id
stringlengths
9
16
submitter
stringlengths
1
59
authors
stringlengths
5
12.7k
title
stringlengths
0
319
comments
stringlengths
1
567
journal-ref
stringlengths
4
345
doi
stringlengths
11
138
report-no
stringlengths
2
330
categories
stringlengths
5
124
license
stringclasses
9 values
abstract
stringlengths
260
2.32k
versions
listlengths
2
50
update_date
stringdate
2007-05-23 00:00:00
2025-03-21 00:00:00
authors_parsed
listlengths
1
973
first_version_created
stringlengths
28
29
first_version_dt
timestamp[ns, tz=UTC]date
1991-08-26 21:15:24
2022-11-30 22:49:56
top_categories
listlengths
1
6
dataset
stringclasses
3 values
entry_type
stringclasses
2 values
citation_key
stringlengths
10
53
editor
stringclasses
651 values
month
stringclasses
64 values
year
float64
1.96k
2.02k
address
stringclasses
189 values
publisher
stringclasses
41 values
url
stringlengths
34
61
author
stringlengths
7
1.22k
booktitle
stringclasses
755 values
pages
stringlengths
1
12
pmid
float64
20.1M
31.9M
journal
stringlengths
3
239
2101.04438
Agustin Moreno
Agustin Moreno
The symplectic geometry of the three-body problem
225 pages. v3: significantly expanded to a book format
null
null
null
math.SG math-ph math.DS math.MP
http://creativecommons.org/licenses/by-nc-sa/4.0/
A draft of a book in progress, concerning the classical restricted three body problem, and the approach to this old conundrum coming from the modern methods of symplectic and contact geometry. It is split into Part I (theoretical aspects), and Part II (practical aspects). The main themes are Floer theory, contact topology, symplectic dynamics, and space mission design.
[ { "created": "Tue, 12 Jan 2021 12:23:10 GMT", "version": "v1" }, { "created": "Wed, 12 May 2021 20:56:49 GMT", "version": "v2" }, { "created": "Thu, 25 Jan 2024 12:29:42 GMT", "version": "v3" } ]
2024-01-26
[ [ "Moreno", "Agustin", "" ] ]
Tue, 12 Jan 2021 12:23:10 GMT
2021-01-12T12:23:10Z
[ "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Effectiveness of cognitive behaviour therapy for the treatment of catastrophisation in patients with fibromyalgia: a randomised controlled trial.
null
null
null
null
null
null
No randomised, controlled trials have been conducted to date on the efficacy of psychological and pharmacological treatments of pain catastrophising (PC) in patients with fibromyalgia. Our aim in this study was to assess the effectiveness of cognitive-behaviour therapy (CBT) and the recommended pharmacological treatment (RPT) compared with treatment as usual (TAU) at the primary care level for the treatment of PC in fibromyalgia patients.
null
null
null
null
null
null
pubmed
null
null
null
null
2,011
null
null
null
null
null
null
22,018,333
Arthritis research & therapy
hep-th/0502019
Toshiaki Tanaka
Toshiaki Tanaka
A New Construction of Quasi-solvable Quantum Many-body Systems of Deformed Calogero-Sutherland Type
31 pages, no figures; minor revision, to appear in Annals of Physics
Annals Phys. 320 (2005) 199-225
10.1016/j.aop.2005.08.001
null
hep-th math-ph math.MP nlin.SI
null
We make a new multivariate generalization of the type A monomial space of a single variable. It is different from the previously introduced type A space of several variables which is an sl(M+1) module, and we thus call it type A'. We construct the most general quasi-solvable operator of (at most) second-order which preserves the type A' space. Investigating directly the condition under which the type A' operators can be transformed to Schroedinger operators, we obtain the complete list of the type A' quasi-solvable quantum many-body systems. In particular, we find new quasi-solvable models of deformed Calogero-Sutherland type which are different from the Inozemtsev systems. We also examine a new multivariate generalization of the type C monomial space based on the type A' scheme.
[ { "created": "Tue, 1 Feb 2005 19:05:52 GMT", "version": "v1" }, { "created": "Tue, 30 Aug 2005 11:09:26 GMT", "version": "v2" } ]
2007-05-23
[ [ "Tanaka", "Toshiaki", "" ] ]
Tue, 1 Feb 2005 19:05:52 GMT
2005-02-01T19:05:52Z
[ "physics", "math", "nlin" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1311.4766
Nicholas Ham
Nicholas Ham
Notions of Anonymity, Fairness and Symmetry for Finite Strategic-Form Games
32 pages
null
null
null
math.CO cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we survey various notions of anonymity and symmetry for finite strategic-form games present in relevant literature, and discuss notions of fairness; show that game bijections and game isomorphisms form groupoids; introduce matchings as a convenient characterisation of strategy triviality; and outline how to construct and partially order parameterised (symmetric) games with examples that range all combinations of surveyed symmetry notions, which when combined with other results in this paper gives the precise relationship between the various symmetry notions.
[ { "created": "Mon, 18 Nov 2013 10:25:04 GMT", "version": "v1" }, { "created": "Sun, 6 May 2018 05:12:04 GMT", "version": "v2" }, { "created": "Tue, 29 May 2018 12:50:22 GMT", "version": "v3" }, { "created": "Tue, 7 Aug 2018 03:00:07 GMT", "version": "v4" }, { "created": "Wed, 5 May 2021 17:25:13 GMT", "version": "v5" } ]
2021-05-06
[ [ "Ham", "Nicholas", "" ] ]
Mon, 18 Nov 2013 10:25:04 GMT
2013-11-18T10:25:04Z
[ "cs", "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1810.02334
Kyle Hsu
Kyle Hsu and Sergey Levine and Chelsea Finn
Unsupervised Learning via Meta-Learning
ICLR 2019 camera-ready. 24 pages, 2 figures, links to code available at https://sites.google.com/view/unsupervised-via-meta
null
null
null
cs.LG cs.AI cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A central goal of unsupervised learning is to acquire representations from unlabeled data or experience that can be used for more effective learning of downstream tasks from modest amounts of labeled data. Many prior unsupervised learning works aim to do so by developing proxy objectives based on reconstruction, disentanglement, prediction, and other metrics. Instead, we develop an unsupervised meta-learning method that explicitly optimizes for the ability to learn a variety of tasks from small amounts of data. To do so, we construct tasks from unlabeled data in an automatic way and run meta-learning over the constructed tasks. Surprisingly, we find that, when integrated with meta-learning, relatively simple task construction mechanisms, such as clustering embeddings, lead to good performance on a variety of downstream, human-specified tasks. Our experiments across four image datasets indicate that our unsupervised meta-learning approach acquires a learning algorithm without any labeled data that is applicable to a wide range of downstream classification tasks, improving upon the embedding learned by four prior unsupervised learning methods.
[ { "created": "Thu, 4 Oct 2018 17:29:17 GMT", "version": "v1" }, { "created": "Sat, 6 Oct 2018 23:39:52 GMT", "version": "v2" }, { "created": "Sat, 13 Oct 2018 23:57:36 GMT", "version": "v3" }, { "created": "Thu, 22 Nov 2018 20:47:45 GMT", "version": "v4" }, { "created": "Fri, 7 Dec 2018 20:38:03 GMT", "version": "v5" }, { "created": "Thu, 21 Mar 2019 23:43:47 GMT", "version": "v6" } ]
2019-03-25
[ [ "Hsu", "Kyle", "" ], [ "Levine", "Sergey", "" ], [ "Finn", "Chelsea", "" ] ]
Thu, 4 Oct 2018 17:29:17 GMT
2018-10-04T17:29:17Z
[ "cs", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2203.08299
Maximillian Chen
Maximillian Chen, Caitlyn Chen, Xiao Yu, Zhou Yu
FastKASSIM: A Fast Tree Kernel-Based Syntactic Similarity Metric
In EACL 2023. 21 pages, 13 figures, 4 tables. Code available at https://github.com/jasonyux/FastKASSIM
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Syntax is a fundamental component of language, yet few metrics have been employed to capture syntactic similarity or coherence at the utterance- and document-level. The existing standard document-level syntactic similarity metric is computationally expensive and performs inconsistently when faced with syntactically dissimilar documents. To address these challenges, we present FastKASSIM, a metric for utterance- and document-level syntactic similarity which pairs and averages the most similar constituency parse trees between a pair of documents based on tree kernels. FastKASSIM is more robust to syntactic dissimilarities and runs up to to 5.32 times faster than its predecessor over documents in the r/ChangeMyView corpus. FastKASSIM's improvements allow us to examine hypotheses in two settings with large documents. We find that syntactically similar arguments on r/ChangeMyView tend to be more persuasive, and that syntax is predictive of authorship attribution in the Australian High Court Judgment corpus.
[ { "created": "Tue, 15 Mar 2022 22:33:26 GMT", "version": "v1" }, { "created": "Wed, 25 May 2022 05:54:34 GMT", "version": "v2" }, { "created": "Fri, 14 Oct 2022 03:47:17 GMT", "version": "v3" }, { "created": "Fri, 27 Jan 2023 05:33:58 GMT", "version": "v4" } ]
2023-01-30
[ [ "Chen", "Maximillian", "" ], [ "Chen", "Caitlyn", "" ], [ "Yu", "Xiao", "" ], [ "Yu", "Zhou", "" ] ]
Tue, 15 Mar 2022 22:33:26 GMT
2022-03-15T22:33:26Z
[ "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1907.03304
Huy Nguyen Q
Huy Q. Nguyen, Beno\^it Pausader
A paradifferential approach for well-posedness of the Muskat problem
Contraction estimates for the Dirichlet-Neumann operator extended to the natural regularity range. Some proof details added and references updated
null
10.1007/s00205-020-01494-7
null
math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the Muskat problem for one fluid or two fluids, with or without viscosity jump, with or without rigid boundaries, and in arbitrary space dimension $d$ of the interface. The Muskat problem is scaling invariant in the Sobolev space $H^{s_c}(\mathbb{R}^d)$ where $s_c=1+\frac{d}{2}$. Employing a paradifferential approach, we prove local well-posedness for large data in any subcritical Sobolev spaces $H^s(\mathbb{R}^d)$, $s>s_c$. Moreover, the rigid boundaries are only required to be Lipschitz and can have arbitrarily large variation. The Rayleigh-Taylor stability condition is assumed for the case of two fluids with viscosity jump but is proved to be automatically satisfied for the case of one fluid. The starting point of this work is a reformulation solely in terms of the Drichlet-Neumann operator. The key elements of proofs are new paralinearization and contraction results for the Drichlet-Neumann operator in rough domains.
[ { "created": "Sun, 7 Jul 2019 14:51:44 GMT", "version": "v1" }, { "created": "Thu, 8 Aug 2019 17:31:43 GMT", "version": "v2" }, { "created": "Wed, 29 Jan 2020 14:15:59 GMT", "version": "v3" } ]
2020-03-18
[ [ "Nguyen", "Huy Q.", "" ], [ "Pausader", "Benoît", "" ] ]
Sun, 7 Jul 2019 14:51:44 GMT
2019-07-07T14:51:44Z
[ "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1904.03649
Irmak Sa\u{g}lam
Irmak Saglam, Ebru Aydin Gol
Cause Mining and Controller Synthesis with STL
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Formal control of cyber-physical systems allows for synthesis of control strategies from rich specifications such as temporal logics. However, the classes of systems that the formal approaches can be applied to is limited due to the computational complexity. Furthermore, the synthesis problem becomes even harder when non-determinism or stochasticity is considered. In this work, we propose an alternative approach. First, we mark the unwanted events on the traces of the system and generate a controllable cause representing these events as a Signal Temporal Logic (STL) formula. Then, we synthesize a controller based on this formula to avoid the satisfaction of it. Our approach is applicable to any system with finitely many control choices. While we can not guarantee correctness, i.e., the unwanted events will never occur, we show on an example that the proposed approach reduces the number of the unwanted events. In particular, we validate it for the congestion avoidance problem in a traffic network.
[ { "created": "Sun, 7 Apr 2019 13:16:29 GMT", "version": "v1" }, { "created": "Thu, 22 Aug 2019 14:34:06 GMT", "version": "v2" }, { "created": "Tue, 3 Sep 2019 16:33:49 GMT", "version": "v3" } ]
2019-09-04
[ [ "Saglam", "Irmak", "" ], [ "Gol", "Ebru Aydin", "" ] ]
Sun, 7 Apr 2019 13:16:29 GMT
2019-04-07T13:16:29Z
[ "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2205.07979
Boro Sitnikovski
Boro Sitnikovski
Budge: a programming language and a theorem prover
null
null
null
null
cs.PL cs.CL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a simple programming language based on G\"odel numbering and prime factorization, enhanced with explicit, scoped loops, allowing for easy program composition. Further, we will present a theorem prover that allows expressing and working with formal systems. The theorem prover is simple as it relies merely on a substitution rule and set equality to derive theorems. Finally, we will represent the programming language in the theorem prover. We will show the syntax and semantics of both, and then provide a few example programs and their evaluation.
[ { "created": "Mon, 16 May 2022 20:35:25 GMT", "version": "v1" }, { "created": "Thu, 19 May 2022 12:25:22 GMT", "version": "v2" }, { "created": "Tue, 24 May 2022 13:15:24 GMT", "version": "v3" }, { "created": "Thu, 4 Aug 2022 11:47:22 GMT", "version": "v4" }, { "created": "Tue, 23 Aug 2022 23:23:12 GMT", "version": "v5" }, { "created": "Tue, 6 Dec 2022 11:48:21 GMT", "version": "v6" } ]
2022-12-07
[ [ "Sitnikovski", "Boro", "" ] ]
Mon, 16 May 2022 20:35:25 GMT
2022-05-16T20:35:25Z
[ "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2003.05730
Jintang Li
Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, Zibin Zheng, Bingzhe Wu
A Survey of Adversarial Learning on Graphs
Preprint; 16 pages, 2 figures
null
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep learning models on graphs have achieved remarkable performance in various graph analysis tasks, e.g., node classification, link prediction, and graph clustering. However, they expose uncertainty and unreliability against the well-designed inputs, i.e., adversarial examples. Accordingly, a line of studies has emerged for both attack and defense addressed in different graph analysis tasks, leading to the arms race in graph adversarial learning. Despite the booming works, there still lacks a unified problem definition and a comprehensive review. To bridge this gap, we investigate and summarize the existing works on graph adversarial learning tasks systemically. Specifically, we survey and unify the existing works w.r.t. attack and defense in graph analysis tasks, and give appropriate definitions and taxonomies at the same time. Besides, we emphasize the importance of related evaluation metrics, investigate and summarize them comprehensively. Hopefully, our works can provide a comprehensive overview and offer insights for the relevant researchers. Latest advances in graph adversarial learning are summarized in our GitHub repository https://github.com/EdisonLeeeee/Graph-Adversarial-Learning.
[ { "created": "Tue, 10 Mar 2020 12:48:00 GMT", "version": "v1" }, { "created": "Tue, 19 May 2020 13:43:57 GMT", "version": "v2" }, { "created": "Tue, 5 Apr 2022 12:54:56 GMT", "version": "v3" } ]
2022-04-06
[ [ "Chen", "Liang", "" ], [ "Li", "Jintang", "" ], [ "Peng", "Jiaying", "" ], [ "Xie", "Tao", "" ], [ "Cao", "Zengxu", "" ], [ "Xu", "Kun", "" ], [ "He", "Xiangnan", "" ], [ "Zheng", "Zibin", "" ], [ "Wu", "Bingzhe", "" ] ]
Tue, 10 Mar 2020 12:48:00 GMT
2020-03-10T12:48:00Z
[ "cs", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1110.3412
Andrew Das Arulsamy
Andrew Das Arulsamy
Chemical Reaction due to Stronger Ramachandran Interaction
To be published in Journal of Chemical Sciences
Journal of Chemical Sciences 126 (2014) 677
null
null
physics.gen-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The origin of a chemical reaction between two reactant atoms is associated to the activation energy, with the assumption that, high-energy collisions between these atoms, are the ones that overcome the activation energy. Here, we (i) show that a stronger attractive van der Waals (vdW) and electron-ion Coulomb interactions between two polarized atoms are responsible to initiate a chemical reaction, either before or after the collision. We derive this stronger vdW attraction formula exactly using the quasi one-dimensional Drude model within the ionization energy theory and the energy-level spacing renormalization group method. Along the way, we (ii) expose the precise physical mechanism responsible for the existence of a stronger vdW interaction for both long and short distances, and also show how to technically avoid the electron-electron Coulomb repulsion between polarized electrons from these two reactant atoms. Finally, we properly and correctly associate the existence of this stronger attraction to Ramachandran's 'normal limits' (distance shorter than what is allowed by the standard vdW bond) between chemically nonbonded atoms.
[ { "created": "Sat, 15 Oct 2011 13:36:49 GMT", "version": "v1" }, { "created": "Mon, 12 Dec 2011 04:28:40 GMT", "version": "v2" }, { "created": "Sun, 29 Jan 2012 02:16:32 GMT", "version": "v3" }, { "created": "Thu, 12 Jul 2012 01:41:52 GMT", "version": "v4" }, { "created": "Wed, 21 Aug 2013 04:48:31 GMT", "version": "v5" }, { "created": "Thu, 26 Dec 2013 04:17:55 GMT", "version": "v6" } ]
2014-05-20
[ [ "Arulsamy", "Andrew Das", "" ] ]
Sat, 15 Oct 2011 13:36:49 GMT
2011-10-15T13:36:49Z
[ "physics" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1112.1556
Sivan Sabato
Alon Gonen, Sivan Sabato and Shai Shalev-Shwartz
Active Learning of Halfspaces under a Margin Assumption
A more detailed exposition; Added a description of a simpler implementation and results of experiments
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive and analyze a new, efficient, pool-based active learning algorithm for halfspaces, called ALuMA. Most previous algorithms show exponential improvement in the label complexity assuming that the distribution over the instance space is close to uniform. This assumption rarely holds in practical applications. Instead, we study the label complexity under a large-margin assumption -- a much more realistic condition, as evident by the success of margin-based algorithms such as SVM. Our algorithm is computationally efficient and comes with formal guarantees on its label complexity. It also naturally extends to the non-separable case and to non-linear kernels. Experiments illustrate the clear advantage of ALuMA over other active learning algorithms.
[ { "created": "Wed, 7 Dec 2011 13:34:25 GMT", "version": "v1" }, { "created": "Mon, 20 Feb 2012 11:48:41 GMT", "version": "v2" }, { "created": "Fri, 24 Feb 2012 08:07:54 GMT", "version": "v3" } ]
2015-03-19
[ [ "Gonen", "Alon", "" ], [ "Sabato", "Sivan", "" ], [ "Shalev-Shwartz", "Shai", "" ] ]
Wed, 7 Dec 2011 13:34:25 GMT
2011-12-07T13:34:25Z
[ "cs", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1406.4811
Laura Kubatko
Julia Chifman and Laura Kubatko
Identifiability of the unrooted species tree topology under the coalescent model with time-reversible substitution processes, site-specific rate variation, and invariable sites
null
Journal of Theoretical Biology 374: 35-47, 2015
10.1016/j.jtbi.2015.03.006
null
q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The inference of the evolutionary history of a collection of organisms is a problem of fundamental importance in evolutionary biology. The abundance of DNA sequence data arising from genome sequencing projects has led to significant challenges in the inference of these phylogenetic relationships. Among these challenges is the inference of the evolutionary history of a collection of species based on sequence information from several distinct genes sampled throughout the genome. It is widely accepted that each individual gene has its own phylogeny, which may not agree with the species tree. Many possible causes of this gene tree incongruence are known. The best studied is incomplete lineage sorting, which is commonly modeled by the coalescent process. Numerous methods based on the coalescent process have been proposed for estimation of the phylogenetic species tree given DNA sequence data. However, use of these methods assumes that the phylogenetic species tree can be identified from DNA sequence data at the leaves of the tree, although this has not been formally established. We prove that the unrooted topology of the n-leaf phylogenetic species tree is generically identifiable given observed data at the leaves of the tree that are assumed to have arisen from the coalescent process under a time-reversible substitution process with the possibility of site-specific rate variation modeled by the discrete gamma distribution and a proportion of invariable sites.
[ { "created": "Wed, 18 Jun 2014 17:53:41 GMT", "version": "v1" }, { "created": "Fri, 3 Jul 2015 21:18:37 GMT", "version": "v2" } ]
2015-07-07
[ [ "Chifman", "Julia", "" ], [ "Kubatko", "Laura", "" ] ]
Wed, 18 Jun 2014 17:53:41 GMT
2014-06-18T17:53:41Z
[ "q-bio" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2009.13174
Manon Costa
Manon Costa and S\'ebastien Gadat
Non asymptotic controls on a recursive superquantile approximation
null
null
null
null
math.PR math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we study a new recursive stochastic algorithm for the joint estimation of quantile and superquantile of an unknown distribution. The novelty of this algorithm is to use the Cesaro averaging of the quantile estimation inside the recursive approximation of the superquantile. We provide some sharp non-asymptotic bounds on the quadratic risk of the superquantile estimator for different step size sequences. We also prove new non-asymptotic $L^p$-controls on the Robbins Monro algorithm for quantile estimation and its averaged version. Finally, we derive a central limit theorem of our joint procedure using the diffusion approximation point of view hidden behind our stochastic algorithm.
[ { "created": "Mon, 28 Sep 2020 09:43:45 GMT", "version": "v1" }, { "created": "Tue, 10 Nov 2020 08:29:44 GMT", "version": "v2" }, { "created": "Wed, 15 Sep 2021 07:07:55 GMT", "version": "v3" } ]
2021-09-16
[ [ "Costa", "Manon", "" ], [ "Gadat", "Sébastien", "" ] ]
Mon, 28 Sep 2020 09:43:45 GMT
2020-09-28T09:43:45Z
[ "math", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
chao-dyn/9811020
Ken Kiyono
Nobuko Fuchikami, Shunya Ishioka and Ken Kiyono
Simulation of a Dripping Faucet
20 pages, 15 figures, J. Phys. Soc. Jpn. (in press)
J. Phys. Soc. Jpn. Vol. 68, No. 4 (1999) pp. 1185-1196
10.1143/JPSJ.68.1185
null
chao-dyn nlin.CD
null
We present a simulation of a dripping faucet system. A new algorithm based on Lagrangian description is introduced. The shape of drop falling from a faucet obtained by the present algorithm agrees quite well with experimental observations. Long-term behavior of the simulation can reproduce period-one, period-two, intermittent and chaotic oscillations widely observed in experiments. Possible routes to chaos are discussed.
[ { "created": "Sat, 21 Nov 1998 17:12:55 GMT", "version": "v1" }, { "created": "Tue, 6 Apr 1999 14:39:24 GMT", "version": "v2" } ]
2009-10-31
[ [ "Fuchikami", "Nobuko", "" ], [ "Ishioka", "Shunya", "" ], [ "Kiyono", "Ken", "" ] ]
Sat, 21 Nov 1998 17:12:55 GMT
1998-11-21T17:12:55Z
[ "nlin" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2207.12077
Jiannan Yang Dr
Jiannan Yang
Decision-oriented two-parameter Fisher information sensitivity using symplectic decomposition
15 pages, 10 figures, and a Supplement Material as ancillary files. Technometrics 2023. New version adds a benchmark section. The datasets generated during and/or analysed during the current study are available in the GitHub repository: https://github.com/longitude-jyang/SymplecticFisherSensitivity
null
10.1080/00401706.2023.2216251
null
cs.IT cs.NA math.IT math.NA math.SG stat.AP
http://creativecommons.org/licenses/by/4.0/
The eigenvalues and eigenvectors of the Fisher information matrix (FIM) can reveal the most and least sensitive directions of a system and it has wide application across science and engineering. We present a symplectic variant of the eigenvalue decomposition for the FIM and extract the sensitivity information with respect to two-parameter conjugate pairs. The symplectic approach decomposes the FIM onto an even-dimensional symplectic basis. This symplectic structure can reveal additional sensitivity information between two-parameter pairs, otherwise concealed in the orthogonal basis from the standard eigenvalue decomposition. The proposed sensitivity approach can be applied to naturally paired two-parameter distribution parameters, or decision-oriented pairing via re-grouping or re-parameterization of the FIM. It can be utilised in tandem with the standard eigenvalue decomposition and offer additional insight into the sensitivity analysis at negligible extra cost.
[ { "created": "Mon, 25 Jul 2022 11:53:42 GMT", "version": "v1" }, { "created": "Mon, 15 Aug 2022 13:50:16 GMT", "version": "v2" }, { "created": "Wed, 12 Oct 2022 20:21:49 GMT", "version": "v3" } ]
2023-07-04
[ [ "Yang", "Jiannan", "" ] ]
Mon, 25 Jul 2022 11:53:42 GMT
2022-07-25T11:53:42Z
[ "cs", "math", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1804.02784
Jingchen Hu
Jingchen Hu
Bayesian Estimation of Attribute and Identification Disclosure Risks in Synthetic Data
null
Transactions on Data Privacy, 12:1, 61-89 (2019)
null
null
stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The synthetic data approach to data confidentiality has been actively researched on, and for the past decade or so, a good number of high quality work on developing innovative synthesizers, creating appropriate utility measures and risk measures, among others, have been published. Comparing to a large volume of work on synthesizers development and utility measures creation, measuring risks has overall received less attention. This paper focuses on the detailed construction of some Bayesian methods proposed for estimating disclosure risks in synthetic data. In the processes of presenting attribute and identification disclosure risks evaluation methods, we highlight key steps, emphasize Bayesian thinking, illustrate with real application examples, and discuss challenges and future research directions. We hope to give the readers a comprehensive view of the Bayesian estimation procedures, enable synthetic data researchers and producers to use these procedures to evaluate disclosure risks, and encourage more researchers to work in this important growing field.
[ { "created": "Mon, 9 Apr 2018 01:17:47 GMT", "version": "v1" }, { "created": "Fri, 14 Dec 2018 17:47:53 GMT", "version": "v2" }, { "created": "Fri, 7 May 2021 18:36:47 GMT", "version": "v3" } ]
2021-05-11
[ [ "Hu", "Jingchen", "" ] ]
Mon, 9 Apr 2018 01:17:47 GMT
2018-04-09T01:17:47Z
[ "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1410.2305
Monika Winklmeier
Monika Winklmeier, Christian Wyss
On the Spectral Decomposition of Dichotomous and Bisectorial Operators
null
Integral Equations and Operator Theory. 82(1):119-150 (2015)
10.1007/s00020-015-2218-5
null
math.FA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For an unbounded operator $S$ on a Banach space the existence of invariant subspaces corresponding to its spectrum in the left and right half-plane is proved. The general assumption on $S$ is the uniform boundedness of the resolvent along the imaginary axis. The projections associated with the invariant subspaces are bounded if $S$ is strictly dichotomous, but may be unbounded in general. Explicit formulas for these projections in terms of resolvent integrals are derived and used to obtain perturbation theorems for dichotomy. All results apply, with certain simplifications, to bisectorial operators.
[ { "created": "Wed, 8 Oct 2014 22:27:25 GMT", "version": "v1" }, { "created": "Sat, 7 Mar 2015 17:08:46 GMT", "version": "v2" } ]
2015-04-21
[ [ "Winklmeier", "Monika", "" ], [ "Wyss", "Christian", "" ] ]
Wed, 8 Oct 2014 22:27:25 GMT
2014-10-08T22:27:25Z
[ "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2007.01214
Robin Delabays
Andr\'e Reggio, Robin Delabays, and Philippe Jacquod
Clusterization and phase diagram of the bimodal Kuramoto model with bounded confidence
10 pages, 4 figures
Chaos 30, 093134 (2020)
10.1063/5.0020436
null
nlin.AO cs.SI math.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inspired by the Deffuant and Hegselmann-Krause models of opinion dynamics, we extend the Kuramoto model to account for confidence bounds, i.e., vanishing interactions between pairs of oscillators when their phases differ by more than a certain value. We focus on Kuramoto oscillators with peaked, bimodal distribution of natural frequencies. We show that, in this case, the fixed-points for the extended model are made of certain numbers of independent clusters of oscillators, depending on the length of the confidence bound -- the interaction range -- and the distance between the two peaks of the bimodal distribution of natural frequencies. This allows us to construct the phase diagram of attractive fixed-points for the bimodal Kuramoto model with bounded confidence and to analytically explain clusterization in dynamical systems with bounded confidence.
[ { "created": "Tue, 30 Jun 2020 21:51:55 GMT", "version": "v1" }, { "created": "Sun, 27 Sep 2020 22:39:32 GMT", "version": "v2" } ]
2020-09-29
[ [ "Reggio", "André", "" ], [ "Delabays", "Robin", "" ], [ "Jacquod", "Philippe", "" ] ]
Tue, 30 Jun 2020 21:51:55 GMT
2020-06-30T21:51:55Z
[ "cs", "nlin", "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Memory clinics in context.
null
null
null
null
null
null
The growing number of older people in all parts of the world raises the question of how best to respond to their health needs, including those associated with memory impairment. Specialist Memory Clinics have a role to play, complementing community services which reach out to older people with mental health problems and encompassing younger people who become forgetful. Dementia is the most common syndrome seen, but there are other important treatable conditions which present with subjective or objective dysmnesia. Memory Clinics provide a high quality, devoted focus for early intervention, treatment, support and research.
null
null
null
null
null
null
pubmed
null
null
null
null
2,009
null
null
null
null
null
null
21,416,022
Indian journal of psychiatry
1908.02164
T. L\v{i} Ph.D.
T. N. Li and A. Papanicolaou
Statistical Arbitrage for Multiple Co-Integrated Stocks
null
null
null
null
q-fin.PM math.OC math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we analyse optimal statistical arbitrage strategies from stochastic control and optimisation problems for multiple co-integrated stocks with eigenportfolios being factors. Optimal portfolio weights are found by solving a Hamilton-Jacobi-Bellman (HJB) partial differential equation, which we solve for both an unconstrained portfolio and a portfolio constrained to be market neutral. Our analyses demonstrate sufficient conditions on the model parameters to ensure long-term stability of the HJB solutions and stable growth rates for the optimal portfolios. To gauge how these optimal portfolios behave in practice, we perform backtests on historical stock prices of the S&P 500 constituents from year 2000 through year 2021. These backtests suggest three key conclusions: that the proposed co-integrated model with eigenportfolios being factors can generate a large number of co-integrated stocks over a long time horizon, that the optimal portfolios are sensitive to parameter estimation, and that the statistical arbitrage strategies are more profitable in periods when overall market volatilities are high.
[ { "created": "Tue, 6 Aug 2019 13:49:27 GMT", "version": "v1" }, { "created": "Wed, 30 Jun 2021 20:47:35 GMT", "version": "v2" }, { "created": "Sat, 30 Oct 2021 13:57:38 GMT", "version": "v3" }, { "created": "Wed, 15 Dec 2021 03:36:58 GMT", "version": "v4" }, { "created": "Tue, 8 Feb 2022 05:35:42 GMT", "version": "v5" } ]
2022-02-09
[ [ "Li", "T. N.", "" ], [ "Papanicolaou", "A.", "" ] ]
Tue, 6 Aug 2019 13:49:27 GMT
2019-08-06T13:49:27Z
[ "math", "q-fin" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
hep-th/0610082
Alexei Deriglazov A
A.A. Deriglazov and Z. Kuznetsova
Conversion of second class constraints by deformation of Lagrangian local symmetries
23 pages, misprints corrected. Slightly compactified version is published in Phys. Lett. B 646 (2007) 47
Phys.Lett.B646:47-53,2007
10.1016/j.physletb.2007.01.004
null
hep-th math-ph math.MP
null
For a theory with first and second class constraints, we propose a procedure for conversion of second class constraints based on deformation the structure of local symmetries of the Lagrangian formulation. It does not require extension or reduction of configuration space of the theory. We give examples in which the initial formulation implies a non linear realization of some global symmetries, therefore is not convenient. The conversion reveals hidden symmetry presented in the theory. The extra gauge freedom of conversed version is used to search for a parameterization which linearizes the equations of motion. We apply the above procedure to membrane theory (in the formulation with world-volume metric). In the resulting version, all the metric components are gauge degrees of freedom. The above procedure works also in a theory with only second class constraints presented. As an examples, we discuss arbitrary dynamical system of classical mechanics subject to kinematic constraints, O(N)-invariant nonlinear sigma-model, and the theory of massive vector field with Maxwell-Proca Lagrangian.
[ { "created": "Sat, 7 Oct 2006 16:30:07 GMT", "version": "v1" }, { "created": "Wed, 18 Oct 2006 18:22:45 GMT", "version": "v2" }, { "created": "Tue, 20 Feb 2007 12:17:52 GMT", "version": "v3" } ]
2008-11-26
[ [ "Deriglazov", "A. A.", "" ], [ "Kuznetsova", "Z.", "" ] ]
Sat, 7 Oct 2006 16:30:07 GMT
2006-10-07T16:30:07Z
[ "physics", "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2211.00323
Jinghe Wang
Jinghe Wang, Wankai Tang, Jing Cheng Liang, Lei Zhang, Jun Yan Dai, Xiao Li, Shi Jin, Qiang Cheng, and Tie Jun Cui
Reconfigurable Intelligent Surface: Power Consumption Modeling and Practical Measurement Validation
null
null
null
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The reconfigurable intelligent surface (RIS) has received a lot of interest because of its capacity to reconfigure the wireless communication environment in a cost- and energy-efficient way. However, the realistic power consumption modeling and measurement validation of RIS has received far too little attention. Therefore, in this work, we model the power consumption of RIS and conduct measurement validations using various RISs to fill this vacancy. Firstly, we propose a practical power consumption model of RIS. The RIS hardware is divided into three basic parts: the FPGA control board, the drive circuits, and the RIS unit cells. The power consumption of the first two parts is modeled as $P_{\text {static}}$ and that of the last part is modeled as $P_{\text {units}}$. Expressions of $P_{\text {static}}$ and $P_{\text {units}}$ vary amongst different types of RISs. Secondly, we conduct measurements on various RISs to validate the proposed model. Five different RISs including the PIN diode, varactor diode, and RF switch types are measured, and measurement results validate the generality and applicability of the proposed power consumption model of RIS. Finally, we summarize the measurement results and discuss the approaches to achieve the low-power-consumption design of RIS-assisted wireless communication systems.
[ { "created": "Tue, 1 Nov 2022 08:22:08 GMT", "version": "v1" }, { "created": "Tue, 12 Sep 2023 07:15:58 GMT", "version": "v2" }, { "created": "Tue, 6 Feb 2024 07:17:11 GMT", "version": "v3" } ]
2024-02-07
[ [ "Wang", "Jinghe", "" ], [ "Tang", "Wankai", "" ], [ "Liang", "Jing Cheng", "" ], [ "Zhang", "Lei", "" ], [ "Dai", "Jun Yan", "" ], [ "Li", "Xiao", "" ], [ "Jin", "Shi", "" ], [ "Cheng", "Qiang", "" ], [ "Cui", "Tie Jun", "" ] ]
Tue, 1 Nov 2022 08:22:08 GMT
2022-11-01T08:22:08Z
[ "cs", "eess", "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1905.03325
L\'aszl\'o Csat\'o
L\'aszl\'o Csat\'o
Fair tournament design: A flaw of the UEFA Euro 2020 qualification
21 pages, 8 figures, 2 tables
null
null
null
stat.AP physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The integrity of a sport can be seriously undermined if its rules punish winning as this creates incentives for strategic manipulation. Therefore, a sports tournament can be called unfair if the overall win probabilities are not ordered according to the teams' ranking based on their past performances. We present how statistical methods can contribute to choosing a tournament format that is in line with the above axiom. In particular, the qualification for the 2020 UEFA European Championship is shown to violate this requirement: being a top team in the lowest-ranked League D of the 2018/19 UEFA Nations League substantially increases the probability of qualifying compared to being a bottom team in the higher-ranked League C. The unfairness can be remarkably reduced or even eliminated with slightly changing the path formation policy of the UEFA Euro 2020 qualifying play-offs. The misaligned design has severely punished a team for winning a match years before. Since the deficiency is an inherent feature of the qualifying process, the Union of European Football Associations (UEFA) should reconsider the format of future tournaments to eliminate the unfair advantage enjoyed by certain teams.
[ { "created": "Wed, 8 May 2019 20:43:00 GMT", "version": "v1" }, { "created": "Mon, 9 Sep 2019 13:22:16 GMT", "version": "v2" }, { "created": "Mon, 23 Sep 2019 16:00:10 GMT", "version": "v3" }, { "created": "Tue, 21 Jan 2020 18:53:29 GMT", "version": "v4" }, { "created": "Mon, 7 Sep 2020 15:57:38 GMT", "version": "v5" }, { "created": "Fri, 12 Feb 2021 12:35:19 GMT", "version": "v6" } ]
2021-02-15
[ [ "Csató", "László", "" ] ]
Wed, 8 May 2019 20:43:00 GMT
2019-05-08T20:43:00Z
[ "physics", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
A web ontology for brain trauma patient computer-assisted rehabilitation.
null
null
null
null
null
null
In this paper we describe CABROnto, which is a web ontology for the semantic representation of the computer assisted brain trauma rehabilitation. This is a novel and emerging domain, since it employs the use of robotic devices, adaptation software and machine learning to facilitate interactive and adaptive rehabilitation care. We used Protégé 4.2 and Protégé-Owl schema editor. The primary goal of this ontology is to enable the reuse of the domain knowledge. CABROnto has nine main classes, more than 50 subclasses, existential and cardinality restrictions. The ontology can be found online at Bioportal.
null
null
null
null
null
null
pubmed
null
null
null
null
2,013
null
null
null
null
null
null
23,823,389
Studies in health technology and informatics
null
null
null
Epistolary Education in 21st Century: A System to Support Composition of {E}-mails by Students to Superiors in {J}apanese
null
null
null
null
null
null
E-mail is a communication tool widely used by people of all ages on the Internet today, often in business and formal situations, especially in Japan. Moreover, Japanese E-mail communication has a set of specific rules taught using specialized guidebooks. E-mail literacy education for many Japanese students is typically provided in a traditional, yet inefficient lecture-based way. We propose a system to support Japanese students in writing E-mails to superiors (teachers, job hunting representatives, etc.). We firstly make an investigation into the importance of formal E-mails in Japan, and what is needed to successfully write a formal E-mail. Next, we develop the system with accordance to those rules. Finally, we evaluated the system twofold. The results, although performed on a small number of samples, were generally positive, and clearly indicated additional ways to improve the system.
null
null
null
null
null
null
acl
inproceedings
ryu-ptaszynski-2020-epistolary
Ptaszynski, Michal and Ziolko, Bartosz
dec
2,020
Barcelona, Spain (Online)
International Committee on Computational Linguistics (ICCL)
https://aclanthology.org/2020.coling-demos.16/
Ryu, Kenji and Ptaszynski, Michal
Proceedings of the 28th International Conference on Computational Linguistics: System Demonstrations
87--92
null
null
null
null
null
Criticality Distinguishes the Ensemble of Biological Regulatory Networks.
null
null
null
null
null
null
The hypothesis that many living systems should exhibit near-critical behavior is well motivated theoretically, and an increasing number of cases have been demonstrated empirically. However, a systematic analysis across biological networks, which would enable identification of the network properties that drive criticality, has not yet been realized. Here, we provide a first comprehensive survey of criticality across a diverse sample of biological networks, leveraging a publicly available database of 67 Boolean models of regulatory circuits. We find all 67 networks to be near critical. By comparing to ensembles of random networks with similar topological and logical properties, we show that criticality in biological networks is not predictable solely from macroscale properties such as mean degree ⟨K⟩ and mean bias in the logic functions ⟨p⟩, as previously emphasized in theories of random Boolean networks. Instead, the ensemble of real biological circuits is jointly constrained by the local causal structure and logic of each node. In this way, biological regulatory networks are more distinguished from random networks by their criticality than by other macroscale network properties such as degree distribution, edge density, or fraction of activating conditions.
null
null
null
null
null
null
pubmed
null
null
null
null
2,018
null
null
null
null
null
null
30,312,104
Physical review letters
1901.00433
Patrick Forr\'e
Patrick Forr\'e, Joris M. Mooij
Causal Calculus in the Presence of Cycles, Latent Confounders and Selection Bias
Accepted for publication in Conference on Uncertainty in Artificial Intelligence 2019 (UAI-2019)
Proceedings of the 35th Annual Conference on Uncertainty in Artificial Intelligence, 2019
null
null
stat.ML cs.AI cs.LG stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove the main rules of causal calculus (also called do-calculus) for i/o structural causal models (ioSCMs), a generalization of a recently proposed general class of non-/linear structural causal models that allow for cycles, latent confounders and arbitrary probability distributions. We also generalize adjustment criteria and formulas from the acyclic setting to the general one (i.e. ioSCMs). Such criteria then allow to estimate (conditional) causal effects from observational data that was (partially) gathered under selection bias and cycles. This generalizes the backdoor criterion, the selection-backdoor criterion and extensions of these to arbitrary ioSCMs. Together, our results thus enable causal reasoning in the presence of cycles, latent confounders and selection bias. Finally, we extend the ID algorithm for the identification of causal effects to ioSCMs.
[ { "created": "Wed, 2 Jan 2019 15:58:49 GMT", "version": "v1" }, { "created": "Wed, 3 Jul 2019 16:38:18 GMT", "version": "v2" } ]
2022-08-31
[ [ "Forré", "Patrick", "" ], [ "Mooij", "Joris M.", "" ] ]
Wed, 2 Jan 2019 15:58:49 GMT
2019-01-02T15:58:49Z
[ "cs", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2208.12248
Dmitrijs Trizna
Dmitrijs Trizna
Quo Vadis: Hybrid Machine Learning Meta-Model based on Contextual and Behavioral Malware Representations
10 pages, 4 figures, 4 tables
AISec'22: Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, November 2022
10.1145/3560830.3563726
null
cs.CR cs.LG
http://creativecommons.org/licenses/by-sa/4.0/
We propose a hybrid machine learning architecture that simultaneously employs multiple deep learning models analyzing contextual and behavioral characteristics of Windows portable executable, producing a final prediction based on a decision from the meta-model. The detection heuristic in contemporary machine learning Windows malware classifiers is typically based on the static properties of the sample since dynamic analysis through virtualization is challenging for vast quantities of samples. To surpass this limitation, we employ a Windows kernel emulation that allows the acquisition of behavioral patterns across large corpora with minimal temporal and computational costs. We partner with a security vendor for a collection of more than 100k int-the-wild samples that resemble the contemporary threat landscape, containing raw PE files and filepaths of applications at the moment of execution. The acquired dataset is at least ten folds larger than reported in related works on behavioral malware analysis. Files in the training dataset are labeled by a professional threat intelligence team, utilizing manual and automated reverse engineering tools. We estimate the hybrid classifier's operational utility by collecting an out-of-sample test set three months later from the acquisition of the training set. We report an improved detection rate, above the capabilities of the current state-of-the-art model, especially under low false-positive requirements. Additionally, we uncover a meta-model's ability to identify malicious activity in validation and test sets even if none of the individual models express enough confidence to mark the sample as malevolent. We conclude that the meta-model can learn patterns typical to malicious samples from representation combinations produced by different analysis techniques. We publicly release pre-trained models and anonymized dataset of emulation reports.
[ { "created": "Sat, 20 Aug 2022 05:30:16 GMT", "version": "v1" }, { "created": "Sat, 19 Oct 2024 16:07:50 GMT", "version": "v2" } ]
2024-10-22
[ [ "Trizna", "Dmitrijs", "" ] ]
Sat, 20 Aug 2022 05:30:16 GMT
2022-08-20T05:30:16Z
[ "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2006.05896
Carl Allen
Carl Allen, Ivana Bala\v{z}evi\'c, Timothy Hospedales
A Probabilistic Model for Discriminative and Neuro-Symbolic Semi-Supervised Learning
null
null
null
null
cs.LG cs.LO stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Much progress has been made in semi-supervised learning (SSL) by combining methods that exploit different aspects of the data distribution, e.g. consistency regularisation relies on properties of $p(x)$, whereas entropy minimisation pertains to the label distribution $p(y|x)$. Focusing on the latter, we present a probabilistic model for discriminative SSL, that mirrors its classical generative counterpart. Under the assumption $y|x$ is deterministic, the prior over latent variables becomes discrete. We show that several well-known SSL methods can be interpreted as approximating this prior, and can be improved upon. We extend the discriminative model to neuro-symbolic SSL, where label features satisfy logical rules, by showing such rules relate directly to the above prior, thus justifying a family of methods that link statistical learning and logical reasoning, and unifying them with regular SSL.
[ { "created": "Wed, 10 Jun 2020 15:30:54 GMT", "version": "v1" }, { "created": "Tue, 25 Aug 2020 16:34:19 GMT", "version": "v2" }, { "created": "Thu, 18 Feb 2021 13:04:04 GMT", "version": "v3" }, { "created": "Mon, 31 May 2021 12:20:00 GMT", "version": "v4" } ]
2021-06-01
[ [ "Allen", "Carl", "" ], [ "Balažević", "Ivana", "" ], [ "Hospedales", "Timothy", "" ] ]
Wed, 10 Jun 2020 15:30:54 GMT
2020-06-10T15:30:54Z
[ "cs", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1710.09443
Arya Pourzanjani
Arya A Pourzanjani, Richard M Jiang, Brian Mitchell, Paul J Atzberger, Linda R Petzold
Bayesian Inference over the Stiefel Manifold via the Givens Representation
null
null
null
null
stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce an approach based on the Givens representation for posterior inference in statistical models with orthogonal matrix parameters, such as factor models and probabilistic principal component analysis (PPCA). We show how the Givens representation can be used to develop practical methods for transforming densities over the Stiefel manifold into densities over subsets of Euclidean space. We show how to deal with issues arising from the topology of the Stiefel manifold and how to inexpensively compute the change-of-measure terms. We introduce an auxiliary parameter approach that limits the impact of topological issues. We provide both analysis of our methods and numerical examples demonstrating the effectiveness of the approach. We also discuss how our Givens representation can be used to define general classes of distributions over the space of orthogonal matrices. We then give demonstrations on several examples showing how the Givens approach performs in practice in comparison with other methods.
[ { "created": "Wed, 25 Oct 2017 20:14:10 GMT", "version": "v1" }, { "created": "Fri, 17 Nov 2017 17:22:03 GMT", "version": "v2" }, { "created": "Mon, 14 Jan 2019 01:13:15 GMT", "version": "v3" }, { "created": "Sat, 2 Nov 2019 21:04:58 GMT", "version": "v4" } ]
2019-11-05
[ [ "Pourzanjani", "Arya A", "" ], [ "Jiang", "Richard M", "" ], [ "Mitchell", "Brian", "" ], [ "Atzberger", "Paul J", "" ], [ "Petzold", "Linda R", "" ] ]
Wed, 25 Oct 2017 20:14:10 GMT
2017-10-25T20:14:10Z
[ "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Predicting the toxicity of permethrin to Daphnia magna in water using SPME fibers.
null
null
null
null
null
null
Multiple factors can influence bioavailability, which can make predictions of toxicity in natural systems difficult. The current study examined the potential use of solid-phase microextraction fibers as a matrix-independent approach to predict the toxicity of permethrin to Daphnia magna across various water sources, including a laboratory reconstituted water, two natural waters, and a modified natural water. Water source strongly affected the toxicity of permethrin as well as the concentration-response relationships. Although permethrin concentrations in the water were predictive of toxicity to D. magna for individual water sources, there was no relationship between permethrin concentrations among water sources and mortality. This indicated that compositional differences among water sources can greatly influence toxicity, suggesting that benchmarks established using reconstituted water may be overly conservative for some natural waters. In addition, although permethrin tissue residues were predictive of mortality for individual waters, the correlation among waters was not as clear. Finally, both 48-h and equilibrium-based SPME fiber concentrations adequately predicted toxicity independent of water properties. This demonstrated that bioavailability-based estimates provided a more accurate prediction of toxicity than water concentrations and that SPME fibers could be used in environmental monitoring as a rapid and accurate means of predicting toxicity in natural waters.
null
null
null
null
null
null
pubmed
null
null
null
null
2,012
null
null
null
null
null
null
22,037,820
Archives of environmental contamination and toxicology
null
null
null
Epidemiology and molecular identification of Anisakis pegreffii (Nematoda: Anisakidae) in the horse mackerel Trachurus trachurus from northern Morocco.
null
null
null
null
null
null
Anisakis infection parameters were studied in horse mackerel (Trachurus trachurus) taken from two areas of northern Morocco (Tetouan and Tangier), which showed a mean prevalence of 54.9%. Identification of the ITS1-5.8S-ITS2 fragment by polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) showed A. pegreffii to be the dominant species; no A. simplex s.s. were detected. The presence of A. pegreffii in horse mackerel was not influenced by the sex (P = 0.46) or catch area (Atlantic versus Mediterranean, P = 0.52) of the fish, but was significantly related to their length, weight, liver weight and gonad weight, and to the season of their capture (P < 0.05). A low prevalence (8.6%) and mean intensity (1.0) was detected in the muscle, probably related to the reduced ability of A. pegreffii to penetrate muscle. The risk of the presence of A. pegreffii in the muscle was fivefold higher in fish caught during the summer than during any other season. Susceptible members of the human population can minimize the risk of infection by avoiding the consumption of larger horse mackerel specimens during the summer.
null
null
null
null
null
null
pubmed
null
null
null
null
2,014
null
null
null
null
null
null
23,461,880
Journal of helminthology
0708.0377
David Anderson
David F. Anderson
Incorporating postleap checks in tau-leaping
Final version. Minor changes
null
10.1063/1.2819665
null
q-bio.MN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
By explicitly representing the reaction times of discrete chemical systems as the firing times of independent, unit rate Poisson processes, we develop a new adaptive tau-leaping procedure. The procedure developed is novel in that accuracy is guaranteed by performing postleap checks. Because the representation we use separates the randomness of the model from the state of the system, we are able to perform the postleap checks in such a way that the statistics of the sample paths generated will not be biased by the rejections of leaps. Further, since any leap condition is ensured with a probability of one, the simulation method naturally avoids negative population values
[ { "created": "Thu, 2 Aug 2007 16:36:27 GMT", "version": "v1" }, { "created": "Tue, 25 Sep 2007 03:59:25 GMT", "version": "v2" }, { "created": "Tue, 30 Oct 2007 01:47:58 GMT", "version": "v3" }, { "created": "Mon, 18 Aug 2008 15:34:52 GMT", "version": "v4" } ]
2009-11-13
[ [ "Anderson", "David F.", "" ] ]
Thu, 2 Aug 2007 16:36:27 GMT
2007-08-02T16:36:27Z
[ "q-bio" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
cond-mat/0306589
Bernd Berg
Bernd A. Berg
Biased Metropolis Sampling for Rugged Free Energy Landscapes
Plenary talk at the Los Alamos conference, The Monte Carlo Method in Physical Sciences: Celebrating the 50th Anniversary of the Metropolis Algorithm, to appear in the proceedings, 11 pages, 4 figures, one table. Inconsistencies corrected and references added
AIP Conference Proceedings Vol.690, 63-73 (2003)
10.1063/1.1632118
null
cond-mat.stat-mech cond-mat.soft q-bio
null
Metropolis simulations of all-atom models of peptides (i.e. small proteins) are considered. Inspired by the funnel picture of Bryngelson and Wolyness, a transformation of the updating probabilities of the dihedral angles is defined, which uses probability densities from a higher temperature to improve the algorithmic performance at a lower temperature. The method is suitable for canonical as well as for generalized ensemble simulations. A simple approximation to the full transformation is tested at room temperature for Met-Enkephalin in vacuum. Integrated autocorrelation times are found to be reduced by factors close to two and a similar improvement due to generalized ensemble methods enters multiplicatively.
[ { "created": "Tue, 24 Jun 2003 05:15:17 GMT", "version": "v1" }, { "created": "Fri, 8 Aug 2003 03:23:38 GMT", "version": "v2" } ]
2009-11-10
[ [ "Berg", "Bernd A.", "" ] ]
Tue, 24 Jun 2003 05:15:17 GMT
2003-06-24T05:15:17Z
[ "q-bio", "physics" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1506.03338
Shixiang Gu
Shixiang Gu and Zoubin Ghahramani and Richard E. Turner
Neural Adaptive Sequential Monte Carlo
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sequential Monte Carlo (SMC), or particle filtering, is a popular class of methods for sampling from an intractable target distribution using a sequence of simpler intermediate distributions. Like other importance sampling-based methods, performance is critically dependent on the proposal distribution: a bad proposal can lead to arbitrarily inaccurate estimates of the target distribution. This paper presents a new method for automatically adapting the proposal using an approximation of the Kullback-Leibler divergence between the true posterior and the proposal distribution. The method is very flexible, applicable to any parameterized proposal distribution and it supports online and batch variants. We use the new framework to adapt powerful proposal distributions with rich parameterizations based upon neural networks leading to Neural Adaptive Sequential Monte Carlo (NASMC). Experiments indicate that NASMC significantly improves inference in a non-linear state space model outperforming adaptive proposal methods including the Extended Kalman and Unscented Particle Filters. Experiments also indicate that improved inference translates into improved parameter learning when NASMC is used as a subroutine of Particle Marginal Metropolis Hastings. Finally we show that NASMC is able to train a latent variable recurrent neural network (LV-RNN) achieving results that compete with the state-of-the-art for polymorphic music modelling. NASMC can be seen as bridging the gap between adaptive SMC methods and the recent work in scalable, black-box variational inference.
[ { "created": "Wed, 10 Jun 2015 14:52:09 GMT", "version": "v1" }, { "created": "Thu, 11 Jun 2015 07:11:56 GMT", "version": "v2" }, { "created": "Mon, 16 Nov 2015 21:28:48 GMT", "version": "v3" } ]
2015-11-18
[ [ "Gu", "Shixiang", "" ], [ "Ghahramani", "Zoubin", "" ], [ "Turner", "Richard E.", "" ] ]
Wed, 10 Jun 2015 14:52:09 GMT
2015-06-10T14:52:09Z
[ "cs", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Mechanical properties of hydrogenated bilayer graphene.
null
null
null
null
null
null
Using first principle methods, we study the mechanical properties of monolayer and bilayer graphene with 50% and 100% coverage of hydrogen. We employ the vdW-DF, vdW-DF-C09x, and vdW-DF2-C09x van der Waals functionals for the exchange correlation interactions that give significantly improved interlayer spacings and energies. We also use the PBE form for the generalized gradient corrected exchange correlation functional for comparison. We present a consistent theoretical framework for the in-plane layer modulus and the out-of-plane interlayer modulus and we calculate, for the first time, these properties for these systems. This gives a measure of the change of the strength properties when monolayer and bilayer graphene are hydrogenated. Moreover, comparing the relative performance of these functionals in describing hydrogenated bilayered graphenes, we also benchmark these functionals in how they calculate the properties of graphite.
null
null
null
null
null
null
pubmed
null
null
null
null
2,013
null
null
null
null
null
null
23,822,266
The Journal of chemical physics
1912.01326
Adrien Deli\`ege Mr
Anthony Cioppa, Adrien Deli\`ege, Silvio Giancola, Bernard Ghanem, Marc Van Droogenbroeck, Rikke Gade, Thomas B. Moeslund
A Context-Aware Loss Function for Action Spotting in Soccer Videos
Accepted for CVPR2020 main conference. This document contains 8 pages + references + supplementary material
null
null
null
cs.CV cs.LG eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In video understanding, action spotting consists in temporally localizing human-induced events annotated with single timestamps. In this paper, we propose a novel loss function that specifically considers the temporal context naturally present around each action, rather than focusing on the single annotated frame to spot. We benchmark our loss on a large dataset of soccer videos, SoccerNet, and achieve an improvement of 12.8% over the baseline. We show the generalization capability of our loss for generic activity proposals and detection on ActivityNet, by spotting the beginning and the end of each activity. Furthermore, we provide an extended ablation study and display challenging cases for action spotting in soccer videos. Finally, we qualitatively illustrate how our loss induces a precise temporal understanding of actions and show how such semantic knowledge can be used for automatic highlights generation.
[ { "created": "Tue, 3 Dec 2019 11:59:55 GMT", "version": "v1" }, { "created": "Sun, 22 Mar 2020 17:08:43 GMT", "version": "v2" }, { "created": "Mon, 30 Mar 2020 13:53:26 GMT", "version": "v3" } ]
2020-03-31
[ [ "Cioppa", "Anthony", "" ], [ "Deliège", "Adrien", "" ], [ "Giancola", "Silvio", "" ], [ "Ghanem", "Bernard", "" ], [ "Van Droogenbroeck", "Marc", "" ], [ "Gade", "Rikke", "" ], [ "Moeslund", "Thomas B.", "" ] ]
Tue, 3 Dec 2019 11:59:55 GMT
2019-12-03T11:59:55Z
[ "cs", "eess" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2111.03253
Daisuke Oba
Daisuke Oba, Shinnosuke Matsuo and Brian Kenji Iwana
Dynamic Data Augmentation with Gating Networks for Time Series Recognition
Accepted to ICPR2022
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data augmentation is a technique to improve the generalization ability of machine learning methods by increasing the size of the dataset. However, since every augmentation method is not equally effective for every dataset, you need to select an appropriate method carefully. We propose a neural network that dynamically selects the best combination of data augmentation methods using a mutually beneficial gating network and a feature consistency loss. The gating network is able to control how much of each data augmentation is used for the representation within the network. The feature consistency loss gives a constraint that augmented features from the same input should be in similar. In experiments, we demonstrate the effectiveness of the proposed method on the 12 largest time-series datasets from 2018 UCR Time Series Archive and reveal the relationships between the data augmentation methods through analysis of the proposed method.
[ { "created": "Fri, 5 Nov 2021 04:24:51 GMT", "version": "v1" }, { "created": "Wed, 26 Jan 2022 07:38:13 GMT", "version": "v2" }, { "created": "Sat, 28 May 2022 09:36:21 GMT", "version": "v3" } ]
2022-05-31
[ [ "Oba", "Daisuke", "" ], [ "Matsuo", "Shinnosuke", "" ], [ "Iwana", "Brian Kenji", "" ] ]
Fri, 5 Nov 2021 04:24:51 GMT
2021-11-05T04:24:51Z
[ "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2002.03605
Jan Kieseler
Jan Kieseler
Object condensation: one-stage grid-free multi-object reconstruction in physics detectors, graph and image data
null
Eur. Phys. J. C 80, 886 (2020)
10.1140/epjc/s10052-020-08461-2
null
physics.data-an cs.CV eess.IV hep-ex
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High-energy physics detectors, images, and point clouds share many similarities in terms of object detection. However, while detecting an unknown number of objects in an image is well established in computer vision, even machine learning assisted object reconstruction algorithms in particle physics almost exclusively predict properties on an object-by-object basis. Traditional approaches from computer vision either impose implicit constraints on the object size or density and are not well suited for sparse detector data or rely on objects being dense and solid. The object condensation method proposed here is independent of assumptions on object size, sorting or object density, and further generalises to non-image-like data structures, such as graphs and point clouds, which are more suitable to represent detector signals. The pixels or vertices themselves serve as representations of the entire object, and a combination of learnable local clustering in a latent space and confidence assignment allows one to collect condensates of the predicted object properties with a simple algorithm. As proof of concept, the object condensation method is applied to a simple object classification problem in images and used to reconstruct multiple particles from detector signals. The latter results are also compared to a classic particle flow approach.
[ { "created": "Mon, 10 Feb 2020 09:04:02 GMT", "version": "v1" }, { "created": "Wed, 1 Apr 2020 14:39:13 GMT", "version": "v2" }, { "created": "Sun, 27 Sep 2020 07:48:16 GMT", "version": "v3" } ]
2020-09-29
[ [ "Kieseler", "Jan", "" ] ]
Mon, 10 Feb 2020 09:04:02 GMT
2020-02-10T09:04:02Z
[ "physics", "eess", "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
hep-ph/0106119
Shinta Kasuya
S. Kasuya and M. Kawasaki
Q-ball formation: Obstacle to Affleck-Dine baryogenesis in the gauge-mediated SUSY breaking ?
27 pages, RevTeX, 21 postscript figures included. The version to be published
Phys.Rev. D64 (2001) 123515
10.1103/PhysRevD.64.123515
null
hep-ph
null
We consider the Affleck-Dine baryogenesis comprehensively in the minimal supersymmetric standard model with gauge-mediated supersymmetry breaking. Considering the high temperature effects, we see that the Affleck-Dine field is naturally deformed into the form of the Q ball. In the natural scenario where the initial amplitude of the field and the A-terms are both determined by the nonrenormalizable superpotential, we obtain only very a narrow allowed region in the parameter space in order to explain the baryon number of the universe for the case that the Q-ball formation occurs just after baryon number production. Moreover, most of the parameter sets suited have already been excluded by current experiments. We also find new situations in which the Q-ball formation takes place rather late compared with baryon number creation. This situation is more preferable, since it allows a wider parameter region for naturally consistent scenarios, although it is still difficult to realize in the actual cosmological scenario.
[ { "created": "Tue, 12 Jun 2001 11:16:46 GMT", "version": "v1" }, { "created": "Thu, 11 Oct 2001 06:47:05 GMT", "version": "v2" } ]
2009-11-07
[ [ "Kasuya", "S.", "" ], [ "Kawasaki", "M.", "" ] ]
Tue, 12 Jun 2001 11:16:46 GMT
2001-06-12T11:16:46Z
[ "physics" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
nlin/0604018
Alexander Manashov
S. E. Derkachov, A. N. Manashov
Baxter operators for the quantum sl(3) invariant spin chain
20 pages, 4 figures, references added
J.Phys. A39 (2006) 13171-13190
10.1088/0305-4470/39/42/001
null
nlin.SI hep-th
null
The noncompact homogeneous sl(3) invariant spin chains are considered. We show that the transfer matrix with generic auxiliary space is factorized into the product of three sl(3) invariant commuting operators. These operators satisfy the finite difference equations in the spectral parameters which follow from the structure of the reducible sl(3) modules.
[ { "created": "Mon, 10 Apr 2006 11:38:23 GMT", "version": "v1" }, { "created": "Thu, 11 May 2006 14:53:23 GMT", "version": "v2" } ]
2009-11-11
[ [ "Derkachov", "S. E.", "" ], [ "Manashov", "A. N.", "" ] ]
Mon, 10 Apr 2006 11:38:23 GMT
2006-04-10T11:38:23Z
[ "physics", "nlin" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2203.10425
Sangeeta Srivastava
Sangeeta Srivastava, Ho-Hsiang Wu, Joao Rulff, Magdalena Fuentes, Mark Cartwright, Claudio Silva, Anish Arora, Juan Pablo Bello
A Study on Robustness to Perturbations for Representations of Environmental Sound
Accepted in EUSIPCO 2022
null
null
null
cs.SD cs.AI cs.LG eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Audio applications involving environmental sound analysis increasingly use general-purpose audio representations, also known as embeddings, for transfer learning. Recently, Holistic Evaluation of Audio Representations (HEAR) evaluated twenty-nine embedding models on nineteen diverse tasks. However, the evaluation's effectiveness depends on the variation already captured within a given dataset. Therefore, for a given data domain, it is unclear how the representations would be affected by the variations caused by myriad microphones' range and acoustic conditions -- commonly known as channel effects. We aim to extend HEAR to evaluate invariance to channel effects in this work. To accomplish this, we imitate channel effects by injecting perturbations to the audio signal and measure the shift in the new (perturbed) embeddings with three distance measures, making the evaluation domain-dependent but not task-dependent. Combined with the downstream performance, it helps us make a more informed prediction of how robust the embeddings are to the channel effects. We evaluate two embeddings -- YAMNet, and OpenL3 on monophonic (UrbanSound8K) and polyphonic (SONYC-UST) urban datasets. We show that one distance measure does not suffice in such task-independent evaluation. Although Fr\'echet Audio Distance (FAD) correlates with the trend of the performance drop in the downstream task most accurately, we show that we need to study FAD in conjunction with the other distances to get a clear understanding of the overall effect of the perturbation. In terms of the embedding performance, we find OpenL3 to be more robust than YAMNet, which aligns with the HEAR evaluation.
[ { "created": "Sun, 20 Mar 2022 01:04:38 GMT", "version": "v1" }, { "created": "Wed, 23 Mar 2022 01:22:01 GMT", "version": "v2" }, { "created": "Wed, 6 Jul 2022 20:44:11 GMT", "version": "v3" } ]
2022-07-08
[ [ "Srivastava", "Sangeeta", "" ], [ "Wu", "Ho-Hsiang", "" ], [ "Rulff", "Joao", "" ], [ "Fuentes", "Magdalena", "" ], [ "Cartwright", "Mark", "" ], [ "Silva", "Claudio", "" ], [ "Arora", "Anish", "" ], [ "Bello", "Juan Pablo", "" ] ]
Sun, 20 Mar 2022 01:04:38 GMT
2022-03-20T01:04:38Z
[ "cs", "eess" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1912.09781
Zilong Wang
Qiping Fang, Zilong Wang
New Construction of Optimal Interference-Free ZCZ Sequence Sets by Zak Transform
It is known result and proved by other people, so it should be withdraw
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new construction of interference-free zero correlation zone (IF-ZCZ) sequence sets is proposed by well designed finite Zak transform lattice tessellation. Each set is characterized by the period of sequences $KM^2$, the set size $K$ and the length of zero correlation zone $M^2-1$, which is optimal with respect to the Tang-Fan-Matsufuji bound. In particular, all sequences in these sets have sparse and highly structured Zak and Fourier spectra, which can decrease the computational complexity of the implementation of the banks of matched filters. Moreover, for the parameters proposed in this paper, the new construction is essentially different from the general construction of optimal IF-ZCZ sequence sets given by Popovic.
[ { "created": "Fri, 20 Dec 2019 12:12:39 GMT", "version": "v1" }, { "created": "Sun, 12 Jan 2020 14:48:04 GMT", "version": "v2" }, { "created": "Tue, 12 May 2020 14:35:05 GMT", "version": "v3" } ]
2020-05-13
[ [ "Fang", "Qiping", "" ], [ "Wang", "Zilong", "" ] ]
Fri, 20 Dec 2019 12:12:39 GMT
2019-12-20T12:12:39Z
[ "cs", "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Neuronal Regulation of Cutaneous Immunity.
null
null
null
null
null
null
The skin is innervated by numerous sensory afferent neurons that respond to a diverse array of stimuli ranging from gentle touch to noxious pain. Various features of the immune system-pathogen recognition, secretion of soluble mediators-are shared with the nervous system. This has led to the recognition that neurons share some functions with innate immune cells and have the capacity to recognize pathogens and participate in innate immune responses. Neuroimmune interactions are bidirectional. Soluble mediators from immune cells activate neurons and soluble mediators from neurons can activate immune cells. In this review, we will focus on the interplay between neurons and innate immunity in the skin in the context of host defense and inflammation.
null
null
null
null
null
null
pubmed
null
null
null
null
2,020
null
null
null
null
null
null
31,907,268
Journal of immunology (Baltimore, Md. : 1950)
1008.2412
Gene Sher
Gene I. Sher
Discover & eXplore Neural Network (DXNN) Platform, a Modular TWEANN
null
null
null
null
cs.NE cond-mat.dis-nn
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper I present a novel type of Topology and Weight Evolving Artificial Neural Network (TWEANN) system called Modular Discover & eXplore Neural Network (DXNN). Modular DXNN utilizes a hierarchical/modular topology which allows for highly scalable and dynamically granular systems to evolve. Among the novel features discussed in this paper is a simple and database friendly encoding for hierarchical/modular NNs, a new selection method aimed at producing highly compact and fit individuals within the population, a "Targeted Tunning" system aimed at alleviating the curse of dimensionality, and a two phase based neuroevolutionary approach which yields high population diversity and removes the need for speciation algorithms. I will discuss DXNN's mutation operators which are aimed at improving its efficiency, expandability, and capabilities through a built in feature selection method that allows for the evolved system to expand, discover, and explore new sensors and actuators. Finally I will compare DXNN platform to other state of the art TWEANNs on a control task to demonstrate its superior ability to produce highly compact solutions faster than its competitors.
[ { "created": "Sat, 14 Aug 2010 03:35:05 GMT", "version": "v1" }, { "created": "Mon, 6 Dec 2010 08:14:43 GMT", "version": "v2" }, { "created": "Tue, 7 Dec 2010 03:51:14 GMT", "version": "v3" } ]
2010-12-08
[ [ "Sher", "Gene I.", "" ] ]
Sat, 14 Aug 2010 03:35:05 GMT
2010-08-14T03:35:05Z
[ "physics", "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1409.5617
Leonardo Rolla
Roberto Markarian, Leonardo T. Rolla, Vladas Sidoravicius, Fabio A. Tal, Maria E. Vares
Stochastic Perturbations of Convex Billiards
null
Nonlinearity, v. 28, p. 4425-4434, 2015
10.1088/0951-7715/28/12/4425
null
math.DS math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a strictly convex billiard table with $C^2$ boundary, with the dynamics subjected to random perturbations. Each time the billiard ball hits the boundary its reflection angle has a random perturbation. The perturbation distribution corresponds to the physical situation where either the scale of the surface irregularities is smaller than but comparable to the diameter of the reflected object, or the billiard ball is not perfectly rigid. We prove that for a large class of such perturbations the resulting Markov chain is uniformly ergodic, although this is not true in general.
[ { "created": "Fri, 19 Sep 2014 12:06:23 GMT", "version": "v1" }, { "created": "Wed, 11 Nov 2015 15:43:38 GMT", "version": "v2" }, { "created": "Wed, 13 Jun 2018 20:17:13 GMT", "version": "v3" } ]
2018-06-15
[ [ "Markarian", "Roberto", "" ], [ "Rolla", "Leonardo T.", "" ], [ "Sidoravicius", "Vladas", "" ], [ "Tal", "Fabio A.", "" ], [ "Vares", "Maria E.", "" ] ]
Fri, 19 Sep 2014 12:06:23 GMT
2014-09-19T12:06:23Z
[ "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
0811.2841
Mukund Sundararajan
Arpita Ghosh, Tim Roughgarden, Mukund Sundararajan
Universally Utility-Maximizing Privacy Mechanisms
rewritten for clarity, typos corrected
null
null
null
cs.DB cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A mechanism for releasing information about a statistical database with sensitive data must resolve a trade-off between utility and privacy. Privacy can be rigorously quantified using the framework of {\em differential privacy}, which requires that a mechanism's output distribution is nearly the same whether or not a given database row is included or excluded. The goal of this paper is strong and general utility guarantees, subject to differential privacy. We pursue mechanisms that guarantee near-optimal utility to every potential user, independent of its side information (modeled as a prior distribution over query results) and preferences (modeled via a loss function). Our main result is: for each fixed count query and differential privacy level, there is a {\em geometric mechanism} $M^*$ -- a discrete variant of the simple and well-studied Laplace mechanism -- that is {\em simultaneously expected loss-minimizing} for every possible user, subject to the differential privacy constraint. This is an extremely strong utility guarantee: {\em every} potential user $u$, no matter what its side information and preferences, derives as much utility from $M^*$ as from interacting with a differentially private mechanism $M_u$ that is optimally tailored to $u$.
[ { "created": "Tue, 18 Nov 2008 05:59:39 GMT", "version": "v1" }, { "created": "Thu, 19 Mar 2009 19:17:20 GMT", "version": "v2" }, { "created": "Fri, 20 Mar 2009 16:34:43 GMT", "version": "v3" } ]
2009-03-20
[ [ "Ghosh", "Arpita", "" ], [ "Roughgarden", "Tim", "" ], [ "Sundararajan", "Mukund", "" ] ]
Tue, 18 Nov 2008 05:59:39 GMT
2008-11-18T05:59:39Z
[ "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2005.00905
Hong Zhang
Hong Zhang, Judong Shen and Zheyang Wu
An efficient and accurate approximation to the distribution of quadratic forms of Gaussian variables
null
Journal of Computational and Graphical Statistics. 2022, 31:1, 304-311
10.1080/10618600.2021.2000423
null
stat.ME q-bio.QM stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In computational and applied statistics, it is of great interest to get fast and accurate calculation for the distributions of the quadratic forms of Gaussian random variables. This paper presents a novel approximation strategy that contains two developments. First, we propose a faster numerical procedure in computing the moments of the quadratic forms. Second, we establish a general moment-matching framework for distribution approximation, which covers existing approximation methods for the distributions of the quadratic forms of Gaussian variables. Under this framework, a novel moment-ratio method (MR) is proposed to match the ratio of skewness and kurtosis based on the gamma distribution. Our extensive simulations show that 1) MR is almost as accurate as the exact distribution calculation and is much more efficient; 2) comparing with existing approximation methods, MR significantly improves the accuracy of approximating far right tail probabilities. The proposed method has wide applications. For example, it is a better choice than existing methods for facilitating hypothesis testing in big data analysis, where efficient and accurate calculation of very small $p$-values is desired. An R package Qapprox that implements related methods is available on CRAN.
[ { "created": "Sat, 2 May 2020 19:07:19 GMT", "version": "v1" }, { "created": "Wed, 23 Sep 2020 13:26:42 GMT", "version": "v2" } ]
2023-12-29
[ [ "Zhang", "Hong", "" ], [ "Shen", "Judong", "" ], [ "Wu", "Zheyang", "" ] ]
Sat, 2 May 2020 19:07:19 GMT
2020-05-02T19:07:19Z
[ "q-bio", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Classification and Analysis of Neologisms Produced by Learners of {S}panish: Effects of Proficiency and Task
null
null
null
null
null
null
The Spanish Learner Language Oral Corpora (SPLLOC) of transcribed conversations between investigators and language learners contains a set of neologism tags. In this work, the utterances tagged as neologisms are broken down into three categories: true neologisms, loanwords, and errors. This work examines the relationships between neologism, loanword, and error production and both language learner level and conversation task. The results of this study suggest that loanwords and errors are produced most frequently by language learners with moderate experience, while neologisms are produced most frequently by native speakers. This study also indicates that tasks that require descriptions of images draw more neologism, loanword and error production. We ultimately present a unique analysis of the implications of neologism, loanword, and error production useful for further work in second language acquisition research, as well as for language educators.
null
null
null
null
null
null
acl
inproceedings
wein-2020-classification
Cunha, Rossana and Shaikh, Samira and Varis, Erika and Georgi, Ryan and Tsai, Alicia and Anastasopoulos, Antonios and Chandu, Khyathi Raghavi
jul
2,020
Seattle, USA
Association for Computational Linguistics
https://aclanthology.org/2020.winlp-1.22/
Wein, Shira
Proceedings of the Fourth Widening Natural Language Processing Workshop
88--91
null
null
2209.14610
Pan Lu
Pan Lu, Liang Qiu, Kai-Wei Chang, Ying Nian Wu, Song-Chun Zhu, Tanmay Rajpurohit, Peter Clark, Ashwin Kalyan
Dynamic Prompt Learning via Policy Gradient for Semi-structured Mathematical Reasoning
ICLR 2023. 26 pages and 18 figures. The data and code are available at https://promptpg.github.io
null
null
null
cs.LG cs.AI cs.CL cs.CV
http://creativecommons.org/licenses/by/4.0/
Mathematical reasoning, a core ability of human intelligence, presents unique challenges for machines in abstract thinking and logical reasoning. Recent large pre-trained language models such as GPT-3 have achieved remarkable progress on mathematical reasoning tasks written in text form, such as math word problems (MWP). However, it is unknown if the models can handle more complex problems that involve math reasoning over heterogeneous information, such as tabular data. To fill the gap, we present Tabular Math Word Problems (TabMWP), a new dataset containing 38,431 open-domain grade-level problems that require mathematical reasoning on both textual and tabular data. Each question in TabMWP is aligned with a tabular context, which is presented as an image, semi-structured text, and a structured table. There are two types of questions: free-text and multi-choice, and each problem is annotated with gold solutions to reveal the multi-step reasoning process. We evaluate different pre-trained models on TabMWP, including the GPT-3 model in a few-shot setting. As earlier studies suggest, since few-shot GPT-3 relies on the selection of in-context examples, its performance is unstable and can degrade to near chance. The unstable issue is more severe when handling complex problems like TabMWP. To mitigate this, we further propose a novel approach, PromptPG, which utilizes policy gradient to learn to select in-context examples from a small amount of training data and then constructs the corresponding prompt for the test example. Experimental results show that our method outperforms the best baseline by 5.31% on the accuracy metric and reduces the prediction variance significantly compared to random selection, which verifies its effectiveness in selecting in-context examples.
[ { "created": "Thu, 29 Sep 2022 08:01:04 GMT", "version": "v1" }, { "created": "Wed, 2 Nov 2022 23:42:14 GMT", "version": "v2" }, { "created": "Thu, 2 Mar 2023 07:41:55 GMT", "version": "v3" } ]
2023-03-03
[ [ "Lu", "Pan", "" ], [ "Qiu", "Liang", "" ], [ "Chang", "Kai-Wei", "" ], [ "Wu", "Ying Nian", "" ], [ "Zhu", "Song-Chun", "" ], [ "Rajpurohit", "Tanmay", "" ], [ "Clark", "Peter", "" ], [ "Kalyan", "Ashwin", "" ] ]
Thu, 29 Sep 2022 08:01:04 GMT
2022-09-29T08:01:04Z
[ "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1510.02258
Zhi-Wei Li
Zhi-Wei Li
The triangulation of the subfactor categories of additive categories with suspensions
we rewrite the section 6 and introduce the notions of Frobenius partial one-sided triangulated categories
null
null
null
math.RT math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a framework to triangulate subfactor categories of additive categories with additive endofunctors. It is proved that such a framework is sufficiently flexible to cover many instances in algebra and geometry where abelian, exact and triangulated subfactor categories are constructed. As an application, we show that Iyama-Yoshino triangulated subfactor categories can be modeled.
[ { "created": "Thu, 8 Oct 2015 09:47:38 GMT", "version": "v1" }, { "created": "Sun, 3 Jul 2016 13:55:57 GMT", "version": "v2" }, { "created": "Mon, 12 Dec 2016 11:03:50 GMT", "version": "v3" }, { "created": "Mon, 23 Jan 2017 04:48:40 GMT", "version": "v4" }, { "created": "Sun, 12 Feb 2017 15:29:05 GMT", "version": "v5" }, { "created": "Wed, 22 Feb 2017 10:13:53 GMT", "version": "v6" } ]
2017-02-23
[ [ "Li", "Zhi-Wei", "" ] ]
Thu, 8 Oct 2015 09:47:38 GMT
2015-10-08T09:47:38Z
[ "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2001.07859
Christopher Urban
Christopher J. Urban and Daniel J. Bauer
A Deep Learning Algorithm for High-Dimensional Exploratory Item Factor Analysis
30 pages; 12 figures; accepted for publication in Psychometrika
Psychometrika 86 (2021) 1-29
10.1007/s11336-021-09748-3
null
stat.ME cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Marginal maximum likelihood (MML) estimation is the preferred approach to fitting item response theory models in psychometrics due to the MML estimator's consistency, normality, and efficiency as the sample size tends to infinity. However, state-of-the-art MML estimation procedures such as the Metropolis-Hastings Robbins-Monro (MH-RM) algorithm as well as approximate MML estimation procedures such as variational inference (VI) are computationally time-consuming when the sample size and the number of latent factors are very large. In this work, we investigate a deep learning-based VI algorithm for exploratory item factor analysis (IFA) that is computationally fast even in large data sets with many latent factors. The proposed approach applies a deep artificial neural network model called an importance-weighted autoencoder (IWAE) for exploratory IFA. The IWAE approximates the MML estimator using an importance sampling technique wherein increasing the number of importance-weighted (IW) samples drawn during fitting improves the approximation, typically at the cost of decreased computational efficiency. We provide a real data application that recovers results aligning with psychological theory across random starts. Via simulation studies, we show that the IWAE yields more accurate estimates as either the sample size or the number of IW samples increases (although factor correlation and intercepts estimates exhibit some bias) and obtains similar results to MH-RM in less time. Our simulations also suggest that the proposed approach performs similarly to and is potentially faster than constrained joint maximum likelihood estimation, a fast procedure that is consistent when the sample size and the number of items simultaneously tend to infinity.
[ { "created": "Wed, 22 Jan 2020 03:02:34 GMT", "version": "v1" }, { "created": "Mon, 14 Sep 2020 00:21:19 GMT", "version": "v2" }, { "created": "Mon, 25 Jan 2021 18:24:46 GMT", "version": "v3" }, { "created": "Thu, 4 Feb 2021 17:29:22 GMT", "version": "v4" } ]
2025-01-08
[ [ "Urban", "Christopher J.", "" ], [ "Bauer", "Daniel J.", "" ] ]
Wed, 22 Jan 2020 03:02:34 GMT
2020-01-22T03:02:34Z
[ "cs", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2109.09248
Sanyukta Deshpande
Sanyukta Deshpande and Milind A. Sohoni
Wages and Utilities in a Closed Economy
null
null
null
null
cs.GT
http://creativecommons.org/licenses/by/4.0/
The broad objective of this paper is to propose a mathematical model for the study of causes of wage inequality and relate it to choices of consumption, the technologies of production, and the composition of labor in an economy. The paper constructs a Simple Closed Model, or an SCM, for short, for closed economies, in which the consumption and the production parts are clearly separated and yet coupled. The model is established as a specialization of the Arrow-Debreu model and its equilibria correspond directly with those of the general Arrow-Debreu model. The formulation allows us to identify the combinatorial data which link parameters of the economic system with its equilibria, in particular, the impact of consumer preferences on wages. The SCM model also allows the formulation and explicit construction of the consumer choice game, where expressed utilities of various labor classes serve as strategies with total or relative wages as the pay-offs. We illustrate, through examples, the mathematical details of the consumer choice game. We show that consumer preferences, expressed through modified utility functions, do indeed percolate through the economy, and influence not only prices but also production and wages. Thus, consumer choice may serve as an effective tool for wage redistribution.
[ { "created": "Sun, 19 Sep 2021 23:08:19 GMT", "version": "v1" }, { "created": "Fri, 17 Mar 2023 15:08:03 GMT", "version": "v2" }, { "created": "Thu, 17 Aug 2023 23:34:56 GMT", "version": "v3" } ]
2023-08-21
[ [ "Deshpande", "Sanyukta", "" ], [ "Sohoni", "Milind A.", "" ] ]
Sun, 19 Sep 2021 23:08:19 GMT
2021-09-19T23:08:19Z
[ "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1209.0835
Neil Zhenqiang Gong
Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song
Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+
14 pages, 19 figures. will appear in IMC'12
null
null
null
cs.SI cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Understanding social network structure and evolution has important implications for many aspects of network and system design including provisioning, bootstrapping trust and reputation systems via social networks, and defenses against Sybil attacks. Several recent results suggest that augmenting the social network structure with user attributes (e.g., location, employer, communities of interest) can provide a more fine-grained understanding of social networks. However, there have been few studies to provide a systematic understanding of these effects at scale. We bridge this gap using a unique dataset collected as the Google+ social network grew over time since its release in late June 2011. We observe novel phenomena with respect to both standard social network metrics and new attribute-related metrics (that we define). We also observe interesting evolutionary patterns as Google+ went from a bootstrap phase to a steady invitation-only stage before a public release. Based on our empirical observations, we develop a new generative model to jointly reproduce the social structure and the node attributes. Using theoretical analysis and empirical evaluations, we show that our model can accurately reproduce the social and attribute structure of real social networks. We also demonstrate that our model provides more accurate predictions for practical application contexts.
[ { "created": "Wed, 5 Sep 2012 01:01:47 GMT", "version": "v1" }, { "created": "Sat, 8 Sep 2012 04:12:28 GMT", "version": "v2" }, { "created": "Tue, 11 Sep 2012 17:17:36 GMT", "version": "v3" }, { "created": "Wed, 19 Sep 2012 02:24:50 GMT", "version": "v4" } ]
2012-09-20
[ [ "Gong", "Neil Zhenqiang", "" ], [ "Xu", "Wenchang", "" ], [ "Huang", "Ling", "" ], [ "Mittal", "Prateek", "" ], [ "Stefanov", "Emil", "" ], [ "Sekar", "Vyas", "" ], [ "Song", "Dawn", "" ] ]
Wed, 5 Sep 2012 01:01:47 GMT
2012-09-05T01:01:47Z
[ "physics", "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1902.02606
Michiel van den Berg
Michiel van den Berg, Peter Gilkey, Katie Gittins
Heat flow from polygons
17 pages, including 4 figures; to appear in Potential Analysis
null
null
null
math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the heat flow from an open, bounded set $D$ in $\R^2$ with a polygonal boundary $\partial D$. The initial condition is the indicator function of $D$. A Dirichlet $0$ boundary condition has been imposed on some but not all of the edges of $\partial D$. We calculate the heat content of $D$ in $\R^2$ at $t$ up to an exponentially small remainder as $t\downarrow 0$.
[ { "created": "Thu, 7 Feb 2019 13:14:17 GMT", "version": "v1" }, { "created": "Mon, 22 Jul 2019 11:22:25 GMT", "version": "v2" }, { "created": "Thu, 29 Aug 2019 13:33:41 GMT", "version": "v3" } ]
2019-08-30
[ [ "Berg", "Michiel van den", "" ], [ "Gilkey", "Peter", "" ], [ "Gittins", "Katie", "" ] ]
Thu, 7 Feb 2019 13:14:17 GMT
2019-02-07T13:14:17Z
[ "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Structural mechanics of the mosquito heart and its function in bidirectional hemolymph transport.
null
null
null
null
null
null
The insect circulatory system transports nutrients, signaling molecules, wastes and immune factors to all areas of the body. The primary organ driving circulation is the dorsal vessel, which consists of an abdominal heart and a thoracic aorta. Here, we present qualitative and quantitative data characterizing the heart of the mosquito, Anopheles gambiae. Visual observation showed that the heart of resting mosquitoes contracts at a rate of 1.37 Hz (82 beats per minute) and switches contraction direction, with 72% of contractions occurring in the anterograde direction (toward the head) and 28% of contractions occurring in the retrograde direction (toward the tip of the abdomen). The heart is tethered to the midline of the abdominal tergum by six complete and three incomplete pairs of alary muscles, and propels hemolymph at an average velocity of 8 mm s(-1) by sequentially contracting muscle fibers oriented in a helical twist with respect to the lumen of the vessel. Hemolymph enters the heart through six pairs of incurrent abdominal ostia and one pair of ostia located at the thoraco-abdominal junction that receive hemolymph from the abdominal hemocoel and thoracic venous channels, respectively. The vessel expels hemolymph through distal excurrent openings located at the anterior end of the aorta and the posterior end of the heart. In conclusion, this study presents a comprehensive revision and expansion of our knowledge of the mosquito heart and for the first time quantifies hemolymph flow in an insect while observing dorsal vessel contractions.
null
null
null
null
null
null
pubmed
null
null
null
null
2,010
null
null
null
null
null
null
20,118,304
The Journal of experimental biology
1710.05359
Tomoya Sakai
Tomoya Sakai and Gang Niu and Masashi Sugiyama
Information-Theoretic Representation Learning for Positive-Unlabeled Classification
null
Neural Computation (2021) 33 (1) 244-268
10.1162/neco_a_01337
null
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent advances in weakly supervised classification allow us to train a classifier only from positive and unlabeled (PU) data. However, existing PU classification methods typically require an accurate estimate of the class-prior probability, which is a critical bottleneck particularly for high-dimensional data. This problem has been commonly addressed by applying principal component analysis in advance, but such unsupervised dimension reduction can collapse underlying class structure. In this paper, we propose a novel representation learning method from PU data based on the information-maximization principle. Our method does not require class-prior estimation and thus can be used as a preprocessing method for PU classification. Through experiments, we demonstrate that our method combined with deep neural networks highly improves the accuracy of PU class-prior estimation, leading to state-of-the-art PU classification performance.
[ { "created": "Sun, 15 Oct 2017 16:19:37 GMT", "version": "v1" }, { "created": "Tue, 7 Nov 2017 10:50:54 GMT", "version": "v2" }, { "created": "Mon, 12 Feb 2018 06:45:53 GMT", "version": "v3" }, { "created": "Sat, 18 Jun 2022 15:48:18 GMT", "version": "v4" } ]
2022-06-22
[ [ "Sakai", "Tomoya", "" ], [ "Niu", "Gang", "" ], [ "Sugiyama", "Masashi", "" ] ]
Sun, 15 Oct 2017 16:19:37 GMT
2017-10-15T16:19:37Z
[ "cs", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
astro-ph/9804102
Martin Hardcastle
M. J. Hardcastle, C. R. Lawrence and D. M. Worrall
Extended and compact X-ray emission from the powerful radio galaxy 3C220.1
7 pages, 4 figures. Uses emulateapj.sty (included). To appear in ApJ, Sep 10th issue. Update corrects some numbers and adds note in proof; conclusions unchanged
Astrophys.J. 504 (1998) 743
10.1086/306121
Bristol Astrophysics preprint 27
astro-ph
null
We report on ROSAT HRI observations of the z=0.61 radio galaxy 3C220.1. The X-ray emission from this object consists of an extended component, which we attribute to luminous cluster emission, and a compact central source. The compact component is too bright to be modelled as a cooling flow under some plausible assumptions for the hot gas temperature and distribution; we suggest instead that it is directly related to the core of the radio source. The X-ray flux of the compact component is consistent with the prediction of Worrall et al (1994) that all powerful radio galaxies should have a central jet-related X-ray emission component that is proportional in strength to the radio core flux density. Other observations of distant 3CR radio sources are consistent with this model.
[ { "created": "Thu, 9 Apr 1998 17:18:43 GMT", "version": "v1" }, { "created": "Wed, 24 Jun 1998 11:29:48 GMT", "version": "v2" } ]
2009-10-30
[ [ "Hardcastle", "M. J.", "" ], [ "Lawrence", "C. R.", "" ], [ "Worrall", "D. M.", "" ] ]
Thu, 9 Apr 1998 17:18:43 GMT
1998-04-09T17:18:43Z
[ "physics" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1910.03193
Lu Lu
Lu Lu, Pengzhan Jin, George Em Karniadakis
DeepONet: Learning nonlinear operators for identifying differential equations based on the universal approximation theorem of operators
null
null
10.1038/s42256-021-00302-5
null
cs.LG stat.ML
http://creativecommons.org/licenses/by-nc-sa/4.0/
While it is widely known that neural networks are universal approximators of continuous functions, a less known and perhaps more powerful result is that a neural network with a single hidden layer can approximate accurately any nonlinear continuous operator. This universal approximation theorem is suggestive of the potential application of neural networks in learning nonlinear operators from data. However, the theorem guarantees only a small approximation error for a sufficient large network, and does not consider the important optimization and generalization errors. To realize this theorem in practice, we propose deep operator networks (DeepONets) to learn operators accurately and efficiently from a relatively small dataset. A DeepONet consists of two sub-networks, one for encoding the input function at a fixed number of sensors $x_i, i=1,\dots,m$ (branch net), and another for encoding the locations for the output functions (trunk net). We perform systematic simulations for identifying two types of operators, i.e., dynamic systems and partial differential equations, and demonstrate that DeepONet significantly reduces the generalization error compared to the fully-connected networks. We also derive theoretically the dependence of the approximation error in terms of the number of sensors (where the input function is defined) as well as the input function type, and we verify the theorem with computational results. More importantly, we observe high-order error convergence in our computational tests, namely polynomial rates (from half order to fourth order) and even exponential convergence with respect to the training dataset size.
[ { "created": "Tue, 8 Oct 2019 03:21:14 GMT", "version": "v1" }, { "created": "Tue, 14 Apr 2020 02:31:17 GMT", "version": "v2" }, { "created": "Wed, 15 Apr 2020 00:51:54 GMT", "version": "v3" } ]
2021-11-03
[ [ "Lu", "Lu", "" ], [ "Jin", "Pengzhan", "" ], [ "Karniadakis", "George Em", "" ] ]
Tue, 8 Oct 2019 03:21:14 GMT
2019-10-08T03:21:14Z
[ "cs", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2112.09997
Jocelyn \'Etienne
H. Chelly, A. Jahangiri, M. Mireux, J. \'Etienne, D.K. Dysthe, C. Verdier and P. Recho
Cell crawling on a compliant substrate: a biphasic relation with linear friction
null
Int. J. Non-Linear Mech 139:103897, 2022
10.1016/j.ijnonlinmec.2021.103897
null
physics.bio-ph cond-mat.soft q-bio.CB
http://creativecommons.org/licenses/by-sa/4.0/
A living cell actively generates traction forces on its environment with its actin cytoskeleton. These forces deform the cell elastic substrate which, in turn, affects the traction forces exerted by the cell and can consequently modify the cell dynamics. By considering a cell constrained to move along a one-dimensional thin track, we take advantage of the problem geometry to explicitly derive the effective law that describes the non-local frictional contact between the cell and the deformable substrate. We then couple such a law with one of the simplest model of the active flow within the cell cytoskeleton. This offers a paradigm that does not invoke any local non-linear friction law to explain that the relation between the cell steady state velocity and the substrate elasticity is non linear as experimentally observed. Additionally, we present an experimental platform to test our theoretical predictions. While our efforts are still not conclusive in this respect as more cell types need to be investigated, our analysis of the coupling between the substrate displacement and the actin flow leads to friction coefficient estimates that are in-line with some previously reported results.
[ { "created": "Sat, 18 Dec 2021 20:48:08 GMT", "version": "v1" }, { "created": "Wed, 2 Feb 2022 15:50:03 GMT", "version": "v2" } ]
2022-02-03
[ [ "Chelly", "H.", "" ], [ "Jahangiri", "A.", "" ], [ "Mireux", "M.", "" ], [ "Étienne", "J.", "" ], [ "Dysthe", "D. K.", "" ], [ "Verdier", "C.", "" ], [ "Recho", "P.", "" ] ]
Sat, 18 Dec 2021 20:48:08 GMT
2021-12-18T20:48:08Z
[ "q-bio", "physics" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2206.02629
Beren Millidge Mr
Beren Millidge, Yuhang Song, Tommaso Salvatori, Thomas Lukasiewicz, Rafal Bogacz
Backpropagation at the Infinitesimal Inference Limit of Energy-Based Models: Unifying Predictive Coding, Equilibrium Propagation, and Contrastive Hebbian Learning
31/05/22 initial upload; 22/06/22 change corresponding author; 03/08/22 revisions
null
null
null
cs.LG cs.AI q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How the brain performs credit assignment is a fundamental unsolved problem in neuroscience. Many `biologically plausible' algorithms have been proposed, which compute gradients that approximate those computed by backpropagation (BP), and which operate in ways that more closely satisfy the constraints imposed by neural circuitry. Many such algorithms utilize the framework of energy-based models (EBMs), in which all free variables in the model are optimized to minimize a global energy function. However, in the literature, these algorithms exist in isolation and no unified theory exists linking them together. Here, we provide a comprehensive theory of the conditions under which EBMs can approximate BP, which lets us unify many of the BP approximation results in the literature (namely, predictive coding, equilibrium propagation, and contrastive Hebbian learning) and demonstrate that their approximation to BP arises from a simple and general mathematical property of EBMs at free-phase equilibrium. This property can then be exploited in different ways with different energy functions, and these specific choices yield a family of BP-approximating algorithms, which both includes the known results in the literature and can be used to derive new ones.
[ { "created": "Tue, 31 May 2022 20:48:52 GMT", "version": "v1" }, { "created": "Wed, 22 Jun 2022 18:56:53 GMT", "version": "v2" }, { "created": "Wed, 3 Aug 2022 20:37:05 GMT", "version": "v3" } ]
2022-08-05
[ [ "Millidge", "Beren", "" ], [ "Song", "Yuhang", "" ], [ "Salvatori", "Tommaso", "" ], [ "Lukasiewicz", "Thomas", "" ], [ "Bogacz", "Rafal", "" ] ]
Tue, 31 May 2022 20:48:52 GMT
2022-05-31T20:48:52Z
[ "q-bio", "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1311.5699
Jere Koskela
Jere Koskela, Paul A. Jenkins and Dario Spano
Computational inference beyond Kingman's coalescent
20 pages, 5 figures
J. Appl. Probab. 52(2), p. 519-537, 2015
10.1239/jap/1437658613
null
math.PR q-bio.PE stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Full likelihood inference under Kingman's coalescent is a computationally challenging problem to which importance sampling (IS) and the product of approximate conditionals (PAC) method have been applied successfully. Both methods can be expressed in terms of families of intractable conditional sampling distributions (CSDs), and rely on principled approximations for accurate inference. Recently, more general $\Lambda$- and $\Xi$-coalescents have been observed to provide better modelling fits to some genetic data sets. We derive families of approximate CSDs for finite sites $\Lambda$- and $\Xi$-coalescents, and use them to obtain "approximately optimal" IS and PAC algorithms for $\Lambda$-coalescents, yielding substantial gains in efficiency over existing methods.
[ { "created": "Fri, 22 Nov 2013 10:25:16 GMT", "version": "v1" }, { "created": "Mon, 9 Jun 2014 15:26:52 GMT", "version": "v2" }, { "created": "Wed, 25 Mar 2015 11:08:29 GMT", "version": "v3" }, { "created": "Wed, 16 Dec 2015 15:38:16 GMT", "version": "v4" } ]
2016-08-29
[ [ "Koskela", "Jere", "" ], [ "Jenkins", "Paul A.", "" ], [ "Spano", "Dario", "" ] ]
Fri, 22 Nov 2013 10:25:16 GMT
2013-11-22T10:25:16Z
[ "q-bio", "math", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1509.08535
Siamak Ravanbakhsh
Siamak Ravanbakhsh, Barnabas Poczos, Russell Greiner
Boolean Matrix Factorization and Noisy Completion via Message Passing
null
null
null
null
math.ST cs.AI cs.DM stat.ML stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Boolean matrix factorization and Boolean matrix completion from noisy observations are desirable unsupervised data-analysis methods due to their interpretability, but hard to perform due to their NP-hardness. We treat these problems as maximum a posteriori inference problems in a graphical model and present a message passing approach that scales linearly with the number of observations and factors. Our empirical study demonstrates that message passing is able to recover low-rank Boolean matrices, in the boundaries of theoretically possible recovery and compares favorably with state-of-the-art in real-world applications, such collaborative filtering with large-scale Boolean data.
[ { "created": "Mon, 28 Sep 2015 23:11:16 GMT", "version": "v1" }, { "created": "Fri, 9 Oct 2015 19:27:13 GMT", "version": "v2" }, { "created": "Thu, 4 Feb 2016 21:05:32 GMT", "version": "v3" } ]
2016-02-08
[ [ "Ravanbakhsh", "Siamak", "" ], [ "Poczos", "Barnabas", "" ], [ "Greiner", "Russell", "" ] ]
Mon, 28 Sep 2015 23:11:16 GMT
2015-09-28T23:11:16Z
[ "cs", "math", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Role of amino acid transporter LAT2 in the activation of mTORC1 pathway and the pathogenesis of crescentic glomerulonephritis.
null
null
null
null
null
null
Molecular mechanisms and signaling pathways leading to cellular proliferation and lesion formation in the crescentic glomerulonephritis (CGN) remain elusive. In the present study we have explored a potential role of the mammalian target of rapamycin complex 1 (mTORC1) signaling pathway and amino acid transporter (LAT) in the pathogenesis of CGN. Immunohistochemistry and western blot analysis of glomeruli isolated from a rat model of CGN revealed that activation of mTORC1 preceded crescent formation in glomerular parietal epithelial cells (PECs) and podocytes. Daily treatment of rats with the mTOR inhibitor everolimus just after induction of CGN was not beneficial and instead led to increased cellular necrosis of PECs. However, daily treatment starting 7 days after the onset of CGN was beneficial and maintained intact glomeruli. Out of three forms of L-type neutral amino acid transporters (LAT1-LAT3) studied here, only LAT2 was found to be upregulated in the PECs and podocytes in advance of the crescent formation as well as in the crescent lesion itself. Cell culture study revealed that plasma membrane expression of LAT2 markedly stimulated mTORC1 signaling pathway, which was significantly abrogated by coexistence of LAT inhibitor. Finally, LAT inhibitor significantly abrogated development of crescent formation of CGN on day 7. Our data suggest that LAT2 may have a pivotal role in the pathogenesis of CGN by activating the mTORC1 pathway in the glomerular epithelial cells.
null
null
null
null
null
null
pubmed
null
null
null
null
2,011
null
null
null
null
null
null
21,403,644
Laboratory investigation; a journal of technical methods and pathology
1012.2643
Caroline Uhler
Caroline Uhler
Geometry of maximum likelihood estimation in Gaussian graphical models
Published in at http://dx.doi.org/10.1214/11-AOS957 the Annals of Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Statistics 2012, Vol. 40, No. 1, 238-261
10.1214/11-AOS957
IMS-AOS-AOS957
math.ST math.AG math.OC stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study maximum likelihood estimation in Gaussian graphical models from a geometric point of view. An algebraic elimination criterion allows us to find exact lower bounds on the number of observations needed to ensure that the maximum likelihood estimator (MLE) exists with probability one. This is applied to bipartite graphs, grids and colored graphs. We also study the ML degree, and we present the first instance of a graph for which the MLE exists with probability one, even when the number of observations equals the treewidth.
[ { "created": "Mon, 13 Dec 2010 06:40:41 GMT", "version": "v1" }, { "created": "Tue, 29 May 2012 10:48:37 GMT", "version": "v2" } ]
2012-05-30
[ [ "Uhler", "Caroline", "" ] ]
Mon, 13 Dec 2010 06:40:41 GMT
2010-12-13T06:40:41Z
[ "math", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1812.00181
Sean Saito
Sean Saito, Sujoy Roy
Effects of Loss Functions And Target Representations on Adversarial Robustness
8 pages, 4 figures. Accepted at MLSys 2020 First Workshop on Secure and Resilient Autonomy
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Understanding and evaluating the robustness of neural networks under adversarial settings is a subject of growing interest. Attacks proposed in the literature usually work with models trained to minimize cross-entropy loss and output softmax probabilities. In this work, we present interesting experimental results that suggest the importance of considering other loss functions and target representations, specifically, (1) training on mean-squared error and (2) representing targets as codewords generated from a random codebook. We evaluate the robustness of neural networks that implement these proposed modifications using existing attacks, showing an increase in accuracy against untargeted attacks of up to 98.7\% and a decrease of targeted attack success rates of up to 99.8\%. Our model demonstrates more robustness compared to its conventional counterpart even against attacks that are tailored to our modifications. Furthermore, we find that the parameters of our modified model have significantly smaller Lipschitz bounds, an important measure correlated with a model's sensitivity to adversarial perturbations.
[ { "created": "Sat, 1 Dec 2018 09:53:50 GMT", "version": "v1" }, { "created": "Fri, 8 Feb 2019 06:36:34 GMT", "version": "v2" }, { "created": "Fri, 6 Mar 2020 15:31:13 GMT", "version": "v3" } ]
2020-03-09
[ [ "Saito", "Sean", "" ], [ "Roy", "Sujoy", "" ] ]
Sat, 1 Dec 2018 09:53:50 GMT
2018-12-01T09:53:50Z
[ "cs", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2012.04177
Motoya Shinozaki
Motoya Shinozaki, Yui Muto, Takahito Kitada, Takashi Nakajima, Matthieu R. Delbecq, Jun Yoneda, Kenta Takeda, Akito Noiri, Takumi Ito, Arne Ludwig, Andreas D. Wieck, Seigo Tarucha, and Tomohiro Otsuka
Gate voltage dependence of noise distribution in radio-frequency reflectometry in gallium arsenide quantum dots
null
Applied Physics Express 14, 035002 (2021)
10.35848/1882-0786/abe41f
null
cond-mat.mes-hall
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate gate voltage dependence of electrical readout noise in high-speed rf reflectometry using gallium arsenide quantum dots. The fast Fourier transform spectrum from the real time measurement reflects build-in device noise and circuit noise including the resonator and the amplifier. We separate their noise spectral components by model analysis. Detail of gate voltage dependence of the flicker noise is investigated and compared to the charge sensor sensitivity. We point out that the dominant component of the readout noise changes by the measurement integration time.
[ { "created": "Tue, 8 Dec 2020 02:40:06 GMT", "version": "v1" }, { "created": "Wed, 9 Dec 2020 02:17:15 GMT", "version": "v2" }, { "created": "Tue, 12 Jan 2021 08:14:24 GMT", "version": "v3" } ]
2021-02-24
[ [ "Shinozaki", "Motoya", "" ], [ "Muto", "Yui", "" ], [ "Kitada", "Takahito", "" ], [ "Nakajima", "Takashi", "" ], [ "Delbecq", "Matthieu R.", "" ], [ "Yoneda", "Jun", "" ], [ "Takeda", "Kenta", "" ], [ "Noiri", "Akito", "" ], [ "Ito", "Takumi", "" ], [ "Ludwig", "Arne", "" ], [ "Wieck", "Andreas D.", "" ], [ "Tarucha", "Seigo", "" ], [ "Otsuka", "Tomohiro", "" ] ]
Tue, 8 Dec 2020 02:40:06 GMT
2020-12-08T02:40:06Z
[ "physics" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1701.00948
Gabriele Fici
Gabriele Fici, Filippo Mignosi, Jeffrey Shallit
Abelian-Square-Rich Words
To appear in Theoretical Computer Science. Corrected a flaw in the proof of Proposition 7
null
10.1016/j.tcs.2017.02.012
null
cs.DM cs.FL math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An abelian square is the concatenation of two words that are anagrams of one another. A word of length $n$ can contain at most $\Theta(n^2)$ distinct factors, and there exist words of length $n$ containing $\Theta(n^2)$ distinct abelian-square factors, that is, distinct factors that are abelian squares. This motivates us to study infinite words such that the number of distinct abelian-square factors of length $n$ grows quadratically with $n$. More precisely, we say that an infinite word $w$ is {\it abelian-square-rich} if, for every $n$, every factor of $w$ of length $n$ contains, on average, a number of distinct abelian-square factors that is quadratic in $n$; and {\it uniformly abelian-square-rich} if every factor of $w$ contains a number of distinct abelian-square factors that is proportional to the square of its length. Of course, if a word is uniformly abelian-square-rich, then it is abelian-square-rich, but we show that the converse is not true in general. We prove that the Thue-Morse word is uniformly abelian-square-rich and that the function counting the number of distinct abelian-square factors of length $2n$ of the Thue-Morse word is $2$-regular. As for Sturmian words, we prove that a Sturmian word $s_{\alpha}$ of angle $\alpha$ is uniformly abelian-square-rich if and only if the irrational $\alpha$ has bounded partial quotients, that is, if and only if $s_{\alpha}$ has bounded exponent.
[ { "created": "Wed, 4 Jan 2017 10:16:30 GMT", "version": "v1" }, { "created": "Mon, 13 Feb 2017 16:02:50 GMT", "version": "v2" }, { "created": "Fri, 24 Feb 2017 17:14:54 GMT", "version": "v3" } ]
2017-02-27
[ [ "Fici", "Gabriele", "" ], [ "Mignosi", "Filippo", "" ], [ "Shallit", "Jeffrey", "" ] ]
Wed, 4 Jan 2017 10:16:30 GMT
2017-01-04T10:16:30Z
[ "cs", "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2001.11151
Anton Braverman
Anton Braverman
Steady-state diffusion approximations of Markov chains: error analysis via the discrete Poisson equation
The paper is extremely bulky and difficult to read. Its contents were separated into two separate papers
null
null
null
math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper uses the generator approach of Stein's method to analyze the gap between steady-state distributions of Markov chains and diffusion processes. Until now, the standard way to invoke Stein's method for this problem was to use the Poisson equation for the diffusion as a starting point. The main technical difficulty with this approach is obtaining bounds on the derivatives of the solution to the Poisson equation, also known as Stein factor bounds. In this paper we propose starting with the discrete Poisson equation of the Markov chain. An important step in our approach is extending the discrete Poisson equation to be defined on the continuum where the diffusion is defined, and we achieve this by using interpolation. Although there are still Stein factor bounds to prove, these now correspond to the finite differences of the discrete Poisson equation solution, as opposed to the derivatives of the solution to the continuous one. Discrete Stein factor bounds can be easier to obtain, for instance when the drift is not everywhere differentiable, when the diffusion has a state-dependent diffusion coefficient, or in the presence of a reflecting boundary condition. We use the join the shortest queue model in the Halfin-Whitt regime as a working example to illustrate the methodology. We show that the steady-state approximation error of the diffusion limit converges to zero at a rate of $1/\sqrt{n}$, where $n$ is the number of servers in the system.
[ { "created": "Thu, 30 Jan 2020 02:21:16 GMT", "version": "v1" }, { "created": "Sun, 9 Feb 2020 04:23:10 GMT", "version": "v2" }, { "created": "Sat, 12 Feb 2022 21:59:53 GMT", "version": "v3" } ]
2022-02-15
[ [ "Braverman", "Anton", "" ] ]
Thu, 30 Jan 2020 02:21:16 GMT
2020-01-30T02:21:16Z
[ "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1611.01553
Vedad Hadzic
Roderick Bloem, Nicolas Braud-Santoni and Vedad Hadzic
QBF Solving by Counterexample-guided Expansion
This is a **very** old version of the paper arXiv:1807.08964 and should be taken down. I did not know you could just replace papers, and did not know whether I could change authors and similar, so that is why I made a different submission. Please take it down
null
null
null
cs.LO cs.AI
http://creativecommons.org/publicdomain/zero/1.0/
We introduce a novel generalization of Counterexample-Guided Inductive Synthesis (CEGIS) and instantiate it to yield a novel, competitive algorithm for solving Quantified Boolean Formulas (QBF). Current QBF solvers based on counterexample-guided expansion use a recursive approach which scales poorly with the number of quantifier alternations. Our generalization of CEGIS removes the need for this recursive approach, and we instantiate it to yield a simple and efficient algorithm for QBF solving. Lastly, this research is supported by a competitive, though straightforward, implementation of the algorithm, making it possible to study the practical impact of our algorithm design decisions, along with various optimizations.
[ { "created": "Fri, 4 Nov 2016 22:08:40 GMT", "version": "v1" }, { "created": "Tue, 8 Nov 2016 15:26:12 GMT", "version": "v2" }, { "created": "Fri, 25 Nov 2016 17:48:36 GMT", "version": "v3" }, { "created": "Fri, 27 Jul 2018 10:16:43 GMT", "version": "v4" } ]
2018-07-30
[ [ "Bloem", "Roderick", "" ], [ "Braud-Santoni", "Nicolas", "" ], [ "Hadzic", "Vedad", "" ] ]
Fri, 4 Nov 2016 22:08:40 GMT
2016-11-04T22:08:40Z
[ "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1912.01790
Abulikemu Abuduweili
Abulikemu Abuduweili and Changliu Liu
Robust Online Model Adaptation by Extended Kalman Filter with Exponential Moving Average and Dynamic Multi-Epoch Strategy
2nd Annual Conference on Learning for Dynamics and Control
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High fidelity behavior prediction of intelligent agents is critical in many applications. However, the prediction model trained on the training set may not generalize to the testing set due to domain shift and time variance. The challenge motivates the adoption of online adaptation algorithms to update prediction models in real-time to improve the prediction performance. Inspired by Extended Kalman Filter (EKF), this paper introduces a series of online adaptation methods, which are applicable to neural network-based models. A base adaptation algorithm Modified EKF with forgetting factor (MEKF$_\lambda$) is introduced first, followed by exponential moving average filtering techniques. Then this paper introduces a dynamic multi-epoch update strategy to effectively utilize samples received in real time. With all these extensions, we propose a robust online adaptation algorithm: MEKF with Exponential Moving Average and Dynamic Multi-Epoch strategy (MEKF$_{\text{EMA-DME}}$). The proposed algorithm outperforms existing methods as demonstrated in experiments. The source code is open-sourced in the following link https://github.com/intelligent-control-lab/MEKF_MAME.
[ { "created": "Wed, 4 Dec 2019 04:16:42 GMT", "version": "v1" }, { "created": "Wed, 18 Dec 2019 08:20:53 GMT", "version": "v2" }, { "created": "Tue, 28 Apr 2020 06:33:43 GMT", "version": "v3" } ]
2020-04-29
[ [ "Abuduweili", "Abulikemu", "" ], [ "Liu", "Changliu", "" ] ]
Wed, 4 Dec 2019 04:16:42 GMT
2019-12-04T04:16:42Z
[ "cs", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Total regio- and diastereocontrol in the aldol reactions of dienolborinates.
null
null
null
null
null
null
It is reported that appropriate dienolborinates can provide access to both diastereomers of 2-(hydroxymethyl)but-3-enoates through exclusive α-regiocontrol in a non-vinylogous pathway. Contrary to previous reports in which dialkylchloroboranes failed to enolize propanoates, acidity-enhanced but-3-enoates readily undergo enolization, offering unprecedented control over the formation of these valuable synthons. The first example of an aldol reaction in the presence of a phosphine-borane adduct is also reported.
null
null
null
null
null
null
pubmed
null
null
null
null
2,013
null
null
null
null
null
null
23,465,070
Organic letters
2010.00577
Michael Sejr Schlichtkrull
Michael Sejr Schlichtkrull, Nicola De Cao, Ivan Titov
Interpreting Graph Neural Networks for NLP With Differentiable Edge Masking
null
null
null
null
cs.CL cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph neural networks (GNNs) have become a popular approach to integrating structural inductive biases into NLP models. However, there has been little work on interpreting them, and specifically on understanding which parts of the graphs (e.g. syntactic trees or co-reference structures) contribute to a prediction. In this work, we introduce a post-hoc method for interpreting the predictions of GNNs which identifies unnecessary edges. Given a trained GNN model, we learn a simple classifier that, for every edge in every layer, predicts if that edge can be dropped. We demonstrate that such a classifier can be trained in a fully differentiable fashion, employing stochastic gates and encouraging sparsity through the expected $L_0$ norm. We use our technique as an attribution method to analyze GNN models for two tasks -- question answering and semantic role labeling -- providing insights into the information flow in these models. We show that we can drop a large proportion of edges without deteriorating the performance of the model, while we can analyse the remaining edges for interpreting model predictions.
[ { "created": "Thu, 1 Oct 2020 17:51:19 GMT", "version": "v1" }, { "created": "Fri, 23 Apr 2021 10:17:42 GMT", "version": "v2" }, { "created": "Mon, 3 Oct 2022 10:22:35 GMT", "version": "v3" } ]
2022-10-04
[ [ "Schlichtkrull", "Michael Sejr", "" ], [ "De Cao", "Nicola", "" ], [ "Titov", "Ivan", "" ] ]
Thu, 1 Oct 2020 17:51:19 GMT
2020-10-01T17:51:19Z
[ "cs", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2002.10631
Pascal Poupart
Amur Ghose, Abdullah Rashwan, Pascal Poupart
Batch norm with entropic regularization turns deterministic autoencoders into generative models
null
Published in the Proceedings of the International Conference on Uncertainty in Artificial Intelligence (UAI), 2020
null
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The variational autoencoder is a well defined deep generative model that utilizes an encoder-decoder framework where an encoding neural network outputs a non-deterministic code for reconstructing an input. The encoder achieves this by sampling from a distribution for every input, instead of outputting a deterministic code per input. The great advantage of this process is that it allows the use of the network as a generative model for sampling from the data distribution beyond provided samples for training. We show in this work that utilizing batch normalization as a source for non-determinism suffices to turn deterministic autoencoders into generative models on par with variational ones, so long as we add a suitable entropic regularization to the training objective.
[ { "created": "Tue, 25 Feb 2020 02:42:18 GMT", "version": "v1" }, { "created": "Wed, 22 Sep 2021 00:51:29 GMT", "version": "v2" } ]
2021-09-23
[ [ "Ghose", "Amur", "" ], [ "Rashwan", "Abdullah", "" ], [ "Poupart", "Pascal", "" ] ]
Tue, 25 Feb 2020 02:42:18 GMT
2020-02-25T02:42:18Z
[ "cs", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2104.14543
Tobias Haug
Tobias Haug, M.S. Kim
Optimal training of variational quantum algorithms without barren plateaus
15 pages, 17 figures
null
null
null
quant-ph cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Variational quantum algorithms (VQAs) promise efficient use of near-term quantum computers. However, training VQAs often requires an extensive amount of time and suffers from the barren plateau problem where the magnitude of the gradients vanishes with increasing number of qubits. Here, we show how to optimally train VQAs for learning quantum states. Parameterized quantum circuits can form Gaussian kernels, which we use to derive adaptive learning rates for gradient ascent. We introduce the generalized quantum natural gradient that features stability and optimized movement in parameter space. Both methods together outperform other optimization routines in training VQAs. Our methods also excel at numerically optimizing driving protocols for quantum control problems. The gradients of the VQA do not vanish when the fidelity between the initial state and the state to be learned is bounded from below. We identify a VQA for quantum simulation with such a constraint that thus can be trained free of barren plateaus. Finally, we propose the application of Gaussian kernels for quantum machine learning.
[ { "created": "Thu, 29 Apr 2021 17:54:59 GMT", "version": "v1" }, { "created": "Wed, 12 May 2021 14:26:13 GMT", "version": "v2" }, { "created": "Wed, 23 Jun 2021 13:34:29 GMT", "version": "v3" } ]
2021-06-24
[ [ "Haug", "Tobias", "" ], [ "Kim", "M. S.", "" ] ]
Thu, 29 Apr 2021 17:54:59 GMT
2021-04-29T17:54:59Z
[ "physics", "stat", "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1702.02568
Morteza Mirafzal
S. Morteza Mirafzal
A note on the automorphism groups of Johnson graphs
Research paper, submitted
null
null
null
math.CO math.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Johnson graph $J(n, i)$ is defined as the graph whose vertex set is the set of all $i$-element subsets of $\{1, . . ., n \}$, and two vertices are adjacent whenever the cardinality of their intersection is equal to $i$-1. In Ramras and Donovan [SIAM J. Discrete Math, 25(1): 267-270, 2011], it is proved that if $ n \neq 2i$, then the automorphism group of $J(n, i)$ is isomorphic with the group $Sym(n)$ and it is conjectured that if $n = 2i$, then the automorphism group of $J(n, i)$ is isomorphic with the group $ Sym(n) \times \mathbb{Z}_2$. In this paper, we will find these results by different methods. We will prove the conjecture in the affirmative.
[ { "created": "Wed, 8 Feb 2017 15:34:12 GMT", "version": "v1" }, { "created": "Wed, 15 Mar 2017 03:44:15 GMT", "version": "v2" }, { "created": "Sun, 30 Apr 2017 08:10:03 GMT", "version": "v3" }, { "created": "Fri, 13 Oct 2017 19:54:14 GMT", "version": "v4" } ]
2017-10-17
[ [ "Mirafzal", "S. Morteza", "" ] ]
Wed, 8 Feb 2017 15:34:12 GMT
2017-02-08T15:34:12Z
[ "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
q-bio/0511005
Hong Qian
Hong Qian (Univ. of Washington) and Daniel A. Beard (Medical Collge of Wisconsin)
Metabolic Futile Cycles and Their Functions: A Systems Analysis of Energy and Control
11 pages, 5 figures
IEE Proceedings - Systems Biology , Vol. 153, pp. 192-200 (2006)
10.1049/ip-syb:20050086
null
q-bio.SC q-bio.MN
null
It has long been hypothesized that futile cycles in cellular metabolism are involved in the regulation of biochemical pathways. Following the work of Newsholme and Crabtree, we develop a quantitative theory for this idea based on open-system thermodynamics and metabolic control analysis. It is shown that the {\it stoichiometric sensitivity} of an intermediary metabolite concentration with respect to changes in steady-state flux is governed by the effective equilibrium constant of the intermediate formation, and the equilibrium can be regulated by a futile cycle. The direction of the shift in the effective equilibrium constant depends on the direction of operation of the futile cycle. High stoichiometric sensitivity corresponds to ultrasensitivity of an intermediate concentration to net flow through a pathway; low stoichiometric sensitivity corresponds to super-robustness of concentration with respect to changes in flux. Both cases potentially play important roles in metabolic regulation. Futile cycles actively shift the effective equilibrium by expending energy; the magnitude of changes in effective equilibria and sensitivities is a function of the amount of energy used by a futile cycle. This proposed mechanism for control by futile cycles works remarkably similarly to kinetic proofreading in biosynthesis. The sensitivity of the system is also intimately related to the rate of concentration fluctuations of intermediate metabolites. The possibly different roles of the two major mechanisms for cellular biochemical regulation, namely reversible chemical modifications via futile cycles and shifting equilibrium by macromolecular binding, are discussed.
[ { "created": "Fri, 4 Nov 2005 07:18:16 GMT", "version": "v1" }, { "created": "Wed, 14 Jun 2006 19:40:10 GMT", "version": "v2" } ]
2007-05-23
[ [ "Qian", "Hong", "", "Univ. of Washington" ], [ "Beard", "Daniel A.", "", "Medical Collge of\n Wisconsin" ] ]
Fri, 4 Nov 2005 07:18:16 GMT
2005-11-04T07:18:16Z
[ "q-bio" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1805.09902
Fabian Kr\"uger
Fabian Kr\"uger and Johanna F. Ziegel
Generic Conditions for Forecast Dominance
null
null
null
null
stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent studies have analyzed whether one forecast method dominates another under a class of consistent scoring functions. While the existing literature focuses on empirical tests of forecast dominance, little is known about the theoretical conditions under which one forecast dominates another. To address this question, we derive a new characterization of dominance among forecasts of the mean functional. We present various scenarios under which dominance occurs. Unlike existing results, our results allow for the case that the forecasts' underlying information sets are not nested, and allow for uncalibrated forecasts that suffer, e.g., from model misspecification or parameter estimation error. We illustrate the empirical relevance of our results via data examples from finance and economics.
[ { "created": "Thu, 24 May 2018 21:13:31 GMT", "version": "v1" }, { "created": "Wed, 19 Sep 2018 08:58:35 GMT", "version": "v2" }, { "created": "Wed, 6 Mar 2019 12:32:13 GMT", "version": "v3" }, { "created": "Wed, 18 Dec 2019 10:38:27 GMT", "version": "v4" } ]
2019-12-19
[ [ "Krüger", "Fabian", "" ], [ "Ziegel", "Johanna F.", "" ] ]
Thu, 24 May 2018 21:13:31 GMT
2018-05-24T21:13:31Z
[ "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Remote ischemic post-conditioning protects against myocardial ischemia/reperfusion injury by inhibiting the Rho-kinase signaling pathway.
null
null
null
null
null
null
The aim of the present study was to observe the effect of Rho-kinase on remote ischemic post-conditioning (RIPostC) and explore the underlying mechanisms. Male Sprague Dawley rats (n=32) were randomly distributed into four groups: Sham group, ischemia/reperfusion (I/R) group, RIPostC group and I/R with fasudil group (I/R+Fas). Infarction size was detected by triphenyltetrazolium chloride staining. The levels of creatine kinase (CK), lactate dehydrogenase (LDH), superoxide dismutase (SOD), malondialdehyde (MDA) and cardiac troponin I (cTnI) were measured using an ultraviolet spectrophotometer. The mRNA expression levels of Rho-associated coiled-coil containing protein kinase (ROCK)-1 and ROCK2, B-cell lymphoma 2 (Bcl-2) and Bcl-2-associated X protein (Bax) were detected via reverse transcription-PCR. The protein expression levels of phosphorylated-myosin phosphatase target subunit (p-MYPT1) and phosphorylated-myosin light chain (p-MLC) were assessed by western blotting. The results demonstrated that RIPostC could decrease the infarct size, the levels of CK, LDH, cTnI and MDA and increase the activity of SOD compared with the I/R group. In addition, the mRNA expression of ROCK1 and ROCK2 was downregulated, the protein expression of p-MYPT1 and p-MLC was decreased, and the ratio of Bcl-2/Bax was elevated in the RIPostC groups compared with the I/R group. Notably, the aforementioned index in I/R with Fas group was similar to the RIPostC group and no significant difference was observed between RIPostC and I/R+Fas. These results revealed that RIPostC could attenuate I/R injury and the underlying mechanisms might be associated with a reduction in myocardial apoptosis and the suppression of the Rho-kinase signaling pathway.
null
null
null
null
null
null
pubmed
null
null
null
null
2,020
null
null
null
null
null
null
31,853,278
Experimental and therapeutic medicine
1003.4028
Michael Kinyon
Joao Araujo and Michael Kinyon
An elegant 3-basis for inverse semigroups
4 pages; v.2: fixed abstract; v.3: final version with minor changes suggested by referee, to appear in Semigroup Forum
Semigroup Forum 82 (2011), no. 2, 319-323
null
null
math.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well known that in every inverse semigroup the binary operation and the unary operation of inversion satisfy the following three identities: [\quad x=(xx')x \qquad \quad (xx')(y'y)=(y'y)(xx') \qquad \quad (xy)z=x(yz"). ] The goal of this note is to prove the converse, that is, we prove that an algebra of type $<2,1>$ satisfying these three identities is an inverse semigroup and the unary operation coincides with the usual inversion on such semigroups.
[ { "created": "Sun, 21 Mar 2010 21:01:20 GMT", "version": "v1" }, { "created": "Tue, 23 Mar 2010 15:45:23 GMT", "version": "v2" }, { "created": "Wed, 28 Jul 2010 22:38:07 GMT", "version": "v3" } ]
2012-10-01
[ [ "Araujo", "Joao", "" ], [ "Kinyon", "Michael", "" ] ]
Sun, 21 Mar 2010 21:01:20 GMT
2010-03-21T21:01:20Z
[ "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Field Experiments of Real Time Foreign News Distribution Powered by {MT}
null
null
null
null
null
null
Field experiments on a foreign news distribution system using two key technologies are reported. The first technology is a summarization component, which is used for generating news headlines. This component is a transformer-based abstractive text summarization system which is trained to output headlines from the leading sentences of news articles. The second technology is machine translation (MT), which enables users to read foreign news articles in their mother language. Since the system uses MT, users can immediately access the latest foreign news. 139 Japanese LINE users participated in the field experiments for two weeks, viewing about 40,000 articles which had been translated from English to Japanese. We carried out surveys both during and after the experiments. According to the results, 79.3{\%} of users evaluated the headlines as adequate, while 74.7{\%} of users evaluated the automatically translated articles as intelligible. According to the post-experiment survey, 59.7{\%} of users wished to continue using the system; 11.5{\%} of users did not. We also report several statistics of the experiments.
null
null
null
null
null
null
acl
inproceedings
yasuda-etal-2021-field
Campbell, Janice and Huyck, Ben and Larocca, Stephen and Marciano, Jay and Savenkov, Konstantin and Yanishevsky, Alex
aug
2,021
Virtual
Association for Machine Translation in the Americas
https://aclanthology.org/2021.mtsummit-up.17/
Yasuda, Keiji and Yamada, Ichiro and Okazaki, Naoaki and Tanaka, Hideki and Asaka, Hidehiro and Anzai, Takeshi and Sugaya, Fumiaki
Proceedings of Machine Translation Summit XVIII: Users and Providers Track
227--232
null
null
null
null
null
{W}e{C}hat Neural Machine Translation Systems for {WMT}20
null
null
null
null
null
null
We participate in the WMT 2020 shared newstranslation task on Chinese{\textrightarrow}English. Our system is based on the Transformer (Vaswaniet al., 2017a) with effective variants and the DTMT (Meng and Zhang, 2019) architecture. In our experiments, we employ data selection, several synthetic data generation approaches (i.e., back-translation, knowledge distillation, and iterative in-domain knowledge transfer), advanced finetuning approaches and self-bleu based model ensemble. Our constrained Chinese{\textrightarrow}English system achieves 36.9 case-sensitive BLEU score, which is thehighest among all submissions.
null
null
null
null
null
null
acl
inproceedings
meng-etal-2020-wechat
Barrault, Lo{\"ic and Bojar, Ond{\v{rej and Bougares, Fethi and Chatterjee, Rajen and Costa-juss{\`a, Marta R. and Federmann, Christian and Fishel, Mark and Fraser, Alexander and Graham, Yvette and Guzman, Paco and Haddow, Barry and Huck, Matthias and Yepes, Antonio Jimeno and Koehn, Philipp and Martins, Andr{\'e and Morishita, Makoto and Monz, Christof and Nagata, Masaaki and Nakazawa, Toshiaki and Negri, Matteo
nov
2,020
Online
Association for Computational Linguistics
https://aclanthology.org/2020.wmt-1.24/
Meng, Fandong and Yan, Jianhao and Liu, Yijin and Gao, Yuan and Zeng, Xianfeng and Zeng, Qinsong and Li, Peng and Chen, Ming and Zhou, Jie and Liu, Sifan and Zhou, Hao
Proceedings of the Fifth Conference on Machine Translation
239--247
null
null
2004.03575
Jos\'e Carcione M
Jose' M. Carcione, Juan E. Santos, Claudio Bagaini, Jing Ba
A simulation of a COVID-19 epidemic based on a deterministic SEIR model
null
null
null
null
q-bio.PE physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An epidemic disease caused by a new coronavirus has spread in Northern Italy with a strong contagion rate. We implement an SEIR model to compute the infected population and number of casualties of this epidemic. The example may ideally regard the situation in the Italian Region of Lombardy, where the epidemic started on February 25. We calibrate the model with the number of dead individuals to date (May 5, 2020) and constraint the parameters on the basis of values reported in the literature. The peak occurs at day 37 (March 31) approximately, when there is a rapid decrease, with a reproduction ratio R0 = 3 initially, 1.36 at day 22 and 0.8 after day 35, indicating different degrees of lockdown. The predicted death toll is approximately 15600 casualties, with 2.7 million infected individuals at the end of the epidemic. The incubation period providing a better fit of the dead individuals is 4.25 days and the infection period is 4 days, with a fatality rate of 0.00144/day [values based on the reported (official) number of casualties]. The infection fatality rate (IFR) is 0.57 %, and 2.36 % if twice the reported number of casualties is assumed. However, these rates depend on the initially exposed individuals. If approximately nine times more individuals are exposed, there are three times more infected people at the end of the epidemic and IFR = 0.47 %. If we relax these constraints and use a wider range of lower and upper bounds for the incubation and infection periods, we observe that a higher incubation period (13 versus 4.25 days) gives the same IFR (0.6 versus 0.57 %), but nine times more exposed individuals in the first case. Therefore, a precise determination of the fatality rate is subject to the knowledge of the characteristics of the epidemic.
[ { "created": "Tue, 7 Apr 2020 17:54:33 GMT", "version": "v1" }, { "created": "Sun, 10 May 2020 09:18:19 GMT", "version": "v10" }, { "created": "Wed, 8 Apr 2020 09:03:36 GMT", "version": "v2" }, { "created": "Sat, 11 Apr 2020 08:03:24 GMT", "version": "v3" }, { "created": "Tue, 14 Apr 2020 09:17:58 GMT", "version": "v4" }, { "created": "Wed, 15 Apr 2020 17:25:46 GMT", "version": "v5" }, { "created": "Sun, 19 Apr 2020 14:29:37 GMT", "version": "v6" }, { "created": "Fri, 24 Apr 2020 12:49:50 GMT", "version": "v7" }, { "created": "Wed, 29 Apr 2020 08:01:37 GMT", "version": "v8" }, { "created": "Tue, 5 May 2020 17:07:02 GMT", "version": "v9" } ]
2020-05-12
[ [ "Carcione", "Jose' M.", "" ], [ "Santos", "Juan E.", "" ], [ "Bagaini", "Claudio", "" ], [ "Ba", "Jing", "" ] ]
Tue, 7 Apr 2020 17:54:33 GMT
2020-04-07T17:54:33Z
[ "q-bio", "physics" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1807.02154
Adam Van Tuyl
Federico Galetto, Johannes Hofscheier, Graham Keiper, Craig Kohne, Miguel Eduardo Uribe Paczka, Adam Van Tuyl
Betti numbers of toric ideals of graphs: A case study
12 pages; revised and corrected; to appear in Journal of Algebra and its Applications
J. Algebra Appl. 18 (2019), no. 12, 1950226, 14 pp
10.1142/S0219498819502268
null
math.AC math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We compute the graded Betti numbers for the toric ideal of a family of graphs constructed by adjoining a cycle to a complete bipartite graph. The key observation is that this family admits an initial ideal which has linear quotients. As a corollary, we compute the Hilbert series and $h$-vector for all the toric ideals of graphs in this family.
[ { "created": "Thu, 5 Jul 2018 19:03:54 GMT", "version": "v1" }, { "created": "Mon, 19 Nov 2018 17:28:21 GMT", "version": "v2" } ]
2019-11-12
[ [ "Galetto", "Federico", "" ], [ "Hofscheier", "Johannes", "" ], [ "Keiper", "Graham", "" ], [ "Kohne", "Craig", "" ], [ "Paczka", "Miguel Eduardo Uribe", "" ], [ "Van Tuyl", "Adam", "" ] ]
Thu, 5 Jul 2018 19:03:54 GMT
2018-07-05T19:03:54Z
[ "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2002.12776
Radu Grosu
Radu Grosu
ResNets, NeuralODEs and CT-RNNs are Particular Neural Regulatory Networks
9 pages, 4 figures
null
null
null
q-bio.NC cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper shows that ResNets, NeuralODEs, and CT-RNNs, are particular neural regulatory networks (NRNs), a biophysical model for the nonspiking neurons encountered in small species, such as the C.elegans nematode, and in the retina of large species. Compared to ResNets, NeuralODEs and CT-RNNs, NRNs have an additional multiplicative term in their synaptic computation, allowing them to adapt to each particular input. This additional flexibility makes NRNs $M$ times more succinct than NeuralODEs and CT-RNNs, where $M$ is proportional to the size of the training set. Moreover, as NeuralODEs and CT-RNNs are $N$ times more succinct than ResNets, where $N$ is the number of integration steps required to compute the output $F(x)$ for a given input $x$, NRNs are in total $M\,{\cdot}\,N$ more succinct than ResNets. For a given approximation task, this considerable succinctness allows to learn a very small and therefore understandable NRN, whose behavior can be explained in terms of well established architectural motifs, that NRNs share with gene regulatory networks, such as, activation, inhibition, sequentialization, mutual exclusion, and synchronization. To the best of our knowledge, this paper unifies for the first time the mainstream work on deep neural networks with the one in biology and neuroscience in a quantitative fashion.
[ { "created": "Wed, 26 Feb 2020 18:33:20 GMT", "version": "v1" }, { "created": "Tue, 3 Mar 2020 13:05:48 GMT", "version": "v2" }, { "created": "Thu, 19 Mar 2020 07:20:12 GMT", "version": "v3" } ]
2020-03-20
[ [ "Grosu", "Radu", "" ] ]
Wed, 26 Feb 2020 18:33:20 GMT
2020-02-26T18:33:20Z
[ "q-bio", "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2002.04326
Weihao Yu
Weihao Yu, Zihang Jiang, Yanfei Dong, Jiashi Feng
ReClor: A Reading Comprehension Dataset Requiring Logical Reasoning
ICLR 2020 paper. Project page: http://whyu.me/reclor/
null
null
null
cs.CL cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent powerful pre-trained language models have achieved remarkable performance on most of the popular datasets for reading comprehension. It is time to introduce more challenging datasets to push the development of this field towards more comprehensive reasoning of text. In this paper, we introduce a new Reading Comprehension dataset requiring logical reasoning (ReClor) extracted from standardized graduate admission examinations. As earlier studies suggest, human-annotated datasets usually contain biases, which are often exploited by models to achieve high accuracy without truly understanding the text. In order to comprehensively evaluate the logical reasoning ability of models on ReClor, we propose to identify biased data points and separate them into EASY set while the rest as HARD set. Empirical results show that state-of-the-art models have an outstanding ability to capture biases contained in the dataset with high accuracy on EASY set. However, they struggle on HARD set with poor performance near that of random guess, indicating more research is needed to essentially enhance the logical reasoning ability of current models.
[ { "created": "Tue, 11 Feb 2020 11:54:29 GMT", "version": "v1" }, { "created": "Mon, 4 May 2020 09:23:26 GMT", "version": "v2" }, { "created": "Sat, 22 Aug 2020 07:14:30 GMT", "version": "v3" } ]
2020-08-25
[ [ "Yu", "Weihao", "" ], [ "Jiang", "Zihang", "" ], [ "Dong", "Yanfei", "" ], [ "Feng", "Jiashi", "" ] ]
Tue, 11 Feb 2020 11:54:29 GMT
2020-02-11T11:54:29Z
[ "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1311.5553
Ruben Fossion
Ruben Fossion, Gamaliel Torres Vargas and Juan Carlos L\'opez Vieyra
Random Matrix Spectra as a Time Series
Phys. Rev. E (Rapid Communication) [http://pre.aps.org/accepted/ca072R0eWe4Ebf1410bf6d37595695d4a4c8cd76f] Accepted for publication, Wednesday Nov 20, 2013
Phys. Rev. E 88, 060902(R) (2013) [4 pages]
10.1103/PhysRevE.88.060902
null
nlin.CD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectra of ordered eigenvalues of finite Random Matrices are interpreted as a time series. Dataadaptive techniques from signal analysis are applied to decompose the spectrum in clearly differentiated trend and fluctuation modes, avoiding possible artifacts introduced by standard unfolding techniques. The fluctuation modes are scale invariant and follow different power laws for Poisson and Gaussian ensembles, which already during the unfolding allows to distinguish the two cases.
[ { "created": "Thu, 21 Nov 2013 20:48:34 GMT", "version": "v1" }, { "created": "Sat, 23 Nov 2013 16:05:36 GMT", "version": "v2" } ]
2013-12-12
[ [ "Fossion", "Ruben", "" ], [ "Vargas", "Gamaliel Torres", "" ], [ "Vieyra", "Juan Carlos López", "" ] ]
Thu, 21 Nov 2013 20:48:34 GMT
2013-11-21T20:48:34Z
[ "nlin" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1611.04281
Johannes Berg
Johannes Berg
Statistical mechanics of the inverse Ising problem and the optimal objective function
16 pages
null
10.1088/1742-5468/aa7df6
null
cond-mat.dis-nn q-bio.QM stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The inverse Ising problem seeks to reconstruct the parameters of an Ising Hamiltonian on the basis of spin configurations sampled from the Boltzmann measure. Over the last decade, many applications of the inverse Ising problem have arisen, driven by the advent of large-scale data across different scientific disciplines. Recently, strategies to solve the inverse Ising problem based on convex optimisation have proven to be very successful. These approaches maximise particular objective functions with respect to the model parameters. Examples are the pseudolikelihood method and interaction screening. In this paper, we establish a link between approaches to the inverse Ising problem based on convex optimisation and the statistical physics of disordered systems. We characterise the performance of an arbitrary objective function and calculate the objective function which optimally reconstructs the model parameters. We evaluate the optimal objective function within a replica-symmetric ansatz and compare the results of the optimal objective function with other reconstruction methods. Apart from giving a theoretical underpinning to solving the inverse Ising problem by convex optimisation, the optimal objective function outperforms state-of-the-art methods, albeit by a small margin.
[ { "created": "Mon, 14 Nov 2016 08:30:47 GMT", "version": "v1" }, { "created": "Tue, 31 Jan 2017 07:43:13 GMT", "version": "v2" }, { "created": "Wed, 31 May 2017 13:37:28 GMT", "version": "v3" }, { "created": "Fri, 30 Jun 2017 07:31:10 GMT", "version": "v4" } ]
2017-09-13
[ [ "Berg", "Johannes", "" ] ]
Mon, 14 Nov 2016 08:30:47 GMT
2016-11-14T08:30:47Z
[ "q-bio", "physics", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Flow-induced shift of the Donnan equilibrium for ultra-sensitive mass transport measurement through a single nanochannel.
null
null
null
null
null
null
Despite mass flow being arguably the most elementary transport associated with nanofluidics, its measurement still constitutes a significant bottleneck for the development of this promising field. Here, we investigate how a liquid flow perturbs the ubiquitous enrichment-or depletion-of a solute inside a single nanochannel. Using fluorescence correlation spectroscopy to access the local solute concentration, we demonstrate that the initial enrichment-the so-called Donnan equilibrium-is depleted under flow, thus revealing the underlying mass transport. Combining theoretical and numerical calculations beyond the classical 1D treatment of nanochannels, we rationalize quantitatively our observations and demonstrate unprecedented flow rate sensitivity. Because the present mass transport investigations are based on generic effects, we believe that they can develop into a versatile approach for nanofluidics.
null
null
null
null
null
null
pubmed
null
null
null
null
2,019
null
null
null
null
null
null
31,893,893
The Journal of chemical physics
null
null
null
Listening Comprehension over Argumentative Content
null
null
null
null
null
null
This paper presents a task for machine listening comprehension in the argumentation domain and a corresponding dataset in English. We recorded 200 spontaneous speeches arguing for or against 50 controversial topics. For each speech, we formulated a question, aimed at confirming or rejecting the occurrence of potential arguments in the speech. Labels were collected by listening to the speech and marking which arguments were mentioned by the speaker. We applied baseline methods addressing the task, to be used as a benchmark for future work over this dataset. All data used in this work is freely available for research.
null
null
null
null
null
null
acl
inproceedings
mirkin-etal-2018-listening
Riloff, Ellen and Chiang, David and Hockenmaier, Julia and Tsujii, Jun{'}ichi
oct # "-" # nov
2,018
Brussels, Belgium
Association for Computational Linguistics
https://aclanthology.org/D18-1078/
Mirkin, Shachar and Moshkowich, Guy and Orbach, Matan and Kotlerman, Lili and Kantor, Yoav and Lavee, Tamar and Jacovi, Michal and Bilu, Yonatan and Aharonov, Ranit and Slonim, Noam
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing
719--724
null
null
null
null
null
{D}e{C}our: a corpus of {DE}ceptive statements in {I}talian {COUR}ts
null
null
null
null
null
null
In criminal proceedings, sometimes it is not easy to evaluate the sincerity of oral testimonies. DECOUR - DEception in COURt corpus - has been built with the aim of training models suitable to discriminate, from a stylometric point of view, between sincere and deceptive statements. DECOUR is a collection of hearings held in four Italian Courts, in which the speakers lie in front of the judge. These hearings become the object of a specific criminal proceeding for calumny or false testimony, in which the deceptiveness of the statements of the defendant is ascertained. Thanks to the final Court judgment, that points out which lies are told, each utterance of the corpus has been annotated as true, uncertain or false, according to its degree of truthfulness. Since the judgment of deceptiveness follows a judicial inquiry, the annotation has been realized with a greater degree of confidence than ever before. Moreover, in Italy this is the first corpus of deceptive texts not relying on ‘mock' lies created in laboratory conditions, but which has been collected in a natural environment.
null
null
null
null
null
null
acl
inproceedings
fornaciari-poesio-2012-decour
Calzolari, Nicoletta and Choukri, Khalid and Declerck, Thierry and Do{\u{g}}an, Mehmet U{\u{g}}ur and Maegaard, Bente and Mariani, Joseph and Moreno, Asuncion and Odijk, Jan and Piperidis, Stelios
may
2,012
Istanbul, Turkey
European Language Resources Association (ELRA)
https://aclanthology.org/L12-1188/
Fornaciari, Tommaso and Poesio, Massimo
Proceedings of the Eighth International Conference on Language Resources and Evaluation ({LREC}`12)
1585--1590
null
null
1205.2123
Karthik Bharath
Karthik Bharath, Vladimir Pozdnyakov and Dipak K Dey
Asymptotics of a Clustering Criterion for Smooth Distributions
null
Electronic Journal of Statistics, Vol 7 . 1078-1093 , 2013
10.1214/13-EJS801
null
math.ST math.PR stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a clustering framework for observations from a population with a smooth probability distribution function and derive its asymptotic properties. A clustering criterion based on a linear combination of order statistics is proposed. The asymptotic behavior of the point at which the observations are split into two clusters is examined. The results obtained can then be utilized to construct an interval estimate of the point which splits the data and develop tests for bimodality and presence of clusters.
[ { "created": "Wed, 9 May 2012 23:41:41 GMT", "version": "v1" }, { "created": "Thu, 4 Oct 2012 15:45:13 GMT", "version": "v2" }, { "created": "Mon, 1 Apr 2013 18:41:46 GMT", "version": "v3" } ]
2013-04-16
[ [ "Bharath", "Karthik", "" ], [ "Pozdnyakov", "Vladimir", "" ], [ "Dey", "Dipak K", "" ] ]
Wed, 9 May 2012 23:41:41 GMT
2012-05-09T23:41:41Z
[ "math", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1911.11943
Choi Sungik
Sungik Choi, Sae-Young Chung
Novelty Detection Via Blurring
ICLR 2020
null
null
null
cs.LG cs.CV eess.IV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conventional out-of-distribution (OOD) detection schemes based on variational autoencoder or Random Network Distillation (RND) have been observed to assign lower uncertainty to the OOD than the target distribution. In this work, we discover that such conventional novelty detection schemes are also vulnerable to the blurred images. Based on the observation, we construct a novel RND-based OOD detector, SVD-RND, that utilizes blurred images during training. Our detector is simple, efficient at test time, and outperforms baseline OOD detectors in various domains. Further results show that SVD-RND learns better target distribution representation than the baseline RND algorithm. Finally, SVD-RND combined with geometric transform achieves near-perfect detection accuracy on the CelebA dataset.
[ { "created": "Wed, 27 Nov 2019 04:10:18 GMT", "version": "v1" }, { "created": "Tue, 7 Jan 2020 07:36:13 GMT", "version": "v2" }, { "created": "Tue, 3 Mar 2020 06:39:00 GMT", "version": "v3" } ]
2020-03-04
[ [ "Choi", "Sungik", "" ], [ "Chung", "Sae-Young", "" ] ]
Wed, 27 Nov 2019 04:10:18 GMT
2019-11-27T04:10:18Z
[ "cs", "eess", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1810.00055
Vanessa Sih
Michael Macmahon, Joseph R. Iafrate, Michael J. Dominguez, and Vanessa Sih
Observation of magnetic-field-sweep-direction-dependent dynamic nuclear polarization under periodic optical electron spin pumping
11 pages, 9 figures
Phys. Rev. B 99, 075201 (2019)
10.1103/PhysRevB.99.075201
null
cond-mat.mes-hall
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Optical pump-probe techniques are used to generate and measure electron spin polarization in a gallium arsenide epilayer in which the electron spin coherence time exceeds the mode-locked laser repetition period. Resonant spin amplification occurs at magnetic fields at which the electron spin polarization excited by successive laser pulses add constructively. Measurements of Kerr rotation as a function of applied magnetic field reveal nuclear spin polarization that aligns either with or against the external magnetic field depending on whether the applied magnetic field is being decreased or increased. Furthermore, the nuclear spin polarization magnitude varies in proportion to the perpendicular net electron spin polarization as the latter changes due to resonant spin amplification and other causes. We also report an experimental technique that reveals a minutes-long memory of precise field history in the electron-nuclear spin system.
[ { "created": "Fri, 28 Sep 2018 19:43:52 GMT", "version": "v1" }, { "created": "Thu, 10 Sep 2020 18:13:49 GMT", "version": "v2" } ]
2020-09-14
[ [ "Macmahon", "Michael", "" ], [ "Iafrate", "Joseph R.", "" ], [ "Dominguez", "Michael J.", "" ], [ "Sih", "Vanessa", "" ] ]
Fri, 28 Sep 2018 19:43:52 GMT
2018-09-28T19:43:52Z
[ "physics" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Computational Complexity of Natural Languages: A Reasoned Overview
null
null
null
null
null
null
There has been an upsurge of research interest in natural language complexity. As this interest will benefit from being informed by established contributions in this area, this paper presents a reasoned overview of central results concerning the computational complexity of natural language parsing. This overview also seeks to help to understand why, contrary to recent and widespread assumptions, it is by no means sufficient that an agent handles sequences of items under a pattern $a^n b^n$ or under a pattern $a^n b^m c^n d^m$ to ascertain ipso facto that this is the result of at least an underlying context-free grammar or an underlying context-sensitive grammar, respectively. In addition, it seeks to help to understand why it is also not sufficient that an agent handles sequences of items under a pattern $a^n b^n$ for it to be deemed as having a cognitive capacity of higher computational complexity.
null
null
null
null
null
null
acl
inproceedings
branco-2018-computational
Becerra-Bonache, Leonor and Jim{\'e}nez-L{\'o}pez, M. Dolores and Mart{\'i}n-Vide, Carlos and Torrens-Urrutia, Adri{\`a}
aug
2,018
Santa Fe, New-Mexico
Association for Computational Linguistics
https://aclanthology.org/W18-4602/
Branco, Ant{\'o}nio
Proceedings of the Workshop on Linguistic Complexity and Natural Language Processing
10--19
null
null
2006.03226
Yujie Wu
Yujie Wu, Rong Zhao, Jun Zhu, Feng Chen, Mingkun Xu, Guoqi Li, Sen Song, Lei Deng, Guanrui Wang, Hao Zheng, Jing Pei, Youhui Zhang, Mingguo Zhao, and Luping Shi
Brain-inspired global-local learning incorporated with neuromorphic computing
5 figures, 6 tables
null
null
null
cs.NE cs.AI q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two main routes of learning methods exist at present including error-driven global learning and neuroscience-oriented local learning. Integrating them into one network may provide complementary learning capabilities for versatile learning scenarios. At the same time, neuromorphic computing holds great promise, but still needs plenty of useful algorithms and algorithm-hardware co-designs for exploiting the advantages. Here, we report a neuromorphic hybrid learning model by introducing a brain-inspired meta-learning paradigm and a differentiable spiking model incorporating neuronal dynamics and synaptic plasticity. It can meta-learn local plasticity and receive top-down supervision information for multiscale synergic learning. We demonstrate the advantages of this model in multiple different tasks, including few-shot learning, continual learning, and fault-tolerance learning in neuromorphic vision sensors. It achieves significantly higher performance than single-learning methods, and shows promise in empowering neuromorphic applications revolution. We further implemented the hybrid model in the Tianjic neuromorphic platform by exploiting algorithm-hardware co-designs and proved that the model can fully utilize neuromorphic many-core architecture to develop hybrid computation paradigm.
[ { "created": "Fri, 5 Jun 2020 04:24:19 GMT", "version": "v1" }, { "created": "Thu, 3 Sep 2020 12:01:40 GMT", "version": "v2" }, { "created": "Tue, 22 Jun 2021 01:15:53 GMT", "version": "v3" } ]
2021-06-23
[ [ "Wu", "Yujie", "" ], [ "Zhao", "Rong", "" ], [ "Zhu", "Jun", "" ], [ "Chen", "Feng", "" ], [ "Xu", "Mingkun", "" ], [ "Li", "Guoqi", "" ], [ "Song", "Sen", "" ], [ "Deng", "Lei", "" ], [ "Wang", "Guanrui", "" ], [ "Zheng", "Hao", "" ], [ "Pei", "Jing", "" ], [ "Zhang", "Youhui", "" ], [ "Zhao", "Mingguo", "" ], [ "Shi", "Luping", "" ] ]
Fri, 5 Jun 2020 04:24:19 GMT
2020-06-05T04:24:19Z
[ "q-bio", "cs" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1609.04319
Jin Dai
Jin Dai, Fei Ding, Sergey I. Bozhevolnyi, and Min Yan
Ultra-Broadband Super-Planckian Radiative Heat Transfer with Artificial Continuum Cavity States in Patterned Hyperbolic Metamaterial
14 pages, 5 figures
Phys. Rev. B 95, 245405 (2017)
10.1103/PhysRevB.95.245405
null
physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Localized cavity resonances due to nanostructures at material surfaces can greatly enhance radiative heat transfer (RHT) between two closely placed bodies owing to stretching of cavity states in momentum space beyond light line. Based on such understanding, we numerically demonstrate the possibility of ultra-broadband super-Planckian RHT between two plates patterned with trapezoidal-shaped hyperbolic metamaterial (HMM) arrays. The phenomenon is rooted not only in HMM's high effective index for creating sub-wavelength resonators, but also its extremely anisotropic isofrequency contour. The two properties enable one to create photonic bands with a high spectral density to populate a desired thermal radiation window. At sub-micron gap sizes between such two plates, the artificial continuum states extend outside light cone, tremendously increasing overall RHT. Our study reveals that structured HMM offers unprecedented potential in achieving a controllable super-Planckian radiative heat transfer for thermal management at nanoscale.
[ { "created": "Wed, 14 Sep 2016 15:46:06 GMT", "version": "v1" }, { "created": "Fri, 31 Mar 2017 16:03:21 GMT", "version": "v2" } ]
2017-06-14
[ [ "Dai", "Jin", "" ], [ "Ding", "Fei", "" ], [ "Bozhevolnyi", "Sergey I.", "" ], [ "Yan", "Min", "" ] ]
Wed, 14 Sep 2016 15:46:06 GMT
2016-09-14T15:46:06Z
[ "physics" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
2010.14556
Jeremy Budd
Jeremy Budd, Yves van Gennip, and Jonas Latz
Classification and image processing with a semi-discrete scheme for fidelity forced Allen--Cahn on graphs
41 pages, 17 figures
GAMM-Mitteilungen. 2021; 44:e202100004
10.1002/gamm.202100004
null
math.NA cs.NA math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a semi-discrete implicit Euler (SDIE) scheme for the Allen-Cahn equation (ACE) with fidelity forcing on graphs. Bertozzi and Flenner (2012) pioneered the use of this differential equation as a method for graph classification problems, such as semi-supervised learning and image segmentation. In Merkurjev, Kosti\'c, and Bertozzi (2013), a Merriman-Bence-Osher (MBO) scheme with fidelity forcing was used instead, as the MBO scheme is heuristically similar to the ACE. This paper rigorously establishes the graph MBO scheme with fidelity forcing as a special case of an SDIE scheme for the graph ACE with fidelity forcing. This connection requires using the double-obstacle potential in the ACE, as was shown in Budd and Van Gennip (2020) for ACE without fidelity forcing. We also prove that solutions of the SDIE scheme converge to solutions of the graph ACE with fidelity forcing as the SDIE time step tends to zero. Next, we develop the SDIE scheme as a classification algorithm. We also introduce some innovations into the algorithms for the SDIE and MBO schemes. For large graphs, we use a QR decomposition method to compute an eigendecomposition from a Nystr\"om extension, which outperforms the method used in e.g. Bertozzi and Flenner (2012) in accuracy, stability, and speed. Moreover, we replace the Euler discretisation for the scheme's diffusion step by a computation based on the Strang formula for matrix exponentials. We apply this algorithm to a number of image segmentation problems, and compare the performance of the SDIE and MBO schemes. We find that whilst the general SDIE scheme does not perform better than the MBO special case at this task, our other innovations lead to a significantly better segmentation than that from previous literature. We also empirically quantify the uncertainty that this segmentation inherits from the randomness in the Nystr\"om extension.
[ { "created": "Tue, 27 Oct 2020 18:53:54 GMT", "version": "v1" }, { "created": "Sat, 28 Nov 2020 16:20:01 GMT", "version": "v2" } ]
2021-04-08
[ [ "Budd", "Jeremy", "" ], [ "van Gennip", "Yves", "" ], [ "Latz", "Jonas", "" ] ]
Tue, 27 Oct 2020 18:53:54 GMT
2020-10-27T18:53:54Z
[ "cs", "math" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null
1305.5270
Marc Hoffmann
Marc Hoffmann, Judith Rousseau, Johannes Schmidt-Hieber
On adaptive posterior concentration rates
Published at http://dx.doi.org/10.1214/15-AOS1341 in the Annals of Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Statistics 2015, Vol. 43, No. 5, 2259-2295
10.1214/15-AOS1341
IMS-AOS-AOS1341
math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the problem of deriving posterior concentration rates under different loss functions in nonparametric Bayes. We first provide a lower bound on posterior coverages of shrinking neighbourhoods that relates the metric or loss under which the shrinking neighbourhood is considered, and an intrinsic pre-metric linked to frequentist separation rates. In the Gaussian white noise model, we construct feasible priors based on a spike and slab procedure reminiscent of wavelet thresholding that achieve adaptive rates of contraction under $L^2$ or $L^{\infty}$ metrics when the underlying parameter belongs to a collection of H\"{o}lder balls and that moreover achieve our lower bound. We analyse the consequences in terms of asymptotic behaviour of posterior credible balls as well as frequentist minimax adaptive estimation. Our results are appended with an upper bound for the contraction rate under an arbitrary loss in a generic regular experiment. The upper bound is attained for certain sieve priors and enables to extend our results to density estimation.
[ { "created": "Wed, 22 May 2013 21:11:41 GMT", "version": "v1" }, { "created": "Fri, 24 Apr 2015 14:59:12 GMT", "version": "v2" }, { "created": "Thu, 5 Nov 2015 06:49:57 GMT", "version": "v3" } ]
2015-11-06
[ [ "Hoffmann", "Marc", "" ], [ "Rousseau", "Judith", "" ], [ "Schmidt-Hieber", "Johannes", "" ] ]
Wed, 22 May 2013 21:11:41 GMT
2013-05-22T21:11:41Z
[ "math", "stat" ]
arxiv
null
null
null
null
null
null
null
null
null
null
null
null
null