id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
479
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
unknown | authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2301.00710 | Stefan Machmeier | Stefan Machmeier | Honeypot Implementation in a Cloud Environment | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | In this age of digitalization, Internet services face more attacks than ever.
An attacker's objective is to exploit systems and use them for malicious
purposes. Such efforts are rising as vulnerable systems can be discovered and
compromised through Internet-wide scanning. One known methodology besides
traditional security leverages is to learn from those who attack it. A honeypot
helps to collect information about an attacker by pretending to be a vulnerable
target. Thus, how honeypots can contribute to a more secure infrastructure
makes an interesting topic of research. This thesis will present a honeypot
solution to investigate malicious activities in heiCLOUD and show that attacks
have increased significantly. To detect attackers in restricted network zones
at Heidelberg University, a new concept to discover leaks in the firewall will
be created. Furthermore, to consider an attacker's point of view, a method for
detecting honeypots at the transport level will be introduced. Lastly, a
customized OpenSSH server that works as an intermediary instance will be
presented to mitigate these efforts.
| [
{
"version": "v1",
"created": "Mon, 2 Jan 2023 15:02:54 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 14:35:54 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Machmeier",
"Stefan",
""
]
] |
2301.05089 | Aditya Dave | Aditya Dave, Nishanth Venkatesh, Andreas A. Malikopoulos | Approximate Information States for Worst-Case Control and Learning in
Uncertain Systems | Preliminary results related to this article were reported in
arXiv:2203.15271 | IEEE Transactions on Automatic Control (TAC), 2024 | 10.1109/TAC.2024.3422889 | null | eess.SY cs.AI cs.SY math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate discrete-time decision-making problems in
uncertain systems with partially observed states. We consider a non-stochastic
model, where uncontrolled disturbances acting on the system take values in
bounded sets with unknown distributions. We present a general framework for
decision-making in such problems by using the notion of the information state
and approximate information state, and introduce conditions to identify an
uncertain variable that can be used to compute an optimal strategy through a
dynamic program (DP). Next, we relax these conditions and define approximate
information states that can be learned from output data without knowledge of
system dynamics. We use approximate information states to formulate a DP that
yields a strategy with a bounded performance loss. Finally, we illustrate the
application of our results in control and reinforcement learning using
numerical examples.
| [
{
"version": "v1",
"created": "Thu, 12 Jan 2023 15:36:36 GMT"
},
{
"version": "v2",
"created": "Sat, 6 Apr 2024 00:50:16 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Dave",
"Aditya",
""
],
[
"Venkatesh",
"Nishanth",
""
],
[
"Malikopoulos",
"Andreas A.",
""
]
] |
2301.06178 | Anthony Rios | Xingmeng Zhao, Dan Schumacher, Sashank Nalluri, Xavier Walton, Suhana
Shrestha and Anthony Rios | Bike Frames: Understanding the Implicit Portrayal of Cyclists in the
News | Accepted to AAAI ICWSM 2025 | null | null | null | cs.CY cs.CL | http://creativecommons.org/licenses/by/4.0/ | Increasing cycling for transportation or recreation can boost health and
reduce the environmental impacts of vehicles. However, news agencies'
ideologies and reporting styles often influence public perception of cycling.
For example, if news agencies overly report cycling accidents, it may make
people perceive cyclists as "dangerous," reducing the number of cyclists who
opt to cycle. Additionally, a decline in cycling can result in less government
funding for safe infrastructure. In this paper, we develop a method for
detecting the perceived perception of cyclists within news headlines. We
introduce a new dataset called ``Bike Frames'' to accomplish this. The dataset
consists of 31,480 news headlines and 1,500 annotations. Our focus is on
analyzing 11,385 headlines from the United States. We also introduce the
BikeFrame Chain-of-Code framework to predict cyclist perception, identify
accident-related headlines, and determine fault. This framework uses pseudocode
for precise logic and integrates news agency bias analysis for improved
predictions over traditional chain-of-thought reasoning in large language
models. Our method substantially outperforms other methods, and most
importantly, we find that incorporating news bias information substantially
impacts performance, improving the average F1 from .739 to .815. Finally, we
perform a comprehensive case study on US-based news headlines, finding
reporting differences between news agencies and cycling-specific websites as
well as differences in reporting depending on the gender of cyclists. WARNING:
This paper contains descriptions of accidents and death.
| [
{
"version": "v1",
"created": "Sun, 15 Jan 2023 20:22:03 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2024 20:42:44 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Zhao",
"Xingmeng",
""
],
[
"Schumacher",
"Dan",
""
],
[
"Nalluri",
"Sashank",
""
],
[
"Walton",
"Xavier",
""
],
[
"Shrestha",
"Suhana",
""
],
[
"Rios",
"Anthony",
""
]
] |
2301.08858 | Robin Koytcheff | Robin Koytcheff and Yongheng Zhang | Cubes, cacti, and framed long knots | Main changes: added a new proof of the nontriviality of a certain
Browder bracket found by Sakai; added an illustration of the action of cacti
on aligned maps coming from knots; reduced background content in Sections 2
and 3; and slightly shortened Section 5. Now 40 pages | null | null | null | math.AT math.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define an action of the operad of projective spineless cacti on each stage
of the Taylor tower for the space of framed 1-dimensional long knots in any
Euclidean space. By mapping a subspace of the overlapping intervals operad to
the subspace of normalized cacti, we prove a space-level compatibility of our
action with Budney's little 2-cubes action on the space of framed long knots
itself. Our result improves upon previous joint work of the first author
related to the conjecture that the Taylor tower for classical long knots is a
universal Vassiliev invariant over the integers. As a corollary, we reprove the
nontriviality of a certain Browder bracket class first detected by Sakai.
| [
{
"version": "v1",
"created": "Sat, 21 Jan 2023 02:32:03 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2024 20:58:50 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Koytcheff",
"Robin",
""
],
[
"Zhang",
"Yongheng",
""
]
] |
2301.08967 | Alexander Kilian | Alexander Kilian and Bernhard Maschke and Andrii Mironchenko and
Fabian Wirth | Infinite-dimensional port-Hamiltonian systems with a stationary
interface | arXiv admin note: text overlap with arXiv:2301.07344 | null | null | null | math.AP math.OC | http://creativecommons.org/licenses/by/4.0/ | We consider two systems of two conservation laws that are defined on
complementary spatial intervals and coupled by an interface as a single
port-Hamiltonian system. In case of a fixed interface position, we characterize
the boundary and interface conditions for which the associated port-Hamiltonian
operator generates a contraction semigroup. Furthermore, we present sufficient
conditions for the exponential stability of the generated $C_0$-semigroup. The
results are illustrated by the example of two acoustic waveguides coupled by an
interface consisting of some membrane.
| [
{
"version": "v1",
"created": "Sat, 21 Jan 2023 16:11:42 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 15:35:31 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Kilian",
"Alexander",
""
],
[
"Maschke",
"Bernhard",
""
],
[
"Mironchenko",
"Andrii",
""
],
[
"Wirth",
"Fabian",
""
]
] |
2301.10311 | Walter Guttmann | Walter Guttmann | Relation-Algebraic Verification of Disjoint-Set Forests | added explanations, simplified postconditions, restructured paper | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies how to use relation algebras, which are useful for
high-level specification and verification, for proving the correctness of
lower-level array-based implementations of algorithms. We give a simple
relation-algebraic semantics of read and write operations on associative
arrays. The array operations seamlessly integrate with assignments in
computation models supporting while-programs. As a result, relation algebras
can be used for verifying programs with associative arrays. We verify the
correctness of an array-based implementation of disjoint-set forests using the
union-by-rank strategy and find operations with path compression, path
splitting and path halving. All results are formally proved in Isabelle/HOL.
This paper is an extended version of [1].
| [
{
"version": "v1",
"created": "Tue, 24 Jan 2023 21:23:13 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Aug 2023 03:47:12 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jan 2024 00:21:59 GMT"
},
{
"version": "v4",
"created": "Tue, 16 Jul 2024 21:32:10 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Guttmann",
"Walter",
""
]
] |
2302.02778 | Emil L{\o}vbak | Emil L{\o}vbak, Fr\'ed\'eric Blondeel, Adam Lee, Lander Vanroye,
Andreas Van Barel and Giovanni Samaey | Reversible random number generation for adjoint Monte Carlo simulation
of the heat equation | 17 pages, 5 figures, accepted for the proceedings of MCQMC22, minor
rephrasing upon reviewer suggestion and corrections in acknowledgements | Monte Carlo and Quasi-Monte Carlo Methods 2022, 451--468 (2024) | 10.1007/978-3-030-43465-6_19 | null | math.NA cs.NA | http://creativecommons.org/licenses/by/4.0/ | In PDE-constrained optimization, one aims to find design parameters that
minimize some objective, subject to the satisfaction of a partial differential
equation. A major challenges is computing gradients of the objective to the
design parameters, as applying the chain rule requires computing the Jacobian
of the design parameters to the PDE's state. The adjoint method avoids this
Jacobian by computing partial derivatives of a Lagrangian. Evaluating these
derivatives requires the solution of a second PDE with the adjoint differential
operator to the constraint, resulting in a backwards-in-time simulation.
Particle-based Monte Carlo solvers are often used to compute the solution to
high-dimensional PDEs. However, such solvers have the drawback of introducing
noise to the computed results, thus requiring stochastic optimization methods.
To guarantee convergence in this setting, both the constraint and adjoint Monte
Carlo simulations should simulate the same particle trajectories. For large
simulations, storing full paths from the constraint equation for re-use in the
adjoint equation becomes infeasible due to memory limitations. In this paper,
we provide a reversible extension to the family of permuted congruential
pseudorandom number generators (PCG). We then use such a generator to recompute
these time-reversed paths for the heat equation, avoiding these memory issues.
| [
{
"version": "v1",
"created": "Mon, 6 Feb 2023 13:48:30 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Sep 2023 14:08:54 GMT"
},
{
"version": "v3",
"created": "Sun, 24 Dec 2023 13:51:49 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Løvbak",
"Emil",
""
],
[
"Blondeel",
"Frédéric",
""
],
[
"Lee",
"Adam",
""
],
[
"Vanroye",
"Lander",
""
],
[
"Van Barel",
"Andreas",
""
],
[
"Samaey",
"Giovanni",
""
]
] |
2302.04412 | Tomoya Wakayama | Tomoya Wakayama and Shonosuke Sugasawa | Spatiotemporal factor models for functional data with application to
population map forecast | null | null | null | null | stat.AP stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The proliferation of mobile devices has led to the collection of large
amounts of population data. This situation has prompted the need to utilize
this rich, multidimensional data in practical applications. In response to this
trend, we have integrated functional data analysis (FDA) and factor analysis to
address the challenge of predicting hourly population changes across various
districts in Tokyo. Specifically, by assuming a Gaussian process, we avoided
the large covariance matrix parameters of the multivariate normal distribution.
In addition, the data were both time and spatially dependent between districts.
To capture these characteristics, a Bayesian factor model was introduced, which
modeled the time series of a small number of common factors and expressed the
spatial structure through factor loading matrices. Furthermore, the factor
loading matrices were made identifiable and sparse to ensure the
interpretability of the model. We also proposed a Bayesian shrinkage method as
a systematic approach for factor selection. Through numerical experiments and
data analysis, we investigated the predictive accuracy and interpretability of
our proposed method. We concluded that the flexibility of the method allows for
the incorporation of additional time series features, thereby improving its
accuracy.
| [
{
"version": "v1",
"created": "Thu, 9 Feb 2023 02:43:47 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Jun 2023 14:59:38 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 05:52:58 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Wakayama",
"Tomoya",
""
],
[
"Sugasawa",
"Shonosuke",
""
]
] |
2302.05487 | Petr Stepanov | Niels C.H. Hesp, Sergi Batlle-Porro, Roshan Krishna Kumar, Hitesh
Agarwal, David Barcons-Ruiz, Hanan Herzig Sheinfux, Kenji Watanabe, Takashi
Taniguchi, Petr Stepanov, Frank H.L. Koppens | Cryogenic nano-imaging of second-order moir\'e superlattices | 10 pages, 5 figures | null | null | null | cond-mat.mes-hall | http://creativecommons.org/licenses/by/4.0/ | Second-order superlattices form when moir\'e superlattices of similar
periodicities interfere with each other, leading to even larger superlattice
periodicities. These crystalline structures have been engineered utilizing
two-dimensional (2D) materials such as graphene and hexagonal boron nitride
(hBN) under specific alignment conditions. Such specific alignment has shown to
play a crucial role in facilitating correlation-driven topological phases
featuring the quantized anomalous Hall effect. While signatures of second-order
superlattices have been identified in magnetotransport experiments, any
real-space visualization is lacking to date. In this work, we present
\NT{electronic transport measurements and cryogenic nanoscale photovoltage (PV)
measurements} that reveal a second-order superlattice in magic-angle twisted
bilayer graphene closely aligned to hBN. This is evidenced by long-range
periodic photovoltage modulations across the entire sample backed by the
corresponding electronic transport features. Supported by theoretical
calculations, our experimental data show that even minuscule strain and
twist-angle variations on the order of 0.01$^\circ$ can lead to a drastic
change of the second-order superlattice structure between local
one-dimensional, square or triangular types. Our real-space observations
therefore serve as a strong `magnifying glass' for strain and twist angle and
can shed new light on the mechanisms responsible for the breaking of spatial
symmetries in twisted bilayer graphene, and pave an avenue to engineer
long-range superlattice structures in 2D materials using strain fields.
| [
{
"version": "v1",
"created": "Fri, 10 Feb 2023 19:48:03 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2024 20:23:03 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Hesp",
"Niels C. H.",
""
],
[
"Batlle-Porro",
"Sergi",
""
],
[
"Kumar",
"Roshan Krishna",
""
],
[
"Agarwal",
"Hitesh",
""
],
[
"Barcons-Ruiz",
"David",
""
],
[
"Sheinfux",
"Hanan Herzig",
""
],
[
"Watanabe",
"Kenji",
""
],
[
"Taniguchi",
"Takashi",
""
],
[
"Stepanov",
"Petr",
""
],
[
"Koppens",
"Frank H. L.",
""
]
] |
2302.08937 | Gustave Bainier | Gustave Bainier, Benoit Marx, Jean-Christophe Ponsart | Orthogonal Projection of Convex Sets with a Differentiable Boundary | 13 pages, 7 figures | null | null | null | math.DG math.GN | http://creativecommons.org/licenses/by/4.0/ | Given an Euclidean space, this paper elucidates the topological link between
the partial derivatives of the Minkowski functional associated to a set
(assumed to be compact, convex, with a differentiable boundary and a non-empty
interior) and the boundary of its orthogonal projection onto the linear
subspaces of the Euclidean space. A system of equations for these orthogonal
projections is derived from this topological link. This result is illustrated
by the projection of the unit ball of norm $4$ in $\mathbb{R}^3$ on a plane.
| [
{
"version": "v1",
"created": "Fri, 17 Feb 2023 15:22:18 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 13:39:48 GMT"
},
{
"version": "v3",
"created": "Wed, 28 Feb 2024 13:37:59 GMT"
},
{
"version": "v4",
"created": "Wed, 17 Jul 2024 14:34:30 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Bainier",
"Gustave",
""
],
[
"Marx",
"Benoit",
""
],
[
"Ponsart",
"Jean-Christophe",
""
]
] |
2302.14697 | Paul Breiding | Viktoriia Borovik and Paul Breiding | A short proof for the parameter continuation theorem | null | null | null | null | math.AG cs.NA math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Parameter Continuation Theorem is the theoretical foundation for
polynomial homotopy continuation, which is one of the main tools in
computational algebraic geometry. In this note, we give a short proof using
Gr\"obner bases. Our approach gives a method for computing discriminants.
| [
{
"version": "v1",
"created": "Tue, 28 Feb 2023 16:09:09 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Mar 2023 07:48:01 GMT"
},
{
"version": "v3",
"created": "Wed, 10 May 2023 12:01:27 GMT"
},
{
"version": "v4",
"created": "Tue, 31 Oct 2023 00:04:40 GMT"
},
{
"version": "v5",
"created": "Wed, 17 Jul 2024 15:13:32 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Borovik",
"Viktoriia",
""
],
[
"Breiding",
"Paul",
""
]
] |
2303.01784 | Martin Lonsky | Martin Lonsky, Martin Lang, Samuel Holt, Swapneel Amit Pathak, Robin
Klause, Tzu-Hsiang Lo, Marijan Beg, Axel Hoffmann, Hans Fangohr | Numerical simulation projects in micromagnetics with Jupyter | Main article: 9 pages; supplementary material: 24 pages. Accepted for
publication in American Journal of Physics | null | null | null | physics.ed-ph cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We report a case study where an existing materials science course was
modified to include numerical simulation projects on the micromagnetic behavior
of materials. The Ubermag micromagnetic simulation software package is used in
order to solve problems computationally. The simulation software is controlled
through Python code in Jupyter notebooks. Our experience is that the self-paced
problem-solving nature of the project work can facilitate a better in-depth
exploration of the course contents. We discuss which aspects of the Ubermag and
the project Jupyter ecosystem have been beneficial for the students' learning
experience and which could be transferred to similar teaching activities in
other subject areas.
| [
{
"version": "v1",
"created": "Fri, 3 Mar 2023 08:48:21 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 14:21:40 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Lonsky",
"Martin",
""
],
[
"Lang",
"Martin",
""
],
[
"Holt",
"Samuel",
""
],
[
"Pathak",
"Swapneel Amit",
""
],
[
"Klause",
"Robin",
""
],
[
"Lo",
"Tzu-Hsiang",
""
],
[
"Beg",
"Marijan",
""
],
[
"Hoffmann",
"Axel",
""
],
[
"Fangohr",
"Hans",
""
]
] |
2303.02498 | Thomas E Bartlett | Thomas E. Bartlett, Swati Chandna, and Sandipan Roy | A stochastic network approach to clustering and visualising single-cell
genomic count data | null | null | null | null | stat.ME | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Important tasks in the study of genomic data include the identification of
groups of similar cells (for example by clustering), and visualisation of data
summaries (for example by dimensional reduction). In this paper, we propose a
novel approach to studying single-cell genomic data, by modelling the observed
genomic data count matrix $\mathbf{X}\in\mathbb{Z}_{\geq0}^{p\times n}$ as a
bipartite network with multi-edges. Utilising this first-principles network
representation of the raw data, we propose clustering single cells in a
suitably identified $d$-dimensional Laplacian Eigenspace (LE) via a Gaussian
mixture model (GMM-LE), and employing UMAP to non-linearly project the LE to
two dimensions for visualisation (UMAP-LE). This LE representation of the data
estimates transformed latent positions (of genes and cells), under a latent
position model of nodes in a bipartite stochastic network. We demonstrate how
these estimated latent positions can enable fine-grained clustering and
visualisation of single-cell genomic data, by application to data from three
recent genomics studies in different biological contexts. In each data
application, clusters of cells independently learned by our proposed
methodology are found to correspond to cells expressing specific marker genes
that were independently defined by domain experts. In this validation setting,
our proposed clustering methodology outperforms the industry-standard for these
data. Furthermore, we validate components of the LE decomposition of the data
by contrasting healthy cells from normal and at-risk groups in a
machine-learning model, thereby generating an LE cancer biomarker that
significantly predicts long-term patient survival outcome in an independent
validation dataset.
| [
{
"version": "v1",
"created": "Sat, 4 Mar 2023 20:47:30 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 12:00:11 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 13:33:11 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Bartlett",
"Thomas E.",
""
],
[
"Chandna",
"Swati",
""
],
[
"Roy",
"Sandipan",
""
]
] |
2303.05759 | Chengwei Wei | Chengwei Wei, Yun-Cheng Wang, Bin Wang, C.-C. Jay Kuo | An Overview on Language Models: Recent Developments and Outlook | null | null | 10.1561/116.00000010 | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Language modeling studies the probability distributions over strings of
texts. It is one of the most fundamental tasks in natural language processing
(NLP). It has been widely used in text generation, speech recognition, machine
translation, etc. Conventional language models (CLMs) aim to predict the
probability of linguistic sequences in a causal manner, while pre-trained
language models (PLMs) cover broader concepts and can be used in both causal
sequential modeling and fine-tuning for downstream applications. PLMs have
their own training paradigms (usually self-supervised) and serve as foundation
models in modern NLP systems. This overview paper provides an introduction to
both CLMs and PLMs from five aspects, i.e., linguistic units, architectures,
training methods, evaluation methods, and applications. Furthermore, we discuss
the relationship between CLMs and PLMs and shed light on the future directions
of language modeling in the pre-trained era.
| [
{
"version": "v1",
"created": "Fri, 10 Mar 2023 07:55:00 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2023 05:52:04 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Wei",
"Chengwei",
""
],
[
"Wang",
"Yun-Cheng",
""
],
[
"Wang",
"Bin",
""
],
[
"Kuo",
"C. -C. Jay",
""
]
] |
2303.05989 | P\'al Andr\'as Papp | P\'al Andr\'as Papp, Georg Anegg, A. N. Yzelman | DAG Scheduling in the BSP Model | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of scheduling an arbitrary computational DAG on a fixed
number of processors while minimizing the makespan. While previous works have
mostly studied this problem in fairly restricted models, we define and analyze
DAG scheduling in the Bulk Synchronous Parallel (BSP) model, which is a
well-established parallel computing model that captures the communication cost
between processors much more accurately. We provide a taxonomy of simpler
scheduling models that can be understood as variants or special cases of BSP,
and discuss how the properties and optimum cost of these models relate to BSP.
This essentially allows us to dissect the different building blocks of the BSP
model, and gain insight into how these influence the scheduling problem.
We then analyze the hardness of DAG scheduling in BSP in detail. We show that
the problem is solvable in polynomial time for some very simple classes of
DAGs, but it is already NP-hard for in-trees or DAGs of height 2. We also prove
that in general DAGs, the problem is APX-hard: it cannot be approximated to a
$(1+\epsilon)$-factor in polynomial time for some specific $\epsilon>0$. We
then separately study the subproblem of scheduling communication steps, and we
show that the NP-hardness of this problem depends on the problem parameters and
the communication rules within the BSP model. Finally, we present and analyze a
natural formulation of our scheduling task as an Integer Linear Program.
| [
{
"version": "v1",
"created": "Fri, 10 Mar 2023 15:45:09 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2024 18:28:31 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Papp",
"Pál András",
""
],
[
"Anegg",
"Georg",
""
],
[
"Yzelman",
"A. N.",
""
]
] |
2303.06089 | Alberto Manzano | Alberto Manzano, Gonzalo Ferro, \'Alvaro Leitao, Carlos V\'azquez,
Andr\'es G\'omez | Real Option Pricing using Quantum Computers | 32 pages, 15 figures, 3 tables | null | null | null | quant-ph q-fin.CP | http://creativecommons.org/licenses/by/4.0/ | In this work we present an alternative methodology to the standard Quantum
Accelerated Monte Carlo (QAMC) applied to derivatives pricing. Our pipeline
benefits from the combination of a new encoding protocol, referred to as the
direct encoding, and a amplitude estimation algorithm, the modified Real
Quantum Amplitude Estimation (mRQAE) algorithm. On the one hand, the direct
encoding prepares a quantum state which contains the information about the sign
of the expected payoff. On the other hand, the mRQAE is able to read all the
information contained in the quantum state. Although the procedure we describe
is different from the standard one, the main building blocks are almost the
same. Thus, all the extensive research that has been performed is still
applicable. Moreover, we experimentally compare the performance of the proposed
methodology against the standard QAMC employing a quantum emulator and show
that we retain the speedups.
| [
{
"version": "v1",
"created": "Fri, 10 Mar 2023 17:09:59 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 11:26:52 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Manzano",
"Alberto",
""
],
[
"Ferro",
"Gonzalo",
""
],
[
"Leitao",
"Álvaro",
""
],
[
"Vázquez",
"Carlos",
""
],
[
"Gómez",
"Andrés",
""
]
] |
2303.06947 | Lorenzo Cazzella | Lorenzo Cazzella, Francesco Linsalata, Maurizio Magarini, Matteo
Matteucci, Umberto Spagnolini | A Multi-Modal Simulation Framework to Enable Digital Twin-based V2X
Communications in Dynamic Environments | null | null | null | null | eess.SP cs.LG cs.NI | http://creativecommons.org/licenses/by-sa/4.0/ | Digital Twins (DTs) for physical wireless environments have been recently
proposed as accurate virtual representations of the propagation environment
that can enable multi-layer decisions at the physical communication equipment.
At high-frequency bands, DTs can help to overcome the challenges emerging in
high mobility conditions featuring vehicular environments. In this paper, we
propose a novel data-driven workflow for the creation of the DT of a
Vehicle-to-Everything (V2X) communication scenario and a multi-modal simulation
framework for the generation of realistic sensor data and accurate
mmWave/sub-THz wireless channels. The proposed method leverages an automotive
simulation and testing framework and an accurate ray-tracing channel simulator.
Simulations over an urban scenario show the achievable realistic sensor and
channel modelling both at the infrastructure and at ego-vehicles. We showcase
the proposed framework on the DT-aided blockage handover task for V2X link
restoration, leveraging the framework's dynamic channel generation capabilities
for realistic vehicular blockage simulation.
| [
{
"version": "v1",
"created": "Mon, 13 Mar 2023 09:31:20 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Apr 2023 14:46:32 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 13:24:22 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Cazzella",
"Lorenzo",
""
],
[
"Linsalata",
"Francesco",
""
],
[
"Magarini",
"Maurizio",
""
],
[
"Matteucci",
"Matteo",
""
],
[
"Spagnolini",
"Umberto",
""
]
] |
2303.07068 | Lakshmi Mandal | Lakshmi Mandal and Shalabh Bhatnagar | n-Step Temporal Difference Learning with Optimal n | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of finding the optimal value of n in the n-step
temporal difference (TD) learning algorithm. Our objective function for the
optimization problem is the average root mean squared error (RMSE). We find the
optimal n by resorting to a model-free optimization technique involving a
one-simulation simultaneous perturbation stochastic approximation (SPSA) based
procedure. Whereas SPSA is a zeroth-order continuous optimization procedure, we
adapt it to the discrete optimization setting by using a random projection
operator. We prove the asymptotic convergence of the recursion by showing that
the sequence of n-updates obtained using zeroth-order stochastic gradient
search converges almost surely to an internally chain transitive invariant set
of an associated differential inclusion. This results in convergence of the
discrete parameter sequence to the optimal n in n-step TD. Through experiments,
we show that the optimal value of n is achieved with our SDPSA algorithm for
arbitrary initial values. We further show using numerical evaluations that
SDPSA outperforms the state-of-the-art discrete parameter stochastic
optimization algorithm Optimal Computing Budget Allocation (OCBA) on benchmark
RL tasks.
| [
{
"version": "v1",
"created": "Mon, 13 Mar 2023 12:44:32 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Apr 2023 14:38:42 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Apr 2023 09:02:37 GMT"
},
{
"version": "v4",
"created": "Fri, 14 Apr 2023 13:09:36 GMT"
},
{
"version": "v5",
"created": "Wed, 17 Jul 2024 15:07:13 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Mandal",
"Lakshmi",
""
],
[
"Bhatnagar",
"Shalabh",
""
]
] |
2303.09079 | Jiaqi Xue | Mengxin Zheng, Jiaqi Xue, Zihao Wang, Xun Chen, Qian Lou, Lei Jiang
and Xiaofeng Wang | SSL-Cleanse: Trojan Detection and Mitigation in Self-Supervised Learning | Accepted by the 18th European Conference on Computer Vision ECCV 2024 | null | null | null | cs.CR cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Self-supervised learning (SSL) is a prevalent approach for encoding data
representations. Using a pre-trained SSL image encoder and subsequently
training a downstream classifier, impressive performance can be achieved on
various tasks with very little labeled data. The growing adoption of SSL has
led to an increase in security research on SSL encoders and associated Trojan
attacks. Trojan attacks embedded in SSL encoders can operate covertly,
spreading across multiple users and devices. The presence of backdoor behavior
in Trojaned encoders can inadvertently be inherited by downstream classifiers,
making it even more difficult to detect and mitigate the threat. Although
current Trojan detection methods in supervised learning can potentially
safeguard SSL downstream classifiers, identifying and addressing triggers in
the SSL encoder before its widespread dissemination is a challenging task. This
challenge arises because downstream tasks might be unknown, dataset labels may
be unavailable, and the original unlabeled training dataset might be
inaccessible during Trojan detection in SSL encoders. We introduce SSL-Cleanse
as a solution to identify and mitigate backdoor threats in SSL encoders. We
evaluated SSL-Cleanse on various datasets using 1200 encoders, achieving an
average detection success rate of 82.2% on ImageNet-100. After mitigating
backdoors, on average, backdoored encoders achieve 0.3% attack success rate
without great accuracy loss, proving the effectiveness of SSL-Cleanse. The
source code of SSL-Cleanse is available at
https://github.com/UCF-ML-Research/SSL-Cleanse.
| [
{
"version": "v1",
"created": "Thu, 16 Mar 2023 04:45:06 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Oct 2023 01:17:14 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Jul 2024 23:07:24 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Zheng",
"Mengxin",
""
],
[
"Xue",
"Jiaqi",
""
],
[
"Wang",
"Zihao",
""
],
[
"Chen",
"Xun",
""
],
[
"Lou",
"Qian",
""
],
[
"Jiang",
"Lei",
""
],
[
"Wang",
"Xiaofeng",
""
]
] |
2303.09255 | Stefan B\"auml | Stefan B\"auml, Carlos Pascual-Garc\'ia, Victoria Wright, Omar Fawzi,
Antonio Ac\'in | Security of discrete-modulated continuous-variable quantum key
distribution | Accepted version | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | Continuous variable quantum key distribution with discrete modulation has the
potential to provide information-theoretic security using widely available
optical elements and existing telecom infrastructure. While their
implementation is significantly simpler than that for protocols based on
Gaussian modulation, proving their finite-size security against coherent
attacks poses a challenge. In this work we prove finite-size security against
coherent attacks for a discrete-modulated quantum key distribution protocol
involving four coherent states and heterodyne detection. To do so, and contrary
to most of the existing schemes, we first discretize all the continuous
variables generated during the protocol. This allows us to use the entropy
accumulation theorem, a tool that has previously been used in the setting of
discrete variables, to construct the finite-size security proof. We then
compute the corresponding finite-key rates through semi-definite programming
and under a photon-number cutoff. Our analysis provides asymptotic rates in the
range of $0.1-10^{-4}$ bits per round for distances up to hundred kilometres,
while in the finite case and for realistic parameters, we get of the order of
$10$ Gbits of secret key after $n\sim10^{11}$ rounds and distances of few tens
of kilometres.
| [
{
"version": "v1",
"created": "Thu, 16 Mar 2023 12:14:07 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jun 2023 16:00:48 GMT"
},
{
"version": "v3",
"created": "Fri, 29 Sep 2023 02:53:09 GMT"
},
{
"version": "v4",
"created": "Wed, 17 Jul 2024 14:39:52 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Bäuml",
"Stefan",
""
],
[
"Pascual-García",
"Carlos",
""
],
[
"Wright",
"Victoria",
""
],
[
"Fawzi",
"Omar",
""
],
[
"Acín",
"Antonio",
""
]
] |
2303.09281 | Jinxiang Lai | Jinxiang Lai, Siqian Yang, Wenlong Wu, Tao Wu, Guannan Jiang, Xi Wang,
Jun Liu, Bin-Bin Gao, Wei Zhang, Yuan Xie, Chengjie Wang | SpatialFormer: Semantic and Target Aware Attentions for Few-Shot
Learning | null | AAAI 2023 | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Recent Few-Shot Learning (FSL) methods put emphasis on generating a
discriminative embedding features to precisely measure the similarity between
support and query sets. Current CNN-based cross-attention approaches generate
discriminative representations via enhancing the mutually semantic similar
regions of support and query pairs. However, it suffers from two problems: CNN
structure produces inaccurate attention map based on local features, and
mutually similar backgrounds cause distraction. To alleviate these problems, we
design a novel SpatialFormer structure to generate more accurate attention
regions based on global features. Different from the traditional Transformer
modeling intrinsic instance-level similarity which causes accuracy degradation
in FSL, our SpatialFormer explores the semantic-level similarity between pair
inputs to boost the performance. Then we derive two specific attention modules,
named SpatialFormer Semantic Attention (SFSA) and SpatialFormer Target
Attention (SFTA), to enhance the target object regions while reduce the
background distraction. Particularly, SFSA highlights the regions with same
semantic information between pair features, and SFTA finds potential foreground
object regions of novel feature that are similar to base categories. Extensive
experiments show that our methods are effective and achieve new
state-of-the-art results on few-shot classification benchmarks.
| [
{
"version": "v1",
"created": "Wed, 15 Mar 2023 08:31:48 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 03:43:11 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Lai",
"Jinxiang",
""
],
[
"Yang",
"Siqian",
""
],
[
"Wu",
"Wenlong",
""
],
[
"Wu",
"Tao",
""
],
[
"Jiang",
"Guannan",
""
],
[
"Wang",
"Xi",
""
],
[
"Liu",
"Jun",
""
],
[
"Gao",
"Bin-Bin",
""
],
[
"Zhang",
"Wei",
""
],
[
"Xie",
"Yuan",
""
],
[
"Wang",
"Chengjie",
""
]
] |
2303.09838 | Han Yuan | Han Yuan, Shen Li, Tao Zhu, Simon O'Kane, Carlos Garcia, Gregory
Offer, Monica Marinescu | A Computational Framework Integrating Physics-based Model and Equivalent
Circuit Network Model to Simulate Li-ion batteries | null | null | null | null | physics.app-ph | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Battery models generally fall into two categories: physics-based models and
ECM models. Physics-based Doyle-Fuller-Newman (DFN) models can accurately
simulate the battery internal electrochemical processes, but to properly
account for thermal effects requires a strong coupling between a DFN model and
a 3D thermal model, which is computationally unaffordable. Distributed
Equivalent Circuit Network (ECN) models can perform simulations with high speed
and reasonable accuracy. However, these models rely heavily on the
characterisation experiments for ECN parameter identification, which is
resource-intensive and can lead to inaccurate parametrisation outcomes due to
internal thermal inhomogeneity. To harness the strengths of both models, we
propose a computational framework to integrate electrochemical DFN model and 3D
distributed ECN model together. Using this framework, we simulate constant
current discharge experiments of Kokam 7.5 Ah pouch cell (Model SLPB75106100)
and compare the simulations with the commonly-used lumped DFN-thermal model.
The computational model outperforms the lumped DFN model at low-temperature
and/or high C-rate scenarios significantly. The largest predicting error of the
framework at 3 C-rate &Tam = 25oC and at 1 C-rate &Tam = 0 oC is approximately
1/3 of that for DFN model. At 3 C-rate &Tam = 5oC, the difference between these
two can rise to 377 mV. By integrating DFN and 3D-distributed ECN together, the
computational framework can simulate the complicated interplay between
electrochemistry, thermal process, and electricity within a cell fast and
accurately. We anticipate this computational framework to be a valuable toolset
to assist researchers and engineers in the design and control of Li-ion
batteries.
| [
{
"version": "v1",
"created": "Fri, 17 Mar 2023 08:45:53 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jul 2024 08:14:34 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 08:23:10 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Yuan",
"Han",
""
],
[
"Li",
"Shen",
""
],
[
"Zhu",
"Tao",
""
],
[
"O'Kane",
"Simon",
""
],
[
"Garcia",
"Carlos",
""
],
[
"Offer",
"Gregory",
""
],
[
"Marinescu",
"Monica",
""
]
] |
2303.10008 | \'Eric Bavu | Julien Hauret, Thomas Joubaud, V\'eronique Zimpfer, \'Eric Bavu | Configurable EBEN: Extreme Bandwidth Extension Network to enhance
body-conducted speech capture | Accepted in IEEE/ACM Transactions on Audio, Speech and Language
Processing on 14/08/2023 | IEEE/ACM Transactions on Audio, Speech, and Language Processing
(2023 - Volume: 31) - pp. 3499 - 3512 | 10.1109/TASLP.2023.3313433 | null | eess.AS cs.SD | http://creativecommons.org/licenses/by/4.0/ | This paper presents a configurable version of Extreme Bandwidth Extension
Network (EBEN), a Generative Adversarial Network (GAN) designed to improve
audio captured with body-conduction microphones. We show that although these
microphones significantly reduce environmental noise, this insensitivity to
ambient noise happens at the expense of the bandwidth of the speech signal
acquired by the wearer of the devices. The obtained captured signals therefore
require the use of signal enhancement techniques to recover the full-bandwidth
speech. EBEN leverages a configurable multiband decomposition of the raw
captured signal. This decomposition allows the data time domain dimensions to
be reduced and the full band signal to be better controlled. The multiband
representation of the captured signal is processed through a U-Net-like model,
which combines feature and adversarial losses to generate an enhanced speech
signal. We also benefit from this original representation in the proposed
configurable discriminators architecture. The configurable EBEN approach can
achieve state-of-the-art enhancement results on synthetic data with a
lightweight generator that allows real-time processing.
| [
{
"version": "v1",
"created": "Fri, 17 Mar 2023 14:31:24 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Sep 2023 18:33:58 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Hauret",
"Julien",
""
],
[
"Joubaud",
"Thomas",
""
],
[
"Zimpfer",
"Véronique",
""
],
[
"Bavu",
"Éric",
""
]
] |
2303.11858 | Yunjie He | Yunjie He, Mojtaba Nayyeri, Bo Xiong, Yuqicheng Zhu, Evgeny Kharlamov,
Steffen Staab | Modeling Relational Patterns for Logical Query Answering over Knowledge
Graphs | null | null | null | null | cs.DB cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Answering first-order logical (FOL) queries over knowledge graphs (KG)
remains a challenging task mainly due to KG incompleteness. Query embedding
approaches this problem by computing the low-dimensional vector representations
of entities, relations, and logical queries. KGs exhibit relational patterns
such as symmetry and composition and modeling the patterns can further enhance
the performance of query embedding models. However, the role of such patterns
in answering FOL queries by query embedding models has not been yet studied in
the literature. In this paper, we fill in this research gap and empower FOL
queries reasoning with pattern inference by introducing an inductive bias that
allows for learning relation patterns. To this end, we develop a novel query
embedding method, RoConE, that defines query regions as geometric cones and
algebraic query operators by rotations in complex space. RoConE combines the
advantages of Cone as a well-specified geometric representation for query
embedding, and also the rotation operator as a powerful algebraic operation for
pattern inference. Our experimental results on several benchmark datasets
confirm the advantage of relational patterns for enhancing logical query
answering task.
| [
{
"version": "v1",
"created": "Tue, 21 Mar 2023 13:59:15 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 13:57:25 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"He",
"Yunjie",
""
],
[
"Nayyeri",
"Mojtaba",
""
],
[
"Xiong",
"Bo",
""
],
[
"Zhu",
"Yuqicheng",
""
],
[
"Kharlamov",
"Evgeny",
""
],
[
"Staab",
"Steffen",
""
]
] |
2303.12162 | Anita Dabrowska | Anita D\k{a}browska and Marcin Marciniak | Stochastic approach to evolution of a quantum system interacting with a
wave packet in squeezed number state | 22 pages | Quantum Inf. Process. 22, 385, 2013 | 10.1007/s11128-023-04108-9 | null | quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We determine filtering and master equations for a quantum system interacting
with wave packet of light in a continuous-mode squeezed number state. We
formulate the problem of conditional evolution of a quantum system making use
of model of repeated interactions and measurements. In this approach the
quantum system undergoes a sequence of interactions with an environment defined
by a chain of harmonic oscillators. We assume that the environment is prepared
in an entangled state being a discrete analogue of a continuous-mode number
state. We present a derivation of a discrete stochastic dynamics that depends
on the results of measurement performed on the field after its interaction with
the system. In this paper we consider a photon counting measurement scheme. By
taking a continuous time limit, we finally obtain differential stochastic
equations for the system. Analytical formulae for quantum trajectories and
exclusive probability densities that allow to fully characterize the statistics
of photons in the output field are given.
| [
{
"version": "v1",
"created": "Tue, 21 Mar 2023 19:42:15 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Dąbrowska",
"Anita",
""
],
[
"Marciniak",
"Marcin",
""
]
] |
2303.16271 | Luke Conners | Luke Conners | Row-Column Mirror Symmetry for Colored Torus Knot Homology | 87 pages; many figures. v2: Final version to appear in Selecta
Mathematica. Section 5 significantly expanded and all material on singular
Soergel bimodules moved to a new Appendix. Many revisions throughout to
improve clarity and correct typos | null | null | null | math.GT math.QA math.RT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a recursive construction of the categorified Young symmetrizer
introduced by Abel-Hogancamp in arXiv:1510.05330 corresponding to the
single-column partition. As a consequence, we obtain new expressions for the
uncolored $y$-ified HOMFLYPT homology of positive torus links and the $y$-ified
column-colored HOMFLYPT homology of positive torus knots. In the latter case,
we compare with the row-colored homology of positive torus knots computed by
Hogancamp-Mellit in arXiv:1909.00418, verifying the mirror symmetry conjectures
of arXiv:1112.0030 and arXiv:1304.3481 in this case.
| [
{
"version": "v1",
"created": "Tue, 28 Mar 2023 19:30:37 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2024 21:31:47 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Conners",
"Luke",
""
]
] |
2303.16590 | Parth Bambhaniya | Kauntey Acharya, Kshitij Pandey, Parth Bambhaniya, Pankaj S. Joshi and
Vishva Patel | Naked Singularity as a Possible Source of Ultra-High Energy Cosmic Rays | Calculation errors | null | null | null | gr-qc | http://creativecommons.org/licenses/by/4.0/ | The source of Ultra-High Energy Cosmic Rays (UHECRs) remains one of the
greatest mysteries in astrophysics. Their possible source can be the galactic
nuclei, where the ultra-high gravity region plays a crucial role. Cosmic rays
are extremely energetic particles that travel through space with energies
exceeding $10^{20}eV$, but their origin is still a mystery despite years of
studies and observations. In view of this, in this work, we studied the
Joshi-Malafarina-Narayan (JMN-1) naked singularity as a natural particle
accelerator. We derived the necessary expressions to find center of mass energy
when two particles collide. We have obtained results showing that center of
mass energy of the two particles will reach to Planck energy scale. This will
form a microscopic black hole which will decay in Hawking radiation, having
energy on the order of $10^{26} eV$ from the ultra-high gravity region of Sgr
A*. These outgoing highly energetic particles from the naked singularity could
be the possible sources of UHECRs.
| [
{
"version": "v1",
"created": "Wed, 29 Mar 2023 10:53:26 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 11:30:32 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Acharya",
"Kauntey",
""
],
[
"Pandey",
"Kshitij",
""
],
[
"Bambhaniya",
"Parth",
""
],
[
"Joshi",
"Pankaj S.",
""
],
[
"Patel",
"Vishva",
""
]
] |
2304.01412 | Xing Han Lu | Xing Han Lu, Siva Reddy, Harm de Vries | The StatCan Dialogue Dataset: Retrieving Data Tables through
Conversations with Genuine Intents | Accepted at EACL 2023 | Proceedings of the 17th Conference of the European Chapter of the
Association for Computational Linguistics. (2023) 2799-2829 | 10.18653/v1/2023.eacl-main.206 | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | We introduce the StatCan Dialogue Dataset consisting of 19,379 conversation
turns between agents working at Statistics Canada and online users looking for
published data tables. The conversations stem from genuine intents, are held in
English or French, and lead to agents retrieving one of over 5000 complex data
tables. Based on this dataset, we propose two tasks: (1) automatic retrieval of
relevant tables based on a on-going conversation, and (2) automatic generation
of appropriate agent responses at each turn. We investigate the difficulty of
each task by establishing strong baselines. Our experiments on a temporal data
split reveal that all models struggle to generalize to future conversations, as
we observe a significant drop in performance across both tasks when we move
from the validation to the test set. In addition, we find that response
generation models struggle to decide when to return a table. Considering that
the tasks pose significant challenges to existing models, we encourage the
community to develop models for our task, which can be directly used to help
knowledge workers find relevant tables for live chat users.
| [
{
"version": "v1",
"created": "Mon, 3 Apr 2023 23:18:30 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Apr 2023 01:20:51 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Lu",
"Xing Han",
""
],
[
"Reddy",
"Siva",
""
],
[
"de Vries",
"Harm",
""
]
] |
2304.02171 | Jackson Bunting | Jackson Bunting, Takuya Ura | Faster estimation of dynamic discrete choice models using index
invertibility | null | null | null | null | econ.EM | http://creativecommons.org/licenses/by/4.0/ | Many estimators of dynamic discrete choice models with persistent unobserved
heterogeneity have desirable statistical properties but are computationally
intensive. In this paper we propose a method to quicken estimation for a broad
class of dynamic discrete choice problems by exploiting semiparametric index
restrictions. Specifically, we propose an estimator for models whose reduced
form parameters are invertible functions of one or more linear indices (Ahn,
Ichimura, Powell and Ruud 2018), a property we term index invertibility. We
establish that index invertibility implies a set of equality constraints on the
model parameters. Our proposed estimator uses the equality constraints to
decrease the dimension of the optimization problem, thereby generating
computational gains. Our main result shows that the proposed estimator is
asymptotically equivalent to the unconstrained, computationally heavy
estimator. In addition, we provide a series of results on the number of
independent index restrictions on the model parameters, providing theoretical
guidance on the extent of computational gains. Finally, we demonstrate the
advantages of our approach via Monte Carlo simulations.
| [
{
"version": "v1",
"created": "Wed, 5 Apr 2023 00:06:28 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Sep 2023 23:54:38 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Jul 2024 22:59:19 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Bunting",
"Jackson",
""
],
[
"Ura",
"Takuya",
""
]
] |
2304.04186 | Maksym Liul | M. P. Liul, A. I. Ryzhov, S. N. Shevchenko | Interferometry of multi-level systems: rate-equation approach for a
charge qudit | null | Eur. Phys. J. Spec. Top. 232, 3227-3235 (2023) | 10.1140/epjs/s11734-023-00977-4 | null | cond-mat.mes-hall | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We theoretically describe a driven two-electron four-level double-quantum dot
(DQD) tunnel coupled to a fermionic sea by using the rate-equation formalism.
This approach allows to find occupation probabilities of each DQD energy level
in a relatively simple way, compared to other methods. Calculated dependencies
are compared with the experimental results. The system under study is
irradiated by a strong driving signal and as a result, one can observe
Landau-Zener-Stuckelberg-Majorana (LZSM) interferometry patterns which are
successfully described by the considered formalism. The system operation regime
depends on the amplitude of the excitation signal and the energy detuning,
therefore, one can transfer the system to the necessary quantum state in the
most efficient way by setting these parameters. Obtained results give insights
about initializing, characterizing, and controlling the quantum system states.
| [
{
"version": "v1",
"created": "Sun, 9 Apr 2023 08:09:18 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Oct 2023 16:51:28 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Nov 2023 12:00:16 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Liul",
"M. P.",
""
],
[
"Ryzhov",
"A. I.",
""
],
[
"Shevchenko",
"S. N.",
""
]
] |
2304.05393 | Vladim\'ir Luke\v{s} | Eduard Rohan and Vladim\'ir Luke\v{s} | Homogenization of peristaltic flows in piezoelectric porous media | null | Computers & Structures, 302:107470 (2024) | 10.1016/j.compstruc.2024.107470 | null | math.AP physics.comp-ph | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The paper presents a new type of weakly nonlinear two-scale model of
controllable periodic porous piezoelectric structures saturated by Newtonian
fluids. The flow is propelled by peristaltic deformation of microchannels which
is induced due to piezoelectric segments embedded in the microstructure and
locally actuated by voltage waves. The homogenization is employed to derive a
macroscopic model of the poroelastic medium with effective parameters modified
by piezoelectric properties of the skeleton. To capture the peristaltic
pumping, the nonlinearity associated with deforming configuration must be
respected. In the macroscopic model, this nonlinearity is introduced through
homogenized coefficients depending on the deforming micro-configurations. For
this, linear expansions based on the sensitivity analysis of the homogenized
coefficients with respect to deformation induced by the macroscopic quantities
are employed. This enables to avoid the two-scale tight coupling of the macro-
and microproblems otherwise needed in nonlinear problems. The derived
reduced-order model is implemented and verified using direct numerical
simulations of the periodic heterogeneous medium. Numerical results demonstrate
the peristaltic driven fluid propulsion in response to the electric actuation
and the efficiency of the proposed treatment of the nonlinearity. The paper
shows new perspectives in homogenization-based computationally efficient
modelling of weakly nonlinear problems where continuum microstructures are
perturbed by coupled fields.
| [
{
"version": "v1",
"created": "Sat, 8 Apr 2023 15:55:49 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jun 2024 11:00:53 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Rohan",
"Eduard",
""
],
[
"Lukeš",
"Vladimír",
""
]
] |
2304.08674 | Victor Y. Wang | Victor Y. Wang | Prime Hasse principles via Diophantine second moments | 22 pages; accepted version | null | null | null | math.NT math.AG | http://creativecommons.org/licenses/by/4.0/ | We show that almost all primes $p\not\equiv \pm 4 \bmod{9}$ are sums of three
cubes, assuming a conjecture due to Hooley, Manin, et al. on cubic fourfolds.
This conjecture is approachable under standard statistical hypotheses on
geometric families of $L$-functions.
| [
{
"version": "v1",
"created": "Tue, 18 Apr 2023 00:53:09 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 16:45:43 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Wang",
"Victor Y.",
""
]
] |
2304.09592 | Oliver Sutton | Paul Houston, Matthew E. Hubbard, Thomas J. Radley, Oliver J. Sutton
and Richard S.J. Widdowson | Efficient High-Order Space-Angle-Energy Polytopic Discontinuous Galerkin
Finite Element Methods for Linear Boltzmann Transport | 27 pages, 2 figures | J. Sci. Comput. 100 (2024) 52 | 10.1007/s10915-024-02569-3 | null | math.NA cs.NA | http://creativecommons.org/licenses/by/4.0/ | We introduce an $hp$-version discontinuous Galerkin finite element method
(DGFEM) for the linear Boltzmann transport problem. A key feature of this new
method is that, while offering arbitrary order convergence rates, it may be
implemented in an almost identical form to standard multigroup discrete
ordinates methods, meaning that solutions can be computed efficiently with high
accuracy and in parallel within existing software. This method provides a
unified discretisation of the space, angle, and energy domains of the
underlying integro-differential equation and naturally incorporates both local
mesh and local polynomial degree variation within each of these computational
domains. Moreover, general polytopic elements can be handled by the method,
enabling efficient discretisations of problems posed on complicated spatial
geometries. We study the stability and $hp$-version a priori error analysis of
the proposed method, by deriving suitable $hp$-approximation estimates together
with a novel inf-sup bound. Numerical experiments highlighting the performance
of the method for both polyenergetic and monoenergetic problems are presented.
| [
{
"version": "v1",
"created": "Wed, 19 Apr 2023 11:58:01 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Houston",
"Paul",
""
],
[
"Hubbard",
"Matthew E.",
""
],
[
"Radley",
"Thomas J.",
""
],
[
"Sutton",
"Oliver J.",
""
],
[
"Widdowson",
"Richard S. J.",
""
]
] |
2304.10093 | Jinxiang Lai | Jinxiang Lai, Siqian Yang, Junhong Zhou, Wenlong Wu, Xiaochen Chen,
Jun Liu, Bin-Bin Gao, Chengjie Wang | Clustered-patch Element Connection for Few-shot Learning | null | IJCAI 2023 | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Weak feature representation problem has influenced the performance of
few-shot classification task for a long time. To alleviate this problem, recent
researchers build connections between support and query instances through
embedding patch features to generate discriminative representations. However,
we observe that there exists semantic mismatches (foreground/ background) among
these local patches, because the location and size of the target object are not
fixed. What is worse, these mismatches result in unreliable similarity
confidences, and complex dense connection exacerbates the problem. According to
this, we propose a novel Clustered-patch Element Connection (CEC) layer to
correct the mismatch problem. The CEC layer leverages Patch Cluster and Element
Connection operations to collect and establish reliable connections with high
similarity patch features, respectively. Moreover, we propose a CECNet,
including CEC layer based attention module and distance metric. The former is
utilized to generate a more discriminative representation benefiting from the
global clustered-patch features, and the latter is introduced to reliably
measure the similarity between pair-features. Extensive experiments demonstrate
that our CECNet outperforms the state-of-the-art methods on classification
benchmark. Furthermore, our CEC approach can be extended into few-shot
segmentation and detection tasks, which achieves competitive performances.
| [
{
"version": "v1",
"created": "Thu, 20 Apr 2023 05:22:27 GMT"
},
{
"version": "v2",
"created": "Wed, 10 May 2023 05:47:19 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 03:51:29 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Lai",
"Jinxiang",
""
],
[
"Yang",
"Siqian",
""
],
[
"Zhou",
"Junhong",
""
],
[
"Wu",
"Wenlong",
""
],
[
"Chen",
"Xiaochen",
""
],
[
"Liu",
"Jun",
""
],
[
"Gao",
"Bin-Bin",
""
],
[
"Wang",
"Chengjie",
""
]
] |
2305.00386 | Zhenqiao Song | Zhenqiao Song, Lei Li | Importance Weighted Expectation-Maximization for Protein Sequence Design | null | null | null | null | q-bio.BM cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Designing protein sequences with desired biological function is crucial in
biology and chemistry. Recent machine learning methods use a surrogate
sequence-function model to replace the expensive wet-lab validation. How can we
efficiently generate diverse and novel protein sequences with high fitness? In
this paper, we propose IsEM-Pro, an approach to generate protein sequences
towards a given fitness criterion. At its core, IsEM-Pro is a latent generative
model, augmented by combinatorial structure features from a separately learned
Markov random fields (MRFs). We develop an Monte Carlo Expectation-Maximization
method (MCEM) to learn the model. During inference, sampling from its latent
space enhances diversity while its MRFs features guide the exploration in high
fitness regions. Experiments on eight protein sequence design tasks show that
our IsEM-Pro outperforms the previous best methods by at least 55% on average
fitness score and generates more diverse and novel protein sequences.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2023 04:56:36 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Jun 2024 16:36:08 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 16:21:28 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Song",
"Zhenqiao",
""
],
[
"Li",
"Lei",
""
]
] |
2305.07408 | Zhan Yu | Zhan Yu, Jun Fan, Zhongjie Shi, Ding-Xuan Zhou | Distributed Gradient Descent for Functional Learning | 48 pages | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, different types of distributed and parallel learning schemes
have received increasing attention for their strong advantages in handling
large-scale data information. In the information era, to face the big data
challenges {that} stem from functional data analysis very recently, we propose
a novel distributed gradient descent functional learning (DGDFL) algorithm to
tackle functional data across numerous local machines (processors) in the
framework of reproducing kernel Hilbert space. Based on integral operator
approaches, we provide the first theoretical understanding of the DGDFL
algorithm in many different aspects of the literature. On the way of
understanding DGDFL, firstly, a data-based gradient descent functional learning
(GDFL) algorithm associated with a single-machine model is proposed and
comprehensively studied. Under mild conditions, confidence-based optimal
learning rates of DGDFL are obtained without the saturation boundary on the
regularity index suffered in previous works in functional regression. We
further provide a semi-supervised DGDFL approach to weaken the restriction on
the maximal number of local machines to ensure optimal rates. To our best
knowledge, the DGDFL provides the first divide-and-conquer iterative training
approach to functional learning based on data samples of intrinsically
infinite-dimensional random functions (functional covariates) and enriches the
methodologies for functional data analysis.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 12:15:42 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 07:27:24 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Yu",
"Zhan",
""
],
[
"Fan",
"Jun",
""
],
[
"Shi",
"Zhongjie",
""
],
[
"Zhou",
"Ding-Xuan",
""
]
] |
2305.08096 | Songming Zhang | Songming Zhang, Yunlong Liang, Shuaibo Wang, Wenjuan Han, Jian Liu,
Jinan Xu and Yufeng Chen | Towards Understanding and Improving Knowledge Distillation for Neural
Machine Translation | 16 pages, 5 figures; accepted by the main conference of ACL2023 | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Knowledge distillation (KD) is a promising technique for model compression in
neural machine translation. However, where the knowledge hides in KD is still
not clear, which may hinder the development of KD. In this work, we first
unravel this mystery from an empirical perspective and show that the knowledge
comes from the top-1 predictions of teachers, which also helps us build a
potential connection between word- and sequence-level KD. Further, we point out
two inherent issues in vanilla word-level KD based on this finding. Firstly,
the current objective of KD spreads its focus to whole distributions to learn
the knowledge, yet lacks special treatment on the most crucial top-1
information. Secondly, the knowledge is largely covered by the golden
information due to the fact that most top-1 predictions of teachers overlap
with ground-truth tokens, which further restricts the potential of KD. To
address these issues, we propose a novel method named \textbf{T}op-1
\textbf{I}nformation \textbf{E}nhanced \textbf{K}nowledge \textbf{D}istillation
(TIE-KD). Specifically, we design a hierarchical ranking loss to enforce the
learning of the top-1 information from the teacher. Additionally, we develop an
iterative KD procedure to infuse more additional knowledge by distilling on the
data without ground-truth targets. Experiments on WMT'14 English-German, WMT'14
English-French and WMT'16 English-Romanian demonstrate that our method can
respectively boost Transformer$_{base}$ students by +1.04, +0.60 and +1.11 BLEU
scores and significantly outperform the vanilla word-level KD baseline.
Besides, our method shows higher generalizability on different teacher-student
capacity gaps than existing KD techniques.
| [
{
"version": "v1",
"created": "Sun, 14 May 2023 08:23:03 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 08:36:30 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Zhang",
"Songming",
""
],
[
"Liang",
"Yunlong",
""
],
[
"Wang",
"Shuaibo",
""
],
[
"Han",
"Wenjuan",
""
],
[
"Liu",
"Jian",
""
],
[
"Xu",
"Jinan",
""
],
[
"Chen",
"Yufeng",
""
]
] |
2305.08638 | Daniel Perrucci | Daniel Perrucci, Marie-Fran\c{c}oise Roy | Algebraic Winding Numbers | null | null | null | null | math.AG | http://creativecommons.org/licenses/by/4.0/ | In this paper, we propose a new algebraic winding number and prove that it
computes the number of complex roots of a polynomial in a rectangle, including
roots on edges or vertices with appropriate counting. The definition makes
sense for the algebraic closure C = R[i] of a real closed field R, and the root
counting result also holds in this case. We study in detail the properties of
the algebraic winding number defined in [3] with respect to complex root
counting in rectangles. We extend both winding numbers to rational functions,
obtaining then algebraic versions of the argument principle for rectangles.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 13:32:02 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 09:41:39 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Perrucci",
"Daniel",
""
],
[
"Roy",
"Marie-Françoise",
""
]
] |
2305.10973 | Xingang Pan | Xingang Pan, Ayush Tewari, Thomas Leimk\"uhler, Lingjie Liu, Abhimitra
Meka, Christian Theobalt | Drag Your GAN: Interactive Point-based Manipulation on the Generative
Image Manifold | Accepted to SIGGRAPH 2023. Project page:
https://vcai.mpi-inf.mpg.de/projects/DragGAN/ | null | 10.1145/3588432.3591500 | null | cs.CV cs.GR | http://creativecommons.org/licenses/by/4.0/ | Synthesizing visual content that meets users' needs often requires flexible
and precise controllability of the pose, shape, expression, and layout of the
generated objects. Existing approaches gain controllability of generative
adversarial networks (GANs) via manually annotated training data or a prior 3D
model, which often lack flexibility, precision, and generality. In this work,
we study a powerful yet much less explored way of controlling GANs, that is, to
"drag" any points of the image to precisely reach target points in a
user-interactive manner, as shown in Fig.1. To achieve this, we propose
DragGAN, which consists of two main components: 1) a feature-based motion
supervision that drives the handle point to move towards the target position,
and 2) a new point tracking approach that leverages the discriminative
generator features to keep localizing the position of the handle points.
Through DragGAN, anyone can deform an image with precise control over where
pixels go, thus manipulating the pose, shape, expression, and layout of diverse
categories such as animals, cars, humans, landscapes, etc. As these
manipulations are performed on the learned generative image manifold of a GAN,
they tend to produce realistic outputs even for challenging scenarios such as
hallucinating occluded content and deforming shapes that consistently follow
the object's rigidity. Both qualitative and quantitative comparisons
demonstrate the advantage of DragGAN over prior approaches in the tasks of
image manipulation and point tracking. We also showcase the manipulation of
real images through GAN inversion.
| [
{
"version": "v1",
"created": "Thu, 18 May 2023 13:41:25 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 10:27:55 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Pan",
"Xingang",
""
],
[
"Tewari",
"Ayush",
""
],
[
"Leimkühler",
"Thomas",
""
],
[
"Liu",
"Lingjie",
""
],
[
"Meka",
"Abhimitra",
""
],
[
"Theobalt",
"Christian",
""
]
] |
2305.11005 | Christoph Hertrich | Christoph Hertrich, Yixin Tao, L\'aszl\'o A. V\'egh | Mode Connectivity in Auction Design | Conference paper published at NeurIPS 2023 | null | null | null | cs.GT cs.LG cs.NE stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Optimal auction design is a fundamental problem in algorithmic game theory.
This problem is notoriously difficult already in very simple settings. Recent
work in differentiable economics showed that neural networks can efficiently
learn known optimal auction mechanisms and discover interesting new ones. In an
attempt to theoretically justify their empirical success, we focus on one of
the first such networks, RochetNet, and a generalized version for affine
maximizer auctions. We prove that they satisfy mode connectivity, i.e., locally
optimal solutions are connected by a simple, piecewise linear path such that
every solution on the path is almost as good as one of the two local optima.
Mode connectivity has been recently investigated as an intriguing empirical and
theoretically justifiable property of neural networks used for prediction
problems. Our results give the first such analysis in the context of
differentiable economics, where neural networks are used directly for solving
non-convex optimization problems.
| [
{
"version": "v1",
"created": "Thu, 18 May 2023 14:36:07 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 16:03:13 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Hertrich",
"Christoph",
""
],
[
"Tao",
"Yixin",
""
],
[
"Végh",
"László A.",
""
]
] |
2305.11332 | Shintar\^o Kuroki | Shintaro Kuroki | Equivariant cohomology of even-dimensional complex quadrics from a
combinatorial point of view | 27 pages, 15 figures; v2: correct some parts; v3: corrected by
following referee's comments | null | null | null | math.AT math.CO | http://creativecommons.org/licenses/by/4.0/ | The purpose of this paper is to determine the ring structure of the graph
equivariant cohomology of the GKM graph induced from the even-dimensional
complex quadrics. We show that the graph equivariant cohomology is generated by
two types of subgraphs in the GKM graph, which are subject to four different
types of relations. By utilizing this ring structure, we establish the
multiplicative relation for the generators of degree 2n and provide an
alternative computation of the ordinary cohomology ring of 4n-dimensional
complex quadrics, as previously computed by H. Lai. Additionally, we provide a
combinatorial explanation for why the square of the 2n degree generator x
vanishes when n is odd and is non-vanishing when n is even.
| [
{
"version": "v1",
"created": "Thu, 18 May 2023 22:42:33 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Jun 2023 04:52:06 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Jul 2024 21:58:22 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Kuroki",
"Shintaro",
""
]
] |
2305.13062 | Yuan Sui | Yuan Sui, Mengyu Zhou, Mingjie Zhou, Shi Han, Dongmei Zhang | Table Meets LLM: Can Large Language Models Understand Structured Table
Data? A Benchmark and Empirical Study | This paper has been accepted as a full paper at WSDM 2024. Explore
the MS research blog of our work at
https://www.microsoft.com/en-us/research/blog/improving-llm-understanding-of-structured-data-and-exploring-advanced-prompting-methods/ | null | null | null | cs.CL cs.AI cs.IR | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Large language models (LLMs) are becoming attractive as few-shot reasoners to
solve Natural Language (NL)-related tasks. However, the understanding of their
capability to process structured data like tables remains an under-explored
area. While tables can be serialized as input for LLMs, there is a lack of
comprehensive studies on whether LLMs genuinely comprehend this data. In this
paper, we try to understand this by designing a benchmark to evaluate the
structural understanding capabilities of LLMs through seven distinct tasks,
e.g., cell lookup, row retrieval and size detection. Specially, we perform a
series of evaluations on the recent most advanced LLM models, GPT-3.5 and GPT-4
and observe that performance varied with different input choices, including
table input format, content order, role prompting, and partition marks. Drawing
from the insights gained through the benchmark evaluations, we propose
$\textit{self-augmentation}$ for effective structural prompting, such as
critical value / range identification using internal knowledge of LLMs. When
combined with carefully chosen input choices, these structural prompting
methods lead to promising improvements in LLM performance on a variety of
tabular tasks, e.g., TabFact($\uparrow2.31\%$), HybridQA($\uparrow2.13\%$),
SQA($\uparrow2.72\%$), Feverous($\uparrow0.84\%$), and ToTTo($\uparrow5.68\%$).
We believe that our open source benchmark and proposed prompting methods can
serve as a simple yet generic selection for future research. The code and data
of this paper will be temporality released at
https://anonymous.4open.science/r/StructuredLLM-76F3/README.md and will be
replaced with an official one at https://github.com/microsoft/TableProvider
later.
| [
{
"version": "v1",
"created": "Mon, 22 May 2023 14:23:46 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Oct 2023 08:35:01 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Nov 2023 12:18:39 GMT"
},
{
"version": "v4",
"created": "Sat, 17 Feb 2024 08:28:05 GMT"
},
{
"version": "v5",
"created": "Wed, 17 Jul 2024 05:26:03 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Sui",
"Yuan",
""
],
[
"Zhou",
"Mengyu",
""
],
[
"Zhou",
"Mingjie",
""
],
[
"Han",
"Shi",
""
],
[
"Zhang",
"Dongmei",
""
]
] |
2305.14021 | Ming Li | Ming Li and Youjin Deng | Iterative Site Percolation on Triangular Lattice | 11 pages, 11 figures | null | null | null | cond-mat.stat-mech | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The site percolation on the triangular lattice stands out as one of the few
exactly solved statistical systems. By initially configuring critical
percolation clusters of this model and randomly reassigning the color of each
percolation cluster, we obtain coarse-grained configurations by merging
adjacent clusters that share the same color. It is shown that the process can
be infinitely iterated in the infinite-lattice limit, leading to an iterative
site percolation model. We conjecture from the self-matching argument that
percolation clusters remain fractal for any finite generation, which can even
take any positive real number by a generalized process. Extensive simulations
are performed, and, from the generation-dependent fractal dimension, a
continuous family of previously unknown universalities is revealed.
| [
{
"version": "v1",
"created": "Tue, 23 May 2023 12:55:43 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Oct 2023 08:30:00 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 05:50:22 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Li",
"Ming",
""
],
[
"Deng",
"Youjin",
""
]
] |
2305.15203 | Lorenzo Basile | Lorenzo Basile, Nikos Karantzas, Alberto D'Onofrio, Luca Bortolussi,
Alex Rodriguez, Fabio Anselmi | Investigating Adversarial Vulnerability and Implicit Bias through
Frequency Analysis | null | null | null | null | cs.LG cs.AI cs.CR stat.ML | http://creativecommons.org/licenses/by/4.0/ | Despite their impressive performance in classification tasks, neural networks
are known to be vulnerable to adversarial attacks, subtle perturbations of the
input data designed to deceive the model. In this work, we investigate the
relation between these perturbations and the implicit bias of neural networks
trained with gradient-based algorithms. To this end, we analyse the network's
implicit bias through the lens of the Fourier transform. Specifically, we
identify the minimal and most critical frequencies necessary for accurate
classification or misclassification respectively for each input image and its
adversarially perturbed version, and uncover the correlation among those. To
this end, among other methods, we use a newly introduced technique capable of
detecting non-linear correlations between high-dimensional datasets. Our
results provide empirical evidence that the network bias in Fourier space and
the target frequencies of adversarial attacks are highly correlated and suggest
new potential strategies for adversarial defence.
| [
{
"version": "v1",
"created": "Wed, 24 May 2023 14:40:23 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 16:34:48 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Basile",
"Lorenzo",
""
],
[
"Karantzas",
"Nikos",
""
],
[
"D'Onofrio",
"Alberto",
""
],
[
"Bortolussi",
"Luca",
""
],
[
"Rodriguez",
"Alex",
""
],
[
"Anselmi",
"Fabio",
""
]
] |
2305.19118 | Tian Liang | Tian Liang, Zhiwei He, Wenxiang Jiao, Xing Wang, Rui Wang, Yujiu Yang,
Zhaopeng Tu, Shuming Shi | Encouraging Divergent Thinking in Large Language Models through
Multi-Agent Debate | Work in progress | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern large language models (LLMs) like ChatGPT have shown remarkable
performance on general language tasks but still struggle on complex reasoning
tasks, which drives the research on cognitive behaviors of LLMs to explore
human-like problem-solving strategies. Along this direction, one representative
strategy is self-reflection, which asks an LLM to refine the solution with the
feedback generated by itself iteratively. However, our study shows that such
reflection-style methods suffer from the Degeneration-of-Thought (DoT) problem:
once the LLM has established confidence in its solutions, it is unable to
generate novel thoughts later through reflection even if its initial stance is
incorrect. To address the DoT problem, we propose a Multi-Agent Debate (MAD)
framework, in which multiple agents express their arguments in the state of
"tit for tat" and a judge manages the debate process to obtain a final
solution. Clearly, our MAD framework encourages divergent thinking in LLMs
which would be helpful for tasks that require deep levels of contemplation.
Experiment results on two challenging datasets, commonsense machine translation
and counter-intuitive arithmetic reasoning, demonstrate the effectiveness of
our MAD framework. Extensive analyses suggest that the adaptive break of debate
and the modest level of "tit for tat" state are required for MAD to obtain good
performance. Moreover, we find that LLMs might not be a fair judge if different
LLMs are used for agents. Code is available at
https://github.com/Skytliang/Multi-Agents-Debate.
| [
{
"version": "v1",
"created": "Tue, 30 May 2023 15:25:45 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Jun 2024 09:35:12 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 09:56:01 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Liang",
"Tian",
""
],
[
"He",
"Zhiwei",
""
],
[
"Jiao",
"Wenxiang",
""
],
[
"Wang",
"Xing",
""
],
[
"Wang",
"Rui",
""
],
[
"Yang",
"Yujiu",
""
],
[
"Tu",
"Zhaopeng",
""
],
[
"Shi",
"Shuming",
""
]
] |
2306.01276 | Hyeonah Kim | Hyeonah Kim, Minsu Kim, Sungsoo Ahn, Jinkyoo Park | Symmetric Replay Training: Enhancing Sample Efficiency in Deep
Reinforcement Learning for Combinatorial Optimization | International Conference on Machine Learning | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep reinforcement learning (DRL) has significantly advanced the field of
combinatorial optimization (CO). However, its practicality is hindered by the
necessity for a large number of reward evaluations, especially in scenarios
involving computationally intensive function assessments. To enhance the sample
efficiency, we propose a simple but effective method, called symmetric replay
training (SRT), which can be easily integrated into various DRL methods. Our
method leverages high-reward samples to encourage exploration of the
under-explored symmetric regions without additional online interactions - free.
Through replay training, the policy is trained to maximize the likelihood of
the symmetric trajectories of discovered high-rewarded samples. Experimental
results demonstrate the consistent improvement of our method in sample
efficiency across diverse DRL methods applied to real-world tasks, such as
molecular optimization and hardware design.
| [
{
"version": "v1",
"created": "Fri, 2 Jun 2023 05:34:01 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Oct 2023 08:57:34 GMT"
},
{
"version": "v3",
"created": "Mon, 5 Feb 2024 04:12:30 GMT"
},
{
"version": "v4",
"created": "Wed, 17 Jul 2024 05:55:45 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Kim",
"Hyeonah",
""
],
[
"Kim",
"Minsu",
""
],
[
"Ahn",
"Sungsoo",
""
],
[
"Park",
"Jinkyoo",
""
]
] |
2306.04090 | Xiusi Chen | Xiusi Chen, Wei-Yao Wang, Ziniu Hu, David Reynoso, Kun Jin, Mingyan
Liu, P. Jeffrey Brantingham, Wei Wang | PlayBest: Professional Basketball Player Behavior Synthesis via Planning
with Diffusion | CIKM 2024 | null | null | null | cs.AI cs.MA | http://creativecommons.org/licenses/by/4.0/ | Dynamically planning in complex systems has been explored to improve
decision-making in various domains. Professional basketball serves as a
compelling example of a dynamic spatio-temporal game, encompassing
context-dependent decision-making. However, processing the diverse on-court
signals and navigating the vast space of potential actions and outcomes make it
difficult for existing approaches to swiftly identify optimal strategies in
response to evolving circumstances. In this study, we formulate the sequential
decision-making process as a conditional trajectory generation process. Based
on the formulation, we introduce PlayBest (PLAYer BEhavior SynThesis), a method
to improve player decision-making. We extend the diffusion probabilistic model
to learn challenging environmental dynamics from historical National Basketball
Association (NBA) player motion tracking data. To incorporate data-driven
strategies, an auxiliary value function is trained with corresponding rewards.
To accomplish reward-guided trajectory generation, we condition the diffusion
model on the value function via classifier-guided sampling. We validate the
effectiveness of PlayBest through simulation studies, contrasting the generated
trajectories with those employed by professional basketball teams. Our results
reveal that the model excels at generating reasonable basketball trajectories
that produce efficient plays. Moreover, the synthesized play strategies exhibit
an alignment with professional tactics, highlighting the model's capacity to
capture the intricate dynamics of basketball games.
| [
{
"version": "v1",
"created": "Wed, 7 Jun 2023 01:23:38 GMT"
},
{
"version": "v2",
"created": "Sat, 10 Jun 2023 03:04:30 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Jul 2024 21:01:27 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Chen",
"Xiusi",
""
],
[
"Wang",
"Wei-Yao",
""
],
[
"Hu",
"Ziniu",
""
],
[
"Reynoso",
"David",
""
],
[
"Jin",
"Kun",
""
],
[
"Liu",
"Mingyan",
""
],
[
"Brantingham",
"P. Jeffrey",
""
],
[
"Wang",
"Wei",
""
]
] |
2306.05342 | Vasileios Fotopoulos | Vasileios Fotopoulos and Alexander L. Shluger | Simulation of mechanical effects of hydrogen in bicrystalline Cu using
DFT and bond order potentials | null | Procedia Structural Integrity 52 (2024) 356-365 | 10.1016/j.prostr.2023.12.035 | null | cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hydrogen embrittlement is a prime cause of several degradation effects in
metals. Since grain boundaries (GBs) act efficiently as sinks for hydrogen
atoms, H is thought to segregate in these regions, affecting the local
formation of dislocations. However, it remains unclear at which concentrations
H begins to play any role in the mechanical properties of Cu. In the current
study, we use density functional theory (DFT) to assess the accuracy of a bond
order potential (BOP) in simulating the segregation of H in Cu GB. BOP
accurately predicts the most favorable segregation sites of H in Cu GB, along
with the induced lattice relaxation effects. H is found to weaken the crystal
by reducing the GB separation energy. Classical molecular dynamics (MD)
simulations using BOP are performed to evaluate the concentration of H in
bicrystalline Cu required to substantially impact the crystal's mechanical
strength. For concentrations higher than 10 mass ppm, H significantly reduces
the yield strength of bicrystalline Cu samples during uniaxial tensile strain
application. This effect was attributed to the fact that H interstitials within
the GB promoted the formation of partial dislocations.
| [
{
"version": "v1",
"created": "Thu, 8 Jun 2023 16:45:47 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Fotopoulos",
"Vasileios",
""
],
[
"Shluger",
"Alexander L.",
""
]
] |
2306.06520 | Hugo Tadashi Kussaba Ph.D. | Hugo T. M. Kussaba, Abdalla Swikir, Fan Wu, Anastasija Demerdjieva,
Gitta Kutyniok, Sami Haddadin | Learning optimal controllers: a dynamical motion primitive approach | This work has been accepted to the 22nd IFAC World Congress | null | 10.1016/j.ifacol.2023.10.1242 | null | cs.RO math.OC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Real-time computation of optimal control is a challenging problem and, to
solve this difficulty, many frameworks proposed to use learning techniques to
learn (possibly sub-optimal) controllers and enable their usage in an online
fashion. Among these techniques, the optimal motion framework is a simple, yet
powerful technique, that obtained success in many complex real-world
applications. The main idea of this approach is to take advantage of dynamic
motion primitives, a widely used tool in robotics to learn trajectories from
demonstrations. While usually these demonstrations come from humans, the
optimal motion framework is based on demonstrations coming from optimal
solutions, such as the ones obtained by numeric solvers. As usual in many
learning techniques, a drawback of this approach is that it is hard to estimate
the suboptimality of learned solutions, since finding easily computable and
non-trivial upper bounds to the error between an optimal solution and a learned
solution is, in general, unfeasible. However, we show in this paper that it is
possible to estimate this error for a broad class of problems. Furthermore, we
apply this estimation technique to achieve a novel and more efficient sampling
scheme to be used within the optimal motion framework, enabling the usage of
this framework in some scenarios where the computational resources are limited.
| [
{
"version": "v1",
"created": "Sat, 10 Jun 2023 21:01:18 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Kussaba",
"Hugo T. M.",
""
],
[
"Swikir",
"Abdalla",
""
],
[
"Wu",
"Fan",
""
],
[
"Demerdjieva",
"Anastasija",
""
],
[
"Kutyniok",
"Gitta",
""
],
[
"Haddadin",
"Sami",
""
]
] |
2306.06525 | Hugo Tadashi Kussaba Ph.D. | Mazin Hamad, Jesus Gutierrez-Moreno, Hugo T. M. Kussaba, Nico
Mansfeld, Saeed Abdolshah, Abdalla Swikir, Wolfram Burgard, Sami Haddadin | Fast yet predictable braking manoeuvers for real-time robot control | This work has been accepted to the 22nd IFAC World Congress | null | 10.1016/j.ifacol.2023.10.711 | null | cs.RO math.OC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper proposes a framework for generating fast, smooth and predictable
braking manoeuvers for a controlled robot. The proposed framework integrates
two approaches to obtain feasible modal limits for designing braking
trajectories. The first approach is real-time capable but conservative
considering the usage of the available feasible actuator control region,
resulting in longer braking times. In contrast, the second approach maximizes
the used braking control inputs at the cost of requiring more time to evaluate
larger, feasible modal limits via optimization. Both approaches allow for
predicting the robot's stopping trajectory online. In addition, we also
formulated and solved a constrained, nonlinear final-time minimization problem
to find optimal torque inputs. The optimal solutions were used as a benchmark
to evaluate the performance of the proposed predictable braking framework. A
comparative study was compiled in simulation versus a classical optimal
controller on a 7-DoF robot arm with only three moving joints. The results
verified the effectiveness of our proposed framework and its integrated
approaches in achieving fast robot braking manoeuvers with accurate online
predictions of the stopping trajectories and distances under various braking
settings.
| [
{
"version": "v1",
"created": "Sat, 10 Jun 2023 21:31:19 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Hamad",
"Mazin",
""
],
[
"Gutierrez-Moreno",
"Jesus",
""
],
[
"Kussaba",
"Hugo T. M.",
""
],
[
"Mansfeld",
"Nico",
""
],
[
"Abdolshah",
"Saeed",
""
],
[
"Swikir",
"Abdalla",
""
],
[
"Burgard",
"Wolfram",
""
],
[
"Haddadin",
"Sami",
""
]
] |
2306.09124 | Caixin Kang | Caixin Kang, Yinpeng Dong, Zhengyi Wang, Shouwei Ruan, Yubo Chen, Hang
Su, Xingxing Wei | DIFFender: Diffusion-Based Adversarial Defense against Patch Attacks | null | null | null | null | cs.CV cs.AI cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Adversarial attacks, particularly patch attacks, pose significant threats to
the robustness and reliability of deep learning models. Developing reliable
defenses against patch attacks is crucial for real-world applications. This
paper introduces DIFFender, a novel defense framework that harnesses the
capabilities of a text-guided diffusion model to combat patch attacks. Central
to our approach is the discovery of the Adversarial Anomaly Perception (AAP)
phenomenon, which empowers the diffusion model to detect and localize
adversarial patches through the analysis of distributional discrepancies.
DIFFender integrates dual tasks of patch localization and restoration within a
single diffusion model framework, utilizing their close interaction to enhance
defense efficacy. Moreover, DIFFender utilizes vision-language pre-training
coupled with an efficient few-shot prompt-tuning algorithm, which streamlines
the adaptation of the pre-trained diffusion model to defense tasks, thus
eliminating the need for extensive retraining. Our comprehensive evaluation
spans image classification and face recognition tasks, extending to real-world
scenarios, where DIFFender shows good robustness against adversarial attacks.
The versatility and generalizability of DIFFender are evident across a variety
of settings, classifiers, and attack methodologies, marking an advancement in
adversarial patch defense strategies.
| [
{
"version": "v1",
"created": "Thu, 15 Jun 2023 13:33:27 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Oct 2023 15:09:12 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Dec 2023 14:54:18 GMT"
},
{
"version": "v4",
"created": "Wed, 17 Jul 2024 09:22:55 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Kang",
"Caixin",
""
],
[
"Dong",
"Yinpeng",
""
],
[
"Wang",
"Zhengyi",
""
],
[
"Ruan",
"Shouwei",
""
],
[
"Chen",
"Yubo",
""
],
[
"Su",
"Hang",
""
],
[
"Wei",
"Xingxing",
""
]
] |
2306.09199 | Federica Ferrarese | Giacomo Albi and Federica Ferrarese and Claudia Totzeck | Kinetic based optimization enhanced by genetic dynamics | null | null | null | null | math.OC cs.NA math.NA | http://creativecommons.org/licenses/by/4.0/ | We propose and analyse a variant of the recently introduced kinetic based
optimization method that incorporates ideas like survival-of-the-fittest and
mutation strategies well-known from genetic algorithms. Thus, we provide a
first attempt to reach out from the class of consensus/kinetic-based algorithms
towards genetic metaheuristics. Different generations of genetic algorithms are
represented via two species identified with different labels, binary
interactions are prescribed on the particle level and then we derive a
mean-field approximation in order to analyse the method in terms of
convergence. Numerical results underline the feasibility of the approach and
show in particular that the genetic dynamics allows to improve the efficiency,
of this class of global optimization methods in terms of computational cost.
| [
{
"version": "v1",
"created": "Thu, 15 Jun 2023 15:28:54 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 15:11:29 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Albi",
"Giacomo",
""
],
[
"Ferrarese",
"Federica",
""
],
[
"Totzeck",
"Claudia",
""
]
] |
2306.11169 | Luca Reggio | C\'elia Borlido, Panagis Karazeris, Luca Reggio and Konstantinos
Tsamis | Filtral pretoposes and compact Hausdorff locales | v2: 28 pages. Presentation substantially improved | null | null | null | math.CT | http://creativecommons.org/licenses/by/4.0/ | The category of compact Hausdorff locales is a pretopos which is filtral,
meaning that every object is covered by one whose subobject lattice is
isomorphic to the lattice of filters of complemented elements. We show that any
filtral pretopos satisfying some mild additional conditions can be embedded
into the category of compact Hausdorff locales. This result is valid in the
internal logic of any topos. Assuming the principle of weak excluded middle and
the existence of copowers of the terminal object in the pretopos, the image of
the embedding contains all spatial compact Hausdorff locales.
The notion of filtrality was introduced by V. Marra and L. Reggio (Theory
Appl. Categ., 2020) to characterise the category of compact Hausdorff spaces
within the class of pretoposes. Our results can be regarded as a constructive
extension of the aforementioned characterisation, avoiding reference to points.
If the ambient logic is classical, i.e. it satisfies excluded middle, and the
prime ideal theorem for Boolean algebras holds, we obtain as a corollary the
characterisation of compact Hausdorff spaces in op. cit.
| [
{
"version": "v1",
"created": "Mon, 19 Jun 2023 21:26:00 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 07:30:14 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Borlido",
"Célia",
""
],
[
"Karazeris",
"Panagis",
""
],
[
"Reggio",
"Luca",
""
],
[
"Tsamis",
"Konstantinos",
""
]
] |
2306.12151 | Davide Franco | D. Franco (for the DarkSide-50 Collaboration) | Light dark matter search with DarkSide-50 | 6 pages, 4 figures. Contribution to the 2023 Electroweak session of
the 57th Rencontres de Moriond | null | null | null | hep-ex astro-ph.CO | http://creativecommons.org/licenses/by/4.0/ | We present the latest results from the search for light dark matter particle
interactions with the DarkSide-50 dual-phase liquid argon time projection
chamber. This analysis, based on the ionization signal only, improves the
existing limits for spin-independent WIMP-nucleon interactions in the $[1.2,
3.6]$ GeV/c$^2$ mass range. The sensitivity is extended down to 40 MeV/c$^2$ by
assuming the Migdal effect, responsible for an additional ionization signal
from the recoiling atom. Finally, we set new constraints to interactions of
dark matter particles with electrons in the final state, namely WIMPs, galactic
axions, dark photons, and sterile neutrinos.
| [
{
"version": "v1",
"created": "Wed, 21 Jun 2023 09:54:23 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Franco",
"D.",
"",
"for the DarkSide-50 Collaboration"
]
] |
2306.13054 | Theshani Nuradha | Theshani Nuradha, Ziv Goldfeld, Mark M. Wilde | Quantum Pufferfish Privacy: A Flexible Privacy Framework for Quantum
Systems | v2: 33 pages, 9 figures, accepted to IEEE Transactions on Information
Theory | IEEE Transactions on Information Theory, vol. 70, no. 8, pp.
5731-5762, Aug. 2024 | 10.1109/TIT.2024.3404927 | null | quant-ph cs.CR cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a versatile privacy framework for quantum systems, termed quantum
pufferfish privacy (QPP). Inspired by classical pufferfish privacy, our
formulation generalizes and addresses limitations of quantum differential
privacy by offering flexibility in specifying private information, feasible
measurements, and domain knowledge. We show that QPP can be equivalently
formulated in terms of the Datta-Leditzky information spectrum divergence, thus
providing the first operational interpretation thereof. We reformulate this
divergence as a semi-definite program and derive several properties of it,
which are then used to prove convexity, composability, and post-processing of
QPP mechanisms. Parameters that guarantee QPP of the depolarization mechanism
are also derived. We analyze the privacy-utility tradeoff of general QPP
mechanisms and, again, study the depolarization mechanism as an explicit
instance. The QPP framework is then applied to privacy auditing for identifying
privacy violations via a hypothesis testing pipeline that leverages quantum
algorithms. Connections to quantum fairness and other quantum divergences are
also explored and several variants of QPP are examined.
| [
{
"version": "v1",
"created": "Thu, 22 Jun 2023 17:21:17 GMT"
},
{
"version": "v2",
"created": "Tue, 28 May 2024 14:08:52 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Nuradha",
"Theshani",
""
],
[
"Goldfeld",
"Ziv",
""
],
[
"Wilde",
"Mark M.",
""
]
] |
2307.01883 | Ivan Smith | Mohammed Abouzaid, Mark McLean, Ivan Smith | Gromov-Witten invariants in complex and Morava-local $K$-theories | 68 pages, 2 figures. v2 corrects an error in the construction of
consistent domain metrics in section 4; the main results and other
constructions are unaffected. v3 corrects discussion of forgetful axiom and
incorporates referees' corrections and suggestions, including a change in
title. Accepted version | null | null | null | math.SG math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a closed symplectic manifold $X$, we construct Gromov-Witten-type
invariants valued both in (complex) $K$-theory and in any complex-oriented
cohomology theory $\mathbb{K}$ which is $K_p(n)$-local for some Morava
$K$-theory $K_p(n)$. We show that these invariants satisfy a version of the
Kontsevich-Manin axioms, extending Givental and Lee's work for the quantum
$K$-theory of complex projective algebraic varieties. In particular, we prove a
Gromov-Witten type splitting axiom, and hence define quantum $K$-theory and
quantum $\mathbb{K}$-theory as commutative deformations of the corresponding
(generalised) cohomology rings of $X$; the definition of the quantum product
involves the formal group of the underlying cohomology theory. The key
geometric input to these results is a construction of global Kuranishi charts
for moduli spaces of stable maps of arbitrary genus to $X$. On the algebraic
side, in order to establish a common framework covering both ordinary
$K$-theory and $K_p(n)$-local theories, we introduce a formalism of `counting
theories' for enumerative invariants on a category of global Kuranishi charts.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 19:01:10 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Aug 2023 06:56:57 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Jul 2024 18:28:21 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Abouzaid",
"Mohammed",
""
],
[
"McLean",
"Mark",
""
],
[
"Smith",
"Ivan",
""
]
] |
2307.02147 | Yimeng Bai | Yang Zhang, Zhiyu Hu, Yimeng Bai, Jiancan Wu, Qifan Wang, Fuli Feng | Recommendation Unlearning via Influence Function | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recommendation unlearning is an emerging task to serve users for erasing
unusable data (e.g., some historical behaviors) from a well-trained recommender
model. Existing methods process unlearning requests by fully or partially
retraining the model after removing the unusable data. However, these methods
are impractical due to the high computation cost of full retraining and the
highly possible performance damage of partial training. In this light, a
desired recommendation unlearning method should obtain a similar model as full
retraining in a more efficient manner, i.e., achieving complete, efficient and
harmless unlearning.
In this work, we propose a new Influence Function-based Recommendation
Unlearning (IFRU) framework, which efficiently updates the model without
retraining by estimating the influence of the unusable data on the model via
the influence function. In the light that recent recommender models use
historical data for both the constructions of the optimization loss and the
computational graph (e.g., neighborhood aggregation), IFRU jointly estimates
the direct influence of unusable data on optimization loss and the spillover
influence on the computational graph to pursue complete unlearning.
Furthermore, we propose an importance-based pruning algorithm to reduce the
cost of the influence function. IFRU is harmless and applicable to mainstream
differentiable models. Extensive experiments demonstrate that IFRU achieves
more than 250 times acceleration compared to retraining-based methods with
recommendation performance comparable to full retraining. Codes are avaiable at
https://github.com/baiyimeng/IFRU.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 09:42:51 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 05:14:56 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Zhang",
"Yang",
""
],
[
"Hu",
"Zhiyu",
""
],
[
"Bai",
"Yimeng",
""
],
[
"Wu",
"Jiancan",
""
],
[
"Wang",
"Qifan",
""
],
[
"Feng",
"Fuli",
""
]
] |
2307.02214 | Boris Latosh | A. Arbuzov, D. Kuznetsov, B. Latosh, V. Shmidt | Inflation in simple one-loop effective potentials of perturbative
quantum gravity | 19 pages, 30 figures. International Journal of Modern Physics, 2024 | International Journal of Modern Physics D, Volume No. 33, Issue
No. 07n08, Article No. 2450028, Year 2024 | 10.1142/S0218271824500287 | CTPU-PTC-23-30 | gr-qc hep-th | http://creativecommons.org/licenses/by/4.0/ | We study inflation in scalar-tensor perturbative quantum gravity driven by a
one-loop effective potential. We consider effective potentials generated by
three models. The first model describes a single scalar field with a
non-vanishing mass. The second model describes a massless scalar field with
non-minimal coupling to the Einstein tensor. The third model generalises the
Coleman-Weinberg model for the gravitational case. The first model can be
consistent with the observational data for $N\sim 70$ e-foldings. The second
model can be consistent with the observational data for $N \sim 40$ e-foldings.
We did not find parameters that make the generalised Coleman-Weinberg model
consistent with the observational data. We discuss the implications of these
results and ways to improve them with other terms of effective action.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 11:42:29 GMT"
},
{
"version": "v2",
"created": "Sun, 30 Jul 2023 00:55:33 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Apr 2024 11:10:48 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Arbuzov",
"A.",
""
],
[
"Kuznetsov",
"D.",
""
],
[
"Latosh",
"B.",
""
],
[
"Shmidt",
"V.",
""
]
] |
2307.04284 | Hiroki Sayama | Yiding Cao, Yingjun Dong, Minjun Kim, Neil G. MacLaren, Sriniwas
Pandey, Shelley D. Dionne, Francis J. Yammarino, Hiroki Sayama | Effects of Network Connectivity and Functional Diversity Distribution on
Human Collective Ideation | 46 pages, 20 figures, 3 tables | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Human collective tasks in teams and organizations increasingly require
participation of members with diverse backgrounds working in networked social
environments. However, little is known about how network structure and the
functional diversity of member backgrounds would interact with each other and
affect collective processes. Here we conducted three sets of human-subject
experiments which involved 617 university students who collaborated anonymously
in a collective ideation task on a custom-made online social network platform.
We found that spatially clustered collectives with assortative background
distribution tended to explore more diverse ideas than in other conditions,
whereas collectives with random background distribution consistently generated
ideas with the highest utility. We also found that higher network connectivity
may improve individuals' overall experience but may not improve the collective
performance regarding idea generation, idea diversity, and final idea quality.
| [
{
"version": "v1",
"created": "Mon, 10 Jul 2023 00:20:45 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Oct 2023 20:35:46 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 04:05:04 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Cao",
"Yiding",
""
],
[
"Dong",
"Yingjun",
""
],
[
"Kim",
"Minjun",
""
],
[
"MacLaren",
"Neil G.",
""
],
[
"Pandey",
"Sriniwas",
""
],
[
"Dionne",
"Shelley D.",
""
],
[
"Yammarino",
"Francis J.",
""
],
[
"Sayama",
"Hiroki",
""
]
] |
2307.04580 | Giuseppe Orlando | Giuseppe Orlando | An implicit DG solver for incompressible two-phase flows with an
artificial compressibility formulation | null | null | null | null | math.NA cs.NA physics.flu-dyn | http://creativecommons.org/licenses/by/4.0/ | We propose an implicit Discontinuous Galerkin (DG) discretization for
incompressible two-phase flows using an artificial compressibility formulation.
The conservative level set (CLS) method is employed in combination with a
reinitialization procedure to capture the moving interface. A projection method
based on the L-stable TR-BDF2 method is adopted for the time discretization of
the Navier-Stokes equations and of the level set method. Adaptive Mesh
Refinement (AMR) is employed to enhance the resolution in correspondence of the
interface between the two fluids. The effectiveness of the proposed approach is
shown in a number of classical benchmarks. A specific analysis on the influence
of different choices of the mixture viscosity is also carried out.
| [
{
"version": "v1",
"created": "Mon, 10 Jul 2023 14:15:05 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Mar 2024 16:26:17 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 12:11:37 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Orlando",
"Giuseppe",
""
]
] |
2307.04856 | Benoit Vicedo | Simen Bruinsma, Alexander Schenkel, Benoit Vicedo | Universal first-order Massey product of a prefactorization algebra | 41 pages; v2: final version to appear in Communications in
Mathematical Physics | null | null | null | math-ph hep-th math.AT math.MP math.QA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the universal first-order Massey product of a
prefactorization algebra, which encodes higher algebraic operations on the
cohomology. Explicit computations of these structures are carried out in the
locally constant case, with applications to factorization envelopes on
$\mathbb{R}^m$ and a compactification of linear Chern-Simons theory on
$\mathbb{R}^2\times \mathbb{S}^1$.
| [
{
"version": "v1",
"created": "Mon, 10 Jul 2023 19:01:06 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 06:52:21 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Bruinsma",
"Simen",
""
],
[
"Schenkel",
"Alexander",
""
],
[
"Vicedo",
"Benoit",
""
]
] |
2307.06768 | Hurum Maksora Tohfa | Hurum Tohfa, Jack Crump, Ethan Baker, Luke Hart, Daniel Grin, Madeline
Brosius, and Jens Chluba | A cosmic microwave background search for fine-structure constant
evolution | 23 pages, 16 figures, 3 tables, comments welcome | null | null | null | astro-ph.CO gr-qc hep-ph | http://creativecommons.org/licenses/by/4.0/ | In some extensions of the standard model of particle physics, the values of
the fundamental coupling constants vary in space and time. Some observations of
quasars hint at time and spatial variation of the fine structure constant
$\alpha$. Here, the Bekenstein-Sandvik-Barrow-Magueijo (BSBM) model (which
posits the existence of a scalar field driving evolution in the fundamental
electric charge $e$) is tested against quasar and Planck satellite cosmic
microwave background (CMB) data. In this model, variations in $e$ are coupled
to the matter density through a factor $\zeta_{\rm m}/{\omega}$, which is
related to electromagnetic contributions to nucleon masses, and {the energy}
scale of new physics. Simulations conducted here do not support claims that the
electrostatic contribution to $\zeta_{m}$ is completely shielded. Other common
approximations used in BSBM field evolution are found to be adequate. Principal
components of the CMB data with respect to variations in $\alpha$ are used to
obtain constraints of $\zeta_{\rm m}/{\omega}\lesssim 9.3 \times 10^{-9}$ for a
massless field. A forecast anticipating the promise of the Simons Observatory
(SO) CMB experiment shows that SO will be sensitive to values of $\zeta_{\rm
m}/{\omega}\geq 2.2 \times 10^{-9}$.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2023 14:12:59 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2024 19:27:11 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Tohfa",
"Hurum",
""
],
[
"Crump",
"Jack",
""
],
[
"Baker",
"Ethan",
""
],
[
"Hart",
"Luke",
""
],
[
"Grin",
"Daniel",
""
],
[
"Brosius",
"Madeline",
""
],
[
"Chluba",
"Jens",
""
]
] |
2307.11398 | Wei Liu | Wei Liu, Jincheng Wang, Fangfang Wang, Kai Qi, and Zengru Di | The precursor of the critical transitions in majority vote model with
the noise feedback from the vote layer | 16 pages, 10 figures | null | null | null | physics.soc-ph cond-mat.stat-mech | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate phase transitions in the Majority-Vote model
coupled with noise layers of different structures. We examine the Square
lattice and Random-regular networks, as well as their combinations, for both
vote layers and noise layers. Our findings reveal the presence of independent
third-order transitions in all cases and dependent third-order transitions when
critical transitions occur. This suggests that dependent third-order
transitions may serve as precursors to critical transitions in non-equilibrium
systems. Furthermore, we observe that when the structure of vote layers is
local, the coupling between the vote layer and the noise layer leads to the
absence of critical phenomena.
| [
{
"version": "v1",
"created": "Fri, 21 Jul 2023 07:30:47 GMT"
},
{
"version": "v2",
"created": "Thu, 31 Aug 2023 03:58:49 GMT"
},
{
"version": "v3",
"created": "Fri, 8 Sep 2023 07:06:20 GMT"
},
{
"version": "v4",
"created": "Wed, 17 Jul 2024 06:44:13 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Liu",
"Wei",
""
],
[
"Wang",
"Jincheng",
""
],
[
"Wang",
"Fangfang",
""
],
[
"Qi",
"Kai",
""
],
[
"Di",
"Zengru",
""
]
] |
2307.11731 | Alex Ortiz | Alexander Ortiz | A sharp weighted Fourier extension estimate for the cone in
$\mathbb{R}^3$ based on circle tangencies | Updated title and abstract, exposition improved for clarity. Added
discussion about decoupling and the Mizohata--Takeuchi conjecture. 40 pages,
7 figures | null | null | null | math.CA | http://creativecommons.org/licenses/by/4.0/ | We apply recent circle tangency estimates due to Pramanik--Yang--Zahl to
prove sharp weighted Fourier extension estimates for the cone in $\mathbb{R}^3$
and $1$-dimensional weights. The idea of using circle tangency estimates to
study Fourier extension of the cone is originally due to Tom Wolff, who used it
in part to prove the first decoupling estimates. We make an improvement to the
best known Mizohata--Takeuchi-type estimates for the cone in $\mathbb{R}^3$ and
the $1$-dimensional weights as a corollary of our main theorem, where the
previously best known bound follows as a corollary of refined decoupling
estimates.
| [
{
"version": "v1",
"created": "Fri, 21 Jul 2023 17:45:20 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 11:42:32 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Ortiz",
"Alexander",
""
]
] |
2308.00304 | Jiaao Chen | Jiaao Chen, Xiaoman Pan, Dian Yu, Kaiqiang Song, Xiaoyang Wang, Dong
Yu, Jianshu Chen | Skills-in-Context Prompting: Unlocking Compositionality in Large
Language Models | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | We investigate how to elicit compositional generalization capabilities in
large language models (LLMs). Compositional generalization empowers LLMs to
solve complex problems by combining foundational skills, a critical reasoning
ability akin to human intelligence. However, even the most advanced LLMs
currently struggle with this form of reasoning. We examine this problem within
the framework of in-context learning and find that demonstrating both
foundational skills and compositional examples grounded in these skills within
the same prompt context is crucial. We refer to this prompt structure as
skills-in-context (SKiC). With as few as two exemplars, this in-context
learning structure enables LLMs to tackle more challenging problems requiring
innovative skill combinations, achieving near-perfect systematic generalization
across a broad range of tasks. Intriguingly, SKiC also unlocks the latent
potential of LLMs, allowing them to more actively utilize pre-existing internal
skills acquired during earlier pretraining stages to solve complex reasoning
problems. The SKiC structure is robust across different skill constructions and
exemplar choices and demonstrates strong transferability to new tasks. Finally,
inspired by our in-context learning study, we show that fine-tuning LLMs with
SKiC-style data can elicit zero-shot weak-to-strong generalization, enabling
the models to solve much harder problems directly with standard prompting.
| [
{
"version": "v1",
"created": "Tue, 1 Aug 2023 05:54:12 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Aug 2023 08:11:15 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Jul 2024 20:09:47 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Chen",
"Jiaao",
""
],
[
"Pan",
"Xiaoman",
""
],
[
"Yu",
"Dian",
""
],
[
"Song",
"Kaiqiang",
""
],
[
"Wang",
"Xiaoyang",
""
],
[
"Yu",
"Dong",
""
],
[
"Chen",
"Jianshu",
""
]
] |
2308.00850 | Lubomira Dvorakova | Lubom\'ira Dvo\v{r}\'akov\'a, Veronika Hendrychov\'a | String attractors of Rote sequences | null | null | null | null | math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we describe minimal string attractors (of size two) of
pseudopalindromic prefixes of standard complementary-symmetric Rote sequences.
Such a class of Rote sequences forms a subclass of binary generalized
pseudostandard sequences, i.e., of sequences obtained when iterating
palindromic and antipalindromic closures. When iterating only palindromic
closure, palindromic prefixes of standard Sturmian sequences are obtained and
their string attractors are of size two. However, already when iterating only
antipalindromic closure, antipalindromic prefixes of binary pseudostandard
sequences are obtained and we prove that the minimal string attractors are of
size three in this case. We conjecture that the pseudopalindromic prefixes of
any binary generalized pseudostandard sequence have a minimal string attractor
of size at most four.
| [
{
"version": "v1",
"created": "Tue, 1 Aug 2023 21:31:06 GMT"
},
{
"version": "v2",
"created": "Sat, 7 Oct 2023 21:13:06 GMT"
},
{
"version": "v3",
"created": "Fri, 1 Mar 2024 15:59:33 GMT"
},
{
"version": "v4",
"created": "Wed, 17 Jul 2024 06:26:47 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Dvořáková",
"Lubomíra",
""
],
[
"Hendrychová",
"Veronika",
""
]
] |
2308.01097 | Jiexin Wang | Jiexin Wang, Yujie Zhou, Wenwen Qiang, Ying Ba, Bing Su, Ji-Rong Wen | Spatio-Temporal Branching for Motion Prediction using Motion Increments | The incremental information of our paper includes the displacement
information from the last frame of the historical sequence, derived from the
motion information of the first frame in the future sequence and the motion
information of the last frame of the historical sequence. This implicitly
contains future information, inadvertently giving an unfair advantage in the
human motion prediction task | ACM MM 2023 | 10.1145/3581783.3612330 | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Human motion prediction (HMP) has emerged as a popular research topic due to
its diverse applications, but it remains a challenging task due to the
stochastic and aperiodic nature of future poses. Traditional methods rely on
hand-crafted features and machine learning techniques, which often struggle to
model the complex dynamics of human motion. Recent deep learning-based methods
have achieved success by learning spatio-temporal representations of motion,
but these models often overlook the reliability of motion data. Additionally,
the temporal and spatial dependencies of skeleton nodes are distinct. The
temporal relationship captures motion information over time, while the spatial
relationship describes body structure and the relationships between different
nodes. In this paper, we propose a novel spatio-temporal branching network
using incremental information for HMP, which decouples the learning of
temporal-domain and spatial-domain features, extracts more motion information,
and achieves complementary cross-domain knowledge learning through knowledge
distillation. Our approach effectively reduces noise interference and provides
more expressive information for characterizing motion by separately extracting
temporal and spatial features. We evaluate our approach on standard HMP
benchmarks and outperform state-of-the-art methods in terms of prediction
accuracy.
| [
{
"version": "v1",
"created": "Wed, 2 Aug 2023 12:04:28 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Aug 2023 07:21:53 GMT"
},
{
"version": "v3",
"created": "Fri, 11 Aug 2023 05:30:10 GMT"
},
{
"version": "v4",
"created": "Wed, 17 Jul 2024 12:12:48 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Wang",
"Jiexin",
""
],
[
"Zhou",
"Yujie",
""
],
[
"Qiang",
"Wenwen",
""
],
[
"Ba",
"Ying",
""
],
[
"Su",
"Bing",
""
],
[
"Wen",
"Ji-Rong",
""
]
] |
2308.01380 | Marco Arroyo | M. A. Arroyo-Ure\~na, J. Lorenzo D\'iaz-Cruz, O. F\'elix-Beltr\'an and
M. Zeleny-Mora | Lessons from LHC on the LFV Higgs decays $h \to \ell_a \ell_b$ in the
Two-Higgs Doublet Models | Version accepted to be published in IJMPA | null | 10.1142/S0217751X24500799 | null | hep-ph | http://creativecommons.org/licenses/by/4.0/ | The non-conservation of the lepton number has been explored at the LHC
through the Lepton-Flavor Violating (LFV) Higgs decays $h\to\ell_a\ell_b$, with
$\ell_{a,\,b}=e,\,\mu,\,\tau$ $(a \neq b)$. Current limits on these decays are
a source of valuable information on the structure of the Yukawa and Higgs
sectors. The LFV Higgs couplings can arise within the general Two-Higgs Doublet
Model (2HDM); the predicted rates for these decay modes depend on the specific
Yukawa structure being considered, ranging from a vanishing branching ratio at
tree-level for some versions (2HDM-I, II, X, Y), up to large and detectable
ratios within the general 2HDM-III. An attractive scenario is given by the
texturized version of the model (2HDM-Tx), with the Yukawa matrices having some
texture zeros, such as the minimal version with the so-called Cheng-Sher
ansazt. We study the constraints on the parameter space of the 2HDM provided by
experimental and theoretical restrictions, and use them to study the detection
of LFV Higgs modes at LHC. We find several encouraging scenarios to the search
for the decay $h \to\tau\mu$ that could be achieved in the High-Luminosity LHC.
On the other hand, LFV Higgs couplings can also be induced at one-loop level in
the 2HDM with neutrino masses, with the loops being mediated by neutrino
interactions; we find that the resulting branching ratios are of order
$10^{-7}$ at best, which is out of the reach of current and future phases of
the LHC.
| [
{
"version": "v1",
"created": "Wed, 2 Aug 2023 18:37:21 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2024 23:28:19 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Arroyo-Ureña",
"M. A.",
""
],
[
"Díaz-Cruz",
"J. Lorenzo",
""
],
[
"Félix-Beltrán",
"O.",
""
],
[
"Zeleny-Mora",
"M.",
""
]
] |
2308.02095 | Mauricio Junca | Mauricio Junca and Harold Moreno-Franco and Jose Luis Perez | An optimal multibarrier strategy for a singular stochastic control
problem with a state-dependent reward | null | null | null | null | math.OC | http://creativecommons.org/licenses/by/4.0/ | We consider a singular control problem that aims to maximize the expected
cumulative rewards, where the instantaneous returns depend on the state of a
controlled process. The contributions of this paper are twofold. Firstly, to
establish sufficient conditions for determining the optimality of the
one-barrier strategy when the uncontrolled process $X$ follows a spectrally
negative L\'evy process with a L\'evy measure defined by a completely monotone
density. Secondly, to verify the optimality of the $(2n+1)$-barrier strategy
when $X$ is a Brownian motion with a drift. Additionally, we provide an
algorithm to compute the barrier values in the latter case.
| [
{
"version": "v1",
"created": "Fri, 4 Aug 2023 00:43:34 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2024 20:39:14 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Junca",
"Mauricio",
""
],
[
"Moreno-Franco",
"Harold",
""
],
[
"Perez",
"Jose Luis",
""
]
] |
2308.02406 | Corentin D\'eprez | Floor van Riggelen-Doelman, Chien-An Wang, Sander L. de Snoo, William
I. L. Lawrie, Nico W. Hendrickx, Maximilian Rimbach-Russ, Amir Sammak,
Giordano Scappucci, Corentin D\'eprez, and Menno Veldhorst | Coherent spin qubit shuttling through germanium quantum dots | Main text: 9 pages, 4 figures Supplementary material: 10 pages, 8
figures | Nat. Commun. 15, 5716 (2024) | 10.1038/s41467-024-49358-y | null | cond-mat.mes-hall quant-ph | http://creativecommons.org/licenses/by/4.0/ | Quantum links can interconnect qubit registers and are therefore essential in
networked quantum computing. Semiconductor quantum dot qubits have seen
significant progress in the high-fidelity operation of small qubit registers
but establishing a compelling quantum link remains a challenge. Here, we show
that a spin qubit can be shuttled through multiple quantum dots while
preserving its quantum information. Remarkably, we achieve these results using
hole spin qubits in germanium, despite the presence of strong spin-orbit
interaction. We accomplish the shuttling of spin basis states over effective
lengths beyond 300 $\mu$m and demonstrate the coherent shuttling of
superposition states over effective lengths corresponding to 9 $\mu$m, which we
can extend to 49 $\mu$m by incorporating dynamical decoupling. These findings
indicate qubit shuttling as an effective approach to route qubits within
registers and to establish quantum links between registers.
| [
{
"version": "v1",
"created": "Fri, 4 Aug 2023 15:57:25 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"van Riggelen-Doelman",
"Floor",
""
],
[
"Wang",
"Chien-An",
""
],
[
"de Snoo",
"Sander L.",
""
],
[
"Lawrie",
"William I. L.",
""
],
[
"Hendrickx",
"Nico W.",
""
],
[
"Rimbach-Russ",
"Maximilian",
""
],
[
"Sammak",
"Amir",
""
],
[
"Scappucci",
"Giordano",
""
],
[
"Déprez",
"Corentin",
""
],
[
"Veldhorst",
"Menno",
""
]
] |
2308.02623 | Shu Xincheng | Zegang Huang, Xincheng Shu, Qi Xuan, Zhongyuan Ruan | Epidemic spreading under game-based self-quarantine behaviors: The
different effects of local and global information | Accepted by Chaos; 7 pages, 6 figures | Chaos. 34 (1): 013112 (2024) | 10.1063/5.0180484 | null | physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | During the outbreak of an epidemic, individuals may modify their behaviors in
response to external (including local and global) infection-related
information. However, the difference between local and global information in
influencing the spread of diseases remains inadequately explored. Here we study
a simple epidemic model that incorporates the game-based self-quarantine
behavior of individuals, taking into account the influence of local infection
status, global disease prevalence and node heterogeneity (non-identical degree
distribution). Our findings reveal that local information can effectively
contain an epidemic, even with only a small proportion of individuals opting
for self-quarantine. On the other hand, global information can cause infection
evolution curves shaking during the declining phase of an epidemic, owing to
the synchronous release of nodes with the same degree from the quarantined
state. In contrast, the releasing pattern under the local information appears
to be more random. This shaking phenomenon can be observed in various types of
networks associated with different characteristics. Moreover, it is found that
under the proposed game-epidemic framework, a disease is more difficult to
spread in heterogeneous networks than in homogeneous networks, which differs
from conventional epidemic models.
| [
{
"version": "v1",
"created": "Fri, 4 Aug 2023 15:17:39 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 15:48:53 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Huang",
"Zegang",
""
],
[
"Shu",
"Xincheng",
""
],
[
"Xuan",
"Qi",
""
],
[
"Ruan",
"Zhongyuan",
""
]
] |
2308.03024 | Anand Mishra | Shreyas Vaidya, Arvind Kumar Sharma, Prajwal Gatti, Anand Mishra | Show Me the World in My Language: Establishing the First Baseline for
Scene-Text to Scene-Text Translation | Please be advised that the previous version contained some technical
issues. Kindly refer to this updated version for accurate information | null | null | null | cs.CV cs.AI cs.CL cs.MM | http://creativecommons.org/licenses/by-nc-nd/4.0/ | In this work, we study the task of visually translating scene text from a
source language (e.g., Hindi) to a target language (e.g., English). Visual
translation involves not just the recognition and translation of scene text but
also the generation of the translated image that preserves visual features of
the source scene text, such as font, size, and background. There are several
challenges associated with this task, such as translation with limited context,
deciding between translation and transliteration, accommodating varying text
lengths within fixed spatial boundaries, and preserving the font and background
styles of the source scene text in the target language. To address this
problem, we make the following contributions: (i) We study visual translation
as a standalone problem for the first time in the literature. (ii) We present a
cascaded framework for visual translation that combines state-of-the-art
modules for scene text recognition, machine translation, and scene text
synthesis as a baseline for the task. (iii) We propose a set of task-specific
design enhancements to design a variant of the baseline to obtain performance
improvements. (iv) Currently, the existing related literature lacks any
comprehensive performance evaluation for this novel task. To fill this gap, we
introduce several automatic and user-assisted evaluation metrics designed
explicitly for evaluating visual translation. Further, we evaluate presented
baselines for translating scene text between Hindi and English. Our experiments
demonstrate that although we can effectively perform visual translation over a
large collection of scene text images, the presented baseline only partially
addresses challenges posed by visual translation tasks. We firmly believe that
this new task and the limitations of existing models, as reported in this
paper, should encourage further research in visual translation.
| [
{
"version": "v1",
"created": "Sun, 6 Aug 2023 05:23:25 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 09:53:23 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Vaidya",
"Shreyas",
""
],
[
"Sharma",
"Arvind Kumar",
""
],
[
"Gatti",
"Prajwal",
""
],
[
"Mishra",
"Anand",
""
]
] |
2308.03387 | Zichao Xiao | Zichao Xiao, Rang Liu, Ming Li, Qian Liu, and A. Lee Swindlehurst | A Novel Joint Angle-Range-Velocity Estimation Method for MIMO-OFDM ISAC
Systems | 13 pages, 8 figures, submitted to IEEE Trans | null | null | null | eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Integrated sensing and communication (ISAC) is emerging as a key technique
for next-generation wireless systems. In order to expedite the practical
implementation of ISAC in pervasive mobile networks, it is crucial to have
widely deployed base stations with radar sensing capabilities. Thus, the
utilization of standardized multiple-input multiple-output (MIMO) orthogonal
frequency division multiplexing (OFDM) hardware architectures and waveforms is
pivotal for realizing seamless integration of effective communication and
sensing functionalities. In this paper, we introduce a novel joint
angle-range-velocity estimation algorithm for MIMO-OFDM ISAC systems. This
approach exclusively depends on the format of conventional MIMO-OFDM waveforms
that are widely adopted in wireless communications. Specifically, the
angle-range-velocity information of potential targets is jointly extracted by
utilizing all the received echo signals within a coherent processing interval
(CPI). The proposed joint estimation algorithm can achieve larger
signal-to-noise-ratio (SNR) processing gains and higher resolution by fully
exploiting the echo signals and jointly estimating the angle-range-velocity
information. A theoretical analysis for maximum unambiguous range, resolution,
and SNR processing gains is provided to verify the advantages of the proposed
joint estimation algorithm. Finally, the results of extensive numerical
experiments are presented to demonstrate that the proposed joint estimation
approach can achieve significantly lower root-mean-square-error (RMSE)
performance for angle/range/velocity estimation for both single- and
multi-target scenarios.
| [
{
"version": "v1",
"created": "Mon, 7 Aug 2023 08:15:25 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Oct 2023 07:11:27 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 10:23:42 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Xiao",
"Zichao",
""
],
[
"Liu",
"Rang",
""
],
[
"Li",
"Ming",
""
],
[
"Liu",
"Qian",
""
],
[
"Swindlehurst",
"A. Lee",
""
]
] |
2308.03415 | Christian Huber | Christian Huber, Tu Anh Dinh, Carlos Mullov, Ngoc Quan Pham, Thai Binh
Nguyen, Fabian Retkowski, Stefan Constantin, Enes Yavuz Ugan, Danni Liu,
Zhaolin Li, Sai Koneru, Jan Niehues and Alexander Waibel | End-to-End Evaluation for Low-Latency Simultaneous Speech Translation | Demo paper at EMNLP 2023 | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | The challenge of low-latency speech translation has recently draw significant
interest in the research community as shown by several publications and shared
tasks. Therefore, it is essential to evaluate these different approaches in
realistic scenarios. However, currently only specific aspects of the systems
are evaluated and often it is not possible to compare different approaches.
In this work, we propose the first framework to perform and evaluate the
various aspects of low-latency speech translation under realistic conditions.
The evaluation is carried out in an end-to-end fashion. This includes the
segmentation of the audio as well as the run-time of the different components.
Secondly, we compare different approaches to low-latency speech translation
using this framework. We evaluate models with the option to revise the output
as well as methods with fixed output. Furthermore, we directly compare
state-of-the-art cascaded as well as end-to-end systems. Finally, the framework
allows to automatically evaluate the translation quality as well as latency and
also provides a web interface to show the low-latency model outputs to the
user.
| [
{
"version": "v1",
"created": "Mon, 7 Aug 2023 09:06:20 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Oct 2023 11:47:04 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 11:29:10 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Huber",
"Christian",
""
],
[
"Dinh",
"Tu Anh",
""
],
[
"Mullov",
"Carlos",
""
],
[
"Pham",
"Ngoc Quan",
""
],
[
"Nguyen",
"Thai Binh",
""
],
[
"Retkowski",
"Fabian",
""
],
[
"Constantin",
"Stefan",
""
],
[
"Ugan",
"Enes Yavuz",
""
],
[
"Liu",
"Danni",
""
],
[
"Li",
"Zhaolin",
""
],
[
"Koneru",
"Sai",
""
],
[
"Niehues",
"Jan",
""
],
[
"Waibel",
"Alexander",
""
]
] |
2308.04553 | Maan Qraitem | Maan Qraitem, Kate Saenko, Bryan A. Plummer | From Fake to Real: Pretraining on Balanced Synthetic Images to Prevent
Spurious Correlations in Image Recognition | Accepted at ECCV 2024 | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Visual recognition models are prone to learning spurious correlations induced
by a biased training set where certain conditions $B$ (\eg, Indoors) are
over-represented in certain classes $Y$ (\eg, Big Dogs). Synthetic data from
off-the-shelf large-scale generative models offers a promising direction to
mitigate this issue by augmenting underrepresented subgroups in the real
dataset. However, by using a mixed distribution of real and synthetic data, we
introduce another source of bias due to distributional differences between
synthetic and real data (\eg synthetic artifacts). As we will show, prior
work's approach for using synthetic data to resolve the model's bias toward $B$
do not correct the model's bias toward the pair $(B, G)$, where $G$ denotes
whether the sample is real or synthetic. Thus, the model could simply learn
signals based on the pair $(B, G)$ (\eg, Synthetic Indoors) to make predictions
about $Y$ (\eg, Big Dogs). To address this issue, we propose a simple,
easy-to-implement, two-step training pipeline that we call From Fake to Real
(FFR). The first step of FFR pre-trains a model on balanced synthetic data to
learn robust representations across subgroups. In the second step, FFR
fine-tunes the model on real data using ERM or common loss-based bias
mitigation methods. By training on real and synthetic data separately, FFR does
not expose the model to the statistical differences between real and synthetic
data and thus avoids the issue of bias toward the pair $(B, G)$. Our
experiments show that FFR improves worst group accuracy over the
state-of-the-art by up to 20\% over three datasets. Code available:
\url{https://github.com/mqraitem/From-Fake-to-Real}
| [
{
"version": "v1",
"created": "Tue, 8 Aug 2023 19:52:28 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Sep 2023 05:32:35 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 15:07:01 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Qraitem",
"Maan",
""
],
[
"Saenko",
"Kate",
""
],
[
"Plummer",
"Bryan A.",
""
]
] |
2308.04971 | Max Ehre | Max Ehre, Iason Papaioannou, Daniel Straub | Stein Variational Rare Event Simulation | null | null | null | null | stat.ME | http://creativecommons.org/licenses/by/4.0/ | Rare event simulation and rare event probability estimation are important
tasks within the analysis of systems subject to uncertainty and randomness.
Simultaneously, accurately estimating rare event probabilities is an inherently
difficult task that calls for dedicated tools and methods. One way to improve
estimation efficiency on difficult rare event estimation problems is to
leverage gradients of the computational model representing the system in
consideration, e.g., to explore the rare event faster and more reliably. We
present a novel approach for estimating rare event probabilities using such
model gradients by drawing on a technique to generate samples from
non-normalized posterior distributions in Bayesian inference - the Stein
variational gradient descent. We propagate samples generated from a tractable
input distribution towards a near-optimal rare event importance sampling
distribution by exploiting a similarity of the latter with Bayesian posterior
distributions. Sample propagation takes the shape of passing samples through a
sequence of invertible transforms such that their densities can be tracked and
used to construct an unbiased importance sampling estimate of the rare event
probability - the Stein variational rare event estimator. We discuss settings
and parametric choices of the algorithm and suggest a method for balancing
convergence speed with stability by choosing the step width or base learning
rate adaptively. We analyze the method's performance on several analytical test
functions and two engineering examples in low to high stochastic dimensions ($d
= 2 - 869$) and find that it consistently outperforms other state-of-the-art
gradient-based rare event simulation methods.
| [
{
"version": "v1",
"created": "Wed, 9 Aug 2023 14:10:37 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2024 18:28:14 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Ehre",
"Max",
""
],
[
"Papaioannou",
"Iason",
""
],
[
"Straub",
"Daniel",
""
]
] |
2308.05651 | Olivier Haution | Olivier Haution | The geometric concentration theorem | null | null | null | null | math.AG math.KT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We establish a purely geometric form of the concentration theorem (also
called localization theorem) for actions of a linearly reductive group $G$ on
an affine scheme $X$ over an affine base scheme $S$. It asserts the existence
of a $G$-representation without trivial summand over $S$, which acquires over
$X$ an equivariant section vanishing precisely at the fixed locus of $X$.
As a consequence, we show that the equivariant stable motivic homotopy theory
of a scheme with an action of a linearly reductive group is equivalent to that
of the fixed locus, upon inverting appropriate maps, namely the Euler classes
of representations without trivial summands. We also discuss consequences for
equivariant cohomology theories obtained using Borel's construction. This
recovers most known forms of the concentration theorem in algebraic geometry,
and yields generalizations valid beyond the setting of actions of
diagonalizable groups on one hand, and that of oriented cohomology theories on
the other hand.
Finally, we derive a version of Smith theory for motivic cohomology,
following the approach of Dwyer--Wilkerson in topology.
| [
{
"version": "v1",
"created": "Thu, 10 Aug 2023 15:48:53 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Oct 2023 16:03:00 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 13:39:23 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Haution",
"Olivier",
""
]
] |
2308.05731 | Marcel Hallgarten | Steffen Hagedorn, Marcel Hallgarten, Martin Stoll, Alexandru
Condurache | Rethinking the Integration of Prediction and Planning in Deep
Learning-Based Automated Driving Systems: A Review | null | null | null | null | cs.RO cs.AI cs.CV cs.LG cs.MA | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Automated driving has the potential to revolutionize personal, public, and
freight mobility. Beside accurately perceiving the environment, automated
vehicles must plan a safe, comfortable, and efficient motion trajectory. To
promote safety and progress, many works rely on modules that predict the future
motion of surrounding traffic. Modular automated driving systems commonly
handle prediction and planning as sequential, separate tasks. While this
accounts for the influence of surrounding traffic on the ego vehicle, it fails
to anticipate the reactions of traffic participants to the ego vehicle's
behavior. Recent models increasingly integrate prediction and planning in a
joint or interdependent step to model bi-directional interactions. To date, a
comprehensive overview of different integration principles is lacking. We
systematically review state-of-the-art deep learning-based prediction and
planning, and focus on integrated prediction and planning models. Different
facets of the integration ranging from model architecture and model design to
behavioral aspects are considered and related to each other. Moreover, we
discuss the implications, strengths, and limitations of different integration
principles. By pointing out research gaps, describing relevant future
challenges, and highlighting trends in the research field, we identify
promising directions for future research.
| [
{
"version": "v1",
"created": "Thu, 10 Aug 2023 17:53:03 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 09:35:26 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Hagedorn",
"Steffen",
""
],
[
"Hallgarten",
"Marcel",
""
],
[
"Stoll",
"Martin",
""
],
[
"Condurache",
"Alexandru",
""
]
] |
2308.09489 | Guofa Cai | Kengyuan Xie, Guofa Cai, Jiguang He, Georges Kaddoum | STAR-RIS Aided MISO SWIPT-NOMA System with Energy Buffer: Performance
Analysis and Optimization | null | null | null | null | cs.IT eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a simultaneous transmitting and reflecting
reconfigurable intelligent surface (STAR-RIS) and energy buffer aided
multiple-input single-output (MISO) simultaneous wireless information and power
transfer (SWIPT) non-orthogonal multiple access (NOMA) system, which consists
of a STAR-RIS, an access point (AP), and reflection users and transmission
users with energy buffers. In the proposed system, the multi-antenna AP can
transmit information and energy to several single-antenna reflection and
transmission users simultaneously by the NOMA fashion in the downlink, where
the power transfer and information transmission states of the users are modeled
using Markov chains. The reflection and transmission users harvest and store
the energy in energy buffers as additional power supplies, which are partially
utilized for uplink information transmission. The power outage probability,
information outage probability, sum throughput, and joint outage probability
closed-form expressions of the proposed system are derived over Nakagami-m
fading channels, which are validated via simulations. Results demonstrate that
the proposed system achieves better performance as compared to the proposed
system with discrete phase shifts, the STAR-RIS aided MISO SWIPT-NOMA
buffer-less, conventional RIS and energy buffer aided MISO SWIPT-NOMA, and
STAR-RIS and energy buffer aided MISO SWIPT-time-division multiple access
(TDMA) systems. Furthermore, a particle swarm optimization-based power
allocation (PSO-PA) algorithm is designed to maximize the uplink sum throughput
with a constraint on the uplink joint outage probability and Jain's fairness
index (JFI). Simulation results illustrate that the proposed PSO-PA algorithm
can achieve an improved sum throughput performance of the proposed system.
| [
{
"version": "v1",
"created": "Fri, 18 Aug 2023 11:56:43 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 02:12:36 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Xie",
"Kengyuan",
""
],
[
"Cai",
"Guofa",
""
],
[
"He",
"Jiguang",
""
],
[
"Kaddoum",
"Georges",
""
]
] |
2308.09574 | Jeffrey Everts | Jeffrey C. Everts and Bogdan Cichocki | Dissipative effects in odd viscous Stokes flow around a single sphere | 7 pages, 2 figures, Supplemental Material can be found under
ancillary files. v3: corrected an error in the expression for the
rotational-rotational mobility tensor. This has been published as an erratum,
see Phys. Rev. Lett. 133, 039902 (2024), which has been incorporated in the
main text here | Phys. Rev. Lett. 132, 218303 (2024) | 10.1103/PhysRevLett.132.218303 | null | cond-mat.soft physics.flu-dyn | http://creativecommons.org/licenses/by/4.0/ | Odd viscosity (OV) is a transport coefficient in, for example, fluids of
self-spinning (active) particles or electrons in an external magnetic field.
The key feature of OV is that it does not contribute to dissipation in two
spatial dimensions. In contrast, we explicitly show that in the
three-dimensional case, OV can contribute indirectly to dissipation by
modifying the fluid flow. We quantify the dissipation rate of a single
spherical particle moving through a fluid with OV via an exact analytical
solution of the generalised stationary creeping flow equations. Our results
provide a novel way to quantify the effects of OV by measuring the solid-body
motion of a single spherical particle. Moreover, we explicitly demonstrate how
complex fluids can be designed in terms of their rheological properties by
mixing passive particles with self-spinning active particles.
| [
{
"version": "v1",
"created": "Fri, 18 Aug 2023 14:05:03 GMT"
},
{
"version": "v2",
"created": "Fri, 24 May 2024 19:05:47 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 15:20:41 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Everts",
"Jeffrey C.",
""
],
[
"Cichocki",
"Bogdan",
""
]
] |
2308.10012 | Weijia Wu | Yuanhang Liu, Yaozhong Hu, Weijia Wu, Donghui Yang | Carleman estimates for degenerate parabolic equations with single
interior point degeneracy and its applications | null | null | null | null | math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the controllability of a class of $N$-dimensional degenerate
parabolic equations with single interior point degeneracy. We employ the
Galerkin method to prove the existence of solutions for the equations. The
analysis is then divided into two cases based on whether the degenerate point
$x=0$ lies within the control region $\omega_0$ or not. For each case, we
establish specific Carleman estimates. As a result, we achieve null
controllability in the first case $0\in\omega_0$ and unique continuation and
approximate controllability in the second case $0\notin\omega_0$.
| [
{
"version": "v1",
"created": "Sat, 19 Aug 2023 13:30:27 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Feb 2024 07:12:25 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 17:08:31 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Liu",
"Yuanhang",
""
],
[
"Hu",
"Yaozhong",
""
],
[
"Wu",
"Weijia",
""
],
[
"Yang",
"Donghui",
""
]
] |
2308.10046 | Igor Letina | Jean-Michel Benkert, Igor Letina and Shuo Liu | Startup Acquisitions: Acquihires and Talent Hoarding | null | null | null | null | econ.GN q-fin.EC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study how competitive forces may drive firms to inefficiently acquire
startup talent. In our model, two rival firms have the capacity to acquire and
integrate a startup operating in an orthogonal market. We show that firms may
pursue such acquihires primarily as a preemptive strategy, even when they
appear unprofitable in isolation. Thus, acquihires, even absent traditional
competition-reducing effects, need not be benign, as they can lead to
inefficient talent allocation. Additionally, our analysis underscores that such
talent hoarding can diminish consumer surplus and exacerbate job volatility for
acquihired employees.
| [
{
"version": "v1",
"created": "Sat, 19 Aug 2023 15:10:30 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Oct 2023 12:07:31 GMT"
},
{
"version": "v3",
"created": "Tue, 6 Feb 2024 17:19:23 GMT"
},
{
"version": "v4",
"created": "Wed, 17 Jul 2024 09:35:59 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Benkert",
"Jean-Michel",
""
],
[
"Letina",
"Igor",
""
],
[
"Liu",
"Shuo",
""
]
] |
2308.12013 | Stefano Martina PhD | Marco Parigi, Stefano Martina, Filippo Caruso | Quantum-Noise-Driven Generative Diffusion Models | 27 pages, 4 figures | Adv Quantum Technol. 2024, 2300401 | 10.1002/qute.202300401 | null | quant-ph cond-mat.dis-nn cs.AI cs.LG stat.ML | http://creativecommons.org/licenses/by/4.0/ | Generative models realized with machine learning techniques are powerful
tools to infer complex and unknown data distributions from a finite number of
training samples in order to produce new synthetic data. Diffusion models are
an emerging framework that have recently overcome the performance of the
generative adversarial networks in creating synthetic text and high-quality
images. Here, we propose and discuss the quantum generalization of diffusion
models, i.e., three quantum-noise-driven generative diffusion models that could
be experimentally tested on real quantum systems. The idea is to harness unique
quantum features, in particular the non-trivial interplay among coherence,
entanglement and noise that the currently available noisy quantum processors do
unavoidably suffer from, in order to overcome the main computational burdens of
classical diffusion models during inference. Hence, we suggest to exploit
quantum noise not as an issue to be detected and solved but instead as a very
remarkably beneficial key ingredient to generate much more complex probability
distributions that would be difficult or even impossible to express
classically, and from which a quantum processor might sample more efficiently
than a classical one. An example of numerical simulations for an hybrid
classical-quantum generative diffusion model is also included. Therefore, our
results are expected to pave the way for new quantum-inspired or quantum-based
generative diffusion algorithms addressing more powerfully classical tasks as
data generation/prediction with widespread real-world applications ranging from
climate forecasting to neuroscience, from traffic flow analysis to financial
forecasting.
| [
{
"version": "v1",
"created": "Wed, 23 Aug 2023 09:09:32 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Sep 2023 14:25:23 GMT"
},
{
"version": "v3",
"created": "Wed, 12 Jun 2024 14:52:10 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Parigi",
"Marco",
""
],
[
"Martina",
"Stefano",
""
],
[
"Caruso",
"Filippo",
""
]
] |
2308.12405 | Joe Sawada | J. Sawada, J. Sears, A. Trautrim, A. Williams | Concatenation trees: A framework for efficient universal cycle and de
Bruijn sequence constructions | null | null | null | null | math.CO cs.DM | http://creativecommons.org/licenses/by/4.0/ | Classic cycle-joining techniques have found widespread application in
creating universal cycles for a diverse range of combinatorial objects, such as
shorthand permutations, weak orders, orientable sequences, and various subsets
of $k$-ary strings, including de Bruijn sequences. In the most favorable
scenarios, these algorithms operate with a space complexity of $O(n)$ and
require $O(n)$ time to generate each symbol in the sequences. In contrast,
concatenation-based methods have been developed for a limited selection of
universal cycles. In each of these instances, the universal cycles can be
generated far more efficiently, with an amortized time complexity of $O(1)$ per
symbol, while still using $O(n)$ space.
This paper introduces $\mathit{concatenation~trees}$, which serve as the
fundamental structures needed to bridge the gap between cycle-joining
constructions based on the pure cycle register and corresponding
concatenation-based approaches. They immediately demystify the relationship
between the classic Lyndon word concatenation construction of de Bruijn
sequences and a corresponding cycle-joining based construction. To underscore
their significance, concatenation trees are applied to construct universal
cycles for shorthand permutations and weak orders in $O(1)$-amortized time per
symbol. Moreover, we provide insights as to how similar results can be obtained
for other universal cycles including cut-down de Bruijn sequences and
orientable sequences.
| [
{
"version": "v1",
"created": "Wed, 23 Aug 2023 19:58:46 GMT"
},
{
"version": "v2",
"created": "Sun, 26 Nov 2023 01:09:47 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Jul 2024 19:27:04 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Sawada",
"J.",
""
],
[
"Sears",
"J.",
""
],
[
"Trautrim",
"A.",
""
],
[
"Williams",
"A.",
""
]
] |
2308.13267 | Nilakantha Meher | Nilakantha Meher, Eilon Poem, Tom\'a\v{s} Opatrn\'y, Ofer Firstenberg,
Gershon Kurizki | Supersensitive phase estimation by thermal light in a Kerr-nonlinear
interferometric setup | Accepted for publication in Phys. Rev. A | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | Estimation of the phase delay between interferometer arms is the core of
transmission phase microscopy. Such phase estimation may exhibit an error below
the standard quantum (shot-noise) limit, if the input is an entangled two-mode
state, e.g., a N00N state. We show, by contrast, that such supersensitive phase
estimation (SSPE) is achievable by \textit{incoherent}, e.g., \textit{thermal},
light that is injected into a Mach-Zehnder interferometer via a Kerr-nonlinear
two-mode coupler. Phase error is shown to be reduced below $1/\bar{n}$,
$\bar{n}$ being the mean photon number, by thermal input in such
interferometric setups, even for small nonlinear phase-shifts per photon pair
or for significant photon loss. Remarkably, the phase accuracy achievable in
such setups by thermal input surpasses that of coherent light with the same
$\bar{n}$. Available mode couplers with giant Kerr nonlinearity that stems
either from dipole-dipole interactions of Rydberg polaritons in a cold atomic
gas, or from cavity-enhanced dispersive atom-field interactions, may exploit
such effects to substantially advance interferometric phase microscopy using
incoherent, faint light sources.
| [
{
"version": "v1",
"created": "Fri, 25 Aug 2023 09:38:40 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 13:23:58 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Meher",
"Nilakantha",
""
],
[
"Poem",
"Eilon",
""
],
[
"Opatrný",
"Tomáš",
""
],
[
"Firstenberg",
"Ofer",
""
],
[
"Kurizki",
"Gershon",
""
]
] |
2308.13482 | Robert Lipshitz | Robert Lipshitz, Lenhard Ng | Torsion in linearized contact homology for Legendrian knots | 19 pages, 7 figures. V2: minor revisions; accepted for publication in
Michigan Math. J | null | null | null | math.SG math.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present examples of Legendrian knots in $\mathbb{R}^3$ that have
linearized Legendrian contact homology over $\mathbb{Z}$ containing torsion. As
a consequence, we show that there exist augmentations of Legendrian knots over
$\mathbb{Z}$ that are not induced by exact Lagrangian fillings, even though
their mod $2$ reductions are.
| [
{
"version": "v1",
"created": "Fri, 25 Aug 2023 16:41:41 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 02:36:15 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Lipshitz",
"Robert",
""
],
[
"Ng",
"Lenhard",
""
]
] |
2308.13698 | Ayman Shehata | Ghazi S. Khammash, Shimaa I. Moustafa, Shahid Mubeen, Saralees
Nadarajah, and Ayman Shehata | On the fractional integrals and derivatives of Bateman's matrix
polynomials | null | null | null | null | math.GM | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The object of this paper is to investigate the certain results involving
Bateman's matrix polynomials for integral index. We obtain some properties,
integral representation and recurrence relations for hypergeometric matrix
function. We introduce some matrix differential equations of the three order,
integral transform and fractional integral formulas for hypergeometric matrix
function by using the beta and Laplace transforms formula, Erdelyi Kober type
fractional integral operators
| [
{
"version": "v1",
"created": "Fri, 25 Aug 2023 22:59:13 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 16:38:43 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Khammash",
"Ghazi S.",
""
],
[
"Moustafa",
"Shimaa I.",
""
],
[
"Mubeen",
"Shahid",
""
],
[
"Nadarajah",
"Saralees",
""
],
[
"Shehata",
"Ayman",
""
]
] |
2308.13747 | Ikemefuna Agbanusi | Ikemefuna Agbanusi | On the Smoothness of Zero-Extensions | 13 pages. Major revisions to the Introduction and general exposition.
The Besov Spaces results are new | null | null | null | math.CA | http://creativecommons.org/licenses/by-nc-sa/4.0/ | This note investigates the regularity of zero-extensions of $L^p$ functions
from bounded domains. Simple examples show the possibility of a loss in
smoothness and our goal is to quantify this loss more generally.
For the unit cube $\mathcal{Q}=[0,1]^d$, one of our main results is a bound
for the $L^p$ modulus of continuity of zero-extensions. Using this, we prove
that nonconstant functions in the Besov space $B^\alpha_{p,q}(\mathcal{Q})$
have zero-extensions in $B^\beta_{p,r}(\mathbb{R}^d)$ with
$\beta=\frac\alpha{\alpha p+1}$ and $r=q(1+\alpha p)$. This seems to be new
when $\frac1p\leq\alpha<1$. The key idea behind the main estimate is to use
piecewise constant approximation on dyadic subcubes. This technique can likely
be sharpened, even for the unit cube, and extended to less regular domains.
| [
{
"version": "v1",
"created": "Sat, 26 Aug 2023 03:13:16 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 00:54:34 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Agbanusi",
"Ikemefuna",
""
]
] |
2308.16723 | Victor Valad\~ao | V.J. Valad\~ao | Circulation Statistics in Homogeneous and Isotropic Turbulence | Ph.D. Thesis - final version | null | null | null | physics.flu-dyn | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This is the final version of a Thesis presented to the PostGrad Program in
Physics of the Physics Institute of the Federal University of Rio de Janeiro
(UFRJ), as a necessary requirement for the title of Ph.D. in Science (Physics).
The development of the Vortex Gas Model (VGM) introduces a novel statistical
framework for describing the characteristics of velocity circulation. In this
model, the underlying foundations rely on the statistical attributes of two
fundamental constituents. The first is a GMC field that governs intermittent
behavior and the second constituent is a Gaussian Free field responsible for
the partial polarization of the vortices in the gas. The model is revisited in
a more sophisticated language, where volume exclusion among vortices is
addressed. These additions were subsequently validated through numerical
simulations of turbulent Navier-Stokes equations. This revised approach
harmonizes with the multifractal characteristics exhibited by circulation
statistics, offering a compelling elucidation for the phenomenon of
linearization of the statistical circulation moments, observed in recent
numerical simulation.
In the end, a field theoretical approach, known as
Martin-Siggia-Rose-Janssen-de Dominicis (MSRJD) functional method is carried
out in the context of circulation probability density function. This approach
delves into the realm of extreme circulation events, often referred to as
Instantons, through two distinct methodologies: The First investigates the
linear solutions and, by a renormalization group argument a time-rescaling
symmetry is discussed. Secondly, a numerical strategy is implemented to tackle
the nonlinear instanton equations in the axisymmetric approximation. This
approach addresses the typical topology exhibited by the velocity field
associated with extreme circulation events.
| [
{
"version": "v1",
"created": "Thu, 31 Aug 2023 13:40:04 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Oct 2023 14:55:26 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 07:23:02 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Valadão",
"V. J.",
""
]
] |
2309.00616 | Zhening Huang | Zhening Huang, Xiaoyang Wu, Xi Chen, Hengshuang Zhao, Lei Zhu, Joan
Lasenby | OpenIns3D: Snap and Lookup for 3D Open-vocabulary Instance Segmentation | ECCV 2024. Project page: https://zheninghuang.github.io/OpenIns3D/ | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we introduce OpenIns3D, a new 3D-input-only framework for 3D
open-vocabulary scene understanding. The OpenIns3D framework employs a
"Mask-Snap-Lookup" scheme. The "Mask" module learns class-agnostic mask
proposals in 3D point clouds, the "Snap" module generates synthetic scene-level
images at multiple scales and leverages 2D vision-language models to extract
interesting objects, and the "Lookup" module searches through the outcomes of
"Snap" to assign category names to the proposed masks. This approach, yet
simple, achieves state-of-the-art performance across a wide range of 3D
open-vocabulary tasks, including recognition, object detection, and instance
segmentation, on both indoor and outdoor datasets. Moreover, OpenIns3D
facilitates effortless switching between different 2D detectors without
requiring retraining. When integrated with powerful 2D open-world models, it
achieves excellent results in scene understanding tasks. Furthermore, when
combined with LLM-powered 2D models, OpenIns3D exhibits an impressive
capability to comprehend and process highly complex text queries that demand
intricate reasoning and real-world knowledge. Project page:
https://zheninghuang.github.io/OpenIns3D/
| [
{
"version": "v1",
"created": "Fri, 1 Sep 2023 17:59:56 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Sep 2023 17:59:54 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Oct 2023 15:15:58 GMT"
},
{
"version": "v4",
"created": "Wed, 17 Jul 2024 15:05:38 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Huang",
"Zhening",
""
],
[
"Wu",
"Xiaoyang",
""
],
[
"Chen",
"Xi",
""
],
[
"Zhao",
"Hengshuang",
""
],
[
"Zhu",
"Lei",
""
],
[
"Lasenby",
"Joan",
""
]
] |
2309.01238 | Filippos Tzortzoglou | Filippos N. Tzortzoglou, Dionysios Theodosis, Aditya Dave, Andreas
Malikopoulos | Performance-Sensitive Potential Functions for Efficient Flow of
Connected and Automated Vehicles | null | 2024 American Control Conference (ACC) | null | null | eess.SY cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Connected and automated vehicles (CAVs) provide the most intriguing
opportunity for enabling users to monitor transportation network conditions and
make better decisions for improving safety and transportation efficiency. In
this paper, we address the problem of effectively coordinating CAVs on
lane-based roadways. Our approach utilizes potential functions to generate
repulsive forces between CAVs that ensure collision avoidance. However, such
potential functions can lead to unrealistic acceleration profiles and large
inter-vehicle distances. The primary contribution of this work is the
introduction of performance-sensitive potential functions to address these
challenges. In our approach, the parameters of a potential function are
determined through an optimization problem aiming to reduce both acceleration
and inter-vehicle distances. To circumvent the computational implications due
to the complexity of the resulting optimization problem that prevents the
derivation of a real-time solution, we train a neural network model to learn
the mapping of initial conditions to optimal parameters derived offline. Then,
we prove sufficient criteria for the sampled-data model to ensure that the
neural network output does not activate any of the state and safety
constraints. Finally, we provide simulation results to demonstrate the
effectiveness of the proposed approach.
| [
{
"version": "v1",
"created": "Sun, 3 Sep 2023 18:11:54 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Tzortzoglou",
"Filippos N.",
""
],
[
"Theodosis",
"Dionysios",
""
],
[
"Dave",
"Aditya",
""
],
[
"Malikopoulos",
"Andreas",
""
]
] |
2309.02961 | Ilayda Yaman | Ilayda Yaman, Guoda Tian, Erik Tegler, Jens Gulin, Nikhil Challa,
Fredrik Tufvesson, Ove Edfors, Kalle Astrom, Steffen Malkowsky, Liang Liu | LuViRA Dataset Validation and Discussion: Comparing Vision, Radio, and
Audio Sensors for Indoor Localization | 10 pages, 11 figures | IEEE Journal of Indoor and Seamless Positioning and Navigation
(2024) 1-11 | 10.1109/JISPIN.2024.3429110 | null | eess.SP cs.CV cs.SD eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a unique comparative analysis, and evaluation of vision, radio,
and audio based localization algorithms. We create the first baseline for the
aforementioned sensors using the recently published Lund University Vision,
Radio, and Audio (LuViRA) dataset, where all the sensors are synchronized and
measured in the same environment. Some of the challenges of using each specific
sensor for indoor localization tasks are highlighted. Each sensor is paired
with a current state-of-the-art localization algorithm and evaluated for
different aspects: localization accuracy, reliability and sensitivity to
environment changes, calibration requirements, and potential system complexity.
Specifically, the evaluation covers the ORB-SLAM3 algorithm for vision-based
localization with an RGB-D camera, a machine-learning algorithm for radio-based
localization with massive MIMO technology, and the SFS2 algorithm for
audio-based localization with distributed microphones. The results can serve as
a guideline and basis for further development of robust and high-precision
multi-sensory localization systems, e.g., through sensor fusion, context, and
environment-aware adaptation.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2023 12:57:00 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Apr 2024 08:54:21 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Yaman",
"Ilayda",
""
],
[
"Tian",
"Guoda",
""
],
[
"Tegler",
"Erik",
""
],
[
"Gulin",
"Jens",
""
],
[
"Challa",
"Nikhil",
""
],
[
"Tufvesson",
"Fredrik",
""
],
[
"Edfors",
"Ove",
""
],
[
"Astrom",
"Kalle",
""
],
[
"Malkowsky",
"Steffen",
""
],
[
"Liu",
"Liang",
""
]
] |
2309.03225 | Yewen Pu | Yewen Pu, Saujas Vaduguru, Priyan Vaithilingam, Elena Glassman, Daniel
Fried | Amortizing Pragmatic Program Synthesis with Rankings | I accidentally submitted a new version of this (arXiv:2407.02499)
instead of replacing this one, so I'll take this one out as it is out-dated | null | null | null | cs.PL cs.AI | http://creativecommons.org/licenses/by/4.0/ | In program synthesis, an intelligent system takes in a set of user-generated
examples and returns a program that is logically consistent with these
examples. The usage of Rational Speech Acts (RSA) framework has been successful
in building \emph{pragmatic} program synthesizers that return programs which --
in addition to being logically consistent -- account for the fact that a user
chooses their examples informatively. However, the computational burden of
running the RSA algorithm has restricted the application of pragmatic program
synthesis to domains with a small number of possible programs. This work
presents a novel method of amortizing the RSA algorithm by leveraging a
\emph{global pragmatic ranking} -- a single, total ordering of all the
hypotheses. We prove that for a pragmatic synthesizer that uses a single
demonstration, our global ranking method exactly replicates RSA's ranked
responses. We further empirically show that global rankings effectively
approximate the full pragmatic synthesizer in an online, multi-demonstration
setting. Experiments on two program synthesis domains using our pragmatic
ranking method resulted in orders of magnitudes of speed ups compared to the
RSA synthesizer, while outperforming the standard, non-pragmatic synthesizer.
| [
{
"version": "v1",
"created": "Fri, 1 Sep 2023 20:12:01 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jul 2024 20:55:15 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Pu",
"Yewen",
""
],
[
"Vaduguru",
"Saujas",
""
],
[
"Vaithilingam",
"Priyan",
""
],
[
"Glassman",
"Elena",
""
],
[
"Fried",
"Daniel",
""
]
] |
2309.03244 | Nikolai K\"orber | Nikolai K\"orber, Eduard Kromer, Andreas Siebert, Sascha Hauke, Daniel
Mueller-Gritschneder, Bj\"orn Schuller | EGIC: Enhanced Low-Bit-Rate Generative Image Compression Guided by
Semantic Segmentation | ECCV 2024 Camera Ready | null | null | null | eess.IV cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce EGIC, an enhanced generative image compression method that
allows traversing the distortion-perception curve efficiently from a single
model. EGIC is based on two novel building blocks: i) OASIS-C, a conditional
pre-trained semantic segmentation-guided discriminator, which provides both
spatially and semantically-aware gradient feedback to the generator,
conditioned on the latent image distribution, and ii) Output Residual
Prediction (ORP), a retrofit solution for multi-realism image compression that
allows control over the synthesis process by adjusting the impact of the
residual between an MSE-optimized and GAN-optimized decoder output on the
GAN-based reconstruction. Together, EGIC forms a powerful codec, outperforming
state-of-the-art diffusion and GAN-based methods (e.g., HiFiC, MS-ILLM, and
DIRAC-100), while performing almost on par with VTM-20.0 on the distortion end.
EGIC is simple to implement, very lightweight, and provides excellent
interpolation characteristics, which makes it a promising candidate for
practical applications targeting the low bit range.
| [
{
"version": "v1",
"created": "Wed, 6 Sep 2023 08:50:04 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Mar 2024 13:08:20 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Jul 2024 12:34:05 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Körber",
"Nikolai",
""
],
[
"Kromer",
"Eduard",
""
],
[
"Siebert",
"Andreas",
""
],
[
"Hauke",
"Sascha",
""
],
[
"Mueller-Gritschneder",
"Daniel",
""
],
[
"Schuller",
"Björn",
""
]
] |
2309.03981 | Heeseung Bang | Heeseung Bang, Aditya Dave, Andreas A. Malikopoulos | Routing in Mixed Transportation Systems for Mobility Equity | 6 pages, 5 figures | Proceedings of 2024 American Control Conference (ACC), Toronto,
Canada, 2024 | null | null | eess.SY cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This letter proposes a routing framework in mixed transportation systems for
improving mobility equity. We present a strategic routing game that governs
interactions between compliant and noncompliant vehicles, where noncompliant
vehicles are modeled with cognitive hierarchy theory. Then, we introduce a
mobility equity metric (MEM) to quantify the accessibility and fairness in the
transportation network. We integrate the MEM into the routing framework to
optimize it with adjustable weights for different transportation modes. The
proposed approach bridges the gap between technological advancements and
societal goals in mixed transportation systems to enhance efficiency and
equity. We provide numerical examples and analysis of the results.
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2023 19:27:15 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Bang",
"Heeseung",
""
],
[
"Dave",
"Aditya",
""
],
[
"Malikopoulos",
"Andreas A.",
""
]
] |
2309.05641 | Yichen Huang | Yichen Huang | Long-time properties of generic Floquet systems are approximately
periodic with the driving period | v2: published version | New Journal of Physics 26 (7), 072001 (Fast Track Communication),
2024 | 10.1088/1367-2630/ad5eb1 | null | quant-ph cond-mat.dis-nn cond-mat.stat-mech cond-mat.str-el math-ph math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A Floquet quantum system is governed by a Hamiltonian that is periodic in
time. Consider the space of piecewise time-independent Floquet systems with
(geometrically) local interactions. We prove that for all but a measure zero
set of systems in this space, starting from a random product state, many
properties (including expectation values of observables and the entanglement
entropy of a macroscopically large subsystem) at long times are approximately
periodic with the same period as the Hamiltonian. Thus, in almost every Floquet
system of arbitrarily large but finite size, discrete time-crystalline behavior
does not persist to strictly infinite time.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2023 17:30:59 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 13:11:00 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Huang",
"Yichen",
""
]
] |
2309.06519 | Ioannis Faros | Ioannis Faros and Aditya Dave and Andreas A. Malikopoulos | A Q-learning Approach for Adherence-Aware Recommendations | null | IEEE Control Systems Letters (L-CSS), Vol 7, 2023 | 10.1109/LCSYS.2023.3339591 | null | cs.LG cs.SY eess.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In many real-world scenarios involving high-stakes and safety implications, a
human decision-maker (HDM) may receive recommendations from an artificial
intelligence while holding the ultimate responsibility of making decisions. In
this letter, we develop an "adherence-aware Q-learning" algorithm to address
this problem. The algorithm learns the "adherence level" that captures the
frequency with which an HDM follows the recommended actions and derives the
best recommendation policy in real time. We prove the convergence of the
proposed Q-learning algorithm to the optimal value and evaluate its performance
across various scenarios.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2023 18:50:24 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Faros",
"Ioannis",
""
],
[
"Dave",
"Aditya",
""
],
[
"Malikopoulos",
"Andreas A.",
""
]
] |
2309.06785 | Menachem Shlossberg | Michael Megrelishvili and Menachem Shlossberg | Key subgroups in topological groups | 24 pages | null | null | null | math.GN math.GR | http://creativecommons.org/licenses/by/4.0/ | We introduce two minimality properties of subgroups in topological groups. A
subgroup $H$ is a key subgroup (co-key subgroup) of a topological group $G$ if
there is no strictly coarser Hausdorff group topology on $G$ which induces on
$H$ (resp., on the coset space $G/H$) the original topology. Every co-minimal
subgroup is a key subgroup while the converse is not true. Every locally
compact co-compact subgroup is a key subgroup (but not always co-minimal). Any
relatively minimal subgroup is a co-key subgroup (but not vice versa).
Extending some results concerning the generalized Heisenberg groups, we prove
that the center ("corner" subgroup) of the upper unitriangular group
$\mathrm{UT(n,K)}$, defined over a commutative topological unital ring $K$, is
a key subgroup. Every "non-corner" 1-parameter subgroup $H$ of
$\mathrm{UT(n,K)}$ is a co-key subgroup. We study injectivity property of the
restriction map $$r_H \colon \mathcal{T}_{\downarrow}(G) \to
\mathcal{T}_{\downarrow}(H), \ \sigma \mapsto \sigma|_H$$ and show that it is
an isomorphism of sup-semilattices for every central co-minimal subgroup $H$,
where $\mathcal{T}_{\downarrow}(G)$ is the semilattice of coarser Hausdorff
group topologies on $G$.
| [
{
"version": "v1",
"created": "Wed, 13 Sep 2023 08:18:53 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Nov 2023 17:51:34 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Jul 2024 06:53:10 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Megrelishvili",
"Michael",
""
],
[
"Shlossberg",
"Menachem",
""
]
] |
2309.06979 | Eran Malach | Eran Malach | Auto-Regressive Next-Token Predictors are Universal Learners | null | null | null | null | cs.LG cs.CL | http://creativecommons.org/licenses/by/4.0/ | Large language models display remarkable capabilities in logical and
mathematical reasoning, allowing them to solve complex tasks. Interestingly,
these abilities emerge in networks trained on the simple task of next-token
prediction. In this work, we present a theoretical framework for studying
auto-regressive next-token predictors. We demonstrate that even simple models
such as linear next-token predictors, trained on Chain-of-Thought (CoT) data,
can approximate any function efficiently computed by a Turing machine. We
introduce a new complexity measure -- length complexity -- which measures the
number of intermediate tokens in a CoT sequence required to approximate some
target function, and analyze the interplay between length complexity and other
notions of complexity. Finally, we show experimentally that simple next-token
predictors, such as linear networks and shallow Multi-Layer Perceptrons (MLPs),
display non-trivial performance on text generation and arithmetic tasks. Our
results demonstrate that the power of today's LLMs can be attributed, to a
great extent, to the auto-regressive next-token training scheme, and not
necessarily to a particular choice of architecture.
| [
{
"version": "v1",
"created": "Wed, 13 Sep 2023 14:15:03 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 13:03:08 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Malach",
"Eran",
""
]
] |
2309.07262 | Thomas Fork | Thomas Fork and Francesco Borrelli | Euclidean and non-Euclidean Trajectory Optimization Approaches for
Quadrotor Racing | null | null | null | null | cs.RO cs.SY eess.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present two quadrotor raceline optimization approaches which differ in
using Euclidean or non-Euclidean geometry to describe vehicle position. Both
approaches use high-fidelity quadrotor dynamics and avoid the need to
approximate gates using waypoints. We demonstrate both approaches on simulated
racetracks with realistic vehicle parameters where we demonstrate 100x faster
compute time than comparable published methods and improved solver convergence.
We then extend the non-Euclidean approach to compute racelines in the presence
of numerous static obstacles.
| [
{
"version": "v1",
"created": "Wed, 13 Sep 2023 18:53:47 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2024 18:24:22 GMT"
}
] | "2024-07-18T00:00:00" | [
[
"Fork",
"Thomas",
""
],
[
"Borrelli",
"Francesco",
""
]
] |