
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03091
Preferences for efficiency, rather than preferences for morality, drive cooperation in the one-shot Stag-Hunt Game
Recent work highlights that cooperation in the one-shot Prisoner's dilemma (PD) is primarily driven by moral preferences for doing the right thing, rather than social preferences for equity or efficiency. By contrast, little is known on what motivates cooperation in the Stag-Hunt Game (SHG). Cooperation in the SHG fundamentally differs from cooperation in the PD in that it is not costly, but risky: players have no temptation to deviate from the cooperative outcome, but cooperation only pays off if the other player cooperates. Here, we provide data from a large (N=436), pre-registered, experiment. Contrary to what has been observed for the PD, we find that SHG cooperation is primarily driven by preferences for efficiency, rather than preferences for doing the right thing.
physics.soc-ph cs.GT q-bio.PE
2019-08-09T00:00:00
Valerio Capraro, Ismael Rodriguez-Lara, Maria J. Ruiz-Martos
no_new_dataset
false
0.675931
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03092
Motivating Workers in Federated Learning: A Stackelberg Game Perspective
Due to the large size of the training data, distributed learning approaches such as federated learning have gained attention recently. However, the convergence rate of distributed learning suffers from heterogeneous worker performance. In this paper, we consider an incentive mechanism for workers to mitigate the delays in completion of each batch. We analytically obtained equilibrium solution of a Stackelberg game. Our numerical results indicate that with a limited budget, the model owner should judiciously decide on the number of workers due to trade off between the diversity provided by the number of workers and the latency of completing the training.
cs.DC
2019-08-09T00:00:00
Yunus Sarikaya and Ozgur Ercetin
no_new_dataset
false
0.710425
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03141
CARL: Aggregated Search with Context-Aware Module Embedding Learning
Aggregated search aims to construct search result pages (SERPs) from blue-links and heterogeneous modules (such as news, images, and videos). Existing studies have largely ignored the correlations between blue-links and heterogeneous modules when selecting the heterogeneous modules to be presented. We observe that the top ranked blue-links, which we refer to as the \emph{context}, can provide important information about query intent and helps identify the relevant heterogeneous modules. For example, informative terms like "streamed" and "recorded" in the context imply that a video module may better satisfy the query. To model and utilize the context information for aggregated search, we propose a model with context attention and representation learning (CARL). Our model applies a recurrent neural network with an attention mechanism to encode the context, and incorporates the encoded context information into module embeddings. The context-aware module embeddings together with the ranking policy are jointly optimized under the Markov decision process (MDP) formulation. To achieve a more effective joint learning, we further propose an optimization function with self-supervision loss to provide auxiliary supervision signals. Experimental results based on two public datasets demonstrate the superiority of CARL over multiple baseline approaches, and confirm the effectiveness of the proposed optimization function in boosting the joint learning process.
cs.IR
2019-08-09T00:00:00
Xinting Huang, Jianzhong Qi, Yu Sun, Rui Zhang, Hai-Tao Zheng
no_new_dataset
false
0.70934
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03143
Viterbi Extraction tutorial with Hidden Markov Toolkit
An algorithm used to extract HMM parameters is revisited. Most parts of the extraction process are taken from implemented Hidden Markov Toolkit (HTK) program under name HInit. The algorithm itself shows a few variations compared to another domain of implementations. The HMM model is introduced briefly based on the theory of Discrete Time Markov Chain. We schematically outline the Viterbi method implemented in HTK. Iterative definition of the method which is ready to be implemented in computer programs is reviewed. We also illustrate the method calculation precisely using manual calculation and extensive graphical illustration. The distribution of observation probability used is simply independent Gaussians r.v.s. The purpose of the content is not to justify the performance or accuracy of the method applied in a specific area. This writing merely to describe how the algorithm is performed. The whole content should enlighten the audience the insight of the Viterbi Extraction method used by HTK.
cs.SD cs.AI eess.AS
2019-08-09T00:00:00
Zulkarnaen Hatala, Victor Puturuhu
no_new_dataset
false
0.708788
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03146
Your Stance is Exposed! Analysing Possible Factors for Stance Detection on Social Media
To what extent user's stance towards a given topic could be inferred? Most of the studies on stance detection have focused on analysing user's posts on a given topic to predict the stance. However, the stance in social media can be inferred from a mixture of signals that might reflect user's beliefs including posts and online interactions. This paper examines various online features of users to detect their stance towards different topics. We compare multiple set of features, including on-topic content, network interactions, user's preferences, and online network connections. Our objective is to understand the online signals that can reveal the users' stance. Experimentation is applied on tweets dataset from the SemEval stance detection task, which covers five topics. Results show that stance of a user can be detected with multiple signals of user's online activity, including their posts on the topic, the network they interact with or follow, the websites they visit, and the content they like. The performance of the stance modelling using different network features are comparable with the state-of-the-art reported model that used textual content only. In addition, combining network and content features leads to the highest reported performance to date on the SemEval dataset with F-measure of 72.49%. We further present an extensive analysis to show how these different set of features can reveal stance. Our findings have distinct privacy implications, where they highlight that stance is strongly embedded in user's online social network that, in principle, individuals can be profiled from their interactions and connections even when they do not post about the topic.
cs.SI cs.CL
2019-08-09T00:00:00
Abeer Aldayel and Walid Magdy
no_new_dataset
false
0.71096
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03154
GAPS: Searching for Dark Matter using Antinuclei in Cosmic Rays
The General Antiparticle Spectrometer (GAPS) will carry out a sensitive dark matter search by measuring low-energy ($\mathrm{E} < 0.25 \mathrm{GeV/nucleon}$) cosmic ray antinuclei. The primary targets are low-energy antideuterons produced in the annihilation or decay of dark matter. At these energies antideuterons from secondary/tertiary interactions are expected to have very low fluxes, significantly below those predicted by well-motivated, beyond the standard model theories. GAPS will also conduct low-energy antiproton and antihelium searches. Combined, these observations will provide a powerful search for dark matter and provide the best observations to date on primordial black hole evaporation on Galactic length scales. The GAPS instrument detects antinuclei using the novel exotic atom technique. It consists of a central tracker with a surrounding time-of-flight (TOF) system. The tracker is a one cubic meter volume containing 10 cm-diameter lithium-drifted silicon (Si(Li)) detectors. The TOF is a plastic scintillator system that will both trigger the Si(Li) tracker and enable better reconstruction of particle tracks. After coming to rest in the tracker, antinuclei will form an excited exotic atom. This will then de-excite via characteristic X-ray transitions before producing a pion/proton star when the antiparticle annihilates with the nucleus. This unique event topology will give GAPS the nearly background-free detection capability required for a rare-event search. Here we present the scientific motivation for the GAPS experiment, its design and its current status as it prepares for flight in the austral summer of 2021-22.
astro-ph.IM physics.ins-det
2019-08-09T00:00:00
R. Bird, T. Aramaki, M. Boezio, S.E. Boggs, V. Bonvicini, D. Campana, W.W. Craig, E. Everson, L. Fabris, H. Fuke, F. Gahbauer, I. Garcia, C. Gerrity, C.J. Hailey, T. Hayashi, C. Kato, A. Kawachi, M. Kondo, M. Kozai, A. Lowell, M. Manghisoni, N. Marcelli, M. Martucci, S.I. Mognet, K. Munakata, R. Munini, S. Okazaki, J. Olson, R.A. Ong, G. Osteria, K. Perez, S. Quinn, V. Re, E. Riceputi, F. Rogers, J.L. Ryan, N. Saffold, V. Scotti, Y. Shimizu, R. Sparvoli, A. Stoessl, S. Takeuchi, E. Vannuccini, P. von Doetinchem, T. Wada, M. Xiao, A. Yoshida, T. Yoshida, G. Zampa, J. Zweerink
no_new_dataset
false
0.703296
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03162
Photodissociation as a probe of the H$_3^+$ avoided crossing seam
Experiments are conducted to investigate the role of the avoided crossing seam in the photodissociation of H$_3^+$. Three-dimensional imaging of dissociation products is used to determine the kinetic energy release and branching ratio among the fragmentation channels. Vibrational distributions are measured by dissociative charge transfer of H$_2^+$ products. It is found that the photodissociation of hot H$_3^+$ in the near ultraviolet produces cold H$_2^+$, but hot H$_2$. Modelling the wavepacket dynamics along the repulsive potential energy surface accounts for the repopulation of the ground potential energy surface. The role of the avoided crossing seam is emphasized and its importance for the astrophysically relevant charge transfer reactions is underlined.
physics.chem-ph
2019-08-09T00:00:00
X. Urbain, A. Dochain, R. Marion, T. Launoy, J. Loreau
no_new_dataset
false
0.709919
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03166
Disturbance Estimation and Rejection for High-Precision Multirotor Position Control
Many multirotor Unmanned Aerial Systems applications have a critical need for precise position control in environments with strong dynamic external disturbances such as wind gusts or ground and wall effects. Moreover, to maximize flight time, small multirotor platforms have to operate within strict constraints on payload and thus computational performance. In this paper, we present the design and experimental comparison of Model Predictive and PID multirotor position controllers augmented with a disturbance estimator to reject strong wind gusts up to 12 m/s and ground effect. For disturbance estimation, we compare Extended and Unscented Kalman filtering. In extensive in- and outdoor flight tests, we evaluate the suitability of the developed control and estimation algorithms to run on a computationally constrained platform. This allows to draw a conclusion on whether potential performance improvements justify the increased computational complexity of MPC for multirotor position control and UKF for disturbance estimation.
cs.RO
2019-08-09T00:00:00
Daniel Hentzen, Thomas Stastny, Roland Siegwart, Roland Brockers
no_new_dataset
false
0.708541
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03174
Rethinking Secure Precoding via Interference Exploitation: A Smart Eavesdropper Perspective
Based on the concept of constructive interference (CI), multiuser interference (MUI) has recently been shown to be beneficial for communication secrecy. A few CI-based secure precoding algorithms have been proposed that use both the channel state information (CSI) and knowledge of the instantaneous transmit symbols. In this paper, we examine the CI-based secure precoding problem with a focus on smart eavesdroppers that exploit statistical information gleaned from the precoded data for symbol detection. Moreover, the impact of correlation between the main and eavesdropper channels is taken into account. We first modify an existing CI-based preocding scheme to better utilize the destructive impact of the interference. Then, we point out the drawback of both the existing and the new modified CI-based precoders when faced with a smart eavesdropper. To address this deficiency, we provide a general principle for precoder design and then give two specific design examples. Finally, the scenario where the eavesdropper's CSI is unavailable is studied. Numerical results show that although our modified CI-based precoder can achieve a better energy-secrecy trade-off than the existing approach, both have a limited secrecy benefit. On the contrary, the precoders developed using the new CI-design principle can achieve a much improved trade-off and significantly degrade the eavesdropper's performance.
cs.IT math.IT
2019-08-09T00:00:00
Qian Xu, Pinyi Ren, A. Lee Swindlehurst
no_new_dataset
false
0.710639
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03176
Defending Against Adversarial Iris Examples Using Wavelet Decomposition
Deep neural networks have presented impressive performance in biometric applications. However, their performance is highly at risk when facing carefully crafted input samples known as adversarial examples. In this paper, we present three defense strategies to detect adversarial iris examples. These defense strategies are based on wavelet domain denoising of the input examples by investigating each wavelet sub-band and removing the sub-bands that are most affected by the adversary. The first proposed defense strategy reconstructs multiple denoised versions of the input example through manipulating the mid- and high-frequency components of the wavelet domain representation of the input example and makes a decision upon the classification result of the majority of the denoised examples. The second and third proposed defense strategies aim to denoise each wavelet domain sub-band and determine the sub-bands that are most likely affected by the adversary using the reconstruction error computed for each sub-band. We test the performance of the proposed defense strategies against several attack scenarios and compare the results with five state of the art defense strategies.
cs.CV cs.LG eess.IV stat.ML
2019-08-09T00:00:00
Sobhan Soleymani, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi
no_new_dataset
false
0.710574
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03179
Privatization-Safe Transactional Memories (Extended Version)
Transactional memory (TM) facilitates the development of concurrent applications by letting the programmer designate certain code blocks as atomic. Programmers using a TM often would like to access the same data both inside and outside transactions, and would prefer their programs to have a strongly atomic semantics, which allows transactions to be viewed as executing atomically with respect to non-transactional accesses. Since guaranteeing such semantics for arbitrary programs is prohibitively expensive, researchers have suggested guaranteeing it only for certain data-race free (DRF) programs, particularly those that follow the privatization idiom: from some point on, threads agree that a given object can be accessed non-transactionally. In this paper we show that a variant of Transactional DRF (TDRF) by Dalessandro et al. is appropriate for a class of privatization-safe TMs, which allow using privatization idioms. We prove that, if such a TM satisfies a condition we call privatization-safe opacity and a program using the TM is TDRF under strongly atomic semantics, then the program indeed has such semantics. We also present a method for proving privatization-safe opacity that reduces proving this generalization to proving the usual opacity, and apply the method to a TM based on two-phase locking and a privatization-safe version of TL2. Finally, we establish the inherent cost of privatization-safety: we prove that a TM cannot be progressive and have invisible reads if it guarantees strongly atomic semantics for TDRF programs.
cs.DC
2019-08-09T00:00:00
Artem Khyzha, Hagit Attiya and Alexey Gotsman
no_new_dataset
false
0.710393
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03180
Moviescope: Large-scale Analysis of Movies using Multiple Modalities
Film media is a rich form of artistic expression. Unlike photography, and short videos, movies contain a storyline that is deliberately complex and intricate in order to engage its audience. In this paper we present a large scale study comparing the effectiveness of visual, audio, text, and metadata-based features for predicting high-level information about movies such as their genre or estimated budget. We demonstrate the usefulness of content-based methods in this domain in contrast to human-based and metadata-based predictions in the era of deep learning. Additionally, we provide a comprehensive study of temporal feature aggregation methods for representing video and text and find that simple pooling operations are effective in this domain. We also show to what extent different modalities are complementary to each other. To this end, we also introduce Moviescope, a new large-scale dataset of 5,000 movies with corresponding movie trailers (video + audio), movie posters (images), movie plots (text), and metadata.
cs.CV
2019-08-09T00:00:00
Paola Cascante-Bonilla, Kalpathy Sitaraman, Mengjia Luo, Vicente Ordonez
new_dataset
true
0.711905
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03181
Assessing Sentiment of the Expressed Stance on Social Media
Stance detection is the task of inferring viewpoint towards a given topic or entity either being supportive or opposing. One may express a viewpoint towards a topic by using positive or negative language. This paper examines how the stance is being expressed in social media according to the sentiment polarity. There has been a noticeable misconception of the similarity between the stance and sentiment when it comes to viewpoint discovery, where negative sentiment is assumed to mean against stance, and positive sentiment means in-favour stance. To analyze the relation between stance and sentiment, we construct a new dataset with four topics and examine how people express their viewpoint with regards these topics. We validate our results by carrying a further analysis of the popular stance benchmark SemEval stance dataset. Our analyses reveal that sentiment and stance are not highly aligned, and hence the simple sentiment polarity cannot be used solely to denote a stance toward a given topic.
cs.SI cs.CL
2019-08-09T00:00:00
Abeer Aldayel and Walid Magdy
new_dataset
true
0.712717
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03182
Dynamic Scale Inference by Entropy Minimization
Given the variety of the visual world there is not one true scale for recognition: objects may appear at drastically different sizes across the visual field. Rather than enumerate variations across filter channels or pyramid levels, dynamic models locally predict scale and adapt receptive fields accordingly. The degree of variation and diversity of inputs makes this a difficult task. Existing methods either learn a feedforward predictor, which is not itself totally immune to the scale variation it is meant to counter, or select scales by a fixed algorithm, which cannot learn from the given task and data. We extend dynamic scale inference from feedforward prediction to iterative optimization for further adaptivity. We propose a novel entropy minimization objective for inference and optimize over task and structure parameters to tune the model to each input. Optimization during inference improves semantic segmentation accuracy and generalizes better to extreme scale variations that cause feedforward dynamic inference to falter.
cs.CV cs.LG
2019-08-09T00:00:00
Dequan Wang, Evan Shelhamer, Bruno Olshausen, Trevor Darrell
no_new_dataset
false
0.710331
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03185
Optimizing quantum heuristics with meta-learning
Variational quantum algorithms, a class of quantum heuristics, are promising candidates for the demonstration of useful quantum computation. Finding the best way to amplify the performance of these methods on hardware is an important task. Here, we evaluate the optimization of quantum heuristics with an existing class of techniques called `meta-learners'. We compare the performance of a meta-learner to Bayesian optimization, evolutionary strategies, L-BFGS-B and Nelder-Mead approaches, for two quantum heuristics (quantum alternating operator ansatz and variational quantum eigensolver), on three problems, in three simulation environments. We show that the meta-learner comes near to the global optima more frequently than all other optimizers we tested in a noisy parameter setting environment. We also find that the meta-learner is generally more resistant to noise, for example seeing a smaller reduction in performance in Noisy and Sampling environments and performs better on average by a `gain' metric than its closest comparable competitor L-BFGS-B. These results are an important indication that meta-learning and associated machine learning methods will be integral to the useful application of noisy near-term quantum computers.
quant-ph cs.NE
2019-08-09T00:00:00
Max Wilson, Sam Stromswold, Filip Wudarski, Stuart Hadfield, Norm M. Tubman, Eleanor Rieffel
no_new_dataset
false
0.710069
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03188
Freestanding and flexible composites of magnetocaloric Gd$_5$(Si,Ge)$_4$ microparticles embedded in thermoplastic poly(methyl methacrylate) matrix
The implementation of processed magnetic materials onto thermoplastics can be an approach for practical application of brittle intermetallic materials with the advantage of enlarging the range of applications. In the present work, we evaluate the effect of blending magnetocaloric Gd$_5$Si$_{2.4}$Ge$_{1.6}$ micrometric particles with 3.4 $\mu$m in different weight fractions onto a flexible, transparent and non-magnetic poly(methyl methacrylate) (PMMA). A close to homogeneous grain distribution along the polymer surface were achiever by using a simple solvent casting method for evaluation of their magnetocaloric properties. From XRD analysis, it was found a relative unit cell volume reduction of $\sim$2.5$\times$10$^3$ ppm for the composite with 70 wt.\% of powder as a result of interfacial interactions between the components. Although PMMA does not influence the magnetic nature of microparticles main phase, a reduction on the amount of secondary monoclinic phase occurs for all produced composite samples. As a consequence, a weakening on the effect of secondary phases on the micropowder magnetocaloric response is observed as a result of hydrostatic pressure from the difference between thermal expansions of matrix and filler.
cond-mat.mtrl-sci physics.app-ph
2019-08-09T00:00:00
Vivian M. Andrade, Nathalie B. Barroca, Ana L. Pires, Jo\~ao H. Belo, Jo\~ao P. Ara\'ujo, Andr\'e M. Pereira
no_new_dataset
false
0.708822
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03190
NeuPDE: Neural Network Based Ordinary and Partial Differential Equations for Modeling Time-Dependent Data
We propose a neural network based approach for extracting models from dynamic data using ordinary and partial differential equations. In particular, given a time-series or spatio-temporal dataset, we seek to identify an accurate governing system which respects the intrinsic differential structure. The unknown governing model is parameterized by using both (shallow) multilayer perceptrons and nonlinear differential terms, in order to incorporate relevant correlations between spatio-temporal samples. We demonstrate the approach on several examples where the data is sampled from various dynamical systems and give a comparison to recurrent networks and other data-discovery methods. In addition, we show that for MNIST and Fashion MNIST, our approach lowers the parameter cost as compared to other deep neural networks.
cs.LG stat.ML
2019-08-09T00:00:00
Yifan Sun, Linan Zhang, and Hayden Schaeffer
no_new_dataset
false
0.710052
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1908.03201
Rigid Graph Alignment
Graph databases have been the subject of significant research and development. Problems such as modularity, centrality, alignment, and clustering have been formalized and solved in various application contexts. In this paper, we focus on databases for applications in which graphs have a spatial basis, which we refer to as rigid graphs. Nodes in such graphs have preferred positions relative to their graph neighbors. Examples of such graphs include abstractions of large biomolecules, functional connectomes of the human brain, and mobile device/ sensor communication logs. When analyzing such networks it is important to consider edge lengths; e.g., when identifying conserved patterns through graph alignment, it is important for conserved edges to have correlated lengths, in addition to topological similarity. In contrast to a large body of work on topological graph alignment, rigid graph alignment simultaneously aligns the network, as well as the underlying structure as characterized by edge lengths. We formulate the problem and present a meta-algorithm based on expectation-maximization that alternately aligns the network and the structure. We demonstrate that our meta-algorithm significantly improves the quality of alignments in target applications, compared to topological or structural aligners alone. We apply rigid graph alignment to functional brain networks derived from 20 subjects drawn from the Human Connectome Project (HCP) database, and show over a two-fold increase in quality of alignment over state of the art topological aligners. We evaluate the impact of various parameters associated with input datasets through a study on synthetic graphs, where we fully characterize the performance of our method. Our results are broadly applicable to other applications and abstracted networks that can be embedded in metric spaces -- e.g., through spectral embeddings.
cs.SI cs.DB
2019-08-09T00:00:00
Vikram Ravindra and Huda Nassar and David F. Gleich and Ananth Grama
no_new_dataset
false
0.712003
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1303.4634
Experimental distribution of entanglement with separable carriers
The key requirement for quantum networking is the distribution of entanglement between nodes. Surprisingly, entanglement can be generated across a network without direct transfer - or communication - of entanglement. In contrast to information gain, which cannot exceed the communicated information, the entanglement gain is bounded by the communicated quantum discord, a more general measure of quantum correlation that includes but is not limited to entanglement. Here, we experimentally entangle two communicating parties sharing three initially separable photonic qubits by exchange of a carrier photon that is unentangled with either party at all times. We show that distributing entanglement with separable carriers is resilient to noise and in some cases becomes the only way of distributing entanglement through noisy environments.
quant-ph physics.optics
2019-08-08T00:00:00
A. Fedrizzi, M. Zuppardo, G. G. Gillett, M. A. Broome, M. de Almeida, M. Paternostro, A. G. White, T. Paterek
no_new_dataset
false
0.706116
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1310.6324
On Jacobian group arithmetic for typical divisors on curves
In a previous joint article with F. Abu Salem, we gave efficient algorithms for Jacobian group arithmetic of "typical" divisor classes on C_{3,4} curves, improving on similar results by other authors. At that time, we could only state that a generic divisor was typical, and hence unlikely to be encountered if one implemented these algorithms over a very large finite field. This article pins down an explicit characterization of these typical divisors, for an arbitrary smooth projective curve of genus g >= 1 having at least one rational point. We give general algorithms for Jacobian group arithmetic with these typical divisors, and prove not only that the algorithms are correct if various divisors are typical, but also that the success of our algorithms provides a guarantee that the resulting output is correct and that the resulting input and/or output divisors are also typical. These results apply in particular to our earlier algorithms for C_{3,4} curves. As a byproduct, we obtain a further speedup of approximately 15% on our previous algorithms for C_{3,4} curves.
math.NT cs.SC math.AG
2019-08-08T00:00:00
Kamal Khuri-Makdisi
no_new_dataset
false
0.713299
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1608.08144
Achievements in Answer Set Programming
This paper describes an approach to the methodology of answer set programming (ASP) that can facilitate the design of encodings that are easy to understand and provably correct. Under this approach, after appending a rule or a small group of rules to the emerging program we include a comment that states what has been "achieved" so far. This strategy allows us to set out our understanding of the design of the program by describing the roles of small parts of the program in a mathematically precise way.
cs.AI
2019-08-08T00:00:00
Vladimir Lifschitz
no_new_dataset
false
0.710282
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1609.00389
QED-driven laser absorption
Absorption covers the physical processes which convert intense photon flux into energetic particles when a high-power laser illuminates optically-thick matter. It underpins important petawatt-scale applications today, e.g., medical-quality proton beam production. However, development of ultra-high-field applications has been hindered since no study so far has described absorption throughout the entire transition from the classical to the quantum electrodynamical (QED) regime of plasma physics. Here we present a model of absorption that holds over an unprecedented six orders-of-magnitude in optical intensity and lays the groundwork for QED applications of laser-driven particle beams. We demonstrate 58% efficient \gamma-ray production at $1.8\times 10^{25}~\mathrm{W~ cm^{-2}}$ and the creation of an anti-matter source achieving $4\times 10^{24}\ \mathrm{positrons}\ \mathrm{cm^{-3}}$, $10^{6}~\times$ denser than of any known photonic scheme. These results will find applications in scaled laboratory probes of black hole and pulsar winds, \gamma-ray radiography for materials science and homeland security, and fundamental nuclear physics.
physics.plasm-ph
2019-08-08T00:00:00
M. C. Levy, T. G. Blackburn, N. Ratan, J. Sadler, C. P. Ridgers, M. Kasim, L. Ceurvorst, J. Holloway, M. G. Baring, A. R. Bell, S. H. Glenzer, G. Gregori, A. Ilderton, M. Marklund, M. Tabak, S. C. Wilks
no_new_dataset
false
0.710407
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1610.04219
Mossbauer experiments in a rotating system: The so-called "synchronization effect" to explain the extra energy shift between emitted and absorbed radiation constitutes a complete failure
We show that a new attempt by C. Corda to once more rehash his so-called "synchronization effect" in order to account for the origin of the extra energy shift between emitted and absorbed radiation in Mossbauer rotor experiments (C. Corda, Int. J. Mod. Phys. D, doi: 10.1142/S0218271819501311) is yet again erroneous, just as were his previous attempts (Ann. Phys. 355, 360 (2015); Ann. Phys. 368, 258 (2016); Int. J. Mod. Phys. D 27, 1847016 (2018)). The correct approach presented herein with regards to the calculation of the energy shift between emitted and absorbed radiation in a rotating system leads to, as a matter of fact, no specific "synchronization effect".
physics.gen-ph
2019-08-08T00:00:00
Alexander Kholmetskii, Tolga Yarman, Ozan Yarman, Metin Arik
no_new_dataset
false
0.711796
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1612.02275
Computer Algebra and Material Design
This article is intended to an introductory lecture in material physics, in which the modern computational group theory and the electronic structure calculation are in collaboration. The effort of mathematicians in field of the group theory, have ripened as a new trend, called "computer algebra", outcomes of which now can be available as handy computational packages, and would also be useful to physicists with practical purposes. This article, in the former part, explains how to use the computer algebra for the applications in the solid-state simulation, by means of one of the computer algebra package, the GAP system. The computer algebra enables us to obtain various group theoretical properties with ease, such as the representations, the character tables, the subgroups, etc. Furthermore it would grant us a new perspective of material design, which could be executed in mathematically rigorous and systematic way. Some technical details and some computations which require the knowledge of a little higher mathematics (but computable easily by the computer algebra) are also given. The selected topics will provide the reader with some insights toward the dominating role of the symmetry in crystal, or, the "mathematical first principles" in it. In the latter part of the article, we analyze the relation between the structural symmetry and the electronic structure in C$_{60}$ (as an example to the sysmem without periodicity). The principal object of the study is to illustrate the hierarchical change of the quantum-physical properties of the molecule, in accordance with the reduction of the symmetry (as it descends down in the ladder of subgroups). In order to serve the common interest of the researchers, the details of the computations (the required initial data and the small programs developed for the purpose) are explained as minutely as possible.
cond-mat.mtrl-sci cs.CE cs.SC math.GR
2019-08-08T00:00:00
Akihito Kikuchi
no_new_dataset
false
0.708938
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1702.07262
Computing and Using Minimal Polynomials
Given a zero-dimensional ideal I in a polynomial ring, many computations start by finding univariate polynomials in I. Searching for a univariate polynomial in I is a particular case of considering the minimal polynomial of an element in P/I. It is well known that minimal polynomials may be computed via elimination, therefore this is considered to be a "resolved problem". But being the key of so many computations, it is worth investigating its meaning, its optimization, its applications (e.g. testing if a zero-dimensional ideal is radical, primary or maximal). We present efficient algorithms for computing the minimal polynomial of an element of P/I. For the specific case where the coefficients are in Q, we show how to use modular methods to obtain a guaranteed result. We also present some applications of minimal polynomials, namely algorithms for computing radicals and primary decompositions of zero-dimensional ideals, and also for testing radicality and maximality.
math.AC cs.SC
2019-08-08T00:00:00
John Abbott, Anna Maria Bigatti, Elisa Palezzato, Lorenzo Robbiano
no_new_dataset
false
0.710366
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1704.04759
A Component-Based Simplex Architecture for High-Assurance Cyber-Physical Systems
We present Component-Based Simplex Architecture (CBSA), a new framework for assuring the runtime safety of component-based cyber-physical systems (CPSs). CBSA integrates Assume-Guarantee (A-G) reasoning with the core principles of the Simplex control architecture to allow component-based CPSs to run advanced, uncertified controllers while still providing runtime assurance that A-G contracts and global properties are satisfied. In CBSA, multiple Simplex instances, which can be composed in a nested, serial or parallel manner, coordinate to assure system-wide properties. Combining A-G reasoning and the Simplex architecture is a challenging problem that yields significant benefits. By utilizing A-G contracts, we are able to compositionally determine the switching logic for CBSAs, thereby alleviating the state explosion encountered by other approaches. Another benefit is that we can use A-G proof rules to decompose the proof of system-wide safety assurance into sub-proofs corresponding to the component-based structure of the system architecture. We also introduce the notion of coordinated switching between Simplex instances, a key component of our compositional approach to reasoning about CBSA switching logic. We illustrate our framework with a component-based control system for a ground rover. We formally prove that the CBSA for this system guarantees energy safety (the rover never runs out of power), and collision freedom (the rover never collides with a stationary obstacle). We also consider a CBSA for the rover that guarantees mission completion: all target destinations visited within a prescribed amount of time.
cs.SY
2019-08-08T00:00:00
Dung Phan, Junxing Yang, Matthew Clark, Radu Grosu, John D. Schierman, Scott A. Smolka, Scott D. Stoller
no_new_dataset
false
0.70848
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1707.08989
Monocular Visual Teach and Repeat Aided by Local Ground Planarity
Visual Teach and Repeat (VT\&R) allows an autonomous vehicle to repeat a previously traversed route without a global positioning system. Existing implementations of VT\&R typically rely on 3D sensors such as stereo cameras for mapping and localization, but many mobile robots are equipped with only 2D monocular vision for tasks such as teleoperated bomb disposal. While simultaneous localization and mapping (SLAM) algorithms exist that can recover 3D structure and motion from monocular images, the scale ambiguity inherent in these methods complicates the estimation and control of lateral path-tracking error, which is essential for achieving high-accuracy path following. In this paper, we propose a monocular vision pipeline that enables kilometre-scale route repetition with centimetre-level accuracy by approximating the ground surface near the vehicle as planar (with some uncertainty) and recovering absolute scale from the known position and orientation of the camera relative to the vehicle. This system provides added value to many existing robots by allowing for high-accuracy autonomous route repetition with a simple software upgrade and no additional sensors. We validate our system over 4.3 km of autonomous navigation and demonstrate accuracy on par with the conventional stereo pipeline, even in highly non-planar terrain.
cs.RO
2019-08-08T00:00:00
Lee Clement, Jonathan Kelly, Timothy D. Barfoot
no_new_dataset
false
0.708727
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1712.09722
Satellite-Based Continuous-Variable Quantum Communications: State-of-the-Art and a Predictive Outlook
The recent launch of the Micius quantum-enabled satellite heralds a major step forward for long-range quantum communication. Using single-photon discrete-variable quantum states, this exciting new development proves beyond any doubt that all of the quantum protocols previously deployed over limited ranges in terrestrial experiments can, in fact, be translated to global distances via the use of low-orbit satellites. In this work, we survey the imminent extension of space-based quantum communication to the continuous-variable regime - the quantum regime perhaps most closely related to classical wireless communications. The CV regime offers the potential for increased communication performance and represents the next major step forward for quantum communications and the development of the global quantum internet.
quant-ph cs.CR cs.IT math.IT
2019-08-08T00:00:00
Nedasadat Hosseinidehaj, Robert Malaney, Soon Xin Ng and Lajos Hanzo
no_new_dataset
false
0.711444
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1801.10562
Feature Decomposition Based Saliency Detection in Electron Cryo-Tomograms
Electron Cryo-Tomography (ECT) allows 3D visualization of subcellular structures at the submolecular resolution in close to the native state. However, due to the high degree of structural complexity and imaging limits, the automatic segmentation of cellular components from ECT images is very difficult. To complement and speed up existing segmentation methods, it is desirable to develop a generic cell component segmentation method that is 1) not specific to particular types of cellular components, 2) able to segment unknown cellular components, 3) fully unsupervised and does not rely on the availability of training data. As an important step towards this goal, in this paper, we propose a saliency detection method that computes the likelihood that a subregion in a tomogram stands out from the background. Our method consists of four steps: supervoxel over-segmentation, feature extraction, feature matrix decomposition, and computation of saliency. The method produces a distribution map that represents the regions' saliency in tomograms. Our experiments show that our method can successfully label most salient regions detected by a human observer, and able to filter out regions not containing cellular components. Therefore, our method can remove the majority of the background region, and significantly speed up the subsequent processing of segmentation and recognition of cellular components captured by ECT.
q-bio.QM cs.CV stat.ML
2019-08-08T00:00:00
Bo Zhou, Qiang Guo, Xiangrui Zeng, Min Xu
no_new_dataset
false
0.713617
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1802.02508
Spectral Phase Control of Interfering Chirped Pulses for High-Energy Narrowband Terahertz Generation
Highly-efficient optical generation of narrowband terahertz (THz) radiation enables unexplored technologies and sciences from compact electron acceleration to charge manipulation in solids. State-of-the-art conversion efficiencies are currently achieved using difference-frequency generation (DFG) driven by temporal beating of chirped pulses but remain, however, far lower than desired or predicted. Here we show that high-order spectral phase fundamentally limits the efficiency of narrowband DFG using chirped-pulse beating and resolve this limitation by introducing a novel technique based on tuning the relative spectral phase of the pulses. For optical terahertz generation, we demonstrate a 13-fold enhancement in conversion efficiency for 1%-bandwidth, 0.361 THz pulses, yielding a record energy of 0.6 mJ and exceeding previous optically-generated energies by over an order of magnitude. Our results prove the feasibility of millijoule-scale applications like terahertz-based electron accelerators and light sources and solve the long-standing problem of temporal irregularities in the pulse trains generated by interfering chirped pulses.
physics.optics
2019-08-08T00:00:00
Spencer W. Jolly, Nicholas H. Matlis, Frederike Ahr, Vincent Leroux, Timo Eichner, Anne-Laure Calendron, Hideki Ishizuki, Takunori Taira, Franz X. K\"artner, Andreas R. Maier
no_new_dataset
false
0.709273
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1802.04392
Image Retargetability
Real-world applications could benefit from the ability to automatically retarget an image to different aspect ratios and resolutions, while preserving its visually and semantically important content. However, not all images can be equally well processed that way. In this work, we introduce the notion of image retargetability to describe how well a particular image can be handled by content-aware image retargeting. We propose to learn a deep convolutional neural network to rank photo retargetability in which the relative ranking of photo retargetability is directly modeled in the loss function. Our model incorporates joint learning of meaningful photographic attributes and image content information which can help regularize the complicated retargetability rating problem. To train and analyze this model, we have collected a database which contains retargetability scores and meaningful image attributes assigned by six expert raters. Experiments demonstrate that our unified model can generate retargetability rankings that are highly consistent with human labels. To further validate our model, we show applications of image retargetability in retargeting method selection, retargeting method assessment and photo collage generation.
cs.CV
2019-08-08T00:00:00
Fan Tang and Weiming Dong and Yiping Meng and Chongyang Ma and Fuzhang Wu and Xinrui Li and Tong-Yee Lee
new_dataset
true
0.703857
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1802.10528
Dimensional Analysis in Economics: A Study of the Neoclassical Economic Growth Model
The fundamental purpose of the present research article is to introduce the basic principles of Dimensional Analysis in the context of the neoclassical economic theory, in order to apply such principles to the fundamental relations that underlay most models of economic growth. In particular, basic instruments from Dimensional Analysis are used to evaluate the analytical consistency of the Neoclassical economic growth model. The analysis shows that an adjustment to the model is required in such a way that the principle of dimensional homogeneity is satisfied.
econ.EM physics.soc-ph q-fin.GN
2019-08-08T00:00:00
Miguel Alvarez Texocotitla, M. David Alvarez Hernandez, Shani Alvarez Hernandez
no_new_dataset
false
0.709149
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1803.04388
Partitioning a graph into degenerate subgraphs
Let $G = (V, E)$ be a connected graph with maximum degree $k\geq 3$ distinct from $K_{k+1}$. Given integers $s \geq 2$ and $p_1,\ldots,p_s\geq 0$, $G$ is said to be $(p_1, \dots, p_s)$-partitionable if there exists a partition of $V$ into sets~$V_1,\ldots,V_s$ such that $G[V_i]$ is $p_i$-degenerate for $i\in\{1,\ldots,s\}$. In this paper, we prove that we can find a $(p_1, \dots, p_s)$-partition of $G$ in $O(|V| + |E|)$-time whenever $1\geq p_1, \dots, p_s \geq 0$ and $p_1 + \dots + p_s \geq k - s$. This generalizes a result of Bonamy et al. (MFCS, 2017) and can be viewed as an algorithmic extension of Brooks' theorem and several results on vertex arboricity of graphs of bounded maximum degree. We also prove that deciding whether $G$ is $(p, q)$-partitionable is $\mathbb{NP}$-complete for every $k \geq 5$ and pairs of non-negative integers $(p, q)$ such that $(p, q) \not = (1, 1)$ and $p + q = k - 3$. This resolves an open problem of Bonamy et al. (manuscript, 2017). Combined with results of Borodin, Kostochka and Toft (\emph{Discrete Mathematics}, 2000), Yang and Yuan (\emph{Discrete Mathematics}, 2006) and Wu, Yuan and Zhao (\emph{Journal of Mathematical Study}, 1996), it also settles the complexity of deciding whether a graph with bounded maximum degree can be partitioned into two subgraphs of prescribed degeneracy.
cs.DM math.CO
2019-08-08T00:00:00
Faisal N. Abu-Khzam, Carl Feghali, Pinar Heggernes
no_new_dataset
false
0.703322
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1803.06156
Smoothing for signals with discontinuities using higher order Mumford-Shah models
Minimizing the Mumford-Shah functional is frequently used for smoothing signals or time series with discontinuities. A significant limitation of the standard Mumford-Shah model is that linear trends -- and in general polynomial trends -- in the data are not well preserved. This can be improved by building on splines of higher order which leads to higher order Mumford-Shah models. In this work, we study these models in the univariate situation: we discuss important differences to the first order Mumford-Shah model, and we obtain uniqueness results for their solutions. As a main contribution, we derive fast minimization algorithms for Mumford-Shah models of arbitrary orders. We show that the worst case complexity of all proposed schemes is quadratic in the length of the signal. Remarkably, they thus achieve the worst case complexity of the fastest solver for the piecewise constant Mumford-Shah model (which is the simplest model of the class). Further, we obtain stability results for the proposed algorithms. We complement these results with a numerical study. Our reference implementation processes signals with more than 10,000 elements in less than one second.
math.NA cs.NA
2019-08-08T00:00:00
Martin Storath, Lukas Kiefer, Andreas Weinmann
no_new_dataset
false
0.710316
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1804.07758
Mapping Images to Psychological Similarity Spaces Using Neural Networks
The cognitive framework of conceptual spaces bridges the gap between symbolic and subsymbolic AI by proposing an intermediate conceptual layer where knowledge is represented geometrically. There are two main approaches for obtaining the dimensions of this conceptual similarity space: using similarity ratings from psychological experiments and using machine learning techniques. In this paper, we propose a combination of both approaches by using psychologically derived similarity ratings to constrain the machine learning process. This way, a mapping from stimuli to conceptual spaces can be learned that is both supported by psychological data and allows generalization to unseen stimuli. The results of a first feasibility study support our proposed approach.
cs.LG cs.AI stat.ML
2019-08-08T00:00:00
Lucas Bechberger and Elektra Kypridemou
no_new_dataset
false
0.712415
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1807.00938
Topic Discovery in Massive Text Corpora Based on Min-Hashing
The task of discovering topics in text corpora has been dominated by Latent Dirichlet Allocation and other Topic Models for over a decade. In order to apply these approaches to massive text corpora, the vocabulary needs to be reduced considerably and large computer clusters and/or GPUs are typically required. Moreover, the number of topics must be provided beforehand but this depends on the corpus characteristics and it is often difficult to estimate, especially for massive text corpora. Unfortunately, both topic quality and time complexity are sensitive to this choice. This paper describes an alternative approach to discover topics based on Min-Hashing, which can handle massive text corpora and large vocabularies using modest computer hardware and does not require to fix the number of topics in advance. The basic idea is to generate multiple random partitions of the corpus vocabulary to find sets of highly co-occurring words, which are then clustered to produce the final topics. In contrast to probabilistic topic models where topics are distributions over the complete vocabulary, the topics discovered by the proposed approach are sets of highly co-occurring words. Interestingly, these topics underlie various thematics with different levels of granularity. An extensive qualitative and quantitative evaluation using the 20 Newsgroups (18K), Reuters (800K), Spanish Wikipedia (1M), and English Wikipedia (5M) corpora shows that the proposed approach is able to consistently discover meaningful and coherent topics. Remarkably, the time complexity of the proposed approach is linear with respect to corpus and vocabulary size; a non-parallel implementation was able to discover topics from the entire English edition of Wikipedia with over 5 million documents and 1 million words in less than 7 hours.
cs.CL
2019-08-08T00:00:00
Gibran Fuentes-Pineda and Ivan Vladimir Meza-Ruiz
no_new_dataset
false
0.711219
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1807.07787
Upgrade of the ALICE central barrel tracking detectors: ITS and TPC
The ALICE Collaboration will undertake a major upgrade of the detector apparatus during the second LHC Long Shutdown LS2 (2019-2020) in view of the Runs 3 and 4 (2021-2029). The objective of the upgrade is two-fold: i) an improvement of the tracking precision and efficiency, in particular in the low-momentum range; ii) an improvement of the readout capabilities of the experiment, in order to fully exploit the luminosity for heavy ions envisaged after LS2. The first goal will be achieved by replacing the Inner Tracking System with a new tracker, composed of seven layers of silicon pixel detectors. The new tracker will be made up of about 25000 Monolithic Active Pixel Sensors with fast readout, resulting in a material thickness reduced to 0.3% (inner layers) - 1% (outer layers) of the radiation length and a granularity of $28\times28$ $\mu$m$^2$. The second goal will be achieved, among other measures, by replacing the readout chambers of the 90 m$^3$ Time Projection Chamber with Micro Pattern Gaseous Detectors. In particular, the new readout chambers will consist of stacks of 4 Gas Electron Multiplier foils combining different hole pitches. The upgraded detector will operate continuously without the use of a triggered gating grid. It will thus be able to record all Pb--Pb collisions at the LHC interaction rate of 50 kHz.
physics.ins-det nucl-ex
2019-08-08T00:00:00
P. Gasik fo the ALICE Collaboration
no_new_dataset
false
0.707967
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1807.09901
Neural State Classification for Hybrid Systems
We introduce the State Classification Problem (SCP) for hybrid systems, and present Neural State Classification (NSC) as an efficient solution technique. SCP generalizes the model checking problem as it entails classifying each state $s$ of a hybrid automaton as either positive or negative, depending on whether or not $s$ satisfies a given time-bounded reachability specification. This is an interesting problem in its own right, which NSC solves using machine-learning techniques, Deep Neural Networks in particular. State classifiers produced by NSC tend to be very efficient (run in constant time and space), but may be subject to classification errors. To quantify and mitigate such errors, our approach comprises: i) techniques for certifying, with statistical guarantees, that an NSC classifier meets given accuracy levels; ii) tuning techniques, including a novel technique based on adversarial sampling, that can virtually eliminate false negatives (positive states classified as negative), thereby making the classifier more conservative. We have applied NSC to six nonlinear hybrid system benchmarks, achieving an accuracy of 99.25% to 99.98%, and a false-negative rate of 0.0033 to 0, which we further reduced to 0.0015 to 0 after tuning the classifier. We believe that this level of accuracy is acceptable in many practical applications, and that these results demonstrate the promise of the NSC approach.
cs.LG stat.ML
2019-08-08T00:00:00
Dung Phan, Nicola Paoletti, Timothy Zhang, Radu Grosu, Scott A. Smolka, Scott D. Stoller
no_new_dataset
false
0.710892
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1808.02016
MCRM: Mother Compact Recurrent Memory
LSTMs and GRUs are the most common recurrent neural network architectures used to solve temporal sequence problems. The two architectures have differing data flows dealing with a common component called the cell state (also referred to as the memory). We attempt to enhance the memory by presenting a modification that we call the Mother Compact Recurrent Memory (MCRM). MCRMs are a type of a nested LSTM-GRU architecture where the cell state is the GRU hidden state. The concatenation of the forget gate and input gate interactions from the LSTM are considered an input to the GRU cell. Because MCRMs has this type of nesting, MCRMs have a compact memory pattern consisting of neurons that acts explicitly in both long-term and short-term fashions. For some specific tasks, empirical results show that MCRMs outperform previously used architectures.
cs.NE cs.LG stat.ML
2019-08-08T00:00:00
Abduallah A. Mohamed and Christian Claudel
no_new_dataset
false
0.711077
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1808.05469
Cross-view image synthesis using geometry-guided conditional GANs
We address the problem of generating images across two drastically different views, namely ground (street) and aerial (overhead) views. Image synthesis by itself is a very challenging computer vision task and is even more so when generation is conditioned on an image in another view. Due the difference in viewpoints, there is small overlapping field of view and little common content between these two views. Here, we try to preserve the pixel information between the views so that the generated image is a realistic representation of cross view input image. For this, we propose to use homography as a guide to map the images between the views based on the common field of view to preserve the details in the input image. We then use generative adversarial networks to inpaint the missing regions in the transformed image and add realism to it. Our exhaustive evaluation and model comparison demonstrate that utilizing geometry constraints adds fine details to the generated images and can be a better approach for cross view image synthesis than purely pixel based synthesis methods.
cs.CV
2019-08-08T00:00:00
Krishna Regmi, Ali Borji
no_new_dataset
false
0.711811
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1808.10166
Different patterns of social closeness observed in mobile phone communication
We analyze a large-scale mobile phone call dataset containing information on the age, gender, and billing locality of users to get insight into social closeness in pairs of individuals of similar age. We show that in addition to using the demographic information, the ranking of contacts by their call frequency in egocentric networks is crucial to characterize the different communication patterns. We find that mutually top-ranked opposite-gender pairs show the highest levels of call frequency and daily regularity, which is consistent with the behavior of real-life romantic partners. At somewhat lower level of call frequency and daily regularity come the mutually top-ranked same-gender pairs, while the lowest call frequency and daily regularity are observed for mutually non-top-ranked pairs. We have also observed that older pairs tend to call less frequently and less regularly than younger pairs, while the average call durations exhibit a more complex dependence on age. We expect that a more detailed analysis can help us better characterize the nature of relationships between pairs of individuals and distinguish between various types of relations, such as siblings, friends, and romantic partners.
cs.SI physics.soc-ph
2019-08-08T00:00:00
Mikaela Irene D. Fudolig, Daniel Monsivais, Kunal Bhattacharya, Hang-Hyun Jo, and Kimmo Kaski
no_new_dataset
false
0.697455
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1808.10350
IEA: Inner Ensemble Average within a convolutional neural network
Ensemble learning is a method of combining multiple trained models to improve model accuracy. We propose the usage of such methods, specifically ensemble average, inside Convolutional Neural Network (CNN) architectures by replacing the single convolutional layers with Inner Average Ensembles (IEA) of multiple convolutional layers. Empirical results on different benchmarking datasets show that CNN models using IEA outperform those with regular convolutional layers. A visual and a similarity score analysis of the features generated from IEA explains why it boosts the model performance.
cs.LG stat.ML
2019-08-08T00:00:00
Abduallah Mohamed, Xinrui Hua, Xianda Zhou and Christian Claudel
no_new_dataset
false
0.711465
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1810.07422
Fast and Longest Rollercoasters
For $k\geq 3$, a k-rollercoaster is a sequence of numbers whose every maximal contiguous subsequence, that is increasing or decreasing, has length at least $k$; $3$-rollercoasters are called simply rollercoasters. Given a sequence of distinct numbers, we are interested in computing its maximum-length (not necessarily contiguous) subsequence that is a $k$-rollercoaster. Biedl et al. [ICALP 2018] have shown that each sequence of $n$ distinct real numbers contains a rollercoaster of length at least $\lceil n/2\rceil$ for $n>7$, and that a longest rollercoaster contained in such a sequence can be computed in $O(n\log n)$-time. They have also shown that every sequence of $n\geq (k-1)^2+1$ distinct real numbers contains a $k$-rollercoaster of length at least $\frac{n}{2(k-1)}-\frac{3k}{2}$, and gave an $O(nk\log n)$-time algorithm computing a longest $k$-rollercoaster in a sequence of length $n$. In this paper, we give an $O(nk^2)$-time algorithm computing the length of a longest $k$-rollercoaster contained in a sequence of $n$ distinct real numbers; hence, for constant $k$, our algorithm computes the length of a longest $k$-rollercoaster in optimal linear time. The algorithm can be easily adapted to output the respective $k$-rollercoaster. In particular, this improves the results of Biedl et al. [ICALP 2018], by showing that a longest rollercoaster can be computed in optimal linear time. We also present an algorithm computing the length of a longest $k$-rollercoaster in $O(n \log^2 n)$-time, that is, subquadratic even for large values of $k\leq n$. Again, the rollercoaster can be easily retrieved. Finally, we show an $\Omega(n \log k)$ lower bound for the number of comparisons in any comparison-based algorithm computing the length of a longest $k$-rollercoaster.
cs.DS
2019-08-08T00:00:00
Pawe{\l} Gawrychowski, Florin Manea, Rados{\l}aw Serafin
no_new_dataset
false
0.709537
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1811.04377
On SDN-Enabled Online and Dynamic Bandwidth Allocation for Stream Analytics
Data communication in cloud-based distributed stream data analytics often involves a collection of parallel and pipelined TCP flows. As the standard TCP congestion control mechanism is designed for achieving "fairness" among competing flows and is agnostic to the application layer contexts, the bandwidth allocation among a set of TCP flows traversing bottleneck links often leads to sub-optimal application-layer performance measures, e.g., stream processing throughput or average tuple complete latency. Motivated by this and enabled by the rapid development of the Software-Defined Networking (SDN) techniques, in this paper, we re-investigate the design space of the bandwidth allocation problem and propose a cross-layer framework which utilizes the additional information obtained from the application layer and provides on-the-fly and dynamic bandwidth adjustment algorithms for helping the stream analytics applications achieving better performance during the runtime. We implement a prototype cross-layer bandwidth allocation framework based on a popular open-source distributed stream processing platform, Apache Storm, together with the OpenDaylight controller, and carry out extensive experiments with real-world analytical workloads on top of a local cluster consisting of 10 workstations interconnected by a SDN-enabled switch. The experiment results clearly validate the effectiveness and efficiency of our proposed framework and algorithms.
cs.NI
2019-08-08T00:00:00
Walid Aljoby, Xin Wang, Tom Z. J. Fu, Richard T. B. Ma
no_new_dataset
false
0.708494
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1811.08599
M2E-Try On Net: Fashion from Model to Everyone
Most existing virtual try-on applications require clean clothes images. Instead, we present a novel virtual Try-On network, M2E-Try On Net, which transfers the clothes from a model image to a person image without the need of any clean product images. To obtain a realistic image of person wearing the desired model clothes, we aim to solve the following challenges: 1) non-rigid nature of clothes - we need to align poses between the model and the user; 2) richness in textures of fashion items - preserving the fine details and characteristics of the clothes is critical for photo-realistic transfer; 3) variation of identity appearances - it is required to fit the desired model clothes to the person identity seamlessly. To tackle these challenges, we introduce three key components, including the pose alignment network (PAN), the texture refinement network (TRN) and the fitting network (FTN). Since it is unlikely to gather image pairs of input person image and desired output image (i.e. person wearing the desired clothes), our framework is trained in a self-supervised manner to gradually transfer the poses and textures of the model's clothes to the desired appearance. In the experiments, we verify on the Deep Fashion dataset and MVC dataset that our method can generate photo-realistic images for the person to try-on the model clothes. Furthermore, we explore the model capability for different fashion items, including both upper and lower garments.
cs.CV
2019-08-08T00:00:00
Zhonghua Wu, Guosheng Lin, Qingyi Tao and Jianfei Cai
no_new_dataset
false
0.711981
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1811.09794
Three-Dimensionally Embedded Graph Convolutional Network (3DGCN) for Molecule Interpretation
We present a three-dimensional graph convolutional network (3DGCN), which predicts molecular properties and biochemical activities, based on 3D molecular graph. In the 3DGCN, graph convolution is unified with learning operations on the vector to handle the spatial information from molecular topology. The 3DGCN model exhibits significantly higher performance on various tasks compared with other deep-learning models, and has the ability of generalizing a given conformer to targeted features regardless of its rotations in the 3D space. More significantly, our model also can distinguish the 3D rotations of a molecule and predict the target value, depending upon the rotation degree, in the protein-ligand docking problem, when trained with orientation-dependent datasets. The rotation distinguishability of 3DGCN, along with rotation equivariance, provides a key milestone in the implementation of three-dimensionality to the field of deep-learning chemistry that solves challenging biochemical problems.
cs.LG stat.ML
2019-08-08T00:00:00
Hyeoncheol Cho, Insung S. Choi
no_new_dataset
false
0.711228
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1811.10403
Running on Fumes--Preventing Out-of-Gas Vulnerabilities in Ethereum Smart Contracts using Static Resource Analysis
Gas is a measurement unit of the computational effort that it will take to execute every single operation that takes part in the Ethereum blockchain platform. Each instruction executed by the Ethereum Virtual Machine (EVM) has an associated gas consumption specified by Ethereum. If a transaction exceeds the amount of gas allotted by the user (known as gas limit), an out-of-gas exception is raised. There is a wide family of contract vulnerabilities due to out-of-gas behaviours. We report on the design and implementation of GASTAP, a Gas-Aware Smart contracT Analysis Platform, which takes as input a smart contract (either in EVM, disassembled EVM, or in Solidity source code) and automatically infers sound gas upper bounds for all its public functions. Our bounds ensure that if the gas limit paid by the user is higher than our inferred gas bounds, the contract is free of out-of-gas vulnerabilities.
cs.PL cs.CL
2019-08-08T00:00:00
Elvira Albert and Pablo Gordillo and Albert Rubio and Ilya Sergey
no_new_dataset
false
0.709513
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1812.01612
The active flux scheme on Cartesian grids and its low Mach number limit
Finite volume schemes for hyperbolic conservation laws require a numerical intercell flux. In one spatial dimension the numerical flux can be successfully obtained by solving (exactly or approximately) Riemann problems that are introduced at cell interfaces. This is more challenging in multiple spatial dimensions. The active flux scheme is a finite volume scheme that considers continuous reconstructions instead. The intercell flux is obtained using additional degrees of freedom distributed along the cell boundary. For their time evolution an exact evolution operator is employed, which naturally ensures the correct direction of information propagation and provides stability. This paper presents an implementation of active flux for the acoustic equations on two-dimensional Cartesian grids and demonstrates its ability to simulate discontinuous solutions with an explicit time stepping in a stable manner. Additionally, it is shown that the active flux scheme for linear acoustics is low Mach number compliant without the need for any fix.
math.NA cs.NA
2019-08-08T00:00:00
Wasilij Barsukow, Jonathan Hohm, Christian Klingenberg, Philip L. Roe
no_new_dataset
false
0.713194
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1902.01501
Measurement of the scintillation efficiency for nuclear recoils in liquid argon under electric fields up to 3 kV/cm
We present a measurement of scintillation efficiency for a few tens of keV nuclear recoils (NR) with a liquid argon time projection chamber under electric fields ranging from $0$ to $3\ {\rm kV/cm}$. The calibration data are taken with $^{252}{\rm Cf}$ radioactive source. Observed scintillation and electroluminescence spectra are simultaneously fit with spectra derived from Geant4-based Monte Carlo simulation and an NR model. The scintillation efficiency extracted from the fit is reported as a function of recoil energy and electric field. This result can be used for designing the detector and for the interpretation of experimental data in searching for scintillation and ionization signals induced by WIMP dark matter.
physics.ins-det hep-ex
2019-08-08T00:00:00
M.Kimura, M.Tanaka, T.Washimi, K.Yorita
no_new_dataset
false
0.705112
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1902.02177
Modeling atom-atom interactions at low energy by Jost-Kohn potentials
More than 65 years ago, Jost and Kohn [R. Jost and W. Kohn, {Phys. Rev.} {\bf 87}, 977 (1952)] derived an explicit expression for a class of short-range model potentials from a given effective range expansion with the $s$-wave scattering length $a_s$ being negative. For $a_s >0$, they calculated another class of short-range model potentials [R. Jost and W. Kohn, { Dan. Mat. Fys. Medd} {\bf 27}, 1 (1953)] using a method based on an adaptation from Gelfand-Levitan theory [I. M. Gel'fand and B. M. Levitan, { Dokl. Akad. Nauk. USSR} {\bf 77}, 557-560 (1951)] of inverse scattering. We here revisit the methods of Jost and Kohn in order to explore the possibility of modeling resonant finite-range interactions at low energy. We show that the Jost-Kohn potentials can account for zero-energy resonances. The $s$-wave phase shift for positive scattering length is expressed in an analytical form as a function of the binding energy of a bound state. We show that, for small binding energy, both the scattering length and the effective range are strongly influenced by the binding energy; and below a critical binding energy the effective range becomes negative provided the scattering length is large. As a consistency check, we carry out some simple calculations to show that Jost-Kohn potentials can reproduce the standard results of contact interaction in the limit of the effective range going to zero.
physics.atom-ph cond-mat.quant-gas
2019-08-08T00:00:00
Subhanka Mal, Kingshuk Adhikary, Dibyendu Sardar, Abhik Kumar Saha and Bimalendu Deb
no_new_dataset
false
0.710375
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1902.04446
Solving All-Pairs Shortest-Paths Problem in Large Graphs Using Apache Spark
Algorithms for computing All-Pairs Shortest-Paths (APSP) are critical building blocks underlying many practical applications. The standard sequential algorithms, such as Floyd-Warshall and Johnson, quickly become infeasible for large input graphs, necessitating parallel approaches. In this work, we provide detailed analysis of parallel APSP performance on distributed memory clusters with Apache Spark. The Spark model allows for a portable and easy to deploy distributed implementation, and hence is attractive from the end-user point of view. We propose four different APSP implementations for large undirected weighted graphs, which differ in complexity and degree of reliance on techniques outside of pure Spark API. We demonstrate that Spark is able to handle APSP problems with over 200,000 vertices on a 1024-core cluster, and can compete with a naive MPI-based solution. However, our best performing solver requires auxiliary shared persistent storage, and is over two times slower than optimized MPI-based solver.
cs.DC
2019-08-08T00:00:00
Frank Schoeneman and Jaroslaw Zola
no_new_dataset
false
0.706136
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1902.06700
A Speculative Study on 6G
While 5G is being tested worldwide and anticipated to be rolled out gradually in 2019, researchers around the world are beginning to turn their attention to what 6G might be in 10+ years time, and there are already initiatives in various countries focusing on the research of possible 6G technologies. This article aims to extend the vision of 5G to more ambitious scenarios in a more distant future and speculates on the visionary technologies that could provide the step changes needed for enabling 6G.
cs.NI
2019-08-08T00:00:00
Faisal Tariq, Muhammad Khandaker, Kai-Kit Wong, Muhammad Imran, Mehdi Bennis, Merouane Debbah
no_new_dataset
false
0.71196
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1902.10234
Quantum Capacitance-Limited MoS2 Biosensors Enable Remote Label-Free Enzyme Measurements
We have demonstrated atomically thin, quantum capacitance-limited, field-effect transistors (FETs) that enable the detection of pH changes with ~75-fold higher sensitivity (4.4 V/pH) over the Nernst value of 59 mV/pH at room temperature when used as a biosensor. The transistors, which are fabricated from a monolayer of MoS2 with a room temperature ionic liquid (RTIL) in place of a conventional oxide gate dielectric, exhibit very low intrinsic noise resulting in a pH limit of detection (LOD) of 92x10^-6 at 10 Hz. This high device performance, which is a function of the structure of our device, is achieved by remotely connecting the gate to a pH sensing element allowing the FETs to be reused. Because pH measurements are fundamentally important in biotechnology, the low limit of detection demonstrated here will benefit numerous applications ranging from pharmaceutical manufacturing to clinical diagnostics. As an example, we experimentally quantified the function of the kinase Cdk5, an enzyme implicated in Alzheimer's disease, at concentrations that are 5-fold lower than physiological values, and with sufficient time-resolution to allow the estimation of both steady-state and kinetic parameters in a single experiment. The high sensitivity, low LOD and fast turnaround time of the measurements will allow the development of early diagnostic tools and novel therapeutics to detect and treat neurological conditions years before currently possible.
q-bio.QM physics.app-ph
2019-08-08T00:00:00
Son T. Le, Nicholas B. Guros, Robert C. Bruce, Antonio Cardone, Niranjana D. Amin, Siyuan Zhang, Jeffery B. Klauda, Harish C. Pant, Curt A. Richter and Arvind Balijepalli
no_new_dataset
false
0.70961
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1902.10501
Atomistic structure learning
One endeavour of modern physical chemistry is to use bottom-up approaches to design materials and drugs with desired properties. Here we introduce an atomistic structure learning algorithm (ASLA) that utilizes a convolutional neural network to build 2D compounds and layered structures atom by atom. The algorithm takes no prior data or knowledge on atomic interactions but inquires a first-principles quantum mechanical program for physical properties. Using reinforcement learning, the algorithm accumulates knowledge of chemical compound space for a given number and type of atoms and stores this in the neural network, ultimately learning the blueprint for the optimal structural arrangement of the atoms for a given target property. ASLA is demonstrated to work on diverse problems, including grain boundaries in graphene sheets, organic compound formation and a surface oxide structure. This approach to structure prediction is a first step toward direct manipulation of atoms with artificially intelligent first principles computer codes.
cond-mat.mtrl-sci cs.LG physics.chem-ph stat.ML
2019-08-08T00:00:00
Mathias S. J{\o}rgensen, Henrik L. Mortensen, S{\o}ren A. Meldgaard, Esben L. Kolsbjerg, Thomas L. Jacobsen, Knud H. S{\o}rensen, and Bj{\o}rk Hammer
no_new_dataset
false
0.708041
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1903.01682
A linear-time algorithm and analysis of graph Relative Hausdorff distance
Graph similarity metrics serve far-ranging purposes across many domains in data science. As graph datasets grow in size, scientists need comparative tools that capture meaningful differences, yet are lightweight and scalable. Graph Relative Hausdorff (RH) distance is a promising, recently proposed measure for quantifying degree distribution similarity. In spite of recent interest in RH distance, little is known about its properties. Here, we conduct an algorithmic and analytic study of RH distance. In particular, we provide the first linear-time algorithm for computing RH distance, analyze examples of RH distance between pairs of real-world networks as well as structured families of graphs, and prove several analytic results concerning the range, density, and extremal behavior of RH distance values.
math.CO cs.DM cs.DS
2019-08-08T00:00:00
Sinan G. Aksoy, Kathleen E. Nowak, Stephen J. Young
no_new_dataset
false
0.711541
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1903.01820
Influence of petroleum and gas trade on EU economies from the reduced Google matrix analysis of UN COMTRADE data
Using the United Nations COMTRADE database we apply the reduced Google matrix (REGOMAX) algorithm to analyze the multiproduct world trade in years 2004-2016. Our approach allows to determine the trade balance sensitivity of a group of countries to a specific product price increase from a specific exporting country taking into account all direct and indirect trade pathways via all world countries exchanging 61 UN COMTRADE identified trade products. On the basis of this approach we present the influence of trade in petroleum and gas products from Russia, USA, Saudi Arabia and Norway determining the sensitivity of each EU country. We show that the REGOMAX approach provides a new and more detailed analysis of trade influence propagation comparing to the usual approach based on export and import flows.
q-fin.ST cs.SI physics.soc-ph
2019-08-08T00:00:00
C\'elestin Coquid\'e, Leonardo Ermann, Jos\'e Lages, D.L. Shepelyansky
no_new_dataset
false
0.706262
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1903.02499
Human Attention in Image Captioning: Dataset and Analysis
In this work, we present a novel dataset consisting of eye movements and verbal descriptions recorded synchronously over images. Using this data, we study the differences in human attention during free-viewing and image captioning tasks. We look into the relationship between human attention and language constructs during perception and sentence articulation. We also analyse attention deployment mechanisms in the top-down soft attention approach that is argued to mimic human attention in captioning tasks, and investigate whether visual saliency can help image captioning. Our study reveals that (1) human attention behaviour differs in free-viewing and image description tasks. Humans tend to fixate on a greater variety of regions under the latter task, (2) there is a strong relationship between described objects and attended objects ($97\%$ of the described objects are being attended), (3) a convolutional neural network as feature encoder accounts for human-attended regions during image captioning to a great extent (around $78\%$), (4) soft-attention mechanism differs from human attention, both spatially and temporally, and there is low correlation between caption scores and attention consistency scores. These indicate a large gap between humans and machines in regards to top-down attention, and (5) by integrating the soft attention model with image saliency, we can significantly improve the model's performance on Flickr30k and MSCOCO benchmarks. The dataset can be found at: https://github.com/SenHe/Human-Attention-in-Image-Captioning.
cs.CV
2019-08-08T00:00:00
Sen He, Hamed R. Tavakoli, Ali Borji, Nicolas Pugeault
new_dataset
true
0.711102
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1903.07417
The effects of trap-confinement and interatomic interactions on Josephson effects and macroscopic quantum self-trapping for a Bose-Einstein Condensate
We theoretically study the effects of trap-confinement and interatomic interactions on Josephson oscillations (JO) and macroscopic quantum self-trapping (MQST) for a Bose-Einstein condensate (BEC) confined in a trap which has a symmetric double-well (DW) potential along z-axis and 2D harmonic potentials along x- and y-axis. We consider three types of model interaction potentials: contact, long-range dipolar and finite-range potentials. Our results show that by changing the aspect ratio between the axial and radial trap sizes, one can induce a transition from JO to MQST for contact interactions with a small scattering length. For long-range dipolar interatomic interactions, we analyze transition from Rabi to Josephson regime and Josephson to MQST regime by changing the aspect ratio of the trap for a particular dipolar orientation. For a finite-range interaction, we study the effects of relatively large scattering length and effective range on JO and MQST. We show that JO and MQST are possible even if scattering length is relatively large, particularly near a narrow Feshbach resonance due to the finite-range effects.
physics.atom-ph cond-mat.quant-gas
2019-08-08T00:00:00
Abhik Kumar Saha, Kingshuk Adhikary, Subhanka Mal, Krishna Rai Dastidar and Bimalendu Deb
no_new_dataset
false
0.711054
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1903.08297
Deep Neural Networks Improve Radiologists' Performance in Breast Cancer Screening
We present a deep convolutional neural network for breast cancer screening exam classification, trained and evaluated on over 200,000 exams (over 1,000,000 images). Our network achieves an AUC of 0.895 in predicting whether there is a cancer in the breast, when tested on the screening population. We attribute the high accuracy of our model to a two-stage training procedure, which allows us to use a very high-capacity patch-level network to learn from pixel-level labels alongside a network learning from macroscopic breast-level labels. To validate our model, we conducted a reader study with 14 readers, each reading 720 screening mammogram exams, and find our model to be as accurate as experienced radiologists when presented with the same data. Finally, we show that a hybrid model, averaging probability of malignancy predicted by a radiologist with a prediction of our neural network, is more accurate than either of the two separately. To better understand our results, we conduct a thorough analysis of our network's performance on different subpopulations of the screening population, model design, training procedure, errors, and properties of its internal representations.
cs.LG cs.CV stat.ML
2019-08-08T00:00:00
Nan Wu, Jason Phang, Jungkyu Park, Yiqiu Shen, Zhe Huang, Masha Zorin, Stanis{\l}aw Jastrz\k{e}bski, Thibault F\'evry, Joe Katsnelson, Eric Kim, Stacey Wolfson, Ujas Parikh, Sushma Gaddam, Leng Leng Young Lin, Kara Ho, Joshua D. Weinstein, Beatriu Reig, Yiming Gao, Hildegard Toth, Kristine Pysarenko, Alana Lewin, Jiyon Lee, Krystal Airola, Eralda Mema, Stephanie Chung, Esther Hwang, Naziya Samreen, S. Gene Kim, Laura Heacock, Linda Moy, Kyunghyun Cho and Krzysztof J. Geras
no_new_dataset
false
0.709732
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1903.09799
Improving Adversarial Robustness via Guided Complement Entropy
Adversarial robustness has emerged as an important topic in deep learning as carefully crafted attack samples can significantly disturb the performance of a model. Many recent methods have proposed to improve adversarial robustness by utilizing adversarial training or model distillation, which adds additional procedures to model training. In this paper, we propose a new training paradigm called Guided Complement Entropy (GCE) that is capable of achieving "adversarial defense for free," which involves no additional procedures in the process of improving adversarial robustness. In addition to maximizing model probabilities on the ground-truth class like cross-entropy, we neutralize its probabilities on the incorrect classes along with a "guided" term to balance between these two terms. We show in the experiments that our method achieves better model robustness with even better performance compared to the commonly used cross-entropy training objective. We also show that our method can be used orthogonal to adversarial training across well-known methods with noticeable robustness gain. To the best of our knowledge, our approach is the first one that improves model robustness without compromising performance.
cs.LG cs.CV cs.PF stat.ML
2019-08-08T00:00:00
Hao-Yun Chen, Jhao-Hong Liang, Shih-Chieh Chang, Jia-Yu Pan, Yu-Ting Chen, Wei Wei, Da-Cheng Juan
no_new_dataset
false
0.711114
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1904.02912
Point-to-Point Video Generation
While image manipulation achieves tremendous breakthroughs (e.g., generating realistic faces) in recent years, video generation is much less explored and harder to control, which limits its applications in the real world. For instance, video editing requires temporal coherence across multiple clips and thus poses both start and end constraints within a video sequence. We introduce point-to-point video generation that controls the generation process with two control points: the targeted start- and end-frames. The task is challenging since the model not only generates a smooth transition of frames, but also plans ahead to ensure that the generated end-frame conforms to the targeted end-frame for videos of various length. We propose to maximize the modified variational lower bound of conditional data likelihood under a skip-frame training strategy. Our model can generate sequences such that their end-frame is consistent with the targeted end-frame without loss of quality and diversity. Extensive experiments are conducted on Stochastic Moving MNIST, Weizmann Human Action, and Human3.6M to evaluate the effectiveness of the proposed method. We demonstrate our method under a series of scenarios (e.g., dynamic length generation) and the qualitative results showcase the potential and merits of point-to-point generation. For project page, see https://zswang666.github.io/P2PVG-Project-Page/
cs.CV
2019-08-08T00:00:00
Tsun-Hsuan Wang, Yen-Chi Cheng, Chieh Hubert Lin, Hwann-Tzong Chen, Min Sun
no_new_dataset
false
0.712332
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1904.04978
Data Priming Network for Automatic Check-Out
Automatic Check-Out (ACO) receives increased interests in recent years. An important component of the ACO system is the visual item counting, which recognizes the categories and counts of the items chosen by the customers. However, the training of such a system is challenged by the domain adaptation problem, in which the training data are images from isolated items while the testing images are for collections of items. Existing methods solve this problem with data augmentation using synthesized images, but the image synthesis leads to unreal images that affect the training process. In this paper, we propose a new data priming method to solve the domain adaptation problem. Specifically, we first use pre-augmentation data priming, in which we remove distracting background from the training images using the coarse-to-fine strategy and select images with realistic view angles by the pose pruning method. In the post-augmentation step, we train a data priming network using detection and counting collaborative learning, and select more reliable images from testing data to fine-tune the final visual item tallying network. Experiments on the large scale Retail Product Checkout (RPC) dataset demonstrate the superiority of the proposed method, i.e., we achieve 80.51% checkout accuracy compared with 56.68% of the baseline methods. The source codes can be found in https://isrc.iscas.ac.cn/gitlab/research/acm-mm-2019-ACO.
cs.CV cs.LG
2019-08-08T00:00:00
Congcong Li, Dawei Du, Libo Zhang, Tiejian Luo, Yanjun Wu, Qi Tian, Longyin Wen, Siwei Lyu
no_new_dataset
false
0.710873
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1904.07863
Resilience Dynamics of Urban Water Security and Potential for Tipping Points
Cities are the drivers of socio-economic innovation, and are also forced to address the accelerating risk of failure in providing essential services such as water supply today and in the future. Here, we investigate the resilience of urban water supply security, which is defined in terms of the services that citizens receive. The resilience of services is determined by the availability and robustness of critical system elements, or 'capitals' (water resources, infrastructure, finances, management efficacy and community adaptation). We translate quantitative information about this portfolio of capitals from seven contrasting cities on four continents into parameters of a coupled systems dynamics model. Water services are disrupted by recurring stochastic shocks, and we simulate the dynamics of impact and recovery cycles. Resilience emerges under various constraints, expressed in terms of each city's capital portfolio. Systematic assessment of the parameter space produces the urban water resilience landscape, and we determine the position of each city along a continuous gradient from water insecure and non-resilient to secure and resilient systems. In several cities stochastic disturbance regimes challenge steady-state conditions and drive system collapse. While water insecure and non-resilient cities risk being pushed into a poverty trap, cities which have developed excess capitals risk being trapped in rigidity and crossing a tipping point from high to low services and collapse. Where public services are insufficient, community adaptation improves water security and resilience to varying degrees. Our results highlight the need for resilience thinking in the governance of urban water systems under global change pressures.
physics.soc-ph
2019-08-08T00:00:00
Elisabeth H. Krueger, Dietrich Borchardt, James W. Jawitz, Harald Klammler, Soohyun Yang, Jonatan Zischg and P. Suresh C. Rao
no_new_dataset
false
0.707358
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1904.09658
Probabilistic Face Embeddings
Embedding methods have achieved success in face recognition by comparing facial features in a latent semantic space. However, in a fully unconstrained face setting, the facial features learned by the embedding model could be ambiguous or may not even be present in the input face, leading to noisy representations. We propose Probabilistic Face Embeddings (PFEs), which represent each face image as a Gaussian distribution in the latent space. The mean of the distribution estimates the most likely feature values while the variance shows the uncertainty in the feature values. Probabilistic solutions can then be naturally derived for matching and fusing PFEs using the uncertainty information. Empirical evaluation on different baseline models, training datasets and benchmarks show that the proposed method can improve the face recognition performance of deterministic embeddings by converting them into PFEs. The uncertainties estimated by PFEs also serve as good indicators of the potential matching accuracy, which are important for a risk-controlled recognition system.
cs.CV
2019-08-08T00:00:00
Yichun Shi, Anil K. Jain
no_new_dataset
false
0.707952
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1904.10716
Bayesian Gaussian mixture model for robotic policy imitation
A common approach to learn robotic skills is to imitate a demonstrated policy. Due to the compounding of small errors and perturbations, this approach may let the robot leave the states in which the demonstrations were provided. This requires the consideration of additional strategies to guarantee that the robot will behave appropriately when facing unknown states. We propose to use a Bayesian method to quantify the action uncertainty at each state. The proposed Bayesian method is simple to set up, computationally efficient, and can adapt to a wide range of problems. Our approach exploits the estimated uncertainty to fuse the imitation policy with additional policies. It is validated on a Panda robot with the imitation of three manipulation tasks in the continuous domain using different control input/state pairs.
cs.RO
2019-08-08T00:00:00
Emmanuel Pignat and Sylvain Calinon
no_new_dataset
false
0.709003
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1904.11147
A compact subcell WENO limiting strategy using immediate neighbors for Runge-Kutta Discontinuous Galerkin Methods
A compact subcell WENO (CSWENO) limiter is proposed for the solution of hyperbolic conservation laws with Discontinuous Galerkin Method which uses only the immediate neighbors of a given cell. These neighbors are divided into the required stencil for WENO reconstruction and an existing WENO limiting strategy is used. Accuracy tests and results for one-dimensional and two-dimensional Burgers equation and one-dimensional and two-dimensional Euler equations for Cartesian meshes are presented using this limiter. Comparisons with the parent WENO limiter are provided wherever appropriate and the performance of the current limiter is found to be slightly better than the parent WENO limiter for higher orders.
cs.NA math.NA
2019-08-08T00:00:00
S R Siva Prasad Kochi and M Ramakrishna
no_new_dataset
false
0.710302
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1904.11544
Probing What Different NLP Tasks Teach Machines about Function Word Comprehension
We introduce a set of nine challenge tasks that test for the understanding of function words. These tasks are created by structurally mutating sentences from existing datasets to target the comprehension of specific types of function words (e.g., prepositions, wh-words). Using these probing tasks, we explore the effects of various pretraining objectives for sentence encoders (e.g., language modeling, CCG supertagging and natural language inference (NLI)) on the learned representations. Our results show that pretraining on language modeling performs the best on average across our probing tasks, supporting its widespread use for pretraining state-of-the-art NLP models, and CCG supertagging and NLI pretraining perform comparably. Overall, no pretraining objective dominates across the board, and our function word probing tasks highlight several intuitive differences between pretraining objectives, e.g., that NLI helps the comprehension of negation.
cs.CL
2019-08-08T00:00:00
Najoung Kim, Roma Patel, Adam Poliak, Alex Wang, Patrick Xia, R. Thomas McCoy, Ian Tenney, Alexis Ross, Tal Linzen, Benjamin Van Durme, Samuel R. Bowman, Ellie Pavlick
no_new_dataset
false
0.660163
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1904.12757
On the Angular Dependence of InP High Electron Mobility Transistors for Cryogenic Low Noise Amplifiers in a Magnetic Field
The InGaAs-InAlAs-InP high electron mobility transistor (InP HEMT) is the preferred active device used in a cryogenic low noise amplifier (LNA) for sensitive detection of microwave signals. We observed that an InP HEMT 0.3-14GHz LNA at 2K, where the in-going transistors were oriented perpendicular to a magnetic field, heavily degraded in gain and average noise temperature already up to 1.5T. Dc measurements for InP HEMTs at 2K revealed a strong reduction in the transistor output current as a function of static magnetic field up to 14T. In contrast, the current reduction was insignificant when the InP HEMT was oriented parallel to the magnetic field. Given the transistor layout with large gate width/gate length ratio, the results suggest a strong geometrical magnetoresistance effect occurring in the InP HEMT. This was confirmed in the angular dependence of the transistor output current with respect to the magnetic field. Key device parameters such as transconductance and on-resistance were significantly affected at small angles and magnetic fields. The strong angular dependence of the InP HEMT output current in a magnetic field has important implications for the alignment of cryogenic LNAs in microwave detection experiments involving magnetic fields.
physics.app-ph cond-mat.mes-hall
2019-08-08T00:00:00
Isabel Harrysson Rodrigues, David Niepce, Arsalan Pourkabirian, Giuseppe Moschetti, Joel Schleeh, Thilo Bauch and Jan Grahn
no_new_dataset
false
0.713583
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1905.00399
Network Calculus-based Timing Analysis of AFDX networks incorporating multiple TSN/BLS traffic classes
We propose a formal timing analysis of an extension of the AFDX standard, incorporating the TSN/BLS shaper, to homogenize the avionics communication architecture, and enable the interconnection of different avionics domains with mixed-criticality levels, e.g., current AFDX traffic, Flight Control and In-Flight Entertainment. Existing Network Calculus models are limited to three classes, but applications with heterogeneous traffic require additional classes. Hence, we propose to generalize an existing Network Calculus model to do a worst-case timing analysis of an architecture with multiple BLS on multi-hop networks, to infer real-time bounds. Then, we conduct the performance analysis of such a proposal. First we evaluate the model on a simple 3-classes single-hop network to assess the sensitivity and tightness of the model, and compare it to existing models (CPA and Network Calculus). Secondly, we study a realistic AFDX configuration with six classes and two BLS. Finally, we compute a real use-case to add A350 flight control traffic to the AFDX. Results show the good properties of the generalized Network Calculus model compared to the CPA model and the efficiency of the extended AFDX to noticeably enhance the medium priority level delay bounds, while respecting the higher priority level constraints, in comparison with the current AFDX standard.
cs.NI
2019-08-08T00:00:00
Anais Finzi and Ahlem Mifdaoui and Fabrice Frances and Emmanuel Lochin
no_new_dataset
false
0.708686
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1905.01926
Zero-Shot Audio Classification Based on Class Label Embeddings
This paper proposes a zero-shot learning approach for audio classification based on the textual information about class labels without any audio samples from target classes. We propose an audio classification system built on the bilinear model, which takes audio feature embeddings and semantic class label embeddings as input, and measures the compatibility between an audio feature embedding and a class label embedding. We use VGGish to extract audio feature embeddings from audio recordings. We treat textual labels as semantic side information of audio classes, and use Word2Vec to generate class label embeddings. Results on the ESC-50 dataset show that the proposed system can perform zero-shot audio classification with small training dataset. It can achieve accuracy (26 % on average) better than random guess (10 %) on each audio category. Particularly, it reaches up to 39.7 % for the category of natural audio classes.
cs.LG cs.SD eess.AS stat.ML
2019-08-08T00:00:00
Huang Xie, Tuomas Virtanen
no_new_dataset
false
0.710928
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1905.05134
What Clinicians Want: Contextualizing Explainable Machine Learning for Clinical End Use
Translating machine learning (ML) models effectively to clinical practice requires establishing clinicians' trust. Explainability, or the ability of an ML model to justify its outcomes and assist clinicians in rationalizing the model prediction, has been generally understood to be critical to establishing trust. However, the field suffers from the lack of concrete definitions for usable explanations in different settings. To identify specific aspects of explainability that may catalyze building trust in ML models, we surveyed clinicians from two distinct acute care specialties (Intenstive Care Unit and Emergency Department). We use their feedback to characterize when explainability helps to improve clinicians' trust in ML models. We further identify the classes of explanations that clinicians identified as most relevant and crucial for effective translation to clinical practice. Finally, we discern concrete metrics for rigorous evaluation of clinical explainability methods. By integrating perceptions of explainability between clinicians and ML researchers we hope to facilitate the endorsement and broader adoption and sustained use of ML systems in healthcare.
cs.LG stat.ML
2019-08-08T00:00:00
Sana Tonekaboni, Shalmali Joshi, Melissa D McCradden, Anna Goldenberg
no_new_dataset
false
0.711116
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1905.07880
Independent Vector Analysis with more Microphones than Sources
We extend frequency-domain blind source separation based on independent vector analysis to the case where there are more microphones than sources. The signal is modelled as non-Gaussian sources in a Gaussian background. The proposed algorithm is based on a parametrization of the demixing matrix decreasing the number of parameters to estimate. Furthermore, orthogonal constraints between the signal and background subspaces are imposed to regularize the separation. The problem can then be posed as a constrained likelihood maximization. We propose efficient alternating updates guaranteed to converge to a stationary point of the cost function. The performance of the algorithm is assessed on simulated signals. We find that the separation performance is on par with that of the conventional determined algorithm at a fraction of the computational cost.
cs.SD eess.AS
2019-08-08T00:00:00
Robin Scheibler and Nobutaka Ono
no_new_dataset
false
0.707982
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
1905.08410
Inter-plane satellite matching in dense LEO constellations
Dense constellations of Low Earth Orbit (LEO) small satellites are envisioned to make extensive use of the inter-satellite link (ISL). Within the same orbital plane, the inter-satellite distances are preserved and the links are rather stable. In contrast, the relative motion between planes makes the inter-plane ISL challenging. In a dense set-up, each spacecraft has several satellites in its coverage volume, but the time duration of each of these links is small and the maximum number of active connections is limited by the hardware. We analyze the matching problem of connecting satellites using the inter-plane ISL for unicast transmissions. We present and evaluate the performance of two solutions to the matching problem with any number of orbital planes and up to two transceivers: a heuristic solution with the aim of minimizing the total cost; and a Markovian solution to maintain the on-going connections as long as possible. The Markovian algorithm reduces the time needed to solve the matching up to 1000x and 10x with respect to the optimal solution and to the heuristic solution, respectively, without compromising the total cost. Our model includes power adaptation and optimizes the network energy consumption as the exemplary cost in the evaluations, but any other QoS-oriented KPI can be used instead.
cs.IT eess.SP math.IT
2019-08-08T00:00:00
Beatriz Soret, Israel Leyva-Mayorga, Petar Popovski
no_new_dataset
false
0.71013
2026-01-30T10:28:21.683723
davanstrien/ModernBERT-base-is-new-arxiv-dataset
null
null
End of preview. Expand in Data Studio

No dataset card yet

Downloads last month
22