text
stringlengths 138
2.38k
| labels
sequencelengths 6
6
| Predictions
sequencelengths 1
3
|
---|---|---|
Title: Adversarial Pseudo Healthy Synthesis Needs Pathology Factorization,
Abstract: Pseudo healthy synthesis, i.e. the creation of a subject-specific `healthy'
image from a pathological one, could be helpful in tasks such as anomaly
detection, understanding changes induced by pathology and disease or even as
data augmentation. We treat this task as a factor decomposition problem: we aim
to separate what appears to be healthy and where disease is (as a map). The two
factors are then recombined (by a network) to reconstruct the input disease
image. We train our models in an adversarial way using either paired or
unpaired settings, where we pair disease images and maps (as segmentation
masks) when available. We quantitatively evaluate the quality of pseudo healthy
images. We show in a series of experiments, performed in ISLES and BraTS
datasets, that our method is better than conditional GAN and CycleGAN,
highlighting challenges in using adversarial methods in the image translation
task of pseudo healthy image generation. | [
1,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Quantitative Biology"
] |
Title: Integrable structure of products of finite complex Ginibre random matrices,
Abstract: We consider the squared singular values of the product of $M$ standard
complex Gaussian matrices. Since the squared singular values form a
determinantal point process with a particular Meijer G-function kernel, the gap
probabilities are given by a Fredholm determinant based on this kernel. It was
shown by Strahov \cite{St14} that a hard edge scaling limit of the gap
probabilities is described by Hamiltonian differential equations which can be
formulated as an isomonodromic deformation system similar to the theory of the
Kyoto school. We generalize this result to the case of finite matrices by first
finding a representation of the finite kernel in integrable form. As a result
we obtain the Hamiltonian structure for a finite size matrices and formulate it
in terms of a $(M+1) \times (M+1)$ matrix Schlesinger system. The case $M=1$
reproduces the Tracy and Widom theory which results in the Painlevé V
equation for the $(0,s)$ gap probability. Some integrals of motion for $M = 2$
are identified, and a coupled system of differential equations in two unknowns
is presented which uniquely determines the corresponding $(0,s)$ gap
probability. | [
0,
1,
1,
0,
0,
0
] | [
"Mathematics",
"Statistics",
"Physics"
] |
Title: Superintegrable systems on 3-dimensional curved spaces: Eisenhart formalism and separability,
Abstract: The Eisenhart geometric formalism, which transforms an Euclidean natural
Hamiltonian $H=T+V$ into a geodesic Hamiltonian ${\cal T}$ with one additional
degree of freedom, is applied to the four families of quadratically
superintegrable systems with multiple separability in the Euclidean plane.
Firstly, the separability and superintegrability of such four geodesic
Hamiltonians ${\cal T}_r$ ($r=a,b,c,d$) in a three-dimensional curved space are
studied and then these four systems are modified with the addition of a
potential ${\cal U}_r$ leading to ${\cal H}_r={\cal T}_r +{\cal U}_r$.
Secondly, we study the superintegrability of the four Hamiltonians
$\widetilde{\cal H}_r= {\cal H}_r/ \mu_r$, where $\mu_r$ is a certain
position-dependent mass, that enjoys the same separability as the original
system ${\cal H}_r$. All the Hamiltonians here studied describe superintegrable
systems on non-Euclidean three-dimensional manifolds with a broken spherically
symmetry. | [
0,
1,
1,
0,
0,
0
] | [
"Physics",
"Mathematics"
] |
Title: Optimal Gossip Algorithms for Exact and Approximate Quantile Computations,
Abstract: This paper gives drastically faster gossip algorithms to compute exact and
approximate quantiles.
Gossip algorithms, which allow each node to contact a uniformly random other
node in each round, have been intensely studied and been adopted in many
applications due to their fast convergence and their robustness to failures.
Kempe et al. [FOCS'03] gave gossip algorithms to compute important aggregate
statistics if every node is given a value. In particular, they gave a beautiful
$O(\log n + \log \frac{1}{\epsilon})$ round algorithm to $\epsilon$-approximate
the sum of all values and an $O(\log^2 n)$ round algorithm to compute the exact
$\phi$-quantile, i.e., the the $\lceil \phi n \rceil$ smallest value.
We give an quadratically faster and in fact optimal gossip algorithm for the
exact $\phi$-quantile problem which runs in $O(\log n)$ rounds. We furthermore
show that one can achieve an exponential speedup if one allows for an
$\epsilon$-approximation. We give an $O(\log \log n + \log \frac{1}{\epsilon})$
round gossip algorithm which computes a value of rank between $\phi n$ and
$(\phi+\epsilon)n$ at every node.% for any $0 \leq \phi \leq 1$ and $0 <
\epsilon < 1$. Our algorithms are extremely simple and very robust - they can
be operated with the same running times even if every transmission fails with
a, potentially different, constant probability. We also give a matching
$\Omega(\log \log n + \log \frac{1}{\epsilon})$ lower bound which shows that
our algorithm is optimal for all values of $\epsilon$. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science",
"Mathematics"
] |
Title: A parallel approach to bi-objective integer programming,
Abstract: To obtain a better understanding of the trade-offs between various
objectives, Bi-Objective Integer Programming (BOIP) algorithms calculate the
set of all non-dominated vectors and present these as the solution to a BOIP
problem. Historically, these algorithms have been compared in terms of the
number of single-objective IPs solved and total CPU time taken to produce the
solution to a problem. This is equitable, as researchers can often have access
to widely differing amounts of computing power. However, the real world has
recently seen a large uptake of multi-core processors in computers, laptops,
tablets and even mobile phones. With this in mind, we look at how to best
utilise parallel processing to improve the elapsed time of optimisation
algorithms. We present two methods of parallelising the recursive algorithm
presented by Ozlen, Burton and MacRae. Both new methods utilise two threads and
improve running times. One of the new methods, the Meeting algorithm, halves
running time to achieve near-perfect parallelisation. The results are compared
with the efficiency of parallelisation within the commercial IP solver IBM ILOG
CPLEX, and the new methods are both shown to perform better. | [
1,
0,
1,
0,
0,
0
] | [
"Computer Science",
"Mathematics"
] |
Title: Vehicle Localization and Control on Roads with Prior Grade Map,
Abstract: We propose a map-aided vehicle localization method for GPS-denied
environments. This approach exploits prior knowledge of the road grade map and
vehicle on-board sensor measurements to accurately estimate the longitudinal
position of the vehicle. Real-time localization is crucial to systems that
utilize position-dependent information for planning and control. We validate
the effectiveness of the localization method on a hierarchical control system.
The higher level planner optimizes the vehicle velocity to minimize the energy
consumption for a given route by employing traffic condition and road grade
data. The lower level is a cruise control system that tracks the
position-dependent optimal reference velocity. Performance of the proposed
localization algorithm is evaluated using both simulations and experiments. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science",
"Statistics"
] |
Title: Generalization Bounds of SGLD for Non-convex Learning: Two Theoretical Viewpoints,
Abstract: Algorithm-dependent generalization error bounds are central to statistical
learning theory. A learning algorithm may use a large hypothesis space, but the
limited number of iterations controls its model capacity and generalization
error. The impacts of stochastic gradient methods on generalization error for
non-convex learning problems not only have important theoretical consequences,
but are also critical to generalization errors of deep learning.
In this paper, we study the generalization errors of Stochastic Gradient
Langevin Dynamics (SGLD) with non-convex objectives. Two theories are proposed
with non-asymptotic discrete-time analysis, using Stability and PAC-Bayesian
results respectively. The stability-based theory obtains a bound of
$O\left(\frac{1}{n}L\sqrt{\beta T_k}\right)$, where $L$ is uniform Lipschitz
parameter, $\beta$ is inverse temperature, and $T_k$ is aggregated step sizes.
For PAC-Bayesian theory, though the bound has a slower $O(1/\sqrt{n})$ rate,
the contribution of each step is shown with an exponentially decaying factor by
imposing $\ell^2$ regularization, and the uniform Lipschitz constant is also
replaced by actual norms of gradients along trajectory. Our bounds have no
implicit dependence on dimensions, norms or other capacity measures of
parameter, which elegantly characterizes the phenomenon of "Fast Training
Guarantees Generalization" in non-convex settings. This is the first
algorithm-dependent result with reasonable dependence on aggregated step sizes
for non-convex learning, and has important implications to statistical learning
aspects of stochastic gradient methods in complicated models such as deep
learning. | [
1,
0,
1,
1,
0,
0
] | [
"Computer Science",
"Statistics",
"Mathematics"
] |
Title: Effective gravity and effective quantum equations in a system inspired by walking droplets experiments,
Abstract: In this paper we suggest a macroscopic toy system in which a potential-like
energy is generated by a non-uniform pulsation of the medium (i.e. pulsation of
transverse standing oscillations that the elastic medium of the system tends to
support at each point). This system is inspired by walking droplets experiments
with submerged barriers. We first show that a Poincaré-Lorentz covariant
formalization of the system causes inconsistency and contradiction. The
contradiction is solved by using a general covariant formulation and by
assuming a relation between the metric associated with the elastic medium and
the pulsation of the medium. (Calculations are performed in a Newtonian-like
metric, constant in time). We find ($i$) an effective Schrödinger equation
with external potential, ($ii$) an effective de Broglie-Bohm guidance formula
and ($iii$) an energy of the `particle' which has a direct counterpart in
general relativity as well as in quantum mechanics. We analyze the wave and the
`particle' in an effective free fall and with a harmonic potential. This
potential-like energy is an effective gravitational potential, rooted in the
pulsation of the medium at each point. The latter, also conceivable as a
natural clock, makes easy to understand why proper time varies from place to
place. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: Injective stabilization of additive functors. I. Preliminaries,
Abstract: This paper is the first one in a series of three dealing with the concept of
injective stabilization of the tensor product and its applications. Its primary
goal is to collect known facts and establish a basic operational calculus that
will be used in the subsequent parts. This is done in greater generality than
is necessary for the stated goal. Several results of independent interest are
also established. They include, among other things, connections with
satellites, an explicit construction of the stabilization of a finitely
presented functor, various exactness properties of the injectively stable
functors, a construction, from a functor and a short exact sequence, of a
doubly-infinite exact sequence by splicing the injective stabilization of the
functor and its derived functors. When specialized to the tensor product with a
finitely presented module, the injective stabilization with coefficients in the
ring is isomorphic to the 1-torsion functor. The Auslander-Reiten formula is
extended to a more general formula, which holds for arbitrary (i.e., not
necessarily finite) modules over arbitrary associative rings with identity.
Weakening of the assumptions in the theorems of Eilenberg and Watts leads to
characterizations of the requisite zeroth derived functors.
The subsequent papers, provide applications of the developed techniques.
Part~II deals with new notions of torsion module and cotorsion module of a
module. This is done for arbitrary modules over arbitrary rings. Part~III
introduces a new concept, called the asymptotic stabilization of the tensor
product. The result is closely related to different variants of stable homology
(these are generalizations of Tate homology to arbitrary rings). A comparison
transformation from Vogel homology to the asymptotic stabilization of the
tensor product is constructed and shown to be epic. | [
0,
0,
1,
0,
0,
0
] | [
"Mathematics"
] |
Title: The heavy path approach to Galton-Watson trees with an application to Apollonian networks,
Abstract: We study the heavy path decomposition of conditional Galton-Watson trees. In
a standard Galton-Watson tree conditional on its size $n$, we order all
children by their subtree sizes, from large (heavy) to small. A node is marked
if it is among the $k$ heaviest nodes among its siblings. Unmarked nodes and
their subtrees are removed, leaving only a tree of marked nodes, which we call
the $k$-heavy tree. We study various properties of these trees, including their
size and the maximal distance from any original node to the $k$-heavy tree. In
particular, under some moment condition, the $2$-heavy tree is with high
probability larger than $cn$ for some constant $c > 0$, and the maximal
distance from the $k$-heavy tree is $O(n^{1/(k+1)})$ in probability. As a
consequence, for uniformly random Apollonian networks of size $n$, the expected
size of the longest simple path is $\Omega(n)$. | [
1,
0,
1,
0,
0,
0
] | [
"Mathematics",
"Statistics"
] |
Title: A fast algorithm for maximal propensity score matching,
Abstract: We present a new algorithm which detects the maximal possible number of
matched disjoint pairs satisfying a given caliper when a bipartite matching is
done with respect to a scalar index (e.g., propensity score), and constructs a
corresponding matching. Variable width calipers are compatible with the
technique, provided that the width of the caliper is a Lipschitz function of
the index. If the observations are ordered with respect to the index then the
matching needs $O(N)$ operations, where $N$ is the total number of subjects to
be matched. The case of 1-to-$n$ matching is also considered.
We offer also a new fast algorithm for optimal complete one-to-one matching
on a scalar index when the treatment and control groups are of the same size.
This allows us to improve greedy nearest neighbor matching on a scalar index.
Keywords: propensity score matching, nearest neighbor matching, matching with
caliper, variable width caliper. | [
1,
0,
0,
1,
0,
0
] | [
"Statistics",
"Computer Science"
] |
Title: Challenges testing the no-hair theorem with gravitational waves,
Abstract: General relativity's no-hair theorem states that isolated astrophysical black
holes are described by only two numbers: mass and spin. As a consequence, there
are strict relationships between the frequency and damping time of the
different modes of a perturbed Kerr black hole. Testing the no-hair theorem has
been a longstanding goal of gravitational-wave astronomy. The recent detection
of gravitational waves from black hole mergers would seem to make such tests
imminent. We investigate how constraints on black hole ringdown parameters
scale with the loudness of the ringdown signal---subject to the constraint that
the post-merger remnant must be allowed to settle into a perturbative,
Kerr-like state. In particular, we require that---for a given detector---the
gravitational waveform predicted by numerical relativity is indistinguishable
from an exponentially damped sine after time $t^\text{cut}$. By requiring the
post-merger remnant to settle into such a perturbative state, we find that
confidence intervals for ringdown parameters do not necessarily shrink with
louder signals. In at least some cases, more sensitive measurements probe later
times without necessarily providing tighter constraints on ringdown frequencies
and damping times. Preliminary investigations are unable to explain this result
in terms of a numerical relativity artifact. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: The Australian PCEHR system: Ensuring Privacy and Security through an Improved Access Control Mechanism,
Abstract: An Electronic Health Record (EHR) is designed to store diverse data
accurately from a range of health care providers and to capture the status of a
patient by a range of health care providers across time. Realising the numerous
benefits of the system, EHR adoption is growing globally and many countries
invest heavily in electronic health systems. In Australia, the Government
invested $467 million to build key components of the Personally Controlled
Electronic Health Record (PCEHR) system in July 2012. However, in the last
three years, the uptake from individuals and health care providers has not been
satisfactory. Unauthorised access of the PCEHR was one of the major barriers.
We propose an improved access control model for the PCEHR system to resolve the
unauthorised access issue. We discuss the unauthorised access issue with real
examples and present a potential solution to overcome the issue to make the
PCEHR system a success in Australia. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science"
] |
Title: Optimal Transport: Fast Probabilistic Approximation with Exact Solvers,
Abstract: We propose a simple subsampling scheme for fast randomized approximate
computation of optimal transport distances. This scheme operates on a random
subset of the full data and can use any exact algorithm as a black-box
back-end, including state-of-the-art solvers and entropically penalized
versions. It is based on averaging the exact distances between empirical
measures generated from independent samples from the original measures and can
easily be tuned towards higher accuracy or shorter computation times. To this
end, we give non-asymptotic deviation bounds for its accuracy in the case of
discrete optimal transport problems. In particular, we show that in many
important instances, including images (2D-histograms), the approximation error
is independent of the size of the full problem. We present numerical
experiments that demonstrate that a very good approximation in typical
applications can be obtained in a computation time that is several orders of
magnitude smaller than what is required for exact computation of the full
problem. | [
0,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Mathematics"
] |
Title: Separatrix crossing in rotation of a body with changing geometry of masses,
Abstract: We consider free rotation of a body whose parts move slowly with respect to
each other under the action of internal forces. This problem can be considered
as a perturbation of the Euler-Poinsot problem. The dynamics has an approximate
conservation law - an adiabatic invariant. This allows to describe the
evolution of rotation in the adiabatic approximation. The evolution leads to an
overturn in the rotation of the body: the vector of angular velocity crosses
the separatrix of the Euler-Poinsot problem. This crossing leads to a
quasi-random scattering in body's dynamics. We obtain formulas for
probabilities of capture into different domains in the phase space at
separatrix crossings. | [
0,
1,
0,
0,
0,
0
] | [
"Physics",
"Mathematics"
] |
Title: Path-by-path regularization by noise for scalar conservation laws,
Abstract: We prove a path-by-path regularization by noise result for scalar
conservation laws. In particular, this proves regularizing properties for
scalar conservation laws driven by fractional Brownian motion and generalizes
the respective results obtained in [Gess, Souganidis; Comm. Pure Appl. Math.
(2017)]. In addition, we introduce a new path-by-path scaling property which is
shown to be sufficient to imply regularizing effects. | [
0,
0,
1,
0,
0,
0
] | [
"Mathematics",
"Statistics"
] |
Title: An End-to-End Trainable Neural Network Model with Belief Tracking for Task-Oriented Dialog,
Abstract: We present a novel end-to-end trainable neural network model for
task-oriented dialog systems. The model is able to track dialog state, issue
API calls to knowledge base (KB), and incorporate structured KB query results
into system responses to successfully complete task-oriented dialogs. The
proposed model produces well-structured system responses by jointly learning
belief tracking and KB result processing conditioning on the dialog history. We
evaluate the model in a restaurant search domain using a dataset that is
converted from the second Dialog State Tracking Challenge (DSTC2) corpus.
Experiment results show that the proposed model can robustly track dialog state
given the dialog history. Moreover, our model demonstrates promising results in
producing appropriate system responses, outperforming prior end-to-end
trainable neural network models using per-response accuracy evaluation metrics. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science"
] |
Title: Convexification of Queueing Formulas by Mixed-Integer Second-Order Cone Programming: An Application to a Discrete Location Problem with Congestion,
Abstract: Mixed-Integer Second-Order Cone Programs (MISOCPs) form a nice class of
mixed-inter convex programs, which can be solved very efficiently due to the
recent advances in optimization solvers. Our paper bridges the gap between
modeling a class of optimization problems and using MISOCP solvers. It is shown
how various performance metrics of M/G/1 queues can be molded by different
MISOCPs. To motivate our method practically, it is first applied to a
challenging stochastic location problem with congestion, which is broadly used
to design socially optimal service networks. Four different MISOCPs are
developed and compared on sets of benchmark test problems. The new formulations
efficiently solve large-size test problems, which cannot be solved by the best
existing method. Then, the general applicability of our method is shown for
similar optimization problems that use queue-theoretic performance measures to
address customer satisfaction and service quality. | [
1,
0,
0,
0,
0,
0
] | [
"Mathematics",
"Computer Science"
] |
Title: Discriminative Metric Learning with Deep Forest,
Abstract: A Discriminative Deep Forest (DisDF) as a metric learning algorithm is
proposed in the paper. It is based on the Deep Forest or gcForest proposed by
Zhou and Feng and can be viewed as a gcForest modification. The case of the
fully supervised learning is studied when the class labels of individual
training examples are known. The main idea underlying the algorithm is to
assign weights to decision trees in random forest in order to reduce distances
between objects from the same class and to increase them between objects from
different classes. The weights are training parameters. A specific objective
function which combines Euclidean and Manhattan distances and simplifies the
optimization problem for training the DisDF is proposed. The numerical
experiments illustrate the proposed distance metric algorithm. | [
1,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics"
] |
Title: Controllability of Conjunctive Boolean Networks with Application to Gene Regulation,
Abstract: A Boolean network is a finite state discrete time dynamical system. At each
step, each variable takes a value from a binary set. The value update rule for
each variable is a local function which depends only on a selected subset of
variables. Boolean networks have been used in modeling gene regulatory
networks. We focus in this paper on a special class of Boolean networks, namely
the conjunctive Boolean networks (CBNs), whose value update rule is comprised
of only logic AND operations. It is known that any trajectory of a Boolean
network will enter a periodic orbit. Periodic orbits of a CBN have been
completely understood. In this paper, we investigate the orbit-controllability
and state-controllability of a CBN: We ask the question of how one can steer a
CBN to enter any periodic orbit or to reach any final state, from any initial
state. We establish necessary and sufficient conditions for a CBN to be
orbit-controllable and state-controllable. Furthermore, explicit control laws
are presented along the analysis. | [
0,
0,
1,
0,
0,
0
] | [
"Computer Science",
"Mathematics",
"Quantitative Biology"
] |
Title: Challenges to Keeping the Computer Industry Centered in the US,
Abstract: It is undeniable that the worldwide computer industry's center is the US,
specifically in Silicon Valley. Much of the reason for the success of Silicon
Valley had to do with Moore's Law: the observation by Intel co-founder Gordon
Moore that the number of transistors on a microchip doubled at a rate of
approximately every two years. According to the International Technology
Roadmap for Semiconductors, Moore's Law will end in 2021. How can we rethink
computing technology to restart the historic explosive performance growth?
Since 2012, the IEEE Rebooting Computing Initiative (IEEE RCI) has been working
with industry and the US government to find new computing approaches to answer
this question. In parallel, the CCC has held a number of workshops addressing
similar questions. This whitepaper summarizes some of the IEEE RCI and CCC
findings. The challenge for the US is to lead this new era of computing. Our
international competitors are not sitting still: China has invested
significantly in a variety of approaches such as neuromorphic computing, chip
fabrication facilities, computer architecture, and high-performance simulation
and data analytics computing, for example. We must act now, otherwise, the
center of the computer industry will move from Silicon Valley and likely move
off shore entirely. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science"
] |
Title: Contiguous Relations, Laplace's Methods and Continued Fractions for 3F2(1),
Abstract: Using contiguous relations we construct an infinite number of continued
fraction expansions for ratios of generalized hypergeometric series 3F2(1). We
establish exact error term estimates for their approximants and prove their
rapid convergences. To do so we develop a discrete version of Laplace's method
for hypergeometric series in addition to the use of ordinary (continuous)
Laplace's method for Euler's hypergeometric integrals. | [
0,
0,
1,
0,
0,
0
] | [
"Mathematics"
] |
Title: A note on the violation of Bell's inequality,
Abstract: With Bell's inequalities one has a formal expression to show how essentially
all local theories of natural phenomena that are formulated within the
framework of realism may be tested using a simple experimental arrangement. For
the case of entangled pairs of spin-1/2 particles we propose an alternative
measurement setup which is consistent to the necessary assumptions
corresponding to the derivation of the Bell inequalities. We find that the Bell
inequalities are never violated with respect to our suggested measurement
process. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: Scalable Realistic Recommendation Datasets through Fractal Expansions,
Abstract: Recommender System research suffers currently from a disconnect between the
size of academic data sets and the scale of industrial production systems. In
order to bridge that gap we propose to generate more massive user/item
interaction data sets by expanding pre-existing public data sets. User/item
incidence matrices record interactions between users and items on a given
platform as a large sparse matrix whose rows correspond to users and whose
columns correspond to items. Our technique expands such matrices to larger
numbers of rows (users), columns (items) and non zero values (interactions)
while preserving key higher order statistical properties. We adapt the
Kronecker Graph Theory to user/item incidence matrices and show that the
corresponding fractal expansions preserve the fat-tailed distributions of user
engagements, item popularity and singular value spectra of user/item
interaction matrices. Preserving such properties is key to building large
realistic synthetic data sets which in turn can be employed reliably to
benchmark Recommender Systems and the systems employed to train them. We
provide algorithms to produce such expansions and apply them to the MovieLens
20 million data set comprising 20 million ratings of 27K movies by 138K users.
The resulting expanded data set has 10 billion ratings, 2 million items and
864K users in its smaller version and can be scaled up or down. A larger
version features 655 billion ratings, 7 million items and 17 million users. | [
1,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics"
] |
Title: Accelerating Discrete Wavelet Transforms on GPUs,
Abstract: The two-dimensional discrete wavelet transform has a huge number of
applications in image-processing techniques. Until now, several papers compared
the performance of such transform on graphics processing units (GPUs). However,
all of them only dealt with lifting and convolution computation schemes. In
this paper, we show that corresponding horizontal and vertical lifting parts of
the lifting scheme can be merged into non-separable lifting units, which halves
the number of steps. We also discuss an optimization strategy leading to a
reduction in the number of arithmetic operations. The schemes were assessed
using the OpenCL and pixel shaders. The proposed non-separable lifting scheme
outperforms the existing schemes in many cases, irrespective of its higher
complexity. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science"
] |
Title: Quantifying the distribution of editorial power and manuscript decision bias at the mega-journal PLOS ONE,
Abstract: We analyzed the longitudinal activity of nearly 7,000 editors at the
mega-journal PLOS ONE over the 10-year period 2006-2015. Using the
article-editor associations, we develop editor-specific measures of power,
activity, article acceptance time, citation impact, and editorial renumeration
(an analogue to self-citation). We observe remarkably high levels of power
inequality among the PLOS ONE editors, with the top-10 editors responsible for
3,366 articles -- corresponding to 2.4% of the 141,986 articles we analyzed.
Such high inequality levels suggest the presence of unintended incentives,
which may reinforce unethical behavior in the form of decision-level biases at
the editorial level. Our results indicate that editors may become apathetic in
judging the quality of articles and susceptible to modes of power-driven
misconduct. We used the longitudinal dimension of editor activity to develop
two panel regression models which test and verify the presence of editor-level
bias. In the first model we analyzed the citation impact of articles, and in
the second model we modeled the decision time between an article being
submitted and ultimately accepted by the editor. We focused on two variables
that represent social factors that capture potential conflicts-of-interest: (i)
we accounted for the social ties between editors and authors by developing a
measure of repeat authorship among an editor's article set, and (ii) we
accounted for the rate of citations directed towards the editor's own
publications in the reference list of each article he/she oversaw. Our results
indicate that these two factors play a significant role in the editorial
decision process. Moreover, these two effects appear to increase with editor
age, which is consistent with behavioral studies concerning the evolution of
misbehavior and response to temptation in power-driven environments. | [
1,
1,
0,
0,
0,
0
] | [
"Statistics",
"Quantitative Biology"
] |
Title: Threshold Constraints with Guarantees for Parity Objectives in Markov Decision Processes,
Abstract: The beyond worst-case synthesis problem was introduced recently by Bruyère
et al. [BFRR14]: it aims at building system controllers that provide strict
worst-case performance guarantees against an antagonistic environment while
ensuring higher expected performance against a stochastic model of the
environment. Our work extends the framework of [BFRR14] and follow-up papers,
which focused on quantitative objectives, by addressing the case of
$\omega$-regular conditions encoded as parity objectives, a natural way to
represent functional requirements of systems.
We build strategies that satisfy a main parity objective on all plays, while
ensuring a secondary one with sufficient probability. This setting raises new
challenges in comparison to quantitative objectives, as one cannot easily mix
different strategies without endangering the functional properties of the
system. We establish that, for all variants of this problem, deciding the
existence of a strategy lies in ${\sf NP} \cap {\sf coNP}$, the same complexity
class as classical parity games. Hence, our framework provides additional
modeling power while staying in the same complexity class.
[BFRR14] Véronique Bruyère, Emmanuel Filiot, Mickael Randour, and
Jean-François Raskin. Meet your expectations with guarantees: Beyond
worst-case synthesis in quantitative games. In Ernst W. Mayr and Natacha
Portier, editors, 31st International Symposium on Theoretical Aspects of
Computer Science, STACS 2014, March 5-8, 2014, Lyon, France, volume 25 of
LIPIcs, pages 199-213. Schloss Dagstuhl - Leibniz - Zentrum fuer Informatik,
2014. | [
1,
0,
1,
0,
0,
0
] | [
"Computer Science",
"Mathematics"
] |
Title: GLSR-VAE: Geodesic Latent Space Regularization for Variational AutoEncoder Architectures,
Abstract: VAEs (Variational AutoEncoders) have proved to be powerful in the context of
density modeling and have been used in a variety of contexts for creative
purposes. In many settings, the data we model possesses continuous attributes
that we would like to take into account at generation time. We propose in this
paper GLSR-VAE, a Geodesic Latent Space Regularization for the Variational
AutoEncoder architecture and its generalizations which allows a fine control on
the embedding of the data into the latent space. When augmenting the VAE loss
with this regularization, changes in the learned latent space reflects changes
of the attributes of the data. This deeper understanding of the VAE latent
space structure offers the possibility to modulate the attributes of the
generated data in a continuous way. We demonstrate its efficiency on a
monophonic music generation task where we manage to generate variations of
discrete sequences in an intended and playful way. | [
1,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics"
] |
Title: A New Torsion Pendulum for Gravitational Reference Sensor Technology Development,
Abstract: We report on the design and sensitivity of a new torsion pendulum for
measuring the performance of ultra-precise inertial sensors and for the
development of associated technologies for space-based gravitational wave
observatories and geodesy missions. The apparatus comprises a 1 m-long, 50
um-diameter, tungsten fiber that supports an inertial member inside a vacuum
system. The inertial member is an aluminum crossbar with four hollow cubic test
masses at each end. This structure converts the rotation of the torsion
pendulum into translation of the test masses. Two test masses are enclosed in
capacitive sensors which provide readout and actuation. These test masses are
electrically insulated from the rest of the cross-bar and their electrical
charge is controlled by photoemission using fiber-coupled ultraviolet light
emitting diodes. The capacitive readout measures the test mass displacement
with a broadband sensitivity of 30 nm / sqrt(Hz), and is complemented by a
laser interferometer with a sensitivity of about 0.5 nm / sqrt(Hz). The
performance of the pendulum, as determined by the measured residual torque
noise and expressed in terms of equivalent force acting on a single test mass,
is roughly 200 fN / sqrt(Hz) around 2 mHz, which is about a factor of 20 above
the thermal noise limit of the fiber. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: Autonomous drone race: A computationally efficient vision-based navigation and control strategy,
Abstract: Drone racing is becoming a popular sport where human pilots have to control
their drones to fly at high speed through complex environments and pass a
number of gates in a pre-defined sequence. In this paper, we develop an
autonomous system for drones to race fully autonomously using only onboard
resources. Instead of commonly used visual navigation methods, such as
simultaneous localization and mapping and visual inertial odometry, which are
computationally expensive for micro aerial vehicles (MAVs), we developed the
highly efficient snake gate detection algorithm for visual navigation, which
can detect the gate at 20HZ on a Parrot Bebop drone. Then, with the gate
detection result, we developed a robust pose estimation algorithm which has
better tolerance to detection noise than a state-of-the-art perspective-n-point
method. During the race, sometimes the gates are not in the drone's field of
view. For this case, a state prediction-based feed-forward control strategy is
developed to steer the drone to fly to the next gate. Experiments show that the
drone can fly a half-circle with 1.5m radius within 2 seconds with only 30cm
error at the end of the circle without any position feedback. Finally, the
whole system is tested in a complex environment (a showroom in the faculty of
Aerospace Engineering, TU Delft). The result shows that the drone can complete
the track of 15 gates with a speed of 1.5m/s which is faster than the speeds
exhibited at the 2016 and 2017 IROS autonomous drone races. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science",
"Physics"
] |
Title: Controlling motile disclinations in a thick nematogenic material with an electric field,
Abstract: Manipulating topological disclination networks that arise in a
symmetry-breaking phase transfor- mation in widely varied systems including
anisotropic materials can potentially lead to the design of novel materials
like conductive microwires, self-assembled resonators, and active anisotropic
matter. However, progress in this direction is hindered by a lack of control of
the kinetics and microstructure due to inherent complexity arising from
competing energy and topology. We have studied thermal and electrokinetic
effects on disclinations in a three-dimensional nonabsorbing nematic material
with a positive and negative sign of the dielectric anisotropy. The electric
flux lines are highly non-uniform in uniaxial media after an electric field
below the Fréedericksz threshold is switched on, and the kinetics of the
disclination lines is slowed down. In biaxial media, depending on the sign of
the dielectric anisotropy, apart from the slowing down of the disclination
kinetics, a non-uniform electric field filters out disclinations of different
topology by inducing a kinetic asymmetry. These results enhance the current
understanding of forced disclination networks and establish the pre- sented
method, which we call fluctuating electronematics, as a potentially useful tool
for designing materials with novel properties in silico. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: Exploiting network topology for large-scale inference of nonlinear reaction models,
Abstract: The development of chemical reaction models aids understanding and prediction
in areas ranging from biology to electrochemistry and combustion. A systematic
approach to building reaction network models uses observational data not only
to estimate unknown parameters, but also to learn model structure. Bayesian
inference provides a natural approach to this data-driven construction of
models. Yet traditional Bayesian model inference methodologies that numerically
evaluate the evidence for each model are often infeasible for nonlinear
reaction network inference, as the number of plausible models can be
combinatorially large. Alternative approaches based on model-space sampling can
enable large-scale network inference, but their realization presents many
challenges. In this paper, we present new computational methods that make
large-scale nonlinear network inference tractable. First, we exploit the
topology of networks describing potential interactions among chemical species
to design improved "between-model" proposals for reversible-jump Markov chain
Monte Carlo. Second, we introduce a sensitivity-based determination of move
types which, when combined with network-aware proposals, yields significant
additional gains in sampling performance. These algorithms are demonstrated on
inference problems drawn from systems biology, with nonlinear differential
equation models of species interactions. | [
1,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics",
"Quantitative Biology"
] |
Title: Dynamics of higher-order rational solitons for the nonlocal nonlinear Schrodinger equation with the self-induced parity-time-symmetric potential,
Abstract: The integrable nonlocal nonlinear Schrodinger (NNLS) equation with the
self-induced parity-time-symmetric potential [Phys. Rev. Lett. 110 (2013)
064105] is investigated, which is an integrable extension of the standard NLS
equation. Its novel higher-order rational solitons are found using the nonlocal
version of the generalized perturbation (1, N-1)-fold Darboux transformation.
These rational solitons illustrate abundant wave structures for the distinct
choices of parameters (e.g., the strong and weak interactions of bright and
dark rational solitons). Moreover, we also explore the dynamical behaviors of
these higher-order rational solitons with some small noises on the basis of
numerical simulations. | [
0,
1,
1,
0,
0,
0
] | [
"Physics",
"Mathematics"
] |
Title: Some preliminary results on the set of principal congruences of a finite lattice,
Abstract: In the second edition of the congruence lattice book, Problem 22.1 asks for a
characterization of subsets $Q$ of a finite distributive lattice $D$ such that
there is a finite lattice $L$ whose congruence lattice is isomorphic to $D$ and
under this isomorphism $Q$ corresponds the the principal congruences of $L$. In
this note, we prove some preliminary results. | [
0,
0,
1,
0,
0,
0
] | [
"Mathematics"
] |
Title: Neural Probabilistic Model for Non-projective MST Parsing,
Abstract: In this paper, we propose a probabilistic parsing model, which defines a
proper conditional probability distribution over non-projective dependency
trees for a given sentence, using neural representations as inputs. The neural
network architecture is based on bi-directional LSTM-CNNs which benefits from
both word- and character-level representations automatically, by using
combination of bidirectional LSTM and CNN. On top of the neural network, we
introduce a probabilistic structured layer, defining a conditional log-linear
model over non-projective trees. We evaluate our model on 17 different
datasets, across 14 different languages. By exploiting Kirchhoff's Matrix-Tree
Theorem (Tutte, 1984), the partition functions and marginals can be computed
efficiently, leading to a straight-forward end-to-end model training procedure
via back-propagation. Our parser achieves state-of-the-art parsing performance
on nine datasets. | [
1,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics"
] |
Title: Fair mixing: the case of dichotomous preferences,
Abstract: Agents vote to choose a fair mixture of public outcomes; each agent likes or
dislikes each outcome. We discuss three outstanding voting rules. The
Conditional Utilitarian rule, a variant of the random dictator, is
Strategyproof and guarantees to any group of like-minded agents an influence
proportional to its size. It is easier to compute and more efficient than the
familiar Random Priority rule. Its worst case (resp. average) inefficiency is
provably (resp. in numerical experiments) low if the number of agents is low.
The efficient Egalitarian rule protects similarly individual agents but not
coalitions. It is Excludable Strategyproof: I do not want to lie if I cannot
consume outcomes I claim to dislike. The efficient Nash Max Product rule offers
the strongest welfare guarantees to coalitions, who can force any outcome with
a probability proportional to their size. But it fails even the excludable form
of Strategyproofness. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science",
"Mathematics",
"Statistics"
] |
Title: Absorption and Emission Probabilities of Electrons in Electric and Magnetic Fields for FEL,
Abstract: We consider induced emission of ultrarelativistic electrons in strong
electric (magnetic) fields that are uniform along the direction of the electron
motion and are not uniform in the transverse direction. The stimulated
absorption and emission probabilities are found in such system. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: Conditional Time Series Forecasting with Convolutional Neural Networks,
Abstract: We present a method for conditional time series forecasting based on an
adaptation of the recent deep convolutional WaveNet architecture. The proposed
network contains stacks of dilated convolutions that allow it to access a broad
range of history when forecasting, a ReLU activation function and conditioning
is performed by applying multiple convolutional filters in parallel to separate
time series which allows for the fast processing of data and the exploitation
of the correlation structure between the multivariate time series. We test and
analyze the performance of the convolutional network both unconditionally as
well as conditionally for financial time series forecasting using the S&P500,
the volatility index, the CBOE interest rate and several exchange rates and
extensively compare it to the performance of the well-known autoregressive
model and a long-short term memory network. We show that a convolutional
network is well-suited for regression-type problems and is able to effectively
learn dependencies in and between the series without the need for long
historical time series, is a time-efficient and easy to implement alternative
to recurrent-type networks and tends to outperform linear and recurrent models. | [
0,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics",
"Quantitative Finance"
] |
Title: Community structure detection and evaluation during the pre- and post-ictal hippocampal depth recordings,
Abstract: Detecting and evaluating regions of brain under various circumstances is one
of the most interesting topics in computational neuroscience. However, the
majority of the studies on detecting communities of a functional connectivity
network of the brain is done on networks obtained from coherency attributes,
and not from correlation. This lack of studies, in part, is due to the fact
that many common methods for clustering graphs require the nodes of the network
to be `positively' linked together, a property that is guaranteed by a
coherency matrix, by definition. However, correlation matrices reveal more
information regarding how each pair of nodes are linked together. In this
study, for the first time we simultaneously examine four inherently different
network clustering methods (spectral, heuristic, and optimization methods)
applied to the functional connectivity networks of the CA1 region of the
hippocampus of an anaesthetized rat during pre-ictal and post-ictal states. The
networks are obtained from correlation matrices, and its results are compared
with the ones obtained by applying the same methods to coherency matrices. The
correlation matrices show a much finer community structure compared to the
coherency matrices. Furthermore, we examine the potential smoothing effect of
choosing various window sizes for computing the correlation/coherency matrices. | [
1,
0,
0,
0,
1,
0
] | [
"Quantitative Biology",
"Computer Science"
] |
Title: Shapley effects for sensitivity analysis with correlated inputs: comparisons with Sobol' indices, numerical estimation and applications,
Abstract: The global sensitivity analysis of a numerical model aims to quantify, by
means of sensitivity indices estimate, the contributions of each uncertain
input variable to the model output uncertainty. The so-called Sobol' indices,
which are based on the functional variance analysis, present a difficult
interpretation in the presence of statistical dependence between inputs. The
Shapley effect was recently introduced to overcome this problem as they
allocate the mutual contribution (due to correlation and interaction) of a
group of inputs to each individual input within the group.In this paper, using
several new analytical results, we study the effects of linear correlation
between some Gaussian input variables on Shapley effects, and compare these
effects to classical first-order and total Sobol' indices.This illustrates the
interest, in terms of sensitivity analysis setting and interpretation, of the
Shapley effects in the case of dependent inputs. We also investigate the
numerical convergence of the estimated Shapley effects. For the practical issue
of computationally demanding computer models, we show that the substitution of
the original model by a metamodel (here, kriging) makes it possible to estimate
these indices with precision at a reasonable computational cost. | [
0,
0,
1,
1,
0,
0
] | [
"Mathematics",
"Statistics",
"Computer Science"
] |
Title: Ridesourcing Car Detection by Transfer Learning,
Abstract: Ridesourcing platforms like Uber and Didi are getting more and more popular
around the world. However, unauthorized ridesourcing activities taking
advantages of the sharing economy can greatly impair the healthy development of
this emerging industry. As the first step to regulate on-demand ride services
and eliminate black market, we design a method to detect ridesourcing cars from
a pool of cars based on their trajectories. Since licensed ridesourcing car
traces are not openly available and may be completely missing in some cities
due to legal issues, we turn to transferring knowledge from public transport
open data, i.e, taxis and buses, to ridesourcing detection among ordinary
vehicles. We propose a two-stage transfer learning framework. In Stage 1, we
take taxi and bus data as input to learn a random forest (RF) classifier using
trajectory features shared by taxis/buses and ridesourcing/other cars. Then, we
use the RF to label all the candidate cars. In Stage 2, leveraging the subset
of high confident labels from the previous stage as input, we further learn a
convolutional neural network (CNN) classifier for ridesourcing detection, and
iteratively refine RF and CNN, as well as the feature set, via a co-training
process. Finally, we use the resulting ensemble of RF and CNN to identify the
ridesourcing cars in the candidate pool. Experiments on real car, taxi and bus
traces show that our transfer learning framework, with no need of a pre-labeled
ridesourcing dataset, can achieve similar accuracy as the supervised learning
methods. | [
1,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics"
] |
Title: Collapsing hyperkähler manifolds,
Abstract: Given a projective hyperkahler manifold with a holomorphic Lagrangian
fibration, we prove that hyperkahler metrics with volume of the torus fibers
shrinking to zero collapse in the Gromov-Hausdorff sense (and smoothly away
from the singular fibers) to a compact metric space which is a half-dimensional
special Kahler manifold outside a singular set of real Hausdorff codimension 2
and is homeomorphic to the base projective space. | [
0,
0,
1,
0,
0,
0
] | [
"Mathematics",
"Physics"
] |
Title: Hidden multiparticle excitation in weakly interacting Bose-Einstein Condensate,
Abstract: We investigate multiparticle excitation effect on a collective density
excitation as well as a single-particle excitation in a weakly interacting
Bose--Einstein condensate (BEC). We find that although the weakly interacting
BEC offers weak multiparticle excitation spectrum at low temperatures, this
multiparticle excitation effect may not remain hidden, but emerges as
bimodality in the density response function through the single-particle
excitation. Identification of spectra in the BEC between the single-particle
excitation and the density excitation is also assessed at nonzero temperatures,
which has been known to be unique nature in the BEC at absolute zero
temperature. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: Learning to Acquire Information,
Abstract: We consider the problem of diagnosis where a set of simple observations are
used to infer a potentially complex hidden hypothesis. Finding the optimal
subset of observations is intractable in general, thus we focus on the problem
of active diagnosis, where the agent selects the next most-informative
observation based on the results of previous observations. We show that under
the assumption of uniform observation entropy, one can build an implication
model which directly predicts the outcome of the potential next observation
conditioned on the results of past observations, and selects the observation
with the maximum entropy. This approach enjoys reduced computation complexity
by bypassing the complicated hypothesis space, and can be trained on
observation data alone, learning how to query without knowledge of the hidden
hypothesis. | [
1,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics"
] |
Title: How hard is it to cross the room? -- Training (Recurrent) Neural Networks to steer a UAV,
Abstract: This work explores the feasibility of steering a drone with a (recurrent)
neural network, based on input from a forward looking camera, in the context of
a high-level navigation task. We set up a generic framework for training a
network to perform navigation tasks based on imitation learning. It can be
applied to both aerial and land vehicles. As a proof of concept we apply it to
a UAV (Unmanned Aerial Vehicle) in a simulated environment, learning to cross a
room containing a number of obstacles. So far only feedforward neural networks
(FNNs) have been used to train UAV control. To cope with more complex tasks, we
propose the use of recurrent neural networks (RNN) instead and successfully
train an LSTM (Long-Short Term Memory) network for controlling UAVs. Vision
based control is a sequential prediction problem, known for its highly
correlated input data. The correlation makes training a network hard,
especially an RNN. To overcome this issue, we investigate an alternative
sampling method during training, namely window-wise truncated backpropagation
through time (WW-TBPTT). Further, end-to-end training requires a lot of data
which often is not available. Therefore, we compare the performance of
retraining only the Fully Connected (FC) and LSTM control layers with networks
which are trained end-to-end. Performing the relatively simple task of crossing
a room already reveals important guidelines and good practices for training
neural control networks. Different visualizations help to explain the behavior
learned. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science"
] |
Title: Generalization for Adaptively-chosen Estimators via Stable Median,
Abstract: Datasets are often reused to perform multiple statistical analyses in an
adaptive way, in which each analysis may depend on the outcomes of previous
analyses on the same dataset. Standard statistical guarantees do not account
for these dependencies and little is known about how to provably avoid
overfitting and false discovery in the adaptive setting. We consider a natural
formalization of this problem in which the goal is to design an algorithm that,
given a limited number of i.i.d.~samples from an unknown distribution, can
answer adaptively-chosen queries about that distribution.
We present an algorithm that estimates the expectations of $k$ arbitrary
adaptively-chosen real-valued estimators using a number of samples that scales
as $\sqrt{k}$. The answers given by our algorithm are essentially as accurate
as if fresh samples were used to evaluate each estimator. In contrast, prior
work yields error guarantees that scale with the worst-case sensitivity of each
estimator. We also give a version of our algorithm that can be used to verify
answers to such queries where the sample complexity depends logarithmically on
the number of queries $k$ (as in the reusable holdout technique).
Our algorithm is based on a simple approximate median algorithm that
satisfies the strong stability guarantees of differential privacy. Our
techniques provide a new approach for analyzing the generalization guarantees
of differentially private algorithms. | [
1,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics"
] |
Title: Attribution of extreme rainfall in Southeast China during May 2015,
Abstract: Anthropogenic climate change increased the probability that a short-duration,
intense rainfall event would occur in parts of southeast China. This type of
event occurred in May 2015, causing serious flooding. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: Automatic Brain Tumor Detection and Segmentation Using U-Net Based Fully Convolutional Networks,
Abstract: A major challenge in brain tumor treatment planning and quantitative
evaluation is determination of the tumor extent. The noninvasive magnetic
resonance imaging (MRI) technique has emerged as a front-line diagnostic tool
for brain tumors without ionizing radiation. Manual segmentation of brain tumor
extent from 3D MRI volumes is a very time-consuming task and the performance is
highly relied on operator's experience. In this context, a reliable fully
automatic segmentation method for the brain tumor segmentation is necessary for
an efficient measurement of the tumor extent. In this study, we propose a fully
automatic method for brain tumor segmentation, which is developed using U-Net
based deep convolutional networks. Our method was evaluated on Multimodal Brain
Tumor Image Segmentation (BRATS 2015) datasets, which contain 220 high-grade
brain tumor and 54 low-grade tumor cases. Cross-validation has shown that our
method can obtain promising segmentation efficiently. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science",
"Quantitative Biology"
] |
Title: Estimation of Relationship between Stimulation Current and Force Exerted during Isometric Contraction,
Abstract: In this study, we developed a method to estimate the relationship between
stimulation current and volatility during isometric contraction. In functional
electrical stimulation (FES), joints are driven by applying voltage to muscles.
This technology has been used for a long time in the field of rehabilitation,
and recently application oriented research has been reported. However,
estimation of the relationship between stimulus value and exercise capacity has
not been discussed to a great extent. Therefore, in this study, a human muscle
model was estimated using the transfer function estimation method with fast
Fourier transform. It was found that the relationship between stimulation
current and force exerted could be expressed by a first-order lag system. In
verification of the force estimate, the ability of the proposed model to
estimate the exerted force under steady state response was found to be good. | [
0,
0,
0,
0,
1,
0
] | [
"Quantitative Biology",
"Statistics"
] |
Title: One-step Estimation of Networked Population Size with Anonymity Using Respondent-Driven Capture-Recapture and Hashing,
Abstract: Estimates of population size for hidden and hard-to-reach individuals are of
particular interest to health officials when health problems are concentrated
in such populations. Efforts to derive these estimates are often frustrated by
a range of factors including social stigma or an association with illegal
activities that ordinarily preclude conventional survey strategies. This paper
builds on and extends prior work that proposed a method to meet these
challenges. Here we describe a rigorous formalization of a one-step,
network-based population estimation procedure that can be employed under
conditions of anonymity. The estimation procedure is designed to be implemented
alongside currently accepted strategies for research with hidden populations.
Simulation experiments are described that test the efficacy of the method
across a range of implementation conditions and hidden population sizes. The
results of these experiments show that reliable population estimates can be
derived for hidden, networked population as large as 12,500 and perhaps larger
for one family of random graphs. As such, the method shows potential for
cost-effective implementation health and disease surveillance officials
concerned with hidden populations. Limitations and future work are discussed in
the concluding section. | [
1,
0,
0,
1,
0,
0
] | [
"Statistics",
"Quantitative Biology"
] |
Title: Real single ion solvation free energies with quantum mechanical simulation,
Abstract: Single ion solvation free energies are one of the most important properties
of electrolyte solutions and yet there is ongoing debate about what these
values are. Only the values for neutral ion pairs are known. Here, we use DFT
interaction potentials with molecular dynamics simulation (DFT-MD) combined
with a modified version of the quasi-chemical theory (QCT) to calculate these
energies for the lithium and fluoride ions. A method to correct for the error
in the DFT functional is developed and very good agreement with the
experimental value for the lithium fluoride pair is obtained. Moreover, this
method partitions the energies into physically intuitive terms such as surface
potential, cavity and charging energies which are amenable to descriptions with
reduced models. Our research suggests that lithium's solvation free energy is
dominated by the free energetics of a charged hard sphere, whereas fluoride
exhibits significant quantum mechanical behavior that cannot be simply
described with a reduced model. | [
0,
1,
0,
0,
0,
0
] | [
"Physics",
"Chemistry"
] |
Title: Crowdsourcing with Sparsely Interacting Workers,
Abstract: We consider estimation of worker skills from worker-task interaction data
(with unknown labels) for the single-coin crowd-sourcing binary classification
model in symmetric noise. We define the (worker) interaction graph whose nodes
are workers and an edge between two nodes indicates whether or not the two
workers participated in a common task. We show that skills are asymptotically
identifiable if and only if an appropriate limiting version of the interaction
graph is irreducible and has odd-cycles. We then formulate a weighted rank-one
optimization problem to estimate skills based on observations on an
irreducible, aperiodic interaction graph. We propose a gradient descent scheme
and show that for such interaction graphs estimates converge asymptotically to
the global minimum. We characterize noise robustness of the gradient scheme in
terms of spectral properties of signless Laplacians of the interaction graph.
We then demonstrate that a plug-in estimator based on the estimated skills
achieves state-of-art performance on a number of real-world datasets. Our
results have implications for rank-one matrix completion problem in that
gradient descent can provably recover $W \times W$ rank-one matrices based on
$W+1$ off-diagonal observations of a connected graph with a single odd-cycle. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science",
"Statistics",
"Mathematics"
] |
Title: Training deep learning based denoisers without ground truth data,
Abstract: Recent deep learning based denoisers often outperform state-of-the-art
conventional denoisers such as BM3D. They are typically trained to minimize the
mean squared error (MSE) between the output of a deep neural network and the
ground truth image. In deep learning based denoisers, it is important to use
high quality noiseless ground truth for high performance, but it is often
challenging or even infeasible to obtain such a clean image in application
areas such as hyperspectral remote sensing and medical imaging. We propose a
Stein's Unbiased Risk Estimator (SURE) based method for training deep neural
network denoisers only with noisy images. We demonstrated that our SURE based
method without ground truth was able to train deep neural network denoisers to
yield performance close to deep learning denoisers trained with ground truth
and to outperform state-of-the-art BM3D. Further improvements were achieved by
including noisy test images for training denoiser networks using our proposed
SURE based method. | [
0,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics"
] |
Title: Language Design and Renormalization,
Abstract: Here we consider some well-known facts in syntax from a physics perspective,
which allows us to establish some remarkable equivalences. Specifically, we
observe that the operation MERGE put forward by N. Chomsky in 1995 can be
interpreted as a physical information coarse-graining. Thus, MERGE in
linguistics entails information renormalization in physics, according to
different time scales. We make this point mathematically formal in terms of
language models, i.e., probability distributions over word sequences, widely
used in natural language processing as well as other ambits. In this setting,
MERGE corresponds to a 3-index probability tensor implementing a
coarse-graining, akin to a probabilistic context-free grammar. The probability
vectors of meaningful sentences are naturally given by stochastic tensor
networks (TN) that are mostly loop-free, such as Tree Tensor Networks and
Matrix Product States. These structures have short-ranged correlations in the
syntactic distance by construction and, because of the peculiarities of human
language, they are extremely efficient to manipulate computationally. We also
propose how to obtain such language models from probability distributions of
certain TN quantum states, which we show to be efficiently preparable by a
quantum computer. Moreover, using tools from entanglement theory, we use these
quantum states to prove classical lower bounds on the perplexity of the
probability distribution for a set of words in a sentence. Implications of
these results are discussed in the ambits of theoretical and computational
linguistics, artificial intelligence, programming languages, RNA and protein
sequencing, quantum many-body systems, and beyond. Our work shows how many of
the key linguistic ideas from the last century, including developments in
computational linguistics, fit perfectly with known physical concepts linked to
renormalization. | [
1,
1,
0,
0,
0,
0
] | [
"Computer Science",
"Physics",
"Mathematics"
] |
Title: On the geometry of the moduli space of sheaves supported on curves of genus two in a quadric surface,
Abstract: We study the moduli space of stable sheaves of Euler characteristic 2,
supported on curves of arithmetic genus 2 contained in a smooth quadric
surface. We show that this moduli space is rational. We compute its Betti
numbers and we give a classification of the stable sheaves involving locally
free resolutions. | [
0,
0,
1,
0,
0,
0
] | [
"Mathematics"
] |
Title: Pattern Generation Strategies for Improving Recognition of Handwritten Mathematical Expressions,
Abstract: Recognition of Handwritten Mathematical Expressions (HMEs) is a challenging
problem because of the ambiguity and complexity of two-dimensional handwriting.
Moreover, the lack of large training data is a serious issue, especially for
academic recognition systems. In this paper, we propose pattern generation
strategies that generate shape and structural variations to improve the
performance of recognition systems based on a small training set. For data
generation, we employ the public databases: CROHME 2014 and 2016 of online
HMEs. The first strategy employs local and global distortions to generate shape
variations. The second strategy decomposes an online HME into sub-online HMEs
to get more structural variations. The hybrid strategy combines both these
strategies to maximize shape and structural variations. The generated online
HMEs are converted to images for offline HME recognition. We tested our
strategies in an end-to-end recognition system constructed from a recent deep
learning model: Convolutional Neural Network and attention-based
encoder-decoder. The results of experiments on the CROHME 2014 and 2016
databases demonstrate the superiority and effectiveness of our strategies: our
hybrid strategy achieved classification rates of 48.78% and 45.60%,
respectively, on these databases. These results are competitive compared to
others reported in recent literature. Our generated datasets are openly
available for research community and constitute a useful resource for the HME
recognition research in future. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science",
"Mathematics"
] |
Title: Collective spin excitations of helices and magnetic skyrmions: review and perspectives of magnonics in non-centrosymmetric magnets,
Abstract: Magnetic materials hosting correlated electrons play an important role for
information technology and signal processing. The currently used ferro-, ferri-
and antiferromagnetic materials provide microscopic moments (spins) that are
mainly collinear. Recently more complex spin structures such as spin helices
and cycloids have regained a lot of interest. The interest has been initiated
by the discovery of the skyrmion lattice phase in non-centrosymmetric helical
magnets. In this review we address how spin helices and skyrmion lattices
enrich the microwave characteristics of magnetic materials. When discussing
perspectives for microwave electronics and magnonics we focus particularly on
insulating materials as they avoid eddy current losses, offer low spin-wave
damping, and might allow for electric field control of collective spin
excitations. Thereby, they further fuel the vision of magnonics operated at low
energy consumption. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: Regret Bounds for Reinforcement Learning via Markov Chain Concentration,
Abstract: We give a simple optimistic algorithm for which it is easy to derive regret
bounds of $\tilde{O}(\sqrt{t_{\rm mix} SAT})$ after $T$ steps in uniformly
ergodic Markov decision processes with $S$ states, $A$ actions, and mixing time
parameter $t_{\rm mix}$. These bounds are the first regret bounds in the
general, non-episodic setting with an optimal dependence on all given
parameters. They could only be improved by using an alternative mixing time
parameter. | [
0,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Mathematics",
"Statistics"
] |
Title: The affine approach to homogeneous geodesics in homogeneous Finsler spaces,
Abstract: In a recent paper, it was claimed that any homogeneous Finsler space of odd
dimension admits a homogeneous geodesic through any point. For the proof, the
algebraic method dealing with the reductive decomposition of the Lie algebra of
the isometry group was used. However, the proof contains a serious gap. In the
present paper, homogeneous geodesics in Finsler homogeneous spaces are studied
using the affine method, which was developed in earlier papers by the author.
The mentioned statement is proved correctly and it is further proved that any
homogeneous Berwald space or homogeneous reversible Finsler space admits a
homogeneous geodesic through any point. | [
0,
0,
1,
0,
0,
0
] | [
"Mathematics"
] |
Title: Fate of the spin-\frac{1}{2} Kondo effect in the presence of temperature gradients,
Abstract: We consider a strongly interacting quantum dot connected to two leads held at
quite different temperatures. Our aim is to study the behavior of the Kondo
effect in the presence of large thermal biases. We use three different
approaches, namely, a perturbation formalism based on the Kondo Hamiltonian, a
slave-boson mean-field theory for the Anderson model at large charging energies
and a truncated equation-of-motion approach beyond the Hartree-Fock
approximation. The two former formalisms yield a suppression of the Kondo peak
for thermal gradients above the Kondo temperature, showing a remarkably good
agreement despite their different ranges of validity. The third technique
allows us to analyze the full density of states within a wide range of
energies. Additionally, we have investigated the quantum transport properties
(electric current and thermocurrent) beyond linear response. In the
voltage-driven case, we reproduce the split differential conductance due to the
presence of different electrochemical potentials. In the temperature-driven
case, we observe a strongly nonlinear thermocurrent as a function of the
applied thermal gradient. Depending on the parameters, we can find nontrivial
zeros in the electric current for finite values of the temperature bias.
Importantly, these thermocurrent zeros yield direct access to the system's
characteristic energy scales (Kondo temperature and charging energy). | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: Geometrical dependence of domain wall propagation and nucleation fields in magnetic domain wall sensor devices,
Abstract: We study the key domain wall properties in segmented nanowires loop-based
structures used in domain wall based sensors. The two reasons for device
failure, namely the distribution of domain wall propagation field (depinning)
and the nucleation field are determined with Magneto-Optical Kerr Effect (MOKE)
and Giant Magnetoresistance (GMR) measurements for thousands of elements to
obtain significant statistics. Single layers of Ni$_{81}$Fe$_{19}$, a complete
GMR stack with Co$_{90}$Fe$_{10}$/Ni$_{81}$Fe$_{19}$ as a free layer and a
single layer of Co$_{90}$Fe$_{10}$ are deposited and industrially patterned to
determine the influence of the shape anisotropy, the magnetocrystalline
anisotropy and the fabrication processes. We show that the propagation field is
little influenced by the geometry but significantly by material parameters. The
domain wall nucleation fields can be described by a typical Stoner-Wohlfarth
model related to the measured geometrical parameters of the wires and fitted by
considering the process parameters. The GMR effect is subsequently measured in
a substantial number of devices (3000), in order to accurately gauge the
variation between devices. This reveals a corrected upper limit to the
nucleation fields of the sensors that can be exploited for fast
characterization of working elements. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: Faster Rates for Policy Learning,
Abstract: This article improves the existing proven rates of regret decay in optimal
policy estimation. We give a margin-free result showing that the regret decay
for estimating a within-class optimal policy is second-order for empirical risk
minimizers over Donsker classes, with regret decaying at a faster rate than the
standard error of an efficient estimator of the value of an optimal policy. We
also give a result from the classification literature that shows that faster
regret decay is possible via plug-in estimation provided a margin condition
holds. Four examples are considered. In these examples, the regret is expressed
in terms of either the mean value or the median value; the number of possible
actions is either two or finitely many; and the sampling scheme is either
independent and identically distributed or sequential, where the latter
represents a contextual bandit sampling scheme. | [
0,
0,
1,
1,
0,
0
] | [
"Statistics",
"Computer Science"
] |
Title: Learning Deep Networks from Noisy Labels with Dropout Regularization,
Abstract: Large datasets often have unreliable labels-such as those obtained from
Amazon's Mechanical Turk or social media platforms-and classifiers trained on
mislabeled datasets often exhibit poor performance. We present a simple,
effective technique for accounting for label noise when training deep neural
networks. We augment a standard deep network with a softmax layer that models
the label noise statistics. Then, we train the deep network and noise model
jointly via end-to-end stochastic gradient descent on the (perhaps mislabeled)
dataset. The augmented model is overdetermined, so in order to encourage the
learning of a non-trivial noise model, we apply dropout regularization to the
weights of the noise model during training. Numerical experiments on noisy
versions of the CIFAR-10 and MNIST datasets show that the proposed dropout
technique outperforms state-of-the-art methods. | [
1,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics"
] |
Title: On Efficiently Detecting Overlapping Communities over Distributed Dynamic Graphs,
Abstract: Modern networks are of huge sizes as well as high dynamics, which challenges
the efficiency of community detection algorithms. In this paper, we study the
problem of overlapping community detection on distributed and dynamic graphs.
Given a distributed, undirected and unweighted graph, the goal is to detect
overlapping communities incrementally as the graph is dynamically changing. We
propose an efficient algorithm, called \textit{randomized Speaker-Listener
Label Propagation Algorithm} (rSLPA), based on the \textit{Speaker-Listener
Label Propagation Algorithm} (SLPA) by relaxing the probability distribution of
label propagation. Besides detecting high-quality communities, rSLPA can
incrementally update the detected communities after a batch of edge insertion
and deletion operations. To the best of our knowledge, rSLPA is the first
algorithm that can incrementally capture the same communities as those obtained
by applying the detection algorithm from the scratch on the updated graph.
Extensive experiments are conducted on both synthetic and real-world datasets,
and the results show that our algorithm can achieve high accuracy and
efficiency at the same time. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science"
] |
Title: Spatially distributed multipartite entanglement enables Einstein-Podolsky-Rosen steering of atomic clouds,
Abstract: A key resource for distributed quantum-enhanced protocols is entanglement
between spatially separated modes. Yet, the robust generation and detection of
nonlocal entanglement between spatially separated regions of an ultracold
atomic system remains a challenge. Here, we use spin mixing in a tightly
confined Bose-Einstein condensate to generate an entangled state of
indistinguishable particles in a single spatial mode. We show experimentally
that this local entanglement can be spatially distributed by self-similar
expansion of the atomic cloud. Spatially resolved spin read-out is used to
reveal a particularly strong form of quantum correlations known as
Einstein-Podolsky-Rosen steering between distinct parts of the expanded cloud.
Based on the strength of Einstein-Podolsky-Rosen steering we construct a
witness, which testifies up to genuine five-partite entanglement. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: A Deep Active Survival Analysis Approach for Precision Treatment Recommendations: Application of Prostate Cancer,
Abstract: Survival analysis has been developed and applied in the number of areas
including manufacturing, finance, economics and healthcare. In healthcare
domain, usually clinical data are high-dimensional, sparse and complex and
sometimes there exists few amount of time-to-event (labeled) instances.
Therefore building an accurate survival model from electronic health records is
challenging. With this motivation, we address this issue and provide a new
survival analysis framework using deep learning and active learning with a
novel sampling strategy. First, our approach provides better representation
with lower dimensions from clinical features using labeled (time-to-event) and
unlabeled (censored) instances and then actively trains the survival model by
labeling the censored data using an oracle. As a clinical assistive tool, we
introduce a simple effective treatment recommendation approach based on our
survival model. In the experimental study, we apply our approach on
SEER-Medicare data related to prostate cancer among African-Americans and white
patients. The results indicate that our approach outperforms significantly than
baseline models. | [
0,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics",
"Quantitative Biology"
] |
Title: Free quantitative fourth moment theorems on Wigner space,
Abstract: We prove a quantitative Fourth Moment Theorem for Wigner integrals of any
order with symmetric kernels, generalizing an earlier result from Kemp et al.
(2012). The proof relies on free stochastic analysis and uses a new biproduct
formula for bi-integrals. A consequence of our main result is a
Nualart-Ortiz-Latorre type characterization of convergence in law to the
semicircular distribution for Wigner integrals. As an application, we provide
Berry-Esseen type bounds in the context of the free Breuer-Major theorem for
the free fractional Brownian motion. | [
0,
0,
1,
0,
0,
0
] | [
"Mathematics",
"Statistics"
] |
Title: Towards understanding startup product development as effectual entrepreneurial behaviors,
Abstract: Software startups face with multiple technical and business challenges, which
could make the startup journey longer, or even become a failure. Little is
known about entrepreneurial decision making as a direct force to startup
development outcome. In this study, we attempted to apply a behaviour theory of
entrepreneurial firms to understand the root-cause of some software startup s
challenges. Six common challenges related to prototyping and product
development in twenty software startups were identified. We found the behaviour
theory as a useful theoretical lens to explain the technical challenges.
Software startups search for local optimal solutions, emphasise on short-run
feedback rather than long-run strategies, which results in vague prototype
planning, paradox of demonstration and evolving throw-away prototypes. The
finding implies that effectual entrepreneurial processes might require a more
suitable product development approach than the current state-of-practice. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science",
"Quantitative Finance"
] |
Title: Generalized Dirac structure beyond the linear regime in graphene,
Abstract: We show that a generalized Dirac structure survives beyond the linear regime
of the low-energy dispersion relations of graphene. A generalized uncertainty
principle of the kind compatible with specific quantum gravity scenarios with a
fundamental minimal length (here graphene lattice spacing) and Lorentz
violation (here the particle/hole asymmetry, the trigonal warping, etc.) is
naturally obtained. We then show that the corresponding emergent field theory
is a table-top realization of such scenarios, by explicitly computing the third
order Hamiltonian, and giving the general recipe for any order. Remarkably, our
results imply that going beyond the low-energy approximation does not spoil the
well-known correspondence with analogue massless quantum electrodynamics
phenomena (as usually believed), but rather it is a way to obtain experimental
signatures of quantum-gravity-like corrections to such phenomena. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: Generative Mixture of Networks,
Abstract: A generative model based on training deep architectures is proposed. The
model consists of K networks that are trained together to learn the underlying
distribution of a given data set. The process starts with dividing the input
data into K clusters and feeding each of them into a separate network. After
few iterations of training networks separately, we use an EM-like algorithm to
train the networks together and update the clusters of the data. We call this
model Mixture of Networks. The provided model is a platform that can be used
for any deep structure and be trained by any conventional objective function
for distribution modeling. As the components of the model are neural networks,
it has high capability in characterizing complicated data distributions as well
as clustering data. We apply the algorithm on MNIST hand-written digits and
Yale face datasets. We also demonstrate the clustering ability of the model
using some real-world and toy examples. | [
1,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics"
] |
Title: On the quantum differentiation of smooth real-valued functions,
Abstract: Calculating the value of $C^{k\in\{1,\infty\}}$ class of smoothness
real-valued function's derivative in point of $\mathbb{R}^+$ in radius of
convergence of its Taylor polynomial (or series), applying an analog of
Newton's binomial theorem and $q$-difference operator. $(P,q)$-power difference
introduced in section 5. Additionally, by means of Newton's interpolation
formula, the discrete analog of Taylor series, interpolation using
$q$-difference and $p,q$-power difference is shown. | [
0,
0,
1,
0,
0,
0
] | [
"Mathematics",
"Physics"
] |
Title: The Peridynamic Stress Tensors and the Non-local to Local Passage,
Abstract: We re-examine the notion of stress in peridynamics. Based on the idea of
traction we define two new peridynamic stress tensors $\mathbf{P}^{\mathbf{y}}$
and $\mathbf{P}$ which stand, respectively, for analogues of the Cauchy and 1st
Piola-Kirchhoff stress tensors from classical elasticity. We show that the
tensor $\mathbf{P}$ differs from the earlier defined peridynamic stress tensor
$\nu$; though their divergence is equal. We address the question of symmetry of
the tensor $\mathbf{P}^{\mathbf{y}}$ which proves to be symmetric in case of
bond-based peridynamics; as opposed to the inverse Piola transform of $\nu$
(corresponding to the analogue of Cauchy stress tensor) which fails to be
symmetric in general. We also derive a general formula of the force-flux in
peridynamics and compute the limit of $\mathbf{P}$ for vanishing non-locality,
denoted by $\mathbf{P}_0$. We show that this tensor $\mathbf{P}_0$ surprisingly
coincides with the collapsed tensor $\nu_0$, a limit of the original tensor
$\nu$. At the end, using this flux-formula, we suggest an explanation why the
collapsed tensor $\mathbf{P}_0$ (and hence $\nu_0$) can be indeed identified
with the 1st Piola-Kirchhoff stress tensor. | [
0,
1,
0,
0,
0,
0
] | [
"Physics",
"Mathematics"
] |
Title: Learning Efficient Image Representation for Person Re-Identification,
Abstract: Color names based image representation is successfully used in person
re-identification, due to the advantages of being compact, intuitively
understandable as well as being robust to photometric variance. However, there
exists the diversity between underlying distribution of color names' RGB values
and that of image pixels' RGB values, which may lead to inaccuracy when
directly comparing them in Euclidean space. In this paper, we propose a new
method named soft Gaussian mapping (SGM) to address this problem. We model the
discrepancies between color names and pixels using a Gaussian and utilize the
inverse of covariance matrix to bridge the gap between them. Based on SGM, an
image could be converted to several soft Gaussian maps. In each soft Gaussian
map, we further seek to establish stable and robust descriptors within a local
region through a max pooling operation. Then, a robust image representation
based on color names is obtained by concatenating the statistical descriptors
in each stripe. When labeled data are available, one discriminative subspace
projection matrix is learned to build efficient representations of an image via
cross-view coupling learning. Experiments on the public datasets - VIPeR,
PRID450S and CUHK03, demonstrate the effectiveness of our method. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science"
] |
Title: Helium-like and Lithium-like ions: Ground state energy,
Abstract: It is shown that the non-relativistic ground state energy of helium-like and
lithium-like ions with static nuclei can be interpolated in full physics range
of nuclear charges $Z$ with accuracy of not less than 6 decimal digits (d.d.)
or 7-8 significant digits (s.d.) using a meromorphic function in appropriate
variable with a few free parameters. It is demonstrated that finite nuclear
mass effects do not change 4-5 s.d. for $Z \in [1,50]$ for 2-,3-electron
systems and the leading relativistic and QED corrections leave unchanged 3-4
s.d. for $Z \in [1,12]$ in the ground state energy for 2-electron system, thus,
the interpolation reproduces definitely those figures. A meaning of proposed
interpolation is in a construction of unified, {\it two-point} Pade approximant
(for both small and large $Z$ expansions) with fitting some parameters at
intermediate $Z$. | [
0,
1,
0,
0,
0,
0
] | [
"Physics",
"Mathematics"
] |
Title: Koszul A-infinity algebras and free loop space homology,
Abstract: We introduce a notion of Koszul A-infinity algebra that generalizes Priddy's
notion of a Koszul algebra and we use it to construct small A-infinity algebra
models for Hochschild cochains. As an application, this yields new techniques
for computing free loop space homology algebras of manifolds that are either
formal or coformal (over a field or over the integers). We illustrate these
techniques in two examples. | [
0,
0,
1,
0,
0,
0
] | [
"Mathematics"
] |
Title: Learning RBM with a DC programming Approach,
Abstract: By exploiting the property that the RBM log-likelihood function is the
difference of convex functions, we formulate a stochastic variant of the
difference of convex functions (DC) programming to minimize the negative
log-likelihood. Interestingly, the traditional contrastive divergence algorithm
is a special case of the above formulation and the hyperparameters of the two
algorithms can be chosen such that the amount of computation per mini-batch is
identical. We show that for a given computational budget the proposed algorithm
almost always reaches a higher log-likelihood more rapidly, compared to the
standard contrastive divergence algorithm. Further, we modify this algorithm to
use the centered gradients and show that it is more efficient and effective
compared to the standard centered gradient algorithm on benchmark datasets. | [
1,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics"
] |
Title: Sparse Inverse Covariance Estimation for Chordal Structures,
Abstract: In this paper, we consider the Graphical Lasso (GL), a popular optimization
problem for learning the sparse representations of high-dimensional datasets,
which is well-known to be computationally expensive for large-scale problems.
Recently, we have shown that the sparsity pattern of the optimal solution of GL
is equivalent to the one obtained from simply thresholding the sample
covariance matrix, for sparse graphs under different conditions. We have also
derived a closed-form solution that is optimal when the thresholded sample
covariance matrix has an acyclic structure. As a major generalization of the
previous result, in this paper we derive a closed-form solution for the GL for
graphs with chordal structures. We show that the GL and thresholding
equivalence conditions can significantly be simplified and are expected to hold
for high-dimensional problems if the thresholded sample covariance matrix has a
chordal structure. We then show that the GL and thresholding equivalence is
enough to reduce the GL to a maximum determinant matrix completion problem and
drive a recursive closed-form solution for the GL when the thresholded sample
covariance matrix has a chordal structure. For large-scale problems with up to
450 million variables, the proposed method can solve the GL problem in less
than 2 minutes, while the state-of-the-art methods converge in more than 2
hours. | [
0,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics",
"Mathematics"
] |
Title: Orthogonal free quantum group factors are strongly 1-bounded,
Abstract: We prove that the orthogonal free quantum group factors
$\mathcal{L}(\mathbb{F}O_N)$ are strongly $1$-bounded in the sense of Jung. In
particular, they are not isomorphic to free group factors. This result is
obtained by establishing a spectral regularity result for the edge reversing
operator on the quantum Cayley tree associated to $\mathbb{F}O_N$, and
combining this result with a recent free entropy dimension rank theorem of Jung
and Shlyakhtenko. | [
0,
0,
1,
0,
0,
0
] | [
"Mathematics",
"Physics"
] |
Title: Enhanced spin ordering temperature in ultrathin FeTe films grown on a topological insulator,
Abstract: We studied the temperature dependence of the diagonal double-stripe spin
order in one and two unit cell thick layers of FeTe grown on the topological
insulator Bi_2Te_3 via spin-polarized scanning tunneling microscopy. The spin
order persists up to temperatures which are higher than the transition
temperature reported for bulk Fe_1+yTe with lowest possible excess Fe content
y. The enhanced spin order stability is assigned to a strongly decreased y with
respect to the lowest values achievable in bulk crystal growth, and effects due
to the interface between the FeTe and the topological insulator. The result is
relevant for understanding the recent observation of a coexistence of
superconducting correlations and spin order in this system. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: A SAT+CAS Approach to Finding Good Matrices: New Examples and Counterexamples,
Abstract: We enumerate all circulant good matrices with odd orders divisible by 3 up to
order 70. As a consequence of this we find a previously overlooked set of good
matrices of order 27 and a new set of good matrices of order 57. We also find
that circulant good matrices do not exist in the orders 51, 63, and 69, thereby
finding three new counterexamples to the conjecture that such matrices exist in
all odd orders. Additionally, we prove a new relationship between the entries
of good matrices and exploit this relationship in our enumeration algorithm.
Our method applies the SAT+CAS paradigm of combining computer algebra
functionality with modern SAT solvers to efficiently search large spaces which
are specified by both algebraic and logical constraints. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science",
"Mathematics"
] |
Title: Involutive bordered Floer homology,
Abstract: We give a bordered extension of involutive HF-hat and use it to give an
algorithm to compute involutive HF-hat for general 3-manifolds. We also explain
how the mapping class group action on HF-hat can be computed using bordered
Floer homology. As applications, we prove that involutive HF-hat satisfies a
surgery exact triangle and compute HFI-hat of the branched double covers of all
10-crossing knots. | [
0,
0,
1,
0,
0,
0
] | [
"Mathematics"
] |
Title: HTEM data improve 3D modelling of aquifers in Paris Basin, France,
Abstract: In Paris Basin, we evaluate how HTEM data complement the usual borehole,
geological and deep seismic data used for modelling aquifer geometries. With
these traditional data, depths between ca. 50 to 300m are often relatively
ill-constrained, as most boreholes lie within the first tens of meters of the
underground and petroleum seismic is blind shallower than ca. 300m. We have
fully reprocessed and re-inverted 540km of flight lines of a SkyTEM survey of
2009, acquired on a 40x12km zone with 400m line spacing. The resistivity model
is first "calibrated" with respect to ca. 50 boreholes available on the study
area. Overall, the correlation between EM resistivity models and the
hydrogeological horizons clearly shows that the geological units in which the
aquifers are developed almost systematically correspond to relative increase of
resistivity, whatever the "background" resistivity environment and the
lithology of the aquifer. In 3D Geomodeller software, this allows interpreting
11 aquifer/aquitar layers along the flight lines and then jointly interpolating
them in 3D along with the borehole data. The resulting model displays 3D
aquifer geometries consistent with the SIGES "reference" regional
hydrogeological model and improves it in between the boreholes and on the
50-300m depth range. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: Social Network based Short-Term Stock Trading System,
Abstract: This paper proposes a novel adaptive algorithm for the automated short-term
trading of financial instrument. The algorithm adopts a semantic sentiment
analysis technique to inspect the Twitter posts and to use them to predict the
behaviour of the stock market. Indeed, the algorithm is specifically developed
to take advantage of both the sentiment and the past values of a certain
financial instrument in order to choose the best investment decision. This
allows the algorithm to ensure the maximization of the obtainable profits by
trading on the stock market. We have conducted an investment simulation and
compared the performance of our proposed with a well-known benchmark (DJTATO
index) and the optimal results, in which an investor knows in advance the
future price of a product. The result shows that our approach outperforms the
benchmark and achieves the performance score close to the optimal result. | [
1,
0,
0,
0,
0,
1
] | [
"Computer Science",
"Quantitative Finance"
] |
Title: Towards an Understanding of the Effects of Augmented Reality Games on Disaster Management,
Abstract: Location-based augmented reality games have entered the mainstream with the
nearly overnight success of Niantic's Pokémon Go. Unlike traditional video
games, the fact that players of such games carry out actions in the external,
physical world to accomplish in-game objectives means that the large-scale
adoption of such games motivate people, en masse, to do things and go places
they would not have otherwise done in unprecedented ways. The social
implications of such mass-mobilisation of individual players are, in general,
difficult to anticipate or characterise, even for the short-term. In this work,
we focus on disaster relief, and the short- and long-term implications that a
proliferation of AR games like Pokémon Go, may have in disaster-prone regions
of the world. We take a distributed cognition approach and focus on one natural
disaster-prone region of New Zealand, the city of Wellington. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science",
"Quantitative Biology"
] |
Title: Identification of Conduit Countries and Community Structures in the Withholding Tax Networks,
Abstract: Due to economic globalization, each country's economic law, including tax
laws and tax treaties, has been forced to work as a single network. However,
each jurisdiction (country or region) has not made its economic law under the
assumption that its law functions as an element of one network, so it has
brought unexpected results. We thought that the results are exactly
international tax avoidance. To contribute to the solution of international tax
avoidance, we tried to investigate which part of the network is vulnerable.
Specifically, focusing on treaty shopping, which is one of international tax
avoidance methods, we attempt to identified which jurisdiction are likely to be
used for treaty shopping from tax liabilities and the relationship between
jurisdictions which are likely to be used for treaty shopping and others. For
that purpose, based on withholding tax rates imposed on dividends, interest,
and royalties by jurisdictions, we produced weighted multiple directed graphs,
computed the centralities and detected the communities. As a result, we
clarified the jurisdictions that are likely to be used for treaty shopping and
pointed out that there are community structures. The results of this study
suggested that fewer jurisdictions need to introduce more regulations for
prevention of treaty abuse worldwide. | [
0,
0,
0,
0,
0,
1
] | [
"Quantitative Finance",
"Statistics"
] |
Title: Reward Maximization Under Uncertainty: Leveraging Side-Observations on Networks,
Abstract: We study the stochastic multi-armed bandit (MAB) problem in the presence of
side-observations across actions that occur as a result of an underlying
network structure. In our model, a bipartite graph captures the relationship
between actions and a common set of unknowns such that choosing an action
reveals observations for the unknowns that it is connected to. This models a
common scenario in online social networks where users respond to their friends'
activity, thus providing side information about each other's preferences. Our
contributions are as follows: 1) We derive an asymptotic lower bound (with
respect to time) as a function of the bi-partite network structure on the
regret of any uniformly good policy that achieves the maximum long-term average
reward. 2) We propose two policies - a randomized policy; and a policy based on
the well-known upper confidence bound (UCB) policies - both of which explore
each action at a rate that is a function of its network position. We show,
under mild assumptions, that these policies achieve the asymptotic lower bound
on the regret up to a multiplicative factor, independent of the network
structure. Finally, we use numerical examples on a real-world social network
and a routing example network to demonstrate the benefits obtained by our
policies over other existing policies. | [
1,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics"
] |
Title: Verifying Safety of Functional Programs with Rosette/Unbound,
Abstract: The goal of unbounded program verification is to discover an inductive
invariant that safely over-approximates all possible program behaviors.
Functional languages featuring higher order and recursive functions become more
popular due to the domain-specific needs of big data analytics, web, and
security. We present Rosette/Unbound, the first program verifier for Racket
exploiting the automated constrained Horn solver on its backend. One of the key
features of Rosette/Unbound is the ability to synchronize recursive
computations over the same inputs allowing to verify programs that iterate over
unbounded data streams multiple times. Rosette/Unbound is successfully
evaluated on a set of non-trivial recursive and higher order functional
programs. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science"
] |
Title: Extended Formulations for Polytopes of Regular Matroids,
Abstract: We present a simple proof of the fact that the base (and independence)
polytope of a rank $n$ regular matroid over $m$ elements has an extension
complexity $O(mn)$. | [
1,
0,
1,
0,
0,
0
] | [
"Mathematics",
"Computer Science"
] |
Title: Nesterov's Smoothing Technique and Minimizing Differences of Convex Functions for Hierarchical Clustering,
Abstract: A bilevel hierarchical clustering model is commonly used in designing optimal
multicast networks. In this paper, we consider two different formulations of
the bilevel hierarchical clustering problem, a discrete optimization problem
which can be shown to be NP-hard. Our approach is to reformulate the problem as
a continuous optimization problem by making some relaxations on the
discreteness conditions. Then Nesterov's smoothing technique and a numerical
algorithm for minimizing differences of convex functions called the DCA are
applied to cope with the nonsmoothness and nonconvexity of the problem.
Numerical examples are provided to illustrate our method. | [
0,
0,
1,
0,
0,
0
] | [
"Computer Science",
"Mathematics"
] |
Title: Heisenberg equation for a nonrelativistic particle on a hypersurface: from the centripetal force to a curvature induced force,
Abstract: In classical mechanics, a nonrelativistic particle constrained on an $N-1$
curved hypersurface embedded in $N$ flat space experiences the centripetal
force only. In quantum mechanics, the situation is totally different for the
presence of the geometric potential. We demonstrate that the motion of the
quantum particle is "driven" by not only the the centripetal force, but also a
curvature induced force proportional to the Laplacian of the mean curvature,
which is fundamental in the interface physics, causing curvature driven
interface evolution. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: Higher order molecular organisation as a source of biological function,
Abstract: Molecular interactions have widely been modelled as networks. The local
wiring patterns around molecules in molecular networks are linked with their
biological functions. However, networks model only pairwise interactions
between molecules and cannot explicitly and directly capture the higher order
molecular organisation, such as protein complexes and pathways. Hence, we ask
if hypergraphs (hypernetworks), that directly capture entire complexes and
pathways along with protein-protein interactions (PPIs), carry additional
functional information beyond what can be uncovered from networks of pairwise
molecular interactions. The mathematical formalism of a hypergraph has long
been known, but not often used in studying molecular networks due to the lack
of sophisticated algorithms for mining the underlying biological information
hidden in the wiring patterns of molecular systems modelled as hypernetworks.
We propose a new, multi-scale, protein interaction hypernetwork model that
utilizes hypergraphs to capture different scales of protein organization,
including PPIs, protein complexes and pathways. In analogy to graphlets, we
introduce hypergraphlets, small, connected, non-isomorphic, induced
sub-hypergraphs of a hypergraph, to quantify the local wiring patterns of these
multi-scale molecular hypergraphs and to mine them for new biological
information. We apply them to model the multi-scale protein networks of baker
yeast and human and show that the higher order molecular organisation captured
by these hypergraphs is strongly related to the underlying biology.
Importantly, we demonstrate that our new models and data mining tools reveal
different, but complementary biological information compared to classical PPI
networks. We apply our hypergraphlets to successfully predict biological
functions of uncharacterised proteins. | [
0,
0,
0,
0,
1,
0
] | [
"Quantitative Biology",
"Mathematics",
"Computer Science"
] |
Title: Semi-equivelar maps on the torus are Archimedean,
Abstract: If the face-cycles at all the vertices in a map on a surface are of same type
then the map is called semi-equivelar. There are eleven types of Archimedean
tilings on the plane. All the Archimedean tilings are semi-equivelar maps. If a
map $X$ on the torus is a quotient of an Archimedean tiling on the plane then
the map $X$ is semi-equivelar. We show that each semi-equivelar map on the
torus is a quotient of an Archimedean tiling on the plane.
Vertex-transitive maps are semi-equivelar maps. We know that four types of
semi-equivelar maps on the torus are always vertex-transitive and there are
examples of other seven types of semi-equivelar maps which are not
vertex-transitive. We show that the number of ${\rm Aut}(Y)$-orbits of vertices
for any semi-equivelar map $Y$ on the torus is at most six. In fact, the number
of orbits is at most three except one type of semi-equivelar maps. Our bounds
on the number of orbits are sharp. | [
0,
0,
1,
0,
0,
0
] | [
"Mathematics"
] |
Title: Global teleconnectivity structures of the El Niño-Southern Oscillation and large volcanic eruptions -- An evolving network perspective,
Abstract: Recent work has provided ample evidence that global climate dynamics at
time-scales between multiple weeks and several years can be severely affected
by the episodic occurrence of both, internal (climatic) and external
(non-climatic) perturbations. Here, we aim to improve our understanding on how
regional to local disruptions of the "normal" state of the global surface air
temperature field affect the corresponding global teleconnectivity structure.
Specifically, we present an approach to quantify teleconnectivity based on
different characteristics of functional climate network analysis. Subsequently,
we apply this framework to study the impacts of different phases of the El
Niño-Southern Oscillation (ENSO) as well as the three largest volcanic
eruptions since the mid 20th century on the dominating spatiotemporal
co-variability patterns of daily surface air temperatures. Our results confirm
the existence of global effects of ENSO which result in episodic breakdowns of
the hierarchical organization of the global temperature field. This is
associated with the emergence of strong teleconnections. At more regional
scales, similar effects are found after major volcanic eruptions. Taken
together, the resulting time-dependent patterns of network connectivity allow a
tracing of the spatial extents of the dominating effects of both types of
climate disruptions. We discuss possible links between these observations and
general aspects of atmospheric circulation. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: Unbiased Shrinkage Estimation,
Abstract: Shrinkage estimation usually reduces variance at the cost of bias. But when
we care only about some parameters of a model, I show that we can reduce
variance without incurring bias if we have additional information about the
distribution of covariates. In a linear regression model with homoscedastic
Normal noise, I consider shrinkage estimation of the nuisance parameters
associated with control variables. For at least three control variables and
exogenous treatment, I establish that the standard least-squares estimator is
dominated with respect to squared-error loss in the treatment effect even among
unbiased estimators and even when the target parameter is low-dimensional. I
construct the dominating estimator by a variant of James-Stein shrinkage in a
high-dimensional Normal-means problem. It can be interpreted as an invariant
generalized Bayes estimator with an uninformative (improper) Jeffreys prior in
the target parameter. | [
0,
0,
1,
1,
0,
0
] | [
"Statistics",
"Mathematics"
] |
Title: Characterizing The Influence of Continuous Integration. Empirical Results from 250+ Open Source and Proprietary Projects,
Abstract: Continuous integration (CI) tools integrate code changes by automatically
compiling, building, and executing test cases upon submission of code changes.
Use of CI tools is getting increasingly popular, yet how proprietary projects
reap the benefits of CI remains unknown. To investigate the influence of CI on
software development, we analyze 150 open source software (OSS) projects, and
123 proprietary projects. For OSS projects, we observe the expected benefits
after CI adoption, e.g., improvements in bug and issue resolution. However, for
the proprietary projects, we cannot make similar observations. Our findings
indicate that only adoption of CI might not be enough to the improve software
development process. CI can be effective for software development if
practitioners use CI's feedback mechanism efficiently, by applying the practice
of making frequent commits. For our set of proprietary projects we observe
practitioners commit less frequently, and hence not use CI effectively for
obtaining feedback on the submitted code changes. Based on our findings we
recommend industry practitioners to adopt the best practices of CI to reap the
benefits of CI tools for example, making frequent commits. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science"
] |
Title: On Controllable Abundance Of Saturated-input Linear Discrete Systems,
Abstract: Several theorems on the volume computing of the polyhedron spanned by a
n-dimensional vector set with the finite-interval parameters are presented and
proved firstly, and then are used in the analysis of the controllable regions
of the linear discrete time-invariant systems with saturated inputs. A new
concept and continuous measure on the control ability, control efficiency of
the input variables, and the diversity of the control laws, named as the
controllable abundance, is proposed based on the volume computing of the
regions and is applied to the actuator placing and configuring problems, the
optimizing problems of dynamics and kinematics of the controlled plants, etc..
The numerical experiments show the effectiveness of the new concept and methods
for investigating and optimizing the control ability and efficiency. | [
1,
0,
1,
0,
0,
0
] | [
"Mathematics",
"Computer Science"
] |
Title: To the Acceleration of Charged Particles with Travelling Laser Focus,
Abstract: We describe here the latest results of calculations with FlexPDE code of
wake-fields induced by the bunch in micro-structures. These structures,
illuminated by swept laser bust, serve for acceleration of charged particles.
The basis of the scheme is a fast sweeping device for the laser bunch. After
sweeping, the laser bunch has a slope ~45o with respect to the direction of
propagation. So the every cell of the microstructure becomes excited locally
only for the moment when the particles are there. Self-consistent parameters of
collider based on this idea allow consideration this type of collider as a
candidate for the near-future accelerator era. | [
0,
1,
0,
0,
0,
0
] | [
"Physics"
] |
Title: An IoT Analytics Embodied Agent Model based on Context-Aware Machine Learning,
Abstract: Agent-based Internet of Things (IoT) applications have recently emerged as
applications that can involve sensors, wireless devices, machines and software
that can exchange data and be accessed remotely. Such applications have been
proposed in several domains including health care, smart cities and
agriculture. However, despite their increased adoption, deploying these
applications in specific settings has been very challenging because of the
complex static and dynamic variability of the physical devices such as sensors
and actuators, the software application behavior and the environment in which
the application is embedded. In this paper, we propose a modeling approach for
IoT analytics based on learning embodied agents (i.e. situated agents). The
approach involves: (i) a variability model of IoT embodied agents; (ii)
feedback evaluative machine learning; and (iii) reconfiguration of a group of
agents in accordance with environmental context. The proposed approach advances
the state of the art in that it facilitates the development of Agent-based IoT
applications by explicitly capturing their complex and dynamic variabilities
and supporting their self-configuration based on an context-aware and machine
learning-based approach. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science"
] |
Title: Neural Sequence Model Training via $α$-divergence Minimization,
Abstract: We propose a new neural sequence model training method in which the objective
function is defined by $\alpha$-divergence. We demonstrate that the objective
function generalizes the maximum-likelihood (ML)-based and reinforcement
learning (RL)-based objective functions as special cases (i.e., ML corresponds
to $\alpha \to 0$ and RL to $\alpha \to1$). We also show that the gradient of
the objective function can be considered a mixture of ML- and RL-based
objective gradients. The experimental results of a machine translation task
show that minimizing the objective function with $\alpha > 0$ outperforms
$\alpha \to 0$, which corresponds to ML-based methods. | [
1,
0,
0,
1,
0,
0
] | [
"Computer Science",
"Statistics"
] |
Title: Persuasive Technology For Human Development: Review and Case Study,
Abstract: Technology is an extremely potent tool that can be leveraged for human
development and social good. Owing to the great importance of environment and
human psychology in driving human behavior, and the ubiquity of technology in
modern life, there is a need to leverage the insights and capabilities of both
fields together for nudging people towards a behavior that is optimal in some
sense (personal or social). In this regard, the field of persuasive technology,
which proposes to infuse technology with appropriate design and incentives
using insights from psychology, behavioral economics, and human-computer
interaction holds a lot of promise. Whilst persuasive technology is already
being developed and is at play in many commercial applications, it can have the
great social impact in the field of Information and Communication Technology
for Development (ICTD) which uses Information and Communication Technology
(ICT) for human developmental ends such as education and health. In this paper
we will explore what persuasive technology is and how it can be used for the
ends of human development. To develop the ideas in a concrete setting, we
present a case study outlining how persuasive technology can be used for human
development in Pakistan, a developing South Asian country, that suffers from
many of the problems that plague typical developing country. | [
1,
0,
0,
0,
0,
0
] | [
"Computer Science",
"Quantitative Biology"
] |