id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
479
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
unknown | authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2406.02372 | Richard Szabo | Djordje Bogdanovi\'c, Marija Dimitrijevi\'c \'Ciri\'c, Voja
Radovanovi\'c, Richard J. Szabo, Guillaume Trojani | Braided scalar quantum field theory | 41 pages; v2: typos corrected; v3: minor changes and typos fixed | null | null | null | hep-th math-ph math.MP math.QA | http://creativecommons.org/licenses/by/4.0/ | We formulate scalar field theories in a curved braided $L_\infty$-algebra
formalism and analyse their correlation functions using Batalin-Vilkovisky
quantization. We perform detailed calculations in cubic braided scalar field
theory up to two-loop order and three-point multiplicity. The divergent tadpole
contributions are eliminated by a suitable choice of central curvature for the
$L_\infty$-structure, and we confirm the absence of UV/IR mixing. The
calculations of higher loop and higher multiplicity correlators in homological
perturbation theory are facilitated by the introduction of a novel diagrammatic
calculus. We derive an algebraic version of the Schwinger-Dyson equations based
on the homological perturbation lemma, and use them to prove the braided Wick
theorem.
| [
{
"version": "v1",
"created": "Tue, 4 Jun 2024 14:49:59 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Jun 2024 06:55:37 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Jun 2024 16:15:43 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Bogdanović",
"Djordje",
""
],
[
"Ćirić",
"Marija Dimitrijević",
""
],
[
"Radovanović",
"Voja",
""
],
[
"Szabo",
"Richard J.",
""
],
[
"Trojani",
"Guillaume",
""
]
] |
2406.02466 | Katy Clough Dr | Katy Clough, Tim Dietrich and Sebastian Khan | What no one has seen before: gravitational waveforms from warp drive
collapse | 12 pages, 6 figures, plus appendix. Comments welcome! | null | null | null | gr-qc astro-ph.HE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite originating in science fiction, warp drives have a concrete
description in general relativity, with Alcubierre first proposing a spacetime
metric that supported faster-than-light travel. Whilst there are numerous
practical barriers to their implementation in real life, including a
requirement for negative energy, computationally, one can simulate their
evolution in time given an equation of state describing the matter. In this
work, we study the signatures arising from a warp drive "containment failure",
assuming a stiff equation of state for the fluid. We compute the emitted
gravitational-wave signal and track the energy fluxes of the fluid. Apart from
its rather speculative application to the search for extraterrestrial life in
gravitational-wave detector data, this work is interesting as a study of the
dynamical evolution and stability of spacetimes that violate the null energy
condition. Our work highlights the importance of exploring strange new
spacetimes, to (boldly) simulate what no one has seen before.
| [
{
"version": "v1",
"created": "Tue, 4 Jun 2024 16:34:41 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Clough",
"Katy",
""
],
[
"Dietrich",
"Tim",
""
],
[
"Khan",
"Sebastian",
""
]
] |
2406.02635 | Peiliang Gong | Mohamed Ragab, Peiliang Gong, Emadeldeen Eldele, Wenyu Zhang, Min Wu,
Chuan-Sheng Foo, Daoqiang Zhang, Xiaoli Li, Zhenghua Chen | Evidentially Calibrated Source-Free Time-Series Domain Adaptation with
Temporal Imputation | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Source-free domain adaptation (SFDA) aims to adapt a model pre-trained on a
labeled source domain to an unlabeled target domain without access to source
data, preserving the source domain's privacy. While SFDA is prevalent in
computer vision, it remains largely unexplored in time series analysis.
Existing SFDA methods, designed for visual data, struggle to capture the
inherent temporal dynamics of time series, hindering adaptation performance.
This paper proposes MAsk And imPUte (MAPU), a novel and effective approach for
time series SFDA. MAPU addresses the critical challenge of temporal consistency
by introducing a novel temporal imputation task. This task involves randomly
masking time series signals and leveraging a dedicated temporal imputer to
recover the original signal within the learned embedding space, bypassing the
complexities of noisy raw data. Notably, MAPU is the first method to explicitly
address temporal consistency in the context of time series SFDA. Additionally,
it offers seamless integration with existing SFDA methods, providing greater
flexibility. We further introduce E-MAPU, which incorporates evidential
uncertainty estimation to address the overconfidence issue inherent in softmax
predictions. To achieve that, we leverage evidential deep learning to obtain a
better-calibrated pre-trained model and adapt the target encoder to map
out-of-support target samples to a new feature representation closer to the
source domain's support. This fosters better alignment, ultimately enhancing
adaptation performance. Extensive experiments on five real-world time series
datasets demonstrate that both MAPU and E-MAPU achieve significant performance
gains compared to existing methods. These results highlight the effectiveness
of our proposed approaches for tackling various time series domain adaptation
problems.
| [
{
"version": "v1",
"created": "Tue, 4 Jun 2024 05:36:29 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 03:08:23 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Ragab",
"Mohamed",
""
],
[
"Gong",
"Peiliang",
""
],
[
"Eldele",
"Emadeldeen",
""
],
[
"Zhang",
"Wenyu",
""
],
[
"Wu",
"Min",
""
],
[
"Foo",
"Chuan-Sheng",
""
],
[
"Zhang",
"Daoqiang",
""
],
[
"Li",
"Xiaoli",
""
],
[
"Chen",
"Zhenghua",
""
]
] |
2406.02699 | Scott H. Hawley | Scott H. Hawley and Austin R. Tackett | Operational Latent Spaces | 7 pages, 6 figures. Accepted to AES International Symposium on AI and
the Musician | null | null | null | cs.LG cs.SD eess.AS | http://creativecommons.org/licenses/by/4.0/ | We investigate the construction of latent spaces through self-supervised
learning to support semantically meaningful operations. Analogous to
operational amplifiers, these "operational latent spaces" (OpLaS) not only
demonstrate semantic structure such as clustering but also support common
transformational operations with inherent semantic meaning. Some operational
latent spaces are found to have arisen "unintentionally" in the progress toward
some (other) self-supervised learning objective, in which unintended but still
useful properties are discovered among the relationships of points in the
space. Other spaces may be constructed "intentionally" by developers
stipulating certain kinds of clustering or transformations intended to produce
the desired structure. We focus on the intentional creation of operational
latent spaces via self-supervised learning, including the introduction of
rotation operators via a novel "FiLMR" layer, which can be used to enable
ring-like symmetries found in some musical constructions.
| [
{
"version": "v1",
"created": "Tue, 4 Jun 2024 18:25:15 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Hawley",
"Scott H.",
""
],
[
"Tackett",
"Austin R.",
""
]
] |
2406.02713 | Juxin Yang | Juxin Yang and Jie Wu | On rectangular Toda brackets and Oda's extension problems | There are native errors on the def. of my rectangular Toda brackets | null | null | null | math.AT | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper tackles \textit{N. Oda}'s extension problems for the homotopy
groups $\pi_{39}(S^{6})$, $\pi_{40}(S^{7})$, and $\pi_{41}(S^{8})$ localized at
2, the issues having eluded resolution for more than four decades. We introduce
a tool for the theory of determinations of unstable homotopy groups, namely,
the rectangular Toda bracket, by which we are able to solve the extension
problems with respect to these three homotopy groups.
| [
{
"version": "v1",
"created": "Tue, 4 Jun 2024 18:57:18 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jun 2024 20:01:39 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Yang",
"Juxin",
""
],
[
"Wu",
"Jie",
""
]
] |
2406.02795 | Priya Pitre | Priya Pitre, Kurt Luther | ArguMentor: Augmenting User Experiences with Counter-Perspectives | null | null | null | null | cs.HC cs.CL | http://creativecommons.org/licenses/by/4.0/ | Opinion pieces (or op-eds) can provide valuable perspectives, but they often
represent only one side of a story, which can make readers susceptible to
confirmation bias and echo chambers. Exposure to different perspectives can
help readers overcome these obstacles and form more robust, nuanced views on
important societal issues. We designed ArguMentor, a human-AI collaboration
system that highlights claims in opinion pieces, identifies counter-arguments
for them using a LLM, and generates a context-based summary of based on current
events. It further enhances user understanding through additional features like
a Q&A bot (that answers user questions pertaining to the text), DebateMe (an
agent that users can argue any side of the piece with) and highlighting (where
users can highlight a word or passage to get its definition or context). Our
evaluation shows that participants can generate more arguments and
counter-arguments and have, on average, have more moderate views after engaging
with the system.
| [
{
"version": "v1",
"created": "Tue, 4 Jun 2024 21:43:56 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 12:33:58 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Pitre",
"Priya",
""
],
[
"Luther",
"Kurt",
""
]
] |
2406.02856 | Grey Wang | Yichuan Wang, Yang Liu, Yu Yan, Qun Wang, Shulei Wu, Xucheng Huang,
Ling Jiang | Xmodel-LM Technical Report | null | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce Xmodel-LM, a compact and efficient 1.1B language model
pre-trained on around 2 trillion tokens. Trained on our self-built dataset
(Xdata), which balances Chinese and English corpora based on downstream task
optimization, Xmodel-LM exhibits remarkable performance despite its smaller
size. It notably surpasses existing open-source language models of similar
scale. Our model checkpoints and code are publicly accessible on GitHub at
https://github.com/XiaoduoAILab/XmodelLM.
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2024 02:12:06 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jun 2024 06:12:41 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Jun 2024 08:35:47 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Wang",
"Yichuan",
""
],
[
"Liu",
"Yang",
""
],
[
"Yan",
"Yu",
""
],
[
"Wang",
"Qun",
""
],
[
"Wu",
"Shulei",
""
],
[
"Huang",
"Xucheng",
""
],
[
"Jiang",
"Ling",
""
]
] |
2406.02944 | Mrinal Kumar Das | Ankita Kakoti, Happy Borgohain and Mrinal Kumar Das | Texture Zeros in modular Left-Right Symmetric Model | 23 figures, 8 tables. arXiv admin note: text overlap with
arXiv:2312.00822 | null | null | null | hep-ph | http://creativecommons.org/licenses/by/4.0/ | Texture zeros play a crucial role in the phenomenological implementation of a
particular model in the Beyond Standard Model framework. As such, in this work
we study the possibility concerning the origin of texture zero in the neutrino
mass matrix in the context of modular Left-Right Symmetric Model.
Implementation of texture zeros in the light neutrino mass matrix brings forth
the existence of allowed and disallowed classes of the texture zero
classification. In the present work, we have studied Neutrinoless Double-Beta
Decay, Lepton flavor violation and Resonant Leptogenesis and tried to analyze
if the simultaneous study of these three phenomenology are connected with a
common parameter space within the model. We have determined the possible
combinations of 1-0 and 2-0 textures in the context of resulting light neutrino
mass matrix and illustrated the allowed classes for both textures corresponding
to the realization of neutrinoless double beta decay, leptogenesis and lepton
flavor violation. The study has been carried out for both normal and inverted
hierarchy and the results have been illustrated in the present work.
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2024 05:06:07 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 07:33:16 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Kakoti",
"Ankita",
""
],
[
"Borgohain",
"Happy",
""
],
[
"Das",
"Mrinal Kumar",
""
]
] |
2406.02945 | Illya Plotnikov | Illya Plotnikov, Allard Jan van Marle, Claire Gu\'epin, Alexandre
Marcowith and Pierrick Martin | Kinetic simulations of electron-positron induced streaming instability
in the context of gamma-ray halos around pulsars | 14 pages, 9 figures + appendices. Accepted for publication in A&A | null | null | null | astro-ph.HE astro-ph.SR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The possibility of slow diffusion regions as the origin for extended TeV
emission halos around some pulsars (such as PSR J0633+1746 and PSR B0656+14)
challenges the standard scaling of the electron diffusion coefficient in the
interstellar medium. Self-generated turbulence by electron-positron pairs
streaming out of the pulsar wind nebula was proposed as a possible mechanism to
produce the enhanced turbulence required to explain the morphology and
brightness of these TeV halos. We perform fully kinetic 1D3V particle-in-cell
simulations of this instability, considering the case where streaming electrons
and positrons have the same density. This implies purely resonant instability
as the beam does not carry any current. We compare the linear phase of the
instability with analytical theory and find very reasonable agreement. The
non-linear phase of the instability is also studied, which reveals that the
intensity of saturated waves is consistent with a momentum exchange criterion
between a decelerating beam and growing magnetic waves. With the adopted
parameters, the instability-driven wavemodes cover both the Alfv\'enic (fluid)
and kinetic scales. The spectrum of the produced waves is non-symmetric, with
left-handed circular polarisation waves being strongly damped when entering the
ion-cyclotron branch, while right-handed waves are suppressed at smaller
wavelength when entering the Whistler branch. The low-wavenumber part of the
spectrum remains symmetric when in the Alfv\'enic branch. As a result,
positrons behave dynamically differently compared to electrons. We also
observed a second harmonic plasma emission in the wave spectrum. An MHD-PIC
approach is warranted to probe hotter beams and investigate the Alfv\'en branch
physics. This work confirms that the self-confinement scenario develops
essentially according to analytical expectations [...](abridged)
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2024 05:08:57 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 09:08:04 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Plotnikov",
"Illya",
""
],
[
"van Marle",
"Allard Jan",
""
],
[
"Guépin",
"Claire",
""
],
[
"Marcowith",
"Alexandre",
""
],
[
"Martin",
"Pierrick",
""
]
] |
2406.03020 | Frank Kowol | Frank Kowol | Analytically exact solution of the Schrodinger equation for neutral
helium in the ground state | 35 pages, 4 figures | null | null | null | quant-ph | http://creativecommons.org/licenses/by-nc-sa/4.0/ | This report presents the analytical solution of the Schrodinger equation and
its corresponding wave function for the neutral helium or helium-like atoms in
the ground state. The state functions of the two electrons for s=0 and l=0 as
well as their boundary conditions are examined in detail. Furthermore, a method
for describing a generic electron potential consisting of Coulomb and exchange
interactions is derived, and the resulting potential function is integrated
into the Schrodinger equation as a potential term. In addition, the altered
electromagnetic coupling of the electrons due to vacuum polarization effects is
investigated and finally the Schrodinger equation for the neutral 1S0 Helium,
historically known as Para-Helium, is solved using Laplace transformations. The
energy in the ground state is then determined, and it can be shown that this
agrees with the literature values given the fact that the electron can be
assumed to be a point-like particle. In the context of these investigations, an
upper limit estimation for the spatial dimension of the electron can also be
given as well is the existence of a minimal distance of a stable bonding state
between two electrons, which can be interpreted as an entangled state; in
addition, the chemical inertness of helium with regard to chemical reactions -
i.e. the principle of the "closed" electron shell - can be made plausible by
the quantum mechanical electron configuration and its consequences with regard
to binding energy. The wave function found for the helium atom is compared with
the known solutions for the hydrogen atom, and essential differences between
the two are worked out.
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2024 07:35:00 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jun 2024 20:58:49 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Kowol",
"Frank",
""
]
] |
2406.03035 | Jingyun Xue | Jingyun Xue, Hongfa Wang, Qi Tian, Yue Ma, Andong Wang, Zhiyuan Zhao,
Shaobo Min, Wenzhe Zhao, Kaihao Zhang, Heung-Yeung Shum, Wei Liu, Mengyang
Liu, Wenhan Luo | Follow-Your-Pose v2: Multiple-Condition Guided Character Image Animation
for Stable Pose Control | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Pose-controllable character video generation is in high demand with extensive
applications for fields such as automatic advertising and content creation on
social media platforms. While existing character image animation methods using
pose sequences and reference images have shown promising performance, they tend
to struggle with incoherent animation in complex scenarios, such as multiple
character animation and body occlusion. Additionally, current methods request
large-scale high-quality videos with stable backgrounds and temporal
consistency as training datasets, otherwise, their performance will greatly
deteriorate. These two issues hinder the practical utilization of character
image animation tools. In this paper, we propose a practical and robust
framework Follow-Your-Pose v2, which can be trained on noisy open-sourced
videos readily available on the internet. Multi-condition guiders are designed
to address the challenges of background stability, body occlusion in
multi-character generation, and consistency of character appearance. Moreover,
to fill the gap of fair evaluation of multi-character pose animation, we
propose a new benchmark comprising approximately 4,000 frames. Extensive
experiments demonstrate that our approach outperforms state-of-the-art methods
by a margin of over 35% across 2 datasets and on 7 metrics. Meanwhile,
qualitative assessments reveal a significant improvement in the quality of
generated video, particularly in scenarios involving complex backgrounds and
body occlusion of multi-character, suggesting the superiority of our approach.
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2024 08:03:18 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jun 2024 02:38:23 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Jun 2024 01:17:18 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Xue",
"Jingyun",
""
],
[
"Wang",
"Hongfa",
""
],
[
"Tian",
"Qi",
""
],
[
"Ma",
"Yue",
""
],
[
"Wang",
"Andong",
""
],
[
"Zhao",
"Zhiyuan",
""
],
[
"Min",
"Shaobo",
""
],
[
"Zhao",
"Wenzhe",
""
],
[
"Zhang",
"Kaihao",
""
],
[
"Shum",
"Heung-Yeung",
""
],
[
"Liu",
"Wei",
""
],
[
"Liu",
"Mengyang",
""
],
[
"Luo",
"Wenhan",
""
]
] |
2406.03266 | Matthias Stuermer | Matthias Stuermer | Technological Perspective on Digital Sovereignty | 48 pages, 7 figures, written in German | null | null | null | cs.CY | http://creativecommons.org/licenses/by/4.0/ | This report for the attention of the Federal Department of Foreign Affairs
(FDFA) makes a scientific contribution in the context of postulate 22.4411
"Digital Sovereignty Strategy for Switzerland" by Councillor of States Heidi
Z'graggen. The report shows what digital sovereignty means from a technological
perspective and what activities are currently being carried out in this regard
in Switzerland and abroad. It also provides strategic directions and specific
recommendations for a future "Swiss Digital Sovereignty Strategy".
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2024 13:44:33 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jun 2024 21:33:02 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Stuermer",
"Matthias",
""
]
] |
2406.03279 | Lorenzo Boldorini | L. Boldorini and G. Montani | Effective Quantum Gravitational Collapse in a Polymer Framework | 18 pages, 13 figures, submitted to PRD. Added references | null | null | null | gr-qc hep-th | http://creativecommons.org/licenses/by/4.0/ | We study how the presence of an area gap, different than zero, affects the
gravitational collapse of a dust ball. The implementation of such discreteness
is achieved through the framework of polymer quantization, a scheme inspired by
loop quantum gravity (LQG). We study the collapse using variables which
represent the area, in order to impose the non-zero area gap condition. The
collapse is analyzed for both the flat and spherical Oppenheimer-Snyder models.
In both scenarios the formation of the singularity is avoided, due to the
inversion of the velocity at finite values of the sphere surface. This happens
due to the presence of a negative pressure, with origins at a quantum level.
When the inversion happens inside the black hole event horizon, we achieve a
geometry transition to a white hole. When the inversion happens outside the
event horizon, we find a new possible astrophysical object. A characterization
of such hypothetical object is done. Some constraints on the value for the area
gap are also imposed in order to maintain the link with our already established
physical theories.
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2024 13:54:22 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 13:24:19 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Boldorini",
"L.",
""
],
[
"Montani",
"G.",
""
]
] |
2406.03339 | Bhashithe Abeysinghe | Bhashithe Abeysinghe and Ruhan Circi | The Challenges of Evaluating LLM Applications: An Analysis of Automated,
Human, and LLM-Based Approaches | Accepted in The First Workshop on Large Language Models for
Evaluation in Information Retrieval | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Chatbots have been an interesting application of natural language generation
since its inception. With novel transformer based Generative AI methods,
building chatbots have become trivial. Chatbots which are targeted at specific
domains for example medicine and psychology are implemented rapidly. This
however, should not distract from the need to evaluate the chatbot responses.
Especially because the natural language generation community does not entirely
agree upon how to effectively evaluate such applications. With this work we
discuss the issue further with the increasingly popular LLM based evaluations
and how they correlate with human evaluations. Additionally, we introduce a
comprehensive factored evaluation mechanism that can be utilized in conjunction
with both human and LLM-based evaluations. We present the results of an
experimental evaluation conducted using this scheme in one of our chatbot
implementations which consumed educational reports, and subsequently compare
automated, traditional human evaluation, factored human evaluation, and
factored LLM evaluation. Results show that factor based evaluation produces
better insights on which aspects need to be improved in LLM applications and
further strengthens the argument to use human evaluation in critical spaces
where main functionality is not direct retrieval.
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2024 14:55:10 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 15:13:40 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Abeysinghe",
"Bhashithe",
""
],
[
"Circi",
"Ruhan",
""
]
] |
2406.03352 | Nikolina (Niko) Sarcevic | Nikolina \v{S}ar\v{c}evi\'c, C. Danielle Leonard, Markus M. Rau, LSST
Dark Energy Science Collaboration | Joint Modelling of Astrophysical Systematics for Cosmology with LSST | 19 pages, 16 figures, 3 tables; v2: added LSST DESC to arxiv author
list | null | null | null | astro-ph.CO | http://creativecommons.org/licenses/by-nc-sa/4.0/ | We present a novel framework for jointly modelling the weak lensing source
galaxy redshift distribution and the intrinsic alignment of galaxies via a
shared luminosity function (LF). Considering this framework within the context
of a Rubin Observatory's Legacy Survey of Space and Time (LSST) Year 1 and Year
10 cosmic shear analysis, we first demonstrate the substantial impact of the LF
on both source galaxy redshift distributions and the intrinsic alignment
contamination. We establish how the individual parameters of a Schechter LF
model impact the redshift distribution of a magnitude-limited sample, and we
demonstrate the effect of marginalising over the LF parameters as incorporated
in the intrinsic alignment modelling of a standard cosmic shear analysis
set-up. We forecast the impact of our joint modelling framework on cosmological
parameter constraints. Our preliminary results are promising, indicating that
this framework can yield cosmological constraints consistent with those
expected from standard analyses, enhanced by the flexibility of not fixing LF
parameters. We plan to further validate these findings with comprehensive
Markov chain Monte Carlo simulations to robustly quantify bias avoidance and
underscore the framework's efficacy. Taking advantage of our forecasting
results and the parameter degeneracies, we identify the specific impact of the
shape of the LF of source galaxies on the cosmic shear data vector. We also
discuss the potential of this method in providing a way to model generic
selection functions in redshift distribution estimation, as well as its
possibilities for extension to a 3x2pt analysis, particularly with respect to
incorporating galaxy bias in this luminosity-function-based framework. Although
we consider the context of LSST cosmic shear in this work, the proposed joint
modelling framework is generically applicable to weak lensing surveys.
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2024 15:09:20 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jun 2024 23:38:37 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Šarčević",
"Nikolina",
""
],
[
"Leonard",
"C. Danielle",
""
],
[
"Rau",
"Markus M.",
""
],
[
"Collaboration",
"LSST Dark Energy Science",
""
]
] |
2406.03471 | Alan Dow | Alan Dow | Non-trivial copies of N* | null | null | null | null | math.GN math.LO | http://creativecommons.org/licenses/by/4.0/ | We show that it is consistent to have regular closed non-clopen copies of
$\mathbb N^*$ within $\mathbb N^*$ and a non-trivial self-map of $\mathbb N^*$
even if all autohomeomorphisms of $\mathbb N^*$ are trivial.
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2024 17:24:59 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Dow",
"Alan",
""
]
] |
2406.03589 | Samuel Pfrommer | Samuel Pfrommer, Yatong Bai, Tanmay Gautam, Somayeh Sojoudi | Ranking Manipulation for Conversational Search Engines | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Major search engine providers are rapidly incorporating Large Language Model
(LLM)-generated content in response to user queries. These conversational
search engines operate by loading retrieved website text into the LLM context
for summarization and interpretation. Recent research demonstrates that LLMs
are highly vulnerable to jailbreaking and prompt injection attacks, which
disrupt the safety and quality goals of LLMs using adversarial strings. This
work investigates the impact of prompt injections on the ranking order of
sources referenced by conversational search engines. To this end, we introduce
a focused dataset of real-world consumer product websites and formalize
conversational search ranking as an adversarial problem. Experimentally, we
analyze conversational search rankings in the absence of adversarial injections
and show that different LLMs vary significantly in prioritizing product name,
document content, and context position. We then present a tree-of-attacks-based
jailbreaking technique which reliably promotes low-ranked products.
Importantly, these attacks transfer effectively to state-of-the-art
conversational search engines such as perplexity.ai. Given the strong financial
incentive for website owners to boost their search ranking, we argue that our
problem formulation is of critical importance for future robustness work.
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2024 19:14:21 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 01:12:56 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Pfrommer",
"Samuel",
""
],
[
"Bai",
"Yatong",
""
],
[
"Gautam",
"Tanmay",
""
],
[
"Sojoudi",
"Somayeh",
""
]
] |
2406.03641 | Tianyang Pan | Tianyang Pan, Rahul Shome, Lydia E. Kavraki | Task and Motion Planning for Execution in the Real | 15 pages, 14 figures, 2 tables, accepted by IEEE Transactions on
Robotics | null | null | null | cs.RO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Task and motion planning represents a powerful set of hybrid planning methods
that combine reasoning over discrete task domains and continuous motion
generation. Traditional reasoning necessitates task domain models and enough
information to ground actions to motion planning queries. Gaps in this
knowledge often arise from sources like occlusion or imprecise modeling. This
work generates task and motion plans that include actions cannot be fully
grounded at planning time. During execution, such an action is handled by a
provided human-designed or learned closed-loop behavior. Execution combines
offline planned motions and online behaviors till reaching the task goal.
Failures of behaviors are fed back as constraints to find new plans. Forty
real-robot trials and motivating demonstrations are performed to evaluate the
proposed framework and compare against state-of-the-art. Results show faster
execution time, less number of actions, and more success in problems where
diverse gaps arise. The experiment data is shared for researchers to simulate
these settings. The work shows promise in expanding the applicable class of
realistic partially grounded problems that robots can address.
| [
{
"version": "v1",
"created": "Wed, 5 Jun 2024 22:30:40 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 16:05:27 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Pan",
"Tianyang",
""
],
[
"Shome",
"Rahul",
""
],
[
"Kavraki",
"Lydia E.",
""
]
] |
2406.03679 | Wei Li | Wei Li, William Bishop, Alice Li, Chris Rawles, Folawiyo
Campbell-Ajala, Divya Tyamagundlu, Oriana Riva | On the Effects of Data Scale on Computer Control Agents | null | null | null | null | cs.AI cs.LG | http://creativecommons.org/publicdomain/zero/1.0/ | Autonomous agents that control computer interfaces to accomplish human tasks
are emerging. Leveraging LLMs to power such agents has been of special
interest, but unless fine-tuned on human-collected task demonstrations,
performance is still relatively low. In this work we study whether fine-tuning
alone is a viable approach for building real-world computer control agents. In
particularly, we investigate how performance measured on both high and
low-level tasks in domain and out of domain scales as more training data is
collected. To this end we collect and release a new dataset, AndroidControl,
consisting of 15,283 demonstrations of everyday tasks with Android apps.
Compared to existing datasets, each AndroidControl task instance includes both
high and low-level human-generated instructions, allowing us to explore the
level of task complexity an agent can handle. Moreover, AndroidControl is the
most diverse computer control dataset to date, including 15,283 unique tasks
over 833 Android apps, thus allowing us to conduct in-depth analysis of the
model performance in and out of the domain of the training data. Using the
dataset, we find that when tested in domain fine-tuned models outperform zero
and few-shot baselines and scale in such a way that robust performance might
feasibly be obtained simply by collecting more data. Out of domain, performance
scales significantly more slowly and suggests that in particular for high-level
tasks, fine-tuning on more data alone may be insufficient for achieving robust
out-of-domain performance.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2024 01:49:29 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Jun 2024 13:19:38 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Jun 2024 13:31:05 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Li",
"Wei",
""
],
[
"Bishop",
"William",
""
],
[
"Li",
"Alice",
""
],
[
"Rawles",
"Chris",
""
],
[
"Campbell-Ajala",
"Folawiyo",
""
],
[
"Tyamagundlu",
"Divya",
""
],
[
"Riva",
"Oriana",
""
]
] |
2406.04010 | Yisheng Song | Yisheng Song | Positive definiteness of fourth order three dimensional symmetric
tensors | 8 Pages | null | null | null | math.CA math.OC | http://creativecommons.org/licenses/by/4.0/ | For a 4th order 3-dimensional symmetric tensor with its entries $1$ or $-1$,
we show the analytic sufficient and necessary conditions of its positive
definiteness. By applying these conclusions, several strict inequalities is
bulit for ternary quartic homogeneous polynomials.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2024 12:37:25 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 07:28:15 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Song",
"Yisheng",
""
]
] |
2406.04014 | Yuki Nagahama | Yuki Nagahama | Interactive zoom display in smartphone-based digital holographic
microscope for 3D imaging | null | null | null | null | cs.GR eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Digital holography has applications in bio-imaging because it can
simultaneously obtain the amplitude and phase information of a microscopic
sample in a single shot, thus facilitating non-contact, noninvasive observation
of the 3D shape of transparent objects (phase objects, which can be mapped with
the phase information,) and moving objects. The combination of digital
holography and microscopy is called digital holographic microscopy (DHM). In
this study, we propose a smartphone-based DHM system for 3D imaging that is
compact, inexpensive, and capable of observing objects in real time; this
system includes an optical system comprising a 3D printer using commercially
available image sensors and semiconductor lasers; further, an Android-based
application is used to reconstruct the holograms acquired by this optical
system, thus outlining the amplitude and phase information of the observed
object. Also, by utilizing scalable diffraction calculation methods and
touchscreen interaction, we implemented zoom functionality through pinch-in
gestures. The study results showed that the DHM system successfully obtained
the amplitude and phase information of the observed object via the acquired
holograms in an almost real time manner. Thus, this study showed that it is
possible to construct a low cost and compact DHM system that includes a 3D
printer to construct the optical system and a smartphone application to
reconstruct the holograms. Furthermore, this smartphone-based DHM system's
ability to capture, reconstruct, and display holograms in real time
demonstrates its superiority and novelty over existing systems. This system is
also expected to contribute to biology fieldwork and pathological diagnosis in
remote areas.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2024 12:40:48 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 13:02:20 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Nagahama",
"Yuki",
""
]
] |
2406.04141 | Roman Sokolovskii | Roman Sokolovskii, Parv Agarwal, Luis Alberto Croquevielle, Zijian
Zhou, Thomas Heinis | Coding Over Coupon Collector Channels for Combinatorial Motif-Based DNA
Storage | 11 pages, 8 figures | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by/4.0/ | Encoding information in combinations of pre-synthesised deoxyribonucleic acid
(DNA) strands (referred to as motifs) is an interesting approach to DNA storage
that could potentially circumvent the prohibitive costs of
nucleotide-by-nucleotide DNA synthesis. Based on our analysis of an empirical
data set from HelixWorks, we propose two channel models for this setup (with
and without interference) and analyse their fundamental limits. We propose a
coding scheme that approaches those limits by leveraging all information
available at the output of the channel, in contrast to earlier schemes
developed for a similar setup by Preuss et al. We highlight an important
connection between channel capacity curves and the fundamental trade-off
between synthesis (writing) and sequencing (reading), and offer a way to
mitigate an exponential growth in decoding complexity with the size of the
motif library.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2024 15:04:36 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 16:20:23 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Sokolovskii",
"Roman",
""
],
[
"Agarwal",
"Parv",
""
],
[
"Croquevielle",
"Luis Alberto",
""
],
[
"Zhou",
"Zijian",
""
],
[
"Heinis",
"Thomas",
""
]
] |
2406.04166 | Eulalia Gallego-Cano Laly | E. Gallego-Cano, T. Fritz, R. Sch\"odel, A. Feldmeier-Krause, T. Do,
and S. Nishiyama | Photometric Classification of Stars Around the Milky Way's Central Black
Hole: I. Central Parsec | null | null | null | null | astro-ph.GA | http://creativecommons.org/licenses/by/4.0/ | The presence of young massive stars in the Galactic Centre (GC) raises
questions about star formation near the black hole Sagittarius A* (Sgr A*).
Additionally, the initial mass function (IMF) in this region appears different
from the standard Salpeter/Kroupa law. Extreme extinction and crowding limit
our understanding of the stellar population, with spectroscopic data available
only for selected bright sources. We aim to improve knowledge about the
distribution and IMF of young, massive stars near Sgr A*. Using intermediate
band (IB) photometry, we identify candidates for massive young stars through
Bayesian inference, a neural network, and a gradient-boosted trees algorithm.
We obtained spectral energy distributions for 6590 stars, 1181 of which have
been previously classified spectroscopically. We identify 351 stars classified
as early types by all three methods, including 155 newly identified candidates.
The radial density profiles for late and early-type stars fit broken power
laws, with a break radius of 9.2 +- 0.6'' for early-type stars. Late-type stars
show a core-like distribution around Sgr A*, while early-type stars' density
increases steeply towards the black hole. We infer a top-heavy IMF of young
stars near Sgr A* (R < 9''), with a power-law of 1.6 +- 0.1. At greater
distances, a standard Salpeter/Kroupa IMF fits the data. IB photometry also
constrains the metallicities of late-type stars, estimating metallicities for
over 600 stars. The IMF variation with radial distance suggests different star
formation mechanisms, with a top-heavy IMF near Sgr A* consistent with disc
star formation.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2024 15:22:56 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 06:26:01 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Gallego-Cano",
"E.",
""
],
[
"Fritz",
"T.",
""
],
[
"Schödel",
"R.",
""
],
[
"Feldmeier-Krause",
"A.",
""
],
[
"Do",
"T.",
""
],
[
"Nishiyama",
"S.",
""
]
] |
2406.04179 | Alexander Barvinok | Alexander Barvinok | On the zeros of partition functions with multi-spin interactions | 21 page, several improvements and ramifications | null | null | null | math.PR cs.DS math-ph math.CO math.MP | http://creativecommons.org/licenses/by/4.0/ | Let $X_1, \ldots, X_n$ be probability spaces, let $X$ be their direct
product, let $\phi_1, \ldots, \phi_m: X \longrightarrow {\Bbb C}$ be random
variables, each depending only on a few coordinates of a point $x=(x_1, \ldots,
x_n)$, and let $f=\phi_1 + \ldots + \phi_m$. The expectation $E\thinspace
e^{\lambda f}$, where $\lambda \in {\Bbb C}$, appears in statistical physics as
the partition function of a system with multi-spin interactions, and also in
combinatorics and computer science, where it is known as the partition function
of edge-coloring models, tensor network contractions or a Holant polynomial.
Assuming that each $\phi_i$ is 1-Lipschitz in the Hamming metric of $X$, that
each $\phi_i(x)$ depends on at most $r \geq 2$ coordinates $x_1, \ldots, x_n$
of $x \in X$, and that for each $j$ there are at most $c \geq 1$ functions
$\phi_i$ that depend on the coordinate $x_j$, we prove that $E\thinspace
e^{\lambda f} \ne 0$ provided $| \lambda | \leq \ (3 c \sqrt{r-1})^{-1}$ and
that the bound is sharp up to a constant factor. Taking a scaling limit, we
prove a similar result for functions $\phi_1, \ldots, \phi_m: {\Bbb R}^n
\longrightarrow {\Bbb C}$ that are 1-Lipschitz in the $\ell^1$ metric of ${\Bbb
R}^n$ and where the expectation is taken with respect to the standard Gaussian
measure in ${\Bbb R}^n$. As a corollary, the value of the expectation can be
efficiently approximated, provided $\lambda$ lies in a slightly smaller disc.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2024 15:36:13 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 15:32:50 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Barvinok",
"Alexander",
""
]
] |
2406.04251 | Haosen Yang | Haosen Yang and Chenhao Zhang and Wenqing Wang and Marco Volino and
Adrian Hilton and Li Zhang and Xiatian Zhu | Gaussian Splatting with Localized Points Management | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Point management is a critical component in optimizing 3D Gaussian Splatting
(3DGS) models, as the point initiation (e.g., via structure from motion) is
distributionally inappropriate. Typically, the Adaptive Density Control (ADC)
algorithm is applied, leveraging view-averaged gradient magnitude thresholding
for point densification, opacity thresholding for pruning, and regular
all-points opacity reset. However, we reveal that this strategy is limited in
tackling intricate/special image regions (e.g., transparent) as it is unable to
identify all the 3D zones that require point densification, and lacking an
appropriate mechanism to handle the ill-conditioned points with negative
impacts (occlusion due to false high opacity). To address these limitations, we
propose a Localized Point Management (LPM) strategy, capable of identifying
those error-contributing zones in the highest demand for both point addition
and geometry calibration. Zone identification is achieved by leveraging the
underlying multiview geometry constraints, with the guidance of image rendering
errors. We apply point densification in the identified zone, whilst resetting
the opacity of those points residing in front of these regions so that a new
opportunity is created to correct ill-conditioned points. Serving as a
versatile plugin, LPM can be seamlessly integrated into existing 3D Gaussian
Splatting models. Experimental evaluation across both static 3D and dynamic 4D
scenes validate the efficacy of our LPM strategy in boosting a variety of
existing 3DGS models both quantitatively and qualitatively. Notably, LPM
improves both vanilla 3DGS and SpaceTimeGS to achieve state-of-the-art
rendering quality while retaining real-time speeds, outperforming on
challenging datasets such as Tanks & Temples and the Neural 3D Video Dataset.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2024 16:55:07 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 16:28:31 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Yang",
"Haosen",
""
],
[
"Zhang",
"Chenhao",
""
],
[
"Wang",
"Wenqing",
""
],
[
"Volino",
"Marco",
""
],
[
"Hilton",
"Adrian",
""
],
[
"Zhang",
"Li",
""
],
[
"Zhu",
"Xiatian",
""
]
] |
2406.04382 | Vanessa Frias-Martinez | Jiahui Wu and Vanessa Frias-Martinez | Improving the Fairness of Deep-Learning, Short-term Crime Prediction
with Under-reporting-aware Models | 25 pages, 4 figures | null | null | null | cs.CY cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Deep learning crime predictive tools use past crime data and additional
behavioral datasets to forecast future crimes. Nevertheless, these tools have
been shown to suffer from unfair predictions across minority racial and ethnic
groups. Current approaches to address this unfairness generally propose either
pre-processing methods that mitigate the bias in the training datasets by
applying corrections to crime counts based on domain knowledge or in-processing
methods that are implemented as fairness regularizers to optimize for both
accuracy and fairness. In this paper, we propose a novel deep learning
architecture that combines the power of these two approaches to increase
prediction fairness. Our results show that the proposed model improves the
fairness of crime predictions when compared to models with in-processing
de-biasing approaches and with models without any type of bias correction,
albeit at the cost of reducing accuracy.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2024 04:05:23 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 17:53:01 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Wu",
"Jiahui",
""
],
[
"Frias-Martinez",
"Vanessa",
""
]
] |
2406.04426 | Sergio Casas | Sergio Casas, Ben Agro, Jiageng Mao, Thomas Gilles, Alexander Cui,
Thomas Li, Raquel Urtasun | DeTra: A Unified Model for Object Detection and Trajectory Forecasting | null | null | null | null | cs.CV cs.AI cs.LG cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The tasks of object detection and trajectory forecasting play a crucial role
in understanding the scene for autonomous driving. These tasks are typically
executed in a cascading manner, making them prone to compounding errors.
Furthermore, there is usually a very thin interface between the two tasks,
creating a lossy information bottleneck. To address these challenges, our
approach formulates the union of the two tasks as a trajectory refinement
problem, where the first pose is the detection (current time), and the
subsequent poses are the waypoints of the multiple forecasts (future time). To
tackle this unified task, we design a refinement transformer that infers the
presence, pose, and multi-modal future behaviors of objects directly from LiDAR
point clouds and high-definition maps. We call this model DeTra, short for
object Detection and Trajectory forecasting. In our experiments, we observe
that \ourmodel{} outperforms the state-of-the-art on Argoverse 2 Sensor and
Waymo Open Dataset by a large margin, across a broad range of metrics. Last but
not least, we perform extensive ablation studies that show the value of
refinement for this task, that every proposed component contributes positively
to its performance, and that key design choices were made.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2024 18:12:04 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 12:54:10 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Casas",
"Sergio",
""
],
[
"Agro",
"Ben",
""
],
[
"Mao",
"Jiageng",
""
],
[
"Gilles",
"Thomas",
""
],
[
"Cui",
"Alexander",
""
],
[
"Li",
"Thomas",
""
],
[
"Urtasun",
"Raquel",
""
]
] |
2406.04439 | Mengfei Chen | Mengfei Chen, Mohamed Kharbeche, Mohamed Haouari, Weihong "Grace" Guo | A simulation-optimization framework for food supply chain network design
to ensure food accessibility under uncertainty | 32 pages, 6 figures | null | null | null | econ.GN q-fin.EC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | How to ensure accessibility to food and nutrition while food supply chains
suffer from demand and supply uncertainties caused by disruptive forces such as
the COVID-19 pandemic and natural disasters is an emerging and critical issue.
Unstable access to food influences the level of nutrition that weakens the
health and well-being of citizens. Therefore, a food accessibility evaluation
index is proposed in this work to quantify how well nutrition needs are met.
The proposed index is then embedded in a stochastic multi-objective
mixed-integer optimization problem to determine the optimal supply chain design
to maximize food accessibility and minimize cost. Considering uncertainty in
demand and supply, the multi-objective problem is solved in a two-phase
simulation-optimization framework in which Green Field Analysis is applied to
determine the long-term, tactical decisions such as supply chain configuration,
and then Monte Carlo simulation is performed iteratively to determine the
short-term supply chain operations by solving a stochastic programming problem.
A case study is conducted on the beef supply chain in Qatar. Pareto efficient
solutions are validated in discrete event simulation to evaluate the
performance of the designed supply chain in various realistic scenarios and
provide recommendations for different decision-makers.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2024 18:33:40 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 17:37:16 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Chen",
"Mengfei",
""
],
[
"Kharbeche",
"Mohamed",
""
],
[
"Haouari",
"Mohamed",
""
],
[
"Guo",
"Weihong \"Grace\"",
""
]
] |
2406.04470 | Haokun Zhou | Haokun Zhou, Yipeng Hong | DiffuSyn Bench: Evaluating Vision-Language Models on Real-World
Complexities with Diffusion-Generated Synthetic Benchmarks | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | This study assesses the ability of Large Vision-Language Models (LVLMs) to
differentiate between AI-generated and human-generated images. It introduces a
new automated benchmark construction method for this evaluation. The experiment
compared common LVLMs with human participants using a mixed dataset of AI and
human-created images. Results showed that LVLMs could distinguish between the
image types to some extent but exhibited a rightward bias, and perform
significantly worse compared to humans. To build on these findings, we
developed an automated benchmark construction process using AI. This process
involved topic retrieval, narrative script generation, error embedding, and
image generation, creating a diverse set of text-image pairs with intentional
errors. We validated our method through constructing two caparable benchmarks.
This study highlights the strengths and weaknesses of LVLMs in real-world
understanding and advances benchmark construction techniques, providing a
scalable and automatic approach for AI model evaluation.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2024 19:50:33 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 16:46:22 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Zhou",
"Haokun",
""
],
[
"Hong",
"Yipeng",
""
]
] |
2406.04535 | Lexing Ying | Lexing Ying | Tangent differential privacy | null | null | null | null | cs.LG cs.CR stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Differential privacy is a framework for protecting the identity of individual
data points in the decision-making process. In this note, we propose a new form
of differential privacy called tangent differential privacy. Compared with the
usual differential privacy that is defined uniformly across data distributions,
tangent differential privacy is tailored towards a specific data distribution
of interest. It also allows for general distribution distances such as total
variation distance and Wasserstein distance. In the case of risk minimization,
we show that entropic regularization guarantees tangent differential privacy
under rather general conditions on the risk function.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2024 22:11:31 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Ying",
"Lexing",
""
]
] |
2406.04538 | Zhi Cheng | Zhi Cheng, Fue-Sang Lien, Earl H. Dowell | A unified framework for prediction of vortex-induced vibration based on
the nonlinear identification of general wake oscillator modeling | This version is not intended to be sent for peer review and is merely
a summary of some preliminary work | null | null | null | physics.flu-dyn | http://creativecommons.org/licenses/by/4.0/ | In this paper, we present novel identification strategies to develop a
unified framework for vortex-induced vibration (VIV) prediction based on the
general semi-empirical wake oscillator. Greybox nonlinear system identification
method accompanying high-fidelity computational fluid dynamics (CFD) and/or
experimental data could be applied for the identification process. The proposed
template of general wake oscillators contains low- to high-order damping terms
to be identified for characterizing the possible flow dynamics. Two different
strategies, including individual identification of single wake oscillator and
overall identification of coupled VIV control equations, are proposed. VIV
system consisting of an elastically-mounted circular cylinder submerged in
laminar flow at Reynold number of 100 is considered. Both strategies have been
tested and have exhibited high accuracy. The second strategy, i.e., overall
identification of coupled VIV control equations, would be more suitable for the
future framework owing that its training process considers the effect of fluid
damping. A detailed mathematical introduction to future works on framework
development covering the wide Reynold number range is addressed. The proposed
unified framework is a landmark update of past wake oscillators both in terms
of prediction accuracy and physical principles and has considerable research
significance and practical engineering value.
| [
{
"version": "v1",
"created": "Thu, 6 Jun 2024 22:22:12 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 16:33:52 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Cheng",
"Zhi",
""
],
[
"Lien",
"Fue-Sang",
""
],
[
"Dowell",
"Earl H.",
""
]
] |
2406.04636 | Tsung-Han Lee | Tsung-Han Lee, Corey Melnick, Ran Adler, Xue Sun, Yongxin Yao, Nicola
Lanat\`a, Gabriel Kotliar | Charge self-consistent density functional theory plus ghost
rotationally-invariant slave-boson theory for correlated materials | null | null | null | null | cond-mat.str-el cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a charge self-consistent density functional theory combined with
the ghost-rotationally-invariant slave-boson (DFT+gRISB) formalism for studying
correlated materials. This method is applied to SrVO$_3$ and NiO, representing
prototypical correlated metals and charge-transfer insulators. For SrVO$_3$, we
demonstrate that DFT+gRISB yields an accurate equilibrium volume and effective
mass close to experimentally observed values. Regarding NiO, DFT+gRISB enables
the simultaneous description of charge transfer and Mott-Hubbard bands,
significantly enhancing the accuracy of the original DFT+RISB approach.
Furthermore, the calculated equilibrium volume and spectral function reasonably
agree with experimental observations.
| [
{
"version": "v1",
"created": "Fri, 7 Jun 2024 04:44:18 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 14:56:23 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Lee",
"Tsung-Han",
""
],
[
"Melnick",
"Corey",
""
],
[
"Adler",
"Ran",
""
],
[
"Sun",
"Xue",
""
],
[
"Yao",
"Yongxin",
""
],
[
"Lanatà",
"Nicola",
""
],
[
"Kotliar",
"Gabriel",
""
]
] |
2406.04797 | Waleed Abdeen | Waleed Abdeen, Michael Unterkalmsteiner, Krzysztof Wnuk, Alexandros
Chirtoglou, Christoph Schimanski, Heja Goli | Multi-Label Requirements Classification with Large Taxonomies | Accepted at the Requirements Engineering Conference (RE) 2024 -
Industrial Innovation Track | null | null | null | cs.SE | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Classification aids software development activities by organizing
requirements in classes for easier access and retrieval. The majority of
requirements classification research has, so far, focused on binary or
multi-class classification. Multi-label classification with large taxonomies
could aid requirements traceability but is prohibitively costly with supervised
training. Hence, we investigate zero-short learning to evaluate the feasibility
of multi-label requirements classification with large taxonomies. We
associated, together with domain experts from the industry, 129 requirements
with 769 labels from taxonomies ranging between 250 and 1183 classes. Then, we
conducted a controlled experiment to study the impact of the type of
classifier, the hierarchy, and the structural characteristics of taxonomies on
the classification performance. The results show that: (1) The sentence-based
classifier had a significantly higher recall compared to the word-based
classifier; however, the precision and F1-score did not improve significantly.
(2) The hierarchical classification strategy did not always improve the
performance of requirements classification. (3) The total and leaf nodes of the
taxonomies have a strong negative correlation with the recall of the
hierarchical sentence-based classifier. We investigate the problem of
multi-label requirements classification with large taxonomies, illustrate a
systematic process to create a ground truth involving industry participants,
and provide an analysis of different classification pipelines using zero-shot
learning.
| [
{
"version": "v1",
"created": "Fri, 7 Jun 2024 09:53:55 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 06:55:22 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Abdeen",
"Waleed",
""
],
[
"Unterkalmsteiner",
"Michael",
""
],
[
"Wnuk",
"Krzysztof",
""
],
[
"Chirtoglou",
"Alexandros",
""
],
[
"Schimanski",
"Christoph",
""
],
[
"Goli",
"Heja",
""
]
] |
2406.04887 | Jiangdong Ai | Jiangdong Ai, Xiangzhou Liu, Fei Peng | A variable version of the quasi-kernel conjecture | 9 pages | null | null | null | math.CO | http://creativecommons.org/licenses/by/4.0/ | A quasi-kernel of a digraph $D$ is an independent set $Q$ such that every
vertex can reach $Q$ in at most two steps. A 48-year conjecture made by P.L.
Erd\H{o}s and Sz\'ekely, denoted the small QK conjecture, says that every
sink-free digraph contains a quasi-kernel of size at most $n/2$.
Recently, Spiro posed the large QK conjecture, that every sink-free digraph
contains a quasi-kernel $Q$ such that $|N^-[Q]|\geq n/2$, and showed that it
follows from the small QK conjecture.
In this paper, we establish that the large QK conjecture implies the small QK
conjecture with a weaker constant. We also show that the large QK conjecture is
equivalent to a sharp version of it, answering affirmatively a question of
Spiro. We formulate variable versions of these conjectures, which are still
open in general.
Not many digraphs are known to have quasi-kernels of size $(1-\alpha)n$ or
less. We show this for digraphs with bounded dichromatic number, by proving the
stronger statement that every sink-free digraph contains a quasi-kernel of size
at most $(1-1/k)n$, where $k$ is the digraph's kernel-perfect number.
| [
{
"version": "v1",
"created": "Fri, 7 Jun 2024 12:32:48 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 13:29:48 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Ai",
"Jiangdong",
""
],
[
"Liu",
"Xiangzhou",
""
],
[
"Peng",
"Fei",
""
]
] |
2406.05191 | Rushikesh Zawar | Shaurya Dewan, Rushikesh Zawar, Prakanshul Saxena, Yingshan Chang,
Andrew Luo, Yonatan Bisk | DiffusionPID: Interpreting Diffusion via Partial Information
Decomposition | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Text-to-image diffusion models have made significant progress in generating
naturalistic images from textual inputs, and demonstrate the capacity to learn
and represent complex visual-semantic relationships. While these diffusion
models have achieved remarkable success, the underlying mechanisms driving
their performance are not yet fully accounted for, with many unanswered
questions surrounding what they learn, how they represent visual-semantic
relationships, and why they sometimes fail to generalize. Our work presents
Diffusion Partial Information Decomposition (DiffusionPID), a novel technique
that applies information-theoretic principles to decompose the input text
prompt into its elementary components, enabling a detailed examination of how
individual tokens and their interactions shape the generated image. We
introduce a formal approach to analyze the uniqueness, redundancy, and synergy
terms by applying PID to the denoising model at both the image and pixel level.
This approach enables us to characterize how individual tokens and their
interactions affect the model output. We first present a fine-grained analysis
of characteristics utilized by the model to uniquely localize specific
concepts, we then apply our approach in bias analysis and show it can recover
gender and ethnicity biases. Finally, we use our method to visually
characterize word ambiguity and similarity from the model's perspective and
illustrate the efficacy of our method for prompt intervention. Our results show
that PID is a potent tool for evaluating and diagnosing text-to-image diffusion
models.
| [
{
"version": "v1",
"created": "Fri, 7 Jun 2024 18:17:17 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jun 2024 21:28:13 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Dewan",
"Shaurya",
""
],
[
"Zawar",
"Rushikesh",
""
],
[
"Saxena",
"Prakanshul",
""
],
[
"Chang",
"Yingshan",
""
],
[
"Luo",
"Andrew",
""
],
[
"Bisk",
"Yonatan",
""
]
] |
2406.05217 | Steve Fan | Steve Fan | The shifted prime-divisor function over shifted primes | 39 pages | null | null | null | math.NT | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Let $a,b\in\mathbb{Z}\setminus\{0\}$. For every $n\in\mathbb{N}$, we denote
by $\omega_a^*(n)$ the number of shifted-prime divisors $p-a$ of $n$, where
$p>a$ is prime. In this paper, we study the moments of $\omega_a^*$ over
shifted primes $p-b$. Specifically, we prove an asymptotic formula for the
first moment and upper and lower bounds of the correct order of magnitude for
the second moment. These results suggest that the average behavior of
$\omega^*_a$ on shifted primes is similar to its average behavior on natural
numbers. We shall also prove upper bounds for the mean values of
sub-multiplicative functions in a nice class over the least common multiples of
the shifted primes $p-a$ and $q-b$. Such upper bounds are intimately related to
the second moments of $\omega^*_a$ over natural numbers and over shifted
primes. Finally, we propose a new conjecture on the second moment of
$\omega_1^*$ over natural numbers and provide a heuristic argument in support
of this conjecture.
| [
{
"version": "v1",
"created": "Fri, 7 Jun 2024 19:00:41 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 12:30:22 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Fan",
"Steve",
""
]
] |
2406.05282 | Baibhab Chatterjee | Ovishake Sen, Chukwufumnanya Ogbogu, Peyman Dehghanzadeh, Janardhan
Rao Doppa, Swarup Bhunia, Partha Pratim Pande, and Baibhab Chatterjee | Scalable and Programmable Look-Up Table based Neural Acceleration
(LUT-NA) for Extreme Energy Efficiency | 7 pages | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional digital implementations of neural accelerators are limited by
high power and area overheads, while analog and non-CMOS implementations suffer
from noise, device mismatch, and reliability issues. This paper introduces a
CMOS Look-Up Table (LUT)-based Neural Accelerator (LUT-NA) framework that
reduces the power, latency, and area consumption of traditional digital
accelerators through pre-computed, faster look-ups while avoiding noise and
mismatch of analog circuits. To solve the scalability issues of conventional
LUT-based computation, we split the high-precision multiply and accumulate
(MAC) operations into lower-precision MACs using a divide-and-conquer-based
approach. We show that LUT-NA achieves up to $29.54\times$ lower area with
$3.34\times$ lower energy per inference task than traditional LUT-based
techniques and up to $1.23\times$ lower area with $1.80\times$ lower energy per
inference task than conventional digital MAC-based techniques (Wallace
Tree/Array Multipliers) without retraining and without affecting accuracy, even
on lottery ticket pruned (LTP) models that already reduce the number of
required MAC operations by up to 98%. Finally, we introduce mixed precision
analysis in LUT-NA framework for various LTP models (VGG11, VGG19, Resnet18,
Resnet34, GoogleNet) that achieved up to $32.22\times$-$50.95\times$ lower area
across models with $3.68\times$-$6.25\times$ lower energy per inference than
traditional LUT-based techniques, and up to $1.35\times$-$2.14\times$ lower
area requirement with $1.99\times$-$3.38\times$ lower energy per inference
across models as compared to conventional digital MAC-based techniques with
$\sim$1% accuracy loss.
| [
{
"version": "v1",
"created": "Fri, 7 Jun 2024 22:27:29 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 12:23:19 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Sen",
"Ovishake",
""
],
[
"Ogbogu",
"Chukwufumnanya",
""
],
[
"Dehghanzadeh",
"Peyman",
""
],
[
"Doppa",
"Janardhan Rao",
""
],
[
"Bhunia",
"Swarup",
""
],
[
"Pande",
"Partha Pratim",
""
],
[
"Chatterjee",
"Baibhab",
""
]
] |
2406.05463 | Jos\'e De Los Santos Guerra | T. H. T. Rosa, M. A. Oliveira, Y. Mendez-Gonzalez, F. Guerrero, R.
Guo, A. S. Bhalla, J. D. S. Guerra | Polaron-assisted dielectric relaxation processes in donor-doped
BaTiO3-based ceramics | 26 pages, 9 figures, 1 table | null | null | null | cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Perovskite structure materials based on the Ba1-xGdxTiO3 system, where x =
0.001, 0.002, 0.003, 0.004 and 0.005, were prepared via the Pechini chemical
synthesis route. The dielectric properties have been analyzed over a wide
temperature and frequency range, revealing a significant contribution of the
conduction mechanisms in the dielectric response of the studied ceramics. In
fact, by using the Davidson-Cole formalism, the observed electrical behavior
was found to be associated with relaxation processes related to intrinsic
defects mobility promoted by a thermally-activated polaronic mechanism. The
obtained values of the activation energy for the relaxation processes,
estimated from the Arrhenius law for the mean relaxation time, revealed a
decrease from 0.29 up to 0.21 eV as the Gd-doping concentration increases,
which suggests the conduction process to be associated with the polaronic
effects due to the coexistence of Ti4+ and Ti3+ ions in the structure. Analysis
from the conductivity formalism, by using the Jonscher universal power-law,
confirmed the polaron-type conduction mechanism for the dielectric dispersion,
as suggested by the dielectric analysis, being the nature of the hopping
mechanism governed by small polaron hopping (SPH) charge transport in the
studied Ba1-xGdxTiO3 ceramics.
| [
{
"version": "v1",
"created": "Sat, 8 Jun 2024 12:54:16 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 10:23:08 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Rosa",
"T. H. T.",
""
],
[
"Oliveira",
"M. A.",
""
],
[
"Mendez-Gonzalez",
"Y.",
""
],
[
"Guerrero",
"F.",
""
],
[
"Guo",
"R.",
""
],
[
"Bhalla",
"A. S.",
""
],
[
"Guerra",
"J. D. S.",
""
]
] |
2406.05644 | Zhenhong Zhou | Zhenhong Zhou, Haiyang Yu, Xinghua Zhang, Rongwu Xu, Fei Huang,
Yongbin Li | How Alignment and Jailbreak Work: Explain LLM Safety through
Intermediate Hidden States | 27 pages | null | null | null | cs.CL cs.AI cs.CR cs.CY | http://creativecommons.org/licenses/by/4.0/ | Large language models (LLMs) rely on safety alignment to avoid responding to
malicious user inputs. Unfortunately, jailbreak can circumvent safety
guardrails, resulting in LLMs generating harmful content and raising concerns
about LLM safety. Due to language models with intensive parameters often
regarded as black boxes, the mechanisms of alignment and jailbreak are
challenging to elucidate. In this paper, we employ weak classifiers to explain
LLM safety through the intermediate hidden states. We first confirm that LLMs
learn ethical concepts during pre-training rather than alignment and can
identify malicious and normal inputs in the early layers. Alignment actually
associates the early concepts with emotion guesses in the middle layers and
then refines them to the specific reject tokens for safe generations. Jailbreak
disturbs the transformation of early unethical classification into negative
emotions. We conduct experiments on models from 7B to 70B across various model
families to prove our conclusion. Overall, our paper indicates the intrinsical
mechanism of LLM safety and how jailbreaks circumvent safety guardrails,
offering a new perspective on LLM safety and reducing concerns. Our code is
available at https://github.com/ydyjya/LLM-IHS-Explanation.
| [
{
"version": "v1",
"created": "Sun, 9 Jun 2024 05:04:37 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 05:39:31 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Zhou",
"Zhenhong",
""
],
[
"Yu",
"Haiyang",
""
],
[
"Zhang",
"Xinghua",
""
],
[
"Xu",
"Rongwu",
""
],
[
"Huang",
"Fei",
""
],
[
"Li",
"Yongbin",
""
]
] |
2406.05711 | Tailong Xiao | Yan Zhu, Tailong Xiao, Guihua Zeng, Giulio Chiribella, Ya-Dong Wu | Controlling Unknown Quantum States via Data-Driven State Representations | null | null | null | null | quant-ph | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Accurate control of quantum states is crucial for quantum computing and other
quantum technologies. In the basic scenario, the task is to steer a quantum
system towards a target state through a sequence of control operations.
Determining the appropriate operations, however, generally requires information
about the initial state of the system. When the initial state is not {\em a
priori} known, gathering this information is generally challenging for quantum
systems of increasing size. To address this problem, we develop a
machine-learning algorithm that uses a small amount of measurement data to
construct a representation of the system's state. The algorithm compares this
data-driven representation with the representation of the target state, and
uses reinforcement learning to output the appropriate control operations.We
illustrate the effectiveness of the algorithm showing that it achieves accurate
control of unknown many-body quantum states and non-Gaussian
continuous-variable states using data from a limited set of quantum
measurements.
| [
{
"version": "v1",
"created": "Sun, 9 Jun 2024 10:07:05 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 06:39:36 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Zhu",
"Yan",
""
],
[
"Xiao",
"Tailong",
""
],
[
"Zeng",
"Guihua",
""
],
[
"Chiribella",
"Giulio",
""
],
[
"Wu",
"Ya-Dong",
""
]
] |
2406.05839 | Guanrou Yang | Guanrou Yang, Ziyang Ma, Fan Yu, Zhifu Gao, Shiliang Zhang, Xie Chen | MaLa-ASR: Multimedia-Assisted LLM-Based ASR | null | null | null | null | eess.AS cs.AI | http://creativecommons.org/licenses/by/4.0/ | As more and more information-rich data like video become available, utilizing
multi-modal auxiliary information to enhance audio tasks has sparked widespread
research interest. The recent surge in research on LLM-based audio models
provides fresh perspectives for tackling audio tasks. Given that LLM can
flexibly ingest multiple inputs, we propose MaLa-ASR, an LLM-based ASR model
that can integrate textual keywords extracted from presentation slides to
improve recognition of conference content. MaLa-ASR yields average WERs of 9.4%
and 11.7% on the L95 and S95 subsets of the SlideSpeech corpus, representing a
significant relative WER drop of 27.9% and 44.7% over the baseline model
reported in SlideSpeech. MaLa-ASR underscores LLM's strong performance in
speech tasks and the capability to integrate auxiliary information
conveniently. By adding keywords to the input prompt, the biased word error
rate (B-WER) reduces relatively by 46.0% and 44.2%, establishing a new SOTA on
this dataset.
| [
{
"version": "v1",
"created": "Sun, 9 Jun 2024 16:00:00 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 07:50:40 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Yang",
"Guanrou",
""
],
[
"Ma",
"Ziyang",
""
],
[
"Yu",
"Fan",
""
],
[
"Gao",
"Zhifu",
""
],
[
"Zhang",
"Shiliang",
""
],
[
"Chen",
"Xie",
""
]
] |
2406.05884 | Jose Fontanari | Bianca Y. S. Ishikawa and Jos\'e F. Fontanari | Revisiting institutional punishment in the $N$-person prisoner's dilemma | null | null | null | null | physics.soc-ph nlin.AO q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The conflict between individual and collective interests makes fostering
cooperation in human societies a challenging task, requiring drastic measures
such as the establishment of sanctioning institutions. These institutions are
costly because they have to be maintained regardless of the presence or absence
of offenders. Here, we propose realistic improvements to the standard
$N$-person prisoner's dilemma formulation with institutional punishment by
eliminating overpunishment, requiring a minimum number of contributors to
establish the sanctioning institution, and sharing the cost among them once
this minimum number is reached. In addition, we focus on large groups or
communities for which sanctioning institutions are ubiquitous. Using the
replicator equation framework for an infinite population, we find that by
sufficiently fining players who fail to contribute either to the public good or
to the sanctioning institution, a population of contributors immune to invasion
by these free riders can be established, provided that the contributors are
sufficiently numerous. In a finite population, we use finite-size scaling to
show that, for some parameter settings, demographic noise helps to fixate the
strategy that contributes to the public good but not to the sanctioning
institution even for infinitely large populations when, somewhat
counterintuitively, its proportion in the initial population vanishes with a
small power of the population size.
| [
{
"version": "v1",
"created": "Sun, 9 Jun 2024 18:42:27 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 11:41:22 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Ishikawa",
"Bianca Y. S.",
""
],
[
"Fontanari",
"José F.",
""
]
] |
2406.06126 | Chengyu Wu | Chengyu Wu and Jiaqing Yang | The obstacle scattering for the biharmonic equation | null | null | null | null | math.AP | http://creativecommons.org/licenses/by/4.0/ | In this paper, we consider the obstacle scattering problem for biharmonic
equations with a Dirichlet boundary condition in both two and three dimensions.
Some basic properties are first derived for the biharmonic scattering
solutions, which leads to a simple criterion for the uniqueness of the direct
problem. Then a new type far-field pattern is introduced, where the
correspondence between the far-field pattern and scattered field is
established. Based on these properties, we prove the well-posedness of the
direct problem in associated function spaces by utilizing the boundary integral
equation method, which relys on a natural decomposition of the biharmonic
operator and the theory of the pseudodifferential operator. Furthermore, the
inverse problem for determining the obstacle is studied. By establishing some
novel reciprocity relations between the far-field pattern and scattered field,
we show that the obstacle can be uniquely recovered from the measurements at a
fixed frequency.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2024 09:33:24 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 07:23:13 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Wu",
"Chengyu",
""
],
[
"Yang",
"Jiaqing",
""
]
] |
2406.06144 | Jiaming Ji | Jiaming Ji, Kaile Wang, Tianyi Qiu, Boyuan Chen, Jiayi Zhou, Changye
Li, Hantao Lou, Yaodong Yang | Language Models Resist Alignment | 21 pages | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large language models (LLMs) may exhibit undesirable behaviors. Recent
efforts have focused on aligning these models to prevent harmful generation.
Despite these efforts, studies have shown that even a well-conducted alignment
process can be easily circumvented, whether intentionally or accidentally. Do
alignment fine-tuning have robust effects on models, or are merely superficial?
In this work, we answer this question through both theoretical and empirical
means. Empirically, we demonstrate the elasticity of post-alignment models,
i.e., the tendency to revert to the behavior distribution formed during the
pre-training phase upon further fine-tuning. Using compression theory, we
formally derive that such fine-tuning process disproportionately undermines
alignment compared to pre-training, potentially by orders of magnitude. We
conduct experimental validations to confirm the presence of elasticity across
models of varying types and sizes. Specifically, we find that model performance
declines rapidly before reverting to the pre-training distribution, after which
the rate of decline drops significantly. We further reveal that elasticity
positively correlates with increased model size and the expansion of
pre-training data. Our discovery signifies the importance of taming the
inherent elasticity of LLMs, thereby overcoming the resistance of LLMs to
alignment finetuning.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2024 10:03:16 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 06:46:14 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Ji",
"Jiaming",
""
],
[
"Wang",
"Kaile",
""
],
[
"Qiu",
"Tianyi",
""
],
[
"Chen",
"Boyuan",
""
],
[
"Zhou",
"Jiayi",
""
],
[
"Li",
"Changye",
""
],
[
"Lou",
"Hantao",
""
],
[
"Yang",
"Yaodong",
""
]
] |
2406.06145 | Matteo Torzoni | Gabriel Garayalde and Luca Rosafalco and Matteo Torzoni and Alberto
Corigliano | Mastering truss structure optimization with tree search | null | null | null | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This study investigates the combined use of generative grammar rules and
Monte Carlo Tree Search (MCTS) for optimizing truss structures. Our approach
accommodates intermediate construction stages characteristic of progressive
construction settings. We demonstrate the significant robustness and
computational efficiency of our approach compared to alternative reinforcement
learning frameworks from previous research activities, such as Q-learning or
deep Q-learning. These advantages stem from the ability of MCTS to
strategically navigate large state spaces, leveraging the upper confidence
bound for trees formula to effectively balance exploitation-exploration
trade-offs. We also emphasize the importance of early decision nodes in the
search tree, reflecting design choices crucial for identifying the global
optimum. Additionally, we show how MCTS dynamically adapts to complex and
extensive state spaces without significantly affecting solution quality. While
the focus of this paper is on truss optimization, our findings suggest MCTS as
a powerful tool for addressing other increasingly complex engineering
applications.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2024 10:04:21 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 10:42:25 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Garayalde",
"Gabriel",
""
],
[
"Rosafalco",
"Luca",
""
],
[
"Torzoni",
"Matteo",
""
],
[
"Corigliano",
"Alberto",
""
]
] |
2406.06336 | Mark Spivack | Mark Spivack, Orsola Rath Spivack | Propagation in rough waveguides: Forward and inverse problems | null | null | null | null | physics.comp-ph physics.class-ph physics.optics | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss here the direct and inverse problems for wave propagation in a
waveguide with rough internal surface and arbitrary mean shape. The high degree
of multiple scattering inside the waveguide poses significant challenges both
for the forward computation and for the recovery of the surface profile, and
raises important questions about scattering cross-sections. This paper falls
into two parts corresponding to these issues.
We first apply Left-Right (L-R) operator splitting to calculate the scattered
fields in 2- and 3-dimensional waveguides. Using this we illustrate the
scattered fields and the effect of surface roughness. In the second part we
formulate an algorithm for surface recovery from field measurements along the
waveguide axis, which generalises recent work on surfaces in 2 dimensions. This
method utilizes forward scattering assumptions in effect by formulating an
integral equation in the unknown surface field, treated as a function of the
surface. Although discussed in the context of waveguides, the formulae are
given in a form applicable to a variety of geometries, with coefficients which
will depend on and be determined by each specific application.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2024 14:54:32 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jun 2024 20:55:15 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Spivack",
"Mark",
""
],
[
"Spivack",
"Orsola Rath",
""
]
] |
2406.06433 | Shuo Zhang | Jason Shuo Zhang, Benjamin Howson, Panayiota Savva, Eleanor Loh | DISCO: An End-to-End Bandit Framework for Personalised Discount
Allocation | Accepted at ECML/PKDD 2024 | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Personalised discount codes provide a powerful mechanism for managing
customer relationships and operational spend in e-commerce. Bandits are well
suited for this product area, given the partial information nature of the
problem, as well as the need for adaptation to the changing business
environment. Here, we introduce DISCO, an end-to-end contextual bandit
framework for personalised discount code allocation at ASOS. DISCO adapts the
traditional Thompson Sampling algorithm by integrating it within an integer
program, thereby allowing for operational cost control. Because bandit learning
is often worse with high dimensional actions, we focused on building low
dimensional action and context representations that were nonetheless capable of
good accuracy. Additionally, we sought to build a model that preserved the
relationship between price and sales, in which customers increasing their
purchasing in response to lower prices ("negative price elasticity"). These
aims were achieved by using radial basis functions to represent the continuous
(i.e. infinite armed) action space, in combination with context embeddings
extracted from a neural network. These feature representations were used within
a Thompson Sampling framework to facilitate exploration, and further integrated
with an integer program to allocate discount codes across ASOS's customer base.
These modelling decisions result in a reward model that (a) enables pooled
learning across similar actions, (b) is highly accurate, including in
extrapolation, and (c) preserves the expected negative price elasticity.
Through offline analysis, we show that DISCO is able to effectively enact
exploration and improves its performance over time, despite the global
constraint. Finally, we subjected DISCO to a rigorous online A/B test, and find
that it achieves a significant improvement of >1% in average basket value,
relative to the legacy systems.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2024 16:24:35 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Jun 2024 08:16:34 GMT"
},
{
"version": "v3",
"created": "Wed, 12 Jun 2024 21:51:22 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Zhang",
"Jason Shuo",
""
],
[
"Howson",
"Benjamin",
""
],
[
"Savva",
"Panayiota",
""
],
[
"Loh",
"Eleanor",
""
]
] |
2406.06460 | Bahador Beigomi | Bahador Beigomi, Zheng H. Zhu | Towards Real-World Efficiency: Domain Randomization in Reinforcement
Learning for Pre-Capture of Free-Floating Moving Targets by Autonomous Robots | This is a preprint for the work submitted to the ICRA 2024 conference | 2024 IEEE International Conference on Robotics and Automation
(ICRA) | null | null | cs.RO cs.AI | http://creativecommons.org/licenses/by/4.0/ | In this research, we introduce a deep reinforcement learning-based control
approach to address the intricate challenge of the robotic pre-grasping phase
under microgravity conditions. Leveraging reinforcement learning eliminates the
necessity for manual feature design, therefore simplifying the problem and
empowering the robot to learn pre-grasping policies through trial and error.
Our methodology incorporates an off-policy reinforcement learning framework,
employing the soft actor-critic technique to enable the gripper to proficiently
approach a free-floating moving object, ensuring optimal pre-grasp success. For
effective learning of the pre-grasping approach task, we developed a reward
function that offers the agent clear and insightful feedback. Our case study
examines a pre-grasping task where a Robotiq 3F gripper is required to navigate
towards a free-floating moving target, pursue it, and subsequently position
itself at the desired pre-grasp location. We assessed our approach through a
series of experiments in both simulated and real-world environments. The source
code, along with recordings of real-world robot grasping, is available at
Fanuc_Robotiq_Grasp.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2024 16:54:51 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Beigomi",
"Bahador",
""
],
[
"Zhu",
"Zheng H.",
""
]
] |
2406.06511 | Alexander Kemper | Anjali A. Agrawal, Joshua Job, Tyler L. Wilson, S. N. Saadatmand, Mark
J. Hodson, Josh Y. Mutus, Athena Caesura, Peter D. Johnson, Justin E.
Elenewski, Kaitlyn J. Morrell, Alexander F. Kemper | Quantifying fault tolerant simulation of strongly correlated systems
using the Fermi-Hubbard model | null | null | null | null | quant-ph cond-mat.str-el | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Understanding the physics of strongly correlated materials is one of the
grand challenge problems for physics today. A large class of scientifically
interesting materials, from high-$T_c$ superconductors to spin liquids, involve
medium to strong correlations, and building a holistic understanding of these
materials is critical. Doing so is hindered by the competition between the
kinetic energy and Coulomb repulsion, which renders both analytic and numerical
methods unsatisfactory for describing interacting materials. Fault-tolerant
quantum computers have been proposed as a path forward to overcome these
difficulties, but this potential capability has not yet been fully assessed.
Here, using the multi-orbital Fermi-Hubbard model as a representative model and
a source of scalable problem specifications, we estimate the resource costs
needed to use fault-tolerant quantum computers for obtaining experimentally
relevant quantities such as correlation function estimation. We find that
advances in quantum algorithms and hardware will be needed in order to reduce
quantum resources and feasibly address utility-scale problem instances.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2024 17:50:56 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 14:37:11 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Agrawal",
"Anjali A.",
""
],
[
"Job",
"Joshua",
""
],
[
"Wilson",
"Tyler L.",
""
],
[
"Saadatmand",
"S. N.",
""
],
[
"Hodson",
"Mark J.",
""
],
[
"Mutus",
"Josh Y.",
""
],
[
"Caesura",
"Athena",
""
],
[
"Johnson",
"Peter D.",
""
],
[
"Elenewski",
"Justin E.",
""
],
[
"Morrell",
"Kaitlyn J.",
""
],
[
"Kemper",
"Alexander F.",
""
]
] |
2406.06579 | Xiao-Feng Zhang | Xiaofeng Zhang, Chen Shen, Xiaosong Yuan, Shaotian Yan, Liang Xie,
Wenxiao Wang, Chaochen Gu, Hao Tang, Jieping Ye | From Redundancy to Relevance: Enhancing Explainability in Multimodal
Large Language Models | null | null | null | null | cs.CL cs.AI cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Recently, multimodal large language models have exploded with an endless
variety, most of the popular Large Vision Language Models (LVLMs) depend on
sequential visual representation, where images are converted into hundreds or
thousands of tokens before being input into the Large Language Model (LLM)
along with language prompts. The black-box design hinders the interpretability
of visual-language models, especially regarding more complex reasoning tasks.
To explore the interaction process between image and text in complex reasoning
tasks, we introduce the information flow method to visualize the interaction
mechanism. By analyzing the dynamic flow of the information flow, we find that
the information flow appears to converge in the shallow layer. Further
investigation revealed a redundancy of the image token in the shallow layer.
Consequently, a truncation strategy was introduced to aggregate image tokens
within these shallow layers. This approach has been validated through
experiments across multiple models, yielding consistent improvements.
| [
{
"version": "v1",
"created": "Tue, 4 Jun 2024 13:52:54 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 10:29:45 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Zhang",
"Xiaofeng",
""
],
[
"Shen",
"Chen",
""
],
[
"Yuan",
"Xiaosong",
""
],
[
"Yan",
"Shaotian",
""
],
[
"Xie",
"Liang",
""
],
[
"Wang",
"Wenxiao",
""
],
[
"Gu",
"Chaochen",
""
],
[
"Tang",
"Hao",
""
],
[
"Ye",
"Jieping",
""
]
] |
2406.06643 | Abdul Qayyum | Abdul Qayyum, Hao Xu, Brian P. Halliday, Cristobal Rodero, Christopher
W. Lanyon, Richard D. Wilkinson, Steven Alexander Niederer | Transforming Heart Chamber Imaging: Self-Supervised Learning for Whole
Heart Reconstruction and Segmentation | arXiv admin note: text overlap with arXiv:2206.07349 by other authors | null | null | null | eess.IV | http://creativecommons.org/licenses/by/4.0/ | Automated segmentation of Cardiac Magnetic Resonance (CMR) plays a pivotal
role in efficiently assessing cardiac function, offering rapid clinical
evaluations that benefit both healthcare practitioners and patients. While
recent research has primarily focused on delineating structures in the
short-axis orientation, less attention has been given to long-axis
representations, mainly due to the complex nature of structures in this
orientation. Performing pixel-wise segmentation of the left ventricular (LV)
myocardium and the four cardiac chambers in 2-D steady-state free precession
(SSFP) cine sequences is a crucial preprocessing stage for various analyses.
However, the challenge lies in the significant variability in contrast,
appearance, orientation, and positioning of the heart across different
patients, clinical views, scanners, and imaging protocols. Consequently,
achieving fully automatic semantic segmentation in this context is notoriously
challenging. In recent years, several deep learning models have been proposed
to accurately quantify and diagnose cardiac pathologies. These automated tools
heavily rely on the accurate segmentation of cardiac structures in magnetic
resonance images (MRI). Hence, there is a need for new methods to handle such
structures' geometrical and textural complexities. We proposed 2D and 3D
two-stage self-supervised deep learning segmentation hybrid transformer and
CNN-based architectures for 4CH whole heart segmentation. Accurate segmentation
of the ventricles and atria in 4CH views is crucial for analyzing heart health
and reconstructing four-chamber meshes, which are essential for estimating
various parameters to assess overall heart condition. Our proposed method
outperformed state-of-the-art techniques, demonstrating superior performance in
this domain.
| [
{
"version": "v1",
"created": "Sun, 9 Jun 2024 18:44:37 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Qayyum",
"Abdul",
""
],
[
"Xu",
"Hao",
""
],
[
"Halliday",
"Brian P.",
""
],
[
"Rodero",
"Cristobal",
""
],
[
"Lanyon",
"Christopher W.",
""
],
[
"Wilkinson",
"Richard D.",
""
],
[
"Niederer",
"Steven Alexander",
""
]
] |
2406.06664 | Neeraj Gaur | Neeraj Gaur, Rohan Agrawal, Gary Wang, Parisa Haghani, Andrew
Rosenberg, Bhuvana Ramabhadran | ASTRA: Aligning Speech and Text Representations for Asr without Sampling | To be published in Interspeech 2024 | null | null | null | eess.AS cs.LG cs.SD | http://creativecommons.org/licenses/by-nc-sa/4.0/ | This paper introduces ASTRA, a novel method for improving Automatic Speech
Recognition (ASR) through text injection.Unlike prevailing techniques, ASTRA
eliminates the need for sampling to match sequence lengths between speech and
text modalities. Instead, it leverages the inherent alignments learned within
CTC/RNNT models. This approach offers the following two advantages, namely,
avoiding potential misalignment between speech and text features that could
arise from upsampling and eliminating the need for models to accurately predict
duration of sub-word tokens. This novel formulation of modality (length)
matching as a weighted RNNT objective matches the performance of the
state-of-the-art duration-based methods on the FLEURS benchmark, while opening
up other avenues of research in speech processing.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2024 15:39:04 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 15:39:03 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Gaur",
"Neeraj",
""
],
[
"Agrawal",
"Rohan",
""
],
[
"Wang",
"Gary",
""
],
[
"Haghani",
"Parisa",
""
],
[
"Rosenberg",
"Andrew",
""
],
[
"Ramabhadran",
"Bhuvana",
""
]
] |
2406.06684 | Sreetama Goswami | R. Abbasi, M. Ackermann, J. Adams, S. K. Agarwalla, J. A. Aguilar, M.
Ahlers, J.M. Alameddine, N. M. Amin, K. Andeen, C. Arg\"uelles, Y. Ashida, S.
Athanasiadou, L. Ausborm, S. N. Axani, X. Bai, A. Balagopal V., M. Baricevic,
S. W. Barwick, S. Bash, V. Basu, R. Bay, J. J. Beatty, J. Becker Tjus, J.
Beise, C. Bellenghi, C. Benning, S. BenZvi, D. Berley, E. Bernardini, D. Z.
Besson, E. Blaufuss, L. Bloom, S. Blot, F. Bontempo, J. Y. Book Motzkin, C.
Boscolo Meneguolo, S. B\"oser, O. Botner, J. B\"ottcher, J. Braun, B.
Brinson, J. Brostean-Kaiser, L. Brusa, R. T. Burley, D. Butterfield, M. A.
Campana, I. Caracas, K. Carloni, J. Carpio, S. Chattopadhyay, N. Chau, Z.
Chen, D. Chirkin, S. Choi, B. A. Clark, A. Coleman, G. H. Collin, A.
Connolly, J. M. Conrad, P. Coppin, R. Corley, P. Correa, D. F. Cowen, P.
Dave, C. De Clercq, J. J. DeLaunay, D. Delgado, S. Deng, A. Desai, P.
Desiati, K. D. de Vries, G. de Wasseige, T. DeYoung, A. Diaz, J. C.
D\'iaz-V\'elez, P. Dierichs, M. Dittmer, A. Domi, L. Draper, H. Dujmovic, K.
Dutta, M. A. DuVernois, T. Ehrhardt, L. Eidenschink, A. Eimer, P. Eller, E.
Ellinger, S. El Mentawi, D. Els\"asser, R. Engel, H. Erpenbeck, J. Evans, P.
A. Evenson, K. L. Fan, K. Fang, K. Farrag, A. R. Fazely, A. Fedynitch, N.
Feigl, S. Fiedlschuster, C. Finley, L. Fischer, D. Fox, A. Franckowiak, S.
Fukami, P. F\"urst, J. Gallagher, E. Ganster, A. Garcia, M. Garcia, G. Garg,
E. Genton, L. Gerhardt, A. Ghadimi, C. Girard-Carillo, C. Glaser, T.
Gl\"usenkamp, J. G. Gonzalez, S. Goswami, A. Granados, D. Grant, S. J. Gray,
O. Gries, S. Griffin, S. Griswold, K. M. Groth, C. G\"unther, P. Gutjahr, C.
Ha, C. Haack, A. Hallgren, L. Halve, F. Halzen, H. Hamdaoui, M. Ha Minh, M.
Handt, K. Hanson, J. Hardin, A. A. Harnisch, P. Hatch, A. Haungs, J.
H\"au{\ss}ler, K. Helbing, J. Hellrung, J. Hermannsgabner, L. Heuermann, N.
Heyer, S. Hickford, A. Hidvegi, C. Hill, G. C. Hill, K. D. Hoffman, S. Hori,
K. Hoshina, M. Hostert, W. Hou, T. Huber, K. Hultqvist, M. H\"unnefeld, R.
Hussain, K. Hymon, A. Ishihara, W. Iwakiri, M. Jacquart, S. Jain, O. Janik,
M. Jansson, G. S. Japaridze, M. Jeong, M. Jin, B. J. P. Jones, N. Kamp, D.
Kang, W. Kang, X. Kang, A. Kappes, D. Kappesser, L. Kardum, T. Karg, M. Karl,
A. Karle, A. Katil, U. Katz, M. Kauer, J. L. Kelley, M. Khanal, A. Khatee
Zathul, A. Kheirandish, J. Kiryluk, S. R. Klein, A. Kochocki, R. Koirala, H.
Kolanoski, T. Kontrimas, L. K\"opke, C. Kopper, D. J. Koskinen, P. Koundal,
M. Kovacevich, M. Kowalski, T. Kozynets, J. Krishnamoorthi, K. Kruiswijk, E.
Krupczak, A. Kumar, E. Kun, N. Kurahashi, N. Lad, C. Lagunas Gualda, M.
Lamoureux, M. J. Larson, S. Latseva, F. Lauber, J. P. Lazar, J. W. Lee, K.
Leonard DeHolton, A. Leszczy\'nska, J. Liao, M. Lincetto, Y. T. Liu, M.
Liubarska, C. Love, C. J. Lozano Mariscal, L. Lu, F. Lucarelli, W. Luszczak,
Y. Lyu, J. Madsen, E. Magnus, K. B. M. Mahn, Y. Makino, E. Manao, S. Mancina,
W. Marie Sainte, I. C. Mari\c{s}, S. Marka, Z. Marka, M. Marsee, I.
Martinez-Soler, R. Maruyama, F. Mayhew, F. McNally, J. V. Mead, K. Meagher,
S. Mechbal, A. Medina, M. Meier, Y. Merckx, L. Merten, J. Micallef, J.
Mitchell, T. Montaruli, R. W. Moore, Y. Morii, R. Morse, M. Moulai, T.
Mukherjee, R. Naab, R. Nagai, M. Nakos, U. Naumann, J. Necker, A. Negi, L.
Neste, M. Neumann, H. Niederhausen, M. U. Nisa, K. Noda, A. Noell, A.
Novikov, A. Obertacke Pollmann, V. O'Dell, B. Oeyen, A. Olivas, R. Orsoe, J.
Osborn, E. O'Sullivan, V. Palusova, H. Pandya, N. Park, G. K. Parker, E. N.
Paudel, L. Paul, C. P\'erez de los Heros, T. Pernice, J. Peterson, S.
Philippen, A. Pizzuto, M. Plum, A. Pont\'en, Y. Popovych, M. Prado Rodriguez,
B. Pries, G. C. Privon, R. Procter-Murphy, G. T. Przybylski, C. Raab, J.
Rack-Helleis, M. Ravn, K. Rawlins, Z. Rechav, A. Rehman, P. Reichherzer, E.
Resconi, S. Reusch, W. Rhode, B. Riedel, A. Rifaie, E. J. Roberts, S.
Robertson, S. Rodan, G. Roellinghoff, M. Rongen, A. Rosted, C. Rott, T. Ruhe,
L. Ruohan, D. Ryckbosch, I. Safa, J. Saffer, D. Salazar-Gallegos, P.
Sampathkumar, A. Sandrock, M. Santander, S. Sarkar, S. Sarkar, J. Savelberg,
P. Savina, P. Schaile, M. Schaufel, H. Schieler, S. Schindler, L.
Schlickmann, B. Schl\"uter, F. Schl\"uter, N. Schmeisser, T. Schmidt, J.
Schneider, F. G. Schr\"oder, L. Schumacher, S. Sclafani, D. Seckel, M. Seikh,
M. Seo, S. Seunarine, P. Sevle Myhr, R. Shah, S. Shefali, N. Shimizu, M.
Silva, B. Skrzypek, B. Smithers, R. Snihur, J. Soedingrekso, A. S{\o}gaard,
D. Soldin, P. Soldin, G. Sommani, C. Spannfellner, G. M. Spiczak, C.
Spiering, M. Stamatikos, T. Stanev, T. Stezelberger, T. St\"urwald, T.
Stuttard, G. W. Sullivan, I. Taboada, S. Ter-Antonyan, A. Terliuk, M.
Thiesmeyer, W. G. Thompson, J. Thwaites, S. Tilav, K. Tollefson, C. T\"onnis,
S. Toscano, D. Tosi, A. Trettin, R. Turcotte, J. P. Twagirayezu, M. A. Unland
Elorrieta, A. K. Upadhyay, K. Upshaw, A. Vaidyanathan, N. Valtonen-Mattila,
J. Vandenbroucke, N. van Eijndhoven, D. Vannerom, J. van Santen, J. Vara, F.
Varsi, J. Veitch-Michaelis, M. Venugopal, M. Vereecken, S. Verpoest, D.
Veske, A. Vijai, C. Walck, A. Wang, C. Weaver, P. Weigel, A. Weindl, J.
Weldert, A. Y. Wen, C. Wendt, J. Werthebach, M. Weyrauch, N. Whitehorn, C. H.
Wiebusch, D. R. Williams, L. Witthaus, A. Wolf, M. Wolf, G. Wrede, X. W. Xu,
J. P. Yanez, E. Yildizci, S. Yoshida, R. Young, S. Yu, T. Yuan, Z. Zhang, P.
Zhelnin, P. Zilberman, M. Zimmerman | Search for neutrino emission from hard X-ray AGN with IceCube | null | null | null | null | astro-ph.HE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Active Galactic Nuclei (AGN) are promising candidate sources of high-energy
astrophysical neutrinos since they provide environments rich in matter and
photon targets where cosmic ray interactions may lead to the production of
gamma rays and neutrinos. We searched for high-energy neutrino emission from
AGN using the $\textit{Swift}$-BAT Spectroscopic Survey (BASS) catalog of hard
X-ray sources and 12 years of IceCube muon track data. First, upon performing a
stacked search, no significant emission was found. Second, we searched for
neutrinos from a list of 43 candidate sources and found an excess from the
direction of two sources, Seyfert galaxies NGC 1068 and NGC 4151. We observed
NGC 1068 at flux $\phi_{\nu_{\mu}+\bar{\nu}_{\mu}}$ = $4.02_{-1.52}^{+1.58}
\times 10^{-11}$ TeV$^{-1}$ cm$^{-2}$ s$^{-1}$ normalized at 1 TeV, with
power-law spectral index, $\gamma$ = 3.10$^{+0.26}_{-0.22}$, consistent with
previous IceCube results. The observation of a neutrino excess from the
direction of NGC 4151 is at a post-trial significance of 2.9$\sigma$. If
interpreted as an astrophysical signal, the excess observed from NGC 4151
corresponds to a flux $\phi_{\nu_{\mu}+\bar{\nu}_{\mu}}$ =
$1.51_{-0.81}^{+0.99} \times 10^{-11}$ TeV$^{-1}$ cm$^{-2}$ s$^{-1}$ normalized
at 1 TeV and $\gamma$ = 2.83$^{+0.35}_{-0.28}$.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2024 18:00:04 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 01:21:01 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Abbasi",
"R.",
""
],
[
"Ackermann",
"M.",
""
],
[
"Adams",
"J.",
""
],
[
"Agarwalla",
"S. K.",
""
],
[
"Aguilar",
"J. A.",
""
],
[
"Ahlers",
"M.",
""
],
[
"Alameddine",
"J. M.",
""
],
[
"Amin",
"N. M.",
""
],
[
"Andeen",
"K.",
""
],
[
"Argüelles",
"C.",
""
],
[
"Ashida",
"Y.",
""
],
[
"Athanasiadou",
"S.",
""
],
[
"Ausborm",
"L.",
""
],
[
"Axani",
"S. N.",
""
],
[
"Bai",
"X.",
""
],
[
"V.",
"A. Balagopal",
""
],
[
"Baricevic",
"M.",
""
],
[
"Barwick",
"S. W.",
""
],
[
"Bash",
"S.",
""
],
[
"Basu",
"V.",
""
],
[
"Bay",
"R.",
""
],
[
"Beatty",
"J. J.",
""
],
[
"Tjus",
"J. Becker",
""
],
[
"Beise",
"J.",
""
],
[
"Bellenghi",
"C.",
""
],
[
"Benning",
"C.",
""
],
[
"BenZvi",
"S.",
""
],
[
"Berley",
"D.",
""
],
[
"Bernardini",
"E.",
""
],
[
"Besson",
"D. Z.",
""
],
[
"Blaufuss",
"E.",
""
],
[
"Bloom",
"L.",
""
],
[
"Blot",
"S.",
""
],
[
"Bontempo",
"F.",
""
],
[
"Motzkin",
"J. Y. Book",
""
],
[
"Meneguolo",
"C. Boscolo",
""
],
[
"Böser",
"S.",
""
],
[
"Botner",
"O.",
""
],
[
"Böttcher",
"J.",
""
],
[
"Braun",
"J.",
""
],
[
"Brinson",
"B.",
""
],
[
"Brostean-Kaiser",
"J.",
""
],
[
"Brusa",
"L.",
""
],
[
"Burley",
"R. T.",
""
],
[
"Butterfield",
"D.",
""
],
[
"Campana",
"M. A.",
""
],
[
"Caracas",
"I.",
""
],
[
"Carloni",
"K.",
""
],
[
"Carpio",
"J.",
""
],
[
"Chattopadhyay",
"S.",
""
],
[
"Chau",
"N.",
""
],
[
"Chen",
"Z.",
""
],
[
"Chirkin",
"D.",
""
],
[
"Choi",
"S.",
""
],
[
"Clark",
"B. A.",
""
],
[
"Coleman",
"A.",
""
],
[
"Collin",
"G. H.",
""
],
[
"Connolly",
"A.",
""
],
[
"Conrad",
"J. M.",
""
],
[
"Coppin",
"P.",
""
],
[
"Corley",
"R.",
""
],
[
"Correa",
"P.",
""
],
[
"Cowen",
"D. F.",
""
],
[
"Dave",
"P.",
""
],
[
"De Clercq",
"C.",
""
],
[
"DeLaunay",
"J. J.",
""
],
[
"Delgado",
"D.",
""
],
[
"Deng",
"S.",
""
],
[
"Desai",
"A.",
""
],
[
"Desiati",
"P.",
""
],
[
"de Vries",
"K. D.",
""
],
[
"de Wasseige",
"G.",
""
],
[
"DeYoung",
"T.",
""
],
[
"Diaz",
"A.",
""
],
[
"Díaz-Vélez",
"J. C.",
""
],
[
"Dierichs",
"P.",
""
],
[
"Dittmer",
"M.",
""
],
[
"Domi",
"A.",
""
],
[
"Draper",
"L.",
""
],
[
"Dujmovic",
"H.",
""
],
[
"Dutta",
"K.",
""
],
[
"DuVernois",
"M. A.",
""
],
[
"Ehrhardt",
"T.",
""
],
[
"Eidenschink",
"L.",
""
],
[
"Eimer",
"A.",
""
],
[
"Eller",
"P.",
""
],
[
"Ellinger",
"E.",
""
],
[
"Mentawi",
"S. El",
""
],
[
"Elsässer",
"D.",
""
],
[
"Engel",
"R.",
""
],
[
"Erpenbeck",
"H.",
""
],
[
"Evans",
"J.",
""
],
[
"Evenson",
"P. A.",
""
],
[
"Fan",
"K. L.",
""
],
[
"Fang",
"K.",
""
],
[
"Farrag",
"K.",
""
],
[
"Fazely",
"A. R.",
""
],
[
"Fedynitch",
"A.",
""
],
[
"Feigl",
"N.",
""
],
[
"Fiedlschuster",
"S.",
""
],
[
"Finley",
"C.",
""
],
[
"Fischer",
"L.",
""
],
[
"Fox",
"D.",
""
],
[
"Franckowiak",
"A.",
""
],
[
"Fukami",
"S.",
""
],
[
"Fürst",
"P.",
""
],
[
"Gallagher",
"J.",
""
],
[
"Ganster",
"E.",
""
],
[
"Garcia",
"A.",
""
],
[
"Garcia",
"M.",
""
],
[
"Garg",
"G.",
""
],
[
"Genton",
"E.",
""
],
[
"Gerhardt",
"L.",
""
],
[
"Ghadimi",
"A.",
""
],
[
"Girard-Carillo",
"C.",
""
],
[
"Glaser",
"C.",
""
],
[
"Glüsenkamp",
"T.",
""
],
[
"Gonzalez",
"J. G.",
""
],
[
"Goswami",
"S.",
""
],
[
"Granados",
"A.",
""
],
[
"Grant",
"D.",
""
],
[
"Gray",
"S. J.",
""
],
[
"Gries",
"O.",
""
],
[
"Griffin",
"S.",
""
],
[
"Griswold",
"S.",
""
],
[
"Groth",
"K. M.",
""
],
[
"Günther",
"C.",
""
],
[
"Gutjahr",
"P.",
""
],
[
"Ha",
"C.",
""
],
[
"Haack",
"C.",
""
],
[
"Hallgren",
"A.",
""
],
[
"Halve",
"L.",
""
],
[
"Halzen",
"F.",
""
],
[
"Hamdaoui",
"H.",
""
],
[
"Minh",
"M. Ha",
""
],
[
"Handt",
"M.",
""
],
[
"Hanson",
"K.",
""
],
[
"Hardin",
"J.",
""
],
[
"Harnisch",
"A. A.",
""
],
[
"Hatch",
"P.",
""
],
[
"Haungs",
"A.",
""
],
[
"Häußler",
"J.",
""
],
[
"Helbing",
"K.",
""
],
[
"Hellrung",
"J.",
""
],
[
"Hermannsgabner",
"J.",
""
],
[
"Heuermann",
"L.",
""
],
[
"Heyer",
"N.",
""
],
[
"Hickford",
"S.",
""
],
[
"Hidvegi",
"A.",
""
],
[
"Hill",
"C.",
""
],
[
"Hill",
"G. C.",
""
],
[
"Hoffman",
"K. D.",
""
],
[
"Hori",
"S.",
""
],
[
"Hoshina",
"K.",
""
],
[
"Hostert",
"M.",
""
],
[
"Hou",
"W.",
""
],
[
"Huber",
"T.",
""
],
[
"Hultqvist",
"K.",
""
],
[
"Hünnefeld",
"M.",
""
],
[
"Hussain",
"R.",
""
],
[
"Hymon",
"K.",
""
],
[
"Ishihara",
"A.",
""
],
[
"Iwakiri",
"W.",
""
],
[
"Jacquart",
"M.",
""
],
[
"Jain",
"S.",
""
],
[
"Janik",
"O.",
""
],
[
"Jansson",
"M.",
""
],
[
"Japaridze",
"G. S.",
""
],
[
"Jeong",
"M.",
""
],
[
"Jin",
"M.",
""
],
[
"Jones",
"B. J. P.",
""
],
[
"Kamp",
"N.",
""
],
[
"Kang",
"D.",
""
],
[
"Kang",
"W.",
""
],
[
"Kang",
"X.",
""
],
[
"Kappes",
"A.",
""
],
[
"Kappesser",
"D.",
""
],
[
"Kardum",
"L.",
""
],
[
"Karg",
"T.",
""
],
[
"Karl",
"M.",
""
],
[
"Karle",
"A.",
""
],
[
"Katil",
"A.",
""
],
[
"Katz",
"U.",
""
],
[
"Kauer",
"M.",
""
],
[
"Kelley",
"J. L.",
""
],
[
"Khanal",
"M.",
""
],
[
"Zathul",
"A. Khatee",
""
],
[
"Kheirandish",
"A.",
""
],
[
"Kiryluk",
"J.",
""
],
[
"Klein",
"S. R.",
""
],
[
"Kochocki",
"A.",
""
],
[
"Koirala",
"R.",
""
],
[
"Kolanoski",
"H.",
""
],
[
"Kontrimas",
"T.",
""
],
[
"Köpke",
"L.",
""
],
[
"Kopper",
"C.",
""
],
[
"Koskinen",
"D. J.",
""
],
[
"Koundal",
"P.",
""
],
[
"Kovacevich",
"M.",
""
],
[
"Kowalski",
"M.",
""
],
[
"Kozynets",
"T.",
""
],
[
"Krishnamoorthi",
"J.",
""
],
[
"Kruiswijk",
"K.",
""
],
[
"Krupczak",
"E.",
""
],
[
"Kumar",
"A.",
""
],
[
"Kun",
"E.",
""
],
[
"Kurahashi",
"N.",
""
],
[
"Lad",
"N.",
""
],
[
"Gualda",
"C. Lagunas",
""
],
[
"Lamoureux",
"M.",
""
],
[
"Larson",
"M. J.",
""
],
[
"Latseva",
"S.",
""
],
[
"Lauber",
"F.",
""
],
[
"Lazar",
"J. P.",
""
],
[
"Lee",
"J. W.",
""
],
[
"DeHolton",
"K. Leonard",
""
],
[
"Leszczyńska",
"A.",
""
],
[
"Liao",
"J.",
""
],
[
"Lincetto",
"M.",
""
],
[
"Liu",
"Y. T.",
""
],
[
"Liubarska",
"M.",
""
],
[
"Love",
"C.",
""
],
[
"Mariscal",
"C. J. Lozano",
""
],
[
"Lu",
"L.",
""
],
[
"Lucarelli",
"F.",
""
],
[
"Luszczak",
"W.",
""
],
[
"Lyu",
"Y.",
""
],
[
"Madsen",
"J.",
""
],
[
"Magnus",
"E.",
""
],
[
"Mahn",
"K. B. M.",
""
],
[
"Makino",
"Y.",
""
],
[
"Manao",
"E.",
""
],
[
"Mancina",
"S.",
""
],
[
"Sainte",
"W. Marie",
""
],
[
"Mariş",
"I. C.",
""
],
[
"Marka",
"S.",
""
],
[
"Marka",
"Z.",
""
],
[
"Marsee",
"M.",
""
],
[
"Martinez-Soler",
"I.",
""
],
[
"Maruyama",
"R.",
""
],
[
"Mayhew",
"F.",
""
],
[
"McNally",
"F.",
""
],
[
"Mead",
"J. V.",
""
],
[
"Meagher",
"K.",
""
],
[
"Mechbal",
"S.",
""
],
[
"Medina",
"A.",
""
],
[
"Meier",
"M.",
""
],
[
"Merckx",
"Y.",
""
],
[
"Merten",
"L.",
""
],
[
"Micallef",
"J.",
""
],
[
"Mitchell",
"J.",
""
],
[
"Montaruli",
"T.",
""
],
[
"Moore",
"R. W.",
""
],
[
"Morii",
"Y.",
""
],
[
"Morse",
"R.",
""
],
[
"Moulai",
"M.",
""
],
[
"Mukherjee",
"T.",
""
],
[
"Naab",
"R.",
""
],
[
"Nagai",
"R.",
""
],
[
"Nakos",
"M.",
""
],
[
"Naumann",
"U.",
""
],
[
"Necker",
"J.",
""
],
[
"Negi",
"A.",
""
],
[
"Neste",
"L.",
""
],
[
"Neumann",
"M.",
""
],
[
"Niederhausen",
"H.",
""
],
[
"Nisa",
"M. U.",
""
],
[
"Noda",
"K.",
""
],
[
"Noell",
"A.",
""
],
[
"Novikov",
"A.",
""
],
[
"Pollmann",
"A. Obertacke",
""
],
[
"O'Dell",
"V.",
""
],
[
"Oeyen",
"B.",
""
],
[
"Olivas",
"A.",
""
],
[
"Orsoe",
"R.",
""
],
[
"Osborn",
"J.",
""
],
[
"O'Sullivan",
"E.",
""
],
[
"Palusova",
"V.",
""
],
[
"Pandya",
"H.",
""
],
[
"Park",
"N.",
""
],
[
"Parker",
"G. K.",
""
],
[
"Paudel",
"E. N.",
""
],
[
"Paul",
"L.",
""
],
[
"Heros",
"C. Pérez de los",
""
],
[
"Pernice",
"T.",
""
],
[
"Peterson",
"J.",
""
],
[
"Philippen",
"S.",
""
],
[
"Pizzuto",
"A.",
""
],
[
"Plum",
"M.",
""
],
[
"Pontén",
"A.",
""
],
[
"Popovych",
"Y.",
""
],
[
"Rodriguez",
"M. Prado",
""
],
[
"Pries",
"B.",
""
],
[
"Privon",
"G. C.",
""
],
[
"Procter-Murphy",
"R.",
""
],
[
"Przybylski",
"G. T.",
""
],
[
"Raab",
"C.",
""
],
[
"Rack-Helleis",
"J.",
""
],
[
"Ravn",
"M.",
""
],
[
"Rawlins",
"K.",
""
],
[
"Rechav",
"Z.",
""
],
[
"Rehman",
"A.",
""
],
[
"Reichherzer",
"P.",
""
],
[
"Resconi",
"E.",
""
],
[
"Reusch",
"S.",
""
],
[
"Rhode",
"W.",
""
],
[
"Riedel",
"B.",
""
],
[
"Rifaie",
"A.",
""
],
[
"Roberts",
"E. J.",
""
],
[
"Robertson",
"S.",
""
],
[
"Rodan",
"S.",
""
],
[
"Roellinghoff",
"G.",
""
],
[
"Rongen",
"M.",
""
],
[
"Rosted",
"A.",
""
],
[
"Rott",
"C.",
""
],
[
"Ruhe",
"T.",
""
],
[
"Ruohan",
"L.",
""
],
[
"Ryckbosch",
"D.",
""
],
[
"Safa",
"I.",
""
],
[
"Saffer",
"J.",
""
],
[
"Salazar-Gallegos",
"D.",
""
],
[
"Sampathkumar",
"P.",
""
],
[
"Sandrock",
"A.",
""
],
[
"Santander",
"M.",
""
],
[
"Sarkar",
"S.",
""
],
[
"Sarkar",
"S.",
""
],
[
"Savelberg",
"J.",
""
],
[
"Savina",
"P.",
""
],
[
"Schaile",
"P.",
""
],
[
"Schaufel",
"M.",
""
],
[
"Schieler",
"H.",
""
],
[
"Schindler",
"S.",
""
],
[
"Schlickmann",
"L.",
""
],
[
"Schlüter",
"B.",
""
],
[
"Schlüter",
"F.",
""
],
[
"Schmeisser",
"N.",
""
],
[
"Schmidt",
"T.",
""
],
[
"Schneider",
"J.",
""
],
[
"Schröder",
"F. G.",
""
],
[
"Schumacher",
"L.",
""
],
[
"Sclafani",
"S.",
""
],
[
"Seckel",
"D.",
""
],
[
"Seikh",
"M.",
""
],
[
"Seo",
"M.",
""
],
[
"Seunarine",
"S.",
""
],
[
"Myhr",
"P. Sevle",
""
],
[
"Shah",
"R.",
""
],
[
"Shefali",
"S.",
""
],
[
"Shimizu",
"N.",
""
],
[
"Silva",
"M.",
""
],
[
"Skrzypek",
"B.",
""
],
[
"Smithers",
"B.",
""
],
[
"Snihur",
"R.",
""
],
[
"Soedingrekso",
"J.",
""
],
[
"Søgaard",
"A.",
""
],
[
"Soldin",
"D.",
""
],
[
"Soldin",
"P.",
""
],
[
"Sommani",
"G.",
""
],
[
"Spannfellner",
"C.",
""
],
[
"Spiczak",
"G. M.",
""
],
[
"Spiering",
"C.",
""
],
[
"Stamatikos",
"M.",
""
],
[
"Stanev",
"T.",
""
],
[
"Stezelberger",
"T.",
""
],
[
"Stürwald",
"T.",
""
],
[
"Stuttard",
"T.",
""
],
[
"Sullivan",
"G. W.",
""
],
[
"Taboada",
"I.",
""
],
[
"Ter-Antonyan",
"S.",
""
],
[
"Terliuk",
"A.",
""
],
[
"Thiesmeyer",
"M.",
""
],
[
"Thompson",
"W. G.",
""
],
[
"Thwaites",
"J.",
""
],
[
"Tilav",
"S.",
""
],
[
"Tollefson",
"K.",
""
],
[
"Tönnis",
"C.",
""
],
[
"Toscano",
"S.",
""
],
[
"Tosi",
"D.",
""
],
[
"Trettin",
"A.",
""
],
[
"Turcotte",
"R.",
""
],
[
"Twagirayezu",
"J. P.",
""
],
[
"Elorrieta",
"M. A. Unland",
""
],
[
"Upadhyay",
"A. K.",
""
],
[
"Upshaw",
"K.",
""
],
[
"Vaidyanathan",
"A.",
""
],
[
"Valtonen-Mattila",
"N.",
""
],
[
"Vandenbroucke",
"J.",
""
],
[
"van Eijndhoven",
"N.",
""
],
[
"Vannerom",
"D.",
""
],
[
"van Santen",
"J.",
""
],
[
"Vara",
"J.",
""
],
[
"Varsi",
"F.",
""
],
[
"Veitch-Michaelis",
"J.",
""
],
[
"Venugopal",
"M.",
""
],
[
"Vereecken",
"M.",
""
],
[
"Verpoest",
"S.",
""
],
[
"Veske",
"D.",
""
],
[
"Vijai",
"A.",
""
],
[
"Walck",
"C.",
""
],
[
"Wang",
"A.",
""
],
[
"Weaver",
"C.",
""
],
[
"Weigel",
"P.",
""
],
[
"Weindl",
"A.",
""
],
[
"Weldert",
"J.",
""
],
[
"Wen",
"A. Y.",
""
],
[
"Wendt",
"C.",
""
],
[
"Werthebach",
"J.",
""
],
[
"Weyrauch",
"M.",
""
],
[
"Whitehorn",
"N.",
""
],
[
"Wiebusch",
"C. H.",
""
],
[
"Williams",
"D. R.",
""
],
[
"Witthaus",
"L.",
""
],
[
"Wolf",
"A.",
""
],
[
"Wolf",
"M.",
""
],
[
"Wrede",
"G.",
""
],
[
"Xu",
"X. W.",
""
],
[
"Yanez",
"J. P.",
""
],
[
"Yildizci",
"E.",
""
],
[
"Yoshida",
"S.",
""
],
[
"Young",
"R.",
""
],
[
"Yu",
"S.",
""
],
[
"Yuan",
"T.",
""
],
[
"Zhang",
"Z.",
""
],
[
"Zhelnin",
"P.",
""
],
[
"Zilberman",
"P.",
""
],
[
"Zimmerman",
"M.",
""
]
] |
2406.06754 | Chao Zhang | Chao Zhang, Angela Bonifati, M. Tamer \"Ozsu | Incremental Sliding Window Connectivity over Streaming Graphs | To appear in VLDB 2024 | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study index-based processing for connectivity queries within sliding
windows on streaming graphs. These queries, which determine whether two
vertices belong to the same connected component, are fundamental operations in
real-time graph data processing and demand high throughput and low latency.
While indexing methods that leverage data structures for fully dynamic
connectivity can facilitate efficient query processing, they encounter
significant challenges with deleting expired edges from the window during
window updates. We introduce a novel indexing approach that eliminates the need
for physically performing edge deletions. This is achieved through a unique
bidirectional incremental computation framework, referred to as the BIC model.
The BIC model implements two distinct incremental computations to compute
connected components within the window, operating along and against the
timeline, respectively. These computations are then merged to efficiently
compute queries in the window. We propose techniques for optimized index
storage, incremental index updates, and efficient query processing to improve
BIC effectiveness. Empirically, BIC achieves a 14$\times$ increase in
throughput and a reduction in P95 latency by up to 3900$\times$ when compared
to state-of-the-art indexes.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2024 19:33:13 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jun 2024 20:57:51 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Zhang",
"Chao",
""
],
[
"Bonifati",
"Angela",
""
],
[
"Özsu",
"M. Tamer",
""
]
] |
2406.06764 | Matteo Esposito | Matteo Esposito, Maryam Tavassoli Sabzevari, Boshuai Ye, Davide
Falessi, Arif Ali Khan, Davide Taibi | $Classi|Q\rangle$ Towards a Translation Framework To Bridge The
Classical-Quantum Programming Gap | null | null | 10.1145/3663531.3664752 | null | cs.SE cs.CL cs.ET cs.PL | http://creativecommons.org/licenses/by/4.0/ | Quantum computing, albeit readily available as hardware or emulated on the
cloud, is still far from being available in general regarding complex
programming paradigms and learning curves. This vision paper introduces
$Classi|Q\rangle$, a translation framework idea to bridge Classical and Quantum
Computing by translating high-level programming languages, e.g., Python or C++,
into a low-level language, e.g., Quantum Assembly. Our idea paper serves as a
blueprint for ongoing efforts in quantum software engineering, offering a
roadmap for further $Classi|Q\rangle$ development to meet the diverse needs of
researchers and practitioners. $Classi|Q\rangle$ is designed to empower
researchers and practitioners with no prior quantum experience to harness the
potential of hybrid quantum computation. We also discuss future enhancements to
$Classi|Q\rangle$, including support for additional quantum languages, improved
optimization strategies, and integration with emerging quantum computing
platforms.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2024 19:50:16 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jun 2024 19:31:16 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Esposito",
"Matteo",
""
],
[
"Sabzevari",
"Maryam Tavassoli",
""
],
[
"Ye",
"Boshuai",
""
],
[
"Falessi",
"Davide",
""
],
[
"Khan",
"Arif Ali",
""
],
[
"Taibi",
"Davide",
""
]
] |
2406.06777 | Khiem Le | Khiem Le, Zhichun Guo, Kaiwen Dong, Xiaobao Huang, Bozhao Nan, Roshni
Iyer, Xiangliang Zhang, Olaf Wiest, Wei Wang, Nitesh V. Chawla | MolX: Enhancing Large Language Models for Molecular Learning with A
Multi-Modal Extension | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Recently, Large Language Models (LLMs) with their strong task-handling
capabilities have shown remarkable advancements across a spectrum of fields,
moving beyond natural language understanding. However, their proficiency within
the chemistry domain remains restricted, especially in solving professional
molecule-related tasks. This challenge is attributed to their inherent
limitations in comprehending molecules using only common textual
representations, i.e., SMILES strings. In this study, we seek to enhance the
ability of LLMs to comprehend molecules by designing and equipping them with a
multi-modal external module, namely MolX. In particular, instead of directly
using a SMILES string to represent a molecule, we utilize specific encoders to
extract fine-grained features from both SMILES string and 2D molecular graph
representations for feeding into an LLM. Moreover, a human-defined molecular
fingerprint is incorporated to leverage its embedded domain knowledge. Then, to
establish an alignment between MolX and the LLM's textual input space, the
whole model in which the LLM is frozen, is pre-trained with a versatile
strategy including a diverse set of tasks. Extensive experimental evaluations
demonstrate that our proposed method only introduces a small number of
trainable parameters while outperforming baselines on various downstream
molecule-related tasks ranging from molecule-to-text translation to
retrosynthesis, with and without fine-tuning the LLM.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2024 20:25:18 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 03:54:49 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Le",
"Khiem",
""
],
[
"Guo",
"Zhichun",
""
],
[
"Dong",
"Kaiwen",
""
],
[
"Huang",
"Xiaobao",
""
],
[
"Nan",
"Bozhao",
""
],
[
"Iyer",
"Roshni",
""
],
[
"Zhang",
"Xiangliang",
""
],
[
"Wiest",
"Olaf",
""
],
[
"Wang",
"Wei",
""
],
[
"Chawla",
"Nitesh V.",
""
]
] |
2406.06852 | Shuai Zhao | Shuai Zhao, Meihuizi Jia, Zhongliang Guo, Leilei Gan, Jie Fu, Yichao
Feng, Fengjun Pan, Luu Anh Tuan | A Survey of Backdoor Attacks and Defenses on Large Language Models:
Implications for Security Measures | null | null | null | null | cs.CR cs.AI cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The large language models (LLMs), which bridge the gap between human language
understanding and complex problem-solving, achieve state-of-the-art performance
on several NLP tasks, particularly in few-shot and zero-shot settings. Despite
the demonstrable efficacy of LMMs, due to constraints on computational
resources, users have to engage with open-source language models or outsource
the entire training process to third-party platforms. However, research has
demonstrated that language models are susceptible to potential security
vulnerabilities, particularly in backdoor attacks. Backdoor attacks are
designed to introduce targeted vulnerabilities into language models by
poisoning training samples or model weights, allowing attackers to manipulate
model responses through malicious triggers. While existing surveys on backdoor
attacks provide a comprehensive overview, they lack an in-depth examination of
backdoor attacks specifically targeting LLMs. To bridge this gap and grasp the
latest trends in the field, this paper presents a novel perspective on backdoor
attacks for LLMs by focusing on fine-tuning methods. Specifically, we
systematically classify backdoor attacks into three categories: full-parameter
fine-tuning, parameter-efficient fine-tuning, and attacks without fine-tuning.
Based on insights from a substantial review, we also discuss crucial issues for
future research on backdoor attacks, such as further exploring attack
algorithms that do not require fine-tuning, or developing more covert attack
algorithms.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2024 23:54:21 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 08:52:44 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Zhao",
"Shuai",
""
],
[
"Jia",
"Meihuizi",
""
],
[
"Guo",
"Zhongliang",
""
],
[
"Gan",
"Leilei",
""
],
[
"Fu",
"Jie",
""
],
[
"Feng",
"Yichao",
""
],
[
"Pan",
"Fengjun",
""
],
[
"Tuan",
"Luu Anh",
""
]
] |
2406.06866 | Pavel Fileviez Perez | Pavel Fileviez Perez | On Lepton and Baryon Numbers as Local Gauge Symmetries | null | null | null | null | hep-ph hep-ex | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A simple theory where the total lepton number is a local gauge symmetry is
proposed. In this context, the gauge anomalies are cancelled with the minimal
number of extra fermionic fields and one predicts that the neutrinos are
Majorana fermions. The properties of the neutrino sector are discussed showing
that this theory predicts a $3+2$ light neutrino sector. We show that using the
same fermionic fields one can gauge the baryon number and define a simple
theory where the lepton and baryon numbers can be spontaneously broken at the
low scale in agreement with experiments.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 00:42:12 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Perez",
"Pavel Fileviez",
""
]
] |
2406.06870 | Venkat Venkatasubramanian | Venkat Venkatasubramanian | What's in an embedding? Would a rose by any embedding smell as sweet? | 7 pages, 9 images | null | null | null | cs.AI cs.CL | http://creativecommons.org/licenses/by/4.0/ | Large Language Models (LLMs) are often criticized for lacking true
"understanding" and an ability to "reason" with their knowledge, being seen
merely as advanced autocomplete systems. We believe that this perspective might
be missing an important insight. We suggest that LLMs do develop a kind of
empirical "understanding" that is "geometry"-like, which seems quite sufficient
for a range of applications in NLP, computer vision, coding assistance, etc.
However, this "geometric" understanding, built from incomplete and noisy data,
makes them unreliable, difficult to generalize, and lacking in inference
capabilities and explanations, similar to the challenges faced by
heuristics-based expert systems decades ago.
To overcome these limitations, we suggest that LLMs should be integrated with
an "algebraic" representation of knowledge that includes symbolic AI elements
used in expert systems. This integration aims to create large knowledge models
(LKMs) that not only possess "deep" knowledge grounded in first principles, but
also have the ability to reason and explain, mimicking human expert
capabilities. To harness the full potential of generative AI safely and
effectively, a paradigm shift from LLMs to the more comprehensive LKMs is
needed.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 01:10:40 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jun 2024 18:38:13 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Venkatasubramanian",
"Venkat",
""
]
] |
2406.06881 | Manuel Goul\~ao | Manuel Goul\~ao and David Elkouss | Pseudo-Entanglement is Necessary for EFI Pairs | arXiv admin note: text overlap with arXiv:2310.02783 by other authors | null | null | null | quant-ph cs.CR | http://creativecommons.org/licenses/by/4.0/ | Regarding minimal assumptions, most of classical cryptography is known to
depend on the existence of One-Way Functions (OWFs). However, recent evidence
has shown that this is not the case when considering quantum resources. Besides
the well known unconditional security of Quantum Key Distribution, it is now
known that computational cryptography may be built on weaker primitives than
OWFs, e.g., pseudo-random states [JLS18], one-way state generators [MY23], or
EFI pairs of states [BCQ23]. We consider a new quantum resource,
pseudo-entanglement, and show that the existence of EFI pairs, one of the
current main candidates for the weakest computational assumption for
cryptography (necessary for commitments, oblivious transfer, secure multi-party
computation, computational zero-knowledge proofs), implies the existence of
pseudo-entanglement, as defined by [ABF+24, ABV23] under some reasonable
adaptations. We prove this by constructing a new family of pseudo-entangled
quantum states given only EFI pairs. Our result has important implications for
the field of computational cryptography. It shows that if pseudo-entanglement
does not exist, then most of cryptography cannot exist either. Moreover, it
establishes pseudo-entanglement as a new minimal assumption for most of
computational cryptography, which may pave the way for the unification of other
assumptions into a single primitive. Finally, pseudo-entanglement connects
physical phenomena and efficient computation, thus, our result strengthens the
connection between cryptography and the physical world.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 01:44:16 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Goulão",
"Manuel",
""
],
[
"Elkouss",
"David",
""
]
] |
2406.06953 | Weiqing Xiao | Weiqing Xiao, Wei Zhao | Stepwise Regression and Pre-trained Edge for Robust Stereo Matching | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Due to the difficulty in obtaining real samples and ground truth, the
generalization performance and the fine-tuned performance are critical for the
feasibility of stereo matching methods in real-world applications. However, the
presence of substantial disparity distributions and density variations across
different datasets presents significant challenges for the generalization and
fine-tuning of the model. In this paper, we propose a novel stereo matching
method, called SR-Stereo, which mitigates the distributional differences across
different datasets by predicting the disparity clips and uses a loss weight
related to the regression target scale to improve the accuracy of the disparity
clips. Moreover, this stepwise regression architecture can be easily extended
to existing iteration-based methods to improve the performance without changing
the structure. In addition, to mitigate the edge blurring of the fine-tuned
model on sparse ground truth, we propose Domain Adaptation Based on Pre-trained
Edges (DAPE). Specifically, we use the predicted disparity and RGB image to
estimate the edge map of the target domain image. The edge map is filtered to
generate edge map background pseudo-labels, which together with the sparse
ground truth disparity on the target domain are used as a supervision to
jointly fine-tune the pre-trained stereo matching model. These proposed methods
are extensively evaluated on SceneFlow, KITTI, Middbury 2014 and ETH3D. The
SR-Stereo achieves competitive disparity estimation performance and
state-of-the-art cross-domain generalisation performance. Meanwhile, the
proposed DAPE significantly improves the disparity estimation performance of
fine-tuned models, especially in the textureless and detail regions.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 05:25:25 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 13:11:29 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Xiao",
"Weiqing",
""
],
[
"Zhao",
"Wei",
""
]
] |
2406.06992 | Heinrich Dinkel | Heinrich Dinkel, Zhiyong Yan, Yongqing Wang, Junbo Zhang, Yujun Wang,
Bin Wang | Scaling up masked audio encoder learning for general audio
classification | Interspeech 2024 | null | null | null | cs.SD eess.AS | http://creativecommons.org/licenses/by/4.0/ | Despite progress in audio classification, a generalization gap remains
between speech and other sound domains, such as environmental sounds and music.
Models trained for speech tasks often fail to perform well on environmental or
musical audio tasks, and vice versa. While self-supervised (SSL) audio
representations offer an alternative, there has been limited exploration of
scaling both model and dataset sizes for SSL-based general audio
classification. We introduce Dasheng, a simple SSL audio encoder, based on the
efficient masked autoencoder framework. Trained with 1.2 billion parameters on
272,356 hours of diverse audio, Dasheng obtains significant performance gains
on the HEAR benchmark. It outperforms previous works on CREMA-D, LibriCount,
Speech Commands, VoxLingua, and competes well in music and environment
classification. Dasheng features inherently contain rich speech, music, and
environmental information, as shown in nearest-neighbor classification
experiments. Code is available https://github.com/richermans/dasheng/.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 06:44:54 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 04:38:02 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Dinkel",
"Heinrich",
""
],
[
"Yan",
"Zhiyong",
""
],
[
"Wang",
"Yongqing",
""
],
[
"Zhang",
"Junbo",
""
],
[
"Wang",
"Yujun",
""
],
[
"Wang",
"Bin",
""
]
] |
2406.07022 | Angela Bragaglia | A. Bragaglia (1), V. D'Orazi (2,3), L. Magrini (4), M. Baratella (5),
T. Bensby (6), S. Martell (7,8), S. Randich (4), G. Tautvaisiene (9), E.J.
Alfaro (10), L. Morbidelli (4), R. Smiljanic (11), S. Zaggia (2) (1-INAF-OAS
Bologna, 2-INAF-OA Padova, 3-Uni. Tor. Vergata, 4-INAF-OA Arcetri, 5-ESO
Santiago, 6-Lund Obs., 7-Uni NSW. Sidney, 8-ASTRO-3D Australia, 9-Uni.
Vilnius, 10-IAA Granada, 11-NCAC Warsaw) | The Gaia-ESO Survey: No sign of multiple stellar populations in open
clusters from their sodium and oxygen abundances | Based on the Gaia-ESO Survey. In press on Astronomy & Astrophysics.
Figure A.2 updated | null | null | null | astro-ph.SR astro-ph.GA | http://creativecommons.org/licenses/by/4.0/ | Context: The light element (anti-)correlations shown by globular clusters
(GCs) are the main spectroscopic signature of multiple stellar populations.
These internal abundance variations provide us with fundamental constraints on
the formation mechanism of stellar clusters. Aims: Using Gaia-ESO, the largest
and most homogeneous survey of open clusters (OCs), we intend to check whether
these stellar aggregates display the same patterns. Based on previous studies
of many GCs, several young and massive clusters in the Magellanic Clouds, as
well as a few OCs, we do not expect to find any anti-correlation, given the low
mass of Milky Way OCs. Methods: We used the results based on UVES spectra of
stars in Gaia-ESO to derive the distribution of Na and O abundances and
seevwhether they show an unexplained dispersion or whether they are
anti-correlated. By selecting only high-probability members with high-precision
stellar parameters, we ended up with more than 700 stars in 74 OCs. We examined
the O-Na distribution in 28 OCsvwith at least 4 stars available as well as the
Na distribution in 24 OCs, with at least 10 stars available. Results: We find
that the distribution of Na abundances is compatible with a single-value
population, within the errors. The fewvapparent exceptions can be explained by
differences in the evolutionary phase (main sequence and giant post first
dredge-up episode) or by difficulties in analysing low gravity giants. We did
not find any indication of an Na-O anti-correlation in any of the clusters for
which O has been derived. Conclusions: Based on the very small spread we find,
OCs maintain the status of single stellar populations. However, a definitive
answer requires studying more elements and larger samples covering different
evolutionary phases. This will be possible with the next generation of large
surveys
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 07:26:30 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 11:04:31 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Bragaglia",
"A.",
""
],
[
"D'Orazi",
"V.",
""
],
[
"Magrini",
"L.",
""
],
[
"Baratella",
"M.",
""
],
[
"Bensby",
"T.",
""
],
[
"Martell",
"S.",
""
],
[
"Randich",
"S.",
""
],
[
"Tautvaisiene",
"G.",
""
],
[
"Alfaro",
"E. J.",
""
],
[
"Morbidelli",
"L.",
""
],
[
"Smiljanic",
"R.",
""
],
[
"Zaggia",
"S.",
""
]
] |
2406.07031 | Weile Chen | Weile Chen, Haibo Du, Shihua Li and Xinghuo Yu | Arbitrary-Order Distributed Finite-Time Differentiator for Multi-Agent
Systems | Because there are some mistakes in the expression of the article, in
order not to mislead readers, I apply for withdrawal | null | null | null | cs.MA | http://creativecommons.org/licenses/by/4.0/ | This paper proposes arbitrary-order distributed finite-time differentiator
(AODFD) for leader-follower multi-agent systems (MAS) under directed graph by
only using relative or absolute output information. By using arbitrary-order
distributed finite-time differentiator via relative output information
(AODFD-R), each follower agent can obtain the relative output information
between itself and leader and the relative output's arbitrary-order
derivatives, where the information to be measured is only the local relative
output information between each follower agent and its neighboring agents. As a
simple extension of AODFD-R, the arbitrary-order distributed finite-time
differentiator via absolute output information (AODFD-A) is also given. The
finite-time stability of the closed-loop system under AODFD is proved by
constructing a Lyapunov function skillfully. Finally, several simulation
examples are given to verify the effectiveness of the AODFD.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 07:40:46 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 06:49:15 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Chen",
"Weile",
""
],
[
"Du",
"Haibo",
""
],
[
"Li",
"Shihua",
""
],
[
"Yu",
"Xinghuo",
""
]
] |
2406.07079 | Stjepan \v{S}ebek | Stjepan \v{S}ebek | Convex hull of Brownian motion and Brownian bridge | 13 pages. arXiv admin note: text overlap with arXiv:0912.0631 by
other authors | null | null | null | math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article we study the convex hull spanned by the union of trajectories
of a standard planar Brownian motion, and an independent standard planar
Brownian bridge. We find exact values of the expectation of perimeter and area
of such a convex hull. As an auxiliary result, that is of interest in its own
right, we provide an explicit shape of the probability density function of a
random variable that represents the time when combined maximum of a standard
one-dimensional Brownian motion, and an independent standard one-dimensional
Brownian bridge is attained. At the end, we generalize our results to the case
of multiple independent standard planar Brownian motions and Brownian bridges.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 09:08:09 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Šebek",
"Stjepan",
""
]
] |
2406.07146 | Che Liu | Che Liu, Zhongwei Wan, Yuqi Wang, Hui Shen, Haozhe Wang, Kangyu Zheng,
Mi Zhang, Rossella Arcucci | Benchmarking and Boosting Radiology Report Generation for 3D
High-Resolution Medical Images | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Automatic radiology report generation can significantly benefit the
labor-intensive process of report writing by radiologists, especially for 3D
radiographs like CT scans, which are crucial for broad clinical diagnostics yet
underexplored compared to 2D radiographs. Existing methods often handle 3D
volumes either slice-wise or with aggressive downsampling due to current GPU
memory limitations, which results in a loss of the inherent 3D nature and
critical details. To overcome these issues, we introduce a novel framework that
efficiently and effectively generates radiology reports for high-resolution
(HR) 3D volumes, based on large language models (LLMs). Specifically, our
framework utilizes low-resolution (LR) visual tokens as queries to mine
information from HR tokens, preserving detailed HR information while reducing
computational costs by only processing HR informed LR visual queries. Further
benefiting the field, we curate and release BIMCV-RG, a new dataset with 5,328
HR 3D volumes and paired reports, establishing the first benchmarks for report
generation from 3D HR medical images. Our method consistently surpasses
existing methods on this benchmark across three different settings:
normal-resolution, high-resolution inputs, and zero-shot domain transfer, all
at an acceptable computational cost, trainable on a single A100-80G.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 10:45:59 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jun 2024 18:00:21 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Liu",
"Che",
""
],
[
"Wan",
"Zhongwei",
""
],
[
"Wang",
"Yuqi",
""
],
[
"Shen",
"Hui",
""
],
[
"Wang",
"Haozhe",
""
],
[
"Zheng",
"Kangyu",
""
],
[
"Zhang",
"Mi",
""
],
[
"Arcucci",
"Rossella",
""
]
] |
2406.07195 | Luana Liberato Dr | Luana Liberato, Paolo Tanga, David Mary, Kate Minker, Benoit Carry,
Federica Spoto, Przemyslaw Bartczak, Bruno Sicardy, Dagmara Oszkiewicz,
Josselin Desmars | Binary asteroid candidates in Gaia DR3 astrometry | 25 pages, 29 figures, Online table currently available at
https://lagrange.oca.eu/fr/gaiamoons | null | null | null | astro-ph.EP astro-ph.IM physics.data-an | http://creativecommons.org/licenses/by/4.0/ | Asteroids with companions constitute an excellent sample for studying the
collisional and dynamical evolution of minor planets. The currently known
binary population were discovered by different complementary techniques that
produce, for the moment, a strongly biased distribution, especially in a range
of intermediate asteroid sizes (approximately 20 to 100 km) where both mutual
photometric events and high-resolution adaptive optic imaging are poorly
efficient. A totally independent technique of binary asteroid discovery, based
on astrometry, can help to reveal new binary systems and populate a range of
sizes and separations that remain nearly unexplored. In this work, we describe
a dedicated period detection method and its results for the Gaia DR3 data set.
This method looks for the presence of a periodic signature in the orbit
post-fit residuals. After conservative filtering and validation based on
statistical and physical criteria, we are able to present a first sample of
astrometric binary candidates, to be confirmed by other observation techniques
such as photometric light curves and stellar occultations.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 12:10:57 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 09:03:02 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Liberato",
"Luana",
""
],
[
"Tanga",
"Paolo",
""
],
[
"Mary",
"David",
""
],
[
"Minker",
"Kate",
""
],
[
"Carry",
"Benoit",
""
],
[
"Spoto",
"Federica",
""
],
[
"Bartczak",
"Przemyslaw",
""
],
[
"Sicardy",
"Bruno",
""
],
[
"Oszkiewicz",
"Dagmara",
""
],
[
"Desmars",
"Josselin",
""
]
] |
2406.07213 | Qiong Wu | Zhiyu Shao, Qiong Wu, Pingyi Fan, Nan Cheng, Wen Chen, Jiangzhou Wang,
Khaled B. Letaief | Semantic-Aware Spectrum Sharing in Internet of Vehicles Based on Deep
Reinforcement Learning | This paper has been submitted to IEEE Journal. The source code has
been released at:
https://github.com/qiongwu86/Semantic-Aware-Spectrum-Sharing-in-Internet-of-Vehicles-Based-on-Deep-Reinforcement-Learning | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work aims to investigate semantic communication in high-speed mobile
Internet of vehicles (IoV) environments, with a focus on the spectrum sharing
between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I)
communications. We specifically address spectrum scarcity and network traffic
and then propose a semantic-aware spectrum sharing algorithm (SSS) based on the
deep reinforcement learning (DRL) soft actor-critic (SAC) approach. Firstly, we
delve into the extraction of semantic information. Secondly, we redefine
metrics for semantic information in V2V and V2I spectrum sharing in IoV
environments, introducing high-speed semantic spectrum efficiency (HSSE) and
semantic transmission rate (HSR). Finally, we employ the SAC algorithm for
decision optimization in V2V and V2I spectrum sharing based on semantic
information. This optimization encompasses the optimal link of V2V and V2I
sharing strategies, the transmission power for vehicles sending semantic
information and the length of transmitted semantic symbols, aiming at
maximizing HSSE of V2I and enhancing success rate of effective semantic
information transmission (SRS) of V2V. Experimental results demonstrate that
the SSS algorithm outperforms other baseline algorithms, including other
traditional-communication-based spectrum sharing algorithms and spectrum
sharing algorithm using other reinforcement learning approaches. The SSS
algorithm exhibits a 15% increase in HSSE and approximately a 7% increase in
SRS.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 12:42:41 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 11:20:07 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Shao",
"Zhiyu",
""
],
[
"Wu",
"Qiong",
""
],
[
"Fan",
"Pingyi",
""
],
[
"Cheng",
"Nan",
""
],
[
"Chen",
"Wen",
""
],
[
"Wang",
"Jiangzhou",
""
],
[
"Letaief",
"Khaled B.",
""
]
] |
2406.07218 | Vjekoslav Kova\v{c} | Vjekoslav Kova\v{c} | On eventually greedy best underapproximations by Egyptian fractions | 7 pages; v2 corrects the history of the claim for rational numbers | null | null | null | math.NT math.CA math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Erd\H{o}s and Graham found it conceivable that the best $n$-term Egyptian
underapproximation of almost every positive number for sufficiently large $n$
gets constructed in a greedy manner, i.e., from the best $(n-1)$-term Egyptian
underapproximation. We show that the opposite is true: the set of real numbers
with this property has Lebesgue measure zero. [This note solves Problem 206 on
Bloom's website "Erd\H{o}s problems".]
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 12:53:57 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 15:22:45 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Kovač",
"Vjekoslav",
""
]
] |
2406.07322 | Jean-Christophe Pain | Jean-Christophe Pain | A derivation of Dickson polynomials using the Cayley-Hamilton theorem | null | null | null | null | math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this note, the first-order Dickson polynomials are introduced through a
particular case of the expression of the trace of the $n^{th}$ power of a
matrix in terms of powers of the trace and determinant of the matrix itself.
The technique relies on the Cayley-Hamilton theorem and its application to the
derivation of formulas due to Carlitz and to second-order Dickson polynomials
is straightforward. Finally, generalization of Dickson polynomials over finite
fields and multivariate Dickson polynomials are evoked as potential avenues of
investigation in the same framework.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 14:52:40 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 16:03:08 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Pain",
"Jean-Christophe",
""
]
] |
2406.07394 | Di Zhang | Di Zhang, Xiaoshui Huang, Dongzhan Zhou, Yuqiang Li, Wanli Ouyang | Accessing GPT-4 level Mathematical Olympiad Solutions via Monte Carlo
Tree Self-refine with LLaMa-3 8B | null | null | null | null | cs.AI | http://creativecommons.org/licenses/by/4.0/ | This paper introduces the MCT Self-Refine (MCTSr) algorithm, an innovative
integration of Large Language Models (LLMs) with Monte Carlo Tree Search
(MCTS), designed to enhance performance in complex mathematical reasoning
tasks. Addressing the challenges of accuracy and reliability in LLMs,
particularly in strategic and mathematical reasoning, MCTSr leverages
systematic exploration and heuristic self-refine mechanisms to improve
decision-making frameworks within LLMs. The algorithm constructs a Monte Carlo
search tree through iterative processes of Selection, self-refine,
self-evaluation, and Backpropagation, utilizing an improved Upper Confidence
Bound (UCB) formula to optimize the exploration-exploitation balance. Extensive
experiments demonstrate MCTSr's efficacy in solving Olympiad-level mathematical
problems, significantly improving success rates across multiple datasets,
including GSM8K, GSM Hard, MATH, and Olympiad-level benchmarks, including Math
Odyssey, AIME, and OlympiadBench. The study advances the application of LLMs in
complex reasoning tasks and sets a foundation for future AI integration,
enhancing decision-making accuracy and reliability in LLM-driven applications.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 16:01:07 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 07:19:06 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Zhang",
"Di",
""
],
[
"Huang",
"Xiaoshui",
""
],
[
"Zhou",
"Dongzhan",
""
],
[
"Li",
"Yuqiang",
""
],
[
"Ouyang",
"Wanli",
""
]
] |
2406.07437 | Xueyu Liu | Xueyu Liu and Jie Lin and Chao Wang | Graph-based multi-Feature fusion method for speech emotion recognition | 25 pages,4 figures | null | null | null | cs.SD eess.AS | http://creativecommons.org/licenses/by/4.0/ | Exploring proper way to conduct multi-speech feature fusion for cross-corpus
speech emotion recognition is crucial as different speech features could
provide complementary cues reflecting human emotion status. While most previous
approaches only extract a single speech feature for emotion recognition,
existing fusion methods such as concatenation, parallel connection, and
splicing ignore heterogeneous patterns in the interaction between features and
features, resulting in performance of existing systems. In this paper, we
propose a novel graph-based fusion method to explicitly model the relationships
between every pair of speech features. Specifically, we propose a
multi-dimensional edge features learning strategy called Graph-based
multi-Feature fusion method for speech emotion recognition. It represents each
speech feature as a node and learns multi-dimensional edge features to
explicitly describe the relationship between each feature-feature pair in the
context of emotion recognition. This way, the learned multi-dimensional edge
features encode speech feature-level information from both the vertex and edge
dimensions. Our Approach consists of three modules: an Audio Feature
Generation(AFG)module, an Audio-Feature Multi-dimensional Edge Feature(AMEF)
module and a Speech Emotion Recognition (SER) module. The proposed methodology
yielded satisfactory outcomes on the SEWA dataset. Furthermore, the method
demonstrated enhanced performance compared to the baseline in the AVEC 2019
Workshop and Challenge. We used data from two cultures as our training and
validation sets: two cultures containing German and Hungarian on the SEWA
dataset, the CCC scores for German are improved by 17.28% for arousal and 7.93%
for liking. The outcomes of our methodology demonstrate a 13% improvement over
alternative fusion techniques, including those employing one dimensional
edge-based feature fusion approach.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 16:45:34 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 05:06:27 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Liu",
"Xueyu",
""
],
[
"Lin",
"Jie",
""
],
[
"Wang",
"Chao",
""
]
] |
2406.07464 | Christian Yeo | Gilles Pag\`es, Christian Yeo | Convex ordering for stochastic control: the swing contracts case | 32 Pages | null | null | null | q-fin.MF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate propagation of convexity and convex ordering on a typical
stochastic optimal control problem, namely the pricing of
\q{\emph{Take-or-Pay}} swing option, a financial derivative product commonly
traded on energy markets. The dynamics of the underlying asset is modelled by
an \emph{ARCH} model with convex coefficients. We prove that the value function
associated to the stochastic optimal control problem is a convex function of
the underlying asset price. We also introduce a domination criterion offering
insights into the monotonicity of the value function with respect to parameters
of the underlying \emph{ARCH} coefficients. We particularly focus on the
one-dimensional setting where, by means of Stein's formula and regularization
techniques, we show that the convexity assumption for the \emph{ARCH}
coefficients can be relaxed with a semi-convexity assumption. To validate the
results presented in this paper, we also conduct numerical illustrations.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 17:10:25 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 15:17:24 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Pagès",
"Gilles",
""
],
[
"Yeo",
"Christian",
""
]
] |
2406.07471 | Ming Hu | Ming Hu and Peng Xia and Lin Wang and Siyuan Yan and Feilong Tang and
Zhongxing Xu and Yimin Luo and Kaimin Song and Jurgen Leitner and Xuelian
Cheng and Jun Cheng and Chi Liu and Kaijing Zhou and Zongyuan Ge | OphNet: A Large-Scale Video Benchmark for Ophthalmic Surgical Workflow
Understanding | Version 1 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Surgical scene perception via videos are critical for advancing robotic
surgery, telesurgery, and AI-assisted surgery, particularly in ophthalmology.
However, the scarcity of diverse and richly annotated video datasets has
hindered the development of intelligent systems for surgical workflow analysis.
Existing datasets for surgical workflow analysis, which typically face
challenges such as small scale, a lack of diversity in surgery and phase
categories, and the absence of time-localized annotations, limit the
requirements for action understanding and model generalization validation in
complex and diverse real-world surgical scenarios. To address this gap, we
introduce OphNet, a large-scale, expert-annotated video benchmark for
ophthalmic surgical workflow understanding. OphNet features: 1) A diverse
collection of 2,278 surgical videos spanning 66 types of cataract, glaucoma,
and corneal surgeries, with detailed annotations for 102 unique surgical phases
and 150 granular operations; 2) It offers sequential and hierarchical
annotations for each surgery, phase, and operation, enabling comprehensive
understanding and improved interpretability; 3) Moreover, OphNet provides
time-localized annotations, facilitating temporal localization and prediction
tasks within surgical workflows. With approximately 205 hours of surgical
videos, OphNet is about 20 times larger than the largest existing surgical
workflow analysis benchmark. Our dataset and code have been made available at:
\url{https://github.com/minghu0830/OphNet-benchmark}.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 17:18:11 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jun 2024 09:36:19 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Jun 2024 09:46:33 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Hu",
"Ming",
""
],
[
"Xia",
"Peng",
""
],
[
"Wang",
"Lin",
""
],
[
"Yan",
"Siyuan",
""
],
[
"Tang",
"Feilong",
""
],
[
"Xu",
"Zhongxing",
""
],
[
"Luo",
"Yimin",
""
],
[
"Song",
"Kaimin",
""
],
[
"Leitner",
"Jurgen",
""
],
[
"Cheng",
"Xuelian",
""
],
[
"Cheng",
"Jun",
""
],
[
"Liu",
"Chi",
""
],
[
"Zhou",
"Kaijing",
""
],
[
"Ge",
"Zongyuan",
""
]
] |
2406.07534 | Kai Schwenzer | Kaiser Arf and Kai Schwenzer | On the potential of probing the neutron star composition in accreting
X-ray binaries | 15 pages, 3 figures | null | null | null | astro-ph.HE nucl-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Transiently accreting Low Mass X-Ray Binaries have the potential to probe the
core composition of their neutron stars via deep crustal heating caused by
nuclear reactions. We statistically assess this deep crustal heating scenario,
taking into account the various microphysical and astrophysical uncertainties.
We find that despite the sizable uncertainties there is the chance to
discriminate different compositional scenarios. Several observed sources
statistically challenge a minimal hadronic matter composition, where cooling
proceeds exclusively via slow modified Urca reactions. Considering here two
exemplary extended uniform compositions, namely ultra-dense hadronic matter
with direct Urca emission and ungapped quark matter, we find that they are even
within uncertainties distinguishable. We show that although exotic forms of
matter are generally only expected in an inner core, which could in principle
have any size, sufficiently large astrophysical data sets nonetheless have the
potential to statistically discriminate compositional scenarios, in particular
when further mass measurements become available.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 17:56:50 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Arf",
"Kaiser",
""
],
[
"Schwenzer",
"Kai",
""
]
] |
2406.07549 | Siyuan Huang | Siyuan Huang, Haonan Chang, Yuhan Liu, Yimeng Zhu, Hao Dong, Peng Gao,
Abdeslam Boularias, Hongsheng Li | A3VLM: Actionable Articulation-Aware Vision Language Model | null | null | null | null | cs.RO | http://creativecommons.org/licenses/by/4.0/ | Vision Language Models (VLMs) have received significant attention in recent
years in the robotics community. VLMs are shown to be able to perform complex
visual reasoning and scene understanding tasks, which makes them regarded as a
potential universal solution for general robotics problems such as manipulation
and navigation. However, previous VLMs for robotics such as RT-1, RT-2, and
ManipLLM have focused on directly learning robot-centric actions. Such
approaches require collecting a significant amount of robot interaction data,
which is extremely costly in the real world. Thus, we propose A3VLM, an
object-centric, actionable, articulation-aware vision language model. A3VLM
focuses on the articulation structure and action affordances of objects. Its
representation is robot-agnostic and can be translated into robot actions using
simple action primitives. Extensive experiments in both simulation benchmarks
and real-world settings demonstrate the effectiveness and stability of A3VLM.
We release our code and other materials at
https://github.com/changhaonan/A3VLM.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 17:59:55 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 08:16:05 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Huang",
"Siyuan",
""
],
[
"Chang",
"Haonan",
""
],
[
"Liu",
"Yuhan",
""
],
[
"Zhu",
"Yimeng",
""
],
[
"Dong",
"Hao",
""
],
[
"Gao",
"Peng",
""
],
[
"Boularias",
"Abdeslam",
""
],
[
"Li",
"Hongsheng",
""
]
] |
2406.07559 | Sumanth Rao | Sumanth Rao | After the Breach: Incident Response within Enterprises | null | null | null | null | cs.CR cs.SY eess.SY | http://creativecommons.org/licenses/by/4.0/ | Enterprises are constantly under attack from sophisticated adversaries. These
adversaries use a variety of techniques to first gain access to the enterprise,
then spread laterally inside its networks, establish persistence, and finally
exfiltrate sensitive data, or hold it for ransom. While historically,
enterprises have used different Incident Response systems that monitor hosts,
servers, or network devices to detect and report threats, these systems often
need many analysts to triage and respond to alerts. However, the immense
quantity of alerts to sift through, combined with the potential risk of missing
a valid threat makes the task of the analyst challenging. To ease this manual
and laborious process, researchers have proposed a variety of systems that
perform automated attack investigations. These systems collect data, track
causally related events, and present the analyst with an interpretable summary
of the attack. In this paper, we present a survey of systems that perform
automated attack investigation, and compare them based on their designs, goals,
and heuristics. We discuss the challenges faced by these systems, and present a
comparison in terms of their effectiveness, practicality, and ability to
address these challenges. We conclude by discussing the future of these
systems, and the open problems in this area.
| [
{
"version": "v1",
"created": "Tue, 30 Apr 2024 18:00:00 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 15:38:51 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Rao",
"Sumanth",
""
]
] |
2406.07594 | Tianle Gu | Tianle Gu, Zeyang Zhou, Kexin Huang, Dandan Liang, Yixu Wang, Haiquan
Zhao, Yuanqi Yao, Xingge Qiao, Keqing Wang, Yujiu Yang, Yan Teng, Yu Qiao,
Yingchun Wang | MLLMGuard: A Multi-dimensional Safety Evaluation Suite for Multimodal
Large Language Models | null | null | null | null | cs.CR cs.AI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Powered by remarkable advancements in Large Language Models (LLMs),
Multimodal Large Language Models (MLLMs) demonstrate impressive capabilities in
manifold tasks. However, the practical application scenarios of MLLMs are
intricate, exposing them to potential malicious instructions and thereby posing
safety risks. While current benchmarks do incorporate certain safety
considerations, they often lack comprehensive coverage and fail to exhibit the
necessary rigor and robustness. For instance, the common practice of employing
GPT-4V as both the evaluator and a model to be evaluated lacks credibility, as
it tends to exhibit a bias toward its own responses. In this paper, we present
MLLMGuard, a multidimensional safety evaluation suite for MLLMs, including a
bilingual image-text evaluation dataset, inference utilities, and a lightweight
evaluator. MLLMGuard's assessment comprehensively covers two languages (English
and Chinese) and five important safety dimensions (Privacy, Bias, Toxicity,
Truthfulness, and Legality), each with corresponding rich subtasks. Focusing on
these dimensions, our evaluation dataset is primarily sourced from platforms
such as social media, and it integrates text-based and image-based red teaming
techniques with meticulous annotation by human experts. This can prevent
inaccurate evaluation caused by data leakage when using open-source datasets
and ensures the quality and challenging nature of our benchmark. Additionally,
a fully automated lightweight evaluator termed GuardRank is developed, which
achieves significantly higher evaluation accuracy than GPT-4. Our evaluation
results across 13 advanced models indicate that MLLMs still have a substantial
journey ahead before they can be considered safe and responsible.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 13:41:33 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 11:22:15 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Gu",
"Tianle",
""
],
[
"Zhou",
"Zeyang",
""
],
[
"Huang",
"Kexin",
""
],
[
"Liang",
"Dandan",
""
],
[
"Wang",
"Yixu",
""
],
[
"Zhao",
"Haiquan",
""
],
[
"Yao",
"Yuanqi",
""
],
[
"Qiao",
"Xingge",
""
],
[
"Wang",
"Keqing",
""
],
[
"Yang",
"Yujiu",
""
],
[
"Teng",
"Yan",
""
],
[
"Qiao",
"Yu",
""
],
[
"Wang",
"Yingchun",
""
]
] |
2406.07625 | Yuchen Li | Yuchen Li, Tian-Gang Zhou, Ze Wu, Pai Peng, Shengyu Zhang, Riqiang Fu,
Ren Zhang, Wei Zheng, Pengfei Zhang, Hui Zhai, Xinhua Peng, and Jiangfeng Du | Emergent Universal Quench Dynamics in Randomly Interacting Spin Models | 10 pages, 4 figures; Supplementary Information 26 pages, 11 figures,
2 tables | null | null | null | cond-mat.str-el cond-mat.quant-gas quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Universality often emerges in low-energy equilibrium physics of quantum
many-body systems, despite their microscopic complexity and variety. Recently,
there has been a growing interest in studying far-from-equilibrium dynamics of
quantum many-body systems. Such dynamics usually involves highly excited states
beyond the traditional low-energy theory description. Whether universal
behaviors can also emerge in such non-equilibrium dynamics is a central issue
at the frontier of quantum dynamics. Here we report the experimental
observation of universal dynamics by monitoring the spin depolarization process
in a solid-state NMR system described by an ensemble of randomly interacting
spins. The spin depolarization can be related to temporal spin-spin correlation
functions at high temperatures. We discover a remarkable phenomenon that these
correlation functions obey a universal functional form. This experimental fact
helps us identify the dominant interacting processes in the spin depolarization
dynamics that lead to this universality. Our observation demonstrates the
existence of universality even in non-equilibrium dynamics at high
temperatures, thereby complementing the well-established universality in
low-energy physics.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 18:00:10 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Li",
"Yuchen",
""
],
[
"Zhou",
"Tian-Gang",
""
],
[
"Wu",
"Ze",
""
],
[
"Peng",
"Pai",
""
],
[
"Zhang",
"Shengyu",
""
],
[
"Fu",
"Riqiang",
""
],
[
"Zhang",
"Ren",
""
],
[
"Zheng",
"Wei",
""
],
[
"Zhang",
"Pengfei",
""
],
[
"Zhai",
"Hui",
""
],
[
"Peng",
"Xinhua",
""
],
[
"Du",
"Jiangfeng",
""
]
] |
2406.07662 | Raffi Hotter | Michel Adamic, Wellington Avelino, Anna Brandenberger, Bryan Chiang,
Hunter Davis, Stephen Fay, Andrew Gregory, Aayush Gupta, Raphael Hotter,
Grace Jiang, Fiona Leng, Stephen Polcyn, Thomas Ribeiro, Paul Scotti,
Michelle Wang, Marley Xiong, Jonathan Xu | Progress Towards Decoding Visual Imagery via fNIRS | null | null | null | null | eess.IV cs.AI cs.CV cs.LG q-bio.NC | http://creativecommons.org/licenses/by/4.0/ | We demonstrate the possibility of reconstructing images from fNIRS brain
activity and start building a prototype to match the required specs. By
training an image reconstruction model on downsampled fMRI data, we discovered
that cm-scale spatial resolution is sufficient for image generation. We
obtained 71% retrieval accuracy with 1-cm resolution, compared to 93% on the
full-resolution fMRI, and 20% with 2-cm resolution. With simulations and
high-density tomography, we found that time-domain fNIRS can achieve 1-cm
resolution, compared to 2-cm resolution for continuous-wave fNIRS. Lastly, we
share designs for a prototype time-domain fNIRS device, consisting of a laser
driver, a single photon detector, and a time-to-digital converter system.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 19:08:32 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 01:39:23 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Adamic",
"Michel",
""
],
[
"Avelino",
"Wellington",
""
],
[
"Brandenberger",
"Anna",
""
],
[
"Chiang",
"Bryan",
""
],
[
"Davis",
"Hunter",
""
],
[
"Fay",
"Stephen",
""
],
[
"Gregory",
"Andrew",
""
],
[
"Gupta",
"Aayush",
""
],
[
"Hotter",
"Raphael",
""
],
[
"Jiang",
"Grace",
""
],
[
"Leng",
"Fiona",
""
],
[
"Polcyn",
"Stephen",
""
],
[
"Ribeiro",
"Thomas",
""
],
[
"Scotti",
"Paul",
""
],
[
"Wang",
"Michelle",
""
],
[
"Xiong",
"Marley",
""
],
[
"Xu",
"Jonathan",
""
]
] |
2406.07707 | Sm Shaqib | Md. Shariful Islam, SM Shaqib, Shahriar Sultan Ramit, Shahrun Akter
Khushbu, Mr. Abdus Sattar, Dr. Sheak Rashed Haider Noori | A Deep Learning Approach to Detect Complete Safety Equipment For
Construction Workers Based On YOLOv7 | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the construction sector, ensuring worker safety is of the utmost
significance. In this study, a deep learning-based technique is presented for
identifying safety gear worn by construction workers, such as helmets, goggles,
jackets, gloves, and footwears. The recommended approach uses the YOLO v7 (You
Only Look Once) object detection algorithm to precisely locate these safety
items. The dataset utilized in this work consists of labeled images split into
training, testing and validation sets. Each image has bounding box labels that
indicate where the safety equipment is located within the image. The model is
trained to identify and categorize the safety equipment based on the labeled
dataset through an iterative training approach. We used custom dataset to train
this model. Our trained model performed admirably well, with good precision,
recall, and F1-score for safety equipment recognition. Also, the model's
evaluation produced encouraging results, with a mAP@0.5 score of 87.7\%. The
model performs effectively, making it possible to quickly identify safety
equipment violations on building sites. A thorough evaluation of the outcomes
reveals the model's advantages and points up potential areas for development.
By offering an automatic and trustworthy method for safety equipment detection,
this research makes a contribution to the fields of computer vision and
workplace safety. The proposed deep learning-based approach will increase
safety compliance and reduce the risk of accidents in the construction industry
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 20:38:41 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 04:51:11 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Islam",
"Md. Shariful",
""
],
[
"Shaqib",
"SM",
""
],
[
"Ramit",
"Shahriar Sultan",
""
],
[
"Khushbu",
"Shahrun Akter",
""
],
[
"Sattar",
"Mr. Abdus",
""
],
[
"Noori",
"Dr. Sheak Rashed Haider",
""
]
] |
2406.07721 | Chenyang Wang | Chenyang Wang, Daniel Carnieto Tozadore, Barbara Bruno, Pierre
Dillenbourg | Co-designing a Child-Robot Relational Norm Intervention to Regulate
Children's Handwriting Posture | null | null | null | null | cs.HC cs.RO | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Persuasive social robots employ their social influence to modulate children's
behaviours in child-robot interaction. In this work, we introduce the
Child-Robot Relational Norm Intervention (CRNI) model, leveraging the passive
role of social robots and children's reluctance to inconvenience others to
influence children's behaviours. Unlike traditional persuasive strategies that
employ robots in active roles, CRNI utilizes an indirect approach by generating
a disturbance for the robot in response to improper child behaviours, thereby
motivating behaviour change through the avoidance of norm violations. The
feasibility of CRNI is explored with a focus on improving children's
handwriting posture. To this end, as a preliminary work, we conducted two
participatory design workshops with 12 children and 1 teacher to identify
effective disturbances that can promote posture correction.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 21:02:58 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 11:29:24 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Wang",
"Chenyang",
""
],
[
"Tozadore",
"Daniel Carnieto",
""
],
[
"Bruno",
"Barbara",
""
],
[
"Dillenbourg",
"Pierre",
""
]
] |
2406.07769 | Porter Jenkins | Porter Jenkins, Michael Selander, J. Stockton Jenkins, Andrew Merrill,
Kyle Armstrong | Personalized Product Assortment with Real-time 3D Perception and
Bayesian Payoff Estimation | Accepted to KDD 2024 | null | 10.1145/3637528.3671518 | null | cs.LG cs.DB | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Product assortment selection is a critical challenge facing physical
retailers. Effectively aligning inventory with the preferences of shoppers can
increase sales and decrease out-of-stocks. However, in real-world settings the
problem is challenging due to the combinatorial explosion of product assortment
possibilities. Consumer preferences are typically heterogeneous across space
and time, making inventory-preference alignment challenging. Additionally,
existing strategies rely on syndicated data, which tends to be aggregated, low
resolution, and suffer from high latency. To solve these challenges, we
introduce a real-time recommendation system, which we call EdgeRec3D. Our
system utilizes recent advances in 3D computer vision for perception and
automatic, fine grained sales estimation. These perceptual components run on
the edge of the network and facilitate real-time reward signals. Additionally,
we develop a Bayesian payoff model to account for noisy estimates from 3D LIDAR
data. We rely on spatial clustering to allow the system to adapt to
heterogeneous consumer preferences, and a graph-based candidate generation
algorithm to address the combinatorial search problem. We test our system in
real-world stores across two, 6-8 week A/B tests with beverage products and
demonstrate a 35% and 27% increase in sales respectively. Finally, we monitor
the deployed system for a period of 28 weeks with an observational study and
show a 9.4% increase in sales.
| [
{
"version": "v1",
"created": "Tue, 11 Jun 2024 23:23:54 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 17:21:26 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Jenkins",
"Porter",
""
],
[
"Selander",
"Michael",
""
],
[
"Jenkins",
"J. Stockton",
""
],
[
"Merrill",
"Andrew",
""
],
[
"Armstrong",
"Kyle",
""
]
] |
2406.07834 | Xuesong Wang | Xuesong Wang | Research on material identification of mobile phones falling to the
ground | null | null | null | null | eess.SY cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The failure mode of the phone falling has a lot to do with the ground
material. At present, the research on ground material and mobile phone damage
is generally carried out through experiments, which is extremely costly. This
paper presents a method to identify the material of mobile phones falling on
the ground. The method determines the material of the mobile phone falling to
the ground according to the data of the mobile phone accelerometer and can
obtain the ground material of the mobile phone falling through a large number
of user data. By analyzing the physical process of mobile phone falling, the
accelerometer data interval which can reflect the characteristics of falling is
reasonably intercepted. And the data features that can reflect the collision
are extracted. Finally, based on the fully connected neural network, the method
of determining the material of mobile phones falling on the ground is
developed. The experimental results show that the method has a high
identification rate, and the average identification rate for different ground
materials is 96.75%. Instead of relying on auxiliary devices, the
identification process only relies on the phone's built-in acceleration sensor.
This paper fills the gap in the field of mobile phone falling ground material
identification. It has a great contribution to the collection of user drop
data, the analysis of the drop process, and the improvement of mobile phone
design defects.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 03:03:51 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 02:00:48 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Wang",
"Xuesong",
""
]
] |
2406.07856 | Rituparno Mandal | Rituparno Mandal, Rosalind Huang, Michel Fruchart, Pepijn G. Moerman,
Suriyanarayanan Vaikuntanathan, Arvind Murugan and Vincenzo Vitelli | Learning dynamical behaviors in physical systems | 6 pages, 3 figures | null | null | null | cond-mat.soft cond-mat.stat-mech | http://creativecommons.org/licenses/by/4.0/ | Physical learning is an emerging paradigm in science and engineering whereby
(meta)materials acquire desired macroscopic behaviors by exposure to examples.
So far, it has been applied to static properties such as elastic moduli and
self-assembled structures encoded in minima of an energy landscape. Here, we
extend this paradigm to dynamic functionalities, such as motion and shape
change, that are instead encoded in limit cycles or pathways of a dynamical
system. We identify the two ingredients needed to learn time-dependent
behaviors irrespective of experimental platforms: (i) learning rules with time
delays and (ii) exposure to examples that break time-reversal symmetry during
training. After providing a hands-on demonstration of these requirements using
programmable LEGO toys, we turn to realistic particle-based simulations where
the training rules are not programmed on a computer. Instead, we elucidate how
they emerge from physico-chemical processes involving the causal propagation of
fields, like in recent experiments on moving oil droplets with chemotactic
signalling. Our trainable particles can self-assemble into structures that move
or change shape on demand, either by retrieving the dynamic behavior previously
seen during training, or by learning on the fly. This rich phenomenology is
captured by a modified Hopfield spin model amenable to analytical treatment.
The principles illustrated here provide a step towards von Neumann's dream of
engineering synthetic living systems that adapt to the environment.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 04:12:21 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Mandal",
"Rituparno",
""
],
[
"Huang",
"Rosalind",
""
],
[
"Fruchart",
"Michel",
""
],
[
"Moerman",
"Pepijn G.",
""
],
[
"Vaikuntanathan",
"Suriyanarayanan",
""
],
[
"Murugan",
"Arvind",
""
],
[
"Vitelli",
"Vincenzo",
""
]
] |
2406.07859 | Vatsal Jha | Farzan Byramji, Vatsal Jha, Chandrima Kayal, Rajat Mittal | Relations between monotone complexity measures based on decision tree
complexity | 27 Pages, COCOON 2024 | null | null | null | cs.CC cs.DM | http://creativecommons.org/licenses/by/4.0/ | In a recent result, Knop, Lovett, McGuire and Yuan (STOC 2021) proved the
log-rank conjecture for communication complexity, up to log n factor, for any
Boolean function composed with AND function as the inner gadget. One of the
main tools in this result was the relationship between monotone analogues of
well-studied Boolean complexity measures like block sensitivity and certificate
complexity. The relationship between the standard measures has been a long line
of research, with a landmark result by Huang (Annals of Mathematics 2019),
finally showing that sensitivity is polynomially related to all other standard
measures. In this article, we study the monotone analogues of standard measures
like block sensitivity (mbs(f)), certificate complexity (MCC(f)) and fractional
block sensitivity (fmbs(f)); and study the relationship between these measures
given their connection with AND-decision tree and sparsity of a Boolean
function. We show the following results: 1) Given a Boolean function $f : \{0,
1\}^{n} \rightarrow \{0, 1\}$, the ratio $fmbs(f^l )/mbs(f^l )$ is bounded by a
function of n (and not l). A similar result was known for the corresponding
standard measures (Tal, ITCS 2013). This result allows us to extend any upper
bound by a well behaved measure on monotone block sensitivity to monotone
fractional block sensitivity. 2) The question of the best possible upper bound
on monotone block sensitivity by the logarithm of sparsity is equivalent to the
natural question of best upper bound by degree on sensitivity. One side of this
relationship was used in the proof by Knop, Lovett, McGuire and Yuan (STOC
2021). 3) For two natural classes of functions, symmetric and monotone, hitting
set complexity (MCC) is equal to monotone sensitivity.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 04:22:23 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 03:25:03 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Byramji",
"Farzan",
""
],
[
"Jha",
"Vatsal",
""
],
[
"Kayal",
"Chandrima",
""
],
[
"Mittal",
"Rajat",
""
]
] |
2406.07875 | Han Wang | Han Wang, Wenhao Li, Hongyuan Zha, Baoxiang Wang | Carbon Market Simulation with Adaptive Mechanism Design | 10 pages, 4 figures | null | null | null | cs.LG cs.AI cs.MA | http://creativecommons.org/licenses/by/4.0/ | A carbon market is a market-based tool that incentivizes economic agents to
align individual profits with the global utility, i.e., reducing carbon
emissions to tackle climate change. Cap and trade stands as a critical
principle based on allocating and trading carbon allowances (carbon emission
credit), enabling economic agents to follow planned emissions and penalizing
excess emissions. A central authority is responsible for introducing and
allocating those allowances in cap and trade. However, the complexity of carbon
market dynamics makes accurate simulation intractable, which in turn hinders
the design of effective allocation strategies. To address this, we propose an
adaptive mechanism design framework, simulating the market using hierarchical,
model-free multi-agent reinforcement learning (MARL). Government agents
allocate carbon credits, while enterprises engage in economic activities and
carbon trading. This framework illustrates agents' behavior comprehensively.
Numerical results show MARL enables government agents to balance productivity,
equality, and carbon emissions. Our project is available at
https://github.com/xwanghan/Carbon-Simulator.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 05:08:51 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 10:29:16 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Wang",
"Han",
""
],
[
"Li",
"Wenhao",
""
],
[
"Zha",
"Hongyuan",
""
],
[
"Wang",
"Baoxiang",
""
]
] |
2406.07903 | Sebastian Frey | Sebastian Frey, Mattia Alberto Lucchini, Victor Kartsch, Thorir Mar
Ingolfsson, Andrea Helga Bernardi, Michael Segessenmann, Jakub Osieleniec,
Simone Benatti, Luca Benini, Andrea Cossettini | GAPses: Versatile smart glasses for comfortable and fully-dry
acquisition and parallel ultra-low-power processing of EEG and EOG | 10 pages, 5 figures, 5 tables. This paper has been submitted to IEEE
Transactions on Biomedical Circuits and Systems | null | null | null | eess.SP cs.SY eess.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent advancements in head-mounted wearable technology are revolutionizing
the field of biopotential measurement, but the integration of these
technologies into practical, user-friendly devices remains challenging due to
issues with design intrusiveness, comfort, and data privacy. To address these
challenges, this paper presents GAPSES, a novel smart glasses platform designed
for unobtrusive, comfortable, and secure acquisition and processing of
electroencephalography (EEG) and electrooculography (EOG) signals. We introduce
a direct electrode-electronics interface with custom fully dry soft electrodes
to enhance comfort for long wear. An integrated parallel ultra-low-power RISC-V
processor (GAP9, Greenwaves Technologies) processes data at the edge, thereby
eliminating the need for continuous data streaming through a wireless link,
enhancing privacy, and increasing system reliability in adverse channel
conditions. We demonstrate the broad applicability of the designed prototype
through validation in a number of EEG-based interaction tasks, including alpha
waves, steady-state visual evoked potential analysis, and motor movement
classification. Furthermore, we demonstrate an EEG-based biometric subject
recognition task, where we reach a sensitivity and specificity of 98.87% and
99.86% respectively, with only 8 EEG channels and an energy consumption per
inference on the edge as low as 121 uJ. Moreover, in an EOG-based eye movement
classification task, we reach an accuracy of 96.68% on 11 classes, resulting in
an information transfer rate of 94.78 bit/min, which can be further increased
to 161.43 bit/min by reducing the accuracy to 81.43%. The deployed
implementation has an energy consumption of 24 uJ per inference and a total
system power of only 16.28 mW, allowing for continuous operation of more than
12 h with a small 75 mAh battery.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 06:11:47 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 14:27:29 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Frey",
"Sebastian",
""
],
[
"Lucchini",
"Mattia Alberto",
""
],
[
"Kartsch",
"Victor",
""
],
[
"Ingolfsson",
"Thorir Mar",
""
],
[
"Bernardi",
"Andrea Helga",
""
],
[
"Segessenmann",
"Michael",
""
],
[
"Osieleniec",
"Jakub",
""
],
[
"Benatti",
"Simone",
""
],
[
"Benini",
"Luca",
""
],
[
"Cossettini",
"Andrea",
""
]
] |
2406.07932 | Haiyuan Zhao | Haiyuan Zhao, Guohao Cai, Jieming Zhu, Zhenhua Dong, Jun Xu, Ji-Rong
Wen | Counteracting Duration Bias in Video Recommendation via Counterfactual
Watch Time | Accepted by KDD 2024 | null | null | null | cs.IR | http://creativecommons.org/licenses/by/4.0/ | In video recommendation, an ongoing effort is to satisfy users' personalized
information needs by leveraging their logged watch time. However, watch time
prediction suffers from duration bias, hindering its ability to reflect users'
interests accurately. Existing label-correction approaches attempt to uncover
user interests through grouping and normalizing observed watch time according
to video duration. Although effective to some extent, we found that these
approaches regard completely played records (i.e., a user watches the entire
video) as equally high interest, which deviates from what we observed on real
datasets: users have varied explicit feedback proportion when completely
playing videos. In this paper, we introduce the counterfactual watch time(CWT),
the potential watch time a user would spend on the video if its duration is
sufficiently long. Analysis shows that the duration bias is caused by the
truncation of CWT due to the video duration limitation, which usually occurs on
those completely played records. Besides, a Counterfactual Watch Model (CWM) is
proposed, revealing that CWT equals the time users get the maximum benefit from
video recommender systems. Moreover, a cost-based transform function is defined
to transform the CWT into the estimation of user interest, and the model can be
learned by optimizing a counterfactual likelihood function defined over
observed user watch times. Extensive experiments on three real video
recommendation datasets and online A/B testing demonstrated that CWM
effectively enhanced video recommendation accuracy and counteracted the
duration bias.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 06:55:35 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 09:08:32 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Zhao",
"Haiyuan",
""
],
[
"Cai",
"Guohao",
""
],
[
"Zhu",
"Jieming",
""
],
[
"Dong",
"Zhenhua",
""
],
[
"Xu",
"Jun",
""
],
[
"Wen",
"Ji-Rong",
""
]
] |
2406.07963 | Danil Zainutdinov | D.I. Zainutdinov, V.A. Borodin, S.A. Gorbunov, N. Medvedev, R.A.
Rymzhanov, M.V. Sorokin, R.A. Voronkov, A.E. Volkov | High-temperature threshold of damage of SiC by swift heavy ions | null | null | null | null | cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | At ambient conditions, SiC is known to be resistant to irradiation with swift
heavy ions (SHI) decelerating in the electronic stopping regime. However, there
is no experimental data on the SiC irradiation at elevated temperatures. To
investigate this problem, we evaluate the stability of SiC to SHI impacts at
high temperatures up to 2200 K. We apply the combination of the Monte-Carlo
code TREKIS-3, describing excitation of the electronic and atomic systems using
temperature-dependent scattering cross-sections, with molecular-dynamic
modeling of the lattice response to the excitation. We demonstrate that
increasing irradiation temperature increases the energy transferred to the
atomic lattice from the excited electronic system. This material heating leads
to formation of a stable nanometric damaged core along the trajectory of 710
MeV Bi ion when the irradiation temperature overcomes the threshold of ~1800 K.
In this case, a chain of nanometric voids along the ion trajectory forms due to
the mass transport from the track core by edge dislocations. Voids of larger
sizes appear at higher irradiation temperatures. At lower irradiation
temperatures, the damaged regions recrystallize completely within ~100 ps after
the ion passage.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 07:41:56 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 09:49:15 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Zainutdinov",
"D. I.",
""
],
[
"Borodin",
"V. A.",
""
],
[
"Gorbunov",
"S. A.",
""
],
[
"Medvedev",
"N.",
""
],
[
"Rymzhanov",
"R. A.",
""
],
[
"Sorokin",
"M. V.",
""
],
[
"Voronkov",
"R. A.",
""
],
[
"Volkov",
"A. E.",
""
]
] |
2406.07971 | Lingfeng Shen | Taiming Lu, Lingfeng Shen, Xinyu Yang, Weiting Tan, Beidi Chen, Huaxiu
Yao | It Takes Two: On the Seamlessness between Reward and Policy Model in
RLHF | null | null | null | null | cs.CL cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Reinforcement Learning from Human Feedback (RLHF) involves training policy
models (PMs) and reward models (RMs) to align language models with human
preferences. Instead of focusing solely on PMs and RMs independently, we
propose to examine their interactions during fine-tuning, introducing the
concept of seamlessness. Our study starts with observing the saturation
phenomenon, where continual improvements in RM and PM do not translate into
RLHF progress. Our analysis shows that RMs fail to assign proper scores to PM
responses, resulting in a 35% mismatch rate with human preferences,
highlighting a significant discrepancy between PM and RM. To measure
seamlessness between PM and RM without human effort, we propose an automatic
metric, SEAM. SEAM quantifies the discrepancies between PM and RM judgments
induced by data samples. We validate the effectiveness of SEAM in data
selection and model augmentation. Our experiments demonstrate that (1) using
SEAM-filtered data for RL training improves RLHF performance by 4.5%, and (2)
SEAM-guided model augmentation results in a 4% performance improvement over
standard augmentation methods.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 07:52:17 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 05:13:50 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Lu",
"Taiming",
""
],
[
"Shen",
"Lingfeng",
""
],
[
"Yang",
"Xinyu",
""
],
[
"Tan",
"Weiting",
""
],
[
"Chen",
"Beidi",
""
],
[
"Yao",
"Huaxiu",
""
]
] |
2406.07981 | Bipul Mohanto | Bipul Mohanto, Sven Kluge, Oliver Staadt | Towards Accelerating Real-Time Path Tracing with Foveated Framework | null | null | null | null | cs.GR | http://creativecommons.org/licenses/by/4.0/ | Path tracing is one of the most widespread rendering techniques for high-end
graphics fidelity. However, the slow convergence time and presence of intensive
noises make it infeasible for numerous real-time applications where physically
corrected photorealistic effects are salient. Additionally, the increased
demand for pixel density, geometric complexity, advanced material, and multiple
lights hinder the algorithm from attaining an interactive frame rate for
real-time applications. To address these issues, we developed a framework to
accelerate path tracing through foveated rendering, a robust technique that
leverages human vision. Our dynamic foveated path-tracing framework integrates
fixation data and selectively lowers the rendering resolution towards the
periphery. The framework is built on NVIDIA's OptiX 7.5 API with CUDA 12.1,
serving as the base of future foveated path tracing research. Through
comprehensive experimentation, we demonstrated the effectiveness of our
framework in this paper. Depending on the scene complexity, our solution can
significantly enhance rendering performance up to a factor of 25 without any
notable visual differences. We further evaluated the framework using a
structured error map algorithm with variable sample numbers and foveated area
size.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 08:06:46 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 10:30:28 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Mohanto",
"Bipul",
""
],
[
"Kluge",
"Sven",
""
],
[
"Staadt",
"Oliver",
""
]
] |
2406.08079 | Lixian Zhang | Lixian Zhang, Yi Zhao, Runmin Dong, Jinxiao Zhang, Shuai Yuan, Shilei
Cao, Mengxuan Chen, Juepeng Zheng, Weijia Li, Wei Liu, Litong Feng, Haohuan
Fu | A$^{2}$-MAE: A spatial-temporal-spectral unified remote sensing
pre-training method based on anchor-aware masked autoencoder | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Vast amounts of remote sensing (RS) data provide Earth observations across
multiple dimensions, encompassing critical spatial, temporal, and spectral
information which is essential for addressing global-scale challenges such as
land use monitoring, disaster prevention, and environmental change mitigation.
Despite various pre-training methods tailored to the characteristics of RS
data, a key limitation persists: the inability to effectively integrate
spatial, temporal, and spectral information within a single unified model. To
unlock the potential of RS data, we construct a Spatial-Temporal-Spectral
Structured Dataset (STSSD) characterized by the incorporation of multiple RS
sources, diverse coverage, unified locations within image sets, and
heterogeneity within images. Building upon this structured dataset, we propose
an Anchor-Aware Masked AutoEncoder method (A$^{2}$-MAE), leveraging intrinsic
complementary information from the different kinds of images and
geo-information to reconstruct the masked patches during the pre-training
phase. A$^{2}$-MAE integrates an anchor-aware masking strategy and a geographic
encoding module to comprehensively exploit the properties of RS images.
Specifically, the proposed anchor-aware masking strategy dynamically adapts the
masking process based on the meta-information of a pre-selected anchor image,
thereby facilitating the training on images captured by diverse types of RS
sources within one model. Furthermore, we propose a geographic encoding method
to leverage accurate spatial patterns, enhancing the model generalization
capabilities for downstream applications that are generally location-related.
Extensive experiments demonstrate our method achieves comprehensive
improvements across various downstream tasks compared with existing RS
pre-training methods, including image classification, semantic segmentation,
and change detection tasks.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 11:02:15 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 08:29:43 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Zhang",
"Lixian",
""
],
[
"Zhao",
"Yi",
""
],
[
"Dong",
"Runmin",
""
],
[
"Zhang",
"Jinxiao",
""
],
[
"Yuan",
"Shuai",
""
],
[
"Cao",
"Shilei",
""
],
[
"Chen",
"Mengxuan",
""
],
[
"Zheng",
"Juepeng",
""
],
[
"Li",
"Weijia",
""
],
[
"Liu",
"Wei",
""
],
[
"Feng",
"Litong",
""
],
[
"Fu",
"Haohuan",
""
]
] |
2406.08101 | Qianli Wang | Qianli Wang, Tatiana Anikina, Nils Feldhus, Simon Ostermann, Sebastian
M\"oller | CoXQL: A Dataset for Parsing Explanation Requests in Conversational XAI
Systems | 4 pages, short paper | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Conversational explainable artificial intelligence (ConvXAI) systems based on
large language models (LLMs) have garnered significant interest from the
research community in natural language processing (NLP) and human-computer
interaction (HCI). Such systems can provide answers to user questions about
explanations in dialogues, have the potential to enhance users' comprehension
and offer more information about the decision-making and generation processes
of LLMs. Currently available ConvXAI systems are based on intent recognition
rather than free chat, as this has been found to be more precise and reliable
in identifying users' intentions. However, the recognition of intents still
presents a challenge in the case of ConvXAI, since little training data exist
and the domain is highly specific, as there is a broad range of XAI methods to
map requests onto. In order to bridge this gap, we present CoXQL, the first
dataset for user intent recognition in ConvXAI, covering 31 intents, seven of
which require filling multiple slots. Subsequently, we enhance an existing
parsing approach by incorporating template validations, and conduct an
evaluation of several LLMs on CoXQL using different parsing strategies. We
conclude that the improved parsing approach (MP+) surpasses the performance of
previous approaches. We also discover that intents with multiple slots remain
highly challenging for LLMs.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 11:27:10 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 03:16:47 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Wang",
"Qianli",
""
],
[
"Anikina",
"Tatiana",
""
],
[
"Feldhus",
"Nils",
""
],
[
"Ostermann",
"Simon",
""
],
[
"Möller",
"Sebastian",
""
]
] |
2406.08105 | Niall McGuire | Niall McGuire and Dr Yashar Moshfeghi | Prediction of the Realisation of an Information Need: An EEG Study | null | null | null | null | cs.IR cs.AI cs.HC | http://creativecommons.org/licenses/by/4.0/ | One of the foundational goals of Information Retrieval (IR) is to satisfy
searchers' Information Needs (IN). Understanding how INs physically manifest
has long been a complex and elusive process. However, recent studies utilising
Electroencephalography (EEG) data have provided real-time insights into the
neural processes associated with INs. Unfortunately, they have yet to
demonstrate how this insight can practically benefit the search experience. As
such, within this study, we explore the ability to predict the realisation of
IN within EEG data across 14 subjects whilst partaking in a Question-Answering
(Q/A) task. Furthermore, we investigate the combinations of EEG features that
yield optimal predictive performance, as well as identify regions within the
Q/A queries where a subject's realisation of IN is more pronounced. The
findings from this work demonstrate that EEG data is sufficient for the
real-time prediction of the realisation of an IN across all subjects with an
accuracy of 73.5% (SD 2.6%) and on a per-subject basis with an accuracy of
90.1% (SD 22.1%). This work helps to close the gap by bridging theoretical
neuroscientific advancements with tangible improvements in information
retrieval practices, paving the way for real-time prediction of the realisation
of IN.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 11:34:19 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 08:53:56 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"McGuire",
"Niall",
""
],
[
"Moshfeghi",
"Dr Yashar",
""
]
] |
2406.08128 | Zicheng Liu | Zicheng Liu, Siyuan Li, Li Wang, Zedong Wang, Yunfan Liu, and Stan Z.
Li | Short-Long Convolutions Help Hardware-Efficient Linear Attention to
Focus on Long Sequences | ICML 2024 camera ready. arXiv admin note: text overlap with
arXiv:2212.08136 by other authors | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To mitigate the computational complexity in the self-attention mechanism on
long sequences, linear attention utilizes computation tricks to achieve linear
complexity, while state space models (SSMs) popularize a favorable practice of
using non-data-dependent memory pattern, i.e., emphasize the near and neglect
the distant, to processing sequences. Recent studies have shown the priorities
by combining them as one. However, the efficiency of linear attention remains
only at the theoretical level in a causal setting, and SSMs require various
designed constraints to operate effectively on specific data. Therefore, in
order to unveil the true power of the hybrid design, the following two issues
need to be addressed: (1) hardware-efficient implementation for linear
attention and (2) stabilization of SSMs. To achieve this, we leverage the
thought of tiling and hierarchy to propose CHELA (short-long Convolutions with
Hardware-Efficient Linear Attention), which replaces SSMs with short-long
convolutions and implements linear attention in a divide-and-conquer manner.
This approach enjoys global abstraction and data-dependent selection from
stable SSM and linear attention while maintaining real linear complexity. Our
comprehensive experiments on the Long Range Arena benchmark and language
modeling tasks demonstrate the effectiveness of the proposed method.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 12:12:38 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 07:41:49 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Liu",
"Zicheng",
""
],
[
"Li",
"Siyuan",
""
],
[
"Wang",
"Li",
""
],
[
"Wang",
"Zedong",
""
],
[
"Liu",
"Yunfan",
""
],
[
"Li",
"Stan Z.",
""
]
] |
2406.08129 | Kostya Trachenko | K. Trachenko, B. Monserrat, M. Hutcheon and C. J. Pickard | Upper bounds on the highest phonon frequency and superconducting
temperature from fundamental physical constants | null | null | null | null | cond-mat.supr-con cond-mat.mtrl-sci cond-mat.stat-mech | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fundamental physical constants govern key effects in high-energy particle
physics and astrophysics, including the stability of particles, nuclear
reactions, formation and evolution of stars, synthesis of heavy nuclei and
emergence of stable molecular structures. Here, we show that fundamental
constants also set an upper bound for the frequency of phonons in condensed
matter phases, or how rapidly an atom can vibrate. This bound is in agreement
with \textit{ab initio} simulations of atomic hydrogen and high-temperature
hydride superconductors, and implies an upper limit to the superconducting
transition temperature $T_c$ in condensed matter. Fundamental constants set
this limit to the order of 10$^2-10^3$ K. This range is consistent with our
calculations of $T_c$ from optimal Eliashberg functions. As a corollary, we
observe that the very existence of high-temperature superconductivity research
is due to the observed values of fundamental constants. We finally discuss how
fundamental constants affect the observability of other condensed matter
phenomena including phase transitions.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 12:15:49 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Trachenko",
"K.",
""
],
[
"Monserrat",
"B.",
""
],
[
"Hutcheon",
"M.",
""
],
[
"Pickard",
"C. J.",
""
]
] |
2406.08166 | David Cont | D. Cont, L. Nortmann, F. Yan, F. Lesjak, S. Czesla, A. Lavail, A.
Reiners, N. Piskunov, A. Hatzes, L. Boldt-Christmas, O. Kochukhov, T.
Marquart, E. Nagel, A. D. Rains, M. Rengel, U. Seemann, D. Shulyak | Exploring the ultra-hot Jupiter WASP-178b. Constraints on atmospheric
chemistry and dynamics from a joint retrieval of VLT/CRIRES$^+$ and space
photometric data | Submitted to A&A | null | null | null | astro-ph.EP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite recent progress in the spectroscopic characterization of individual
exoplanets, the atmospheres of key ultra-hot Jupiters (UHJs) still lack
comprehensive investigations. These include WASP-178b, one of the most
irradiated UHJs known to date. We observed the dayside emission signal of this
planet with CRIRES$^+$ in the spectral K-band. By applying the
cross-correlation technique and a Bayesian retrieval framework to the
high-resolution spectra, we identified the emission signature of $^{12}$CO (S/N
= 8.9) and H$_2$O (S/N = 4.9), and a strong atmospheric thermal inversion. A
joint retrieval with space-based secondary eclipse measurements from TESS and
CHEOPS allows us to refine our results on the thermal profile and thus to
constrain the atmospheric chemistry, yielding a solar to super-solar
metallicity (1.4$\pm$1.6 dex) and a solar C/O ratio (0.6$\pm$0.2). We infer a
significant excess of spectral line broadening and identify a slight
Doppler-shift between the $^{12}$CO and H$_2$O signals. These findings provide
strong evidence for a super-rotating atmospheric flow pattern and suggest the
possible existence of chemical inhomogeneities across the planetary dayside
hemisphere. In addition, the inclusion of photometric data in our retrieval
allows us to account for stellar light reflected by the planetary atmosphere,
resulting in an upper limit on the geometric albedo (0.23). The successful
characterization of WASP-178b's atmosphere through a joint analysis of
CRIRES$^+$, TESS, and CHEOPS observations highlights the potential of combined
studies with space- and ground-based instruments and represents a promising
avenue for advancing our understanding of exoplanet atmospheres.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 12:55:43 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 07:33:23 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Cont",
"D.",
""
],
[
"Nortmann",
"L.",
""
],
[
"Yan",
"F.",
""
],
[
"Lesjak",
"F.",
""
],
[
"Czesla",
"S.",
""
],
[
"Lavail",
"A.",
""
],
[
"Reiners",
"A.",
""
],
[
"Piskunov",
"N.",
""
],
[
"Hatzes",
"A.",
""
],
[
"Boldt-Christmas",
"L.",
""
],
[
"Kochukhov",
"O.",
""
],
[
"Marquart",
"T.",
""
],
[
"Nagel",
"E.",
""
],
[
"Rains",
"A. D.",
""
],
[
"Rengel",
"M.",
""
],
[
"Seemann",
"U.",
""
],
[
"Shulyak",
"D.",
""
]
] |
2406.08200 | Rui Wang | Rui Wang, Liping Chen, Kong AiK Lee, Zhen-Hua Ling | Asynchronous Voice Anonymization Using Adversarial Perturbation On
Speaker Embedding | accpeted by Interspeech2024 | null | null | null | cs.SD cs.AI eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Voice anonymization has been developed as a technique for preserving privacy
by replacing the speaker's voice in a speech signal with that of a
pseudo-speaker, thereby obscuring the original voice attributes from machine
recognition and human perception. In this paper, we focus on altering the voice
attributes against machine recognition while retaining human perception. We
referred to this as the asynchronous voice anonymization. To this end, a speech
generation framework incorporating a speaker disentanglement mechanism is
employed to generate the anonymized speech. The speaker attributes are altered
through adversarial perturbation applied on the speaker embedding, while human
perception is preserved by controlling the intensity of perturbation.
Experiments conducted on the LibriSpeech dataset showed that the speaker
attributes were obscured with their human perception preserved for 60.71% of
the processed utterances.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 13:33:24 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 13:08:57 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Wang",
"Rui",
""
],
[
"Chen",
"Liping",
""
],
[
"Lee",
"Kong AiK",
""
],
[
"Ling",
"Zhen-Hua",
""
]
] |
2406.08266 | Hengyu Li | Hengyu Li and Kangdi Mei and Zhaoci Liu and Yang Ai and Liping Chen
and Jie Zhang and Zhenhua Ling | Refining Self-Supervised Learnt Speech Representation using Brain
Activations | accpeted by Interspeech2024 | null | null | null | eess.AS cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It was shown in literature that speech representations extracted by
self-supervised pre-trained models exhibit similarities with brain activations
of human for speech perception and fine-tuning speech representation models on
downstream tasks can further improve the similarity. However, it still remains
unclear if this similarity can be used to optimize the pre-trained speech
models. In this work, we therefore propose to use the brain activations
recorded by fMRI to refine the often-used wav2vec2.0 model by aligning model
representations toward human neural responses. Experimental results on SUPERB
reveal that this operation is beneficial for several downstream tasks, e.g.,
speaker verification, automatic speech recognition, intent classification.One
can then consider the proposed method as a new alternative to improve
self-supervised speech models.
| [
{
"version": "v1",
"created": "Wed, 12 Jun 2024 14:34:41 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jun 2024 06:26:35 GMT"
}
] | "2024-06-14T00:00:00" | [
[
"Li",
"Hengyu",
""
],
[
"Mei",
"Kangdi",
""
],
[
"Liu",
"Zhaoci",
""
],
[
"Ai",
"Yang",
""
],
[
"Chen",
"Liping",
""
],
[
"Zhang",
"Jie",
""
],
[
"Ling",
"Zhenhua",
""
]
] |