id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2504.16268 | Abdesslem Layeb | Abdesslem Layeb | Boosting Classifier Performance with Opposition-Based Data
Transformation | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | In this paper, we introduce a novel data transformation framework based on
Opposition-Based Learning (OBL) to boost the performance of traditional
classification algorithms. Originally developed to accelerate convergence in
optimization tasks, OBL is leveraged here to generate synthetic opposite
samples that replace the acutely training data and improve decision boundary
formation. We explore three OBL variants; Global OBL, Class-Wise OBL, and
Localized Class-Wise OBL; and integrate them with several widely used
classifiers, including K-Nearest Neighbors (KNN), Support Vector Machines
(SVM), Logistic Regression (LR), and Decision Tree (DT). Extensive experiments
conducted on 26 heterogeneous and high-dimensional datasets demonstrate that
OBL-enhanced classifiers consistently outperform their standard counterparts in
terms of accuracy and F1-score, frequently achieving near-perfect or perfect
classification. Furthermore, OBL contributes to improved computational
efficiency, particularly in SVM and LR. These findings underscore the potential
of OBL as a lightweight yet powerful data transformation strategy for enhancing
classification performance, especially in complex or sparse learning
environments.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:03:31 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Layeb",
"Abdesslem",
""
]
] |
2504.16269 | Ye Qiao | Ye Qiao, Zhiheng Cheng, Yian Wang, Yifan Zhang, Yunzhe Deng, Sitao
Huang | COBRA: Algorithm-Architecture Co-optimized Binary Transformer
Accelerator for Edge Inference | null | null | null | null | cs.AR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Transformer-based models have demonstrated superior performance in various
fields, including natural language processing and computer vision. However,
their enormous model size and high demands in computation, memory, and
communication limit their deployment to edge platforms for local, secure
inference. Binary transformers offer a compact, low-complexity solution for
edge deployment with reduced bandwidth needs and acceptable accuracy. However,
existing binary transformers perform inefficiently on current hardware due to
the lack of binary specific optimizations. To address this, we introduce COBRA,
an algorithm-architecture co-optimized binary Transformer accelerator for edge
computing. COBRA features a real 1-bit binary multiplication unit, enabling
matrix operations with -1, 0, and +1 values, surpassing ternary methods. With
further hardware-friendly optimizations in the attention block, COBRA achieves
up to 3,894.7 GOPS throughput and 448.7 GOPS/Watt energy efficiency on edge
FPGAs, delivering a 311x energy efficiency improvement over GPUs and a 3.5x
throughput improvement over the state-of-the-art binary accelerator, with only
negligible inference accuracy degradation.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:03:43 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Qiao",
"Ye",
""
],
[
"Cheng",
"Zhiheng",
""
],
[
"Wang",
"Yian",
""
],
[
"Zhang",
"Yifan",
""
],
[
"Deng",
"Yunzhe",
""
],
[
"Huang",
"Sitao",
""
]
] |
2504.16270 | Naren Manoj | Naren Sarayu Manoj | A Geometric Approach to Problems in Optimization and Data Science | PhD dissertation | null | null | null | math.OC cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give new results for problems in computational and statistical machine
learning using tools from high-dimensional geometry and probability.
We break up our treatment into two parts. In Part I, we focus on
computational considerations in optimization. Specifically, we give new
algorithms for approximating convex polytopes in a stream, sparsification and
robust least squares regression, and dueling optimization.
In Part II, we give new statistical guarantees for data science problems. In
particular, we formulate a new model in which we analyze statistical properties
of backdoor data poisoning attacks, and we study the robustness of graph
clustering algorithms to ``helpful'' misspecification.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:06:41 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Manoj",
"Naren Sarayu",
""
]
] |
2504.16271 | Elisa Bassignana | Frederik Bredgaard and Martin Lund Trinhammer and Elisa Bassignana | The Language of Attachment: Modeling Attachment Dynamics in
Psychotherapy | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The delivery of mental healthcare through psychotherapy stands to benefit
immensely from developments within Natural Language Processing (NLP), in
particular through the automatic identification of patient specific qualities,
such as attachment style. Currently, the assessment of attachment style is
performed manually using the Patient Attachment Coding System (PACS; Talia et
al., 2017), which is complex, resource-consuming and requires extensive
training. To enable wide and scalable adoption of attachment informed treatment
and research, we propose the first exploratory analysis into automatically
assessing patient attachment style from psychotherapy transcripts using NLP
classification models. We further analyze the results and discuss the
implications of using automated tools for this purpose -- e.g., confusing
`preoccupied' patients with `avoidant' likely has a more negative impact on
therapy outcomes with respect to other mislabeling. Our work opens an avenue of
research enabling more personalized psychotherapy and more targeted research
into the mechanisms of psychotherapy through advancements in NLP.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:07:44 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Bredgaard",
"Frederik",
""
],
[
"Trinhammer",
"Martin Lund",
""
],
[
"Bassignana",
"Elisa",
""
]
] |
2504.16272 | Ryan Koo | Ryan Koo, Ian Yang, Vipul Raheja, Mingyi Hong, Kwang-Sung Jun,
Dongyeop Kang | Learning Explainable Dense Reward Shapes via Bayesian Optimization | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Current reinforcement learning from human feedback (RLHF) pipelines for large
language model (LLM) alignment typically assign scalar rewards to sequences,
using the final token as a surrogate indicator for the quality of the entire
sequence. However, this leads to sparse feedback and suboptimal token-level
credit assignment. In this work, we frame reward shaping as an optimization
problem focused on token-level credit assignment. We propose a reward-shaping
function leveraging explainability methods such as SHAP and LIME to estimate
per-token rewards from the reward model. To learn parameters of this shaping
function, we employ a bilevel optimization framework that integrates Bayesian
Optimization and policy training to handle noise from the token reward
estimates. Our experiments show that achieving a better balance of token-level
reward attribution leads to performance improvements over baselines on
downstream tasks and finds an optimal policy faster during training.
Furthermore, we show theoretically that explainability methods that are feature
additive attribution functions maintain the optimal policy as the original
reward.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:09:33 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Koo",
"Ryan",
""
],
[
"Yang",
"Ian",
""
],
[
"Raheja",
"Vipul",
""
],
[
"Hong",
"Mingyi",
""
],
[
"Jun",
"Kwang-Sung",
""
],
[
"Kang",
"Dongyeop",
""
]
] |
2504.16273 | Joseph Lee | Joseph Lee, Tianqi Shang, Jae Young Baik, Duy Duong-Tran, Shu Yang,
Lingyao Li, Li Shen | Investigating LLMs in Clinical Triage: Promising Capabilities,
Persistent Intersectional Biases | Accepted to GenAI4Health Workshop @ AAAI 2025 | null | null | null | cs.AI cs.HC | http://creativecommons.org/licenses/by/4.0/ | Large Language Models (LLMs) have shown promise in clinical decision support,
yet their application to triage remains underexplored. We systematically
investigate the capabilities of LLMs in emergency department triage through two
key dimensions: (1) robustness to distribution shifts and missing data, and (2)
counterfactual analysis of intersectional biases across sex and race. We assess
multiple LLM-based approaches, ranging from continued pre-training to
in-context learning, as well as machine learning approaches. Our results
indicate that LLMs exhibit superior robustness, and we investigate the key
factors contributing to the promising LLM-based approaches. Furthermore, in
this setting, we identify gaps in LLM preferences that emerge in particular
intersections of sex and race. LLMs generally exhibit sex-based differences,
but they are most pronounced in certain racial groups. These findings suggest
that LLMs encode demographic preferences that may emerge in specific clinical
contexts or particular combinations of characteristics.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:11:47 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Lee",
"Joseph",
""
],
[
"Shang",
"Tianqi",
""
],
[
"Baik",
"Jae Young",
""
],
[
"Duong-Tran",
"Duy",
""
],
[
"Yang",
"Shu",
""
],
[
"Li",
"Lingyao",
""
],
[
"Shen",
"Li",
""
]
] |
2504.16274 | K Prabith | K Prabith, Georgios Theocharis and Rajesh Chaunsali | Nonlinearity-induced corner states in a kagome lattice | 18 pages, 9 figures | null | null | null | cond-mat.mes-hall | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nonlinearity provides a powerful mechanism for controlling energy
localization in structured dynamical systems. In this study, we investigate the
emergence of nonlinearity-induced energy localization at the corners of a
kagome lattice model featuring onsite cubic nonlinearity. Employing quench
dynamics simulations and nonlinear continuation methods, we analyze the
temporal and spectral characteristics of localized states under strong
nonlinearity. Our results demonstrate the formation of stable, localized corner
states, strikingly, even within the parameter regime corresponding to the
topologically trivial phase of the underlying linear system, which normally
lacks such boundary modes. Furthermore, we identify distinct families of
nonlinearity-induced corner states residing within the semi-infinite spectral
gap above the bulk bands in both the trivial and nontrivial phases. Stability
analysis and nonlinear continuation reveal they are intrinsic nonlinear
solutions, fundamentally distinct from perturbations of linear topological or
bulk states. These findings elucidate a robust mechanism for generating
localized states via nonlinearity, independent of linear topological
protection, and provide answers to fundamental questions about the nature of
nonlinear topological phenomena. The ability to create tunable, localized
states in various spectral regions offers potential applications in energy
harvesting, wave manipulation, and advanced signal processing.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:15:15 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Prabith",
"K",
""
],
[
"Theocharis",
"Georgios",
""
],
[
"Chaunsali",
"Rajesh",
""
]
] |
2504.16275 | Jannis Born | Jannis Born, Filip Skogh, Kahn Rhrissorrakrai, Filippo Utro, Nico
Wagner, Aleksandros Sobczyk | Quantum Doubly Stochastic Transformers | Under Review | null | null | null | cs.LG cs.AI cs.CE cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | At the core of the Transformer, the Softmax normalizes the attention matrix
to be right stochastic. Previous research has shown that this often
destabilizes training and that enforcing the attention matrix to be doubly
stochastic (through Sinkhorn's algorithm) consistently improves performance
across different tasks, domains and Transformer flavors. However, Sinkhorn's
algorithm is iterative, approximative, non-parametric and thus inflexible
w.r.t. the obtained doubly stochastic matrix (DSM). Recently, it has been
proven that DSMs can be obtained with a parametric quantum circuit, yielding a
novel quantum inductive bias for DSMs with no known classical analogue.
Motivated by this, we demonstrate the feasibility of a hybrid classical-quantum
doubly stochastic Transformer (QDSFormer) that replaces the Softmax in the
self-attention layer with a variational quantum circuit. We study the
expressive power of the circuit and find that it yields more diverse DSMs that
better preserve information than classical operators. Across multiple
small-scale object recognition tasks, we find that our QDSFormer consistently
surpasses both a standard Vision Transformer and other doubly stochastic
Transformers. Beyond the established Sinkformer, this comparison includes a
novel quantum-inspired doubly stochastic Transformer (based on QR
decomposition) that can be of independent interest. The QDSFormer also shows
improved training stability and lower performance variation suggesting that it
may mitigate the notoriously unstable training of ViTs on small-scale data.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:15:45 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Born",
"Jannis",
""
],
[
"Skogh",
"Filip",
""
],
[
"Rhrissorrakrai",
"Kahn",
""
],
[
"Utro",
"Filippo",
""
],
[
"Wagner",
"Nico",
""
],
[
"Sobczyk",
"Aleksandros",
""
]
] |
2504.16276 | Leandra Brickson PhD | Abhishek Jana, Moeumu Uili, James Atherton, Mark O'Brien, Joe Wood,
and Leandra Brickson | An Automated Pipeline for Few-Shot Bird Call Classification: A Case
Study with the Tooth-Billed Pigeon | 16 pages, 5 figures, 4 tables | null | null | null | cs.LG cs.AI cs.CV cs.SD | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper presents an automated one-shot bird call classification pipeline
designed for rare species absent from large publicly available classifiers like
BirdNET and Perch. While these models excel at detecting common birds with
abundant training data, they lack options for species with only 1-3 known
recordings-a critical limitation for conservationists monitoring the last
remaining individuals of endangered birds. To address this, we leverage the
embedding space of large bird classification networks and develop a classifier
using cosine similarity, combined with filtering and denoising preprocessing
techniques, to optimize detection with minimal training data. We evaluate
various embedding spaces using clustering metrics and validate our approach in
both a simulated scenario with Xeno-Canto recordings and a real-world test on
the critically endangered tooth-billed pigeon (Didunculus strigirostris), which
has no existing classifiers and only three confirmed recordings. The final
model achieved 1.0 recall and 0.95 accuracy in detecting tooth-billed pigeon
calls, making it practical for use in the field. This open-source system
provides a practical tool for conservationists seeking to detect and monitor
rare species on the brink of extinction.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:21:41 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Jana",
"Abhishek",
""
],
[
"Uili",
"Moeumu",
""
],
[
"Atherton",
"James",
""
],
[
"O'Brien",
"Mark",
""
],
[
"Wood",
"Joe",
""
],
[
"Brickson",
"Leandra",
""
]
] |
2504.16277 | Neha Hulkund | Neha Hulkund, Alaa Maalouf, Levi Cai, Daniel Yang, Tsun-Hsuan Wang,
Abigail O'Neil, Timm Haucke, Sandeep Mukherjee, Vikram Ramaswamy, Judy Hansen
Shen, Gabriel Tseng, Mike Walmsley, Daniela Rus, Ken Goldberg, Hannah Kerner,
Irene Chen, Yogesh Girdhar, Sara Beery | DataS^3: Dataset Subset Selection for Specialization | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | In many real-world machine learning (ML) applications (e.g. detecting broken
bones in x-ray images, detecting species in camera traps), in practice models
need to perform well on specific deployments (e.g. a specific hospital, a
specific national park) rather than the domain broadly. However, deployments
often have imbalanced, unique data distributions. Discrepancy between the
training distribution and the deployment distribution can lead to suboptimal
performance, highlighting the need to select deployment-specialized subsets
from the available training data. We formalize dataset subset selection for
specialization (DS3): given a training set drawn from a general distribution
and a (potentially unlabeled) query set drawn from the desired
deployment-specific distribution, the goal is to select a subset of the
training data that optimizes deployment performance.
We introduce DataS^3; the first dataset and benchmark designed specifically
for the DS3 problem. DataS^3 encompasses diverse real-world application
domains, each with a set of distinct deployments to specialize in. We conduct a
comprehensive study evaluating algorithms from various families--including
coresets, data filtering, and data curation--on DataS^3, and find that
general-distribution methods consistently fail on deployment-specific tasks.
Additionally, we demonstrate the existence of manually curated
(deployment-specific) expert subsets that outperform training on all available
data with accuracy gains up to 51.3 percent. Our benchmark highlights the
critical role of tailored dataset curation in enhancing performance and
training efficiency on deployment-specific distributions, which we posit will
only become more important as global, public datasets become available across
domains and ML models are deployed in the real world.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:25:14 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Hulkund",
"Neha",
""
],
[
"Maalouf",
"Alaa",
""
],
[
"Cai",
"Levi",
""
],
[
"Yang",
"Daniel",
""
],
[
"Wang",
"Tsun-Hsuan",
""
],
[
"O'Neil",
"Abigail",
""
],
[
"Haucke",
"Timm",
""
],
[
"Mukherjee",
"Sandeep",
""
],
[
"Ramaswamy",
"Vikram",
""
],
[
"Shen",
"Judy Hansen",
""
],
[
"Tseng",
"Gabriel",
""
],
[
"Walmsley",
"Mike",
""
],
[
"Rus",
"Daniela",
""
],
[
"Goldberg",
"Ken",
""
],
[
"Kerner",
"Hannah",
""
],
[
"Chen",
"Irene",
""
],
[
"Girdhar",
"Yogesh",
""
],
[
"Beery",
"Sara",
""
]
] |
2504.16278 | Peter Mann | Peter Mann and Simon Dobson | An alternative expression of message passing on networks | 8 pages, 6 figures | null | null | null | physics.soc-ph | http://creativecommons.org/licenses/by/4.0/ | Message passing techniques on networks encompasses a family of related
methods that can be employed to ascertain many important properties of a
network. It is widely considered to be the state of the art formulation for
networked systems and advances in this method have a wide impact across
multiple literatures. One property that message passing can yield is the size
of the largest connected component in the network following bond percolation.
In this paper, we introduce an alternative method of finding this value that
differs from the standard approach. Like the canonical approach, our method is
exact on trees and an approximation on arbitrary graphs. We show that our
method lends itself to the description of a variety of generalisations of bond
percolation such as sequential percolation and non-binary percolation and can
yield information about the local environment of a node in percolation
equilibrium that the traditional approach cannot.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:28:48 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Mann",
"Peter",
""
],
[
"Dobson",
"Simon",
""
]
] |
2504.16279 | Taha Ameen | Taha Ameen, Bruce Hajek | Detecting Correlation between Multiple Unlabeled Gaussian Networks | 7 pages, appearing at IEEE ISIT 2025 | null | null | null | math.ST cs.IT math.IT stat.AP stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the hypothesis testing problem to determine whether m > 2
unlabeled graphs with Gaussian edge weights are correlated under a latent
permutation. Previously, a sharp detection threshold for the correlation
parameter \rho was established by Wu, Xu and Yu for this problem when m = 2.
Presently, their result is leveraged to derive necessary and sufficient
conditions for general m. In doing so, an interval for \rho is uncovered for
which detection is impossible using 2 graphs alone but becomes possible with m
> 2 graphs.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:30:25 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Ameen",
"Taha",
""
],
[
"Hajek",
"Bruce",
""
]
] |
2504.16280 | Zhi-Yun Tang | Zhi-Yun Tang and Xianhua Tang | A positive solution of the elliptic equation on a starshaped domain with
boundary singularities | null | null | null | null | math.AP math.FA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the elliptic equation with boundary singularities
\begin{equation} \begin{cases} -\Delta u=-\lambda
|x|^{-s_{1}}|u|^{p-2}u+|x|^{-s_{2}}|u|^{q-2}u &\text { in } \varOmega , u(x)=0
&\text { on } \partial \varOmega , \end{cases} \end{equation} where $0\leq s_1
< s_2 < 2$, $2<p< 2^{*}(s_1)$, $q< 2^{*}(s_2)$. Which is the subcritical
approximations of the Li-Lin's open problem proposed by Li and Lin (Arch Ration
Mech Anal 203(3): 943-968, 2012). We find a positive solution which is a local
minimum point of the energy functional on the Nehari manifold when
$p>q>\frac{2-s_2}{2-s_1}p+\frac{2s_2-2s_1}{2-s_1}$. We also discuss the
asymptotic behavior of the positive solution and find a new class of blow-up
points by blowing up analysis. These blow-up points are on the boundary of the
domain, which are not similar with the usual.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:32:37 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Tang",
"Zhi-Yun",
""
],
[
"Tang",
"Xianhua",
""
]
] |
2504.16281 | Daniel Solano | Daniel Solano (1, 2 and 3), Laurent Younes (1 and 3), Jerome Darbon
(2) ((1) Johns Hopkins University Department of Applied Mathematics and
Statistics, (2) Brown University Division of Applied Mathematics, (3) Johns
Hopkins University Center for Imaging Science) | Shape Alignment via Allen-Cahn Nonlinear-Convection | 30 pages, 10 figures | null | null | null | math.OC | http://creativecommons.org/licenses/by-sa/4.0/ | This paper demonstrates the impact of a phase field method on shape
registration to align shapes of possibly different topology. It yields new
insights into the building of discrepancy measures between shapes regardless of
topology, which would have applications in fields of image data analysis such
as computational anatomy. A soft end-point optimal control problem is
introduced whose minimum measures the minimal control norm required to align an
initial shape to a final shape, up to a small error term. The initial data is
spatially integrable, the paths in control spaces are integrable and the
evolution equation is a generalized convective Allen-Cahn. Binary images are
used to represent shapes for the initial data. Inspired by level-set methods
and large diffeomorphic deformation metric mapping, the controls spaces are
integrable scalar functions to serve as a normal velocity and smooth
reproducing kernel Hilbert spaces to serve as velocity vector fields. The
existence of mild solutions to the evolution equation is proved, the minimums
of the time discretized optimal control problem are characterized, and
numerical simulations of minimums to the fully discretized optimal control
problem are displayed. The numerical implementation enforces the
maximum-bounded principle, although it is not proved for these mild solutions.
This research offers a novel discrepancy measure that provides valuable ways to
analyze diverse image data sets. Future work involves proving the existence of
minimums, existence and uniqueness of strong solutions and the maximum bounded
principle.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:32:56 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Solano",
"Daniel",
"",
"1, 2 and 3"
],
[
"Younes",
"Laurent",
"",
"1 and 3"
],
[
"Darbon",
"Jerome",
""
]
] |
2504.16282 | Naoki Imai | Naoki Imai, Hiroki Kato, Alex Youcis | An integral analogue of Fontaine's crystalline functor | 35 pages. The contents of this article previously belonged to
arXiv:2310.08472. We have split this portion off and expanded the results
(see Theorem A) | null | null | null | math.NT math.AG | http://creativecommons.org/licenses/by/4.0/ | For a smooth formal scheme $\mathfrak{X}$ over the Witt vectors $W$ of a
perfect field $k$, we construct a functor $\mathbb{D}_\mathrm{crys}$ from the
category of prismatic $F$-crystals $(\mathcal{E},\varphi_\mathcal{E})$ (or
prismatic $F$-gauges) on $\mathfrak{X}$ to the category of filtered
$F$-crystals on $\mathfrak{X}$. We show that
$\mathbb{D}_\mathrm{crys}(\mathcal{E},\varphi_\mathcal{E})$ enjoys strong
properties (e.g., strong divisibility in the sense of Faltings) when
$(\mathcal{E},\varphi_\mathcal{E})$ is what we call locally filtered free
(lff). Most significantly, we show that $\mathbb{D}_\mathrm{crys}$ actually
induces an equivalence between the category of prismatic $F$-gauges on
$\mathfrak{X}$ with Hodge--Tate weights in $[0,p-2]$ and the category of
Fontaine--Laffaille modules on $\mathfrak{X}$. Finally, we use our functor
$\mathbb{D}_\mathrm{crys}$ to enhance the study of prismatic Dieduonn\'e theory
of $p$-divisible groups (as initiated by Ansch\"{u}tz--Le Bras) allowing one to
recover the filtered crystalline Dieudonn\'e crystal from the prismatic
Dieudonn\'e crystal. This in turn allows us to clarify the relationship between
prismatic Dieudonn\'e theory and the work of Kim on classifying $p$-divisible
groups using Breuil--Kisin modules.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:35:14 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Imai",
"Naoki",
""
],
[
"Kato",
"Hiroki",
""
],
[
"Youcis",
"Alex",
""
]
] |
2504.16283 | Jaya Narain | Jaya Narain, Amrit Romana, Vikramjit Mitra, Colin Lea, Shirley Ren | Affect Models Have Weak Generalizability to Atypical Speech | Preprint | null | null | null | cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Speech and voice conditions can alter the acoustic properties of speech,
which could impact the performance of paralinguistic models for affect for
people with atypical speech. We evaluate publicly available models for
recognizing categorical and dimensional affect from speech on a dataset of
atypical speech, comparing results to datasets of typical speech. We
investigate three dimensions of speech atypicality: intelligibility, which is
related to pronounciation; monopitch, which is related to prosody, and
harshness, which is related to voice quality. We look at (1) distributional
trends of categorical affect predictions within the dataset, (2) distributional
comparisons of categorical affect predictions to similar datasets of typical
speech, and (3) correlation strengths between text and speech predictions for
spontaneous speech for valence and arousal. We find that the output of affect
models is significantly impacted by the presence and degree of speech
atypicalities. For instance, the percentage of speech predicted as sad is
significantly higher for all types and grades of atypical speech when compared
to similar typical speech datasets. In a preliminary investigation on improving
robustness for atypical speech, we find that fine-tuning models on
pseudo-labeled atypical speech data improves performance on atypical speech
without impacting performance on typical speech. Our results emphasize the need
for broader training and evaluation datasets for speech emotion models, and for
modeling approaches that are robust to voice and speech differences.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:40:17 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Narain",
"Jaya",
""
],
[
"Romana",
"Amrit",
""
],
[
"Mitra",
"Vikramjit",
""
],
[
"Lea",
"Colin",
""
],
[
"Ren",
"Shirley",
""
]
] |
2504.16284 | Nicholas Baldonado | Nicholas Baldonado | A New Look At Small-$x$ Helicity Phenomenology: Investigating
Uncertainties And The Impact Of Polarized Proton-proton Data | 184 pages, 5 tables, 44 figures | null | null | null | hep-ph hep-th nucl-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This dissertation highlights the contributions I have made to the field of
theoretical nuclear physics, specifically in high-energy Quantum Chromodynamics
(QCD). High-energy QCD is a robust subject and my research is refined to the
sub-field of small-$x$ spin physics; small-$x$ physics is characterized by
high-energy and density collisions and is well-suited for the Color Glass
Condensate (CGC) effective field theory. Small-$x$ spin physics takes the
ultra-relativistic description of high-energy QCD and gives special attention
to spin-dependent interactions suppressed by powers of the center-of-mass
energy. My expertise lies in exploring the theory and phenomenology relating to
the KPS-CTT small-$x$ helicity evolution equations, a rubric that allows one to
make predictions of the quarks' and gluons' distributions of spin at small-$x$.
These predictions are heavily influenced by the initial conditions of the
evolution, and the initial conditions are determined through analyses of world
polarized data. My contributions focus on Bayesian parameter analysis,
numerical and analytical calculations to discretize and cross-check the
evolution equations, and the incorporation of a new observable into the pool of
analyzed data. The results of such work show that the net amount of spin from
quarks and gluons in the small-$x$ regime is predicted to be negative and/or
potentially small; an analysis of polarized deep-inelastic scattering (DIS) and
semi-inclusive DIS (SIDIS) data resulted in a net small-$x$ spin prediction
that can be large and negative, but new results with the inclusion of data for
single-inclusive jet production in polarized proton-proton ($pp$) collisions
now estimate that the net amount of parton spin at small $x$ is small, with
1-$\sigma$ uncertainty that spans zero.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:42:09 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Baldonado",
"Nicholas",
""
]
] |
2504.16285 | Marko Micic | Marko Mi\'ci\'c, Xinyu Dai, Nick Shumate, Khoa Nguyen Tran, Heechan
Yuk | Environmental Dependence of X-Ray Emission From The Least Massive
Galaxies | Six pages, eight figures. Submitted to MNRAS. Comments are welcome | null | null | null | astro-ph.GA | http://creativecommons.org/licenses/by/4.0/ | The low-mass end of low-mass galaxies is largely unexplored in AGN studies,
but it is essential for extending our understanding of the black hole-galaxy
coevolution. We surveyed the 3D-HST catalog and collected a sample of 546 dwarf
galaxies with stellar masses log(M$_*$/\(M_\odot\))$<$8.7, residing in the
GOODS-South deep field. We then used the unprecedented depth of Chandra
available in the GOODS-South field to search for AGN. We carefully investigated
the factors that could play roles in the AGN detectability, such as Chandra's
point-spread function and the redshift- and off-axis-dependent detection
limits. We identified 16 X-ray sources that are likely associated with AGN
activity. Next, we evaluated the environment density of each galaxy by
computing tidal indices. We uncovered a dramatic impact of the environment on
AGN triggering as dwarfs from high-density environments showed an AGN fraction
of 22.5\%, while the median stellar mass of this subset of dwarfs is only
log(M$_*$/\(M_\odot\))=8.1. In contrast, the low-density environment dwarfs
showed an AGN fraction of only 1.4\%, in line with typically reported values
from the literature. This highlights the fact that massive central black holes
are ubiquitous even at the lowest mass scales and demonstrates the importance
of the environment in triggering black hole accretion, as well as the necessity
for deep X-ray data and proper evaluation of the X-ray data quality.
Alternatively, even if the detected X-ray sources are related to stellar mass
accretors rather than AGN, the environmental dependence persists, signaling the
impact of the environment on galaxy evolution and star formation processes at
the lowest mass scales. Additionally, we stacked the X-ray images of
non-detected galaxies from high- and low-density environments, revealing
similar trends.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:44:39 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Mićić",
"Marko",
""
],
[
"Dai",
"Xinyu",
""
],
[
"Shumate",
"Nick",
""
],
[
"Tran",
"Khoa Nguyen",
""
],
[
"Yuk",
"Heechan",
""
]
] |
2504.16286 | Pedro Brom | Li Weigang, Pedro Carvalho Brom | The Paradox of Poetic Intent in Back-Translation: Evaluating the Quality
of Large Language Models in Chinese Translation | 24 pages, 3 figures | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The rapid advancement of large language models (LLMs) has reshaped the
landscape of machine translation, yet challenges persist in preserving poetic
intent, cultural heritage, and handling specialized terminology in
Chinese-English translation. This study constructs a diverse corpus
encompassing Chinese scientific terminology, historical translation paradoxes,
and literary metaphors. Utilizing a back-translation and Friedman test-based
evaluation system (BT-Fried), we evaluate BLEU, CHRF, TER, and semantic
similarity metrics across six major LLMs (e.g., GPT-4.5, DeepSeek V3) and three
traditional translation tools. Key findings include: (1) Scientific abstracts
often benefit from back-translation, while traditional tools outperform LLMs in
linguistically distinct texts; (2) LLMs struggle with cultural and literary
retention, exemplifying the "paradox of poetic intent"; (3) Some models exhibit
"verbatim back-translation", reflecting emergent memory behavior; (4) A novel
BLEU variant using Jieba segmentation and n-gram weighting is proposed. The
study contributes to the empirical evaluation of Chinese NLP performance and
advances understanding of cultural fidelity in AI-mediated translation.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:48:05 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Weigang",
"Li",
""
],
[
"Brom",
"Pedro Carvalho",
""
]
] |
2504.16287 | Anwesh Ray | Eknath Ghate, Anwesh Ray | Deformations of reducible Galois representations with large Selmer
$p$-rank | Version 1: 43 pages | null | null | null | math.NT | http://creativecommons.org/licenses/by/4.0/ | Let $p\geq 5$ be a prime number. In this paper, we construct Galois
representations associated with modular forms for which the dimension of the
$p$-torsion in the Bloch-Kato Selmer group can be made arbitrarily large. Our
result extends similar results known for small primes, such as Matsuno's work
on Tate-Shafarevich groups of elliptic curves. Extending the technique of
Hamblen and Ramakrishna, we lift residually reducible Galois representations to
modular representations for which the associated Greenberg Selmer groups are
minimally generated by a large number of elements over the Iwasawa algebra. We
deduce that there is an isogenous lattice for which the Bloch-Kato Selmer group
has large $p$-rank.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:49:49 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Ghate",
"Eknath",
""
],
[
"Ray",
"Anwesh",
""
]
] |
2504.16288 | Antoine Amarilli | Antoine Amarilli and Florin Manea and Tina Ringleb and Markus L.
Schmid | Linear Time Subsequence and Supersequence Regex Matching | 31 pages. Full version including all proofs | null | null | null | cs.DS cs.FL | http://creativecommons.org/licenses/by/4.0/ | It is well-known that checking whether a given string $w$ matches a given
regular expression $r$ can be done in quadratic time $O(|w|\cdot |r|)$ and that
this cannot be improved to a truly subquadratic running time of $O((|w|\cdot
|r|)^{1-\epsilon})$ assuming the strong exponential time hypothesis (SETH). We
study a different matching paradigm where we ask instead whether $w$ has a
subsequence that matches $r$, and show that regex matching in this sense can be
solved in linear time $O(|w| + |r|)$. Further, the same holds if we ask for a
supersequence. We show that the quantitative variants where we want to compute
a longest or shortest subsequence or supersequence of $w$ that matches $r$ can
be solved in $O(|w| \cdot |r|)$, i. e., asymptotically no worse than classical
regex matching; and we show that $O(|w| + |r|)$ is conditionally not possible
for these problems. We also investigate these questions with respect to other
natural string relations like the infix, prefix, left-extension or extension
relation instead of the subsequence and supersequence relation. We further
study the complexity of the universal problem where we ask if all subsequences
(or supersequences, infixes, prefixes, left-extensions or extensions) of an
input string satisfy a given regular expression.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:50:01 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Amarilli",
"Antoine",
""
],
[
"Manea",
"Florin",
""
],
[
"Ringleb",
"Tina",
""
],
[
"Schmid",
"Markus L.",
""
]
] |
2504.16289 | Toon Van Waterschoot | Toon van Waterschoot | Deep, data-driven modeling of room acoustics: literature review and
research perspectives | null | null | null | null | eess.AS cs.SD | http://creativecommons.org/licenses/by/4.0/ | Our everyday auditory experience is shaped by the acoustics of the indoor
environments in which we live. Room acoustics modeling is aimed at establishing
mathematical representations of acoustic wave propagation in such environments.
These representations are relevant to a variety of problems ranging from
echo-aided auditory indoor navigation to restoring speech understanding in
cocktail party scenarios. Many disciplines in science and engineering have
recently witnessed a paradigm shift powered by deep learning (DL), and room
acoustics research is no exception. The majority of deep, data-driven room
acoustics models are inspired by DL-based speech and image processing, and
hence lack the intrinsic space-time structure of acoustic wave propagation.
More recently, DL-based models for room acoustics that include either geometric
or wave-based information have delivered promising results, primarily for the
problem of sound field reconstruction. In this review paper, we will provide an
extensive and structured literature review on deep, data-driven modeling in
room acoustics. Moreover, we position these models in a framework that allows
for a conceptual comparison with traditional physical and data-driven models.
Finally, we identify strengths and shortcomings of deep, data-driven room
acoustics models and outline the main challenges for further research.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:53:42 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"van Waterschoot",
"Toon",
""
]
] |
2504.16290 | Andr\'e Longon | Andr\'e Longon | Naturally Computed Scale Invariance in the Residual Stream of ResNet18 | null | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | An important capacity in visual object recognition is invariance to
image-altering variables which leave the identity of objects unchanged, such as
lighting, rotation, and scale. How do neural networks achieve this? Prior
mechanistic interpretability research has illuminated some invariance-building
circuitry in InceptionV1, but the results are limited and networks with
different architectures have remained largely unexplored. This work
investigates ResNet18 with a particular focus on its residual stream, an
architectural component which InceptionV1 lacks. We observe that many
convolutional channels in intermediate blocks exhibit scale invariant
properties, computed by the element-wise residual summation of scale
equivariant representations: the block input's smaller-scale copy with the
block pre-sum output's larger-scale copy. Through subsequent ablation
experiments, we attempt to causally link these neural properties with
scale-robust object recognition behavior. Our tentative findings suggest how
the residual stream computes scale invariance and its possible role in
behavior. Code is available at:
https://github.com/cest-andre/residual-stream-interp
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 21:54:37 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Longon",
"André",
""
]
] |
2504.16291 | Rui Fang | Aytekin \c{C}ibik, Rui Fang, William Layton, Farjana Siddiqua | Data assimilation with model errors | null | null | null | null | math.NA cs.NA | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Nudging is a data assimilation method amenable to both analysis and
implementation. It also has the (reported) advantage of being insensitive to
model errors compared to other assimilation methods. However, nudging behavior
in the presence of model errors is little analyzed. This report gives an
analysis of nudging to correct model errors. The analysis indicates that the
error contribution due to the model error decays as the nudging parameter $\chi
\to \infty$ like $\mathcal{O}(\chi^{-\frac{1}{2}})$, Theorem 3.2. Numerical
tests verify the predicted convergence rates and validate the nudging
correction to model errors.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:01:56 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Çibik",
"Aytekin",
""
],
[
"Fang",
"Rui",
""
],
[
"Layton",
"William",
""
],
[
"Siddiqua",
"Farjana",
""
]
] |
2504.16292 | Saikat Mondal | Saikat Mondal and Chanchal K. Roy | GENCNIPPET: Automated Generation of Code Snippets for Supporting
Programming Questions | Accepted in the International Conference on Mining Software
Repositories (MSR 2025 Registered Reports Track) | null | null | null | cs.SE | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Context: Software developers often ask questions on Technical Q&A forums like
Stack Overflow (SO) to seek solutions to their programming-related problems
(e.g., errors and unexpected behavior of code). Problem: Many questions miss
required code snippets due to the lack of readily available code, time
constraints, employer restrictions, confidentiality concerns, or uncertainty
about what code to share. Unfortunately, missing but required code snippets
prevent questions from getting prompt and appropriate solutions. Objective: We
plan to introduce GENCNIPPET, a tool designed to integrate with SO's question
submission system. GENCNIPPET will generate relevant code examples (when
required) to support questions for their timely solutions. Methodology: We
first downloaded the SO April 2024 data dump, which contains 1.94 million
questions related to Python that have code snippets and 1.43 million questions
related to Java. Then, we filter these questions to identify those that
genuinely require code snippets using a state-of-the-art machine learning
model. Next, we select questions with positive scores to ensure high-quality
data. Our plan is to fine-tune Llama-3 models (e.g., Llama-3-8B), using 80% of
the selected questions for training and 10% for validation. The primary reasons
for choosing Llama models are their open-source accessibility and robust
fine-tuning capabilities, which are essential for deploying a freely accessible
tool. GENCNIPPET will be integrated with the SO question submission system as a
browser plugin. It will communicate with the fine-tuned model to generate code
snippets tailored to the target questions. The effectiveness of the generated
code examples will be assessed using automatic evaluation against ground truth,
user perspectives, and live (wild) testing in real-world scenarios.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:07:40 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Mondal",
"Saikat",
""
],
[
"Roy",
"Chanchal K.",
""
]
] |
2504.16293 | Robert Main | Christopher Andrade, Charanjot Brar, Alyssa Cassity, Kathryn Crowter,
Davor Cubranic, Abigail K. Denney, Fengqiu Adam Dong, Emmanuel Fonseca, Ajay
Kumar, Lars K\"unkel, Magnus L'Argent, Dustin Lang, Robert A. Main, Kiyoshi
W. Masui, Sujay Mate, Juan Mena-Parra, Bradley W. Meyers, Cherry Ng, Aaron B.
Pearlman, Ue-Li Pen, Scott M. Ransom, Alexander P. Roman, Kendrick Smith,
Reynier Squillace, Ingrid Stairs, Chia Min Tan, Laurent Tarabout, Xia Wenke,
Tarik J. Zegmott | CHIME All-sky Multiday Pulsar Stacking Search (CHAMPSS): System Overview
and First Discoveries | 27 pages, 20 figures. Submitted to ApJ, comments welcome | null | null | null | astro-ph.HE | http://creativecommons.org/licenses/by/4.0/ | We describe the CHIME All-sky Multiday Pulsar Stacking Search (CHAMPSS)
project. This novel radio pulsar survey revisits the full Northern Sky daily,
offering unprecedented opportunity to detect highly intermittent pulsars, as
well as faint sources via long-term data stacking. CHAMPSS uses the CHIME/FRB
datastream, which consists of 1024 stationary beams streaming intensity data at
$0.983$\,ms resolution, 16384 frequency channels across 400--800\,MHz,
continuously being searched for single, dispersed bursts/pulses. In CHAMPSS,
data from adjacent east-west beams are combined to form a grid of tracking
beams, allowing longer exposures at fixed positions. These tracking beams are
dedispersed to many trial dispersion measures (DM) to a maximum DM beyond the
Milky Way's expected contribution, and Fourier transformed in time to form
power spectra. Repeated observations are searched daily to find intermittent
sources, and power spectra of the same sky positions are incoherently stacked,
increasing sensitivity to faint persistent sources. The $0.983$\,ms time
resolution limits our sensitivity to millisecond pulsars; we have full
sensitivity to pulsars with $P > 60\,$ms, with sensitivity gradually decreasing
from $60$ ms to $2$\,ms as higher harmonics are beyond the Nyquist limit. In a
commissioning survey, data covering $\sim 1/16$ of the CHIME sky was processed
and searched in quasi-realtime over two months, leading to the discovery of
eleven new pulsars, each with $S_{600} > 0.1$\,mJy. When operating at scale,
CHAMPSS will stack $>$1\,year of data along each sightline, reaching a
sensitivity of $\lesssim 30\, \mu$Jy for all sightlines above a declination of
$10^{\circ}$, and off of the Galactic plane.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:08:19 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Andrade",
"Christopher",
""
],
[
"Brar",
"Charanjot",
""
],
[
"Cassity",
"Alyssa",
""
],
[
"Crowter",
"Kathryn",
""
],
[
"Cubranic",
"Davor",
""
],
[
"Denney",
"Abigail K.",
""
],
[
"Dong",
"Fengqiu Adam",
""
],
[
"Fonseca",
"Emmanuel",
""
],
[
"Kumar",
"Ajay",
""
],
[
"Künkel",
"Lars",
""
],
[
"L'Argent",
"Magnus",
""
],
[
"Lang",
"Dustin",
""
],
[
"Main",
"Robert A.",
""
],
[
"Masui",
"Kiyoshi W.",
""
],
[
"Mate",
"Sujay",
""
],
[
"Mena-Parra",
"Juan",
""
],
[
"Meyers",
"Bradley W.",
""
],
[
"Ng",
"Cherry",
""
],
[
"Pearlman",
"Aaron B.",
""
],
[
"Pen",
"Ue-Li",
""
],
[
"Ransom",
"Scott M.",
""
],
[
"Roman",
"Alexander P.",
""
],
[
"Smith",
"Kendrick",
""
],
[
"Squillace",
"Reynier",
""
],
[
"Stairs",
"Ingrid",
""
],
[
"Tan",
"Chia Min",
""
],
[
"Tarabout",
"Laurent",
""
],
[
"Wenke",
"Xia",
""
],
[
"Zegmott",
"Tarik J.",
""
]
] |
2504.16294 | Luca Maggio | Luca Maggio and Vincenzo Tamma | Ultimate quantum sensitivity in the 3D relative localisation of two
single-photon emitters via two-photon interference | null | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | We present a quantum sensing protocol for the simultaneous estimation of the
difference in the localization parameters of two single-photon sources, paving
the way to single-photon 3D imaging and 3D nanoscopy beyond the diffraction
limit. This is achieved by exploiting two-photon interference of the two
emitted photons at a beam splitter via sampling measurements in the frequency
and transverse momenta at the output. We prove theoretically that this
technique reaches the ultimate sensitivity in the 3D relative localization of
two emitters, already with a number of sampling measurements of 1000 and a bias
in the three localization parameters below 1%. These results are independent of
the values of the localization parameters to estimate.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:18:49 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Maggio",
"Luca",
""
],
[
"Tamma",
"Vincenzo",
""
]
] |
2504.16296 | Ronisio Ribeiro | Luis Fernando Mello, Ronisio Moises Ribeiro | Traveling wave solutions of the Burgers-Huxley equations | null | null | null | null | math.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the traveling wave solutions of the Burgers-Huxley equation from a
geometric point of view via the qualitative theory of ordinary differential
equations. By using the Poincar\'e compactification we study the global phase
portraits of a family of polynomial ordinary differential equations in the
plane related to the Burgers-Huxley equation. We obtain the traveling wave
solutions and their asymptotic behaviors from the orbits that connect
equilibrium points taking into account the restrictions of the studied
equation.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:25:13 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Mello",
"Luis Fernando",
""
],
[
"Ribeiro",
"Ronisio Moises",
""
]
] |
2504.16297 | Taylor Patti | Taylor L. Patti, Thien Nguyen, Justin G. Lietz, Alexander J. McCaskey,
Brucek Khailany | Augmenting Simulated Noisy Quantum Data Collection by Orders of
Magnitude Using Pre-Trajectory Sampling with Batched Execution | 8 pages, 5 figures | null | null | null | quant-ph physics.comp-ph | http://creativecommons.org/licenses/by/4.0/ | Classically simulating quantum systems is challenging, as even noiseless
$n$-qubit quantum states scale as $2^n$. The complexity of noisy quantum
systems is even greater, requiring $2^n \times 2^n$-dimensional density
matrices. Various approximations reduce density matrix overhead, including
quantum trajectory-based methods, which instead use an ensemble of $m \ll 2^n$
noisy states. While this method is dramatically more efficient, current
implementations use unoptimized sampling, redundant state preparation, and
single-shot data collection. In this manuscript, we present the Pre-Trajectory
Sampling technique, increasing the efficiency and utility of trajectory
simulations by tailoring error types, batching sampling without redundant
computation, and collecting error information. We demonstrate the effectiveness
of our method with both a mature statevector simulation of a 35-qubit quantum
error-correction code and a preliminary tensor network simulation of 85 qubits,
yielding speedups of up to $10^6$x and $16$x, as well as generating massive
datasets of one trillion and one million shots, respectively.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:36:18 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Patti",
"Taylor L.",
""
],
[
"Nguyen",
"Thien",
""
],
[
"Lietz",
"Justin G.",
""
],
[
"McCaskey",
"Alexander J.",
""
],
[
"Khailany",
"Brucek",
""
]
] |
2504.16298 | Siddhant Solanki | Siddhant Solanki, Jordy Davelaar, Bart Ripperda and Alexander
Philippov | Modeling of lightcurves from reconnection-powered very high energy
flares from M87* | 24 pages, 15 figures. Accepted for publication in The Astrophysical
Journal | null | null | null | astro-ph.HE | http://creativecommons.org/licenses/by/4.0/ | The black hole at the center of M87 is observed to flare regularly in the
very high energy (VHE) band, with photon energies $\gtrsim 100$ GeV. The rapid
variability, which can be as short as $2$ days in the VHE lightcurve constrains
some of the flares to originate close to the black hole. Magnetic reconnection
is a promising candidate for explaining the flares, where the VHE emission
comes from background soft photons that Inverse Compton (IC) scatter off of
high energy electron-positron pairs in the reconnecting current sheet. In this
work, we ray trace photons from a current sheet near the black hole event
horizon during a flux eruption in a magnetically arrested state in a general
relativistic magnetohydrodynamics simulation. We incorporate beaming of the
Compton up-scattered photons, based on results from radiative kinetic
simulations of relativistic reconnection. We then construct VHE lightcurves
that account for the dynamics of the current sheet and lensing from
general-relativistic effects. We find that most of the flux originates in the
inner $5$ gravitational radii, and beaming is essential to explain the observed
flux from the strongest VHE flares. The ray traced lightcurves show features
resulting from the changing volume of the reconnecting current sheet on
timescales that can be consistent with observations. Furthermore, we find that
the amount of beaming depends strongly on two effects: the current sheet
inclination with respect to the observer and the anisotropy in the direction of
motion of the accelerated particles.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:39:32 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Solanki",
"Siddhant",
""
],
[
"Davelaar",
"Jordy",
""
],
[
"Ripperda",
"Bart",
""
],
[
"Philippov",
"Alexander",
""
]
] |
2504.16299 | Arick Grootveld | Arick Grootveld, Haodong Yang, Biao Chen, Venkata Gandikota, Jason
Pollack | Towards Quantum Universal Hypothesis Testing | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hoeffding's formulation and solution to the universal hypothesis testing
(UHT) problem had a profound impact on many subsequent works dealing with
asymmetric hypotheses. In this work, we introduce a quantum universal
hypothesis testing framework that serves as a quantum analog to Hoeffding's
UHT. Motivated by Hoeffding's approach, which estimates the empirical
distribution and uses it to construct the test statistic, we employ quantum
state tomography to reconstruct the unknown state prior to forming the test
statistic. Leveraging the concentration properties of quantum state tomography,
we establish the exponential consistency of the proposed test: the type II
error probability decays exponentially quickly, with the exponent determined by
the trace distance between the true state and the nominal state.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:41:08 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Grootveld",
"Arick",
""
],
[
"Yang",
"Haodong",
""
],
[
"Chen",
"Biao",
""
],
[
"Gandikota",
"Venkata",
""
],
[
"Pollack",
"Jason",
""
]
] |
2504.16300 | Enrico Calzavarini | Saad Raza, Romulo B. Freitas, Leonardo S. B. Alves, Enrico
Calzavarini, Silvia C. Hirata | Impact of Particle Injection Velocity on the Stability of the
Particulate Rayleigh-B\'enard System | 9 pages, 6 figures | null | null | null | physics.flu-dyn | http://creativecommons.org/licenses/by/4.0/ | The linear stability of a thermally stratified fluid layer between horizontal
walls, where thermal particles are continuously injected at one boundary and
extracted at the other - a system known as particulate Rayleigh-B\'enard (pRB)
- is studied. For a fixed volumetric particle flux, reducing the injection
velocity stabilizes the system when heavy particles are introduced from above,
but destabilizes it when light particles are injected from below. For very
light particles (bubbles), low injection velocities can shift the onset of
convection to negative Rayleigh numbers, i.e. heating from above. Particles
accumulate non-uniformly near the extraction wall and in regions of strong
vertical flow, aligning with either wall-impinging or wall-detaching zones
depending on whether injection is at sub- or super-terminal velocity.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:41:23 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Raza",
"Saad",
""
],
[
"Freitas",
"Romulo B.",
""
],
[
"Alves",
"Leonardo S. B.",
""
],
[
"Calzavarini",
"Enrico",
""
],
[
"Hirata",
"Silvia C.",
""
]
] |
2504.16301 | Niko Zuppas | Niko Zuppas and Bryan C. Carstens | SLiM-Gym: Reinforcement Learning for Population Genetics | 7 pages, 2 figures | null | null | null | q-bio.PE | http://creativecommons.org/licenses/by/4.0/ | We introduce SLiM-Gym, a Python package for integrating reinforcement
learning (RL) with forward-time population genetic simulations. Wright-Fisher
evolutionary dynamics offer a tractable framework for modeling populations
across discrete generations, yet applying RL to these systems requires a
compatible training environment. SLiM-Gym connects the standardized RL
interface provided by Gymnasium with the high-fidelity evolutionary simulations
of SLiM, allowing agents to interact with evolving populations in real time.
This framework enables the development and evaluation of RL-based strategies
for understanding evolutionary processes.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:41:35 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Zuppas",
"Niko",
""
],
[
"Carstens",
"Bryan C.",
""
]
] |
2504.16302 | Lily Agranat-Tamir | Lily Agranat-Tamir, Michael Fuchs, Bernhard Gittenberger and Noah A.
Rosenberg | Enumerative combinatorics of unlabeled and labeled time-consistent
galled trees | null | null | null | null | math.CO q-bio.PE | http://creativecommons.org/licenses/by/4.0/ | In mathematical phylogenetics, the time-consistent galled trees provide a
simple class of rooted binary network structures that can be used to represent
a variety of different biological phenomena. We study the enumerative
combinatorics of unlabeled and labeled time-consistent galled trees. We present
a new derivation via the symbolic method of the number of unlabeled
time-consistent galled trees with a fixed number of leaves and a fixed number
of galls. We also derive new generating functions and asymptotics for labeled
time-consistent galled trees.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:42:24 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Agranat-Tamir",
"Lily",
""
],
[
"Fuchs",
"Michael",
""
],
[
"Gittenberger",
"Bernhard",
""
],
[
"Rosenberg",
"Noah A.",
""
]
] |
2504.16303 | Keyi Yin | Keyi Yin, Xiang Fang, Zhuo Chen, Ang Li, David Hayes, Eneet Kaur, Reza
Nejabati, Hartmut Haeffner, Wes Campbell, Eric Hudson, Jens Palsberg, Travis
Humble, Yufei Ding | Flexion: Adaptive In-Situ Encoding for On-Demand QEC in Ion Trap Systems | null | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | Recent advances in quantum hardware and quantum error correction (QEC) have
set the stage for early demonstrations of fault-tolerant quantum computing
(FTQC). A key near-term goal is to build a system capable of executing millions
of logical operations reliably -- referred to as a megaquop quantum computer
(MQC). In this work, we propose a novel system architecture targeting MQC on
trapped-ion quantum computers (TIQC), leveraging their ultra-high-fidelity
single-qubit gates (1Q) and efficient two-qubit (2Q) logical CNOT gates enabled
by the quantum charge-coupled device (QCCD) architecture with the ion shuttling
feature.
We propose Flexion, a hybrid encoding scheme that uses bare qubits for 1Q
gates and QEC-encoded logical qubits for 2Q gates. This approach avoids fully
encoding all qubits, eliminating the overhead of gate synthesis, teleportation,
and magic state distillation for non-Clifford gates. To support this, we design
(1) a low-noise conversion protocol between bare and logical qubits, (2) a
bare-logical hybrid instruction set architecture tailored for 2D grid-based
TIQC, and (3) a compiler that minimizes conversion cost and optimizes the
scheduling efficiency. We evaluate our approach on VQA and small-scale FTQC
benchmarks, showing that it achieves superior performance improvements with
significantly reduced resource overhead, offering a practical path toward early
FTQC on TIQC.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:44:47 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Yin",
"Keyi",
""
],
[
"Fang",
"Xiang",
""
],
[
"Chen",
"Zhuo",
""
],
[
"Li",
"Ang",
""
],
[
"Hayes",
"David",
""
],
[
"Kaur",
"Eneet",
""
],
[
"Nejabati",
"Reza",
""
],
[
"Haeffner",
"Hartmut",
""
],
[
"Campbell",
"Wes",
""
],
[
"Hudson",
"Eric",
""
],
[
"Palsberg",
"Jens",
""
],
[
"Humble",
"Travis",
""
],
[
"Ding",
"Yufei",
""
]
] |
2504.16304 | Claire Wonjeong Jo | Wonjeong Jo, Magdalena Wojcieszak | MetaHarm: Harmful YouTube Video Dataset Annotated by Domain Experts,
GPT-4-Turbo, and Crowdworkers | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Short video platforms, such as YouTube, Instagram, or TikTok, are used by
billions of users. These platforms expose users to harmful content, ranging
from clickbait or physical harms to hate or misinformation. Yet, we lack a
comprehensive understanding and measurement of online harm on short video
platforms. Toward this end, we present two large-scale datasets of multi-modal
and multi-categorical online harm: (1) 60,906 systematically selected
potentially harmful YouTube videos and (2) 19,422 videos annotated by three
labeling actors: trained domain experts, GPT-4-Turbo (using 14 image frames, 1
thumbnail, and text metadata), and crowdworkers (Amazon Mechanical Turk master
workers). The annotated dataset includes both (a) binary classification
(harmful vs. harmless) and (b) multi-label categorizations of six harm
categories: Information, Hate and harassment, Addictive, Clickbait, Sexual, and
Physical harms. Furthermore, the annotated dataset provides (1) ground truth
data with videos annotated consistently across (a) all three actors and (b) the
majority of the labeling actors, and (2) three data subsets labeled by
individual actors. These datasets are expected to facilitate future work on
online harm, aid in (multi-modal) classification efforts, and advance the
identification and potential mitigation of harmful content on video platforms.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:45:16 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Jo",
"Wonjeong",
""
],
[
"Wojcieszak",
"Magdalena",
""
]
] |
2504.16305 | Eduar Antonio Becerra Vergara | L. M. Becerra, E. A. Becerra-Vergara and F. D. Lora-Clavijo | Rotating neutron stars: anisotropy model comparison | 9 pages, 4 figures, accepted in Phys. Rev. D | null | null | null | astro-ph.HE astro-ph.SR gr-qc | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We build slowly rotating anisotropic neutron stars using the Hartle-Thorne
formalism, employing three distinct anisotropy models--Horvat, Bowers-Liang,
and a covariant model--to characterize the relationship between radial and
tangential pressure. We analyze how anisotropy influences stellar properties
such as the mass-radius relation, angular momentum, moment of inertia, and
binding energy. Our findings reveal that the maximum stable mass of
non-rotating stars depends strongly on the anisotropy model, with some
configurations supporting up to 60% more mass than their isotropic counterparts
with the same central density. This mass increase is most pronounced in the
models where the anisotropy grows toward the star's surface, as seen in the
covariant model. Furthermore, slowly rotating anisotropic stars adhere to
universal relations for the moment of inertia and binding energy, regardless of
the chosen anisotropy model or equation of state.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:47:03 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Becerra",
"L. M.",
""
],
[
"Becerra-Vergara",
"E. A.",
""
],
[
"Lora-Clavijo",
"F. D.",
""
]
] |
2504.16306 | Yanlin Zhou | Yanlin Zhou, Mostafa El-Khamy, Kee-Bong Song | Regularizing Differentiable Architecture Search with Smooth Activation | null | null | null | null | cs.NE cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Differentiable Architecture Search (DARTS) is an efficient Neural
Architecture Search (NAS) method but suffers from robustness, generalization,
and discrepancy issues. Many efforts have been made towards the performance
collapse issue caused by skip dominance with various regularization techniques
towards operation weights, path weights, noise injection, and super-network
redesign. It had become questionable at a certain point if there could exist a
better and more elegant way to retract the search to its intended goal -- NAS
is a selection problem. In this paper, we undertake a simple but effective
approach, named Smooth Activation DARTS (SA-DARTS), to overcome skip dominance
and discretization discrepancy challenges. By leveraging a smooth activation
function on architecture weights as an auxiliary loss, our SA-DARTS mitigates
the unfair advantage of weight-free operations, converging to fanned-out
architecture weight values, and can recover the search process from
skip-dominance initialization. Through theoretical and empirical analysis, we
demonstrate that the SA-DARTS can yield new state-of-the-art (SOTA) results on
NAS-Bench-201, classification, and super-resolution. Further, we show that
SA-DARTS can help improve the performance of SOTA models with fewer parameters,
such as Information Multi-distillation Network on the super-resolution task.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:49:38 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Zhou",
"Yanlin",
""
],
[
"El-Khamy",
"Mostafa",
""
],
[
"Song",
"Kee-Bong",
""
]
] |
2504.16307 | Sage Anastasi | Sage Anastasi, Giulio Dalla Riva | Schelling segregation dynamics in densely-connected social network
graphs | 17 pages, 13 figures, 5 tables | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Schelling segregation is a well-established model used to investigate the
dynamics of segregation in agent-based models. Since we consider segregation to
be key for the development of political polarisation, we are interested in what
insights it could give for this problem. We tested basic questions of
segregation on an agent-based social network model where agents' connections
were not restricted by their spatial position, and made the network graph much
denser than previous tests of Schelling segregation in social networks.
We found that a dense social network does not become as strongly segregated
as a sparse network, and that agents' numbers of same-group neighbours do not
greatly exceed their desired numbers (i.e. they do not end up more segregated
than they desire to be). Furthermore, we found that the network was very
difficult to polarise when one group was somewhat smaller than the other, and
that it became unstable when one group was extremely small, both of which
provide insights into real-world polarisation dynamics. Finally, we tested the
question of whether an increase in the minority group's desire for same-group
neighbours created more segregation than a similar increase for the majority
group -- the "paradox of weak minority preferences" -- and found mixed evidence
for this effect in a densely connected social network.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 22:55:15 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Anastasi",
"Sage",
""
],
[
"Riva",
"Giulio Dalla",
""
]
] |
2504.16308 | Luis Manuel | Adelina A. Orlandini, Germ\'an G. Blesio, Claudio J. Gazza, Luis O.
Manuel | Nontrivial entanglement passively mediated by a quenched magnetic
impurity | 6 pages, 4 figures, Supplemental Material | null | null | null | cond-mat.str-el | http://creativecommons.org/licenses/by/4.0/ | We investigate the entanglement properties of a Kondo system undergoing a
transition to a state with a quenched magnetic impurity, using the density
matrix renormalization group (DMRG) method. We focus on a two-channel spin-1
Kondo impurity with single-ion anisotropy, where a quantum phase transition
occurs between two topologically distinct local Fermi liquids. In the fully
screened Kondo phase, realized at lower anisotropies, the entangled region
surrounding the magnetic impurity mimics the Kondo screening cloud, although
its length does not follow the conventional behavior. In contrast, beyond the
transition, the system enters a non-Landau Fermi liquid phase with a markedly
different entanglement structure: as the impurity is quenched and disentangled
from the rest of the system due to the breakdown of the Kondo effect, the two
conduction channels coupled only through the impurity develop a significant
degree of entanglement with one another. Our findings demonstrate that a
quenched magnetic impurity can passively and efficiently mediate entanglement
between spatially separated conduction bands.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:01:28 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Orlandini",
"Adelina A.",
""
],
[
"Blesio",
"Germán G.",
""
],
[
"Gazza",
"Claudio J.",
""
],
[
"Manuel",
"Luis O.",
""
]
] |
2504.16309 | Guang Chai | Guang Chai, Zhibin Yu, Xiaofeng Wu, Giuseppe Caire | Discrete Codebook Design for Self-interference Suppression in mmWave
ISAC | null | null | null | null | eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents discrete codebook synthesis methods for self-interference
(SI) suppression in a mmWave device, designed to support FD ISAC. We formulate
a SINR maximization problem that optimizes the RX and TX codewords, aimed at
suppressing the near-field SI signal while maintaining the beamforming gain in
the far-field sensing directions. The formulation considers the practical
constraints of discrete RX and TX codebooks with quantized phase settings, as
well as a TX beamforming gain requirement in the specified communication
direction. Under an alternating optimization framework, the RX and TX codewords
are iteratively optimized, with one fixed while the other is optimized. When
the TX codeword is fixed, we show that the RX codeword optimization problem can
be formulated as an integer quadratic fractional programming (IQFP) problem.
Using Dinkelbach's algorithm, we transform the problem into a sequence of
subproblems in which the numerator and the denominator of the objective
function are decoupled. These subproblems, subject to discrete constraints, are
then efficiently solved by the spherical search (SS) method. This overall
approach is referred to as FP-SS. When the RX codeword is fixed, the TX
codeword optimization problem can similarly be formulated as an IQFP problem,
whereas an additional TX beamforming constraint for communication needs to be
considered. The problem is solved through Dinkelbach's transformation followed
by the constrained spherical search (CSS), and we refer to this approach as
FP-CSS. Finally, we integrate the FP-SS and FP-CSS methods into a joint RX-TX
codebook design approach. Simulations show that, the proposed FP-SS and FP-CSS
achieve the same SI suppression performance as the corresponding exhaustive
search method, but with much lower complexity. Furthermore, the alternating
optimization framework achieved even better SI suppression performance.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:01:44 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Chai",
"Guang",
""
],
[
"Yu",
"Zhibin",
""
],
[
"Wu",
"Xiaofeng",
""
],
[
"Caire",
"Giuseppe",
""
]
] |
2504.16310 | Leonardo Centellas-Claros | Leonardo Centellas-Claros, Juan J. Alonso-Lecaros, Juan Pablo Sandoval
Alcocer, Andres Neyem | Improving Automated Secure Code Reviews: A Synthetic Dataset for Code
Vulnerability Flaws | MSR 2025 - Registered Reports | null | null | null | cs.SE | http://creativecommons.org/licenses/by/4.0/ | Automation of code reviews using AI models has garnered substantial attention
in the software engineering community as a strategy to reduce the cost and
effort associated with traditional peer review processes. These models are
typically trained on extensive datasets of real-world code reviews that address
diverse software development concerns, including testing, refactoring, bug
fixes, performance optimization, and maintainability improvements. However, a
notable limitation of these datasets is the under representation of code
vulnerabilities, critical flaws that pose significant security risks, with
security-focused reviews comprising a small fraction of the data. This scarcity
of vulnerability-specific data restricts the effectiveness of AI models in
identifying and commenting on security-critical code. To address this issue, we
propose the creation of a synthetic dataset consisting of vulnerability-focused
reviews that specifically comment on security flaws. Our approach leverages
Large Language Models (LLMs) to generate human-like code review comments for
vulnerabilities, using insights derived from code differences and commit
messages. To evaluate the usefulness of the generated synthetic dataset, we
plan to use it to fine-tune three existing code review models. We anticipate
that the synthetic dataset will improve the performance of the original code
review models.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:07:24 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Centellas-Claros",
"Leonardo",
""
],
[
"Alonso-Lecaros",
"Juan J.",
""
],
[
"Alcocer",
"Juan Pablo Sandoval",
""
],
[
"Neyem",
"Andres",
""
]
] |
2504.16311 | Bruno Bauwens | Bruno Bauwens, Bruno Loff | Key-agreement exists if and only if the "interactive vs non interactive
Kolmogorov problem" is not in ioBPP: a short proof | null | null | null | null | cs.CC cs.IT math.IT | http://creativecommons.org/licenses/by/4.0/ | Ball, Liu, Mazor and Pass proved that the existence of key-agreement
protocols is equivalent to the hardness of a certain problem about interactive
Kolmogorov complexity. We generalize the statement and give a short proof of
the difficult implication.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:08:43 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Bauwens",
"Bruno",
""
],
[
"Loff",
"Bruno",
""
]
] |
2504.16312 | Zhangdie Yuan | Zhangdie Yuan and Andreas Vlachos | Capturing Symmetry and Antisymmetry in Language Models through
Symmetry-Aware Training Objectives | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Capturing symmetric (e.g., country borders another country) and antisymmetric
(e.g., parent_of) relations is crucial for a variety of applications. This
paper tackles this challenge by introducing a novel Wikidata-derived natural
language inference dataset designed to evaluate large language models (LLMs).
Our findings reveal that LLMs perform comparably to random chance on this
benchmark, highlighting a gap in relational understanding. To address this, we
explore encoder retraining via contrastive learning with k-nearest neighbors.
The retrained encoder matches the performance of fine-tuned classification
heads while offering additional benefits, including greater efficiency in
few-shot learning and improved mitigation of catastrophic forgetting.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:11:50 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Yuan",
"Zhangdie",
""
],
[
"Vlachos",
"Andreas",
""
]
] |
2504.16313 | Jos\'e Blanco Vald\'es | Jos\'e Blanco, Cuauhtemoc Campuzano, J. C. Corona-Oran and V\'ictor H.
C\'ardenas | Non-geometrical perturbation on homogeneous stealth dust | null | null | null | null | gr-qc hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we study a non-geometrical perturbation to the stealth field,
which means the background remains invariant. The stealh is homogeneous in a
universe whose source is dust and demand that perturbation unchanged density.
As a regular procedure, we introduce a parameter $\lambda$ to perturb the
scalar field equation and get an intriguing expression of the equation, similar
to a series expansion in $\lambda$. From this procedure, we distinguish and
approach to discriminate solutions, and the numerical solutions show that the
most significant contribution to the solution comes from the linear term of
$\lambda$.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:13:05 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Blanco",
"José",
""
],
[
"Campuzano",
"Cuauhtemoc",
""
],
[
"Corona-Oran",
"J. C.",
""
],
[
"Cárdenas",
"Víctor H.",
""
]
] |
2504.16314 | Dip Joti Paul | Dip Joti Paul, Tony X. Zhou, Karl K. Berggren | Photolithography-Compatible Three-Terminal Superconducting Switch for
Driving CMOS Loads | 7 figures | null | null | null | physics.app-ph | http://creativecommons.org/licenses/by/4.0/ | Superconducting devices have enabled breakthrough performance in quantum
sensing and ultra-low-power computing applications. However, the need for a
cryo-electronics platform that can interface superconducting electronics with
Complementary Metal-Oxide-Semiconductor (CMOS) devices has become increasingly
evident in many cutting-edge applications. In this work, we present a
three-terminal superconducting switch fabricated using photolithography, which
can directly interface with CMOS electronics. We investigate the switching
characteristics of this micron-width wire-based cryotron (wTron) by varying its
channel and gate dimensions and sweeping its terminal bias currents. The wTron
exhibits an output impedance exceeding 1 k$\Omega$ and demonstrates reduced
sensitivity to ambient magnetic noise, similar to its nanoscale predecessor,
the nanocryotron. In addition, its micron-width wires have switching currents
in the mA range, making wTrons well-suited for driving current-hungry resistive
loads and highly capacitive CMOS loads. We demonstrate the capability of wTron
to drive room-temperature CMOS electronics, including an LED and a MOSFET with
a gate capacitance of 500 pF. Finally, we discuss design considerations for
optimizing wTron device parameters to drive CMOS loads, such as MOSFETs, HEMTs,
and electro-optic modulators. Our analysis shows that wTron will facilitate the
interface between superconducting electronics and CMOS, thereby paving the way
for the development of foundry-process-compatible cryo-electronics ecosystems
to advance next-generation computing and quantum applications.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:13:56 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Paul",
"Dip Joti",
""
],
[
"Zhou",
"Tony X.",
""
],
[
"Berggren",
"Karl K.",
""
]
] |
2504.16315 | Sen Fang | Sen Fang, Chunyu Sui, Hongwei Yi, Carol Neidle, Dimitris N. Metaxas | SignX: The Foundation Model for Sign Recognition | null | null | null | null | cs.CV cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The complexity of sign language data processing brings many challenges. The
current approach to recognition of ASL signs aims to translate RGB sign
language videos through pose information into English-based ID glosses, which
serve to uniquely identify ASL signs. Note that there is no shared convention
for assigning such glosses to ASL signs, so it is essential that the same
glossing conventions are used for all of the data in the datasets that are
employed. This paper proposes SignX, a foundation model framework for sign
recognition. It is a concise yet powerful framework applicable to multiple
human activity recognition scenarios. First, we developed a Pose2Gloss
component based on an inverse diffusion model, which contains a multi-track
pose fusion layer that unifies five of the most powerful pose information
sources--SMPLer-X, DWPose, Mediapipe, PrimeDepth, and Sapiens
Segmentation--into a single latent pose representation. Second, we trained a
Video2Pose module based on ViT that can directly convert raw video into signer
pose representation. Through this 2-stage training framework, we enable sign
language recognition models to be compatible with existing pose formats, laying
the foundation for the common pose estimation necessary for sign recognition.
Experimental results show that SignX can recognize signs from sign language
video, producing predicted gloss representations with greater accuracy than has
been reported in prior work.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:23:39 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Fang",
"Sen",
""
],
[
"Sui",
"Chunyu",
""
],
[
"Yi",
"Hongwei",
""
],
[
"Neidle",
"Carol",
""
],
[
"Metaxas",
"Dimitris N.",
""
]
] |
2504.16316 | Hossein Shokouhinejad | Hossein Shokouhinejad, Griffin Higgins, Roozbeh Razavi-Far, Hesamodin
Mohammadian, Ali A. Ghorbani | On the Consistency of GNN Explanations for Malware Detection | null | null | null | null | cs.CR cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Control Flow Graphs (CFGs) are critical for analyzing program execution and
characterizing malware behavior. With the growing adoption of Graph Neural
Networks (GNNs), CFG-based representations have proven highly effective for
malware detection. This study proposes a novel framework that dynamically
constructs CFGs and embeds node features using a hybrid approach combining
rule-based encoding and autoencoder-based embedding. A GNN-based classifier is
then constructed to detect malicious behavior from the resulting graph
representations. To improve model interpretability, we apply state-of-the-art
explainability techniques, including GNNExplainer, PGExplainer, and
CaptumExplainer, the latter is utilized three attribution methods: Integrated
Gradients, Guided Backpropagation, and Saliency. In addition, we introduce a
novel aggregation method, called RankFusion, that integrates the outputs of the
top-performing explainers to enhance the explanation quality. We also evaluate
explanations using two subgraph extraction strategies, including the proposed
Greedy Edge-wise Composition (GEC) method for improved structural coherence. A
comprehensive evaluation using accuracy, fidelity, and consistency metrics
demonstrates the effectiveness of the proposed framework in terms of accurate
identification of malware samples and generating reliable and interpretable
explanations.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:25:12 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Shokouhinejad",
"Hossein",
""
],
[
"Higgins",
"Griffin",
""
],
[
"Razavi-Far",
"Roozbeh",
""
],
[
"Mohammadian",
"Hesamodin",
""
],
[
"Ghorbani",
"Ali A.",
""
]
] |
2504.16317 | Wayne Zhao | Wayne Zhao (1, 2, 3), Ruo Xi Yang (2), Aaron D. Kaplan (2), Kristin A.
Persson (1, 2, 3) ((1) University of California Berkeley, (2) Lawrence
Berkeley National Laboratory, (3) Liquid Sunlight Alliance) | Accelerated discovery of cost-effective photoabsorber materials for
near-infrared ({\lambda}=1600 nm) photodetector applications | null | null | null | null | cond-mat.mtrl-sci physics.optics | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current infrared sensing devices are based on costly materials with
relatively few viable alternatives known. To identify promising candidate
materials for infrared photodetection, we have developed a high-throughput
screening methodology based on high-accuracy r$^2$SCAN and HSE calculations in
density functional theory. Using this method, we identify ten already
synthesized materials between the inverse perovskite family, barium silver
pnictide family, the alkaline pnictide family, and ZnSnAs$_2$ as top
candidates. Among these, ZnSnAs$_2$ emerges as the most promising candidate due
to its experimentally verified band gap of 0.74 eV at 0 K, and its
cost-effective synthesis through Bridgman growth. BaAgP also shows potential
with an HSE-calculated band gap of 0.64 eV, although further experimental
validation is required. Lastly, we discover an additional material, Ca$_3$BiP,
which has not been previously synthesized, but exhibits a promising optical
spectra and a band gap of 0.56 eV. The method applied in this work is
sufficiently general to screen wider bandgap materials in high-throughput and
now extended to narrow-band gap materials.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:25:15 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Zhao",
"Wayne",
""
],
[
"Yang",
"Ruo Xi",
""
],
[
"Kaplan",
"Aaron D.",
""
],
[
"Persson",
"Kristin A.",
""
]
] |
2504.16318 | Kisung You | Kisung You | Semantics at an Angle: When Cosine Similarity Works Until It Doesn't | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Cosine similarity has become a standard metric for comparing embeddings in
modern machine learning. Its scale-invariance and alignment with model training
objectives have contributed to its widespread adoption. However, recent studies
have revealed important limitations, particularly when embedding norms carry
meaningful semantic information. This informal article offers a reflective and
selective examination of the evolution, strengths, and limitations of cosine
similarity. We highlight why it performs well in many settings, where it tends
to break down, and how emerging alternatives are beginning to address its blind
spots. We hope to offer a mix of conceptual clarity and practical perspective,
especially for quantitative scientists who think about embeddings not just as
vectors, but as geometric and philosophical objects.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:31:32 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"You",
"Kisung",
""
]
] |
2504.16319 | Connor Blais | Connor Blais, Md Abdul Baset Sarker, Masudul H. Imtiaz | Vision Controlled Orthotic Hand Exoskeleton | null | null | null | null | cs.RO cs.SY eess.IV eess.SY | http://creativecommons.org/licenses/by/4.0/ | This paper presents the design and implementation of an AI vision-controlled
orthotic hand exoskeleton to enhance rehabilitation and assistive functionality
for individuals with hand mobility impairments. The system leverages a Google
Coral Dev Board Micro with an Edge TPU to enable real-time object detection
using a customized MobileNet\_V2 model trained on a six-class dataset. The
exoskeleton autonomously detects objects, estimates proximity, and triggers
pneumatic actuation for grasp-and-release tasks, eliminating the need for
user-specific calibration needed in traditional EMG-based systems. The design
prioritizes compactness, featuring an internal battery. It achieves an 8-hour
runtime with a 1300 mAh battery. Experimental results demonstrate a 51ms
inference speed, a significant improvement over prior iterations, though
challenges persist in model robustness under varying lighting conditions and
object orientations. While the most recent YOLO model (YOLOv11) showed
potential with 15.4 FPS performance, quantization issues hindered deployment.
The prototype underscores the viability of vision-controlled exoskeletons for
real-world assistive applications, balancing portability, efficiency, and
real-time responsiveness, while highlighting future directions for model
optimization and hardware miniaturization.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:36:46 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Blais",
"Connor",
""
],
[
"Sarker",
"Md Abdul Baset",
""
],
[
"Imtiaz",
"Masudul H.",
""
]
] |
2504.16320 | Yaofeng Cheng | Yaofeng Cheng, Fusheng Zha, Wei Guo, Pengfei Wang, Chao Zeng, Lining
Sun and Chenguang Yang | PCF-Grasp: Converting Point Completion to Geometry Feature to Enhance
6-DoF Grasp | null | null | null | null | cs.RO cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The 6-Degree of Freedom (DoF) grasp method based on point clouds has shown
significant potential in enabling robots to grasp target objects. However, most
existing methods are based on the point clouds (2.5D points) generated from
single-view depth images. These point clouds only have one surface side of the
object providing incomplete geometry information, which mislead the grasping
algorithm to judge the shape of the target object, resulting in low grasping
accuracy. Humans can accurately grasp objects from a single view by leveraging
their geometry experience to estimate object shapes. Inspired by humans, we
propose a novel 6-DoF grasping framework that converts the point completion
results as object shape features to train the 6-DoF grasp network. Here, point
completion can generate approximate complete points from the 2.5D points
similar to the human geometry experience, and converting it as shape features
is the way to utilize it to improve grasp efficiency. Furthermore, due to the
gap between the network generation and actual execution, we integrate a score
filter into our framework to select more executable grasp proposals for the
real robot. This enables our method to maintain a high grasp quality in any
camera viewpoint. Extensive experiments demonstrate that utilizing complete
point features enables the generation of significantly more accurate grasp
proposals and the inclusion of a score filter greatly enhances the credibility
of real-world robot grasping. Our method achieves a 17.8\% success rate higher
than the state-of-the-art method in real-world experiments.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:37:05 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Cheng",
"Yaofeng",
""
],
[
"Zha",
"Fusheng",
""
],
[
"Guo",
"Wei",
""
],
[
"Wang",
"Pengfei",
""
],
[
"Zeng",
"Chao",
""
],
[
"Sun",
"Lining",
""
],
[
"Yang",
"Chenguang",
""
]
] |
2504.16321 | Aaron (Louie) Putterman | Sanjeev Khanna, Aaron Putterman, Madhu Sudan | Near-optimal Hypergraph Sparsification in Insertion-only and
Bounded-deletion Streams | null | null | null | null | cs.DS | http://creativecommons.org/licenses/by-nc-sa/4.0/ | We study the problem of constructing hypergraph cut sparsifiers in the
streaming model where a hypergraph on $n$ vertices is revealed either via an
arbitrary sequence of hyperedge insertions alone ({\em insertion-only}
streaming model) or via an arbitrary sequence of hyperedge insertions and
deletions ({\em dynamic} streaming model). For any $\epsilon \in (0,1)$, a $(1
\pm \epsilon)$ hypergraph cut-sparsifier of a hypergraph $H$ is a reweighted
subgraph $H'$ whose cut values approximate those of $H$ to within a $(1 \pm
\epsilon)$ factor. Prior work shows that in the static setting, one can
construct a $(1 \pm \epsilon)$ hypergraph cut-sparsifier using
$\tilde{O}(nr/\epsilon^2)$ bits of space [Chen-Khanna-Nagda FOCS 2020], and in
the setting of dynamic streams using $\tilde{O}(nr\log m/\epsilon^2)$ bits of
space [Khanna-Putterman-Sudan FOCS 2024]; here the $\tilde{O}$ notation hides
terms that are polylogarithmic in $n$, and we use $m$ to denote the total
number of hyperedges in the hypergraph. Up until now, the best known space
complexity for insertion-only streams has been the same as that for the dynamic
streams. This naturally poses the question of understanding the complexity of
hypergraph sparsification in insertion-only streams.
Perhaps surprisingly, in this work we show that in \emph{insertion-only}
streams, a $(1 \pm \epsilon)$ cut-sparsifier can be computed in
$\tilde{O}(nr/\epsilon^2)$ bits of space, \emph{matching the complexity} of the
static setting. As a consequence, this also establishes an $\Omega(\log m)$
factor separation between the space complexity of hypergraph cut sparsification
in insertion-only streams and dynamic streams, as the latter is provably known
to require $\Omega(nr \log m)$ bits of space.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:39:35 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Khanna",
"Sanjeev",
""
],
[
"Putterman",
"Aaron",
""
],
[
"Sudan",
"Madhu",
""
]
] |
2504.16322 | Haoyuan Zhao | Haoyuan Zhao, Jianxin Shi, Guanzhen Wu, Hao Fang, Yi Ching Chou, Long
Chen, Feng Wang, Jiangchuan Liu | BAROC: Concealing Packet Losses in LSNs with Bimodal Behavior Awareness
for Livecast Ingestion | This is the preprint version of the paper accepted to IEEE INFOCOM
2025 | null | null | null | cs.NI cs.MM | http://creativecommons.org/licenses/by/4.0/ | The advent of Low-Earth Orbit satellite networks (LSNs), exemplified by
initiatives like \emph{Starlink}, \emph{OneWeb} and \emph{Kuiper}, has ushered
in a new era of ``Internet from Space" global connectivity. Recent studies have
shown that LSNs are capable of providing unprecedented download capacity and
low latency to support Livecast viewing. However, Livecast ingestion still
faces significant challenges, such as limited uplink capacity, bandwidth
degradation, and the burst of packet loss due to frequent satellite
reallocations, which cause previous recovery and adaptive solutions to be
inferior under this new scenario. In this paper, we conduct an in-depth
measurement study dedicated to understanding the implications of satellite
reallocations, which reveals that the network status during reallocations with
network anomalies exhibits a different distribution, leading to bimodal
behaviors on the overall network performance. Motivated by this finding, we
propose BAROC, a framework that can effectively conceal burst packet losses by
combining a novel proposed MTP-Informer with bimodal behavior awareness during
satellite reallocation. BAROC enhances video QoE on the server side by
addressing the above challenges and jointly determining the optimal video
encoding and recovery parameters. Our extensive evaluation shows that BAROC
outperforms other video delivery recovery approaches, achieving an average PSNR
improvement of $1.95$ dB and a maximum of $3.44$ dB, along with enhancements in
frame rate and parity packet utilization. Additionally, a comprehensive
ablation study is conducted to assess the effectiveness of MTP-Informer and
components in BAROC.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:43:39 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Zhao",
"Haoyuan",
""
],
[
"Shi",
"Jianxin",
""
],
[
"Wu",
"Guanzhen",
""
],
[
"Fang",
"Hao",
""
],
[
"Chou",
"Yi Ching",
""
],
[
"Chen",
"Long",
""
],
[
"Wang",
"Feng",
""
],
[
"Liu",
"Jiangchuan",
""
]
] |
2504.16323 | Merve Cerit | Merve Cerit, Eric Zelikman, Mu-Jung Cho, Thomas N. Robinson, Byron
Reeves, Nilam Ram, Nick Haber | Media Content Atlas: A Pipeline to Explore and Investigate
Multidimensional Media Space using Multimodal LLMs | Accepted to CHI 2025, in press. See the project page at
mediacontentatlas.github.io | null | 10.1145/3706599.3720055 | null | cs.HC cs.SI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | As digital media use continues to evolve and influence various aspects of
life, developing flexible and scalable tools to study complex media experiences
is essential. This study introduces the Media Content Atlas (MCA), a novel
pipeline designed to help researchers investigate large-scale screen data
beyond traditional screen-use metrics. Leveraging multimodal large language
models (MLLMs), MCA enables moment-by-moment content analysis, content-based
clustering, topic modeling, image retrieval, and interactive visualizations.
Evaluated on 1.12 million smartphone screenshots continuously captured during
screen use from 112 adults over an entire month, MCA facilitates open-ended
exploration and hypothesis generation as well as hypothesis-driven
investigations at an unprecedented scale. Expert evaluators underscored its
usability and potential for research and intervention design, with clustering
results rated 96% relevant and descriptions 83% accurate. By bridging
methodological possibilities with domain-specific needs, MCA accelerates both
inductive and deductive inquiry, presenting new opportunities for media and HCI
research.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:44:24 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Cerit",
"Merve",
""
],
[
"Zelikman",
"Eric",
""
],
[
"Cho",
"Mu-Jung",
""
],
[
"Robinson",
"Thomas N.",
""
],
[
"Reeves",
"Byron",
""
],
[
"Ram",
"Nilam",
""
],
[
"Haber",
"Nick",
""
]
] |
2504.16324 | Jaewan Hong | Jaewan Hong, Marcos K. Aguilera, Emmanuel Amaro, Vincent Liu, Aurojit
Panda, Ion Stoica | The Dawn of Disaggregation and the Coherence Conundrum: A Call for
Federated Coherence | null | null | null | null | cs.DC cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Disaggregated memory is an upcoming data center technology that will allow
nodes (servers) to share data efficiently. Sharing data creates a debate on the
level of cache coherence the system should provide. While current proposals aim
to provide coherence for all or parts of the disaggregated memory, we argue
that this approach is problematic, because of scalability limitations and
hardware complexity. Instead, we propose and formally define federated
coherence, a model that provides coherence only within nodes, not across nodes.
Federated coherence can use current intra-node coherence provided by processors
without requiring expensive mechanisms for inter-node coherence. Developers can
use federated coherence with a few simple programming paradigms and a
synchronization library. We sketch some potential applications.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:52:13 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Hong",
"Jaewan",
""
],
[
"Aguilera",
"Marcos K.",
""
],
[
"Amaro",
"Emmanuel",
""
],
[
"Liu",
"Vincent",
""
],
[
"Panda",
"Aurojit",
""
],
[
"Stoica",
"Ion",
""
]
] |
2504.16325 | Carlos Gaston Ferrarra | Y. Ricardo Espinosa and C. Manuel Carlevaro and C. Gast\'on Ferrara | Molecular Mechanisms Underlying the Effects of Urea and the Structural
Dynamics of Bovine Serum Albumin | 9 pages, 7 figures | null | null | null | physics.bio-ph | http://creativecommons.org/licenses/by/4.0/ | The disruption of protein structures by denaturants like urea is well
studied, though its molecular mechanisms remain unclear. Using Molecular
Dynamics (MD) simulations, we investigated how urea affects the structural
stability of Bovine Serum Albumin (BSA) at concentrations from 0 M to 5 M. Our
results reveal that urea induces a dehydration/rehydration cycle, characterized
by displacement and partial replacement of water molecules in BSAs hydration
shell. At low concentrations, urea reduces protein/water hydrogen bonds while
enhancing protein-urea interactions. At higher concentrations, urea aggregation
limits these interactions, promoting rehydration and changes in tertiary
structure, while secondary structure remains largely intact. These findings
provide insights into the mechanisms of protein denaturation and stability by
urea.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 23:53:43 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Espinosa",
"Y. Ricardo",
""
],
[
"Carlevaro",
"C. Manuel",
""
],
[
"Ferrara",
"C. Gastón",
""
]
] |
2504.16326 | Roman Kositsyn | Roman Kositsyn | Deformation Theory for $(\infty,n)$-categories | 82 pages | null | null | null | math.CT | http://creativecommons.org/licenses/by/4.0/ | For an $(\infty,n)$-category $\mathscr E$ we define an $(\infty,1)$ category
$\mathrm{TwAr}(\mathscr E)$ and provide an isomorphism between the
stabilization of the overcategory of $\mathscr E$ in
$\mathrm{Cat}_{(\infty,n)}$ and the $\infty$-category of spectrum-valued
functors on $\mathrm{TwAr}(\mathscr E)$. We use this to develop the deformation
theory of $(\infty,n)$-categories and apply it to given an $\infty$-categorical
characterization of lax-idempotent monads.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 00:00:40 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Kositsyn",
"Roman",
""
]
] |
2504.16327 | Junyao Zhao | Junyao Zhao | Universal Online Contention Resolution with Preselected Order | ICALP 2025 | null | null | null | cs.DS cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online contention resolution scheme (OCRS) is a powerful technique for online
decision making, which--in the case of matroids--given a matroid and a prior
distribution of active elements, selects a subset of active elements that
satisfies the matroid constraint in an online fashion. OCRS has been studied
mostly for product distributions in the literature. Recently, universal OCRS,
that works even for correlated distributions, has gained interest, because it
naturally generalizes the classic notion, and its existence in the random-order
arrival model turns out to be equivalent to the matroid secretary conjecture.
However, currently very little is known about how to design universal OCRSs for
any arrival model. In this work, we consider a natural and relatively flexible
arrival model, where the OCRS is allowed to preselect (i.e., non-adaptively
select) the arrival order of the elements, and within this model, we design
simple and optimal universal OCRSs that are computationally efficient. In the
course of deriving our OCRSs, we also discover an efficient reduction from
universal online contention resolution to the matroid secretary problem for any
arrival model, answering a question from Dughmi (2020).
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 00:09:58 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Zhao",
"Junyao",
""
]
] |
2504.16328 | Ehsan Taheri | Nicholas P. Nurre and Ehsan Taheri | Eigendecomposition Parameterization of Penalty Matrices for Enhanced
Control Design: Aerospace Applications | 39 pages, 18 figures | null | null | null | math.OC cs.RO cs.SY eess.SY | http://creativecommons.org/licenses/by/4.0/ | Modern control algorithms require tuning of square weight/penalty matrices
appearing in quadratic functions/costs to improve performance and/or stability
output. Due to simplicity in gain-tuning and enforcing positive-definiteness,
diagonal penalty matrices are used extensively in control methods such as
linear quadratic regulator (LQR), model predictive control, and Lyapunov-based
control. In this paper, we propose an eigendecomposition approach to
parameterize penalty matrices, allowing positive-definiteness with non-zero
off-diagonal entries to be implicitly satisfied, which not only offers notable
computational and implementation advantages, but broadens the class of
achievable controls. We solve three control problems: 1) a variation of
Zermelo's navigation problem, 2) minimum-energy spacecraft attitude control
using both LQR and Lyapunov-based methods, and 3) minimum-fuel and minimum-time
Lyapunov-based low-thrust trajectory design. Particle swarm optimization is
used to optimize the decision variables, which will parameterize the penalty
matrices. The results demonstrate improvements of up to 65% in the performance
objective in the example problems utilizing the proposed method.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 00:10:06 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Nurre",
"Nicholas P.",
""
],
[
"Taheri",
"Ehsan",
""
]
] |
2504.16329 | Pratik Mullick | Piotr Nyczka, Pratik Mullick | Analyzing stripes in crossing pedestrian flows using temporal matrices
and a geometric model | 38 pages, 13 figures | null | null | null | physics.soc-ph | http://creativecommons.org/licenses/by/4.0/ | Understanding pattern formation in crossing pedestrian flows is essential for
analyzing and managing high-density crowd dynamics in urban environments. This
study presents two complementary methodological approaches to detect and
characterize stripe formations, an emergent structure observed when two
pedestrian groups cross at various angles. First, we propose a matrix-based
method that utilizes time-resolved trajectory data to determine the relative
crossing order of pedestrians from opposing groups. By identifying points of
minimal spatial separation between individuals and analyzing associated time
differences, we construct a crossing matrix that captures the sequence and
composition of stripes. Second, we introduce a geometric model based on
elliptical approximations of pedestrian groups, enabling analytical prediction
of two key macroscopic quantities: the number of stripes and the interaction
time between groups. The model captures how these quantities vary with the
crossing angle and shows strong agreement with experimental data. Further
analysis reveals that group elongation during crossing correlates with the
vertical cross-section of the elliptical shape. These methods provide effective
tools for analyzing large-scale movement datasets, informing the design of
public spaces, and calibrating mechanistic models. The study also presents
hypotheses about pattern transitions in continuous pedestrian streams,
suggesting promising directions for future research on collective motion under
varying flow geometries and densities.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 00:17:54 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Nyczka",
"Piotr",
""
],
[
"Mullick",
"Pratik",
""
]
] |
2504.16330 | Andr\'es G\'omez | Soobin Choi, Valentina Cepeda, Andres Gomez, Shaoning Han | Rank-one convexification for quadratic optimization problems with step
function penalties | null | null | null | null | math.OC | http://creativecommons.org/licenses/by/4.0/ | We investigate convexification for convex quadratic optimization with step
function penalties. Such problems can be cast as mixed-integer quadratic
optimization problems, where binary variables are used to encode the non-convex
step function. First, we derive the convex hull for the epigraph of a quadratic
function defined by a rank-one matrix and step function penalties. Using this
rank-one convexification, we develop copositive and semi-definite relaxations
for general convex quadratic functions. Leveraging these findings, we construct
convex formulations to the support vector machine problem with 0--1 loss and
show that they yield robust estimators in settings with anomalies and outliers.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 00:24:48 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Choi",
"Soobin",
""
],
[
"Cepeda",
"Valentina",
""
],
[
"Gomez",
"Andres",
""
],
[
"Han",
"Shaoning",
""
]
] |
2504.16331 | Jie JW Wu PhD | Jie JW Wu, Manav Chaudhary, Davit Abrahamyan, Arhaan Khaku, Anjiang
Wei, Fatemeh H. Fard | ClarifyCoder: Clarification-Aware Fine-Tuning for Programmatic Problem
Solving | 12 pages, 5 figures, 6 tables | null | null | null | cs.SE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large language models (LLMs) have demonstrated remarkable capabilities in
code generation tasks. However, a significant gap remains between their current
performance and that of expert software engineers. A key differentiator is that
human engineers actively seek clarification when faced with ambiguous
requirements, while LLMs typically generate code regardless of uncertainties in
the problem description. We present ClarifyCoder, a novel framework with
synthetic data generation and instruction-tuning that enables LLMs to identify
ambiguities and request clarification before proceeding with code generation.
While recent work has focused on LLM-based agents for iterative code
generation, we argue that the fundamental ability to recognize and query
ambiguous requirements should be intrinsic to the models themselves. Our
approach consists of two main components: (1) a data synthesis technique that
augments existing programming datasets with scenarios requiring clarification
to generate clarification-aware training data, and (2) a fine-tuning strategy
that teaches models to prioritize seeking clarification over immediate code
generation when faced with incomplete or ambiguous requirements. We further
provide an empirical analysis of integrating ClarifyCoder with standard
fine-tuning for a joint optimization of both clarify-awareness and coding
ability. Experimental results demonstrate that ClarifyCoder significantly
improves the communication capabilities of Code LLMs through meaningful
clarification dialogues while maintaining code generation capabilities.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 00:34:39 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Wu",
"Jie JW",
""
],
[
"Chaudhary",
"Manav",
""
],
[
"Abrahamyan",
"Davit",
""
],
[
"Khaku",
"Arhaan",
""
],
[
"Wei",
"Anjiang",
""
],
[
"Fard",
"Fatemeh H.",
""
]
] |
2504.16332 | Juhyeok Lee | Juhyeok Lee, Samuel W. Song, Min Gee Cho, Georgios Varnavides,
Stephanie M. Ribet, Colin Ophus, Mary C. Scott, Michael L. Whittaker | PhaseT3M: 3D Imaging at 1.6 {\AA} Resolution via Electron
Cryo-Tomography with Nonlinear Phase Retrieval | 26 pages, 5 figures, 8 supplementary figures | null | null | null | cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Electron cryo-tomography (cryo-ET) enables 3D imaging of complex,
radiation-sensitive structures with molecular detail. However, image contrast
from the interference of scattered electrons is nonlinear with atomic density
and multiple scattering further complicates interpretation. These effects
degrade resolution, particularly in conventional reconstruction algorithms,
which assume linearity. Particle averaging can reduce such issues but is
unsuitable for heterogeneous or dynamic samples ubiquitous in biology,
chemistry, and materials sciences. Here, we develop a phase retrieval-based
cryo-ET method, PhaseT3M. We experimentally demonstrate its application to a ~7
nm Co3O4 nanoparticle on ~30 nm carbon substrate, achieving a maximum
resolution of 1.6 {\AA}, surpassing conventional limits using standard cryo-TEM
equipment. PhaseT3M uses a multislice model for multiple scattering and
Bayesian optimization for alignment and computational aberration correction,
with a positivity constraint to recover 'missing wedge' information. Applied
directly to biological particles, it enhances resolution and reduces artifacts,
establishing a new standard for routine 3D imaging of complex,
radiation-sensitive materials.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 00:53:39 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Lee",
"Juhyeok",
""
],
[
"Song",
"Samuel W.",
""
],
[
"Cho",
"Min Gee",
""
],
[
"Varnavides",
"Georgios",
""
],
[
"Ribet",
"Stephanie M.",
""
],
[
"Ophus",
"Colin",
""
],
[
"Scott",
"Mary C.",
""
],
[
"Whittaker",
"Michael L.",
""
]
] |
2504.16333 | Tomoki Hiraoka | Tomoki Hiraoka, Sandra Nestler, Wentao Zhang, Simon Rossel, Hassan A.
Hafez, Savio Fabretti, Heike Schloerb, Andy Thomas, and Dmitry Turchinovich | Terahertz field effect in a two-dimensional semiconductor MoS2 | Manuscript 16 pages 5 figures. Supplementary Information 50 pages | null | null | null | cond-mat.mtrl-sci cond-mat.mes-hall physics.optics | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Layered two-dimensional (2D) materials, with their atomic-scale thickness and
tunable electronic, optical, and mechanical properties, open many promising
pathways to significantly advance modern electronics. The field effect caused
by a strong electric field, typically of MV/cm level, applied perpendicular to
the material layers, is a highly effective method for controlling these
properties. Field effect allows the regulation of the electron flow in
transistor channels, improves the photodetector efficiency and spectral range,
and facilitates the exploration of novel exotic quantum phenomena in 2D
materials. However, existing approaches to induce the field effect in 2D
materials utilize circuit-based electrical gating methods fundamentally limited
to microwave response rates. Device-compatible ultrafast, sub-picosecond
control needed for modern technology and basic science applications still
remains a challenge. In this study, we demonstrate such an ultrafast field
effect in atomically thin MoS2, an archetypal 2D semiconductor, embedded in a
hybrid 3D-2D terahertz nanoantenna structure. This nanoantenna efficiently
converts an incident terahertz electric field into the vertical ultrafast
gating field in MoS2 while simultaneously enhancing it to the required MV/cm
level. We observe the terahertz field effect optically as coherent
terahertz-induced Stark shift of characteristic exciton resonances in MoS2. Our
results enable novel developments in technology and the fundamental science of
2D materials, where the terahertz field effect is crucial.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 00:58:01 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Hiraoka",
"Tomoki",
""
],
[
"Nestler",
"Sandra",
""
],
[
"Zhang",
"Wentao",
""
],
[
"Rossel",
"Simon",
""
],
[
"Hafez",
"Hassan A.",
""
],
[
"Fabretti",
"Savio",
""
],
[
"Schloerb",
"Heike",
""
],
[
"Thomas",
"Andy",
""
],
[
"Turchinovich",
"Dmitry",
""
]
] |
2504.16334 | Kamran Majid | Kamran Majid | Deep Neural Network Emulation of the Quantum-Classical Transition via
Learned Wigner Function Dynamics | null | null | null | null | quant-ph cs.LG | http://creativecommons.org/licenses/by/4.0/ | The emergence of classical behavior from quantum mechanics as Planck's
constant $\hbar$ approaches zero remains a fundamental challenge in physics
[1-3]. This paper introduces a novel approach employing deep neural networks to
directly learn the dynamical mapping from initial quantum state parameters (for
Gaussian wave packets of the one-dimensional harmonic oscillator) and $\hbar$
to the parameters of the time-evolved Wigner function in phase space [4-6]. A
comprehensive dataset of analytically derived time-evolved Wigner functions was
generated, and a deep feedforward neural network with an enhanced architecture
was successfully trained for this prediction task, achieving a final training
loss of ~ 0.0390. The network demonstrates a significant and previously
unrealized ability to accurately capture the underlying mapping of the Wigner
function dynamics. This allows for a direct emulation of the quantum-classical
transition by predicting the evolution of phase-space distributions as $\hbar$
is systematically varied. The implications of these findings for providing a
new computational lens on the emergence of classicality are discussed,
highlighting the potential of this direct phase-space learning approach for
studying fundamental aspects of quantum mechanics. This work presents a
significant advancement beyond previous efforts that focused on learning
observable mappings [7], offering a direct route via the phase-space
representation.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 00:58:11 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Majid",
"Kamran",
""
]
] |
2504.16335 | Jiuzhouf Fu | Jiuzhou Fu, Dongfang Zhao | MPAD: A New Dimension-Reduction Method for Preserving Nearest Neighbors
in High-Dimensional Vector Search | null | null | null | null | cs.IR cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | High-dimensional vector embeddings are widely used in retrieval systems, yet
dimensionality reduction (DR) is seldom applied due to its tendency to distort
nearest-neighbor (NN) structure critical for search. Existing DR techniques
such as PCA and UMAP optimize global or manifold-preserving criteria, rather
than retrieval-specific objectives. We present MPAD: Maximum Pairwise Absolute
Difference, an unsupervised DR method that explicitly preserves approximate NN
relations by maximizing the margin between k-NNs and non-k-NNs under a soft
orthogonality constraint. This design enables MPAD to retain ANN-relevant
geometry without supervision or changes to the original embedding model.
Experiments across multiple domains show that MPAD consistently outperforms
standard DR methods in preserving neighborhood structure, enabling more
accurate search in reduced dimensions.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 00:59:00 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Fu",
"Jiuzhou",
""
],
[
"Zhao",
"Dongfang",
""
]
] |
2504.16336 | Hiraku Nozawa | Masanori Adachi, Yoshifumi Matsuda, Hiraku Nozawa | Harmonic measures and rigidity for transverse foliations on Seifert
$3$-manifolds | 20 pages, one figure | null | null | null | math.GT | http://creativecommons.org/licenses/by/4.0/ | Thurston proposed, in part of an unfinished manuscript, to study surface
group actions on $S^1$ by using an $S^1$-connection on the suspension bundle
obtained from a harmonic measure. Following the approach and previous work of
the authors, we study the actions of general lattices of $\mathrm{PSU}(1,1)$ on
$S^1$. We prove the Gauss--Bonnet formula for the $S^1$-connection associated
with a harmonic measure, and show that a harmonic measure on the suspension
bundle of the action with maximal Euler number has rigidity, having a form
closely related to the Poisson kernel. As an application, we prove a
semiconjugacy rigidity for foliations with maximal Euler number, which is
analogous to theorems due to Matsumoto, Minakawa and Burger--Iozzi--Wienhard.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 01:01:39 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Adachi",
"Masanori",
""
],
[
"Matsuda",
"Yoshifumi",
""
],
[
"Nozawa",
"Hiraku",
""
]
] |
2504.16337 | Rayff de Souza | Rayff de Souza, Gabriel Rodrigues and Jailson Alcaniz | Thawing quintessence and transient cosmic acceleration in light of DESI | 5 pages, 2 figures, 1 table | null | null | null | astro-ph.CO hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent analysis of the DESI Collaboration challenges the $\Lambda$-Cold Dark
Matter ($\Lambda$CDM) model, suggesting evidence for a dynamic dark energy.
These results are obtained in the context of generic parameterizations of the
dark energy equation of state (EoS), which better fit the data when they
exhibit an unphysical phantom behavior in the past. In this paper, we briefly
analyze how ambiguous this latter conclusion can be in light of the background
degeneracy between EoS parameterizations and minimally coupled quintessence
scenarios. We then investigate whether the current observational data can be
accommodated with a non-phantom, thawing dark energy EoS, typical of a broad
class of quintessence models. We show that the thawing behavior of this EoS
outperforms the CPL parameterization and is statistically competitive with
$\Lambda$CDM while predicting cosmic acceleration as a transient phenomenon.
Such a dynamic behavior aligns with theoretical arguments from string theory
and offers a way out of the trans-Planckian problem that challenges the
ever-accelerated $\Lambda$CDM paradigm.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 01:03:07 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"de Souza",
"Rayff",
""
],
[
"Rodrigues",
"Gabriel",
""
],
[
"Alcaniz",
"Jailson",
""
]
] |
2504.16338 | Dale Muccignat Mr | G. J. Boyle, N. A. Garland, D. L. Muccignat, I. Simonovi\'c, D.
Bo\v{s}njakovi\'c, S. Dujko and R. D. White | Review of the experimental and theoretical landscape of electron
transport in noble liquids | null | null | null | null | physics.app-ph | http://creativecommons.org/licenses/by/4.0/ | We present a review of the current experimental and theoretical understanding
of electron transport in noble liquids. Special attention is given to recent
measurements that coincide with the development of time projection chambers
(TPCs) using liquid xenon and argon as detector media. To enable transparent
benchmarking of simulations and to facilitate the comparison between early
studies and modern TPC data, we introduce a new open-access database of
electron mobility and diffusion measurements. In particular, we emphasize the
transition to large-scale detector designs which incorporate extended drift
distances alongside improved purity control and field uniformity. On the
theoretical side, we contrast empirical transport models with ab initio
approaches, highlighting our recent efforts to incorporate low-energy,
liquid-specific scattering phenomena, including coherent scattering,
polarization screening, and bulk potential modifications. While elastic
transport has seen substantial theoretical progress, inelastic processes in
liquids, including ionization, exciton formation and interband transitions,
remain poorly understood due to the lack of experimental cross sections and
validated models. We also discuss the applications and challenges of modeling
scintillation, doped and mixture-liquid targets, and gas-liquid interface
behavior, all of which are critical for the design and optimization of
next-generation detectors.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 01:22:43 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Boyle",
"G. J.",
""
],
[
"Garland",
"N. A.",
""
],
[
"Muccignat",
"D. L.",
""
],
[
"Simonović",
"I.",
""
],
[
"Bošnjaković",
"D.",
""
],
[
"Dujko",
"S.",
""
],
[
"White",
"R. D.",
""
]
] |
2504.16339 | Cong Guo | Cong Guo, Chiyue Wei, Jiaming Tang, Bowen Duan, Song Han, Hai Li,
Yiran Chen | Transitive Array: An Efficient GEMM Accelerator with Result Reuse | ISCA 2025 | null | null | null | cs.AR | http://creativecommons.org/licenses/by/4.0/ | Deep Neural Networks (DNNs) and Large Language Models (LLMs) have
revolutionized artificial intelligence, yet their deployment faces significant
memory and computational challenges, especially in resource-constrained
environments. Quantization techniques have mitigated some of these issues by
reducing data precision, primarily focusing on General Matrix Multiplication
(GEMM). This study introduces a novel sparsity paradigm, transitive sparsity,
which leverages the reuse of previously computed results to substantially
minimize computational overhead in GEMM operations. By representing transitive
relations using a directed acyclic graph, we develop an efficient strategy for
determining optimal execution orders, thereby overcoming inherent challenges
related to execution dependencies and parallelism. Building on this foundation,
we present the Transitive Array, a multiplication-free accelerator designed to
exploit transitive sparsity in GEMM. Our architecture effectively balances
computational workloads across multiple parallel lanes, ensuring high
efficiency and optimal resource utilization. Comprehensive evaluations
demonstrate that the Transitive Array achieves approximately 7.46$\times$ and
3.97$\times$ speedup and 2.31$\times$ and 1.65$\times$ energy reduction
compared to state-of-the-art accelerators such as Olive and BitVert while
maintaining comparable model accuracy on LLaMA models.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 01:23:41 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Guo",
"Cong",
""
],
[
"Wei",
"Chiyue",
""
],
[
"Tang",
"Jiaming",
""
],
[
"Duan",
"Bowen",
""
],
[
"Han",
"Song",
""
],
[
"Li",
"Hai",
""
],
[
"Chen",
"Yiran",
""
]
] |
2504.16340 | Feng Ji | Lili Du and Feng Ji | Helically symmetric solution of 3D Euler equations with vorticity and
its free boundary | 26 pages, 4 figures. Any comments are welcome | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates an incompressible steady free boundary problem of
Euler equations with helical symmetry in $3$ dimensions and with nontrivial
vorticity. The velocity field of the fluid arises from the spiral of its
velocity within a cross-section, whose global existence, uniqueness and
well-posedness with fixed boundary were established by a series of brilliant
works. A perplexing issue, untouched in the literature, concerns the free
boundary problem with (partial) unknown domain boundary in this helically
symmetric configuration. We address this gap through the analysis of the
optimal regularity property of the scalar stream function as a minimizer in a
semilinear minimal problem, establishing the $C^{0,1}$-regularity of the
minimizer, and the $C^{1,\alpha}$-regularity of its free boundary. More
specifically, the regularity results are obtained in arbitrary cross-sections
through smooth helical transformation by virtue of variational method and the
rule of "flatness implies $C^{1,\alpha}$".
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 01:24:27 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Du",
"Lili",
""
],
[
"Ji",
"Feng",
""
]
] |
2504.16341 | Masashi Shiraishi | K. Ohnishi (1), R. Ohshima (1), T. Nishijima (1), S. Kawabata (1), S.
Kasahara (2,3), Y. Kasahara (3), Y. Ando (1,4), Y. Yanase (3), Y. Matsuda
(3), M. Shiraishi (1) ((1) Dep. Electronic Science and Engineering, Kyoto
Univ., (2) Okayama Univ., (3) Dep. Physics, Kyoto Univ., (4) PRESTO-JST) | Potentiometric detection of spin polarization expected at the surface of
FeTe0.6Se0.4 in the effective p-wave superconducting state | 18pages, 4 figures [To appear in PRB as Letter] | null | null | null | cond-mat.mtrl-sci cond-mat.supr-con quant-ph | http://creativecommons.org/licenses/by/4.0/ | Nowadays, the quest for non-Abelian anyons is attracting tremendous
attention. In particular, a Majorana quasiparticle has attracted great interest
since the non-Abelian anyon is a key particle for topological quantum
computation. Much effort has been paid for the quest of the Majorana state in
solids, and some candidate material platforms are reported. Among various
materials that can host the Majorana state, chiral p-wave superconductor is one
of the suitable materials and the iron-based layered superconductor FeTeSe is
one of the promising material platforms because its surface can host effective
p-wave superconducting state that is analogous to chiral p-wave superconducting
state thanks to its topological surface state. Given that a chiral p-wave
superconductor possesses spin polarization, detecting the spin polarization can
be evidence for the chiral p-wave trait, which results in the existence of
Majorana excitation. Here, we show successful detection of the spin
polarization at the surface of FeTe0.6Se0.4 in its superconducting state, where
the spin polarization is detected via a potentiometric method. Amplitudes of
the spin signal exhibit characteristic dependence for temperature and bias
current, suggesting detection of spin polarization of the Bogoliubov
quasiparticles. Our achievement opens a new avenue to explore topological
superconductivity for fault-tolerant quantum computation.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 01:26:06 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Ohnishi",
"K.",
""
],
[
"Ohshima",
"R.",
""
],
[
"Nishijima",
"T.",
""
],
[
"Kawabata",
"S.",
""
],
[
"Kasahara",
"S.",
""
],
[
"Kasahara",
"Y.",
""
],
[
"Ando",
"Y.",
""
],
[
"Yanase",
"Y.",
""
],
[
"Matsuda",
"Y.",
""
],
[
"Shiraishi",
"M.",
""
]
] |
2504.16342 | Hiroshi Ishii | Hiroshi Ishii and Riku Watanabe | Spot solutions to a neural field equation on oblate spheroids | null | null | null | null | nlin.PS q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Understanding the dynamics of excitation patterns in neural fields is an
important topic in neuroscience. Neural field equations are mathematical models
that describe the excitation dynamics of interacting neurons to perform the
theoretical analysis. Although many analyses of neural field equations focus on
the effect of neuronal interactions on the flat surface, the geometric
constraint of the dynamics is also an attractive topic when modeling organs
such as the brain. This paper reports pattern dynamics in a neural field
equation defined on spheroids as model curved surfaces. We treat spot solutions
as localized patterns and discuss how the geometric properties of the curved
surface change their properties. To analyze spot patterns on spheroids with
small flattening, we first construct exact stationary spot solutions on the
spherical surface and reveal their stability. We then extend the analysis to
show the existence and stability of stationary spot solutions in the spheroidal
case. One of our theoretical results is the derivation of a stability criterion
for stationary spot solutions localized at poles on oblate spheroids. The
criterion determines whether a spot solution remains at a pole or moves away.
Finally, we conduct numerical simulations to discuss the dynamics of spot
solutions with the insight of our theoretical predictions. Our results show
that the dynamics of spot solutions depend on the curved surface and the
coordination of neural interactions.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 01:37:54 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Ishii",
"Hiroshi",
""
],
[
"Watanabe",
"Riku",
""
]
] |
2504.16343 | Armin Moin | Chad Marshall, Andrew Barovic and Armin Moin | Mining Software Repositories for Expert Recommendation | null | null | null | null | cs.SE cs.AI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | We propose an automated approach to bug assignment to developers in large
open-source software projects. This way, we assist human bug triagers who are
in charge of finding the best developer with the right level of expertise in a
particular area to be assigned to a newly reported issue. Our approach is based
on the history of software development as documented in the issue tracking
systems. We deploy BERTopic and techniques from TopicMiner. Our approach works
based on the bug reports' features, such as the corresponding products and
components, as well as their priority and severity levels. We sort developers
based on their experience with specific combinations of new reports. The
evaluation is performed using Top-k accuracy, and the results are compared with
the reported results in prior work, namely TopicMiner MTM, BUGZIE, Bug triaging
via deep Reinforcement Learning BT-RL, and LDA-SVM. The evaluation data come
from various Eclipse and Mozilla projects, such as JDT, Firefox, and
Thunderbird.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 01:41:08 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Marshall",
"Chad",
""
],
[
"Barovic",
"Andrew",
""
],
[
"Moin",
"Armin",
""
]
] |
2504.16344 | Stefan Henneking | Stefan Henneking, Sreeram Venkat, Veselin Dobrev, John Camier, Tzanio
Kolev, Milinda Fernando, Alice-Agnes Gabriel, Omar Ghattas | Real-time Bayesian inference at extreme scale: A digital twin for
tsunami early warning applied to the Cascadia subduction zone | null | null | null | null | cs.DC cs.NA math.NA physics.geo-ph | http://creativecommons.org/licenses/by/4.0/ | We present a Bayesian inversion-based digital twin that employs acoustic
pressure data from seafloor sensors, along with 3D coupled acoustic-gravity
wave equations, to infer earthquake-induced spatiotemporal seafloor motion in
real time and forecast tsunami propagation toward coastlines for early warning
with quantified uncertainties. Our target is the Cascadia subduction zone, with
one billion parameters. Computing the posterior mean alone would require 50
years on a 512 GPU machine. Instead, exploiting the shift invariance of the
parameter-to-observable map and devising novel parallel algorithms, we induce a
fast offline-online decomposition. The offline component requires just one
adjoint wave propagation per sensor; using MFEM, we scale this part of the
computation to the full El Capitan system (43,520 GPUs) with 92% weak parallel
efficiency. Moreover, given real-time data, the online component exactly solves
the Bayesian inverse and forecasting problems in 0.2 seconds on a modest GPU
system, a ten-billion-fold speedup.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 01:41:24 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Henneking",
"Stefan",
""
],
[
"Venkat",
"Sreeram",
""
],
[
"Dobrev",
"Veselin",
""
],
[
"Camier",
"John",
""
],
[
"Kolev",
"Tzanio",
""
],
[
"Fernando",
"Milinda",
""
],
[
"Gabriel",
"Alice-Agnes",
""
],
[
"Ghattas",
"Omar",
""
]
] |
2504.16345 | Kimihiko Motegi | Tetsuya Ito, Kimihiko Motegi and Masakazu Teragaito | Every non-trivial knot group is fully residually perfect | 23 pages, 7 figures | null | null | null | math.GT math.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a class $\mathcal{P}$ of groups we say that a group $G$ is fully
residually $\mathcal{P}$ if for any finite subset $F$ of $G$, there exists an
epimorphism from $G$ to a group in $\mathcal{P}$ which is injective on $F$. It
is known that any non-trivial knot group is fully residually finite. For
hyperbolic knots, its knot group is fully residually closed hyperbolic
$3$--manifold group, and fully residually simple. In this article, we show that
every non-trivial knot group is fully residually perfect, closed $3$--manifold
group.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 01:44:27 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Ito",
"Tetsuya",
""
],
[
"Motegi",
"Kimihiko",
""
],
[
"Teragaito",
"Masakazu",
""
]
] |
2504.16346 | Chuang Yang | Zhenping Sun, Chuang Yang, Yafeng Bu, Bokai Liu, Jun Zeng and Xiaohui
Li | Road Similarity-Based BEV-Satellite Image Matching for UGV Localization | 7 pages,9 figures,published to IROS2025 | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To address the challenge of autonomous UGV localization in GNSS-denied
off-road environments,this study proposes a matching-based localization method
that leverages BEV perception image and satellite map within a road similarity
space to achieve high-precision positioning.We first implement a robust
LiDAR-inertial odometry system, followed by the fusion of LiDAR and image data
to generate a local BEV perception image of the UGV. This approach mitigates
the significant viewpoint discrepancy between ground-view images and satellite
map. The BEV image and satellite map are then projected into the road
similarity space, where normalized cross correlation (NCC) is computed to
assess the matching score.Finally, a particle filter is employed to estimate
the probability distribution of the vehicle's pose.By comparing with GNSS
ground truth, our localization system demonstrated stability without divergence
over a long-distance test of 10 km, achieving an average lateral error of only
0.89 meters and an average planar Euclidean error of 3.41 meters. Furthermore,
it maintained accurate and stable global localization even under nighttime
conditions, further validating its robustness and adaptability.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 01:46:01 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Sun",
"Zhenping",
""
],
[
"Yang",
"Chuang",
""
],
[
"Bu",
"Yafeng",
""
],
[
"Liu",
"Bokai",
""
],
[
"Zeng",
"Jun",
""
],
[
"Li",
"Xiaohui",
""
]
] |
2504.16347 | Junwei Chen | Junwei Chen, Marco Raiola, Stefano Discetti | An efficient offline sensor placement method for flow estimation | null | Experimental Thermal and Fluid Science Volume 167, August 2025,
111448 | 10.1016/j.expthermflusci.2025.111448 | null | physics.flu-dyn | http://creativecommons.org/licenses/by/4.0/ | We present an efficient method to optimize sensor placement for flow
estimation using sensors with time-delay embedding in advection-dominated
flows. Our solution allows identifying promising candidates for sensor
positions using solely preliminary flow field measurements with
non-time-resolved Particle Image Velocimetry (PIV), without introducing
physical probes in the flow. Data-driven estimation in advection-dominated
flows often exploits time-delay embedding to enrich the sensor information for
the reconstruction, i.e. it uses the information embedded in probe time series
to provide a more accurate estimation. Optimizing the probe position is the key
to improving the accuracy of such estimation. Unfortunately, the cost of
performing an online combinatorial search to identify the optimal sensor
placement in experiments is often prohibitive. We leverage the principle that,
in advection-dominated flows, rows of vectors from PIV fields embed similar
information to that of probe time series located at the downstream end of the
domain. We propose thus to optimize the sensor placement using the row data
from non-time-resolved PIV measurements as a surrogate of the data a real probe
would actually capture in time. This optimization is run offline and requires
only one preliminary experiment with standard PIV. Once the optimal positions
are identified, the probes can be installed and operated simultaneously with
the PIV to perform the time-resolved field estimation. We show that the
proposed method outperforms equidistant positioning or greedy optimization
techniques available in the literature.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 01:47:00 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Chen",
"Junwei",
""
],
[
"Raiola",
"Marco",
""
],
[
"Discetti",
"Stefano",
""
]
] |
2504.16348 | Russell Boey | Russell Boey, Emily Kendall, Yourong Wang, Richard Easther | Supermassive Binaries in Ultralight Dark Matter Solitons | 14 pages, 20 figures | null | null | null | astro-ph.CO astro-ph.GA | http://creativecommons.org/licenses/by/4.0/ | Ultralight (or fuzzy) dark matter (ULDM) is an alternative to cold dark
matter. A key feature of ULDM is the presence of solitonic cores at the centers
of collapsed halos. These would potentially increase the drag experienced by
supermassive black hole (SMBH) binaries, changing their merger dynamics and the
resulting gravitational wave background. We perform detailed simulations of
high-mass SMBH binaries in the soliton of a massive halo. We find more rapid
decay than previous simulations and semi-analytic approximations. We confirm
expectations that the drag depends strongly on the ULDM particle mass, finding
masses greater than $10^{-21}$ eV could potentially alleviate the final parsec
problem and that ULDM may even suppress gravitational wave production at lower
frequencies in the pulsar timing band.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 01:47:21 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Boey",
"Russell",
""
],
[
"Kendall",
"Emily",
""
],
[
"Wang",
"Yourong",
""
],
[
"Easther",
"Richard",
""
]
] |
2504.16349 | Xiaolu Tan | Bruno Bouchard and Xiaolu Tan | Unbiased simulation of Asian options | null | null | null | null | math.PR q-fin.CP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide an extension of the unbiased simulation method for SDEs developed
in Henry-Labordere et al. [Ann Appl Probab. 27:6 (2017) 1-37] to a class of
path-dependent dynamics, pertaining for Asian options. In our setting, both the
payoff and the SDE's coefficients depend on the (weighted) average of the
process or, more precisely, on the integral of the solution to the SDE against
a continuous function with bounded variations. In particular, this applies to
the numerical resolution of the class of path-dependent PDEs whose regularity,
in the sens of Dupire, is studied in Bouchard and Tan [Ann. I.H.P., to appear].
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 01:52:53 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Bouchard",
"Bruno",
""
],
[
"Tan",
"Xiaolu",
""
]
] |
2504.16350 | Ilya Tyagin | Ilya Tyagin, Marwa H. Farag, Kyle Sherbert, Karunya Shirali, Yuri
Alexeev and Ilya Safro | QAOA-GPT: Efficient Generation of Adaptive and Regular Quantum
Approximate Optimization Algorithm Circuits | null | null | null | null | quant-ph cs.AI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Quantum computing has the potential to improve our ability to solve certain
optimization problems that are computationally difficult for classical
computers, by offering new algorithmic approaches that may provide speedups
under specific conditions. In this work, we introduce QAOA-GPT, a generative
framework that leverages Generative Pretrained Transformers (GPT) to directly
synthesize quantum circuits for solving quadratic unconstrained binary
optimization problems, and demonstrate it on the MaxCut problem on graphs. To
diversify the training circuits and ensure their quality, we have generated a
synthetic dataset using the adaptive QAOA approach, a method that incrementally
builds and optimizes problem-specific circuits. The experiments conducted on a
curated set of graph instances demonstrate that QAOA-GPT, generates high
quality quantum circuits for new problem instances unseen in the training as
well as successfully parametrizes QAOA. Our results show that using QAOA-GPT to
generate quantum circuits will significantly decrease both the computational
overhead of classical QAOA and adaptive approaches that often use gradient
evaluation to generate the circuit and the classical optimization of the
circuit parameters. Our work shows that generative AI could be a promising
avenue to generate compact quantum circuits in a scalable way.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:00:36 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Tyagin",
"Ilya",
""
],
[
"Farag",
"Marwa H.",
""
],
[
"Sherbert",
"Kyle",
""
],
[
"Shirali",
"Karunya",
""
],
[
"Alexeev",
"Yuri",
""
],
[
"Safro",
"Ilya",
""
]
] |
2504.16351 | Juseong Park | Juseong Park, Foad Sohrabi, Jinfeng Du, Jeffrey G. Andrews | Self-Nomination: Deep Learning for Decentralized CSI Feedback Reduction
in MU-MIMO Systems | null | null | null | null | eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a novel deep learning-based user-side feedback
reduction framework, termed self-nomination. The goal of self-nomination is to
reduce the number of users (UEs) feeding back channel state information (CSI)
to the base station (BS), by letting each UE decide whether to feed back based
on its estimated likelihood of being scheduled and its potential contribution
to precoding in a multiuser MIMO (MU-MIMO) downlink. Unlike SNR- or SINR-based
thresholding methods, the proposed approach uses rich spatial channel
statistics and learns nontrivial correlation effects that affect eventual
MU-MIMO scheduling decisions. To train the self-nomination network under an
average feedback constraint, we propose two different strategies: one based on
direct optimization with gradient approximations, and another using policy
gradient-based optimization with a stochastic Bernoulli policy to handle
non-differentiable scheduling. The framework also supports proportional-fair
scheduling by incorporating dynamic user weights. Numerical results confirm
that the proposed self-nomination method significantly reduces CSI feedback
overhead. Compared to baseline feedback methods, self-nomination can reduce
feedback by as much as 65%, saving not only bandwidth but also allowing many
UEs to avoid feedback altogether (and thus, potentially enter a sleep mode).
Self-nomination achieves this significant savings with negligible reduction in
sum-rate or fairness.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:00:49 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Park",
"Juseong",
""
],
[
"Sohrabi",
"Foad",
""
],
[
"Du",
"Jinfeng",
""
],
[
"Andrews",
"Jeffrey G.",
""
]
] |
2504.16352 | Jiwan Kim | Jiwan Kim, Hongseok Kang, Sein Kim, Kibum Kim, Chanyoung Park | Disentangling and Generating Modalities for Recommendation in Missing
Modality Scenarios | SIGIR 2025 | null | null | null | cs.IR cs.AI | http://creativecommons.org/licenses/by/4.0/ | Multi-modal recommender systems (MRSs) have achieved notable success in
improving personalization by leveraging diverse modalities such as images,
text, and audio. However, two key challenges remain insufficiently addressed:
(1) Insufficient consideration of missing modality scenarios and (2) the
overlooking of unique characteristics of modality features. These challenges
result in significant performance degradation in realistic situations where
modalities are missing. To address these issues, we propose Disentangling and
Generating Modality Recommender (DGMRec), a novel framework tailored for
missing modality scenarios. DGMRec disentangles modality features into general
and specific modality features from an information-based perspective, enabling
richer representations for recommendation. Building on this, it generates
missing modality features by integrating aligned features from other modalities
and leveraging user modality preferences. Extensive experiments show that
DGMRec consistently outperforms state-of-the-art MRSs in challenging scenarios,
including missing modalities and new item settings as well as diverse missing
ratios and varying levels of missing modalities. Moreover, DGMRec's
generation-based approach enables cross-modal retrieval, a task inapplicable
for existing MRSs, highlighting its adaptability and potential for real-world
applications. Our code is available at https://github.com/ptkjw1997/DGMRec.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:04:14 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Kim",
"Jiwan",
""
],
[
"Kang",
"Hongseok",
""
],
[
"Kim",
"Sein",
""
],
[
"Kim",
"Kibum",
""
],
[
"Park",
"Chanyoung",
""
]
] |
2504.16353 | Arpana Hosabettu | Arpana Hosabettu (Google), Harsh Shah (Cornell University) | Transformer-Based Extraction of Statutory Definitions from the U.S. Code | 7 pages, to be published in IEEE AIIoT 2025 | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Automatic extraction of definitions from legal texts is critical for
enhancing the comprehension and clarity of complex legal corpora such as the
United States Code (U.S.C.). We present an advanced NLP system leveraging
transformer-based architectures to automatically extract defined terms, their
definitions, and their scope from the U.S.C. We address the challenges of
automatically identifying legal definitions, extracting defined terms, and
determining their scope within this complex corpus of over 200,000 pages of
federal statutory law. Building upon previous feature-based machine learning
methods, our updated model employs domain-specific transformers (Legal-BERT)
fine-tuned specifically for statutory texts, significantly improving extraction
accuracy. Our work implements a multi-stage pipeline that combines document
structure analysis with state-of-the-art language models to process legal text
from the XML version of the U.S. Code. Each paragraph is first classified using
a fine-tuned legal domain BERT model to determine if it contains a definition.
Our system then aggregates related paragraphs into coherent definitional units
and applies a combination of attention mechanisms and rule-based patterns to
extract defined terms and their jurisdictional scope. The definition extraction
system is evaluated on multiple titles of the U.S. Code containing thousands of
definitions, demonstrating significant improvements over previous approaches.
Our best model achieves 96.8% precision and 98.9% recall (98.2% F1-score),
substantially outperforming traditional machine learning classifiers. This work
contributes to improving accessibility and understanding of legal information
while establishing a foundation for downstream legal reasoning tasks.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:09:53 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Hosabettu",
"Arpana",
"",
"Google"
],
[
"Shah",
"Harsh",
"",
"Cornell University"
]
] |
2504.16354 | Zhuang Li | Zhuang Li, Qiuping Yi, Jeff Huang | VeriFix: Verifying Your Fix Towards An Atomicity Violation | null | null | null | null | cs.SE | http://creativecommons.org/licenses/by/4.0/ | Atomicity violation is one of the most serious types of bugs in concurrent
programs. Synchronizations are commonly used to enforce atomicity. However, it
is very challenging to place synchronizations correctly and sufficiently
due to complex thread interactions and large input space. This paper presents
\textsf{VeriFix}, a new approach for verifying atomicity violation fixes. Given
a buggy trace that exposes an atomicity violation and a corresponding fix, % in
the form of locks, \textsf{VeriFix} effectively verifies if the fix introduces
sufficient synchronizations to repair the atomicity violation without
introducing new deadlocks. The key idea is that \textsf{VeriFix} transforms the
fix verification problem into a property verification problem, in which both
the observed atomicity violation and potential deadlocks are encoded as a
safety property, and both the inputs and schedules are encoded as symbolic
constraints. By reasoning the conjoined constraints with an SMT solver,
\textsf{VeriFix} systematically explores all reachable paths %from the whole
schedule and input space and verifies if there exists a concrete
\textit{schedule+input} combination to manifest the intended atomicity or any
new deadlocks. We have implemented and evaluated \verifix\ on a collection of
real-world C/C++ programs. The result shows that \textsf{VeriFix} significantly
outperforms the state-of-the-art.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:11:07 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Li",
"Zhuang",
""
],
[
"Yi",
"Qiuping",
""
],
[
"Huang",
"Jeff",
""
]
] |
2504.16355 | Hassan Jameel Asghar | Hassan Asghar, Chenhan Zhang, Dali Kaafar | Property-Preserving Hashing for $\ell_1$-Distance Predicates:
Applications to Countering Adversarial Input Attacks | null | null | null | null | cs.CR cs.IT cs.LG math.IT | http://creativecommons.org/licenses/by/4.0/ | Perceptual hashing is used to detect whether an input image is similar to a
reference image with a variety of security applications. Recently, they have
been shown to succumb to adversarial input attacks which make small
imperceptible changes to the input image yet the hashing algorithm does not
detect its similarity to the original image. Property-preserving hashing (PPH)
is a recent construct in cryptography, which preserves some property
(predicate) of its inputs in the hash domain. Researchers have so far shown
constructions of PPH for Hamming distance predicates, which, for instance,
outputs 1 if two inputs are within Hamming distance $t$. A key feature of PPH
is its strong correctness guarantee, i.e., the probability that the predicate
will not be correctly evaluated in the hash domain is negligible. Motivated by
the use case of detecting similar images under adversarial setting, we propose
the first PPH construction for an $\ell_1$-distance predicate. Roughly, this
predicate checks if the two one-sided $\ell_1$-distances between two images are
within a threshold $t$. Since many adversarial attacks use $\ell_2$-distance
(related to $\ell_1$-distance) as the objective function to perturb the input
image, by appropriately choosing the threshold $t$, we can force the attacker
to add considerable noise to evade detection, and hence significantly
deteriorate the image quality. Our proposed scheme is highly efficient, and
runs in time $O(t^2)$. For grayscale images of size $28 \times 28$, we can
evaluate the predicate in $0.0784$ seconds when pixel values are perturbed by
up to $1 \%$. For larger RGB images of size $224 \times 224$, by dividing the
image into 1,000 blocks, we achieve times of $0.0128$ seconds per block for $1
\%$ change, and up to $0.2641$ seconds per block for $14\%$ change.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:11:21 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Asghar",
"Hassan",
""
],
[
"Zhang",
"Chenhan",
""
],
[
"Kaafar",
"Dali",
""
]
] |
2504.16356 | Jiahe Lin | Jiahe Lin, Yikai Zhang, George Michailidis | Covariate-dependent Graphical Model Estimation via Neural Networks with
Statistical Guarantees | Accepted by Transactions on Machine Learning Research (TMLR) | null | null | null | stat.ML cs.LG stat.ME | http://creativecommons.org/licenses/by/4.0/ | Graphical models are widely used in diverse application domains to model the
conditional dependencies amongst a collection of random variables. In this
paper, we consider settings where the graph structure is covariate-dependent,
and investigate a deep neural network-based approach to estimate it. The method
allows for flexible functional dependency on the covariate, and fits the data
reasonably well in the absence of a Gaussianity assumption. Theoretical results
with PAC guarantees are established for the method, under assumptions commonly
used in an Empirical Risk Minimization framework. The performance of the
proposed method is evaluated on several synthetic data settings and benchmarked
against existing approaches. The method is further illustrated on real datasets
involving data from neuroscience and finance, respectively, and produces
interpretable results.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:13:36 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Lin",
"Jiahe",
""
],
[
"Zhang",
"Yikai",
""
],
[
"Michailidis",
"George",
""
]
] |
2504.16357 | Ying Chang | Ying Chang, Xiaohu Shi, Xiaohui Zhao, Zhaohuang Chen, Deyin Ma | DP2FL: Dual Prompt Personalized Federated Learning in Foundation Models | null | null | null | null | cs.DC cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Personalized federated learning (PFL) has garnered significant attention for
its ability to address heterogeneous client data distributions while preserving
data privacy. However, when local client data is limited, deep learning models
often suffer from insufficient training, leading to suboptimal performance.
Foundation models, such as CLIP (Contrastive Language-Image Pretraining),
exhibit strong feature extraction capabilities and can alleviate this issue by
fine-tuning on limited local data. Despite their potential, foundation models
are rarely utilized in federated learning scenarios, and challenges related to
integrating new clients remain largely unresolved. To address these challenges,
we propose the Dual Prompt Personalized Federated Learning (DP2FL) framework,
which introduces dual prompts and an adaptive aggregation strategy. DP2FL
combines global task awareness with local data-driven insights, enabling local
models to achieve effective generalization while remaining adaptable to
specific data distributions. Moreover, DP2FL introduces a global model that
enables prediction on new data sources and seamlessly integrates newly added
clients without requiring retraining. Experimental results in highly
heterogeneous environments validate the effectiveness of DP2FL's prompt design
and aggregation strategy, underscoring the advantages of prediction on novel
data sources and demonstrating the seamless integration of new clients into the
federated learning framework.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:13:56 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Chang",
"Ying",
""
],
[
"Shi",
"Xiaohu",
""
],
[
"Zhao",
"Xiaohui",
""
],
[
"Chen",
"Zhaohuang",
""
],
[
"Ma",
"Deyin",
""
]
] |
2504.16358 | Huiyan Ying | Tian Bai, Huiyan Ying, Kailong Suo, Junqiu Wei, Tao Fan, Yuanfeng Song | Text-to-TrajVis: Enabling Trajectory Data Visualizations from Natural
Language Questions | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces the Text-to-TrajVis task, which aims to transform
natural language questions into trajectory data visualizations, facilitating
the development of natural language interfaces for trajectory visualization
systems. As this is a novel task, there is currently no relevant dataset
available in the community. To address this gap, we first devised a new
visualization language called Trajectory Visualization Language (TVL) to
facilitate querying trajectory data and generating visualizations. Building on
this foundation, we further proposed a dataset construction method that
integrates Large Language Models (LLMs) with human efforts to create
high-quality data. Specifically, we first generate TVLs using a comprehensive
and systematic process, and then label each TVL with corresponding natural
language questions using LLMs. This process results in the creation of the
first large-scale Text-to-TrajVis dataset, named TrajVL, which contains 18,140
(question, TVL) pairs. Based on this dataset, we systematically evaluated the
performance of multiple LLMs (GPT, Qwen, Llama, etc.) on this task. The
experimental results demonstrate that this task is both feasible and highly
challenging and merits further exploration within the research community.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:15:52 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Bai",
"Tian",
""
],
[
"Ying",
"Huiyan",
""
],
[
"Suo",
"Kailong",
""
],
[
"Wei",
"Junqiu",
""
],
[
"Fan",
"Tao",
""
],
[
"Song",
"Yuanfeng",
""
]
] |
2504.16359 | Hanqian Li | Xuming Hu, Hanqian Li, Jungang Li, Aiwei Liu | VideoMark: A Distortion-Free Robust Watermarking Framework for Video
Diffusion Models | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | This work presents VideoMark, a training-free robust watermarking framework
for video diffusion models. As diffusion models advance in generating highly
realistic videos, the need for reliable content attribution mechanisms has
become critical. While watermarking techniques for image diffusion models have
made progress, directly extending these methods to videos presents unique
challenges due to variable video lengths and vulnerability to temporal attacks.
VideoMark addresses these limitations through a frame-wise watermarking
strategy using pseudorandom error correction (PRC) codes to embed watermark
information during the generation process. Our method generates an extended
watermark message sequence and randomly selects starting positions for each
video, ensuring uniform noise distribution in the latent space and maintaining
generation quality. For watermark extraction, we introduce a Temporal Matching
Module (TMM) that uses edit distance to align decoded messages with the
original watermark sequence, providing robustness against temporal attacks such
as frame deletion. Experimental results demonstrate that VideoMark achieves
higher decoding accuracy than existing methods while maintaining video quality
on par with watermark-free generation. Importantly, our watermark remains
undetectable to attackers without the secret key, ensuring strong
imperceptibility compared to other watermarking frameworks. VideoMark provides
a practical solution for content attribution in diffusion-based video
generation without requiring additional training or compromising video quality.
Our code and data are available at
\href{https://github.com/KYRIE-LI11/VideoMark}{https://github.com/KYRIE-LI11/VideoMark}.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:21:12 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Hu",
"Xuming",
""
],
[
"Li",
"Hanqian",
""
],
[
"Li",
"Jungang",
""
],
[
"Liu",
"Aiwei",
""
]
] |
2504.16360 | Tao Wu | Mao Wang, Tao Wu, Xingping Xian, Shaojie Qiao, Weina Niu, Canyixing
Cui | Disentangled Graph Representation Based on Substructure-Aware Graph
Optimal Matching Kernel Convolutional Networks | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graphs effectively characterize relational data, driving graph representation
learning methods that uncover underlying predictive information. As
state-of-the-art approaches, Graph Neural Networks (GNNs) enable end-to-end
learning for diverse tasks. Recent disentangled graph representation learning
enhances interpretability by decoupling independent factors in graph data.
However, existing methods often implicitly and coarsely characterize graph
structures, limiting structural pattern analysis within the graph. This paper
proposes the Graph Optimal Matching Kernel Convolutional Network (GOMKCN) to
address this limitation. We view graphs as node-centric subgraphs, where each
subgraph acts as a structural factor encoding position-specific information.
This transforms graph prediction into structural pattern recognition. Inspired
by CNNs, GOMKCN introduces the Graph Optimal Matching Kernel (GOMK) as a
convolutional operator, computing similarities between subgraphs and learnable
graph filters. Mathematically, GOMK maps subgraphs and filters into a Hilbert
space, representing graphs as point sets. Disentangled representations emerge
from projecting subgraphs onto task-optimized filters, which adaptively capture
relevant structural patterns via gradient descent. Crucially, GOMK incorporates
local correspondences in similarity measurement, resolving the trade-off
between differentiability and accuracy in graph kernels. Experiments validate
that GOMKCN achieves superior accuracy and interpretability in graph pattern
mining and prediction. The framework advances the theoretical foundation for
disentangled graph representation learning.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:26:33 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Wang",
"Mao",
""
],
[
"Wu",
"Tao",
""
],
[
"Xian",
"Xingping",
""
],
[
"Qiao",
"Shaojie",
""
],
[
"Niu",
"Weina",
""
],
[
"Cui",
"Canyixing",
""
]
] |
2504.16361 | Qizhao Chen | Qizhao Chen | Comparing Different Transformer Model Structures for Stock Prediction | null | null | null | null | cs.CE | http://creativecommons.org/licenses/by/4.0/ | This paper compares different Transformer model architectures for stock index
prediction. While many studies have shown that Transformers perform well in
stock price forecasting, few have explored how different structural designs
impact performance. Most existing works treat the Transformer as a black box,
overlooking how specific architectural choices may affect predictive accuracy.
However, understanding these differences is critical for developing more
effective forecasting models. This study aims to identify which Transformer
variant is most suitable for stock forecasting. This study evaluates five
Transformer structures: (1) encoder-only Transformer, (2) decoder-only
Transformer, (3) Vanilla Transformer (encoder + decoder), (4) Vanilla
Transformer without embedding layers, and (5) Vanilla Transformer with
ProbSparse attention. Results show that Transformer-based models generally
outperform traditional approaches. Transformer with decoder only structure
outperforms all other models in all scenarios. Transformer with ProbSparse
attention has the worst performance in almost all cases.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:26:42 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Chen",
"Qizhao",
""
]
] |
2504.16362 | Colton Crum | Colton R. Crum, Adam Czajka | Almost Right: Making First-layer Kernels Nearly Orthogonal Improves
Model Generalization | 8 pages, 1 figure, 3 tables | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | An ongoing research challenge within several domains in computer vision is
how to increase model generalization capabilities. Several attempts to improve
model generalization performance are heavily inspired by human perceptual
intelligence, which is remarkable in both its performance and efficiency to
generalize to unknown samples. Many of these methods attempt to force portions
of the network to be orthogonal, following some observation within neuroscience
related to early vision processes. In this paper, we propose a loss component
that regularizes the filtering kernels in the first convolutional layer of a
network to make them nearly orthogonal. Deviating from previous works, we give
the network flexibility in which pairs of kernels it makes orthogonal, allowing
the network to navigate to a better solution space, imposing harsh penalties.
Without architectural modifications, we report substantial gains in
generalization performance using the proposed loss against previous works
(including orthogonalization- and saliency-based regularization methods) across
three different architectures (ResNet-50, DenseNet-121, ViT-b-16) and two
difficult open-set recognition tasks: presentation attack detection in iris
biometrics, and anomaly detection in chest X-ray images.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:27:20 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Crum",
"Colton R.",
""
],
[
"Czajka",
"Adam",
""
]
] |
2504.16364 | Tong Zhang | Fengchun Liu, Tong Zhang, Chunying Zhang | CLPSTNet: A Progressive Multi-Scale Convolutional Steganography Model
Integrating Curriculum Learning | null | null | null | null | cs.CV cs.AI cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, a large number of works have introduced Convolutional Neural
Networks (CNNs) into image steganography, which transform traditional
steganography methods such as hand-crafted features and prior knowledge design
into steganography methods that neural networks autonomically learn information
embedding. However, due to the inherent complexity of digital images, issues of
invisibility and security persist when using CNN models for information
embedding. In this paper, we propose Curriculum Learning Progressive Steganophy
Network (CLPSTNet). The network consists of multiple progressive multi-scale
convolutional modules that integrate Inception structures and dilated
convolutions. The module contains multiple branching pathways, starting from a
smaller convolutional kernel and dilatation rate, extracting the basic, local
feature information from the feature map, and gradually expanding to the
convolution with a larger convolutional kernel and dilatation rate for
perceiving the feature information of a larger receptive field, so as to
realize the multi-scale feature extraction from shallow to deep, and from fine
to coarse, allowing the shallow secret information features to be refined in
different fusion stages. The experimental results show that the proposed
CLPSTNet not only has high PSNR , SSIM metrics and decoding accuracy on three
large public datasets, ALASKA2, VOC2012 and ImageNet, but also the
steganographic images generated by CLPSTNet have low steganalysis scores.You
can find our code at
\href{https://github.com/chaos-boops/CLPSTNet}{https://github.com/chaos-boops/CLPSTNet}.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:34:25 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Liu",
"Fengchun",
""
],
[
"Zhang",
"Tong",
""
],
[
"Zhang",
"Chunying",
""
]
] |
2504.16365 | Tong Zhou | Tong Zhou | Vanishing Cycles for Zariski-Constructible Sheaves on Rigid Analytic
Varieties | 21 pages. Comments welcome | null | null | null | math.AG | http://creativecommons.org/licenses/by/4.0/ | We develop a theory of nearby and vanishing cycles in the context of
finite-coefficient Zariski-constructible sheaves over a non-archimedean field
which is non-trivially valued, complete, algebraically closed, and of mixed
characteristic or equal characteristic zero. Apart from basic properties, we
show that they preserve Zariski-constructibility, have a Milnor fibre
interpretation, satisfy Beilinson's gluing construction, are perverse t-exact,
and commute with Verdier duality.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:34:58 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Zhou",
"Tong",
""
]
] |
2504.16366 | Hannah Nguyen | Noel Chacko, Hannah Vy Nguyen, Sophie Chen, Stephen MacNeil | Lightweight Social Computing Tools for Undergraduate Research Community
Building | 2 pages, 2 figures, Proceedings of the 56th ACM Technical Symposium
on Computer Science Education V. 2 (SIGCSE TS 2025) | null | 10.1145/3641555.3705214 | null | cs.SI | http://creativecommons.org/licenses/by/4.0/ | Many barriers exist when new members join a research community, including
impostor syndrome. These barriers can be especially challenging for
undergraduate students who are new to research. In our work, we explore how the
use of social computing tools in the form of spontaneous online social networks
(SOSNs) can be used in small research communities to improve sense of
belonging, peripheral awareness, and feelings of togetherness within an
existing CS research community. Inspired by SOSNs such as BeReal, we integrated
a Wizard-of-Oz photo sharing bot into a computing research lab to foster
community building among members. Through a small sample of lab members (N =
17) over the course of 2 weeks, we observed an increase in participants' sense
of togetherness based on pre- and post-study surveys. Our surveys and
semi-structured interviews revealed that this approach has the potential to
increase awareness of peers' personal lives, increase feelings of community,
and reduce feelings of disconnectedness.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:38:46 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Chacko",
"Noel",
""
],
[
"Nguyen",
"Hannah Vy",
""
],
[
"Chen",
"Sophie",
""
],
[
"MacNeil",
"Stephen",
""
]
] |
2504.16368 | Linhua Kong | Linhua Kong, Dongxia Chang, Lian Liu, Zisen Kong, Pengyuan Li and Yao
Zhao | Revisiting Radar Camera Alignment by Contrastive Learning for 3D Object
Detection | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, 3D object detection algorithms based on radar and camera fusion
have shown excellent performance, setting the stage for their application in
autonomous driving perception tasks. Existing methods have focused on dealing
with feature misalignment caused by the domain gap between radar and camera.
However, existing methods either neglect inter-modal features interaction
during alignment or fail to effectively align features at the same spatial
location across modalities. To alleviate the above problems, we propose a new
alignment model called Radar Camera Alignment (RCAlign). Specifically, we
design a Dual-Route Alignment (DRA) module based on contrastive learning to
align and fuse the features between radar and camera. Moreover, considering the
sparsity of radar BEV features, a Radar Feature Enhancement (RFE) module is
proposed to improve the densification of radar BEV features with the knowledge
distillation loss. Experiments show RCAlign achieves a new state-of-the-art on
the public nuScenes benchmark in radar camera fusion for 3D Object Detection.
Furthermore, the RCAlign achieves a significant performance gain (4.3\% NDS and
8.4\% mAP) in real-time 3D detection compared to the latest state-of-the-art
method (RCBEVDet).
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:41:43 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Kong",
"Linhua",
""
],
[
"Chang",
"Dongxia",
""
],
[
"Liu",
"Lian",
""
],
[
"Kong",
"Zisen",
""
],
[
"Li",
"Pengyuan",
""
],
[
"Zhao",
"Yao",
""
]
] |
2504.16370 | Yuto Morohoshi | Yuto Morohoshi, Akimoto Nakayama, Hidetaka Manabe, Kosuke Mitarai | Learning functions of Hamiltonians with Hamiltonian Fourier features | 9 pages, 4 figures | null | null | null | quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a quantum machine learning task that is provably easy for quantum
computers and arguably hard for classical ones. The task involves predicting
quantities of the form $\mathrm{Tr}[f(H)\rho]$, where $f$ is an unknown
function, given descriptions of $H$ and $\rho$. Using a Fourier-based feature
map of Hamiltonians and linear regression, we theoretically establish the
learnability of the task and implement it on a superconducting device using up
to 40 qubits. This work provides a machine learning task with practical
relevance, provable quantum easiness, and near-term feasibility.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:48:00 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Morohoshi",
"Yuto",
""
],
[
"Nakayama",
"Akimoto",
""
],
[
"Manabe",
"Hidetaka",
""
],
[
"Mitarai",
"Kosuke",
""
]
] |
2504.16371 | Arghavan Zibaie | Arghavan Zibaie, Spencer Hutchinson, Ramtin Pedarsani, Mahnoosh
Alizadeh | The Safety-Privacy Tradeoff in Linear Bandits | 16 pages, 3 figures, accepted to 2025 IEEE International Symposium on
Information Theory (ISIT) | null | null | null | math.OC cs.LG | http://creativecommons.org/licenses/by/4.0/ | We consider a collection of linear stochastic bandit problems, each modeling
the random response of different agents to proposed interventions, coupled
together by a global safety constraint. We assume a central coordinator must
choose actions to play on each bandit with the objective of regret
minimization, while also ensuring that the expected response of all agents
satisfies the global safety constraints at each round, in spite of uncertainty
about the bandits' parameters. The agents consider their observed responses to
be private and in order to protect their sensitive information, the data
sharing with the central coordinator is performed under local differential
privacy (LDP). However, providing higher level of privacy to different agents
would have consequences in terms of safety and regret. We formalize these
tradeoffs by building on the notion of the sharpness of the safety set - a
measure of how the geometric properties of the safe set affects the growth of
regret - and propose a unilaterally unimprovable vector of privacy levels for
different agents given a maximum regret budget.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:48:02 GMT"
}
] | 2025-04-24T00:00:00 | [
[
"Zibaie",
"Arghavan",
""
],
[
"Hutchinson",
"Spencer",
""
],
[
"Pedarsani",
"Ramtin",
""
],
[
"Alizadeh",
"Mahnoosh",
""
]
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.