{"text": "Title: Uncertainty in GNN Learning Evaluations: A Comparison Between Measures for Quantifying Randomness in GNN Community Detection\nAbstract: (1) The enhanced capability of Graph Neural Networks (GNNs) in unsupervised community detection of clustered nodes is attributed to their capacity to encode both the connectivity and feature information spaces of graphs. The identification of latent communities holds practical significance in various domains, from social networks to genomics. Current real-world performance benchmarks are perplexing due to the multitude of decisions influencing GNN evaluations for this task. (2) Three metrics are compared to assess the consistency of algorithm rankings in the presence of randomness. The consistency and quality of performance between the results under a hyperparameter optimisation with the default hyperparameters is evaluated. (3) The results compare hyperparameter optimisation with default hyperparameters, revealing a significant performance loss when neglecting hyperparameter investigation. A comparison of metrics indicates that ties in ranks can substantially alter the quantification of randomness. (4) Ensuring adherence to the same evaluation criteria may result in notable differences in the reported performance of methods for this task. The $W$ Randomness coefficient, based on the Wasserstein distance, is identified as providing the most robust assessment of randomness.", "label": 0, "field": "cs"} {"text": "Title: Enhancing RAW-to-sRGB with Decoupled Style Structure in Fourier Domain\nAbstract: RAW to sRGB mapping, which aims to convert RAW images from smartphones into RGB form equivalent to that of Digital Single-Lens Reflex (DSLR) cameras, has become an important area of research. However, current methods often ignore the difference between cell phone RAW images and DSLR camera RGB images, a difference that goes beyond the color matrix and extends to spatial structure due to resolution variations. Recent methods directly rebuild color mapping and spatial structure via shared deep representation, limiting optimal performance. Inspired by Image Signal Processing (ISP) pipeline, which distinguishes image restoration and enhancement, we present a novel Neural ISP framework, named FourierISP. This approach breaks the image down into style and structure within the frequency domain, allowing for independent optimization. FourierISP is comprised of three subnetworks: Phase Enhance Subnet for structural refinement, Amplitude Refine Subnet for color learning, and Color Adaptation Subnet for blending them in a smooth manner. This approach sharpens both color and structure, and extensive evaluations across varied datasets confirm that our approach realizes state-of-the-art results. Code will be available at ~\\url{https://github.com/alexhe101/FourierISP}.", "label": 0, "field": "cs"} {"text": "Title: Interacting stochastic processes on sparse random graphs\nAbstract: Large ensembles of stochastically evolving interacting particles describe phenomena in diverse fields including statistical physics, neuroscience, biology, and engineering. In such systems, the infinitesimal evolution of each particle depends only on its own state (or history) and the states (or histories) of neighboring particles with respect to an underlying, possibly random, interaction graph. While these high-dimensional processes are typically too complex to be amenable to exact analysis, their dynamics are quite well understood when the interaction graph is the complete graph. In this case, classical theorems show that in the limit as the number of particles goes to infinity, the dynamics of the empirical measure and the law of a typical particle coincide and can be characterized in terms of a much more tractable dynamical system of reduced dimension called the mean-field limit. In contrast, until recently not much was known about corresponding convergence results in the complementary case when the interaction graph is sparse (i.e., with uniformly bounded average degree). This article provides a brief survey of classical work and then describes recent progress on the sparse regime that relies on a combination of techniques from random graph theory, Markov random fields, and stochastic analysis. The article concludes by discussing ramifications for applications and posing several open problems.", "label": 0, "field": "math"} {"text": "Title: Sieve in discrete groups, especially sparse\nAbstract: We survey the recent applications and developments of sieve methods related to discrete groups, especially in the case of infinite index subgroups of arithmetic groups.", "label": 1, "field": "math"} {"text": "Title: Xorbits: Automating Operator Tiling for Distributed Data Science\nAbstract: Data science pipelines commonly utilize dataframe and array operations for tasks such as data preprocessing, analysis, and machine learning. The most popular tools for these tasks are pandas and NumPy. However, these tools are limited to executing on a single node, making them unsuitable for processing large-scale data. Several systems have attempted to distribute data science applications to clusters while maintaining interfaces similar to single-node libraries, enabling data scientists to scale their workloads without significant effort. However, existing systems often struggle with processing large datasets due to Out-of-Memory (OOM) problems caused by poor data partitioning. To overcome these challenges, we develop Xorbits, a high-performance, scalable data science framework specifically designed to distribute data science workloads across clusters while retaining familiar APIs. The key differentiator of Xorbits is its ability to dynamically switch between graph construction and graph execution. Xorbits has been successfully deployed in production environments with up to 5k CPU cores. Its applications span various domains, including user behavior analysis and recommendation systems in the e-commerce sector, as well as credit assessment and risk management in the finance industry. Users can easily scale their data science workloads by simply changing the import line of their pandas and NumPy code. Our experiments demonstrate that Xorbits can effectively process very large datasets without encountering OOM or data-skewing problems. Over the fastest state-of-the-art solutions, Xorbits achieves an impressive 2.66* speedup on average. In terms of API coverage, Xorbits attains a compatibility rate of 96.7%, surpassing the fastest framework by an impressive margin of 60 percentage points. Xorbits is available at https: //github.com/xorbitsai/xorbits.", "label": 0, "field": "cs"} {"text": "Title: CAD-compatible structural shape optimization with a movable B\u00e9zier tetrahedral mesh\nAbstract: This paper presents the development of a complete CAD-compatible framework for structural shape optimization in 3D. The boundaries of the domain are described using NURBS while the interior is discretized with B\\'ezier tetrahedra. The tetrahedral mesh is obtained from the mesh generator software Gmsh. A methodology to reconstruct the NURBS surfaces from the triangular faces of the boundary mesh is presented. The description of the boundary is used for the computation of the analytical sensitivities with respect to the control points employed in surface design. Further, the mesh is updated at each iteration of the structural optimization process by a pseudo-elastic moving mesh method. In this procedure, the existing mesh is deformed to match the updated surface and therefore reduces the need for remeshing. Numerical examples are presented to test the performance of the proposed method. The use of the movable mesh technique results in a considerable decrease in the computational effort for the numerical examples.", "label": 0, "field": "cs"} {"text": "Title: Learning with Noisy Labels by Adaptive Gradient-Based Outlier Removal\nAbstract: An accurate and substantial dataset is essential for training a reliable and well-performing model. However, even manually annotated datasets contain label errors, not to mention automatically labeled ones. Previous methods for label denoising have primarily focused on detecting outliers and their permanent removal - a process that is likely to over- or underfilter the dataset. In this work, we propose AGRA: a new method for learning with noisy labels by using Adaptive GRAdient-based outlier removal. Instead of cleaning the dataset prior to model training, the dataset is dynamically adjusted during the training process. By comparing the aggregated gradient of a batch of samples and an individual example gradient, our method dynamically decides whether a corresponding example is helpful for the model at this point or is counter-productive and should be left out for the current update. Extensive evaluation on several datasets demonstrates AGRA's effectiveness, while a comprehensive results analysis supports our initial hypothesis: permanent hard outlier removal is not always what model benefits the most from.", "label": 0, "field": "cs"} {"text": "Title: Cyclotomic generating functions\nAbstract: It is a remarkable fact that for many statistics on finite sets of combinatorial objects, the roots of the corresponding generating function are each either a complex root of unity or zero. We call such polynomials \\textbf{cyclotomic generating functions} (CGF's). Previous work studied the support and asymptotic distribution of the coefficients of several families of CGF's arising from tableau and forest combinatorics. In this paper, we continue these explorations by studying general CGF's from algebraic, analytic, and asymptotic perspectives. We review some of the many known examples of CGF's; describe their coefficients, moments, cumulants, and characteristic functions; and give a variety of necessary and sufficient conditions for their existence arising from probability, commutative algebra, and invariant theory. We further show that CGF's are ``generically'' asymptotically normal, generalizing a result of Diaconis. We include several open problems concerning CGF's.", "label": 0, "field": "math"} {"text": "Title: Kodaira-Saito vanishing for the irregular Hodge filtration\nAbstract: After making correct, and then improving, our definition of the category of irregular mixed Hodge modules thanks to Mochizuki's recent results arXiv:2108.03843, we show how these results allow us to obtain Kodaira-Saito-type vanishing theorems for the irregular Hodge filtration of irregular mixed Hodge modules.", "label": 0, "field": "math"} {"text": "Title: Further Explanations on \"SAT Requires Exhaustive Search\"\nAbstract: Recently, Xu and Zhou [2023] introduced a constructive approach for exploring computational hardness, proving that SAT requires exhaustive search. In light of certain misinterpretations concerning the contributions and proofs in that paper, we focus on providing detailed explanations in this work. We begin by delineating the core innovation of the constructive approach, shedding light on the pivotal concept of algorithm designability. We address the overlooked white-box diagonalization method and highlight the concept of an almost independent solution space. In response to specific misunderstandings, such as the concerns surrounding the assumptions of Lemma 3.1, we offer comprehensive clarifications aimed at improving the comprehension of the proof. We are grateful for the feedback received on our prior paper and hope this work can foster a more well-informed discussion.", "label": 0, "field": "cs"} {"text": "Title: Quantum Geometry, Integrability, and Opers\nAbstract: This review article discusses recent progress in understanding of various families of integrable models in terms of algebraic geometry, representation theory, and physics. In particular, we address the connections between soluble many-body systems of Calogero-Ruijsenaars type, quantum spin chains, spaces of opers, representations of double affine Hecke algebras, enumerative counts to quiver varieties, to name just a few. We formulate several conjectures and open problems. This is a contribution to the proceedings of the conference on Elliptic Integrable Systems and Representation Theory, which was held in August 2023 at University of Tokyo.", "label": 0, "field": "math"} {"text": "Title: Maximum Likelihood With a Time Varying Parameter\nAbstract: We consider the problem of tracking an unknown time varying parameter that characterizes the probabilistic evolution of a sequence of independent observations. To this aim, we propose a stochastic gradient descent-based recursive scheme in which the log-likelihood of the observations acts as time varying gain function. We prove convergence in mean-square error in a suitable neighbourhood of the unknown time varying parameter and illustrate the details of our findings in the case where data are generated from distributions belonging to the exponential family.", "label": 1, "field": "math"} {"text": "Title: Hybrid Learning of Time-Series Inverse Dynamics Models for Locally Isotropic Robot Motion\nAbstract: Applications of force control and motion planning often rely on an inverse dynamics model to represent the high-dimensional dynamic behavior of robots during motion. The widespread occurrence of low-velocity, small-scale, locally isotropic motion (LIMO) typically complicates the identification of appropriate models due to the exaggeration of dynamic effects and sensory perturbation caused by complex friction and phenomena of hysteresis, e.g., pertaining to joint elasticity. We propose a hybrid model learning base architecture combining a rigid body dynamics model identified by parametric regression and time-series neural network architectures based on multilayer-perceptron, LSTM, and Transformer topologies. Further, we introduce novel joint-wise rotational history encoding, reinforcing temporal information to effectively model dynamic hysteresis. The models are evaluated on a KUKA iiwa 14 during algorithmically generated locally isotropic movements. Together with the rotational encoding, the proposed architectures outperform state-of-the-art baselines by a magnitude of 10$^3$ yielding an RMSE of 0.14 Nm. Leveraging the hybrid structure and time-series encoding capabilities, our approach allows for accurate torque estimation, indicating its applicability in critically force-sensitive applications during motion sequences exceeding the capacity of conventional inverse dynamics models while retaining trainability in face of scarce data and explainability due to the employed physics model prior.", "label": 1, "field": "cs"} {"text": "Title: Semistability of pairs for projective toric varieties\nAbstract: Let $X \\to \\mathbb P^N$ be a smooth linearly normal projective variety. It was proved by Paul that the $K$-energy of $(X,\\omega_{FS}|_{X})$ restricted to the Bergman metrics is bounded from below if and only if the pair of (rescaled) Chow/Hurwitz forms of $X$ is semistable. In this paper, we provide a necessary and sufficient condition for a given smooth toric variety $X_P$ to be semistable of pairs with respect to $\\mathcal O_{X_P}(i)$ for a positive integer $i$. Applying this result to a smooth polarized toric variety $(X_P, L_P)$, we prove that $(X_P, L_P)$ is asymptotically semistable of pairs if and only if it is K-semistable for toric degenerations.", "label": 0, "field": "math"} {"text": "Title: Noncommutative Hamiltonian structures and quantizations on preprojective algebras\nAbstract: Given a noncommutative Hamiltonian space $A$, we show that the conjecture ``{\\it quantization commutes with reduction}'' holds on $A$. We also construct a semi-product algebra $A \\rtimes \\mG^A$, equivariant sheaves on the representation space are related to left $A \\rtimes \\mG^A$-modules. In the quiver setting, via the quantum and classical trace maps, we establish the explicit correspondence between quantizations on a preprojective algebra and those on a quiver variety.", "label": 0, "field": "math"} {"text": "Title: 2-Rainbow domination number of circulant graphs C(n; {1,4})\nAbstract: Let $k$ be a positive integer. A $k$-rainbow domination function (kRDF) of a graph $G$ is a function $f$ from $V(G)$ to the set of all subsets of $\\{1,2,\\dots,k\\}$ such that every vertex $v \\in V(G)$ with $f(v) = \\emptyset$ satisfies $\\bigcup_{u \\in N(v)} f(u) = \\{1,2,\\dots,k\\}$. The weight of a $k$RDF is defined as $w(f)= \\sum_{v \\in V(G)} |f(v)|$. The $k$-rainbow domination number of $G$, denoted by $\\gamma_{rk}(G)$, is the minimum weight of all kRDFs of $G$. In this paper, we determine the exact value of the 2-rainbow domination number of circulant graphs $C(n; \\{1,4\\})$, which is $\\gamma_{r2}(C(n; \\{1,4\\})) = \\lceil n/3 \\rceil + \\alpha$, where $\\alpha = 0$ for $n \\equiv 0 \\pmod{6}$, $\\alpha = 1$ for $n \\equiv 1,2,3,5 \\pmod{6}$, and $\\alpha = 2$ for $n \\equiv 4 \\pmod{6}$.", "label": 0, "field": "math"} {"text": "Title: Mesoscopic averaging of the two-dimensional KPZ equation\nAbstract: We study the limit of a local average of the KPZ equation in dimension $d=2$ with general initial data in the subcritical regime. Our result shows that a proper spatial averaging of the KPZ equation converges in distribution to the sum of the solution to a deterministic KPZ equation and a Gaussian random variable that depends solely on the scale of averaging. This shows a unique mesoscopic averaging phenomenon that is only present in dimension two. Our work is inspired by the recent findings by Chatterjee \\cite{chatterjee2021weak}.", "label": 0, "field": "math"} {"text": "Title: On the minimal set for counterexamples to the local-global principle\nAbstract: We prove that only for powers of 2 and 3 could occur counterexamples to the local-global divisibility principle for elliptic curves defined over the rationals. For we refine our previous criterion for the validity of the principle. We also give an example that shows that the assumptions of our criterion are necessary.", "label": 1, "field": "math"} {"text": "Title: Asymptotic $l_p$ spaces and bounded distortions\nAbstract: The new class of Banach spaces, so-called asymptotic $l_p$ spaces, is introduced and it is shown that every Banach space with bounded distortions contains a subspace from this class. The proof is based on an investigation of certain functions, called enveloping functions, which are intimately connected with stabilization properties of the norm.", "label": 1, "field": "math"} {"text": "Title: Combinatorial spectra using polynomials\nAbstract: In this paper we would like to introduce some new methods for studying magic type-colorings of graphs or domination of graphs, based on combinatorial spectrum on polynomial rings. We hope that this concept will be potentially useful for the graph theorists.", "label": 0, "field": "math"} {"text": "Title: Non-trivial higher homotopy of first-order theories\nAbstract: Let $T$ be the theory of dense cyclically ordered sets with at least two elements. We determine the classifying space of $\\mathsf{Mod}(T)$ to be homotopically equivalent to $\\mathbb{CP}^\\infty$. In particular, $\\pi_2(\\lvert\\mathsf{Mod}(T)\\rvert)=\\mathbb{Z}$, which answers a question in our previous work. The computation is based on Connes' cycle category $\\Lambda$.", "label": 0, "field": "math"} {"text": "Title: Trajectory Optimization for Completion Time Minimization in UAV-Enabled Multicasting\nAbstract: This paper studies an unmanned aerial vehicle (UAV)-enabled multicasting system, where a UAV is dispatched to disseminate a common file to a number of geographically distributed ground terminals (GTs). Our objective is to design the UAV trajectory to minimize its mission completion time, while ensuring that each GT is able to successfully recover the file with a high probability required. We consider the use of practical random linear network coding (RLNC) for UAV multicasting, so that each GT is able to recover the file as long as it receives a sufficiently large number of coded packets. However, the formulated UAV trajectory optimization problem is non-convex and difficult to be directly solved. To tackle this issue, we first derive an analytical lower bound for the success probability of each GT's file recovery. Based on this result, we then reformulate the problem into a more tractable form, where the UAV trajectory only needs to be designed to meet a set of constraints each on the minimum connection time with a GT, during which their distance is below a designed threshold. We show that the optimal UAV trajectory only needs to constitute connected line segments, thus it can be obtained by determining first the optimal set of waypoints and then UAV speed along the lines connecting the waypoints. We propose practical schemes for the waypoints design based on a novel concept of virtual base station (VBS) placement and by applying convex optimization techniques. Furthermore, for given set of waypoints, we obtain the optimal UAV speed over the resulting path efficiently by solving a linear programming (LP) problem. Numerical results show that the proposed UAV-enabled multicasting with optimized trajectory design achieves significant performance gains as compared to benchmark schemes.", "label": 1, "field": "cs"} {"text": "Title: Asymptotic characterizations of strong pseudoconvexity on pseudoconvex domains of finite type in $\\mathbb{C}^2$\nAbstract: In this paper, we provide some characterizations of strong pseudoconvexity by the boundary behavior of intrinsic invariants for smoothly bounded pseudoconvex domains of finite type in $\\mathbb{C}^2$. As a consequence, if such domain is biholomorphically equivalent to a quotient of the unit ball, then it is strongly pseudoconvex.", "label": 0, "field": "math"} {"text": "Title: Three term rational function progressions in finite fields\nAbstract: Let $F(t),G(t)\\in \\mathbb{Q}(t)$ be rational functions such that $F(t),G(t)$ and the constant function $1$ are linearly independent over $\\mathbb{Q}$, we prove an asymptotic formula for the number of the three term rational function progressions of the form $x,x+F(y),x+G(y)$ in subsets of $\\mathbb{F}_p$. The main new ingredient is an algebraic geometry version of PET induction that bypasses Weyl's differencing. This answers a question of Bourgain and Chang.", "label": 0, "field": "math"} {"text": "Title: A Unified Framework for Rank-based Loss Minimization\nAbstract: The empirical loss, commonly referred to as the average loss, is extensively utilized for training machine learning models. However, in order to address the diverse performance requirements of machine learning models, the use of the rank-based loss is prevalent, replacing the empirical loss in many cases. The rank-based loss comprises a weighted sum of sorted individual losses, encompassing both convex losses like the spectral risk, which includes the empirical risk and conditional value-at-risk, and nonconvex losses such as the human-aligned risk and the sum of the ranked range loss. In this paper, we introduce a unified framework for the optimization of the rank-based loss through the utilization of a proximal alternating direction method of multipliers. We demonstrate the convergence and convergence rate of the proposed algorithm under mild conditions. Experiments conducted on synthetic and real datasets illustrate the effectiveness and efficiency of the proposed algorithm.", "label": 0, "field": "math"} {"text": "Title: Hopf algebras with enough quotients\nAbstract: A family of algebra maps $H\\to A_i$ whose common domain is a Hopf algebra is said to be jointly inner faithful if it does not factor simultaneously through a proper Hopf quotient of $H$. We show that tensor and free products of jointly inner faithful maps of Hopf algebras are again jointly inner faithful, generalizing a number of results in the literature on torus generation of compact quantum groups.", "label": 1, "field": "math"} {"text": "Title: Monotonicity Formulas for Bakry-Emery Ricci Curvature\nAbstract: Motivated and inspired by the recent work of Colding [5] and Colding-Minicozzi [6] we derive several families of monotonicity formulas for manifolds with nonnegative Bakry-Emery Ricci curvature, extending the formulas in [5, 6].", "label": 1, "field": "math"} {"text": "Title: A characterisation of elementary fibrations\nAbstract: Grothendieck fibrations provide a unifying algebraic framework that underlies the treatment of various form of logics, such as first order logic, higher order logics and dependent type theories. In the categorical approach to logic proposed by Lawvere, which systematically uses adjoints to describe the logical operations, equality is presented in the form of a left adjoint to reindexing along a diagonal arrows in the base. Taking advantage of the modular perspective provided by category theory, one can look at those Grothendieck fibrations which sustain just the structure of equality, the so-called elementary fibrations, aka fibrations with equality. The present paper provides a characterisation of elementary fibrations based on particular structures in the fibres, called transporters. The characterisation is a substantial generalisation of the one already available for faithful fibrations. There is a close resemblance between transporters and the structures used in the semantics of the identity type of Martin-L\\\"of type theory. We close the paper by comparing the two.", "label": 1, "field": "math"} {"text": "Title: Minimizing The Maximum Distance Traveled To Form Patterns With Systems of Mobile Robots\nAbstract: In the pattern formation problem, robots in a system must self-coordinate to form a given pattern, regardless of translation, rotation, uniform-scaling, and/or reflection. In other words, a valid final configuration of the system is a formation that is \\textit{similar} to the desired pattern. While there has been no shortage of research in the pattern formation problem under a variety of assumptions, models, and contexts, we consider the additional constraint that the maximum distance traveled among all robots in the system is minimum. Existing work in pattern formation and closely related problems are typically application-specific or not concerned with optimality (but rather feasibility). We show the necessary conditions any optimal solution must satisfy and present a solution for systems of three robots. Our work also led to an interesting result that has applications beyond pattern formation. Namely, a metric for comparing two triangles where a distance of $0$ indicates the triangles are similar, and $1$ indicates they are \\emph{fully dissimilar}.", "label": 1, "field": "cs"} {"text": "Title: The model theory of the curve graph\nAbstract: In this paper we develop a bridge between model theory, geometric topology, and geometric group theory. In particular, we investigate the Ivanov Metaconjecture from the point of view of model theory, and more broadly we seek to answer the general question: why does the curve graph of a surface play such a central role in the study of surfaces and mapping class groups? More specifically, we consider a surface $\\Sigma$ of finite type and its curve graph $\\mathcal C(\\Sigma)$, and we investigate its first-order theory in the language of graph theory. Crucially, $\\mathcal C(\\Sigma)$ is bi-interpretable with a certain object called the augmented Cayley graph of the mapping class group of the surface. We use this bi-interpretation to prove that the theory of the curve graph is $\\omega$--stable, to compute its Morley rank, and to show that it has quantifier elimination with respect to the class of $\\forall\\exists$--formulae. We also show that many of the complexes which are naturally associated to a surface are interpretable in $\\mathcal C(\\Sigma)$. This shows that these complexes are all $\\omega$--stable and admit certain a priori bounds on their Morley ranks. We are able to use Morley ranks to prove that various complexes are not bi--interpretable with the curve graph. As a consequence of quantifier elimination, we show that algebraic intersection number is not definable in the first order theory of the curve graph. Finally, we prove that the curve graph of a surface enjoys a novel phenomenon that we call interpretation rigidity. That is, if surfaces $\\Sigma_1$ and $\\Sigma_2$ admits curve graphs that are mutually interpretable, then $\\Sigma_1$ and $\\Sigma_2$ are homeomorphic to each other. Along the way, numerous technical results are obtained.", "label": 1, "field": "math"} {"text": "Title: Robustness Evaluation of Regression Tasks with Skewed Domain Preferences\nAbstract: In natural phenomena, data distributions often deviate from normality. One can think of cataclysms as a self-explanatory example: events that occur almost never, and at the same time are many standard deviations away from the common outcome. In many scientific contexts it is exactly these tail events that researchers are most interested in anticipating, so that adequate measures can be taken to prevent or attenuate a major impact on society. Despite such efforts, we have yet to provide definite answers to crucial issues in evaluating predictive solutions in domains such as weather, pollution, health. In this paper, we deal with two encapsulated problems simultaneously. First, assessing the performance of regression models when non-uniform preferences apply - not all values are equally relevant concerning the accuracy of their prediction, and there's a particular interest in the most extreme values. Second, assessing the robustness of models when dealing with uncertainty regarding the actual underlying distribution of values relevant for such problems. We show how different levels of relevance associated with target values may impact experimental conclusions, and demonstrate the practical utility of the proposed methods.", "label": 1, "field": "cs"} {"text": "Title: Performance Trade-off and Joint Waveform Design for MIMO-OFDM DFRC Systems\nAbstract: Dual-functional radar-communication (DFRC) has attracted considerable attention. This paper considers the frequency-selective multipath fading environment and proposes DFRC waveform design strategies based on multiple-input and multiple-output (MIMO) and orthogonal frequency division multiplexing (OFDM) techniques. In the proposed waveform design strategies, the Cramer-Rao bound (CRB) of the radar system, the inter-stream interference (ISI) and the achievable rate of the communication system, are respectively considered as the performance metrics. In this paper, we focus on the performance trade-off between the radar system and the communication system, and the optimization problems are formulated. In the ISI minimization based waveform design strategy, the optimization problem is convex and can be easily solved. In the achievable rate maximization based waveform design strategy, we propose a water-filling (WF) and sequential quadratic programming (SQP) based algorithm to derive the covariance matrix and the precoding matrix. Simulation results validate the proposed DFRC waveform designs and show that the achievable rate maximization based strategy has a better performance than the ISI minimization based strategy.", "label": 0, "field": "cs"} {"text": "Title: Universality for bounded degree spanning trees in randomly perturbed graphs\nAbstract: We solve a problem of Krivelevich, Kwan and Sudakov [SIAM Journal on Discrete Mathematics 31 (2017), 155-171] concerning the threshold for the containment of all bounded degree spanning trees in the model of randomly perturbed dense graphs. More precisely, we show that, if we start with a dense graph $G_\\alpha$ on $n$ vertices with $\\delta(G_\\alpha)\\ge \\alpha n$ for $\\alpha>0$ and we add to it the binomial random graph $G(n,C/n)$, then with high probability the graph $G_\\alpha\\cup G(n,C/n)$ contains copies of all spanning trees with maximum degree at most $\\Delta$ simultaneously, where $C$ depends only on $\\alpha$ and $\\Delta$.", "label": 1, "field": "math"} {"text": "Title: Representation stability in the level 4 braid group\nAbstract: We investigate the cohomology of the level 4 subgroup of the braid group, namely, the kernel of the mod 4 reduction of the Burau representation at $t=-1$. This group is also equal to the kernel of the mod 2 abelianization of the pure braid group. We give an exact formula for the first Betti number; it is a quartic polynomial in the number of strands. We also show that, like the pure braid group, the first homology satisfies uniform representation stability in the sense of Church and Farb. Unlike the pure braid group, the group of symmetries - the quotient of the braid group by the level 4 subgroup - is one for which the representation theory has not been well studied; we develop its representation theory. This group is a non-split extension of the symmetric group. As applications of our main results, we show that the rational cohomology ring of the level 4 braid group is not generated in degree 1 when the number of strands is at least 15, and we compute all Betti numbers of the level 4 braid group when the number of strands is at most 4. We also derive a new lower bound on the first rational Betti number of the hyperelliptic Torelli group and on the top rational Betti number of the level 4 mapping class group in genus 2. Finally, we apply our results to locate all of the 2-torsion points on the characteristic varieties of the pure braid group.", "label": 1, "field": "math"} {"text": "Title: Boson Operator Ordering Identities from Generalized Stirling and Eulerian Numbers\nAbstract: Ordering identities in the Weyl-Heisenberg algebra generated by single-mode boson operators are investigated. A boson string composed of creation and annihilation operators can be expanded as a linear combination of other such strings, the simplest example being a normal ordering. The case when each string contains only one annihilation operator is already combinatorially nontrivial. Two kinds of expansion are derived: (i) that of a power of a string $\\Omega$ in lower powers of another string $\\Omega'$, and (ii) that of a power of $\\Omega$ in twisted versions of the same power of $\\Omega'$. The expansion coefficients are shown to be, respectively, generalized Stirling numbers of Hsu and Shiue, and certain generalized Eulerian numbers. Many examples are given. These combinatorial numbers are binomial transforms of each other, and their theory is developed, emphasizing schemes for computing them: summation formulas, Graham-Knuth-Patashnik (GKP) triangular recurrences, terminating hypergeometric series, and closed-form expressions. The results on the first type of expansion subsume a number of previous results on the normal ordering of boson strings.", "label": 0, "field": "math"} {"text": "Title: Embedding 1-Planar Graphs in Ten Pages\nAbstract: Every planar graph has a 4-page book embedding and this bound is tight. We show that every 1-planar graph, which is a graph that admits a drawing with at most one crossing per edge, has a 10-page book embedding. In addition, four pages are sometimes necessary and always sufficient if the planar skeleton, obtained from a 1-planar drawing by removing all crossed edges, has a Hamiltonian cycle.", "label": 0, "field": "cs"} {"text": "Title: Rational Construction of Stochastic Numerical Methods for Molecular Sampling\nAbstract: In this article, we focus on the sampling of the configurational Gibbs-Boltzmann distribution, that is, the calculation of averages of functions of the position coordinates of a molecular $N$-body system modelled at constant temperature. We show how a formal series expansion of the invariant measure of a Langevin dynamics numerical method can be obtained in a straightforward way using the Baker-Campbell-Hausdorff lemma. We then compare Langevin dynamics integrators in terms of their invariant distributions and demonstrate a superconvergence property (4th order accuracy where only 2nd order would be expected) of one method in the high friction limit; this method, moreover, can be reduced to a simple modification of the Euler-Maruyama method for Brownian dynamics involving a non-Markovian (coloured noise) random process. In the Brownian dynamics case, 2nd order accuracy of the invariant density is achieved. All methods considered are efficient for molecular applications (requiring one force evaluation per timestep) and of a simple form. In fully resolved (long run) molecular dynamics simulations, for our favoured method, we observe up to two orders of magnitude improvement in configurational sampling accuracy for given stepsize with no evident reduction in the size of the largest usable timestep compared to common alternative methods.", "label": 1, "field": "math"} {"text": "Title: Limit trees for free group automorphisms: universality\nAbstract: To any free group automorphism, we associate a universal (cone of) limit tree(s) with three defining properties: first, the tree has a minimal isometric action of the free group with trivial arc stabilizers; second, there is a unique expanding dilation of the tree that represents the free group automorphism; and finally, the loxodromic elements are exactly the elements that weakly limit to dominating attracting laminations under forward iteration by the automorphism. So the action on the tree detects the automorphism's dominating exponential dynamics. As a corollary, our previously constructed limit pretree that detects the exponential dynamics is canonical. We also characterize all very small trees that admit an expanding homothety representing a given automorphism. In the appendix, we prove a variation of Feighn--Handel's recognition theorem for atoroidal outer automorphisms.", "label": 1, "field": "math"} {"text": "Title: 2-Dimensional Combinatorial Calabi Flow in Hyperbolic Background Geometry\nAbstract: For triangulated surfaces locally embedded in the standard hyperbolic space, we introduce combinatorial Calabi flow as the negative gradient flow of combinatorial Calabi energy. We prove that the flow produces solutions which converge to ZCCP-metric (zero curvature circle packing metric) if the initial energy is small enough. Assuming the curvature has a uniform upper bound less than $2\\pi$, we prove that combinatorial Calabi flow exists for all time. Moreover, it converges to ZCCP-metric if and only if ZCCP-metric exists.", "label": 1, "field": "math"} {"text": "Title: Inference with System W Satisfies Syntax Splitting\nAbstract: In this paper, we investigate inductive inference with system W from conditional belief bases with respect to syntax splitting. The concept of syntax splitting for inductive inference states that inferences about independent parts of the signature should not affect each other. This was captured in work by Kern-Isberner, Beierle, and Brewka in the form of postulates for inductive inference operators expressing syntax splitting as a combination of relevance and independence; it was also shown that c-inference fulfils syntax splitting, while system P inference and system Z both fail to satisfy it. System W is a recently introduced inference system for nonmonotonic reasoning that captures and properly extends system Z as well as c-inference. We show that system W fulfils the syntax splitting postulates for inductive inference operators by showing that it satisfies the required properties of relevance and independence. This makes system W another inference operator besides c-inference that fully complies with syntax splitting, while in contrast to c-inference, also extending rational closure.", "label": 1, "field": "cs"} {"text": "Title: Fundamental groups, coregularity, and low dimensional klt Calabi-Yau pairs\nAbstract: In this article, we study how the absolute coregularity of a projective log pair reflects on its fundamental group. More precisely, we conjecture that for a projective klt log pair $(X,D)$ of absolute coregularity $c$ (and arbitrary dimension) the fundamental group $\\pi_1^{\\rm reg}(X,D)$ admits a normal abelian subgroup of finite index and rank at most $2c$. We prove this conjecture in the cases $c\\in \\{0,1,2\\}$, building on the almost abelianity of the fundamental groups of klt Calabi-Yau pairs of dimension $\\leq 2$. In the cases $c \\in \\{0,1,2\\}$ and fixed dimension, we can furthermore bound the index of a solvable normal subgroup. In dimension three, we are able to prove almost abelianity for projective varieties with klt singularities and $\\mathbb{Q}$-trivial canonical divisor.", "label": 0, "field": "math"} {"text": "Title: Asymptotic behavior of positive solutions of some nonlinear elliptic equations on cylinders\nAbstract: We establish quantitative asymptotic behavior of positive solutions of a family of nonlinear elliptic equations on the half cylinder near the end. This unifies the study of isolated singularities of some semilinear elliptic equations, such as the Yamabe equation, Hardy-H\\'enon equation etc.", "label": 1, "field": "math"} {"text": "Title: Topological Data Analysis for Neural Network Analysis: A Comprehensive Survey\nAbstract: This survey provides a comprehensive exploration of applications of Topological Data Analysis (TDA) within neural network analysis. Using TDA tools such as persistent homology and Mapper, we delve into the intricate structures and behaviors of neural networks and their datasets. We discuss different strategies to obtain topological information from data and neural networks by means of TDA. Additionally, we review how topological information can be leveraged to analyze properties of neural networks, such as their generalization capacity or expressivity. We explore practical implications of deep learning, specifically focusing on areas like adversarial detection and model selection. Our survey organizes the examined works into four broad domains: 1. Characterization of neural network architectures; 2. Analysis of decision regions and boundaries; 3. Study of internal representations, activations, and parameters; 4. Exploration of training dynamics and loss functions. Within each category, we discuss several articles, offering background information to aid in understanding the various methodologies. We conclude with a synthesis of key insights gained from our study, accompanied by a discussion of challenges and potential advancements in the field.", "label": 0, "field": "cs"} {"text": "Title: Hyperbolic Graph Diffusion Model\nAbstract: Diffusion generative models (DMs) have achieved promising results in image and graph generation. However, real-world graphs, such as social networks, molecular graphs, and traffic graphs, generally share non-Euclidean topologies and hidden hierarchies. For example, the degree distributions of graphs are mostly power-law distributions. The current latent diffusion model embeds the hierarchical data in a Euclidean space, which leads to distortions and interferes with modeling the distribution. Instead, hyperbolic space has been found to be more suitable for capturing complex hierarchical structures due to its exponential growth property. In order to simultaneously utilize the data generation capabilities of diffusion models and the ability of hyperbolic embeddings to extract latent hierarchical distributions, we propose a novel graph generation method called, Hyperbolic Graph Diffusion Model (HGDM), which consists of an auto-encoder to encode nodes into successive hyperbolic embeddings, and a DM that operates in the hyperbolic latent space. HGDM captures the crucial graph structure distributions by constructing a hyperbolic potential node space that incorporates edge information. Extensive experiments show that HGDM achieves better performance in generic graph and molecule generation benchmarks, with a $48\\%$ improvement in the quality of graph generation with highly hierarchical structures.", "label": 0, "field": "cs"} {"text": "Title: Bounded Derivations on Uniform Roe Algebras\nAbstract: We show that if $C_u^*(X)$ is a uniform Roe algebra associated to a bounded geometry metric space X, then all bounded derivations on $C^*_u(X)$ are inner.", "label": 1, "field": "math"} {"text": "Title: Normal operators for momentum ray transforms, I: The inversion formula\nAbstract: The momentum ray transform $I_m^k$ integrates a rank $m$ symmetric tensor field $f$ on $\\mathbb R^n$ over lines with the weight $t^k$, $I_m^kf(x,\\xi)=\\int_{-\\infty}^\\infty t^k\\langle f(x+t\\xi),\\xi^m\\rangle\\,\\mathrm{d}t$. We compute the normal operator $N_m^k=(I_m^k){}^*I_m^k$ and present an inversion formula recovering a rank $m$ tensor field $f$ from the data $(N_m^0f,\\dots,N_m^mf)$.", "label": 0, "field": "math"} {"text": "Title: Fredholm-type Operators and Index\nAbstract: While in \\cite{HB} we studied classes of Fredholm-type operators defined by the homomorphism $\\Pi$ from $L(X)$ onto the Calkin algebra $\\mathcal{C}(X)$, $X$ being a Banach space, we study in this paper two classes of Fredholm-type operators defined by the homomorphism $\\pi$ from $L(X)$ onto the algebra $\\mathcal{C}_0(X)= L(X)/F_0(X),$ where $F_0(X)$ is the ideal of finite rank operators in $L(X).$ Then we define an index for Fredholm-type operators and we show that this new index satisfies similar properties as the usual Fredholm index.", "label": 0, "field": "math"} {"text": "Title: Optimal Economic Operation of Liquid Petroleum Products Pipeline Systems\nAbstract: The majority of overland transport needs for crude petroleum and refined petroleum products are met using pipelines. Numerous studies have developed optimization methods for design of these systems in order to minimize construction costs while meeting capacity requirements. Here, we formulate problems to optimize the operations of existing single liquid commodity pipeline systems subject to physical flow and pump engineering constraints. The objectives are to maximize the economic value created for users of the system and to minimize operating costs. We present a general computational method for this class of continuous, non-convex nonlinear programs, and examine the use of pump operating settings and flow allocations as decision variables. The approach is applied to compute optimal operating regimes and perform engineering economic sensitivity analyses for a case study of a crude oil pipeline developed using publicly available data.", "label": 1, "field": "math"} {"text": "Title: Actions of right-angled Artin groups in low dimensions\nAbstract: We survey the role of right-angled Artin groups in the theory of diffeomorphism groups of low dimensional manifolds. We first describe some of the subgroup structure of right-angled Artin groups. We then discuss the interplay between algebraic structure, compactness, and regularity for group actions on one--dimensional manifolds. For compact one--manifolds, every right-angled Artin group acts faithfully by $C^1$ diffeomorphisms, but the right-angled Artin groups which act faithfully by $C^2$ diffeomorphisms are very restricted. For the real line, every right-angled Artin group acts faithfully by $C^{\\infty}$ diffeomorphisms, though analytic actions are again more limited. In dimensions two and higher, every right-angled Artin group acts faithfully on every manifold by $C^{\\infty}$ diffeomorphisms. We give applications of this discussion to mapping class groups of surfaces and related groups.", "label": 1, "field": "math"} {"text": "Title: Open Gromov-Witten invariants from the Fukaya category\nAbstract: This paper proposes a framework to show that the Fukaya category of a symplectic manifold $X$ determines the open Gromov-Witten invariants of Lagrangians $L \\subset X$. We associate to an object in an $A_\\infty$-category an extension of the negative cyclic homology, called \\emph{relative cyclic homology}. We extend the Getzler-Gauss-Manin connection to relative cyclic homology. Then, we construct (under simplifying technical assumptions) a relative cyclic open-closed map, which maps the relative cyclic homology of a Lagrangian $L$ in the Fukaya category of a symplectic manifold $X$ to the $S^1$-equivariant relative quantum homology of $(X,L)$. Relative quantum homology is the dual to the relative quantum cohomology constructed by Solomon-Tukachinsky. This is an extension of quantum cohomology, and comes equipped with a connection extending the quantum connection. We prove that the relative open-closed map respects connections. As an application of this framework, we show, assuming a construction of the relative cyclic open-closed map in a broader technical setup, that the Fukaya category of a Calabi-Yau variety determines the open Gromov-Witten invariants with one interior marked point for any null-homologous Lagrangian brane.", "label": 1, "field": "math"} {"text": "Title: Product Formula of Artin Symbols in Non-abelian Extensions\nAbstract: The product formula of Artin symbols (norm residue symbols) is an important equality that connects local and global class field theory. Usually, the product formula of Artin symbols is considered in abelian extensions of global fields. In this paper, however, the product is considered in non-abelian extensions such that each symbol is well-defined. As an application, some properties on fundamental units of real quadratic fields are obtained and will be presented here.", "label": 0, "field": "math"} {"text": "Title: CURE Dataset: Ladder Networks for Audio Event Classification\nAbstract: Audio event classification is an important task for several applications such as surveillance, audio, video and multimedia retrieval etc. There are approximately 3M people with hearing loss who can't perceive events happening around them. This paper establishes the CURE dataset which contains curated set of specific audio events most relevant for people with hearing loss. We propose a ladder network based audio event classifier that utilizes 5s sound recordings derived from the Freesound project. We adopted the state-of-the-art convolutional neural network (CNN) embeddings as audio features for this task. We also investigate extreme learning machine (ELM) for event classification. In this study, proposed classifiers are compared with support vector machine (SVM) baseline. We propose signal and feature normalization that aims to reduce the mismatch between different recordings scenarios. Firstly, CNN is trained on weakly labeled Audioset data. Next, the pre-trained model is adopted as feature extractor for proposed CURE corpus. We incorporate ESC-50 dataset as second evaluation set. Results and discussions validate the superiority of Ladder network over ELM and SVM classifier in terms of robustness and increased classification accuracy. While Ladder network is robust to data mismatches, simpler SVM and ELM classifiers are sensitive to such mismatches, where the proposed normalization techniques can play an important role. Experimental studies with ESC-50 and CURE corpora elucidate the differences in dataset complexity and robustness offered by proposed approaches.", "label": 1, "field": "cs"} {"text": "Title: Event-Object Reasoning with Curated Knowledge Bases: Deriving Missing Information\nAbstract: The broader goal of our research is to formulate answers to why and how questions with respect to knowledge bases, such as AURA. One issue we face when reasoning with many available knowledge bases is that at times needed information is missing. Examples of this include partially missing information about next sub-event, first sub-event, last sub-event, result of an event, input to an event, destination of an event, and raw material involved in an event. In many cases one can recover part of the missing knowledge through reasoning. In this paper we give a formal definition about how such missing information can be recovered and then give an ASP implementation of it. We then discuss the implication of this with respect to answering why and how questions.", "label": 1, "field": "cs"} {"text": "Title: Approximation in H\u00f6lder Spaces\nAbstract: For a modulus of continuity $\\omega$ and Banach spaces $X,Y$ we introduce and study the subspaces $\\dot{\\operatorname{VC}}^{0,\\omega}_{\\Upsilon}(X,Y)$ of vanishing scales $\\Upsilon\\in \\{\\operatorname{small},\\operatorname{large},\\operatorname{far}\\}$ of the homogeneous H\\\"{o}lder space $\\dot{C}^{0,\\omega}(X,Y).$ For a wide class of couples $X$ and $Y$, we characterize the subspaces of functions approximable by smooth and Lipschitz and boundedly supported functions in terms of these three vanishing scales. In the particular case $X=\\mathbb{R}^n,$ we identify the spaces $\\dot{\\operatorname{VC}}^{0,\\omega}_{\\Upsilon}(\\mathbb{R}^n,Y)$ with the corresponding vanishing mean oscillation spaces $\\operatorname{VMO}^{\\omega}_{\\Upsilon}(\\mathbb{R}^n,Y)$, thus providing a proof for the density of test functions also on these spaces.", "label": 0, "field": "math"} {"text": "Title: On the uniqueness and computation of commuting extensions\nAbstract: A tuple (Z_1,...,Z_p) of matrices of size r is said to be a commuting extension of a tuple (A_1,...,A_p) of matrices of size n h'$ in the natural partial order on Dyck paths then $I_{h} \\subset I_{h'}$, and explicitly construct a Gr\\\"{o}bner basis for $I_h$. We use a second family of ideals $J_h$ for which some of the claims are easier to see, and prove that $I_h = J_h$. The ideals $J_h$ arise in work of Ding, Develin-Martin-Reiner, and Gasharov-Reiner on a family of Schubert varieties called partition varieties. Using earlier work of the first author, the current manuscript proves that the ideals $I_h = J_h$ generalize the Tanisaki ideals both algebraically and geometrically, from Springer varieties to a family of nilpotent Hessenberg varieties.", "label": 1, "field": "math"} {"text": "Title: Ravnest: Decentralized Asynchronous Training on Heterogeneous Devices\nAbstract: Modern deep learning models, growing larger and more complex, have demonstrated exceptional generalization and accuracy due to training on huge datasets. This trend is expected to continue. However, the increasing size of these models poses challenges in training, as traditional centralized methods are limited by memory constraints at such scales. This paper proposes an asynchronous decentralized training paradigm for large modern deep learning models that harnesses the compute power of regular heterogeneous PCs with limited resources connected across the internet to achieve favourable performance metrics. Ravnest facilitates decentralized training by efficiently organizing compute nodes into clusters with similar data transfer rates and compute capabilities, without necessitating that each node hosts the entire model. These clusters engage in $\\textit{Zero-Bubble Asynchronous Model Parallel}$ training, and a $\\textit{Parallel Multi-Ring All-Reduce}$ method is employed to effectively execute global parameter averaging across all clusters. We have framed our asynchronous SGD loss function as a block structured optimization problem with delayed updates and derived an optimal convergence rate of $O\\left(\\frac{1}{\\sqrt{K}}\\right)$. We further discuss linear speedup with respect to the number of participating clusters and the bound on the staleness parameter.", "label": 0, "field": "cs"} {"text": "Title: Causal Stream Inclusions\nAbstract: We study solutions to systems of stream inclusions 'f in T(f)', where T is assumed to be causal in the sense that elements in output streams are determined by a finite history of inputs. For solving these inclusions we develop a correspondence of causality and contraction with respect to the prefix distance on streams. Now, based on this causality-contraction correspondence, we apply fixpoint principles for the spherically complete ultrametric space of streams to obtain solutions for causal stream inclusions. The underlying fixpoint iterations induce fixpoint induction principles for reasoning about solutions of causal stream inclusions. In addition, these fixpoint approximations induce anytime algorithms for computing finite stream prefixes of solutions. We illustrate the use of these developments for some central concepts of system design.", "label": 0, "field": "cs"} {"text": "Title: Signal Processing in the Retina: Interpretable Graph Classifier to Predict Ganglion Cell Responses\nAbstract: It is a popular hypothesis in neuroscience that ganglion cells in the retina are activated by selectively detecting visual features in an observed scene. While ganglion cell firings can be predicted via data-trained deep neural nets, the networks remain indecipherable, thus providing little understanding of the cells' underlying operations. To extract knowledge from the cell firings, in this paper we learn an interpretable graph-based classifier from data to predict the firings of ganglion cells in response to visual stimuli. Specifically, we learn a positive semi-definite (PSD) metric matrix $\\mathbf{M} \\succeq 0$ that defines Mahalanobis distances between graph nodes (visual events) endowed with pre-computed feature vectors; the computed inter-node distances lead to edge weights and a combinatorial graph that is amenable to binary classification. Mathematically, we define the objective of metric matrix $\\mathbf{M}$ optimization using a graph adaptation of large margin nearest neighbor (LMNN), which is rewritten as a semi-definite programming (SDP) problem. We solve it efficiently via a fast approximation called Gershgorin disc perfect alignment (GDPA) linearization. The learned metric matrix $\\mathbf{M}$ provides interpretability: important features are identified along $\\mathbf{M}$'s diagonal, and their mutual relationships are inferred from off-diagonal terms. Our fast metric learning framework can be applied to other biological systems with pre-chosen features that require interpretation.", "label": 0, "field": "cs"} {"text": "Title: Almost dominant generalized slices and convolution diagrams over them\nAbstract: Let $G$ be a connected reductive complex algebraic group with a maximal torus $T$. We denote by $\\Lambda$ the cocharacter lattice of $(T,G)$. Let $\\Lambda^+ \\subset \\Lambda$ be the submonoid of dominant coweights. For $\\lambda \\in \\Lambda^+,\\,\\mu \\in \\Lambda,\\,\\mu \\leqslant \\lambda$, in arXiv:1604.03625, authors defined a generalized transversal slice $\\overline{\\mathcal{W}}^\\lambda_\\mu$. This is an algebraic variety of the dimension $\\langle 2\\rho^{\\vee}, \\lambda-\\mu \\rangle$, where $2\\rho^{\\vee}$ is the sum of positive roots of $G$. In this paper, we construct an isomorphism $\\overline{\\mathcal{W}}^\\lambda_\\mu \\simeq \\overline{\\mathcal{W}}^\\lambda_{\\mu^+} \\times {\\mathbb{A}}^{\\langle 2\\rho^{\\vee},\\, \\mu^+-\\mu\\rangle}$ for $\\mu \\in \\Lambda$ such that $\\langle \\alpha^{\\vee},\\mu\\rangle \\geqslant -1$ for any positive root $\\alpha^{\\vee}$, here $\\mu^+ \\in W\\mu$ is the dominant representative in the Weyl group orbit of $\\mu$. We consider the example when $\\lambda$ is minuscule, $\\mu \\in W\\lambda$ and describe natural coordinates, Poisson structure on $\\overline{\\mathcal{W}}^\\lambda_\\mu \\simeq {\\mathbb{A}}^{\\langle 2\\rho^\\vee,\\,\\lambda-\\mu \\rangle}$ and its $T\\times {\\mathbb{C}}^\\times$-character. We apply these results to compute $T \\times {\\mathbb{C}}^\\times$-characters of tangent spaces at fixed points of convolution diagrams $\\widetilde{\\mathcal{W}}^{\\underline{\\lambda}}_\\mu$ with minuscule $\\lambda_i$. We also apply our results to construct open coverings by affine spaces of convolution diagrams $\\widetilde{\\mathcal{W}}^{\\underline{\\lambda}}_\\mu$ over slices with $\\mu$ such that $\\langle \\alpha^{\\vee},\\mu\\rangle \\geqslant -1$ for any positive root $\\alpha^{\\vee}$ and minuscule $\\lambda_i$ and to compute Poincar\\'e polynomials of such convolution diagrams $\\widetilde{\\mathcal{W}}^{\\underline{\\lambda}}_{\\mu}$.", "label": 1, "field": "math"} {"text": "Title: Two trees are better than one\nAbstract: We consider partitions of a point set into two parts, and the lengths of the minimum spanning trees of the original set and of the two parts. If $w(P)$ denotes the length of a minimum spanning tree of $P$, we show that every set $P$ of $n \\geq 12$ points admits a bipartition $P= R \\cup B$ for which the ratio $\\frac{w(R)+w(B)}{w(P)}$ is strictly larger than $1$; and that $1$ is the largest number with this property. Furthermore, we provide a very fast algorithm that computes such a bipartition in $O(1)$ time and one that computes the corresponding ratio in $O(n \\log{n})$ time. In certain settings, a ratio larger than $1$ can be expected and sometimes guaranteed. For example, if $P$ is a set of $n$ random points uniformly distributed in $[0,1]^2$ ($n \\to \\infty$), then for any $\\eps>0$, the above ratio in a maximizing partition is at least $\\sqrt2 -\\eps$ with probability tending to $1$. As another example, if $P$ is a set of $n$ points with spread at most $\\alpha \\sqrt{n}$, for some constant $\\alpha>0$, then the aforementioned ratio in a maximizing partition is $1 + \\Omega(\\alpha^{-2})$. All our results and techniques are extendable to higher dimensions.", "label": 0, "field": "cs"} {"text": "Title: A Palm hierarchy for determinantal point processes with the confluent hypergeometric kernel, the decomposing measures in the problem of harmonic analysis on the infinite-dimensional unitary group\nAbstract: The main result of this note is that the shift of the parameter by 1 in the parameter space of decomposing measures in the problem of harmonic analysis on the infinite-dimensional unitary group corresponds to the taking of the reduced Palm measure at infinity for our decomposing measures. The proof proceeds by finite-dimensional approximation of our measures by orthogonal polynomial ensembles. The key remark is that the taking the reduced Palm measure commutes with the scaling limit transition from finite to infinite particle systems.", "label": 0, "field": "math"} {"text": "Title: Almost global well-posedness for quasilinear strongly coupled wave-Klein-Gordon systems in two space dimensions\nAbstract: We prove almost global well-posedness for quasilinear strongly coupled wave-Klein-Gordon systems with small and localized data in two space dimensions. We assume only mild decay on the data at infinity as well as minimal regularity. We systematically investigate all the possible quadratic null form type quasilinear strong coupling nonlinearities, and provide a new, robust approach for the proof. In a second paper we will complete the present results to full global well-posedness.", "label": 1, "field": "math"} {"text": "Title: Mining Fine-Grained Image-Text Alignment for Zero-Shot Captioning via Text-Only Training\nAbstract: Image captioning aims at generating descriptive and meaningful textual descriptions of images, enabling a broad range of vision-language applications. Prior works have demonstrated that harnessing the power of Contrastive Image Language Pre-training (CLIP) offers a promising approach to achieving zero-shot captioning, eliminating the need for expensive caption annotations. However, the widely observed modality gap in the latent space of CLIP harms the performance of zero-shot captioning by breaking the alignment between paired image-text features. To address this issue, we conduct an analysis on the CLIP latent space which leads to two findings. Firstly, we observe that the CLIP's visual feature of image subregions can achieve closer proximity to the paired caption due to the inherent information loss in text descriptions. In addition, we show that the modality gap between a paired image-text can be empirically modeled as a zero-mean Gaussian distribution. Motivated by the findings, we propose a novel zero-shot image captioning framework with text-only training to reduce the modality gap. In particular, we introduce a subregion feature aggregation to leverage local region information, which produces a compact visual representation for matching text representation. Moreover, we incorporate a noise injection and CLIP reranking strategy to boost captioning performance. We also extend our framework to build a zero-shot VQA pipeline, demonstrating its generality. Through extensive experiments on common captioning and VQA datasets such as MSCOCO, Flickr30k and VQAV2, we show that our method achieves remarkable performance improvements. Code is available at https://github.com/Artanic30/MacCap.", "label": 0, "field": "cs"} {"text": "Title: A leaf as a convex domain containing eigenvalues of a linear transformation on a real inner product space\nAbstract: We define a leaf which is a domain in the closure $\\overline{\\mathfrak{H}}=\\mathfrak{H}\\cup\\mathbb{R}\\cup\\{\\infty\\}$ of the complex upper half plane $\\mathfrak{H} = \\{z\\in\\mathbb{C}\\mid{\\mathrm{Im}\\,} z>0\\}$ for any linear transformation of an inner product space over the real number field $\\mathbb{R}$. If the dimension of the inner product space is at least 3, the leaf is convex on the Poincar\\'e metric, and then simply connected, and contains all eigenvalues with nonnegative imaginary part. Moreover, if the linear transformation is normal, the leaf is the eigenvalue geodesic polygon, which is the minimum convex domain in $\\overline{\\mathfrak{H}}$ containing all eigenvalues with nonnegative imaginary part. We discuss the application of the geometric properties of a leaf to the operator norm.", "label": 0, "field": "math"} {"text": "Title: Height functions on Whitney umbrellas\nAbstract: We study the singularities of the members of the family of height functions on Whitney umbrellas, which is also known as cross-caps, and show that the family of the height functions is a versal unfolding. Moreover, we study local intersections of a Whitney umbrella with a hyperplane through its singular point.", "label": 1, "field": "math"} {"text": "Title: Presentations of configuration categories\nAbstract: The configuration category of a manifold is a topological category which we view as a Segal space, via the nerve construction. Our main result is that the unordered configuration category, suitably truncated, admits a finite presentation as a complete Segal space if the manifold in question is the interior of a compact manifold.", "label": 0, "field": "math"} {"text": "Title: Energy based diffusion generator for efficient sampling of Boltzmann distributions\nAbstract: We introduce a novel sampler called the energy based diffusion generator for generating samples from arbitrary target distributions. The sampling model employs a structure similar to a variational autoencoder, utilizing a decoder to transform latent variables from a simple distribution into random variables approximating the target distribution, and we design an encoder based on the diffusion model. Leveraging the powerful modeling capacity of the diffusion model for complex distributions, we can obtain an accurate variational estimate of the Kullback-Leibler divergence between the distributions of the generated samples and the target. Moreover, we propose a decoder based on generalized Hamiltonian dynamics to further enhance sampling performance. Through empirical evaluation, we demonstrate the effectiveness of our method across various complex distribution functions, showcasing its superiority compared to existing methods.", "label": 0, "field": "cs"} {"text": "Title: Nonexistence of Exceptional 5-class Association Schemes with Two $Q$-polynomial Structures\nAbstract: In [H. Suzuki, Association schemes with multiple $Q$-polynomial structures, J. Algebraic Combin. 7 (1998) 181-196], Suzuki gave a classification of association schemes with multiple $Q$-polynomial structures, allowing for one exceptional case which has five classes. In this paper, we rule out the existence of this case. Hence Suzuki's theorem mirrors exactly the well-known counterpart for association schemes with multiple $P$-polynomial structures, a result due to Eiichi Bannai and Etsuko Bannai in 1980.", "label": 1, "field": "math"} {"text": "Title: Discrete Uniqueness Sets for Functions with Spectral Gaps\nAbstract: It is well-known that entire functions whose spectrum belongs to a fixed bounded set $S$ admit real uniformly discrete uniqueness sets $\\Lambda$. We show that the same is true for much wider spaces of continuous functions. In particular, Sobolev spaces have this property whenever $S$ is a set of infinite measure having \"periodic gaps\". The periodicity condition is crucial. For sets $S$ with randomly distributed gaps, we show that the uniformly discrete sets $\\Lambda$ satisfy a strong non-uniqueness property: Every discrete function $c(\\lambda)\\in l^2(\\Lambda)$ can be interpolated by an analytic $L^2$-function with spectrum in $S$.", "label": 1, "field": "math"} {"text": "Title: Big pictures of motivic and classical homotopy theories\nAbstract: Motivic homotopy theory is meant to play the role of algebraic topology, in particular homotopy theory, in the context of algebraic geometry. As proved by Oliver Rondigs and Paul Arne Ostvaer, this theory is closely connected to Voevodsky's triangulated category of motives. A connection that is the motivic analogue of the connection between algebraic topology and homological algebra. In this paper, we try to understand the big picture of motivic homotopy theory and its connection to Voevodsky's motives by comparison to the classical counterpart.", "label": 0, "field": "math"} {"text": "Title: Mutual-visibility problems on graphs of diameter two\nAbstract: The mutual-visibility problem in a graph $G$ asks for the cardinality of a largest set of vertices $S\\subseteq V(G)$ so that for any two vertices $x,y\\in S$ there is a shortest $x,y$-path $P$ so that all internal vertices of $P$ are not in $S$. This is also said as $x,y$ are visible with respect to $S$, or $S$-visible for short. Variations of this problem are known, based on the extension of the visibility property of vertices that are in and/or outside $S$. Such variations are called total, outer and dual mutual-visibility problems. This work is focused on studying the corresponding four visibility parameters in graphs of diameter two, throughout showing bounds and/or closed formulae for these parameters. The mutual-visibility problem in the Cartesian product of two complete graphs is equivalent to (an instance of) the celebrated Zarankievicz's problem. Here we study the dual and outer mutual-visibility problem for the Cartesian product of two complete graphs and all the mutual-visibility problems for the direct product of such graphs as well. We also study all the mutual-visibility problems for the line graphs of complete and complete bipartite graphs. As a consequence of this study, we present several relationships between the mentioned problems and some instances of the classical Tur\\'an problem. Moreover, we study the visibility problems for cographs and several non-trivial diameter-two graphs of minimum size.", "label": 0, "field": "math"} {"text": "Title: Centers of categorified endomorphism rings\nAbstract: We prove that for a large class of well-behaved cocomplete categories $\\mathcal C$ the weak and strong Drinfeld centers of the monoidal category $\\mathcal{E}$ of cocontinuous endofunctors of $\\mathcal{C}$ coincide. This generalizes similar results in the literature, where $\\mathcal{C}$ is the category of modules over a ring $A$ and hence $\\mathcal{E}$ is the category of $A$-bimodules.", "label": 1, "field": "math"} {"text": "Title: Large volume limit fibrations over fanifolds\nAbstract: We lift the stratified torus fibration over a fanifold constructed by Gammage--Shende to the associated Weinstein manifold-with-boundary, which is homotopic to a filtered stratified integrable system with noncompact fibers. When the fanifold admits a dual stratified space in a suitable sense, we give a stratified fibration over it completing SYZ picture. For the fanifold associated with a very affine hypersurface, we realize the latter fibration as a restriction of SYZ fibrations over the tropical hypersurface proposed by Abouzaid--Auroux--Katzarkov.", "label": 0, "field": "math"} {"text": "Title: Improved bounds for the bracketing number of orthants or revisiting an algorithm of Thi\u00e9mard to compute bounds for the star discrepancy\nAbstract: We improve the best known upper bound for the bracketing number of $d$-dimensional axis-parallel boxes anchored in $0$ (or, put differently, of lower left orthants intersected with the $d$-dimensional unit cube $[0,1]^d$). More precisely, we provide a better upper bound for the cardinality of an algorithmic bracketing cover construction due to Eric Thi\\'emard, which forms the core of his algorithm to approximate the star discrepancy of arbitrary point sets from [E. Thi\\'emard, An algorithm to compute bounds for the star discrepancy, J.~Complexity 17 (2001), 850 -- 880]. Moreover, the new upper bound for the bracketing number of anchored axis-parallel boxes yields an improved upper bound for the bracketing number of arbitrary axis-parallel boxes in $[0,1]^d$. In our upper bounds all constants are fully explicit.", "label": 0, "field": "math"} {"text": "Title: InternVid: A Large-scale Video-Text Dataset for Multimodal Understanding and Generation\nAbstract: This paper introduces InternVid, a large-scale video-centric multimodal dataset that enables learning powerful and transferable video-text representations for multimodal understanding and generation. The InternVid dataset contains over 7 million videos lasting nearly 760K hours, yielding 234M video clips accompanied by detailed descriptions of total 4.1B words. Our core contribution is to develop a scalable approach to autonomously build a high-quality video-text dataset with large language models (LLM), thereby showcasing its efficacy in learning video-language representation at scale. Specifically, we utilize a multi-scale approach to generate video-related descriptions. Furthermore, we introduce ViCLIP, a video-text representation learning model based on ViT-L. Learned on InternVid via contrastive learning, this model demonstrates leading zero-shot action recognition and competitive video retrieval performance. Beyond basic video understanding tasks like recognition and retrieval, our dataset and model have broad applications. They are particularly beneficial for generating interleaved video-text data for learning a video-centric dialogue system, advancing video-to-text and text-to-video generation research. These proposed resources provide a tool for researchers and practitioners interested in multimodal video understanding and generation.", "label": 0, "field": "cs"} {"text": "Title: Disentangle Estimation of Causal Effects from Cross-Silo Data\nAbstract: Estimating causal effects among different events is of great importance to critical fields such as drug development. Nevertheless, the data features associated with events may be distributed across various silos and remain private within respective parties, impeding direct information exchange between them. This, in turn, can result in biased estimations of local causal effects, which rely on the characteristics of only a subset of the covariates. To tackle this challenge, we introduce an innovative disentangle architecture designed to facilitate the seamless cross-silo transmission of model parameters, enriched with causal mechanisms, through a combination of shared and private branches. Besides, we introduce global constraints into the equation to effectively mitigate bias within the various missing domains, thereby elevating the accuracy of our causal effect estimation. Extensive experiments conducted on new semi-synthetic datasets show that our method outperforms state-of-the-art baselines.", "label": 0, "field": "cs"} {"text": "Title: Riemann surface of the Riemann zeta function\nAbstract: In this paper we treat the classical Riemann zeta function as a function of three variables: one is the usual complex $\\adyn$-dimensional, customly denoted as $s$, another two are complex infinite dimensional, we denote it as $\\b = \\{b_n\\}_{n=1}^{\\infty}$ and $\\z =\\{z_n\\}_{n=1}^{\\infty}$. When $\\b = \\{1\\}_{n=1}^{\\infty}$ and $\\z = \\{\\frac{1}{n}\\}_{n=1}^{\\infty}$ one gets the usual Riemann zeta function. Our goal in this paper is to study the meromorphic continuation of $\\zeta (\\b , \\z ,s)$ as a function of the triple $(\\a , \\z , s)$. Minor corrections, to appear in the Journal of Mathematical Analysis and Applications.", "label": 1, "field": "math"} {"text": "Title: Characters of Representations of Quantum Groups of Type $A_n$\nAbstract: We introduce the notion of characters of comodules over coribbon Hopf algebras. The case of quantum groups of type $A_n$ is studied. We establish a characteristic equation for the quantum matrix and a q-analogue of Harish-Chandra- Itzykson-Zuber integral", "label": 1, "field": "math"} {"text": "Title: Pareto-Optimal Allocation of Indivisible Goods with Connectivity Constraints\nAbstract: We study the problem of allocating indivisible items to agents with additive valuations, under the additional constraint that bundles must be connected in an underlying item graph. Previous work has considered the existence and complexity of fair allocations. We study the problem of finding an allocation that is Pareto-optimal. While it is easy to find an efficient allocation when the underlying graph is a path or a star, the problem is NP-hard for many other graph topologies, even for trees of bounded pathwidth or of maximum degree 3. We show that on a path, there are instances where no Pareto-optimal allocation satisfies envy-freeness up to one good, and that it is NP-hard to decide whether such an allocation exists, even for binary valuations. We also show that, for a path, it is NP-hard to find a Pareto-optimal allocation that satisfies maximin share, but show that a moving-knife algorithm can find such an allocation when agents have binary valuations that have a non-nested interval structure.", "label": 1, "field": "cs"} {"text": "Title: Random walk on the high-dimensional IIC\nAbstract: We study the asymptotic behavior the exit times of random walk from Euclidean balls around the origin of the incipient infinite cluster in a manner inspired by [26]. We do this by obtaining bounds on the effective resistance between the origin and the boundary of these Euclidean balls. We show that the geometric properties of long-range percolation clusters are significantly different from those of finite-range clusters. We also study the behavior of random walk on the backbone of the IIC and we prove that the Alexander-Orbach conjecture holds for the incipient infinite cluster in high dimensions, both for long-range percolation and for finite-range percolation.", "label": 1, "field": "math"} {"text": "Title: Bounded diameter tree-decompositions\nAbstract: When does a graph admit a tree-decomposition in which every bag has small diameter? For finite graphs, this is a property of interest in algorithmic graph theory, where it is called having bounded ``tree-length''. We will show that this is equivalent to being ``boundedly quasi-isometric to a tree'', which for infinite graphs is a much-studied property from metric geometry. One object of this paper is to tie these two areas together. We will prove that there is a tree-decomposition in which each bag has small diameter, if and only if there is a map $\\phi$ from $V(G)$ into the vertex set of a tree $T$, such that for all $u,v\\in V(G)$, the distances $d_G(u,v), d_T(\\phi(u),\\phi(v))$ differ by at most a constant. A ``geodesic loaded cycle'' in $G$ is a pair $(C,F)$, where $C$ is a cycle of $G$ and $F\\subseteq E(C)$, such that for every pair $u,v$ of vertices of $C$, one of the paths of $C$ between $u,v$ contains at most $d_G(u,v)$ $F$-edges, where $d_G(u,v)$ is the distance between $u,v$ in $G$. We will show that a graph $G$ admits a tree-decomposition in which every bag has small diameter, if and only if $|F|$ is small for every geodesic loaded cycle $(C,F)$. Our proof is an extension of an algorithm to approximate tree-length in finite graphs by Dourisboure and Gavoille. In metric geometry, there is a similar theorem that characterizes when a graph is quasi-isometric to a tree, ``Manning's bottleneck criterion''. The goal of this paper is to tie all these concepts together, and add a few more related ideas. For instance, we prove a conjecture of Rose McCarty, that $G$ admits a tree-decomposition in which every bag has small diameter, if and only if for all vertices $u,v,w$ of $G$, some ball of small radius meets every path joining two of $u,v,w$.", "label": 0, "field": "math"} {"text": "Title: Sharp weighted inequalities for iterated commutators of a class of multilinear operators\nAbstract: In this paper, the sharp quantitative weighted bounds for the iterated commutators of a class of multilinear operators were systematically studied. This class of operators contains multilinear Calder\\'{o}n-Zygmund operators, multilinear Fourier integral operators, and multilinear Littlewood-Paley square operators as its typical examples. These were done only under two pretty much general assumptions of pointwise sparse domination estimates. We first established local decay estimates and quantitative weak $A_\\infty$ decay estimates for iterated commutators of this class of operators. Then, we considered the corresponding Coifman-Fefferman inequalities and the mixed weak type estimates associated with Sawyer's conjecture. Beyond that, the Fefferman-Stein inequalities with respect to arbitrary weights and weighted modular inequalities were also given. As applications, it was shown that all the conclusions aforementioned can be applied to multilinear $\\omega$-Calder\\'{o}n-Zygmund operators, multilinear maximal singular integral operators, multilinear pseudo-differential operators, Stein's square functions, and higher order Calder\\'{o}n commutators.", "label": 0, "field": "math"} {"text": "Title: A note on Jones polynomial and cosmetic surgery\nAbstract: We show that two Dehn surgeries on a knot $K$ never yield manifolds that are homeomorphic as oriented manifolds if $V_K''(1)\\neq 0$ or $V_K'''(1)\\neq 0$. As an application, we verify the cosmetic surgery conjecture for all knots with no more than $11$ crossings except for three $10$-crossing knots and five $11$-crossing knots. We also compute the finite type invariant of order $3$ for two-bridge knots and Whitehead doubles, from which we prove several nonexistence results of purely cosmetic surgery.", "label": 1, "field": "math"} {"text": "Title: Real-Time 2D Temperature Field Prediction in Metal Additive Manufacturing Using Physics-Informed Neural Networks\nAbstract: Accurately predicting the temperature field in metal additive manufacturing (AM) processes is critical to preventing overheating, adjusting process parameters, and ensuring process stability. While physics-based computational models offer precision, they are often time-consuming and unsuitable for real-time predictions and online control in iterative design scenarios. Conversely, machine learning models rely heavily on high-quality datasets, which can be costly and challenging to obtain within the metal AM domain. Our work addresses this by introducing a physics-informed neural network framework specifically designed for temperature field prediction in metal AM. This framework incorporates a physics-informed input, physics-informed loss function, and a Convolutional Long Short-Term Memory (ConvLSTM) architecture. Utilizing real-time temperature data from the process, our model predicts 2D temperature fields for future timestamps across diverse geometries, deposition patterns, and process parameters. We validate the proposed framework in two scenarios: full-field temperature prediction for a thin wall and 2D temperature field prediction for cylinder and cubic parts, demonstrating errors below 3% and 1%, respectively. Our proposed framework exhibits the flexibility to be applied across diverse scenarios with varying process parameters, geometries, and deposition patterns.", "label": 0, "field": "cs"} {"text": "Title: Taming the Beast: Fully Automated Unit Testing with Coyote C++\nAbstract: In this paper, we present Coyote C++, a fully automated white-box unit testing tool for C and C++. Whereas existing tools have struggled to realize unit test generation for C++, Coyote C++ is able to produce high coverage results from unit test generation at a testing speed of over 10,000 statements per hour. This impressive feat is made possible by the combination of a powerful concolic execution engine with sophisticated automated test harness generation. Additionally, the GUI of Coyote C++ displays detailed code coverage visualizations and provides various configuration features for users seeking to manually optimize their coverage results. Combining potent one-click automated testing with rich support for manual tweaking, Coyote C++ is the first automated testing tool that is practical enough to make automated testing of C++ code truly viable in industrial applications.", "label": 0, "field": "cs"} {"text": "Title: Asynchronous Downlink Massive MIMO Networks: A Stochastic Geometry Approach\nAbstract: Massive multiple-input multiple-output (MIMO) is recognized as a promising technology for the next generation of wireless networks because of its potential to increase the spectral efficiency. In initial studies of massive MIMO, the system has been considered to be perfectly synchronized throughout the entire cells. However, perfect synchronization may be hard to attain in practice. Therefore, we study a massive MIMO system whose cells are not synchronous to each other, while transmissions in a cell are still synchronous. We analyze an asynchronous downlink massive MIMO system in terms of the coverage probability and the ergodic rate by means of the stochastic geometry tool. For comparison, we also obtain the results for the synchronous systems. In addition, we investigate the effect of the uplink power control and the number of pilot symbols on the downlink ergodic rate, and we observe that there is an optimal value for the number of pilot symbols maximizing the downlink ergodic rate of a cell. Our results also indicate that, compared to the cases with synchronous transmission, the downlink ergodic rate is more sensitive to the uplink power control in the asynchronous mode.", "label": 1, "field": "cs"} {"text": "Title: Liouville formulas for quantum affine algebras and eigenvalues of quantum Gelfand invariants\nAbstract: We construct new central elements in the quantum affine algebras of type $A$ and prove Liouville-type formulas relating them to the quantum determinants. We apply these formulas to calculate the eigenvalues of the quantum Gelfand invariants as introduced by Reshetikhin, Takhtadzhyan and Faddeev (1989) acting in irreducible highest weight representations of the quantized enveloping algebra for ${\\mathfrak {gl}}_n$.", "label": 0, "field": "math"} {"text": "Title: Limit theorems for a supercritical remaining-lifetime age-structured branching process\nAbstract: In a previous paper [9] we studied an age-structured branching model without immigration. Here we consider a special case of the model, where the system is founded by a single particle with a random lifetime and the reproduction regime is supercritical. We show that there is a necessary and sufficient condition for the convergence of the Malthus normalized random measures $e^{-\\tilde{\\alpha}t} X_t$, where $\\tilde{\\alpha}$ is a strictly positive Malthusian parameter. The convergence of $e^{-\\tilde{\\alpha}t} \\langle X_t,f\\rangle$ can be strengthened to hold with probability one under conditions weaker than those given in Jagers [24]. A central limit theorem of $\\langle X_t,f\\rangle$ is further proved.", "label": 0, "field": "math"} {"text": "Title: DHOT-GM: Robust Graph Matching Using A Differentiable Hierarchical Optimal Transport Framework\nAbstract: Graph matching is one of the most significant graph analytic tasks in practice, which aims to find the node correspondence across different graphs. Most existing approaches rely on adjacency matrices or node embeddings when matching graphs, whose performances are often sub-optimal because of not fully leveraging the multi-modal information hidden in graphs, such as node attributes, subgraph structures, etc. In this study, we propose a novel and effective graph matching method based on a differentiable hierarchical optimal transport (HOT) framework, called DHOT-GM. Essentially, our method represents each graph as a set of relational matrices corresponding to the information of different modalities. Given two graphs, we enumerate all relational matrix pairs and obtain their matching results, and accordingly, infer the node correspondence by the weighted averaging of the matching results. This method can be implemented as computing the HOT distance between the two graphs -- each matching result is an optimal transport plan associated with the Gromov-Wasserstein (GW) distance between two relational matrices, and the weights of all matching results are the elements of an upper-level optimal transport plan defined on the matrix sets. We propose a bi-level optimization algorithm to compute the HOT distance in a differentiable way, making the significance of the relational matrices adjustable. Experiments on various graph matching tasks demonstrate the superiority and robustness of our method compared to state-of-the-art approaches.", "label": 0, "field": "cs"} {"text": "Title: New Perspective on Progressive GANs Distillation for One-class Novelty Detection\nAbstract: One-class novelty detection is conducted to identify anomalous instances, with different distributions from the expected normal instances. In this paper, the Generative Adversarial Network based on the Encoder-Decoder-Encoder scheme (EDE-GAN) achieves state-of-the-art performance. The two factors bellow serve the above purpose: 1) The EDE-GAN calculates the distance between two latent vectors as the anomaly score, which is unlike the previous methods by utilizing the reconstruction error between images. 2) The model obtains best results when the batch size is set to 1. To illustrate their superiority, we design a new GAN architecture, and compare performances according to different batch sizes. Moreover, with experimentation leads to discovery, our result implies there is also evidence of just how beneficial constraint on the latent space are when engaging in model training. In an attempt to learn compact and fast models, we present a new technology, Progressive Knowledge Distillation with GANs (P-KDGAN), which connects two standard GANs through the designed distillation loss. Two-step progressive learning continuously augments the performance of student GANs with improved results over single-step approach. Our experimental results on CIFAR-10, MNIST, and FMNIST datasets illustrate that P-KDGAN improves the performance of the student GAN by 2.44%, 1.77%, and 1.73% when compressing the computationat ratios of 24.45:1, 311.11:1, and 700:1, respectively.", "label": 1, "field": "cs"} {"text": "Title: On upper bounds on expectations of gOSs based on DFR and DFRA distributions\nAbstract: We focus on the problem of establishing the optimal upper bounds on generalized order statistics which are based on the underlying cdf belonging to the family of distributions with decreasing failure rate and decreasing failure rate on the average. This issue has been previously considered by Bieniek [Projection bounds on expectations of generalized order statistics from DFR and DFRA families, Statistics, 2006; 40: 339--351], who established upper nonnegative mean-variance bounds with use of the projections of the compositions of density functions of the uniform generalized order statistic and the exponential distribution function onto the properly chosen convex cones. In this paper we obtain possibly negative upper bounds, by improving the zero bounds obtained by Bieniek for some particular cases of gOSs. We express the bounds in the scale units generated by the central absolute moments of arbitrary orders. We also describe the attainability conditions.", "label": 1, "field": "math"} {"text": "Title: An algebra structure for reproducing kernel Hilbert spaces\nAbstract: Reproducing kernel Hilbert spaces (RKHSs) are Hilbert spaces of functions where pointwise evaluation is continuous. There are known examples of RKHSs that are Banach algebras under pointwise multiplication. These examples are built from weights on the dual of a locally compact abelian group. In this paper we define an algebra structure on an RKHS that is equivalent to subconvolutivity of the weight for known examples (referred to as reproducing kernel Hilbert algebras, or RKHAs). We show that the class of RKHAs is closed under the Hilbert space tensor product and the pullback construction on the category of RKHSs. The subcategory of RKHAs becomes a monoidal category with the spectrum as a monoidal functor to the category of topological spaces. The image of this functor is shown to contain all compact subspaces of $\\mathbb R^n$ for $n>0$.", "label": 0, "field": "math"} {"text": "Title: Filtered fiber functors over a general base\nAbstract: We prove that every filtered fiber functor on the category of dualizable representations of a smooth affine group scheme with enough dualizable representations comes from a graded fiber functor.", "label": 0, "field": "math"} {"text": "Title: An insertion algorithm for catabolizability\nAbstract: Motivated by our recent work relating canonical bases to combinatorics of Garsia-Procesi modules \\cite{B}, we give an insertion algorithm that computes the catabolizability of the insertion tableau of a standard word. This allows us to characterize catabolizability as the statistic on words invariant under Knuth transformations, certain (co)rotations, and a new operation called a catabolism transformation. We also prove a Greene's Theorem-like characterization of catabolizability, and a result about how cocyclage changes catabolizability, strengthening a similar result in \\cite{SW}.", "label": 1, "field": "math"} {"text": "Title: Optimal jump set in hyperbolic conservation laws\nAbstract: This paper deals with some qualitative properties of entropy solutions to hyperbolic conservation laws. In [11] the jump set of entropy solution to conservation laws has been introduced. We find an entropy solution to scalar conservation laws for which the jump set is not closed, in particular, it is dense in a space-time domain. In the later part of this article, we obtain a similar result for the hyperbolic system. We give two different approaches for scalar conservation laws and hyperbolic system to obtain the results. For the scalar case, obtained solutions are more explicitly calculated.", "label": 1, "field": "math"} {"text": "Title: On semigroups of orientation-preserving partial permutations with restricted range\nAbstract: Let $\\Omega_n$ be a finite chain with $n$ elements $(n\\in\\mathbb{N})$, and let $\\mathcal{POPI}_{n}$ be the semigroup of all injective orientation-preserving partial transformations of $\\Omega_n$. In this paper, for any nonempty subset $Y$ of $\\Omega_n$, we consider the subsemigroup $\\mathcal{POPI}_{n}(Y)$ of $\\mathcal{POPI}_{n}$ of all transformations with range contained in $Y$. We describe the Green's relations and study the regularity of $\\mathcal{POPI}_{n}(Y)$. Moreover, we calculate the rank of $\\mathcal{POPI}_{n}(Y)$ and determine when two semigroups of this type are isomorphic.", "label": 0, "field": "math"} {"text": "Title: Reconstruction from Substrings with Partial Overlap\nAbstract: This paper introduces a new family of reconstruction codes which is motivated by applications in DNA data storage and sequencing. In such applications, DNA strands are sequenced by reading some subset of their substrings. While previous works considered two extreme cases in which \\emph{all} substrings of some fixed length are read or substrings are read with no overlap, this work considers the setup in which consecutive substrings are read with some given minimum overlap. First, upper bounds are provided on the attainable rates of codes that guarantee unique reconstruction. Then, we present efficient constructions of asymptotically optimal codes that meet the upper bound.", "label": 1, "field": "cs"} {"text": "Title: Log-concave Density Estimation with Independent Components\nAbstract: We propose a method for estimating a log-concave density on $\\mathbb R^d$ from samples, under the assumption that there exists an orthogonal transformation that makes the components of the random vector independent. While log-concave density estimation is hard both computationally and statistically, the independent components assumption alleviates both issues, while still maintaining a large non-parametric class. We prove that under mild conditions, at most $\\tilde{\\mathcal{O}}(\\epsilon^{-4})$ samples (suppressing constants and log factors) suffice for our proposed estimator to be within $\\epsilon$ of the original density in squared Hellinger distance. On the computational front, while the usual log-concave maximum likelihood estimate can be obtained via a finite-dimensional convex program, it is slow to compute -- especially in higher dimensions. We demonstrate through numerical experiments that our estimator can be computed efficiently, making it more practical to use.", "label": 0, "field": "math"} {"text": "Title: Hadwiger's conjecture and topological bounds\nAbstract: The Odd Hadwiger's conjecture, formulated by Gerards and Seymour in 1995, is a substantial strengthening of Hadwiger's famous coloring conjecture from 1943. We investigate whether the hierarchy of topological lower bounds on the chromatic number, introduced by Matou\\v{s}ek and Ziegler (2003) and refined recently by Daneshpajouh and Meunier (2023), forms a potential avenue to a disproof of Hadwiger's conjecture or its odd-minor variant. In this direction, we prove that, in a very general sense, every graph $G$ that admits a topological lower bound of $t$ on its chromatic number, contains $K_{\\lfloor t/2\\rfloor +1}$ as an odd-minor. This solves a problem posed by Simonyi and Zsb\\'{a}n [European Journal of Combinatorics, 31(8), 2110--2119 (2010)]. We also prove that if for a graph $G$ the Dol'nikov-K\\v{r}\\'{i}\\v{z} lower bound on the chromatic number (one of the lower bounds in the aforementioned hierarchy) attains a value of at least $t$, then $G$ contains $K_t$ as a minor. Finally, extending results by Simonyi and Zsb\\'{a}n, we show that the Odd Hadwiger's conjecture holds for Schrijver and Kneser graphs for any choice of the parameters. The latter are canonical examples of graphs for which topological lower bounds on the chromatic number are tight.", "label": 0, "field": "math"} {"text": "Title: Absence of Lavrentiev's gap for anisotropic functionals\nAbstract: We establish the absence of the Lavrentiev gap between Sobolev and smooth maps for a non-autonomous variational problem of a general structure, where the integrand is assumed to be controlled by a function which is convex and anisotropic with respect to the last variable. This fact results from new results on good approximation properties of the natural underlying unconventional function space. Scalar and vector-valued problems are studied.", "label": 1, "field": "math"} {"text": "Title: On the embedding complexity of Liouville manifolds\nAbstract: We define a family of symplectic invariants which obstruct exact symplectic embeddings between Liouville manifolds, using the general formalism of linearized contact homology and its L-infinity structure. As our primary application, we investigate embeddings between normal crossing divisor complements in complex projective space, giving a complete characterization in many cases. Our main embedding results are deduced explicitly from pseudoholomorphic curves, without appealing to Hamiltonian or virtual perturbations.", "label": 1, "field": "math"} {"text": "Title: Minimum Weight Pairwise Distance Preservers\nAbstract: In this paper, we study the Minimum Weight Pairwise Distance Preservers (MWPDP) problem. Consider a positively weighted undirected/directed connected graph $G = (V, E, c)$ and a subset $P$ of pairs of vertices, also called demand pairs. A subgraph $G'$ is a distance preserver with respect to $P$ if and only if every pair $(u, w) \\in P$ satisfies $dist_{G'} (u, w) = dist_{G}(u, w)$. In MWPDP problem, we aim to find the minimum-weight subgraph $G^*$ that is a distance preserver with respect to $P$. Taking a shortest path between each pair in $P$ gives us a trivial solution with the weight of at most $U=\\sum_{(u,v) \\in P} dist_{G} (u, w)$. Subsequently, we ask how much improvement we can make upon $U$. In other words, we opt to find a distance preserver $G^*$ that maximizes $U-c(G^*)$. Denote this problem as Cost Sharing Pairwise Distance Preservers (CSPDP), which has several applications in the planning and operations of transportation systems. The only known work that can provide a nontrivial solution for CSPDP is that of Chlamt\\'a\\v{c} et al. (SODA, 2017). This algorithm works for unweighted graphs and guarantees a non-zero objective only if the optimal solution is extremely sparse with respect to the trivial solution. We address this issue by proposing an $O(|E|^{1/2+\\epsilon})$-approximation algorithm for CSPDP in weighted graphs that runs in $O((|P||E|)^{2.38} (1/\\epsilon))$ time. Moreover, we prove CSPDP is at least as hard as $\\text{LABEL-COVER}_{\\max}$. This implies that CSPDP cannot be approximated within $O(|E|^{1/6-\\epsilon})$ factor in polynomial time, unless there is an improvement in the notoriously difficult $\\text{LABEL-COVER}_{\\max}$.", "label": 1, "field": "cs"} {"text": "Title: Quadratic relations of the deformed $W$-algebra\nAbstract: The deformed $W$-algebra is a quantum deformation of the $W$-algebra ${\\cal W}_\\beta(\\mathfrak{g})$ in conformal field theory. Using the free field construction, we obtain a closed set of quadratic relations of the $W$-currents of the deformed $W$-algebra. This allows us to define the deformed $W$-algebra by generators and relations. In this review, we study two types of deformed $W$-algebra. One is the deformed $W$-algebra ${\\cal W}_{x,r}\\big(A_{2N}^{(2)}\\big)$, and the other is the $q$-deformed corner vertex algebra $q$-$Y_{L_1, L_2, L_3}$ that is a generalization of the deformed $W$-algebra ${\\cal W}_{x,r}\\big(A(M,N)^{(1)}\\big)$ via the quantum toroidal algebra.", "label": 0, "field": "math"} {"text": "Title: Joint symbolic aggregate approximation of time series\nAbstract: The increasing availability of temporal data poses a challenge to time-series and signal-processing domains due to its high numerosity and complexity. Symbolic representation outperforms raw data in a variety of engineering applications due to its storage efficiency, reduced numerosity, and noise reduction. The most recent symbolic aggregate approximation technique called ABBA demonstrates outstanding performance in preserving essential shape information of time series and enhancing the downstream applications. However, ABBA cannot handle multiple time series with consistent symbols, i.e., the same symbols from distinct time series are not identical. Also, working with appropriate ABBA digitization involves the tedious task of tuning the hyperparameters, such as the number of symbols or tolerance. Therefore, we present a joint symbolic aggregate approximation that has symbolic consistency, and show how the hyperparameter of digitization can itself be optimized alongside the compression tolerance ahead of time. Besides, we propose a novel computing paradigm that enables parallel computing of symbolic approximation. The extensive experiments demonstrate its superb performance and outstanding speed regarding symbolic approximation and reconstruction.", "label": 0, "field": "cs"} {"text": "Title: UstanceBR: a multimodal language resource for stance prediction\nAbstract: This work introduces UstanceBR, a multimodal corpus in the Brazilian Portuguese Twitter domain for target-based stance prediction. The corpus comprises 86.8 k labelled stances towards selected target topics, and extensive network information about the users who published these stances on social media. In this article we describe the corpus multimodal data, and a number of usage examples in both in-domain and zero-shot stance prediction based on text- and network-related information, which are intended to provide initial baseline results for future studies in the field.", "label": 0, "field": "cs"} {"text": "Title: Approximate innerness and central triviality of endomorphisms\nAbstract: We introduce the notions of approximate innerness and central triviality for endomorphisms on separable von Neumann factors, and we characterize them for hyperfinite factors by Connes-Takesaki modules of endomorphisms and modular endomorphisms which are introduced by Izumi. Our result is a generalization of the corresponding result obtained by Kawahigashi-Sutherland-Takesaki in automorphism case.", "label": 1, "field": "math"} {"text": "Title: On Codes for the Noisy Substring Channel\nAbstract: We consider the problem of coding for the substring channel, in which information strings are observed only through their (multisets of) substrings. Due to existing DNA sequencing techniques and applications in DNA-based storage systems, interest in this channel has renewed in recent years. In contrast to existing literature, we consider a noisy channel model where information is subject to noise before its substrings are sampled, motivated by in-vivo storage. We study two separate noise models, substitutions or deletions. In both cases, we examine families of codes which may be utilized for error-correction and present combinatorial bounds on their sizes. Through a generalization of the concept of repeat-free strings, we show that the added required redundancy due to this imperfect observation assumption is sublinear, either when the fraction of errors in the observed substring length is sufficiently small, or when that length is sufficiently long. This suggests that no asymptotic cost in rate is incurred by this channel model in these cases. Moreover, we develop an efficient encoder for such constrained strings in some cases. Finally, we show how a similar encoder can be used to avoid formation of secondary-structures in coded DNA strands, even when accounting for imperfect structures.", "label": 1, "field": "cs"} {"text": "Title: On the complexity of the generalized Q2R automaton\nAbstract: We study the dynamic and complexity of the generalized Q2R automaton. We show the existence of non-polynomial cycles as well as its capability to simulate with the synchronous update the classical version of the automaton updated under a block sequential update scheme. Furthermore, we show that the decision problem consisting in determine if a given node in the network changes its state is \\textbf{P}-Hard.", "label": 1, "field": "cs"} {"text": "Title: Depth-Regularized Optimization for 3D Gaussian Splatting in Few-Shot Images\nAbstract: In this paper, we present a method to optimize Gaussian splatting with a limited number of images while avoiding overfitting. Representing a 3D scene by combining numerous Gaussian splats has yielded outstanding visual quality. However, it tends to overfit the training views when only a small number of images are available. To address this issue, we introduce a dense depth map as a geometry guide to mitigate overfitting. We obtained the depth map using a pre-trained monocular depth estimation model and aligning the scale and offset using sparse COLMAP feature points. The adjusted depth aids in the color-based optimization of 3D Gaussian splatting, mitigating floating artifacts, and ensuring adherence to geometric constraints. We verify the proposed method on the NeRF-LLFF dataset with varying numbers of few images. Our approach demonstrates robust geometry compared to the original method that relies solely on images. Project page: robot0321.github.io/DepthRegGS", "label": 0, "field": "cs"} {"text": "Title: A quick probability-oriented introduction to operator splitting methods\nAbstract: This paper is an extended and reworked version of a short course given by the author at ''Uzbekistan-Ukrainian readings in stochastic processes'', Tashkent-Kyiv, 2022, and was prepared for a special issue of ''Theory of stochastic processes'', devoted to publishing lecture notes from the aforementioned workshop. The survey is devoted to operator splitting methods in the abstract formulation and their applications in probability. While the survey is focused on multiplicative methods, the BCH formula is used to discuss exponential splitting methods and a short informal introduction to additive splitting is presented. We introduce frameworks and available deterministic and probabilistic results and concentrate on constructing a wide picture of the field of operator splitting methods, providing a rigorous description in the setting of abstract Cauchy problems and an informal discussion for further and parallel advances. Some limitations and common difficulties are listed, as well as examples of works that provide solutions or hints. No new results are given. The bibliography contains illustrative deterministic examples and a selection of probability-related works.", "label": 0, "field": "math"} {"text": "Title: A Note on the Two Approaches to Stringy Functors for Orbifolds\nAbstract: In this note, we reconcile two approaches that have been used to construct stringy multiplications. The pushing forward after pulling back that has been used to give a global stringy extension of the functors K_0,K^{top},A^*,H^* [CR, FG, AGV, JKK2], and the pulling back after having pushed forward, which we have previously used in our (re)-construction program for G-Frobenius algebras, notably in considerations of singularities with symmetries and for symmetric products. A similar approach was also used by [CH] in their considerations of the Chen-Ruan product in a deRham setting for Abelian orbifolds. We show that the pull-push formalism has a solution by the push-pull equations in two situations. The first is a deRham formalism with Thom push-forward maps and the second is the setting of cyclic twisted sectors, which was at the heart of the (re)-construction program. We go on to do formal calculations using fractional Euler classes which allows us to formally treat all the stringy multiplications mentioned above in the general setting. The upshot is the formal trivialization of the co-cycles of the reconstruction program using the presentation of the obstruction bundle of [JKK2].", "label": 1, "field": "math"} {"text": "Title: Short Squeeze in DeFi Lending Market: Decentralization in Jeopardy?\nAbstract: Anxiety levels in the Aave community spiked in November 2022 as Avi Eisenberg performed an attack on Aave. Eisenberg attempted to short the CRV token by using funds borrowed on the protocol to artificially deflate the value of CRV. While the attack was ultimately unsuccessful, it left the Aave community scared and even raised question marks regarding the feasibility of large lending platforms under decentralized governance. In this work, we analyze Avi Eisenberg's actions and show how he was able to artificially lower the price of CRV by selling large quantities of borrowed CRV for stablecoins on both decentralized and centralized exchanges. Despite the failure of his attack, it still led to irretrievable debt worth more than 1.5 Mio USD at the time and, thereby, quadrupled the protocol's irretrievable debt. Furthermore, we highlight that his attack was enabled by the vast proportion of CRV available to borrow as well as Aave's lending protocol design hindering rapid intervention. We stress Eisenberg's attack exposes a predicament of large DeFi lending protocols: limit the scope or compromise on 'decentralization'.", "label": 1, "field": "cs"} {"text": "Title: The Case for Bayesian Deep Learning\nAbstract: The key distinguishing property of a Bayesian approach is marginalization instead of optimization, not the prior, or Bayes rule. Bayesian inference is especially compelling for deep neural networks. (1) Neural networks are typically underspecified by the data, and can represent many different but high performing models corresponding to different settings of parameters, which is exactly when marginalization will make the biggest difference for both calibration and accuracy. (2) Deep ensembles have been mistaken as competing approaches to Bayesian methods, but can be seen as approximate Bayesian marginalization. (3) The structure of neural networks gives rise to a structured prior in function space, which reflects the inductive biases of neural networks that help them generalize. (4) The observed correlation between parameters in flat regions of the loss and a diversity of solutions that provide good generalization is further conducive to Bayesian marginalization, as flat regions occupy a large volume in a high dimensional space, and each different solution will make a good contribution to a Bayesian model average. (5) Recent practical advances for Bayesian deep learning provide improvements in accuracy and calibration compared to standard training, while retaining scalability.", "label": 1, "field": "cs"} {"text": "Title: Wide Neural Networks Forget Less Catastrophically\nAbstract: A primary focus area in continual learning research is alleviating the \"catastrophic forgetting\" problem in neural networks by designing new algorithms that are more robust to the distribution shifts. While the recent progress in continual learning literature is encouraging, our understanding of what properties of neural networks contribute to catastrophic forgetting is still limited. To address this, instead of focusing on continual learning algorithms, in this work, we focus on the model itself and study the impact of \"width\" of the neural network architecture on catastrophic forgetting, and show that width has a surprisingly significant effect on forgetting. To explain this effect, we study the learning dynamics of the network from various perspectives such as gradient orthogonality, sparsity, and lazy training regime. We provide potential explanations that are consistent with the empirical results across different architectures and continual learning benchmarks.", "label": 1, "field": "cs"} {"text": "Title: On Memorization and Privacy Risks of Sharpness Aware Minimization\nAbstract: In many recent works, there is an increased focus on designing algorithms that seek flatter optima for neural network loss optimization as there is empirical evidence that it leads to better generalization performance in many datasets. In this work, we dissect these performance gains through the lens of data memorization in overparameterized models. We define a new metric that helps us identify which data points specifically do algorithms seeking flatter optima do better when compared to vanilla SGD. We find that the generalization gains achieved by Sharpness Aware Minimization (SAM) are particularly pronounced for atypical data points, which necessitate memorization. This insight helps us unearth higher privacy risks associated with SAM, which we verify through exhaustive empirical evaluations. Finally, we propose mitigation strategies to achieve a more desirable accuracy vs privacy tradeoff.", "label": 0, "field": "cs"} {"text": "Title: Cartan calculus for $C^\\infty$-ringed spaces\nAbstract: In an earlier paper (arXiv:2212.11163) I constructed a complex of differential forms on a local $C^\\infty$-ringed space. In this paper I define a sheaf of vector fields (``the tangent sheaf'') on a local $C^\\infty$-ringed space, define contractions of vector fields and forms, Lie derivatives of forms with respect to vector fields, and show that the standard equations of Cartan calculus hold for vector fields and differential forms on local $C^\\infty$-ringed spaces.", "label": 0, "field": "math"} {"text": "Title: Large and moderate deviations for Gaussian neural networks\nAbstract: We prove large and moderate deviations for the output of Gaussian fully connected neural networks. The main achievements concern deep neural networks (i.e., when the model has more than one hidden layer) and hold for bounded and continuous pre-activation functions. However, for deep neural networks fed by a single input, we have results even if the pre-activation is ReLU. When the network is shallow (i.e., there is exactly one hidden layer) the large and moderate principles hold for quite general pre-activations and in an infinite-dimensional setting.", "label": 0, "field": "math"} {"text": "Title: Higher dimensional Calabi-Yau manifolds of Kummer type\nAbstract: Based on Cynk-Hulek method we construct complex Calabi-Yau varieties of arbitrary dimensions using elliptic curves with automorphism of order 6. Also we give formulas for Hodge numbers of varieties obtained from that construction. We shall generalize result of Katsura and Sch\\\"utt to obtain arbitrarily dimensional Calabi-Yau manifolds which are Zariski in any characteristic $p\\not\\equiv 1\\pmod{12}.$", "label": 1, "field": "math"} {"text": "Title: Application of the Cartier Operator in Coding Theory\nAbstract: The $a$-number is an invariant of the isomorphism class of the $p$-torsion group scheme. We use the Cartier operator on $H^0(\\mathcal{A}_2,\\Omega^1)$ to find a closed formula for the $a$-number of the form $\\mathcal{A}_2 = v(Y^{\\sqrt{q}}+Y-x^{\\frac{\\sqrt{q}+1}{2}})$ where $q=p^s$ over the finite field $\\mathbb{F}_{q^2}$. The application of the computed $a$-number in coding theory is illustrated by the relationship between the algebraic properties of the curve and the parameters of codes that are supported by it.", "label": 0, "field": "cs"} {"text": "Title: Cohomology of fixed point sets of anti-symplectic involutions in the Hilbert scheme of points on a surface\nAbstract: Let $S$ be a smooth, quasi-projective complex surface with complex symplectic form $\\omega \\in H^0(S, K_S)$. This determines a symplectic form $\\omega_n$ on the Hilbert scheme of points $S^{[n]}$ for $n \\geq 1$. Let $\\tau$ be an anti-symplectic involution of $(S,\\omega)$: an order two automorphism of $S$ such that $ \\tau^*\\omega=-\\omega$. Then $\\tau$ induces an anti-symplectic involution on $(S^{[n]},\\omega_n)$ and the fixed point set $(S^{[n]})^\\tau$ is a smooth Lagrangian subvariety of $S^{[n]}$. In this paper, we calculate the mixed Hodge structure of $H^*( (S^{[n]})^\\tau; \\mathbb{Q})$ in terms of the mixed Hodge structures of $H^*( S^\\tau;\\mathbb{Q})$ and of $H^*( S / \\tau; \\mathbb{Q})$. We also classify the connected components of $(S^{[n]})^\\tau$ and determine their mixed Hodge structures. Our results apply more generally whenever $S$ is a smooth quasi-projective surface, and $\\tau$ is an involution of $S$ for which $S^\\tau$ is a curve.", "label": 0, "field": "math"} {"text": "Title: Beyond Information Exchange: An Approach to Deploy Network Properties for Information Diffusion\nAbstract: Information diffusion in Online Social Networks is a new and crucial problem in social network analysis field and requires significant research attention. Efficient diffusion of information are of critical importance in diverse situations such as; pandemic prevention, advertising, marketing etc. Although several mathematical models have been developed till date, but previous works lacked systematic analysis and exploration of the influence of neighborhood for information diffusion. In this paper, we have proposed Common Neighborhood Strategy (CNS) algorithm for information diffusion that demonstrates the role of common neighborhood in information propagation throughout the network. The performance of CNS algorithm is evaluated on several real-world datasets in terms of diffusion speed and diffusion outspread and compared with several widely used information diffusion models. Empirical results show CNS algorithm enables better information diffusion both in terms of diffusion speed and diffusion outspread.", "label": 1, "field": "cs"} {"text": "Title: The Constrained Round Robin Algorithm for Fair and Efficient Allocation\nAbstract: We consider a multi-agent resource allocation setting that models the assignment of papers to reviewers. A recurring issue in allocation problems is the compatibility of welfare/efficiency and fairness. Given an oracle to find a welfare-achieving allocation, we embed such an oracle into a flexible algorithm called the Constrained Round Robin (CRR) algorithm, that achieves the required welfare level. Our algorithm also allows the system designer to lower the welfare requirements in order to achieve a higher degree of fairness. If the welfare requirement is lowered enough, a strengthening of envy-freeness up to one item is guaranteed. Hence, our algorithm can be viewed as a computationally efficient way to interpolate between welfare and approximate envy-freeness in allocation problems.", "label": 1, "field": "cs"} {"text": "Title: Disjointness for measurably distal group actions and applications\nAbstract: We generalize Berg's notion of quasi-disjointness to actions of countable groups and prove that every measurably distal system is quasi-disjoint from every measure preserving system. As a corollary we obtain easy to check necessary and sufficient conditions for two systems to be disjoint, provided one of them is measurably distal. We also obtain a Wiener--Wintner type theorem for countable amenable groups with distal weights and applications to weighted multiple ergodic averages and multiple recurrence.", "label": 1, "field": "math"} {"text": "Title: STAS: Spatial-Temporal Return Decomposition for Multi-agent Reinforcement Learning\nAbstract: Centralized Training with Decentralized Execution (CTDE) has been proven to be an effective paradigm in cooperative multi-agent reinforcement learning (MARL). One of the major challenges is credit assignment, which aims to credit agents by their contributions. While prior studies have shown great success, their methods typically fail to work in episodic reinforcement learning scenarios where global rewards are revealed only at the end of the episode. They lack the functionality to model complicated relations of the delayed global reward in the temporal dimension and suffer from inefficiencies. To tackle this, we introduce Spatial-Temporal Attention with Shapley (STAS), a novel method that learns credit assignment in both temporal and spatial dimensions. It first decomposes the global return back to each time step, then utilizes the Shapley Value to redistribute the individual payoff from the decomposed global reward. To mitigate the computational complexity of the Shapley Value, we introduce an approximation of marginal contribution and utilize Monte Carlo sampling to estimate it. We evaluate our method on an Alice & Bob example and MPE environments across different scenarios. Our results demonstrate that our method effectively assigns spatial-temporal credit, outperforming all state-of-the-art baselines.", "label": 0, "field": "cs"} {"text": "Title: Optimal Synthesis of Finite State Machines with Universal Gates using Evolutionary Algorithm\nAbstract: This work presents an optimization method for the synthesis of finite state machines. The focus is on the reduction in the on-chip area and the cost of the circuit. A list of finite state machines from MCNC91 benchmark circuits have been evolved using Cartesian Genetic Programming. On the average, almost 30% of reduction in the total number of gates has been achieved. The effects of some parameters on the evolutionary process have also been discussed in the paper.", "label": 0, "field": "cs"} {"text": "Title: The \"exponential\" torsion of superelliptic Jacobians\nAbstract: Let $J$ be the Jacobian of a superelliptic curve defined by the equation $y^{\\ell} = f(x)$, where $f$ is a separable polynomial of degree non-divisible by $\\ell$. In this article we study the \"exponential\" (i.e. $\\ell$-power) torsion of $J$. In particular, under some mild conditions on the polynomial $f$, we determine the image of the associated $\\ell$-adic representation up to the determinant. We show also that the image of the determinant is contained in an explicit $\\mathbb Z_{\\ell}$-lattice with a finite index. As an application, we prove the Mumford-Tate conjecture for a generic superelliptic Jacobian of the above type.", "label": 0, "field": "math"} {"text": "Title: Dynamics of point-vortex systems near thermal equilibrium: relaxation or not?\nAbstract: This article is devoted to the long-time dynamics of point-vortex systems near thermal equilibrium and to the possible emergence of collisional relaxation. More precisely, we consider a tagged particle coupled to a large number of background particles that are initially at equilibrium, and we analyze its resulting slow dynamics. On the one hand, in the spirit of the Lenard-Balescu relaxation for plasmas, we establish in a generic setting the outset of the slow thermalization of the tagged particle. On the other hand, we show that a completely different phenomenology is also possible in some degenerate regime: the slow dynamics of the tagged particle then remains conservative and the thermalization no longer holds in a strict sense. We provide the first detailed description of this degenerate regime and of its mixing properties. Note that it is particularly delicate to handle due to statistical closure problems, which manifest themselves as a lack of self-adjointness of the effective Hamiltonian.", "label": 0, "field": "math"} {"text": "Title: Positive Semidefinite Metric Learning with Boosting\nAbstract: The learning of appropriate distance metrics is a critical problem in image classification and retrieval. In this work, we propose a boosting-based technique, termed \\BoostMetric, for learning a Mahalanobis distance metric. One of the primary difficulties in learning such a metric is to ensure that the Mahalanobis matrix remains positive semidefinite. Semidefinite programming is sometimes used to enforce this constraint, but does not scale well. \\BoostMetric is instead based on a key observation that any positive semidefinite matrix can be decomposed into a linear positive combination of trace-one rank-one matrices. \\BoostMetric thus uses rank-one positive semidefinite matrices as weak learners within an efficient and scalable boosting-based learning process. The resulting method is easy to implement, does not require tuning, and can accommodate various types of constraints. Experiments on various datasets show that the proposed algorithm compares favorably to those state-of-the-art methods in terms of classification accuracy and running time.", "label": 1, "field": "cs"} {"text": "Title: A rewriting-logic-with-SMT-based formal analysis and parameter synthesis framework for parametric time Petri nets\nAbstract: This paper presents a concrete and a symbolic rewriting logic semantics for parametric time Petri nets with inhibitor arcs (PITPNs), a flexible model of timed systems where parameters are allowed in firing bounds. We prove that our semantics is bisimilar to the \"standard\" semantics of PITPNs. This allows us to use the rewriting logic tool Maude, combined with SMT solving, to provide sound and complete formal analyses for PITPNs. We develop and implement a new general folding approach for symbolic reachability, so that Maude-with-SMT reachability analysis terminates whenever the parametric state-class graph of the PITPN is finite. Our work opens up the possibility of using the many formal analysis capabilities of Maude -- including full LTL model checking, analysis with user-defined analysis strategies, and even statistical model checking -- for such nets. We illustrate this by explaining how almost all formal analysis and parameter synthesis methods supported by the state-of-the-art PITPN tool Romeo can be performed using Maude with SMT. In addition, we also support analysis and parameter synthesis from parametric initial markings, as well as full LTL model checking and analysis with user-defined execution strategies. Experiments show that our methods outperform Romeo in many cases.", "label": 0, "field": "cs"} {"text": "Title: Error Approximation and Bias Correction in Dynamic Problems using a Recurrent Neural Network/Finite Element Hybrid Model\nAbstract: This work proposes a hybrid modeling framework based on recurrent neural networks (RNNs) and the finite element (FE) method to approximate model discrepancies in time dependent, multi-fidelity problems, and use the trained hybrid models to perform bias correction of the low-fidelity models. The hybrid model uses FE basis functions as a spatial basis and RNNs for the approximation of the time dependencies of the FE basis' degrees of freedom. The training data sets consist of sparse, non-uniformly sampled snapshots of the discrepancy function, pre-computed from trajectory data of low- and high-fidelity dynamic FE models. To account for data sparsity and prevent overfitting, data upsampling and local weighting factors are employed, to instigate a trade-off between physically conforming model behavior and neural network regression. The proposed hybrid modeling methodology is showcased in three highly non-trivial engineering test-cases, all featuring transient FE models, namely, heat diffusion out of a heat sink, eddy-currents in a quadrupole magnet, and sound wave propagation in a cavity. The results show that the proposed hybrid model is capable of approximating model discrepancies to a high degree of accuracy and accordingly correct low-fidelity models.", "label": 0, "field": "cs"} {"text": "Title: Deep Learning based Multi-Label Image Classification of Protest Activities\nAbstract: With the rise of internet technology amidst increasing rates of urbanization, sharing information has never been easier thanks to globally-adopted platforms for digital communication. The resulting output of massive amounts of user-generated data can be used to enhance our understanding of significant societal issues particularly for urbanizing areas. In order to better analyze protest behavior, we enhanced the GSR dataset and manually labeled all the images. We used deep learning techniques to analyze social media data to detect social unrest through image classification, which performed good in predict multi-attributes, then also used map visualization to display protest behaviors across the country.", "label": 1, "field": "cs"} {"text": "Title: Chaos expansion of 2D parabolic Anderson model\nAbstract: We prove a chaos expansion for the 2D parabolic Anderson Model in small time, with the expansion coefficients expressed in terms of the annealed density function of the polymer in a white noise environment.", "label": 1, "field": "math"} {"text": "Title: Collective Choice Theory in Collaborative Computing\nAbstract: This paper presents some fundamental collective choice theory for information system designers, particularly those working in the field of computer-supported cooperative work. This paper is focused on a presentation of Arrow's Possibility and Impossibility theorems which form the fundamental boundary on the efficacy of collective choice: voting and selection procedures. It restates the conditions that Arrow placed on collective choice functions in more rigorous second-order logic, which could be used as a set of test conditions for implementations, and a useful probabilistic result for analyzing votes on issue pairs. It also describes some simple collective choice functions. There is also some discussion of how enterprises should approach putting their resources under collective control: giving an outline of a superstructure of performative agents to carry out this function and what distributing processing technology would be needed.", "label": 1, "field": "cs"} {"text": "Title: Galois subspaces for smooth projective curves\nAbstract: Given an embedding of a smooth projective curve $X$ of genus $g\\geq1$ into $\\mathbb{P}^N$, we study the locus of linear subspaces of $\\mathbb{P}^N$ of codimension 2 such that projection from said subspace, composed with the embedding, gives a Galois morphism $X\\to\\mathbb{P}^1$. For genus $g\\geq2$ we prove that this locus is a smooth projective variety with components isomorphic to projective spaces. If $g=1$ and the embedding is given by a complete linear system, we prove that this locus is also a smooth projective variety whose positive-dimensional components are isomorphic to projective bundles over \\'etale quotients of the elliptic curve, and we describe these components explicitly.", "label": 1, "field": "math"} {"text": "Title: Primitive elements in infinitesimal bialgebras\nAbstract: For any set S, the free magmatic algebra spanned by card(S) binary products is the vector space spanned by the set of all planar rooted binary trees with the internal nodes colored by the elements of S, graded by the number of leaves of a tree. We show that it has a unique structure of coassociative coalgebra such that the coproduct satisfies the unital infinitesimal condition with each magmatic product, and prove an analog of Aguiar-Sottile formula in this context, describing the coproduct in terms of the Moebius basis for the Tamari order. The last result allows us to compute the subspace of primitive elements of any unital infinitesimal S-magmatic bialgebra. As an example, we construct a set of generators of the dual of Pilaud and Pons bialgebra of integer relations and compute an explicit basis of its subspace of primitive elements.", "label": 0, "field": "math"} {"text": "Title: Towards understanding the Pierce-Birkhoff conjecture via MV-algebras\nAbstract: Our main issue was to understand the connection between \\L ukasiewicz logic with product and the Pierce-Birkhoff conjecture, and to express it in a mathematical way. To do this we define the class of \\textit{f}MV-algebras, which are MV-algebras endowed with both an internal binary product and a scalar product with scalars from $[0,1]$. The proper quasi-variety generated by $[0,1]$, with both products interpreted as the real product, provides the desired framework: the normal form theorem of its corresponding logical system can be seen as a local version of the Pierce-Birkhoff conjecture.", "label": 1, "field": "math"} {"text": "Title: A noncommutative Davis' decomposition for martingales\nAbstract: We prove an analogue of the classical Davis' decomposition for martingales in noncommutative L_p-spaces, involving the square functions. We also determine the dual space of the noncommutative conditioned Hardy space \\h_1. We further extend this latter result to the case 11$, where the maximum degree of $P(n,m)$ is not concentrated on any subset of $[n]$ with bounded size.", "label": 1, "field": "math"} {"text": "Title: Craig's Interpolation Theorem formalised and mechanised in Isabelle/HOL\nAbstract: We formalise and mechanise a construtive, proof theoretic proof of Craig's Interpolation Theorem in Isabelle/HOL. We give all the definitions and lemma statements both formally and informally. We also transcribe informally the formal proofs. We detail the main features of our mechanisation, such as the formalisation of binding for first order formulae. We also give some applications of Craig's Interpolation Theorem.", "label": 1, "field": "cs"} {"text": "Title: Non-commutative ambits and equivariant compactifications\nAbstract: We prove that an action $\\rho:A\\to M(C_0(\\mathbb{G})\\otimes A)$ of a locally compact quantum group on a $C^*$-algebra has a universal equivariant compactification, and prove a number of other category-theoretic results on $\\mathbb{G}$-equivariant compactifications: that the categories compactifications of $\\rho$ and $A$ respectively are locally presentable (hence complete and cocomplete), that the forgetful functor between them is a colimit-creating left adjoint, and that epimorphisms therein are surjective and injections are regular monomorphisms. When $\\mathbb{G}$ is regular coamenable we also show that the forgetful functor from unital $\\mathbb{G}$-$C^*$-algebras to unital $C^*$-algebras creates finite limits and is comonadic, and that the monomorphisms in the former category are injective.", "label": 1, "field": "math"} {"text": "Title: Necessary and sufficient graphical conditions for optimal adjustment sets in causal graphical models with hidden variables\nAbstract: The problem of selecting optimal backdoor adjustment sets to estimate causal effects in graphical models with hidden and conditioned variables is addressed. Previous work has defined optimality as achieving the smallest asymptotic estimation variance and derived an optimal set for the case without hidden variables. For the case with hidden variables there can be settings where no optimal set exists and currently only a sufficient graphical optimality criterion of limited applicability has been derived. In the present work optimality is characterized as maximizing a certain adjustment information which allows to derive a necessary and sufficient graphical criterion for the existence of an optimal adjustment set and a definition and algorithm to construct it. Further, the optimal set is valid if and only if a valid adjustment set exists and has higher (or equal) adjustment information than the Adjust-set proposed in Perkovi{\\'c} et al. [Journal of Machine Learning Research, 18: 1--62, 2018] for any graph. The results translate to minimal asymptotic estimation variance for a class of estimators whose asymptotic variance follows a certain information-theoretic relation. Numerical experiments indicate that the asymptotic results also hold for relatively small sample sizes and that the optimal adjustment set or minimized variants thereof often yield better variance also beyond that estimator class. Surprisingly, among the randomly created setups more than 90\\% fulfill the optimality conditions indicating that also in many real-world scenarios graphical optimality may hold. Code is available as part of the python package \\url{https://github.com/jakobrunge/tigramite}.", "label": 1, "field": "cs"} {"text": "Title: Sorting by Reversals and the Theory of 4-Regular Graphs\nAbstract: We show that the theory of sorting by reversals fits into the well-established theory of circuit partitions of 4-regular multigraphs (which also involves the combinatorial structures of circle graphs and delta-matroids). In this way, we expose strong connections between the two theories that have not been fully appreciated before. We also discuss a generalization of sorting by reversals involving the double-cut-and-join (DCJ) operation. Finally, we also show that the theory of sorting by reversals is closely related to that of gene assembly in ciliates.", "label": 1, "field": "cs"} {"text": "Title: Perfect matchings and Hamilton cycles in uniform attachment graphs\nAbstract: We study Hamilton cycles and perfect matchings in a uniform attachment graph. In this random graph, vertices are added sequentially, and when a vertex $t$ is created, it makes $k$ independent and uniform choices from $\\{1,\\dots,t-1\\}$ and attaches itself to these vertices. Improving the results of Frieze, P\\'erez-Gim\\'enez, Pra\\l{}at and Reiniger (2019), we show that, with probability approaching 1 as $n$ tends to infinity, a uniform attachment graph on $n$ vertices has a perfect matching for $k \\ge 5$ and a Hamilton cycle for $k\\ge 13$. One of the ingredients in our proofs is the identification of a subset of vertices that is least likely to expand, which provides us with better expansion rates than the existing ones.", "label": 1, "field": "math"} {"text": "Title: A Moebius inversion formula to discard tangled hyperbolic surfaces\nAbstract: Recent literature on Weil-Petersson random hyperbolic surfaces has met a consistent obstacle: the necessity to condition the model, prohibiting certain rare geometric patterns (which we call tangles), such as short closed geodesics or embedded surfaces of short boundary length. The main result of this article is a Moebius inversion formula, allowing to integrate the indicator function of the set of tangle-free surfaces in a systematic, tractable way. It is inspired by a key step of Friedman's celebrated proof of Alon's conjecture. We further prove that our tangle-free hypothesis significantly reduces the number of local topological types of short geodesics, replacing the exponential proliferation observed on tangled surfaces by a polynomial growth.", "label": 0, "field": "math"} {"text": "Title: Box complexes: at the crossroad of graph theory and topology\nAbstract: Various simplicial complexes can be associated with a graph. Box complexes form an important families of such simplicial complexes and are especially useful for providing lower bounds on the chromatic number of the graph via some of their topological properties. They provide thus a fascinating topic mixing topology and discrete mathematics. This paper is intended to provide an up-do-date survey on box complexes. It is based on classical results and recent findings from the literature, but also establishes new results improving our current understanding of the topic, and identifies several challenging open questions.", "label": 0, "field": "math"} {"text": "Title: Markov modulated fluid network process: Tail asymptotics of the stationary distribution\nAbstract: We consider a Markov modulated fluid network with a finite number of stations. We are interested in the tail asymptotics behavior of the stationary distribution of its buffer content process. Using two different approaches, we derive upper and lower bounds for the stationary tail decay rate in various directions. Both approaches are based on a well-known time-evolution formula of a Markov process, so-called Dynkin's formula, where a key ingredient is a suitable choice of test functions. Those results show how multidimensional tail asymptotics can be studied for the more than two-dimensional case, which is known as a hard problem.", "label": 1, "field": "math"} {"text": "Title: A minimum semi-degree sufficient condition for one-to-many disjoint path covers in semicomplete digraphs\nAbstract: Let $D$ be a digraph. We define the minimum semi-degree of $D$ as $\\delta^{0}(D) := \\min \\{\\delta^{+}(D), \\delta^{-}(D)\\}$. Let $k$ be a positive integer, and let $S = \\{s\\}$ and $T = \\{t_{1}, \\dots ,t_{k}\\}$ be any two disjoint subsets of $V(D)$. A set of $k$ internally disjoint paths joining source set $S$ and sink set $T$ that cover all vertices $D$ are called a one-to-many $k$-disjoint directed path cover ($k$-DDPC for short) of $D$. A digraph $D$ is semicomplete if for every pair $x,y$ of vertices of it, there is at least one arc between $x$ and $y$. In this paper, we prove that every semicomplete digraph $D$ of sufficiently large order $n$ with $\\delta^{0}(D) \\geq \\lceil (n+k-1)/2\\rceil$ has a one-to-many $k$-DDPC joining any disjoint source set $S$ and sink set $T$, where $S = \\{s\\}, T = \\{t_{1}, \\dots, t_{k}\\}$.", "label": 1, "field": "math"} {"text": "Title: A load balanced chemistry model with analytical Jacobian for faster reactive simulations in OpenFOAM\nAbstract: In this study, we introduce a novel open-source chemistry model for OpenFOAM to speed-up the reactive computational fluid dynamics (CFD) simulations using finite-rate chemistry. First, a dynamic load balancing model called DLBFoam is introduced to balance the chemistry load during runtime in parallel simulations. In addition, the solution of the cell-based chemistry problem is improved by utilizing an analytical Jacobian using an open-source library called pyJac and an efficient linear algebra library LAPACK. Combination of the aforementioned efforts yields a speed-up factor 200 for a high-fidelity large-eddy simulation spray combustion case compared to the standard OpenFOAM implementation. It is worth noting that the present implementation does not compromise the solution accuracy.", "label": 1, "field": "cs"} {"text": "Title: Debiased Cross-modal Matching for Content-based Micro-video Background Music Recommendation\nAbstract: Micro-video background music recommendation is a complicated task where the matching degree between videos and uploader-selected background music is a major issue. However, the selection of the user-generated content (UGC) is biased caused by knowledge limitations and historical preferences among music of each uploader. In this paper, we propose a Debiased Cross-Modal (DebCM) matching model to alleviate the influence of such selection bias. Specifically, we design a teacher-student network to utilize the matching of segments of music videos, which is professional-generated content (PGC) with specialized music-matching techniques, to better alleviate the bias caused by insufficient knowledge of users. The PGC data is captured by a teacher network to guide the matching of uploader-selected UGC data of the student network by KL-based knowledge transfer. In addition, uploaders' personal preferences of music genres are identified as confounders that spuriously correlate music embeddings and background music selections, resulting in the learned recommender system to over-recommend music from the majority groups. To resolve such confounders in the UGC data of the student network, backdoor adjustment is utilized to deconfound the spurious correlation between music embeddings and prediction scores. We further utilize Monte Carlo (MC) estimator with batch-level average as the approximations to avoid integrating the entire confounder space calculated by the adjustment. Extensive experiments on the TT-150k-genre dataset demonstrate the effectiveness of the proposed method towards the selection bias. The code is publicly available on: \\url{https://github.com/jing-1/DebCM}.", "label": 1, "field": "cs"} {"text": "Title: Task and Explanation Network\nAbstract: Explainability in deep networks has gained increased importance in recent years. We argue herein that an AI must be tasked not just with a task but also with an explanation of why said task was accomplished as such. We present a basic framework -- Task and Explanation Network (TENet) -- which fully integrates task completion and its explanation. We believe that the field of AI as a whole should insist -- quite emphatically -- on explainability.", "label": 0, "field": "cs"} {"text": "Title: Packing graphs of bounded codegree\nAbstract: Two graphs $G_1$ and $G_2$ on $n$ vertices are said to pack if there exist injective mappings of their vertex sets into $[n]$ such that the images of their edge sets are disjoint. A longstanding conjecture due to Bollob\\'as and Eldridge and, independently, Catlin, asserts that, if $(\\Delta_1(G)+1) (\\Delta_2(G)+1) \\le n+1$, then $G_1$ and $G_2$ pack. We consider the validity of this assertion under the additional assumption that $G_1$ or $G_2$ has bounded codegree. In particular, we prove for all $t \\ge 2$ that, if $G_1$ contains no copy of the complete bipartite graph $K_{2,t}$ and $\\Delta_1 > 17 t \\cdot \\Delta_2$, then $(\\Delta_1(G)+1) (\\Delta_2(G)+1) \\le n+1$ implies that $G_1$ and $G_2$ pack. We also provide a mild improvement if moreover $G_2$ contains no copy of the complete tripartite graph $K_{1,1,s}$, $s\\ge 1$.", "label": 1, "field": "math"} {"text": "Title: Explore Human Parsing Modality for Action Recognition\nAbstract: Multimodal-based action recognition methods have achieved high success using pose and RGB modality. However, skeletons sequences lack appearance depiction and RGB images suffer irrelevant noise due to modality limitations. To address this, we introduce human parsing feature map as a novel modality, since it can selectively retain effective semantic features of the body parts, while filtering out most irrelevant noise. We propose a new dual-branch framework called Ensemble Human Parsing and Pose Network (EPP-Net), which is the first to leverage both skeletons and human parsing modalities for action recognition. The first human pose branch feeds robust skeletons in graph convolutional network to model pose features, while the second human parsing branch also leverages depictive parsing feature maps to model parsing festures via convolutional backbones. The two high-level features will be effectively combined through a late fusion strategy for better action recognition. Extensive experiments on NTU RGB+D and NTU RGB+D 120 benchmarks consistently verify the effectiveness of our proposed EPP-Net, which outperforms the existing action recognition methods. Our code is available at: https://github.com/liujf69/EPP-Net-Action.", "label": 0, "field": "cs"} {"text": "Title: Which Quantum Circuit Mutants Shall Be Used? An Empirical Evaluation of Quantum Circuit Mutations\nAbstract: As a new research area, quantum software testing lacks systematic testing benchmarks to assess testing techniques' effectiveness. Recently, some open-source benchmarks and mutation analysis tools have emerged. However, there is insufficient evidence on how various quantum circuit characteristics (e.g., circuit depth, number of quantum gates), algorithms (e.g., Quantum Approximate Optimization Algorithm), and mutation characteristics (e.g., mutation operators) affect the most mutant detection in quantum circuits. Studying such relations is important to systematically design faulty benchmarks with varied attributes (e.g., the difficulty in detecting a seeded fault) to facilitate assessing the cost-effectiveness of quantum software testing techniques efficiently. To this end, we present a large-scale empirical evaluation with more than 700K faulty benchmarks (quantum circuits) generated by mutating 382 real-world quantum circuits. Based on the results, we provide valuable insights for researchers to define systematic quantum mutation analysis techniques. We also provide a tool to recommend mutants to users based on chosen characteristics (e.g., a quantum algorithm type) and the required difficulty of killing mutants. Finally, we also provide faulty benchmarks that can already be used to assess the cost-effectiveness of quantum software testing techniques.", "label": 0, "field": "cs"} {"text": "Title: A Galton-Watson tree approach to local limits of permutations avoiding a pattern of length three\nAbstract: We use local limits of Galton-Watson trees to establish local limit theorems for permutations conditioned to avoid a pattern of length three. In the case of 321-avoiding permutations our results resolve an open problem of Pinsky. In the other cases our results give new descriptions of the limiting objects in terms of size-biased Galton-Watson trees.", "label": 0, "field": "math"} {"text": "Title: Sommets fortement critiques d'un tournoi ind\u00e9composable\nAbstract: Let $T=(V,A)$ be a tournament. For $X\\subseteq V$, the subtournament of $T$ induced by $X$ is denoted by $T[X]$. A subset $I$ of $V$ is an interval of $T$ provided that for every $a,b\\in I$ and $x\\in V\\setminus I$, $(a,x)\\in A$ if and only if $(b,x)\\in A$. For example, $\\varnothing $, ${x}$ ($x \\in V$) and $V$ are intervals of $T$, called trivial intervals. The tournament $T$ is indecomposable if all its intervals are trivial, otherwise, it is decomposable. A critical tournament is an indecomposable tournament $T$ of cardinality $\\geqslant 5$ such that every vertex $x$ of $T$ is critical, i.e., the subtournament $T[V(T)\\setminus\\{x\\}]$ is decomposable. Given an indecomposable tournament $T$, a vertex $x$ of $T$ is strongly critical, if for every $X\\subseteq V(T)$ such that $x\\in X$, $\\vert X\\vert \\geqslant 5$ and $T[X]$ is indecomposable, $x$ is a critical vertex of $T[X]$. Let $T$ be an indecomposable tournament and let $\\mathscr{C}(T)$ be the set of the strongly critical vertices of $T$. We prove that, if $T$ is non-critical, then $f(T):=\\vert \\mathscr{C}(T)\\vert \\leqslant 4$, and that the correspondence $f(T)$ is decreasing from the class of indecomposable and non-critical tournaments (defined by means of embedding) to $\\{0,1,2,3,4\\}$. By giving examples, we also verify that the bounds 0 and 4 are optimal. This article is an extract from my master's thesis \\cite{mon mast\\`ere}.", "label": 0, "field": "math"} {"text": "Title: Construction of spherical cubature formulas using lattices\nAbstract: We construct cubature formulas on spheres supported by homothetic images of shells in some Euclidian lattices. Our analysis of these cubature formulas uses results from the theory of modular forms. Examples are worked out on the sphere of dimension n-1 for n=4, 8, 12, 14, 16, 20, 23, and 24, and the sizes of the cubature formulas we obtain are compared with the lower bounds given by Linear Programming.", "label": 1, "field": "math"} {"text": "Title: Classification of algebras of level two in the variety of nilpotent algebras and Leibniz algebras\nAbstract: This paper is devoted to the description of complex finite-dimensional algebras of level two. We obtain the classification of algebras of level two in the variety of Leibniz algebras. It is shown that, up to isomorphism, there exist three Leibniz algebras of level two, one of which is solvable, and two of which are nilpotent. Moreover we describe all algebras of level two in the variety of nilpotent algebras.", "label": 1, "field": "math"} {"text": "Title: Integrability of moduli and regularity of Denjoy counterexamples\nAbstract: We study the regularity of exceptional actions of groups by $C^{1,\\alpha}$ diffeomorphisms on the circle, i.e. ones which admit exceptional minimal sets, and whose elements have first derivatives that are continuous with concave modulus of continuity $\\alpha$. Let $G$ be a finitely generated group admitting a $C^{1,\\alpha}$ action $\\rho$ with a free orbit on the circle, and such that the logarithms of derivatives of group elements are uniformly bounded at some point of the circle. We prove that if $G$ has spherical growth bounded by $c n^{d-1}$ and if the function $1/\\alpha^d$ is integrable near zero, then under some mild technical assumptions on $\\alpha$, there is a sequence of exceptional $C^{1,\\alpha}$ actions of $G$ which converge to $\\rho$ in the $C^1$ topology. As a consequence for a single diffeomorphism, we obtain that if the function $1/\\alpha$ is integrable near zero, then there exists a $C^{1,\\alpha}$ exceptional diffeomorphism of the circle. This corollary accounts for all previously known moduli of continuity for derivatives of exceptional diffeomorphisms. We also obtain a partial converse to our main result. For finitely generated free abelian groups, the existence of an exceptional action, together with some natural hypotheses on the derivatives of group elements, puts integrability restrictions on the modulus $\\alpha$. These results are related to a long-standing question of D. McDuff concerning the length spectrum of exceptional $C^1$ diffeomorphisms of the circle.", "label": 1, "field": "math"} {"text": "Title: Bagchi's Theorem for families of automorphic forms\nAbstract: We prove a version of Bagchi's Theorem and of Voronin's Universality Theorem for family of primitive cusp forms of weight $2$ and prime level, and discuss under which conditions the argument will apply to general reasonable family of automorphic $L$-functions.", "label": 1, "field": "math"} {"text": "Title: Real-and-Present: Investigating the Use of Life-Size 2D Video Avatars in HMD-Based AR Teleconferencing\nAbstract: Augmented Reality (AR) teleconferencing allows separately located users to interact with each other in 3D through agents in their own physical environments. Existing methods leveraging volumetric capturing and reconstruction can provide a high-fidelity experience but are often too complex and expensive for everyday usage. Other solutions target mobile and effortless-to-setup teleconferencing on AR Head Mounted Displays (HMD). They directly transplant the conventional video conferencing onto an AR-HMD platform or use avatars to represent remote participants. However, they can only support either a high fidelity or a high level of co-presence. Moreover, the limited Field of View (FoV) of HMDs could further influence users' immersive experience. To achieve a balance between fidelity and co-presence, we explore using life-size 2D video-based avatars (video avatars for short) in AR teleconferencing. Specifically, with the potential effect of FoV on users' perception of proximity, we first conduct a pilot study to explore the local-user-centered optimal placement of video avatars in small-group AR conversations. With the placement results, we then implement a proof-of-concept prototype of video-avatar-based teleconferencing. We conduct user evaluations with the prototype to verify its effectiveness in balancing fidelity and co-presence. Following the indication in the pilot study, we further quantitatively explore the effect of FoV size on the video avatar's optimal placement through a user study involving more FoV conditions in a VR-simulated environment. We regress placement models to serve as references for computationally determining video avatar placements in such teleconferencing applications on various existing AR HMDs and future ones with bigger FoVs.", "label": 0, "field": "cs"} {"text": "Title: CLASS-M: Adaptive stain separation-based contrastive learning with pseudo-labeling for histopathological image classification\nAbstract: Histopathological image classification is an important task in medical image analysis. Recent approaches generally rely on weakly supervised learning due to the ease of acquiring case-level labels from pathology reports. However, patch-level classification is preferable in applications where only a limited number of cases are available or when local prediction accuracy is critical. On the other hand, acquiring extensive datasets with localized labels for training is not feasible. In this paper, we propose a semi-supervised patch-level histopathological image classification model, named CLASS-M, that does not require extensively labeled datasets. CLASS-M is formed by two main parts: a contrastive learning module that uses separated Hematoxylin and Eosin images generated through an adaptive stain separation process, and a module with pseudo-labels using MixUp. We compare our model with other state-of-the-art models on two clear cell renal cell carcinoma datasets. We demonstrate that our CLASS-M model has the best performance on both datasets. Our code is available at github.com/BzhangURU/Paper_CLASS-M/tree/main", "label": 0, "field": "cs"} {"text": "Title: Weyl modules and Levi subalgebras\nAbstract: For a simple complex Lie algebra of finite rank and classical type, we fix a triangular decomposition and consider the simple Levi subalgebras associated to closed subsets of roots. We study the restriction of global and local Weyl modules of current algebras to this Levi subalgebra. We identify necessary and sufficient conditions on a pair of a Levi subalgebra and a dominant integral weight, such that the restricted module is a global (resp. a local) Weyl module.", "label": 1, "field": "math"} {"text": "Title: KK-duality for the Cuntz-Pimsner algebras of Temperley-Lieb subproduct systems\nAbstract: We prove that the Cuntz-Pimsner algebra of every Temperley-Lieb subproduct system is KK-self-dual. We show also that every such Cuntz-Pimsner algebra has a canonical KMS-state, which we use to construct a Fredholm module representative for the fundamental class of the duality. This allows us to describe the K-homology of the Cuntz-Pimsner algebras by explicit Fredholm modules. Both the construction of the dual class and the proof of duality rely in a crucial way on quantum symmetries of Temperley-Lieb subproduct systems. In the simplest case of Arveson's $2$-shift our work establishes $U(2)$-equivariant KK-self-duality of $S^3$.", "label": 0, "field": "math"} {"text": "Title: From transient elastic linkages to friction: a complete study of a penalized fourth order equation with delay\nAbstract: In this paper we consider a fourth order nonlinear parabolic delayed problem modelling a quasi-instantaneous turn-over of linkages in the context of cell-motility. The model depends on a small parameter $\\epsilon$ which represents a typical time scale of the memory effect. We first prove global existence and uniqueness of solutions for $\\epsilon$ fixed. This is achieved by combining suitable fixed-point and energy arguments and by uncovering a nonlocal in time, integral conserved quantity. After giving a complete classification of steady states in terms of elliptic functions, we next show that every solution converges to a steady state as $t \\to \\infty$. When $\\epsilon \\to 0$, we then establish convergence results on finite time intervals, showing that the solution tends in a suitable sense towards the solution of a parabolic problem without delay. Moreover, we establish the convergence of energies as $\\epsilon \\to 0$, which enables us to show that, for $\\epsilon$ small enough, the $\\epsilon$-dependent problem inherits part of the large time asymptotics of the limiting parabolic problem.", "label": 0, "field": "math"} {"text": "Title: A PDE approach for solving the characteristic function of the generalised signature process\nAbstract: The signature of a path, as a fundamental object in Rough path theory, serves as a generating function for non-communicative monomials on path space. It transforms the path into a grouplike element in the tensor algebra space, summarising the path faithfully up to a generalised form of re-parameterisation (a negligible equivalence class in this context). Our paper concerns stochastic processes and studies the characteristic function of the path signature of the stochastic process. In contrast to the expected signature, it determines the law on the random signatures without any regularity condition. The computation of the characteristic function of the random signature offers potential applications in stochastic analysis and machine learning, where the expected signature plays an important role. In this paper, we focus on a time-homogeneous It\\^o diffusion process, and adopt a PDE approach to derive the characteristic function of its signature defined at any fixed time horizon. A key ingredient of our approach is the introduction of the generalised-signature process. This lifting enables us to establish the Feynman-Kac-type theorem for the characteristic function of the generalised-signature process by following the martingale approach. Moreover, as an application of our results, we present a novel derivation of the joint characteristic function of Brownian motion coupled with the L\\'evy area, leveraging the structure theorem of anti-symmetric matrices.", "label": 0, "field": "math"} {"text": "Title: Solving Fokker-Planck equations using the zeros of Fokker-Planck operators and the Feynman-Kac formula\nAbstract: First we show that physics-informed neural networks are not suitable for a large class of parabolic partial differential equations including the Fokker-Planck equation. Then we devise an algorithm to compute solutions of the Fokker-Planck equation using the zeros of Fokker-Planck operator and the Feynman-Kac formula. The resulting algorithm is mesh-free, highly parallelizable and able to compute solutions pointwise, thus mitigating the curse of dimensionality in a practical sense. We analyze various nuances of this algorithm that are determined by the drift term in the Fokker-Planck equation. We work with problems ranging in dimensions from 2 to 10. We demonstrate that this algorithm requires orders of magnitude fewer trajectories for each point in space when compared to Monte-Carlo. We also prove that under suitable conditions the error that is caused by letting some trajectories (associated with the Feynman-Kac expectation) escape our domain of knowledge is proportional to the fraction of trajectories that escape.", "label": 0, "field": "math"} {"text": "Title: Prompt Decoupling for Text-to-Image Person Re-identification\nAbstract: Text-to-image person re-identification (TIReID) aims to retrieve the target person from an image gallery via a textual description query. Recently, pre-trained vision-language models like CLIP have attracted significant attention and have been widely utilized for this task due to their robust capacity for semantic concept learning and rich multi-modal knowledge. However, recent CLIP-based TIReID methods commonly rely on direct fine-tuning of the entire network to adapt the CLIP model for the TIReID task. Although these methods show competitive performance on this topic, they are suboptimal as they necessitate simultaneous domain adaptation and task adaptation. To address this issue, we attempt to decouple these two processes during the training stage. Specifically, we introduce the prompt tuning strategy to enable domain adaptation and propose a two-stage training approach to disentangle domain adaptation from task adaptation. In the first stage, we freeze the two encoders from CLIP and solely focus on optimizing the prompts to alleviate domain gap between the original training data of CLIP and downstream tasks. In the second stage, we maintain the fixed prompts and fine-tune the CLIP model to prioritize capturing fine-grained information, which is more suitable for TIReID task. Finally, we evaluate the effectiveness of our method on three widely used datasets. Compared to the directly fine-tuned approach, our method achieves significant improvements.", "label": 0, "field": "cs"} {"text": "Title: Stress and Adaptation: Applying Anna Karenina Principle in Deep Learning for Image Classification\nAbstract: Image classification with deep neural networks has reached state-of-art with high accuracy. This success is attributed to good internal representation features that bypasses the difficulties of the non-convex optimization problems. We have little understanding of these internal representations, let alone quantifying them. Recent research efforts have focused on alternative theories and explanations of the generalizability of these deep networks. We propose the alternative perturbation of deep models during their training induces changes that lead to transitions to different families. The result is an Anna Karenina Principle AKP for deep learning, in which less generalizable models unhappy families vary more in their representation than more generalizable models happy families paralleling Leo Tolstoy dictum that all happy families look alike, each unhappy family is unhappy in its own way. Anna Karenina principle has been found in systems in a wide range: from the surface of endangered corals exposed to harsh weather to the lungs of patients suffering from fatal diseases of AIDs. In our paper, we have generated artificial perturbations to our model by hot-swapping the activation and loss functions during the training. In this paper, we build a model to classify cancer cells from non-cancer ones. We give theoretical proof that the internal representations of generalizable happy models are similar in the asymptotic limit. Our experiments verify similar representations of generalizable models.", "label": 1, "field": "cs"} {"text": "Title: The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective\nAbstract: Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge. By shifting the load of cloud computing to individual local servers, MEC helps meet the requirements of ultralow latency, localized data processing, and extends the potential of Internet of Things (IoT) for end-users. However, the crosscutting nature of MEC and the multidisciplinary components necessary for its deployment have presented additional security and privacy concerns. Fortunately, Artificial Intelligence (AI) algorithms can cope with excessively unpredictable and complex data, which offers a distinct advantage in dealing with sophisticated and developing adversaries in the security industry. Hence, in this paper we comprehensively provide a survey of security and privacy in MEC from the perspective of AI. On the one hand, we use European Telecommunications Standards Institute (ETSI) MEC reference architecture as our based framework while merging the Software Defined Network (SDN) and Network Function Virtualization (NFV) to better illustrate a serviceable platform of MEC. On the other hand, we focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI. Finally, we comprehensively discuss the opportunities and challenges associated with applying AI to MEC security and privacy as possible future research directions.", "label": 0, "field": "cs"} {"text": "Title: Lifespan of Solution to MHD Boundary Layer Equations with Analytic Perturbation of General Shear Flow\nAbstract: In this paper, we consider the lifespan of solution to the MHD boundary layer system as an analytic perturbation of general shear flow. By using the cancellation mechanism in the system observed in \\cite{LXY1}, the lifespan of solution is shown to have a lower bound in the order of $\\varepsilon^{-2+}$ if the strength of the perturbation is of the order of $\\varepsilon$. Since there is no restriction on the strength of the shear flow and the lifespan estimate is larger than the one obtained for the classical Prandtl system in this setting, it reveals the stabilizing effect of the magnetic field on the electrically conducting fluid near the boundary.", "label": 1, "field": "math"} {"text": "Title: Generating synthetic data for neural operators\nAbstract: Numerous developments in the recent literature show the promising potential of deep learning in obtaining numerical solutions to partial differential equations (PDEs) beyond the reach of current numerical solvers. However, data-driven neural operators all suffer from the same problem: the data needed to train a network depends on classical numerical solvers such as finite difference or finite element, among others. In this paper, we propose a new approach to generating synthetic functional training data that does not require solving a PDE numerically. The way we do this is simple: we draw a large number $N$ of independent and identically distributed `random functions' $u_j$ from the underlying solution space (e.g., $H_0^1(\\Omega)$) in which we know the solution lies according to classical theory. We then plug each such random candidate solution into the equation and get a corresponding right-hand side function $f_j$ for the equation, and consider $(f_j, u_j)_{j=1}^N$ as supervised training data for learning the underlying inverse problem $f \\rightarrow u$. This `backwards' approach to generating training data only requires derivative computations, in contrast to standard `forward' approaches, which require a numerical PDE solver, enabling us to generate a large number of such data points quickly and efficiently. While the idea is simple, we hope that this method will expand the potential for developing neural PDE solvers that do not depend on classical numerical solvers.", "label": 0, "field": "cs"} {"text": "Title: Gradient-Based Optimization of Lattice Quantizers\nAbstract: Lattices with minimal normalized second moments are designed using a new numerical optimization algorithm. Starting from a random lower-triangular generator matrix and applying stochastic gradient descent, all elements are updated towards the negative gradient, which makes it the most efficient algorithm proposed so far for this purpose. A graphical illustration of the theta series, called theta image, is introduced and shown to be a powerful tool for converting numerical lattice representations into their underlying exact forms. As a proof of concept, optimized lattices are designed in dimensions up to 16. In all dimensions, the algorithm converges to either the previously best known lattice or a better one. The dual of the 15-dimensional laminated lattice is conjectured to be optimal in its dimension.", "label": 0, "field": "cs"} {"text": "Title: Posets, Tensor Products and Schur positivity\nAbstract: Let g be a complex finite-dimensional simple Lie algebra. Given a positive integer k and a dominant weight \\lambda, we define a preorder on the set $P(\\lambda, k)$ of k-tuples of dominant weights which add up to \\lambda. Let $P(\\lambda, k)/\\sim$ be the corresponding poset of equivalence classes defined by the preorder. We show that if \\lambda is a multiple of a fundamental weight (and k is general) or if k=2 (and \\lambda is general), then $P(\\lambda, k)/\\sim$ coincides with the set of S_k-orbits in $P(\\lambda,k)$, where S_k acts on $P(\\lambda, k)$ as the permutations of components. If g is of type A_n and k=2, we show that the S_2-orbit of the row shuffle defined by Fomin et al is the unique maximal element in the poset. Given an element of $P(\\lambda, k)$, consider the tensor product of the corresponding simple finite-dimensional g-modules. We show that (for general g, \\lambda, and k) the dimension of this tensor product increases along with the partial order. We also show that in the case when \\lambda is a multiple of a fundamental minuscule weight (g and k are general) or if g is of type A_2 and k=2 (\\lambda is general), there exists an inclusion of tensor products of g-modules along with the partial order. In particular, if g is of type A_n, this means that the difference of the characters is Schur positive.", "label": 1, "field": "math"} {"text": "Title: Towards the Atiyah-Sutcliffe conjectures for coplanar hyperbolic points\nAbstract: The Atiyah-Sutcliffe normalized determinant function $D$ is a smooth complex-valued function on $C_n(H^3)$, where $C_n(H^3)$ denotes the configuration space of $n$ distinct points in hyperbolic $3$-space $H^3$. The hyperbolic version of the Atiyah-Sutcliffe conjecture $1$ (AS conjecture $1$) states that $D$ is nowhere vanishing. AS conjecture $2$ (hyperbolic version) is the stronger statement that $|D(\\mathbf{x})| \\geq 1$ for any $\\mathbf{x} \\in C_n(H^3)$. In this short article, we prove AS conjecture $2$ for hyperbolic convex coplanar quadrilaterals, that is for configurations of $4$ points in $H^2$ with none of the points in the configuration lying in the convex hull of the other three. We also obtain Y. Zhang and J. Ma's result, namely AS conjecture $1$ for non-convex quadrilaterals in $H^2$. Finally, we find an explicit lower bound for $|D|$ depending on $n$ only for the natural ``star-based'' variant of the AS problem, for convex coplanar hyperbolic configurations. The latter result holds for any $n \\geq 2$. The proofs for $n=4$ make use of the symbolic library of Python. The proof of the general result follows from a general formula for the determinant. In all these cases, $D$ can be expanded as a linear combination of non-negative rational functions with positive coefficients.", "label": 1, "field": "math"} {"text": "Title: Towards a Solution to Bongard Problems: A Causal Approach\nAbstract: Even though AI has advanced rapidly in recent years displaying success in solving highly complex problems, the class of Bongard Problems (BPs) yet remain largely unsolved by modern ML techniques. In this paper, we propose a new approach in an attempt to not only solve BPs but also extract meaning out of learned representations. This includes the reformulation of the classical BP into a reinforcement learning (RL) setting which will allow the model to gain access to counterfactuals to guide its decisions but also explain its decisions. Since learning meaningful representations in BPs is an essential sub-problem, we further make use of contrastive learning for the extraction of low level features from pixel data. Several experiments have been conducted for analyzing the general BP-RL setup, feature extraction methods and using the best combination for the feature space analysis and its interpretation.", "label": 1, "field": "cs"} {"text": "Title: On grids in point-line arrangements in the plane\nAbstract: The famous Szemer\\'{e}di-Trotter theorem states that any arrangement of $n$ points and $n$ lines in the plane determines $O(n^{4/3})$ incidences, and this bound is tight. In this paper, we prove the following Tur\\'an-type result for point-line incidence. Let $\\mathcal{L}_1$ and $\\mathcal{L}_2$ be two sets of $t$ lines in the plane and let $P=\\{\\ell_1 \\cap \\ell_2 : \\ell_1 \\in \\mathcal{L}_1, \\ell_2 \\in \\mathcal{L}_2\\}$ be the set of intersection points between $\\mathcal{L}_1$ and $\\mathcal{L}_2$. We say that $(P, \\mathcal{L}_1 \\cup \\mathcal{L}_2)$ forms a \\emph{natural $t\\times t$ grid} if $|P| =t^2$, and $conv(P)$ does not contain the intersection point of some two lines in $\\mathcal{L}_i,$ for $i = 1,2.$ For fixed $t > 1$, we show that any arrangement of $n$ points and $n$ lines in the plane that does not contain a natural $t\\times t$ grid determines $O(n^{\\frac{4}{3}- \\varepsilon})$ incidences, where $\\varepsilon = \\varepsilon(t)$. We also provide a construction of $n$ points and $n$ lines in the plane that does not contain a natural $2 \\times 2$ grid and determines at least $\\Omega({n^{1+\\frac{1}{14}}})$ incidences.", "label": 1, "field": "math"} {"text": "Title: Approximation to multifractional Riemann-Liouville Brownian sheet\nAbstract: In this paper, we first introduce multifrational Riemann-Liouville Brownian sheets. Then, we show a result of approximation in law of the multifractional Riemann-Liouville Brownian sheet. The construction of these approximations is based on a sequence of I.I.D random variables.", "label": 1, "field": "math"} {"text": "Title: Probabilistic representation for mild solution of the Navier-Stokes equations\nAbstract: This paper is based on a formulation of the Navier-Stokes equations developed by Iyer and Constantin \\cite{Cont} , where the velocity field of a viscous incompressible fluid is written as the expected value of a stochastic process. Our contribution is to establish this probabilistic representation formula for mild solutions of the Navier-Stokes equations on $\\mathbb{R}^{d} $.", "label": 1, "field": "math"} {"text": "Title: Optimal Hardy-weights for the $(p,A)$-Laplacian with a potential term\nAbstract: We construct new optimal $L^p$ Hardy-type inequalities for elliptic Schr\\\"odinger-type operators", "label": 1, "field": "math"} {"text": "Title: Tarski's Least Fixed Point Theorem: A Type Theoretic Formulation\nAbstract: We translate Giovanni Curi's predicative least fixed point theorem into type theory. There are multiple benefits of having a type theoretic formulation apart from the potential for routine formalization. By taking advantage of (higher) inductive types, we have skirted the painstaking set theoretic constructions and as a result believe our presentation is conceptually clearer. Additionally, due the predicative admissibility of (higher) inductive types we take a step towards the \\say{system independent} derivation that Curi calls for in his conclusion. We also explore restrictions on monotone maps that guarantee they are \\say{generated} in a sense we make precise. This allows for an alternative statement of the least fixed point theorem which goes beyond the version found in Curi's work.", "label": 0, "field": "math"} {"text": "Title: Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective\nAbstract: Adversarial machine learning (AML) studies the adversarial phenomenon of machine learning, which may make inconsistent or unexpected predictions with humans. Some paradigms have been recently developed to explore this adversarial phenomenon occurring at different stages of a machine learning system, such as backdoor attack occurring at the pre-training, in-training and inference stage; weight attack occurring at the post-training, deployment and inference stage; adversarial attack occurring at the inference stage. However, although these adversarial paradigms share a common goal, their developments are almost independent, and there is still no big picture of AML. In this work, we aim to provide a unified perspective to the AML community to systematically review the overall progress of this field. We firstly provide a general definition about AML, and then propose a unified mathematical framework to covering existing attack paradigms. According to the proposed unified framework, we build a full taxonomy to systematically categorize and review existing representative methods for each paradigm. Besides, using this unified framework, it is easy to figure out the connections and differences among different attack paradigms, which may inspire future researchers to develop more advanced attack paradigms. Finally, to facilitate the viewing of the built taxonomy and the related literature in adversarial machine learning, we further provide a website, \\ie, \\url{http://adversarial-ml.com}, where the taxonomies and literature will be continuously updated.", "label": 0, "field": "cs"} {"text": "Title: Free constructions of geometries of Coxeter type\nAbstract: We establish two free constructions of geometries of Coxeter type. The first construction deals with any Coxeter diagram having no subdiagram of type A_3, the second one with diagrams of type C_n and H_4.", "label": 1, "field": "math"} {"text": "Title: Incentivizing Massive Unknown Workers for Budget-Limited Crowdsensing: From Off-Line and On-Line Perspectives\nAbstract: How to incentivize strategic workers using limited budget is a very fundamental problem for crowdsensing systems; nevertheless, since the sensing abilities of the workers may not always be known as prior knowledge due to the diversities of their sensor devices and behaviors, it is difficult to properly select and pay the unknown workers. Although the uncertainties of the workers can be addressed by the standard Combinatorial Multi-Armed Bandit (CMAB) framework in existing proposals through a trade-off between exploration and exploitation, we may not have sufficient budget to enable the trade-off among the individual workers, especially when the number of the workers is huge while the budget is limited. Moreover, the standard CMAB usually assumes the workers always stay in the system, whereas the workers may join in or depart from the system over time, such that what we have learnt for an individual worker cannot be applied after the worker leaves. To address the above challenging issues, in this paper, we first propose an off-line Context-Aware CMAB-based Incentive (CACI) mechanism. We innovate in leveraging the exploration-exploitation trade-off in an elaborately partitioned context space instead of the individual workers, to effectively incentivize the massive unknown workers with a very limited budget. We also extend the above basic idea to the on-line setting where unknown workers may join in or depart from the systems dynamically, and propose an on-line version of the CACI mechanism. We perform rigorous theoretical analysis to reveal the upper bounds on the regrets of our CACI mechanisms and to prove their truthfulness and individual rationality, respectively. Extensive experiments on both synthetic and real datasets are also conducted to verify the efficacy of our mechanisms.", "label": 0, "field": "cs"} {"text": "Title: Factorial Moments of the Geometric Distribution of Order $k$\nAbstract: We derive a simple expression for the $r^{th}$ factorial moment $\\mu_{(r)}$ of the geometric distribution of order $k$ with success parameter $p\\in(0,1)$ (and $q=1-p$) in terms of its probability mass function $f_k(n)$. Specifically, $\\mu_{(r)} = r!f_k((r+1)k+r)/((qp^k)^{r+1})$.", "label": 0, "field": "math"} {"text": "Title: Equidistribution from the Chinese Remainder Theorem\nAbstract: We prove the equidistribution of subsets of $(\\Rr/\\Zz)^n$ defined by fractional parts of subsets of~$(\\Zz/q\\Zz)^n$ that are constructed using the Chinese Remainder Theorem.", "label": 1, "field": "math"} {"text": "Title: An experimental sorting method for improving metagenomic data encoding\nAbstract: Minimizing data storage poses a significant challenge in large-scale metagenomic projects. In this paper, we present a new method for improving the encoding of FASTQ files generated by metagenomic sequencing. This method incorporates metagenomic classification followed by a recursive filter for clustering reads by DNA sequence similarity to improve the overall reference-free compression. In the results, we show an overall improvement in the compression of several datasets. As hypothesized, we show a progressive compression gain for higher coverage depth and number of identified species. Additionally, we provide an implementation that is freely available at https://github.com/cobilab/mizar and can be customized to work with other FASTQ compression tools.", "label": 0, "field": "cs"} {"text": "Title: The Weyl law for algebraic tori\nAbstract: We give an asymptotic evaluation for the number of automorphic characters of an algebraic torus $T$ with bounded analytic conductor. The analytic conductor which we use is defined via the local Langlands correspondence for tori by choosing a finite dimensional complex algebraic representation of the $L$-group of $T$. Our results therefore fit into a general framework of counting automorphic representations on reductive groups by analytic conductor.", "label": 1, "field": "math"} {"text": "Title: Logit-Q Dynamics for Efficient Learning in Stochastic Teams\nAbstract: We present two logit-Q learning dynamics combining the classical and independent log-linear learning updates with an on-policy value iteration update for efficient learning in stochastic games. We show that the logit-Q dynamics presented reach (near) efficient equilibrium in stochastic teams. We quantify a bound on the approximation error. We also show the rationality of the logit-Q dynamics against agents following pure stationary strategies and the convergence of the dynamics in stochastic games where the reward functions induce potential games, yet only a single agent controls the state transitions beyond stochastic teams. The key idea is to approximate the dynamics with a fictional scenario where the Q-function estimates are stationary over finite-length epochs only for analysis. We then couple the dynamics in the main and fictional scenarios to show that these two scenarios become more and more similar across epochs due to the vanishing step size.", "label": 0, "field": "cs"} {"text": "Title: Infinite Eulerian trails are computable on graphs with vertices of infinite degree\nAbstract: The Erd\\H{o}s, Gr\\\"unwald and Weiszfeld theorem provides a characterization of infinite graphs which are Eulerian. That is, infinite graphs which admit infinite Eulerian trails. In this article we complement this theorem with a characterization of those finite trails that can be extended to infinite Eulerian trails. This allows us to prove an effective version of the Erd\\H{o}s, Gr\\\"unwald and Weiszfeld theorem for a class of graphs that includes non locally finite ones, generalizing a theorem of D.Bean.", "label": 0, "field": "math"} {"text": "Title: Twinless articulation points and some related problems\nAbstract: Let $G=(V,E)$ be a twinless strongly connected graph. a vertex $v\\in V$ is a twinless articulation point if the subrgraph obtained from $G$ by removing the vertex $v$ is not twinless strongly connected. An edge $e\\in E$ is a twinless bridge if the subgraph obtained from $G$ by deleting $e$ is not twiless strongly connected graph. In this paper we study twinless articulation points and twinless bridges. We also study the problem of finding a minimum cardinality edge subset $E_{1} \\subseteq E$ such that the subgraph $(V,E_{1})$ is twinless strongly connected. Moreover, we present an algorithm for computing the $2$-vertex-twinless connected components of $G$.", "label": 1, "field": "cs"} {"text": "Title: Continuous Credit Networks and Layer 2 Blockchains: Monotonicity and Sampling\nAbstract: To improve transaction rates, many cryptocurrencies have implemented so-called ''Layer-2'' transaction protocols, where payments are routed across networks of private payment channels. However, for a given transaction, not every network state provides a feasible route to perform the payment; in this case, the transaction must be put on the public ledger. The payment channel network thus multiplies the transaction rate of the overall system; the less frequently it fails, the higher the multiplier. We build on earlier work on credit networks and show that this network liquidity problem is connected to the combinatorics of graphical matroids. Earlier work could only analyze the (unnatural) scenario where transactions had discrete sizes. Superficially, it might seem like the continuous case would be harder to examine. However, removing this assumption lets us make progress in two important directions. First, we give a partial answer to the ``monotonicity conjecture'' that previous work left open. This conjecture asks that the network's performance not degrade as capacity on any edge increases. And second, we construct here a network state sampling procedure with much faster asymptotic performance than off-the-shelf Markov chains ($O(\\vert E\\vert \\beta(\\vert E\\vert))$, where $\\beta(x)$ is the complexity of solving a linear program on $x$ constraints.) We obtain our results by mapping the underlying graphs to convex bodies and then showing that the liquidity and sampling problems reduce to bounding and computing the volumes of these bodies. The transformation relies crucially on the combinatorial properties of the underlying graphic matroid, as do the proofs of monotonicity and fast sampling.", "label": 1, "field": "cs"} {"text": "Title: An analysis of training and generalization errors in shallow and deep networks\nAbstract: This paper is motivated by an open problem around deep networks, namely, the apparent absence of over-fitting despite large over-parametrization which allows perfect fitting of the training data. In this paper, we analyze this phenomenon in the case of regression problems when each unit evaluates a periodic activation function. We argue that the minimal expected value of the square loss is inappropriate to measure the generalization error in approximation of compositional functions in order to take full advantage of the compositional structure. Instead, we measure the generalization error in the sense of maximum loss, and sometimes, as a pointwise error. We give estimates on exactly how many parameters ensure both zero training error as well as a good generalization error. We prove that a solution of a regularization problem is guaranteed to yield a good training error as well as a good generalization error and estimate how much error to expect at which test data.", "label": 1, "field": "cs"} {"text": "Title: Fusion Categories over Non-Algebriacally Closed Fields\nAbstract: Several complications arise when attempting to work with fusion categories over arbitrary fields. Here we describe some of the new phenomena that occur when the field is not algebraically closed, and we adapt tools such as the Frobenius-Perron dimension in order to accommodate these new effects.", "label": 0, "field": "math"} {"text": "Title: Sphere-like isoparametric hypersurfaces in Damek-Ricci spaces\nAbstract: Locally harmonic manifolds are Riemannian manifolds in which small geodesic spheres are isoparametric hypersurfaces, i.e., hypersurfaces whose nearby parallel hypersurfaces are of constant mean curvature. Flat and rank one symmetric spaces are examples of harmonic manifolds. Damek-Ricci spaces are non-compact harmonic manifolds, most of which are non-symmetric. Taking the limit of an \"inflating\" sphere through a point $p$ in a Damek-Ricci space as the center of the sphere runs out to infinity along a geodesic half-line $\\gamma$ starting from $p$, we get a horosphere. Similarly to spheres, horospheres are also isoparametric hypersurfaces. In this paper, we define the sphere-like hypersurfaces obtained by \"overinflating the horospheres\" by pushing the center of the sphere beyond the point at infinity of $\\gamma$ along a virtual prolongation of $\\gamma$. They give a new family of isoparametric hypersurfaces in Damek-Ricci spaces connecting geodesic spheres to some of the isoparametric hypersurfaces constructed by J. C. D\\'iaz-Ramos and M. Dom\\'inguez-V\\'azquez [arXiv:1111.0264] in Damek-Ricci spaces. We study the geometric properties of these isoparametric hypersurfaces, in particular their homogeneity and the totally geodesic condition for their focal varieties.", "label": 0, "field": "math"} {"text": "Title: On a reduction map for Drinfeld modules\nAbstract: In this paper we investigate a local to global principle for Mordell-Weil group defined over a ring of integers ${\\cal O}_K$ of $t$-modules that are products of the Drinfeld modules ${\\widehat\\varphi}={\\phi}_{1}^{e_1}\\times \\dots \\times {\\phi}_{t}^{e_{t}}.$ Here $K$ is a finite extension of the field of fractions of $A={\\mathbb F}_{q}[t].$ We assume that the ${\\mathrm{rank}}(\\phi)_{i})=d_{i}$ and endomorphism rings of the involved Drinfeld modules of generic characteristic are the simplest possible, i.e. ${\\mathrm{End}}({\\phi}_{i})=A$ for $ i=1,\\dots , t.$ Our main result is the following numeric criterion. Let ${N}={N}_{1}^{e_1}\\times\\dots\\times {N}_{t}^{e_t}$ be a finitely generated $A$ submodule of the Mordell-Weil group ${\\widehat\\varphi}({\\cal O}_{K})={\\phi}_{1}({\\cal O}_{K})^{e_{1}}\\times\\dots\\times {\\phi}_{t}({\\cal O}_{K})^{{e}_{t}},$ and let ${\\Lambda}\\subset N$ be an $A$ - submodule. If we assume $d_{i}\\geq e_{i}$ and $P\\in N$ such that $r_{\\cal W}(P)\\in r_{\\cal W}({\\Lambda}) $ for almost all primes ${\\cal W}$ of ${\\cal O}_{K},$ then $P\\in {\\Lambda}+N_{tor}.$ We also build on the recent results of S.Bara{\\'n}czuk \\cite{b17} concerning the dynamical local to global principle in Mordell-Weil type groups and the solvability of certain dynamical equations to the aforementioned $t$-modules.", "label": 1, "field": "math"} {"text": "Title: Unique Triangulated 1-Planar Graphs\nAbstract: It is well-known that every 3-connected planar graph has a unique planar embedding on the sphere. We study the extension to triangulated 1-planar graphs, T1P graphs for short, which admit an embedding in which each edge is crossed at most once and each face is a triangle, and obtain an algorithmic solution by a cubic time recognition algorithm that also counts the number of T1P embeddings. In particular, we show that every triangulated planar graph has a unique T1P embedding, although it may admit many 1-planar embeddings, and that any 6-connected T1P graph has a unique 1-planar embedding, except for full generalized two-stars that admit two or eight 1-planar embeddings. Our algorithm extends, refines, and corrects a previous recognition algorithm by Chen, Grigni and Papadimitiou (``Recognizing Hole-Free 4-Map Graphs in Cubic Time'', Algorithmica 45 (2006)).", "label": 0, "field": "cs"} {"text": "Title: Improved uncertainty quantification for neural networks with Bayesian last layer\nAbstract: Uncertainty quantification is an important task in machine learning - a task in which standardneural networks (NNs) have traditionally not excelled. This can be a limitation for safety-critical applications, where uncertainty-aware methods like Gaussian processes or Bayesian linear regression are often preferred. Bayesian neural networks are an approach to address this limitation. They assume probability distributions for all parameters and yield distributed predictions. However, training and inference are typically intractable and approximations must be employed. A promising approximation is NNs with Bayesian last layer (BLL). They assume distributed weights only in the linear output layer and yield a normally distributed prediction. To approximate the intractable Bayesian neural network, point estimates of the distributed weights in all but the last layer should be obtained by maximizing the marginal likelihood. This has previously been challenging, as the marginal likelihood is expensive to evaluate in this setting. We present a reformulation of the log-marginal likelihood of a NN with BLL which allows for efficient training using backpropagation. Furthermore, we address the challenge of uncertainty quantification for extrapolation points. We provide a metric to quantify the degree of extrapolation and derive a method to improve the uncertainty quantification for these points. Our methods are derived for the multivariate case and demonstrated in a simulation study. In comparison to Bayesian linear regression with fixed features, and a Bayesian neural network trained with variational inference, our proposed method achieves the highest log-predictive density on test data.", "label": 0, "field": "cs"} {"text": "Title: Hochschild cohomology of the second kind: Koszul duality and Morita invariance\nAbstract: We define Hochschild cohomology of the second kind for differential graded (dg) or curved algebras as a derived functor in a compactly generated derived category of the second kind, and show that it is invariant under Morita equivalence of the second kind. A bimodule version of Koszul duality is constructed and used to show that Hochschild cohomology of the second kind is preserved under (nonconilpotent) Koszul duality. Hochschild cohomology of the second kind of an algebra often computes the ordinary Hochschild cohomology of geometrically meaningful dg categories. Examples include the category of infinity local systems on a topological space, the bounded derived category of a complex algebraic manifold and the category of matrix factorizations.", "label": 0, "field": "math"} {"text": "Title: Coverage Explorer: Coverage-guided Test Generation for Cyber Physical Systems\nAbstract: Given the safety-critical functions of autonomous cyber-physical systems (CPS) across diverse domains, testing these systems is essential. While conventional software and hardware testing methodologies offer partial insights, they frequently do not provide adequate coverage in a CPS. In this study, we introduce a testing framework designed to systematically formulate test cases, effectively exploring the state space of CPS. This framework introduces a coverage-centric sampling technique, coupled with a cluster-based methodology for training a surrogate model. The framework then uses model predictive control within the surrogate model to generates test cases tailored to CPS specifications. To evaluate the efficacy of the framework, we applied it on several benchmarks, spanning from a kinematic car to systems like an unmanned aircraft collision avoidance system (ACAS XU) and automatic transmission system. Comparative analyses were conducted against alternative test generation strategies, including randomized testing, as well as falsification using S-TaLiRo.", "label": 0, "field": "cs"} {"text": "Title: Analyzing Misinformation Claims During the 2022 Brazilian General Election on WhatsApp, Twitter, and Kwai\nAbstract: This study analyzes misinformation from WhatsApp, Twitter, and Kwai during the 2022 Brazilian general election. Given the democratic importance of accurate information during elections, multiple fact-checking organizations collaborated to identify and respond to misinformation via WhatsApp tiplines and power a fact-checking feature within a chatbot operated by Brazil's election authority, the TSE. WhatsApp is installed on over 99% of smartphones in Brazil, and the TSE chatbot was used by millions of citizens in the run-up to the elections. During the same period, we collected social media data from Twitter (now X) and Kwai (a popular video-sharing app similar to TikTok). Using the WhatsApp, Kwai, and Twitter data along with fact-checks from three Brazilian fact-checking organizations, we find unique claims on each platform. Even when the same claims are present on different platforms, they often differ in format, detail, length, or other characteristics. Our research highlights the limitations of current claim matching algorithms to match claims across platforms with such differences and identifies areas for further algorithmic development. Finally, we perform a descriptive analysis examining the formats (image, video, audio, text) and content themes of popular misinformation claims.", "label": 0, "field": "cs"} {"text": "Title: Global Sobolev persistence for the fractional Boussinesq equations with zero diffusivity\nAbstract: We address the persistence of regularity for the 2D $\\alpha$-fractional Boussinesq equations with positive viscosity and zero diffusivity in general Sobolev spaces, i.e., for $(u_{0}, \\rho_{0}) \\in W^{s,q}(\\mathbb R^2) \\times W^{s,q}(\\mathbb R^2)$, where $s> 1$ and $q \\in (2, \\infty)$. We prove that the solution $(u(t), \\rho(t))$ exists and belongs to $W^{s,q}(\\mathbb R^2) \\times W^{s,q}(\\mathbb R^2)$ for all positive time $t$ for $q>2$, where $\\alpha\\in(1,2)$ is arbitrary.", "label": 1, "field": "math"} {"text": "Title: Fast Certification of Vision-Language Models Using Incremental Randomized Smoothing\nAbstract: A key benefit of deep vision-language models such as CLIP is that they enable zero-shot open vocabulary classification; the user has the ability to define novel class labels via natural language prompts at inference time. However, while CLIP-based zero-shot classifiers have demonstrated competitive performance across a range of domain shifts, they remain highly vulnerable to adversarial attacks. Therefore, ensuring the robustness of such models is crucial for their reliable deployment in the wild. In this work, we introduce Open Vocabulary Certification (OVC), a fast certification method designed for open-vocabulary models like CLIP via randomized smoothing techniques. Given a base \"training\" set of prompts and their corresponding certified CLIP classifiers, OVC relies on the observation that a classifier with a novel prompt can be viewed as a perturbed version of nearby classifiers in the base training set. Therefore, OVC can rapidly certify the novel classifier using a variation of incremental randomized smoothing. By using a caching trick, we achieve approximately two orders of magnitude acceleration in the certification process for novel prompts. To achieve further (heuristic) speedups, OVC approximates the embedding space at a given input using a multivariate normal distribution bypassing the need for sampling via forward passes through the vision backbone. We demonstrate the effectiveness of OVC on through experimental evaluation using multiple vision-language backbones on the CIFAR-10 and ImageNet test datasets.", "label": 0, "field": "cs"} {"text": "Title: Transformers in Action Recognition: A Review on Temporal Modeling\nAbstract: In vision-based action recognition, spatio-temporal features from different modalities are used for recognizing activities. Temporal modeling is a long challenge of action recognition. However, there are limited methods such as pre-computed motion features, three-dimensional (3D) filters, and recurrent neural networks (RNN) for modeling motion information in deep-based approaches. Recently, transformers success in modeling long-range dependencies in natural language processing (NLP) tasks has gotten great attention from other domains; including speech, image, and video, to rely entirely on self-attention without using sequence-aligned RNNs or convolutions. Although the application of transformers to action recognition is relatively new, the amount of research proposed on this topic within the last few years is astounding. This paper especially reviews recent progress in deep learning methods for modeling temporal variations. It focuses on action recognition methods that use transformers for temporal modeling, discussing their main features, used modalities, and identifying opportunities and challenges for future research.", "label": 1, "field": "cs"} {"text": "Title: Analyticity of Entropy Rate of Hidden Markov Chains\nAbstract: We prove that under mild positivity assumptions the entropy rate of a hidden Markov chain varies analytically as a function of the underlying Markov chain parameters. A general principle to determine the domain of analyticity is stated. An example is given to estimate the radius of convergence for the entropy rate. We then show that the positivity assumptions can be relaxed, and examples are given for the relaxed conditions. We study a special class of hidden Markov chains in more detail: binary hidden Markov chains with an unambiguous symbol, and we give necessary and sufficient conditions for analyticity of the entropy rate for this case. Finally, we show that under the positivity assumptions the hidden Markov chain {\\em itself} varies analytically, in a strong sense, as a function of the underlying Markov chain parameters.", "label": 1, "field": "math"} {"text": "Title: Approximate Distance and Shortest-Path Oracles for Fault-Tolerant Geometric Spanners\nAbstract: In this paper, we present approximate distance and shortest-path oracles for fault-tolerant Euclidean spanners motivated by the routing problem in real-world road networks. An $f$-fault-tolerant Euclidean $t$-spanner for a set $V$ of $n$ points in $\\mathbb{R}^d$ is a graph $G=(V,E)$ where, for any two points $p$ and $q$ in $V$ and a set $F$ of $f$ vertices of $V$, the distance between $p$ and $q$ in $G-F$ is at most $t$ times their Euclidean distance. Given an $f$-fault-tolerant Euclidean $t$-spanner $G$ with $O(n)$ edges and a constant $\\varepsilon$, our data structure has size $O_{t,f}(n\\log n)$, and this allows us to compute an $(1+\\varepsilon)$-approximate distance in $G-F$ between $s$ and $s'$ can be computed in constant time for any two vertices $s$ and $s'$ and a set $F$ of $f$ failed vertices. Also, with a data structure of size $O_{t,f}(n\\log n\\log\\log n)$, we can compute an $(1+\\varepsilon)$-approximate shortest path in $G-F$ between $s$ and $s'$ in $O_{t,f}(\\log^2 n\\log\\log n+\\textsf{sol})$ time for any two vertices $s$ and $s'$ and a set $F$ of failed vertices, where $\\textsf{sol}$ denotes the number of vertices in the returned path.", "label": 0, "field": "cs"} {"text": "Title: Unleashing the Emergent Cognitive Synergy in Large Language Models: A Task-Solving Agent through Multi-Persona Self-Collaboration\nAbstract: Human intelligence thrives on cognitive synergy, where collaboration among different minds yield superior outcomes compared to isolated individuals. In this work, we propose Solo Performance Prompting (SPP), which transforms a single LLM into a cognitive synergist by engaging in multi-turn self-collaboration with multiple personas. A cognitive synergist is an intelligent agent that collaboratively combines multiple minds' strengths and knowledge to enhance problem-solving in complex tasks. By dynamically identifying and simulating different personas based on task inputs, SPP unleashes the potential of cognitive synergy in LLMs. Our in-depth analysis shows that assigning multiple fine-grained personas in LLMs improves problem-solving abilities compared to using a single or fixed number of personas. We evaluate SPP on three challenging tasks: Trivia Creative Writing, Codenames Collaborative, and Logic Grid Puzzle, encompassing both knowledge-intensive and reasoning-intensive types. Unlike previous works, such as Chain-of-Thought, that solely enhance the reasoning abilities in LLMs, experimental results demonstrate that SPP effectively reduces factual hallucination, and maintains strong reasoning capabilities. Additionally, comparative experiments show that cognitive synergy only emerges in GPT-4 and does not appear in less capable models, such as GPT-3.5-turbo and Llama2-13b-chat, which draws an interesting analogy to human development. Code, data, and prompts can be found at: https://github.com/MikeWangWZHL/Solo-Performance-Prompting.git.", "label": 0, "field": "cs"} {"text": "Title: The Implicit Bias of Benign Overfitting\nAbstract: The phenomenon of benign overfitting, where a predictor perfectly fits noisy training data while attaining near-optimal expected loss, has received much attention in recent years, but still remains not fully understood beyond well-specified linear regression setups. In this paper, we provide several new results on when one can or cannot expect benign overfitting to occur, for both regression and classification tasks. We consider a prototypical and rather generic data model for benign overfitting of linear predictors, where an arbitrary input distribution of some fixed dimension $k$ is concatenated with a high-dimensional distribution. For linear regression which is not necessarily well-specified, we show that the minimum-norm interpolating predictor (that standard training methods converge to) is biased towards an inconsistent solution in general, hence benign overfitting will generally not occur. Moreover, we show how this can be extended beyond standard linear regression, by an argument proving how the existence of benign overfitting on some regression problems precludes its existence on other regression problems. We then turn to classification problems, and show that the situation there is much more favorable. Specifically, we prove that the max-margin predictor (to which standard training methods are known to converge in direction) is asymptotically biased towards minimizing a weighted \\emph{squared hinge loss}. This allows us to reduce the question of benign overfitting in classification to the simpler question of whether this loss is a good surrogate for the misclassification error, and use it to show benign overfitting in some new settings.", "label": 1, "field": "cs"} {"text": "Title: Development of An Autonomous Bridge Deck Inspection Robotic System\nAbstract: The threat to safety of aging bridges has been recognized as a critical concern to the general public due to the poor condition of many bridges in the U.S. Currently, the bridge inspection is conducted manually, and it is not efficient to identify bridge condition deterioration in order to facilitate implementation of appropriate maintenance or rehabilitation procedures. In this paper, we report a new development of the autonomous mobile robotic system for bridge deck inspection and evaluation. The robot is integrated with several nondestructive evaluation (NDE) sensors and a navigation control algorithm to allow it to accurately and autonomously maneuver on the bridge deck to collect visual images and conduct NDE measurements. The developed robotic system can reduce the cost and time of the bridge deck data collection and inspection. For efficient bridge deck monitoring, the crack detection algorithm to build the deck crack map is presented in detail. The impact-echo (IE), ultrasonic surface waves (USW) and electrical resistivity (ER) data collected by the robot are analyzed to generate the delamination, concrete elastic modulus, corrosion maps of the bridge deck, respectively. The presented robotic system has been successfully deployed to inspect numerous bridges in more than ten different states in the U.S.", "label": 1, "field": "cs"} {"text": "Title: Toda brackets in n-angulated categories\nAbstract: We introduce Toda brackets for n-angulated categories and show that the various definitions of Toda brackets coincide. We prove juggling formulas for these Toda brackets generalizing the triangulated case. Following that, we generalize a theorem due to Heller in the triangulated setting to the setting of n-angulated categories. We also provide several examples of computing Toda brackets for n-angulated categories. Finally, for an n-angulated category sitting in a triangulated category as in the setup of Geiss, Keller and Oppermann, we show that Toda brackets in the n-angulated sense coincide with n-fold Toda brackets in the triangulated sense up to an explicit sign.", "label": 0, "field": "math"} {"text": "Title: A Bag of Visual Words Approach for Symbols-Based Coarse-Grained Ancient Coin Classification\nAbstract: The field of Numismatics provides the names and descriptions of the symbols minted on the ancient coins. Classification of the ancient coins aims at assigning a given coin to its issuer. Various issuers used various symbols for their coins. We propose to use these symbols for a framework that will coarsely classify the ancient coins. Bag of visual words (BoVWs) is a well established visual recognition technique applied to various problems in computer vision like object and scene recognition. Improvements have been made by incorporating the spatial information to this technique. We apply the BoVWs technique to our problem and use three symbols for coarse-grained classification. We use rectangular tiling, log-polar tiling and circular tiling to incorporate spatial information to BoVWs. Experimental results show that the circular tiling proves superior to the rest of the methods for our problem.", "label": 1, "field": "cs"} {"text": "Title: The Unreasonable Effectiveness of Deep Evidential Regression\nAbstract: There is a significant need for principled uncertainty reasoning in machine learning systems as they are increasingly deployed in safety-critical domains. A new approach with uncertainty-aware regression-based neural networks (NNs), based on learning evidential distributions for aleatoric and epistemic uncertainties, shows promise over traditional deterministic methods and typical Bayesian NNs, notably with the capabilities to disentangle aleatoric and epistemic uncertainties. Despite some empirical success of Deep Evidential Regression (DER), there are important gaps in the mathematical foundation that raise the question of why the proposed technique seemingly works. We detail the theoretical shortcomings and analyze the performance on synthetic and real-world data sets, showing that Deep Evidential Regression is a heuristic rather than an exact uncertainty quantification. We go on to discuss corrections and redefinitions of how aleatoric and epistemic uncertainties should be extracted from NNs.", "label": 1, "field": "cs"} {"text": "Title: An Experimental Study of ILP Formulations for the Longest Induced Path Problem\nAbstract: Given a graph $G=(V,E)$, the longest induced path problem asks for a maximum cardinality node subset $W\\subseteq V$ such that the graph induced by $W$ is a path. It is a long established problem with applications, e.g., in network analysis. We propose novel integer linear programming (ILP) formulations for the problem and discuss efficient implementations thereof. Comparing them with known formulations from literature, we prove that they are beneficial in theory, yielding stronger relaxations. Moreover, our experiments show their practical superiority.", "label": 1, "field": "cs"} {"text": "Title: Abacus models for parabolic quotients of affine Weyl groups\nAbstract: We introduce abacus diagrams that describe minimal length coset representatives in affine Weyl groups of types B, C, and D. These abacus diagrams use a realization of the affine Weyl group of type C due to Eriksson to generalize a construction of James for the symmetric group. We also describe several combinatorial models for these parabolic quotients that generalize classical results in affine type A related to core partitions.", "label": 1, "field": "math"} {"text": "Title: The stochastic fractional Strichartz estimate and blow-up for Schr\u00f6dinger equation\nAbstract: We establish the stochastic Strichartz estimate for the fractional Schr\\\"odinger equation with multiplicative noise. With the help of the deterministic Strichartz estimates, we prove the existence and uniqueness of a global solution to the stochastic fractional nonlinear Schr\\\"odinger equation in $L^2(\\mathbb{R}^n)$. In addition, we also prove a general blow up result by deriving a localized virial estimate and the generalized Strauss inequality with a restricted class of initial data.", "label": 0, "field": "math"} {"text": "Title: Robust Physics Informed Neural Networks\nAbstract: We introduce a Robust version of the Physics-Informed Neural Networks (RPINNs) to approximate the Partial Differential Equations (PDEs) solution. Standard Physics Informed Neural Networks (PINN) takes into account the governing physical laws described by PDE during the learning process. The network is trained on a data set that consists of randomly selected points in the physical domain and its boundary. PINNs have been successfully applied to solve various problems described by PDEs with boundary conditions. The loss function in traditional PINNs is based on the strong residuals of the PDEs. This loss function in PINNs is generally not robust with respect to the true error. The loss function in PINNs can be far from the true error, which makes the training process more difficult. In particular, we do not know if the training process has already converged to the solution with the required accuracy. This is especially true if we do not know the exact solution, so we cannot estimate the true error during the training. This paper introduces a different way of defining the loss function. It incorporates the residual and the inverse of the Gram matrix, computed using the energy norm. We test our RPINN algorithm on two Laplace problems and one advection-diffusion problem in two spatial dimensions. We conclude that RPINN is a robust method. The proposed loss coincides well with the true error of the solution, as measured in the energy norm. Thus, we know if our training process goes well, and we know when to stop the training to obtain the neural network approximation of the solution of the PDE with the true error of required accuracy.", "label": 0, "field": "cs"} {"text": "Title: Offline Policy Optimization with Eligible Actions\nAbstract: Offline policy optimization could have a large impact on many real-world decision-making problems, as online learning may be infeasible in many applications. Importance sampling and its variants are a commonly used type of estimator in offline policy evaluation, and such estimators typically do not require assumptions on the properties and representational capabilities of value function or decision process model function classes. In this paper, we identify an important overfitting phenomenon in optimizing the importance weighted return, in which it may be possible for the learned policy to essentially avoid making aligned decisions for part of the initial state space. We propose an algorithm to avoid this overfitting through a new per-state-neighborhood normalization constraint, and provide a theoretical justification of the proposed algorithm. We also show the limitations of previous attempts to this approach. We test our algorithm in a healthcare-inspired simulator, a logged dataset collected from real hospitals and continuous control tasks. These experiments show the proposed method yields less overfitting and better test performance compared to state-of-the-art batch reinforcement learning algorithms.", "label": 1, "field": "cs"} {"text": "Title: Transformer Neural Autoregressive Flows\nAbstract: Density estimation, a central problem in machine learning, can be performed using Normalizing Flows (NFs). NFs comprise a sequence of invertible transformations, that turn a complex target distribution into a simple one, by exploiting the change of variables theorem. Neural Autoregressive Flows (NAFs) and Block Neural Autoregressive Flows (B-NAFs) are arguably the most perfomant members of the NF family. However, they suffer scalability issues and training instability due to the constraints imposed on the network structure. In this paper, we propose a novel solution to these challenges by exploiting transformers to define a new class of neural flows called Transformer Neural Autoregressive Flows (T-NAFs). T-NAFs treat each dimension of a random variable as a separate input token, using attention masking to enforce an autoregressive constraint. We take an amortization-inspired approach where the transformer outputs the parameters of an invertible transformation. The experimental results demonstrate that T-NAFs consistently match or outperform NAFs and B-NAFs across multiple datasets from the UCI benchmark. Remarkably, T-NAFs achieve these results using an order of magnitude fewer parameters than previous approaches, without composing multiple flows.", "label": 0, "field": "cs"} {"text": "Title: EPA: Neural Collapse Inspired Robust Out-of-Distribution Detector\nAbstract: Out-of-distribution (OOD) detection plays a crucial role in ensuring the security of neural networks. Existing works have leveraged the fact that In-distribution (ID) samples form a subspace in the feature space, achieving state-of-the-art (SOTA) performance. However, the comprehensive characteristics of the ID subspace still leave under-explored. Recently, the discovery of Neural Collapse ($\\mathcal{NC}$) sheds light on novel properties of the ID subspace. Leveraging insight from $\\mathcal{NC}$, we observe that the Principal Angle between the features and the ID feature subspace forms a superior representation for measuring the likelihood of OOD. Building upon this observation, we propose a novel $\\mathcal{NC}$-inspired OOD scoring function, named Entropy-enhanced Principal Angle (EPA), which integrates both the global characteristic of the ID subspace and its inner property. We experimentally compare EPA with various SOTA approaches, validating its superior performance and robustness across different network architectures and OOD datasets.", "label": 0, "field": "cs"} {"text": "Title: SwitchTab: Switched Autoencoders Are Effective Tabular Learners\nAbstract: Self-supervised representation learning methods have achieved significant success in computer vision and natural language processing, where data samples exhibit explicit spatial or semantic dependencies. However, applying these methods to tabular data is challenging due to the less pronounced dependencies among data samples. In this paper, we address this limitation by introducing SwitchTab, a novel self-supervised method specifically designed to capture latent dependencies in tabular data. SwitchTab leverages an asymmetric encoder-decoder framework to decouple mutual and salient features among data pairs, resulting in more representative embeddings. These embeddings, in turn, contribute to better decision boundaries and lead to improved results in downstream tasks. To validate the effectiveness of SwitchTab, we conduct extensive experiments across various domains involving tabular data. The results showcase superior performance in end-to-end prediction tasks with fine-tuning. Moreover, we demonstrate that pre-trained salient embeddings can be utilized as plug-and-play features to enhance the performance of various traditional classification methods (e.g., Logistic Regression, XGBoost, etc.). Lastly, we highlight the capability of SwitchTab to create explainable representations through visualization of decoupled mutual and salient features in the latent space.", "label": 0, "field": "cs"} {"text": "Title: Simplicial $*$-modules and mild actions\nAbstract: We develop an analogue of the theory of $*$-modules in the world of simplicial sets, based on actions of a certain simplicial monoid $E\\mathcal M$ originally appearing in the construction of global algebraic $K$-theory. As our main results, we show that strictly commutative monoids with respect to a certain box product on these simplicial $*$-modules yield models of equivariantly and globally coherently commutative monoids, and we give a characterization of simplicial $*$-modules in terms of a certain mildness condition on the $E\\mathcal M$-action, relaxing the notion of tameness previously investigated by Sagave-Schwede and the first author.", "label": 0, "field": "math"} {"text": "Title: Free Brownian motion and free convolution semigroups: multiplicative case\nAbstract: We consider a pair of probability measures $\\mu,\\nu$ on the unit circle such that $\\Sigma_{\\lambda}(\\eta_{\\nu}(z))=z/\\eta_{\\mu}(z)$. We prove that the same type of equation holds for any $t\\geq 0$ when we replace $\\nu$ by $\\nu\\boxtimes\\lambda_t$ and $\\mu$ by $\\mathbb{M}_t(\\mu)$, where $\\lambda_t$ is the free multiplicative analogue of the normal distribution on the unit circle of $\\mathbb{C}$ and $\\mathbb{M}_t$ is the map defined by Arizmendi and Hasebe. These equations are a multiplicative analogue of equations studied by Belinschi and Nica. In order to achieve this result, we study infinite divisibility of the measures associated with subordination functions in multiplicative free Brownian motion and multiplicative free convolution semigroups. We use the modified $\\mathcal{S}$-transform introduced by Raj Rao and Speicher to deal with the case that $\\nu$ has mean zero. The same type of the result holds for convolutions on the positive real line. We also obtain some regularity properties for the free multiplicative analogue of the normal distributions.", "label": 1, "field": "math"} {"text": "Title: Quantum Team Logic and Bell's Inequalities\nAbstract: A logical approach to Bell's Inequalities of quantum mechanics has been introduced by Abramsky and Hardy [2]. We point out that the logical Bell's Inequalities of [2] are provable in the probability logic of Fagin, Halpern and Megiddo [4]. Since it is now considered empirically established that quantum mechanics violates Bell's Inequalities, we introduce a modified probability logic, that we call quantum team logic, in which Bell's Inequalities are not provable, and prove a Completeness Theorem for this logic. For this end we generalise the team semantics of dependence logic [7] first to probabilistic team semantics, and then to what we call quantum team semantics.", "label": 1, "field": "math"} {"text": "Title: On knots that divide ribbon knotted surfaces\nAbstract: We define a knot to be half ribbon if it is the cross-section of a ribbon 2-knot, and observe that ribbon implies half ribbon implies slice. We introduce the half ribbon genus of a knot K, the minimum genus of a ribbon knotted surface of which K is a cross-section. We compute this genus for all prime knots up to 12 crossings, and many 13-crossing knots. The same approach yields new computations of the doubly slice genus. We also introduce the half fusion number of a knot K, that measures the complexity of ribbon 2-knots of which K is a cross-section. We show that it is bounded from below by the Levine-Tristram signatures, and differs from the standard fusion number by an arbitrarily large amount.", "label": 1, "field": "math"} {"text": "Title: Optimizing Information Freshness in Uplink Multiuser MIMO Networks with Partial Observations\nAbstract: This paper investigates a multiuser scheduling problem within an uplink multiple-input multi-output (MIMO) status update network, consisting of a multi-antenna base station (BS) and multiple single-antenna devices. The presence of multiple antennas at the BS introduces spatial degrees-of-freedom, enabling concurrent transmission of status updates from multiple devices in each time slot. Our objective is to optimize network-wide information freshness, quantified by the age of information (AoI) metric, by determining how the BS can best schedule device transmissions, while taking into account the random arrival of status updates at the device side.To address this decision-making problem, we model it as a partially observable Markov decision process (POMDP) and establish that the evolution of belief states for different devices is independent.We also prove that feasible belief states can be described by finite-dimensional vectors. Building on these observations, we develop a dynamic scheduling (DS) policy to solve the POMDP, and then derive an upper bound of its AoI performance, which is used to optimize the parameter configuration. To gain more design insights, we investigate a symmetric network, and put forth a fixed scheduling (FS) policy with lower computational complexity. An action space reduction strategy is applied to further reduce the computational complexity of both DS and FS policies. Our numerical results validate our analyses and indicate that the DS policy with the reduced action space performs almost identically to the original DS policy, and both outperform the baseline policies.", "label": 0, "field": "cs"} {"text": "Title: Dynamic Local Regret for Non-convex Online Forecasting\nAbstract: We consider online forecasting problems for non-convex machine learning models. Forecasting introduces several challenges such as (i) frequent updates are necessary to deal with concept drift issues since the dynamics of the environment change over time, and (ii) the state of the art models are non-convex models. We address these challenges with a novel regret framework. Standard regret measures commonly do not consider both dynamic environment and non-convex models. We introduce a local regret for non-convex models in a dynamic environment. We present an update rule incurring a cost, according to our proposed local regret, which is sublinear in time T. Our update uses time-smoothed gradients. Using a real-world dataset we show that our time-smoothed approach yields several benefits when compared with state-of-the-art competitors: results are more stable against new data; training is more robust to hyperparameter selection; and our approach is more computationally efficient than the alternatives.", "label": 1, "field": "cs"} {"text": "Title: Separable homology of graphs and the Whitehead complex\nAbstract: We introduce the Whitehead complex, a one-complex associated to a finite regular cover of the rose and show that it is connected if and only if the fundamental group of the associated cover is generated by its intersection with the set of elements in proper free factors of $\\mathbf{F}_n$. The Whitehead complex admits an action of $\\mathrm{Out}(\\mathbf{F}_n)$ by isometries if the associated cover corresponds to a characteristic subgroup of $\\mathbf{F}_n$. We prove that the Whitehead complex of the rose has infinite diameter and is nonhyperbolic, implying it is not quasi-isometric to the free splitting complex or the free factor complex.", "label": 0, "field": "math"} {"text": "Title: The spectrality of self-affine measure under the similarity transformation of $GL_n(p)$\nAbstract: Let $\\mu_{M,D}$ be the self-affine measure generated by an expanding integer matrix $M\\in M_n(\\mathbb{Z})$ and a finite digit set $D\\subset\\mathbb{Z}^n$. It is well known that the two measures $\\mu_{M,D}$ and $\\mu_{\\tilde{M},\\tilde{D}}$ have the same spectrality if $\\tilde{M}=B^{-1}MB$ and $\\tilde{D}=B^{-1}D$, where $B\\in M_n(\\mathbb{R})$ is a nonsingular matrix. This fact is usually used to simplify the digit set $D$ or the expanding matrix $M$. However, it often transforms integer digit set $D$ or expanding matrix $M$ into real, which brings many difficulties to study the spectrality of $\\mu_{\\tilde{M},\\tilde{D}}$. In this paper, we introduce a similarity transformation of general linear group $GL_n(p)$ for some self-affine measures, and discuss their spectrality. This kind of similarity transformation can keep the integer properties of $D$ and $M$ simultaneously, which leads to many advantages in discussing the spectrality of self-affine measures. As an application, we extend some well-known spectral self-affine measures to more general forms.", "label": 1, "field": "math"} {"text": "Title: Reference-less Measure of Faithfulness for Grammatical Error Correction\nAbstract: We propose USim, a semantic measure for Grammatical Error Correction (GEC) that measures the semantic faithfulness of the output to the source, thereby complementing existing reference-less measures (RLMs) for measuring the output's grammaticality. USim operates by comparing the semantic symbolic structure of the source and the correction, without relying on manually-curated references. Our experiments establish the validity of USim, by showing that (1) semantic annotation can be consistently applied to ungrammatical text; (2) valid corrections obtain a high USim similarity score to the source; and (3) invalid corrections obtain a lower score.", "label": 1, "field": "cs"} {"text": "Title: Support theorem for the transverse ray transform of tensor fields of rank 2\nAbstract: Let (M, g) be a simple, real analytic, Riemannian manifold with boundary and of dimension n>=3. In this work, we prove a support theorem for the transverse ray transform of tensor fields of rank 2 defined over such manifolds. More specifically, given a symmetric tensor field f of rank 2, we show that if the transverse ray transform of f vanishes over an appropriate open set of maximal geodesics of M , then the support of f vanishes on the points of M that lie on the union of the aforementioned open set of geodesics.", "label": 1, "field": "math"} {"text": "Title: Mod-$p$ isogeny classes on Shimura varieties with parahoric level structure\nAbstract: We study the special fiber of the integral models for Shimura varieties of Hodge type with parahoric level structure constructed by Kisin and Pappas in [KP]. We show that when the group is residually split, the points in the mod $p$ isogeny classes have the form predicted by the Langlands Rapoport conjecture in [LR]. We also verify most of the He-Rapoport axioms for these integral models without the residually split assumption. This allows us to prove that all Newton strata are non-empty for these models.", "label": 1, "field": "math"} {"text": "Title: The limiting shape of a full mailbox\nAbstract: We study a model for email communication due to Gabrielli and Caldarelli, where someone receives and answers emails at the times of independent Poisson processes with intensities $\\lambda_{\\rm in}>\\lambda_{\\rm out}$. The receiver assigns i.i.d. priorities to incoming emails according to some atomless law and always answers the email in the mailbox with the highest priority. Since the frequency of incoming emails is higher than the frequency of answering, below a critical priority, the mailbox fills up ad infinitum. We prove a theorem about the limiting shape of the mailbox just above the critical point, linking it to the convex hull of Brownian motion. We conjecture that this limiting shape is universal in a class of similar models, including a model for the evolution of an order book due to Stigler and Luckock.", "label": 1, "field": "math"} {"text": "Title: On two open questions for extension bundles\nAbstract: In this paper we give positive answers for two open questions on extension bundles over weighted projective lines, raised by Kussin, Lenzing and Meltzer in the paper ``Triangle singularities, ADE-chains and weighted projective lines''.", "label": 0, "field": "math"} {"text": "Title: Evolution of Retweet Rates in Twitter User Careers: Analysis and Model\nAbstract: We study the evolution of the number of retweets received by Twitter users over the course of their \"careers\" on the platform. We find that on average the number of retweets received by users tends to increase over time. This is partly expected because users tend to gradually accumulate followers. Normalizing by the number of followers, however, reveals that the relative, per-follower retweet rate tends to be non-monotonic, maximized at a \"peak age\" after which it does not increase, or even decreases. We develop a simple mathematical model of the process behind this phenomenon, which assumes a constantly growing number of followers, each of whom loses interest over time. We show that this model is sufficient to explain the non-monotonic nature of per-follower retweet rates, without any assumptions about the quality of content posted at different times.", "label": 1, "field": "cs"} {"text": "Title: b-articulation points and b-bridges in strongly biconnected directed graphs\nAbstract: A directed graph $G=(V,E)$ is called strongly biconnected if $G$ is strongly connected and the underlying graph of $G$ is biconnected. This class of directed graphs was first introduced by Wu and Grumbach. Let $G=(V,E)$ be a strongly biconnected directed graph. An edge $e\\in E$ is a b-bridge if the subgraph $G\\setminus \\left\\lbrace e\\right\\rbrace =(V,E\\setminus \\left\\lbrace e\\right\\rbrace) $ is not strongly biconnected. A vertex $w\\in V$ is a b-articulation point if $G\\setminus \\left\\lbrace w\\right\\rbrace$ is not strongly biconnected, where $G\\setminus \\left\\lbrace w\\right\\rbrace$ is the subgraph obtained from $G$ by removing $w$. In this paper we study b-articulation points and b-bridges.", "label": 1, "field": "cs"} {"text": "Title: On Error and Compression Rates for Prototype Rules\nAbstract: We study the close interplay between error and compression in the non-parametric multiclass classification setting in terms of prototype learning rules. We focus in particular on a recently proposed compression-based learning rule termed OptiNet (Kontorovich, Sabato, and Urner 2016; Kontorovich, Sabato, and Weiss 2017; Hanneke et al. 2021). Beyond its computational merits, this rule has been recently shown to be universally consistent in any metric instance space that admits a universally consistent rule--the first learning algorithm known to enjoy this property. However, its error and compression rates have been left open. Here we derive such rates in the case where instances reside in Euclidean space under commonly posed smoothness and tail conditions on the data distribution. We first show that OptiNet achieves non-trivial compression rates while enjoying near minimax-optimal error rates. We then proceed to study a novel general compression scheme for further compressing prototype rules that locally adapts to the noise level without sacrificing accuracy. Applying it to OptiNet, we show that under a geometric margin condition, further gain in the compression rate is achieved. Experimental results comparing the performance of the various methods are presented.", "label": 1, "field": "cs"} {"text": "Title: Weighted Proportional Allocations of Indivisible Goods and Chores: Insights via Matchings\nAbstract: We study the fair allocation of indivisible goods and chores under ordinal valuations for agents with unequal entitlements. We show the existence and polynomial time computation of weighted necessarily proportional up to one item (WSD-PROP1) allocations for both goods and chores, by reducing it to a problem of finding perfect matchings in a bipartite graph. We give a complete characterization of these allocations as corner points of a perfect matching polytope. Using this polytope, we can optimize over all allocations to find a min-cost WSD-PROP1 allocation of goods or most efficient WSD-PROP1 allocation of chores. Additionally, we show the existence and computation of sequencible (SEQ) WSD-PROP1 allocations by using rank-maximal perfect matching algorithms and show incompatibility of Pareto optimality under all valuations and WSD-PROP1. We also consider the Best-of-Both-Worlds (BoBW) fairness notion. By using our characterization, we show the existence and polynomial time computation of Ex-ante envy free (WSD-EF) and Ex-post WSD-PROP1 allocations under ordinal valuations for both chores and goods.", "label": 0, "field": "cs"} {"text": "Title: On the standing waves of the NLS-log equation with point interaction on a star graph\nAbstract: We study a nonlinear Schr\\\"odinger equation with logarithmic nonlinearity on a star graph $\\mathcal{G}$. At the vertex an interaction occurs described by a boundary condition of delta type with strength $\\alpha\\in \\mathbb{R}$. We investigate orbital stability and spectral instability of the standing wave solutions $e^{i\\omega t}\\mathbf{\\Phi}(x)$ to the equation when the profile $\\mathbf\\Phi(x)$ has mixed structure (i.e. has bumps and tails). In our approach we essentially use the extension theory of symmetric operators by Krein - von Neumann, and the analytic perturbations theory.", "label": 1, "field": "math"} {"text": "Title: Boolean TQFTs with accumulating defects, sofic systems, and automata for infinite words\nAbstract: Any finite state automaton gives rise to a Boolean one-dimensional TQFT with defects and inner endpoints of cobordisms. This paper extends the correspondence to Boolean TQFTs where defects accumulate toward inner endpoints, relating such TQFTs and topological theories to sofic systems and $\\omega$-automata.", "label": 0, "field": "math"} {"text": "Title: An efficient implementable inexact entropic proximal point algorithm for a class of linear programming problems\nAbstract: We introduce a class of specially structured linear programming (LP) problems, which has favorable modeling capability for important application problems in different areas such as optimal transport, discrete tomography and economics. To solve these generally large-scale LP problems efficiently, we design an implementable inexact entropic proximal point algorithm (iEPPA) combined with an easy-to-implement dual block coordinate descent method as a subsolver. Unlike existing entropy-type proximal point algorithms, our iEPPA employs a more practically checkable stopping condition for solving the associated subproblems while achieving provable convergence. Moreover, when solving the capacity constrained multi-marginal optimal transport (CMOT) problem (a special case of our LP problem), our iEPPA is able to bypass the underlying numerical instability issues that often appear in the popular entropic regularization approach, since our algorithm does not require the proximal parameter to be very small in order to obtain an accurate approximate solution. Numerous numerical experiments show that our iEPPA is efficient and robust for solving large-scale CMOT problems. The experiments on the discrete tomography problem also highlight the potential modeling power of our model.", "label": 1, "field": "math"} {"text": "Title: Towards Fully Decoupled End-to-End Person Search\nAbstract: End-to-end person search aims to jointly detect and re-identify a target person in raw scene images with a unified model. The detection task unifies all persons while the re-id task discriminates different identities, resulting in conflict optimal objectives. Existing works proposed to decouple end-to-end person search to alleviate such conflict. Yet these methods are still sub-optimal on one or two of the sub-tasks due to their partially decoupled models, which limits the overall person search performance. In this paper, we propose to fully decouple person search towards optimal person search. A task-incremental person search network is proposed to incrementally construct an end-to-end model for the detection and re-id sub-task, which decouples the model architecture for the two sub-tasks. The proposed task-incremental network allows task-incremental training for the two conflicting tasks. This enables independent learning for different objectives thus fully decoupled the model for persons earch. Comprehensive experimental evaluations demonstrate the effectiveness of the proposed fully decoupled models for end-to-end person search.", "label": 0, "field": "cs"} {"text": "Title: Radical subgroups of finite reductive groups\nAbstract: Radical subgroups play an important role in both group theory and representation theory. In this paper we present a strategy of classifying radical subgroups of finite reductive groups. As an application, we complete the proof of the inductive blockwise Alperin weight condition for the Chevalley groups $\\F_4(q)$, contributing to the program to prove the Alperin weight conjecture by verifying its inductive condition for simple groups.", "label": 0, "field": "math"} {"text": "Title: Blow up of solutions for a Parabolic-Elliptic Chemotaxis System with gradient dependent chemotactic coefficient\nAbstract: We consider a Parabolic-Elliptic system of PDE's with a chemotactic term in a $N$-dimensional unit ball describing the behavior of the density of a biological species \"$u$\" and a chemical stimulus \"$v$\". The system includes a nonlinear chemotactic coefficient depending of ``$\\nabla v$\", i.e. the chemotactic term is given in the form $$- div (\\chi u |\\nabla v|^{p-2} \\nabla v), \\qquad \\mbox{ for } \\ p \\in ( \\frac{N}{N-1},2), \\qquad N >2 $$ for a positive constant $\\chi$ when $v$ satisfies the poisson equation $$- \\Delta v = u - \\frac{1}{|\\Omega|} \\int_{\\Omega} u_0dx.$$ We study the radially symmetric solutions under the assumption in the initial mass $$ \\frac{1}{|\\Omega|} \\int_{\\Omega} u_0dx>6.$$ For $\\chi$ large enough, we present conditions in the initial data, such that any regular solution of the problem blows up at finite time.", "label": 1, "field": "math"} {"text": "Title: The extension problem in free harmonic analysis\nAbstract: This paper studies certain aspects of harmonic analysis on nonabelian free groups. We focus on the concept of a positive definite function on the free group and our primary goal is to understand how such functions can be extended from balls of finite radius to the entire group. Previous work showed that such extensions always exist and we study the problem of simultaneous extension of multiple positive definite functions. More specifically, we define a concept of 'relative energy' which measures the proximity between a pair of positive definite functions, and show that a pair of positive definite functions on a finite ball can be extended to the entire group without increasing their relative energy. The proof is analytic, involving differentiation of noncommutative Szego parameters.", "label": 1, "field": "math"} {"text": "Title: Characterization of commuting graphs of finite groups having small genus\nAbstract: In this paper we first show that among all double-toroidal and triple-toroidal finite graphs only $K_8 \\sqcup 9K_1$, $K_8 \\sqcup 5K_2$, $K_8 \\sqcup 3K_4$, $K_8 \\sqcup 9K_3$, $K_8\\sqcup 9(K_1 \\vee 3K_2)$, $3K_6$ and $3K_6 \\sqcup 4K_4 \\sqcup 6K_2$ can be realized as commuting graphs of finite groups. As consequences of our results we also show that for any finite non-abelian group $G$ if the commuting graph of $G$ (denoted by $\\Gamma_c(G)$) is double-toroidal or triple-toroidal then $\\Gamma_c(G)$ and its complement satisfy Hansen-Vuki{\\v{c}}evi{\\'c} Conjecture and E-LE conjecture. In the process we find a non-complete graph, namely the non-commuting graph of the group $(\\mathbb{Z}_3 \\times \\mathbb{Z}_3) \\rtimes Q_8$, that is hyperenergetic. This gives a new counter example to a conjecture of Gutman regarding hyperenergetic graphs.", "label": 0, "field": "math"} {"text": "Title: The Rotation of Eigenspaces of Perturbed Matrix Pairs\nAbstract: We revisit the relative perturbation theory for invariant subspaces of positive definite matrix pairs. As a prototype model problem for our results we consider parameter dependent families of eigenvalue problems. We show that new estimates are a natural way to obtain sharp --- as functions of the parameter indexing the family of matrix pairs --- estimates for the rotation of spectral subspaces.", "label": 1, "field": "math"} {"text": "Title: Beck modules and alternative algebras\nAbstract: We set out the general theory of \"Beck modules\" in a variety of algebras and describe them as modules over suitable \"universal enveloping\" unital associative algebras. We pay particular attention to the somewhat nonstandard case of \"alternative algebras,\" defined by a restricted associative law, and determine the Poincar\\'e polynomial of the universal enveloping algebra in the homogenous case.", "label": 0, "field": "math"} {"text": "Title: Backward propagation of warped product structures and asymptotically conical shrinkers\nAbstract: We establish sufficient conditions which ensure that a locally-warped product structure propagates backward in time under the Ricci flow. As an application, we prove that if an asymptotically conical gradient shrinking soliton is asymptotic to a cone whose cross-section is a product of Einstein manifolds, the soliton must itself be a multiply-warped product over the same manifolds.", "label": 0, "field": "math"} {"text": "Title: Bordered and Framed Toeplitz and Hankel Determinants with Applications to Integrable Probability\nAbstract: Bordered and framed Toeplitz/Hankel determinants have the same structure as Toeplitz/Hankel determinants except in small number of matrix rows and/or columns. We review these structured determinants and their connections to orthogonal polynomials, collecting well-known and perhaps less well-known results. We present some applications for these structured determinants to ensembles of non-intersecting paths and the six-vertex model, with an eye towards asymptotic analysis. We also prove some asymptotic formulae for the probability of non-intersection for an ensemble of continuous time random walks for certain choices of starting and ending points as the number of random walkers tends to infinity.", "label": 0, "field": "math"} {"text": "Title: Towards dense object tracking in a 2D honeybee hive\nAbstract: From human crowds to cells in tissue, the detection and efficient tracking of multiple objects in dense configurations is an important and unsolved problem. In the past, limitations of image analysis have restricted studies of dense groups to tracking a single or subset of marked individuals, or to coarse-grained group-level dynamics, all of which yield incomplete information. Here, we combine convolutional neural networks (CNNs) with the model environment of a honeybee hive to automatically recognize all individuals in a dense group from raw image data. We create new, adapted individual labeling and use the segmentation architecture U-Net with a loss function dependent on both object identity and orientation. We additionally exploit temporal regularities of the video recording in a recurrent manner and achieve near human-level performance while reducing the network size by 94% compared to the original U-Net architecture. Given our novel application of CNNs, we generate extensive problem-specific image data in which labeled examples are produced through a custom interface with Amazon Mechanical Turk. This dataset contains over 375,000 labeled bee instances across 720 video frames at 2 FPS, representing an extensive resource for the development and testing of tracking methods. We correctly detect 96% of individuals with a location error of ~7% of a typical body dimension, and orientation error of 12 degrees, approximating the variability of human raters. Our results provide an important step towards efficient image-based dense object tracking by allowing for the accurate determination of object location and orientation across time-series image data efficiently within one network architecture.", "label": 1, "field": "cs"} {"text": "Title: Convergence of boundary layers of chemotaxis models with physical boundary conditions~I: degenerate initial data\nAbstract: The celebrated experiment of Tuval et al. \\cite{tuval2005bacterial} showed that the bacteria living a water drop can form a thin layer near the air-water interface, where a so-called chemotaxis-fluid system with physical boundary conditions was proposed to interpret the mechanism underlying the pattern formation alongside numerical simulations. However, the rigorous proof for the existence and convergence of the boundary layer solutions to the proposed model still remains open. This paper shows that the model with physical boundary conditions proposed in \\cite{tuval2005bacterial} in one dimension can generate boundary layer solution as the oxygen diffusion rate $\\varepsilon>0$ is small. Specifically, we show that the solution of the model with $\\varepsilon>0$ will converge to the solution with $\\varepsilon=0$ (outer-layer solution) plus the boundary layer profiles (inner-layer solution) with a sharp transition near the boundary as $ \\varepsilon \\rightarrow 0$. There are two major difficulties in our analysis. First, the global well-posedness of the model is hard to prove since the Dirichlet boundary condition can not contribute to the gradient estimates needed for the cross-diffusion structure in the model. Resorting to the technique of taking anti-derivative, we remove the cross-diffusion structure such that the Dirichlet boundary condition can facilitate the needed estimates. Second, the outer-layer profile of bacterial density is required to be degenerate at the boundary as $ t \\rightarrow 0 ^{+}$, which makes the traditional cancellation technique incapable. Here we employ the Hardy inequality and delicate weighted energy estimates to overcome this obstacle and derive the requisite uniform-in-$\\varepsilon$ estimates allowing us to pass the limit $\\varepsilon \\to 0$ to achieve our results.", "label": 0, "field": "math"} {"text": "Title: Two-Stage Surrogate Modeling for Data-Driven Design Optimization with Application to Composite Microstructure Generation\nAbstract: This paper introduces a novel two-stage machine learning-based surrogate modeling framework to address inverse problems in scientific and engineering fields. In the first stage of the proposed framework, a machine learning model termed the \"learner\" identifies a limited set of candidates within the input design space whose predicted outputs closely align with desired outcomes. Subsequently, in the second stage, a separate surrogate model, functioning as an \"evaluator,\" is employed to assess the reduced candidate space generated in the first stage. This evaluation process eliminates inaccurate and uncertain solutions, guided by a user-defined coverage level. The framework's distinctive contribution is the integration of conformal inference, providing a versatile and efficient approach that can be widely applicable. To demonstrate the effectiveness of the proposed framework compared to conventional single-stage inverse problems, we conduct several benchmark tests and investigate an engineering application focused on the micromechanical modeling of fiber-reinforced composites. The results affirm the superiority of our proposed framework, as it consistently produces more reliable solutions. Therefore, the introduced framework offers a unique perspective on fostering interactions between machine learning-based surrogate models in real-world applications.", "label": 0, "field": "cs"} {"text": "Title: Normal operators with highly incompatible off-diagonal corners\nAbstract: Let $\\mathcal{H}$ be a complex, separable Hilbert space, and $\\mathcal{B}(\\mathcal{H})$ denote the set of all bounded linear operators on $\\mathcal{H}$. Given an orthogonal projection $P \\in \\mathcal{B}(\\mathcal{H})$ and an operator $D \\in \\mathcal{B}(\\mathcal{H})$, we may write $D=\\begin{bmatrix} D_1& D_2 D_3 & D_4 \\end{bmatrix}$ relative to the decomposition $\\mathcal{H} = \\mathrm{ran}\\, P \\oplus \\mathrm{ran}\\, (I-P)$. In this paper we study the question: for which non-negative integers $j, k$ can we find a normal operator $D$ and an orthogonal projection $P$ such that $\\mathrm{rank}\\, D_2 = j$ and $\\mathrm{rank}\\, D_3 = k$? Complete results are obtained in the case where $\\mathrm{dim}\\, \\mathcal{H} < \\infty$, and partial results are obtained in the infinite-dimensional setting.", "label": 1, "field": "math"} {"text": "Title: Sums, products and dilates on sparse graphs\nAbstract: Let $A \\subset \\mathbb R$ and $G \\subset A \\times A$. We prove that, for any $\\lambda \\in \\mathbb R \\setminus \\{-1,0,1\\}$, \\[ \\max \\{|A+_G A|, |A+_G \\lambda A|, |A\\cdot_G A|\\} \\gg |G|^{6/11}. \\]", "label": 1, "field": "math"} {"text": "Title: Quasitriangular structure and twisting of the 2+1 bicrossproduct model\nAbstract: We show that the bicrossproduct model $C[SU_2^*]{\\blacktriangleright\\!\\!\\triangleleft} U(su_2)$ quantum Poincare group in 2+1 dimensions acting on the quantum spacetime $[x_i,t]=\\imath\\lambda x_i$ is related by a Drinfeld and module-algebra twist to the quantum double $U(su_2)\\ltimes C[SU_2]$ acting on the quantum spacetime $[x_\\mu,x_\\nu]=\\imath\\lambda\\epsilon_{\\mu\\nu\\rho}x_\\rho$. We obtain this twist by taking a scaling limit as $q\\to 1$ of the $q$-deformed version of the above where it corresponds to a previous theory of $q$-deformed Wick rotation from $q$-Euclidean to $q$-Minkowski space. We also recover the twist result at the Lie bialgebra level.", "label": 1, "field": "math"} {"text": "Title: A multipartite analogue of Dilworth's Theorem\nAbstract: We prove that every partially ordered set on $n$ elements contains $k$ subsets $A_{1},A_{2},\\dots,A_{k}$ such that either each of these subsets has size $\\Omega(n/k^{5})$ and, for every $i_{\\ell}a_{2}>_{\\ell}\\dots>_{\\ell}a_{k}$ for any $(a_1,a_2,\\dots,a_k) \\in A_1\\times A_2\\times \\dots \\times A_k$, or $a_i$ is incomparable with $a_j$ for any $i\\ne j$, $a_i\\in A_i$ and $a_j\\in A_j$. This improves on a 2009 result of Pach and the first author motivated by problems in discrete geometry.", "label": 0, "field": "math"} {"text": "Title: On the heavy-tail behavior of the distributionally robust newsvendor\nAbstract: Since the seminal work of Scarf (1958) [A min-max solution of an inventory problem, Studies in the Mathematical Theory of Inventory and Production, pages 201-209] on the newsvendor problem with ambiguity in the demand distribution, there has been a growing interest in the study of the distributionally robust newsvendor problem. The model is criticized at times for being overly conservative since the worst-case distribution is discrete with a few support points. However, it is the order quantity prescribed from the model that is of practical relevance. A simple calculation shows that the optimal order quantity in Scarf's model with known first and second moment is also optimal for a censored student-t distribution with parameter 2. In this paper, we generalize this \"heavy-tail optimality\" property of the distributionally robust newsvendor to an ambiguity set where information on the first and the $\\alpha$th moment is known, for any real number $\\alpha > 1$. We show that the optimal order quantity for the distributionally robust newsvendor problem is also optimal for a regularly varying distribution with roughly a power law tail with tail index $\\alpha$. We illustrate the usefulness of the model in the high service level regime with numerical experiments, by showing that when a standard distribution such as the exponential or lognormal distribution is contaminated with a heavy-tailed (regularly varying) distribution, the distributionally robust optimal order quantity outperforms the optimal order quantity of the original distribution, even with a small amount of contamination.", "label": 1, "field": "math"} {"text": "Title: Norm inflation for the Boussinesq system\nAbstract: We prove the norm inflation phenomena for the Boussinesq system on $\\mathbb T^3$. For arbitrarily small initial data $(u_0,\\rho_0)$ in the negative-order Besov spaces $\\dot{B}^{-1}_{\\infty, \\infty} \\times \\dot{B}^{-1}_{\\infty, \\infty}$, the solution can become arbitrarily large in a short time. Such largeness can be detected in $\\rho$ in Besov spaces of any negative order: $\\dot{B}^{-s}_{\\infty, \\infty}$ for any $s>0$. Notice that our initial data space is scaling critical for $u$ and is scaling subcritical for $\\rho$.", "label": 1, "field": "math"} {"text": "Title: Diametral notions for elements of the unit ball of a Banach space\nAbstract: We introduce extensions of $\\Delta$-points and Daugavet points in which slices are replaced by relative weakly open subsets (super $\\Delta$-points and super Daugavet points) or by convex combinations of slices (ccs $\\Delta$-points and ccs Daugavet points). We first give a general overview on these new concepts and provide some isometric consequences on the spaces. As examples: if a Banach space contains a super $\\Delta$-point, then it does not admit an unconditional FDD with suppression constant smaller than two; if a real Banach space contains a ccs $\\Delta$-point, then it does not admit a one-unconditional basis; if a Banach space contains a ccs Daugavet point, then every convex combination of slices of its unit ball has diameter two. We next characterize the notions in some classes of Banach spaces showing, for instance, that all the notions coincide in $L_1$-predual spaces and that all the notions but ccs Daugavet points coincide in $L_1$-spaces. We next remark on some examples which have previously appeared in the literature and provide some new intriguing examples: examples of super $\\Delta$-points which are as closed as desired to strongly exposed points (hence failing to be Daugavet points in an extreme way); an example of a super $\\Delta$-point which is strongly regular (hence failing to be a ccs $\\Delta$-point in the strongest way); a super Daugavet point which fails to be a ccs $\\Delta$-point. The extensions of the diametral notions to point in the open unit ball and the consequences on the spaces are also studied. Last, we investigate the Kuratowski measure of relative weakly open subsets and of convex combinations of slices in the presence of super $\\Delta$-points or ccs $\\Delta$-points, as well as for spaces enjoying diameter 2 properties. We conclude the paper with a section on open problems.", "label": 1, "field": "math"} {"text": "Title: Infinite-Time Singularities of the Lagrangian Mean Curvature Flow\nAbstract: In this paper, we exhibit examples of Lagrangian mean curvature flow which exist and are embedded for all time, but form an infinite-time singularity and converge to an immersed special Lagrangian as $t\\to\\infty$. This result shows that infinite-time singularities can form in the Thomas--Yau `semi-stable' situation. Our work is a parabolic analogue of the results of Dominic Joyce and Yng-Ing Lee regarding desingularisation of special Lagrangians with conical singularities. The gluing construction that we employ is inspired by the work of Simon Brendle and Nikolaos Kapouleas regarding ancient solutions of the Ricci flow.", "label": 0, "field": "math"} {"text": "Title: Symplectic period for a representation of $GL_n(D)$\nAbstract: In this paper, we study the irreducible admissible representations of $GL_{n}(D)$ with a symplectic period for $n = 3$ and $4$, i.e., those representations which have a linear functional invariant under $Sp_n(D)$, where $D$ is a quaternion division algebra over a non-archimedean local field $k$ of characteristic zero and $Sp_n(D)$ is the unique non-split inner form of the symplectic group $Sp_{2n}(k)$. Our results contain all distinguished unitary representations stated in Prasad's conjecture.", "label": 0, "field": "math"} {"text": "Title: Uniform regularity estimates and invisicid limit for the compressible non-resistive magnetohydrodynamics system\nAbstract: We are concerned with the uniform regularity estimates of solutions to the two dimensional compressible non-resistive magnetohydrodynamics (MHD) equations with the no-slip boundary condition on velocity in the half plane. Under the assumption that the initial magnetic field is transverse to the boundary, the uniform conormal energy estimates are established for the solutions to compressible MHD equations with respect to small viscosity coefficients. As a direct consequence, we proved the inviscid limit of solutions from viscous MHD systems to the ideal MHD systems in $L^\\infty$ sense. It shows that the transverse magnetic field can prevent the boundary layers from occurring in some physical regime.", "label": 1, "field": "math"} {"text": "Title: Forced translational symmetry-breaking for abstract evolution equations: the organizing center for blocking of travelling waves\nAbstract: We consider two parameter families of differential equations on a Banach space X, where the parameters c and $\\epsilon$ are such that: (1) when $\\epsilon=0$, the differential equations are symmetric under the action of the group of one-dimensional translations SE(1) acting on X, whereas when $\\epsilon\\neq 0$, this translation symmetry is broken, (2) when $\\epsilon=0$, the symmetric differential equations admit a smooth family of relative equilibria (travelling waves) parametrized by the drift speed c, with $c=0$ corresponding to steady-states. Under certain hypotheses on the differential equations and on the Banach space X, we use the center manifold theorem of Sandstede, Scheel and Wulff to study the effects of the symmetry-breaking perturbation on the above family of relative equilibria. In particular, we show that the phenomenon commonly referred to as propagation failure, or wave blocking occurs in a cone in the $(c,\\epsilon)$ parameter space which emanates from the point $(c,\\epsilon)=(0,0)$. We also discuss how our methods can be adapted to perturbations of parameter-independent differential equations (such as the Fisher-KPP) which admit families of relative equilibria parametrized by drift speed.", "label": 1, "field": "math"} {"text": "Title: Statistical Mechanical Analysis of Neural Network Pruning\nAbstract: Deep learning architectures with a huge number of parameters are often compressed using pruning techniques to ensure computational efficiency of inference during deployment. Despite multitude of empirical advances, there is a lack of theoretical understanding of the effectiveness of different pruning methods. We inspect different pruning techniques under the statistical mechanics formulation of a teacher-student framework and derive their generalization error (GE) bounds. It has been shown that Determinantal Point Process (DPP) based node pruning method is notably superior to competing approaches when tested on real datasets. Using GE bounds in the aforementioned setup we provide theoretical guarantees for their empirical observations. Another consistent finding in literature is that sparse neural networks (edge pruned) generalize better than dense neural networks (node pruned) for a fixed number of parameters. We use our theoretical setup to prove this finding and show that even the baseline random edge pruning method performs better than the DPP node pruning method. We also validate this empirically on real datasets.", "label": 1, "field": "cs"} {"text": "Title: Randomness Requirements and Asymmetries in Nash Equilibria\nAbstract: In general, Nash equilibria in normal-form games may require players to play (probabilistically) mixed strategies. We define a measure of the complexity of finite probability distributions and study the complexity required to play NEs in finite two player $n\\times n$ games with rational payoffs. Our central results show that there exist games in which there is an exponential vs. linear gap in the complexity of the mixed distributions that the two players play at (the unique) NE. This gap induces gaps in the amount of space required to represent and sample from the corresponding distributions using known state-of-the-art sampling algorithms. We also establish upper and lower bounds on the complexity of any NE in the games that we study. These results highlight (i) the nontriviality of the assumption that players can any mixed strategy and (ii) the disparities in resources that players may require to play NEs in the games that we study.", "label": 0, "field": "cs"} {"text": "Title: Efficient Checking of Timed Order Compliance Rules over Graph-encoded Event Logs\nAbstract: Validation of compliance rules against process data is a fundamental functionality for business process management. Over the years, the problem has been addressed for different types of process data, i.e., process models, process event data at runtime, and event logs representing historical execution. Several approaches have been proposed to tackle compliance checking over process logs. These approaches have been based on different data models and storage technologies including relational databases, graph databases, and proprietary formats. Graph-based encoding of event logs is a promising direction that turns several process analytics tasks into queries on the underlying graph. Compliance checking is one class of such analysis tasks. In this paper, we argue that encoding log data as graphs alone is not enough to guarantee efficient processing of queries on this data. Efficiency is important due to the interactive nature of compliance checking. Thus, compliance checking would benefit from sub-linear scanning of the data. Moreover, as more data are added, e.g., new batches of logs arrive, the data size should grow sub-linearly to optimize both the space of storage and time for querying. We propose two encoding methods using graph representation, realized in Neo4J, and show the benefits of these encoding on a special class of queries, namely timed order compliance rules. Compared to a baseline encoding, our experiments show up to 5x speed up in the querying time as well as a 3x reduction in the graph size.", "label": 1, "field": "cs"} {"text": "Title: Learning the 3D Fauna of the Web\nAbstract: Learning 3D models of all animals on the Earth requires massively scaling up existing solutions. With this ultimate goal in mind, we develop 3D-Fauna, an approach that learns a pan-category deformable 3D animal model for more than 100 animal species jointly. One crucial bottleneck of modeling animals is the limited availability of training data, which we overcome by simply learning from 2D Internet images. We show that prior category-specific attempts fail to generalize to rare species with limited training images. We address this challenge by introducing the Semantic Bank of Skinned Models (SBSM), which automatically discovers a small set of base animal shapes by combining geometric inductive priors with semantic knowledge implicitly captured by an off-the-shelf self-supervised feature extractor. To train such a model, we also contribute a new large-scale dataset of diverse animal species. At inference time, given a single image of any quadruped animal, our model reconstructs an articulated 3D mesh in a feed-forward fashion within seconds.", "label": 0, "field": "cs"} {"text": "Title: The Effect of Noise on the Emergence of Continuous Norms and its Evolutionary Dynamics\nAbstract: We examine the effect of noise on societies of agents using an agent-based model of evolutionary norm emergence. Generally, we see that noisy societies are more selfish, smaller and discontent, and are caught in rounds of perpetual punishment preventing them from flourishing. Surprisingly, despite the effect of noise on the population, it does not seem to evolve away. We carry out further analysis and provide reasons for why this may be the case. Furthermore, we claim that our framework that evolves the noise/ambiguity of norms may be a new way to model the tight/loose framework of norms, suggesting that despite ambiguous norms detrimental effect on society, evolution does not favour clarity.", "label": 0, "field": "cs"} {"text": "Title: The Slepian model based independent interval approximation of persistency and zero-level exceedance distributions\nAbstract: In physics and engineering literature, the distribution of the excursion-above-zero time distribution (exceedance distribution) for a stationary Gaussian process has been approximated by a stationary switching process with independently distributed switching times. The approach matched the covariance of the clipped Gaussian process with the one for the stationary switching process and the distribution of the latter was used as the so-called independent interval approximation (IIA). The approach successfully assessed the persistency exponent for many physically important processes but left an unanswered question when such an approach leads to a mathematically meaningful and proper exceedance distribution. Here we address this question by proposing an alternative matching of the expected values of the clipped Slepian process and the corresponding switched process initiated at the origin. The method has allowed resolving the mathematical correctness of the matching method for a large subclass of the Gaussian processes with monotonic covariance, for which we provide a sufficient condition for the validity of the IIA. Within this class, the IIA produces a valid distribution for the excursion time and is represented in an explicit stochastic form that connects directly to the covariance of the underlying Gaussian process. We compare the excursion level distributions as well as the corresponding persistency exponents obtained through the IIA method with numerically computed exact distributions, and the simulated distribution for several important Gaussian models. We also argue that for stationary Gaussian processes with a non-monotonic covariance, the IIA fails and should not be used.", "label": 0, "field": "math"} {"text": "Title: Recognition of Unit Segment and Polyline Graphs is $\\exists\\mathbb{R}$-Complete\nAbstract: Given a set of objects O in the plane, the corresponding intersection graph is defined as follows. A vertex is created for each object and an edge joins two vertices whenever the corresponding objects intersect. We study here the case of unit segments and polylines with exactly k bends. In the recognition problem, we are given a graph and want to decide whether the graph can be represented as the intersection graph of certain geometric objects. In previous work it was shown that various recognition problems are $\\exists\\mathbb{R}$-complete, leaving unit segments and polylines as few remaining natural cases. We show that recognition for both families of objects is $\\exists\\mathbb{R}$-complete.", "label": 0, "field": "cs"} {"text": "Title: PBW bases and KLR algebras\nAbstract: We generalize Lusztig's geometric construction of the PBW bases of finite quantum groups of type $\\mathsf{ADE}$ under the framework of [Varagnolo-Vasserot, J. reine angew. Math. 659 (2011)]. In particular, every PBW basis of such quantum groups is proven to yield a semi-orthogonal collection in the module category of the KLR-algebras. This enables us to prove Lusztig's conjecture on the positivity of the canonical (lower global) bases in terms of the (lower) PBW bases in the $\\mathsf{ADE}$ case. In addition, we verify Kashiwara's problem on the finiteness of the global dimensions of the KLR-algebras of type $\\mathsf{ADE}$.", "label": 1, "field": "math"} {"text": "Title: $L^p$-spectral theory for the Laplacian on forms\nAbstract: In this article, we find sufficient conditions on an open Riemannian manifold so that a Weyl criterion holds for the $L^p$-spectrum of the Laplacian on $k$-forms, and also prove the decomposition of the $L^p$-spectrum depending on the order of the forms. We then show that the resolvent set of an operator such as the Laplacian on $L^p$ lies outside a parabola whenever the volume of the manifold has an exponential volume growth rate, removing the requirement on the manifold to be of bounded geometry. We conclude by providing a detailed description of the $L^p$ spectrum of the Laplacian on $k$-forms over hyperbolic space.", "label": 0, "field": "math"} {"text": "Title: Explicit characterisation of the fractional power spaces of the Dirichlet Laplacian and Stokes operators\nAbstract: We identify explicitly the fractional power spaces for the $L^2$ Dirichlet Laplacian and Dirichlet Stokes operators using the theory of real interpolation. The results are not new, but we hope that our arguments are relatively accessible.", "label": 1, "field": "math"} {"text": "Title: Bayesian Intrinsic Groupwise Image Registration: Unsupervised Disentanglement of Anatomy and Geometry\nAbstract: This article presents a general Bayesian learning framework for multi-modal groupwise registration on medical images. The method builds on probabilistic modelling of the image generative process, where the underlying common anatomy and geometric variations of the observed images are explicitly disentangled as latent variables. Thus, groupwise registration is achieved through the solution to Bayesian inference. We propose a novel hierarchical variational auto-encoding architecture to realize the inference procedure of the latent variables, where the registration parameters can be calculated in a mathematically interpretable fashion. Remarkably, this new paradigm can learn groupwise registration in an unsupervised closed-loop self-reconstruction process, sparing the burden of designing complex intensity-based similarity measures. The computationally efficient disentangled architecture is also inherently scalable and flexible, allowing for groupwise registration on large-scale image groups with variable sizes. Furthermore, the inferred structural representations from disentanglement learning are capable of capturing the latent anatomy of the observations with visual semantics. Extensive experiments were conducted to validate the proposed framework, including four datasets from cardiac, brain and abdominal medical images. The results have demonstrated the superiority of our method over conventional similarity-based approaches in terms of accuracy, efficiency, scalability and interpretability.", "label": 0, "field": "cs"} {"text": "Title: Characteristic Mode Decomposition Using the Scattering Dyadic in Arbitrary Full-Wave Solvers\nAbstract: Characteristic modes are formulated using the scattering dyadic, which maps incident plane waves to scattered far fields generated by an object of arbitrary material composition. Numerical construction of the scattering dyadic using arbitrary full-wave electromagnetic solvers is demonstrated in examples involving a variety of dielectric and magnetic materials. Wrapper functions for computing characteristic modes in method-of-moments, finite-difference time domain, and finite element solvers are provided as supplementary material.", "label": 1, "field": "cs"} {"text": "Title: Sparsity and spectral properties of dual frames\nAbstract: We study sparsity and spectral properties of dual frames of a given finite frame. We show that any finite frame has a dual with no more than $n^2$ non-vanishing entries, where $n$ denotes the ambient dimension, and that for most frames no sparser dual is possible. Moreover, we derive an expression for the exact sparsity level of the sparsest dual for any given finite frame using a generalized notion of spark. We then study the spectral properties of dual frames in terms of singular values of the synthesis operator. We provide a complete characterization for which spectral patterns of dual frames are possible for a fixed frame. For many cases, we provide simple explicit constructions for dual frames with a given spectrum, in particular, if the constraint on the dual is that it be tight.", "label": 1, "field": "math"} {"text": "Title: Orthogonal webs and semisimplification\nAbstract: We define a diagrammatic category that is equivalent to tilting representations for the orthogonal group. Our construction works in characteristic not equal to two. We also describe the semisimplification of this category.", "label": 0, "field": "math"} {"text": "Title: Neural Network Complexity of Chaos and Turbulence\nAbstract: Chaos and turbulence are complex physical phenomena, yet a precise definition of the complexity measure that quantifies them is still lacking. In this work we consider the relative complexity of chaos and turbulence from the perspective of deep neural networks. We analyze a set of classification problems, where the network has to distinguish images of fluid profiles in the turbulent regime from other classes of images such as fluid profiles in the chaotic regime, various constructions of noise and real world images. We analyze incompressible as well as weakly compressible fluid flows. We quantify the complexity of the computation performed by the network via the intrinsic dimensionality of the internal feature representations, and calculate the effective number of independent features which the network uses in order to distinguish between classes. In addition to providing a numerical estimate of the complexity of the computation, the measure also characterizes the neural network processing at intermediate and final stages. We construct adversarial examples and use them to identify the two point correlation spectra for the chaotic and turbulent vorticity as the feature used by the network for classification.", "label": 1, "field": "cs"} {"text": "Title: The Density Formula: One Lemma to Bound Them All\nAbstract: We introduce the Density Formula for (topological) drawings of graphs in the plane or on the sphere, which relates the number of edges, vertices, crossings, and sizes of cells in the drawing. We demonstrate its capability by providing several applications: we prove tight upper bounds on the edge density of various beyond-planar graph classes, including so-called $k$-planar graphs with $k=1,2$, fan-crossing / fan-planar graphs, $k$-bend RAC-graphs with $k=0,1,2$, and quasiplanar graphs. In some cases ($1$-bend and $2$-bend RAC-graphs and fan-crossing / fan-planar graphs), we thereby obtain the first tight upper bounds on the edge density of the respective graph classes. In other cases, we give new streamlined and significantly shorter proofs for bounds that were already known in the literature. Thanks to the Density Formula, all of our proofs are mostly elementary counting and mostly circumvent the typical intricate case analysis found in earlier proofs. Further, in some cases (simple and non-homotopic quasiplanar graphs), our alternative proofs using the Density Formula lead to the first tight lower bound examples.", "label": 0, "field": "math"} {"text": "Title: Limits of subcritical random graphs and random graphs with excluded minors\nAbstract: We prove local convergence results for the uniformly random, labelled or unlabelled, graphs from subcritical families. As an example special case, we prove Benjamini-Schramm convergence for the uniform random unlabelled tree. We introduce a compactification of the space of countable (connected) rooted graphs, and use it to generalise the notion of Benjamini-Schramm convergence in order to allow for vertices of infinite degree in the limit object.", "label": 1, "field": "math"} {"text": "Title: Know Your Limits: Uncertainty Estimation with ReLU Classifiers Fails at Reliable OOD Detection\nAbstract: A crucial requirement for reliable deployment of deep learning models for safety-critical applications is the ability to identify out-of-distribution (OOD) data points, samples which differ from the training data and on which a model might underperform. Previous work has attempted to tackle this problem using uncertainty estimation techniques. However, there is empirical evidence that a large family of these techniques do not detect OOD reliably in classification tasks. This paper gives a theoretical explanation for said experimental findings and illustrates it on synthetic data. We prove that such techniques are not able to reliably identify OOD samples in a classification setting, since their level of confidence is generalized to unseen areas of the feature space. This result stems from the interplay between the representation of ReLU networks as piece-wise affine transformations, the saturating nature of activation functions like softmax, and the most widely-used uncertainty metrics.", "label": 1, "field": "cs"} {"text": "Title: Adaptive Population-based Simulated Annealing for Uncertain Resource Constrained Job Scheduling\nAbstract: Transporting ore from mines to ports is of significant interest in mining supply chains. These operations are commonly associated with growing costs and a lack of resources. Large mining companies are interested in optimally allocating their resources to reduce operational costs. This problem has been previously investigated in the literature as resource constrained job scheduling (RCJS). While a number of optimisation methods have been proposed to tackle the deterministic problem, the uncertainty associated with resource availability, an inevitable challenge in mining operations, has received less attention. RCJS with uncertainty is a hard combinatorial optimisation problem that cannot be solved efficiently with existing optimisation methods. This study proposes an adaptive population-based simulated annealing algorithm that can overcome the limitations of existing methods for RCJS with uncertainty including the premature convergence, the excessive number of hyper-parameters, and the inefficiency in coping with different uncertainty levels. This new algorithm is designed to effectively balance exploration and exploitation, by using a population, modifying the cooling schedule in the Metropolis-Hastings algorithm, and using an adaptive mechanism to select perturbation operators. The results show that the proposed algorithm outperforms existing methods across a wide range of benchmark RCJS instances and uncertainty levels. Moreover, new best known solutions are discovered for all but one problem instance across all uncertainty levels.", "label": 1, "field": "cs"} {"text": "Title: Partial classification of the large-time behavior of solutions to cubic nonlinear Schr\u00f6dinger systems\nAbstract: In this paper, we study the large-time behavior of small solutions to the standard form of the systems of 1D cubic nonlinear Schr\\\"odinger equations consisting of two components and possessing a coercive mass-like conserved quantity. The cubic nonlinearity is known to be critical in one space dimension in view of the large-time behavior. By employing the result by Katayama and Sakoda, one can obtain the large-time behavior of the solution if we can integrate the corresponding ODE system. We introduce an integration scheme suited to the system. The key idea is to rewrite the ODE system, which is cubic, as a quadratic system of quadratic quantities of the original unknown. By using this technique, we described the large-time behavior of solutions in terms of elementary functions and the Jacobi elliptic functions for several examples of standard systems.", "label": 0, "field": "math"} {"text": "Title: Parabolic Anderson model in bounded domains of recurrent metric measure spaces\nAbstract: A metric measure space equipped with a Dirichlet form is called recurrent if its Hausdorff dimension is less than its walk dimension. In bounded domains of such spaces we study the parabolic Anderson models \\[ \\partial_{t} u(t,x) = \\Delta u(t,x) + \\beta u(t,x) \\, \\dot{W}_\\alpha(t,x) \\] where the noise $W_\\alpha$ is white in time and colored in space when $\\alpha >0$ while for $\\alpha=0$ it is also white in space. Both Dirichlet and Neumann boundary conditions are considered. Besides proving existence and uniqueness in the It\\^o sense we also get precise $L^p$ estimates for the moments and intermittency properties of the solution as a consequence. Our study reveals new exponents which are intrinsically associated to the geometry of the underlying space and the results for instance apply in metric graphs or fractals like the Sierpi\\'nski gasket for which we prove scaling invariance properties of the models.", "label": 0, "field": "math"} {"text": "Title: Calabi-Yau structures on Drinfeld quotients and Amiot's conjecture\nAbstract: In 2009, Claire Amiot gave a construction of Calabi-Yau structures on Verdier quotients. We sketch how to lift it to the dg setting. We use this construction as an important step in an outline of the proof of her conjecture on the structure of 2-Calabi-Yau triangulated categories with a cluster-tilting object.", "label": 0, "field": "math"} {"text": "Title: A note on a question of Shioda about integral sections\nAbstract: We consider a rational elliptic surface with a relatively minimal fibration. We compute the number of integral sections in the above rational elliptic surface. As an application, we obtain an estimate of polynomial solutions of some equations.", "label": 0, "field": "math"} {"text": "Title: On the number of perfect matchings in random lifts\nAbstract: Let G be a fixed connected multigraph with no loops. A random n-lift of G is obtained by replacing each vertex of G by a set of n vertices (where these sets are pairwise disjoint) and replacing each edge by a randomly chosen perfect matching between the n-sets corresponding to the endpoints of the edge. Let X_G be the number of perfect matchings in a random lift of G. We study the distribution of X_G in the limit as n tends to infinity, using the small subgraph conditioning method. We present several results including an asymptotic formula for the expectation of X_G when G is d-regular, d\\geq 3. The interaction of perfect matchings with short cycles in random lifts of regular multigraphs is also analysed. Partial calculations are performed for the second moment of X_G, with full details given for two example multigraphs, including the complete graph K_4. To assist in our calculations we provide a theorem for estimating a summation over multiple dimensions using Laplace's method. This result is phrased as a summation over lattice points, and may prove useful in future applications.", "label": 1, "field": "math"} {"text": "Title: On volumes of hyperbolic right-angled polyhedra\nAbstract: In this paper we obtain new upper bounds on volumes of right-angled polyhedra in hyperbolic space $\\mathbb{H}^3$ in three different cases: for ideal polyhedra with all vertices on the ideal hyperbolic boundary, for compact polytopes with only finite (or usual) vertices, and for finite volume polyhedra with vertices of both types.", "label": 1, "field": "math"} {"text": "Title: Unsupervised Program Synthesis for Images By Sampling Without Replacement\nAbstract: Program synthesis has emerged as a successful approach to the image parsing task. Most prior works rely on a two-step scheme involving supervised pretraining of a Seq2Seq model with synthetic programs followed by reinforcement learning (RL) for fine-tuning with real reference images. Fully unsupervised approaches promise to train the model directly on the target images without requiring curated pretraining datasets. However, they struggle with the inherent sparsity of meaningful programs in the search space. In this paper, we present the first unsupervised algorithm capable of parsing constructive solid geometry (CSG) images into context-free grammar (CFG) without pretraining via non-differentiable renderer. To tackle the \\emph{non-Markovian} sparse reward problem, we combine three key ingredients -- (i) a grammar-encoded tree LSTM ensuring program validity (ii) entropy regularization and (iii) sampling without replacement from the CFG syntax tree. Empirically, our algorithm recovers meaningful programs in large search spaces (up to $3.8 \\times 10^{28}$). Further, even though our approach is fully unsupervised, it generalizes better than supervised methods on the synthetic 2D CSG dataset. On the 2D computer aided design (CAD) dataset, our approach significantly outperforms the supervised pretrained model and is competitive to the refined model.", "label": 1, "field": "cs"} {"text": "Title: How to Scale Up the Spectral Efficiency of Multi-way Massive MIMO Relaying?\nAbstract: This paper considers a decode-and-forward (DF) multi-way massive multiple-input multiple-output (MIMO) relay system where many users exchange their data with the aid of a relay station equipped with a massive antenna array. We propose a new transmission protocol which leverages successive cancelation decoding and zero-forcing (ZF) at the users. By using properties of massive MIMO, a tight analytical approximation of the spectral efficiency is derived. We show that our proposed scheme uses only half of the time-slots required in the conventional scheme (in which the number of time-slots is equal to the number of users [1]), to exchange data across different users. As a result, the sum spectral efficiency of our proposed scheme is nearly double the one of the conventional scheme, thereby boosting the performance of multi-way massive MIMO to unprecedented levels.", "label": 1, "field": "cs"} {"text": "Title: Anchor Pruning for Object Detection\nAbstract: This paper proposes anchor pruning for object detection in one-stage anchor-based detectors. While pruning techniques are widely used to reduce the computational cost of convolutional neural networks, they tend to focus on optimizing the backbone networks where often most computations are. In this work we demonstrate an additional pruning technique, specifically for object detection: anchor pruning. With more efficient backbone networks and a growing trend of deploying object detectors on embedded systems where post-processing steps such as non-maximum suppression can be a bottleneck, the impact of the anchors used in the detection head is becoming increasingly more important. In this work, we show that many anchors in the object detection head can be removed without any loss in accuracy. With additional retraining, anchor pruning can even lead to improved accuracy. Extensive experiments on SSD and MS COCO show that the detection head can be made up to 44% more efficient while simultaneously increasing accuracy. Further experiments on RetinaNet and PASCAL VOC show the general effectiveness of our approach. We also introduce `overanchorized' models that can be used together with anchor pruning to eliminate hyperparameters related to the initial shape of anchors. Code and models are available at https://github.com/Mxbonn/anchor_pruning.", "label": 1, "field": "cs"} {"text": "Title: Geometries arising from trilinear forms on low-dimensional vector spaces\nAbstract: Let ${\\mathcal G}_k(V)$ be the $k$-Grassmannian of a vector space $V$ with $\\dim V=n$. Given a hyperplane $H$ of ${\\mathcal G}_k(V)$, we define in [I. Cardinali, L. Giuzzi, A. Pasini, A geometric approach to alternating $k$-linear forms, J. Algebraic Combin. doi:10.1007/s10801-016-0730-6] a point-line subgeometry of ${\\mathrm{PG}}(V)$ called the {\\it geometry of poles of $H$}. In the present paper, exploiting the classification of alternating trilinear forms in low dimension, we characterize the possible geometries of poles arising for $k=3$ and $n\\leq 7$ and propose some new constructions. We also extend a result of [J.Draisma, R. Shaw, Singular lines of trilinear forms, Linear Algebra Appl. doi:10.1016/j.laa.2010.03.040] regarding the existence of line spreads of ${\\mathrm{PG}}(5,{\\mathbb K})$ arising from hyperplanes of ${\\mathcal G}_3(V).$", "label": 1, "field": "math"} {"text": "Title: Index theory for traveling waves in reaction diffusion systems with skew gradient structure\nAbstract: A unified geometric approach for the stability analysis of traveling pulse solutions for reaction-diffusion equations with skew-gradient structure has been established in a previous paper [9], but essentially no results have been found in the case of traveling front solutions. In this work, we will bridge this gap. For such cases, a Maslov index of the traveling wave is well-defined, and we will show how it can be used to provide the spectral information of the waves. As an application, we use the same index providing the exact number of unstable eigenvalues of the traveling front solutions of FitzHugh-Nagumo equation.", "label": 1, "field": "math"} {"text": "Title: On a class of stochastic hyperbolic equations with double characteristics\nAbstract: We study the effect of Gaussian perturbations on a hyperbolic partial differential equation with double characteristics in two spatial dimensions. The coefficients of our partial differential operator depend polynomially on the space variables, while the noise is additive, white in time and coloured in space. We provide a sufficient condition on the spectral measure of the covariance functional describing the noise that allows for the existence of a random field solution for the resulting stochastic partial differential equation. Our approach is based on explicit computations for the fundamental solution of the partial differential operator and its Fourier transform.", "label": 1, "field": "math"} {"text": "Title: Explicit Generators for the Stabilizers of Rational Points in Thompson's Group $F$\nAbstract: We construct explicit finite generating sets for the stabilizers in Thompson's group $F$ of rational points of a unit interval or a Cantor set. Our technique is based on the Reidemeister-Schreier procedure in the context of Schreier graphs of such stabilizers in $F$. It is well known that the stabilizers of dyadic rational points are isomorphic to $F\\times F$ and can thus be generated by 4 explicit elements. We show that the stabilizer of every non-dyadic rational point $b\\in (0,1)$ is generated by 5 elements that are explicitly calculated as words in generators $x_0, x_1$ of $F$ that depend on the binary expansion of $b$. We also provide an alternative simple proof that the stabilizers of all rational points are finitely presented.", "label": 0, "field": "math"} {"text": "Title: A two-stage stochastic programming model for electric substation flood mitigation prior to an imminent hurricane\nAbstract: We present a stochastic programming model for informing the deployment of ad hoc flood mitigation measures to protect electrical substations prior to an imminent and uncertain hurricane. The first stage captures the deployment of a fixed number of mitigation resources, and the second stage captures grid operation in response to a contingency. The primary objective is to minimize expected load shed. We develop methods for simulating flooding induced by extreme rainfall and construct two geographically realistic case studies, one based on Tropical Storm Imelda and the other on Hurricane Harvey. Applying our model to those case studies, we investigate the effect of the mitigation budget on the optimal objective value and solutions. Our results highlight the sensitivity of the optimal mitigation to the budget, a consequence of those decisions being discrete. We additionally assess the value of having better mitigation options and the spatial features of the optimal mitigation.", "label": 0, "field": "math"} {"text": "Title: The anti-Ramsey numbers of cliques in complete multi-partite graphs\nAbstract: A subgraph of an edge-colored graph is rainbow if all of its edges have different colors. Let $G$ and $H$ be two graphs. The anti-Ramsey number $\\ar(G, H)$ is the maximum number of colors of an edge-coloring of $G$ that does not contain a rainbow copy of $H$. In this paper, we study the anti-Ramsey numbers of $K_k$ in complete multi-partite graphs. We determine the values of the anti-Ramsey numbers of $K_k$ in complete $k$-partite graphs and in balanced complete $r$-partite graphs for $r\\geq k$.", "label": 0, "field": "math"} {"text": "Title: Splines and Wavelets on Circulant Graphs\nAbstract: We present novel families of wavelets and associated filterbanks for the analysis and representation of functions defined on circulant graphs. In this work, we leverage the inherent vanishing moment property of the circulant graph Laplacian operator, and by extension, the e-graph Laplacian, which is established as a parameterization of the former with respect to the degree per node, for the design of vertex-localized and critically-sampled higher-order graph (e-)spline wavelet filterbanks, which can reproduce and annihilate classes of (exponential) polynomial signals on circulant graphs. In addition, we discuss similarities and analogies of the detected properties and resulting constructions with splines and spline wavelets in the Euclidean domain. Ultimately, we consider generalizations to arbitrary graphs in the form of graph approximations, with focus on graph product decompositions. In particular, we proceed to show how the use of graph products facilitates a multi-dimensional extension of the proposed constructions and properties.", "label": 1, "field": "cs"} {"text": "Title: Entropy and sampling numbers of classes of ridge functions\nAbstract: We study properties of ridge functions $f(x)=g(a\\cdot x)$ in high dimensions $d$ from the viewpoint of approximation theory. The considered function classes consist of ridge functions such that the profile $g$ is a member of a univariate Lipschitz class with smoothness $\\alpha > 0$ (including infinite smoothness), and the ridge direction $a$ has $p$-norm $\\|a\\|_p \\leq 1$. First, we investigate entropy numbers in order to quantify the compactness of these ridge function classes in $L_{\\infty}$. We show that they are essentially as compact as the class of univariate Lipschitz functions. Second, we examine sampling numbers and face two extreme cases. In case $p=2$, sampling ridge functions on the Euclidean unit ball faces the curse of dimensionality. It is thus as difficult as sampling general multivariate Lipschitz functions, a result in sharp contrast to the result on entropy numbers. When we additionally assume that all feasible profiles have a first derivative uniformly bounded away from zero in the origin, then the complexity of sampling ridge functions reduces drastically to the complexity of sampling univariate Lipschitz functions. In between, the sampling problem's degree of difficulty varies, depending on the values of $\\alpha$ and $p$. Surprisingly, we see almost the entire hierarchy of tractability levels as introduced in the recent monographs by Novak and Wo\\'zniakowski.", "label": 1, "field": "math"} {"text": "Title: Nuclei instance segmentation and classification in histopathology images with StarDist\nAbstract: Instance segmentation and classification of nuclei is an important task in computational pathology. We show that StarDist, a deep learning nuclei segmentation method originally developed for fluorescence microscopy, can be extended and successfully applied to histopathology images. This is substantiated by conducting experiments on the Lizard dataset, and through entering the Colon Nuclei Identification and Counting (CoNIC) challenge 2022, where our approach achieved the first spot on the leaderboard for the segmentation and classification task for both the preliminary and final test phase.", "label": 1, "field": "cs"} {"text": "Title: Cluster algebras and monotone Lagrangian tori\nAbstract: Motivated by recent developments in the construction of Newton--Okounkov bodies and toric degenerations via cluster algebras in [GHKK18, FO20], we consider a family of Newton--Okounkov polytopes of a complex smooth projective variety $X$ related by a composition of tropicalized cluster mutations. According to the work of [HK15], the toric degeneration associated with each Newton--Okounkov polytope $\\Delta$ in the family produces a Lagrangian torus fibration of $X$ over $\\Delta$. We investigate circumstances in which each Lagrangian torus fibration possesses a monotone Lagrangian torus fiber. We provide a sufficient condition, based on the data of tropical integer points and exchange matrices, for the family of constructed monotone Lagrangian tori to contain infinitely many monotone Lagrangian tori, no two of which are related by any symplectomorphisms. By employing this criterion and exploiting the correspondence between the tropical integer points and the dual canonical basis elements, we generate infinitely many distinct monotone Lagrangian tori on flag manifolds of arbitrary type except in a few cases.", "label": 0, "field": "math"} {"text": "Title: Submodular Mutual Information for Targeted Data Subset Selection\nAbstract: With the rapid growth of data, it is becoming increasingly difficult to train or improve deep learning models with the right subset of data. We show that this problem can be effectively solved at an additional labeling cost by targeted data subset selection(TSS) where a subset of unlabeled data points similar to an auxiliary set are added to the training data. We do so by using a rich class of Submodular Mutual Information (SMI) functions and demonstrate its effectiveness for image classification on CIFAR-10 and MNIST datasets. Lastly, we compare the performance of SMI functions for TSS with other state-of-the-art methods for closely related problems like active learning. Using SMI functions, we observe ~20-30% gain over the model's performance before re-training with added targeted subset; ~12% more than other methods.", "label": 1, "field": "cs"} {"text": "Title: Descent distribution on Catalan words avoiding a pattern of length at most three\nAbstract: Catalan words are particular growth-restricted words over the set of non-negative integers, and they represent still another combinatorial class counted by the Catalan numbers. We study the distribution of descents on the sets of Catalan words avoiding a pattern of length at most three: for each such a pattern $p$ we provide a bivariate generating function where the coefficient of $x^ny^k$ in its series expansion is the number of length $n$ Catalan words with $k$ descents and avoiding $p$. As a byproduct, we enumerate the set of Catalan words avoiding $p$, and we provide the popularity of descents on this set. Some of the obtained enumerating sequences are not yet recorded in the On-line Encyclopedia of Integer Sequences.", "label": 1, "field": "math"} {"text": "Title: Survey of 3D Human Body Pose and Shape Estimation Methods for Contemporary Dance Applications\nAbstract: 3D human body shape and pose estimation from RGB images is a challenging problem with potential applications in augmented/virtual reality, healthcare and fitness technology and virtual retail. Recent solutions have focused on three types of inputs: i) single images, ii) multi-view images and iii) videos. In this study, we surveyed and compared 3D body shape and pose estimation methods for contemporary dance and performing arts, with a special focus on human body pose and dressing, camera viewpoint, illumination conditions and background conditions. We demonstrated that multi-frame methods, such as PHALP, provide better results than single-frame method for pose estimation when dancers are performing contemporary dances.", "label": 0, "field": "cs"} {"text": "Title: Power-law bounds for increasing subsequences in Brownian separable permutons and homogeneous sets in Brownian cographons\nAbstract: The Brownian separable permutons are a one-parameter family -- indexed by $p\\in(0,1)$ -- of universal limits of random constrained permutations. We show that for each $p\\in (0,1)$, there are explicit constants $1/2 < \\alpha_*(p) \\leq \\beta^*(p) < 1$ such that the length of the longest increasing subsequence in a random permutation of size $n$ sampled from the Brownian separable permuton is between $n^{\\alpha_*(p) - o(1)}$ and $n^{\\beta^*(p) + o(1)}$ with probability tending to 1 as $n\\to\\infty$. In the symmetric case $p=1/2$, we have $\\alpha_*(p) \\approx 0.812$ and $\\beta^*(p)\\approx 0.975$. We present numerical simulations which suggest that the lower bound $\\alpha_*(p)$ is close to optimal in the whole range $p\\in(0,1)$. Our results work equally well for the closely related Brownian cographons. In this setting, we show that for each $p\\in (0,1)$, the size of the largest clique (resp. independent set) in a random graph on $n$ vertices sampled from the Brownian cographon is between $n^{\\alpha_*(p) - o(1)}$ and $n^{\\beta^*(p) + o(1)}$ (resp. $n^{\\alpha_*(1-p) - o(1)}$ and $n^{\\beta^*(1-p) + o(1)}$) with probability tending to 1 as $n\\to\\infty$. Our proofs are based on the analysis of a fragmentation process embedded in a Brownian excursion introduced by Bertoin (2002). We expect that our techniques can be extended to prove similar bounds for uniform separable permutations and uniform cographs.", "label": 0, "field": "math"} {"text": "Title: A novel efficient Multi-view traffic-related object detection framework\nAbstract: With the rapid development of intelligent transportation system applications, a tremendous amount of multi-view video data has emerged to enhance vehicle perception. However, performing video analytics efficiently by exploiting the spatial-temporal redundancy from video data remains challenging. Accordingly, we propose a novel traffic-related framework named CEVAS to achieve efficient object detection using multi-view video data. Briefly, a fine-grained input filtering policy is introduced to produce a reasonable region of interest from the captured images. Also, we design a sharing object manager to manage the information of objects with spatial redundancy and share their results with other vehicles. We further derive a content-aware model selection policy to select detection methods adaptively. Experimental results show that our framework significantly reduces response latency while achieving the same detection accuracy as the state-of-the-art methods.", "label": 1, "field": "cs"} {"text": "Title: Homotopy Algebras are Homotopy Algebras\nAbstract: We prove that strongly homotopy algebras (such as $A_\\infty$, $C_\\infty$, sh Lie, $B_\\infty$, $G_\\infty$,...) are homotopically invariant in the category of chain complexes. An important consequence is a rigorous proof that `strongly homotopy structures transfer over chain homotopy equivalences.'", "label": 1, "field": "math"} {"text": "Title: On the Sample Complexity of Decentralized Linear Quadratic Regulator with Partially Nested Information Structure\nAbstract: We study the problem of control policy design for decentralized state-feedback linear quadratic control with a partially nested information structure, when the system model is unknown. We propose a model-based learning solution, which consists of two steps. First, we estimate the unknown system model from a single system trajectory of finite length, using least squares estimation. Next, based on the estimated system model, we design a control policy that satisfies the desired information structure. We show that the suboptimality gap between our control policy and the optimal decentralized control policy (designed using accurate knowledge of the system model) scales linearly with the estimation error of the system model. Using this result, we provide an end-to-end sample complexity result for learning decentralized controllers for a linear quadratic control problem with a partially nested information structure.", "label": 1, "field": "math"} {"text": "Title: Capacity of Lorentzian polynomials and distance to binomial distributions\nAbstract: In this paper we study the capacity of Lorentzian polynomials. We give a new proof of a theorem of Br\\\"and\\'en, Leake and Pak. Our approach is probabilistic in nature and uses a lemma about a certain distance of binomial distributions to distributions with fixed expected value.", "label": 1, "field": "math"} {"text": "Title: Online Learning for Network Constrained Demand Response Pricing in Distribution Systems\nAbstract: Flexible demand response (DR) resources can be leveraged to accommodate the stochasticity of some distributed energy resources. This paper develops an online learning approach that continuously estimates price sensitivities of residential DR participants and produces such price signals to the DR participants that ensure a desired level of DR capacity. The proposed learning approach incorporates the dispatch decisions on DR resources into the distributionally robust chance-constrained optimal power flow (OPF) framework. This integration is shown to adequately remunerate DR resources and co-optimize the dispatch of DR and conventional generation resources. The distributionally robust chance-constrained formulation only relies on empirical data acquired over time and makes no restrictive assumptions on the underlying distribution of the demand uncertainty. The distributional robustness also allows for robustifying the optimal solution against systematically misestimating empirically learned parameters. The effectiveness of the proposed learning approach is shown via numerical experiments. The paper is accompanied by the code and data supplement released for public use, see [27].", "label": 1, "field": "cs"} {"text": "Title: Query Based Access Control for Linked Data\nAbstract: In recent years we have seen significant advances in the technology used to both publish and consume Linked Data. However, in order to support the next generation of ebusiness applications on top of interlinked machine readable data suitable forms of access control need to be put in place. Although a number of access control models and frameworks have been put forward, very little research has been conducted into the security implications associated with granting access to partial data or the correctness of the proposed access control mechanisms. Therefore the contributions of this paper are two fold: we propose a query rewriting algorithm which can be used to partially restrict access to SPARQL 1.1 queries and updates; and we demonstrate how a set of criteria, which was originally used to verify that an access control policy holds over different database states, can be adapted to verify the correctness of access control via query rewriting.", "label": 1, "field": "cs"} {"text": "Title: Harvesting of a stochastic population under a mixed regular-singular control formulation\nAbstract: This work focuses on optimal harvesting-renewing for a stochastic population. A mixed regular-singular control formulation with a state constraint and regime-switching is introduced. The decision-makers either harvest or renew with finite or infinite harvesting/renewing rates. The payoff functions depend on the harvesting/renewing rates. Several properties of the value functions are established. The limiting value function as the white noise intensity approaches infinity is identified. The Markov chain approximation method is used to find a numerical approximation of the value function and optimal strategies.", "label": 1, "field": "math"} {"text": "Title: Symplectic reduction and lagrangian submanifolds in Gr(1, n)\nAbstract: We study lagrangian submanifolds of algebraic variety Gr(1, n) equipped with the Kahler form given by the Plucker embedding. We use the correspondence between lagrangian submanifolds of Gr(1, n) and lagrangian submanifolds of variety M_{n-2}, given by symplectic reduction Gr(1, n)//T^2 for some specially chosen moment maps, which generate T^2 action on Gr(1, n). We establish that in this way one finds many topological types, realized by lagrangian submanifolds, and then one counts that Gr(1, n) admits more than n different topological types of smooth lagrangian submanifolds.", "label": 0, "field": "math"} {"text": "Title: Analysis of Twisted Supercharge Families on Product Manifolds\nAbstract: Twisted supercharge families on product manifolds $\\mathbb{T} \\times M$ have been applied in the analysis of the odd twisted K-theory. We shall suspend these families to the even twisted K-theory and solve their twisted families index problem. This is applied to give analytic representatives of the twisted K-theory classes on tori - including all the torsion classes.", "label": 1, "field": "math"} {"text": "Title: Uncertainty-Aware Deep Attention Recurrent Neural Network for Heterogeneous Time Series Imputation\nAbstract: Missingness is ubiquitous in multivariate time series and poses an obstacle to reliable downstream analysis. Although recurrent network imputation achieved the SOTA, existing models do not scale to deep architectures that can potentially alleviate issues arising in complex data. Moreover, imputation carries the risk of biased estimations of the ground truth. Yet, confidence in the imputed values is always unmeasured or computed post hoc from model output. We propose DEep Attention Recurrent Imputation (DEARI), which jointly estimates missing values and their associated uncertainty in heterogeneous multivariate time series. By jointly representing feature-wise correlations and temporal dynamics, we adopt a self attention mechanism, along with an effective residual component, to achieve a deep recurrent neural network with good imputation performance and stable convergence. We also leverage self-supervised metric learning to boost performance by optimizing sample similarity. Finally, we transform DEARI into a Bayesian neural network through a novel Bayesian marginalization strategy to produce stochastic DEARI, which outperforms its deterministic equivalent. Experiments show that DEARI surpasses the SOTA in diverse imputation tasks using real-world datasets, namely air quality control, healthcare and traffic.", "label": 0, "field": "cs"} {"text": "Title: Actions, quotients and lattices of locally compact quantum groups\nAbstract: We prove a number of property (T) permanence results for locally compact quantum groups under exact sequences and the presence of invariant states, analogous to their classical versions. Along the way we characterize the existence of invariant weights on quantum homogeneous spaces of quotient type, and relate invariant states for LCQG actions on von Neumann algebras to invariant vectors in canonical unitary implementations, providing an application to amenability. Finally, we introduce a notion of lattice in a locally compact quantum group, noting examples provided by Drinfeld doubles of compact quantum groups. We show that property (T) lifts from a lattice to the ambient LCQG, just as it does classically, thus obtaining new examples of non-classical, non-compact, non-discrete LCQGs with property (T).", "label": 1, "field": "math"} {"text": "Title: Algebraic structures in set-theoretic Yang-Baxter & reflection equations\nAbstract: We present resent results regarding invertible, non-degenerate solutions of the set-theoretic Yang-Baxter and reflection equations. We recall the notion of braces and we present and prove various fundamental properties required for the solutions of the set theoretic Yang-Baxter equation. We then restrict our attention on involutive solutions and consider lambda parametric set-theoretic solutions of the Yang-Baxter equation and we extract the associated quantum algebra. We also discuss the notion of the Drinfeld twist for involutive solutions and their relation to the Yangian. We next focus on reflections and we derive the associated defining algebra relations for R-matrices being Baxterized solutions of the symmetric group. We show that there exists a ``reflection'' finite sub-algebra for some special choice of reflection maps.", "label": 0, "field": "math"} {"text": "Title: Limit pretrees for free group automorphisms: existence\nAbstract: To any free group automorphism, we associate a real pretree with several nice properties. First, it has a rigid/non-nesting action of the free group with trivial arc stabilizers. Secondly, there is an expanding pretree-automorphism of the real pretree that represents the free group automorphism. Finally and crucially, the loxodromic elements are exactly those whose (conjugacy class) length grows exponentially under iteration of the automorphism; thus, the action on the real pretree is able to detect the growth type of an element. This construction extends the theory of metric trees that has been used to study free group automorphisms. The new idea is that one can equivariantly blow up an isometric action on a real tree with respect to other real trees and get a rigid action on a treelike structure known as a real pretree. Topology plays no role in this construction as all the work is done in the language of pretrees.", "label": 1, "field": "math"} {"text": "Title: Towards a quality metric for dense light fields\nAbstract: Light fields become a popular representation of three dimensional scenes, and there is interest in their processing, resampling, and compression. As those operations often result in loss of quality, there is a need to quantify it. In this work, we collect a new dataset of dense reference and distorted light fields as well as the corresponding quality scores which are scaled in perceptual units. The scores were acquired in a subjective experiment using an interactive light-field viewing setup. The dataset contains typical artifacts that occur in light-field processing chain due to light-field reconstruction, multi-view compression, and limitations of automultiscopic displays. We test a number of existing objective quality metrics to determine how well they can predict the quality of light fields. We find that the existing image quality metrics provide good measures of light-field quality, but require dense reference light- fields for optimal performance. For more complex tasks of comparing two distorted light fields, their performance drops significantly, which reveals the need for new, light-field-specific metrics.", "label": 1, "field": "cs"} {"text": "Title: A compactness result for the CR Yamabe problem in three dimensions\nAbstract: We prove the compactness of the set of solutions to the CR Yamabe problem on a compact strictly pseudoconvex CR manifold of dimension three whose blow-up manifolds at every point have positive p-mass. As a corollary we deduce that compactness holds for CR-embeddable manifolds which are not CR-equivalent to $S^3$. The theorem is proved by blow-up analysis.", "label": 0, "field": "math"} {"text": "Title: Error Inhibiting Block One-Step Schemes for Ordinary Differential Equations\nAbstract: The commonly used one step methods and linear multi-step methods all have a global error that is of the same order as the local truncation error (as defined in \\cite{gustafsson1995time,quarteroni2010numerical,AllenIsaacson,IsaacsonKeller,Sewell}). In fact, this is true of the entire class of general linear methods. In practice, this means that the order of the method is typically defined solely by the order conditions which are derived by studying the local truncation error. In this work, we investigate the interplay between the local truncation error and the global error, and develop a methodology which defines the construction of explicit {\\em error inhibiting} block one-step methods (alternatively written as explicit general linear methods \\cite{butcher1993a}). These {\\em error inhibiting schemes} are constructed so that the accumulation of the local truncation error over time is controlled, which results in a global error that is one order higher than the local truncation error. In this work, we delineate how to carefully choose the coefficient matrices so that the growth of the local truncation error is inhibited. We then use this theoretical understanding to construct several methods that have higher order global error than local truncation error, and demonstrate their enhanced order of accuracy on test cases. These methods demonstrate that the error inhibiting concept is realizable. Future work will further develop new error inhibiting methods and will analyze the computational efficiency and linear stability properties of these methods.", "label": 1, "field": "math"} {"text": "Title: A class of finite $p$-groups and the normalized unit groups of group algebras\nAbstract: Let $p$ be a prime and $\\mathbb{F}_p$ be a finite field of $p$ elements. Let $\\mathbb{F}_pG$ denote the group algebra of the finite $p$-group $G$ over the field $\\mathbb{F}_p$ and $V(\\mathbb{F}_pG)$ denote the group of normalized units in $\\mathbb{F}_pG$. Suppose that $G$ is a finite $p$-group given by a central extension of the form $$1\\longrightarrow \\mathbb{Z}_{p^n}\\times \\mathbb{Z}_{p^m} \\longrightarrow G \\longrightarrow \\mathbb{Z}_p\\times \\cdots\\times \\mathbb{Z}_p \\longrightarrow 1$$ and $G'\\cong \\mathbb{Z}_p$, $n, m\\geq 1$ and $p$ is odd. In this paper, the structure of $G$ is determined. And the relations of $V(\\mathbb{F}_pG)^{p^l}$ and $G^{p^l}$, $\\Omega_l(V(\\mathbb{F}_pG))$ and $\\Omega_l(G)$ are given. Furthermore, there is a direct proof for $V(\\mathbb{F}_pG)^p\\bigcap G=G^p$.", "label": 0, "field": "math"} {"text": "Title: Hilbert Poincar\u00e9 series and kernels for products of $L$-functions\nAbstract: We study Hilbert Poincar\\'e series associated to general seed functions and construct Cohen's kernels and double Eisenstein series as series of Hilbert Poincar\\'e series. Then we calculate the Rankin-Cohen brackets of Hilbert Poincar\\'e series and Hilbert modular forms and extend Zagier's kernel formula to totally real number fields. Finally, we show that the Rankin-Cohen brackets of two different types of Eisenstein series are special values of double Eisenstein series up to a constant.", "label": 0, "field": "math"} {"text": "Title: Vectorization of Multibyte Floating Point Data Formats\nAbstract: We propose a scheme for reduced-precision representation of floating point data on a continuum between IEEE-754 floating point types. Our scheme enables the use of lower precision formats for a reduction in storage space requirements and data transfer volume. We describe how our scheme can be accelerated using existing hardware vector units on a general-purpose processor (GPP). Exploiting native vector hardware allows us to support reduced precision floating point with low overhead. We demonstrate that supporting reduced precision in the compiler as opposed to using a library approach can yield a low overhead solution for GPPs.", "label": 1, "field": "cs"} {"text": "Title: Asymptotic probability for connectedness\nAbstract: We study the structure of the asymptotic expansion of the probability that a combinatorial object is connected. We show that the coefficients appearing in those asymptotics are integers and can be interpreted as the counting sequences of other derivative combinatorial classes. The general result applies to rapidly growing combinatorial structures, which we call gargantuan, that also admit a sequence decomposition. The result is then applied to several models of graphs, of surfaces (square-tiled surfaces, combinatorial maps), and to geometric models of higher dimension (constellations, graph encoded manifolds). The corresponding derivative combinatorial classes are irreducible (multi)tournaments, indecomposable (multi)permutations and indecomposable perfect (multi)matchings.", "label": 0, "field": "math"} {"text": "Title: Covid19 Vaccine Acceptance and Deprivation in US Counties\nAbstract: This report explores the central question of how socioeconomic status affects Covid19 vaccination rates in the United States, using existing open-source data. In general, a negative correlation exists between Area Deprivation Index (ADI) of a county and first dose, primary series and booster vaccination rates. Higher area deprivation correlated with polled vaccine hesitancy and lower search interest in vaccine interest, intention to vaccinate or concern about safety of vaccination. Positive correlations between ADI and certain mental health search trends were noted. No clear correlation between deprivation index and accessibility to vaccination sites were observed. In a small data sample, county level housing assistance policies and public information campaigns were noted to positively influence vaccine follow through rates. Finally, random forest, linear regression and KNN models were explored to validate the use of the above features for vaccine acceptance prediction.", "label": 0, "field": "cs"} {"text": "Title: General Berndt-Type Integrals and Series Associated with Jacobi Elliptic Functions\nAbstract: n this paper, we prove two structural theorems on the general Berndt-type integrals with the denominator having arbitrary positive degrees by contour integrations involving hyperbolic and trigonometric functions, and hyperbolic sums associated with Jacobi elliptic functions. We first establish explicit relations between these integrals and four classes of hyperbolic sums. Then, using our previous results on hyperbolic series and applying the matrix method from linear algebra, we compute explicitly several general hyperbolic sums and their higher derivatives. These enable us to express two families of general Berndt-type integrals as polynomials in $\\Gamma^4(1/4)$ and $\\pi^{-1}$ with rational coefficients, where $\\Gamma$ is the Euler gamma function. At the end of the paper, we provide some conjectures of general Berndt-type integrals.", "label": 0, "field": "math"} {"text": "Title: Xorshift1024*, Xorshift1024+, Xorshift128+ and Xoroshiro128+ Fail Statistical Tests for Linearity\nAbstract: L'Ecuyer & Simard's Big Crush statistical test suite has revealed statistical flaws in many popular random number generators including Marsaglia's Xorshift generators. Vigna recently proposed some 64-bit variations on the Xorshift scheme that are further scrambled (i.e., Xorshift1024*, Xorshift1024+, Xorshift128+, Xoroshiro128+). Unlike their unscrambled counterparts, they pass Big Crush when interleaving blocks of 32 bits for each 64-bit word (most significant, least significant, most significant, least significant, etc.). We report that these scrambled generators systematically fail Big Crush---specifically the linear-complexity and matrix-rank tests that detect linearity---when taking the 32 lowest-order bits in reverse order from each 64-bit word.", "label": 1, "field": "cs"} {"text": "Title: A Learning-Based Fast Uplink Grant for Massive IoT via Support Vector Machines and Long Short-Term Memory\nAbstract: The current random access (RA) allocation techniques suffer from congestion and high signaling overhead while serving massive machine type communication (mMTC) applications. To this end, 3GPP introduced the need to use fast uplink grant (FUG) allocation in order to reduce latency and increase reliability for smart internet-of-things (IoT) applications with strict QoS constraints. We propose a novel FUG allocation based on support vector machine (SVM), First, MTC devices are prioritized using SVM classifier. Second, LSTM architecture is used for traffic prediction and correction techniques to overcome prediction errors. Both results are used to achieve an efficient resource scheduler in terms of the average latency and total throughput. A Coupled Markov Modulated Poisson Process (CMMPP) traffic model with mixed alarm and regular traffic is applied to compare the proposed FUG allocation to other existing allocation techniques. In addition, an extended traffic model based CMMPP is used to evaluate the proposed algorithm in a more dense network. We test the proposed scheme using real-time measurement data collected from the Numenta Anomaly Benchmark (NAB) database. Our simulation results show the proposed model outperforms the existing RA allocation schemes by achieving the highest throughput and the lowest access delay of the order of 1 ms by achieving prediction accuracy of 98 $\\%$ when serving the target massive and critical MTC applications with a limited number of resources.", "label": 1, "field": "cs"} {"text": "Title: The jet transcendence degree of a real hypersurface and Huang-Ji-Yau Conjecture\nAbstract: We investigate the problem of holomorphic algebraizibility for real hypersurfaces in complex space. We introduce a new invariant of a (real-analytic) Levi-nondegenerate hypersurface called {\\em the jet transcendence degree}. Using this invariant, we solve in the negative the Conjecture of Huang, Ji and Yau on the algabraizability of real hypersurfaces with algebraic syzygies.", "label": 0, "field": "math"} {"text": "Title: Tensorial structure of the lifting doctrine in constructive domain theory\nAbstract: We present a survey of the two-dimensional and tensorial structure of the lifting doctrine in constructive domain theory. We establish the universal property of lifting of directed-complete partial orders (dcpos) as the Sierpi\\'nski cone, from which we deduce (1) that lifting forms a Kock-Z\\\"oberlein doctrine, (2) that lifting algebras, pointed dcpos, and inductive partial orders form canonically equivalent locally posetal 2-categories, and (3) that the category of lifting algebras is cocomplete, with connected colimits created by the forgetful functor to dcpos. Finally we deduce the symmetric monoidal closure of the Eilenberg-Moore resolution of the lifting 2-monad by means of smash products; these are shown to classify both bilinear maps and strict maps, which we prove to coincide in the constructive setting. We provide several concrete computations of the smash product as dcpo coequalisers and lifting algebra coequalisers, and compare these with the more abstract results of Seal. Although all these results are well-known classically, the existing proofs do not apply in a constructive setting; indeed, the classical analysis of the Eilenberg-Moore category of the lifting monad relies on the fact that all lifting algebras are free, a condition that is not known to hold constructively.", "label": 0, "field": "math"} {"text": "Title: Perspective Plane Program Induction from a Single Image\nAbstract: We study the inverse graphics problem of inferring a holistic representation for natural images. Given an input image, our goal is to induce a neuro-symbolic, program-like representation that jointly models camera poses, object locations, and global scene structures. Such high-level, holistic scene representations further facilitate low-level image manipulation tasks such as inpainting. We formulate this problem as jointly finding the camera pose and scene structure that best describe the input image. The benefits of such joint inference are two-fold: scene regularity serves as a new cue for perspective correction, and in turn, correct perspective correction leads to a simplified scene structure, similar to how the correct shape leads to the most regular texture in shape from texture. Our proposed framework, Perspective Plane Program Induction (P3I), combines search-based and gradient-based algorithms to efficiently solve the problem. P3I outperforms a set of baselines on a collection of Internet images, across tasks including camera pose estimation, global structure inference, and down-stream image manipulation tasks.", "label": 1, "field": "cs"} {"text": "Title: StROL: Stabilized and Robust Online Learning from Humans\nAbstract: Robots often need to learn the human's reward function online, during the current interaction. This real-time learning requires fast but approximate learning rules: when the human's behavior is noisy or suboptimal, current approximations can result in unstable robot learning. Accordingly, in this paper we seek to enhance the robustness and convergence properties of gradient descent learning rules when inferring the human's reward parameters. We model the robot's learning algorithm as a dynamical system over the human preference parameters, where the human's true (but unknown) preferences are the equilibrium point. This enables us to perform Lyapunov stability analysis to derive the conditions under which the robot's learning dynamics converge. Our proposed algorithm (StROL) uses these conditions to learn robust-by-design learning rules: given the original learning dynamics, StROL outputs a modified learning rule that now converges to the human's true parameters under a larger set of human inputs. In practice, these autonomously generated learning rules can correctly infer what the human is trying to convey, even when the human is noisy, biased, and suboptimal. Across simulations and a user study we find that StROL results in a more accurate estimate and less regret than state-of-the-art approaches for online reward learning. See videos and code here: https://github.com/VT-Collab/StROL_RAL", "label": 0, "field": "cs"} {"text": "Title: What You See is What You GAN: Rendering Every Pixel for High-Fidelity Geometry in 3D GANs\nAbstract: 3D-aware Generative Adversarial Networks (GANs) have shown remarkable progress in learning to generate multi-view-consistent images and 3D geometries of scenes from collections of 2D images via neural volume rendering. Yet, the significant memory and computational costs of dense sampling in volume rendering have forced 3D GANs to adopt patch-based training or employ low-resolution rendering with post-processing 2D super resolution, which sacrifices multiview consistency and the quality of resolved geometry. Consequently, 3D GANs have not yet been able to fully resolve the rich 3D geometry present in 2D images. In this work, we propose techniques to scale neural volume rendering to the much higher resolution of native 2D images, thereby resolving fine-grained 3D geometry with unprecedented detail. Our approach employs learning-based samplers for accelerating neural rendering for 3D GAN training using up to 5 times fewer depth samples. This enables us to explicitly \"render every pixel\" of the full-resolution image during training and inference without post-processing superresolution in 2D. Together with our strategy to learn high-quality surface geometry, our method synthesizes high-resolution 3D geometry and strictly view-consistent images while maintaining image quality on par with baselines relying on post-processing super resolution. We demonstrate state-of-the-art 3D gemetric quality on FFHQ and AFHQ, setting a new standard for unsupervised learning of 3D shapes in 3D GANs.", "label": 0, "field": "cs"} {"text": "Title: The rational (non-)formality of the non-3-equal manifolds\nAbstract: Let $M^{(k)}_{d}(n)$ be the manifold of $n$-tuples $(x_1,\\ldots,x_n)\\in(\\mathbb{R}^d)^n$ having non-$k$-equal coordinates. We show that, for $d\\geq2$, $M^{(3)}_{d}(n)$ is rationally formal if and only if $n\\leq 6$. This stands in sharp contrast with the fact that all classical configuration spaces $M^{(2)}_d(n)=\\text{Conf}(\\hspace{.2mm}\\mathbb{R}^d,n)$ are rationally formal, just as are all complements of arrangements of arbitrary complex subspaces with geometric lattice of intersections. The rational non formality of $M^{(3)}_{d}(n)$ for $n>6$ is established via detection of non-trivial triple Massey products assessed through Poincar\\'e duality.", "label": 0, "field": "math"} {"text": "Title: Euler's Theorem for Regular CW-Complexes\nAbstract: For strongly connected, pure $n$-dimensional regular CW-complexes, we show that {\\it evenness} (each $(n{-}1)$-cell is contained in an even number of $n$-cells) is equivalent to generalizations of both cycle decomposition and traversability.", "label": 0, "field": "math"} {"text": "Title: Spatiotemporal Attention for Multivariate Time Series Prediction and Interpretation\nAbstract: Multivariate time series modeling and prediction problems are abundant in many machine learning application domains. Accurate interpretation of such prediction outcomes from a machine learning model that explicitly captures temporal correlations can significantly benefit the domain experts. In this context, temporal attention has been successfully applied to isolate the important time steps for the input time series. However, in multivariate time series problems, spatial interpretation is also critical to understand the contributions of different variables on the model outputs. We propose a novel deep learning architecture, called spatiotemporal attention mechanism (STAM) for simultaneous learning of the most important time steps and variables. STAM is a causal (i.e., only depends on past inputs and does not use future inputs) and scalable (i.e., scales well with an increase in the number of variables) approach that is comparable to the state-of-the-art models in terms of computational tractability. We demonstrate our models' performance on two popular public datasets and a domain-specific dataset. When compared with the baseline models, the results show that STAM maintains state-of-the-art prediction accuracy while offering the benefit of accurate spatiotemporal interpretability. The learned attention weights are validated from a domain knowledge perspective for these real-world datasets.", "label": 1, "field": "cs"} {"text": "Title: An Asymmetric Contrastive Loss for Handling Imbalanced Datasets\nAbstract: Contrastive learning is a representation learning method performed by contrasting a sample to other similar samples so that they are brought closely together, forming clusters in the feature space. The learning process is typically conducted using a two-stage training architecture, and it utilizes the contrastive loss (CL) for its feature learning. Contrastive learning has been shown to be quite successful in handling imbalanced datasets, in which some classes are overrepresented while some others are underrepresented. However, previous studies have not specifically modified CL for imbalanced datasets. In this work, we introduce an asymmetric version of CL, referred to as ACL, in order to directly address the problem of class imbalance. In addition, we propose the asymmetric focal contrastive loss (AFCL) as a further generalization of both ACL and focal contrastive loss (FCL). Results on the FMNIST and ISIC 2018 imbalanced datasets show that AFCL is capable of outperforming CL and FCL in terms of both weighted and unweighted classification accuracies. In the appendix, we provide a full axiomatic treatment on entropy, along with complete proofs.", "label": 1, "field": "cs"} {"text": "Title: Learning to Generate Training Datasets for Robust Semantic Segmentation\nAbstract: Semantic segmentation methods have advanced significantly. Still, their robustness to real-world perturbations and object types not seen during training remains a challenge, particularly in safety-critical applications. We propose a novel approach to improve the robustness of semantic segmentation techniques by leveraging the synergy between label-to-image generators and image-to-label segmentation models. Specifically, we design Robusta, a novel robust conditional generative adversarial network to generate realistic and plausible perturbed images that can be used to train reliable segmentation models. We conduct in-depth studies of the proposed generative model, assess the performance and robustness of the downstream segmentation network, and demonstrate that our approach can significantly enhance the robustness in the face of real-world perturbations, distribution shifts, and out-of-distribution samples. Our results suggest that this approach could be valuable in safety-critical applications, where the reliability of perception modules such as semantic segmentation is of utmost importance and comes with a limited computational budget in inference. We release our code at https://github.com/ENSTA-U2IS/robusta.", "label": 0, "field": "cs"} {"text": "Title: Using Malliavin calculus to solve a chemical diffusion master equation\nAbstract: We propose a novel method to solve a chemical diffusion master equation of birth and death type. This is an infinite system of Fokker-Planck equations where the different components are coupled by reaction dynamics similar in form to a chemical master equation. This system was proposed in [3] for modelling the probabilistic evolution of chemical reaction kinetics associated with spatial diffusion of individual particles. Using some basic tools and ideas from infinite dimensional Gaussian analysis we are able to reformulate the aforementioned infinite system of Fokker-Planck equations as a single evolution equation solved by a generalized stochastic process and written in terms of Malliavin derivatives and differential second quantization operators. Via this alternative representation we link certain finite dimensional projections of the solution of the original problem to the solution of a single partial differential equations of Ornstein-Uhlenbeck type containing as many variables as the dimension of the aforementioned projection space.", "label": 1, "field": "math"} {"text": "Title: Synchrony and Anti-synchrony in Weighted Networks\nAbstract: We consider weighted coupled cell networks, that is networks where the interactions between any two cells have an associated weight that is a real valued number. Weighted networks are ubiquitous in real-world applications. We consider a dynamical systems perspective by associating to each network a set of continuous dynamical systems, the ones that respect the graph structure of the network. For weighted networks it is natural for the admissible coupled cell systems to have an additive input structure. We present a characterization of the synchrony subspaces and the anti-synchrony subspaces for a weighted network depending on the restrictions that are imposed to their admissible input-additive coupled cell systems. These subspaces are flow-invariant by those systems and are generalized polydiagonal subspaces, that is, are characterized by conditions on the cell coordinates of the types $x_i = x_j$ and/or $x_k = -x_l$ and/or $x_m=0$. The existence and identification of the synchrony and anti-synchony subspaces for a weighted network are deeply relevant from the applications and dynamics point of view. Our characterization of the synchrony and anti-synchrony subspaces of a weighted network follows from our results where we give necessary and sufficient conditions for a generalized polydiagonal to be left invariant by the adjacency matrix and/or the Laplacian matrix of the network.", "label": 1, "field": "math"} {"text": "Title: Quadratic Discontinuous Galerkin methods for Unilateral Contact Problem\nAbstract: In this article, we employ discontinuous Galerkin (DG) methods for the finite element approximation of the frictionless unilateral contact problem using quadratic finite elements over simplicial triangulation. We first establish an optimal \\textit{a priori} error estimates under the appropriate regularity assumption on the exact solution $\\b{u}$. Further, we analyze \\textit{a posteriori} error estimates in the DG norm wherein, the reliability and efficiency of the proposed \\textit{a posteriori} error estimator is addressed. The suitable construction of discrete Lagrange multiplier $\\b{\\lambda_h}$ and some intermediate operators play a key role in developing \\textit{a posteriori} error analysis. Numerical results presented on uniform and adaptive meshes illustrate and confirm the theoretical findings.", "label": 0, "field": "math"} {"text": "Title: Computation of Infinitesimals for a Group Action on a Multispace of One Independent Variable\nAbstract: This paper expands upon the work of Peter Olver's paper [Appl. Algebra Engrg. Comm. Comput. 11 (2001), 417-436], wherein Olver uses a moving frames approach to examine the action of a group on a curve within a generalization of jet space known as multispace. Here we seek to further study group actions on the multispace of curves by computing the infinitesimals for a given action. For the most part, we proceed formally, and produce in the multispace a recursion relation that closely mimics the previously known prolongation recursion relations for infinitesimals of a group action on jet space.", "label": 0, "field": "math"} {"text": "Title: GridFormer: Point-Grid Transformer for Surface Reconstruction\nAbstract: Implicit neural networks have emerged as a crucial technology in 3D surface reconstruction. To reconstruct continuous surfaces from discrete point clouds, encoding the input points into regular grid features (plane or volume) has been commonly employed in existing approaches. However, these methods typically use the grid as an index for uniformly scattering point features. Compared with the irregular point features, the regular grid features may sacrifice some reconstruction details but improve efficiency. To take full advantage of these two types of features, we introduce a novel and high-efficiency attention mechanism between the grid and point features named Point-Grid Transformer (GridFormer). This mechanism treats the grid as a transfer point connecting the space and point cloud. Our method maximizes the spatial expressiveness of grid features and maintains computational efficiency. Furthermore, optimizing predictions over the entire space could potentially result in blurred boundaries. To address this issue, we further propose a boundary optimization strategy incorporating margin binary cross-entropy loss and boundary sampling. This approach enables us to achieve a more precise representation of the object structure. Our experiments validate that our method is effective and outperforms the state-of-the-art approaches under widely used benchmarks by producing more precise geometry reconstructions. The code is available at https://github.com/list17/GridFormer.", "label": 0, "field": "cs"} {"text": "Title: Stable matchings with correlated Preferences\nAbstract: The stable matching problem has been the subject of intense theoretical and empirical study since the seminal 1962 paper by Gale and Shapley. The number of stable matchings for different systems of preferences has been studied in many contexts, going back to Donald Knuth in the 1970s. In this paper, we consider a family of distributions defined by the Mallows permutations and show that with high probability the number of stable matchings for these preferences is exponential in the number of people.", "label": 0, "field": "math"} {"text": "Title: Predictive Multiplicity in Probabilistic Classification\nAbstract: Machine learning models are often used to inform real world risk assessment tasks: predicting consumer default risk, predicting whether a person suffers from a serious illness, or predicting a person's risk to appear in court. Given multiple models that perform almost equally well for a prediction task, to what extent do predictions vary across these models? If predictions are relatively consistent for similar models, then the standard approach of choosing the model that optimizes a penalized loss suffices. But what if predictions vary significantly for similar models? In machine learning, this is referred to as predictive multiplicity i.e. the prevalence of conflicting predictions assigned by near-optimal competing models. In this paper, we present a framework for measuring predictive multiplicity in probabilistic classification (predicting the probability of a positive outcome). We introduce measures that capture the variation in risk estimates over the set of competing models, and develop optimization-based methods to compute these measures efficiently and reliably for convex empirical risk minimization problems. We demonstrate the incidence and prevalence of predictive multiplicity in real-world tasks. Further, we provide insight into how predictive multiplicity arises by analyzing the relationship between predictive multiplicity and data set characteristics (outliers, separability, and majority-minority structure). Our results emphasize the need to report predictive multiplicity more widely.", "label": 1, "field": "cs"} {"text": "Title: A note on concentration for polynomials in the Ising model\nAbstract: We present precise multilevel exponential concentration inequalities for polynomials in Ising models satisfying the Dobrushin condition. The estimates have the same form as two-sided tail estimates for polynomials in Gaussian variables due to Lata{\\l}a. In particular, for quadratic forms we obtain a Hanson-Wright type inequality. We also prove concentration results for convex functions and estimates for nonnegative definite quadratic forms, analogous as for quadratic forms in i.i.d. Rademacher variables, for more general random vectors satisfying the approximate tensorization property for entropy.", "label": 1, "field": "math"} {"text": "Title: SGFormer: Simplifying and Empowering Transformers for Large-Graph Representations\nAbstract: Learning representations on large-sized graphs is a long-standing challenge due to the inter-dependence nature involved in massive data points. Transformers, as an emerging class of foundation encoders for graph-structured data, have shown promising performance on small graphs due to its global attention capable of capturing all-pair influence beyond neighboring nodes. Even so, existing approaches tend to inherit the spirit of Transformers in language and vision tasks, and embrace complicated models by stacking deep multi-head attentions. In this paper, we critically demonstrate that even using a one-layer attention can bring up surprisingly competitive performance across node property prediction benchmarks where node numbers range from thousand-level to billion-level. This encourages us to rethink the design philosophy for Transformers on large graphs, where the global attention is a computation overhead hindering the scalability. We frame the proposed scheme as Simplified Graph Transformers (SGFormer), which is empowered by a simple attention model that can efficiently propagate information among arbitrary nodes in one layer. SGFormer requires none of positional encodings, feature/graph pre-processing or augmented loss. Empirically, SGFormer successfully scales to the web-scale graph ogbn-papers100M and yields up to 141x inference acceleration over SOTA Transformers on medium-sized graphs. Beyond current results, we believe the proposed methodology alone enlightens a new technical path of independent interest for building Transformers on large graphs.", "label": 0, "field": "cs"} {"text": "Title: Pre-trained Recommender Systems: A Causal Debiasing Perspective\nAbstract: Recent studies on pre-trained vision/language models have demonstrated the practical benefit of a new, promising solution-building paradigm in AI where models can be pre-trained on broad data describing a generic task space and then adapted successfully to solve a wide range of downstream tasks, even when training data is severely limited (e.g., in zero- or few-shot learning scenarios). Inspired by such progress, we investigate in this paper the possibilities and challenges of adapting such a paradigm to the context of recommender systems, which is less investigated from the perspective of pre-trained model. In particular, we propose to develop a generic recommender that captures universal interaction patterns by training on generic user-item interaction data extracted from different domains, which can then be fast adapted to improve few-shot learning performance in unseen new domains (with limited data). However, unlike vision/language data which share strong conformity in the semantic space, universal patterns underlying recommendation data collected across different domains (e.g., different countries or different E-commerce platforms) are often occluded by both in-domain and cross-domain biases implicitly imposed by the cultural differences in their user and item bases, as well as their uses of different e-commerce platforms. As shown in our experiments, such heterogeneous biases in the data tend to hinder the effectiveness of the pre-trained model. To address this challenge, we further introduce and formalize a causal debiasing perspective, which is substantiated via a hierarchical Bayesian deep learning model, named PreRec. Our empirical studies on real-world data show that the proposed model could significantly improve the recommendation performance in zero- and few-shot learning settings under both cross-market and cross-platform scenarios.", "label": 0, "field": "cs"} {"text": "Title: Murre's conjectures for certain product varieties\nAbstract: We consider Murre's conjectures on Chow groups for a fourfold which is a product of two curves and a surface. We give a result which concerns Conjecture D:the kernel of a certain projector is equal to the homologically trivial part of the Chow group. We also give a proof of Conjecture B for a product of two surfaces.", "label": 1, "field": "math"} {"text": "Title: Generalized Divide and Color models\nAbstract: In this paper, we initiate the study of \"Generalized Divide and Color Models\". A very special interesting case of this is the \"Divide and Color Model\" (which motivates the name we use) introduced and studied by Olle H\\\"aggstr\\\"om. In this generalized model, one starts with a finite or countable set $V$, a random partition of $V$ and a parameter $p\\in [0,1]$. The corresponding Generalized Divide and Color Model is the $\\{0,1\\}$-valued process indexed by $V$ obtained by independently, for each partition element in the random partition chosen, with probability $p$, assigning all the elements of the partition element the value 1, and with probability $1-p$, assigning all the elements of the partition element the value 0. Some of the questions which we study here are the following. Under what situations can different random partitions give rise to the same color process? What can one say concerning exchangeable random partitions? What is the set of product measures that a color process stochastically dominates? For random partitions which are translation invariant, what ergodic properties do the resulting color processes have? The motivation for studying these processes is twofold; on the one hand, we believe that this is a very natural and interesting class of processes that deserves investigation and on the other hand, a number of quite varied well-studied processes actually fall into this class such as (1) the Ising model, (2) the fuzzy Potts model, (3) the stationary distributions for the Voter Model, (4) random walk in random scenery and of course (5) the original Divide and Color Model.", "label": 1, "field": "math"} {"text": "Title: SuperEdge: Towards a Generalization Model for Self-Supervised Edge Detection\nAbstract: Edge detection is a fundamental technique in various computer vision tasks. Edges are indeed effectively delineated by pixel discontinuity and can offer reliable structural information even in textureless areas. State-of-the-art heavily relies on pixel-wise annotations, which are labor-intensive and subject to inconsistencies when acquired manually. In this work, we propose a novel self-supervised approach for edge detection that employs a multi-level, multi-homography technique to transfer annotations from synthetic to real-world datasets. To fully leverage the generated edge annotations, we developed SuperEdge, a streamlined yet efficient model capable of concurrently extracting edges at pixel-level and object-level granularity. Thanks to self-supervised training, our method eliminates the dependency on manual annotated edge labels, thereby enhancing its generalizability across diverse datasets. Comparative evaluations reveal that SuperEdge advances edge detection, demonstrating improvements of 4.9% in ODS and 3.3% in OIS over the existing STEdge method on BIPEDv2.", "label": 0, "field": "cs"} {"text": "Title: Unicron: Economizing Self-Healing LLM Training at Scale\nAbstract: Training large-scale language models is increasingly critical in various domains, but it is hindered by frequent failures, leading to significant time and economic costs. Current failure recovery methods in cloud-based settings inadequately address the diverse and complex scenarios that arise, focusing narrowly on erasing downtime for individual tasks without considering the overall cost impact on a cluster. We introduce Unicron, a workload manager designed for efficient self-healing in large-scale language model training. Unicron optimizes the training process by minimizing failure-related costs across multiple concurrent tasks within a cluster. Its key features include in-band error detection for real-time error identification without extra overhead, a dynamic cost-aware plan generation mechanism for optimal reconfiguration, and an efficient transition strategy to reduce downtime during state changes. Deployed on a 128-GPU distributed cluster, Unicron demonstrates up to a 1.9x improvement in training efficiency over state-of-the-art methods, significantly reducing failure recovery costs and enhancing the reliability of large-scale language model training.", "label": 0, "field": "cs"} {"text": "Title: Stochastic Approximation Approaches to Group Distributionally Robust Optimization\nAbstract: This paper investigates group distributionally robust optimization (GDRO), with the purpose to learn a model that performs well over $m$ different distributions. First, we formulate GDRO as a stochastic convex-concave saddle-point problem, and demonstrate that stochastic mirror descent (SMD), using $m$ samples in each iteration, achieves an $O(m (\\log m)/\\epsilon^2)$ sample complexity for finding an $\\epsilon$-optimal solution, which matches the $\\Omega(m/\\epsilon^2)$ lower bound up to a logarithmic factor. Then, we make use of techniques from online learning to reduce the number of samples required in each round from $m$ to $1$, keeping the same sample complexity. Specifically, we cast GDRO as a two-players game where one player simply performs SMD and the other executes an online algorithm for non-oblivious multi-armed bandits. Next, we consider a more practical scenario where the number of samples that can be drawn from each distribution is different, and propose a novel formulation of weighted GDRO, which allows us to derive distribution-dependent convergence rates. Denote by $n_i$ the sample budget for the $i$-th distribution, and assume $n_1 \\geq n_2 \\geq \\cdots \\geq n_m$. In the first approach, we incorporate non-uniform sampling into SMD such that the sample budget is satisfied in expectation, and prove that the excess risk of the $i$-th distribution decreases at an $O(\\sqrt{n_1 \\log m}/n_i)$ rate. In the second approach, we use mini-batches to meet the budget exactly and also reduce the variance in stochastic gradients, and then leverage stochastic mirror-prox algorithm, which can exploit small variances, to optimize a carefully designed weighted GDRO problem. Under appropriate conditions, it attains an $O((\\log m)/\\sqrt{n_i})$ convergence rate, which almost matches the optimal $O(\\sqrt{1/n_i})$ rate of only learning from the $i$-th distribution with $n_i$ samples.", "label": 0, "field": "cs"} {"text": "Title: The relationship between Biological and Artificial Intelligence\nAbstract: Intelligence can be defined as a predominantly human ability to accomplish tasks that are generally hard for computers and animals. Artificial Intelligence [AI] is a field attempting to accomplish such tasks with computers. AI is becoming increasingly widespread, as are claims of its relationship with Biological Intelligence. Often these claims are made to imply higher chances of a given technology succeeding, working on the assumption that AI systems which mimic the mechanisms of Biological Intelligence should be more successful. In this article I will discuss the similarities and differences between AI and the extent of our knowledge about the mechanisms of intelligence in biology, especially within humans. I will also explore the validity of the assumption that biomimicry in AI systems aids their advancement, and I will argue that existing similarity to biological systems in the way Artificial Neural Networks [ANNs] tackle tasks is due to design decisions, rather than inherent similarity of underlying mechanisms. This article is aimed at people who understand the basics of AI (especially ANNs), and would like to be better able to evaluate the often wild claims about the value of biomimicry in AI.", "label": 1, "field": "cs"} {"text": "Title: Hyperlinear approximations to amenable groups come from sofic approximations\nAbstract: We provide a quantitative formulation of the equivalence between hyperlinearity and soficity for amenable groups, showing that every hyperlinear approximation to such a group is essentially produced from a sofic approximation. The proof is probabilistic, using the concentration of measure in high dimensional spheres to control the deviation of an operator's matrix coefficients from its trace. As a corollary, we obtain a result connecting stability of sofic approximations with stability of hyperlinear approximations.", "label": 1, "field": "math"} {"text": "Title: Integration of physics-informed operator learning and finite element method for parametric learning of partial differential equations\nAbstract: We present a method that employs physics-informed deep learning techniques for parametrically solving partial differential equations. The focus is on the steady-state heat equations within heterogeneous solids exhibiting significant phase contrast. Similar equations manifest in diverse applications like chemical diffusion, electrostatics, and Darcy flow. The neural network aims to establish the link between the complex thermal conductivity profiles and temperature distributions, as well as heat flux components within the microstructure, under fixed boundary conditions. A distinctive aspect is our independence from classical solvers like finite element methods for data. A noteworthy contribution lies in our novel approach to defining the loss function, based on the discretized weak form of the governing equation. This not only reduces the required order of derivatives but also eliminates the need for automatic differentiation in the construction of loss terms, accepting potential numerical errors from the chosen discretization method. As a result, the loss function in this work is an algebraic equation that significantly enhances training efficiency. We benchmark our methodology against the standard finite element method, demonstrating accurate yet faster predictions using the trained neural network for temperature and flux profiles. We also show higher accuracy by using the proposed method compared to purely data-driven approaches for unforeseen scenarios.", "label": 0, "field": "cs"} {"text": "Title: Knutson ideals and determinantal ideals of Hankel matrices\nAbstract: Motivated by a work of Knutson, in a recent paper Conca and Varbaro have defined a new class of ideals, namely \"Knutson ideals\", starting from a polynomial $f$ with squarefree leading term. We will show that the main properties that this class has in polynomial rings over fields of characteristic $p$ are preserved when one introduces the definition of Knutson ideal also in polynomial rings over fields of characteristic zero. Then we will show that determinantal ideals of Hankel matrices are Knutson ideals for a suitable choice of the polynomial $f$.", "label": 1, "field": "math"} {"text": "Title: Domination structure for number three\nAbstract: From a research of several recent papers, in the first part, we are concerned with domination number in cubic graphs and give a sufficient condition of Reed's conjecture. In the second part, from a perspective, we study the structure of a minimum dominating set in 3-connected graphs. It is derived from a collection of cycles with length 0 mod 3.", "label": 1, "field": "math"} {"text": "Title: Stanley decompositions of modules of covariants\nAbstract: For a complex reductive group $H$ with finite-dimensional representations $W$ and $U$, the module of covariants for $W$ of type $U$ is the space of all $H$-equivariant polynomial functions $W \\longrightarrow U$. In this paper, we take $H$ to be one of the classical groups $\\operatorname{GL}(V)$, $\\operatorname{Sp}(V)$, or $\\operatorname{O}(V)$ arising in Howe's dual pair setting, where $W$ is a direct sum of copies of $V$ and $V^*$. Our main result is a uniform combinatorial model for Stanley decompositions of the modules of covariants, using visualizations that we call jellyfish. Our decompositions allow us to interpret the Hilbert series as a positive combination of rational expressions which have concrete combinatorial interpretations in terms of lattice paths; significantly, this interpretation does not depend on the Cohen-Macaulay property. As a corollary, we recover a major result of Nishiyama-Ochiai-Taniguchi (2001) regarding the Bernstein degree of unitary highest weight $(\\mathfrak{g},K)$-modules. We also extend our methods to compute the Hilbert series of the invariant rings for the groups $\\operatorname{SL}(V)$ and $\\operatorname{SO}(V)$, as well as the Wallach representations of type ADE.", "label": 0, "field": "math"} {"text": "Title: Radial Laplacian on rotation groups\nAbstract: The Laplacian on the rotation group is invariant by conjugation. Hence, it maps class functions to class functions. A maximal torus consists of block diagonal matrices whose blocks are planar rotations. Class functions are determined by their values of this maximal torus. Hence, the Laplacian induces a second order operator on the maximal torus called the radial Laplacian. In this paper, we derive the expression of the radial Laplacian. Then, we use it to find the eigenvalues of the Laplacian, using that characters are class functions whose expressions are given by the Weyl character formula. Although this material is familiar to Lie-group experts, we gather it here in a synthetic and accessible way which may be useful to non experts who need to work with these concepts.", "label": 1, "field": "math"} {"text": "Title: Clairaut Anti-invariant Riemannian maps from/to K\u00e4hler manifolds admitting Ricci soliton\nAbstract: The aim of this article is to study the Clairaut anti-invariant Riemannian maps from/to K\\\"ahler manifolds admitting Ricci solitons. We find the curvature relations and calculate the Ricci tensor under different conditions. We obtain conditions for the range and kernel of these maps to be Einstein. Next, we find the scalar curvature for range. Finally, we give some non-trivial examples of Clairaut anti-invariant Riemannian maps from/to K\\\"ahler manifolds admitting Ricci solitons.", "label": 0, "field": "math"} {"text": "Title: Fourier neural operator based fluid-structure interaction for predicting the vesicle dynamics\nAbstract: Solving complex fluid-structure interaction (FSI) problems, characterized by nonlinear partial differential equations, is crucial in various scientific and engineering applications. Traditional computational fluid dynamics (CFD) solvers are insufficient to meet the growing requirements for large-scale and long-period simulations. Fortunately, the rapid advancement in neural networks, especially neural operator learning mappings between function spaces, has introduced novel approaches to tackle these challenges via data-driven modeling. In this paper, we propose a Fourier neural operator-based fluid-structure interaction solver (FNO-based FSI solver) for efficient simulation of FSI problems, where the solid solver based on the finite difference method is seamlessly integrated with the Fourier neural operator to predict incompressible flow using the immersed boundary method. We analyze the performance of the FNO-based FSI solver in the following three situations: training data with or without the steady state, training method with one-step label or multi-step labels, and prediction in interpolation or extrapolation. We find that the best performance for interpolation is achieved by training the operator with multi-step labels using steady-state data. Finally, we train the FNO-based FSI solver using this optimal training method and apply it to vesicle dynamics. The results show that the FNO-based FSI solver is capable of capturing the variations in the fluid and the vesicle.", "label": 0, "field": "math"} {"text": "Title: Synergizing Beyond Diagonal Reconfigurable Intelligent Surface and Rate-Splitting Multiple Access\nAbstract: This work focuses on the synergy of rate-splitting multiple access (RSMA) and beyond diagonal reconfigurable intelligent surface (BD-RIS) to enlarge the coverage, improve the performance, and save on antennas. Specifically, we employ a multi-sector BD-RIS modeled as a prism, which can achieve highly directional full-space coverage, in a multiuser multiple input single output communication system. With the multi-sector BD-RIS aided RSMA model, we jointly design the transmit precoder and BD-RIS matrix under the imperfect channel state information (CSI) conditions. The robust design is performed by solving a stochastic average sum-rate maximization problem. With sample average approximation and weighted minimum mean square error-rate relationship, the stochastic problem is transformed into a deterministic one with multiple blocks, each of which is iteratively designed. Simulation results show that multi-sector BD-RIS aided RSMA outperforms space division multiple access schemes. More importantly, synergizing multi-sector BD-RIS with RSMA is an efficient strategy to reduce the number of active antennas at the transmitter and the number of passive antennas in BD-RIS.", "label": 0, "field": "cs"} {"text": "Title: Self-Stabilizing Indulgent Zero-degrading Binary Consensus\nAbstract: Guerraoui proposed an indulgent solution for the binary consensus problem. Namely, he showed that an arbitrary behavior of the failure detector never violates safety requirements even if it compromises liveness. Consensus implementations are often used in a repeated manner. Dutta and Guerraoui proposed a zero-degrading solution, \\ie during system runs in which the failure detector behaves perfectly, a node failure during one consensus instance has no impact on the performance of future instances. Our study, which focuses on indulgent zero-degrading binary consensus, aims at the design of an even more robust communication abstraction. We do so through the lenses of self-stabilization - a very strong notion of fault-tolerance. In addition to node and communication failures, self-stabilizing algorithms can recover after the occurrence of arbitrary transient faults; these faults represent any violation of the assumptions according to which the system was designed to operate (as long as the algorithm code stays intact). This work proposes the first, to the best of our knowledge, self-stabilizing algorithm for indulgent zero-degrading binary consensus for time-free message-passing systems prone to detectable process failures. The proposed algorithm has an O(1) stabilization time (in terms of asynchronous cycles) from arbitrary transient faults. Since the proposed solution uses an {\\Omega} failure detector, we also present the first, to the best of our knowledge, self-stabilizing asynchronous {\\Omega} failure detector, which is a variation on the one by Most\\'efaoui, Mourgaya, and Raynal.", "label": 1, "field": "cs"} {"text": "Title: Speeding Up Distributed Machine Learning Using Codes\nAbstract: Codes are widely used in many engineering applications to offer robustness against noise. In large-scale systems there are several types of noise that can affect the performance of distributed machine learning algorithms -- straggler nodes, system failures, or communication bottlenecks -- but there has been little interaction cutting across codes, machine learning, and distributed systems. In this work, we provide theoretical insights on how coded solutions can achieve significant gains compared to uncoded ones. We focus on two of the most basic building blocks of distributed learning algorithms: matrix multiplication and data shuffling. For matrix multiplication, we use codes to alleviate the effect of stragglers, and show that if the number of homogeneous workers is $n$, and the runtime of each subtask has an exponential tail, coded computation can speed up distributed matrix multiplication by a factor of $\\log n$. For data shuffling, we use codes to reduce communication bottlenecks, exploiting the excess in storage. We show that when a constant fraction $\\alpha$ of the data matrix can be cached at each worker, and $n$ is the number of workers, \\emph{coded shuffling} reduces the communication cost by a factor of $(\\alpha + \\frac{1}{n})\\gamma(n)$ compared to uncoded shuffling, where $\\gamma(n)$ is the ratio of the cost of unicasting $n$ messages to $n$ users to multicasting a common message (of the same size) to $n$ users. For instance, $\\gamma(n) \\simeq n$ if multicasting a message to $n$ users is as cheap as unicasting a message to one user. We also provide experiment results, corroborating our theoretical gains of the coded algorithms.", "label": 1, "field": "cs"} {"text": "Title: Knight's paths towards Catalan numbers\nAbstract: We provide enumerating results for partial knight's paths of a given size. We prove algebraically that zigzag knight's paths of a given size ending on the $x$-axis are enumerated by the generalized Catalan numbers, and we give a constructive bijection with peakless Motzkin paths of a given length. After enumerating partial knight's paths of a given length, we prove that zigzag knight's paths of a given length ending on the $x$-axis are counted by the Catalan numbers. Finally, we give a constructive bijection with Dyck paths of a given length.", "label": 1, "field": "math"} {"text": "Title: Composition method for chromatic symmetric functions: Neat noncommutative analogs\nAbstract: This work is inspired by Shareshian and Wachs's exquisite formula for the chromatic symmetric function of paths. We develop a composition method to unearth neat noncommutative analogs of chromatic symmetric functions. A symmetric function is $e$-positive if and only if it has a $\\Lambda$-positive noncommutative analog. We bring to light short and sweet $\\Lambda$-positive noncommutative analogs for the chromatic symmetric functions of tadpoles and barbells, with cycles and lollipops as specifications. Using these elegant formulas and the composition method, we discover a new family of $e$-positive graphs and call them hats, which are the unicyclic graphs obtained by adding an edge to a path. A compact ribbon Schur analog for cycles is also obtained as a by-product.", "label": 0, "field": "math"} {"text": "Title: Simpler Specifications and Easier Proofs of Distributed Algorithms Using History Variables\nAbstract: This paper studies specifications and proofs of distributed algorithms when only message history variables are used, using the Basic Paxos and Multi-Paxos algorithms for distributed consensus as precise case studies. We show that not using and maintaining other state variables yields simpler specifications that are more declarative and easier to understand. It also allows easier proofs to be developed by needing fewer invariants and facilitating proof derivations. Furthermore, the proofs are mechanically checked more efficiently. We show that specifications in TLA+, Lamport's temporal logic of actions, and proofs in TLAPS, the TLA+ Proof System (TLAPS) are reduced by a quarter or more for single-value Paxos and by about half or more for multi-value Paxos. Overall we need about half as many manually written invariants and proof obligations. Our proof for Basic Paxos takes about 25% less time for TLAPS to check, and our proofs for Multi-Paxos are checked within 1.5 minutes whereas prior proofs fail to be checked by TLAPS.", "label": 1, "field": "cs"} {"text": "Title: Structure and Design of HoloGen\nAbstract: Increasing popularity of augmented and mixed reality systems has seen a similar increase of interest in 2D and 3D computer generated holography (CGH). Unlike stereoscopic approaches, CGH can fully represent a light field including depth of focus, accommodation and vergence. Along with existing telecommunications, imaging, projection, lithography, beam shaping and optical tweezing applications, CGH is an exciting technique applicable to a wide array of photonic problems including full 3D representation. Traditionally, the primary roadblock to acceptance has been the significant numerical processing required to generate holograms requiring both significant expertise and significant computational power. This article discusses the structure and design of HoloGen. HoloGen is an MIT licensed application that may be used to generate holograms using a wide array of algorithms without expert guidance. HoloGen uses a Cuda C and C++ backend with a C# and Windows Presentation Framework graphical user interface. The article begins by introducing HoloGen before providing an in-depth discussion of its design and structure. Particular focus is given to the communication, data transfer and algorithmic aspects.", "label": 1, "field": "cs"} {"text": "Title: On Classes of Fredholm Type Operators\nAbstract: Given an idempotent $p$ in a Banach algebra and following the study in \\cite{P50} of p-invertibility, we consider here left p-invertibility, right p-invertibility and p-invertibility in the Calkin Algebra $\\mathcal{C}(X),$ where $X$ is a Banach space. Then we define and study left and right generalized Drazin invertibility and we characterize left and right Drazin invertible elements in the Calkin algebra. Globally, this leads to define and characterize the classes of P-Fredholm, pseudo B-Fredholm and weak B-Fredholm operators.", "label": 0, "field": "math"} {"text": "Title: Kernel Search approach to solve the Minimum Spanning Tree Problem with conflicting edge pairs\nAbstract: The Minimum Spanning Tree Problem with Conflicts consists in finding the minimum conflict-free spanning tree of a graph, i.e., the spanning tree of minimum cost, including no pairs of edges that are in conflict. In this paper, we solve this problem using a tailored Kernel Search heuristic method, which consists in solving iteratively improved restrictions of the problem. The main novelty of the approach consists in using an independent set of the conflict graph within the algorithm. We test our approach on the benchmark instances and we compare our results with the ones obtained by other heuristics available in the literature.", "label": 0, "field": "math"} {"text": "Title: Quasi-streamwise vortices and enhanced dissipation for the incompressible 3D Navier-Stokes equations\nAbstract: We consider the 3D incompressible Navier-Stokes equations under the following $2+\\frac{1}{2}$-dimensional situation: vertical vortex blob (quasi-streamwise vortices) being stretched by two-dimensional shear flow. We prove enhanced dissipation induced by such quasi-streamwise vortices.", "label": 1, "field": "math"} {"text": "Title: Dorfman connections and Courant algebroids\nAbstract: We define Dorfman connections, which are to Courant algebroids what connections are to Lie algebroids. Several examples illustrate this analogy. A linear connection $\\nabla\\colon \\mathfrak{X}(M)\\times\\Gamma(E)\\to\\Gamma(E)$ on a vector bundle $E$ over a smooth manifold $M$ is tantamount to a linear splitting $TE\\simeq T^{q_E}E\\oplus H_\\nabla$, where $T^{q_E}E$ is the set of vectors tangent to the fibres of $E$. Furthermore, the curvature of the connection measures the failure of the horizontal space $H_\\nabla$ to be integrable. We show that linear horizontal complements to $T^{q_E}E\\oplus (T^{q_E}E)^\\circ$ in the Pontryagin bundle over the vector bundle $E$ can be described in the same manner via a certain class of Dorfman connections $\\Delta\\colon \\Gamma(TM\\oplus E^*)\\times\\Gamma(E\\oplus T^*M)\\to\\Gamma(E\\oplus T^*M)$. Similarly to the tangent bundle case, we find that, after the choice of a linear splitting, the standard Courant algebroid structure of $TE\\oplus T^*E\\to E$ can be completely described by properties of the Dorfman connection. As an application, we study splittings of $TA\\oplus T^*A$ over a Lie algebroid $A$ and, following Gracia-Saz and Mehta, we compute the representations up to homotopy defined by any linear splitting of $TA\\oplus T^*A$ and the linear Lie algebroid $TA\\oplus T^*A\\to TM\\oplus A^*$. Further, we characterise VB- and LA-Dirac structures in $TA\\oplus T^*A$ via Dorfman connections.", "label": 1, "field": "math"} {"text": "Title: A simple proof for generalized Fibonacci numbers with dying rabbits\nAbstract: We consider the generalized Fibonacci counting problem with rabbits that become fertile at age $f$ and die at age $d$, with $1<=f<=d$ and $d$ finite or infinite. We provide a simple proof, based exclusively on a counting argumentation, for a recursive formula that gives the $n$th generalized Fibonacci number as a function of at most 3 previous numbers. The formula generalizes both the original Fibonacci sequence, for $f=2$ and $d=\\infty$ (or $f=1$ and $d=2$), and other Fibonacci-related sequences, such as the Padovan sequence, for $f=2$ and $d=3$, the Tribonacci, for $f=1$ and $d=3$, Tetranacci, for $f=1$ and $d=4$, and alike sequences, for $f=1$ and finite values of $d$.", "label": 0, "field": "math"} {"text": "Title: Some Gr\u00f6nwall inequalities for a class of discretizations of time fractional equations on nonuniform meshes\nAbstract: We consider the completely positive discretizations of fractional ordinary differential equations (FODEs) on nonuniform meshes. Making use of the resolvents for nonuniform meshes, we first establish comparison principles for the discretizations. Then we prove some discrete Gr\\\"onwall inequalities using the comparison principles and careful analysis of the solutions to the time continuous FODEs. Our results do not have any restrictions on the step size ratio. The Gr\\\"onwall inequalities for dissipative equations can be used to obtain the uniform-in-time error control and decay estimates of the numerical solutions. The Gr\\\"onwall inequalities are then applied to subdiffusion problems and the time fractional Allen-Cahn equations for illustration.", "label": 0, "field": "math"} {"text": "Title: Configuration space, moduli space and 3-fold covering space\nAbstract: A function from configuration space to moduli space of surface may induce a homomorphism between their fundamental groups which are braid groups and mapping class groups of surface, respectively. This map $\\phi: B_k \\rightarrow \\Gamma_{g,b}$ is induced by 3-fold branched covering over a disk with some branch points. In this thesis we give a concrete description of this map and show that it is injective by Birman-Hilden theory. This gives us a new interesting non-geometric embedding of braid group into mapping class group. On the other hand, we show that the map on the level of classifying spaces of groups is compatible with the action of little 2-cube operad so that it induces a trivial homomorphim between stable homology group of braid groups and that of mapping class groups(Harer conjecture). We also show how the lift $\\tilde{\\beta_i}$ acts on the fundamental group of the surface and through this we prove that $\\tilde{\\beta_i}$ equals the product of two inverse Dehn twists.", "label": 1, "field": "math"} {"text": "Title: Euclidean algorithms are Gaussian over imaginary quadratic fields\nAbstract: The distributional analysis of Euclidean algorithms was carried out by Baladi and Vall\\'{e}e. They showed the asymptotic normality of the number of division steps and associated costs in the Euclidean algorithm as a random variable on the set of rational numbers with bounded denominator based on the transfer operator methods. We extend their result to the Euclidean algorithm over appropriate imaginary quadratic fields by studying dynamics of the nearest integer complex continued fraction map, which is piecewise analytic and expanding but not a full branch map. By observing a finite Markov partition with a regular CW-structure, which enables us to associate the transfer operator acting on a direct sum of spaces of $C^1$-functions, we obtain the limit Gaussian distribution as well as residual equidistribution.", "label": 0, "field": "math"} {"text": "Title: Training Single-Layer Morphological Perceptron Using Convex-Concave Programming\nAbstract: This paper concerns the training of a single-layer morphological perceptron using disciplined convex-concave programming (DCCP). We introduce an algorithm referred to as K-DDCCP, which combines the existing single-layer morphological perceptron (SLMP) model proposed by Ritter and Urcid with the weighted disciplined convex-concave programming (WDCCP) algorithm by Charisopoulos and Maragos. The proposed training algorithm leverages the disciplined convex-concave procedure (DCCP) and formulates a non-convex optimization problem for binary classification. To tackle this problem, the constraints are expressed as differences of convex functions, enabling the application of the DCCP package. The experimental results confirm the effectiveness of the K-DDCCP algorithm in solving binary classification problems. Overall, this work contributes to the field of morphological neural networks by proposing an algorithm that extends the capabilities of the SLMP model.", "label": 0, "field": "cs"} {"text": "Title: VSFormer: Visual-Spatial Fusion Transformer for Correspondence Pruning\nAbstract: Correspondence pruning aims to find correct matches (inliers) from an initial set of putative correspondences, which is a fundamental task for many applications. The process of finding is challenging, given the varying inlier ratios between scenes/image pairs due to significant visual differences. However, the performance of the existing methods is usually limited by the problem of lacking visual cues (\\eg texture, illumination, structure) of scenes. In this paper, we propose a Visual-Spatial Fusion Transformer (VSFormer) to identify inliers and recover camera poses accurately. Firstly, we obtain highly abstract visual cues of a scene with the cross attention between local features of two-view images. Then, we model these visual cues and correspondences by a joint visual-spatial fusion module, simultaneously embedding visual cues into correspondences for pruning. Additionally, to mine the consistency of correspondences, we also design a novel module that combines the KNN-based graph and the transformer, effectively capturing both local and global contexts. Extensive experiments have demonstrated that the proposed VSFormer outperforms state-of-the-art methods on outdoor and indoor benchmarks. Our code is provided at the following repository: https://github.com/sugar-fly/VSFormer.", "label": 0, "field": "cs"} {"text": "Title: Fractional hypergraph isomorphism and fractional invariants\nAbstract: Fractional graph isomorphism is the linear relaxation of an integer programming formulation of graph isomorphism. It preserves some invariants of graphs, like degree sequences and equitable partitions, but it does not preserve others like connectivity, clique and independence numbers, chromatic number, vertex and edge cover numbers, matching number, domination and total domination numbers. In this work, we extend the concept of fractional graph isomorphism to hypergraphs, and give an alternative characterization, analogous to one of those that are known for graphs. With this new concept we prove that the fractional packing, covering, matching and transversal numbers on hypergraphs are invariant under fractional hypergraph isomorphism. As a consequence, fractional matching, vertex and edge cover, independence, domination and total domination numbers are invariant under fractional graph isomorphism. This is not the case of fractional chromatic, clique, and clique cover numbers. In this way, most of the classical fractional parameters are classified with respect to their invariance under fractional graph isomorphism.", "label": 1, "field": "math"} {"text": "Title: Reuse-Aware Cache Partitioning Framework for Data-Sharing Multicore Systems\nAbstract: Multi-core processors improve performance, but they can create unpredictability owing to shared resources such as caches interfering. Cache partitioning is used to alleviate the Worst-Case Execution Time (WCET) estimation by isolating the shared cache across each thread to reduce interference. It does, however, prohibit data from being transferred between parallel threads running on different cores. In this paper we present (SRCP) a cache replacement mechanism for partitioned caches that is aware of data being shared across threads, prevents shared data from being replicated across partitions and frequently used data from being evicted from caches. Our technique outperforms TA-DRRIP and EHC, which are existing state-of-the-art cache replacement algorithms, by 13.34% in cache hit-rate and 10.4% in performance over LRU (least recently used) cache replacement policy.", "label": 1, "field": "cs"} {"text": "Title: Braid variety cluster structures, II: general type\nAbstract: We show that braid varieties for any complex simple algebraic group $G$ are cluster varieties. This includes open Richardson varieties inside the flag variety $G/B$.", "label": 1, "field": "math"} {"text": "Title: An upwind method for genuine weakly hyperbolic systems\nAbstract: In this article, we attempted to develop an upwind scheme based on Flux Difference Splitting using Jordan canonical forms to simulate genuine weakly hyperbolic systems. Theory of Jordan Canonical Forms is being used to complete defective set of linear independent eigenvectors. Proposed FDS-J scheme is capable of recognizing various shocks accurately.", "label": 1, "field": "math"} {"text": "Title: Twice $Q$-polynomial distance-regular graphs of diameter 4\nAbstract: It is known that a distance-regular graph with valency $k$ at least three admits at most two Q-polynomial structures. % In this note we show that all distance-regular graphs with diameter four and valency at least three admitting two $Q$-polynomial structures are either dual bipartite or almost dual imprimitive. By the work of Dickie \\cite{Dickie} this implies that any distance-regular graph with diameter $d$ at least four and valency at least three admitting two $Q$-polynomial structures is, provided it is not a Hadamard graph, either the cube $H(d,2)$ with $d$ even, the half cube ${1}/{2} H(2d+1,2)$, the folded cube $\\tilde{H}(2d+1,2)$, or the dual polar graph on $[^2A_{2d-1}(q)]$ with $q\\ge 2$ a prime power.", "label": 1, "field": "math"} {"text": "Title: Influence Maximization in Ising Models\nAbstract: Given a complex high-dimensional distribution over $\\{\\pm 1\\}^n$, what is the best way to increase the expected number of $+1$'s by controlling the values of only a small number of variables? Such a problem is known as influence maximization and has been widely studied in social networks, biology, and computer science. In this paper, we consider influence maximization on the Ising model which is a prototypical example of undirected graphical models and has wide applications in many real-world problems. We establish a sharp computational phase transition for influence maximization on sparse Ising models under a bounded budget: In the high-temperature regime, we give a linear-time algorithm for finding a small subset of variables and their values which achieve nearly optimal influence; In the low-temperature regime, we show that the influence maximization problem cannot be solved in polynomial time under commonly-believed complexity assumption. The critical temperature coincides with the tree uniqueness/non-uniqueness threshold for Ising models which is also a critical point for other computational problems including approximate sampling and counting.", "label": 0, "field": "cs"} {"text": "Title: Asymptotically compatible reproducing kernel collocation and meshfree integration for the peridynamic Navier equation\nAbstract: In this work, we study the reproducing kernel (RK) collocation method for the peridynamic Navier equation. We first apply a linear RK approximation on both displacements and dilatation, then back-substitute dilatation, and solve the peridynamic Navier equation in a pure displacement form. The RK collocation scheme converges to the nonlocal limit and also to the local limit as nonlocal interactions vanish. The stability is shown by comparing the collocation scheme with the standard Galerkin scheme using Fourier analysis. We then apply the RK collocation to the quasi-discrete peridynamic Navier equation and show its convergence to the correct local limit when the ratio between the nonlocal length scale and the discretization parameter is fixed. The analysis is carried out on a special family of rectilinear Cartesian grids for the RK collocation method with a designated kernel with finite support. We assume the Lam\\'{e} parameters satisfy $\\lambda \\geq \\mu$ to avoid adding extra constraints on the nonlocal kernel. Finally, numerical experiments are conducted to validate the theoretical results.", "label": 1, "field": "math"} {"text": "Title: Ergodicity of skew products over linearly recurrent IETs\nAbstract: We prove that the skew product over a linearly recurrent interval exchange transformation defined by almost any real-valued, mean-zero linear combination of characteristic functions of intervals is ergodic with respect to Lebesgue measure.", "label": 1, "field": "math"} {"text": "Title: A Simple Generalization of a Result for Random Matrices with Independent Sub-Gaussian Rows\nAbstract: In this short note, we give a very simple but useful generalization of a result of Vershynin (Theorem 5.39 of [1]) for a random matrix with independent sub-Gaussian rows. We also explain with an example where our generalization is useful.", "label": 1, "field": "math"} {"text": "Title: Exponential sums, twisted multiplicativity and moments\nAbstract: We study averages over squarefree moduli of the size of exponential sums with polynomial phases. We prove upper bounds on various moments of such sums, and obtain evidence of un-correlation of exponential sums associated to different suitably unrelated and generic polynomials. The proofs combine analytic arguments with the algebraic interpretation of exponential sums and their monodromy groups.", "label": 1, "field": "math"} {"text": "Title: State Space Decomposition and Subgoal Creation for Transfer in Deep Reinforcement Learning\nAbstract: Typical reinforcement learning (RL) agents learn to complete tasks specified by reward functions tailored to their domain. As such, the policies they learn do not generalize even to similar domains. To address this issue, we develop a framework through which a deep RL agent learns to generalize policies from smaller, simpler domains to more complex ones using a recurrent attention mechanism. The task is presented to the agent as an image and an instruction specifying the goal. This meta-controller guides the agent towards its goal by designing a sequence of smaller subtasks on the part of the state space within the attention, effectively decomposing it. As a baseline, we consider a setup without attention as well. Our experiments show that the meta-controller learns to create subgoals within the attention.", "label": 1, "field": "cs"} {"text": "Title: Hilbert space operators with compatible off-diagonal corners\nAbstract: Given a complex, separable Hilbert space $\\mathcal{H}$, we characterize those operators for which $\\| P T (I-P) \\| = \\| (I-P) T P \\|$ for all orthogonal projections $P$ on $\\mathcal{H}$. When $\\mathcal{H}$ is finite-dimensional, we also obtain a complete characterization of those operators for which $\\mathrm{rank}\\, (I-P) T P = \\mathrm{rank}\\, P T (I-P)$ for all orthogonal projections $P$. When $\\mathcal{H}$ is infinite-dimensional, we show that any operator with the latter property is normal, and its spectrum is contained in either a line or a circle in the complex plane.", "label": 1, "field": "math"} {"text": "Title: Decomposable and atomic projection maps\nAbstract: It is shown that a trace invariant projection map, i.e. a positive unital idempotent map, of a finite dimensional C*-algebra into itself is non-decomposable if and only if it is atomic, or equivalently not the sum of a 2-positive and a 2-copositive map. In particular projections onto spin factors of dimension greater than 6 are atomic.", "label": 1, "field": "math"} {"text": "Title: The Stanley Conjecture Revisited\nAbstract: In the seminal work of Stanley, several conjectures were made on the structure of Littlewood-Richardson coefficients for the multiplication of Jack symmetric functions. Motivated by recent results of Alexandersson and the present author, we postulate that a certain 'windowing' property holds for all such Jack L-R coefficients. This property provides a vast set of relations between these coefficients and allows for their direct computation in certain novel cases. We demonstrate compatibility between our windowing conjecture and the conjectures of Stanley, with the hope of illuminating the structures within.", "label": 0, "field": "math"} {"text": "Title: Towards Higher Spectral Efficiency: Rate-2 Full-Diversity Complex Space-Time Block Codes\nAbstract: The upcoming 5G networks demand high-speed and high spectral-efficiency communications to keep up with the proliferating traffic demands. To this end, Massive multiple-input multiple-output (MIMO) techniques have gained significant traction owing to its ability to achieve these without increasing bandwidth or density of base stations. The preexisting space-time block code (STBC) designs cannot achieve a rate of more than 1 for more than two transmit antennas while preserving the orthogonality and full diversity conditions. In this paper, we present Jagannath codes - a novel complex modulation STBC, that achieves a very high rate of 2 for three and four transmit antennas. The presented designs achieve full diversity and overcome the previously achieved rates with the three and four antenna MIMO systems. We present a detailed account of the code construction of the proposed designs, orthogonality and full diversity analysis, transceiver model and conditional maximum likelihood (ML) decoding. In an effort to showcase the improvement achieved with the presented designs, we compare the rates and delays of some of the known STBCs with the proposed designs. The effective spectral efficiency and coding gain of the presented designs are compared to the Asymmetric Coordinate Interleaved design (ACIOD) and Jafarkhani code. We presented an effective spectral efficiency improvement by a factor of 2 with the proposed Jagannath codes. Owing to the full diversity of the presented designs, we demonstrate significant coding gains (6 dB and 12 dB) with the proposed designs.", "label": 1, "field": "cs"} {"text": "Title: Equivariant Morse theory for Lie algebra actions on Riemannian foliations\nAbstract: Consider the transverse isometric action of a finite dimensional Lie algebra g on a Riemannian foliation. This paper studies the equivariant Morse-Bott theory on the leaf space of the Riemannian foliations in this setting. Among other things, we establish a foliated version of the Morse-Bott lemma for a g-invariant basic Morse-Bott function, and a foliated version of the usual handle presentation theorem. In the non-equivariant case, we apply these results to present a new proof of the Morse inequalities on Riemannian foliations. In the equivariant case, we apply these results to study Hamiltonian action of an abelian Lie algebra on a presymplectic manifold whose underlying foliation is also Riemannian, and extend the Kirwan surjectivity and injectivity theorem in equivariant symplectic geometry to this situation. Among other things, this implies the Kirwan surjectivity and injectivity hold for Hamiltonian torus actions on symplectic orbifolds.", "label": 0, "field": "math"} {"text": "Title: Multiplicity of normalized solutions for the fractional Schr\u00f6dinger equation with potentials\nAbstract: We get multiplicity of normalized solutions for the fractional Schr\\\"{o}dinger equation $$ (-\\Delta)^su+V(\\varepsilon x)u=\\lambda u+h(\\varepsilon x)f(u)\\quad \\mbox{in $\\mathbb{R}^N$}, \\qquad\\int_{\\mathbb{R}^N}|u|^2dx=a, $$ where $(-\\Delta)^s$ is the fractional Laplacian, $s\\in(0,1)$, $a,\\varepsilon>0$, $\\lambda\\in\\mathbb{R}$ is an unknown parameter that appears as a Lagrange multiplier, $V,h:\\mathbb{R}^N\\rightarrow[0,+\\infty)$ are bounded and continuous, and $f$ is continuous function with $L^2$-subcritical growth. We prove that the numbers of normalized solutions are at least the numbers of global maximum points of $h$ when $\\varepsilon$ is small enough.", "label": 0, "field": "math"} {"text": "Title: Modeling multiple taxis: tumor invasion with phenotypic heterogeneity, haptotaxis, and unilateral interspecies repellence\nAbstract: We provide a short review of existing models with multiple taxis performed by (at least) one species and consider a new mathematical model for tumor invasion featuring two mutually exclusive cell phenotypes (migrating and proliferating). The migrating cells perform nonlinear diffusion and two types of taxis in response to non-diffusing cues: away from proliferating cells and up the gradient of surrounding tissue. Transitions between the two cell subpopulations are influenced by subcellular (receptor binding) dynamics, thus conferring the setting a multiscale character. We prove global existence of weak solutions to a simplified model version and perform numerical simulations for the full setting under several phenotype switching and motility scenarios. We also compare (via simulations) this model with the corresponding haptotaxis-chemotaxis one featuring indirect chemorepellent production and provide a discussion about possible model extensions and mathematical challenges.", "label": 1, "field": "math"} {"text": "Title: Chromatic symmetric function of graphs from Borcherds algebras\nAbstract: Let $\\mathfrak g$ be a Borcherds algebra with the associated graph $G$. We prove that the chromatic symmetric function of $G$ can be recovered from the Weyl denominator identity of $\\mathfrak g$ and this gives a Lie theoretic proof of Stanley's expression for chromatic symmetric function in terms of power sum symmetric function. Also, this gives an expression for chromatic symmetric function of $G$ in terms of root multiplicities of $\\lie g$. The absolute value of the linear coefficient of the chromatic polynomial of $G$ is known as the chromatic discriminant of $G$. As an application of our main theorem, we prove that graphs with different chromatic discriminants are distinguished by their chromatic symmetric functions. Also, we find a connection between the Weyl denominators and the $G$-elementary symmetric functions. Using this connection, we give a Lie theoretic proof of non-negativity of coefficients of $G$-power sum symmetric functions.", "label": 1, "field": "math"} {"text": "Title: Directional flow in perivascular networks: Mixed finite elements for reduced-dimensional models on graphs\nAbstract: The flow of cerebrospinal fluid through the perivascular spaces of the brain is believed to play a crucial role in eliminating toxic waste proteins. While the driving forces of this flow have been enigmatic, experiments have shown that arterial wall motion is central. In this work, we present a network model for simulating pulsatile fluid flow in perivascular networks. We establish the well-posedness of this model in the primal and dual mixed variational settings, and show how it can be discretized using mixed finite elements. Further, we utilize this model to investigate fundamental questions concerning the physical mechanisms governing perivascular fluid flow. Notably, our findings reveal that arterial pulsations can induce directional flow in branching perivascular networks.", "label": 0, "field": "math"} {"text": "Title: Projections, Embeddings and Stability\nAbstract: In the present work, we demonstrate how the pseudoinverse concept from linear algebra can be used to represent and analyze the boundary conditions of linear systems of partial differential equations. This approach has theoretical and practical implications; the theory applies even if the boundary operator is rank deficient, or near rank deficient. If desired, the pseudoinverse can be implemented directly using standard tools like Matlab. We also introduce a new and simplified version of the semidiscrete approximation of the linear PDE system, which completely avoids taking the time derivative of the boundary data. The stability results are valid for general, nondiagonal summation-by-parts norms. Another key result is the extension of summation-by-parts operators to multi-domains by means of carefully crafted embedding operators. No extra numerical boundary conditions are required at the grid interfaces. The aforementioned pseudoinverse allows for a compact representation of these multi-block operators, which preserves all relevant properties of the single-block operators. The embedding operators can be constructed for multiple space dimensions. Numerical results for the two-dimensional Maxwell's equations are presented, and they show very good agreement with theory.", "label": 0, "field": "math"} {"text": "Title: On the maximum of the weighted binomial sum $(1+a)^{-r}\\sum_{i=0}^{r}\\binom{m}{i}a^{i}$\nAbstract: Recently, Glasby and Paseman considered the following sequence of binomial sums $\\{2^{-r}\\sum_{i=0}^{r}\\binom{m}{i}\\}_{r=0}^{m}$ and showed that this sequence is unimodal and attains its maximum value at $r=\\lfloor\\frac{m}{3}\\rfloor+1$ for $m\\in\\mathbb{Z}_{\\geq0}\\setminus\\{0,3,6,9,12\\}$. They also analyzed the asymptotic behavior of the maximum value of the sequence as $m$ approaches infinity. In the present work, we generalize their results by considering the sequence $\\{(1+a)^{-r}\\sum_{i=0}^{r}\\binom{m}{i}a^{i}\\}_{r=0}^{m}$ for integers $a \\geq 1$. We also consider a family of discrete probability distributions that naturally arises from this sequence.", "label": 0, "field": "math"} {"text": "Title: An Adaptive Incremental Gradient Method With Support for Non-Euclidean Norms\nAbstract: Stochastic variance reduced methods have shown strong performance in solving finite-sum problems. However, these methods usually require the users to manually tune the step-size, which is time-consuming or even infeasible for some large-scale optimization tasks. To overcome the problem, we propose and analyze several novel adaptive variants of the popular SAGA algorithm. Eventually, we design a variant of Barzilai-Borwein step-size which is tailored for the incremental gradient method to ensure memory efficiency and fast convergence. We establish its convergence guarantees under general settings that allow non-Euclidean norms in the definition of smoothness and the composite objectives, which cover a broad range of applications in machine learning. We improve the analysis of SAGA to support non-Euclidean norms, which fills the void of existing work. Numerical experiments on standard datasets demonstrate a competitive performance of the proposed algorithm compared with existing variance-reduced methods and their adaptive variants.", "label": 1, "field": "math"} {"text": "Title: Efficient Scenario Generation for Chance-constrained Economic Dispatch Considering Ambient Wind Conditions\nAbstract: Scenario generation is an effective data-driven method for solving chance-constrained optimization while ensuring desired risk guarantees with a finite number of samples. Crucial challenges in deploying this technique in the real world arise due to the absence of appropriate risk-tuning models tailored for the desired application. In this paper, we focus on designing efficient scenario generation schemes for economic dispatch in power systems. We propose a novel scenario generation method based on filtering scenarios using ambient wind conditions. These filtered scenarios are deployed incrementally in order to meet desired risk levels while using minimum resources. In order to study the performance of the proposed scheme, we illustrate the procedure on case studies performed for both 24-bus and 118-bus systems with real-world wind power forecasting data. Numerical results suggest that the proposed filter-and-increment scenario generation model leads to a precise and efficient solution for the chance-constrained economic dispatch problem.", "label": 0, "field": "math"} {"text": "Title: Inductive Synthesis of Finite-State Controllers for POMDPs\nAbstract: We present a novel learning framework to obtain finite-state controllers (FSCs) for partially observable Markov decision processes and illustrate its applicability for indefinite-horizon specifications. Our framework builds on oracle-guided inductive synthesis to explore a design space compactly representing available FSCs. The inductive synthesis approach consists of two stages: The outer stage determines the design space, i.e., the set of FSC candidates, while the inner stage efficiently explores the design space. This framework is easily generalisable and shows promising results when compared to existing approaches. Experiments indicate that our technique is (i) competitive to state-of-the-art belief-based approaches for indefinite-horizon properties, (ii) yields smaller FSCs than existing methods for several models, and (iii) naturally treats multi-objective specifications.", "label": 1, "field": "cs"} {"text": "Title: Graph Neural Networks for Tabular Data Learning: A Survey with Taxonomy and Directions\nAbstract: In this survey, we dive into Tabular Data Learning (TDL) using Graph Neural Networks (GNNs), a domain where deep learning-based approaches have increasingly shown superior performance in both classification and regression tasks compared to traditional methods. The survey highlights a critical gap in deep neural TDL methods: the underrepresentation of latent correlations among data instances and feature values. GNNs, with their innate capability to model intricate relationships and interactions between diverse elements of tabular data, have garnered significant interest and application across various TDL domains. Our survey provides a systematic review of the methods involved in designing and implementing GNNs for TDL (GNN4TDL). It encompasses a detailed investigation into the foundational aspects and an overview of GNN-based TDL methods, offering insights into their evolving landscape. We present a comprehensive taxonomy focused on constructing graph structures and representation learning within GNN-based TDL methods. In addition, the survey examines various training plans, emphasizing the integration of auxiliary tasks to enhance the effectiveness of instance representations. A critical part of our discussion is dedicated to the practical application of GNNs across a spectrum of GNN4TDL scenarios, demonstrating their versatility and impact. Lastly, we discuss the limitations and propose future research directions, aiming to spur advancements in GNN4TDL. This survey serves as a resource for researchers and practitioners, offering a thorough understanding of GNNs' role in revolutionizing TDL and pointing towards future innovations in this promising area.", "label": 0, "field": "cs"} {"text": "Title: Multimodal Sampling via Approximate Symmetries\nAbstract: Sampling from multimodal distributions is a challenging task in scientific computing. When a distribution has an exact symmetry between the modes, direct jumps among them can accelerate the samplings significantly. However, the distributions from most applications do not have exact symmetries. This paper considers the distributions with approximate symmetries. We first construct an exactly symmetric reference distribution from the target one by averaging over the group orbit associated with the approximate symmetry. Next, we can apply the multilevel Monte Carlo methods by constructing a continuation path between the reference and target distributions. We discuss how to implement these steps with annealed importance sampling and tempered transitions. Compared with traditional multilevel methods, the proposed approach can be more effective since the reference and target distributions are much closer. Numerical results of the Ising models are presented to illustrate the efficiency of the proposed method.", "label": 0, "field": "math"} {"text": "Title: Detection and Discovery of Misinformation Sources using Attributed Webgraphs\nAbstract: Website reliability labels underpin almost all research in misinformation detection. However, misinformation sources often exhibit transient behavior, which makes many such labeled lists obsolete over time. We demonstrate that Search Engine Optimization (SEO) attributes provide strong signals for predicting news site reliability. We introduce a novel attributed webgraph dataset with labeled news domains and their connections to outlinking and backlinking domains. We demonstrate the success of graph neural networks in detecting news site reliability using these attributed webgraphs, and show that our baseline news site reliability classifier outperforms current SoTA methods on the PoliticalNews dataset, achieving an F1 score of 0.96. Finally, we introduce and evaluate a novel graph-based algorithm for discovering previously unknown misinformation news sources.", "label": 0, "field": "cs"} {"text": "Title: On Newton polytopes of Lagrangian augmentations\nAbstract: This note explores the use of Newton polytopes in the study of Lagrangian fillings of Legendrian submanifolds. In particular, we show that Newton polytopes associated to augmented values of Reeb chords can distinguish infinitely many distinct Lagrangian fillings, both for Legendrian links and higher-dimensional Legendrian spheres. The computations we perform work in finite characteristic, which significantly simplifies arguments and also allows us to show that there exist Legendrian links with infinitely many non-orientable exact Lagrangian fillings.", "label": 0, "field": "math"} {"text": "Title: Investigation of the Sense of Agency in Social Cognition, based on frameworks of Predictive Coding and Active Inference: A simulation study on multimodal imitative interaction\nAbstract: When agents interact socially with different intentions, conflicts are difficult to avoid. Although how agents can resolve such problems autonomously has not been determined, dynamic characteristics of agency may shed light on underlying mechanisms. The current study focused on the sense of agency (SoA), a specific aspect of agency referring to congruence between the agent's intention in acting and the outcome. Employing predictive coding and active inference as theoretical frameworks of perception and action generation, we hypothesize that regulation of complexity in the evidence lower bound of an agent's model should affect the strength of the agent's SoA and should have a critical impact on social interactions. We built a computational model of imitative interaction between a robot and a human via visuo-proprioceptive sensation with a variational Bayes recurrent neural network, and simulated the model in the form of pseudo-imitative interaction using recorded human body movement data. A key feature of the model is that each modality's complexity can be regulated differently with a hyperparameter assigned to each module. We first searched for an optimal setting that endows the model with appropriate coordination of multimodal sensation. This revealed that the vision module's complexity should be more tightly regulated than that of the proprioception module. Using the optimally trained model, we examined how changing the tightness of complexity regulation after training affects the strength of the SoA during interactions. The results showed that with looser regulation, an agent tends to act more egocentrically, without adapting to the other. In contrast, with tighter regulation, the agent tends to follow the other by adjusting its intention. We conclude that the tightness of complexity regulation crucially affects the strength of the SoA and the dynamics of interactions between agents.", "label": 1, "field": "cs"} {"text": "Title: Legendrians with vanishing Shelukhin-Chekanov-Hofer metric\nAbstract: We show that the Legendrian lift of an exact, displaceable Lagrangian has vanishing Shelukhin-Chekanov-Hofer pseudo-metric by lifting an argument due to Sikorav to the contactization. In particular, this proves the existence of such Legendrians, providing counterexamples to a conjecture of Rosen and Zhang.", "label": 0, "field": "math"} {"text": "Title: Deep Learning Based Superposition Coded Modulation for Hierarchical Semantic Communications over Broadcast Channels\nAbstract: We consider multi-user semantic communications over broadcast channels. While most existing works consider that each receiver requires either the same or independent semantic information, this paper explores the scenario where the semantic information desired by different receivers is different but correlated. In particular, we investigate semantic communications over Gaussian broadcast channels where the transmitter has a common observable source but the receivers wish to recover hierarchical semantic information in adaptation to their channel conditions. Inspired by the capacity achieving property of superposition codes, we propose a deep learning based superposition coded modulation (DeepSCM) scheme. Specifically, the hierarchical semantic information is first extracted and encoded into basic and enhanced feature vectors. A linear minimum mean square error (LMMSE) decorrelator is then developed to obtain a refinement from the enhanced features that is uncorrelated with the basic features. Finally, the basic features and their refinement are superposed for broadcasting after probabilistic modulation. Experiments are conducted for two-receiver image semantic broadcasting with coarse and fine classification as hierarchical semantic tasks. DeepSCM outperforms the benchmarking coded-modulation scheme without a superposition structure, especially with large channel disparity and high order modulation. It also approaches the performance upperbound as if there were only one receiver.", "label": 0, "field": "cs"} {"text": "Title: Identifiability of Covariance Kernels in the Gaussian Process Regression Model\nAbstract: Gaussian process regression (GPR) model is a popular nonparametric regression model. In GPR, features of the regression function such as varying degrees of smoothness and periodicities are modeled through combining various covarinace kernels, which are supposed to model certain effects. The covariance kernels have unknown parameters which are estimated by the EM-algorithm or Markov Chain Monte Carlo. The estimated parameters are keys to the inference of the features of the regression functions, but identifiability of these parameters has not been investigated. In this paper, we prove identifiability of covariance kernel parameters in two radial basis mixed kernel GPR and radial basis and periodic mixed kernel GPR. We also provide some examples about non-identifiable cases in such mixed kernel GPRs.", "label": 1, "field": "math"} {"text": "Title: On the shape factor of interaction laws for a non-local approximation of the Sobolev norm and the total variation\nAbstract: We consider the family of non-local and non-convex functionals introduced by H. Brezis and H.-M. Nguyen in a recent paper. These functionals Gamma-converge to a multiple of the Sobolev norm or the total variation, depending on a summability exponent, but the exact values of the constants are unknown in many cases. We describe a new approach to the Gamma-convergence result that leads in some special cases to the exact value of the constants, and to the existence of smooth recovery families.", "label": 1, "field": "math"} {"text": "Title: Local limit theorem for time-inhomogeneous functions of Markov processes\nAbstract: In this paper, we consider a continuous-time Markov process and prove a local limit theorem for the integral of a time-inhomogeneous function of the process. One application is in the study of the fast-oscillating perturbations of linear dynamical systems.", "label": 0, "field": "math"} {"text": "Title: Hot Streaks on Social Media\nAbstract: Measuring the impact and success of human performance is common in various disciplines, including art, science, and sports. Quantifying impact also plays a key role on social media, where impact is usually defined as the reach of a user's content as captured by metrics such as the number of views, likes, retweets, or shares. In this paper, we study entire careers of Twitter users to understand properties of impact. We show that user impact tends to have certain characteristics: First, impact is clustered in time, such that the most impactful tweets of a user appear close to each other. Second, users commonly have 'hot streaks' of impact, i.e., extended periods of high-impact tweets. Third, impact tends to gradually build up before, and fall off after, a user's most impactful tweet. We attempt to explain these characteristics using various properties measured on social media, including the user's network, content, activity, and experience, and find that changes in impact are associated with significant changes in these properties. Our findings open interesting avenues for future research on virality and influence on social media.", "label": 1, "field": "cs"} {"text": "Title: Grassroots Social Networking: Where Members Own and Control their Personal Information and Social Graph\nAbstract: Offering an architecture for social networking in which the members are in control of their personal information and social graph is an open challenge. Here we present a grassroots architecture for serverless, permissionless, peer-to-peer social networks termed Grassroots Social Networking that aims to address this challenge. The architecture is geared for roaming (address-changing) agents communicating over an unreliable network, e.g., smartphones communicating via UDP. The architecture incorporates (i) a decentralized social graph, where each member controls, maintains and stores only their local neighborhood in the graph; (ii) member-created feeds, with authors and followers who create and store the feeds; and (iii) a grassroots dissemination protocol, in which communication among members occurs only along the edges of the social graph. The architecture realizes these components using the blocklace data structure -- a distributed partially-ordered counterpart of the replicated totally-ordered blockchain. We provide two example Grassroots Social Networking protocols -- Twitter-like and WhatsApp-like -- and address their security (safety, liveness and privacy), spam/bot/deep-fake resistance, and implementation, demonstrating how server-based social networks could be supplanted by a grassroots architecture.", "label": 0, "field": "cs"} {"text": "Title: Dynamic Packet Scheduler Optimization in Wireless Relay Networks\nAbstract: In this work, we investigate the optimal dynamic packet scheduling policy in a wireless relay network (WRN). We model this network by two sets of parallel queues, that represent the subscriber stations (SS) and the relay stations (RS), with random link connectivity. An optimal policy minimizes, in stochastic ordering sense, the process of cost function of the SS and RS queue sizes. We prove that, in a system with symmetrical connectivity and arrival distributions, a policy that tries to balance the lengths of all the system queues, at every time slot, is optimal. We use stochastic dominance and coupling arguments in our proof. We also provide a low-overhead algorithm for optimal policy implementation.", "label": 1, "field": "cs"} {"text": "Title: Stable cohomology of congruence subgroups\nAbstract: We describe the $\\mathbb{F}_p$-cohomology of the congruence subgroups $SL_n(\\mathbb{Z}, p^m)$ in degrees $* < p$, for all large enough $n$, establishing a formula proposed by F. Calegari. Along the way, we also establish a formula for the stable cohomology of $SL_n(\\mathbb{Z}/p)$ with certain twisted coefficients.", "label": 1, "field": "math"} {"text": "Title: On the Ideal Number of Groups for Isometric Gradient Propagation\nAbstract: Recently, various normalization layers have been proposed to stabilize the training of deep neural networks. Among them, group normalization is a generalization of layer normalization and instance normalization by allowing a degree of freedom in the number of groups it uses. However, to determine the optimal number of groups, trial-and-error-based hyperparameter tuning is required, and such experiments are time-consuming. In this study, we discuss a reasonable method for setting the number of groups. First, we find that the number of groups influences the gradient behavior of the group normalization layer. Based on this observation, we derive the ideal number of groups, which calibrates the gradient scale to facilitate gradient descent optimization. Our proposed number of groups is theoretically grounded, architecture-aware, and can provide a proper value in a layer-wise manner for all layers. The proposed method exhibited improved performance over existing methods in numerous neural network architectures, tasks, and datasets.", "label": 1, "field": "cs"} {"text": "Title: Local behavior for solutions to anisotropic weighted quasilinear degenerate parabolic equations\nAbstract: This paper aims to study the local behavior of solutions to a class of anisotropic weighted quasilinear degenerate parabolic equations with the weights comprising two power-type weights of different dimensions. We first capture the asymptotic behavior of the solution near the singular or degenerate point of the weights. In particular, we find an explicit upper bound on the decay rate exponent determined by the structures of the equations and weights, which can be achieved under certain condition and meanwhile reflects the damage effect of the weights on the regularity of the solution. Furthermore, we prove the local H\\\"{o}lder regularity of solutions to non-homogeneous parabolic $p$-Laplace equations with single power-type weights.", "label": 0, "field": "math"} {"text": "Title: Radio Network Lower Bounds Made Easy\nAbstract: Theoreticians have studied distributed algorithms in the radio network model for close to three decades. A significant fraction of this work focuses on lower bounds for basic communication problems such as wake-up (symmetry breaking among an unknown set of nodes) and broadcast (message dissemination through an unknown network topology). In this paper, we introduce a new technique for proving this type of bound, based on reduction from a probabilistic hitting game, that simplifies and strengthens much of this existing work. In more detail, in this single paper we prove new expected time and high probability lower bounds for wake-up and global broadcast in single and multichannel versions of the radio network model both with and without collision detection. In doing so, we are able to reproduce results that previously spanned a half-dozen papers published over a period of twenty-five years. In addition to simplifying these existing results, our technique, in many places, also improves the state of the art: of the eight bounds we prove, four strictly strengthen the best known previous result (in terms of time complexity and/or generality of the algorithm class for which it holds), and three provide the first known non-trivial bound for the case in question. The fact that the same technique can easily generate this diverse collection of lower bounds indicates a surprising unity underlying communication tasks in the radio network model---revealing that deep down, below the specifics of the problem definition and model assumptions, communication in this setting reduces to finding efficient strategies for a simple game.", "label": 1, "field": "cs"} {"text": "Title: Cost Minimization in Multi-cloud Systems with Runtime Microservice Re-orchestration\nAbstract: Multi-cloud systems facilitate a cost-efficient and geographically-distributed deployment of microservice-based applications by temporary leasing virtual nodes with diverse pricing models. To preserve the cost-efficiency of multi-cloud deployments, it is essential to redeploy microservices onto the available nodes according to a dynamic resource configuration, which is often performed to better accommodate workload variations. However, this approach leads to frequent service disruption since applications are continuously shutdown and redeployed in order to apply the new resource assignment. To overcome this issue, we propose a re-orchestration scheme that migrates microservice at runtime based on a rolling update scheduling logic. Specifically, we propose an integer linear optimization problem that minimizes the cost associated to multi-cloud virtual nodes and that ensures that delay-sensitive microservices are co-located on the same regional cluster. The resulting rescheduling order guarantees no service disruption by repacking microservices between the available nodes without the need to turn off the outdated microservice instance before redeploying the updated version. In addition, we propose a two-step heuristic scheme that effectively approximates the optimal solution at the expense of close-to-zero service disruption and QoS violation probability. Results show that proposed schemes achieve better performance in terms of cost mitigation, low service disruption and low QoS violation probability compared to baseline schemes replicating Kubernetes scheduler functionalities.", "label": 0, "field": "cs"} {"text": "Title: Connected sums and directed systems in knot Floer homologies\nAbstract: We prove a number of fundamental properties about instanton knot Floer homology. Our arguments rely on general properties of sutured Floer theories and apply also in the Heegaard Floer and monopole Floer settings, where many of our results were already known. Our main result is the connected sum formula for instanton knot Floer homology. An extension of this result proves the oriented skein exact triangle for the minus version of instanton knot Floer homology. Finally, we derive a new model of the minus version of instanton knot Floer homology, which takes the form of a free, finitely generated chain complex over a polynomial ring, as opposed to a direct limit. This construction is new to all of the Floer theories. We explore these results also in the context of Heegaard Floer theory as well.", "label": 0, "field": "math"} {"text": "Title: On Completely Edge-Independent Spanning Trees in Locally Twisted Cubes\nAbstract: A network can contain numerous spanning trees. If two spanning trees $T_i,T_j$ do not share any common edges, $T_i$ and $T_j$ are said to be pairwisely edge-disjoint. For spanning trees $T_1, T_2, ..., T_m$, if any two of them are pairwisely edge-disjoint, they are called completely edge-independent spanning trees (CEISTs for short). CEISTs can facilitate many network functionalities, and constructing CEISTs as maximally allowed as possible in a given network is a worthy undertaking. In this paper, we establish the maximal number of CEISTs in the locally twisted cube network, and propose an algorithm to construct $\\lfloor \\frac{n}{2} \\rfloor$ CEISTs in $LTQ_n$, the $n$-dimensional locally twisted cube. The proposed algorithm has been actually implemented, and we present the outputs. Network broadcasting in the $LTQ_n$ was simulated using $\\lfloor\\frac{n}{2}\\rfloor$ CEISTs, and the performance compared with broadcasting using a single tree.", "label": 0, "field": "cs"} {"text": "Title: Evaluating LLMs on Document-Based QA: Exact Answer Selection and Numerical Extraction using Cogtale dataset\nAbstract: Document-based Question-Answering (QA) tasks are crucial for precise information retrieval. While some existing work focus on evaluating large language models performance on retrieving and answering questions from documents, assessing the LLMs performance on QA types that require exact answer selection from predefined options and numerical extraction is yet to be fully assessed. In this paper, we specifically focus on this underexplored context and conduct empirical analysis of LLMs (GPT-4 and GPT-3.5) on question types, including single-choice, yes-no, multiple-choice, and number extraction questions from documents in zero-shot setting. We use the CogTale dataset for evaluation, which provide human expert-tagged responses, offering a robust benchmark for precision and factual grounding. We found that LLMs, particularly GPT-4, can precisely answer many single-choice and yes-no questions given relevant context, demonstrating their efficacy in information retrieval tasks. However, their performance diminishes when confronted with multiple-choice and number extraction formats, lowering the overall performance of the model on this task, indicating that these models may not yet be sufficiently reliable for the task. This limits the applications of LLMs on applications demanding precise information extraction from documents, such as meta-analysis tasks. These findings hinge on the assumption that the retrievers furnish pertinent context necessary for accurate responses, emphasizing the need for further research. Our work offers a framework for ongoing dataset evaluation, ensuring that LLM applications for information retrieval and document analysis continue to meet evolving standards.", "label": 0, "field": "cs"} {"text": "Title: Enriched Annotations for Tumor Attribute Classification from Pathology Reports with Limited Labeled Data\nAbstract: Precision medicine has the potential to revolutionize healthcare, but much of the data for patients is locked away in unstructured free-text, limiting research and delivery of effective personalized treatments. Generating large annotated datasets for information extraction from clinical notes is often challenging and expensive due to the high level of expertise needed for high quality annotations. To enable natural language processing for small dataset sizes, we develop a novel enriched hierarchical annotation scheme and algorithm, Supervised Line Attention (SLA), and apply this algorithm to predicting categorical tumor attributes from kidney and colon cancer pathology reports from the University of California San Francisco (UCSF). Whereas previous work only annotated document level labels, we in addition ask the annotators to enrich the traditional label by asking them to also highlight the relevant line or potentially lines for the final label, which leads to a 20% increase of annotation time required per document. With the enriched annotations, we develop a simple and interpretable machine learning algorithm that first predicts the relevant lines in the document and then predicts the tumor attribute. Our results show across the small dataset sizes of 32, 64, 128, and 186 labeled documents per cancer, SLA only requires half the number of labeled documents as state-of-the-art methods to achieve similar or better micro-f1 and macro-f1 scores for the vast majority of comparisons that we made. Accounting for the increased annotation time, this leads to a 40% reduction in total annotation time over the state of the art.", "label": 1, "field": "cs"} {"text": "Title: Atomistic modelling of near-crack-tip plasticity\nAbstract: An atomistic model of near-crack-tip plasticity on a square lattice under anti-plane shear kinematics is formulated and studied. The model is based upon a new geometric and functional framework of a lattice manifold complex, which ensures that the crack surface is fully taken into account, while preserving the crucial notion of duality. As a result, existence of locally stable equilibrium configurations containing both a crack opening and dislocations is established. Notably, with the boundary in the form of a crack surface accounted for, no minimum separation between a dislocation core and the crack surface or the crack tip is required. The work presented here constitutes a foundation for several further studies aiming to put the phenomenon of near-crack-tip plasticity on a rigorous footing.", "label": 1, "field": "math"} {"text": "Title: A study in sums of products\nAbstract: We give a general version of cancellation in exponential sums that arise as sums of products of trace functions satisfying a suitable independence condition related to the Goursat-Kolchin-Ribet criterion, in a form that is easily applicable in analytic number theory.", "label": 1, "field": "math"} {"text": "Title: The Impact of Distance on Performance and Scalability of Distributed Database Systems in Hybrid Clouds\nAbstract: The increasing need for managing big data has led the emergence of advanced database management systems. There has been increased efforts aimed at evaluating the performance and scalability of NoSQL and Relational databases hosted by either private or public cloud datacenters. However, there has been little work on evaluating the performance and scalability of these databases in hybrid clouds, where the distance between private and public cloud datacenters can be one of the key factors that can affect their performance. Hence, in this paper, we present a detailed evaluation of throughput, scalability, and VMs size vs. VMs number for six modern databases in a hybrid cloud, consisting of a private cloud in Adelaide and Azure based datacenter in Sydney, Mumbai, and Virginia regions. Based on results, as the distance between private and public clouds increases, the throughput performance of most databases reduces. Second, MongoDB obtains the best throughput performance, followed by MySQL C luster, whilst Cassandra exposes the most fluctuation in through performance. Third, vertical scalability improves the throughput of databases more than the horizontal scalability. Forth, exploiting bigger VMs rather than more VMs with less cores can increase throughput performance for Cassandra, Riak, and Redis.", "label": 1, "field": "cs"} {"text": "Title: Gradient Methods Never Overfit On Separable Data\nAbstract: A line of recent works established that when training linear predictors over separable data, using gradient methods and exponentially-tailed losses, the predictors asymptotically converge in direction to the max-margin predictor. As a consequence, the predictors asymptotically do not overfit. However, this does not address the question of whether overfitting might occur non-asymptotically, after some bounded number of iterations. In this paper, we formally show that standard gradient methods (in particular, gradient flow, gradient descent and stochastic gradient descent) never overfit on separable data: If we run these methods for $T$ iterations on a dataset of size $m$, both the empirical risk and the generalization error decrease at an essentially optimal rate of $\\tilde{\\mathcal{O}}(1/\\gamma^2 T)$ up till $T\\approx m$, at which point the generalization error remains fixed at an essentially optimal level of $\\tilde{\\mathcal{O}}(1/\\gamma^2 m)$ regardless of how large $T$ is. Along the way, we present non-asymptotic bounds on the number of margin violations over the dataset, and prove their tightness.", "label": 1, "field": "cs"} {"text": "Title: A-infinity algebras, modules and functor categories\nAbstract: In this survey, we first present basic facts on A-infinity algebras and modules including their use in describing triangulated categories. Then we describe the Quillen model approach to A-infinity structures following K. Lefevre's thesis. Finally, starting from an idea of V. Lyubashenko's, we give a conceptual construction of A-infinity functor categories using a suitable closed monoidal category of cocategories. In particular, this yields a natural construction of the bialgebra structure on the bar construction of the Hochschild complex of an associative algebra.", "label": 1, "field": "math"} {"text": "Title: Byzantine-Resilient Gradient Coding through Local Gradient Computations\nAbstract: We consider gradient coding in the presence of an adversary controlling so-called malicious workers trying to corrupt the computations. Previous works propose the use of MDS codes to treat the responses from malicious workers as errors and correct them using the error-correction properties of the code. This comes at the expense of increasing the replication, i.e., the number of workers each partial gradient is computed by. In this work, we propose a way to reduce the replication to $s+1$ instead of $2s+1$ in the presence of $s$ malicious workers. Our method detects erroneous inputs from the malicious workers, transforming them into erasures. This comes at the expense of $s$ additional local computations at the main node and additional rounds of light communication between the main node and the workers. We define a general framework and give fundamental limits for fractional repetition data allocations. Our scheme is optimal in terms of replication and local computation and incurs a communication cost that is asymptotically, in the size of the dataset, a multiplicative factor away from the derived bound. We furthermore show how additional redundancy can be exploited to reduce the number of local computations and communication cost, or, alternatively, tolerate straggling workers.", "label": 0, "field": "cs"} {"text": "Title: Proof of Halin's normal spanning tree conjecture\nAbstract: Halin conjectured 20 years ago that a graph has a normal spanning tree if and only if every minor of it has countable colouring number. We prove Halin's conjecture. This implies a forbidden minor characterisation for the property of having a normal spanning tree.", "label": 1, "field": "math"} {"text": "Title: A determinantal formula for orthosymplectic Schur functions\nAbstract: We prove a new determinantal formula for the characters of irreducible representations of orthosymplectic Lie superalgebras analogous to the formula developed by Moens and Jeugt (J. Algebraic Combin., 2003) for general linear Lie superalgebras. Our proof uses the Jacobi--Trudi type formulas for orthosymplectic characters. As a consequence, we show that the odd symplectic characters introduced by Proctor (Invent. Math., 1988) are the same as the orthosymplectic characters with some specialized indeterminates. We also give a generalization of an odd symplectic character identity due to Brent, Krattenthaler and Warnaar (J. Combin. Theory Ser. A, 2016).", "label": 0, "field": "math"} {"text": "Title: Dimension-Minimality and Primality of Counter Nets\nAbstract: A $k$-Counter Net ($k$-CN) is a finite-state automaton equipped with $k$ integer counters that are not allowed to become negative, but do not have explicit zero tests. This language-recognition model can be thought of as labelled vector addition systems with states, some of which are accepting. Certain decision problems for $k$-CNs become easier, or indeed decidable, when the dimension $k$ is small. Yet, little is known about the effect that the dimension $k$ has on the class of languages recognised by $k$-CNs. Specifically, it would be useful if we could simplify algorithmic reasoning by reducing the dimension of a given CN. To this end, we introduce the notion of dimension-primality for $k$-CN, whereby a $k$-CN is prime if it recognises a language that cannot be decomposed into a finite intersection of languages recognised by $d$-CNs, for some $d0$ and we discuss both soft-sphere models (with a pressure term penalizing the overlap of the particles) and hard-sphere models (in which overlap is prohibited). The first case leads to so-called ``blob models\" which have received some attention recently as a tool to approximate non-linear diffusion by particle systems. The hard-sphere model is similar to a classical model for congested crowd motion. We review well-posedness results for these models and discuss their relationship to classical continuum description of aggregation-diffusion phenomena in the limit $\\delta\\to0$: the classical nonlinear drift diffusion equation and its incompressible counterpart. In the second part of the paper, we discuss recent results on the emergence and evolution of sharp interfaces when a large population of particles is considered at appropriate space and time scales: At some intermediate time scale, phase separation occurs and a sharp interface appears which evolves according to a Stefan free boundary problem (and the density function eventually relaxes to a characteristic function - metastable steady state for the original problem). At a larger time scale the attractive forces lead to surface tension phenomena and the evolution of the sharp interface can be described by a Hele-Shaw free boundary problem with surface tension. At that same time scale, we will also discuss the emergence of contact angle conditions for problems set in bounded domains.", "label": 0, "field": "math"} {"text": "Title: An almost linear time algorithm testing whether the Markoff graph modulo $p$ is connected\nAbstract: The Markoff graph modulo $p$ is known to be connected for all but finitely many primes $p$ (see Eddy, Fuchs, Litman, Martin, Tripeny, and Vanyo [arxiv:2308.07579]), and it is conjectured that these graphs are connected for all primes. In this paper, we provide an algorithmic realization of the process introduced by Bourgain, Gamburd, and Sarnak [arxiv:1607.01530] to test whether a Markoff graph modulo $p$ is connected for arbitrary primes. Our algorithm runs in $o(p^{1 + \\epsilon})$ time for every $\\epsilon > 0$. We demonstrate this algorithm by confirming that the Markoff graph modulo $p$ is connected for all primes less than one million.", "label": 0, "field": "math"} {"text": "Title: Contravariant Pseudo-Hessian manifolds and their associated Poisson structures\nAbstract: A contravariant pseudo-Hessian manifold is a manifold $M$ endowed with a pair $(\\nabla,h)$ where $\\nabla$ is a flat connection and $h$ is a symmetric bivector field satisfying a contravariant Codazzi equation. When $h$ is invertible we recover the known notion of pseudo-Hessian manifold. Contravariant pseudo-Hessian manifolds have properties similar to Poisson manifolds and, in fact, to any contravariant pseudo-Hessian manifold $(M,\\nabla,h)$ we associate naturally a Poisson tensor on $TM$. We investigate these properties and we study in details many classes of such structures in order to highlight the richness of the geometry of these manifolds.", "label": 1, "field": "math"} {"text": "Title: Covariant Dirac Operators on Quantum Groups\nAbstract: We give a construction of a Dirac operator on a quantum group based on any simple Lie algebra of classical type. The Dirac operator is an element in the vector space $U_q(\\g) \\otimes \\mathrm{cl}_q(\\g)$ where the second tensor factor is a $q$-deformation of the classical Clifford algebra. The tensor space $ U_q(\\g) \\otimes \\mathrm{cl}_q(\\g)$ is given a structure of the adjoint module of the quantum group and the Dirac operator is invariant under this action. The purpose of this approach is to construct equivariant Fredholm modules and $K$-homology cycles. This work generalizes the operator introduced by Bibikov and Kulish in \\cite{BK}.", "label": 1, "field": "math"} {"text": "Title: Properties of Mean Value Sets: Angle Conditions, Blowup Solutions, and Nonconvexity\nAbstract: We study the mean values sets of the second order divergence form elliptic operator with principal coefficients defined as $$a^{ij}_k(x):= \\begin{cases} \\alpha_k \\delta^{ij}(x) &x_n>0 \\beta_k \\delta^{ij}(x) &x_n<0. \\end{cases}$$ In particular, we will show that the mean value sets associated to such an operator need not be convex as $\\alpha_k$ and $\\beta_k$ converge to 1. This example then leads to an example of nonconvex mean value sets for smooth $a^{ij}(x)$.", "label": 1, "field": "math"} {"text": "Title: Estimation of the incubation time distribution in the singly and doubly interval censored model\nAbstract: We analyze nonparametric estimators for the distribution function of the incubation time in the singly and doubly interval censoring model. The classical approach is to use parametric families like Weibull, log-normal or gamma distributions in the estimation procedure. We propose nonparametric estimates which stay closer to the data than the classical parametric methods. We also give explicit limit distributions for discrete versions of the models and apply this to compute confidence intervals. The methods complement the analysis of the continuous model. R scripts for computation of the estimates are provided on https://github.com/pietg/incubationtime.", "label": 0, "field": "math"} {"text": "Title: Improved estimators in Bell regression model with application\nAbstract: In this paper, we propose the application of shrinkage strategies to estimate coefficients in the Bell regression models when prior information about the coefficients is available. The Bell regression models are well-suited for modeling count data with multiple covariates. Furthermore, we provide a detailed explanation of the asymptotic properties of the proposed estimators, including asymptotic biases and mean squared errors. To assess the performance of the estimators, we conduct numerical studies using Monte Carlo simulations and evaluate their simulated relative efficiency. The results demonstrate that the suggested estimators outperform the unrestricted estimator when prior information is taken into account. Additionally, we present an empirical application to demonstrate the practical utility of the suggested estimators.", "label": 0, "field": "math"} {"text": "Title: Inherently robust suboptimal MPC for autonomous racing with anytime feasible SQP\nAbstract: In recent years, the increasing need for high-performance controllers in applications like autonomous driving has motivated the development of optimization routines tailored to specific control problems. In this paper, we propose an efficient inexact model predictive control (MPC) strategy for autonomous miniature racing with inherent robustness properties. We rely on a feasible sequential quadratic programming (SQP) algorithm capable of generating feasible intermediate iterates such that the solver can be stopped after any number of iterations, without jeopardizing recursive feasibility. In this way, we provide a strategy that computes suboptimal and yet feasible solutions with a computational footprint that is much lower than state-of-the-art methods based on the computation of locally optimal solutions. Under suitable assumptions on the terminal set and on the controllability properties of the system, we can state that, for any sufficiently small disturbance affecting the system's dynamics, recursive feasibility can be guaranteed. We validate the effectiveness of the proposed strategy in simulation and by deploying it onto a physical experiment with autonomous miniature race cars. Both the simulation and experimental results demonstrate that, using the feasible SQP method, a feasible solution can be obtained with moderate additional computational effort compared to strategies that resort to early termination without providing a feasible solution. At the same time, the proposed method is significantly faster than the state-of-the-art solver Ipopt.", "label": 0, "field": "math"} {"text": "Title: Fundamental Theorem of Projective Geometry over Semirings\nAbstract: We state the fundamental theorem of projective geometry for semimodules over semirings, which is facilitated by recent work in the study of bases in semimodules defined over semirings. In the process we explore in detail the linear algebra setup over semirings. We also provide more explicit results to understand the implications of our main theorem on maps between tropical lines in the tropical plane. Along with this we also look at geometrical connections to the rich theory of tropical geometry", "label": 1, "field": "math"} {"text": "Title: On the joint distributions of succession and Eulerian statistics\nAbstract: The motivation of this paper is to investigate the joint distribution of succession and Eulerian statistics. We first investigate the enumerators for the joint distribution of descents, big ascents and successions over all permutations in the symmetric group. As an generalization a result of Diaconis-Evans-Graham (Adv. in Appl. Math., 61 (2014), 102--124), we show that two triple set-valued statistics of permutations are equidistributed on symmetric groups. We then introduce the definition of proper left-to-right minimum. We discover that the joint distribution of the succession and proper left-to-right minimum statistics over permutations is a symmetric distribution. In the final part, we discuss the relationship between the fix and cyc (p,q)-Eulerian polynomials and the joint distribution of succession and several Eulerian-type statistics.", "label": 0, "field": "math"} {"text": "Title: On the Structure of Boolean Functions with Small Spectral Norm\nAbstract: In this paper we prove results regarding Boolean functions with small spectral norm (the spectral norm of f is $\\|\\hat{f}\\|_1=\\sum_{\\alpha}|\\hat{f}(\\alpha)|$). Specifically, we prove the following results for functions $f:\\{0,1\\}^n \\to \\{0,1\\}$ with $\\|\\hat{f}\\|_1=A$. 1. There is a subspace $V$ of co-dimension at most $A^2$ such that $f|_V$ is constant. 2. f can be computed by a parity decision tree of size $2^{A^2}n^{2A}$. (a parity decision tree is a decision tree whose nodes are labeled with arbitrary linear functions.) 3. If in addition f has at most s nonzero Fourier coefficients, then f can be computed by a parity decision tree of depth $A^2 \\log s$. 4. For every $0<\\epsilon$ there is a parity decision tree of depth $O(A^2 + \\log(1/\\epsilon))$ and size $2^{O(A^2)} \\cdot \\min\\{1/\\epsilon^2,O(\\log(1/\\epsilon))^{2A}\\}$ that \\epsilon-approximates f. Furthermore, this tree can be learned, with probability $1-\\delta$, using $\\poly(n,\\exp(A^2),1/\\epsilon,\\log(1/\\delta))$ membership queries. All the results above also hold (with a slight change in parameters) to functions $f:Z_p^n\\to \\{0,1\\}$.", "label": 1, "field": "cs"} {"text": "Title: Runs in Sequences of Random Ordered Variables\nAbstract: We determine the distributions of lengths of runs in sequences of random elements from a total or partial order. In particular, we derive formulas for the expected value, variance, and probability generating function (PGF) of such lengths in the case of total orders (focusing on distributions with atoms). To do this, we define novel generating functions associated with a measure on an order. These generating functions behave nicely when splitting and combining measures on orders allowing us to solve the case of total orders.", "label": 0, "field": "math"} {"text": "Title: First order sensitivity analysis of symplectic eigenvalues\nAbstract: For every $2n \\times 2n$ positive definite matrix $A$ there are $n$ positive numbers $d_1(A) \\leq \\ldots \\leq d_n(A)$ associated with $A$ called the symplectic eigenvalues of $A.$ It is known that $d_m$ are continuous functions of $A$ but are not differentiable in general. In this paper, we show that the directional derivative of $d_m$ exists and derive its expression. We also discuss various subdifferential properties of $d_m$ such as Clarke and Michel-Penot subdifferentials.", "label": 1, "field": "math"} {"text": "Title: Recursive Monte Carlo and Variational Inference with Auxiliary Variables\nAbstract: A key design constraint when implementing Monte Carlo and variational inference algorithms is that it must be possible to cheaply and exactly evaluate the marginal densities of proposal distributions and variational families. This takes many interesting proposals off the table, such as those based on involved simulations or stochastic optimization. This paper broadens the design space, by presenting a framework for applying Monte Carlo and variational inference algorithms when proposal densities cannot be exactly evaluated. Our framework, recursive auxiliary-variable inference (RAVI), instead approximates the necessary densities using meta-inference: an additional layer of Monte Carlo or variational inference, that targets the proposal, rather than the model. RAVI generalizes and unifies several existing methods for inference with expressive approximating families, which we show correspond to specific choices of meta-inference algorithm, and provides new theory for analyzing their bias and variance. We illustrate RAVI's design framework and theorems by using them to analyze and improve upon Salimans et al.'s Markov Chain Variational Inference, and to design a novel sampler for Dirichlet process mixtures, achieving state-of-the-art results on a standard benchmark dataset from astronomy and on a challenging datacleaning task with Medicare hospital data.", "label": 1, "field": "cs"} {"text": "Title: Network Structure, Efficiency, and Performance in WikiProjects\nAbstract: The internet has enabled collaborations at a scale never before possible, but the best practices for organizing such large collaborations are still not clear. Wikipedia is a visible and successful example of such a collaboration which might offer insight into what makes large-scale, decentralized collaborations successful. We analyze the relationship between the structural properties of WikiProject coeditor networks and the performance and efficiency of those projects. We confirm the existence of an overall performance-efficiency trade-off, while observing that some projects are higher than others in both performance and efficiency, suggesting the existence factors correlating positively with both. Namely, we find an association between low-degree coeditor networks and both high performance and high efficiency. We also confirm results seen in previous numerical and small-scale lab studies: higher performance with less skewed node distributions, and higher performance with shorter path lengths. We use agent-based models to explore possible mechanisms for degree-dependent performance and efficiency. We present a novel local-majority learning strategy designed to satisfy properties of real-world collaborations. The local-majority strategy as well as a localized conformity-based strategy both show degree-dependent performance and efficiency, but in opposite directions, suggesting that these factors depend on both network structure and learning strategy. Our results suggest possible benefits to decentralized collaborations made of smaller, more tightly-knit teams, and that these benefits may be modulated by the particular learning strategies in use.", "label": 1, "field": "cs"} {"text": "Title: Schwartz $\u03ba$-densities for the moduli stack of rank $2$ bundles on a curve over a local field\nAbstract: Let $\\rm{Bun}$ be the moduli stack of rank $2$ bundles with fixed determinant on a smooth proper curve $C$ over a local field $F$. We show how to associate with a Schwartz $\\kappa$-density, for $\\rm{Re}(\\kappa)\\ge 1/2$, a smooth function on the corresponding coarse moduli space of very stable bundles. In the non-archimedean case we also prove that the stack $\\rm{Bun}$ is $\\kappa$-bounded in the sense of Definition 2.10 of [arXiv:2112.08139] for any $\\kappa\\in\\mathbb{C}$.", "label": 0, "field": "math"} {"text": "Title: $q$-deformation of Aomoto complex\nAbstract: A degree one element of the Orlik-Solomon algebra of a hyperplane arrangement defines a cochain complex known as the Aomoto complex. The Aomoto complex can be considerd as the ``linear approximation'' of the twisted cochain complex with coefficients in a complex rank one local system. In this paper, we discuss $q$-deformations of the Aomoto complex. The $q$-deformation is defined by replacing the entries of representation matrices of the coboundary maps with their $q$-analogues. While the resulting maps do not generally define cochain complexes, for certain special basis derived from real structures, the $q$-deformation becomes again a cochain complex. Moreover, it exhibits universality in the sense that any specialization of $q$ to a complex number yields the cochain complex computing the corresponding local system cohomology group.", "label": 0, "field": "math"} {"text": "Title: Frequency-Adaptive Pan-Sharpening with Mixture of Experts\nAbstract: Pan-sharpening involves reconstructing missing high-frequency information in multi-spectral images with low spatial resolution, using a higher-resolution panchromatic image as guidance. Although the inborn connection with frequency domain, existing pan-sharpening research has not almost investigated the potential solution upon frequency domain. To this end, we propose a novel Frequency Adaptive Mixture of Experts (FAME) learning framework for pan-sharpening, which consists of three key components: the Adaptive Frequency Separation Prediction Module, the Sub-Frequency Learning Expert Module, and the Expert Mixture Module. In detail, the first leverages the discrete cosine transform to perform frequency separation by predicting the frequency mask. On the basis of generated mask, the second with low-frequency MOE and high-frequency MOE takes account for enabling the effective low-frequency and high-frequency information reconstruction. Followed by, the final fusion module dynamically weights high-frequency and low-frequency MOE knowledge to adapt to remote sensing images with significant content variations. Quantitative and qualitative experiments over multiple datasets demonstrate that our method performs the best against other state-of-the-art ones and comprises a strong generalization ability for real-world scenes. Code will be made publicly at \\url{https://github.com/alexhe101/FAME-Net}.", "label": 0, "field": "cs"} {"text": "Title: Constant Step Size Least-Mean-Square: Bias-Variance Trade-offs and Optimal Sampling Distributions\nAbstract: We consider the least-squares regression problem and provide a detailed asymptotic analysis of the performance of averaged constant-step-size stochastic gradient descent (a.k.a. least-mean-squares). In the strongly-convex case, we provide an asymptotic expansion up to explicit exponentially decaying terms. Our analysis leads to new insights into stochastic approximation algorithms: (a) it gives a tighter bound on the allowed step-size; (b) the generalization error may be divided into a variance term which is decaying as O(1/n), independently of the step-size $\\gamma$, and a bias term that decays as O(1/$\\gamma$ 2 n 2); (c) when allowing non-uniform sampling, the choice of a good sampling density depends on whether the variance or bias terms dominate. In particular, when the variance term dominates, optimal sampling densities do not lead to much gain, while when the bias term dominates, we can choose larger step-sizes that leads to significant improvements.", "label": 1, "field": "cs"} {"text": "Title: Subgroups of bounded rank in hyperbolic 3-manifold groups\nAbstract: We prove a finiteness theorem for subgroups of bounded rank in hyperbolic $3$-manifold groups. As a consequence, we show that every bounded rank covering tower of closed hyperbolic $3$-manifolds is a tower of finite covers associated to a fibration over a $1$-orbifold.", "label": 0, "field": "math"} {"text": "Title: Frechet differentiability of the metric projection operator in Banach spaces\nAbstract: In this paper, we prove Frechet differentiability of the metric projection operator onto closed balls, closed and convex cylinders and positives cones in uniformly convex and uniformly smooth Banach spaces. With respect to these closed and convex subsets, we find the exact expressions for Frechet derivatives and Gateaux directional derivatives of the metric projection operator.", "label": 0, "field": "math"} {"text": "Title: Basmajian-type identities and Hausdorff dimension of limit sets\nAbstract: In this paper, we study Basmajian-type series identities on holomorphic families of Cantor sets associated to one-dimensional complex dynamical systems. We show that the series is absolutely summable if and only if the Hausdorff dimension of the Cantor set is strictly less than one. Throughout the domain of convergence, these identities can be analytically continued and they exhibit nontrivial monodromy.", "label": 1, "field": "math"} {"text": "Title: Integrated Sensing and Communication with Massive MIMO: A Unified Tensor Approach for Channel and Target Parameter Estimation\nAbstract: Benefitting from the vast spatial degrees of freedom, the amalgamation of integrated sensing and communication (ISAC) and massive multiple-input multiple-output (MIMO) is expected to simultaneously improve spectral and energy efficiencies as well as the sensing capability. However, a large number of antennas deployed in massive MIMO-ISAC raises critical challenges in acquiring both accurate channel state information and target parameter information. To overcome these two challenges with a unified framework, we first analyze their underlying system models and then propose a novel tensor-based approach that addresses both the channel estimation and target sensing problems. Specifically, by parameterizing the high-dimensional communication channel exploiting a small number of physical parameters, we associate the channel state information with the sensing parameters of targets in terms of angular, delay, and Doppler dimensions. Then, we propose a shared training pattern adopting the same time-frequency resources such that both the channel estimation and target parameter estimation can be formulated as a canonical polyadic decomposition problem with a similar mathematical expression. On this basis, we first investigate the uniqueness condition of the tensor factorization and the maximum number of resolvable targets by utilizing the specific Vandermonde", "label": 0, "field": "cs"} {"text": "Title: On the boundary of the central quadratic hyperbolic component\nAbstract: We give a concrete description for the boundary of the central quadratic hyperbolic component. The connectedness of the Julia sets of the boundary maps are also considered.", "label": 0, "field": "math"} {"text": "Title: Mechanizing the Metatheory of LF\nAbstract: LF is a dependent type theory in which many other formal systems can be conveniently embedded. However, correct use of LF relies on nontrivial metatheoretic developments such as proofs of correctness of decision procedures for LF's judgments. Although detailed informal proofs of these properties have been published, they have not been formally verified in a theorem prover. We have formalized these properties within Isabelle/HOL using the Nominal Datatype Package, closely following a recent article by Harper and Pfenning. In the process, we identified and resolved a gap in one of the proofs and a small number of minor lacunae in others. We also formally derive a version of the type checking algorithm from which Isabelle/HOL can generate executable code. Besides its intrinsic interest, our formalization provides a foundation for studying the adequacy of LF encodings, the correctness of Twelf-style metatheoretic reasoning, and the metatheory of extensions to LF.", "label": 1, "field": "cs"} {"text": "Title: Learning Traffic Speed Dynamics from Visualizations\nAbstract: Space-time visualizations of macroscopic or microscopic traffic variables is a qualitative tool used by traffic engineers to understand and analyze different aspects of road traffic dynamics. We present a deep learning method to learn the macroscopic traffic speed dynamics from these space-time visualizations, and demonstrate its application in the framework of traffic state estimation. Compared to existing estimation approaches, our approach allows a finer estimation resolution, eliminates the dependence on the initial conditions, and is agnostic to external factors such as traffic demand, road inhomogeneities and driving behaviors. Our model respects causality in traffic dynamics, which improves the robustness of estimation. We present the high-resolution traffic speed fields estimated for several freeway sections using the data obtained from the Next Generation Simulation Program (NGSIM) and German Highway (HighD) datasets. We further demonstrate the quality and utility of the estimation by inferring vehicle trajectories from the estimated speed fields, and discuss the benefits of deep neural network models in approximating the traffic dynamics.", "label": 1, "field": "cs"} {"text": "Title: Shayona@SMM4H23: COVID-19 Self diagnosis classification using BERT and LightGBM models\nAbstract: This paper describes approaches and results for shared Task 1 and 4 of SMMH4-23 by Team Shayona. Shared Task-1 was binary classification of english tweets self-reporting a COVID-19 diagnosis, and Shared Task-4 was Binary classification of English Reddit posts self-reporting a social anxiety disorder diagnosis. Our team has achieved the highest f1-score 0.94 in Task-1 among all participants. We have leveraged the Transformer model (BERT) in combination with the LightGBM model for both tasks.", "label": 0, "field": "cs"} {"text": "Title: Continual Learning: Forget-free Winning Subnetworks for Video Representations\nAbstract: Inspired by the Lottery Ticket Hypothesis (LTH), which highlights the existence of efficient subnetworks within larger, dense networks, a high-performing Winning Subnetwork (WSN) in terms of task performance under appropriate sparsity conditions is considered for various continual learning tasks. It leverages pre-existing weights from dense networks to achieve efficient learning in Task Incremental Learning (TIL) scenarios. In Few-Shot Class Incremental Learning (FSCIL), a variation of WSN referred to as the Soft subnetwork (SoftNet) is designed to prevent overfitting when the data samples are scarce. Furthermore, the sparse reuse of WSN weights is considered for Video Incremental Learning (VIL). The use of Fourier Subneural Operator (FSO) within WSN is considered. It enables compact encoding of videos and identifies reusable subnetworks across varying bandwidths. We have integrated FSO into different architectural frameworks for continual learning, including VIL, TIL, and FSCIL. Our comprehensive experiments demonstrate FSO's effectiveness, significantly improving task performance at various convolutional representational levels. Specifically, FSO enhances higher-layer performance in TIL and FSCIL and lower-layer performance in VIL", "label": 0, "field": "cs"} {"text": "Title: Quasi-invariant theorem on the Gaussian path space\nAbstract: In this article, we will first introduce a class of Gaussian processes, and prove the quasi-invariant theorem with respect to the Gaussian Wiener measure, which is the law of the associated Gaussian process. In particular, it includes the case of the fractional Brownian motion. As applications, we will establish the integration by parts formula and Bismut-Elworthy-Li formula on the Gaussian path space, and by which some logarithmic Sobolev inequalities will be presented. Moreover, we will also provides some applications in the field of financial mathematics.", "label": 0, "field": "math"} {"text": "Title: Borel structurability on the 2-shift of a countable group\nAbstract: We show that for any infinite countable group $G$ and for any free Borel action $G \\curvearrowright X$ there exists an equivariant class-bijective Borel map from $X$ to the free part $\\mathrm{Free}(2^G)$ of the $2$-shift $G \\curvearrowright 2^G$. This implies that any Borel structurability which holds for the equivalence relation generated by $G \\curvearrowright \\mathrm{Free}(2^G)$ must hold a fortiori for all equivalence relations coming from free Borel actions of $G$. A related consequence is that the Borel chromatic number of $\\mathrm{Free}(2^G)$ is the maximum among Borel chromatic numbers of free actions of $G$. This answers a question of Marks. Our construction is flexible and, using an appropriate notion of genericity, we are able to show that in fact the generic $G$-equivariant map to $2^G$ lands in the free part. As a corollary we obtain that for every $\\epsilon > 0$, every free pmp action of $G$ has a free factor which admits a $2$-piece generating partition with Shannon entropy less than $\\epsilon$. This generalizes a result of Danilenko and Park.", "label": 1, "field": "math"} {"text": "Title: Stochastic Approach for Price Optimization Problems with Decision-dependent Uncertainty\nAbstract: Price determination is a central research topic of revenue management in marketing. The important aspect in pricing is controlling the stochastic behavior of demand, and the previous studies have tackled price optimization problems with uncertainties. However, many of those studies assumed that uncertainties are independent of decision variables (i.e., prices) and did not consider situations where demand uncertainty depends on price. Although some price optimization studies have dealt with decision-dependent uncertainty, they make application-specific assumptions in order to obtain an optimal solution or an approximation solution. To handle a wider range of applications with decision-dependent uncertainty, we propose a general non-convex stochastic optimization formulation. This approach aims to maximize the expectation of a revenue function with respect to a random variable representing demand under a decision-dependent distribution. We derived an unbiased stochastic gradient estimator by using a well-tuned variance reduction parameter and used it for a projected stochastic gradient descent method to find a stationary point of our problem. We conducted synthetic experiments and simulation experiments with real data on a retail service application. The results show that the proposed method outputs solutions with higher total revenues than baselines.", "label": 0, "field": "math"} {"text": "Title: An infinite family of counterexamples to a conjecture on distance magic labeling\nAbstract: This work is about a partition problem which is an instance of the distance magic graph labeling problem. Given positive integers $n,k$ and $p_1\\le p_2\\le \\cdots\\le p_k$ such that $p_1+\\cdots+p_k=n$ and $k$ divides $\\sum_{i=1}^ni$, we study the problem of characterizing the cases where it is possible to find a partition of the set $\\{1,2,\\ldots,n\\}$ into $k$ subsets of respective sizes $p_1,\\dots,p_k$, such that the element sum in each subset is equal. Using a computerized search we found examples showing that the necessary condition, $\\sum_{i=1}^{p_1+\\cdots+p_j} (n-i+1)\\ge j{\\binom{n+1}{2}}/k$ for all $j=1,\\ldots,k$, is not generally sufficient, refuting a past conjecture. Moreover, we show that there are infinitely many such counter-examples. The question whether there is a simple characterization is left open and for all we know the corresponding decision problem might be NP-complete.", "label": 0, "field": "math"} {"text": "Title: Multi-stages attention Breast cancer classification based on nonlinear spiking neural P neurons with autapses\nAbstract: Breast cancer(BC) is a prevalent type of malignant tumor in women. Early diagnosis and treatment are vital for enhancing the patients' survival rate. Downsampling in deep networks may lead to loss of information, so for compensating the detail and edge information and allowing convolutional neural networks to pay more attention to seek the lesion region, we propose a multi-stages attention architecture based on NSNP neurons with autapses. First, unlike the single-scale attention acquisition methods of existing methods, we set up spatial attention acquisition at each feature map scale of the convolutional network to obtain an fusion global information on attention guidance. Then we introduce a new type of NSNP variants called NSNP neurons with autapses. Specifically, NSNP systems are modularized as feature encoders, recoding the features extracted from convolutional neural network as well as the fusion of attention information and preserve the key characteristic elements in feature maps. This ensures the retention of valuable data while gradually transforming high-dimensional complicated info into low-dimensional ones. The proposed method is evaluated on the public dataset BreakHis at various magnifications and classification tasks. It achieves a classification accuracy of 96.32% at all magnification cases, outperforming state-of-the-art methods. Ablation studies are also performed, verifying the proposed model's efficacy. The source code is available at XhuBobYoung/Breast-cancer-Classification.", "label": 0, "field": "cs"} {"text": "Title: Variational Autoencoders Without the Variation\nAbstract: Variational autoencdoers (VAE) are a popular approach to generative modelling. However, exploiting the capabilities of VAEs in practice can be difficult. Recent work on regularised and entropic autoencoders have begun to explore the potential, for generative modelling, of removing the variational approach and returning to the classic deterministic autoencoder (DAE) with additional novel regularisation methods. In this paper we empirically explore the capability of DAEs for image generation without additional novel methods and the effect of the implicit regularisation and smoothness of large networks. We find that DAEs can be used successfully for image generation without additional loss terms, and that many of the useful properties of VAEs can arise implicitly from sufficiently large convolutional encoders and decoders when trained on CIFAR-10 and CelebA.", "label": 1, "field": "cs"} {"text": "Title: Extremal results for odd cycles in sparse pseudorandom graphs\nAbstract: We consider extremal problems for subgraphs of pseudorandom graphs. For graphs $F$ and $\\Gamma$ the generalized Tur\\'an density $\\pi_F(\\Gamma)$ denotes the density of a maximum subgraph of $\\Gamma$, which contains no copy of~$F$. Extending classical Tur\\'an type results for odd cycles, we show that $\\pi_{F}(\\Gamma)=1/2$ provided $F$ is an odd cycle and $\\Gamma$ is a sufficiently pseudorandom graph. In particular, for $(n,d,\\lambda)$-graphs $\\Gamma$, i.e., $n$-vertex, $d$-regular graphs with all non-trivial eigenvalues in the interval $[-\\lambda,\\lambda]$, our result holds for odd cycles of length $\\ell$, provided \\[ \\lambda^{\\ell-2}\\ll \\frac{d^{\\ell-1}}n\\log(n)^{-(\\ell-2)(\\ell-3)}\\,. \\] Up to the polylog-factor this verifies a conjecture of Krivelevich, Lee, and Sudakov. For triangles the condition is best possible and was proven previously by Sudakov, Szab\\'o, and Vu, who addressed the case when $F$ is a complete graph. A construction of Alon and Kahale (based on an earlier construction of Alon for triangle-free $(n,d,\\lambda)$-graphs) shows that our assumption on $\\Gamma$ is best possible up to the polylog-factor for every odd $\\ell\\geq 5$.", "label": 1, "field": "math"} {"text": "Title: LLM-SAP: Large Language Model Situational Awareness Based Planning\nAbstract: This work pioneers evaluating emergent planning capabilities based on situational awareness in large language models. We contribute (i) novel benchmarks and metrics for standardized assessment; (ii) a unique dataset to spur progress; and (iii) demonstrations that prompting and multi-agent schemes significantly enhance planning performance in context-sensitive planning tasks. Positioning this within a situated agent and automated planning research, we highlight inherent reliability challenges--efficiently mapping world states to actions without environmental guidance remains open despite simulated domain advances. Although out-of-scope, limitations around validation methodology and data availability indicate exciting directions, including fine-tuning on expanded planning corpora and optimizations for triggering fast latent planning. By conclusively demonstrating current methods' promise and limitations via rigorous comparison, we catalyze investigating reliable goal-directed reasoning for situated agents.", "label": 0, "field": "cs"} {"text": "Title: A finite difference scheme for two-dimensional singularly perturbed convection-diffusion problem with discontinuous source term\nAbstract: We propose a finite difference scheme for the numerical solution of a two-dimensional singularly perturbed convection-diffusion partial differential equation whose solution features interacting boundary and interior layers, the latter due to discontinuities in source term. The problem is posed on the unit square. The second derivative is multiplied by a singular perturbation parameter, $\\epsilon$, while the nature of the first derivative term is such that flow is aligned with a boundary. These two facts mean that solutions tend to exhibit layers of both exponential and characteristic type. We solve the problem using a finite difference method, specially adapted to the discontinuities, and applied on a piecewise-uniform (Shishkin). We prove that that the computed solution converges to the true one at a rate that is independent of the perturbation parameter, and is nearly first-order. We present numerical results that verify that these results are sharp.", "label": 0, "field": "math"} {"text": "Title: Simple loops on 2-bridge spheres in Heckoid orbifolds for the trivial knot\nAbstract: In this paper, we give a necessary and sufficient condition for an essential simple loop on a $2$-bridge sphere in an even Heckoid orbifold for the trivial knot to be null-homotopic, peripheral or torsion in the orbifold. We also give a necessary and sufficient condition for two essential simple loops on a $2$-bridge sphere in an even Heckoid orbifold for the trivial knot to be homotopic in the orbifold.", "label": 1, "field": "math"} {"text": "Title: Stability over a predicate and prime closure\nAbstract: We prove that in a theory $T$ stable over a predicate $P$, for any $\\lambda > |T|$, there is a $\\lambda$-prime model over any complete set A with a $\\lambda$-saturated $P$-part.", "label": 0, "field": "math"} {"text": "Title: Holonomic D-modules on abelian varieties\nAbstract: We study the Fourier-Mukai transform for holonomic D-modules on complex abelian varieties. Among other things, we show that the cohomology support loci of a holonomic D-module are finite unions of linear subvarieties, which go through points of finite order for objects of geometric origin; that the standard t-structure on the derived category of holonomic complexes corresponds, under the Fourier-Mukai transform, to a certain perverse coherent t-structure in the sense of Kashiwara and Arinkin-Bezrukavnikov; and that Fourier-Mukai transforms of simple holonomic D-modules are intersection complexes in this t-structure. This supports the conjecture that Fourier-Mukai transforms of holonomic D-modules are \"hyperk\\\"ahler perverse sheaves\".", "label": 1, "field": "math"} {"text": "Title: HCIZ integral formula as unitarity of a canonical map between reproducing kernel spaces\nAbstract: In this article we prove that the Harish-Chandra-Itzykson-Zuber (HCIZ) integral formula is equivalent to the unitarity of a canonical map between invariant subspaces of Segal-Bargmann spaces. As a consequence, we provide alternative proofs of the HCIZ integral and other results.", "label": 0, "field": "math"} {"text": "Title: Foundations and Scoping of Data Science\nAbstract: There has been an increasing recognition of the value of data and of data-based decision making. As a consequence, the development of data science as a field of study has intensified in recent years. However, there is no systematic and comprehensive treatment and understanding of data science. This article describes a systematic and end-to-end framing of the field based on an inclusive definition. It identifies the core components making up the data science ecosystem, presents its lifecycle modeling the development process, and argues its interdisciplinarity.", "label": 0, "field": "cs"} {"text": "Title: Some combinatorial problems arising in the dimer model\nAbstract: We discuss some diverse open problems in the dimer model, motivated by a geometric viewpoint. This is part of a conference proceedings for the OPAC 2022 conference.", "label": 0, "field": "math"} {"text": "Title: Learning Concept Embeddings with Combined Human-Machine Expertise\nAbstract: This paper presents our work on \"SNaCK,\" a low-dimensional concept embedding algorithm that combines human expertise with automatic machine similarity kernels. Both parts are complimentary: human insight can capture relationships that are not apparent from the object's visual similarity and the machine can help relieve the human from having to exhaustively specify many constraints. We show that our SNaCK embeddings are useful in several tasks: distinguishing prime and nonprime numbers on MNIST, discovering labeling mistakes in the Caltech UCSD Birds (CUB) dataset with the help of deep-learned features, creating training datasets for bird classifiers, capturing subjective human taste on a new dataset of 10,000 foods, and qualitatively exploring an unstructured set of pictographic characters. Comparisons with the state-of-the-art in these tasks show that SNaCK produces better concept embeddings that require less human supervision than the leading methods.", "label": 1, "field": "cs"} {"text": "Title: An obstruction relating locally finite polygons to translation quadrangles\nAbstract: One of the most fundamental open problems in Incidence Geometry, posed by Tits in the 1960s, asks for the existence of so-called \"locally finite generalized polygons\" | that is, generalized polygons with \"mixed parameters\" (one being finite and the other not). In a more specialized context, another long-standing problem (from the 1990s) is as to whether the endomorphism ring of any translation generalized quadrangle is a skew field (the answer of which is known in the finite case). (The analogous problem for projective planes, and its positive solution, the \"Bruck-Bose construction,\" lies at the very base of the whole theory of translation planes.) In this short note, we introduce a category, representing certain very specific embeddings of generalized polygons, which surprisingly controls the solution of both (apparently entirely unrelated) problems.", "label": 1, "field": "math"} {"text": "Title: Finiteness conjecture for 3-manifolds obtained from handlebodies by attaching 2-handles\nAbstract: We study a generalized Witten's finiteness conjecture for the skein modules of oriented compact 3-manifolds with boundary. We formulate an equivalent version of the generalized finiteness conjecture using handlebodies and 2-handles, and prove the conjecture for some classes with the handlebodies of genus 2 and 3 using the equivalent version.", "label": 0, "field": "math"} {"text": "Title: Acyclicity of Preferences, Nash Equilibria, and Subgame Perfect Equilibria: a Formal and Constructive Equivalence\nAbstract: In 1953, Kuhn showed that every sequential game has a Nash equilibrium by showing that a procedure, named ``backward induction'' in game theory, yields a Nash equilibrium. It actually yields Nash equilibria that define a proper subclass of Nash equilibria. In 1965, Selten named this proper subclass subgame perfect equilibria. In game theory, payoffs are rewards usually granted at the end of a game. Although traditional game theory mainly focuses on real-valued payoffs that are implicitly ordered by the usual total order over the reals, works of Simon or Blackwell already involved partially ordered payoffs. This paper generalises the notion of sequential game by replacing real-valued payoff functions with abstract atomic objects, called outcomes, and by replacing the usual total order over the reals with arbitrary binary relations over outcomes, called preferences. This introduces a general abstract formalism where Nash equilibrium, subgame perfect equilibrium, and ``backward induction'' can still be defined. This paper proves that the following three propositions are equivalent: 1) Preferences over the outcomes are acyclic. 2) Every sequential game has a Nash equilibrium. 3) Every sequential game has a subgame perfect equilibrium. The result is fully computer-certified using Coq. Beside the additional guarantee of correctness, the activity of formalisation using Coq also helps clearly identify the useful definitions and the main articulations of the proof.", "label": 1, "field": "cs"} {"text": "Title: Efficient UAVs Deployment and Resource Allocation in UAV-Relay Assisted Public Safety Networks for Video Transmission\nAbstract: Wireless communication highly depends on the cellular ground base station (GBS). A failure of the cellular GBS, fully or partially, during natural or man-made disasters creates a communication gap in the disaster-affected areas. In such situations, public safety communication (PSC) can significantly save the national infrastructure, property, and lives. Throughout emergencies, the PSC can provide mission-critical communication and video transmission services in the affected area. Unmanned aerial vehicles (UAVs) as flying base stations (UAV-BSs) are particularly suitable for PSC services as they are flexible, mobile, and easily deployable. This manuscript considers a multi-UAV-assisted PSC network with an observational UAV receiving videos from the affected area's ground users (AGUs) and transmitting them to the nearby GBS via a relay UAV. The objective of the proposed study is to maximize the average utility of the video streams generated by the AGUs upon reaching the GBS. This is achieved by optimizing the positions of the observational and relay UAVs, as well as the distribution of communication resources, such as bandwidth, and transmit power, while satisfying the system-designed constraints, such as transmission rate, rate outage probability, transmit power budget, and available bandwidth. To this end, a joint UAVs placement and resource allocation problem is mathematically formulated. The proposed problem poses a significant challenge for a solution. Considering the block coordinate descent and successive convex approximation techniques, an efficient iterative algorithm is proposed. Finally, simulation results are provided which show that our proposed approach outperforms the existing methods.", "label": 0, "field": "cs"} {"text": "Title: Leveraging SAM for Single-Source Domain Generalization in Medical Image Segmentation\nAbstract: Domain Generalization (DG) aims to reduce domain shifts between domains to achieve promising performance on the unseen target domain, which has been widely practiced in medical image segmentation. Single-source domain generalization (SDG) is the most challenging setting that trains on only one source domain. Although existing methods have made considerable progress on SDG of medical image segmentation, the performances are still far from the applicable standards when faced with a relatively large domain shift. In this paper, we leverage the Segment Anything Model (SAM) to SDG to greatly improve the ability of generalization. Specifically, we introduce a parallel framework, the source images are sent into the SAM module and normal segmentation module respectively. To reduce the calculation resources, we apply a merging strategy before sending images to the SAM module. We extract the bounding boxes from the segmentation module and send the refined version as prompts to the SAM module. We evaluate our model on a classic DG dataset and achieve competitive results compared to other state-of-the-art DG methods. Furthermore, We conducted a series of ablation experiments to prove the effectiveness of the proposed method. The code is publicly available at https://github.com/SARIHUST/SAMMed.", "label": 0, "field": "cs"} {"text": "Title: Emerging Language Spaces Learned From Massively Multilingual Corpora\nAbstract: Translations capture important information about languages that can be used as implicit supervision in learning linguistic properties and semantic representations. In an information-centric view, translated texts may be considered as semantic mirrors of the original text and the significant variations that we can observe across various languages can be used to disambiguate a given expression using the linguistic signal that is grounded in translation. Parallel corpora consisting of massive amounts of human translations with a large linguistic variation can be applied to increase abstractions and we propose the use of highly multilingual machine translation models to find language-independent meaning representations. Our initial experiments show that neural machine translation models can indeed learn in such a setup and we can show that the learning algorithm picks up information about the relation between languages in order to optimize transfer leaning with shared parameters. The model creates a continuous language space that represents relationships in terms of geometric distances, which we can visualize to illustrate how languages cluster according to language families and groups. Does this open the door for new ideas of data-driven language typology with promising models and techniques in empirical cross-linguistic research?", "label": 1, "field": "cs"} {"text": "Title: Learning Pixel Trajectories with Multiscale Contrastive Random Walks\nAbstract: A range of video modeling tasks, from optical flow to multiple object tracking, share the same fundamental challenge: establishing space-time correspondence. Yet, approaches that dominate each space differ. We take a step towards bridging this gap by extending the recent contrastive random walk formulation to much denser, pixel-level space-time graphs. The main contribution is introducing hierarchy into the search problem by computing the transition matrix between two frames in a coarse-to-fine manner, forming a multiscale contrastive random walk when extended in time. This establishes a unified technique for self-supervised learning of optical flow, keypoint tracking, and video object segmentation. Experiments demonstrate that, for each of these tasks, the unified model achieves performance competitive with strong self-supervised approaches specific to that task. Project webpage: https://jasonbian97.github.io/flowwalk", "label": 1, "field": "cs"} {"text": "Title: Dynamically Masked Discriminator for Generative Adversarial Networks\nAbstract: Training Generative Adversarial Networks (GANs) remains a challenging problem. The discriminator trains the generator by learning the distribution of real/generated data. However, the distribution of generated data changes throughout the training process, which is difficult for the discriminator to learn. In this paper, we propose a novel method for GANs from the viewpoint of online continual learning. We observe that the discriminator model, trained on historically generated data, often slows down its adaptation to the changes in the new arrival generated data, which accordingly decreases the quality of generated results. By treating the generated data in training as a stream, we propose to detect whether the discriminator slows down the learning of new knowledge in generated data. Therefore, we can explicitly enforce the discriminator to learn new knowledge fast. Particularly, we propose a new discriminator, which automatically detects its retardation and then dynamically masks its features, such that the discriminator can adaptively learn the temporally-vary distribution of generated data. Experimental results show our method outperforms the state-of-the-art approaches.", "label": 0, "field": "cs"} {"text": "Title: The Art of Deception: Robust Backdoor Attack using Dynamic Stacking of Triggers\nAbstract: The area of Machine Learning as a Service (MLaaS) is experiencing increased implementation due to recent advancements in the AI (Artificial Intelligence) industry. However, this spike has prompted concerns regarding AI defense mechanisms, specifically regarding potential covert attacks from third-party providers that cannot be entirely trusted. Recent research has uncovered that auditory backdoors may use certain modifications as their initiating mechanism. DynamicTrigger is introduced as a methodology for carrying out dynamic backdoor attacks that use cleverly designed tweaks to ensure that corrupted samples are indistinguishable from clean. By utilizing fluctuating signal sampling rates and masking speaker identities through dynamic sound triggers (such as the clapping of hands), it is possible to deceive speech recognition systems (ASR). Our empirical testing demonstrates that DynamicTrigger is both potent and stealthy, achieving impressive success rates during covert attacks while maintaining exceptional accuracy with non-poisoned datasets.", "label": 0, "field": "cs"} {"text": "Title: The distance signatures of the incidence graphs of affine resolvable designs\nAbstract: In this note, we determined the distance signatures of the incidence matrices of affine resolvable designs. This proves a conjecture by Kohei Yamada.", "label": 1, "field": "math"} {"text": "Title: Numerical solution of the Burgers' equation with high order splitting methods\nAbstract: In this work, high order splitting methods have been used for calculating the numerical solutions of the Burgers' equation in one space dimension with periodic and Dirichlet boundary conditions. However, splitting methods with real coefficients of order higher than two necessarily have negative coefficients and can not be used for time-irreversible systems, such as Burgers equations, due to the time-irreversibility of the Laplacian operator. Therefore, the splitting methods with complex coefficients and extrapolation methods with real and positive coefficients have been employed. If we consider the system as the perturbation of an exactly solvable problem(or can be easily approximated numerically), it is possible to employ highly efficient methods to approximate Burgers' equation. The numerical results show that the methods with complex time steps having one set of coefficients real and positive, say $a_i\\in\\mathbb{R}^+$ and $b_i\\in\\mathbb{C}^+$, and high order extrapolation methods derived from a lower order splitting method produce very accurate solutions of the Burgers' equation.", "label": 1, "field": "math"} {"text": "Title: Improving Sequential Query Recommendation with Immediate User Feedback\nAbstract: We propose an algorithm for next query recommendation in interactive data exploration settings, like knowledge discovery for information gathering. The state-of-the-art query recommendation algorithms are based on sequence-to-sequence learning approaches that exploit historical interaction data. Due to the supervision involved in the learning process, such approaches fail to adapt to immediate user feedback. We propose to augment the transformer-based causal language models for query recommendations to adapt to the immediate user feedback using multi-armed bandit (MAB) framework. We conduct a large-scale experimental study using log files from a popular online literature discovery service and demonstrate that our algorithm improves the per-round regret substantially, with respect to the state-of-the-art transformer-based query recommendation models, which do not make use of immediate user feedback. Our data model and source code are available at https://github.com/shampp/exp3_ss", "label": 1, "field": "cs"} {"text": "Title: Distribution of primes represented by polynomials and Multiple Dedekind zeta functions\nAbstract: n this paper, we state several conjectures regarding distribution of primes and of pairs of primes represented by irreducible homogeneous polynomial in two variables $f(a,b)$. We formulate conjectures with respect to the slope $t=b/a$ for any irreducible polynomial $f$. Here, we formulate a conjecture for all irreducible polynomials. We also consider conjectures for distribution of pairs of primes. It show unexpected relation to multiple Dedekind zeta function - at $s=2$ for one prime and at $(s_1,s_2)=(2,2)$ for pairs of primes. We tested the conjecture for pairs of primes for several quadratic fields. The conjecture for pairs of primes and multiple Dedekind zeta function over the Gaussian integers provide error less than a tenth of a percent. We also tested conjectures that compare sets of primes in a pair of different quadratic fields. Numerically, such quotients can be expressed in terms of regulators and class numbers. Some of the data, together with the code, is available on GitHub, (see \\cite{Zouberou}).", "label": 1, "field": "math"} {"text": "Title: A Cybersecurity Risk Analysis Framework for Systems with Artificial Intelligence Components\nAbstract: The introduction of the European Union Artificial Intelligence Act, the NIST Artificial Intelligence Risk Management Framework, and related norms demands a better understanding and implementation of novel risk analysis approaches to evaluate systems with Artificial Intelligence components. This paper provides a cybersecurity risk analysis framework that can help assessing such systems. We use an illustrative example concerning automated driving systems.", "label": 0, "field": "cs"} {"text": "Title: Radon-type transforms for holomorphic and Hermitian monogenic functions\nAbstract: The standard Radon transform of holomorphic functions is not always well defined, as the integration of such functions over planes may not converge. In this paper, we introduce new Radon-type transforms of co-(real)dimension $2$ for harmonic and holomorphic functions on the unit ball. These transforms are abstractly defined as orthogonal projections onto spaces of complex harmonic and holomorphic plane waves, respectively. The inversion formulas are derived based on the dual transform, while the latter is defined as an integration on a complex Stiefel manifold. Our transforms are extended to the Fock space and give rise to a new transform defined on the entire $L^{2}(\\mathbb{R}^{n})$ through the Segal-Bargmann transform. Furthermore, we develop these transforms for Hermitian monogenic functions on the unit ball, thereby refining the Szeg\\\"o-Radon transform for monogenic functions introduced by Colombo, Sabadini and Sommen.", "label": 0, "field": "math"} {"text": "Title: Continuity of composition operators in Sobolev spaces\nAbstract: We prove that all the composition operators $T_f(g):= f\\circ g$, which take the Adams-Frazier space $W^{m}_{p}\\cap \\dot{W}^{1}_{mp}(\\mathbb{R}^n)$ to itself, are continuous mappings from $W^{m}_{p}\\cap \\dot{W}^{1}_{mp}(\\mathbb{R}^n)$ to itself, for every integer $m\\geq 2$ and every real number $1\\leq p<+\\infty$. The same automatic continuity property holds for Sobolev spaces $W^m_p(\\mathbb{R}^n)$ for $m\\geq 2$ and $1\\leq p<+\\infty$.", "label": 1, "field": "math"} {"text": "Title: The triviality of a certain invariant of link maps in the four-sphere\nAbstract: It is an open problem whether Kirk's $\\sigma$ invariant is the complete obstruction to a link map $S^2\\cup S^2\\to S^4$ being link homotopically trivial. With the objective of constructing counterexamples, Li proposed a link homotopy invariant $\\omega$ that is defined on the kernel of $\\sigma$ and also obstructs link nullhomotopy. We show that $\\omega$ is determined by $\\sigma$, and is a strictly weaker invariant.", "label": 1, "field": "math"} {"text": "Title: Perfect numbers and Fibonacci primes\nAbstract: In this paper, we introduce the concept of $F$-perfect number, which is a positive integer $n$ such that $\\sum_{d|n,d 1$, the geodesic metric space $(\\mathcal{E}^{p}(X,\\theta), d_{p})$ is uniformly convex.", "label": 0, "field": "math"} {"text": "Title: Algebraic trace functions over the primes\nAbstract: We study sums over primes of trace functions of $\\ell$-adic sheaves. Using an extension of our earlier results on algebraic twist of modular forms to the case of Eisenstein series and bounds for Type II sums based on similar applications of the Riemann Hypothesis over finite fields, we prove general estimates with power-saving for such sums. We then derive various concrete applications.", "label": 1, "field": "math"} {"text": "Title: The primitive curve complex for a handlebody\nAbstract: A simple closed curve in the boundary surface of a handlebody is called primitive if there exists an essential disk in the handlebody whose boundary circle intersects the curve transversely in a single point. The primitive curve complex is then defined to be the full subcomplex of the curve complex for the boundary surface, spanned by the vertices of primitive curves. Given any two primitive curves, we construct a sequence of primitive curves from one to the other one satisfying a certain property. As a consequence, we prove that the primitive curve complex for the handlebody is connected.", "label": 0, "field": "math"} {"text": "Title: Section Rings of $\\mathbb{Q}$-Divisors on Genus-$1$ Curves\nAbstract: We compute generators and relations for the section ring of a rational divisor on an elliptic curve. Our technique is a generalization of \\cite{O'Dorney} and \\cite{VZB} that accounts for the additional subtlety that genus one curves pose: their group structure. We give explicit minimal presentations for section rings of divisors supported at one point and for section rings of effective divisors supported at two points. Our results for one-point divisors are quite similar to the corresponding case in genus zero from \\cite{O'Dorney}, and are a combination of the one-point cases in genera one and zero for two-point effective divisors.", "label": 0, "field": "math"} {"text": "Title: Using Schur Rings to Produce GRRs for Dihedral Groups\nAbstract: In this paper we shall be looking at several results relating Schur rings to sufficient conditions for a graph to be a graphical regular representation (GRR) of a finite group, and then applying these specifically in the case of certain subfamilies of dihedral groups. Numerical methods are given for constructing trivalent GRRs for these dihedral groups very quickly.", "label": 0, "field": "math"} {"text": "Title: Fiber criteria for flatness and homomorphisms of flat affine group schemes\nAbstract: A very useful result concerning flatness in Algebraic Geometry is EGA's ``fiber'' criterion. We propose similar fiber criteria to verify flatness of a module while avoiding ``finiteness'' assumptions. Motivated by a Tannakian viewpoint (where the category of representations comes to the front), we derive applications to the theory of affine and flat group schemes.", "label": 0, "field": "math"} {"text": "Title: Periodicity of Adams operations on the Green ring of a finite group\nAbstract: The Adams operations $\\psi_\\Lambda^n$ and $\\psi_S^n$ on the Green ring of a group $G$ over a field $K$ provide a framework for the study of the exterior powers and symmetric powers of $KG$-modules. When $G$ is finite and $K$ has prime characteristic $p$ we show that $\\psi_\\Lambda^n$ and $\\psi_S^n$ are periodic in $n$ if and only if the Sylow $p$-subgroups of $G$ are cyclic. In the case where $G$ is a cyclic $p$-group we find the minimum periods and use recent work of Symonds to express $\\psi_S^n$ in terms of $\\psi_\\Lambda^n$.", "label": 1, "field": "math"} {"text": "Title: On the existence of analytic families of stable lattices in trianguline representations and their reductions\nAbstract: In this article, we prove the existence of rigid analytic families of $G$-stable lattices with locally constant reductions inside families of representations of a topologically compact group $G$, extending a result of Hellman obtained in the semi-simple residual case. Implementing this generalization in the context of Galois representations, we prove a local constancy result for reductions modulo prime powers of trianguline representations of generic dimension $d$. Moreover, we present two explicit applications. First, in dimension two, we extend to a prime power setting and to the whole rigid projective line a recent result of Bergdall, Levin and Liu concerning reductions of semi-stable representations of $\\text{Gal}(\\overline{\\mathbb{Q}}_p / \\mathbb{Q}_p)$ with fixed Hodge-Tate weights and large $\\mathcal{L}$-invariant. Second, in dimension $d$, let $V_n$ be a sequence of crystalline representations converging in a certain geometric sense to a crystalline representation $V$. We show that for any refined version $(V, \\sigma)$ of $V$ (or equivalently for any chosen triangulation of its attached $(\\varphi, \\Gamma)$-module $D_{\\text{rig}} (V)$ over the Robba ring), there exists a sequence of refinement $\\sigma_n$ of each of the $V_n$ such that the limit as refined representations $(V_n , \\sigma_n )$ converges to the $(V, \\sigma)$. This result does not hold under the weaker assumption that $V_n$ converges only uniformly $p$-adically to $V$ (in the sense of Chenevier, Khare and Larsen).", "label": 0, "field": "math"} {"text": "Title: Persistent components in Canny's resultant\nAbstract: When using resultants for elimination, one standard issue is that the resultant vanishes if the variety contains components of dimension larger than the expected dimension. J. Canny proposed an elegant construction, generalized characteristic polynomial, to address this issue by symbolically perturbing the system before the resultant computation. Such perturbed resultant would typically involve artefact components only loosely related to the geometry of the variety of interest. For removing these components, J.M. Rojas proposed to take the greatest common divisor of the results of two different perturbations. In this paper, we investigate this construction, and show that the extra components persistent under taking different perturbations must come either from singularities or from positive-dimensional fibers.", "label": 0, "field": "cs"} {"text": "Title: Discriminants of stable rank two sheaves on some general type surfaces\nAbstract: We prove sharp bounds on the discriminants of stable rank two sheaves on surfaces in three-dimensional projective space. The key technical ingredient is to study them as torsion sheaves in projective space via tilt stability in the derived category. We then proceed to describe the surface itself as a moduli space of rank two vector bundles on it. Lastly, we give a proof of the Bogomolov inequality for semistable rank two sheaves on integral surfaces in three-dimensional projective space in all characteristics.", "label": 1, "field": "math"} {"text": "Title: Language Models Are Greedy Reasoners: A Systematic Formal Analysis of Chain-of-Thought\nAbstract: Large language models (LLMs) have shown remarkable reasoning capabilities given chain-of-thought prompts (examples with intermediate reasoning steps). Existing benchmarks measure reasoning ability indirectly, by evaluating accuracy on downstream tasks such as mathematical reasoning. However, it is unclear how these models obtain the answers and whether they rely on simple heuristics rather than the generated chain-of-thought. To enable systematic exploration of the reasoning ability of LLMs, we present a new synthetic question-answering dataset called PrOntoQA, where each example is generated from a synthetic world model represented in first-order logic. This allows us to parse the generated chain-of-thought into symbolic proofs for formal analysis. Our analysis on InstructGPT and GPT-3 shows that LLMs are quite capable of making correct individual deduction steps, and so are generally capable of reasoning, even in fictional contexts. However, they have difficulty with proof planning: When multiple valid deduction steps are available, they are not able to systematically explore the different options.", "label": 1, "field": "cs"} {"text": "Title: Globalizing and stabilizing global $\\infty$-categories\nAbstract: We consider the question of cocompleting partially presentable parametrized $\\infty$-categories in the sense of arXiv:2307.11001. As our main result we show that in certain cases one may compute such relative cocompletions via a very explicit formula given in terms of partially lax limits. We then apply this to equivariant homotopy theory, building on the work of op. cit. and arXiv:2301.08240, to conclude that the global $\\infty$-category of globally equivariant spectra is the relative cocompletion of the global $\\infty$-category of equivariant spectra. Evaluating at a group $G$ we obtain a description of the $\\infty$-category of $G$-global spectra as a partially lax limit, extending the main result of arXiv:2206.01556 for finite groups to $G$-global homotopy theory. Finally we investigate the question of stabilizing global $\\infty$-categories by inverting the action of representation spheres, and deduce a second universal property for the global $\\infty$-category of globally equivariant spectra, similar to that of arXiv:2302.06207.", "label": 0, "field": "math"} {"text": "Title: Infinite transition solutions for an Allen-Cahn equation\nAbstract: We give another proof of a theorem of Rabinowitz and Stredulinsky obtaining infinite transition solutions for an Allen--Cahn equation. Rabinowitz and Stredulinsky have constructed infinite transition solutions as locally minimal solutions, but it is still an interesting question to establish these solutions by other method. Our result may attract the interest of constructing solutions with the shape of locally minimal solutions of Rabinowitz and Stredulinsky for problems defined on descrete group.", "label": 0, "field": "math"} {"text": "Title: On the number of hyperbolic Dehn fillings of a given volume\nAbstract: Let M be a 1-cusped hyperbolic 3-manifold whose cusp shape is quadratic. We show that there exists c=c(M) such that the number of hyperbolic Dehn fillings of M with any given volume v is uniformly bounded by c.", "label": 1, "field": "math"} {"text": "Title: A Hybrid Neural Network Model For Predicting The Nitrate Concentration In The Recirculating Aquaculture System\nAbstract: This study was groundbreaking in its application of neural network models for nitrate management in the Recirculating Aquaculture System (RAS). A hybrid neural network model was proposed, which accurately predicted daily nitrate concentration and its trends using six water quality parameters. We conducted a 105-day aquaculture experiment, during which we collected 450 samples from five sets of RAS to train our model (C-L-A model) which incorporates Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), and self-Attention. Furthermore, we obtained 90 samples from a standalone RAS as the testing data to evaluate the performance of the model in practical applications. The experimental results proved that the C-L-A model accurately predicted nitrate concentration in RAS and maintained good performance even with a reduced proportion of training data. We recommend using water quality parameters from the past 7 days to forecast future nitrate concentration, as this timeframe allows the model to achieve maximum generalization capability. Additionally, we compared the performance of the C-L-A model with three basic neural network models (CNN, LSTM, self-Attention) as well as three hybrid neural network models (CNN-LSTM, CNN-Attention, LSTM-Attention). The results demonstrated that the C-L-A model (R2=0.956) significantly outperformed the other neural network models (R2=0.901-0.927). Our study suggests that the utilization of neural network models, specifically the C-L-A model, could potentially assist the RAS industry in conserving resources for daily nitrate monitoring.", "label": 0, "field": "cs"} {"text": "Title: Computing higher symplectic capacities I\nAbstract: We present recursive formulas which compute the recently defined \"higher symplectic capacities\" for all convex toric domains. In the special case of four-dimensional ellipsoids, we apply homological perturbation theory to the associated filtered L-infinity algebras and prove that the resulting structure coefficients count punctured pseudoholomorphic curves in cobordisms between ellipsoids. As sample applications, we produce new previously inaccessible obstructions for stabilized embeddings of ellipsoids and polydisks, and we give new counts of curves with tangency constraints.", "label": 1, "field": "math"} {"text": "Title: On Augmenting Scenario-Based Modeling with Generative AI\nAbstract: The manual modeling of complex systems is a daunting task; and although a plethora of methods exist that mitigate this issue, the problem remains very difficult. Recent advances in generative AI have allowed the creation of general-purpose chatbots, capable of assisting software engineers in various modeling tasks. However, these chatbots are often inaccurate, and an unstructured use thereof could result in erroneous system models. In this paper, we outline a method for the safer and more structured use of chatbots as part of the modeling process. To streamline this integration, we propose leveraging scenario-based modeling techniques, which are known to facilitate the automated analysis of models. We argue that through iterative invocations of the chatbot and the manual and automatic inspection of the resulting models, a more accurate system model can eventually be obtained. We describe favorable preliminary results, which highlight the potential of this approach.", "label": 0, "field": "cs"} {"text": "Title: Toroidal orbifolds, destackification, and Kummer blowings up\nAbstract: We show that any toroidal DM stack $X$ with finite diagonalizable inertia possesses a maximal toroidal coarsening $X_{tcs}$ such that the morphism $X\\to X_{tcs}$ is logarithmically smooth. Further, we use torification results of [AT17] to construct a destackification functor, a variant of the main result of Bergh [Ber17], on the category of such toroidal stacks $X$. Namely, we associate to $X$ a sequence of blowings up of toroidal stacks $\\widetilde{\\mathcal{F}}_X\\:Y\\longrightarrow X$ such that $Y_{tc}$ coincides with the usual coarse moduli space $Y_{cs}$. In particular, this provides a toroidal resolution of the algebraic space $X_{cs}$. Both $X_{tcs}$ and $\\widetilde{\\mathcal{F}}_X$ are functorial with respect to strict inertia preserving morphisms $X'\\to X$. Finally, we use coarsening morphisms to introduce a class of non-representable birational modifications of toroidal stacks called Kummer blowings up. These modifications, as well as our version of destackification, are used in our work on functorial toroidal resolution of singularities.", "label": 1, "field": "math"} {"text": "Title: Locally differentially private estimation of nonlinear functionals of discrete distributions\nAbstract: We study the problem of estimating non-linear functionals of discrete distributions in the context of local differential privacy. The initial data $x_1,\\ldots,x_n \\in [K]$ are supposed i.i.d. and distributed according to an unknown discrete distribution $p = (p_1,\\ldots,p_K)$. Only $\\alpha$-locally differentially private (LDP) samples $z_1,...,z_n$ are publicly available, where the term 'local' means that each $z_i$ is produced using one individual attribute $x_i$. We exhibit privacy mechanisms (PM) that are interactive (i.e. they are allowed to use already published confidential data) or non-interactive. We describe the behavior of the quadratic risk for estimating the power sum functional $F_{\\gamma} = \\sum_{k=1}^K p_k^{\\gamma}$, $\\gamma >0$ as a function of $K, \\, n$ and $\\alpha$. In the non-interactive case, we study two plug-in type estimators of $F_{\\gamma}$, for all $\\gamma >0$, that are similar to the MLE analyzed by Jiao et al. (2017) in the multinomial model. However, due to the privacy constraint the rates we attain are slower and similar to those obtained in the Gaussian model by Collier et al. (2020). In the interactive case, we introduce for all $\\gamma >1$ a two-step procedure which attains the faster parametric rate $(n \\alpha^2)^{-1/2}$ when $\\gamma \\geq 2$. We give lower bounds results over all $\\alpha$-LDP mechanisms and all estimators using the private samples.", "label": 1, "field": "math"} {"text": "Title: Adams spectral sequences and Franke's algebraicity conjecture\nAbstract: To any well-behaved homology theory we associate a derived $\\infty$-category which encodes its Adams spectral sequence. As applications, we prove a conjecture of Franke on algebraicity of certain homotopy categories and establish homotopy-coherent monoidality of the Adams filtration.", "label": 1, "field": "math"} {"text": "Title: On the center of near-group fusion category of type $\\mathbb{Z}_3+6$\nAbstract: Let $\\mathcal{A}$ be a near-group fusion category of type $\\mathbb{Z}_3+6$. We show that there is a modular tensor equivalence $\\mathcal{Z}(\\mathcal{A})\\cong\\mathcal{C}(\\mathbb{Z}_3,\\eta)\\boxtimes\\mathcal{C}(\\mathfrak{sl}_3,9)_{\\mathbb{Z}_3}^0$. Moreover, we construct two non-trivial faithful extensions of $\\mathcal{A}$ explicitly, whose Drinfeld centers can also be obtained from representation categories quantum groups at root of unity.", "label": 0, "field": "math"} {"text": "Title: On the error term in a mixed moment of L-functions\nAbstract: There has recently been some interest in optimizing the error term in the asymptotic for the fourth moment of Dirichlet L-functions and a closely related mixed moment of L-functions involving automorphic L-functions twisted by Dirichlet characters. We obtain an improvement for the error term of the latter.", "label": 0, "field": "math"} {"text": "Title: FairGridSearch: A Framework to Compare Fairness-Enhancing Models\nAbstract: Machine learning models are increasingly used in critical decision-making applications. However, these models are susceptible to replicating or even amplifying bias present in real-world data. While there are various bias mitigation methods and base estimators in the literature, selecting the optimal model for a specific application remains challenging. This paper focuses on binary classification and proposes FairGridSearch, a novel framework for comparing fairness-enhancing models. FairGridSearch enables experimentation with different model parameter combinations and recommends the best one. The study applies FairGridSearch to three popular datasets (Adult, COMPAS, and German Credit) and analyzes the impacts of metric selection, base estimator choice, and classification threshold on model fairness. The results highlight the significance of selecting appropriate accuracy and fairness metrics for model evaluation. Additionally, different base estimators and classification threshold values affect the effectiveness of bias mitigation methods and fairness stability respectively, but the effects are not consistent across all datasets. Based on these findings, future research on fairness in machine learning should consider a broader range of factors when building fair models, going beyond bias mitigation methods alone.", "label": 0, "field": "cs"} {"text": "Title: An algorithm for estimating the crossing number of dense graphs, and continuous analogs of the crossing and rectilinear crossing numbers\nAbstract: We present a deterministic $n^{2+o(1)}$-time algorithm that approximates the crossing number of any graph $G$ of order $n$ up to an additive error of $o(n^4)$. We also provide a randomized polynomial-time algorithm that constructs a drawing of $G$ with $\\text{cr}(G)+o(n^4)$ crossings. These results are made interesting by the well known fact that every dense $n$-vertex graph has crossing number $\\Theta(n^4)$. Our work builds on a technique developed by Fox, Pach and S\\'uk, who obtained very similar results for the rectilinear crossing number. The results by the aforementioned authors and in this paper imply that the (normalized) crossing and rectilinear crossing numbers are estimable parameters. Motivated by this, we introduce two graphon parameters, the \\textit{crossing density} and the \\textit{rectilinear crossing density}, and then we prove that, in a precise sense, these are the correct continuous analogs of the crossing and rectilinear crossing numbers of graphs.", "label": 0, "field": "math"} {"text": "Title: Core equality of real sequences\nAbstract: Given an ideal $\\mathcal{I}$ on $\\omega$ and a bounded real sequence $\\textbf{x}$, we denote by $\\text{core}_{\\textbf{x}}(\\mathcal{I})$ the smallest interval $[a,b]$ such that $\\{n \\in \\omega: x_n \\notin [a-\\varepsilon,b+\\varepsilon]\\} \\in \\mathcal{I}$ for all $\\varepsilon>0$ (which corresponds to the interval $[\\,\\liminf \\textbf{x}, \\limsup \\textbf{x}\\,]$ if $\\mathcal{I}$ is the ideal $\\text{Fin}$ of finite subsets of $\\omega$). First, we characterize all the infinite real matrices $A$ such that $$ \\text{core}_{A\\textbf{x}}(\\mathcal{J})=\\text{core}_{\\textbf{x}}(\\mathcal{I}) $$ for all bounded sequences $\\textbf{x}$, provided that $\\mathcal{J}$ is a countably generated ideal on $\\omega$ and $A$ maps bounded sequences into bounded sequences. Such characterization fails if both $\\mathcal{I}$ and $\\mathcal{J}$ are the ideal of asymptotic density zero sets. Next, we show that such equality is possible for distinct ideals $\\mathcal{I}, \\mathcal{J}$, answering an open question in [J.~Math.~Anal.~Appl.~\\textbf{321} (2006), 515--523]. Lastly, we prove that, if $\\mathcal{J}=\\text{Fin}$, the above equality holds for some matrix $A$ if and only if $\\mathcal{I}=\\text{Fin}$ or $\\mathcal{I}=\\text{Fin}\\oplus \\mathcal{P}(\\omega)$.", "label": 0, "field": "math"} {"text": "Title: Post-Processed Posteriors for Banded Covariances\nAbstract: We consider Bayesian inference of banded covariance matrices and propose a post-processed posterior. The post-processing of the posterior consists of two steps. In the first step, posterior samples are obtained from the conjugate inverse-Wishart posterior which does not satisfy any structural restrictions. In the second step, the posterior samples are transformed to satisfy the structural restriction through a post-processing function. The conceptually straightforward procedure of the post-processed posterior makes its computation efficient and can render interval estimators of functionals of covariance matrices. We show that it has nearly optimal minimax rates for banded covariances among all possible pairs of priors and post-processing functions. Furthermore, we prove that the expected coverage probability of the $(1-\\alpha)100\\%$ highest posterior density region of the post-processed posterior is asymptotically $1-\\alpha$ with respect to a conventional posterior distribution. It implies that the highest posterior density region of the post-processed posterior is, on average, a credible set of a conventional posterior. The advantages of the post-processed posterior are demonstrated by a simulation study and a real data analysis.", "label": 1, "field": "math"} {"text": "Title: On the local density problem for graphs of given odd-girth\nAbstract: Erd\\H{o}s conjectured that every $n$-vertex triangle-free graph contains a subset of $\\lfloor n/2\\rfloor$ vertices that spans at most $n^2/50$ edges. Extending a recent result of Norin and Yepremyan, we confirm this conjecture for graphs homomorphic to so-called Andr\\'asfai graphs. As a consequence, Erd\\H{o}s' conjecture holds for every triangle-free graph $G$ with minimum degree $\\delta (G)>10n/29$ and if $\\chi (G)\\leq 3$ the degree condition can be relaxed to $\\delta (G)> n/3$. In fact, we obtain a more general result for graphs of higher odd-girth.", "label": 1, "field": "math"} {"text": "Title: Are LLMs Robust for Spoken Dialogues?\nAbstract: Large Pre-Trained Language Models have demonstrated state-of-the-art performance in different downstream tasks, including dialogue state tracking and end-to-end response generation. Nevertheless, most of the publicly available datasets and benchmarks on task-oriented dialogues focus on written conversations. Consequently, the robustness of the developed models to spoken interactions is unknown. In this work, we have evaluated the performance of LLMs for spoken task-oriented dialogues on the DSTC11 test sets. Due to the lack of proper spoken dialogue datasets, we have automatically transcribed a development set of spoken dialogues with a state-of-the-art ASR engine. We have characterized the ASR-error types and their distributions and simulated these errors in a large dataset of dialogues. We report the intrinsic (perplexity) and extrinsic (human evaluation) performance of fine-tuned GPT-2 and T5 models in two subtasks of response generation and dialogue state tracking, respectively. The results show that LLMs are not robust to spoken noise by default, however, fine-tuning/training such models on a proper dataset of spoken TODs can result in a more robust performance.", "label": 0, "field": "cs"} {"text": "Title: Evasive Hardware Trojan through Adversarial Power Trace\nAbstract: The globalization of the Integrated Circuit (IC) supply chain, driven by time-to-market and cost considerations, has made ICs vulnerable to hardware Trojans (HTs). Against this threat, a promising approach is to use Machine Learning (ML)-based side-channel analysis, which has the advantage of being a non-intrusive method, along with efficiently detecting HTs under golden chip-free settings. In this paper, we question the trustworthiness of ML-based HT detection via side-channel analysis. We introduce a HT obfuscation (HTO) approach to allow HTs to bypass this detection method. Rather than theoretically misleading the model by simulated adversarial traces, a key aspect of our approach is the design and implementation of adversarial noise as part of the circuitry, alongside the HT. We detail HTO methodologies for ASICs and FPGAs, and evaluate our approach using TrustHub benchmark. Interestingly, we found that HTO can be implemented with only a single transistor for ASIC designs to generate adversarial power traces that can fool the defense with 100% efficiency. We also efficiently implemented our approach on a Spartan 6 Xilinx FPGA using 2 different variants: (i) DSP slices-based, and (ii) ring-oscillator-based design. Additionally, we assess the efficiency of countermeasures like spectral domain analysis, and we show that an adaptive attacker can still design evasive HTOs by constraining the design with a spectral noise budget. In addition, while adversarial training (AT) offers higher protection against evasive HTs, AT models suffer from a considerable utility loss, potentially rendering them unsuitable for such security application. We believe this research represents a significant step in understanding and exploiting ML vulnerabilities in a hardware security context, and we make all resources and designs openly available online: https://dev.d18uu4lqwhbmka.amplifyapp.com", "label": 0, "field": "cs"} {"text": "Title: Stability and instability of Kelvin waves\nAbstract: The $m$-waves of Kelvin are uniformly rotating patch solutions of the 2D Euler equations with $m$-fold rotational symmetry for $m\\geq 2$. For Kelvin waves sufficiently close to the disc, we prove a nonlinear stability result up to an arbitrarily long time in the $L^1$ norm of the vorticity, for $m$-fold symmetric perturbations. To obtain this result, we first prove that the Kelvin wave is a strict local maximizer of the energy functional in some admissible class of patches, which had been claimed by Wan in 1986. This gives an orbital stability result with a support condition on the evolution of perturbations, but using a Lagrangian bootstrap argument which traces the particle trajectories of the perturbation, we are able to drop the condition on the evolution. Based on this unconditional stability result, we establish that long time filamentation, or formation of long arms, occurs near the Kelvin waves, which have been observed in various numerical simulations. Additionally, we discuss stability of annular patches in the same variational framework.", "label": 1, "field": "math"} {"text": "Title: Isometric Dilations for Representations of Product Systems\nAbstract: We discuss representations of product systems (of $W^*$-correspondences) over the semigroup $\\mathbb{Z}^n_+$ and show that, under certain pureness and Szego positivity conditions, a completely contractive representation can be dilated to an isometric representation. For $n=1,2$ this is known to hold in general (without assuming the conditions) but, for $n\\geq 3$, it does not hold in general (as is known for the special case of isometric dilations of a tuple of commuting contractions). Restricting to the case of tuples of commuting contractions, our result reduces to a result of Barik, Das, Haria and Sarkar. Our dilation is explicitly constructed and we present some applications.", "label": 0, "field": "math"} {"text": "Title: Universal Approximation Theorem for Vector- and Hypercomplex-Valued Neural Networks\nAbstract: The universal approximation theorem states that a neural network with one hidden layer can approximate continuous functions on compact sets with any desired precision. This theorem supports using neural networks for various applications, including regression and classification tasks. Furthermore, it is valid for real-valued neural networks and some hypercomplex-valued neural networks such as complex-, quaternion-, tessarine-, and Clifford-valued neural networks. However, hypercomplex-valued neural networks are a type of vector-valued neural network defined on an algebra with additional algebraic or geometric properties. This paper extends the universal approximation theorem for a wide range of vector-valued neural networks, including hypercomplex-valued models as particular instances. Precisely, we introduce the concept of non-degenerate algebra and state the universal approximation theorem for neural networks defined on such algebras.", "label": 0, "field": "cs"} {"text": "Title: Carleman estimates for third order operators of KdV and non KdV-type and applications\nAbstract: In this paper we study a class of variable coefficient third order partial differential operators on $\\mathbb{R}^{n+1}$, containing, as a subclass, some variable coefficient operators of KdV-type in any space dimension. For such a class, as well as for the adjoint class, we obtain a Carleman estimate and the local solvability at any point of $\\mathbb{R}^{n+1}$. A discussion of possible applications in the context of dispersive equations is provided.", "label": 0, "field": "math"} {"text": "Title: A convergence result for a local planning problem for mean field games and rigorous proof of a Freidlin-Ventchel-type Large Deviations Principle for the $1+1$ KPZ equation\nAbstract: We prove the convergence of a viscous approximation to an one dimensional local mean field type planning problem with singular initial and terminal measures. Then we use this result to give a rigorous proof to a Freidlin-Ventchel-type Large Deviations Principle for the height of the $1+1$ KPZ equation.", "label": 0, "field": "math"} {"text": "Title: Absolute continuity of the limiting eigenvalue distribution of the random Toeplitz matrix\nAbstract: We show that the limiting eigenvalue distribution of random symmetric Toeplitz matrices is absolutely continuous with density bounded by 8, partially answering a question of Bryc, Dembo and Jiang (2006). The main tool used in the proof is a spectral averaging technique from the theory of random Schr\\\"{o}dinger operators. The similar question for Hankel matrices remains open.", "label": 1, "field": "math"} {"text": "Title: Revisiting Norm Estimation in Data Streams\nAbstract: The problem of estimating the pth moment F_p (p nonnegative and real) in data streams is as follows. There is a vector x which starts at 0, and many updates of the form x_i <-- x_i + v come sequentially in a stream. The algorithm also receives an error parameter 0 < eps < 1. The goal is then to output an approximation with relative error at most eps to F_p = ||x||_p^p. Previously, it was known that polylogarithmic space (in the vector length n) was achievable if and only if p <= 2. We make several new contributions in this regime, including: (*) An optimal space algorithm for 0 < p < 2, which, unlike previous algorithms which had optimal dependence on 1/eps but sub-optimal dependence on n, does not rely on a generic pseudorandom generator. (*) A near-optimal space algorithm for p = 0 with optimal update and query time. (*) A near-optimal space algorithm for the \"distinct elements\" problem (p = 0 and all updates have v = 1) with optimal update and query time. (*) Improved L_2 --> L_2 dimensionality reduction in a stream. (*) New 1-pass lower bounds to show optimality and near-optimality of our algorithms, as well as of some previous algorithms (the \"AMS sketch\" for p = 2, and the L_1-difference algorithm of Feigenbaum et al.). As corollaries of our work, we also obtain a few separations in the complexity of moment estimation problems: F_0 in 1 pass vs. 2 passes, p = 0 vs. p > 0, and F_0 with strictly positive updates vs. arbitrary updates.", "label": 1, "field": "cs"} {"text": "Title: On the Hankel Transform of Bessel Functions on Complex Numbers and Explicit Spectral Formulae over the Gaussian Field\nAbstract: In this paper, on the complex field $\\mathbb{C}$, we prove two integral formulae for the Hankel-Mellin transform and the double Fourier-Mellin transform of Bessel functions, both resulting the hypergeometric function. As two applications, we use the former integral formula to make explicit the spectral formula of Bruggeman and Motohashi for the fourth moment of Dedekind zeta function over the Gaussian number field $\\mathbb{Q}(i)$ and to establish a spectral formula for the Hecke-eigenvalue twisted second moment of central $L$-values for the Picard group $\\mathrm{PGL}_2 (\\mathbb{Z}[i])$. Moreover, we develop the theory of distributional Hankel transform on $\\mathbb{C} \\smallsetminus \\{0\\}$.", "label": 0, "field": "math"} {"text": "Title: Almost periodic invariant tori for the NLS on the circle\nAbstract: In this paper we study the existence and linear stability of almost periodic solutions for a NLS equation on the circle with external parameters. Starting from the seminal result of Bourgain (2005) on the quintic NLS, we propose a novel approach allowing to prove in a unified framework the persistence of finite and infinite dimensional invariant tori, which are the support of the desired solutions. The persistence result is given through a rather abstract \"counter-term theorem\" `a la Herman, directly in the original elliptic variables without passing to action-angle ones. Our framework allows us to find \"many more\" almost periodic solutions with respect to the existing literature and consider also non-translation invariant PDEs.", "label": 1, "field": "math"} {"text": "Title: Optimal Decay Estimates for the Radially Symmetric Compressible Navier-Stokes Equations\nAbstract: We examine the large-time behaviour of solutions to the compressible Navier-Stokes equations under the assumption of radial symmetry. In particular, we calculate a fast time-decay estimate of the norm of the nonlinear part of the solution. This allows us to obtain a bound from below for the time-decay of the solution in $L^\\infty$, proving that our decay estimate in that space is sharp. The decay rate is the same as that of the linear problem for curl-free flow. We also obtain an estimate for a scalar system related to curl-free solutions to the compressible Navier-Stokes equations in a weighted Lebesgue space.", "label": 0, "field": "math"} {"text": "Title: A note on a Sung-Wang's paper\nAbstract: The purpose of this note is to study the connectedness at infinity of manifold by using the theory of $p$-harmonic functions. We show that if the first eigenvalue $\\lambda_{1,p}$ for the $p$-Laplacian achievies its maximal value on a K\\\"{a}hler manifold or a quaternionic K\\\"{a}hler manifold then such a manifold must be connected at infinity unless it is a topological cylinder with an explicit warped product metric.", "label": 1, "field": "math"} {"text": "Title: Sampling Acquisition Functions for Batch Bayesian Optimization\nAbstract: We present Acquisition Thompson Sampling (ATS), a novel technique for batch Bayesian Optimization (BO) based on the idea of sampling multiple acquisition functions from a stochastic process. We define this process through the dependency of the acquisition functions on a set of model hyper-parameters. ATS is conceptually simple, straightforward to implement and, unlike other batch BO methods, it can be employed to parallelize any sequential acquisition function or to make existing parallel methods scale further. We present experiments on a variety of benchmark functions and on the hyper-parameter optimization of a popular gradient boosting tree algorithm. These demonstrate the advantages of ATS with respect to classical parallel Thompson Sampling for BO, its competitiveness with two state-of-the-art batch BO methods, and its effectiveness if applied to existing parallel BO algorithms.", "label": 1, "field": "cs"} {"text": "Title: Higher Order Model Checking in Isabelle for Human Centric Infrastructure Security\nAbstract: In this paper we present an efficient approach to implementing model checking in the Higher Order Logic (HOL) of Isabelle. This is a non-trivial task since model checking is restricted to finite state sets. By restricting our scope to considering security attacks, we achieve an efficient executable specification of a model checking algorithm for attack trees. We provide the existing background, the necessary theory and illustrate its application. Theory and application are fully formalized in Isabelle thus providing an executable model checking algorithm.", "label": 0, "field": "cs"} {"text": "Title: On almost sure convergence of random variables with finite chaos decomposition\nAbstract: Under mild conditions on a family of independent random variables $(X_n)$ we prove that almost sure convergence of a sequence of tetrahedral polynomial chaoses of uniformly bounded degrees in the variables $(X_n)$ implies the almost sure convergence of their homogeneous parts. This generalizes a recent result due to Poly and Zheng obtained under stronger integrability conditions. In particular for i.i.d. sequences we provide a simple necessary and sufficient condition for this property to hold. We also discuss similar phenomena for sums of multiple stochastic integrals with respect to Poisson processes, answering a question by Poly and Zheng.", "label": 1, "field": "math"} {"text": "Title: Symmetry and asymmetry between positive and negative square energies of graphs\nAbstract: The positive and negative square energies of a graph, $s^+(G)$ and $s^-(G)$, are the sums of squares of the positive and negative eigenvalues of the adjacency matrix, respectively. The first results on square energies revealed symmetry between $s^+(G)$ and $s^-(G)$. This paper reviews examples of asymmetry between these parameters, for example using large random graphs and the ratios $s^+/s^-$ and $s^-/s^+$, as well as new examples of symmetry. We answer some questions previously asked about $s^{+}$ and $s^{-}$ and suggest several further avenues of research.", "label": 0, "field": "math"} {"text": "Title: Reduction and reconstruction of SDEs via Girsanov and quasi Doob symmetries\nAbstract: A reduction procedure for stochastic differential equations based on stochastic symmetries including Girsanov random transformations is proposed. In this setting, a new notion of reconstruction is given, involving the expectation values of functionals of solution to the SDE and a reconstruction theorem for general stochastic symmetries is proved. Moreover, the notable case of reduction under the closed subclass of quasi Doob transformations is presented. The theoretical results are applied to stochastic models relevant in the applications.", "label": 1, "field": "math"} {"text": "Title: Reciprocity formulas for certain generalized Hardy sums\nAbstract: In this paper, we establish some reciprocity formulas for certain generalized Hardy sums by using the Fourier series technique and some properties of the periodic zeta function and Lerch zeta function. It turns out that one of Hardy's reciprocity theorems is deduced as a special case.", "label": 0, "field": "math"} {"text": "Title: The combinatorics of Farey words and their traces\nAbstract: The set of Kleinian groups which are free on two parabolic generators is parameterised by the closed Riley slice of Schottky space. A Farey word is a word in such a group which represents a non-boundary-parallel geodesic that can be pinched down to a puncture; in the interior of the Riley slice such a word is loxodromic, and the pinching process corresponds to deforming the word to be parabolic. Keen and Series showed that the geometry of the Riley slice is detected by the real loci of the trace polynomials of these words. We study these trace polynomials from a combinatorial viewpoint, and give a recursion formula for them which enables efficient calculation of the polynomials without performing matrix multiplication; we also present some intriguing examples to show that there is much still to be learned about them.", "label": 1, "field": "math"} {"text": "Title: An entropy bound due to symmetries\nAbstract: Let $H$ be a local net of real Hilbert subspaces of a complex Hilbert space on the family of double cones of the spacetime $\\mathbb{R}^{d+1}$, covariant with respect to a positive energy, unitary representation $U$ of the Poincar\\'e group, with the Bisognano-Wichmann property for the wedge modular group. We set an upper bound on the local entropy $S_H(\\phi|\\! | C)$ of a vector in a region $C$ that depends only on $U$ and the PCT anti-unitary canonically associated with $H$. A similar result holds for local, M\\\"obius covariant nets of standard subspaces on the circle. We compute the entropy increase and illustrate this bound for the nets associated with the $U(1)$-current derivatives.", "label": 0, "field": "math"} {"text": "Title: Inferring relevant features: from QFT to PCA\nAbstract: In many-body physics, renormalization techniques are used to extract aspects of a statistical or quantum state that are relevant at large scale, or for low energy experiments. Recent works have proposed that these features can be formally identified as those perturbations of the states whose distinguishability most resist coarse-graining. Here, we examine whether this same strategy can be used to identify important features of an unlabeled dataset. This approach indeed results in a technique very similar to kernel PCA (principal component analysis), but with a kernel function that is automatically adapted to the data, or \"learned\". We test this approach on handwritten digits, and find that the most relevant features are significantly better for classification than those obtained from a simple gaussian kernel.", "label": 1, "field": "cs"} {"text": "Title: Applications of Gorenstein projective $\u03c4$-rigid modules\nAbstract: We first introduce the notion of $CM$-$\\tau$-tilting free algebras as the generalization of $CM$-free algebras and show the homological properties of $CM$-$\\tau$-tilting free algebras. Then we give a bijection between Gorenstein projective $\\tau$-rigid modules and certain modules by using an equivalence established by Kong and Zhang. Finally, we give a partial answer to Tachikawa's first conjecture by using Gorenstein projective $\\tau$-rigid modules.", "label": 0, "field": "math"} {"text": "Title: Center of Mass Technique and Affine Geometry\nAbstract: The notion of center of mass, which is very useful in kinematics, proves to be very handy in geometry (see [1]-[2]). Countless applications of center of mass to geometry go back to Archimedes. Unfortunately, the center of mass cannot be defined for sets whose total mass equals zero. In the paper we improve this disadvantage and assign to an n-dimensional affine space L over any field k the (n+1)-dimensional vector space over the field k of weighty points and mass dipoles in L. In this space, the sum of weighted points with nonzero total mass is equal to the center of mass of these points equipped with their total mass. We present several interpretations of the space of weighty points and mass dipoles in L, and a couple of its applications to geometry. The paper is self-contained and is accessible for undergraduate students.", "label": 0, "field": "math"} {"text": "Title: Open Transactions on Shared Memory\nAbstract: Transactional memory has arisen as a good way for solving many of the issues of lock-based programming. However, most implementations admit isolated transactions only, which are not adequate when we have to coordinate communicating processes. To this end, in this paper we present OCTM, an Haskell-like language with open transactions over shared transactional memory: processes can join transactions at runtime just by accessing to shared variables. Thus a transaction can co-operate with the environment through shared variables, but if it is rolled-back, also all its effects on the environment are retracted. For proving the expressive power of TCCS we give an implementation of TCCS, a CCS-like calculus with open transactions.", "label": 1, "field": "cs"} {"text": "Title: Investigating EEG-Based Functional Connectivity Patterns for Multimodal Emotion Recognition\nAbstract: Compared with the rich studies on the motor brain-computer interface (BCI), the recently emerging affective BCI presents distinct challenges since the brain functional connectivity networks involving emotion are not well investigated. Previous studies on emotion recognition based on electroencephalography (EEG) signals mainly rely on single-channel-based feature extraction methods. In this paper, we propose a novel emotion-relevant critical subnetwork selection algorithm and investigate three EEG functional connectivity network features: strength, clustering coefficient, and eigenvector centrality. The discrimination ability of the EEG connectivity features in emotion recognition is evaluated on three public emotion EEG datasets: SEED, SEED-V, and DEAP. The strength feature achieves the best classification performance and outperforms the state-of-the-art differential entropy feature based on single-channel analysis. The experimental results reveal that distinct functional connectivity patterns are exhibited for the five emotions of disgust, fear, sadness, happiness, and neutrality. Furthermore, we construct a multimodal emotion recognition model by combining the functional connectivity features from EEG and the features from eye movements or physiological signals using deep canonical correlation analysis. The classification accuracies of multimodal emotion recognition are 95.08/6.42% on the SEED dataset, 84.51/5.11% on the SEED-V dataset, and 85.34/2.90% and 86.61/3.76% for arousal and valence on the DEAP dataset, respectively. The results demonstrate the complementary representation properties of the EEG connectivity features with eye movement data. In addition, we find that the brain networks constructed with 18 channels achieve comparable performance with that of the 62-channel network in multimodal emotion recognition and enable easier setups for BCI systems in real scenarios.", "label": 1, "field": "cs"} {"text": "Title: Microlocal Morse theory of wrapped Fukaya categories\nAbstract: The Nadler--Zaslow correspondence famously identifies the finite-dimensional Floer homology groups between Lagrangians in cotangent bundles with the finite-dimensional Hom spaces between corresponding constructible sheaves. We generalize this correspondence to incorporate the infinite-dimensional spaces of morphisms 'at infinity', given on the Floer side by Reeb trajectories (also known as \"wrapping\") and on the sheaf side by allowing unbounded infinite rank sheaves which are categorically compact. When combined with existing sheaf theoretic computations, our results confirm many new instances of homological mirror symmetry. More precisely, given a real analytic manifold $M$ and a subanalytic isotropic subset $\\Lambda$ of its co-sphere bundle $S^*M$, we show that the partially wrapped Fukaya category of $T^*M$ stopped at $\\Lambda$ is equivalent to the category of compact objects in the unbounded derived category of sheaves on $M$ with microsupport inside $\\Lambda$. By an embedding trick, we also deduce a sheaf theoretic description of the wrapped Fukaya category of any Weinstein sector admitting a stable polarization.", "label": 1, "field": "math"} {"text": "Title: Unsupervised learning from videos using temporal coherency deep networks\nAbstract: In this work we address the challenging problem of unsupervised learning from videos. Existing methods utilize the spatio-temporal continuity in contiguous video frames as regularization for the learning process. Typically, this temporal coherence of close frames is used as a free form of annotation, encouraging the learned representations to exhibit small differences between these frames. But this type of approach fails to capture the dissimilarity between videos with different content, hence learning less discriminative features. We here propose two Siamese architectures for Convolutional Neural Networks, and their corresponding novel loss functions, to learn from unlabeled videos, which jointly exploit the local temporal coherence between contiguous frames, and a global discriminative margin used to separate representations of different videos. An extensive experimental evaluation is presented, where we validate the proposed models on various tasks. First, we show how the learned features can be used to discover actions and scenes in video collections. Second, we show the benefits of such an unsupervised learning from just unlabeled videos, which can be directly used as a prior for the supervised recognition tasks of actions and objects in images, where our results further show that our features can even surpass a traditional and heavily supervised pre-training plus fine-tunning strategy.", "label": 1, "field": "cs"} {"text": "Title: Hilbert modular forms and Galois representations\nAbstract: In this expository article, we present a brief introduction to the theory of Hilbert modular forms and Galois representations, and describe what it means to attach a compatible system of Galois representations to a Hilbert modular form.", "label": 0, "field": "math"} {"text": "Title: Boundary regularity of stochastic PDEs\nAbstract: The boundary behaviour of solutions of stochastic PDEs with Dirichlet boundary conditions can be surprisingly - and in a sense, arbitrarily - bad: as shown by Krylov, for any $\\alpha>0$ one can find a simple $1$-dimensional constant coefficient linear equation whose solution at the boundary is not $\\alpha$-H\\\"older continuous. We obtain a positive counterpart of this: under some mild regularity assumptions on the coefficients, solutions of semilinear SPDEs on $C^1$ domains are proved to be $\\alpha$-H\\\"older continuous up to the boundary with some $\\alpha>0$.", "label": 1, "field": "math"} {"text": "Title: Beyond Self-Promotion: How Software Engineering Research Is Discussed on LinkedIn\nAbstract: LinkedIn is the largest professional network in the world. As such, it can serve to build bridges between practitioners, whose daily work is software engineering (SE), and researchers, who work to advance the field of software engineering. We know that such a metaphorical bridge exists: SE research findings are sometimes shared on LinkedIn and commented on by software practitioners. Yet, we do not know what state the bridge is in. Therefore, we quantitatively and qualitatively investigate how SE practitioners and researchers approach each other via public LinkedIn discussions and what both sides can contribute to effective science communication. We found that a considerable proportion of LinkedIn posts on SE research are written by people who are not the paper authors (39%). Further, 71% of all comments in our dataset are from people in the industry, but only every second post receives at least one comment at all. Based on our findings, we formulate concrete advice for researchers and practitioners to make sharing new research findings on LinkedIn more fruitful.", "label": 0, "field": "cs"} {"text": "Title: Singular metrics and a conjecture by Campana and Peternell\nAbstract: A conjecture by Campana and Peternell says that if a positive multiple of $K_X$ is linearly equivalent to an effective divisor $D$ plus a pseudo-effective divisor, then the Kodaira dimension of $X$ should be at least as big as the Iitaka dimension of $D$. This is a very useful generalization of the non-vanishing conjecture (which is the case $D = 0$). We use recent work about singular metrics on pluri-adjoint bundles to show that the Campana-Peternell conjecture is almost equivalent to the non-vanishing conjecture.", "label": 1, "field": "math"} {"text": "Title: Perceptual Musical Features for Interpretable Audio Tagging\nAbstract: In the age of music streaming platforms, the task of automatically tagging music audio has garnered significant attention, driving researchers to devise methods aimed at enhancing performance metrics on standard datasets. Most recent approaches rely on deep neural networks, which, despite their impressive performance, possess opacity, making it challenging to elucidate their output for a given input. While the issue of interpretability has been emphasized in other fields like medicine, it has not received attention in music-related tasks. In this study, we explored the relevance of interpretability in the context of automatic music tagging. We constructed a workflow that incorporates three different information extraction techniques: a) leveraging symbolic knowledge, b) utilizing auxiliary deep neural networks, and c) employing signal processing to extract perceptual features from audio files. These features were subsequently used to train an interpretable machine-learning model for tag prediction. We conducted experiments on two datasets, namely the MTG-Jamendo dataset and the GTZAN dataset. Our method surpassed the performance of baseline models in both tasks and, in certain instances, demonstrated competitiveness with the current state-of-the-art. We conclude that there are use cases where the deterioration in performance is outweighed by the value of interpretability.", "label": 0, "field": "cs"} {"text": "Title: Answers to Two Questions on the DP Color Function\nAbstract: DP-coloring is a generalization of list coloring that was introduced in 2015 by Dvo\\v{r}\\'{a}k and Postle. The chromatic polynomial of a graph is a notion that has been extensively studied since the early 20th century. The chromatic polynomial of graph $G$ is denoted $P(G,m)$, and it is equal to the number of proper $m$-colorings of $G$. In 2019, Kaul and Mudrock introduced an analogue of the chromatic polynomial for DP-coloring; specifically, the DP color function of graph $G$ is denoted $P_{DP}(G,m)$. Two fundamental questions posed by Kaul and Mudrock are: (1) For any graph $G$ with $n$ vertices, is it the case that $P(G,m)-P_{DP}(G,m) = O(m^{n-3})$ as $m \\rightarrow \\infty$? and (2) For every graph $G$, does there exist $p,N \\in \\mathbb{N}$ such that $P_{DP}(K_p \\vee G, m) = P(K_p \\vee G, m)$ whenever $m \\geq N$? We show that the answer to both these questions is yes. In fact, we show the answer to (2) is yes even if we require $p=1$.", "label": 1, "field": "math"} {"text": "Title: Codes and Designs in Johnson Graphs From Symplectic Actions on Quadratic Forms\nAbstract: The Johnson graph $J(v, k)$ has as vertices the $k$-subsets of $\\mathcal{V}=\\{1,\\ldots, v\\}$, and two vertices are joined by an edge if their intersection has size $k-1$. An \\emph{$X$-strongly incidence-transitive code} in $J (v, k)$ is a proper vertex subset $\\Gamma$ such that the subgroup $X$ of graph automorphisms leaving $\\Gamma$ invariant is transitive on the set $\\Gamma$ of `codewords', and for each codeword $\\Delta$, the setwise stabiliser $X_\\Delta$ is transitive on $\\Delta \\times (\\mathcal{V}\\setminus \\Delta)$. We classify the \\emph{$X$-strongly incidence-transitive codes} in $J(v,k)$ for which $X$ is the symplectic group $\\mathrm{Sp}_{2n}(2)$ acting as a $2$-transitive permutation group of degree $2^{2n-1}\\pm 2^{n-1}$, where the stabiliser $X_\\Delta$ of a codeword $\\Delta$ is contained in a \\emph{geometric} maximal subgroup of $X$. In particular, we construct two new infinite families of strongly incidence-transitive codes associated with the reducible maximal subgroups of $\\mathrm{Sp}_{2n}(2)$.", "label": 1, "field": "math"} {"text": "Title: Generalized Modularity Embedding: a General Framework for Network Embedding\nAbstract: The network embedding problem aims to map nodes that are similar to each other to vectors in a Euclidean space that are close to each other. Like centrality analysis (ranking) and community detection, network embedding is in general considered as an ill-posed problem, and its solution may depend on a person's view on this problem. In this book chapter, we adopt the framework of sampled graphs that treat a person's view as a sampling method for a network. The modularity for a sampled graph, called the generalized modularity in the book chapter, is a similarity matrix that has a specific probabilistic interpretation. One of the main contributions of this book chapter is to propose using the generalized modularity matrix for network embedding and show that the network embedding problem can be treated as a trace maximization problem like the community detection problem. Our generalized modularity embedding approach is very general and flexible. In particular, we show that the Laplacian eigenmaps is a special case of our generalized modularity embedding approach. Also, we show that dimensionality reduction can be done by using a particular sampled graph. Various experiments are conducted on real datasets to illustrate the effectiveness of our approach.", "label": 1, "field": "cs"} {"text": "Title: The singular limit of the Water-Waves equations in the rigid lid regime\nAbstract: The re-scaled Water-Waves equations depend strongly on the ratio epsilon between the amplitude of the wave and the depth of the water. We investigate in this paper the convergence as epsilon goes to zero of the free surface Euler equations to the so called rigid lid model. We first prove that the only solutions of this model are zero. Due to the conservation of the Hamiltonian, the solutions of the free surface Euler equations converge weakly to zero, but not strongly in the general case, as epsilon goes to zero. We then study this default of convergence. More precisely, we show a strong convergence result of the solutions of the water waves equations in the Zakharov-Craig-Sulem formulation to the solutions of the linear water-waves equations. It is then easy to observe that these latter converge weakly to zero. The simple structure of this system also allows us to explain the mechanisms of the weak convergence to zero. Finally, we show that this convergence to the rigid lid model also holds for the solutions of the Euler equations. To this end we give a new proof of the equivalence of the free surface Euler equations and of the Zakharov-Craig-Sulem equation by building an extension of the velocity and pressure fields.", "label": 1, "field": "math"} {"text": "Title: Mid-point embedding of Hamiltonian systems and variational integrators\nAbstract: Following the discrete embedding formalism, we give a new derivation of the mid-point variational integrators as developed by J.M. Wendlandt and J.E. Marsden by defining an adapted order two discrete differential and integral calculus. This allows us to obtain a clearer correspondence between the discrete and continuous case. We also discuss the corresponding definition of a discrete Hamiltonian system. A complete comparaison with the results of J.M. Wendlandt and J.E. Marsden is provided.", "label": 1, "field": "math"} {"text": "Title: Federated Calibration and Evaluation of Binary Classifiers\nAbstract: We address two major obstacles to practical use of supervised classifiers on distributed private data. Whether a classifier was trained by a federation of cooperating clients or trained centrally out of distribution, (1) the output scores must be calibrated, and (2) performance metrics must be evaluated -- all without assembling labels in one place. In particular, we show how to perform calibration and compute precision, recall, accuracy and ROC-AUC in the federated setting under three privacy models (i) secure aggregation, (ii) distributed differential privacy, (iii) local differential privacy. Our theorems and experiments clarify tradeoffs between privacy, accuracy, and data efficiency. They also help decide whether a given application has sufficient data to support federated calibration and evaluation.", "label": 1, "field": "cs"} {"text": "Title: Cyclic codes from low differentially uniform functions\nAbstract: Cyclic codes have many applications in consumer electronics, communication and data storage systems due to their efficient encoding and decoding algorithms. An efficient approach to constructing cyclic codes is the sequence approach. In their articles [Discrete Math. 321, 2014] and [SIAM J. Discrete Math. 27(4), 2013], Ding and Zhou constructed several classes of cyclic codes from almost perfect nonlinear (APN) functions and planar functions over finite fields and presented some open problems on cyclic codes from highly nonlinear functions. This article focuses on these exciting works by investigating new insights in this research direction. Specifically, its objective is twofold. The first is to provide a complement with some former results and present correct proofs and statements on some known ones on the cyclic codes from the APN functions. The second is studying the cyclic codes from some known functions processing low differential uniformity. Along with this article, we shall provide answers to some open problems presented in the literature. The first one concerns Open Problem 1, proposed by Ding and Zhou in Discrete Math. 321, 2014. The two others are Open Problems 5.16 and 5.25, raised by Ding in [SIAM J. Discrete Math. 27(4), 2013].", "label": 1, "field": "cs"} {"text": "Title: The relation between Granger causality and directed information theory: a review\nAbstract: This report reviews the conceptual and theoretical links between Granger causality and directed information theory. We begin with a short historical tour of Granger causality, concentrating on its closeness to information theory. The definitions of Granger causality based on prediction are recalled, and the importance of the observation set is discussed. We present the definitions based on conditional independence. The notion of instantaneous coupling is included in the definitions. The concept of Granger causality graphs is discussed. We present directed information theory from the perspective of studies of causal influences between stochastic processes. Causal conditioning appears to be the cornerstone for the relation between information theory and Granger causality. In the bivariate case, the fundamental measure is the directed information, which decomposes as the sum of the transfer entropies and a term quantifying instantaneous coupling. We show the decomposition of the mutual information into the sums of the transfer entropies and the instantaneous coupling measure, a relation known for the linear Gaussian case. We study the multivariate case, showing that the useful decomposition is blurred by instantaneous coupling. The links are further developed by studying how measures based on directed information theory naturally emerge from Granger causality inference frameworks as hypothesis testing.", "label": 1, "field": "cs"} {"text": "Title: A Distributed SDN Control Plane for Consistent Policy Updates\nAbstract: Software-defined networking (SDN) is a novel paradigm that out-sources the control of packet-forwarding switches to a set of software controllers. The most fundamental task of these controllers is the correct implementation of the \\emph{network policy}, i.e., the intended network behavior. In essence, such a policy specifies the rules by which packets must be forwarded across the network. This paper studies a distributed SDN control plane that enables \\emph{concurrent} and \\emph{robust} policy implementation. We introduce a formal model describing the interaction between the data plane and a distributed control plane (consisting of a collection of fault-prone controllers). Then we formulate the problem of \\emph{consistent} composition of concurrent network policy updates (short: the \\emph{CPC Problem}). To anticipate scenarios in which some conflicting policy updates must be rejected, we enable the composition via a natural \\emph{transactional} interface with all-or-nothing semantics. We show that the ability of an $f$-resilient distributed control plane to process concurrent policy updates depends on the tag complexity, i. e., the number of policy labels (a.k.a. \\emph{tags}) available to the controllers, and describe a CPC protocol with optimal tag complexity $f+2$.", "label": 1, "field": "cs"} {"text": "Title: Design and Implementation Considerations for a Virtual File System Using an Inode Data Structure\nAbstract: Virtual file systems are a tool to centralize and mobilize a file system that could otherwise be complex and consist of multiple hierarchies, hard disks, and more. In this paper, we discuss the design of Unix-based file systems and how this type of file system layout using inode data structures and a disk emulator can be implemented as a single-file virtual file system in Linux. We explore the ways that virtual file systems are vulnerable to security attacks and introduce straightforward solutions that can be implemented to help prevent or mitigate the consequences of such attacks.", "label": 0, "field": "cs"} {"text": "Title: Approximate Equilibria in Generalized Colonel Blotto and Generalized Lottery Blotto Games\nAbstract: In the Colonel Blotto game, two players with a fixed budget simultaneously allocate their resources across n battlefields to maximize the aggregate value gained from the battlefields where they have the higher allocation. Despite its long-standing history and important applications, the Colonel Blotto game still lacks a complete Nash equilibrium characterization in its most general form where players are asymmetric and battlefields' values are heterogeneous across battlefields and different between the two players---this is called the Generalized Colonel Blotto game. In this work, we propose a simply-constructed class of strategies---the independently uniform strategies---and we prove that they are approximate equilibria of the Generalized Colonel Blotto game; moreover, we characterize the approximation error according to the game's parameters. We also consider an extension called the Generalized Lottery Blotto game, with stochastic winner-determination rules allowing more flexibility in modeling practical contests. We prove that the proposed strategies are also approximate equilibria of the Generalized Lottery Blotto game.", "label": 1, "field": "cs"} {"text": "Title: Implementation Notes for the Soft Cosine Measure\nAbstract: The standard bag-of-words vector space model (VSM) is efficient, and ubiquitous in information retrieval, but it underestimates the similarity of documents with the same meaning, but different terminology. To overcome this limitation, Sidorov et al. proposed the Soft Cosine Measure (SCM) that incorporates term similarity relations. Charlet and Damnati showed that the SCM is highly effective in question answering (QA) systems. However, the orthonormalization algorithm proposed by Sidorov et al. has an impractical time complexity of $\\mathcal O(n^4)$, where n is the size of the vocabulary. In this paper, we prove a tighter lower worst-case time complexity bound of $\\mathcal O(n^3)$. We also present an algorithm for computing the similarity between documents and we show that its worst-case time complexity is $\\mathcal O(1)$ given realistic conditions. Lastly, we describe implementation in general-purpose vector databases such as Annoy, and Faiss and in the inverted indices of text search engines such as Apache Lucene, and ElasticSearch. Our results enable the deployment of the SCM in real-world information retrieval systems.", "label": 1, "field": "cs"} {"text": "Title: Applications of machine learning and IoT for Outdoor Air Pollution Monitoring and Prediction: A Systematic Literature Review\nAbstract: According to the World Health Organization (WHO), air pollution kills seven million people every year. Outdoor air pollution is a major environmental health problem affecting low, middle, and high-income countries. In the past few years, the research community has explored IoT-enabled machine learning applications for outdoor air pollution prediction. The general objective of this paper is to systematically review applications of machine learning and Internet of Things (IoT) for outdoor air pollution prediction and the combination of monitoring sensors and input features used. Two research questions were formulated for this review. 1086 publications were collected in the initial PRISMA stage. After the screening and eligibility phases, 37 papers were selected for inclusion. A cost-based analysis was conducted on the findings to highlight high-cost monitoring, low-cost IoT and hybrid enabled prediction. Three methods of prediction were identified: time series, feature-based and spatio-temporal. This review's findings identify major limitations in applications found in the literature, namely lack of coverage, lack of diversity of data and lack of inclusion of context-specific features. This review proposes directions for future research and underlines practical implications in healthcare, urban planning, global synergy and smart cities.", "label": 0, "field": "cs"} {"text": "Title: Returns to the origin of the P\u00f3lya walk with stochastic resetting\nAbstract: We consider the simple random walk (or P\\'olya walk) on the one-dimensional lattice subject to stochastic resetting to the origin with probability $r$ at each time step. The focus is on the joint statistics of the numbers ${\\mathcal{N}}_t^{\\times}$ of spontaneous returns of the walker to the origin and ${\\mathcal{N}}_t^{\\bullet}$ of resetting events up to some observation time $t$. These numbers are extensive in time in a strong sense: all their joint cumulants grow linearly in $t$, with explicitly computable amplitudes, and their fluctuations are described by a smooth bivariate large deviation function. A non-trivial crossover phenomenon takes place in the regime of weak resetting and late times. Remarkably, the time intervals between spontaneous returns to the origin of the reset random walk form a renewal process described in terms of a single `dressed' probability distribution. These time intervals are probabilistic copies of the first one, the `dressed' first-passage time. The present work follows a broader study, covered in a companion paper, on general nested renewal processes.", "label": 0, "field": "math"} {"text": "Title: Universality in block dependent linear models with applications to nonparametric regression\nAbstract: Over the past decade, characterizing the exact asymptotic risk of regularized estimators in high-dimensional regression has emerged as a popular line of work. This literature considers the proportional asymptotics framework, where the number of features and samples both diverge, at a rate proportional to each other. Substantial work in this area relies on Gaussianity assumptions on the observed covariates. Further, these studies often assume the design entries to be independent and identically distributed. Parallel research investigates the universality of these findings, revealing that results based on the i.i.d.~Gaussian assumption extend to a broad class of designs, such as i.i.d.~sub-Gaussians. However, universality results examining dependent covariates so far focused on correlation-based dependence or a highly structured form of dependence, as permitted by right rotationally invariant designs. In this paper, we break this barrier and study a dependence structure that in general falls outside the purview of these established classes. We seek to pin down the extent to which results based on i.i.d.~Gaussian assumptions persist. We identify a class of designs characterized by a block dependence structure that ensures the universality of i.i.d.~Gaussian-based results. We establish that the optimal values of the regularized empirical risk and the risk associated with convex regularized estimators, such as the Lasso and ridge, converge to the same limit under block dependent designs as they do for i.i.d.~Gaussian entry designs. Our dependence structure differs significantly from correlation-based dependence, and enables, for the first time, asymptotically exact risk characterization in prevalent nonparametric regression problems in high dimensions. Finally, we illustrate through experiments that this universality becomes evident quite early, even for relatively moderate sample sizes.", "label": 0, "field": "math"} {"text": "Title: On the Composability of Statistically Secure Random Oblivious Transfer\nAbstract: We show that stand-alone statistically secure random oblivious transfer protocols based on two-party stateless primitives are statistically universally composable. I.e. they are simulatable secure with an unlimited adversary, an unlimited simulator and an unlimited environment machine. Our result implies that several previous oblivious transfer protocols in the literature which were proven secure under weaker, non-composable definitions of security can actually be used in arbitrary statistically secure applications without lowering the security.", "label": 1, "field": "cs"} {"text": "Title: Performance Analysis of Clustered LoRa Networks\nAbstract: In this paper, we investigate the uplink transmission performance of low-power wide-area (LPWA) networks with regards to coexisting radio modules. We adopt long range (LoRa) radio technique as an example of the network of focus even though our analysis can be easily extended to other situations. We exploit a new topology to model the network, where the node locations of LoRa follow a Poisson cluster process (PCP) while other coexisting radio modules follow a Poisson point process (PPP). Unlike most of the performance analysis based on stochastic geometry, we take noise into consideration. More specifically, two models, with a fixed and a random number of active LoRa nodes in each cluster, respectively, are considered. To obtain insights, both the exact and simple approximated expressions for coverage probability are derived. Based on them, area spectral efficiency and energy efficiency are obtained. From our analysis, we show how the performance of LPWA networks can be enhanced through adjusting the density of LoRa nodes around each LoRa receiver. Moreover, the simulation results unveil that the optimal number of active LoRa nodes in each cluster exists to maximize the area spectral efficiency.", "label": 1, "field": "cs"} {"text": "Title: An Equivariant Tensor Product on Mackey Functors\nAbstract: For all subgroups $H$ of a cyclic $p$-group $G$ we define norm functors that build a $G$-Mackey functor from an $H$-Mackey functor. We give an explicit construction of these functors in terms of generators and relations based solely on the intrinsic, algebraic properties of Mackey functors and Tambara functors. We use these norm functors to define a monoidal structure on the category of Mackey functors where Tambara functors are the commutative ring objects.", "label": 1, "field": "math"} {"text": "Title: Membrane-Dependent Neuromorphic Learning Rule for Unsupervised Spike Pattern Detection\nAbstract: Several learning rules for synaptic plasticity, that depend on either spike timing or internal state variables, have been proposed in the past imparting varying computational capabilities to Spiking Neural Networks. Due to design complications these learning rules are typically not implemented on neuromorphic devices leaving the devices to be only capable of inference. In this work we propose a unidirectional post-synaptic potential dependent learning rule that is only triggered by pre-synaptic spikes, and easy to implement on hardware. We demonstrate that such a learning rule is functionally capable of replicating computational capabilities of pairwise STDP. Further more, we demonstrate that this learning rule can be used to learn and classify spatio-temporal spike patterns in an unsupervised manner using individual neurons. We argue that this learning rule is computationally powerful and also ideal for hardware implementations due to its unidirectional memory access.", "label": 1, "field": "cs"} {"text": "Title: High order Lagrange-Galerkin methods for the conservative formulation of the advection-diffusion equation\nAbstract: We introduce in this paper the numerical analysis of high order both in time and space Lagrange-Galerkin methods for the conservative formulation of the advection-diffusion equation. As time discretization scheme we consider the Backward Differentiation Formulas up to order $q=5$. The development and analysis of the methods are performed in the framework of time evolving finite elements presented in C. M. Elliot and T. Ranner, IMA Journal of Numerical Analysis \\textbf{41}, 1696-1845 (2021). The error estimates show through their dependence on the parameters of the equation the existence of different regimes in the behavior of the numerical solution; namely, in the diffusive regime, that is, when the diffusion parameter $\\mu$ is large, the error is $O(h^{k+1}+\\Delta t^{q})$, whereas in the advective regime, $\\mu \\ll 1$, the convergence is $O(\\min (h^{k},\\frac{h^{k+1} }{\\Delta t})+\\Delta t^{q})$. It is worth remarking that the error constant does not have exponential $\\mu ^{-1}$ dependence.", "label": 0, "field": "math"} {"text": "Title: Penalty Parameter Selection in Deconvolution by Estimating the Risk for a Smaller Sample Size\nAbstract: We address the choice of penalty parameter in the Smoothness-Penalized Deconvolution (SPeD) method of estimating a probability density under additive measurement error. Cross-validation gives an unbiased estimate of the risk (for the present sample size n) with a given penalty parameter, and this function can be minimized as a function of the penalty parameter. Least-squares cross-validation, which has been proposed for the similar Deconvoluting Kernel Density Estimator (DKDE), performs quite poorly for SPeD. We instead estimate the risk function for a smaller sample size n_1 < n with a given penalty parameter, using this to choose the penalty parameter for sample size n_1, and then use the asymptotics of the optimal penalty parameter to choose for sample size n. In a simulation study, we find that this has dramatically better performance than cross-validation, is an improvement over a SURE-type method previously proposed for this estimator, and compares favorably to the classic DKDE with its recommended plug-in method. We prove that the maximum error in estimating the risk function is of smaller order than its optimal rate of convergence.", "label": 0, "field": "math"} {"text": "Title: On the homology of locally finite graphs\nAbstract: We show that the topological cycle space of a locally finite graph is a canonical quotient of the first singular homology group of its Freudenthal compactification, and we characterize the graphs for which the two coincide. We construct a new singular-type homology for non-compact spaces with ends, which in dimension~1 captures precisely the topological cycle space of graphs but works in any dimension.", "label": 1, "field": "math"} {"text": "Title: A new characterization of $E_8 (p)$ via its vanishing elements\nAbstract: Let $G$ be a finite group, and $g \\in G$. Then $g$ is said to be a vanishing element of $G$, if there exists an irreducible character $\\chi$ of $G$ such that $\\chi (g)=0$. Denote by ${\\rm Vo} (G)$ the set of the orders of vanishing elements of $G$. We say a non-abelian group $G$ is V-recognizable, if any group $N$ with ${\\rm Vo} (N) = {\\rm Vo} (G)$ is isomorphic to $G$. In this paper, we investigate the V-recognizability of $E_8 (p)$, where $p$ is a prime number. As an application, among the 610 primes $p$ with $p<10000$ and $p \\equiv 0,1,4\\,(\\!\\!\\!\\mod 5)$, we obtain that the method is always valid for confirming the V-recognizability of $E_8 (p)$ for all such $p$ but $ 919,1289,1931,3911,4691,5381$ and $7589 $.", "label": 0, "field": "math"} {"text": "Title: Extension of the Topological Abel-Jacobi Map for Cubic Threefolds\nAbstract: The difference $[L_1]-[L_2]$ of a pair of skew lines on a cubic threefold defines a vanishing cycle on the cubic surface as the hyperplane section spanned by the two lines. By deforming the hyperplane, the flat translation of such vanishing cycle forms a 72-to-1 covering space $T_v$ of a Zariski open subspace of $(\\mathbb P^4)^*$. Based on a lemma of Stein on the compactification of finite analytic covers, we found a compactification of $T_v$ to which the topological Abel-Jacobi map extends. Moreover, the boundary points of the compactification can be interpreted in terms of local monodromy and the singularities on cubic surfaces. We prove the associated map on fundamental groups of topological Abel-Jacobi map is surjective.", "label": 0, "field": "math"} {"text": "Title: Design and Actuator Optimization of Lightweight and Compliant Knee Exoskeleton for Mobility Assistance of Children with Crouch Gait\nAbstract: Pediatric exoskeletons offer great promise to increase mobility for children with crouch gait caused by cerebral palsy. A lightweight, compliant and user-specific actuator is critical for maximizing the benefits of an exoskeleton to users. To date, pediatric exoskeletons generally use the same actuators as adult exoskeletons, which are heavy and resistive to natural movement. There is yet no easy way for robotic exoskeletons to accommodate the changes in design requirements that occur as a child ages. We developed a lightweight (1.65 kg unilateral mass) and compliant pediatric knee exoskeleton with a bandwidth of 22.6 Hz that can provide torque assistance to children with crouch gait using high torque density motor. Experimental results demonstrated that the robot exhibited low mechanical impedance (1.79 Nm average backdrive torque) under the unpowered condition and 0.32 Nm with zero-torque tracking control. Root mean square (RMS) error of torque tracking result is less than 0.73 Nm (5.7% with respect to 12 Nm torque). To achieve optimal age-specific performance, we proposed the first optimization framework that considered both motor and transmission of the actuator system that can produce optimal settings for children between 3 and 18 years old. The optimization generated an optimal motor air gap radius that monotonically increases with age from 0.011 to 0.033 meters, and optimal gear ratio varies from 2.6 to 11.6 (3-13 years old) and 11.6 to 10.2 (13-18 years old), leading to actuators of minimal mass.", "label": 1, "field": "cs"} {"text": "Title: Deplatforming Norm-Violating Influencers on Social Media Reduces Overall Online Attention Toward Them\nAbstract: From politicians to podcast hosts, online platforms have systematically banned (``deplatformed'') influential users for breaking platform guidelines. Previous inquiries on the effectiveness of this intervention are inconclusive because 1) they consider only few deplatforming events; 2) they consider only overt engagement traces (e.g., likes and posts) but not passive engagement (e.g., views); 3) they do not consider all the potential places users impacted by the deplatforming event might migrate to. We address these limitations in a longitudinal, quasi-experimental study of 165 deplatforming events targeted at 101 influencers. We collect deplatforming events from Reddit posts and then manually curate the data, ensuring the correctness of a large dataset of deplatforming events. Then, we link these events to Google Trends and Wikipedia page views, platform-agnostic measures of online attention that capture the general public's interest in specific influencers. Through a difference-in-differences approach, we find that deplatforming reduces online attention toward influencers. After 12 months, we estimate that online attention toward deplatformed influencers is reduced by -63% (95% CI [-75%,-46%]) on Google and by -43% (95% CI [-57%,-24%]) on Wikipedia. Further, as we study over a hundred deplatforming events, we can analyze in which cases deplatforming is more or less impactful, revealing nuances about the intervention. Notably, we find that both permanent and temporary deplatforming reduce online attention toward influencers; Overall, this work contributes to the ongoing effort to map the effectiveness of content moderation interventions, driving platform governance away from speculation.", "label": 0, "field": "cs"} {"text": "Title: Ballistic random walks in random environment as rough paths: convergence and area anomaly\nAbstract: Annealed functional CLT in the rough path topology is proved for the standard class of ballistic random walks in random environment. Moreover, the `area anomaly', i.e. a deterministic linear correction for the second level iterated integral of the rescaled path, is identified in terms of a stochastic area on a regeneration interval. The main theorem is formulated in more general settings, namely for any discrete process with uniformly bounded increments which admits a regeneration structure where the regeneration times have finite moments. Here the largest finite moment translates into the degree of regularity of the rough path topology. In particular, the convergence holds in the $\\alpha$-H\\\"older rough path topology for all $\\alpha<1/2$ whenever all moments are finite, which is the case for the class of ballistic random walks in random environment. The latter may be compared to a special class of random walks in Dirichlet environments for which the regularity $\\alpha<1/2$ is bounded away from $1/2$, explicitly in terms of the corresponding trap parameter.", "label": 1, "field": "math"} {"text": "Title: Non-contractible closed geodesics on compact Finsler space forms without self-intersections\nAbstract: Let $M=S^n/ \\Gamma$ and $h \\in \\pi_1(M)$ be a non-trivial element of finite order $p$, where the integers $n, p\\geq2$ and $\\Gamma$ is a finite abelian group which acts on the sphere freely and isometrically. Therefore $M$ is diffeomorphic to a compact space form which is a typical non-simply connected manifold. For $\\Gamma =\\mathbb{Z}_2$, we obtain there are at least two non-contractible closed geodesics on $\\mathbb{R}P^2$ whose lengths are bounded by geometry of the manifold from above. Moreover, suppose $g_0$ is standard Riemannian metric. We prove that there exists at least $n$ prime non-contractible closed geodesics on $(M,F)$ of prescribed class $[h]$ without self-intersections, provided $F^2 <(\\frac{\\lambda+1}{\\lambda})^2 g_0$ and \\[(\\frac{\\lambda}{\\lambda+1})^2 < K \\leq 1 \\text{ for $n$ is odd or }\\; 0 4$, such that $a_k$ can be arbitrarily large whilst $a_i$ is constant for $1 \\leq i < \\frac{k}{4}$.", "label": 0, "field": "math"} {"text": "Title: A Generative AI Assistant to Accelerate Cloud Migration\nAbstract: We present a tool that leverages generative AI to accelerate the migration of on-premises applications to the cloud. The Cloud Migration LLM accepts input from the user specifying the parameters of their migration, and outputs a migration strategy with an architecture diagram. A user study suggests that the migration LLM can assist inexperienced users in finding the right cloud migration profile, while avoiding complexities of a manual approach.", "label": 0, "field": "cs"} {"text": "Title: Bounds on the minimum distance of locally recoverable codes\nAbstract: We consider locally recoverable codes (LRCs) and aim to determine the smallest possible length $n=n_q(k,d,r)$ of a linear $[n,k,d]_q$-code with locality $r$. For $k\\le 7$ we exactly determine all values of $n_2(k,d,2)$ and for $k\\le 6$ we exactly determine all values of $n_2(k,d,1)$. For the ternary field we also state a few numerical results. As a general result we prove that $n_q(k,d,r)$ equals the Griesmer bound if the minimum Hamming distance $d$ is sufficiently large and all other parameters are fixed.", "label": 0, "field": "math"} {"text": "Title: The convolution algebra of an absolutely locally compact topos\nAbstract: We introduce a class of toposes called \"absolutely locally compact\" toposes and of \"admissible\" sheaf of rings over such toposes. To any such ringed topos $(\\mathcal{T},A)$ we attach an involutive convolution algebra $\\mathcal{C}_c(\\mathcal{T},A)$ which is well defined up to Morita equivalence and characterized by the fact that the category of non-degenerate modules over $\\mathcal{C}_c(\\mathcal{T},A)$ is equivalent to the category of sheaf of $A$-module over $\\mathcal{T}$. In the case where $A$ is the sheaf of real or complex Dedekind numbers, we construct several norms on this involutive algebra that allows to complete it in various Banach and $C^*$-algebras: $L^1(\\mathcal{T},A)$, $C^*_{red}(\\mathcal{T},A)$ and $C^*_{max}(\\mathcal{T},A)$. We also give some examples where this construction corresponds to well known constructions of involutive algebras, like groupoids convolution algebra and Leavitt path algebras.", "label": 1, "field": "math"} {"text": "Title: Shifted Composition II: Shift Harnack Inequalities and Curvature Upper Bounds\nAbstract: We apply the shifted composition rule -- an information-theoretic principle introduced in our earlier work [AC23] -- to establish shift Harnack inequalities for the Langevin diffusion. We obtain sharp constants for these inequalities for the first time, allowing us to investigate their relationship with other properties of the diffusion. Namely, we show that they are equivalent to a sharp \"local gradient-entropy\" bound, and that they imply curvature upper bounds in a compelling reflection of the Bakry-Emery theory of curvature lower bounds. Finally, we show that the local gradient-entropy inequality implies optimal concentration of the score, a.k.a. the logarithmic gradient of the density.", "label": 0, "field": "math"} {"text": "Title: Urban Surface Reconstruction in SAR Tomography by Graph-Cuts\nAbstract: SAR (Synthetic Aperture Radar) tomography reconstructs 3-D volumes from stacks of SAR images. High-resolution satellites such as TerraSAR-X provide images that can be combined to produce 3-D models. In urban areas, sparsity priors are generally enforced during the tomographic inversion process in order to retrieve the location of scatterers seen within a given radar resolution cell. However, such priors often miss parts of the urban surfaces. Those missing parts are typically regions of flat areas such as ground or rooftops. This paper introduces a surface segmentation algorithm based on the computation of the optimal cut in a flow network. This segmentation process can be included within the 3-D reconstruction framework in order to improve the recovery of urban surfaces. Illustrations on a TerraSAR-X tomographic dataset demonstrate the potential of the approach to produce a 3-D model of urban surfaces such as ground, fa\\c{c}ades and rooftops.", "label": 1, "field": "cs"} {"text": "Title: Local semicircle law with imprimitive variance matrix\nAbstract: We extend the proof of the local semicircle law for generalized Wigner matrices given in [4] to the case when the matrix of variances has an eigenvalue $ -1 $. In particular, this result provides a short proof of the optimal local Marchenko-Pastur law at the hard edge (i.e. around zero) for sample covariance matrices $ \\boldsymbol{\\mathrm{X}}^\\ast \\boldsymbol{\\mathrm{X}} $, where the variances of the entries of $ \\boldsymbol{\\mathrm{X}} $ may vary.", "label": 1, "field": "math"} {"text": "Title: A Non-Holonomic Systems Approach to Special Function Identities\nAbstract: We extend Zeilberger's approach to special function identities to cases that are not holonomic. The method of creative telescoping is thus applied to definite sums or integrals involving Stirling or Bernoulli numbers, incomplete Gamma function or polylogarithms, which are not covered by the holonomic framework. The basic idea is to take into account the dimension of appropriate ideals in Ore algebras. This unifies several earlier extensions and provides algorithms for summation and integration in classes that had not been accessible to computer algebra before.", "label": 1, "field": "cs"} {"text": "Title: On mild solutions to some dissipative SPDEs on $L^p$ spaces with additive noise\nAbstract: We establish well-posedness in the mild sense for a class of stochastic semilinear evolution equations on $L^p$ spaces on bounded domains of $\\mathbb{R}^n$ with a nonlinear drift term given by the superposition operator generated by a monotone function on the real line with power-like growth. The noise is of additive type with respect to a cylindrical Wiener process, with diffusion coefficient not necessarily of $\\gamma$-Radonifying type.", "label": 0, "field": "math"} {"text": "Title: A Borsuk--Ulam theorem for well separated maps\nAbstract: Suppose that $f_1,\\ldots ,f_m : S(V)\\to R$ are $m$ ($\\geq 1$) continuous functions defined on the unit sphere in a Euclidean vector space $V$ of dimension $m+1$ satisfying $f_i(-v)=-f_i(v)$ for all $v\\in S(V)$. The classical Borsuk-Ulam theorem asserts that the image of the map $(f_1,\\ldots ,f_m) :S(V)\\to R^m$ contains $0=(0,\\ldots ,0)$. Pursuing ideas in papers of B\\'ar\\'any, Hubard and J\\'eronimo (2008) and Frick and Wellner (2023), we show that a certain separation property will guarantee that the image contains an $m$-cube.", "label": 0, "field": "math"} {"text": "Title: Multi-Source Domain Adaptation with Transformer-based Feature Generation for Subject-Independent EEG-based Emotion Recognition\nAbstract: Although deep learning-based algorithms have demonstrated excellent performance in automated emotion recognition via electroencephalogram (EEG) signals, variations across brain signal patterns of individuals can diminish the model's effectiveness when applied across different subjects. While transfer learning techniques have exhibited promising outcomes, they still encounter challenges related to inadequate feature representations and may overlook the fact that source subjects themselves can possess distinct characteristics. In this work, we propose a multi-source domain adaptation approach with a transformer-based feature generator (MSDA-TF) designed to leverage information from multiple sources. The proposed feature generator retains convolutional layers to capture shallow spatial, temporal, and spectral EEG data representations, while self-attention mechanisms extract global dependencies within these features. During the adaptation process, we group the source subjects based on correlation values and aim to align the moments of the target subject with each source as well as within the sources. MSDA-TF is validated on the SEED dataset and is shown to yield promising results.", "label": 0, "field": "cs"} {"text": "Title: Characters and chromatic symmetric functions\nAbstract: Let $P$ be a poset, $inc(P)$ its incomparability graph, and $X_{inc(P)}$ the corresponding chromatic symmetric function, as defined by Stanley in {\\em Adv. Math.}, {\\bf 111} (1995) pp.~166--194. Certain conditions on $P$ imply that the expansions of $X_{inc(P)}$ in standard symmetric function bases yield coefficients which have simple combinatorial interpretations. By expressing these coefficients as character evaluations, we extend several of these interpretations to {\\em all} posets $P$. Consequences include new combinatorial interpretations of the permanent and other immanants of totally nonnegative matrices, and of the sum of elementary coefficients in the Shareshian-Wachs chromatic quasisymmetric function $X_{inc(P),q}$ when $P$ is a unit interval order.", "label": 1, "field": "math"} {"text": "Title: Global Invariant Branches of Non-degenerate Foliations on Projective Toric Surfaces\nAbstract: We show that the isolated invariant branches globalize to algebraic curves, when we consider weak toric type complex hyperbolic foliations on projective toric ambient surfaces. To do it, we pass through a characterization of weak toric type foliations in terms of \"non-degeneracy\" conditions, associated to Newton polygons. We also give a description of the relationship between invariant algebraic curves and isolated invariant branches, valid for the case of toric type, by means of the following dichotomy. Either there is a rational first integral and there are no isolated invariant branches or we have only finitely many global invariant curves, all of them extending isolated invariant branches.", "label": 1, "field": "math"} {"text": "Title: Sorting Can Exponentially Speed Up Pure Dynamic Programming\nAbstract: Many discrete minimization problems, including various versions of the shortest path problem, can be efficiently solved by dynamic programming (DP) algorithms that are \"pure\" in that they only perform basic operations, as min, max, +, but no conditional branchings via if-then-else in their recursion equations. It is known that any pure (min,+) DP algorithm solving the minimum weight spanning tree problem on undirected n-vertex graphs must perform at least $2^{\\Omega(\\sqrt{n})}$ operations. We show that this problem can be solved by a pure (min,max,+) DP algorithm performing only $O(n^3)$ operations. The algorithm is essentially a (min,max) algorithm: addition operations are only used to output the final values. The presence of both min and max operations means that now DP algorithms can sort: this explains the title of the paper.", "label": 1, "field": "cs"} {"text": "Title: Multidimensional Sticky Brownian Motions: Tail Behaviour of the Joint Stationary Distribution\nAbstract: Sticky Brownian motions, as time-changed semimartingale reflecting Brownian motions, have various applications in many fields, including queuing theory and mathematical finance. In this paper, we are concerned about the stationary distributions of a multidimensional sticky Brownian motion, provided it is stable. We will study the large deviations principle for stationary distribution and the tail behaviour of the joint stationary distribution.", "label": 1, "field": "math"} {"text": "Title: Spin systems with hyperbolic symmetry: a survey\nAbstract: Spin systems with hyperbolic symmetry originated as simplified models for the Anderson metal--insulator transition, and were subsequently found to exactly describe probabilistic models of linearly reinforced walks and random forests. In this survey we introduce these models, discuss their origins and main features, some existing tools available for their study, recent probabilistic results, and relations to other well-studied probabilistic models. Along the way we discuss some of the (many) open questions that remain.", "label": 1, "field": "math"} {"text": "Title: EcoFed: Efficient Communication for DNN Partitioning-based Federated Learning\nAbstract: Efficiently running federated learning (FL) on resource-constrained devices is challenging since they are required to train computationally intensive deep neural networks (DNN) independently. DNN partitioning-based FL (DPFL) has been proposed as one mechanism to accelerate training where the layers of a DNN (or computation) are offloaded from the device to the server. However, this creates significant communication overheads since the intermediate activation and gradient need to be transferred between the device and the server during training. While current research reduces the communication introduced by DNN partitioning using local loss-based methods, we demonstrate that these methods are ineffective in improving the overall efficiency (communication overhead and training speed) of a DPFL system. This is because they suffer from accuracy degradation and ignore the communication costs incurred when transferring the activation from the device to the server. This article proposes EcoFed - a communication efficient framework for DPFL systems. EcoFed eliminates the transmission of the gradient by developing pre-trained initialization of the DNN model on the device for the first time. This reduces the accuracy degradation seen in local loss-based methods. In addition, EcoFed proposes a novel replay buffer mechanism and implements a quantization-based compression technique to reduce the transmission of the activation. It is experimentally demonstrated that EcoFed can reduce the communication cost by up to 133x and accelerate training by up to 21x when compared to classic FL. Compared to vanilla DPFL, EcoFed achieves a 16x communication reduction and 2.86x training time speed-up. EcoFed is available from https://github.com/blessonvar/EcoFed.", "label": 0, "field": "cs"} {"text": "Title: Contractibility of the orbit space of a saturated fusion system after Steinberg\nAbstract: Recently, Steinberg used discrete Morse theory to give a new proof of a theorem of Symonds that the orbit space of the poset of nontrivial $p$-subgroups of a finite group is contractible. We extend Steinberg's argument in two ways, covering more general versions of the theorem that were already known. In particular, following a strategy of Libman, we give a discrete Morse theoretic argument for the contractibility of the orbit space of a saturated fusion system.", "label": 0, "field": "math"} {"text": "Title: The Rank of the Odd Normal Out\nAbstract: Say we have a collection of independent random variables $X_0, ... , X_n$, where $X_0 \\sim \\mathcal{N}(\\mu_0, \\sigma_0^2)$, but $X_i \\sim \\mathcal{N}(\\mu, \\sigma^2)$, for $1 \\leq i \\leq n$. We characterize the distribution of $R_0 := 1 + \\sum_{i=1}^{n} \\mathbf{1}\\{X_i \\leq X_0\\}$, the rank of the random variable whose distribution potentially differs from that of the others -- the odd normal out. We show that $R_0 - 1$ is approximately beta-binomial, an approximation that becomes equality as $\\sigma/\\sigma_0$ or $(\\mu-\\mu_0)/\\sigma_0$ become large or small. The intra-class correlation of the approximating beta-binomial depends on $\\Pr(X_1 \\leq X_0)$ and $\\Pr(X_1 \\leq X_0, X_2 \\leq X_0)$. Our approach relies on the conjugacy of the beta distribution for the binomial: $\\Phi((X_0-\\mu)/\\sigma)$ is approximately $\\mathrm{Beta}(\\alpha(\\sigma/\\sigma_0, (\\mu-\\mu_0)/\\sigma_0), \\beta(\\sigma/\\sigma_0, (\\mu-\\mu_0)/\\sigma_0))$ for functions $\\alpha, \\beta > 0$. We study the distributions of the in-normal ranks. Throughout, simulations corroborate the formulae we derive.", "label": 0, "field": "math"} {"text": "Title: Towards a Formal Modelling, Analysis, and Verification of a Clone Node Attack Detection Scheme in the Internet of Things\nAbstract: In a clone node attack, an attacker attempted to physically capture the devices to gather sensitive information to conduct various insider attacks. Several solutions for detecting clone node attacks on IoT networks have been presented in the viewpoints above. These solutions are focused on specific system designs, processes, and feature sets and act as a high-level abstraction of underlying system architectures based on a few performance requirements. However, critical features like formal analysis, modelling, and verification are frequently overlooked in existing proposed solutions aimed at verifying the correctness and robustness of systems in order to ensure that no problematic scenarios or anomalies exist. This paper presents a formal analysis, modelling, and verification of our existing proposed clone node attack detection scheme in IoT. Firstly, we modelled the architectural components of the proposed scheme using High-Level Petri Nets (HLPNs) and then mapped them using their specified functionalities. Secondly, we defined and analysed the behavioural properties of the proposed scheme using Z specification language. Furthermore, we used the Satisfiability Modulo Theories Library (SMT-Lib) and the Z3 Solver to validate and demonstrate the overall functionality of the proposed scheme. Finally, in addition to modelling and analysis, this work employs Coloured Petri Nets (CPNs), which combine Petri Nets with a high-level programming language, making them more suitable for large-scale system modelling. To perform the simulations in CPN, we used both timed and untimed models, where timed models are used to evaluate performance, and untimed models are used to validate logical validity.", "label": 1, "field": "cs"} {"text": "Title: Divides with cusps and symmetric links\nAbstract: A Divide with cusps is the image of a proper generic immersion from finite intervals and circles into a $2$-disk which allows to have cusps. A divide with cusps is the generalization of the notion of the divide which is introduced by A'Campo. From a divide with cusps, we can define the associated link in $S^3$. In this paper, we give the characterization of the link in $S^3$ which can be described as the associated link of a divide with cusps. In particular, we prove that every strongly invertible link and $2$-periodic link can be described as the link of a divide with cusps.", "label": 0, "field": "math"} {"text": "Title: On the Uniqueness of Bayesian Coarse Correlated Equilibria in Standard First-Price and All-Pay Auctions\nAbstract: In first-price and all-pay auctions under the standard symmetric independent private-values model, we show that the unique Bayesian Coarse Correlated Equilibrium with symmetric, differentiable and strictly increasing bidding strategies is the unique strict Bayesian Nash Equilibrium. Interestingly, this result does not require assumptions on the prior distribution. The proof is based on a dual bound of the infinite-dimensional linear program. Numerical experiments without restrictions on bidding strategies show that for first-price auctions and discretisations up to 21 of the type and bid space, increasing discretisation sizes actually increase the concentration of Bayesian Coarse Correlated Equilibrium over the Bayesian Nash Equilibrium, so long as the prior c.d.f. is concave. Such a concentration is also observed for all-pay auctions, independent of the prior distribution. Overall, our results imply that the equilibria of these important class of auctions are indeed learnable.", "label": 0, "field": "cs"} {"text": "Title: HawkRover: An Autonomous mmWave Vehicular Communication Testbed with Multi-sensor Fusion and Deep Learning\nAbstract: Connected and automated vehicles (CAVs) have become a transformative technology that can change our daily life. Currently, millimeter-wave (mmWave) bands are identified as the promising CAV connectivity solution. While it can provide high data rate, their realization faces many challenges such as high attenuation during mmWave signal propagation and mobility management. Existing solution has to initiate pilot signal to measure channel information, then apply signal processing to calculate the best narrow beam towards the receiver end to guarantee sufficient signal power. This process takes significant overhead and time, hence not suitable for vehicles. In this study, we propose an autonomous and low-cost testbed to collect extensive co-located mmWave signal and other sensors data such as LiDAR (Light Detection and Ranging), cameras, ultrasonic, etc, traditionally for ``automated'', to facilitate mmWave vehicular communications. Intuitively, these sensors can build a 3D map around the vehicle and signal propagation path can be estimated, eliminating iterative the process via pilot signals. This multimodal data fusion, together with AI, is expected to bring significant advances in ``connected'' research.", "label": 0, "field": "cs"} {"text": "Title: Effects of forward scattering on the onset of phototactic bioconvection in an algal suspension under diffuse flux without collimated flux\nAbstract: Phototaxis refers to the directed swimming response influenced by the sensed light intensity in microorganisms. Positive phototaxis involves motion toward the light source, while negative phototaxis entails motion away from it. This study explores the phototactic bioconvection in a suspension of anisotropic scattering phototactic algae, illuminated by diffuse flux without direct collimated flux. The basic state is characterized by zero fluid flow, with the balance between upward and downward swimming due to positive and negative phototaxis, respectively, counteracted by microorganism diffusion. The paper conducts a thorough numerical analysis of linear stability, placing particular emphasis on the impact of forward scattering. The onset of bioconvection manifests either through a stationary mode or an oscillatory mode. The transition between these modes is observed with varying anisotropic coefficients for specific parameter values.", "label": 0, "field": "math"} {"text": "Title: TSGAN: An Optical-to-SAR Dual Conditional GAN for Optical based SAR Temporal Shifting\nAbstract: In contrast to the well-investigated field of SAR-to-Optical translation, this study explores the lesser-investigated domain of Optical-to-SAR translation, a challenging field due to the ill-posed nature of this translation. The complexity arises as a single optical data can have multiple SAR representations based on the SAR viewing geometry. We propose a novel approach, termed SAR Temporal Shifting, which inputs an optical data from the desired timestamp along with a SAR data from a different temporal point but with a consistent viewing geometry as the expected SAR data, both complemented with a change map of optical data during the intervening period. This model modifies the SAR data based on the changes observed in optical data to generate the SAR data for the desired timestamp. Our model, a dual conditional Generative Adversarial Network (GAN), named Temporal Shifting GAN (TSGAN), incorporates a siamese encoder in both the Generator and the Discriminator. To prevent the model from overfitting on the input SAR data, we employed a change weighted loss function. Our approach surpasses traditional translation methods by eliminating the GAN's fiction phenomenon, particularly in unchanged regions, resulting in higher SSIM and PSNR in these areas. Additionally, modifications to the Pix2Pix architecture and the inclusion of attention mechanisms have enhanced the model's performance on all regions of the data. This research paves the way for leveraging legacy optical datasets, the most abundant and longstanding source of Earth imagery data, extending their use to SAR domains and temporal analyses. To foster further research, we provide the code, datasets used in our study, and a framework for generating paired SAR-Optical datasets for new regions of interest. These resources are available on github.com/moienr/TemporalGAN", "label": 0, "field": "cs"} {"text": "Title: On the expected L2-discrepancy of stratified samples from parallel lines\nAbstract: We study the expected $\\mathcal{L}_2$-discrepancy of stratified samples generated from special equi-volume partitions of the unit square. The partitions are defined via parallel lines that are all orthogonal to the diagonal of the square. It is shown that the expected discrepancy of stratified samples derived from these partitions is a factor 2 smaller than the expected discrepancy of the same number of i.i.d uniformly distributed random points in the unit square. We conjecture that this is best possible among all partitions generated from parallel lines.", "label": 0, "field": "math"} {"text": "Title: A Simple Construction of Tournaments with Finite and Uncountable Dichromatic Number\nAbstract: The dichromatic number $\\chi(\\vec{G})$ of a digraph $\\vec{G}$ is the minimum number of colors needed to color the vertices $V(\\vec{G})$ in such a way that no monochromatic directed cycle is obtained. In this note, for any $k\\in \\mathbb{N}$, we give a simple construction of tournaments with dichromatic number exactly equal to $k$. The proofs are based on a combinatorial lemma on partitioning a checkerboard which may be of independent interest. We also generalize our finite construction to give an elementary construction of a complete digraph of cardinality equal to the cardinality of $\\mathbb{R}$ and having an uncountable dichromatic number. Furthermore, we also construct an oriented balanced complete $n$-partite graph $\\vec{K}^{(m)}_n$, such that the minimum number of colors needed to color its vertices such that there is no monochromatic directed triangle is greater than or equal to $nm/(n+2m-2)$.", "label": 0, "field": "math"} {"text": "Title: Inverse questions for the large sieve\nAbstract: Suppose that an infinite set $A$ occupies at most $\\frac{1}{2}(p+1)$ residue classes modulo $p$, for every sufficiently large prime $p$. The squares, or more generally the integer values of any quadratic, are an example of such a set. By the large sieve inequality the number of elements of $A$ that are at most $X$ is $O(X^{1/2})$, and the quadratic examples show that this is sharp. The simplest form of the inverse large sieve problem asks whether they are the only examples. We prove a variety of results and formulate various conjectures in connection with this problem, including several improvements of the large sieve bound when the residue classes occupied by $A$ have some additive structure. Unfortunately we cannot solve the problem itself.", "label": 1, "field": "math"} {"text": "Title: Thread With Caution: Proactively Helping Users Assess and Deescalate Tension in Their Online Discussions\nAbstract: Incivility remains a major challenge for online discussion platforms, to such an extent that even conversations between well-intentioned users can often derail into uncivil behavior. Traditionally, platforms have relied on moderators to -- with or without algorithmic assistance -- take corrective actions such as removing comments or banning users. In this work we propose a complementary paradigm that directly empowers users by proactively enhancing their awareness about existing tension in the conversation they are engaging in and actively guides them as they are drafting their replies to avoid further escalation. As a proof of concept for this paradigm, we design an algorithmic tool that provides such proactive information directly to users, and conduct a user study in a popular discussion platform. Through a mixed methods approach combining surveys with a randomized controlled experiment, we uncover qualitative and quantitative insights regarding how the participants utilize and react to this information. Most participants report finding this proactive paradigm valuable, noting that it helps them to identify tension that they may have otherwise missed and prompts them to further reflect on their own replies and to revise them. These effects are corroborated by a comparison of how the participants draft their reply when our tool warns them that their conversation is at risk of derailing into uncivil behavior versus in a control condition where the tool is disabled. These preliminary findings highlight the potential of this user-centered paradigm and point to concrete directions for future implementations.", "label": 1, "field": "cs"} {"text": "Title: Nonassociative $\\mathrm{L}^p$-spaces and embeddings in noncommutative $\\mathrm{L}^p$-spaces\nAbstract: We define a notion of nonassociative $\\mathrm{L}^p$-space associated to a $\\mathrm{JBW}^*$-algebra (Jordan von Neumann algebra) equipped with a normal faithful state $\\varphi$. In the particular case of $\\mathrm{JW}^*$-algebras underlying von Neumann algebras, we connect these spaces to a complex interpolation theorem of Ricard and Xu on noncommutative $\\mathrm{L}^p$-spaces. We also make the link with the nonassociative $\\mathrm{L}^p$-spaces of Iochum associated to $\\mathrm{JBW}$-algebras and the investigation of contractively complemented subspaces of noncommutative $\\mathrm{L}^p$-spaces. More precisely, we show that our nonassociative $\\mathrm{L}^p$-spaces contain isometrically the $\\mathrm{L}^p$-spaces of Iochum and that all tracial nonassociative $\\mathrm{L}^p$-spaces from $\\mathrm{JW}^*$-factors arise as positively contractively complemented subspaces of noncommutative $\\mathrm{L}^p$-spaces.", "label": 0, "field": "math"} {"text": "Title: Duality for convex infinite optimization on linear spaces\nAbstract: This note establishes a limiting formula for the conic Lagrangian dual of a convex infinite optimization problem, correcting the classical version of Karney [Math. Programming 27 (1983) 75-82] for convex semi-infinite programs. A reformulation of the convex infinite optimization problem with a single constraint leads to a limiting formula for the corresponding Lagrangian dual, called sup-dual, and also for the primal problem in the case when strong Slater condition holds, which also entails strong sup-duality.", "label": 1, "field": "math"} {"text": "Title: Policy-regularized Offline Multi-objective Reinforcement Learning\nAbstract: In this paper, we aim to utilize only offline trajectory data to train a policy for multi-objective RL. We extend the offline policy-regularized method, a widely-adopted approach for single-objective offline RL problems, into the multi-objective setting in order to achieve the above goal. However, such methods face a new challenge in offline MORL settings, namely the preference-inconsistent demonstration problem. We propose two solutions to this problem: 1) filtering out preference-inconsistent demonstrations via approximating behavior preferences, and 2) adopting regularization techniques with high policy expressiveness. Moreover, we integrate the preference-conditioned scalarized update method into policy-regularized offline RL, in order to simultaneously learn a set of policies using a single policy network, thus reducing the computational cost induced by the training of a large number of individual policies for various preferences. Finally, we introduce Regularization Weight Adaptation to dynamically determine appropriate regularization weights for arbitrary target preferences during deployment. Empirical results on various multi-objective datasets demonstrate the capability of our approach in solving offline MORL problems.", "label": 0, "field": "cs"} {"text": "Title: Learning to Prompt with Text Only Supervision for Vision-Language Models\nAbstract: Foundational vision-language models such as CLIP are becoming a new paradigm in vision, due to their excellent generalization abilities. However, adapting these models for downstream tasks while maintaining their generalization remains a challenge. In literature, one branch of methods adapts CLIP by learning prompts using visual information. While effective, most of these works require labeled data which is not practical, and often struggle to generalize towards new datasets due to over-fitting on the source data. An alternative approach resorts to training-free methods by generating class descriptions from large language models (LLMs) and perform prompt ensembling. However, these methods often generate class specific prompts that cannot be transferred to other classes, which incur higher costs by generating LLM descriptions for each class separately. In this work, we propose to combine the strengths of these both streams of methods by learning prompts using only text data derived from LLMs. As supervised training of prompts is not trivial due to absence of images, we develop a training approach that allows prompts to extract rich contextual knowledge from LLM data. Moreover, with LLM contextual data mapped within the learned prompts, it enables zero-shot transfer of prompts to new classes and datasets potentially cutting the LLM prompt engineering cost. To the best of our knowledge, this is the first work that learns generalized prompts using text only data. We perform extensive evaluations on 4 benchmarks where our method improves over prior ensembling works while being competitive to those utilizing labeled images. Our code and pre-trained models are available at https://github.com/muzairkhattak/ProText.", "label": 0, "field": "cs"} {"text": "Title: PEGASUS: Physically Enhanced Gaussian Splatting Simulation System for 6DOF Object Pose Dataset Generation\nAbstract: We introduce Physically Enhanced Gaussian Splatting Simulation System (PEGASUS) for 6DOF object pose dataset generation, a versatile dataset generator based on 3D Gaussian Splatting. Environment and object representations can be easily obtained using commodity cameras to reconstruct with Gaussian Splatting. PEGASUS allows the composition of new scenes by merging the respective underlying Gaussian Splatting point cloud of an environment with one or multiple objects. Leveraging a physics engine enables the simulation of natural object placement within a scene through interaction between meshes extracted for the objects and the environment. Consequently, an extensive amount of new scenes - static or dynamic - can be created by combining different environments and objects. By rendering scenes from various perspectives, diverse data points such as RGB images, depth maps, semantic masks, and 6DoF object poses can be extracted. Our study demonstrates that training on data generated by PEGASUS enables pose estimation networks to successfully transfer from synthetic data to real-world data. Moreover, we introduce the Ramen dataset, comprising 30 Japanese cup noodle items. This dataset includes spherical scans that captures images from both object hemisphere and the Gaussian Splatting reconstruction, making them compatible with PEGASUS.", "label": 0, "field": "cs"} {"text": "Title: On the construction of Cohn's universal localization\nAbstract: For an associative ring we investigate a construction of Cohn's universal ring of fractions defined relative to a multiplicative set of matrices. The construction avoids the Ore condition, which is necessary to construct a ring of fractions relative to a multiplicative set of elements. But a similar condition, which we call the ``pseudo-Ore'' condition, plays an important role in the construction of Cohn's localization. We show that this condition in fact determines the equivalence relation used in the construction.", "label": 0, "field": "math"} {"text": "Title: Green functions for GJMS operators on spheres, Gegenbauer polynomials and rigidity theorems\nAbstract: We derive explicit representation formulae of Green functions for GJMS operators on $n$-spheres, including the fractional ones. These formulae not only have natural geometric interpretations concerning the extrinsic geometry of the round sphere, but also reflect the spherical rigidity among closed embedded hypersurfaces in $\\mathbb{R}^{n+1}$.", "label": 0, "field": "math"} {"text": "Title: Sharing Non-Anonymous Costs of Multiple Resources Optimally\nAbstract: In cost sharing games, the existence and efficiency of pure Nash equilibria fundamentally depends on the method that is used to share the resources' costs. We consider a general class of resource allocation problems in which a set of resources is used by a heterogeneous set of selfish users. The cost of a resource is a (non-decreasing) function of the set of its users. Under the assumption that the costs of the resources are shared by uniform cost sharing protocols, i.e., protocols that use only local information of the resource's cost structure and its users to determine the cost shares, we exactly quantify the inefficiency of the resulting pure Nash equilibria. Specifically, we show tight bounds on prices of stability and anarchy for games with only submodular and only supermodular cost functions, respectively, and an asymptotically tight bound for games with arbitrary set-functions. While all our upper bounds are attained for the well-known Shapley cost sharing protocol, our lower bounds hold for arbitrary uniform cost sharing protocols and are even valid for games with anonymous costs, i.e., games in which the cost of each resource only depends on the cardinality of the set of its users.", "label": 1, "field": "cs"} {"text": "Title: Frequency Domain Nuances Mining for Visible-Infrared Person Re-identification\nAbstract: The key of visible-infrared person re-identification (VIReID) lies in how to minimize the modality discrepancy between visible and infrared images. Existing methods mainly exploit the spatial information while ignoring the discriminative frequency information. To address this issue, this paper aims to reduce the modality discrepancy from the frequency domain perspective. Specifically, we propose a novel Frequency Domain Nuances Mining (FDNM) method to explore the cross-modality frequency domain information, which mainly includes an amplitude guided phase (AGP) module and an amplitude nuances mining (ANM) module. These two modules are mutually beneficial to jointly explore frequency domain visible-infrared nuances, thereby effectively reducing the modality discrepancy in the frequency domain. Besides, we propose a center-guided nuances mining loss to encourage the ANM module to preserve discriminative identity information while discovering diverse cross-modality nuances. To the best of our knowledge, this is the first work that explores the potential frequency information for VIReID research. Extensive experiments show that the proposed FDNM has significant advantages in improving the performance of VIReID. Specifically, our method outperforms the second-best method by 5.2\\% in Rank-1 accuracy and 5.8\\% in mAP on the SYSU-MM01 dataset under the indoor search mode, respectively. Besides, we also validate the effectiveness and generalization of our method on the challenging visible-infrared face recognition task. \\textcolor{magenta}{The code will be available.}", "label": 0, "field": "cs"} {"text": "Title: Improving Deep Pancreas Segmentation in CT and MRI Images via Recurrent Neural Contextual Learning and Direct Loss Function\nAbstract: Deep neural networks have demonstrated very promising performance on accurate segmentation of challenging organs (e.g., pancreas) in abdominal CT and MRI scans. The current deep learning approaches conduct pancreas segmentation by processing sequences of 2D image slices independently through deep, dense per-pixel masking for each image, without explicitly enforcing spatial consistency constraint on segmentation of successive slices. We propose a new convolutional/recurrent neural network architecture to address the contextual learning and segmentation consistency problem. A deep convolutional sub-network is first designed and pre-trained from scratch. The output layer of this network module is then connected to recurrent layers and can be fine-tuned for contextual learning, in an end-to-end manner. Our recurrent sub-network is a type of Long short-term memory (LSTM) network that performs segmentation on an image by integrating its neighboring slice segmentation predictions, in the form of a dependent sequence processing. Additionally, a novel segmentation-direct loss function (named Jaccard Loss) is proposed and deep networks are trained to optimize Jaccard Index (JI) directly. Extensive experiments are conducted to validate our proposed deep models, on quantitative pancreas segmentation using both CT and MRI scans. Our method outperforms the state-of-the-art work on CT [11] and MRI pancreas segmentation [1], respectively.", "label": 1, "field": "cs"} {"text": "Title: Eulerian 2-Complexes\nAbstract: It is shown that Euler's theorem for graphs can be generalized for 2-complexes. Two notions that generalize cycle and Eulerian tour are introduced (``circlet'' and ``Eulerian cover''), and we show that for a strongly-connected, pure 2-complex, the following are equivalent: (i) each edge meets a positive even number of 2-cells (faces), (ii) the complex can be decomposed as the face-disjoint union of circlets, and (iii) the complex has an Eulerian cover. A number of examples are provided.", "label": 0, "field": "math"} {"text": "Title: Betting strategies with bounded splits\nAbstract: We show that a pair of Kolmogorov-Loveland betting strategies cannot win on every non-Martin-L\\\"of random sequence if either of the two following conditions is true: (I) There is an unbounded computable function $g$ such that both betting strategies, when betting on an infinite binary sequence, almost surely, for almost all $\\ell$, bet on at most $\\ell-g(\\ell)$ positions among the first $\\ell$ positions of the sequence. (II) There is a sublinear function $g$ such that both betting strategies, when betting on an infinite binary sequence, almost surely, for almost all $\\ell$, bet on at least $\\ell-g(\\ell)$ positions among the first $\\ell$ positions of the sequence.", "label": 1, "field": "cs"} {"text": "Title: Existence and rigidity of quantum isometry groups for compact metric spaces\nAbstract: We prove the existence of a quantum isometry groups for new classes of metric spaces: (i) geodesic metrics for compact connected Riemannian manifolds (possibly with boundary) and (ii) metric spaces admitting a uniformly distributed probability measure. In the former case it also follows from recent results of the second author that the quantum isometry group is classical, i.e. the commutative $C^*$-algebra of continuous functions on the Riemannian isometry group.", "label": 1, "field": "math"} {"text": "Title: DEM: A Method for Certifying Deep Neural Network Classifier Outputs in Aerospace\nAbstract: Software development in the aerospace domain requires adhering to strict, high-quality standards. While there exist regulatory guidelines for commercial software in this domain (e.g., ARP-4754 and DO-178), these do not apply to software with deep neural network (DNN) components. Consequently, it is unclear how to allow aerospace systems to benefit from the deep learning revolution. Our work here seeks to address this challenge with a novel, output-centric approach for DNN certification. Our method employs statistical verification techniques, and has the key advantage of being able to flag specific inputs for which the DNN's output may be unreliable - so that they may be later inspected by a human expert. To achieve this, our method conducts a statistical analysis of the DNN's predictions for other, nearby inputs, in order to detect inconsistencies. This is in contrast to existing techniques, which typically attempt to certify the entire DNN, as opposed to individual outputs. Our method uses the DNN as a black-box, and makes no assumptions about its topology. We hope that this work constitutes another step towards integrating DNNs in safety-critical applications - especially in the aerospace domain, where high standards of quality and reliability are crucial.", "label": 0, "field": "cs"} {"text": "Title: Crafting, Communality, and Computing: Building on Existing Strengths To Support a Vulnerable Population\nAbstract: In Nepal, sex-trafficking survivors and the organizations that support them have limited resources to assist the survivors in their on-going journey towards reintegration. We take an asset-based approach wherein we identify and build on the strengths possessed by such groups. In this work, we present reflections from introducing a voice-annotated web application to a group of survivors. The web application tapped into and built upon two elements of pre-existing strengths possessed by the survivors -- the social bond between them and knowledge of crafting as taught to them by the organization. Our findings provide insight into the array of factors influencing how the survivors act in relation to one another as they created novel use practices and adapted the technology. Experience with the application seemed to open knowledge of computing as a potential source of strength. Finally, we articulate three design desiderata that could help promote communal spaces: make activity perceptible to the group, create appropriable steps, and build in fun choices.", "label": 1, "field": "cs"} {"text": "Title: Not Only Rewards But Also Constraints: Applications on Legged Robot Locomotion\nAbstract: Several earlier studies have shown impressive control performance in complex robotic systems by designing the controller using a neural network and training it with model-free reinforcement learning. However, these outstanding controllers with natural motion style and high task performance are developed through extensive reward engineering, which is a highly laborious and time-consuming process of designing numerous reward terms and determining suitable reward coefficients. In this work, we propose a novel reinforcement learning framework for training neural network controllers for complex robotic systems consisting of both rewards and constraints. To let the engineers appropriately reflect their intent to constraints and handle them with minimal computation overhead, two constraint types and an efficient policy optimization algorithm are suggested. The learning framework is applied to train locomotion controllers for several legged robots with different morphology and physical attributes to traverse challenging terrains. Extensive simulation and real-world experiments demonstrate that performant controllers can be trained with significantly less reward engineering, by tuning only a single reward coefficient. Furthermore, a more straightforward and intuitive engineering process can be utilized, thanks to the interpretability and generalizability of constraints. The summary video is available at https://youtu.be/KAlm3yskhvM.", "label": 0, "field": "cs"} {"text": "Title: On gamma factors for representations of finite general linear groups\nAbstract: We use the Langlands--Shahidi method in order to define the Shahidi gamma factor for a pair of irreducible generic representations of $\\operatorname{GL}_n\\left(\\mathbb{F}_q\\right)$ and $\\operatorname{GL}_m\\left(\\mathbb{F}_q\\right)$. We prove that the Shahidi gamma factor is multiplicative and show that it is related to the Jacquet--Piatetski-Shapiro--Shalika gamma factor. As an application, we prove a converse theorem based on the absolute value of the Shahidi gamma factor, and improve the converse theorem of Nien. As another application, we give explicit formulas for special values of the Bessel function of an irreducible generic representation of $\\operatorname{GL}_n\\left(\\mathbb{F}_q\\right)$.", "label": 0, "field": "math"} {"text": "Title: Nonconforming virtual element method for an incompressible miscible displacement problem in porous media\nAbstract: This article presents a priori error estimates of the miscible displacement of one incompressible fluid by another through a porous medium characterized by a coupled system of nonlinear elliptic and parabolic equations. The study utilizes the $H(\\rm{div})$ conforming virtual element method (VEM) for the approximation of the velocity, while a non-conforming virtual element approach is employed for the concentration. The pressure is discretised using the standard piecewise discontinuous polynomial functions. These spatial discretization techniques are combined with a backward Euler difference scheme for time discretization. The article also includes numerical results that validate the theoretical estimates presented.", "label": 0, "field": "math"} {"text": "Title: A note on Laguerre truncated polynomials and quadrature formula\nAbstract: In this contribution we deal with Gaussian quadrature rules based on orthogonal polynomials associated with a weight function $w(x)= x^{\\alpha} e^{-x}$ supported on an interval $(0,z)$, $z>0.$ The modified Chebyshev algorithm is used in order to test the accuracy in the computation of the coefficients of the three-term recurrence relation, the zeros and weights, as well as the dependence on the parameter $z.$", "label": 0, "field": "math"} {"text": "Title: Wasserstein Nonnegative Tensor Factorization with Manifold Regularization\nAbstract: Nonnegative tensor factorization (NTF) has become an important tool for feature extraction and part-based representation with preserved intrinsic structure information from nonnegative high-order data. However, the original NTF methods utilize Euclidean or Kullback-Leibler divergence as the loss function which treats each feature equally leading to the neglect of the side-information of features. To utilize correlation information of features and manifold information of samples, we introduce Wasserstein manifold nonnegative tensor factorization (WMNTF), which minimizes the Wasserstein distance between the distribution of input tensorial data and the distribution of reconstruction. Although some researches about Wasserstein distance have been proposed in nonnegative matrix factorization (NMF), they ignore the spatial structure information of higher-order data. We use Wasserstein distance (a.k.a Earth Mover's distance or Optimal Transport distance) as a metric and add a graph regularizer to a latent factor. Experimental results demonstrate the effectiveness of the proposed method compared with other NMF and NTF methods.", "label": 0, "field": "cs"} {"text": "Title: Cellular Automata to More Efficiently Compute the Collatz Map\nAbstract: The Collatz, or 3x+1, Conjecture claims that for every positive integer n, there exists some k such that T^k(n)=1, where T is the Collatz map. We present three cellular automata (CA) that transform the global problem of mimicking the Collatz map in bases 2, 3, and 4 into a local one of transforming the digits of iterates. The CAs streamline computation first by bypassing calculation of certain parts of trajectories: the binary CA bypasses division by two altogether. In addition, they allow for multiple trajectories to be calculated simultaneously, representing both a significant improvement upon existing sequential methods of computing the Collatz map and a demonstration of the efficacy of using a massively parallel approach with cellular automata to tackle iterative problems like the Collatz Conjecture.", "label": 1, "field": "math"} {"text": "Title: Rings Whose Clean and Nil-Clean Elements Have Some Clean-Like Properties\nAbstract: We define two types of rings, namely the so-called CSNC and NCUC that are those rings whose clean elements are strongly nil-clean, respectively, whose nil-clean elements are uniquely clean. Our results obtained in this paper somewhat expand these obtained by Calugareanu-Zhou in Mediterr. J. Math. (2023) and by Cui-Danchev-Jin in Publ. Math. Debrecen (2024), respectively.", "label": 0, "field": "math"} {"text": "Title: Spectral conditions for factor-criticality of graphs\nAbstract: A graph $G$ is $k$-factor-critical if $G-S$ has a perfect matching for any $k$-subset $S$ of the vertex set of $G$. In this paper, we investigate the factor-criticality of graphs with fixed minimum degree and provide sufficient conditions for such graphs to be $k$-factor-critical in terms of spectral radius and signless Laplacian spectral radius.", "label": 0, "field": "math"} {"text": "Title: A note on $t$-designs in isodual codes\nAbstract: In the present paper, we construct 3-designs using extended binary quadratic residue codes and their dual codes.", "label": 0, "field": "math"} {"text": "Title: Age-Aware Dynamic Frame Slotted ALOHA for Machine-Type Communications\nAbstract: Information aging has gained prominence in characterizing communication protocols for timely remote estimation and control applications. This work proposes an Age of Information (AoI)-aware threshold-based dynamic frame slotted ALOHA (T-DFSA) for contention resolution in random access machine-type communication networks. Unlike conventional DFSA that maximizes the throughput in each frame, the frame length and age-gain threshold in T-DFSA are determined to minimize the normalized average AoI reduction of the network in each frame. At the start of each frame in the proposed protocol, the common Access Point (AP) stores an estimate of the age-gain distribution of a typical node. Depending on the observed status of the slots, age-gains of successful nodes, and maximum available AoI, the AP adjusts its estimation in each frame. The maximum available AoI is exploited to derive the maximum possible age-gain at each frame and thus, to avoid overestimating the age-gain threshold, which may render T-DFSA unstable. Numerical results validate our theoretical analysis and demonstrate the effectiveness of the proposed T-DFSA compared to the existing optimal frame slotted ALOHA, threshold-ALOHA, and age-based thinning protocols in a considerable range of update generation rates.", "label": 0, "field": "cs"} {"text": "Title: One-sided reflected Brownian motions and the KPZ fixed point\nAbstract: We consider the system of one-sided reflected Brownian motions which is in variational duality with Brownian last passage percolation. We show that it has integrable transition probabilities, expressed in terms of Hermite polynomials and hitting times of exponential random walks, and that it converges in the 1:2:3 scaling limit to the KPZ fixed point, the scaling invariant Markov process defined in [MQR17] and believed to govern the long time large scale fluctuations for all models in the KPZ universality class. Brownian last passage percolation was shown recently in [DOV18] to converge to the Airy sheet (or directed landscape), defined there as a strong limit of a functional of the Airy line ensemble. This establishes the variational formula for the KPZ fixed point in terms of the Airy sheet.", "label": 1, "field": "math"} {"text": "Title: Termination of Rewriting on Reversible Boolean Circuits as a Free 3-Category Problem\nAbstract: Reversible Boolean Circuits are an interesting computational model under many aspects and in different fields, ranging from Reversible Computing to Quantum Computing. Our contribution is to describe a specific class of Reversible Boolean Circuits - which is as expressive as classical circuits - as a bi-dimensional diagrammatic programming language. We uniformly represent the Reversible Boolean Circuits we focus on as a free 3-category Toff. This formalism allows us to incorporate the representation of circuits and of rewriting rules on them, and to prove termination of rewriting. Termination follows from defining a non-identities-preserving functor from our free 3-category Toff into a suitable 3-category Move that traces the \"moves\" applied to wires inside circuits.", "label": 0, "field": "cs"} {"text": "Title: Image of Lie polynomial of degree $2$ evaluated on Nilpotent Lie algebra\nAbstract: We delineate the image of multilinear Lie polynomial of degree $2$ evaluated on $L$ where $L$ is a finite-dimensional nilpotent Lie algebra over field $k$ with $\\dim L' \\leq 4$.", "label": 1, "field": "math"} {"text": "Title: An eigenvalue problem for self-similar patterns in Hele-Shaw flows\nAbstract: Hele-Shaw problems are prototypes to study the interface dynamics. Linear theory suggests the existence of self-similar patterns in a Hele-Shaw flow. That is, with a specific injection flux the interface shape remains unchanged while its size increases. In this paper, we explore the existence of self-similar patterns in the nonlinear regime and develop a rigorous nonlinear theory characterizing their fundamental features. Using a boundary integral formulation, we pose the question of self-similarity as a generalized nonlinear eigenvalue problem, involving two nonlinear integral operators. The flux constant $C$ is the eigenvalue and the corresponding self-similar pattern $\\mathbf{x}$ is the eigenvector. We develop a quasi-Newton method to solve the problem and show the existence of nonlinear shapes with $k$-fold dominated symmetries. The influence of initial guesses on the self-similar patterns is investigated. We are able to obtain a desired self-similar shape once the initial guess is properly chosen. Our results go beyond the predictions of linear theory and establish a bridge between the linear theory and simulations.", "label": 0, "field": "math"} {"text": "Title: Splitting of Uniform bundles on generalized Grassmannians and Kumar's conjecture\nAbstract: Let $E$ be a uniform bundle on an arbitrary generalised Grassmannian $X$. We show that if the rank of $E$ is smaller than $e.d.(\\mathrm{VMRT})$, then $E$ is necessarily splitting. For some generalised Grassmannians, we prove that the upper bound $e.d.(\\mathrm{VMRT})$ is optimal. On the other hand, Kumar's conjecture predicts that if the minss rank of $G'/P'$ is bigger that the maxss rank of $G/P$, then any morphism $f:G'/P'\\rightarrow G/P$ is constant. We prove some partially affirmative results about this conjecture.", "label": 0, "field": "math"} {"text": "Title: Detecting Unseen Falls from Wearable Devices using Channel-wise Ensemble of Autoencoders\nAbstract: A fall is an abnormal activity that occurs rarely, so it is hard to collect real data for falls. It is, therefore, difficult to use supervised learning methods to automatically detect falls. Another challenge in using machine learning methods to automatically detect falls is the choice of engineered features. In this paper, we propose to use an ensemble of autoencoders to extract features from different channels of wearable sensor data trained only on normal activities. We show that the traditional approach of choosing a threshold as the maximum of the reconstruction error on the training normal data is not the right way to identify unseen falls. We propose two methods for automatic tightening of reconstruction error from only the normal activities for better identification of unseen falls. We present our results on two activity recognition datasets and show the efficacy of our proposed method against traditional autoencoder models and two standard one-class classification methods.", "label": 1, "field": "cs"} {"text": "Title: Algorithms Transcending the SAT-Symmetry Interface\nAbstract: Dedicated treatment of symmetries in satisfiability problems (SAT) is indispensable for solving various classes of instances arising in practice. However, the exploitation of symmetries usually takes a black box approach. Typically, off-the-shelf external, general-purpose symmetry detection tools are invoked to compute symmetry groups of a formula. The groups thus generated are a set of permutations passed to a separate tool to perform further analyzes to understand the structure of the groups. The result of this second computation is in turn used for tasks such as static symmetry breaking or dynamic pruning of the search space. Within this pipeline of tools, the detection and analysis of symmetries typically incurs the majority of the time overhead for symmetry exploitation. In this paper we advocate for a more holistic view of what we call the SAT-symmetry interface. We formulate a computational setting, centered around a new concept of joint graph/group pairs, to analyze and improve the detection and analysis of symmetries. Using our methods, no information is lost performing computational tasks lying on the SAT-symmetry interface. Having access to the entire input allows for simpler, yet efficient algorithms. Specifically, we devise algorithms and heuristics for computing finest direct disjoint decompositions, finding equivalent orbits, and finding natural symmetric group actions. Our algorithms run in what we call instance-quasi-linear time, i.e., almost linear time in terms of the input size of the original formula and the description length of the symmetry group returned by symmetry detection tools. Our algorithms improve over both heuristics used in state-of-the-art symmetry exploitation tools, as well as theoretical general-purpose algorithms.", "label": 0, "field": "cs"} {"text": "Title: Relations Between $p$-Means of Convex Bodies and a New Suggestion for the Definition of the Geometric Mean\nAbstract: In light of the log-Brunn-Minkowski conjecture, various attempts have been made to define the geometric mean of convex bodies. Many of these constructions are fairly complex and/or fail to satisfy some natural properties one would expect of such a mean. We remedy this by providing a new geometric mean that is both technically simple and inherits all the natural properties expected. To improve our understanding of potential geometric mean definitions, we first study general $p$-means of convex bodies, with the usual definition extended to two series ranging over all $p \\in [-\\infty,\\infty]$. We characterize their equality cases and obtain (in almost all instances tight) inequalities that quantify how well these means approximate each other. As a corollary, we establish that every Minkowski centered body is equidistant from all its $p$-symmetrizations with respect to the Banach-Mazur distance. Finally, we show that our geometric mean satisfies all the properties considered in recent literature and extend this list with some properties regarding symmetrization and asymmetry.", "label": 0, "field": "math"} {"text": "Title: Aggregation over Metric Spaces: Proposing and Voting in Elections, Budgeting, and Legislation\nAbstract: We present a unifying framework encompassing many social choice settings. Viewing each social choice setting as voting in a suitable metric space, we consider a general model of social choice over metric spaces, in which---similarly to the spatial model of elections---each voter specifies an ideal element of the metric space. The ideal element functions as a vote, where each voter prefers elements that are closer to her ideal element. But it also functions as a proposal, thus making all participants equal not only as voters but also as proposers. We consider Condorcet aggregation and a continuum of solution concepts, ranging from minimizing the sum of distances to minimizing the maximum distance. We study applications of the abstract model to various social choice settings, including single-winner elections, committee elections, participatory budgeting, and participatory legislation. For each setting, we compare each solution concept to known voting rules and study various properties of the resulting voting rules. Our framework provides expressive aggregation for a broad range of social choice settings while remaining simple for voters, and may enable a unified and integrated implementation for all these settings, as well as unified extensions such as sybil-resiliency, proxy voting, and deliberative decision making.", "label": 1, "field": "cs"} {"text": "Title: Pseudorandom Hashing for Space-bounded Computation with Applications in Streaming\nAbstract: We revisit Nisan's classical pseudorandom generator (PRG) for space-bounded computation (STOC 1990) and its applications in streaming algorithms. We describe a new generator, HashPRG, that can be thought of as a symmetric version of Nisan's generator over larger alphabets. Our generator allows a trade-off between seed length and the time needed to compute a given block of the generator's output. HashPRG can be used to obtain derandomizations with much better update time and \\emph{without sacrificing space} for a large number of data stream algorithms, such as $F_p$ estimation in the parameter regimes $p > 2$ and $0 < p < 2$ and CountSketch with tight estimation guarantees as analyzed by Minton and Price (SODA 2014) which assumed access to a random oracle. We also show a recent analysis of Private CountSketch can be derandomized using our techniques. For a $d$-dimensional vector $x$ being updated in a turnstile stream, we show that $\\|x\\|_{\\infty}$ can be estimated up to an additive error of $\\varepsilon\\|x\\|_{2}$ using $O(\\varepsilon^{-2}\\log(1/\\varepsilon)\\log d)$ bits of space. Additionally, the update time of this algorithm is $O(\\log 1/\\varepsilon)$ in the Word RAM model. We show that the space complexity of this algorithm is optimal up to constant factors. However, for vectors $x$ with $\\|x\\|_{\\infty} = \\Theta(\\|x\\|_{2})$, we show that the lower bound can be broken by giving an algorithm that uses $O(\\varepsilon^{-2}\\log d)$ bits of space which approximates $\\|x\\|_{\\infty}$ up to an additive error of $\\varepsilon\\|x\\|_{2}$. We use our aforementioned derandomization of the CountSketch data structure to obtain this algorithm, and using the time-space trade off of HashPRG, we show that the update time of this algorithm is also $O(\\log 1/\\varepsilon)$ in the Word RAM model.", "label": 0, "field": "cs"} {"text": "Title: Hessian estimates for special Lagrangian equation by doubling\nAbstract: New, doubling proofs are given for the interior Hessian estimates of the special Lagrangian equation. These estimates were originally shown by Chen-Warren-Yuan in CPAM 2009 and Wang-Yuan in AJM 2014. This yields a higher codimension analogue of Korevaar's 1987 pointwise proof of the gradient estimate for minimal hypersurfaces, without using the Michael-Simon mean value inequality.", "label": 0, "field": "math"} {"text": "Title: Fast and Continual Learning for Hybrid Control Policies using Generalized Benders Decomposition\nAbstract: Hybrid model predictive control with both continuous and discrete variables is widely applicable to robotic control tasks, especially those involving contact with the environment. Due to the combinatorial complexity, the solving speed of hybrid MPC can be insufficient for real-time applications. In this paper, we proposed a hybrid MPC solver based on Generalized Benders Decomposition (GBD). The algorithm enumerates and stores cutting planes online inside a finite buffer. After a short cold-start phase, the stored cuts provide warm-starts for the new problem instances to enhance the solving speed. Despite the disturbance and randomly changing environment, the solving speed maintains. Leveraging on the sparsity of feasibility cuts, we also propose a fast algorithm for Benders master problems. Our solver is validated through controlling a cart-pole system with randomly moving soft contact walls, and a free-flying robot navigating around obstacles. The results show that with significantly less data than previous works, the solver reaches competitive speeds to the off-the-shelf solver Gurobi despite the Python overhead.", "label": 0, "field": "cs"} {"text": "Title: Optimal transport for types and convex analysis for definable predicates in tracial $\\mathrm{W}^*$-algebras\nAbstract: We investigate the connections between continuous model theory, free probability, and optimal transport/convex analysis in the context of tracial von Neumann algebras. In particular, we give an analog of Monge-Kantorovich duality for optimal couplings where the role of probability distributions on $\\mathbb{C}^n$ is played by model-theoretic types, the role of real-valued continuous functions is played by definable predicates, and the role of continuous function $\\mathbb{C}^n \\to \\mathbb{C}^n$ is played by definable functions. In the process, we also advance the understanding of definable predicates and definable functions by showing that all definable predicates can be approximated by \"$C^1$ definable predicates\" whose gradients are definable functions. As a consequence, we show that every element in the definable closure of $\\mathrm{W}^*(x_1,\\dots,x_n)$ can be expressed as a definable function of $(x_1,\\dots,x_n)$. We give several classes of examples showing that the definable closure can be much larger than $\\mathrm{W}^*(x_1,\\dots,x_n)$ in general.", "label": 0, "field": "math"} {"text": "Title: Outage Analysis for Active Reconfigurable Intelligent Surface-Enhanced Wireless Powered Communication Networks\nAbstract: Wireless powered communication (WPC) involves the integration of energy harvesting and data transmission. This allows devices to communicate without constant battery replacements or wired power sources. Reconfigurable intelligent surfaces (RISs) can dynamically manipulate radio signals. In this paper, we explore the use of active elements to mitigate double-fading challenges inherent in RIS-aided links. We enhance the reliability performance for an energy-constrained user by combining active RIS and WPC. The theoretical closed-form analysis, which includes transmission rate, harvested energy, and outage probability, provides valuable insights that inform parameter selection.", "label": 0, "field": "cs"} {"text": "Title: Optimal Decomposition and Recombination of Isostatic Geometric Constraint Systems for Designing Layered Materials\nAbstract: Optimal recursive decomposition (or DR-planning) is crucial for analyzing, designing, solving or finding realizations of geometric constraint sytems. While the optimal DR-planning problem is NP-hard even for general 2D bar-joint constraint systems, we describe an O(n^3) algorithm for a broad class of constraint systems that are isostatic or underconstrained. The algorithm achieves optimality by using the new notion of a canonical DR-plan that also meets various desirable, previously studied criteria. In addition, we leverage recent results on Cayley configuration spaces to show that the indecomposable systems---that are solved at the nodes of the optimal DR-plan by recombining solutions to child systems---can be minimally modified to become decomposable and have a small DR-plan, leading to efficient realization algorithms. We show formal connections to well-known problems such as completion of underconstrained systems. Well suited to these methods are classes of constraint systems that can be used to efficiently model, design and analyze quasi-uniform (aperiodic) and self-similar, layered material structures. We formally illustrate by modeling silica bilayers as body-hyperpin systems and cross-linking microfibrils as pinned line-incidence systems. A software implementation of our algorithms and videos demonstrating the software are publicly available online (visit http://cise.ufl.edu/~tbaker/drp/index.html.)", "label": 1, "field": "cs"} {"text": "Title: LLaMA Pro: Progressive LLaMA with Block Expansion\nAbstract: Humans generally acquire new skills without compromising the old; however, the opposite holds for Large Language Models (LLMs), e.g., from LLaMA to CodeLLaMA. To this end, we propose a new post-pretraining method for LLMs with an expansion of Transformer blocks. We tune the expanded blocks using only new corpus, efficiently and effectively improving the model's knowledge without catastrophic forgetting. In this paper, we experiment on the corpus of code and math, yielding LLaMA Pro-8.3B, a versatile foundation model initialized from LLaMA2-7B, excelling in general tasks, programming, and mathematics. LLaMA Pro and its instruction-following counterpart (LLaMA Pro-Instruct) achieve advanced performance among various benchmarks, demonstrating superiority over existing open models in the LLaMA family and the immense potential of reasoning and addressing diverse tasks as an intelligent agent. Our findings provide valuable insights into integrating natural and programming languages, laying a solid foundation for developing advanced language agents that operate effectively in various environments.", "label": 0, "field": "cs"} {"text": "Title: On some anabelian properties of arithmetic curves\nAbstract: In this paper we generalize an argument of Neukirch from birational anabelian geometry to the case of arithmetic curves. In contrast to the function field case, it seems to be more complicate to describe the position of decomposition groups of points at the boundary of the scheme $\\Spec \\caO_{K,S}$, where $K$ is a number field and $S$ a set of primes of $K$, intrinsically in terms of the fundamental group. We prove that it is equivalent to give the following pieces of information additionally with the fundamental group $\\pi_1(\\Spec \\caO_{K,S})$: the location of decomposition groups of boundary points inside it, the $p$-part of the cyclotomic character, the number of points on the boundary of all finite etale covers, etc. Under certain finiteness hypothesis on Tate-Shafarevich groups with divisible coefficients, one can reconstruct all this quantities from the fundamental group alone.", "label": 1, "field": "math"} {"text": "Title: Higher depth quantum modular forms and plumbed $3$-manifolds\nAbstract: In this paper we study new invariants $\\widehat{Z}_{\\boldsymbol{a}}(q)$ attached to plumbed $3$-manifolds that were introduced by Gukov, Pei, Putrov, and Vafa. These remarkable $q$-series at radial limits conjecturally compute WRT invariants of the corresponding plumbed $3$-manifold. Here we investigate the series $\\widehat{Z}_{0}(q)$ for unimodular plumbing ${\\tt H}$-graphs with six vertices. We prove that for every positive definite unimodular plumbing matrix, $\\widehat{Z}_{0}(q)$ is a depth two quantum modular form on $\\mathbb{Q}$.", "label": 1, "field": "math"} {"text": "Title: Dissipative SymODEN: Encoding Hamiltonian Dynamics with Dissipation and Control into Deep Learning\nAbstract: In this work, we introduce Dissipative SymODEN, a deep learning architecture which can infer the dynamics of a physical system with dissipation from observed state trajectories. To improve prediction accuracy while reducing network size, Dissipative SymODEN encodes the port-Hamiltonian dynamics with energy dissipation and external input into the design of its computation graph and learns the dynamics in a structured way. The learned model, by revealing key aspects of the system, such as the inertia, dissipation, and potential energy, paves the way for energy-based controllers.", "label": 1, "field": "cs"} {"text": "Title: A note about the invariance of the basic reproduction number for stochastically perturbed SIS models\nAbstract: We try to justify rigorously, using a Wong-Zakai approximation argument, the susceptible-infected-susceptible (SIS) stochastic differential equation proposed in [2]. We discover that according to this approach the \"right\" stochastic model to be considered should be the Stratonovich version of the It\\^o equation analyzed in [2]. Surprisingly, this alternative model presents the following feature: the threshold value characterizing the two different asymptotic regimes of the solution coincides with the one describing the classical SIS deterministic equation.", "label": 1, "field": "math"} {"text": "Title: Context-Free TextSpotter for Real-Time and Mobile End-to-End Text Detection and Recognition\nAbstract: In the deployment of scene-text spotting systems on mobile platforms, lightweight models with low computation are preferable. In concept, end-to-end (E2E) text spotting is suitable for such purposes because it performs text detection and recognition in a single model. However, current state-of-the-art E2E methods rely on heavy feature extractors, recurrent sequence modellings, and complex shape aligners to pursue accuracy, which means their computations are still heavy. We explore the opposite direction: How far can we go without bells and whistles in E2E text spotting? To this end, we propose a text-spotting method that consists of simple convolutions and a few post-processes, named Context-Free TextSpotter. Experiments using standard benchmarks show that Context-Free TextSpotter achieves real-time text spotting on a GPU with only three million parameters, which is the smallest and fastest among existing deep text spotters, with an acceptable transcription quality degradation compared to heavier ones. Further, we demonstrate that our text spotter can run on a smartphone with affordable latency, which is valuable for building stand-alone OCR applications.", "label": 1, "field": "cs"} {"text": "Title: Hereditary $n$-exangulated categories\nAbstract: Herschend-Liu-Nakaoka introduced the concept of $n$-exangulated categories as higher-dimensional analogues of extriangulated categories defined by Nakaoka-Palu. The class of $n$-exangulated categories contains $n$-exact categories and $(n+2)$-angulated categories as specific examples. In this article, we introduce the notion of hereditary $n$-exangulated categories, which generalize hereditary extriangulated categories. We provide two classes of hereditary $n$-exangulated categories through closed subfunctors. Additionally, we define the concept of $0$-Auslander $n$-exangulated categories and discuss the circumstances under which these two classes of hereditary $n$-exangulated categories become $0$-Auslander.", "label": 0, "field": "math"} {"text": "Title: MULTI-CASE: A Transformer-based Ethics-aware Multimodal Investigative Intelligence Framework\nAbstract: AI-driven models are increasingly deployed in operational analytics solutions, for instance, in investigative journalism or the intelligence community. Current approaches face two primary challenges: ethical and privacy concerns, as well as difficulties in efficiently combining heterogeneous data sources for multimodal analytics. To tackle the challenge of multimodal analytics, we present MULTI-CASE, a holistic visual analytics framework tailored towards ethics-aware and multimodal intelligence exploration, designed in collaboration with domain experts. It leverages an equal joint agency between human and AI to explore and assess heterogeneous information spaces, checking and balancing automation through Visual Analytics. MULTI-CASE operates on a fully-integrated data model and features type-specific analysis with multiple linked components, including a combined search, annotated text view, and graph-based analysis. Parts of the underlying entity detection are based on a RoBERTa-based language model, which we tailored towards user requirements through fine-tuning. An overarching knowledge exploration graph combines all information streams, provides in-situ explanations, transparent source attribution, and facilitates effective exploration. To assess our approach, we conducted a comprehensive set of evaluations: We benchmarked the underlying language model on relevant NER tasks, achieving state-of-the-art performance. The demonstrator was assessed according to intelligence capability assessments, while the methodology was evaluated according to ethics design guidelines. As a case study, we present our framework in an investigative journalism setting, supporting war crime investigations. Finally, we conduct a formative user evaluation with domain experts in law enforcement. Our evaluations confirm that our framework facilitates human agency and steering in security-sensitive applications.", "label": 0, "field": "cs"} {"text": "Title: Tailor: Size Recommendations for High-End Fashion Marketplaces\nAbstract: In the ever-changing and dynamic realm of high-end fashion marketplaces, providing accurate and personalized size recommendations has become a critical aspect. Meeting customer expectations in this regard is not only crucial for ensuring their satisfaction but also plays a pivotal role in driving customer retention, which is a key metric for the success of any fashion retailer. We propose a novel sequence classification approach to address this problem, integrating implicit (Add2Bag) and explicit (ReturnReason) user signals. Our approach comprises two distinct models: one employs LSTMs to encode the user signals, while the other leverages an Attention mechanism. Our best model outperforms SFNet, improving accuracy by 45.7%. By using Add2Bag interactions we increase the user coverage by 24.5% when compared with only using Orders. Moreover, we evaluate the models' usability in real-time recommendation scenarios by conducting experiments to measure their latency performance.", "label": 0, "field": "cs"} {"text": "Title: JPEG XT Image Compression with Hue Compensation for Two-Layer HDR Coding\nAbstract: We propose a novel JPEG XT image compression with hue compensation for two-layer HDR coding. LDR images produced from JPEG XT bitstreams have some distortion in hue due to tone mapping operations. In order to suppress the color distortion, we apply a novel hue compensation method based on the maximally saturated colors. Moreover, the bitstreams generated by using the proposed method are fully compatible with the JPEG XT standard. In an experiment, the proposed method is demonstrated not only to produce images with small hue degradation but also to maintain well-mapped luminance, in terms of three kinds of criterion: TMQI, hue value in CIEDE2000, and the maximally saturated color on the constant-hue plane.", "label": 1, "field": "cs"} {"text": "Title: Using Locality-sensitive Hashing for Rendezvous Search\nAbstract: The multichannel rendezvous problem is a fundamental problem for neighbor discovery in many IoT applications. The existing works in the literature focus mostly on improving the worst-case performance, and the average-case performance is often not as good as that of the random algorithm. As IoT devices (users) are close to each other, their available channel sets, though they might be different, are similar. Using the locality-sensitive hashing (LSH) technique in data mining, we propose channel hopping algorithms that exploit the similarity between the two available channel sets to increase the rendezvous probability. For the synchronous setting, our algorithms have the expected time-to-rendezvous (ETTR) inversely proportional to a well-known similarity measure called the Jaccard index. For the asynchronous setting, we use dimensionality reduction to speed up the rendezvous process. Our numerical results show that our algorithms can outperform the random algorithm in terms of ETTR.", "label": 1, "field": "cs"} {"text": "Title: Stationary Distributions for Two-Dimensional Sticky Brownian Motions: Exact Tail Asymptotics and Extreme Value Distributions\nAbstract: In this paper, we consider a two-dimensional sticky Brownian motion. Sticky Brownian motions can be viewed as time-changed semimartingale reflecting Brownian motions, which find applications in many areas including queueing theory and mathematical finance. For example, a sticky Brownian motion can be used to model a storage system.with exceptional services. In this paper, we focus on stationary distributions for sticky Brownian motions. The main results obtained here include tail asymptotic properties in boundary stationary distributions, marginal distributions, and joint distributions. The kernel method, copula concept and extreme value theory are main tools used in our analysis.", "label": 1, "field": "math"} {"text": "Title: Two point concentration of maximum degree in sparse random planar graphs\nAbstract: Let $P(n,m)$ be a graph chosen uniformly at random from the class of all planar graphs on vertex set $\\left\\{1, \\ldots, n\\right\\}$ with $m=m(n)$ edges. We show that in the sparse regime, when $\\limsup_{n \\to \\infty} m/n<1$, with high probability the maximum degree of $P(n,m)$ takes at most two different values.", "label": 1, "field": "math"} {"text": "Title: Minimum Sobolev norm interpolation of derivative data\nAbstract: We study the problem of reconstructing a function on a manifold satisfying some mild conditions, given data on the values and some derivatives of the function at arbitrary points on the manifold. While the problem of finding a polynomial of two variables with total degree $\\le n$ given the values of the polynomial and some of its derivatives at exactly the same number of points as the dimension of the polynomial space is sometimes impossible, we show that such a problem always has a solution in a very general situation if the degree of the polynomials is sufficiently large. We give estimates on how large the degree should be, and give explicit constructions for such a polynomial even in a far more general case. As the number of sampling points at which the data is available increases, our polynomials converge to the target function on the set where the sampling points are dense. Numerical examples in single and double precision show that this method is stable and of high-order.", "label": 1, "field": "math"} {"text": "Title: Improving Approximate Optimal Transport Distances using Quantization\nAbstract: Optimal transport (OT) is a popular tool in machine learning to compare probability measures geometrically, but it comes with substantial computational burden. Linear programming algorithms for computing OT distances scale cubically in the size of the input, making OT impractical in the large-sample regime. We introduce a practical algorithm, which relies on a quantization step, to estimate OT distances between measures given cheap sample access. We also provide a variant of our algorithm to improve the performance of approximate solvers, focusing on those for entropy-regularized transport. We give theoretical guarantees on the benefits of this quantization step and display experiments showing that it behaves well in practice, providing a practical approximation algorithm that can be used as a drop-in replacement for existing OT estimators.", "label": 1, "field": "cs"} {"text": "Title: Parametric change point detection with random occurrence of the change point\nAbstract: We are concerned with the problem of detecting a single change point in the model parameters of time series data generated from an exponential family. In contrast to the existing literature, we allow that the true location of the change point is itself random, possibly depending on the data. Under the alternative, we study the case when the size of the change point converges to zero while the sample size goes to infinity. Moreover, we concentrate on change points in the \"middle of the data\", i.e., we assume that the change point fraction (the location of the change point relative to the sample size) converges weakly to a random variable $\\lambda^*$ which takes its values almost surely in a closed subset of $(0,1).$ We show that the known statistical results from the literature also transfer to this setting. We substantiate our theoretical results with a simulation study.", "label": 1, "field": "math"} {"text": "Title: Smoothing Methods for Automatic Differentiation Across Conditional Branches\nAbstract: Programs involving discontinuities introduced by control flow constructs such as conditional branches pose challenges to mathematical optimization methods that assume a degree of smoothness in the objective function's response surface. Smooth interpretation (SI) is a form of abstract interpretation that approximates the convolution of a program's output with a Gaussian kernel, thus smoothing its output in a principled manner. Here, we combine SI with automatic differentiation (AD) to efficiently compute gradients of smoothed programs. In contrast to AD across a regular program execution, these gradients also capture the effects of alternative control flow paths. The combination of SI with AD enables the direct gradient-based parameter synthesis for branching programs, allowing for instance the calibration of simulation models or their combination with neural network models in machine learning pipelines. We detail the effects of the approximations made for tractability in SI and propose a novel Monte Carlo estimator that avoids the underlying assumptions by estimating the smoothed programs' gradients through a combination of AD and sampling. Using DiscoGrad, our tool for automatically translating simple C++ programs to a smooth differentiable form, we perform an extensive evaluation. We compare the combination of SI with AD and our Monte Carlo estimator to existing gradient-free and stochastic methods on four non-trivial and originally discontinuous problems ranging from classical simulation-based optimization to neural network-driven control. While the optimization progress with the SI-based estimator depends on the complexity of the program's control flow, our Monte Carlo estimator is competitive in all problems, exhibiting the fastest convergence by a substantial margin in our highest-dimensional problem.", "label": 0, "field": "cs"} {"text": "Title: Coalition Formation Games for Collaborative Spectrum Sensing\nAbstract: Collaborative Spectrum Sensing (CSS) between secondary users (SUs) in cognitive networks exhibits an inherent tradeoff between minimizing the probability of missing the detection of the primary user (PU) and maintaining a reasonable false alarm probability (e.g., for maintaining a good spectrum utilization). In this paper, we study the impact of this tradeoff on the network structure and the cooperative incentives of the SUs that seek to cooperate for improving their detection performance. We model the CSS problem as a non-transferable coalitional game, and we propose distributed algorithms for coalition formation. First, we construct a distributed coalition formation (CF) algorithm that allows the SUs to self-organize into disjoint coalitions while accounting for the CSS tradeoff. Then, the CF algorithm is complemented with a coalitional voting game for enabling distributed coalition formation with detection probability guarantees (CF-PD) when required by the PU. The CF-PD algorithm allows the SUs to form minimal winning coalitions (MWCs), i.e., coalitions that achieve the target detection probability with minimal costs. For both algorithms, we study and prove various properties pertaining to network structure, adaptation to mobility and stability. Simulation results show that CF reduces the average probability of miss per SU up to 88.45% relative to the non-cooperative case, while maintaining a desired false alarm. For CF-PD, the results show that up to 87.25% of the SUs achieve the required detection probability through MWC", "label": 1, "field": "cs"} {"text": "Title: Solutions to complex $m$-Hessian type equation and its application\nAbstract: In this paper, we introduce the class $\\mathcal{E}_{m,F}(\\Omega)$ and prove the existence of solutions of the complex $m-$Hessian type equation $-F(u(z),z)H_{m}(u)=\\mu$ where $\\mu$ vanishes on all of $m-$polar sets in the class $\\mathcal{E}_{m,F}(\\Omega).$ Next, we prove the existence of solutions of this equation in the class $\\mathcal{E}_{m,F}(\\Omega)$ if there exists subsolution in this class. Using the above results, we study subextension in the class $\\mathcal{E}_{m,F}(\\Omega).$", "label": 0, "field": "math"} {"text": "Title: Phase transition and diffusion among socially interacting self-propelled agents\nAbstract: We consider a hydrodynamic model of swarming behavior derived from the kinetic description of a particle system combining a noisy Cucker-Smale consensus force and self-propulsion. In the large self-propulsion force limit, we provide evidence of a phase transition from disordered to ordered motion which manifests itself as a change of type of the limit model (from hyperbolic to diffusive) at the crossing of a critical noise intensity. In the hyperbolic regime, the resulting model, referred to as the `Self-Organized Hydrodynamics (SOH)', consists of a system of compressible Euler equations with a speed constraint. We show that the range of SOH models obtained by this limit is restricted. To waive this restriction, we compute the Navier-Stokes diffusive corrections to the hydrodynamic model. Adding these diffusive corrections, the limit of a large propulsion force yields unrestricted SOH models and offers an alternative to the derivation of the SOH using kinetic models with speed constraints.", "label": 1, "field": "math"} {"text": "Title: A homological reformulation of the link condition\nAbstract: We prove an equivalent condition for the existence of a link between prime ideals in terms of the structure of a certain cohomology module. We use this formulation to answer an open question regarding the nature of module extensions over one sided noetherian rings. We apply the techniques developed in this paper to the local link structure of prime ideals of small homological height and examine when certain noetherian rings satisfy the density condition.", "label": 1, "field": "math"} {"text": "Title: Two dimensional dimers beyond planarity\nAbstract: We consider a generalisation of the double dimer model which includes several models of interest, such as the monomer double dimer model, the dimer model, the Spin O(N) model, and it is related to the loop O(N) model. We prove that on two-dimension like graphs (such as slabs), both the correlation function and the probability that a loop visits two vertices converge to zero as the distance between such vertices gets large. Our analysis is by introducing a new (complex) spin representation for all models belonging to this class, and by deriving a new proof of the Mermin-Wagner theorem which does not require the positivity of the Gibbs measure. Even for the well studied dimer and double dimer model our results are new since - not relying on solvability and Kasteleyn's theorem - they hold beyond the framework of planar graphs.", "label": 0, "field": "math"} {"text": "Title: Propagation of Input Tail Uncertainty in Rare-Event Estimation: A Light versus Heavy Tail Dichotomy\nAbstract: We consider the estimation of small probabilities or other risk quantities associated with rare but catastrophic events. In the model-based literature, much of the focus has been devoted to efficient Monte Carlo computation or analytical approximation assuming the model is accurately specified. In this paper, we study a distinct direction on the propagation of model uncertainty and how it impacts the reliability of rare-event estimates. Specifically, we consider the basic setup of the exceedance of i.i.d. sum, and investigate how the lack of tail information of each input summand can affect the output probability. We argue that heavy-tailed problems are much more vulnerable to input uncertainty than light-tailed problems, reasoned through their large deviations behaviors and numerical evidence. We also investigate some approaches to quantify model errors in this problem using a combination of the bootstrap and extreme value theory, showing some positive outcomes but also uncovering some statistical challenges.", "label": 0, "field": "math"} {"text": "Title: Matchings and loose cycles in the semirandom hypergraph model\nAbstract: We study the 2-offer semirandom 3-uniform hypergraph model on $n$ vertices. At each step, we are presented with 2 uniformly random vertices. We choose any other vertex, thus creating a hyperedge of size 3. We show a strategy that constructs a perfect matching, and another that constructs a loose Hamilton cycle, both succeeding asymptotically almost surely within $\\Theta(n)$ steps. Both results extend to $s$-uniform hypergraphs. Much of the analysis is done on an auxiliary graph that is a uniform $k$-out subgraph of a random bipartite graph, and this tool may be useful in other contexts.", "label": 0, "field": "math"} {"text": "Title: List-Coloring Packing and Correspondence-Coloring Packing of Planar Graphs\nAbstract: For a graph $G$ and a list assignment $L$ with $|L(v)|=k$ for all $v$, an $L$-packing consists of $L$-colorings $\\varphi_1,\\cdots,\\varphi_k$ such that $\\varphi_i(v)\\ne\\varphi_j(v)$ for all $v$ and all distinct $i,j\\in\\{1,\\ldots,k\\}$. Let $\\chi^{\\star}_{\\ell}(G)$ denote the smallest $k$ such that $G$ has an $L$-packing for every $L$ with $|L(v)|=k$ for all $v$. Let $\\mathcal{P}_k$ denote the set of all planar graphs with girth at least $k$. We show that (i) $\\chi^{\\star}_{\\ell}(G)\\le 8$ for all $G\\in \\mathcal{P}_3$ and (ii) $\\chi^{\\star}_{\\ell}(G)\\le 5$ for all $G\\in \\mathcal{P}_4$ and (iii) $\\chi^{\\star}_{\\ell}(G)\\le 4$ for all $G\\in \\mathcal{P}_5$. Part (i) makes progress on a problem of Cambie, Cames van Batenburg, Davies, and Kang. We also construct outerplanar graphs $G$ such that $\\chi^{\\star}_{\\ell}(G)=4$, which matches the known upper bound $\\chi^{\\star}_{\\ell}(G)\\le 4$ for all outerplanar graphs. Finally, we consider the analogue of $\\chi^{\\star}_{\\ell}$ for correspondence coloring, $\\chi^{\\star}_c$. In fact, all bounds stated above for $\\chi^{\\star}_{\\ell}$ also hold for $\\chi^{\\star}_c$.", "label": 0, "field": "math"} {"text": "Title: Visual Relationship Forecasting in Videos\nAbstract: Real-world scenarios often require the anticipation of object interactions in unknown future, which would assist the decision-making process of both humans and agents. To meet this challenge, we present a new task named Visual Relationship Forecasting (VRF) in videos to explore the prediction of visual relationships in a reasoning manner. Specifically, given a subject-object pair with H existing frames, VRF aims to predict their future interactions for the next T frames without visual evidence. To evaluate the VRF task, we introduce two video datasets named VRF-AG and VRF-VidOR, with a series of spatio-temporally localized visual relation annotations in a video. These two datasets densely annotate 13 and 35 visual relationships in 1923 and 13447 video clips, respectively. In addition, we present a novel Graph Convolutional Transformer (GCT) framework, which captures both object-level and frame-level dependencies by spatio-temporal Graph Convolution Network and Transformer. Experimental results on both VRF-AG and VRF-VidOR datasets demonstrate that GCT outperforms the state-of-the-art sequence modelling methods on visual relationship forecasting.", "label": 1, "field": "cs"} {"text": "Title: Structural properties of weak cotype 2 spaces\nAbstract: Several characterizations of weak cotype 2 and weak Hilbert spaces are given in terms of basis constants and other structural invariants of Banach spaces. For finite-dimensional spaces, characterizations depending on subspaces of fixed proportional dimension are proved.", "label": 1, "field": "math"} {"text": "Title: Asymptotic expansion and optimal symmetry of minimal gradient graph equations in dimension 2\nAbstract: In this paper, we study asymptotic expansion at infinity and symmetry of zero mean curvature equations of gradient graph in dimension 2, which include the Monge--Amp\\`ere equation, inverse harmonic Hessian equation and the special Lagrangian equation. This refines the research of asymptotic behavior, gives the precise gap between exterior minimal gradient graph and the entire case, and extends the classification results of Monge--Amp\\`ere equations.", "label": 1, "field": "math"} {"text": "Title: Non-associative Frobenius algebras of type $E_7$\nAbstract: Recently, Maurice Chayet and Skip Garibaldi introduced a class of commutative non-associative algebras. In previous work, we gave an explicit description of these algebras for groups of type $G_2,F_4$ and certain forms of $E_6$ in terms of octonion and Albert algebras. In this paper, we extend this further by dealing with $E_7$ in terms of generalised Freudenthal triple systems.", "label": 0, "field": "math"} {"text": "Title: Can We Distinguish Machine Learning from Human Learning?\nAbstract: What makes a task relatively more or less difficult for a machine compared to a human? Much AI/ML research has focused on expanding the range of tasks that machines can do, with a focus on whether machines can beat humans. Allowing for differences in scale, we can seek interesting (anomalous) pairs of tasks T, T'. We define interesting in this way: The \"harder to learn\" relation is reversed when comparing human intelligence (HI) to AI. While humans seems to be able to understand problems by formulating rules, ML using neural networks does not rely on constructing rules. We discuss a novel approach where the challenge is to \"perform well under rules that have been created by human beings.\" We suggest that this provides a rigorous and precise pathway for understanding the difference between the two kinds of learning. Specifically, we suggest a large and extensible class of learning tasks, formulated as learning under rules. With these tasks, both the AI and HI will be studied with rigor and precision. The immediate goal is to find interesting groundtruth rule pairs. In the long term, the goal will be to understand, in a generalizable way, what distinguishes interesting pairs from ordinary pairs, and to define saliency behind interesting pairs. This may open new ways of thinking about AI, and provide unexpected insights into human learning.", "label": 1, "field": "cs"} {"text": "Title: A note on the growth of regularity with respect to Frobenius\nAbstract: Let $R=k[x_1,\\dots,x_n]/I$ be a standard graded $k$-algebra where $k$ is a field of prime characteristic and let $J$ be a homogeneous ideal in $R$. Denote $(x_1,\\dots,x_n)$ by $\\mathfrak{m}$. We prove that there is a constant $C$ (independent of $e$) such that the regularity of $H^s_{\\mathfrak{m}}(R/J^{[p^e]})$ is bounded above by $Cp^e$ for all $e\\geq 1$ and all integers $s$ such that $s+1$ is at least the dimension of the locus where $R/J$ doesn't have finite projective dimension.", "label": 1, "field": "math"} {"text": "Title: Asymptotic Stability for Relativistic Vlasov-Maxwell-Landau System in Bounded Domain\nAbstract: The control of plasma-wall interaction is one of the keys in a fusion device from both physical and mathematical standpoints. A classical perfect conducting boundary causes the Lorentz force to penetrate inside the domain, which may lead to grazing set singularity in the phase space, preventing the construction of global dynamics for PDEs in any kinetic plasma models. We establish the first global asymptotic stability for the relativistic Vlasov-Maxwell-Landau system for describing a collisional plasma specularly reflected at a perfect conducting boundary.", "label": 0, "field": "math"} {"text": "Title: On the Effects of Battery Imperfections in an Energy Harvesting Device\nAbstract: Energy Harvesting allows the devices in a Wireless Sensor Network to recharge their batteries through environmental energy sources. While in the literature the main focus is on devices with ideal batteries, in reality several inefficiencies have to be considered to correctly design the operating regimes of an Energy Harvesting Device (EHD). In this work we describe how the throughput optimization problem changes under \\emph{real battery} constraints in an EHD. In particular, we consider imperfect knowledge of the state of charge of the battery and storage inefficiencies, \\emph{i.e.}, part of the harvested energy is wasted in the battery recharging process. We formulate the problem as a Markov Decision Process, basing our model on some realistic observations about transmission, consumption and harvesting power. We find the performance upper bound with a real battery and numerically discuss the novelty introduced by the real battery effects. We show that using the \\emph{old} policies obtained without considering the real battery effects is strongly sub-optimal and may even result in zero throughput.", "label": 1, "field": "cs"} {"text": "Title: Higher convexity and iterated sum sets\nAbstract: Let $f$ be a smooth real function with strictly monotone first $k$ derivatives. We show that for a finite set $A$, with $|A+A|\\leq K|A|$, $|2^kf(A)-(2^k-1)f(A)|\\gg_k |A|^{k+1-o(1)}/K^{O_k(1)}$. We deduce several new sum-product type implications, e.g. that $A+A$ being small implies unbounded growth for a many enough times iterated product set $A \\cdots A$.", "label": 1, "field": "math"} {"text": "Title: Examining the Challenges in Archiving Instagram\nAbstract: To prevent the spread of disinformation on Instagram, we need to study the accounts and content of disinformation actors. However, due to their malicious nature, Instagram often bans accounts that are responsible for spreading disinformation, making these accounts inaccessible from the live web. The only way we can study the content of banned accounts is through public web archives such as the Internet Archive. However, there are many issues present with archiving Instagram pages. Specifically, we focused on the issue that many Wayback Machine Instagram mementos redirect to the Instagram login page. In this study, we determined that mementos of Instagram account pages on the Wayback Machine began redirecting to the Instagram login page in August 2019. We also found that Instagram mementos on Archive.today, Arquivo.pt, and Perma.cc are also not well archived in terms of quantity and quality. Moreover, we were unsuccessful in all our attempts to archive Katy Perry's Instagram account page on Archive.today, Arquivo.pt, and Conifer. Although in the minority, replayable Instagram mementos exist in public archives and contain valuable data for studying disinformation on Instagram. With that in mind, we developed a Python script to web scrape Instagram mementos. As of August 2023, the Python script can scrape Wayback Machine archives of Instagram account pages between November 7, 2012 and June 8, 2018.", "label": 0, "field": "cs"} {"text": "Title: Cross-modal Prototype Driven Network for Radiology Report Generation\nAbstract: Radiology report generation (RRG) aims to describe automatically a radiology image with human-like language and could potentially support the work of radiologists, reducing the burden of manual reporting. Previous approaches often adopt an encoder-decoder architecture and focus on single-modal feature learning, while few studies explore cross-modal feature interaction. Here we propose a Cross-modal PROtotype driven NETwork (XPRONET) to promote cross-modal pattern learning and exploit it to improve the task of radiology report generation. This is achieved by three well-designed, fully differentiable and complementary modules: a shared cross-modal prototype matrix to record the cross-modal prototypes; a cross-modal prototype network to learn the cross-modal prototypes and embed the cross-modal information into the visual and textual features; and an improved multi-label contrastive loss to enable and enhance multi-label prototype learning. XPRONET obtains substantial improvements on the IU-Xray and MIMIC-CXR benchmarks, where its performance exceeds recent state-of-the-art approaches by a large margin on IU-Xray and comparable performance on MIMIC-CXR.", "label": 1, "field": "cs"} {"text": "Title: Spiker+: a framework for the generation of efficient Spiking Neural Networks FPGA accelerators for inference at the edge\nAbstract: Including Artificial Neural Networks in embedded systems at the edge allows applications to exploit Artificial Intelligence capabilities directly within devices operating at the network periphery. This paper introduces Spiker+, a comprehensive framework for generating efficient, low-power, and low-area customized Spiking Neural Networks (SNN) accelerators on FPGA for inference at the edge. Spiker+ presents a configurable multi-layer hardware SNN, a library of highly efficient neuron architectures, and a design framework, enabling the development of complex neural network accelerators with few lines of Python code. Spiker+ is tested on two benchmark datasets, the MNIST and the Spiking Heidelberg Digits (SHD). On the MNIST, it demonstrates competitive performance compared to state-of-the-art SNN accelerators. It outperforms them in terms of resource allocation, with a requirement of 7,612 logic cells and 18 Block RAMs (BRAMs), which makes it fit in very small FPGA, and power consumption, draining only 180mW for a complete inference on an input image. The latency is comparable to the ones observed in the state-of-the-art, with 780us/img. To the authors' knowledge, Spiker+ is the first SNN accelerator tested on the SHD. In this case, the accelerator requires 18,268 logic cells and 51 BRAM, with an overall power consumption of 430mW and a latency of 54 us for a complete inference on input data. This underscores the significance of Spiker+ in the hardware-accelerated SNN landscape, making it an excellent solution to deploy configurable and tunable SNN architectures in resource and power-constrained edge applications.", "label": 0, "field": "cs"} {"text": "Title: VBFT: Veloce Byzantine Fault Tolerant Consensus for Blockchains\nAbstract: Low latency is one of the most desirable features of partially synchronous Byzantine consensus protocols. Existing low-latency protocols have achieved consensus with just two communication steps by reducing the maximum number of faults the protocol can tolerate (from $f = \\frac{n-1}{3}$ to $f = \\frac{n+1}{5}$), \\textcolor{black}{by relaxing protocol safety guarantees}, or by using trusted hardware like Trusted Execution Environment. Furthermore, these two-step protocols don't support rotating primary and low-cost view change (leader replacement), which are important features of many blockchain use cases. In this paper, we propose a protocol called VBFT which achieves consensus in just two communication steps without scarifying desirable features. In particular, VBFT tolerates $f = \\frac{n-1}{3}$ faults (which is the best possible), guarantees strong safety for honest primaries, and requires no trusted hardware. Moreover, VBFT supports primary rotation and low-cost view change, thereby improving prior art on multiple axes.", "label": 0, "field": "cs"} {"text": "Title: Physics-Inspired Discrete-Phase Optimization for 3D Beamforming with PIN-Diode Extra-Large Antenna Arrays\nAbstract: Large antenna arrays can steer narrow beams towards a target area, and thus improve the communications capacity of wireless channels and the fidelity of radio sensing. Hardware that is capable of continuously-variable phase shifts is expensive, presenting scaling challenges. PIN diodes that apply only discrete phase shifts are promising and cost-effective; however, unlike continuous phase shifters, finding the best phase configuration across elements is an NP-hard optimization problem. Thus, the complexity of optimization becomes a new bottleneck for large-antenna arrays. To address this challenge, this paper suggests a procedure for converting the optimization objective function from a ratio of quadratic functions to a sequence of more easily solvable quadratic unconstrained binary optimization (QUBO) sub-problems. This conversion is an exact equivalence, and the resulting QUBO forms are standard input formats for various physics-inspired optimization methods. We demonstrate that a simulated annealing approach is very effective for solving these sub-problems, and we give performance metrics for several large array types optimized by this technique. Through numerical experiments, we report 3D beamforming performance for extra-large arrays with up to 10,000 elements.", "label": 0, "field": "cs"} {"text": "Title: Exact Computation of LTI Reach Set from Integrator Reach Set with Bounded Input\nAbstract: We present a semi-analytical method for exact computation of the boundary of the reach set of a single-input controllable linear time invariant (LTI) system with given bounds on its input range. In doing so, we deduce a parametric formula for the boundary of the reach set of an integrator linear system with time-varying bounded input. This formula generalizes recent results on the geometry of an integrator reach set with time-invariant bounded input. We show that the same ideas allow for computing the volume of the LTI reach set.", "label": 0, "field": "math"} {"text": "Title: Early Record of Divisibility and Primality\nAbstract: We provide textual evidence on divisibility and primality in the ancient Vedic texts of India. Concern with divisibility becomes clear from the listing of all the fifteen pairs of divisors of the number 720. The total number of pairs of divisors of 10,800 is also given. The motivation behind finding the divisors was the theory that the number of divisors of a certain periodic process is related to the count associated with some other periodic process. For example, 720 (days and nights of the year) has 15 pairs of divisors, and this was related to the 15 days of the waxing and waning of the moon. Numbers that have no divisors appeared to have been used to symbolize the \"transcendent\" that is beyond periodicity and change.", "label": 1, "field": "math"} {"text": "Title: Noncompact $n$-dimensional Einstein spaces as attractors for the Einstein flow\nAbstract: We prove that along with the Einstein flow, any small perturbations of an $n(n \\geq 4)$-dimensional, non-compact negative Einstein space with some \"non-positive Weyl tensor\" lead to a unique and global solution, and the solution will be attracted to a noncompact Einstein space that is close to the background one. The $n=3$ case has been addressed in [30], while in dimension $n \\geq 4$, as we know, negative Einstein metrics in general have non-trivial moduli spaces. This fact is reflected on the structure of Einstein equations, which further indicates no decay for the spatial Weyl tensor. Furthermore, it is suggested in the proof that the mechanic preventing the metric from flowing back to the original Einstein metric lies in the non-decaying character of spatial Weyl tensor. In contrary to the compact case considered in Andersson-Moncrief [4], our proof is independent of the theory of infinitesimal Einstein deformations. Instead, we take advantage of the inherent geometric structures of Einstein equations and develop an approach of energy estimates for a hyperbolic system of Maxwell type.", "label": 0, "field": "math"} {"text": "Title: Local well-posedness of a coupled Jordan-Moore-Gibson-Thompson-Pennes model of nonlinear ultrasonic heating\nAbstract: In this work, we investigate a mathematical model of nonlinear ultrasonic heating based on the Jordan-Moore-Gibson-Thompson equation (JMGT) with temperature-dependent medium parameters coupled to the semilinear Pennes equation for the bioheat transfer. The equations are coupled via the temperature in the coefficients of the JMGT equation and via a nonlinear source term within the Pennes equation, which models the absorption of acoustic energy by the surrounding tissue. Using the energy method together with a fixed point argument, we prove that our model is locally well-posed, provided that the initial data are regular, small in a lower topology and the final time is short enough.", "label": 0, "field": "math"} {"text": "Title: Generalized domination structure in cubic graphs\nAbstract: In this paper, we consider generalized domination structure in graphs, which stipulates the structure of a minimum dominating set. Two cycles of length 0 mod 3 intersecting with one path are the constituents of the domination structure and by taking every three vertices on the cycles we can obtain a minimum dominating set. For a cubic graph, we construct generalized domination structure by adding edges in a certain way. We prove that the minimum dominating set of a cubic graph is determined in polynomial time.", "label": 1, "field": "math"} {"text": "Title: Communication games, sequential equilibrium, and mediators\nAbstract: We consider $k$-resilient sequential equilibria, strategy profiles where no player in a coalition of at most $k$ players believes that it can increase its utility by deviating, regardless of its local state. We prove that all $k$-resilient sequential equilibria that can be implemented with a trusted mediator can also be implemented without the mediator in a synchronous system of $n$ players if $n >3k$. In asynchronous systems, where there is no global notion of time and messages may take arbitrarily long to get to their recipient, we prove that a $k$-resilient sequential equilibrium with a mediator can be implemented without the mediator if $n > 4k$. These results match the lower bounds given by Abraham, Dolev, and Halpern (2008) and Geffner and Halpern (2023) for implementing a Nash equilibrium without a mediator (which are easily seen to apply to implementing a sequential equilibrium) and improve the results of Gerardi, who showed that, in the case that $k=1$, a sequential equilibrium can be implemented in synchronous systems if $n \\ge 5$.", "label": 0, "field": "cs"} {"text": "Title: Sensing Aided Covert Communications: Turning Interference into Allies\nAbstract: In this paper, we investigate the realization of covert communication in a general radar-communication cooperation system, which includes integrated sensing and communications as a special example. We explore the possibility of utilizing the sensing ability of radar to track and jam the aerial adversary target attempting to detect the transmission. Based on the echoes from the target, the extended Kalman filtering technique is employed to predict its trajectory as well as the corresponding channels. Depending on the maneuvering altitude of adversary target, two channel state information (CSI) models are considered, with the aim of maximizing the covert transmission rate by jointly designing the radar waveform and communication transmit beamforming vector based on the constructed channels. For perfect CSI under the free-space propagation model, by decoupling the joint design, we propose an efficient algorithm to guarantee that the target cannot detect the transmission. For imperfect CSI due to the multi-path components, a robust joint transmission scheme is proposed based on the property of the Kullback-Leibler divergence. The convergence behaviour, tracking MSE, false alarm and missed detection probabilities, and covert transmission rate are evaluated. Simulation results show that the proposed algorithms achieve accurate tracking. For both channel models, the proposed sensing-assisted covert transmission design is able to guarantee the covertness, and significantly outperforms the conventional schemes.", "label": 0, "field": "cs"} {"text": "Title: Two open problems in the fixed point theory of contractive type mappings on first-countable quasimetric spaces\nAbstract: Two open problems in the fixed point theory of quasi metric spaces posed in [Berinde, V. and Choban, M. M., {\\it Generalized distances and their associate metrics. Impact on fixed point theory}, Creat. Math. Inform. {\\bf 22} (2013), no. 1, 23--32] are considered. We give a complete answer to the first problem, a partial answer to the second one, and also illustrate the complexity and relevance of these problems by means of four very interesting and comprehensive examples.", "label": 1, "field": "math"} {"text": "Title: Trajectory-Oriented Policy Optimization with Sparse Rewards\nAbstract: Deep reinforcement learning (DRL) remains challenging in tasks with sparse rewards. These sparse rewards often only indicate whether the task is partially or fully completed, meaning that many exploration actions must be performed before the agent obtains useful feedback. Hence, most existing DRL algorithms fail to learn feasible policies within a reasonable time frame. To overcome this problem, we develop an approach that exploits offline demonstration trajectories for faster and more efficient online RL in sparse reward settings. Our key insight is that by regarding offline demonstration trajectories as guidance, instead of imitating them, our method learns a policy whose state-action visitation marginal distribution matches that of offline demonstrations. Specifically, we introduce a novel trajectory distance based on maximum mean discrepancy (MMD) and formulate policy optimization as a distance-constrained optimization problem. Then, we show that this distance-constrained optimization problem can be reduced into a policy-gradient algorithm with shaped rewards learned from offline demonstrations. The proposed algorithm is evaluated on extensive discrete and continuous control tasks with sparse and deceptive rewards. The experimental results indicate that our proposed algorithm is significantly better than the baseline methods regarding diverse exploration and learning the optimal policy.", "label": 0, "field": "cs"} {"text": "Title: Phototactic bioconvection in an algal suspension with a free top wall due to diffuse flux in the absence of direct collimated flux\nAbstract: In this article, the effect of diffuse flux in the absence of direct collimated flux on the onset of phototactic bioconvection is investigated. The main effect of diffuse flux in the absence of collimated flux is on the swimming behaviour of microorganisms in the suspension. At higher diffuse flux, the horizontal component of swimming orientation exhibits a higher magnitude, which slows the rate of pattern formation in the suspension. Also, the linear stability of the suspension predicts that the most unstable mode of disturbance transits from stationary (oscillatory) to oscillatory (stationary) at the variation in the magnitude of diffuse flux for some fixed parameters. The overstable nature of disturbance is mostly observed at the high value of swimming speed and extinction coefficient. Moreover, the suspension shows a more stable behaviour at the higher magnitude of diffuse flux.", "label": 0, "field": "math"} {"text": "Title: Formal manifolds: foundations, function spaces, and Poincar\u00e9's lemma\nAbstract: This is the first paper in a series that studies smooth relative Lie algebra homologies and cohomologies based on the theory of formal manifolds and formal Lie groups. In this paper, we lay the foundations for this study by introducing the notion of formal manifolds in the context of differential geometry, inspired by the notion of formal schemes in algebraic geometry. We develop the basic theory for formal manifolds, including a generalization of the theory of vector-valued distributions and generalized functions on smooth manifolds to the setting of formal manifolds. Additionally, we establish Poincar\\'e's lemma for de Rham complexes with coefficients in formal functions, formal generalized functions, compactly supported formal densities, or compactly supported formal distributions.", "label": 0, "field": "math"} {"text": "Title: Post-hoc evaluation of nodes influence in information cascades: the case of coordinated accounts\nAbstract: In the last years, social media has gained an unprecedented amount of attention, playing a pivotal role in shaping the contemporary landscape of communication and connection. However, Coordinated Inhautentic Behaviour (CIB), defined as orchestrated efforts by entities to deceive or mislead users about their identity and intentions, has emerged as a tactic to exploit the online discourse. In this study, we quantify the efficacy of CIB tactics by defining a general framework for evaluating the influence of a subset of nodes in a directed tree. We design two algorithms that provide optimal and greedy post-hoc placement strategies that lead to maximising the configuration influence. We then consider cascades from information spreading on Twitter to compare the observed behaviour with our algorithms. The results show that, according to our model, coordinated accounts are quite inefficient in terms of their network influence, thus suggesting that they may play a less pivotal role than expected. Moreover, the causes of these poor results may be found in two separate aspects: a bad placement strategy and a scarcity of resources.", "label": 0, "field": "cs"} {"text": "Title: Global existence, boundedness and stabilization in a high-dimensional chemotaxis system with consumption\nAbstract: This paper deals with the homogeneous Neumann boundary-value problem for the chemotaxis-consumption system \\begin{eqnarray*} \\begin{array}{llc} u_t=\\Delta u-\\chi\\nabla\\cdot (u\\nabla v)+\\kappa u-\\mu u^2,\\\\ v_t=\\Delta v-uv, \\end{array} \\end{eqnarray*} in $N$-dimensional bounded smooth domains for suitably regular positive initial data. We shall establish the existence of a global bounded classical solution for suitably large $\\mu$ and prove that for any $\\mu>0$ there exists a weak solution. Moreover, in the case of $\\kappa>0$ convergence to the constant equilibrium $(\\frac{\\kappa}{\\mu},0)$ is shown.", "label": 1, "field": "math"} {"text": "Title: Sequential choice functions and stability problems\nAbstract: The concept of sequential choice functions is introduced and studied. This concept applies to the reduction of the problem of stable matchings with sequential workers to a situation where the workers are linear.", "label": 0, "field": "math"} {"text": "Title: Synthetic projective lines, geometric closure and AB-sets\nAbstract: In this note, we introduce a new approach to abstract ``synthetic'' projective lines. We discuss various aspects of our approach, and compare these aspects with the classical one. A number of intriguing questions arise. Amongst these aspects, we discuss geometric closures, and introduce automorphism-blocking sets. We also construct a number of (counter) examples in infinite cases.", "label": 1, "field": "math"} {"text": "Title: A note on minor antichains of uncountable graphs\nAbstract: A simplified construction is presented for Komj\\'ath's result that for every uncountable cardinal $\\kappa$, there are $2^\\kappa$ graphs of size $\\kappa$ none of them being a minor of another.", "label": 1, "field": "math"} {"text": "Title: C*-Algebras of one-sided subshifts over arbitrary alphabets\nAbstract: We associate a C*-algebra $\\widetilde{\\mathcal{O}}_{\\textsf{X}}$ with a subshift over an arbitrary, possibly infinite, alphabet. We show that $\\widetilde{\\mathcal{O}}_{\\textsf{X}}$ is a full invariant for topological conjugacy of the subshifts of Ott, Tomforde, and Willis. When the alphabet is countable, we show that $\\widetilde{\\mathcal{O}}_{\\textsf{X}}$ is an invariant for isometric conjugacy of subshifts with the product metric. For a suitable partial action associated with a subshift over a countable alphabet, we show that $\\widetilde{\\mathcal{O}}_{\\textsf{X}}$ is also an invariant for continuous orbit equivalence. Additionally, we give a concrete way to compute the K-theory of $\\widetilde{\\mathcal{O}}_{\\textsf{X}}$ and illustrate it with two examples.", "label": 0, "field": "math"} {"text": "Title: Counterexamples to the local-global principle associated with Swinnerton-Dyer's cubic form\nAbstract: In this paper, we imitate a classical construction of a counterexample to the local-global principle of cubic forms of 4 variables which was discovered first by Swinnerton-Dyer (Mathematica (1962)). Our construction gives new explicit families of counterexamples in homogeneous forms of $4, 5, 6, ..., 2n+2$ variables of degree $2n+1$ for infinitely many integers $n$. It is contrastive to Swinnerton-Dyer's original construction that we do not need any concrete calculation in the proof of local solubility.", "label": 1, "field": "math"} {"text": "Title: Decentralized Multi-Task Online Convex Optimization Under Random Link Failures\nAbstract: Decentralized optimization methods often entail information exchange between neighbors. Transmission failures can happen due to network congestion, hardware/software issues, communication outage, and other factors. In this paper, we investigate the random link failure problem in decentralized multi-task online convex optimization, where agents have individual decisions that are coupled with each other via pairwise constraints. Although widely used in constrained optimization, conventional saddle-point algorithms are not directly applicable here because of random packet dropping. To address this issue, we develop a robust decentralized saddle-point algorithm against random link failures with heterogeneous probabilities by replacing the missing decisions of neighbors with their latest received values. Then, by judiciously bounding the accumulated deviation stemming from this replacement, we first establish that our algorithm achieves $\\mathcal{O}(\\sqrt{T})$ regret and $\\mathcal{O}(T^\\frac{3}{4})$ constraint violations for the full information scenario, where the complete information on the local cost function is revealed to each agent at the end of each time slot. These two bounds match, in order sense, the performance bounds of algorithms with perfect communications. Further, we extend our algorithm and analysis to the two-point bandit feedback scenario, where only the values of the local cost function at two random points are disclosed to each agent sequentially. Performance bounds of the same orders as the full information case are derived. Finally, we corroborate the efficacy of the proposed algorithms and the analytical results through numerical simulations.", "label": 0, "field": "cs"} {"text": "Title: On a Navier-Stokes-Fourier-like system capturing transitions between viscous and inviscid fluid regimes and between no-slip and perfect-slip boundary conditions\nAbstract: We study a generalization of the Navier-Stokes-Fourier system for an incompressible fluid where the deviatoric part of the Cauchy stress tensor is related to the symmetric part of the velocity gradient via a maximal monotone 2-graph that is continuously parametrized by the temperature. As such, the considered fluid may go through transitions between three of the following regimes: it can flow as a Bingham fluid for a specific value of the temperature, while it can behave as the Navier-Stokes fluid for another value of the temperature or, for yet another temperature, it can respond as the Euler fluid until a certain activation initiates the response of the Navier-Stokes fluid. At the same time, we regard a generalized threshold slip on the boundary that also may go through various regimes continuously with the temperature. All material coefficients like the dynamic viscosity, friction or activation coefficients are assumed to be temperature-dependent. We establish the large-data and long-time existence of weak solutions, applying the $L^{\\infty}$-truncation technique to approximate the velocity field.", "label": 1, "field": "math"} {"text": "Title: Local-in-time strong solutions of the homogeneous Landau-Coulomb equation with $L^p$ initial datum\nAbstract: We consider the homogeneous Landau equation with Coulomb potential and general initial data $f_{in} \\in L^p$, where $p$ is arbitrarily close to $3/2$. We show the local-in-time existence and uniqueness of smooth solutions for such initial data. The constraint $p > 3/2$ has appeared in several related works and appears to be the minimal integrability assumption achievable with current techniques. We adapt recent ODE methods and conditional regularity results appearing in [arXiv:2303.02281] to deduce new short time $L^p \\to L^\\infty$ smoothing estimates. These estimates enable us to construct local-in-time smooth solutions for large $L^p$ initial data, and allow us to show directly conditional regularity results for solutions verifying \\emph{unweighted} Prodi-Serrin type conditions. As a consequence, we obtain additional stability and uniqueness results for the solutions we construct.", "label": 0, "field": "math"} {"text": "Title: Parameterized Verification of Disjunctive Timed Networks\nAbstract: We introduce new techniques for the parameterized verification of disjunctive timed networks (DTNs), i.e., networks of timed automata (TAs) that communicate via location guards that enable a transition only if there is another process in a given location. This computational model has been considered in the literature before, example applications are gossiping clock synchronization protocols or planning problems. We address the minimum-time reachability problem (Minreach) in DTNs, and show how to efficiently solve it based on a novel zone graph algorithm. We further show that solving Minreach allows us to construct a summary TA capturing exactly the possible behaviors of a single TA within a DTN of arbitrary size. The combination of these two results enables the parameterized verification of DTNs, while avoiding the construction of an exponential-size cutoff system required by existing results. Additionally, we develop sufficient conditions for solving Minreach and parameterized verification problems even in certain cases where locations that appear in location guards can have clock invariants, a case that has usually been excluded in the literature. Our techniques are also implemented, and experiments show their practicality.", "label": 0, "field": "cs"} {"text": "Title: The Principal Ideal Theorem in Spectral Synthesis\nAbstract: In an earlier paper we solved a long-standing problem which goes back to Laurent Schwartz's work on mean-periodic functions. Namely, we completely characterised those locally compact Abelian groups having spectral synthesis. The method is based on the localisation concept. In this paper we show that localisation can be used to prove another basic result in spectral synthesis: the principal ideal theorem.", "label": 0, "field": "math"} {"text": "Title: Deep Recurrent Level Set for Segmenting Brain Tumors\nAbstract: Variational Level Set (VLS) has been a widely used method in medical segmentation. However, segmentation accuracy in the VLS method dramatically decreases when dealing with intervening factors such as lighting, shadows, colors, etc. Additionally, results are quite sensitive to initial settings and are highly dependent on the number of iterations. In order to address these limitations, the proposed method incorporates VLS into deep learning by defining a novel end-to-end trainable model called as Deep Recurrent Level Set (DRLS). The proposed DRLS consists of three layers, i.e, Convolutional layers, Deconvolutional layers with skip connections and LevelSet layers. Brain tumor segmentation is taken as an instant to illustrate the performance of the proposed DRLS. Convolutional layer learns visual representation of brain tumor at different scales. Since brain tumors occupy a small portion of the image, deconvolutional layers are designed with skip connections to obtain a high quality feature map. Level-Set Layer drives the contour towards the brain tumor. In each step, the Convolutional Layer is fed with the LevelSet map to obtain a brain tumor feature map. This in turn serves as input for the LevelSet layer in the next step. The experimental results have been obtained on BRATS2013, BRATS2015 and BRATS2017 datasets. The proposed DRLS model improves both computational time and segmentation accuracy when compared to the the classic VLS-based method. Additionally, a fully end-to-end system DRLS achieves state-of-the-art segmentation on brain tumors.", "label": 1, "field": "cs"} {"text": "Title: Uniform mixing and completely positive sofic entropy\nAbstract: Let $G$ be a countable discrete sofic group. We define a concept of uniform mixing for measure-preserving $G$-actions and show that it implies completely positive sofic entropy. When $G$ contains an element of infinite order, we use this to produce an uncountable family of pairwise nonisomorphic $G$-actions with completely positive sofic entropy. None of our examples is a factor of a Bernoulli shift.", "label": 1, "field": "math"} {"text": "Title: Additive Correlation and the Inverse Problem for the Large Sieve\nAbstract: Let $A\\subset [1,N]$ be a set of positive integers with $|A|\\gg \\sqrt N$. We show that if avoids about $p/2$ residue classes modulo $p$ for each prime $p$, the $A$ must correlate additively with the squares $S=\\{n^2:1\\leq n\\leq \\sqrt N\\}$, in the sense that we have the additive energy estimate $E(A,S)\\gg N\\log N$. This is, in a sense, optimal.", "label": 1, "field": "math"} {"text": "Title: On games and simulators as a platform for development of artificial intelligence for command and control\nAbstract: Games and simulators can be a valuable platform to execute complex multi-agent, multiplayer, imperfect information scenarios with significant parallels to military applications: multiple participants manage resources and make decisions that command assets to secure specific areas of a map or neutralize opposing forces. These characteristics have attracted the artificial intelligence (AI) community by supporting development of algorithms with complex benchmarks and the capability to rapidly iterate over new ideas. The success of artificial intelligence algorithms in real-time strategy games such as StarCraft II have also attracted the attention of the military research community aiming to explore similar techniques in military counterpart scenarios. Aiming to bridge the connection between games and military applications, this work discusses past and current efforts on how games and simulators, together with the artificial intelligence algorithms, have been adapted to simulate certain aspects of military missions and how they might impact the future battlefield. This paper also investigates how advances in virtual reality and visual augmentation systems open new possibilities in human interfaces with gaming platforms and their military parallels.", "label": 1, "field": "cs"} {"text": "Title: KCES: A Workflow Containerization Scheduling Scheme Under Cloud-Edge Collaboration Framework\nAbstract: As more IoT applications gradually move towards the cloud-edge collaborative mode, the containerized scheduling of workflows extends from the cloud to the edge. However, given the high delay of the communication network, loose coupling of structure, and resource heterogeneity between cloud and edge, workflow containerization scheduling in the cloud-edge scenarios faces the difficulty of resource coordination and application collaboration management. To address these two issues, we propose a KubeEdge-Cloud-Edge-Scheduling scheme named KCES, a workflow containerization scheduling scheme for the KubeEdge cloud-edge framework. The KCES includes a cloud-edge workflow scheduling engine for KubeEdge and workflow scheduling strategies for task horizontal roaming and vertical offloading. Considering the scheduling optimization of cloud-edge workflows, this paper proposes a cloud-edge workflow scheduling model and cloud-edge node model and designs a cloud-edge workflow scheduling engine to maximize cloud-edge resource utilization under the constraint of workflow task delay. A cloud-edge resource hybrid management technology is used to design the cloud-edge resource evaluation and resource allocation algorithms to achieve cloud-edge resource collaboration. Based on the ideas of distributed functional roles and the hierarchical division of computing power, the horizontal roaming among the edges and vertical offloading strategies between the cloud and edges for workflow tasks are designed to realize the cloud-edge application collaboration. Through a customized IoT application workflow instance, experimental results show that KCES is superior to the baseline in total workflow duration, average workflow duration, and resource usage and has the capabilities of horizontal roaming and vertical offloading for workflow tasks.", "label": 0, "field": "cs"} {"text": "Title: Noncentral moderate deviations for time-changed L\u00e9vy processes with inverse of stable subordinators\nAbstract: In this paper we present some extensions of recent noncentral moderate deviation results in the literature. In the first part we generalize the results in \\cite{BeghinMacciSPL2022} by considering a general L\\'evy process $\\{S(t):t\\geq 0\\}$ instead of a compound Poisson process. In the second part we assume that $\\{S(t):t\\geq 0\\}$ has bounded variation and it is not a subordinator; thus, in some sense, we have the difference of two independent non-null subordinators. In this way we generalize the results in \\cite{LeeMacci} for Skellam processes.", "label": 0, "field": "math"} {"text": "Title: Electromechanical phase-field fracture modelling of piezoresistive CNT-based composites\nAbstract: We present a novel computational framework to simulate the electromechanical response of self-sensing carbon nanotube (CNT)-based composites experiencing fracture. The computational framework combines electrical-deformation-fracture finite element modelling with a mixed micromechanics formulation. The latter is used to estimate the constitutive properties of CNT-based composites, including the elastic tensor, fracture energy, electrical conductivity, and linear piezoresistive coefficients. These properties are inputted into a coupled electro-structural finite element model, which simulates the evolution of cracks based upon phase-field fracture. The coupled physical problem is solved in a monolithic manner, exploiting the robustness and efficiency of a quasi-Newton algorithm. 2D and 3D boundary value problems are simulated to illustrate the potential of the modelling framework in assessing the influence of defects on the electromechanical response of meso- and macro-scale smart structures. Case studies aim at shedding light into the interplay between fracture and the electromechanical material response and include parametric analyses, validation against experiments and the simulation of complex cracking conditions (multiple defects, crack merging). The presented numerical results showcase the efficiency and robustness of the computational framework, as well as its ability to model a large variety of structural configurations and damage patterns. The deformation-electrical-fracture finite element code developed is made freely available to download.", "label": 1, "field": "cs"} {"text": "Title: Structural characterization of Cayley graphs\nAbstract: We show that the directed labelled Cayley graphs coincide with the rooted deterministic vertex-transitive simple graphs. The Cayley graphs are also the strongly connected deterministic simple graphs of which all vertices have the same cycle language, or just the same elementary cycle language. Under the assumption of the axiom of choice, we characterize the Cayley graphs for all group subsets as the deterministic, co-deterministic, vertex-transitive simple graphs.", "label": 1, "field": "cs"} {"text": "Title: A BDI Agent-Based Task Scheduling Framework for Cloud Computing\nAbstract: Cloud computing is an attractive technology for providing computing resources over the Internet. Task scheduling is a critical issue in cloud computing, where an efficient task scheduling method can improve overall cloud performance. Since cloud computing is a large-scale and geographically distributed environment, traditional scheduling methods that allocate resources in a centralized manner are ineffective. Besides, traditional methods are difficult to make rational decisions timely when the external environment changes. This paper proposes a decentralized BDI (belief-desire-intention) agent-based scheduling framework for cloud computing. BDI agents have advantages in modelling dynamic environments because BDI agents can update their beliefs, change desires, and trigger behaviours based on environmental changes. Besides, to avoid communication stuck caused by environmental uncertainties, the asynchronous communication mode with a notify listener is employed. The proposed framework covers both the task scheduling and rescheduling stages with the consideration of uncertain events that can interrupt task executions. Two agent-based algorithms are proposed to implement the task scheduling and rescheduling processes, and a novel recommendation mechanism is presented in the scheduling stage to reduce the impact of information synchronization delays. The proposed framework is implemented by JADEX and tested on CloudSim. The experimental results show that our framework can minimize the task makespan, balance the resource utilization in a large-scale environment, and maximize the task success rate when uncertain events occur.", "label": 0, "field": "cs"} {"text": "Title: Some results and a conjecture on certain subclasses of graphs according to the relations among certain energies, degrees and conjugate degrees of graphs\nAbstract: Let $G$ be a simple graph of order $n$ with degree sequence $(d)=(d_1,d_2,\\ldots,d_n)$ and conjugate degree sequence $(d^*)=(d_1^*,d_2^*,\\ldots,d_n^*)$. In \\cite{AkbariGhorbaniKoolenObudi2010,DasMojallalGutman2017} it was proven that $\\mathcal{E}(G)\\leq \\sum_{i=1}^{n} \\sqrt{d_i}$ and $\\sum_{i=1}^{n} \\sqrt{d_i^*} \\leq LEL(G) \\leq IE(G) \\leq \\sum_{i=1}^{n} \\sqrt{d_i}$, where $\\mathcal{E}(G)$, $LEL(G)$ and $IE(G)$ are the energy, the Laplacian-energy-like invariant and the incidence energy of $G$, respectively, and in \\cite{DasMojallalGutman2017} it was concluded that the class of all connected simple graphs of order $n$ can be dividend into four subclasses according to the position of $\\mathcal{E}(G)$ in the order relations above. Then, they proposed a problem about characterizing all graphs in each subclass. In this paper, we attack this problem. First, we count the number of graphs of order $n$ in each of four subclasses for every $1\\leq n \\leq 8$ using a Sage code. Second, we present a conjecture on the ratio of the number of graphs in each subclass to the number of all graphs of order $n$ as $n$ approaches the infinity. Finally, as a first partial solution to the problem, we determine subclasses to which a path, a complete graph and a cycle graph of order $n\\geq 1$ belong.", "label": 1, "field": "math"} {"text": "Title: Comultiplication for shifted Yangians and quantum open Toda lattice\nAbstract: We study a coproduct in type A quantum open Toda lattice in terms of a coproduct in the shifted Yangian of sl_2. At the classical level this corresponds to the multiplication of scattering matrices of euclidean SU(2) monopoles. We also study coproducts for shifted Yangians for any simply-laced Lie algebra.", "label": 1, "field": "math"} {"text": "Title: Efficient Communication in Federated Learning Using Floating-Point Lossy Compression\nAbstract: In the expanding realm of machine learning (ML) within edge computing, the efficient exchange of information in federated learning (FL) environments is paramount. FL's decentralized nature often leads to significant communication bottlenecks, particularly in settings where resources are limited. Traditional data compression techniques, such as quantization and pruning, provide partial solutions but can compromise model performance or necessitate costly retraining. Our paper addresses this issue through \\textit{FedSZ}, a novel lossy compression-based FL framework. \\textit{FedSZ} is designed to minimize the size of local model updates without impacting model performance. Our framework features a compression pipeline integrating data partitioning, lossy and lossless model parameters, metadata compression, and efficient serialization. We conduct a thorough evaluation of \\textit{FedSZ} utilizing a variety of lossy compressors, among which SZ2 emerged as the most effective, consistently performing well across diverse neural network architectures, including AlexNet, MobileNetV2, and ResNet50, and datasets such as CIFAR-10, Caltech101, and FMNIST. A relative error bound of 1E-2 balances compression and data integrity, achieving compression ratios ranging from $5.55\\mbox{--}12.61\\times$. Furthermore, we observed that the runtime overhead introduced by \\textit{FedSZ} is minimal, at less than $4.7\\%$, compared to a significant reduction in network transfer times, which we noted to exceed $13.3\\times$ reduction or saving of over $100$s in edge networks operating at 10Mbps. Our findings firmly establish the efficacy of \\textit{FedSZ}, offering valuable insights for achieving an optimal balance between communication efficiency and model performance in FL settings, particularly in edge computing environments.", "label": 0, "field": "cs"} {"text": "Title: Uncovering the Disentanglement Capability in Text-to-Image Diffusion Models\nAbstract: Generative models have been widely studied in computer vision. Recently, diffusion models have drawn substantial attention due to the high quality of their generated images. A key desired property of image generative models is the ability to disentangle different attributes, which should enable modification towards a style without changing the semantic content, and the modification parameters should generalize to different images. Previous studies have found that generative adversarial networks (GANs) are inherently endowed with such disentanglement capability, so they can perform disentangled image editing without re-training or fine-tuning the network. In this work, we explore whether diffusion models are also inherently equipped with such a capability. Our finding is that for stable diffusion models, by partially changing the input text embedding from a neutral description (e.g., \"a photo of person\") to one with style (e.g., \"a photo of person with smile\") while fixing all the Gaussian random noises introduced during the denoising process, the generated images can be modified towards the target style without changing the semantic content. Based on this finding, we further propose a simple, light-weight image editing algorithm where the mixing weights of the two text embeddings are optimized for style matching and content preservation. This entire process only involves optimizing over around 50 parameters and does not fine-tune the diffusion model itself. Experiments show that the proposed method can modify a wide range of attributes, with the performance outperforming diffusion-model-based image-editing algorithms that require fine-tuning. The optimized weights generalize well to different images. Our code is publicly available at https://github.com/UCSB-NLP-Chang/DiffusionDisentanglement.", "label": 1, "field": "cs"} {"text": "Title: Non-unital polygraphs form a presheaf category\nAbstract: We prove, as claimed by A.Carboni and P.T.Johnstone, that the category of non-unital polygraphs, i.e. polygraphs where the source and target of each generator are not identity arrows, is a presheaf category. More generally we develop a new criterion for proving that certain classes of polygraphs are presheaf categories. This criterion also applies to the larger class of polygraphs where only the source of each generator is not an identity, and to the class of \"many-to-one polygraphs\", producing a new, more direct, proof that this is a presheaf category. The criterion itself seems to be extendable to more general type of operads over possibly different combinatorics, but we leave this question for future work. In an appendix we explain why this result is relevant if one wants to fix the arguments of a famous paper of M.Kapranov and V.Voevodsky and make them into a proof of C.Simpson's semi-strictification conjecture. We present a program aiming at proving this conjecture, which will be continued in subsequent papers.", "label": 1, "field": "math"} {"text": "Title: Proportional 2-Choosability with a Bounded Palette\nAbstract: Proportional choosability is a list coloring analogue of equitable coloring. Specifically, a $k$-assignment $L$ for a graph $G$ specifies a list $L(v)$ of $k$ available colors to each $v \\in V(G)$. An $L$-coloring assigns a color to each vertex $v$ from its list $L(v)$. A proportional $L$-coloring of $G$ is a proper $L$-coloring in which each color $c \\in \\bigcup_{v \\in V(G)} L(v)$ is used $\\lfloor \\eta(c)/k \\rfloor$ or $\\lceil \\eta(c)/k \\rceil$ times where $\\eta(c)=\\left\\lvert{\\{v \\in V(G) : c \\in L(v) \\}}\\right\\rvert$. A graph $G$ is proportionally $k$-choosable if a proportional $L$-coloring of $G$ exists whenever $L$ is a $k$-assignment for $G$. Motivated by earlier work, we initiate the study of proportional choosability with a bounded palette by studying proportional 2-choosability with a bounded palette. In particular, when $\\ell \\geq 2$, a graph $G$ is said to be proportionally $(2, \\ell)$-choosable if a proportional $L$-coloring of $G$ exists whenever $L$ is a $2$-assignment for $G$ satisfying $|\\bigcup_{v \\in V(G)} L(v)| \\leq \\ell$. We observe that a graph is proportionally $(2,2)$-choosable if and only if it is equitably 2-colorable. As $\\ell$ gets larger, the set of proportionally $(2, \\ell)$-choosable graphs gets smaller. We show that whenever $\\ell \\geq 5$ a graph is proportionally $(2, \\ell)$-choosable if and only if it is proportionally 2-choosable. We also completely characterize the connected proportionally $(2, \\ell)$-choosable graphs when $\\ell = 3,4$.", "label": 1, "field": "math"} {"text": "Title: High-Fidelity Diffusion-based Image Editing\nAbstract: Diffusion models have attained remarkable success in the domains of image generation and editing. It is widely recognized that employing larger inversion and denoising steps in diffusion model leads to improved image reconstruction quality. However, the editing performance of diffusion models tends to be no more satisfactory even with increasing denoising steps. The deficiency in editing could be attributed to the conditional Markovian property of the editing process, where errors accumulate throughout denoising steps. To tackle this challenge, we first propose an innovative framework where a rectifier module is incorporated to modulate diffusion model weights with residual features, thereby providing compensatory information to bridge the fidelity gap. Furthermore, we introduce a novel learning paradigm aimed at minimizing error propagation during the editing process, which trains the editing procedure in a manner similar to denoising score-matching. Extensive experiments demonstrate that our proposed framework and training strategy achieve high-fidelity reconstruction and editing results across various levels of denoising steps, meanwhile exhibits exceptional performance in terms of both quantitative metric and qualitative assessments. Moreover, we explore our model's generalization through several applications like image-to-image translation and out-of-domain image editing.", "label": 0, "field": "cs"} {"text": "Title: Modulus representation of the Riemann xi-function and equivalent inequalities for the Riemann hypothesis\nAbstract: We derive a representation of the modulus of the Riemann xi-function and present purely analytical inequalities which are equivalent to the Riemann hypothesis. We also discuss polynomial approximations of the inequalities.", "label": 0, "field": "math"} {"text": "Title: Symplectic leaves in projective spaces of bundle extensions\nAbstract: Fix a stable degree-$n$ rank-$k$ bundle $\\mathcal{F}$ on a complex elliptic curve for (coprime) $1\\le k0}(1/\\Delta_i)\\right)$. Our algorithm is combinatorial and improves on the previous combinatorial algorithm by [Gupta et al., COLT2019] (their bound is $\\tilde{O}\\left(KC+\\sum_{\\Delta_i>0}(1/\\Delta_i)\\right)$), and almost matches the best known bounds obtained by [Zimmert et al., ICML2019] and [Zimmert and Seldin, AISTATS2019] (up to logarithmic factor). Note that the algorithms in [Zimmert et al., ICML2019] and [Zimmert and Seldin, AISTATS2019] require one to solve complex convex programs while our algorithm is combinatorial, very easy to implement, requires weaker assumptions and has very low oracle complexity and running time. We also study the setting where we only get access to an approximation oracle for the stochastic combinatorial semi-bandit problem. Our algorithm achieves an (approximation) regret bound of $\\tilde{O}\\left(d\\sqrt{KT}\\right)$. Our algorithm is very simple, only worse than the best known regret bound by $\\sqrt{d}$, and has much lower oracle complexity than previous work.", "label": 1, "field": "cs"} {"text": "Title: Near-Field Velocity Sensing and Predictive Beamforming\nAbstract: The novel concept of near-field velocity sensing is proposed. In contrast to far-field velocity sensing, near-field velocity sensing enables the simultaneous estimation of both radial and transverse velocities of a moving target. A maximum-likelihood-based method is proposed for jointly estimating the radial and transverse velocities from the echo signals. Assisted by near-field velocity sensing, a predictive beamforming framework is proposed for a moving communication user, which requires no channel estimation but achieves seamless data transmission. Finally, numerical examples validate the proposed approaches.", "label": 0, "field": "cs"} {"text": "Title: $L^p$ Maximal regularity for vector-valued Schr\u00f6dinger operators\nAbstract: In this paper we consider the vector-valued Schr\\\"{o}dinger operator $-\\Delta + V$, where the potential term $V$ is a matrix-valued function whose entries belong to $L^1_{\\rm loc}(\\mathbb{R}^d)$ and, for every $x\\in\\mathbb{R}^d$, $V(x)$ is a symmetric and nonnegative definite matrix, with non positive off-diagonal terms and with eigenvalues comparable each other. For this class of potential terms we obtain maximal inequality in $L^1(\\mathbb{R}^d,\\mathbb{R}^m).$ Assuming further that the minimal eigenvalue of $V$ belongs to some reverse H\\\"older class of order $q\\in(1,\\infty)\\cup\\{\\infty\\}$, we obtain maximal inequality in $L^p(\\mathbb{R}^d,\\mathbb{R}^m)$, for $p$ in between $1$ and some $q$.", "label": 0, "field": "math"} {"text": "Title: Non-Wire Alternatives to Capacity Expansion\nAbstract: Distributed energy resources (DERs) can serve as non-wire alternatives to capacity expansion by managing peak load to avoid or defer traditional expansion projects. In this paper, we study a planning problem that co-optimizes DERs investment and operation (e.g., energy efficiency, energy storage, demand response, solar photovoltaic) and the timing of capacity expansion. We formulate the problem as a large scale (in the order of millions of variables because we model the operation of DERs over a period of decades) non-convex optimization problem. Despite its non-convexities, we find its optimal solution by decomposing it using the Dantzig-Wolfe Decomposition Algorithm and solving a series of small linear problems. Finally, we present a real planning problem at the University of Washington Seattle Campus.", "label": 1, "field": "math"} {"text": "Title: Synchrony in Gene Regulatory Networks\nAbstract: We consider two mathematical dynamical models of gene regulatory networks (GRNs) and obtain results on robust synchronization on these dynamical models based on the existing theoretical results in the coupled cell network formalism. We also explore the concepts of quotient networks and network lifting in the context of GRNs which are related to the process of gene duplication and the phenomenon of genetic redundancy.", "label": 1, "field": "math"} {"text": "Title: Energy-optimal Timetable Design for Sustainable Metro Railway Networks\nAbstract: We present our collaboration with Thales Canada Inc, the largest provider of communication-based train control (CBTC) systems worldwide. We study the problem of designing energy-optimal timetables in metro railway networks to minimize the effective energy consumption of the network, which corresponds to simultaneously minimizing total energy consumed by all the trains and maximizing the transfer of regenerative braking energy from suitable braking trains to accelerating trains. We propose a novel data-driven linear programming model that minimizes the total effective energy consumption in a metro railway network, capable of computing the optimal timetable in real-time, even for some of the largest CBTC systems in the world. In contrast with existing works, which are either NP-hard or involve multiple stages requiring extensive simulation, our model is a single linear programming model capable of computing the energy-optimal timetable subject to the constraints present in the railway network. Furthermore, our model can predict the total energy consumption of the network without requiring time-consuming simulations, making it suitable for widespread use in managerial settings. We apply our model to Shanghai Railway Network's Metro Line 8 -- one of the largest and busiest railway services in the world -- and empirically demonstrate that our model computes energy-optimal timetables for thousands of active trains spanning an entire service period of one day in real-time (solution time less than one second on a standard desktop), achieving energy savings between approximately 20.93% and 28.68%. Given the compelling advantages, our model is in the process of being integrated into Thales Canada Inc's industrial timetable compiler.", "label": 0, "field": "math"} {"text": "Title: Clairvoyant embedding in one dimension\nAbstract: Let v, w be infinite 0-1 sequences, and m a positive integer. We say that w is m-embeddable in v, if there exists an increasing sequence n_{i} of integers with n_{0}=0, such that 0< n_{i} - n_{i-1} < m, w(i) = v(n_i) for all i > 0. Let X and Y be independent coin-tossing sequences. We will show that there is an m with the property that Y is m-embeddable into X with positive probability. This answers a question that was open for a while. The proof generalizes somewhat the hierarchical method of an earlier paper of the author on dependent percolation.", "label": 1, "field": "math"} {"text": "Title: Impact of RIS on Outage Probability and Ergodic Rate in Wireless Powered Communication\nAbstract: Wireless powered communication (WPC) combines information and energy transmission for energy-constrained nodes. Reconfigurable intelligent surfaces (RISs) are capable of controlling radio signals in a dynamic and goal-oriented manner. This paper investigates the combination of RIS and WPC to enhance the performance of an energy-constrained user. Using an RIS, a base station, and a wireless user transmit energy and information signals, respectively. We derive closed-form expressions for outage probability and secrecy rate to analyze the performance of the proposed framework. Based on the theoretical analysis and simulation results, valuable insights are revealed and parameter selection is demonstrated.", "label": 0, "field": "cs"} {"text": "Title: Hereditary completeness of Exponential systems $\\{e^{\u03bb_n t}\\}_{n=1}^{\\infty}$ in their closed span in $L^2 (a, b)$ and Spectral Synthesis\nAbstract: Suppose that $\\{\\lambda_n\\}_{n=1}^{\\infty}$ is a sequence of distinct positive real numbers satisfying the conditions inf$\\{\\lambda_{n+1}-\\lambda_n \\}>0,$ and $\\sum_{n=1}^{\\infty}\\lambda_n^{-1}<\\infty.$ We prove that the exponential system $\\{e^{\\lambda_n t}\\}_{n=1}^{\\infty}$ is hereditarily complete in the closure of the subspace spanned by $\\{e^{\\lambda_n t}\\}_{n=1}^{\\infty}$ in the space $L^2 (a,b)$. We also give an example of a class of compact non-normal operators defined on this closure which admit spectral synthesis.", "label": 0, "field": "math"} {"text": "Title: Inner conjugate pair of Hadamard subfactors and vertex model\nAbstract: We show that any pair of Hadamard subfactors arising from complex Hadamard matrices of order 3 are either equal or inner conjugate. If the pair of Hadamard subfactors are distinct, their intersection is shown to be a subfactor of the hyperfinite type $II_1$ factor $R$. We compute its first relative commutant and characterize this subfactor by identifying it with a vertex model subfactor of the Krishnan-Sunder type. A few key invariants, including the Pimsner-Popa probabilistic number, the angle, and the Connes-St{\\o}rmer relative entropy for the pair of Hadamard subfactors are computed to understand their relative position.", "label": 0, "field": "math"} {"text": "Title: Perfect precise colorings of plane semiregular tilings\nAbstract: A coloring of a planar semiregular tiling $\\mathcal{T}$ is an assignment of a unique color to each tile of $\\mathcal{T}$. If $G$ is the symmetry group of $\\mathcal{T}$, we say that the coloring is perfect if every element of $G$ induces a permutation on the finite set of colors. If $\\mathcal{T}$ is $k$-valent, then a coloring of $\\mathcal{T}$ with $k$ colors is said to be precise if no two tiles of $\\mathcal{T}$ sharing the same vertex have the same color. In this work, we obtain perfect precise colorings of some families of $k$-valent semiregular tilings in the plane, where $k\\leq 6$.", "label": 0, "field": "math"} {"text": "Title: DB-GPT: Empowering Database Interactions with Private Large Language Models\nAbstract: The recent breakthroughs in large language models (LLMs) are positioned to transition many areas of software. Database technologies particularly have an important entanglement with LLMs as efficient and intuitive database interactions are paramount. In this paper, we present DB-GPT, a revolutionary and production-ready project that integrates LLMs with traditional database systems to enhance user experience and accessibility. DB-GPT is designed to understand natural language queries, provide context-aware responses, and generate complex SQL queries with high accuracy, making it an indispensable tool for users ranging from novice to expert. The core innovation in DB-GPT lies in its private LLM technology, which is fine-tuned on domain-specific corpora to maintain user privacy and ensure data security while offering the benefits of state-of-the-art LLMs. We detail the architecture of DB-GPT, which includes a novel retrieval augmented generation (RAG) knowledge system, an adaptive learning mechanism to continuously improve performance based on user feedback and a service-oriented multi-model framework (SMMF) with powerful data-driven agents. Our extensive experiments and user studies confirm that DB-GPT represents a paradigm shift in database interactions, offering a more natural, efficient, and secure way to engage with data repositories. The paper concludes with a discussion of the implications of DB-GPT framework on the future of human-database interaction and outlines potential avenues for further enhancements and applications in the field. The project code is available at https://github.com/eosphoros-ai/DB-GPT. Experience DB-GPT for yourself by installing it with the instructions https://github.com/eosphoros-ai/DB-GPT#install and view a concise 10-minute video at https://www.youtube.com/watch?v=KYs4nTDzEhk.", "label": 0, "field": "cs"} {"text": "Title: Singular SPDEs in domains with boundaries\nAbstract: We study spaces of modelled distributions with singular behaviour near the boundary of a domain that, in the context of the theory of regularity structures, allow one to give robust solution theories for singular stochastic PDEs with boundary conditions. The calculus of modelled distributions established in Hairer (Invent. Math. 198, 2014) is extended to this setting. We formulate and solve fixed point problems in these spaces with a class of kernels that is sufficiently large to cover in particular the Dirichlet and Neumann heat kernels. These results are then used to provide solution theories for the KPZ equation with Dirichlet and Neumann boundary conditions and for the 2D generalised parabolic Anderson model with Dirichlet boundary conditions. In the case of the KPZ equation with Neumann boundary conditions, we show that, depending on the class of mollifiers one considers, a \"boundary renormalisation\" takes place. In other words, there are situations in which a certain boundary condition is applied to an approximation to the KPZ equation, but the limiting process is the Hopf-Cole solution to the KPZ equation with a different boundary condition.", "label": 1, "field": "math"} {"text": "Title: Bounds for the Quartic Weyl Sum\nAbstract: We improve the standard Weyl estimate for quartic exponential sums in which the argument is a quadratic irrational. Specifically we show that \\[\\sum_{n\\le N} e(\\alpha n^4)\\ll_{\\ep,\\alpha}N^{5/6+\\ep}\\] for any $\\ep>0$ and any quadratic irrational $\\alpha\\in\\R-\\Q$. Classically one would have had the exponent $7/8+\\ep$ for such $\\alpha$. In contrast to the author's earlier work \\cite{cubweyl} on cubic Weyl sums (which was conditional on the $abc$-conjecture), we show that the van der Corput $AB$-steps are sufficient for the quartic case, rather than the $BAAB$-process needed for the cubic sum.", "label": 0, "field": "math"} {"text": "Title: Assistive Tele-op: Leveraging Transformers to Collect Robotic Task Demonstrations\nAbstract: Sharing autonomy between robots and human operators could facilitate data collection of robotic task demonstrations to continuously improve learned models. Yet, the means to communicate intent and reason about the future are disparate between humans and robots. We present Assistive Tele-op, a virtual reality (VR) system for collecting robot task demonstrations that displays an autonomous trajectory forecast to communicate the robot's intent. As the robot moves, the user can switch between autonomous and manual control when desired. This allows users to collect task demonstrations with both a high success rate and with greater ease than manual teleoperation systems. Our system is powered by transformers, which can provide a window of potential states and actions far into the future -- with almost no added computation time. A key insight is that human intent can be injected at any location within the transformer sequence if the user decides that the model-predicted actions are inappropriate. At every time step, the user can (1) do nothing and allow autonomous operation to continue while observing the robot's future plan sequence, or (2) take over and momentarily prescribe a different set of actions to nudge the model back on track. We host the videos and other supplementary material at https://sites.google.com/view/assistive-teleop.", "label": 1, "field": "cs"} {"text": "Title: Topological generation and matrix models for quantum reflection groups\nAbstract: We establish several new topological generation results for the quantum permutation groups $S^+_N$ and the quantum reflection groups $H^{s+}_N$. We use these results to show that these quantum groups admit sufficiently many \"matrix models\". In particular, all of these quantum groups have residually finite discrete duals (and are, in particular, hyperlinear), and certain \"flat\" matrix models for $S_N^+$ are inner faithful.", "label": 1, "field": "math"} {"text": "Title: The abstract cotangent complex and Quillen cohomology of enriched categories\nAbstract: In his fundamental work, Quillen developed the theory of the cotangent complex as a universal abelian derived invariant, and used it to define and study a canonical form of cohomology, encompassing many known cohomology theories. Additional cohomology theories, such as generalized cohomology of spaces and topological Andr\\'e-Quillen cohomology, can be accommodated by considering a spectral version of the cotangent complex. Recent work of Lurie established a comprehensive $\\infty$-categorical analogue of the cotangent complex formalism using stabilization of $\\infty$-categories. In this paper we study the spectral cotangent complex while working in Quillen's model categorical setting. Our main result gives new and explicit computations of the cotangent complex and Quillen cohomology of enriched categories. For this we make essential use of previous work, which identifies the tangent categories of operadic algebras in unstable model categories. In particular, we present the cotangent complex of an $\\infty$-category as a spectrum valued functor on its twisted arrow category, and consider the associated obstruction theory in some examples of interest.", "label": 1, "field": "math"} {"text": "Title: From Language to Programs: Bridging Reinforcement Learning and Maximum Marginal Likelihood\nAbstract: Our goal is to learn a semantic parser that maps natural language utterances into executable programs when only indirect supervision is available: examples are labeled with the correct execution result, but not the program itself. Consequently, we must search the space of programs for those that output the correct result, while not being misled by spurious programs: incorrect programs that coincidentally output the correct result. We connect two common learning paradigms, reinforcement learning (RL) and maximum marginal likelihood (MML), and then present a new learning algorithm that combines the strengths of both. The new algorithm guards against spurious programs by combining the systematic search traditionally employed in MML with the randomized exploration of RL, and by updating parameters such that probability is spread more evenly across consistent programs. We apply our learning algorithm to a new neural semantic parser and show significant gains over existing state-of-the-art results on a recent context-dependent semantic parsing task.", "label": 1, "field": "cs"} {"text": "Title: On irrationality measure of Thue-Morse constant\nAbstract: We provide a non-trivial measure of irrationality for a class of Mahler numbers defined with infinite products which cover the Thue-Morse constant.", "label": 1, "field": "math"} {"text": "Title: Subdifferentials of convex matrix-valued functions\nAbstract: Subdifferentials (in the sense of convex analysis) of matrix-valued functions defined on $\\mathbb{R}^d$ that are convex with respect to the L\\\"{o}wner partial order can have a complicated structure and might be very difficult to compute even in simple cases. The aim of this paper is to study subdifferential calculus for such functions and properties of their subdifferentials. We show that many standard results from convex analysis no longer hold true in the matrix-valued case. For example, in this case the subdifferential of the sum is not equal to the sum of subdifferentials, the Clarke subdifferential is not equal to the subdifferential in the sense of convex analysis, etc. Nonetheless, it is possible to provide simple rules for computing nonempty subsets of subdifferentials (in particular, individual subgradients) of convex matrix-valued functions in the general case and to completely describe subdifferentials of such functions defined on the real line. As a by-product of our analysis, we derive some interesting properties of convex matrix-valued functions, e.g. we show that if such function is nonsmooth, then its diagonal elements must be nonsmooth as well.", "label": 0, "field": "math"} {"text": "Title: Logic of temporal attribute implications\nAbstract: We study logic for reasoning with if-then formulas describing dependencies between attributes of objects which are observed in consecutive points in time. We introduce semantic entailment of the formulas, show its fixed-point characterization, investigate closure properties of model classes, present an axiomatization and prove its completeness, and investigate alternative axiomatizations and normalized proofs. We investigate decidability and complexity issues of the logic and prove that the entailment problem is NP-hard and belongs to EXPSPACE. We show that by restricting to predictive formulas, the entailment problem is decidable in pseudo-linear time.", "label": 1, "field": "cs"} {"text": "Title: The tensor product in the theory of Frobenius manifolds\nAbstract: We introduce the operation of forming the tensor product in the theory of analytic Frobenius manifolds. Building on the results for formal Frobenius manifolds which we extend to the additional structures of Euler fields and flat identities, we prove that the tensor product of pointed germs of Frobenius manifolds exists. Furthermore, we define the notion of a tensor product diagram of Frobenius manifolds with factorizable flat identity and prove the existence such a diagram and hence a tensor product Frobenius manifold. These diagrams and manifolds are unique up to equivalence. Finally, we derive the special initial conditions for a tensor product of semi--simple Frobenius manifolds in terms of the special initial conditions of the factors.", "label": 1, "field": "math"} {"text": "Title: Fast & Fair: Efficient Second-Order Robust Optimization for Fairness in Machine Learning\nAbstract: This project explores adversarial training techniques to develop fairer Deep Neural Networks (DNNs) to mitigate the inherent bias they are known to exhibit. DNNs are susceptible to inheriting bias with respect to sensitive attributes such as race and gender, which can lead to life-altering outcomes (e.g., demographic bias in facial recognition software used to arrest a suspect). We propose a robust optimization problem, which we demonstrate can improve fairness in several datasets, both synthetic and real-world, using an affine linear model. Leveraging second order information, we are able to find a solution to our optimization problem more efficiently than a purely first order method.", "label": 0, "field": "cs"} {"text": "Title: Estimation of statistics of transitions and Hill relation for Langevin dynamics\nAbstract: In molecular dynamics, statistics of transitions, such as the mean transition time, are macroscopic observables which provide important dynamical information on the underlying microscopic stochastic process. A direct estimation using simulations of microscopic trajectories over long time scales is typically computationally intractable in metastable situations. To overcome this issue, several numerical methods rely on a potential-theoretic identity, sometimes attributed to Hill in the computational statistical physics litterature, which expresses statistics of transitions in terms of the invariant measure of the sequence of configurations by which the underlying process enters metastable sets. The use of this identity then allows to replace the long time simulation problem with a rare event sampling problem, for which efficient algorithms are available. In this article, we rigorously analyse such a method for molecular systems modelled by the Langevin dynamics. Our main contributions are twofold. First, we prove the Hill relation in the fairly general context of positive Harris recurrent chains, and show that this formula applies to the Langevin dynamics. Second, we provide an explicit expression of the invariant measure involved in the Hill relation, and describe an elementary exact simulation procedure. Overall, this yields a simple and complete numerical method to estimate statistics of transitions.", "label": 1, "field": "math"} {"text": "Title: Linearly shellable complexes\nAbstract: We introduce the class of linearly shellable pure simplicial complexes. The characterizing property is the existence of a labeling of their vertices such that all linear extensions of the Bruhat order on the set of facets are shelling orders. Coxeter complexes of weak intervals in Coxeter groups of finite rank are proved to be linearly shellable. We also introduce the notion of linear strong shellability.", "label": 0, "field": "math"} {"text": "Title: Lookahead: An Inference Acceleration Framework for Large Language Model with Lossless Generation Accuracy\nAbstract: As Large Language Models (LLMs) have made significant advancements across various tasks, such as question answering, translation, text summarization, and dialogue systems, the need for accuracy in information becomes crucial, especially for serious financial products serving billions of users like Alipay. To address this, Alipay has developed a Retrieval-Augmented Generation (RAG) system that grounds LLMs on the most accurate and up-to-date information. However, for a real-world product serving millions of users, the inference speed of LLMs becomes a critical factor compared to a mere experimental model. Hence, this paper presents a generic framework for accelerating the inference process, resulting in a substantial increase in speed and cost reduction for our RAG system, with lossless generation accuracy. In the traditional inference process, each token is generated sequentially by the LLM, leading to a time consumption proportional to the number of generated tokens. To enhance this process, our framework, named \\textit{lookahead}, introduces a \\textit{multi-branch} strategy. Instead of generating a single token at a time, we propose a \\textit{Trie-based Retrieval} (TR) process that enables the generation of multiple branches simultaneously, each of which is a sequence of tokens. Subsequently, for each branch, a \\textit{Verification and Accept} (VA) process is performed to identify the longest correct sub-sequence as the final output. Our strategy offers two distinct advantages: (1) it guarantees absolute correctness of the output, avoiding any approximation algorithms, and (2) the worst-case performance of our approach is equivalent to the conventional process. We conduct extensive experiments to demonstrate the significant improvements achieved by applying our inference acceleration framework. Code is avaliable: https://github.com/alipay/PainlessInferenceAcceleration.", "label": 0, "field": "cs"} {"text": "Title: Phase field modelling of fracture and fatigue in Shape Memory Alloys\nAbstract: We present a new phase field framework for modelling fracture and fatigue in Shape Memory Alloys (SMAs). The constitutive model captures the superelastic behaviour of SMAs and damage is driven by the elastic and transformation strain energy densities. We consider both the assumption of a constant fracture energy and the case of a fracture energy dependent on the martensitic volume fraction. The framework is implemented in an implicit time integration scheme, with both monolithic and staggered solution strategies. The potential of this formulation is showcased by modelling a number of paradigmatic problems. First, a boundary layer model is used to examine crack tip fields and compute crack growth resistance curves (R-curves). We show that the model is able to capture the main fracture features associated with SMAs, including the toughening effect associated with stress-induced phase transformation. Insight is gained into the role of temperature, material strength, crack density function and fracture energy homogenisation. Secondly, several 2D and 3D boundary value problems are addressed, demonstrating the capabilities of the model in capturing complex cracking phenomena in SMAs, such as unstable crack growth, mixed-mode fracture or the interaction between several cracks. Finally, the model is extended to fatigue and used to capture crack nucleation and propagation in biomedical stents, a paradigmatic application of nitinol SMAs.", "label": 1, "field": "cs"} {"text": "Title: Mitigating Face Recognition Bias via Group Adaptive Classifier\nAbstract: Face recognition is known to exhibit bias - subjects in a certain demographic group can be better recognized than other groups. This work aims to learn a fair face representation, where faces of every group could be more equally represented. Our proposed group adaptive classifier mitigates bias by using adaptive convolution kernels and attention mechanisms on faces based on their demographic attributes. The adaptive module comprises kernel masks and channel-wise attention maps for each demographic group so as to activate different facial regions for identification, leading to more discriminative features pertinent to their demographics. Our introduced automated adaptation strategy determines whether to apply adaptation to a certain layer by iteratively computing the dissimilarity among demographic-adaptive parameters. A new de-biasing loss function is proposed to mitigate the gap of average intra-class distance between demographic groups. Experiments on face benchmarks (RFW, LFW, IJB-A, and IJB-C) show that our work is able to mitigate face recognition bias across demographic groups while maintaining the competitive accuracy.", "label": 1, "field": "cs"} {"text": "Title: Dispersive decay of small data solutions for the KdV equation\nAbstract: We consider the Korteweg-de Vries (KdV) equation, and prove that small localized data yields solutions which have dispersive decay on a quartic time-scale. This result is optimal, in view of the emergence of solitons at quartic time, as predicted by inverse scattering theory.", "label": 1, "field": "math"} {"text": "Title: A Tiny CNN Architecture for Medical Face Mask Detection for Resource-Constrained Endpoints\nAbstract: The world is going through one of the most dangerous pandemics of all time with the rapid spread of the novel coronavirus (COVID-19). According to the World Health Organisation, the most effective way to thwart the transmission of coronavirus is to wear medical face masks. Monitoring the use of face masks in public places has been a challenge because manual monitoring could be unsafe. This paper proposes an architecture for detecting medical face masks for deployment on resource-constrained endpoints having extremely low memory footprints. A small development board with an ARM Cortex-M7 microcontroller clocked at 480 Mhz and having just 496 KB of framebuffer RAM, has been used for the deployment of the model. Using the TensorFlow Lite framework, the model is quantized to further reduce its size. The proposed model is 138 KB post quantization and runs at the inference speed of 30 FPS.", "label": 1, "field": "cs"} {"text": "Title: A Stochastic Alternating Direction Method of Multipliers for Non-smooth and Non-convex Optimization\nAbstract: Alternating direction method of multipliers (ADMM) is a popular first-order method owing to its simplicity and efficiency. However, similar to other proximal splitting methods, the performance of ADMM degrades significantly when the scale of the optimization problems to solve becomes large. In this paper, we consider combining ADMM with a class of stochastic gradient with variance reduction for solving large-scale non-convex and non-smooth optimization problems. Global convergence of the generated sequence is established under the extra additional assumption that the object function satisfies Kurdyka-Lojasiewicz (KL) property. Numerical experiments on graph-guided fused Lasso and computed tomography are presented to demonstrate the performance of the proposed methods.", "label": 1, "field": "math"} {"text": "Title: The continuum limit of higher-order Follow-the-Leader models\nAbstract: We study a generalized Follow-the-Leader model where the driver considers the position of an arbitrary but finite number of vehicles ahead, as well as the position of the vehicle directly behind the driver. It is proved that this model converges to the classical Lighthill-Whitham-Richards model for traffic flow when traffic becomes dense. This also underscores the robustness of the Lighthill-Whitham-Richards model.", "label": 0, "field": "math"} {"text": "Title: Semifinite harmonic functions on branching graphs\nAbstract: We study semifinite harmonic functions on arbitrary branching graphs. We give a detailed exposition of an algebraic method which allows one to classify semifinite indecomposable harmonic functions on some multiplicative branching graphs. This method was proposed by A. Wassermann in terms of operator algebras, while we rephrase, clarify, and simplify the main arguments, working only with combinatorial objects. This work was inspired by the theory of traceable factor representations of the infinite symmetric group $S(\\infty)$.", "label": 1, "field": "math"} {"text": "Title: Cofinal elements and fractional Dehn twist coefficients\nAbstract: We show that for a surface $S$ with positive genus and one boundary component, the mapping class of a Dehn twist along a curve parallel to the boundary is cofinal in every left ordering of the mapping class group $\\operatorname{Mod}(S)$. We apply this result to show that one of the usual definitions of the fractional Dehn twist coefficient -- via translation numbers of a particular action of $\\operatorname{Mod}(S)$ on $\\mathbb{R}$ -- is in fact independent of the underlying action when $S$ has genus larger than one. As an algebraic counterpart to this, we provide a formula that recovers the fractional Dehn twist coefficient of a homeomorphism of $S$ from an arbitrary left ordering of $\\operatorname{Mod}(S)$.", "label": 1, "field": "math"} {"text": "Title: Discovery of Causal Additive Models in the Presence of Unobserved Variables\nAbstract: Causal discovery from data affected by unobserved variables is an important but difficult problem to solve. The effects that unobserved variables have on the relationships between observed variables are more complex in nonlinear cases than in linear cases. In this study, we focus on causal additive models in the presence of unobserved variables. Causal additive models exhibit structural equations that are additive in the variables and error terms. We take into account the presence of not only unobserved common causes but also unobserved intermediate variables. Our theoretical results show that, when the causal relationships are nonlinear and there are unobserved variables, it is not possible to identify all the causal relationships between observed variables through regression and independence tests. However, our theoretical results also show that it is possible to avoid incorrect inferences. We propose a method to identify all the causal relationships that are theoretically possible to identify without being biased by unobserved variables. The empirical results using artificial data and simulated functional magnetic resonance imaging (fMRI) data show that our method effectively infers causal structures in the presence of unobserved variables.", "label": 1, "field": "cs"} {"text": "Title: Mapping and Validating a Point Neuron Model on Intel's Neuromorphic Hardware Loihi\nAbstract: Neuromorphic hardware is based on emulating the natural biological structure of the brain. Since its computational model is similar to standard neural models, it could serve as a computational acceleration for research projects in the field of neuroscience and artificial intelligence, including biomedical applications. However, in order to exploit this new generation of computer chips, rigorous simulation and consequent validation of brain-based experimental data is imperative. In this work, we investigate the potential of Intel's fifth generation neuromorphic chip - `Loihi', which is based on the novel idea of Spiking Neural Networks (SNNs) emulating the neurons in the brain. The work is implemented in context of simulating the Leaky Integrate and Fire (LIF) models based on the mouse primary visual cortex matched to a rich data set of anatomical, physiological and behavioral constraints. Simulations on the classical hardware serve as the validation platform for the neuromorphic implementation. We find that Loihi replicates classical simulations very efficiently and scales notably well in terms of both time and energy performance as the networks get larger.", "label": 1, "field": "cs"} {"text": "Title: LLM4TS: Aligning Pre-Trained LLMs as Data-Efficient Time-Series Forecasters\nAbstract: Multivariate time-series forecasting is vital in various domains, e.g., economic planning and weather prediction. Deep train-from-scratch models have exhibited effective performance yet require large amounts of data, which limits real-world applicability. Recently, researchers have explored pre-trained Large Language Models (LLMs) for limited non-linguistic datasets. However, incorporating LLMs with time-series data presents challenges of limited adaptation due to different compositions between time-series and linguistic data, and the inability to process multi-scale temporal information. To tackle these challenges, we propose LLM4TS, a framework for time-series forecasting with pre-trained LLMs. LLM4TS consists of a two-stage fine-tuning strategy: the time-series alignment stage to align LLMs with the nuances of time-series data, and the forecasting fine-tuning stage, which is specifically designed for time-series forecasting tasks. Furthermore, our framework features a novel two-level aggregation method that integrates multi-scale temporal data within pre-trained LLMs, enhancing their ability to interpret time-specific information. In experiments across 7 time-series forecasting datasets, LLM4TS is superior to existing state-of-the-art methods, including those trained from scratch, in full-shot scenarios, and also achieves an average improvement of 6.84% in MSE in few-shot scenarios. In addition, evaluations compared with different self-supervised learning approaches highlight LLM4TS's effectiveness with representation learning in forecasting scenarios.", "label": 0, "field": "cs"} {"text": "Title: On groups with BFC-covered word values\nAbstract: For a group G and a positive integer n write B_n(G) = {x \\in G : |x^G | \\le n}. If s is a positive integer and w is a group word, say that G satisfies the (n,s)-covering condition with respect to the word w if there exists a subset S of G such that |S| \\le s and all w-values of G are contained in B_n(G)S. In a natural way, this condition emerged in the study of probabilistically nilpotent groups of class two. In this paper we obtain the following results. Let w be a multilinear commutator word on k variables and let G be a group satisfying the (n,s)-covering condition with respect to the word w. Then G has a soluble subgroup T such that the index [G : T] and the derived length of T are both (k,n,s)-bounded. Let G be a group satisfying the (n,s)-covering condition with respect to the word \\gamma_k. Then (1) \\gamma_{2k-1}(G) has a subgroup $T$ such that the index [\\gamma_{2k-1}(G) : T] and |T'| are both (k,n,s)-bounded; and (2) G has a nilpotent subgroup U such that the index [G : U] and the nilpotency class of U are both (k,n,s)-bounded.", "label": 0, "field": "math"} {"text": "Title: Two improvements in Brauer's theorem on forms\nAbstract: Let $k$ be a Brauer field, that is, a field over which every diagonal form in sufficiently many variables has a nonzero solution; for instance, $k$ could be an imaginary quadratic number field. Brauer proved that if $f_1, \\ldots, f_r$ are homogeneous polynomials on a $k$-vector space $V$ of degrees $d_1, \\ldots, d_r$, then the variety $Z$ defined by the $f_i$'s has a non-trivial $k$-point, provided that $\\dim{V}$ is sufficiently large compared to the $d_i$'s and $k$. We offer two improvements to this theorem, assuming $k$ is infinite. First, we show that the Zariski closure of the set $Z(k)$ of $k$-points has codimension $0$, the Euler totient function $\\phi(n)$ and sum of divisors function $\\sigma(n)$ are jointly asymptotically equidistributed among the reduced residue classes to moduli $q$ coprime to $6$ varying uniformly up to $(\\log x)^{(1-\\epsilon)\\alpha(q)}$, where $\\alpha(q) = \\prod_{\\ell \\mid q} (\\ell-3)/(\\ell-1)$; furthermore, the coprimality restriction is necessary and the range of $q$ is essentially optimal.", "label": 0, "field": "math"} {"text": "Title: Stationary solutions and large time asymptotics to a cross-diffusion-Cahn-Hilliard system\nAbstract: We study some properties of a multi-species degenerate Ginzburg-Landau energy and its relation to a cross-diffusion Cahn-Hilliard system. The model is motivated by multicomponent mixtures where crossdiffusion effects between the different species are taken into account, and where only one species does separate from the others. Using a comparison argument, we obtain strict bounds on the minimizers from which we can derive first-order optimality conditions, revealing a link with the single-species energy, and providing enough regularity to qualify the minimizers as stationary solutions of the evolution system. We also discuss convexity properties of the energy as well as long time asymptotics of the time-dependent problem. Lastly, we introduce a structure-preserving finite volume scheme for the time-dependent problem and present several numerical experiments in one and two spatial dimensions.", "label": 0, "field": "math"} {"text": "Title: A Dataset for Statutory Reasoning in Tax Law Entailment and Question Answering\nAbstract: Legislation can be viewed as a body of prescriptive rules expressed in natural language. The application of legislation to facts of a case we refer to as statutory reasoning, where those facts are also expressed in natural language. Computational statutory reasoning is distinct from most existing work in machine reading, in that much of the information needed for deciding a case is declared exactly once (a law), while the information needed in much of machine reading tends to be learned through distributional language statistics. To investigate the performance of natural language understanding approaches on statutory reasoning, we introduce a dataset, together with a legal-domain text corpus. Straightforward application of machine reading models exhibits low out-of-the-box performance on our questions, whether or not they have been fine-tuned to the legal domain. We contrast this with a hand-constructed Prolog-based system, designed to fully solve the task. These experiments support a discussion of the challenges facing statutory reasoning moving forward, which we argue is an interesting real-world task that can motivate the development of models able to utilize prescriptive rules specified in natural language.", "label": 1, "field": "cs"} {"text": "Title: Littlewood's problem for sets with multidimensional structure\nAbstract: We give $L^1$-norm estimates for exponential sums of a finite sets $A$ consisting of integers or lattice points. Under the assumption that $A$ possesses sufficient multidimensional structure, our estimates are stronger than those of McGehee-Pigno-Smith and Konyagin. These theorems improve upon past work of Petridis.", "label": 1, "field": "math"} {"text": "Title: A Note on Minimax Robustness of Designs Against Correlated or Heteroscedastic Responses\nAbstract: We present a result according to which certain functions of covariance matrices are maximized at scalar multiples of the identity matrix. This is used to show that experimental designs that are optimal under an assumption of independent, homoscedastic responses can be minimax robust, in broad classes of alternate covariance structures. In particular it can justify the common practice of disregarding possible dependence, or heteroscedasticity, at the design stage of an experiment.", "label": 0, "field": "math"} {"text": "Title: Near-optimal constructions of constant weight codes and constant composition codes asymptotically attaining the Johnson bound: the odd distances\nAbstract: Constant weight codes (CWCs) and constant composition codes (CCCs) are two important classes of codes that have been studied extensively in both combinatorics and coding theory for nearly sixty years. In this paper we show that for {\\it all} fixed odd distances, there exist near-optimal CWCs and CCCs asymptotically achieving the classic Johnson-type upper bounds. Let $A_q(n,w,d)$ denote the maximum size of $q$-ary CWCs of length $n$ with constant weight $w$ and minimum distance $d$. One of our main results shows that for {\\it all} fixed $q,w$ and odd $d$, one has $\\lim_{n\\rightarrow\\infty}\\frac{A_q(n,d,w)}{\\binom{n}{t}}=\\frac{(q-1)^t}{\\binom{w}{t}}$, where $t=\\frac{2w-d+1}{2}$. This implies the existence of near-optimal generalized Steiner systems originally introduced by Etzion, and can be viewed as a counterpart of a celebrated result of R\\\"odl on the existence of near-optimal Steiner systems. Note that prior to our work, very little is known about $A_q(n,w,d)$ for $q\\ge 3$. A similar result is proved for the maximum size of CCCs. We provide different proofs for our two main results, based on two strengthenings of the well-known Frankl-R\\\"odl-Pippenger theorem on the existence of near-optimal matchings in hypergraphs: the first proof follows by Kahn's linear programming variation of the above theorem, and the second follows by the recent independent work of Delcour-Postle, and Glock-Joos-Kim-K\\\"uhn-Lichev on the existence of near-optimal matchings avoiding certain forbidden configurations. We also present several intriguing open questions for future research.", "label": 0, "field": "math"} {"text": "Title: View-based Explanations for Graph Neural Networks\nAbstract: Generating explanations for graph neural networks (GNNs) has been studied to understand their behavior in analytical tasks such as graph classification. Existing approaches aim to understand the overall results of GNNs rather than providing explanations for specific class labels of interest, and may return explanation structures that are hard to access, nor directly queryable. We propose GVEX, a novel paradigm that generates Graph Views for EXplanation. (1) We design a two-tier explanation structure called explanation views. An explanation view consists of a set of graph patterns and a set of induced explanation subgraphs. Given a database G of multiple graphs and a specific class label l assigned by a GNN-based classifier M, it concisely describes the fraction of G that best explains why l is assigned by M. (2) We propose quality measures and formulate an optimization problem to compute optimal explanation views for GNN explanation. We show that the problem is $\\Sigma^2_P$-hard. (3) We present two algorithms. The first one follows an explain-and-summarize strategy that first generates high-quality explanation subgraphs which best explain GNNs in terms of feature influence maximization, and then performs a summarization step to generate patterns. We show that this strategy provides an approximation ratio of 1/2. Our second algorithm performs a single-pass to an input node stream in batches to incrementally maintain explanation views, having an anytime quality guarantee of 1/4 approximation. Using real-world benchmark data, we experimentally demonstrate the effectiveness, efficiency, and scalability of GVEX. Through case studies, we showcase the practical applications of GVEX.", "label": 0, "field": "cs"} {"text": "Title: A reciprocity relation for the twisted second moment of the Riemman Zeta function\nAbstract: We prove a reciprocity relation for the twisted second moment of the Riemann Zeta function. This provides an analogue to a formula of Conrey for Dirichlet L-functions", "label": 0, "field": "math"} {"text": "Title: Some remarks on Grothendieck pairs\nAbstract: We revisit the paper of Alexander Grothendiek where he introduced Grothendieck pairs and discuss the relation between profinite rigidity and left/right Grothendieck rigidity. We also show that various groups are left and/or right Grothendieck rigid and, in particular, all ascending HNN extensiona of finitely generated free groups are right Grothendieck rigid. Along the way we present a number of questions and suggestions for further research.", "label": 0, "field": "math"} {"text": "Title: The novel Tauberian conditions associated with the $(\\overline{N},p,q)$ summability of double sequences\nAbstract: In this paper, our primary objective is to provide a fresh perspective on the relationship between the $(\\overline{N},p,q)$ method, which is a product of relevant one-dimensional summability methods, and $P$-convergence for double sequences. To accomplish this objective, we establish certain Tauberian conditions that control the behavior of a double sequence in terms of both $O_L$-oscillation and $O$-oscillation in certain senses, building a bridge between $(\\overline{N},p,q)$ summability and $P$-convergence, while imposing certain restrictions on the weight sequences. As special circumstances of our findings, we demonstrate that Landau-type $O_L$ condition with respect to $(P_m)$ and $(Q_n),$ as well as Hardy-type $O$ condition with respect to $(P_m)$ and $(Q_n),$ serve as Tauberian conditions for $(\\overline{N},p,q)$ summability under particular additional conditions. Consequently, these results encompass all classical Tauberian theorems, including conditions such as slow decrease or slow oscillation in certain senses.", "label": 0, "field": "math"} {"text": "Title: Analytic problems for elliptic curves\nAbstract: We consider some problems of analytic number theory for elliptic curves which can be considered as analogues of classical questions around the distribution of primes in arithmetic progressions to large moduli, and of the question of twin primes. This leads to some local results on the distribution of the group structures of elliptic curves defined over a prime finite field, exhibiting an interesting dichotomy for the occurence of the possible groups. (Note : This paper was initially written in 2000/01, but after a four year wait for a referee report, it is now withdrawn and deposited in the arXiv).", "label": 1, "field": "math"} {"text": "Title: More on homotopy continuation method and discounted zero-sum stochastic game with ARAT structure\nAbstract: In this paper, we introduce a homotopy function to trace the trajectory by applying modified homotopy continuation method for finding the solution of two-person zero-sum discounted stochastic ARAT game. We show that the algorithm has the higher order of convergence. For the proposed algorithm, the homotopy path approaching the solution is smooth and bounded. Two numerical examples are illustrated to show the effectiveness of the proposed algorithm.", "label": 1, "field": "math"} {"text": "Title: Dynamical processes on metric networks\nAbstract: The structure of a network has a major effect on dynamical processes on that network. Many studies of the interplay between network structure and dynamics have focused on models of phenomena such as disease spread, opinion formation and changes, coupled oscillators, and random walks. In parallel to these developments, there have been many studies of wave propagation and other spatially extended processes on networks. These latter studies consider metric networks, in which the edges are associated with real intervals. Metric networks give a mathematical framework to describe dynamical processes that include both temporal and spatial evolution of some quantity of interest -- such as the concentration of a diffusing substance or the amplitude of a wave -- by using edge-specific intervals that quantify distance information between nodes. Dynamical processes on metric networks often take the form of partial differential equations (PDEs). In this paper, we present a collection of techniques and paradigmatic linear PDEs that are useful to investigate the interplay between structure and dynamics in metric networks. We start by considering a time-independent Schr\\\"odinger equation. We then use both finite-difference and spectral approaches to study the Poisson, heat, and wave equations as paradigmatic examples of elliptic, parabolic, and hyperbolic PDE problems on metric networks. Our spectral approach is able to account for degenerate eigenmodes. In our numerical experiments, we consider metric networks with up to about $10^4$ nodes and about $10^4$ edges. A key contribution of our paper is to increase the accessibility of studying PDEs on metric networks. Software that implements our numerical approaches is available at https://gitlab.com/ComputationalScience/metric-networks.", "label": 0, "field": "math"} {"text": "Title: MedSumm: A Multimodal Approach to Summarizing Code-Mixed Hindi-English Clinical Queries\nAbstract: In the healthcare domain, summarizing medical questions posed by patients is critical for improving doctor-patient interactions and medical decision-making. Although medical data has grown in complexity and quantity, the current body of research in this domain has primarily concentrated on text-based methods, overlooking the integration of visual cues. Also prior works in the area of medical question summarisation have been limited to the English language. This work introduces the task of multimodal medical question summarization for codemixed input in a low-resource setting. To address this gap, we introduce the Multimodal Medical Codemixed Question Summarization MMCQS dataset, which combines Hindi-English codemixed medical queries with visual aids. This integration enriches the representation of a patient's medical condition, providing a more comprehensive perspective. We also propose a framework named MedSumm that leverages the power of LLMs and VLMs for this task. By utilizing our MMCQS dataset, we demonstrate the value of integrating visual information from images to improve the creation of medically detailed summaries. This multimodal strategy not only improves healthcare decision-making but also promotes a deeper comprehension of patient queries, paving the way for future exploration in personalized and responsive medical care. Our dataset, code, and pre-trained models will be made publicly available.", "label": 0, "field": "cs"} {"text": "Title: Pointwise estimates for rough operators with applications to Sobolev inequalities\nAbstract: We investigate Sobolev inequalities for several rough operators. We prove that several operators satisfy a pointwise bound by the Riesz potential applied to the gradient. From this inequality, we derive several new Sobolev-type inequalities with an operator on the left-hand side.", "label": 0, "field": "math"} {"text": "Title: On the completeness of root function system of the $2\\times 2$ Dirac operators with non-regular boundary conditions\nAbstract: The paper is concerned with the completeness property of root functions of the $2\\times 2$ Dirac operator with summable complex-valued potential and non-regular boundary conditions. Sufficient conditions for the completeness of the root function system of the operator under consideration are established.", "label": 0, "field": "math"} {"text": "Title: Rigid Components of Random Graphs\nAbstract: The planar rigidity problem asks, given a set of m pairwise distances among a set P of n unknown points, whether it is possible to reconstruct P, up to a finite set of possibilities (modulo rigid motions of the plane). The celebrated Maxwell-Laman Theorem from Rigidity Theory says that, generically, the rigidity problem has a combinatorial answer: the underlying combinatorial structure must contain a spanning minimally-rigid graph (Laman graph). In the case where the system is not rigid, its inclusion-wise maximal rigid substructures (rigid components) are also combinatorially characterized via the Maxwell-Laman theorem, and may be found efficiently. Physicists have used planar combinatorial rigidity has been used to study the phase transition between liquid and solid in network glasses. The approach has been to generate a graph via a stochastic process and then experimentally analyze its rigidity properties. Of particular interest is the size of the largest rigid components. In this paper, we study the emergence of rigid components in an Erdos-Renyi random graph G(n,p), using the parameterization p=c/n for a fixed constant c>0. Our first result is that for all c>0, almost surely all rigid components have size 2, 3 or Omega(n). We also show that for c>4, almost surely the largest rigid components have size at least n/10. While the G(n,p) model is simpler than those appearing in the physics literature, these results are the first of this type where the distribution is over all graphs on n vertices and the expected number of edges is O(n).", "label": 1, "field": "math"} {"text": "Title: Iyama-Solberg correspondence for exact dg categories\nAbstract: We generalize the notions of $d$-cluster tilting pair and $d$-Auslander exact dg category to $d$-precluster tilting triple and $d$-minimal Auslander--Gorenstein exact dg category. We give a bijection between equivalence classes of $d$-precluster tilting triples and equivalence classes of $d$-minimal Auslander--Gorenstein exact dg categories. Our bijection generalizes Iyama--Solberg correspondence for module categories.", "label": 0, "field": "math"} {"text": "Title: Team Semantics and Independence Notions in Quantum Physics\nAbstract: We study dependence and independence concepts found in quantum physics, especially those related to hidden variables and non-locality, through the lens of team semantics and probabilistic team semantics, adapting a relational framework introduced by the first author in a prior paper. This leads to new developments also in independence logic and probabilistic independence logic.", "label": 1, "field": "math"} {"text": "Title: Universal height and width bounds for random trees\nAbstract: We prove non-asymptotic stretched exponential tail bounds on the height of a randomly sampled node in a random combinatorial tree, which we use to prove bounds on the heights and widths of random trees from a variety of models. Our results allow us to prove a conjecture and settle an open problem of Janson (https://doi.org/10.1214/11-PS188), and nearly prove another conjecture and settle another open problem from the same work (up to a polylogarithmic factor). The key tool for our work is an equivalence in law between the degrees along the path to a random node in a random tree with given degree statistics, and a random truncation of a size-biased ordering of the degrees of such a tree. We also exploit a Poissonization trick introduced by Camarri and Pitman (https://doi.org/10.1214/EJP.v5-58) in the context of inhomogeneous continuum random trees, which we adapt to the setting of random trees with fixed degrees. Finally, we propose and justify a change to the conventions of branching process nomenclature: the name \"Galton-Watson trees\" should be permanently retired by the community, and replaced with the name \"Bienaym\\'e trees\".", "label": 1, "field": "math"} {"text": "Title: Rough metrics on manifolds and quadratic estimates\nAbstract: We study the persistence of quadratic estimates related to the Kato square root problem across a change of metric on smooth manifolds by defining a class of Riemannian-like metrics that are permitted to be of low regularity and degenerate on sets of measure zero. We also demonstrate how to transmit quadratic estimates between manifolds which are homeomorphic and locally bi-Lipschitz. As a consequence, we demonstrate the invariance of the Kato square root problem under Lipschitz transformations of the space and obtain solutions to this problem on functions and forms on compact manifolds with a continuous metric. Furthermore, we show that a lower bound on the injectivity radius is not a necessary condition to solve the Kato square root problem.", "label": 1, "field": "math"} {"text": "Title: On Einstein Lorentzian nilpotent Lie groups\nAbstract: In this paper, we study Lorentzian left invariant Einstein metrics on nilpotent Lie groups. We show that if the center of such Lie groups is degenerate then they are Ricci-flat and their Lie algebras can be obtained by the double extension process from an abelian Euclidean Lie algebra. We show that all nilpotent Lie groups up to dimension $5$ endowed with a Lorentzian Einstein left invariant metric have degenerate center and we use this fact to give a complete classification of these metrics. We show that if $\\mathfrak{g}$ is the Lie algebra of a nilpotent Lie group endowed with a Lorentzian left invariant Einstein metric with non zero scalar curvature then the center $Z(\\mathfrak{g})$ of $\\mathfrak{g}$ is nondegenerate Euclidean, the derived ideal $[\\mathfrak{g},\\mathfrak{g}]$ is nondegenerate Lorentzian and $Z(\\mathfrak{g})\\subset[\\mathfrak{g},\\mathfrak{g}]$. We give the first examples of Ricci-flat Lorentzian nilpotent Lie algebra with nondegenerate center.", "label": 1, "field": "math"} {"text": "Title: WFTNet: Exploiting Global and Local Periodicity in Long-term Time Series Forecasting\nAbstract: Recent CNN and Transformer-based models tried to utilize frequency and periodicity information for long-term time series forecasting. However, most existing work is based on Fourier transform, which cannot capture fine-grained and local frequency structure. In this paper, we propose a Wavelet-Fourier Transform Network (WFTNet) for long-term time series forecasting. WFTNet utilizes both Fourier and wavelet transforms to extract comprehensive temporal-frequency information from the signal, where Fourier transform captures the global periodic patterns and wavelet transform captures the local ones. Furthermore, we introduce a Periodicity-Weighted Coefficient (PWC) to adaptively balance the importance of global and local frequency patterns. Extensive experiments on various time series datasets show that WFTNet consistently outperforms other state-of-the-art baseline. Code is available at https://github.com/Hank0626/WFTNet.", "label": 0, "field": "cs"} {"text": "Title: On Dyck Path Expansion Formulas for Rank 2 Cluster Variables\nAbstract: In this paper, we simplify and generalize formulas for the expansion of rank 2 cluster variables. In particular, we prove an equivalent, but simpler, description of the colored Dyck subpaths framework introduced by Lee and Schiffler. We then prove the conjectured bijectivity of a map constructed by Feiyang Lin between collections of colored Dyck subpaths and compatible pairs, objects introduced by Lee, Li, and Zelevinsky to study the greedy basis. We use this bijection along with Rupel's expansion formula for quantum greedy basis elements, which sums over compatible pairs, to provide a quantum generalization of Lee and Schiffler's colored Dyck subpaths formula.", "label": 1, "field": "math"} {"text": "Title: Leader Election Problem Versus Pattern Formation Problem\nAbstract: Leader election and arbitrary pattern formation are funda- mental tasks for a set of autonomous mobile robots. The former consists in distinguishing a unique robot, called the leader. The latter aims in arranging the robots in the plane to form any given pattern. The solv- ability of both these tasks turns out to be necessary in order to achieve more complex tasks. In this paper, we study the relationship between these two tasks in a model, called CORDA, wherein the robots are weak in several aspects. In particular, they are fully asynchronous and they have no direct means of communication. They cannot remember any previous observation nor computation performed in any previous step. Such robots are said to be oblivious. The robots are also uniform and anonymous, i.e, they all have the same program using no global parameter (such as an identity) allowing to differentiate any of them. Moreover, we assume that none of them share any kind of common coordinate mechanism or common sense of direction and we discuss the influence of a common handedness (i.e., chirality). In such a system, Flochini et al. proved in [11] that it is possible to elect a leader for n \\geq 3 robots if it is possible to form any pattern for n \\geq 3. In this paper, we show that the converse is true for n \\geq 4 when the robots share a common handedness and for n \\geq 5 when they do not. Thus, we deduce that with chirality (resp. without chirality) both problems are equivalent for n \\geq 4 (resp. n \\geq 5) in CORDA.", "label": 1, "field": "cs"} {"text": "Title: Comparative Analysis of Engagement, Themes, and Causality of Ukraine-Related Debunks and Disinformation\nAbstract: This paper compares quantitatively the spread of Ukraine-related disinformation and its corresponding debunks, first by considering re-tweets, replies, and favourites, which demonstrate that despite platform efforts Ukraine-related disinformation is still spreading wider than its debunks. Next, bidirectional post-hoc analysis is carried out using Granger causality tests, impulse response analysis and forecast error variance decomposition, which demonstrate that the spread of debunks has a positive impact on reducing Ukraine-related disinformation eventually, albeit not instantly. Lastly, the paper investigates the dominant themes in Ukraine-related disinformation and their spatiotemporal distribution. With respect to debunks, we also establish that around 18% of fact-checks are debunking claims which have already been fact-checked in another language. The latter finding highlights an opportunity for better collaboration between fact-checkers, so they can benefit from and amplify each other's debunks through translation, citation, and early publication online.", "label": 1, "field": "cs"} {"text": "Title: Towards dense volumetric pancreas segmentation in CT using 3D fully convolutional networks\nAbstract: Pancreas segmentation in computed tomography imaging has been historically difficult for automated methods because of the large shape and size variations between patients. In this work, we describe a custom-build 3D fully convolutional network (FCN) that can process a 3D image including the whole pancreas and produce an automatic segmentation. We investigate two variations of the 3D FCN architecture; one with concatenation and one with summation skip connections to the decoder part of the network. We evaluate our methods on a dataset from a clinical trial with gastric cancer patients, including 147 contrast enhanced abdominal CT scans acquired in the portal venous phase. Using the summation architecture, we achieve an average Dice score of 89.7 $\\pm$ 3.8 (range [79.8, 94.8]) % in testing, achieving the new state-of-the-art performance in pancreas segmentation on this dataset.", "label": 1, "field": "cs"} {"text": "Title: Deformed Hamiltonian vector fields and Lagrangian fibrations\nAbstract: Certain dissipative physical systems closely resemble Hamiltonian systems in $\\mathbb{R}^{2n}$, but with the canonical equation for one of the variables in each conjugate pair rescaled by a real parameter. To generalise these dynamical systems to symplectic manifolds in this paper we introduce and study the properties of deformed Hamiltonian vector fields on Lagrangian fibrations. We describe why these objects have some interesting applications to symplectic geometry and discuss how their physical interpretation motivates new problems in mathematics.", "label": 1, "field": "math"} {"text": "Title: Homology spheres and property R\nAbstract: We present infinitely many homology spheres which contain two distinct knots whose 0-surgeries are $S^1 \\times S^2$. This resolves a question posed by Kirby and Melvin in 1978.", "label": 1, "field": "math"} {"text": "Title: Constructing Thick $B_h$-sets\nAbstract: A subset $A$ of a commutative semigroup $X$ is called a $B_h$ set in $X$ if the only solutions to $a_1+\\dots+a_h = b_1 + \\cdots +b_h$ (with $a_i,b_i \\in A$) are the trivial solutions $\\{a_1,\\dots,a_h\\} = \\{b_1,\\dots,b_h\\}$ (as multisets). With $h=2$ and $X={\\mathbb Z}$, these sets are also known as Sidon sets, Golomb Rulers, and Babcock sets. In this work, we generalize constructions of Bose-Chowla and Singer and give the resultant bounds on the diameter of a $k$ element $B_h$ set in $\\mathbb Z$ for small $k$. We conclude with a list of open problems.", "label": 0, "field": "math"} {"text": "Title: Dynamic Mode Decomposition of Control-Affine Nonlinear Systems using Discrete Control Liouville Operators\nAbstract: Representation of nonlinear dynamical systems as infinite-dimensional linear operators over Hilbert spaces enables analysis of nonlinear systems via pseudo-spectral operator analysis. In this paper, we provide a novel representation for discrete-time control-affine nonlinear dynamical systems as linear operators acting on a Hilbert space. We also demonstrate that this representation can be used to predict the behavior of the closed-loop system given a known feedback law using recorded snapshots of the system state resulting from arbitrary, potentially open-loop control inputs. We thereby extend the predictive capabilities of dynamic mode decomposition to discrete-time nonlinear systems that are affine in control. We validate the method using two numerical experiments by predicting the response of a controlled Duffing oscillator to a known feedback law, as well as demonstrating the advantage of the developed method relative to existing techniques in the literature.", "label": 0, "field": "math"} {"text": "Title: Scale invariant elliptic operators with singular coefficients\nAbstract: We show that a realization of the operator $L=|x|^\\alpha\\Delta +c|x|^{\\alpha-1}\\frac{x}{|x|}\\cdot\\nabla -b|x|^{\\alpha-2}$ generates a semigroup in $L^p(\\mathbb {R}^N)$ if and only if $D_c=b+(N-2+c)^2/4 > 0$ and $s_1+\\min\\{0,2-\\alpha\\}0$. The main objective of the present paper is 3-fold: firstly, it will be shown that for the special case of the $L$-shape arc $\\gamma_0$ consisting of two line segments of the same length that meet at the angle of $\\pi/2$, the growth rate of the Lebesgue constant $L_{{\\bf {z}}_n^{*}}$ is at least as fast as $O(Log^2(n))$, with $\\lim\\sup \\frac{L_{{\\bf {z}}_n^{*}}}{log^2(n)} = \\infty$; secondly, the corresponding (modified) Marcinkiewicz-Zygmund inequalities fail to hold; and thirdly, a proper adjustment ${\\bf z}_n^{**}:=\\{z_{n,j}^{**}\\}^{n}_{j=0}$ of the Fej\\'er points on $\\gamma$ will be described to assure the growth rate of $L_{{\\bf z}_n^{**}}$ to be exactly $O(Log^2(n))$.", "label": 1, "field": "math"} {"text": "Title: Hamiltonicity of Schrijver graphs and stable Kneser graphs\nAbstract: For integers $k\\geq 1$ and $n\\geq 2k+1$, the Schrijver graph $S(n,k)$ has as vertices all $k$-element subsets of $[n]:=\\{1,2,\\ldots,n\\}$ that contain no two cyclically adjacent elements, and an edge between any two disjoint sets. More generally, for integers $k\\geq 1$, $s\\geq 2$, and $n \\geq sk+1$, the $s$-stable Kneser graph $S(n,k,s)$ has as vertices all $k$-element subsets of $[n]$ in which any two elements are in cyclical distance at least $s$. We prove that all the graphs $S(n,k,s)$, in particular Schrijver graphs $S(n,k)=S(n,k,2)$, admit a Hamilton cycle that can be computed in time $\\mathcal{O}(n)$ per generated vertex.", "label": 0, "field": "math"} {"text": "Title: Matchings in hypercubes extend to long cycles\nAbstract: The $d$-dimensional hypercube graph $Q_d$ has as vertices all subsets of $\\{1,\\ldots,d\\}$, and an edge between any two sets that differ in a single element. The Ruskey-Savage conjecture asserts that every matching of $Q_d$, $d\\ge 2$, can be extended to a Hamilton cycle, i.e., to a cycle that visits every vertex exactly once. We prove that every matching of $Q_d$, $d\\ge 2$, can be extended to a cycle that visits at least a $2/3$-fraction of all vertices.", "label": 0, "field": "math"} {"text": "Title: Adaptive Belief Discretization for POMDP Planning\nAbstract: Partially Observable Markov Decision Processes (POMDP) is a widely used model to represent the interaction of an environment and an agent, under state uncertainty. Since the agent does not observe the environment state, its uncertainty is typically represented through a probabilistic belief. While the set of possible beliefs is infinite, making exact planning intractable, the belief space's complexity (and hence planning complexity) is characterized by its covering number. Many POMDP solvers uniformly discretize the belief space and give the planning error in terms of the (typically unknown) covering number. We instead propose an adaptive belief discretization scheme, and give its associated planning error. We furthermore characterize the covering number with respect to the POMDP parameters. This allows us to specify the exact memory requirements on the planner, needed to bound the value function error. We then propose a novel, computationally efficient solver using this scheme. We demonstrate that our algorithm is highly competitive with the state of the art in a variety of scenarios.", "label": 1, "field": "cs"} {"text": "Title: Use of Jordan forms for convection-pressure split Euler solvers\nAbstract: In this study, we analyze convection-pressure split Euler flux functions which contain genuine weakly hyperbolic convection subsystems. A system is said to be a genuine weakly hyperbolic if all eigenvalues are real with no complete set of linearly independent (LI) eigenvectors. To construct an upwind solver based on flux difference splitting (FDS) framework, we require to generate complete set of LI eigenvectors. This can be done through addition of generalized eigenvectors which can be computed from theory of Jordan canonical forms. Once we have complete set of LI generalized eigenvectors, we construct upwind solvers in convection-pressure splitting framework. Since generalized eigenvectors are not unique, we take extra care to ensure no direct contribution of generalized eigenvectors in the final formulation of both the newly developed numerical schemes. First scheme is based on Zha and Bilgen type splitting approach, while second is based on Toro and V\\'azquez splitting. Both the schemes are tested on several bench-mark test problems on 1-D and one of them is tested on some typical 2-D test problems which involve shock instabilities. The concept of generalized eigenvector based on Jordan forms is found to be useful in dealing with the genuine weakly hyperbolic parts of the considered Euler systems.", "label": 1, "field": "math"} {"text": "Title: The Alexander module of a trigonal curve\nAbstract: We describe the Alexander modules and Alexander polynomials (both over $\\Q$ and over finite fields $\\FF{p}$) of generalized trigonal curves. The rational case is closed completely; in the case of characteristic $p>0$, a few points remain open.", "label": 1, "field": "math"} {"text": "Title: The Zilber-Pink Conjecture and the Generalized Cosmetic Surgery Conjecture\nAbstract: In this paper, we generalize the Cosmetic Surgery Conjecture to an $n$-cusped hyperbolic $3$-manifold and prove it under the assumption of another well-known conjecture in number theory, so called the Zilber-Pink Conjecture. For $n=1$ and $2$, we show them without the assumption.", "label": 1, "field": "math"} {"text": "Title: Stochastic Coalitional Games for Cooperative Random Access in M2M Communications\nAbstract: In this paper, the problem of random access contention between machine type devices (MTDs) in the uplink of a wireless cellular network is studied. In particular, the possibility of forming cooperative groups to coordinate the MTDs' requests for the random access channel (RACH) is analyzed. The problem is formulated as a stochastic coalition formation game in which the MTDs are the players that seek to form cooperative coalitions to optimize a utility function that captures each MTD's energy consumption and time-varying queue length. Within each coalition, an MTD acts as a coalition head that sends the access requests of the coalition members over the RACH. One key feature of this game is its ability to cope with stochastic environments in which the arrival requests of MTDs and the packet success rate over RACH are dynamically time-varying. The proposed stochastic coalitional is composed of multiple stages, each of which corresponds to a coalitional game in stochastic characteristic form that is played by the MTDs at each time step. To solve this game, a novel distributed coalition formation algorithm is proposed and shown to converge to a stable MTD partition. Simulation results show that, on the average, the proposed stochastic coalition formation algorithm can reduce the average fail ratio and energy consumption of up to 36% and 31% for a cluster-based distribution of MTDs, respectively, compared with a noncooperative case. Moreover, when the MTDs are more sensitive to the energy consumption (queue length), the coalitions' size will increase (decrease).", "label": 1, "field": "cs"} {"text": "Title: Weight functions on Berkovich curves\nAbstract: Let $C$ be a curve over a complete discretely valued field $K$. We give tropical descriptions of the weight function attached to a pluricanonical form on $C$ and the essential skeleton of $C$. We show that the Laplacian of the weight function equals the pluricanonical divisor on Berkovich skeleta, and we describe the essential skeleton of $C$ as a combinatorial skeleton of the Berkovich skeleton of the minimal $snc$-model. In particular, if $C$ has semi-stable reduction, then the essential skeleton coincides with the minimal skeleton. As an intermediate step, we describe the base loci of logarithmic pluricanonical line bundles on minimal $snc$-models.", "label": 1, "field": "math"} {"text": "Title: Deterministic Identity Testing for Sum of Read-Once Oblivious Arithmetic Branching Programs\nAbstract: A read-once oblivious arithmetic branching program (ROABP) is an arithmetic branching program (ABP) where each variable occurs in at most one layer. We give the first polynomial time whitebox identity test for a polynomial computed by a sum of constantly many ROABPs. We also give a corresponding blackbox algorithm with quasi-polynomial time complexity $n^{O(\\log n)}$. In both the cases, our time complexity is double exponential in the number of ROABPs. ROABPs are a generalization of set-multilinear depth-$3$ circuits. The prior results for the sum of constantly many set-multilinear depth-$3$ circuits were only slightly better than brute-force, i.e. exponential-time. Our techniques are a new interplay of three concepts for ROABP: low evaluation dimension, basis isolating weight assignment and low-support rank concentration. We relate basis isolation to rank concentration and extend it to a sum of two ROABPs using evaluation dimension (or partial derivatives).", "label": 1, "field": "cs"} {"text": "Title: On the Performance of Large-Scale Wireless Networks in the Finite Block-Length Regime\nAbstract: Ultra-Reliable Low-Latency Communications have stringent delay constraints, and hence use codes with small block length (short codewords). In these cases, classical models that provide good approximations to systems with infinitely long codewords become imprecise. To remedy this, in this paper, an average coding rate expression is derived for a large scale network with short codewords using stochastic geometry and the theory of coding in the finite blocklength regime. The average coding rate and upper and lower bounds on the outage probability of the large-scale network are derived, and a tight approximation of the outage probability is presented. Then, simulations are presented to study the effect of network parameters on the average coding rate and the outage probability of the network, which demonstrate that results in the literature derived for the infinite blocklength regime overestimate the network performance, whereas the results in this paper provide a more realistic performance evaluation.", "label": 1, "field": "cs"} {"text": "Title: Hypergraph reconstruction from noisy pairwise observations\nAbstract: The network reconstruction task aims to estimate a complex system's structure from various data sources such as time series, snapshots, or interaction counts. Recent work has examined this problem in networks whose relationships involve precisely two entities-the pairwise case. Here we investigate the general problem of reconstructing a network in which higher-order interactions are also present. We study a minimal example of this problem, focusing on the case of hypergraphs with interactions between pairs and triplets of vertices, measured imperfectly and indirectly. We derive a Metropolis-Hastings-within-Gibbs algorithm for this model and use the algorithms to highlight the unique challenges that come with estimating higher-order models. We show that this approach tends to reconstruct empirical and synthetic networks more accurately than an equivalent graph model without higher-order interactions.", "label": 1, "field": "cs"} {"text": "Title: The multicolour size-Ramsey number of powers of paths\nAbstract: Given a positive integer $s$, a graph $G$ is $s$-Ramsey for a graph $H$, denoted $G\\rightarrow (H)_s$, if every $s$-colouring of the edges of $G$ contains a monochromatic copy of $H$. The $s$-colour size-Ramsey number ${\\hat{r}}_s(H)$ of a graph $H$ is defined to be ${\\hat{r}}_s(H)=\\min\\{|E(G)|\\colon G\\rightarrow (H)_s\\}$. We prove that, for all positive integers $k$ and $s$, we have ${\\hat{r}}_s(P_n^k)=O(n)$, where $P_n^k$ is the $k$th power of the $n$-vertex path $P_n$.", "label": 1, "field": "math"} {"text": "Title: When ideals properly extend the class of Arbault sets\nAbstract: In this article we continue the investigation of generalized version of Arbault sets, that was initiated in \\cite{DGT} but look at the picture from the most general point of view where ideals come into play. While Arbault sets can be naturally associated with the Frechet ideal $Fin$, in \\cite{DGT} it was observed that when $Fin$ is replaced by the natural density ideal $\\mathcal{I}_d$ one can obtain a strictly larger class of trigonometric thin sets containing Arbault sets. From the set theoretic point of view a natural question arises as whether one can broaden the picture and specify a class of ideals (instead of a single ideal) each of which would have the similar effect. As a natural candidate, we focus on a special class of ideals, namely, non-$snt$ ideals ($snt$ stands for ``strongly non translation invariant\") which properly contains the class of translation invariant ideals ($\\varsupsetneq Fin$) and happens to contain ideals generated by simple density functions as also certain non-negative regular summability matrices (but not all) which can be seen from \\cite{DG6}. We consider the resulting class of $\\mathcal{I}$-Arbault sets and it is observed that for each such ideal, the class of $\\mathcal{I}$-Arbault sets not only properly contains the class of classical Arbault sets \\cite{Ar} but also a large subfamily of $\\mathbf{N}$-sets (also called ``sets of absolute convergence\") \\cite{Ft} while being contained in the class of weak Dirichlet sets. %In particular it properly contains the family of $\\mathbf{N}_0$-sets which have been extensively used in the literature (see \\cite{Ar, Ka, Ko}). Though distinct from the class of $\\mathbf{N}$-sets, this happens to be a new class strictly lying between the class of Arbault sets and the class of weak Dirichlet sets.", "label": 0, "field": "math"} {"text": "Title: Towards Palmprint Verification On Smartphones\nAbstract: With the rapid development of mobile devices, smartphones have gradually become an indispensable part of people's lives. Meanwhile, biometric authentication has been corroborated to be an effective method for establishing a person's identity with high confidence. Hence, recently, biometric technologies for smartphones have also become increasingly sophisticated and popular. But it is noteworthy that the application potential of palmprints for smartphones is seriously underestimated. Studies in the past two decades have shown that palmprints have outstanding merits in uniqueness and permanence, and have high user acceptance. However, currently, studies specializing in palmprint verification for smartphones are still quite sporadic, especially when compared to face- or fingerprint-oriented ones. In this paper, aiming to fill the aforementioned research gap, we conducted a thorough study of palmprint verification on smartphones and our contributions are twofold. First, to facilitate the study of palmprint verification on smartphones, we established an annotated palmprint dataset named MPD, which was collected by multi-brand smartphones in two separate sessions with various backgrounds and illumination conditions. As the largest dataset in this field, MPD contains 16,000 palm images collected from 200 subjects. Second, we built a DCNN-based palmprint verification system named DeepMPV+ for smartphones. In DeepMPV+, two key steps, ROI extraction and ROI matching, are both formulated as learning problems and then solved naturally by modern DCNN models. The efficiency and efficacy of DeepMPV+ have been corroborated by extensive experiments. To make our results fully reproducible, the labeled dataset and the relevant source codes have been made publicly available at https://cslinzhang.github.io/MobilePalmPrint/.", "label": 1, "field": "cs"} {"text": "Title: Luna's fundamental lemma for diagonalizable groups\nAbstract: We study relatively affine actions of a diagonalizable group $G$ on locally noetherian schemes. In particular, we generalize Luna's fundamental lemma when applied to a diagonalizable group: we obtain criteria for a $G$-equivariant morphism $f: X'\\to X$ to be $strongly\\ equivariant$, namely the base change of the morphism $f/\\!/G$ of quotient schemes, and establish descent criteria for $f/\\!/G$ to be an open embedding, \\'etale, smooth, regular, syntomic, or lci.", "label": 1, "field": "math"} {"text": "Title: Evolutionary Alternating Direction Method of Multipliers for Constrained Multi-Objective Optimization with Unknown Constraints\nAbstract: Constrained multi-objective optimization problems (CMOPs) pervade real-world applications in science, engineering, and design. Constraint violation has been a building block in designing evolutionary multi-objective optimization algorithms for solving constrained multi-objective optimization problems. However, in certain scenarios, constraint functions might be unknown or inadequately defined, making constraint violation unattainable and potentially misleading for conventional constrained evolutionary multi-objective optimization algorithms. To address this issue, we present the first of its kind evolutionary optimization framework, inspired by the principles of the alternating direction method of multipliers that decouples objective and constraint functions. This framework tackles CMOPs with unknown constraints by reformulating the original problem into an additive form of two subproblems, each of which is allotted a dedicated evolutionary population. Notably, these two populations operate towards complementary evolutionary directions during their optimization processes. In order to minimize discrepancy, their evolutionary directions alternate, aiding the discovery of feasible solutions. Comparative experiments conducted against five state-of-the-art constrained evolutionary multi-objective optimization algorithms, on 120 benchmark test problem instances with varying properties, as well as two real-world engineering optimization problems, demonstrate the effectiveness and superiority of our proposed framework. Its salient features include faster convergence and enhanced resilience to various Pareto front shapes.", "label": 0, "field": "cs"} {"text": "Title: Analytic Linear Lie rack Structures on Leibniz Algebras\nAbstract: A linear Lie rack structure on a finite dimensional vector space $V$ is a Lie rack operation $(x,y)\\mapsto x\\rhd y$ pointed at the origin and such that for any $x$, the left translation $\\mathrm{L}_x:y\\mapsto \\mathrm{L}_x(y)= x\\rhd y$ is linear. A linear Lie rack operation $\\rhd$ is called analytic if for any $x,y\\in V$, \\[ x\\rhd y=y+\\sum_{n=1}^\\infty A_{n,1}(x,\\ldots,x,y), \\]where $A_{n,1}:V\\times\\ldots\\times V\\Leftarrow V$ is an $n+1$-multilinear map symmetric in the $n$ first arguments. In this case, $A_{1,1}$ is exactly the left Leibniz product associated to $\\rhd$. Any left Leibniz algebra $(\\mathfrak{h},[\\;,\\;])$ has a canonical analytic linear Lie rack structure given by $x\\stackrel{c}{\\rhd} y=\\exp(\\mathrm{ad}_x)(y)$, where $\\mathrm{ad}_x(y)=[x,y]$. In this paper, we show that a sequence $(A_{n,1})_{n\\geq1}$ of $n+1$-multilinear maps on a vector space $V$ defines an analytic linear Lie rack structure if and only if $[\\;,\\;]:=A_{1,1}$ is a left Leibniz bracket, the $A_{n,1}$ are invariant for $(V,[\\;,\\;]:)$ and satisfy a sequence of multilinear equations. Some of these equations have a cohomological interpretation and can be solved when the zero and the 1-cohomology of the left Leibniz algebra $(V,[\\;,\\;])$ are trivial. On the other hand, given a left Leibniz algebra $(\\mathfrak{h},[\\;,\\;])$, we show that there is a large class of (analytic) linear Lie rack structures on $(\\mathfrak{h},[\\;,\\;])$ which can be built from the canonical one and invariant multilinear symmetric maps on $\\mathfrak{h}$. A left Leibniz algebra on which all the analytic linear Lie rack structures are build in this way will be called rigid. We use our characterizations of analytic linear Lie rack structures to show that $\\mathfrak{sl}_2(\\mathbb{R})$ and $\\mathfrak{so}(3)$ are rigid. We conjecture that any simple Lie algebra is rigid as a left Leibniz algebra.", "label": 1, "field": "math"} {"text": "Title: Characterizing Boundedness in Chase Variants\nAbstract: Existential rules are a positive fragment of first-order logic that generalizes function-free Horn rules by allowing existentially quantified variables in rule heads. This family of languages has recently attracted significant interest in the context of ontology-mediated query answering. Forward chaining, also known as the chase, is a fundamental tool for computing universal models of knowledge bases, which consist of existential rules and facts. Several chase variants have been defined, which differ on the way they handle redundancies. A set of existential rules is bounded if it ensures the existence of a bound on the depth of the chase, independently from any set of facts. Deciding if a set of rules is bounded is an undecidable problem for all chase variants. Nevertheless, when computing universal models, knowing that a set of rules is bounded for some chase variant does not help much in practice if the bound remains unknown or even very large. Hence, we investigate the decidability of the k-boundedness problem, which asks whether the depth of the chase for a given set of rules is bounded by an integer k. We identify a general property which, when satisfied by a chase variant, leads to the decidability of k-boundedness. We then show that the main chase variants satisfy this property, namely the oblivious, semi-oblivious (aka Skolem), and restricted chase, as well as their breadth-first versions. This paper is under consideration for publication in Theory and Practice of Logic Programming.", "label": 1, "field": "cs"} {"text": "Title: Accelerating Text-to-Image Editing via Cache-Enabled Sparse Diffusion Inference\nAbstract: Due to the recent success of diffusion models, text-to-image generation is becoming increasingly popular and achieves a wide range of applications. Among them, text-to-image editing, or continuous text-to-image generation, attracts lots of attention and can potentially improve the quality of generated images. It's common to see that users may want to slightly edit the generated image by making minor modifications to their input textual descriptions for several rounds of diffusion inference. However, such an image editing process suffers from the low inference efficiency of many existing diffusion models even using GPU accelerators. To solve this problem, we introduce Fast Image Semantically Edit (FISEdit), a cached-enabled sparse diffusion model inference engine for efficient text-to-image editing. The key intuition behind our approach is to utilize the semantic mapping between the minor modifications on the input text and the affected regions on the output image. For each text editing step, FISEdit can automatically identify the affected image regions and utilize the cached unchanged regions' feature map to accelerate the inference process. Extensive empirical results show that FISEdit can be $3.4\\times$ and $4.4\\times$ faster than existing methods on NVIDIA TITAN RTX and A100 GPUs respectively, and even generates more satisfactory images.", "label": 0, "field": "cs"} {"text": "Title: Harmonic curvature in dimension four\nAbstract: We provide a step towards classifying Riemannian four-manifolds in which the curvature tensor has zero divergence, or -- equivalently -- the Ricci tensor Ric satisfies the Codazzi equation. Every known compact manifold of this type belongs to one of five otherwise-familiar classes of examples. The main result consists in showing that, if such a manifold (not necessarily compact or even complete) lies outside of the five classes -- a non-vacuous assumption -- then, at all points of a dense open subset, Ric has four distinct eigenvalues, while suitable local coordinates simultaneously diagonalize Ric, the metric and, in a natural sense, also the curvature tensor. Furthermore, in a local orthonormal frame formed by Ricci eigenvectors, the connection form (or, curvature tensor) has just twelve (or, respectively, six) possibly-nonzero components, which together satisfy a specific system, not depending on the point, of homogeneous polynomial equations. A part of the classification problem is thus reduced to a question in real algebraic geometry.", "label": 0, "field": "math"} {"text": "Title: Some remarks on infinitesimals in MV-algebras\nAbstract: Replacing $\\{0\\}$ by the whole ideal of infinitesimals yields a weaker notion of \\emph{archimedean element} that we call \\emph{quasiarchimedean}. It is known that semisimple MV-algebras with compact maximal spectrum (in the co-Zarisky topology) are exactly the hyperarchimedean algebras. We characterise all the algebras with compact maximal spectrum as being \\emph{quasihyperarchimedean} \\mbox{MV-algebras,} which in a sense are non semisimple hyperarchimedean algebras. We develop some basic facts in the theory of MV-algebras along the lines of algebraic geometry, where infinitesimals play the role of nilpotent elements, and prove a MV-algebra version of Hilbert's Nullstellensatz. Finally we consider the relations (some inedited) between several elementary classes of MV-algebras in terms of the ideals that characterise them, and present elementary (first order with denumerable disjunctions) proofs in place of the \\mbox{set-theoretical} usually found in the literature.", "label": 1, "field": "math"} {"text": "Title: On an open problem about a class of optimal ternary cyclic codes\nAbstract: Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems and communication systems as they have efficient encoding and decoding algorithms. In this paper, we settle an open problem about a class of optimal ternary cyclic codes which was proposed by Ding and Helleseth. Let $C_{(1,e)}$ be a cyclic code of length $3^m-1$ over GF(3) with two nonzeros $\\alpha$ and $\\alpha^e$, where $\\alpha$ is a generator of $GF(3^m)^*$ and e is a given integer. It is shown that $C_{(1,e)}$ is optimal with parameters $[3^m-1,3^m-1-2m,4]$ if one of the following conditions is met. 1) $m\\equiv0(\\mathrm{mod}~ 4)$, $m\\geq 4$, and $e=3^\\frac{m}{2}+5$. 2) $m\\equiv2(\\mathrm{mod}~ 4)$, $m\\geq 6$, and $e=3^\\frac{m+2}{2}+5$.", "label": 1, "field": "math"} {"text": "Title: A Kernel Framework to Quantify a Model's Local Predictive Uncertainty under Data Distributional Shifts\nAbstract: Traditional Bayesian approaches for model uncertainty quantification rely on notoriously difficult processes of marginalization over each network parameter to estimate its probability density function (PDF). Our hypothesis is that internal layer outputs of a trained neural network contain all of the information related to both its mapping function (quantified by its weights) as well as the input data distribution. We therefore propose a framework for predictive uncertainty quantification of a trained neural network that explicitly estimates the PDF of its raw prediction space (before activation), p(y'|x,w), which we refer to as the model PDF, in a Gaussian reproducing kernel Hilbert space (RKHS). The Gaussian RKHS provides a localized density estimate of p(y'|x,w), which further enables us to utilize gradient based formulations of quantum physics to decompose the model PDF in terms of multiple local uncertainty moments that provide much greater resolution of the PDF than the central moments characterized by Bayesian methods. This provides the framework with a better ability to detect distributional shifts in test data away from the training data PDF learned by the model. We evaluate the framework against existing uncertainty quantification methods on benchmark datasets that have been corrupted using common perturbation techniques. The kernel framework is observed to provide model uncertainty estimates with much greater precision based on the ability to detect model prediction errors.", "label": 1, "field": "cs"} {"text": "Title: Identification of the Heat Transfer Coefficient Using an Inverse Heat Conduction Model\nAbstract: Inverse problems of recovering heat transfer coefficient from integral measurements are considered. The heat transfer coefficient occurs in the transmission conditions of imperfect contact type or the Robin type boundary conditions. It is representable as a finite part of the Fourier series with time dependent coefficients. The additional measurements are integrals of a solution multiplied by some weights. Existence and uniqueness of solutions in Sobolev classes are proven and the conditions on the data are sharp. These conditions include smoothness and consistency conditions on the data and additional conditions on the kernels of the integral operators used in additional measurements. The proof relies on a priori bounds and the contraction mapping principle. The existence and uniqueness theorems are local in time.", "label": 0, "field": "math"} {"text": "Title: Heavy Ball Neural Ordinary Differential Equations\nAbstract: We propose heavy ball neural ordinary differential equations (HBNODEs), leveraging the continuous limit of the classical momentum accelerated gradient descent, to improve neural ODEs (NODEs) training and inference. HBNODEs have two properties that imply practical advantages over NODEs: (i) The adjoint state of an HBNODE also satisfies an HBNODE, accelerating both forward and backward ODE solvers, thus significantly reducing the number of function evaluations (NFEs) and improving the utility of the trained models. (ii) The spectrum of HBNODEs is well structured, enabling effective learning of long-term dependencies from complex sequential data. We verify the advantages of HBNODEs over NODEs on benchmark tasks, including image classification, learning complex dynamics, and sequential modeling. Our method requires remarkably fewer forward and backward NFEs, is more accurate, and learns long-term dependencies more effectively than the other ODE-based neural network models. Code is available at \\url{https://github.com/hedixia/HeavyBallNODE}.", "label": 1, "field": "cs"} {"text": "Title: Precondition and Effect Reasoning for Action Recognition\nAbstract: Human action recognition has drawn a lot of attention in the recent years due to the research and application significance. Most existing works on action recognition focus on learning effective spatial-temporal features from videos, but neglect the strong causal relationship among the precondition, action and effect. Such relationships are also crucial to the accuracy of action recognition. In this paper, we propose to model the causal relationships based on the precondition and effect to improve the performance of action recognition. Specifically, a Cycle-Reasoning model is proposed to capture the causal relationships for action recognition. To this end, we annotate precondition and effect for a large-scale action dataset. Experimental results show that the proposed Cycle-Reasoning model can effectively reason about the precondition and effect and can enhance action recognition performance.", "label": 1, "field": "cs"} {"text": "Title: Sampling projections in the uniform norm\nAbstract: We show that there are sampling projections on arbitrary $n$-dimensional subspaces of $B(D)$ with at most $2n$ samples and norm of order $\\sqrt{n}$, where $B(D)$ is the space of complex-valued bounded functions on a set $D$. This gives a more explicit form of the Kadets-Snobar theorem for the uniform norm and improves upon Auerbach's lemma. We discuss consequences for optimal recovery in $L_p$.", "label": 0, "field": "math"} {"text": "Title: Some Fibonacci-Related Sequences\nAbstract: We discuss an interesting sequence defined recursively; namely, sequence A105774 from the On-Line Encyclopedia of Integer Sequences, and study some of its properties. Our main tools are Fibonacci representation, finite automata, and the Walnut theorem-prover. We also prove two new results about synchronized sequences.", "label": 0, "field": "math"} {"text": "Title: Asymptotic stability and sharp decay rates to the linearly stratified Boussinesq equations in horizontally periodic strip domain\nAbstract: We consider an initial boundary value problem of the multi-dimensional Boussinesq equations in the absence of thermal diffusion with velocity damping or velocity diffusion under the stress free boundary condition in horizontally periodic strip domain. We prove the global-in-time existence of classical solutions in high order Sobolev spaces satisfying high order compatibility conditions around the linearly stratified equilibrium, the convergence of the temperature to the asymptotic profile, and sharp decay rates of the velocity field and temperature fluctuation in all intermediate norms based on spectral analysis combined with energy estimates. To the best of our knowledge, our results provide first sharp decay rates for the temperature fluctuation and the vertical velocity to the linearly stratified Boussinesq equations in all intermediate norms.", "label": 1, "field": "math"} {"text": "Title: Global topology of the Hitchin system\nAbstract: Here we survey several results and conjectures on the cohomology of the total space of the Hitchin system: the moduli space of semi-stable rank n and degree d Higgs bundles on a complex algebraic curve C. The picture emerging is a dynamic mixture of ideas originating in theoretical physics such as gauge theory and mirror symmetry, Weil conjectures in arithmetic algebraic geometry, representation theory of finite groups of Lie type and Langlands duality in number theory.", "label": 1, "field": "math"} {"text": "Title: Neural Collapse for Cross-entropy Class-Imbalanced Learning with Unconstrained ReLU Feature Model\nAbstract: The current paradigm of training deep neural networks for classification tasks includes minimizing the empirical risk that pushes the training loss value towards zero, even after the training error has been vanished. In this terminal phase of training, it has been observed that the last-layer features collapse to their class-means and these class-means converge to the vertices of a simplex Equiangular Tight Frame (ETF). This phenomenon is termed as Neural Collapse (NC). To theoretically understand this phenomenon, recent works employ a simplified unconstrained feature model to prove that NC emerges at the global solutions of the training problem. However, when the training dataset is class-imbalanced, some NC properties will no longer be true. For example, the class-means geometry will skew away from the simplex ETF when the loss converges. In this paper, we generalize NC to imbalanced regime for cross-entropy loss under the unconstrained ReLU feature model. We prove that, while the within-class features collapse property still holds in this setting, the class-means will converge to a structure consisting of orthogonal vectors with different lengths. Furthermore, we find that the classifier weights are aligned to the scaled and centered class-means with scaling factors depend on the number of training samples of each class, which generalizes NC in the class-balanced setting. We empirically prove our results through experiments on practical architectures and dataset.", "label": 0, "field": "cs"} {"text": "Title: Testing popularity in linear time via maximum matching\nAbstract: Popularity is an approach in mechanism design to find fair structures in a graph, based on the votes of the nodes. Popular matchings are the relaxation of stable matchings: given a graph G=(V,E) with strict preferences on the neighbors of the nodes, a matching M is popular if there is no other matching M' such that the number of nodes preferring M' is more than those preferring M. This paper considers the popularity testing problem, when the task is to decide whether a given matching is popular or not. Previous algorithms applied reductions to maximum weight matchings. We give a new algorithm for testing popularity by reducing the problem to maximum matching testing, thus attaining a linear running time O(|E|). Linear programming-based characterization of popularity is often applied for proving the popularity of a certain matching. As a consequence of our algorithm we derive a more structured dual witness than previous ones. Based on this result we give a combinatorial characterization of fractional popular matchings, which are a special class of popular matchings.", "label": 0, "field": "cs"} {"text": "Title: Quantization of the K\u00e4hler-Ricci flow and optimal destabilizer for a Fano manifold\nAbstract: For a Fano manifold, We consider the geometric quantization of the K\\\"ahler-Ricci flow and the associated entropy functional. Convergence to the original flow and entropy is established. It is also possible to formulate the finite-dimensional analogue of the optimal degeneration for the anti-canonical polarization.", "label": 0, "field": "math"} {"text": "Title: The Adjoint Representation of a Higher Lie Groupoid\nAbstract: We extend the standard construction of the adjoint representation of a Lie groupoid to the case of an arbitrary higher Lie groupoid. As for a Lie groupoid, the adjoint representation of a higher Lie groupoid turns out to be a representation up to homotopy which is well defined up to isomorphism. Its existence and uniqueness are immediate consequences of a more general result in the theory of simplicial vector bundles: the representation up to homotopy obtained by splitting a higher vector bundle by means of a cleavage is, to within isomorphism, independent of the choice of the cleavage.", "label": 0, "field": "math"} {"text": "Title: DEWP: Deep Expansion Learning for Wind Power Forecasting\nAbstract: Wind is one kind of high-efficient, environmentally-friendly and cost-effective energy source. Wind power, as one of the largest renewable energy in the world, has been playing a more and more important role in supplying electricity. Though growing dramatically in recent years, the amount of generated wind power can be directly or latently affected by multiple uncertain factors, such as wind speed, wind direction, temperatures, etc. More importantly, there exist very complicated dependencies of the generated power on the latent composition of these multiple time-evolving variables, which are always ignored by existing works and thus largely hinder the prediction performances. To this end, we propose DEWP, a novel Deep Expansion learning for Wind Power forecasting framework to carefully model the complicated dependencies with adequate expressiveness. DEWP starts with a stack-by-stack architecture, where each stack is composed of (i) a variable expansion block that makes use of convolutional layers to capture dependencies among multiple variables; (ii) a time expansion block that applies Fourier series and backcast/forecast mechanism to learn temporal dependencies in sequential patterns. These two tailored blocks expand raw inputs into different latent feature spaces which can model different levels of dependencies of time-evolving sequential data. Moreover, we propose an inference block corresponding for each stack, which applies multi-head self-attentions to acquire attentive features and maps expanded latent representations into generated wind power. In addition, to make DEWP more expressive in handling deep neural architectures, we adapt doubly residue learning to process stack-by-stack outputs. Finally, we present extensive experiments in the real-world wind power forecasting application on two datasets from two different turbines to demonstrate the effectiveness of our approach.", "label": 0, "field": "cs"} {"text": "Title: Ramsey Partial Orders from Acyclic Graphs\nAbstract: We prove that finite partial orders with a linear extension form a Ramsey class. Our proof is based on the fact that class of acyclic graphs has the Ramsey property and uses the partite construction.", "label": 1, "field": "math"} {"text": "Title: How Descriptive are GMRES Convergence Bounds?\nAbstract: GMRES is a popular Krylov subspace method for solving linear systems of equations involving a general non-Hermitian coefficient matrix. The conventional bounds on GMRES convergence involve polynomial approximation problems in the complex plane. Three popular approaches pose this approximation problem on the spectrum, the field of values, or pseudospectra of the coefficient matrix. We analyze and compare these bounds, illustrating with six examples the success and failure of each. When the matrix departs from normality due only to a low-dimensional invariant subspace, we discuss how these bounds can be adapted to exploit this structure. Since the Arnoldi process that underpins GMRES provides approximations to the pseudospectra, one can estimate the GMRES convergence bounds as an iteration proceeds.", "label": 1, "field": "math"} {"text": "Title: GIT-Mol: A Multi-modal Large Language Model for Molecular Science with Graph, Image, and Text\nAbstract: Large language models have made significant strides in natural language processing, enabling innovative applications in molecular science by processing textual representations of molecules. However, most existing language models cannot capture the rich information with complex molecular structures or images. In this paper, we introduce GIT-Mol, a multi-modal large language model that integrates the Graph, Image, and Text information. To facilitate the integration of multi-modal molecular data, we propose GIT-Former, a novel architecture that is capable of aligning all modalities into a unified latent space. We achieve a 5%-10% accuracy increase in properties prediction and a 20.2% boost in molecule generation validity compared to the baselines. With the any-to-language molecular translation strategy, our model has the potential to perform more downstream tasks, such as compound name recognition and chemical reaction prediction.", "label": 0, "field": "cs"} {"text": "Title: On the associativity of the addition on elliptic curves\nAbstract: In this short note we give a simple elementary proof of the associativity of the addition on elliptic curves. We do this by providing an explicit formula for the sum of three points, using the explicit definition of the group structure.", "label": 0, "field": "math"} {"text": "Title: DCR-Consistency: Divide-Conquer-Reasoning for Consistency Evaluation and Improvement of Large Language Models\nAbstract: Evaluating the quality and variability of text generated by Large Language Models (LLMs) poses a significant, yet unresolved research challenge. Traditional evaluation methods, such as ROUGE and BERTScore, which measure token similarity, often fail to capture the holistic semantic equivalence. This results in a low correlation with human judgments and intuition, which is especially problematic in high-stakes applications like healthcare and finance where reliability, safety, and robust decision-making are highly critical. This work proposes DCR, an automated framework for evaluating and improving the consistency of LLM-generated texts using a divide-conquer-reasoning approach. Unlike existing LLM-based evaluators that operate at the paragraph level, our method employs a divide-and-conquer evaluator (DCE) that breaks down the paragraph-to-paragraph comparison between two generated responses into individual sentence-to-paragraph comparisons, each evaluated based on predefined criteria. To facilitate this approach, we introduce an automatic metric converter (AMC) that translates the output from DCE into an interpretable numeric score. Beyond the consistency evaluation, we further present a reason-assisted improver (RAI) that leverages the analytical reasons with explanations identified by DCE to generate new responses aimed at reducing these inconsistencies. Through comprehensive and systematic empirical analysis, we show that our approach outperforms state-of-the-art methods by a large margin (e.g., +19.3% and +24.3% on the SummEval dataset) in evaluating the consistency of LLM generation across multiple benchmarks in semantic, factual, and summarization consistency tasks. Our approach also substantially reduces nearly 90% of output inconsistencies, showing promise for effective hallucination mitigation.", "label": 0, "field": "cs"} {"text": "Title: The near-parabolic geometry of external rays\nAbstract: Using Lavaurs maps and near-parabolic renormalization, we describe the degenerating geometry of external rays for quadratic polynomials when a periodic cycle becomes parabolic. We similarly describe the geometry of parameter rays for the Mandelbrot set near parabolic points. Using this geometric control we establish new bounds on the size of limbs of the Mandelbrot set, for example providing a quadratic Pommerenke-Levin-Yoccoz inequality in the near-parabolic setting.", "label": 0, "field": "math"} {"text": "Title: Allison-Benkart-Gao functor and the free non-unital alternative algebras\nAbstract: Let $k$ be a field of characteristic $0$. We introduce a pair of adjoint functors, Allison-Benkart-Gao functor $\\mathcal{ABG}$ and Berman-Moody functor $\\mathcal{BM}$, between the category of non-unital alternative algebras over $k$ and the category ${\\text{\\bf Lie}_{\\text{R}}}$ of Lie algebras with appropriate $sl_3(k)$-module structures. Surprisingly, when $A$ is a non-unital alternative algebra, the Allison-Gao Lie algebra $\\mathcal{ABG}(A)$ is different from the more well-known Steinberg Lie algebra $st_3(A)$. Next, let $A(D)$ be the free (non-unit) alternative algebra generated by $D$ elements and $\\text{Inner} A(D)$ the inner derivation algebra of $A(D)$. A conjecture on the homology of $H_r(\\mathcal{ABG}(A(D)))$ is proposed. Let $A(D)_n$(resp. $\\text{Inner} A(D)_n$) be the degree $n$ component of $A(D)_n$(resp. $\\text{Inner} A(D)_n$). The previous conjecture implies another conjecture on the dimensions on $A(D)_n$ and $\\text{Inner} A(D)_n$. We also give some evidences to support the these conjectures.", "label": 0, "field": "math"} {"text": "Title: A quatum inspired neural network for geometric modeling\nAbstract: By conceiving physical systems as 3D many-body point clouds, geometric graph neural networks (GNNs), such as SE(3)/E(3) equivalent GNNs, have showcased promising performance. In particular, their effective message-passing mechanics make them adept at modeling molecules and crystalline materials. However, current geometric GNNs only offer a mean-field approximation of the many-body system, encapsulated within two-body message passing, thus falling short in capturing intricate relationships within these geometric graphs. To address this limitation, tensor networks, widely employed by computational physics to handle manybody systems using high-order tensors, have been introduced. Nevertheless, integrating these tensorized networks into the message-passing framework of GNNs faces scalability and symmetry conservation (e.g., permutation and rotation) challenges. In response, we introduce an innovative equivariant Matrix Product State (MPS)-based message-passing strategy, through achieving an efficient implementation of the tensor contraction operation. Our method effectively models complex many-body relationships, suppressing mean-field approximations, and captures symmetries within geometric graphs. Importantly, it seamlessly replaces the standard message-passing and layer-aggregation modules intrinsic to geometric GNNs. We empirically validate the superior accuracy of our approach on benchmark tasks, including predicting classical Newton systems and quantum tensor Hamiltonian matrices. To our knowledge, our approach represents the inaugural utilization of parameterized geometric tensor networks.", "label": 0, "field": "cs"} {"text": "Title: The cyclic open-closed map, u-connections and R-matrices\nAbstract: This paper considers the (negative) cyclic open-closed map $\\mathcal{OC}^{-}$, which maps the cyclic homology of the Fukaya category of a symplectic manifold to its $S^1$-equivariant quantum cohomology. We prove (under simplifying technical hypotheses) that this map respects the respective natural connections in the direction of the equivariant parameter. In the monotone setting this allows us to conclude that $\\mathcal{OC}^{-}$ intertwines the decomposition of the Fukaya category by eigenvalues of quantum cup product with the first Chern class, with the Hukuhara-Levelt-Turrittin decomposition of the quantum cohomology. We also explain how our results relate to the Givental-Teleman classification of semisimple cohomological field theories: in particular, how the R-matrix is related to $\\mathcal{OC}^{-}$ in the semisimple case; we also consider the non-semisimple case.", "label": 1, "field": "math"} {"text": "Title: Some Aspects on Solving Transportation Problem\nAbstract: In this paper, we consider a class of transportation problems which arises in sample surveys and other areas of statistics. The associated cost matrices of these transportation problems are of special structure. We observe that the optimality of North West corner solution holds for the general problem where cost component is replaced by a convex function. We revisit assignment problem and present a weighted version of K$\\ddot{o}$nig-Egerv$\\acute{a}$ry theorem and Hungarian method. The weighted Hungarian method proposed in the paper can be used for solving transportation problem.", "label": 1, "field": "math"} {"text": "Title: Re-evaluating the Memory-balanced Pipeline Parallelism: BPipe\nAbstract: Pipeline parallelism is an essential technique in the training of large-scale Transformer models. However, it suffers from imbalanced memory consumption, leading to insufficient memory utilization. The BPipe technique was proposed to address this issue and has proven effective in the GPT-3 model. Nevertheless, our experiments have not yielded similar benefits for LLaMA training. Additionally, BPipe only yields negligible benefits for GPT-3 training when applying flash attention. We analyze the underlying causes of the divergent performance of BPipe on GPT-3 and LLaMA. Furthermore, we introduce a novel method to estimate the performance of BPipe.", "label": 0, "field": "cs"} {"text": "Title: Pendant appearances and components in random graphs from structured classes\nAbstract: We consider random graphs sampled uniformly from a structured class of graphs, such as the class of graphs embeddable in a given surface. We sharpen and extend earlier results on pendant appearances, concerning for example numbers of leaves; and obtain results on the asymptotic distribution of components other than the giant component, under quite general conditions.", "label": 1, "field": "math"} {"text": "Title: The GDPR Enforcement Fines at Glance\nAbstract: The General Data Protection Regulation (GDPR) came into force in 2018. After this enforcement, many fines have already been imposed by national data protection authorities in Europe. This paper examines the individual GDPR articles referenced in the enforcement decisions, as well as predicts the amount of enforcement fines with available meta-data and text mining features extracted from the enforcement decision documents. According to the results, three articles related to the general principles, lawfulness, and information security have been the most frequently referenced ones. Although the amount of fines imposed vary across the articles referenced, these three particular articles do not stand out. Furthermore, a better statistical evidence is available with other meta-data features, including information about the particular European countries in which the enforcements were made. Accurate predictions are attainable even with simple machine learning techniques for regression analysis. Basic text mining features outperform the meta-data features in this regard. In addition to these results, the paper reflects the GDPR's enforcement against public administration obstacles in the European Union (EU), as well as discusses the use of automatic decision-making systems in judiciary.", "label": 1, "field": "cs"} {"text": "Title: Balancing Specialization and Adaptation in a Transforming Scientific Landscape\nAbstract: How scientists navigate between the need to capitalize on their prior knowledge by specializing, and the urge to adapt to evolving research opportunities? Drawing from diverse perspectives on adaptation, in particular from institutional change and cultural evolution, this paper proposes a Bayesian model of the evolution of scientists' research portfolios in response to transformations in their field. The model relies on scientific abstracts and authorship data to evaluate the influence of intellectual, social, and institutional resources on scientists' trajectories within a cohort of $2\\,195$ high-energy physicists between 2000 and 2019. The reallocation of research efforts is shown to be structured by learning costs, thus enhancing the utility of the scientific capital disseminated among scientists. Two dimensions of social capital, namely ``diversity'' and ``power'', have opposite effects on the magnitude of change in scientists' research interests: while ``diversity'' disrupts and expands research interests, ``power'' stabilizes physicists' research agendas -- as does institutional stability. Social capital plays a more crucial role in shifts between cognitively distant research areas.", "label": 0, "field": "cs"} {"text": "Title: Algebraic twists of modular forms and Hecke orbits\nAbstract: We consider the question of the correlation of Fourier coefficients of modular forms with functions of algebraic origin. We establish the absence of correlation in considerable generality (with a power saving of Burgess type) and a corresponding equidistribution property for twisted Hecke orbits. This is done by exploiting the amplification method and the Riemann Hypothesis over finite fields, relying in particular on the ell-adic Fourier transform introduced by Deligne and studied by Katz and Laumon.", "label": 1, "field": "math"} {"text": "Title: Unified Descriptive Intensional Logic\nAbstract: UDIL (unified descriptive intensional logic) aims to be an alternative and improved version of Bealer's logic fulfilling the goal of unifying Bealer's systems T1 and T2 together with adding features to deal with definite descriptions and singular terms and their related philosophical problems (there are interesting connections to Zalta's more restricted parallel second-order version in his book \\emph{Axiomatic Metaphysics}). UDIL also allows a much shorter and transparent proof of soundness, in particular with regards to a notoriously difficult preliminary lemma. UDIL stands out as being both formally and philosophically distinct from mainstream approaches to intensionality. One motivation for UDIL is to contribute to the Leibnizean goal of a formal philosophy, that is, a philosophy in which arguments and proofs are carried out entirely within a formal system.", "label": 0, "field": "math"} {"text": "Title: Parallel Integer Sort: Theory and Practice\nAbstract: Integer sorting is a fundamental problem in computer science. This paper studies parallel integer sort both in theory and in practice. In theory, we show tighter bounds for a class of existing practical integer sort algorithms, which provides a solid theoretical foundation for their widespread usage in practice and strong performance. In practice, we design a new integer sorting algorithm, \\textsf{DovetailSort}, that is theoretically-efficient and has good practical performance. In particular, \\textsf{DovetailSort} overcomes a common challenge in existing parallel integer sorting algorithms, which is the difficulty of detecting and taking advantage of duplicate keys. The key insight in \\textsf{DovetailSort} is to combine algorithmic ideas from both integer- and comparison-sorting algorithms. In our experiments, \\textsf{DovetailSort} achieves competitive or better performance than existing state-of-the-art parallel integer and comparison sorting algorithms on various synthetic and real-world datasets.", "label": 0, "field": "cs"} {"text": "Title: Strauss- and Lions-type results for a class of Orlicz-Sobolev spaces and applications\nAbstract: The main goal this work is to prove two results like Strauss and Lions for Orlicz-Sobolev spaces. After, we use these results for study the existence of solutions for a class of quasilinear problems in $\\mathbb{R}^{N}$.", "label": 1, "field": "math"} {"text": "Title: Linear stability of compact shrinking Ricci solitons\nAbstract: In this paper, we continue to investigate the second variation of Perelman's $\\nu$-entropy for compact shrinking Ricci solitons. In particular, we improve some of our previous work in \"H.-D. Cao and M. Zhu, Math. Ann. 353 (2012), No. 3, 747-763\" and the more recent work in \"M. Mansour and R. Asadollah, arXiv:2104.08343\" and obtain a necessary and sufficient condition for a compact shrinking Ricci soliton to be linearly stable. Our work also extends similar results of Hamilton, Ilmanen and the first author in \"arXiv:math.DG/0404165\" (see also \"H.-D. Cao and C. He, J. Reine Angew. Math. 2015 (2015), no. 709, 229-246.\") for positive Einstein manifolds to the compact shrinking Ricci soliton case.", "label": 0, "field": "math"} {"text": "Title: Bring Metric Functions into Diffusion Models\nAbstract: We introduce a Cascaded Diffusion Model (Cas-DM) that improves a Denoising Diffusion Probabilistic Model (DDPM) by effectively incorporating additional metric functions in training. Metric functions such as the LPIPS loss have been proven highly effective in consistency models derived from the score matching. However, for the diffusion counterparts, the methodology and efficacy of adding extra metric functions remain unclear. One major challenge is the mismatch between the noise predicted by a DDPM at each step and the desired clean image that the metric function works well on. To address this problem, we propose Cas-DM, a network architecture that cascades two network modules to effectively apply metric functions to the diffusion model training. The first module, similar to a standard DDPM, learns to predict the added noise and is unaffected by the metric function. The second cascaded module learns to predict the clean image, thereby facilitating the metric function computation. Experiment results show that the proposed diffusion model backbone enables the effective use of the LPIPS loss, leading to state-of-the-art image quality (FID, sFID, IS) on various established benchmarks.", "label": 0, "field": "cs"} {"text": "Title: Global well-posedness for the Cauchy problem of the Zakharov-Kuznetsov equation on cylindrical spaces\nAbstract: We prove that the Zakharov-Kuznetsov equation on cylindrical spaces is globally well-posed below the energy norm. As is known, local well-posedness below energy space was obtained by the first author. We adapt I-method to extend the solutions globally in time. Using modified energies, we obtain the polynomial bounds on the $H^s$ growth for the global solutions.", "label": 0, "field": "math"} {"text": "Title: Synchronized CTL over One-Counter Automata\nAbstract: We consider the model-checking problem of Synchronized Computation-Tree Logic (CTL+Sync) over One-Counter Automata (OCAs). CTL+Sync augments CTL with temporal operators that require several paths to satisfy properties in a synchronous manner, e.g., the property \"all paths should eventually see $p$ at the same time\". The model-checking problem for CTL+Sync over finite-state Kripke structures was shown to be in $\\mathsf{P}^{\\mathsf{NP}^{\\mathsf{NP}}}$. OCAs are labelled transition systems equipped with a non-negative counter that can be zero-tested. Thus, they induce infinite-state systems whose computation trees are not regular. The model-checking problem for CTL over OCAs was shown to be $\\mathsf{PSPACE}$-complete. We show that the model-checking problem for CTL+Sync over OCAs is decidable. However, the upper bound we give is non-elementary. We therefore proceed to study the problem for a central fragment of CTL+Sync, extending CTL with operators that require all paths to satisfy properties in a synchronous manner, and show that it is in $\\mathsf{EXP}^\\mathsf{NEXP}$ (and in particular in $\\mathsf{EXPSPACE}$), by exhibiting a certain \"segmented periodicity\" in the computation trees of OCAs.", "label": 0, "field": "cs"} {"text": "Title: Mitigating Procrastination in Crowdsourcing Via Efficient Scheduling Algorithm\nAbstract: Several works related to crowdsourcing have been proposed in the direction where the task executors are to perform the tasks within the stipulated deadlines. Though the deadlines are set, it may be a practical scenario that majority of the task executors submit the tasks as late as possible. This situation where the task executors may delay their task submission is termed as procrastination in behavioural economics. In many applications, these late submission of tasks may be problematic for task requesters. In literature, how to prevent this procrastination within the deadline is not addressed in crowdsourcing scenario. However, in a bipartite graph setting one procrastination aware scheduling is proposed but balanced job distribution in different slots (also termed as schedules) is not considered there. In this paper, a procrastination aware scheduling of jobs is proliferated by proposing an (randomized) algorithm in crowdsourcing scenario (also applicable in mobile and spatial crowdsourcing). Our algorithm ensures that balancing of jobs in different schedules are maintained. Our scheme is compared with the existing algorithm through extensive simulation and in terms of balancing effect, our proposed algorithm outperforms the existing one. Analytically it is shown that our proposed algorithm maintains the balanced distribution.", "label": 0, "field": "cs"} {"text": "Title: On wormholes in the moduli space of surfaces\nAbstract: We study a certain wormholing phenomenon that takes place in the Koll\\'ar--Shepherd-Barron--Alexeev (KSBA) compactification of the moduli space of surfaces of general type. It occurs because of the appearance of particular extremal P-resolutions in surfaces on the KSBA boundary. We state a general wormhole conjecture, and we prove it for a wide range of cases. At the end, we discuss some topological properties and open questions.", "label": 1, "field": "math"} {"text": "Title: TR-DETR: Task-Reciprocal Transformer for Joint Moment Retrieval and Highlight Detection\nAbstract: Video moment retrieval (MR) and highlight detection (HD) based on natural language queries are two highly related tasks, which aim to obtain relevant moments within videos and highlight scores of each video clip. Recently, several methods have been devoted to building DETR-based networks to solve both MR and HD jointly. These methods simply add two separate task heads after multi-modal feature extraction and feature interaction, achieving good performance. Nevertheless, these approaches underutilize the reciprocal relationship between two tasks. In this paper, we propose a task-reciprocal transformer based on DETR (TR-DETR) that focuses on exploring the inherent reciprocity between MR and HD. Specifically, a local-global multi-modal alignment module is first built to align features from diverse modalities into a shared latent space. Subsequently, a visual feature refinement is designed to eliminate query-irrelevant information from visual features for modal interaction. Finally, a task cooperation module is constructed to refine the retrieval pipeline and the highlight score prediction process by utilizing the reciprocity between MR and HD. Comprehensive experiments on QVHighlights, Charades-STA and TVSum datasets demonstrate that TR-DETR outperforms existing state-of-the-art methods. Codes are available at \\url{https://github.com/mingyao1120/TR-DETR}.", "label": 0, "field": "cs"} {"text": "Title: Integer Forcing-and-Forward Transceiver Design for MIMO Multi-Pair Two-Way Relaying\nAbstract: In this paper, we propose a new transmission scheme, named as Integer Forcing-and-Forward (IFF), for communications among multi-pair multiple-antenna users in which each pair exchanges their messages with the help of a single multi antennas relay in the multiple-access and broadcast phases. The proposed scheme utilizes Integer Forcing Linear Receiver (IFLR) at relay, which uses equations, i.e., linear integer-combinations of messages, to harness the intra-pair interference. Accordingly, we propose the design of mean squared error (MSE) based transceiver, including precoder and projection matrices for the relay and users, assuming that the perfect channel state information (CSI) is available. In this regards, in the multiple-access phase, we introduce two new MSE criteria for the related precoding and filter designs, i.e., the sum of the equations MSE (Sum-Equation MSE) and the maximum of the equations MSE (Max-Equation MSE), to exploit the equations in the relay. In addition, the convergence of the proposed criteria is proven as well. Moreover, in the broadcast phase, we use the two traditional MSE criteria, i.e. the sum of the users' mean squred errors (Sum MSE) and the maximum of the users' mean squared errors (Max MSE), to design the related precoding and filters for recovering relay's equations by the users. Then, we consider a more practical scenario with imperfect CSI. For this case, IFLR receiver is modified, and another transceiver design is proposed, which take into account the effect of channels estimation error. We evaluate the performance of our proposed strategy and compare the results with the conventional amplify-and-forward (AF) and denoise-and-forward (DF) strategies for the same scenario. The results indicate the substantial superiority of the proposed strategy in terms of the outage probability and the sum rate.", "label": 1, "field": "cs"} {"text": "Title: Homological properties of the relative Frobenius morphism\nAbstract: This work concerns maps of commutative noetherian local rings containing a field of positive characteristic. Given such a map $\\varphi$ of finite flat dimension, the results relate homological properties of the relative Frobenius of $\\varphi$ to those of the fibers of $\\varphi$. The focus is on the complete intersection property and the Gorenstein property.", "label": 0, "field": "math"} {"text": "Title: A Truthful Referral Auction Over Networks\nAbstract: This paper studies a mechanism design problem over a network, where agents can only participate by referrals. The Bulow-Klemberer theorem proposes that expanding the number of participants is a more effective approach to increase revenue than modifying the auction format. However, agents lack the motivation to invite others because doing so intensifies competition among them. On the other hand, misreporting social networks is also a common problem that can reduce revenue. Examples of misreporting include Sybil attacks (an agent pretending to be multiple bidders) and coalition groups (multiple agents pretending to be an agent). To address these challenges, we introduce a novel mechanism called the Truthful Referral Diffusion Mechanism (TRDM). TRDM incentivizes agents to report their social networks truthfully, and some of them are rewarded by the seller for improving revenue. In spite of the fact that some agents overbid in TRDM, the revenue is fixed, and it is higher than the revenue of any mechanism without referrals. TRDM is budget-balanced (non-negative revenue) and generates an efficient outcome (maximized social welfare), making it attractive for both the seller and the buyers as it improves revenue and reward.", "label": 1, "field": "cs"} {"text": "Title: LLaVA-$\u03c6$: Efficient Multi-Modal Assistant with Small Language Model\nAbstract: In this paper, we introduce LLaVA-$\\phi$ (LLaVA-Phi), an efficient multi-modal assistant that harnesses the power of the recently advanced small language model, Phi-2, to facilitate multi-modal dialogues. LLaVA-Phi marks a notable advancement in the realm of compact multi-modal models. It demonstrates that even smaller language models, with as few as 2.7B parameters, can effectively engage in intricate dialogues that integrate both textual and visual elements, provided they are trained with high-quality corpora. Our model delivers commendable performance on publicly available benchmarks that encompass visual comprehension, reasoning, and knowledge-based perception. Beyond its remarkable performance in multi-modal dialogue tasks, our model opens new avenues for applications in time-sensitive environments and systems that require real-time interaction, such as embodied agents. It highlights the potential of smaller language models to achieve sophisticated levels of understanding and interaction, while maintaining greater resource efficiency.The project is available at {https://github.com/zhuyiche/llava-phi}.", "label": 0, "field": "cs"} {"text": "Title: Asymptotically Optimal Proper Conflict-Free Colouring\nAbstract: A proper conflict-free colouring of a graph is a colouring of the vertices such that any two adjacent vertices receive different colours, and for every non-isolated vertex $v$, some colour appears exactly once on the neighbourhood of $v$. Caro, Petru\\v{s}evski and \\v{S}krekovski conjectured that every connected graph with maximum degree $\\Delta \\geq 3$ has a proper conflict-free colouring with at most $\\Delta+1$ colours. This conjecture holds for $\\Delta=3$ and remains open for $\\Delta \\geq 4$. In this paper we prove that this conjecture holds asymptotically; namely, every graph with maximum degree $\\Delta$ has a proper conflict-free colouring with $(1+o(1))\\Delta$ colours.", "label": 0, "field": "math"} {"text": "Title: Extreme statistics of non-intersecting Brownian paths\nAbstract: We consider finite collections of $N$ non-intersecting Brownian paths on the line and on the half-line with both absorbing and reflecting boundary conditions (corresponding to Brownian excursions and reflected Brownian motions) and compute in each case the joint distribution of the maximal height of the top path and the location at which this maximum is attained. The resulting formulas are analogous to the ones obtained in [MFQR13] for the joint distribution of $\\mathcal{M}={\\rm max}_{x\\in\\mathbb{R}}\\{\\mathcal{A}_2(x)-x^2\\}$ and $\\mathcal{T}={\\rm argmax}_{x\\in\\mathbb{R}}\\{\\mathcal{A}_2(x)-x^2\\}$, where $\\mathcal{A}_2$ is the Airy$_2$ process, and we use them to show that in the three cases the joint distribution converges, as $N\\to\\infty$, to the joint distribution of $\\mathcal{M}$ and $\\mathcal{T}$. In the case of non-intersecting Brownian bridges on the line, we also establish small deviation inequalities for the argmax which match the tail behavior of $\\mathcal{T}$. Our proofs are based on the method introduced in [CQR13,BCR15] for obtaining formulas for the probability that the top line of these line ensembles stays below a given curve, which are given in terms of the Fredholm determinant of certain \"path-integral\" kernels.", "label": 1, "field": "math"} {"text": "Title: Convergence of Stochastic Gradient Descent for PCA\nAbstract: We consider the problem of principal component analysis (PCA) in a streaming stochastic setting, where our goal is to find a direction of approximate maximal variance, based on a stream of i.i.d. data points in $\\reals^d$. A simple and computationally cheap algorithm for this is stochastic gradient descent (SGD), which incrementally updates its estimate based on each new data point. However, due to the non-convex nature of the problem, analyzing its performance has been a challenge. In particular, existing guarantees rely on a non-trivial eigengap assumption on the covariance matrix, which is intuitively unnecessary. In this paper, we provide (to the best of our knowledge) the first eigengap-free convergence guarantees for SGD in the context of PCA. This also partially resolves an open problem posed in \\cite{hardt2014noisy}. Moreover, under an eigengap assumption, we show that the same techniques lead to new SGD convergence guarantees with better dependence on the eigengap.", "label": 1, "field": "cs"} {"text": "Title: Politics and Propaganda on Social Media: How Twitter and Meta Moderate State-Linked Information Operations\nAbstract: Why do Social Media Corporations (SMCs) engage in state-linked information operations? Social media can significantly influence the global political landscape, allowing governments and other political entities to engage in concerted information operations, shaping or manipulating domestic and foreign political agendas. In response to state-linked political manipulation tactics on social media, Twitter and Meta carried out take-down operations against propaganda networks, accusing them of interfering foreign elections, organizing disinformation campaigns, manipulating political debates and many other issues. This research investigates the two SMCs' policy orientation to explain which factors can affect these two companies' reaction against state-linked information operations. We find that good governance indicators such as democracy are significant elements of SMCs' country-focus. This article also examines whether Meta and Twitter's attention to political regime characteristics is influenced by international political alignments. This research illuminates recent trends in SMCs' take-down operations and illuminating interplay between geopolitics and domestic regime characteristics.", "label": 0, "field": "cs"} {"text": "Title: Self-similar solutions with fat tails for Smoluchowski's coagulation equation with singular kernels\nAbstract: We show the existence of self-similar solutions with fat tails for Smoluchowski's coagulation equation for homogeneous kernels satisfying $C_1 \\left(x^{-a}y^{b}+x^{b}y^{-a}\\right)\\leq K\\left(x,y\\right)\\leq C_2\\left(x^{-a}y^{b}+x^{b}y^{-a}\\right)$ with $a>0$ and $b<1$. This covers especially the case of Smoluchowski's classical kernel $K(x,y)=(x^{1/3} + y^{1/3})(x^{-1/3} + y^{-1/3})$. For the proof of existence we first consider some regularized kernel $K_{\\epsilon}$ for which we construct a sequence of solutions $h_{\\epsilon}$. In a second step we pass to the limit $\\epsilon\\to 0$ to obtain a solution for the original kernel $K$. The main difficulty is to establish a uniform lower bound on $h_{\\epsilon}$. The basic idea for this is to consider the time-dependent problem and choosing a special test function that solves the dual problem.", "label": 1, "field": "math"} {"text": "Title: H\u00f6rmander properties of discrete time Markov processes\nAbstract: We present an abstract framework for establishing smoothing properties within a specific class of inhomogeneous discrete-time Markov processes. These properties, in turn, serve as a basis for demonstrating the existence of a density function for our process or more precisely for a regularized version of it. They can also be exploited to show its total variation convergence towards the solution of a Stochastic Differential Equation as the time step between two observations of our discrete time Markov process tends to zero. The distinctive feature of our methodology lies in the exploration of smoothing properties under a local weak H\\\"ormander type condition satisfied by the discrete-time Markov process. Our H\\\"ormander property is demonstrated to align with the standard local weak H\\\"ormander associated to the Stochastic Differential Equation which is the total variation limit of our discrete time Markov process.", "label": 0, "field": "math"} {"text": "Title: ChartAssisstant: A Universal Chart Multimodal Language Model via Chart-to-Table Pre-training and Multitask Instruction Tuning\nAbstract: Charts play a vital role in data visualization, understanding data patterns, and informed decision-making. However, their unique combination of graphical elements (e.g., bars, lines) and textual components (e.g., labels, legends) poses challenges for general-purpose multimodal models. While vision-language models trained on chart data excel in comprehension, they struggle with generalization and require task-specific fine-tuning. To address these challenges, we propose ChartAssistant, a chart-based vision-language model for universal chart comprehension and reasoning. ChartAssistant leverages ChartSFT, a comprehensive dataset covering diverse chart-related tasks with basic and specialized chart types. It undergoes a two-stage training process, starting with pre-training on chart-to-table parsing to align chart and text, followed by multitask instruction-following fine-tuning. This approach enables ChartAssistant to achieve competitive performance across various chart tasks without task-specific fine-tuning. Experimental results demonstrate significant performance gains over the state-of-the-art UniChart method, outperforming OpenAI's GPT-4V(ision) on real-world chart data. The code and data are available at https://github.com/OpenGVLab/ChartAst.", "label": 0, "field": "cs"} {"text": "Title: Regular polygraphs and the Simpson conjecture\nAbstract: We prove Carlos Simpson's \"semi-strictification\" (or \"weak unit\") conjecture in the case of infinity-groupoids. More precisely, we introduce two precise versions of the conjecture, the \"general\" and the \"regular\" conjecture, involving two different notions of \"non-unital categories\". The \"general\" version involve infinity-categories where absolutely all composition operations (horizontal, vertical and whiskering) are defined and compatible, the \"regular\" version involve infinity-categories where all the composition operations corresponding to \"regular\" pasting diagram are defined and compatible. In both case we construct (weak) model structures on these categories such that fibrant objects have weak units and weak inverse. We prove the regular version of the conjecture using the original strategy of Kapranov and Voevodsky, together with our previous work on polygraphs. The general version cannot be proved by these methods and is still open. In order to do this we also study some subtle property of the combinatorics of polygraphs, and we construct a new counting function for polygraphs, inspired by previous work of Makkai.", "label": 1, "field": "math"} {"text": "Title: Derivatives of symplectic eigenvalues and a Lidskii type theorem\nAbstract: Associated with every $2n\\times 2n$ real positive definite matrix $A,$ there exist $n$ positive numbers called the symplectic eigenvalues of $A,$ and a basis of $\\mathbb{R}^{2n}$ called the symplectic eigenbasis of $A$ corresponding to these numbers. In this paper, we discuss the differentiability (analyticity) of the symplectic eigenvalues and corresponding symplectic eigenbasis for differentiable (analytic) map $t\\mapsto A(t),$ and compute their derivatives. We then derive an analogue of Lidskii's theorem for symplectic eigenvalues as an application.", "label": 1, "field": "math"} {"text": "Title: Shrinking unit: a Graph Convolution-Based Unit for CNN-like 3D Point Cloud Feature Extractors\nAbstract: 3D point clouds have attracted increasing attention in architecture, engineering, and construction due to their high-quality object representation and efficient acquisition methods. Consequently, many point cloud feature detection methods have been proposed in the literature to automate some workflows, such as their classification or part segmentation. Nevertheless, the performance of point cloud automated systems significantly lags behind their image counterparts. While part of this failure stems from the irregularity, unstructuredness, and disorder of point clouds, which makes the task of point cloud feature detection significantly more challenging than the image one, we argue that a lack of inspiration from the image domain might be the primary cause of such a gap. Indeed, given the overwhelming success of Convolutional Neural Networks (CNNs) in image feature detection, it seems reasonable to design their point cloud counterparts, but none of the proposed approaches closely resembles them. Specifically, even though many approaches generalise the convolution operation in point clouds, they fail to emulate the CNNs multiple-feature detection and pooling operations. For this reason, we propose a graph convolution-based unit, dubbed Shrinking unit, that can be stacked vertically and horizontally for the design of CNN-like 3D point cloud feature extractors. Given that self, local and global correlations between points in a point cloud convey crucial spatial geometric information, we also leverage them during the feature extraction process. We evaluate our proposal by designing a feature extractor model for the ModelNet-10 benchmark dataset and achieve 90.64% classification accuracy, demonstrating that our innovative idea is effective. Our code is available at github.com/albertotamajo/Shrinking-unit.", "label": 1, "field": "cs"} {"text": "Title: On the use of the M-quantiles for outlier detection in multivariate data\nAbstract: Defining a successful notion of a multivariate quantile has been an open problem for more than half a century, motivating a plethora of possible solutions. Of these, the approach of [8] and [25] leading to M-quantiles, is very appealing for its mathematical elegance combining elements of convex analysis and probability theory. The key idea is the description of a convex function (the K-function) whose gradient (the K-transform) is in one-to-one correspondence between all of R^d and the unit ball in R^d. By analogy with the d=1 case where the K-transform is a cumulative distribution function-like object (an M-distribution), the fact that its inverse is guaranteed to exist lends itself naturally to providing the basis for the definition of a quantile function for all d>=1. Over the past twenty years the resulting M-quantiles have seen applications in a variety of fields, primarily for the purpose of detecting outliers in multidimensional spaces. In this article we prove that for odd d>=3, it is not the gradient but a poly-Laplacian of the K-function that is (almost everywhere) proportional to the density function. For d even one cannot establish a differential equation connecting the K-function with the density. These results show that usage of the K-transform for outlier detection in higher odd-dimensions is in principle flawed, as the K-transform does not originate from inversion of a true M-distribution. We demonstrate these conclusions in two dimensions through examples from non-standard asymmetric distributions. Our examples illustrate a feature of the K-transform whereby regions in the domain with higher density map to larger volumes in the co-domain, thereby producing a magnification effect that moves inliers closer to the boundary of the co-domain than outliers. This feature obviously disrupts any outlier detection mechanism that relies on the inverse K-transform.", "label": 0, "field": "math"} {"text": "Title: Multi-Auxiliary Augmented Collaborative Variational Auto-encoder for Tag Recommendation\nAbstract: Recommending appropriate tags to items can facilitate content organization, retrieval, consumption and other applications, where hybrid tag recommender systems have been utilized to integrate collaborative information and content information for better recommendations. In this paper, we propose a multi-auxiliary augmented collaborative variational auto-encoder (MA-CVAE) for tag recommendation, which couples item collaborative information and item multi-auxiliary information, i.e., content and social graph, by defining a generative process. Specifically, the model learns deep latent embeddings from different item auxiliary information using variational auto-encoders (VAE), which could form a generative distribution over each auxiliary information by introducing a latent variable parameterized by deep neural network. Moreover, to recommend tags for new items, item multi-auxiliary latent embeddings are utilized as a surrogate through the item decoder for predicting recommendation probabilities of each tag, where reconstruction losses are added in the training phase to constrict the generation for feedback predictions via different auxiliary embeddings. In addition, an inductive variational graph auto-encoder is designed where new item nodes could be inferred in the test phase, such that item social embeddings could be exploited for new items. Extensive experiments on MovieLens and citeulike datasets demonstrate the effectiveness of our method.", "label": 1, "field": "cs"} {"text": "Title: Remarks on the point character of Banach spaces and non-linear embeddings into~$c_0(\\Ga)$\nAbstract: We give a brief survey of the results on coarse or uniform embeddings of Banach spaces into $c_0(\\Ga)$ and the point character of Banach spaces. In the process we prove several new results in this direction (for example we determine the point character of the spaces $L_p(\\mu)$, $1\\le p\\le2$) solving open problems posed by C.~Avart, P.~Komjath, and V.~Roedl and by G.~Godefroy, G.~Lancien, and V.~Zizler. In particular, we show that $X=L_p(\\mu)$, $1\\le p<\\infty$, bi-Lipschitz embeds into $c_0(\\Ga)$ if and only if $\\dens X<\\om_\\om$.", "label": 0, "field": "math"} {"text": "Title: A Soft Recommender System for Social Networks\nAbstract: Recent social recommender systems benefit from friendship graph to make an accurate recommendation, believing that friends in a social network have exactly the same interests and preferences. Some studies have benefited from hard clustering algorithms (such as K-means) to determine the similarity between users and consequently to define degree of friendships. In this paper, we went a step further to identify true friends for making even more realistic recommendations. we calculated the similarity between users, as well as the dependency between a user and an item. Our hypothesis is that due to the uncertainties in user preferences, the fuzzy clustering, instead of the classical hard clustering, is beneficial in accurate recommendations. We incorporated the C-means algorithm to get different membership degrees of soft users' clusters. Then, the users' similarity metric is defined according to the soft clusters. Later, in a training scheme we determined the latent representations of users and items, extracting from the huge and sparse user-item-tag matrix using matrix factorization. In the parameter tuning, we found the optimum coefficients for the influence of our soft social regularization and the user-item dependency terms. Our experimental results convinced that the proposed fuzzy similarity metric improves the recommendations in real data compared to the baseline social recommender system with the hard clustering.", "label": 1, "field": "cs"} {"text": "Title: Energy Identity for Stationary Harmonic Maps\nAbstract: In this paper we consider sequences $u_j:B_2\\subseteq M\\to N$ of stationary harmonic maps between smooth Riemannian manifolds with uniformly bounded energy $E[u_j]\\equiv \\int |\\nabla u_j|^2\\leq \\Lambda$ . After passing to a subsequence it is known one can limit $u_j\\to u:B_1\\to N$ with the associated defect measure $|\\nabla u_j|^2 dv_g \\to |\\nabla u|^2dv_g+\\nu$, where $\\nu = e(x)\\, H^{m-2}_S$ is an $m-2$ rectifiable measure \\cite{lin_stat}. For a.e. $x\\in S=\\operatorname{supp}(\\nu)$ one can produce a finite number of bubble maps $b_j:S^2\\to N$ by blowing up the sequence $u_j$ near $x$. We prove the energy identity in this paper. Namely, we have at a.e. $x\\in S$ that $e(x)=\\sum_j E[b_j]$ for a complete set of such bubbles. That is, the energy density of the defect measure $\\nu$ is precisely the sum of the energies of the bubbling maps.", "label": 0, "field": "math"} {"text": "Title: InstructTA: Instruction-Tuned Targeted Attack for Large Vision-Language Models\nAbstract: Large vision-language models (LVLMs) have demonstrated their incredible capability in image understanding and response generation. However, this rich visual interaction also makes LVLMs vulnerable to adversarial examples. In this paper, we formulate a novel and practical gray-box attack scenario that the adversary can only access the visual encoder of the victim LVLM, without the knowledge of its prompts (which are often proprietary for service providers and not publicly available) and its underlying large language model (LLM). This practical setting poses challenges to the cross-prompt and cross-model transferability of targeted adversarial attack, which aims to confuse the LVLM to output a response that is semantically similar to the attacker's chosen target text. To this end, we propose an instruction-tuned targeted attack (dubbed InstructTA) to deliver the targeted adversarial attack on LVLMs with high transferability. Initially, we utilize a public text-to-image generative model to \"reverse\" the target response into a target image, and employ GPT-4 to infer a reasonable instruction $\\boldsymbol{p}^\\prime$ from the target response. We then form a local surrogate model (sharing the same visual encoder with the victim LVLM) to extract instruction-aware features of an adversarial image example and the target image, and minimize the distance between these two features to optimize the adversarial example. To further improve the transferability, we augment the instruction $\\boldsymbol{p}^\\prime$ with instructions paraphrased from an LLM. Extensive experiments demonstrate the superiority of our proposed method in targeted attack performance and transferability.", "label": 0, "field": "cs"} {"text": "Title: Sampling probabilities, diffusions, ancestral graphs, and duality under strong selection\nAbstract: Wright-Fisher diffusions and their dual ancestral graphs occupy a central role in the study of allele frequency change and genealogical structure, and they provide expressions, explicit in some special cases but generally implicit, for the sampling probability, a crucial quantity in inference. Under a finite-allele mutation model, with possibly parent-dependent mutation, we consider the asymptotic regime where the selective advantage of one allele grows to infinity, while the other parameters remain fixed. In this regime, we show that the Wright-Fisher diffusion can be approximated either by a Gaussian process or by a process whose components are independent continuous-state branching processes with immigration, aligning with analogous results for Wright-Fisher models but employing different methods. While the first process becomes degenerate at stationarity, the latter does not and provides a simple, analytic approximation for the leading term of the sampling probability. Furthermore, using another approach based on a recursion formula, we characterise all remaining terms to provide a full asymptotic expansion for the sampling probability. Finally, we study the asymptotic behaviour of the rates of the block-counting process of the conditional ancestral selection graph and establish an asymptotic duality relationship between this and the diffusion.", "label": 0, "field": "math"} {"text": "Title: HEAP: Unsupervised Object Discovery and Localization with Contrastive Grouping\nAbstract: Unsupervised object discovery and localization aims to detect or segment objects in an image without any supervision. Recent efforts have demonstrated a notable potential to identify salient foreground objects by utilizing self-supervised transformer features. However, their scopes only build upon patch-level features within an image, neglecting region/image-level and cross-image relationships at a broader scale. Moreover, these methods cannot differentiate various semantics from multiple instances. To address these problems, we introduce Hierarchical mErging framework via contrAstive grouPing (HEAP). Specifically, a novel lightweight head with cross-attention mechanism is designed to adaptively group intra-image patches into semantically coherent regions based on correlation among self-supervised features. Further, to ensure the distinguishability among various regions, we introduce a region-level contrastive clustering loss to pull closer similar regions across images. Also, an image-level contrastive loss is present to push foreground and background representations apart, with which foreground objects and background are accordingly discovered. HEAP facilitates efficient hierarchical image decomposition, which contributes to more accurate object discovery while also enabling differentiation among objects of various classes. Extensive experimental results on semantic segmentation retrieval, unsupervised object discovery, and saliency detection tasks demonstrate that HEAP achieves state-of-the-art performance.", "label": 0, "field": "cs"} {"text": "Title: The Drinfel'd Double and Twisting in Stringy Orbifold Theory\nAbstract: This paper exposes the fundamental role that the Drinfel'd double $\\dkg$ of the group ring of a finite group $G$ and its twists $\\dbkg$, $\\beta \\in Z^3(G,\\uk)$ as defined by Dijkgraaf--Pasquier--Roche play in stringy orbifold theories and their twistings. The results pertain to three different aspects of the theory. First, we show that $G$--Frobenius algebras arising in global orbifold cohomology or K-theory are most naturally defined as elements in the braided category of $\\dkg$--modules. Secondly, we obtain a geometric realization of the Drinfel'd double as the global orbifold $K$--theory of global quotient given by the inertia variety of a point with a $G$ action on the one hand and more stunningly a geometric realization of its representation ring in the braided category sense as the full $K$--theory of the stack $[pt/G]$. Finally, we show how one can use the co-cycles $\\beta$ above to twist a) the global orbifold $K$--theory of the inertia of a global quotient and more importantly b) the stacky $K$--theory of a global quotient $[X/G]$. This corresponds to twistings with a special type of 2--gerbe.", "label": 1, "field": "math"} {"text": "Title: To Save Mobile Crowdsourcing from Cheap-talk: A Game Theoretic Learning Approach\nAbstract: Today mobile crowdsourcing platforms invite users to provide anonymous reviews about service experiences, yet many reviews are found biased to be extremely positive or negative. The existing methods find it difficult to learn from biased reviews to infer the actual service state, as the state can also be extreme and the platform cannot verify the truthfulness of reviews immediately. Further, reviewers can hide their (positive or negative) bias types and proactively adjust their anonymous reviews against the platform's inference. To our best knowledge, we are the first to study how to save mobile crowdsourcing from cheap-talk and strategically learn from biased users' reviews. We formulate the problem as a dynamic Bayesian game, including users' service-type messaging and the platform's follow-up rating/inference. Our closed-form PBE shows that an extremely-biased user may still honestly message to convince the platform of listening to his review. Such Bayesian game-theoretic learning obviously outperforms the latest common schemes especially when there are multiple diversely-biased users to compete. For the challenging single-user case, we further propose a time-evolving mechanism with the platform's commitment inferences to ensure the biased user's truthful messaging all the time, whose performance improves with more time periods to learn from more historical data.", "label": 0, "field": "cs"} {"text": "Title: Pursuing the double affine Grassmannian III: Convolution with affine Zastava\nAbstract: This is the third paper of a series (started by arXiv:0711.2083, arXiv:0908.3390) which describes a conjectural analog of the affine Grassmannian for affine Kac-Moody groups (also known as the double affine Grassmannian). The current paper is dedicated to describing a conjectural analog of the convolution diagram for the double affine Grassmannian and affine Zastava.", "label": 1, "field": "math"} {"text": "Title: Enumerating m-Length Walks in Directed Graphs with Constant Delay\nAbstract: In this paper, we provide a novel enumeration algorithm for the set of all walks of a given length within a directed graph. Our algorithm has worst-case constant delay between outputting succinct representations of such walks, after a preprocessing step requiring linear time relative to the size of the graph. We apply these results to the problem of enumerating succinct representations of the strings of a given length from a prefix-closed regular language (languages accepted by a finite automaton which has final states only).", "label": 0, "field": "cs"} {"text": "Title: Global Well-posedness for 2D non-resistive MHD equations in half-space\nAbstract: This paper focuses on the initial boundary value problem of two-dimensional non-resistive MHD equations in a half space. We prove that the MHD equations have a unique global strong solution around the equilibrium state $(0,\\bf{e_1})$ for Dirichlet boundary condition of velocity and modified Neumann boundary condition of magnetic.", "label": 0, "field": "math"} {"text": "Title: Calderon-Zygmund theory for strongly coupled linear system of nonlocal equations with Holder-regular coefficient\nAbstract: We extend the Calder\\'on-Zygmund theory for nonlocal equations to strongly coupled system of linear nonlocal equations $\\mathcal{L}^{s}_{A} u = f$, where the operator $\\mathcal{L}^{s}_{A}$ is formally given by \\[ \\mathcal{L}^s_{A}u = \\int_{\\mathbb{R}^n}\\frac{A(x, y)}{\\vert x-y\\vert ^{n+2s}} \\frac{(x-y)\\otimes (x-y)}{\\vert x-y\\vert ^2}(u(x)-u(y))dy. \\] For $0 < s < 1$ and $A:\\mathbb{R}^{n} \\times \\mathbb{R}^{n} \\to \\mathbb{R}$ taken to be symmetric and serving as a variable coefficient for the operator, the system under consideration is the fractional version of the classical Navier-Lam\\'e linearized elasticity system. The study of the coupled system of nonlocal equations is motivated by its appearance in nonlocal mechanics, primarily in peridynamics. Our regularity result states that if $A(\\cdot, y)$ is uniformly Holder continuous and $\\inf_{x\\in \\mathbb{R}^n}A(x, x) > 0$, then for $f\\in L^{p}_{loc},$ for $p\\geq 2$, the solution vector $u\\in H^{2s-\\delta,p}_{loc}$ for some $\\delta\\in (0, s)$.", "label": 0, "field": "math"} {"text": "Title: Ramsey properties of random graphs and Folkman numbers\nAbstract: For two graphs, $G$ and $F$, and an integer $r\\ge2$ we write $G\\rightarrow (F)_r$ if every $r$-coloring of the edges of $G$ results in a monochromatic copy of $F$. In 1995, the first two authors established a threshold edge probability for the Ramsey property $G(n,p)\\to (F)_r$, where $G(n,p)$ is a random graph obtained by including each edge of the complete graph on $n$ vertices, independently, with probability $p$. The original proof was based on the regularity lemma of Szemer\\'edi and this led to tower-type dependencies between the involved parameters. Here, for $r=2$, we provide a self-contained proof of a quantitative version of the Ramsey threshold theorem with only double exponential dependencies between the constants. As a corollary we obtain a double exponential upper bound on the 2-color Folkman numbers. By a different proof technique, a similar result was obtained independently by Conlon and Gowers.", "label": 1, "field": "math"} {"text": "Title: Learning to Generalize towards Unseen Domains via a Content-Aware Style Invariant Model for Disease Detection from Chest X-rays\nAbstract: Performance degradation due to distribution discrepancy is a longstanding challenge in intelligent imaging, particularly for chest X-rays (CXRs). Recent studies have demonstrated that CNNs are biased toward styles (e.g., uninformative textures) rather than content (e.g., shape), in stark contrast to the human vision system. Radiologists tend to learn visual cues from CXRs and thus perform well across multiple domains. Motivated by this, we employ the novel on-the-fly style randomization modules at both image (SRM-IL) and feature (SRM-FL) levels to create rich style perturbed features while keeping the content intact for robust cross-domain performance. Previous methods simulate unseen domains by constructing new styles via interpolation or swapping styles from existing data, limiting them to available source domains during training. However, SRM-IL samples the style statistics from the possible value range of a CXR image instead of the training data to achieve more diversified augmentations. Moreover, we utilize pixel-wise learnable parameters in the SRM-FL compared to pre-defined channel-wise mean and standard deviations as style embeddings for capturing more representative style features. Additionally, we leverage consistency regularizations on global semantic features and predictive distributions from with and without style-perturbed versions of the same CXR to tweak the model's sensitivity toward content markers for accurate predictions. Our proposed method, trained on CheXpert and MIMIC-CXR datasets, achieves 77.32$\\pm$0.35, 88.38$\\pm$0.19, 82.63$\\pm$0.13 AUCs(%) on the unseen domain test datasets, i.e., BRAX, VinDr-CXR, and NIH chest X-ray14, respectively, compared to 75.56$\\pm$0.80, 87.57$\\pm$0.46, 82.07$\\pm$0.19 from state-of-the-art models on five-fold cross-validation with statistically significant results in thoracic disease classification.", "label": 0, "field": "cs"} {"text": "Title: Higher Descent Data as a Homotopy Limit\nAbstract: We define the 2-groupoid of descent data assigned to a cosimplicial 2-groupoid and present it as the homotopy limit of the cosimplicial space gotten after applying the 2-nerve in each cosimplicial degree. This can be applied also to the case of $n$-groupoids thus providing an analogous presentation of \"descent data\" in higher dimensions.", "label": 1, "field": "math"} {"text": "Title: An alternative approach to large deviations for the almost-critical Erd\u0151s-R\u00e9nyi random graph\nAbstract: We study the near-critical behavior of the sparse Erd\\H{o}s-R\\'enyi random graph $\\mathcal{G}(n,p)$ on $n\\gg1$ vertices, where the connection probability $p$ satisfies $np = 1+\\theta(b_n^2/n)^{1/3}$, with $n^{3/10}\\ll {b_n}\\ll n^{1/2}$, and $\\theta\\in\\mathbb{R}$. To this end, we introduce an empirical measure that describes connected components of $\\mathcal{G}(n,p)$ of mesoscopic size $\\propto (nb_n)^{2/3}$, and we characterize its large deviation behavior. The proof hinges on detailed combinatorial estimates and optimization procedures. In particular, we give precise estimates for the probability that the graph has no connected component of mesoscopic size or larger. We argue that these are a stepping stone for the analysis of more general inhomogeneous random graphs. Our proof strategy gives new and accurate estimates of the probability that the sparse Erd\\H{o}s-R\\'enyi graph is connected.", "label": 0, "field": "math"} {"text": "Title: How to Apply Markov Chains for Modeling Sequential Edit Patterns in Collaborative Ontology-Engineering Projects\nAbstract: With the growing popularity of large-scale collaborative ontology-engineering projects, such as the creation of the 11th revision of the International Classification of Diseases, we need new methods and insights to help project- and community-managers to cope with the constantly growing complexity of such projects. In this paper, we present a novel application of Markov chains to model sequential usage patterns that can be found in the change-logs of collaborative ontology-engineering projects. We provide a detailed presentation of the analysis process, describing all the required steps that are necessary to apply and determine the best fitting Markov chain model. Amongst others, the model and results allow us to identify structural properties and regularities as well as predict future actions based on usage sequences. We are specifically interested in determining the appropriate Markov chain orders which postulate on how many previous actions future ones depend on. To demonstrate the practical usefulness of the extracted Markov chains we conduct sequential pattern analyses on a large-scale collaborative ontology-engineering dataset, the International Classification of Diseases in its 11th revision. To further expand on the usefulness of the presented analysis, we show that the collected sequential patterns provide potentially actionable information for user-interface designers, ontology-engineering tool developers and project-managers to monitor, coordinate and dynamically adapt to the natural development processes that occur when collaboratively engineering an ontology. We hope that presented work will spur a new line of ontology-development tools, evaluation-techniques and new insights, further taking the interactive nature of the collaborative ontology-engineering process into consideration.", "label": 1, "field": "cs"} {"text": "Title: Jumping numbers of a unibranch curve on a smooth surface\nAbstract: A formula for the jumping numbers of a curve unibranch at a singular point is established. The jumping numbers are expressed in terms of the Enriques diagram of the log resolution of the singularity, or equivalently in terms of the canonical set of generators of the semigroup of the curve at the singular point.", "label": 1, "field": "math"} {"text": "Title: Generalizations of quasielliptic curves\nAbstract: We generalize the notion of quasielliptic curves, which have infinitesimal symmetries and exist only in characteristic two and three, to a remarkable hierarchy of regular curves having infinitesimal symmetries, defined in all characteristics and having higher genera. This relies on the study of certain infinitesimal group schemes acting on the affine line and certain compactifications. The group schemes are defined in terms of invertible additive polynomials over rings with nilpotent elements, and the compactification is constructed with the theory of numerical semigroups. The existence of regular twisted forms relies on Brion's recent theory of equivariant normalization. Furthermore, extending results of Serre from the realm of group cohomology, we describe non-abelian cohomology for semidirect products, to compute in special cases the collection of all twisted forms.", "label": 0, "field": "math"} {"text": "Title: Minimal surfaces with symmetries\nAbstract: Let $G$ be a finite group acting on a connected open Riemann surface $X$ by holomorphic automorphisms and acting on a Euclidean space $\\mathbb R^n$ $(n\\ge 3)$ by orthogonal transformations. We identify a necessary and sufficient condition for the existence of a $G$-equivariant conformal minimal immersion $F:X\\to\\mathbb R^n$. We show in particular that such a map $F$ always exists if $G$ acts without fixed points on $X$. Furthermore, every finite group $G$ arises in this way for some open Riemann surface $X$ and $n=2|G|$. We obtain an analogous result for minimal surfaces having complete ends with finite total Gaussian curvature, and for discrete infinite groups acting on $X$ properly discontinuously and acting on $\\mathbb R^n$ by rigid transformations.", "label": 0, "field": "math"} {"text": "Title: The bridge number of satellite knots, links, and spatial graphs in the 3-sphere and lens spaces\nAbstract: Let $T$ be a satellite knot, link, or spatial graph in a 3-manifold $M$ that is either $S^3$ or a lens space. Let $b_0$ and $b_1$ denote genus 0 and genus 1 bridge number, respectively. Suppose that $T$ has a companion knot $K$ and wrapping number $\\omega$ with respect to $K$. When $K$ is not a torus knot, we show that $b_1(T)\\geq \\omega b_1(K)$. There are previously known counter-examples if $K$ is a torus knot. Along the way, we generalize and give a new proof of Schubert's result that $b_0(T) \\geq \\omega b_0(K)$. We also prove versions of the theorem applicable to when $T$ is a ``lensed satellite'' or when there is a torus separating components of $T$.", "label": 0, "field": "math"} {"text": "Title: To Push or To Pull: On Reducing Communication and Synchronization in Graph Computations\nAbstract: We reduce the cost of communication and synchronization in graph processing by analyzing the fastest way to process graphs: pushing the updates to a shared state or pulling the updates to a private state.We investigate the applicability of this push-pull dichotomy to various algorithms and its impact on complexity, performance, and the amount of used locks, atomics, and reads/writes. We consider 11 graph algorithms, 3 programming models, 2 graph abstractions, and various families of graphs. The conducted analysis illustrates surprising differences between push and pull variants of different algorithms in performance, speed of convergence, and code complexity; the insights are backed up by performance data from hardware counters.We use these findings to illustrate which variant is faster for each algorithm and to develop generic strategies that enable even higher speedups. Our insights can be used to accelerate graph processing engines or libraries on both massively-parallel shared-memory machines as well as distributed-memory systems.", "label": 1, "field": "cs"} {"text": "Title: How Do Pedestrians' Perception Change toward Autonomous Vehicles during Unmarked Midblock Multilane Crossings: Role of AV Operation and Signal Indication\nAbstract: One of the primary impediments hindering the widespread acceptance of autonomous vehicles (AVs) among pedestrians is their limited comprehension of AVs. This study employs virtual reality (VR) to provide pedestrians with an immersive environment for engaging with and comprehending AVs during unmarked midblock multilane crossings. Diverse AV driving behaviors were modeled to exhibit negotiation behavior with a yellow signal indication or non-yielding behavior with a blue signal indication. This paper aims to investigate the impact of various factors, such as AV behavior and signaling, pedestrian past behavior, etc., on pedestrians' perception change of AVs. Before and after the VR experiment, participants completed surveys assessing their perception of AVs, focusing on two main aspects: \"Attitude\" and \"System Effectiveness.\" The Wilcoxon signed-rank test results demonstrated that both pedestrians' overall attitude score toward AVs and trust in the effectiveness of AV systems significantly increased following the VR experiment. Notably, individuals who exhibited a greater trust in the yellow signals were more inclined to display a higher attitude score toward AVs and to augment their trust in the effectiveness of AV systems. This indicates that the design of the yellow signal instills pedestrians with greater confidence in their interactions with AVs. Further, pedestrians who exhibit more aggressive crossing behavior are less likely to change their perception towards AVs as compared to those pedestrians with more positive crossing behaviors. It is concluded that integrating this paper's devised AV behavior and signaling within an immersive VR setting facilitated pedestrian engagement with AVs, thereby changing their perception of AVs.", "label": 0, "field": "cs"} {"text": "Title: Longest and shortest cycles in random planar graphs\nAbstract: Let $P(n,m)$ be a graph chosen uniformly at random from the class of all planar graphs on vertex set $\\{1, \\ldots, n\\}$ with $m=m(n)$ edges. We study the cycle and block structure of $P(n,m)$ when $m\\sim n/2$. More precisely, we determine the asymptotic order of the length of the longest and shortest cycle in $P(n,m)$ in the critical range when $m=n/2+o(n)$. In addition, we describe the block structure of $P(n,m)$ in the weakly supercritical regime when $n^{2/3}\\ll m-n/2\\ll n$.", "label": 1, "field": "math"} {"text": "Title: Distributed Hardware Accelerated Secure Joint Computation on the COPA Framework\nAbstract: Performance of distributed data center applications can be improved through use of FPGA-based SmartNICs, which provide additional functionality and enable higher bandwidth communication. Until lately, however, the lack of a simple approach for customizing SmartNICs to application requirements has limited the potential benefits. Intel's Configurable Network Protocol Accelerator (COPA) provides a customizable FPGA framework that integrates both hardware and software development to improve computation and communication performance. In this first case study, we demonstrate the capabilities of the COPA framework with an application from cryptography -- secure Multi-Party Computation (MPC) -- that utilizes hardware accelerators connected directly to host memory and the COPA network. We find that using the COPA framework gives significant improvements to both computation and communication as compared to traditional implementations of MPC that use CPUs and NICs. A single MPC accelerator running on COPA enables more than 17Gbps of communication bandwidth while using only 1% of Stratix 10 resources. We show that utilizing the COPA framework enables multiple MPC accelerators running in parallel to fully saturate a 100Gbps link enabling higher performance compared to traditional NICs.", "label": 1, "field": "cs"} {"text": "Title: Associators in mould theory\nAbstract: By developing various techniques of mould theory, we introduce $\\mathsf{GARI}(\\mathscr{F})_{\\mathsf{as}+\\mathsf{bal}}$, a mould theoretic formulation of Drinfeld's associator set. We give a mould-theoretical generalization of the result that associator relations imply double shuffle relations, namely, we explain that $\\mathsf{GARI}(\\mathscr{F})_{\\mathsf{as}+\\mathsf{bal}}$ is embedded to Ecalle's set $\\mathsf{GARI}(\\mathscr{F})_{\\mathsf{as}\\ast\\mathsf{is}}$ which is a mould theoretic version of Racinet's double shuffle set.", "label": 0, "field": "math"} {"text": "Title: Some remarks on combinatorial wall-crossing\nAbstract: We establish a new simple explicit description of combinatorial wall-crossing for the rational Cherednik algebra applied to the trivial representation. In this way we recover a theorem of P. Dimakis and G. Yue. We also present two conjectures on combinatorial wall-crossing which were found using computer experiments.", "label": 1, "field": "math"} {"text": "Title: Thermodynamic Consistent Neural Networks for Learning Material Interfacial Mechanics\nAbstract: For multilayer materials in thin substrate systems, interfacial failure is one of the most challenges. The traction-separation relations (TSR) quantitatively describe the mechanical behavior of a material interface undergoing openings, which is critical to understand and predict interfacial failures under complex loadings. However, existing theoretical models have limitations on enough complexity and flexibility to well learn the real-world TSR from experimental observations. A neural network can fit well along with the loading paths but often fails to obey the laws of physics, due to a lack of experimental data and understanding of the hidden physical mechanism. In this paper, we propose a thermodynamic consistent neural network (TCNN) approach to build a data-driven model of the TSR with sparse experimental data. The TCNN leverages recent advances in physics-informed neural networks (PINN) that encode prior physical information into the loss function and efficiently train the neural networks using automatic differentiation. We investigate three thermodynamic consistent principles, i.e., positive energy dissipation, steepest energy dissipation gradient, and energy conservative loading path. All of them are mathematically formulated and embedded into a neural network model with a novel defined loss function. A real-world experiment demonstrates the superior performance of TCNN, and we find that TCNN provides an accurate prediction of the whole TSR surface and significantly reduces the violated prediction against the laws of physics.", "label": 1, "field": "cs"} {"text": "Title: Assessing the Impact of a User-Item Collaborative Attack on Class of Users\nAbstract: Collaborative Filtering (CF) models lie at the core of most recommendation systems due to their state-of-the-art accuracy. They are commonly adopted in e-commerce and online services for their impact on sales volume and/or diversity, and their impact on companies' outcome. However, CF models are only as good as the interaction data they work with. As these models rely on outside sources of information, counterfeit data such as user ratings or reviews can be injected by attackers to manipulate the underlying data and alter the impact of resulting recommendations, thus implementing a so-called shilling attack. While previous works have focused on evaluating shilling attack strategies from a global perspective paying particular attention to the effect of the size of attacks and attacker's knowledge, in this work we explore the effectiveness of shilling attacks under novel aspects. First, we investigate the effect of attack strategies crafted on a target user in order to push the recommendation of a low-ranking item to a higher position, referred to as user-item attack. Second, we evaluate the effectiveness of attacks in altering the impact of different CF models by contemplating the class of the target user, from the perspective of the richness of her profile (i.e., cold v.s. warm user). Finally, similar to previous work we contemplate the size of attack (i.e., the amount of fake profiles injected) in examining their success. The results of experiments on two widely used datasets in business and movie domains, namely Yelp and MovieLens, suggest that warm and cold users exhibit contrasting behaviors in datasets with different characteristics.", "label": 1, "field": "cs"} {"text": "Title: Near Optimal Bounds for Collision in Pollard Rho for Discrete Log\nAbstract: We analyze a fairly standard idealization of Pollard's Rho algorithm for finding the discrete logarithm in a cyclic group G. It is found that, with high probability, a collision occurs in $O(\\sqrt{|G|\\log |G| \\log \\log |G|})$ steps, not far from the widely conjectured value of $\\Theta(\\sqrt{|G|})$. This improves upon a recent result of Miller--Venkatesan which showed an upper bound of $O(\\sqrt{|G|}\\log^3 |G|)$. Our proof is based on analyzing an appropriate nonreversible, non-lazy random walk on a discrete cycle of (odd) length |G|, and showing that the mixing time of the corresponding walk is $O(\\log |G| \\log \\log |G|)$.", "label": 1, "field": "math"} {"text": "Title: More on Arago'n Artacho - Campoy's Algorithm\nAbstract: The Arago'n Artacho-Campoy algorithm (AACA) is a new method for finding zeros of sums of monotone operators. In this paper we complete the analysis of [2] and[1] by providing study of the two possible Arago'n Artacho-Campoy operators.", "label": 0, "field": "math"} {"text": "Title: Notes on limits of accessible categories\nAbstract: Let $\\kappa$ be a regular cardinal, $\\lambda<\\kappa$ be a smaller infinite cardinal, and $\\mathsf K$ be a $\\kappa$-accessible category where colimits of $\\lambda$-indexed chains exist. We show that various category-theoretic constructions applied to $\\mathsf K$, such as the inserter and the equifier, produce $\\kappa$-accessible categories $\\mathsf E$ again, and the most obvious expected description of the full subcategory of $\\kappa$-presentable objects in $\\mathsf E$ in terms of $\\kappa$-presentable objects in $\\mathsf K$ holds true. In particular, if $\\mathsf C$ is a $\\kappa$-small category, then the category of functors $\\mathsf C\\rightarrow\\mathsf K$ is $\\kappa$-accessible, and its $\\kappa$-presentable objects are precisely all the functors from $\\mathsf C$ to the $\\kappa$-presentable objects of $\\mathsf K$. We proceed to discuss the preservation of $\\kappa$-accessibility by conical pseudolimits, lax and oplax limits, and weighted pseudolimits. The results of this paper go back to an unpublished 1977 preprint of Ulmer. Our motivation comes from the theory of flat modules and flat quasi-coherent sheaves.", "label": 0, "field": "math"} {"text": "Title: Co-compact Gabor systems on locally compact abelian groups\nAbstract: In this work we extend classical structure and duality results in Gabor analysis on the euclidean space to the setting of second countable locally compact abelian (LCA) groups. We formulate the concept of rationally oversampling of Gabor systems in an LCA group and prove corresponding characterization results via the Zak transform. From these results we derive non-existence results for critically sampled continuous Gabor frames. We obtain general characterizations in time and in frequency domain of when two Gabor generators yield dual frames. Moreover, we prove the Walnut and Janssen representation of the Gabor frame operator and consider the Wexler-Raz biorthogonality relations for dual generators. Finally, we prove the duality principle for Gabor frames. Unlike most duality results on Gabor systems, we do not rely on the fact that the translation and modulation groups are discrete and co-compact subgroups. Our results only rely on the assumption that either one of the translation and modulation group (in some cases both) are co-compact subgroups of the time and frequency domain. This presentation offers a unified approach to the study of continuous and the discrete Gabor frames.", "label": 1, "field": "math"} {"text": "Title: Gaussian Process based Stochastic Model Predictive Control for Cooperative Adaptive Cruise Control\nAbstract: Cooperative driving relies on communication among vehicles to create situational awareness. One application of cooperative driving is Cooperative Adaptive Cruise Control (CACC) that aims at enhancing highway transportation safety and capacity. Model-based communication (MBC) is a new paradigm with a flexible content structure for broadcasting joint vehicle-driver predictive behavioral models. The vehicle's complex dynamics and diverse driving behaviors add complexity to the modeling process. Gaussian process (GP) is a fully data-driven and non-parametric Bayesian modeling approach which can be used as a modeling component of MBC. The knowledge about the uncertainty is propagated through predictions by generating local GPs for vehicles and broadcasting their hyper-parameters as a model to the neighboring vehicles. In this research study, GP is used to model each vehicle's speed trajectory, which allows vehicles to access the future behavior of their preceding vehicle during communication loss and/or low-rate communication. Besides, to overcome the safety issues in a vehicle platoon, two operating modes for each vehicle are considered; free following and emergency braking. This paper presents a discrete hybrid stochastic model predictive control, which incorporates system modes as well as uncertainties captured by GP models. The proposed control design approach finds the optimal vehicle speed trajectory with the goal of achieving a safe and efficient platoon of vehicles with small inter-vehicle gap while reducing the reliance of the vehicles on a frequent communication. Simulation studies demonstrate the efficacy of the proposed controller considering the aforementioned communication paradigm with low-rate intermittent communication.", "label": 1, "field": "cs"} {"text": "Title: Maximum principal ratio of the signless Laplacian of graphs\nAbstract: Let $G$ be a connected graph and $Q(G)$ be the signless Laplacian of $G$. The principal ratio $\\gamma(G)$ of $Q(G)$ is the ratio of the maximum and minimum entries of the Perron vector of $Q(G)$. In this paper, we consider the maximum principal ratio $\\gamma(G)$ among all connected graphs of order $n$, and show that for sufficiently large $n$ the extremal graph is a kite graph obtained by identifying an end vertex of a path to any vertex of a complete graph.", "label": 1, "field": "math"} {"text": "Title: Current Trends in Digital Twin Development, Maintenance, and Operation: An Interview Study\nAbstract: Digital twins (DT) are often defined as a pairing of a physical entity and a corresponding virtual entity (VE), mimicking certain aspects of the former depending on the use-case. In recent years, this concept has facilitated numerous use-cases ranging from design to validation and predictive maintenance of large and small high-tech systems. Various heterogeneous cross-domain models are essential for such systems and model-driven engineering plays a pivotal role in the design, development, and maintenance of these models. We believe models and model-driven engineering play a similarly crucial role in the context of a VE of a DT. Due to the rapidly growing popularity of DTs and their use in diverse domains and use-cases, the methodologies, tools, and practices for designing, developing, and maintaining the corresponding VEs differ vastly. To better understand these differences and similarities, we performed a semi-structured interview research with 19 professionals from industry and academia who are closely associated with different lifecycle stages of digital twins. In this paper, we present our analysis and findings from this study, which is based on seven research questions. In general, we identified an overall lack of uniformity in terms of the understanding of digital twins and used tools, techniques, and methodologies for the development and maintenance of the corresponding VEs. Furthermore, considering that digital twins are software intensive systems, we recognize a significant growth potential for adopting more software engineering practices, processes, and expertise in various stages of a digital twin's lifecycle.", "label": 0, "field": "cs"} {"text": "Title: Representative Families: A Unified Tradeoff-Based Approach\nAbstract: Let $M=(E,{\\cal I})$ be a matroid, and let $\\cal S$ be a family of subsets of size $p$ of $E$. A subfamily $\\widehat{\\cal S}\\subseteq{\\cal S}$ represents ${\\cal S}$ if for every pair of sets $X\\in{\\cal S}$ and $Y\\subseteq E\\setminus X$ such that $X\\cup Y\\in{\\cal I}$, there is a set $\\widehat{X}\\in\\widehat{\\cal S}$ disjoint from $Y$ such that $\\widehat{X}\\cup Y\\in{\\cal I}$. Fomin et al. (Proc. ACM-SIAM Symposium on Discrete Algorithms, 2014) introduced a powerful technique for fast computation of representative families for uniform matroids. In this paper, we show that this technique leads to a unified approach for substantially improving the running times of parameterized algorithms for some classic problems. This includes, among others, $k$-Partial Cover, $k$-Internal Out-Branching, and Long Directed Cycle. Our approach exploits an interesting tradeoff between running time and the size of the representative families.", "label": 1, "field": "cs"} {"text": "Title: Neighbourhood Evaluation Criteria for Vertex Cover Problem\nAbstract: Neighbourhood Evaluation Criteria is a heuristical approximate algorithm that attempts to solve the Minimum Vertex Cover. degree count is kept in check for each vertex and the highest count based vertex is included in our cover set. In the case of multiple equivalent vertices, the one with the lowest neighbourhood influence is selected. In the case of still existing multiple equivalent vertices, the one with the lowest remaining active vertex count (the highest Independent Set enabling count) is selected as a tie-breaker.", "label": 1, "field": "cs"} {"text": "Title: An invariant for homogeneous spaces of compact quantum groups\nAbstract: The central notion in Connes' formulation of non commutative geometry is that of a spectral triple. Given a homogeneous space of a compact quantum group, restricting our attention to all spectral triples that are `well behaved' with respect to the group action, we construct a certain dimensional invariant. In particular, taking the (quantum) group itself as the homogeneous space, this gives an invariant for a compact quantum group. Computations of this invariant in several cases, including all type A quantum groups, are given.", "label": 1, "field": "math"} {"text": "Title: Van der Corput and metric theorems for geometric progressions for self-similar measures\nAbstract: We prove a van der Corput lemma for non-atomic self-similar measures $\\mu$. As an application, we show that the correlations of all finite orders of $( x^n \\mod 1 )_{n\\geq 1}$ converge to the Poissonian model for $\\mu$-a.e. $x$, assuming $x>1$. We also complete a recent result of Algom, Rodriguez Hertz, and Wang (obtained simultaneously by Baker and Banaji), showing that any self-conformal measure with respect to a non-affine real analytic IFS has polynomial Fourier decay.", "label": 0, "field": "math"} {"text": "Title: Irreducibility and periodicity in $\\mathbb{Z}^{2}$ symbolic systems\nAbstract: We show that there exist $\\mathbb{Z}^{2}$ symbolic systems that are strongly irreducible and have no (fully) periodic points", "label": 0, "field": "math"} {"text": "Title: On the real zeros of depth 1 quasimodular forms\nAbstract: We discuss the critical points of modular forms, or more generally the zeros of quasimodular forms of depth $1$ for $\\mathrm{PSL}_2(\\mathbb Z)$. In particular, we consider the derivatives of the unique weight $k$ modular forms $f_k$ with the maximal number of consecutive zero Fourier coefficients following the constant $1$. Our main results state that (1) every zero of a depth $1$ quasimodular form near the derivative of the Eisenstein series in the standard fundamental domain lies on the geodesic segment $\\{z \\in \\mathbb H: \\Re(z)=1/2\\}$, and (2) more than half of zeros of $f_k$ in the standard fundamental domain lie on the geodesic segment $\\{z \\in \\mathbb H: \\Re(z)=1/2\\}$ for large enough $k$ with $k\\equiv 0 \\pmod{12}$.", "label": 0, "field": "math"} {"text": "Title: Local Discontinuous Galerkin Methods for Solving Convection-Diffusion and Cahn-Hilliard Equations on Surfaces\nAbstract: Local discontinuous Galerkin methods are developed for solving second order and fourth order time-dependent partial differential equations defined on static 2D manifolds. These schemes are second-order accurate with surfaces triangulized by planar triangles and careful design of numerical fluxes. The schemes are proven to be energy stable. Various numerical experiments are provided to validate the new schemes.", "label": 0, "field": "math"} {"text": "Title: Non-existence of three non-coalescing infinite geodesics with the same direction in the directed landscape\nAbstract: It is believed that for metric-like models in the KPZ class the following property holds: with probability one, starting from any point, there are at most two semi-infinite geodesics with the same direction that do not coalesce. Until now, such a result was only proved for one model - exponential LPP (Coupier 11') using its inherent connection to the totally asymmetric exclusion process. We prove that the above property holds for the directed landscape, the universal scaling limit of models in the KPZ class. Our proof reduces the problem to one on line ensembles and therefore paves the way to show similar results for other metric-like models in the KPZ class. Finally, combining our result with the ones in (Busani, Seppalainen,Sorensen 22', Bhatia 23') we obtain the full qualitative geometric description of infinite geodesics in the directed landscape.", "label": 0, "field": "math"} {"text": "Title: Quantum cohomology of minuscule homogeneous spaces\nAbstract: We study the quantum cohomology of (co)minuscule homogeneous varieties under a unified perspective. We show that three points Gromov-Witten invariants can always be interpreted as classical intersection numbers on auxiliary varieties. Our main combinatorial tools are certain quivers, in terms of which we obtain a quantum Chevalley formula and a higher quantum Poincar\\'{e} duality. In particular we compute the quantum cohomology of the two exceptional minuscule homogeneous varieties.", "label": 1, "field": "math"} {"text": "Title: Rigidity And Unirational Groups\nAbstract: We prove a rigidity theorem for morphisms from products of open subschemes of the projective line into solvable groups not containing a copy of $\\Ga$ (for example, wound unipotent groups). As a consequence, we deduce several structural results about unirational group schemes, including that unirationality for group schemes descends through separable extensions. We also apply the main result to prove that permawound unipotent groups are unirational and -- when wound -- commutative.", "label": 0, "field": "math"} {"text": "Title: Two Equivalent Families of Linear Fully Coupled Forward Backward Stochastic Differential Equations\nAbstract: In this paper, we investigate two families of fully coupled linear Forward-Backward Stochastic Differential Equations (FBSDE). Within these families, one could get the same well-posedness of FBSDEs with totally different structures. The first family of FBSDEs are proved to be equivalent with respect to the Unified Approach. Thus one could get the well-posedness of the whole family if one member exists a unique solution. Another equivalent family of FBSDEs are investigated by introducing a linear transformation method. By reason of the fully coupling structure between the forward and backward equations, it leads to a highly interdependence in solutions. We are able to lower the coupling of FBSDEs, by virtue of the idea of transformation, without losing the well-posedness. Moreover, owing to the non-degeneracy of the transformation matrix, the solution to original FBSDE is totally determined by solutions of FBSDE after transformation. In addition, an example of optimal Linear Quadratic (LQ) problem is presented to illustrate.", "label": 1, "field": "math"} {"text": "Title: The Least Common Multiple of Polynomial Values over Function Fields\nAbstract: Cilleruelo conjectured that for an irreducible polynomial $f \\in \\mathbb{Z}[X]$ of degree $d \\geq 2$ one has $$\\log\\left[\\mathrm{lcm}(f(1),f(2),\\ldots f(N))\\right]\\sim(d-1)N\\log N$$ as $N \\to \\infty$. He proved it in the case $d=2$ but it remains open for every polynomial with $d>2$. We investigate the function field analogue of the problem by considering polynomials over the ring $\\mathbb F_q[T]$. We state an analog of Cilleruelo's conjecture in this setting: denoting by $$L_f(n) := \\mathrm{lcm} \\left(f\\left(Q\\right)\\ : \\ Q \\in \\mathbb F_q[T]\\mbox{ monic},\\, \\mathrm{deg}\\,Q = n\\right)$$ we conjecture that \\begin{equation}\\label{eq:conjffabs}\\mathrm{deg}\\, L_f(n) \\sim c_f \\left(d-1\\right) nq^n,\\ n \\to \\infty\\end{equation} ($c_f$ is an explicit constant dependent only on $f$, typically $c_f=1$). We give both upper and lower bounds for $L_f(n)$ and show that the conjectured asymptotic holds for a class of ``special\" polynomials, initially considered by Leumi in this context, which includes all quadratic polynomials and many other examples as well. We fully classify these special polynomials. We also show that $\\mathrm{deg}\\, L_f(n) \\sim \\mathrm{deg}\\,\\mathrm{rad}\\left(L_f(n)\\right)$ (in other words the corresponding LCM is close to being squarefree), which is not known over $\\mathbb Z$.", "label": 0, "field": "math"} {"text": "Title: Brown representability for directed graphs\nAbstract: We prove that any contravariant functor from the homotopy category of finite directed graphs to abelian groups satisfying the additivity axiom and the Mayer-Vietoris axiom is representable.", "label": 1, "field": "math"} {"text": "Title: Linear inverse problems for Markov processes and their regularisation\nAbstract: We study the solutions of the inverse problem \\[ g(z)=\\int f(y) P_T(z,dy) \\] for a given $g$, where $(P_t(\\cdot,\\cdot))_{t \\geq 0}$ is the transition function of a given Markov process, $X$, and $T$ is a fixed deterministic time, which is linked to the solutions of the ill-posed Cauchy problem \\[ u_t + A u=0, \\qquad u(0,\\cdot)=g, \\] where $A$ is the generator of $X$. A necessary and sufficient condition ensuring square integrable solutions is given. Moreover, a family of regularisations for the above problems is suggested. We show in particular that these inverse problems have a solution when $X$ is replaced by $\\xi X + (1-\\xi)J$, where $\\xi$ is a Bernoulli random variable, whose probability of success can be chosen arbitrarily close to $1$, and $J$ is a suitably constructed jump process.", "label": 1, "field": "math"} {"text": "Title: Probabilistic Trajectory Design Via Approximate Gaussian Mixture Steering\nAbstract: A method is presented to solve a stochastic, nonlinear optimal control problem representative of spacecraft trajectory design under uncertainty. The problem is reformulated as a chance constrained nonlinear program, or what is known as a distribution steering problem. Typical distribution steering problems rely on the underlying uncertainties to be Gaussian distributions. This work expands on previous developments by embedding Gaussian mixture distributions into the formulation to better handle the uncertainty propagation and chance constraints involved. The method is applied to a finite-thrust Earth-to-Mars transfer problem. Evaluation via Monte Carlo analysis shows a greater satisfaction of constraints under non-Gaussian distributions of the state and a statistically lower cost.", "label": 0, "field": "math"} {"text": "Title: Legendre-Moment Transform for Linear Ensemble Control and Computation\nAbstract: Ensemble systems, pervasive in diverse scientific and engineering domains, pose challenges to existing control methods due to their massive scale and underactuated nature. This paper presents a dynamic moment approach to addressing theoretical and computational challenges in systems-theoretic analysis and control design for linear ensemble systems. We introduce the Legendre-moments and Legendre-moment transform, which maps an ensemble system defined on the $L^2$-space to a Legendre-moment system defined on the $\\ell^2$-space. We show that this pair of systems is of one-to-one correspondence and shares the same controllability property. This equivalence admits the control of an ensemble system through the control of the corresponding Legendre-moment system and inspires a unified control design scheme for linear ensemble systems using structured truncated moment systems. In particular, we develop a sampling-free ensemble control design algorithm, then conduct error analysis for control design using truncated moment systems and derive error bounds with respect to the truncation orders, which are illustrated with numerical examples.", "label": 0, "field": "math"} {"text": "Title: Knowledge-based XAI through CBR: There is more to explanations than models can tell\nAbstract: The underlying hypothesis of knowledge-based explainable artificial intelligence is the data required for data-centric artificial intelligence agents (e.g., neural networks) are less diverse in contents than the data required to explain the decisions of such agents to humans. The idea is that a classifier can attain high accuracy using data that express a phenomenon from one perspective whereas the audience of explanations can entail multiple stakeholders and span diverse perspectives. We hence propose to use domain knowledge to complement the data used by agents. We formulate knowledge-based explainable artificial intelligence as a supervised data classification problem aligned with the CBR methodology. In this formulation, the inputs are case problems composed of both the inputs and outputs of the data-centric agent and case solutions, the outputs, are explanation categories obtained from domain knowledge and subject matter experts. This formulation does not typically lead to an accurate classification, preventing the selection of the correct explanation category. Knowledge-based explainable artificial intelligence extends the data in this formulation by adding features aligned with domain knowledge that can increase accuracy when selecting explanation categories.", "label": 1, "field": "cs"} {"text": "Title: Parametric robust structured control design\nAbstract: We present a new approach to parametric robust controller design, where we compute controllers of arbitrary order and structure which minimize the worst-case $H_\\infty$ norm over a pre-specified set of uncertain parameters. At the core of our method is a nonsmooth minimization method tailored to functions which are semi-infinite minima of smooth functions. A rich test bench and a more detailed example illustrate the potential of the technique, which can deal with complex problems involving multiple possibly repeated uncertain parameters.", "label": 1, "field": "math"} {"text": "Title: A Quasi Curtis-Tits-Phan theorem for the symplectic group\nAbstract: We obtain the symplectic group as an amalgam of low rank subgroups akin to Levi components. We do this by having the group act flag-transitively on a new type of geometry and applying Tits' lemma. This provides a new way of recognizing the symplectic groups from a small collection of small subgroups. The geometry consists of all subspaces of maximal rank in a vector space of maximal rank with respect to a symplectic form. The main result holds for fields of size at least 3. We analyze the geometry over the field of size 2 and describe its simply connected cover if different from the geometry.", "label": 1, "field": "math"} {"text": "Title: Calculus and applications\nAbstract: This is an introduction to calculus, and its applications to basic questions from physics. We first discuss the theory of functions $f:\\mathbb R\\to\\mathbb R$, with the notion of continuity, and the construction of the derivative $f'(x)$ and of the integral $\\int_a^bf(x)dx$. Then we investigate the case of the complex functions $f:\\mathbb C\\to\\mathbb C$, and notably the holomorphic functions, and harmonic functions. Then, we discuss the multivariable functions, $f:\\mathbb R^N\\to\\mathbb R^M$ or $f:\\mathbb R^N\\to\\mathbb C^M$ or $f:\\mathbb C^N\\to\\mathbb C^M$, with general theory, integration results, maximization questions, and basic applications to physics.", "label": 0, "field": "math"} {"text": "Title: Moduli spaces of arrangements of 12 projective lines with a sextic point\nAbstract: In this paper, we try to classify moduli spaces of arrangements of $12$ lines with sextic points. We show that moduli spaces of arrangements of $12$ lines with sextic points can consist of more than two connected components. We also present defining equations of the arrangements whose moduli spaces are not irreducible taking quotients by the complex conjugation by supply some potential Zariski pairs. Through complex conjugation we take quotients and supply some potential Zariski pairs.", "label": 0, "field": "math"} {"text": "Title: On the Stability Functional for Conservation Laws\nAbstract: This note is devoted to the explicit construction of a functional defined on all pairs of $\\L1$ functions with small total variation, which is equivalent to the $\\L1$ distance and non increasing along the trajectories of a given system of conservation laws. Two different constructions are provided, yielding an extension of the original stability functional by Bressan, Liu and Yang.", "label": 1, "field": "math"} {"text": "Title: Supervised learning on heterogeneous, attributed entities interacting over time\nAbstract: Most physical or social phenomena can be represented by ontologies where the constituent entities are interacting in various ways with each other and with their environment. Furthermore, those entities are likely heterogeneous and attributed with features that evolve dynamically in time as a response to their successive interactions. In order to apply machine learning on such entities, e.g., for classification purposes, one therefore needs to integrate the interactions into the feature engineering in a systematic way. This proposal shows how, to this end, the current state of graph machine learning remains inadequate and needs to be be augmented with a comprehensive feature engineering paradigm in space and time.", "label": 1, "field": "cs"} {"text": "Title: On the computation of coarse cohomology\nAbstract: The purpose of this article is to relate coarse cohomology of metric spaces with a more computable cohomology. We introduce a notion of boundedly supported cohomology and prove that coarse cohomology of many spaces are isomorphic to the boundedly supported cohomology. Boundedly supported cohomology coincides with compactly supported Alexander--Spanier cohomology if the space is proper and contractible. Our work generalizes an earlier result of Roe which says that the coarse cohomology is isomorphic to the compactly supported Alexander-Spanier cohomology if the space is uniformly contractible. As an application of our main theorem, we obtain that coarse cohomology of the complement can be computed in terms of Alexander-Spanier cohomology for many spaces.", "label": 0, "field": "math"} {"text": "Title: Resonances for homoclinic trapped sets\nAbstract: We study semiclassical resonances generated by homoclinic trapped sets. First, under some general assumptions, we prove that there is no resonance in a region below the real axis. Then, we obtain a quantization rule and the asymptotic expansion of the resonances when there is a finite number of homoclinic trajectories. The same kind of results is proved for homoclinic sets of maximal dimension. Next, we generalize to the case of homoclinic/heteroclinic trajectories and we study the three bump case. In all these settings, the resonances may either accumulate on curves or form clouds. We also describe the corresponding resonant states.", "label": 1, "field": "math"} {"text": "Title: Chiplet Cloud: Building AI Supercomputers for Serving Large Generative Language Models\nAbstract: Large language models (LLMs) such as ChatGPT have demonstrated unprecedented capabilities in multiple AI tasks. However, hardware inefficiencies have become a significant factor limiting the democratization of LLMs. We propose Chiplet Cloud, an ASIC supercomputer architecture that optimizes total cost of ownership (TCO) per token for serving generative LLMs. Chiplet Cloud fits all model parameters inside the on-chip SRAMs to eliminate bandwidth limitations while moderating the die size to improve system costs while leveraging software mappings to overcome data communication overhead. We propose a comprehensive design methodology that accurately explores a spectrum of major design trade-offs in the joint space of hardware-software and generates a detailed performance-cost analysis on all valid design points. We evaluate Chiplet Cloud on four popular LLMs. Compared to GPU and TPU, our architecture can achieve up to 94x and 15x improvement in TCO/Token respectively, significantly reducing the cost for realistically serving modern LLMs.", "label": 0, "field": "cs"} {"text": "Title: Functional central limit theorems for stick-breaking priors\nAbstract: We obtain the empirical strong law of large numbers, empirical Glivenko-Cantelli theorem, central limit theorem, functional central limit theorem for various nonparametric Bayesian priors which include the Dirichlet process with general stick-breaking weights, the Poisson-Dirichlet process, the normalized inverse Gaussian process, the normalized generalized gamma process, and the generalized Dirichlet process. For the Dirichlet process with general stick-breaking weights, we introduce two general conditions such that the central limit theorem and functional central limit theorem hold. Except in the case of the generalized Dirichlet process, since the finite dimensional distributions of these processes are either hard to obtain or are complicated to use even they are available, we use the method of moments to obtain the convergence results. For the generalized Dirichlet process we use its finite dimensional marginal distributions to obtain the asymptotics although the computations are highly technical.", "label": 1, "field": "math"} {"text": "Title: Cosemisimple Hopf algebras are faithfully flat over Hopf subalgebras\nAbstract: The question of whether or not a Hopf algebra $H$ is faithfully flat over a Hopf subalgebra $A$ has received positive answers in several particular cases: when $H$ (or more generally, just $A$) is commutative, or cocommutative, or pointed, or when $K$ contains the coradical of $H$. We prove the statement in the title, adding the class of cosemisimple Hopf algebras to those known to be faithfully flat over all Hopf subalgebras. We also show that the third term of the resulting \"exact sequence\" $A\\to H\\to C$ is always a cosemisimple coalgebra, and that the expectation $H\\to A$ is positive when $H$ is a CQG algebra.", "label": 1, "field": "math"} {"text": "Title: Smoothing cones over K3 surfaces\nAbstract: We prove that the affine cone over a general primitively polarised K3 surface of genus g is smoothable if and only if g\\le 10 or g=12. We also give several examples of singularities with special behaviour, such as surfaces whose affine cone is smoothable even though the projective cone is not.", "label": 1, "field": "math"} {"text": "Title: Solving Almost all Systems of Random Quadratic Equations\nAbstract: This paper deals with finding an $n$-dimensional solution $x$ to a system of quadratic equations of the form $y_i=|\\langle{a}_i,x\\rangle|^2$ for $1\\le i \\le m$, which is also known as phase retrieval and is NP-hard in general. We put forth a novel procedure for minimizing the amplitude-based least-squares empirical loss, that starts with a weighted maximal correlation initialization obtainable with a few power or Lanczos iterations, followed by successive refinements based upon a sequence of iteratively reweighted (generalized) gradient iterations. The two (both the initialization and gradient flow) stages distinguish themselves from prior contributions by the inclusion of a fresh (re)weighting regularization technique. The overall algorithm is conceptually simple, numerically scalable, and easy-to-implement. For certain random measurement models, the novel procedure is shown capable of finding the true solution $x$ in time proportional to reading the data $\\{(a_i;y_i)\\}_{1\\le i \\le m}$. This holds with high probability and without extra assumption on the signal $x$ to be recovered, provided that the number $m$ of equations is some constant $c>0$ times the number $n$ of unknowns in the signal vector, namely, $m>cn$. Empirically, the upshots of this contribution are: i) (almost) $100\\%$ perfect signal recovery in the high-dimensional (say e.g., $n\\ge 2,000$) regime given only an information-theoretic limit number of noiseless equations, namely, $m=2n-1$ in the real-valued Gaussian case; and, ii) (nearly) optimal statistical accuracy in the presence of additive noise of bounded support. Finally, substantial numerical tests using both synthetic data and real images corroborate markedly improved signal recovery performance and computational efficiency of our novel procedure relative to state-of-the-art approaches.", "label": 1, "field": "math"} {"text": "Title: Integer-Forcing Message Recovering in Interference Channels\nAbstract: In this paper, we propose a scheme referred to as integer-forcing message recovering (IFMR) to enable receivers to recover their desirable messages in interference channels. Compared to the state-of-the- art integer-forcing linear receiver (IFLR), our proposed IFMR approach needs to decode considerably less number of messages. In our method, each receiver recovers independent linear integer combinations of the desirable messages each from two independent equations. We propose an efficient algorithm to sequentially find the equations and integer combinations with maximum rates. We evaluate the performance of our scheme and compare the results with the minimum mean-square error (MMSE) and zero-forcing (ZF), as well as the IFLR schemes. The results indicate that our IFMR scheme outperforms the MMSE and ZF schemes, in terms of achievable rate, considerably. Also, compared to IFLR, the IFMR scheme achieves slightly less rates in moderate signal-to-noise ratios, with significantly less implementation complexity.", "label": 1, "field": "cs"} {"text": "Title: Poisson summation for Hankel transforms\nAbstract: In this article we study the Poisson summation for Hankel transform in the sense of Braverman-Kazhdan-Ngo in the special case of $L$-embedding $\\rho: GL_1\\rightarrow GL_2$. We view such a summation formula as the generalization of the classical Voronoi summation formula.", "label": 1, "field": "math"} {"text": "Title: A Markov Process Approach to Ensemble Control of Smart Buildings\nAbstract: This paper describes a step-by-step procedure that converts a physical model of a building into a Markov Process that characterizes energy consumption of this and other similar buildings. Relative to existing thermo-physics-based building models, the proposed procedure reduces model complexity and depends on fewer parameters, while also maintaining accuracy and feasibility sufficient for system-level analyses. Furthermore, the proposed Markov Process approach makes it possible to leverage real-time data streams available from intelligent data acquisition systems, which are readily available in smart buildings, and merge it with physics-based and statistical models. Construction of the Markov Process naturally leads to a Markov Decision Process formulation, which describes optimal probabilistic control of a collection of similar buildings. The approach is illustrated using validated building data from Belgium.", "label": 1, "field": "cs"} {"text": "Title: Failures and Fixes: A Study of Software System Incident Response\nAbstract: This paper presents the results of a research study related to software system failures, with the goal of understanding how we might better evolve, maintain and support software systems in production. We have qualitatively analyzed thirty incidents: fifteen collected through in depth interviews with engineers, and fifteen sampled from publicly published incident reports (generally produced as part of postmortem reviews). Our analysis focused on understanding and categorizing how failures occurred, and how they were detected, investigated and mitigated. We also captured analytic insights related to the current state of the practice and associated challenges in the form of 11 key observations. For example, we observed that failures can cascade through a system leading to major outages; and that often engineers do not understand the scaling limits of systems they are supporting until those limits are exceeded. We argue that the challenges we have identified can lead to improvements to how systems are engineered and supported.", "label": 1, "field": "cs"} {"text": "Title: Enhancing NOMA Networks via Reconfigurable Multi-Functional Surface\nAbstract: By flexibly manipulating the radio propagation environment, reconfigurable intelligent surface (RIS) is a promising technique for future wireless communications. However, the single-side coverage and double-fading attenuation faced by conventional RISs largely restrict their applications. To address this issue, we propose a novel concept of multi-functional RIS (MF-RIS), which provides reflection, transmission, and amplification simultaneously for the incident signal. With the aim of enhancing the performance of a non-orthogonal multiple-access (NOMA) downlink multiuser network, we deploy an MF-RIS to maximize the sum rate by jointly optimizing the active beamforming and MF-RIS coefficients. Then, an alternating optimization algorithm is proposed to solve the formulated non-convex problem by exploiting successive convex approximation and penalty-based method. Numerical results show that the proposed MF-RIS outperforms conventional RISs under different settings.", "label": 1, "field": "cs"} {"text": "Title: On the conductor of cohomological transforms\nAbstract: In the analytic study of trace functions of $\\ell$-adic sheaves over finite fields, a crucial issue is to control the conductor of sheaves constructed in various ways. We consider cohomological transforms on the affine line over a finite field which have trace functions given by linear operators with an additive character of a rational function in two variables as a kernel. We prove that the conductor of such a transform is bounded in terms of the complexity of the input sheaf and of the rational function defining the kernel, and discuss applications of this result, including motivating examples arising from the Polymath8 project.", "label": 1, "field": "math"} {"text": "Title: Reconstruction of curves from their theta hyperplanes in genera $6$ and $7$\nAbstract: We derive a formula for reconstructing a generic complex canonical curve $C$ of genus 6 and 7 in terms of the theta hyperplanes of $C$. Hence, we get a generic inverse to the Torelli map, as well as a complete description of the Schottky locus in these genera. The computational part of the proof relies on a certified numerical argument.", "label": 0, "field": "math"} {"text": "Title: The Effects of Generative AI on Computing Students' Help-Seeking Preferences\nAbstract: Help-seeking is a critical way for students to learn new concepts, acquire new skills, and get unstuck when problem-solving in their computing courses. The recent proliferation of generative AI tools, such as ChatGPT, offers students a new source of help that is always available on-demand. However, it is unclear how this new resource compares to existing help-seeking resources along dimensions of perceived quality, latency, and trustworthiness. In this paper, we investigate the help-seeking preferences and experiences of computing students now that generative AI tools are available to them. We collected survey data (n=47) and conducted interviews (n=8) with computing students. Our results suggest that although these models are being rapidly adopted, they have not yet fully eclipsed traditional help resources. The help-seeking resources that students rely on continue to vary depending on the task and other factors. Finally, we observed preliminary evidence about how help-seeking with generative AI is a skill that needs to be developed, with disproportionate benefits for those who are better able to harness the capabilities of LLMs. We discuss potential implications for integrating generative AI into computing classrooms and the future of help-seeking in the era of generative AI.", "label": 0, "field": "cs"} {"text": "Title: Variational Bandwidth Auto-encoder for Hybrid Recommender Systems\nAbstract: Hybrid recommendations have recently attracted a lot of attention where user features are utilized as auxiliary information to address the sparsity problem caused by insufficient user-item interactions. However, extracted user features generally contain rich multimodal information, and most of them are irrelevant to the recommendation purpose. Therefore, excessive reliance on these features will make the model overfit on noise and difficult to generalize. In this article, we propose a variational bandwidth auto-encoder (VBAE) for recommendations, aiming to address the sparsity and noise problems simultaneously. VBAE first encodes user collaborative and feature information into Gaussian latent variables via deep neural networks to capture non-linear user similarities. Moreover, by considering the fusion of collaborative and feature variables as a virtual communication channel from an information-theoretic perspective, we introduce a user-dependent channel to dynamically control the information allowed to be accessed from the feature embeddings. A quantum-inspired uncertainty measurement of the hidden rating embeddings is proposed accordingly to infer the channel bandwidth by disentangling the uncertainty information in the ratings from the semantic information. Through this mechanism, VBAE incorporates adequate auxiliary information from user features if collaborative information is insufficient, while avoiding excessive reliance on noisy user features to improve its generalization ability to new users. Extensive experiments conducted on three real-world datasets demonstrate the effectiveness of the proposed method. Codes and datasets are released at https://github.com/yaochenzhu/vbae.", "label": 1, "field": "cs"} {"text": "Title: An equivariant generalisation of McDuff-Segal's group-completion theorem\nAbstract: In this short note, we prove a G-equivariant generalisation of McDuff-Segal's group-completion theorem for finite groups G. A new complication regarding genuine equivariant localisations arises and we resolve this by isolating a simple condition on the homotopy groups of E-infinity-rings in G-spectra. We check that this condition is satisfied when our inputs are a suitable variant of E-infinity-monoids in G-spaces via the existence of multiplicative norm structures, thus giving a localisation formula for their associated G-spherical group rings.", "label": 0, "field": "math"} {"text": "Title: Probabilistic Modeling for Sequences of Sets in Continuous-Time\nAbstract: Neural marked temporal point processes have been a valuable addition to the existing toolbox of statistical parametric models for continuous-time event data. These models are useful for sequences where each event is associated with a single item (a single type of event or a \"mark\") -- but such models are not suited for the practical situation where each event is associated with a set of items. In this work, we develop a general framework for modeling set-valued data in continuous-time, compatible with any intensity-based recurrent neural point process model. In addition, we develop inference methods that can use such models to answer probabilistic queries such as \"the probability of item $A$ being observed before item $B$,\" conditioned on sequence history. Computing exact answers for such queries is generally intractable for neural models due to both the continuous-time nature of the problem setting and the combinatorially-large space of potential outcomes for each event. To address this, we develop a class of importance sampling methods for querying with set-based sequences and demonstrate orders-of-magnitude improvements in efficiency over direct sampling via systematic experiments with four real-world datasets. We also illustrate how to use this framework to perform model selection using likelihoods that do not involve one-step-ahead prediction.", "label": 0, "field": "cs"} {"text": "Title: P-TimeSync: A Precise Time Synchronization Simulation with Network Propagation Delays\nAbstract: Time serves as the foundation of modern society and will continue to grow in value in the future world. Unlike previous research papers, authors delve into various time sources, ranging from atomic time and GPS time to quartz time. Specifically, we explore the time uncertainty associated with the four major Global Navigation Satellite Systems. Additionally, we provide a summary of eight metrics used to evaluate time accuracy. In existing time synchronization simulations provide partial usages. However, our research introduces a comprehensive and precise time synchronization simulation named P-TimeSync, leading to a better understanding of time synchronization in distributed environments. It is a state-of-the-art simulation tool for time because (1) it can simulate atomic clocks and quartz clocks with user-defined software clock algorithms, (2) the simulation provides nanosecond-level precision time across different network propagation paths and distances, (3) the tool offers a visualization platform with classic algorithms for distributed time synchronization, such as Cristian's algorithm and Berkeley algorithm, and (4) the simulation includes three time-sync attack functions, including distributed denial-of-service (DDoS) attack, IP spoofer, and router hijacker. The simulation easily allows for the redefinition of configurations and functions, supporting advanced research and development. The simulation tool could be downloaded via the website: https://github.com/rui5097/purdue_timesync", "label": 0, "field": "cs"} {"text": "Title: Smooth invariant foliations and Koopman eigenfunctions about stable equilibria of semiflows\nAbstract: We consider a $C^r$ semiflow $\\{ \\varphi_t \\}_{t \\geq 0}$ on a Banach space $X$ admitting a stable fixed point $x$. We show, along the lines of the parameterization method (Cabr\\'e et al., 2003), the existence of a $C^r$ invariant foliation tangent to $X_1$ at $x$, for an arbitrary $D \\varphi_t(x)$-invariant subspace $X_1 \\subset X$ satisfying some additional spectral conditions. Uniqueness ensues in a subclass of sufficiently smooth invariant foliations tangent to $X_1$ at $x$. We then draw relations to Koopman theory, and thereby establish the existence and uniqueness, in some appropriate sense, of $C^r$ Koopman eigenfunctions. We demonstrate that these results apply to the case of the Navier-Stokes system, the archetypal example considered by the modern upheaval of applied 'Koopmanism'.", "label": 0, "field": "math"} {"text": "Title: Robust and Adaptive Planning under Model Uncertainty\nAbstract: Planning under model uncertainty is a fundamental problem across many applications of decision making and learning. In this paper, we propose the Robust Adaptive Monte Carlo Planning (RAMCP) algorithm, which allows computation of risk-sensitive Bayes-adaptive policies that optimally trade off exploration, exploitation, and robustness. RAMCP formulates the risk-sensitive planning problem as a two-player zero-sum game, in which an adversary perturbs the agent's belief over the models. We introduce two versions of the RAMCP algorithm. The first, RAMCP-F, converges to an optimal risk-sensitive policy without having to rebuild the search tree as the underlying belief over models is perturbed. The second version, RAMCP-I, improves computational efficiency at the cost of losing theoretical guarantees, but is shown to yield empirical results comparable to RAMCP-F. RAMCP is demonstrated on an n-pull multi-armed bandit problem, as well as a patient treatment scenario.", "label": 1, "field": "cs"} {"text": "Title: Canonical and $n$-canonical modules on a Noetherian algebra\nAbstract: We define canonical and $n$-canonical modules on a module-finite algebra over a Noether commutative ring and study their basic properties. Using $n$-canonical modules, we generalize a theorem on $(n,C)$-syzygy by Araya and Iima which generalize a well-known theorem on syzygies by Evans and Griffith. Among others, we prove a non-commutative version of Aoyama's theorem which states that a canonical module descends with respect to a flat local homomorphism. We also prove the codimension two-argument for modules over a coherent sheaf of algebras with a $2$-canonical module, generalizing a result of the author.", "label": 1, "field": "math"} {"text": "Title: Notes on exotic and perverse-coherent sheaves\nAbstract: Exotic sheaves are certain complexes of coherent sheaves on the cotangent bundle of the flag variety of a reductive group. They are closely related to perverse-coherent sheaves on the nilpotent cone. This expository article includes the definitions of these two categories, applications, and some structure theory, as well as detailed calculations for SL(2).", "label": 1, "field": "math"} {"text": "Title: An exact test for renewal increasing mean residual life\nAbstract: In this paper, we develop an exact test for testing exponentiality against renewal increasing mean residual life class. Pitman's asymptotic efficacy value shows that our test perform well. Some numerical results are presented to demonstrate the performance of the testing method. We also discuss how the proposed method incorporates the right censored observations.", "label": 1, "field": "math"} {"text": "Title: Presentations of Kauffman bracket skein algebras of planar surfaces\nAbstract: Let $R$ be a commutative ring with identity and a fixed invertible element $q^{\\frac{1}{2}}$, and suppose $q+q^{-1}$ is invertible in $R$. For each planar surface $\\Sigma_{0,n+1}$, we present its Kauffman bracket skein algebra over $R$ by explicit generators and relations. The presentation is independent of $R$, and can be considered as a quantization of the trace algebra of $n$ generic $2\\times 2$ unimodular matrices.", "label": 0, "field": "math"} {"text": "Title: Ramsey and Tur\u00e1n numbers of sparse hypergraphs\nAbstract: Degeneracy plays an important role in understanding Tur\\'an- and Ramsey-type properties of graphs. Unfortunately, the usual hypergraphical generalization of degeneracy fails to capture these properties. We define the skeletal degeneracy of a $k$-uniform hypergraph as the degeneracy of its $1$-skeleton (i.e., the graph formed by replacing every $k$-edge by a $k$-clique). We prove that skeletal degeneracy controls hypergraph Tur\\'an and Ramsey numbers in a similar manner to (graphical) degeneracy. Specifically, we show that $k$-uniform hypergraphs with bounded skeletal degeneracy have linear Ramsey number. This is the hypergraph analogue of the Burr-Erd\\H{o}s conjecture (proved by Lee). In addition, we give upper and lower bounds of the same shape for the Tur\\'an number of a $k$-uniform $k$-partite hypergraph in terms of its skeletal degeneracy. The proofs of both results use the technique of dependent random choice. In addition, the proof of our Ramsey result uses the `random greedy process' introduced by Lee in his resolution of the Burr-Erd\\H{o}s conjecture.", "label": 0, "field": "math"} {"text": "Title: Manipulating Trajectory Prediction with Backdoors\nAbstract: Autonomous vehicles ought to predict the surrounding agents' trajectories to allow safe maneuvers in uncertain and complex traffic situations. As companies increasingly apply trajectory prediction in the real world, security becomes a relevant concern. In this paper, we focus on backdoors - a security threat acknowledged in other fields but so far overlooked for trajectory prediction. To this end, we describe and investigate four triggers that could affect trajectory prediction. We then show that these triggers (for example, a braking vehicle), when correlated with a desired output (for example, a curve) during training, cause the desired output of a state-of-the-art trajectory prediction model. In other words, the model has good benign performance but is vulnerable to backdoors. This is the case even if the trigger maneuver is performed by a non-casual agent behind the target vehicle. As a side-effect, our analysis reveals interesting limitations within trajectory prediction models. Finally, we evaluate a range of defenses against backdoors. While some, like simple offroad checks, do not enable detection for all triggers, clustering is a promising candidate to support manual inspection to find backdoors.", "label": 0, "field": "cs"} {"text": "Title: Affine homogeneous varieties and suspensions\nAbstract: An algebraic variety $X$ is called a homogeneous variety if the automorphism group $\\mathrm{Aut}(X)$ acts on $X$ transitively, and a homogeneous space if there exists a transitive action of an algebraic group on $X$. We prove a criterion of smoothness of a suspension to construct a wide class of homogeneous varieties. As an application, we give criteria for a Danielewski surface to be a homogeneous variety and a homogeneous space. Also, we construct affine suspensions of arbitrary dimension that are homogeneous varieties but not homogeneous spaces.", "label": 0, "field": "math"} {"text": "Title: Nonlinear Young integrals via fractional calculus\nAbstract: For H\\\"older continuous functions $W(t,x)$ and $\\varphi_t$, we define nonlinear integral $\\int_a^b W(dt, \\varphi_t)$ via fractional calculus. This nonlinear integral arises naturally in the Feynman-Kac formula for stochastic heat equations with random coefficients. We also define iterated nonlinear integrals.", "label": 1, "field": "math"} {"text": "Title: Nonconvex bundle method with application to a delamination problem\nAbstract: Delamination is a typical failure mode of composite materials caused by weak bonding. It arises when a crack initiates and propagates under a destructive loading. Given the physical law characterizing the properties of the interlayer adhesive between the bonded bodies, we consider the problem of computing the propagation of the crack front and the stress field along the contact boundary. This leads to a hemivariational inequality, which after discretization by finite elements we solve by a nonconvex bundle method, where upper-$C^1$ criteria have to be minimized. As this is in contrast with other classes of mechanical problems with non-monotone friction laws and in other applied fields, where criteria are typically lower-$C^1$, we propose a bundle method suited for both types of nonsmoothness. We prove its global convergence in the sense of subsequences and test it on a typical delamination problem of material sciences.", "label": 1, "field": "math"} {"text": "Title: A Note on Nesting in Dyadic Deontic Logic\nAbstract: The paper reports on some results concerning Aqvist's dyadic logic known as system G, which is one of the most influential logics for reasoning with dyadic obligations (\"it ought to be the case that ... if it is the case that ...\"). Although this logic has been known in the literature for a while, many of its properties still await in-depth consideration. In this short paper we show: that any formula in system G including nested modal operators is equivalent to some formula with no nesting; that the universal modality introduced by Aqvist in the first presentation of the system is definable in terms of the deontic modality.", "label": 1, "field": "cs"} {"text": "Title: Hierarchical Over-the-Air Federated Learning with Awareness of Interference and Data Heterogeneity\nAbstract: When implementing hierarchical federated learning over wireless networks, scalability assurance and the ability to handle both interference and device data heterogeneity are crucial. This work introduces a learning method designed to address these challenges, along with a scalable transmission scheme that efficiently uses a single wireless resource through over-the-air computation. To provide resistance against data heterogeneity, we employ gradient aggregations. Meanwhile, the impact of interference is minimized through optimized receiver normalizing factors. For this, we model a multi-cluster wireless network using stochastic geometry, and characterize the mean squared error of the aggregation estimations as a function of the network parameters. We show that despite the interference and the data heterogeneity, the proposed scheme achieves high learning accuracy and can significantly outperform the conventional hierarchical algorithm.", "label": 0, "field": "cs"} {"text": "Title: Theta-Induced Diffusion on Tate Elliptic Curves over Non-Archimedean Local Fields\nAbstract: A diffusion operator on the $K$-rational points of a Tate elliptic curve $E_q$ is constructed, where $K$ is a non-archimedean local field, as well as an operator on the Berkovich-analytification $E_q^{an}$ of $E_q$. These are integral operators for measures coming from a regular $1$-form, and kernel functions constructed via theta functions. The second operator can be described via certain non-archimedan curvature forms on $E_q^{an}$. The spectra of these self-adjoint bounded operators on the Hilbert spaces of $L^2$-functions are identical and found to consist of finitely many eigenvalues. A study of the corresponding heat equations yields a positive answer to the Cauchy problem, and induced Markov processes on the curve. Finally, some geometric information about the $K$-rational points of $E_q$ is retrieved from the spectrum.", "label": 0, "field": "math"} {"text": "Title: Edge ideals of some edge-weighted graphs\nAbstract: This paper presents exact formulas for the regularity and depth of powers of edge ideals of an edge-weighted star graph. Additionally, we provide exact formulas for the regularity of powers of the edge ideal of an edge-weighted integrally closed path, as well as lower bounds on the depth of powers of such an edge ideal.", "label": 0, "field": "math"} {"text": "Title: Efficient Continuous Relaxations for Dense CRF\nAbstract: Dense conditional random fields (CRF) with Gaussian pairwise potentials have emerged as a popular framework for several computer vision applications such as stereo correspondence and semantic segmentation. By modeling long-range interactions, dense CRFs provide a more detailed labelling compared to their sparse counterparts. Variational inference in these dense models is performed using a filtering-based mean-field algorithm in order to obtain a fully-factorized distribution minimising the Kullback-Leibler divergence to the true distribution. In contrast to the continuous relaxation-based energy minimisation algorithms used for sparse CRFs, the mean-field algorithm fails to provide strong theoretical guarantees on the quality of its solutions. To address this deficiency, we show that it is possible to use the same filtering approach to speed-up the optimisation of several continuous relaxations. Specifically, we solve a convex quadratic programming (QP) relaxation using the efficient Frank-Wolfe algorithm. This also allows us to solve difference-of-convex relaxations via the iterative concave-convex procedure where each iteration requires solving a convex QP. Finally, we develop a novel divide-and-conquer method to compute the subgradients of a linear programming relaxation that provides the best theoretical bounds for energy minimisation. We demonstrate the advantage of continuous relaxations over the widely used mean-field algorithm on publicly available datasets.", "label": 1, "field": "cs"} {"text": "Title: The dimension of ergodic random sequences\nAbstract: Let \\mu be a computable ergodic shift-invariant measure over the Cantor space. Providing a constructive proof of Shannon-McMillan-Breiman theorem, V'yugin proved that if a sequence x is Martin-L\\\"of random w.r.t. \\mu then the strong effective dimension Dim(x) of x equals the entropy of \\mu. Whether its effective dimension dim(x) also equals the entropy was left as an problem question. In this paper we settle this problem, providing a positive answer. A key step in the proof consists in extending recent results on Birkhoff's ergodic theorem for Martin-L\\\"of random sequences.", "label": 1, "field": "cs"} {"text": "Title: Cubic bent functions outside the completed Maiorana-McFarland class\nAbstract: In this paper we prove that in opposite to the cases of 6 and 8 variables, the Maiorana-McFarland construction does not describe the whole class of cubic bent functions in $n$ variables for all $n\\ge 10$. Moreover, we show that for almost all values of $n$, these functions can simultaneously be homogeneous and have no affine derivatives.", "label": 1, "field": "math"} {"text": "Title: Uncertainty Estimates for Ordinal Embeddings\nAbstract: To investigate objects without a describable notion of distance, one can gather ordinal information by asking triplet comparisons of the form \"Is object $x$ closer to $y$ or is $x$ closer to $z$?\" In order to learn from such data, the objects are typically embedded in a Euclidean space while satisfying as many triplet comparisons as possible. In this paper, we introduce empirical uncertainty estimates for standard embedding algorithms when few noisy triplets are available, using a bootstrap and a Bayesian approach. In particular, simulations show that these estimates are well calibrated and can serve to select embedding parameters or to quantify uncertainty in scientific applications.", "label": 1, "field": "cs"} {"text": "Title: Non-local games and quantum symmetries of quantum metric spaces\nAbstract: We generalize Banica's construction of the quantum isometry group of a metric space to the class of quantum metric spaces in the sense of Kuperberg and Weaver. We also introduce quantum isometries between two quantum metric spaces, and we show that if a pair of quantum metric spaces are algebraically quantum isometric, then their quantum isometry groups are monoidally equivalent. Motivated by the recent work on the graph isomorphism game, we introduce a new two-player non-local game called the metric isometry game, where players can win classically if and only if the metric spaces are isometric. Winning quantum strategies of this game align with quantum isometries of the metric spaces.", "label": 1, "field": "math"} {"text": "Title: A New Foundation for Finitary Corecursion\nAbstract: This paper contributes to a theory of the behaviour of \"finite-state\" systems that is generic in the system type. We propose that such systems are modeled as coalgebras with a finitely generated carrier for an endofunctor on a locally finitely presentable category. Their behaviour gives rise to a new fixpoint of the coalgebraic type functor called locally finite fixpoint (LFF). We prove that if the given endofunctor preserves monomorphisms then the LFF always exists and is a subcoalgebra of the final coalgebra (unlike the rational fixpoint previously studied by Ad\\'amek, Milius and Velebil). Moreover, we show that the LFF is characterized by two universal properties: 1. as the final locally finitely generated coalgebra, and 2. as the initial fg-iterative algebra. As instances of the LFF we first obtain the known instances of the rational fixpoint, e.g. regular languages, rational streams and formal power-series, regular trees etc. And we obtain a number of new examples, e.g. (realtime deterministic resp. non-deterministic) context-free languages, constructively S-algebraic formal power-series (and any other instance of the generalized powerset construction by Silva, Bonchi, Bonsangue, and Rutten) and the monad of Courcelle's algebraic trees.", "label": 1, "field": "math"} {"text": "Title: Compositing with 2D Vector Fields by using Shape Maps that can represent Inconsistent, Impossible, and Incoherent Shapes\nAbstract: In this paper, we present a new compositing approach to obtain stylized reflections and refractions with a simple control. Our approach does not require any mask or separate 3D rendering. Moreover, only one additional image is sufficient to obtain a composited image with convincing qualitative reflection and refraction effects. We have also developed linearized methods that are easy to compute. Although these methods do not directly correspond to the underlying physical phenomena of reflection and refraction, they can provide results that are visually similar to realistic 3D rendering. The main advantage of this approach is the ability to treat images as ``mock-3D'' shapes that can be inserted into any digital paint system without any significant structural change. The core of our approach is the shape map, which encodes 2D shape and thickness information for all visible points of an image of a shape. This information does not have to be complete or consistent to obtain interesting composites. In particular, the shape maps allow us to represent impossible and incoherent shapes with 2D non-conservative vector fields.", "label": 0, "field": "cs"} {"text": "Title: Space reduction techniques for the $3$-wise Kemeny problem\nAbstract: Kemeny's rule is one of the most studied and well-known voting schemes with various important applications in computational social choice and biology. Recently, Kemeny's rule was generalized via a set-wise approach by Gilbert et. al. This paradigm presents interesting advantages in comparison with Kemeny's rule since not only pairwise comparisons but also the discordance between the winners of subsets of three alternatives are also taken into account in the definition of the $3$-wise Kendall-tau distance between two rankings. In spite of the NP-hardness of the 3-wise Kemeny problem which consists of computing the set of $3$-wise consensus rankings, namely rankings whose total $3$-wise Kendall-tau distance to a given voting profile is minimized, we establish in this paper several generalizations of the Major Order Theorems, as obtained by Milosz and Hamel for Kemeny's rule, for the $3$-wise Kemeny voting schemes to achieve a substantial search space reduction by efficiently determining in polynomial time the relative orders of pairs of alternatives. Essentially, our theorems quantify precisely the nontrivial property that if the preference for an alternative over another one in an election is strong enough, not only in the head-to-head competition but even when taking into account one or two more alternatives, then the relative order of these two alternatives in all $3$-wise consensus rankings must be as expected. As an application, we also obtain an improvement of the Major Order Theorems for Kememy's rule. Moreover, we show that the well-known $3/4$-majority rule of Betzler et al. for Kemeny's rule is only valid in general for elections with no more than $5$ alternatives with respect to the $3$-wise Kemeny scheme. Several simulations and tests of our algorithms on real-world and uniform data are provided.", "label": 0, "field": "cs"} {"text": "Title: Numerical Analysis for Dirichlet Optimal Control Problems on Convex Polyhedral Domains\nAbstract: In this paper error analysis for finite element discretizations of Dirichlet boundary control problems is developed. For the first time, optimal discretization error estimates are established in the case of three dimensional polyhedral and convex domains. The convergence rates solely depend on the size of largest interior edge angle. These results are comparable to those for the two dimensional case. However, the approaches from the two dimensional setting are not directly extendable such that new techniques have to be used. The theoretical results are confirmed by numerical experiments.", "label": 0, "field": "math"} {"text": "Title: Distributed convergence detection based on global residual error under asynchronous iterations\nAbstract: Convergence of classical parallel iterations is detected by performing a reduction operation at each iteration in order to compute a residual error relative to a potential solution vector. To efficiently run asynchronous iterations, blocking communication requests are avoided, which makes it hard to isolate and handle any global vector. While some termination protocols were proposed for asynchronous iterations, only very few of them are based on global residual computation and guarantee effective convergence. But the most effective and efficient existing solutions feature two reduction operations, which constitutes an important factor of termination delay. In this paper, we present new, non-intrusive, protocols to compute a residual error under asynchronous iterations, requiring only one reduction operation. Various communication models show that some heuristics can even be introduced and formally evaluated. Extensive experiments with up to 5600 processor cores confirm the practical effectiveness and efficiency of our approach.", "label": 0, "field": "cs"} {"text": "Title: Stanley--Elder--Fine theorems for colored partitions\nAbstract: We give a new proof of a partition theorem popularly known as Elder's theorem, but which is also credited to Stanley and Fine. We extend the theorem to the context of colored partitions (or prefabs). More specifically, we give analogous results for $b$-colored partitions, where each part occurs in $b$ colors; for $b$-colored partitions with odd parts (or distinct parts); for partitions where the part $k$ comes in $k$ colors; and, overpartitions.", "label": 1, "field": "math"} {"text": "Title: Implications of some mass-capacity inequalities\nAbstract: Applying a family of mass-capacity related inequalities proved in \\cite{M22}, we obtain sufficient conditions that imply the nonnegativity as well as positive lower bounds of the mass, on a class of manifolds with nonnegative scalar curvature with or without a singularity.", "label": 0, "field": "math"} {"text": "Title: Approximation of polynomials from Walsh tail spaces\nAbstract: We derive various bounds for the $L_p$ distance of polynomials on the hypercube from Walsh tail spaces, extending some of Oleszkiewicz's results (2017) for Rademacher sums.", "label": 0, "field": "math"} {"text": "Title: An Artificial Neural Network Functionalized by Evolution\nAbstract: The topology of artificial neural networks has a significant effect on their performance. Characterizing efficient topology is a field of promising research in Artificial Intelligence. However, it is not a trivial task and it is mainly experimented on through convolutional neural networks. We propose a hybrid model which combines the tensor calculus of feed-forward neural networks with Pseudo-Darwinian mechanisms. This allows for finding topologies that are well adapted for elaboration of strategies, control problems or pattern recognition tasks. In particular, the model can provide adapted topologies at early evolutionary stages, and 'structural convergence', which can found applications in robotics, big-data and artificial life.", "label": 1, "field": "cs"} {"text": "Title: Purposeful and Operation-based Cognitive System for AGI\nAbstract: This paper proposes a new cognitive model, acting as the main component of an AGI agent. The model is introduced in its mature state, and as an extension of previous models, DENN, and especially AKREM, by including operational models (frames/classes) and will. In addition, it is mainly based on the duality principle in every known intelligent aspect, such as exhibiting both top-down and bottom-up model learning, generalization verse specialization, and more. Furthermore, a holistic approach is advocated for AGI designing and cognition under constraints or efficiency is proposed, in the form of reusability and simplicity. Finally, reaching this mature state is described via a cognitive evolution from infancy to adulthood, utilizing a consolidation principle. The final product of this cognitive model is a dynamic operational memory of models and instances.", "label": 1, "field": "cs"} {"text": "Title: On the displacement of generators of free Fuchsian groups\nAbstract: We prove an inequality that must be satisfied by displacement of generators of free Fuchsian groups, which is the two-dimensional version of the $\\log (2k-1)$ Theorem for Kleinian groups due to Anderson-Canary-Culler-Shalen. As applications, we obtain quantitative results on the geometry of hyperbolic surfaces such as the two-dimensional Margulis constant and lengths of closed curves, which improves a result of Buser's.", "label": 1, "field": "math"} {"text": "Title: Ground state and nodal solutions for fractional Orlicz problems with lack of regularity and without the Ambrosetti-Rabinowitz condition\nAbstract: We consider a non-local Shr\\\"odinger problem driven by the fractional Orlicz g-Laplace operator as follows \\begin{equation}\\label{PP} (-\\triangle_{g})^{\\alpha}u+g(u)=K(x)f(x,u),\\ \\ \\text{in}\\ \\mathbb{R}^{d},\\tag{P} \\end{equation} where $d\\geq 3,\\ (-\\triangle_{g})^{\\alpha}$ is the fractional Orlicz g-Laplace operator, $f:\\mathbb{R}^d\\times\\mathbb{R}\\rightarrow \\mathbb{R}$ is a measurable function and $K$ is a positive continuous function. Employing the Nehari manifold method and without assuming the well-known Ambrosetti-Rabinowitz and differentiability conditions on the non-linear term $f$, we prove that the problem \\eqref{PP} has a ground state of fixed sign and a nodal (or sign-changing) solutions.", "label": 1, "field": "math"} {"text": "Title: Rigorous uniaxial limit of the Qian--Sheng inertial Q-tensor hydrodynamics for liquid crystals\nAbstract: This article is concerned with the rigorous connections between the inertial Qian--Sheng model and the Ericksen--Leslie model for the liquid crystal flow, under a more general condition of coefficients. More specifically, in the framework of Hilbert expansions, we show that: (i) when the elastic coefficients tend to zero (also called the uniaxial limit), the smooth solution to the inertial Qian--Sheng model converges to that to the full inertial Ericksen--Leslie model; (ii) when the elastic coefficients and the inertial coefficient tend to zero simultaneously, the smooth solution to the inertial Qian--Sheng model converges to that to the noninertial Ericksen--Leslie model.", "label": 0, "field": "math"} {"text": "Title: Smoothness Estimation for Whittle-Mat\u00e9rn Processes on Closed Riemannian Manifolds\nAbstract: The family of Mat\\'ern kernels are often used in spatial statistics, function approximation and Gaussian process methods in machine learning. One reason for their popularity is the presence of a smoothness parameter that controls, for example, optimal error bounds for kriging and posterior contraction rates in Gaussian process regression. On closed Riemannian manifolds, we show that the smoothness parameter can be consistently estimated from the maximizer(s) of the Gaussian likelihood when the underlying data are from point evaluations of a Gaussian process and, perhaps surprisingly, even when the data comprise evaluations of a non-Gaussian process. The points at which the process is observed need not have any particular spatial structure beyond quasi-uniformity. Our methods are based on results from approximation theory for the Sobolev scale of Hilbert spaces. Moreover, we generalize a well-known equivalence of measures phenomenon related to Mat\\'ern kernels to the non-Gaussian case by using Kakutani's theorem.", "label": 0, "field": "math"} {"text": "Title: Zero-one law for directional transience of one dimensional excited random walks\nAbstract: The probability that a one dimensional excited random walk in stationary ergodic and elliptic cookie environment is transient to the right (left) is either zero or one. This solves a problem posed by Kosygina and Zerner [8].", "label": 1, "field": "math"} {"text": "Title: The weak categorical quiver minor theorem and its applications: matchings, multipaths, and magnitude cohomology\nAbstract: Building upon previous works of Proudfoot and Ramos, and using the categorical framework of Sam and Snowden, we extend the weak categorical minor theorem from undirected graphs to quivers. As case of study, we investigate the consequences on the homology of multipath complexes; eg. on its torsion. Further, we prove a comparison result: we show that, when restricted to directed graphs without oriented cycles, multipath complexes and matching complexes yield functors which commute up to a blow-up operation on directed graphs. We use this fact to compute the homotopy type of matching complexes for a certain class of bipartite graphs also known as half-graphs or ladders. We complement the work with a study of the (representation) category of cones, and with analysing related consequences on magnitude cohomology of quivers.", "label": 0, "field": "math"} {"text": "Title: Effective Ways to Build and Evaluate Individual Survival Distributions\nAbstract: An accurate model of a patient's individual survival distribution can help determine the appropriate treatment for terminal patients. Unfortunately, risk scores (e.g., from Cox Proportional Hazard models) do not provide survival probabilities, single-time probability models (e.g., the Gail model, predicting 5 year probability) only provide for a single time point, and standard Kaplan-Meier survival curves provide only population averages for a large class of patients meaning they are not specific to individual patients. This motivates an alternative class of tools that can learn a model which provides an individual survival distribution which gives survival probabilities across all times - such as extensions to the Cox model, Accelerated Failure Time, an extension to Random Survival Forests, and Multi-Task Logistic Regression. This paper first motivates such \"individual survival distribution\" (ISD) models, and explains how they differ from standard models. It then discusses ways to evaluate such models - namely Concordance, 1-Calibration, Brier score, and various versions of L1-loss - and then motivates and defines a novel approach \"D-Calibration\", which determines whether a model's probability estimates are meaningful. We also discuss how these measures differ, and use them to evaluate several ISD prediction tools, over a range of survival datasets.", "label": 1, "field": "cs"} {"text": "Title: A conjecture of Stanley on alternating permutations\nAbstract: We give two simple proofs of a conjecture of Richard Stanley concerning the equidistribution of derangements and alternating permutations with the maximal number of fixed points.", "label": 1, "field": "math"} {"text": "Title: Obvious Manipulability of Voting Rules\nAbstract: The Gibbard-Satterthwaite theorem states that no unanimous and non-dictatorial voting rule is strategyproof. We revisit voting rules and consider a weaker notion of strategyproofness called not obvious manipulability that was proposed by Troyan and Morrill (2020). We identify several classes of voting rules that satisfy this notion. We also show that several voting rules including k-approval fail to satisfy this property. We characterize conditions under which voting rules are obviously manipulable. One of our insights is that certain rules are obviously manipulable when the number of alternatives is relatively large compared to the number of voters. In contrast to the Gibbard-Satterthwaite theorem, many of the rules we examined are not obviously manipulable. This reflects the relatively easier satisfiability of the notion and the zero information assumption of not obvious manipulability, as opposed to the perfect information assumption of strategyproofness. We also present algorithmic results for computing obvious manipulations and report on experiments.", "label": 1, "field": "cs"} {"text": "Title: Virtual critical regularity of mapping class group actions on the circle\nAbstract: We show that if $G_1$ and $G_2$ are non-solvable groups, then no $C^{1,\\tau}$ action of $(G_1\\times G_2)*\\mathbb{Z}$ on $S^1$ is faithful for $\\tau>0$. As a corollary, if $S$ is an orientable surface of complexity at least three then the critical regularity of an arbitrary finite index subgroup of the mapping class group $\\mathrm{Mod}(S)$ with respect to the circle is at most one, thus strengthening a result of the first two authors with Baik.", "label": 1, "field": "math"} {"text": "Title: Improved Online Algorithm for Weighted Flow Time\nAbstract: We discuss one of the most fundamental scheduling problem of processing jobs on a single machine to minimize the weighted flow time (weighted response time). Our main result is a $O(\\log P)$-competitive algorithm, where $P$ is the maximum-to-minimum processing time ratio, improving upon the $O(\\log^{2}P)$-competitive algorithm of Chekuri, Khanna and Zhu (STOC 2001). We also design a $O(\\log D)$-competitive algorithm, where $D$ is the maximum-to-minimum density ratio of jobs. Finally, we show how to combine these results with the result of Bansal and Dhamdhere (SODA 2003) to achieve a $O(\\log(\\min(P,D,W)))$-competitive algorithm (where $W$ is the maximum-to-minimum weight ratio), without knowing $P,D,W$ in advance. As shown by Bansal and Chan (SODA 2009), no constant-competitive algorithm is achievable for this problem.", "label": 1, "field": "cs"} {"text": "Title: An improved spectral inequality for sums of eigenfunctions\nAbstract: We establish a new spectral inequality for the quantified estimation of the $H^s$-norm, $s\\ge 0$ of a finite linear combination of eigenfunctions in a domain in terms of its $H^s$-norm in a strictly open subset of the whole domain. The corresponding upper bound depends exponentially on the square root of the frequency number associated to the linear combination.", "label": 0, "field": "math"} {"text": "Title: Feature Selection for Discovering Distributional Treatment Effect Modifiers\nAbstract: Finding the features relevant to the difference in treatment effects is essential to unveil the underlying causal mechanisms. Existing methods seek such features by measuring how greatly the feature attributes affect the degree of the {\\it conditional average treatment effect} (CATE). However, these methods may overlook important features because CATE, a measure of the average treatment effect, cannot detect differences in distribution parameters other than the mean (e.g., variance). To resolve this weakness of existing methods, we propose a feature selection framework for discovering {\\it distributional treatment effect modifiers}. We first formulate a feature importance measure that quantifies how strongly the feature attributes influence the discrepancy between potential outcome distributions. Then we derive its computationally efficient estimator and develop a feature selection algorithm that can control the type I error rate to the desired level. Experimental results show that our framework successfully discovers important features and outperforms the existing mean-based method.", "label": 1, "field": "cs"} {"text": "Title: Simplified Information Geometry Approach for Massive MIMO-OFDM Channel Estimation -- Part II: Convergence Analysis\nAbstract: In Part II of this two-part paper, we prove the convergence of the simplified information geometry approach (SIGA) proposed in Part I. For a general Bayesian inference problem, we first show that the iteration of the common second-order natural parameter (SONP) is separated from that of the common first-order natural parameter (FONP). Hence, the convergence of the common SONP can be checked independently. We show that with the initialization satisfying a specific but large range, the common SONP is convergent regardless of the value of the damping factor. For the common FONP, we establish a sufficient condition of its convergence and prove that the convergence of the common FONP relies on the spectral radius of a particular matrix related to the damping factor. We give the range of the damping factor that guarantees the convergence in the worst case. Further, we determine the range of the damping factor for massive MIMO-OFDM channel estimation by using the specific properties of the measurement matrices. Simulation results are provided to confirm the theoretical results.", "label": 0, "field": "cs"} {"text": "Title: The effect of approximate coarsest-level solves on the convergence of multigrid V-cycle methods\nAbstract: The multigrid V-cycle method is a popular method for solving systems of linear equations. It computes an approximate solution by using smoothing on fine levels and solving a system of linear equations on the coarsest level. Solving on the coarsest level depends on the size and difficulty of the problem. If the size permits, it is typical to use a direct method based on LU or Cholesky decomposition. In settings with large coarsest-level problems, approximate solvers such as iterative Krylov subspace methods, or direct methods based on low-rank approximation, are often used. The accuracy of the coarsest-level solver is typically determined based on the experience of the users with the concrete problems and methods. In this paper we present an approach to analyzing the effects of approximate coarsest-level solves on the convergence of the V-cycle method for symmetric positive definite problems. Using these results, we derive coarsest-level stopping criterion through which we may control the difference between the approximation computed by a V-cycle method with approximate coarsest-level solver and the approximation which would be computed if the coarsest-level problems were solved exactly. The coarsest-level stopping criterion may thus be set up such that the V-cycle method converges to a chosen finest-level accuracy in (nearly) the same number of V-cycle iterations as the V-cycle method with exact coarsest-level solver. We also utilize the theoretical results to discuss how the convergence of the V-cycle method may be affected by the choice of a tolerance in a coarsest-level stopping criterion based on the relative residual norm.", "label": 0, "field": "math"} {"text": "Title: Capacity Bounds and User Identification Costs in Rayleigh-Fading Many-Access Channel\nAbstract: Many-access channel (MnAC) model allows the number of users in the system and the number of active users to scale as a function of the blocklength and as such is suited for dynamic communication systems with massive number of users such as the Internet of Things. Existing MnAC models assume a priori knowledge of channel gains which is impractical since acquiring Channel State Information (CSI) for massive number of users can overwhelm the available radio resources. This paper incorporates Rayleigh fading effects to the MnAC model and derives an upper bound on the symmetric message-length capacity of the Rayleigh-fading Gaussian MnAC. Furthermore, a lower bound on the minimum number of channel uses for discovering the active users is established. In addition, the performance of Noisy Combinatorial Orthogonal Matching Pursuit (N-COMP) based group testing (GT) is studied as a practical strategy for active device discovery. Simulations show that, for a given SNR, as the number of users increase, the required number of channel uses for N-COMP GT scales approximately the same way as the lower bound on minimum user identification cost. Moreover, in the low SNR regime, for sufficiently large population sizes, the number of channel uses required by N-COMP GT was observed to be within a factor of two of the lower bound when the expected number of active users scales sub-linearly with the total population size.", "label": 1, "field": "cs"} {"text": "Title: Squared chromatic number without claws or large cliques\nAbstract: Let $G$ be a claw-free graph on $n$ vertices with clique number $\\omega$, and consider the chromatic number $\\chi(G^2)$ of the square $G^2$ of $G$. Writing $\\chi'_s(d)$ for the supremum of $\\chi(L^2)$ over the line graphs $L$ of simple graphs of maximum degree at most $d$, we prove that $\\chi(G^2)\\le \\chi'_s(\\omega)$ for $\\omega \\in \\{3,4\\}$. For $\\omega=3$, this implies the sharp bound $\\chi(G^2) \\leq 10$. For $\\omega=4$, this implies $\\chi(G^2)\\leq 22$, which is within $2$ of the conjectured best bound. This work is motivated by a strengthened form of a conjecture of Erd\\H{o}s and Ne\\v{s}et\\v{r}il.", "label": 1, "field": "math"} {"text": "Title: Non-isogenous superelliptic jacobians II\nAbstract: Let $\\ell$ be an odd prime and $K$ a field of characteristic different from $\\ell$. Let $\\bar{K}$ be an algebraic closure of $K$. Assume that $K$ contains a primitive $\\ell$th root of unity. Let $n \\ne \\ell$ be another odd prime. Let $f(x)$ and $h(x)$ be degree $n$ polynomials with coefficients in $K$ and without repeated roots. Let us consider superelliptic curves $C_{f,\\ell}: y^{\\ell}=f(x)$ and $C_{h,\\ell}: y^{\\ell}=h(x)$ of genus $(n-1)(\\ell-1)/2$, and their jacobians $J^{(f,\\ell)}$ and $J^{(h,\\ell)}$, which are $(n-1)(\\ell-1)/2$-dimensional abelian varieties over $\\bar{K}$. Suppose that one of the polynomials is irreducible and the other reducible over $K$. We prove that if $J^{(f,\\ell)}$ and $J^{(h,\\ell)}$ are isogenous over $\\bar{K}$ then both endomorphism algebras $\\mathrm{End}^{0}(J^{(f,\\ell)})$ and $\\mathrm{End}^{0}(J^{(h,\\ell)})$ contain an invertible element of multiplicative order $n$.", "label": 0, "field": "math"} {"text": "Title: On Zeros of q-Entire Functions\nAbstract: In this work we first give a upper bound for the modulus of q-transcendental entire functions, then prove certain sums associated with their zeros are convergent, and derive the asymptotic behaviors of their associated heat kernels.", "label": 0, "field": "math"} {"text": "Title: A Decision Method for Elementary Stream Calculus\nAbstract: The main result is a doubly exponential decision procedure for the first-order equality theory of streams with both arithmetic and control-oriented stream operations. This stream logic is expressive for elementary problems of stream calculus.", "label": 0, "field": "cs"} {"text": "Title: Micro-macro Parareal, from ODEs to SDEs and back again\nAbstract: In this paper, we are concerned with the micro-macro Parareal algorithm for the simulation of initial-value problems. In this algorithm, a coarse (fast) solver is applied sequentially over the time domain, and a fine (time-consuming) solver is applied as a corrector in parallel over smaller chunks of the time interval. Moreover, the coarse solver acts on a reduced state variable, which is coupled to the fine state variable through appropriate coupling operators. We first provide a contribution to the convergence analysis of the micro-macro Parareal method for multiscale linear ordinary differential equations (ODEs). Then, we extend a variant of the micro-macro Parareal algorithm for scalar stochastic differential equations (SDEs) to higher-dimensional SDEs.", "label": 0, "field": "math"} {"text": "Title: LLM Augmented LLMs: Expanding Capabilities through Composition\nAbstract: Foundational models with billions of parameters which have been trained on large corpora of data have demonstrated non-trivial skills in a variety of domains. However, due to their monolithic structure, it is challenging and expensive to augment them or impart new skills. On the other hand, due to their adaptation abilities, several new instances of these models are being trained towards new domains and tasks. In this work, we study the problem of efficient and practical composition of existing foundation models with more specific models to enable newer capabilities. To this end, we propose CALM -- Composition to Augment Language Models -- which introduces cross-attention between models to compose their representations and enable new capabilities. Salient features of CALM are: (i) Scales up LLMs on new tasks by 're-using' existing LLMs along with a few additional parameters and data, (ii) Existing model weights are kept intact, and hence preserves existing capabilities, and (iii) Applies to diverse domains and settings. We illustrate that augmenting PaLM2-S with a smaller model trained on low-resource languages results in an absolute improvement of up to 13\\% on tasks like translation into English and arithmetic reasoning for low-resource languages. Similarly, when PaLM2-S is augmented with a code-specific model, we see a relative improvement of 40\\% over the base model for code generation and explanation tasks -- on-par with fully fine-tuned counterparts.", "label": 0, "field": "cs"} {"text": "Title: Act as You Learn: Adaptive Decision-Making in Non-Stationary Markov Decision Processes\nAbstract: A fundamental (and largely open) challenge in sequential decision-making is dealing with non-stationary environments, where exogenous environmental conditions change over time. Such problems are traditionally modeled as non-stationary Markov decision processes (NSMDP). However, existing approaches for decision-making in NSMDPs have two major shortcomings: first, they assume that the updated environmental dynamics at the current time are known (although future dynamics can change); and second, planning is largely pessimistic, i.e., the agent acts ``safely'' to account for the non-stationary evolution of the environment. We argue that both these assumptions are invalid in practice -- updated environmental conditions are rarely known, and as the agent interacts with the environment, it can learn about the updated dynamics and avoid being pessimistic, at least in states whose dynamics it is confident about. We present a heuristic search algorithm called \\textit{Adaptive Monte Carlo Tree Search (ADA-MCTS)} that addresses these challenges. We show that the agent can learn the updated dynamics of the environment over time and then act as it learns, i.e., if the agent is in a region of the state space about which it has updated knowledge, it can avoid being pessimistic. To quantify ``updated knowledge,'' we disintegrate the aleatoric and epistemic uncertainty in the agent's updated belief and show how the agent can use these estimates for decision-making. We compare the proposed approach with the multiple state-of-the-art approaches in decision-making across multiple well-established open-source problems and empirically show that our approach is faster and highly adaptive without sacrificing safety.", "label": 0, "field": "cs"} {"text": "Title: Stability Conditions and Semiorthogonal Decompositions I: Quasi-convergence\nAbstract: We develop a framework relating semiorthogonal decompositions of a triangulated category $\\mathcal{C}$ to paths in its space of stability conditions. We prove that when $\\mathcal{C}$ is the homotopy category of a smooth and proper pre-triangulated dg-category, every semiorthogonal decomposition whose semiorthogonal factors admit a Bridgeland stability condition can be obtained from our framework.", "label": 0, "field": "math"} {"text": "Title: Learned Image Downscaling for Upscaling using Content Adaptive Resampler\nAbstract: Deep convolutional neural network based image super-resolution (SR) models have shown superior performance in recovering the underlying high resolution (HR) images from low resolution (LR) images obtained from the predefined downscaling methods. In this paper we propose a learned image downscaling method based on content adaptive resampler (CAR) with consideration on the upscaling process. The proposed resampler network generates content adaptive image resampling kernels that are applied to the original HR input to generate pixels on the downscaled image. Moreover, a differentiable upscaling (SR) module is employed to upscale the LR result into its underlying HR counterpart. By back-propagating the reconstruction error down to the original HR input across the entire framework to adjust model parameters, the proposed framework achieves a new state-of-the-art SR performance through upscaling guided image resamplers which adaptively preserve detailed information that is essential to the upscaling. Experimental results indicate that the quality of the generated LR image is comparable to that of the traditional interpolation based method, but the significant SR performance gain is achieved by deep SR models trained jointly with the CAR model. The code is publicly available on: URL https://github.com/sunwj/CAR.", "label": 1, "field": "cs"} {"text": "Title: Representing maps for semibounded forms and their Lebesgue type decompositions\nAbstract: For a semibounded sesquilinear form ${\\mathfrak t}$ in a Hilbert space ${\\mathfrak H}$ there exists a representing map $Q$ from ${\\mathfrak H}$ to another Hilbert space ${\\mathfrak K}$, such that ${\\mathfrak t}[\\varphi, \\psi]-c(\\varphi, \\psi)=(Q\\varphi,Q\\psi)$, $\\varphi,\\psi \\in {\\rm dom\\,}{\\mathfrak t}$, with $c \\in {\\mathbb R}$ a lower bound of ${\\mathfrak t}$. Representing maps offer a simplifying tool to study general semibounded forms. By means of representing maps closedness, closability, and singularity of ${\\mathfrak t}$ are immediately translated into the corresponding properties of the operator $Q$, and vice versa. Also properties of sum decompositions ${\\mathfrak t}={\\mathfrak t}_1+{\\mathfrak t}_2$ of a nonnegative form ${\\mathfrak t}$ with two other nonnegative forms ${\\mathfrak t}_1$ and ${\\mathfrak t}_2$ in ${\\mathfrak H}$ can be analyzed by means of associated nonnegative contractions $K\\in {\\mathbf B}({\\mathfrak K})$. This helps, for instance, to establish an explicit operator theoretic characterization for the summands ${\\mathfrak t}_1$ and ${\\mathfrak t}_2$ to be, or not to be, mutually singular. Such sum decompositions are used to study characteristic properties of the so-called Lebesgue type decompositions of semibounded forms ${\\mathfrak t}$, where ${\\mathfrak t}_1$ is closable and ${\\mathfrak t}_2$ singular; in particular, this includes the Lebesgue decomposition of a semibounded form due to B. Simon. Furthermore, for a semibounded form ${\\mathfrak t}$ with its representing map $Q$ it will be shown that the corresponding semibounded selfadjoint relation $Q^*Q^{**} +c$ is uniquely determined by a limit version of the classical representation theorem for the form ${\\mathfrak t}$, being studied by W. Arendt and T. ter Elst in a sectorial context. Via representing maps a full treatment is given of the convergence of monotone sequences of semibounded forms.", "label": 0, "field": "math"} {"text": "Title: DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification\nAbstract: Diffusion-based purification defenses leverage diffusion models to remove crafted perturbations of adversarial examples and achieve state-of-the-art robustness. Recent studies show that even advanced attacks cannot break such defenses effectively, since the purification process induces an extremely deep computational graph which poses the potential problem of gradient obfuscation, high memory cost, and unbounded randomness. In this paper, we propose a unified framework DiffAttack to perform effective and efficient attacks against diffusion-based purification defenses, including both DDPM and score-based approaches. In particular, we propose a deviated-reconstruction loss at intermediate diffusion steps to induce inaccurate density gradient estimation to tackle the problem of vanishing/exploding gradients. We also provide a segment-wise forwarding-backwarding algorithm, which leads to memory-efficient gradient backpropagation. We validate the attack effectiveness of DiffAttack compared with existing adaptive attacks on CIFAR-10 and ImageNet. We show that DiffAttack decreases the robust accuracy of models compared with SOTA attacks by over 20% on CIFAR-10 under $\\ell_\\infty$ attack $(\\epsilon=8/255)$, and over 10% on ImageNet under $\\ell_\\infty$ attack $(\\epsilon=4/255)$. We conduct a series of ablations studies, and we find 1) DiffAttack with the deviated-reconstruction loss added over uniformly sampled time steps is more effective than that added over only initial/final steps, and 2) diffusion-based purification with a moderate diffusion length is more robust under DiffAttack.", "label": 0, "field": "cs"} {"text": "Title: Root multiplicities for Borcherds algebras and graph coloring\nAbstract: We establish a connection between root multiplicities for Borcherds-Kac-Moody algebras and graph coloring. We show that the generalized chromatic polynomial of the graph associated to a given Borcherds algebra can be used to give a closed formula for certain root multiplicities. Using this connection we give a second interpretation, namely that the root multiplicity of a given root coincides with the number of acyclic orientations with a unique sink of a certain graph (depending on the root). Finally, using the combinatorics of Lyndon words we construct a basis for the root spaces corresponding to these roots and determine the Hilbert series in the case when all simple roots are imaginary. As an application we give a Lie theoretic proof of Stanley's reciprocity theorem of chromatic polynomials.", "label": 1, "field": "math"} {"text": "Title: Towards Seamless Serverless Computing Across an Edge-Cloud Continuum\nAbstract: Serverless computing has emerged as an attractive paradigm due to the efficiency of development and the ease of deployment without managing any underlying infrastructure. Nevertheless, serverless computing approaches face numerous challenges to unlock their full potential in hybrid environments. To gain a deeper understanding and firsthand knowledge of serverless computing in edge-cloud deployments, we review the current state of open-source serverless platforms and compare them based on predefined requirements. We then design and implement a serverless computing platform with a novel edge orchestration technique that seamlessly deploys serverless functions across the edge and cloud environments on top of the Knative serverless platform. Moreover, we propose an offloading strategy for edge environments and four different functions for experimentation and showcase the performance benefits of our solution. Our results demonstrate that such an approach can efficiently utilize both cloud and edge resources by dynamically offloading functions from the edge to the cloud during high activity, while reducing the overall application latency and increasing request throughput compared to an edge-only deployment.", "label": 0, "field": "cs"} {"text": "Title: MindOpt Adapter for CPLEX Benchmarking Performance Analysis\nAbstract: This report provides a comprehensive analysis of the performance of MindOpt Adapter for CPLEX 12.9 in benchmark testing. CPLEX, recognized as a robust Mixed Integer Programming (MIP) solver, has faced some scrutiny regarding its performance on MIPLIB 2017 when configured to default settings. MindOpt Adapter aims to enhance CPLEX's performance by automatically applying improved configurations for solving optimization problems. Our testing demonstrates that MindOpt Adapter for CPLEX yields successfully solved 230 of the 240 problems in the MIPLIB 2017 benchmark set. This performance surpasses all the other solvers in terms of the number of problems solved and the geometric mean of running times. The report provides a comparison of the benchmark results against the outcomes achieved by CPLEX under its default configuration.", "label": 0, "field": "cs"} {"text": "Title: Cross-Layer Modeling of Randomly Spread CDMA Using Stochastic Network Calculus\nAbstract: Code-division multiple-access (CDMA) has the potential to support traffic sources with a wide range of quality of service (QoS) requirements. The traffic carrying capacity of CDMA channels under QoS constraints (such as delay guarantee) is, however, less well-understood. In this work, we propose a method based on stochastic network calculus and large system analysis to quantify the maximum traffic that can be carried by a multiuser CDMA network under the QoS constraints. At the physical layer, we have linear minimum-mean square error receivers and adaptive modulation and coding, while the channel service process is modeled by using a finite-state Markov chain. We study the impact of delay requirements, violation probability and the user load on the traffic carrying capacity under different signal strengths. A key insight provided by the numerical results is as to how much one has to back-off from capacity under the different delay requirements.", "label": 1, "field": "cs"} {"text": "Title: Involutions under Bruhat order and labeled Motzkin Paths\nAbstract: In this note, we introduce a statistic on Motzkin paths that describes the rank generating function of Bruhat order for involutions. Our proof relies on a bijection introduced by Philippe Biane from permutations to certain labeled Motzkin paths and a recently introduced interpretation of this rank generating function in terms of visible inversions. By restricting our identity to fixed-point-free (FPF) involutions, we recover an identity due to Louis Billera, Lionel Levine and Karola M\\'esz\\'aros with a previous bijective proof by Matthew Watson. Our work sheds new light on the Ethiopian dinner game.", "label": 1, "field": "math"} {"text": "Title: A Bregman Proximal Stochastic Gradient Method with Extrapolation for Nonconvex Nonsmooth Problems\nAbstract: In this paper, we explore a specific optimization problem that involves the combination of a differentiable nonconvex function and a nondifferentiable function. The differentiable component lacks a global Lipschitz continuous gradient, posing challenges for optimization. To address this issue and accelerate the convergence, we propose a Bregman proximal stochastic gradient method with extrapolation (BPSGE), which only requires smooth adaptivity of the differentiable part. Under the variance reduction framework, we not only analyze the subsequential and global convergence of the proposed algorithm under certain conditions, but also analyze the sublinear convergence rate of the subsequence, and the complexity of the algorithm, revealing that the BPSGE algorithm requires at most O(epsilon\\^\\,(-2)) iterations in expectation to attain an epsilon-stationary point. To validate the effectiveness of our proposed algorithm, we conduct numerical experiments on three real-world applications: graph regularized nonnegative matrix factorization (NMF), matrix factorization with weakly-convex regularization, and NMF with nonconvex sparsity constraints. These experiments demonstrate that BPSGE is faster than the baselines without extrapolation.", "label": 0, "field": "math"} {"text": "Title: Filtrations for $\\mathbb{wK4}$ and its relatives\nAbstract: We study the finite model property of subframe logics with expressible transitive reflexive closure modality. For $m>0$, let $\\mathrm{L}_m$ be the logic given by axiom $\\lozenge^{m+1} p\\to \\lozenge p\\vee p$. We construct filtrations for the logics $\\mathrm{L}_m$. It follows that these logics and their tense counterparts have the finite model property. Then we show that every canonical subframe logic that contains $\\mathrm{L}_m$ have the finite model property.", "label": 0, "field": "math"} {"text": "Title: ClassWise-SAM-Adapter: Parameter Efficient Fine-tuning Adapts Segment Anything to SAR Domain for Semantic Segmentation\nAbstract: In the realm of artificial intelligence, the emergence of foundation models, backed by high computing capabilities and extensive data, has been revolutionary. Segment Anything Model (SAM), built on the Vision Transformer (ViT) model with millions of parameters and vast training dataset SA-1B, excels in various segmentation scenarios relying on its significance of semantic information and generalization ability. Such achievement of visual foundation model stimulates continuous researches on specific downstream tasks in computer vision. The ClassWise-SAM-Adapter (CWSAM) is designed to adapt the high-performing SAM for landcover classification on space-borne Synthetic Aperture Radar (SAR) images. The proposed CWSAM freezes most of SAM's parameters and incorporates lightweight adapters for parameter efficient fine-tuning, and a classwise mask decoder is designed to achieve semantic segmentation task. This adapt-tuning method allows for efficient landcover classification of SAR images, balancing the accuracy with computational demand. In addition, the task specific input module injects low frequency information of SAR images by MLP-based layers to improve the model performance. Compared to conventional state-of-the-art semantic segmentation algorithms by extensive experiments, CWSAM showcases enhanced performance with fewer computing resources, highlighting the potential of leveraging foundational models like SAM for specific downstream tasks in the SAR domain. The source code is available at: https://github.com/xypu98/CWSAM.", "label": 0, "field": "cs"} {"text": "Title: Weierstrass Bridges\nAbstract: We introduce a new class of stochastic processes called fractional Wiener-Weierstrass bridges. They arise by applying the convolution from the construction of the classical, fractal Weierstrass functions to an underlying fractional Brownian bridge. By analyzing the $p$-th variation of the fractional Wiener-Weierstrass bridge along the sequence of $b$-adic partitions, we identify two regimes in which the processes exhibit distinct sample path properties. We also analyze the critical case between those two regimes for Wiener-Weierstrass bridges that are based on standard Brownian bridge. We furthermore prove that fractional Wiener-Weierstrass bridges are never semimartingales, and we show that their covariance functions are typically fractal functions. Some of our results are extended to Weierstrass bridges based on bridges derived from a general continuous Gaussian martingale.", "label": 0, "field": "math"} {"text": "Title: Dirac geometry II: Coherent cohomology\nAbstract: Whatever it is that animates anima and breathes life into higher algebra, this something leaves its trace in the structure of a Dirac ring on the homotopy groups of a commutative algebra in spectra. In the prequel to this paper, we developed the commutative algebra of Dirac rings and defined the category of Dirac schemes. Here, we first embed this category in the larger infinity-category of Dirac stacks, which also contains formal Dirac schemes. We next develop the coherent cohomology of Dirac stacks, which amounts to a functor that to a Dirac stack X assigns a presentably symmetric monoidal stable infinity-category QCoh(X) of quasi-coherent sheaves together with a compatible t-structure. Finally, as applications of the general theory to stable homotopy theory, we use Quillen's theorem on complex cobordism and Milnor's theorem on the dual Steenrod algebra to identify the Dirac stacks corresponding to MU and F_p in terms of their functors of points. In the appendix, we develop a rudimentary theory of accessible presheaves of anima on coaccessible infinity-categories.", "label": 0, "field": "math"} {"text": "Title: Expressive Speech-driven Facial Animation with controllable emotions\nAbstract: It is in high demand to generate facial animation with high realism, but it remains a challenging task. Existing approaches of speech-driven facial animation can produce satisfactory mouth movement and lip synchronization, but show weakness in dramatic emotional expressions and flexibility in emotion control. This paper presents a novel deep learning-based approach for expressive facial animation generation from speech that can exhibit wide-spectrum facial expressions with controllable emotion type and intensity. We propose an emotion controller module to learn the relationship between the emotion variations (e.g., types and intensity) and the corresponding facial expression parameters. It enables emotion-controllable facial animation, where the target expression can be continuously adjusted as desired. The qualitative and quantitative evaluations show that the animation generated by our method is rich in facial emotional expressiveness while retaining accurate lip movement, outperforming other state-of-the-art methods.", "label": 0, "field": "cs"} {"text": "Title: Balanced infinitesimal bialgebras, double Poisson gebras and pre-Calabi-Yau algebras\nAbstract: We consider the properad that governs the balanced infinitesimal bialgebras equipped with a coproduct of degree $1-d$. This properad naturally encodes a tiny part of the structure of the pre-Calabi-Yau algebras of dimension $d$. We compute its cobar construction and show that its gebras are \"in between\" the homotopy double Poisson gebras and the pre-Calabi-Yau algebras. Finally, we show that, if one is willing to consider their curved version, the two resulting notions of curved homotopy balanced infinitesimal bialgebra and curved homotopy double Poisson gebra are equivalent. A relation with the homotopy odd Lie bialgebras is also discussed.", "label": 0, "field": "math"} {"text": "Title: New Generalizations of the Bethe Approximation via Asymptotic Expansion\nAbstract: The Bethe approximation, discovered in statistical physics, gives an efficient algorithm called belief propagation (BP) for approximating a partition function. BP empirically gives an accurate approximation for many problems, e.g., low-density parity-check codes, compressed sensing, etc. Recently, Vontobel gives a novel characterization of the Bethe approximation using graph cover. In this paper, a new approximation based on the Bethe approximation is proposed. The new approximation is derived from Vontobel's characterization using graph cover, and expressed by using the edge zeta function, which is related with the Hessian of the Bethe free energy as shown by Watanabe and Fukumizu. On some conditions, it is proved that the new approximation is asymptotically better than the Bethe approximation.", "label": 1, "field": "cs"} {"text": "Title: A phase field formulation for hydrogen assisted cracking\nAbstract: We present a phase field modeling framework for hydrogen assisted cracking. The model builds upon a coupled mechanical and hydrogen diffusion response, driven by chemical potential gradients, and a hydrogen-dependent fracture energy degradation law grounded on first principles calculations. The coupled problem is solved in an implicit time integration scheme, where displacements, phase field order parameter and hydrogen concentration are the primary variables. We show that phase field formulations for fracture are particularly suitable to capture material degradation due to hydrogen. Specifically, we model (i) unstable crack growth in the presence of hydrogen, (ii) failure stress sensitivity to hydrogen content in notched specimens, (iii) cracking thresholds under constant load, (iv) internal hydrogen assisted fracture in cracked specimens, and (v) complex crack paths arising from corrosion pits. Computations reveal a good agreement with experiments, highlighting the predictive capabilities of the present scheme. The work could have important implications for the prediction and prevention of catastrophic failures in corrosive environments. The finite element code developed can be downloaded from www.empaneda.com/codes", "label": 1, "field": "math"} {"text": "Title: On the measurability of a numerical function with respect to a family of sets\nAbstract: The following document is a translation (from French to English) of: Gabriele H. Greco, Sur la mesurabilit\\'e d'une fonction num\\'erique par rapport \\`a une famille d'ensembles, Rendiconti del Seminario Matematico della Universit\\`a di Padova}, tome 65 (1981), pp. 163--176. Translated by: Jonathan M. Keith, School of Mathematics, Monash University, jonathan.keith@monash.edu. With thanks to: Prof. Andrea D'Agnolo, Editor-in-Chief of the above journal, for permission to publish this translation.", "label": 0, "field": "math"} {"text": "Title: On a variety of right-symmetric algebras\nAbstract: We construct a finite-dimensional metabelian right-symmetric algebra over an arbitrary field that does not have a finite basis of identities.", "label": 0, "field": "math"} {"text": "Title: All terms in a complete exceptional sequence are relatively projective or relatively injective\nAbstract: We prove the statement in the title, define the terms and give one application.", "label": 0, "field": "math"} {"text": "Title: A new version of Toom's proof\nAbstract: There are several proofs now for the stability of Toom's example of a two-dimensional stable cellular automaton and its application to fault-tolerant computation. Simon and Berman simplified and strengthened Toom's original proof: the present report is a simplified exposition of their proof.", "label": 1, "field": "cs"} {"text": "Title: Definability of continuous isomorphisms of groups definable in o-minimal expansions of the real field\nAbstract: In this paper, we study the relation between the category of real Lie groups and that of groups definable in o-minimal expansions of the real field (which we will refer to as \"definable groups\"). It is known (\\cite{Pi88}) that any group definable in an o-minimal expansion of the real field is a Lie group, and in \\cite{COP} a complete characterization of when a Lie group has a \"definable group\" which is \\emph{Lie isomorphic} to it was given. We continue the analysis by explaining when a Lie homomorphism between definable groups is a definable isomorphism. Among other things, we prove that in any o-minimal expansion $\\mathcal R$ of the real field we can add a function symbol for any Lie isomorphism between definable groups to the language of $\\mathcal R$ preserving o-minimality, and that any definable group $G$ can be endowed with an analytic manifold structure definable in $\\mathcal R_{\\text{Pfaff}}$ that makes it an analytic group.", "label": 0, "field": "math"} {"text": "Title: Stability of Rellich-Sobolev type inequality involving Hardy term for bi-Laplacian\nAbstract: For $N\\geq 5$ and $0<\\mu0$ are small parameters, $\\eta$ is the outward unit vector normal to $\\partial \\Omega,$ $f_1,\\,f_2:\\Omega\\times\\mathbb{R}^2\\times\\mathbb{R}^{2N}\\rightarrow \\mathbb{R}$ are Carath\\'{e}odory functions that satisfy certain growth conditions, and $\\Delta _{p_i}$ ($1