id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
sequence |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2401.10121 | Jeffrey Larson | Jeffrey Larson and Matt Menickelly and Jiahao Shi | A Novel Noise-Aware Classical Optimizer for Variational Quantum
Algorithms | null | null | 10.1287/ijoc.2024.0578 | null | quant-ph math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A key component of variational quantum algorithms (VQAs) is the choice of
classical optimizer employed to update the parameterization of an ansatz. It is
well recognized that quantum algorithms will, for the foreseeable future,
necessarily be run on noisy devices with limited fidelities. Thus, the
evaluation of an objective function (e.g., the guiding function in the quantum
approximate optimization algorithm (QAOA) or the expectation of the electronic
Hamiltonian in variational quantum eigensolver (VQE)) required by a classical
optimizer is subject not only to stochastic error from estimating an expected
value but also to error resulting from intermittent hardware noise. Model-based
derivative-free optimization methods have emerged as popular choices of a
classical optimizer in the noisy VQA setting, based on empirical studies.
However, these optimization methods were not explicitly designed with the
consideration of noise. In this work we adapt recent developments from the
``noise-aware numerical optimization'' literature to these commonly used
derivative-free model-based methods. We introduce the key defining
characteristics of these novel noise-aware derivative-free model-based methods
that separate them from standard model-based methods. We study an
implementation of such noise-aware derivative-free model-based methods and
compare its performance on demonstrative VQA simulations to classical solvers
packaged in \texttt{scikit-quant}.
| [
{
"version": "v1",
"created": "Thu, 18 Jan 2024 16:51:02 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Jun 2024 16:47:14 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Larson",
"Jeffrey",
""
],
[
"Menickelly",
"Matt",
""
],
[
"Shi",
"Jiahao",
""
]
] |
2401.11714 | Alexander Lim | Alexander Lim, Yang Liu and Fred Roosta | Conjugate Direction Methods Under Inconsistent Systems | null | null | null | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Since the development of the conjugate gradient (CG) method in 1952 by
Hestenes and Stiefel, CG, has become an indispensable tool in computational
mathematics for solving positive definite linear systems. On the other hand,
the conjugate residual (CR) method, closely related CG and introduced by
Stiefel in 1955 for the same settings, remains relatively less known outside
the numerical linear algebra community. Since their inception, these methods --
henceforth collectively referred to as conjugate direction methods -- have been
extended beyond positive definite to indefinite, albeit consistent, settings.
Going one step further, in this paper, we investigate the theoretical and
empirical properties of these methods under inconsistent systems. Among other
things, we show that small modifications to the original algorithms allow for
the pseudo-inverse solution. Furthermore, we show that CR is essentially
equivalent to the minimum residual method, proposed by Paige and Saunders in
1975, in such contexts. Lastly, we conduct a series of numerical experiments to
shed lights on their numerical stability (or lack thereof) and their
performance for inconsistent systems. Surprisingly, we will demonstrate that,
unlike CR and contrary to popular belief, CG can exhibit significant numerical
instability, bordering on catastrophe in some instances.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2024 06:35:32 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Sep 2024 23:08:24 GMT"
},
{
"version": "v3",
"created": "Sat, 23 Nov 2024 05:49:58 GMT"
},
{
"version": "v4",
"created": "Mon, 5 May 2025 05:54:30 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Lim",
"Alexander",
""
],
[
"Liu",
"Yang",
""
],
[
"Roosta",
"Fred",
""
]
] |
2401.12883 | Shamil Asgarli | Shamil Asgarli, Sara Krehbiel, Howard W. Levinson, Heather M. Russell | Counting subgraphs of coloring graphs | 25 pages; final version accepted for publication in Graphs and
Combinatorics | null | null | null | math.CO | http://creativecommons.org/licenses/by/4.0/ | The chromatic polynomial $\pi_{G}(k)$ of a graph $G$ can be viewed as
counting the number of vertices in a family of coloring graphs $\mathcal
C_k(G)$ associated with (proper) $k$-colorings of $G$ as a function of the
number of colors $k$. These coloring graphs can be understood as a
reconfiguration system. We generalize the chromatic polynomial to
$\pi_G^{(H)}(k)$, counting occurrences of arbitrary induced subgraphs $H$ in
these coloring graphs, and we prove that these functions are polynomial in $k$.
In particular, we study the chromatic pairs polynomial $\pi_{G}^{(P_2)}(k)$,
which counts the number of edges in coloring graphs, corresponding to the
number of pairs of colorings that differ on a single vertex. We show two trees
share a chromatic pairs polynomial if and only if they have the same degree
sequence, and we conjecture that the chromatic pairs polynomial refines the
chromatic polynomial in general. We also instantiate our polynomials with other
choices of $H$ to generate new graph invariants.
| [
{
"version": "v1",
"created": "Tue, 23 Jan 2024 16:24:43 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 06:02:14 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Asgarli",
"Shamil",
""
],
[
"Krehbiel",
"Sara",
""
],
[
"Levinson",
"Howard W.",
""
],
[
"Russell",
"Heather M.",
""
]
] |
2401.13577 | Elvira Lupoian | Elvira Lupoian and James Rawson | Three-Torsion Subgroups and Wild Conductor Exponents Plane Quartics | Major changes: change of title, re-organised structure and added
implementation. Comments are welcome! | null | null | null | math.NT | http://creativecommons.org/licenses/by-sa/4.0/ | In this paper we give an algorithm to find the 3-torsion subgroup of the
Jacobian of a smooth plane quartic curve with a marked rational point. We
describe $3-$torsion points in terms of cubics which triply intersect the
curve, and use this to define a system of equations whose solution set
corresponds to the coefficients of these cubics. We compute the points of this
zero-dimensional, degree $728$ scheme first by approximation, using homotopy
continuation and Newton-Raphson, and then using continued fractions to obtain
accurate expressions for these points. We describe how the Galois structure of
the field of definition of the $3$-torsion subgroup can be used to compute
local wild conductor exponents, including at $p=2$.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2024 16:41:19 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 19:52:23 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Lupoian",
"Elvira",
""
],
[
"Rawson",
"James",
""
]
] |
2401.14456 | Fabio Marino | Simone Giacomelli, Chiung Hwang, Fabio Marino, Sara Pasquetti, Matteo
Sacchi | Probing bad theories with the dualization algorithm II | 131 pages, 84 figures; v3: typos have been corrected; additional
clarifications regarding the electric dualization algorithm have been
included; the code has been improved | null | null | null | hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We continue our analysis of bad theories, focusing on quiver theories with
bad unitary and special unitary gauge groups in three dimensions. By extending
the dualization algorithm we prove that the partition function of bad linear
quivers can be written as a distribution, given by a sum of terms involving a
product of delta functions times the partition function of a good quiver
theory. We describe in detail the good quiver theories appearing in the
partition function of the bad theory and discuss the brane interpretation of
our result. We also discuss in detail the lift of these theories to 4d quivers
with symplectic gauge groups, in which our results can be recovered by studying
the Higgsing triggered by the expectation value for certain chiral operators.
The paper is accompanied by a Mathematica file which implements the algorithm
for an arbitrary unitary bad linear quiver.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2024 19:00:02 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Apr 2024 07:21:49 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 07:03:02 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Giacomelli",
"Simone",
""
],
[
"Hwang",
"Chiung",
""
],
[
"Marino",
"Fabio",
""
],
[
"Pasquetti",
"Sara",
""
],
[
"Sacchi",
"Matteo",
""
]
] |
2401.15695 | David Bethge | David Bethge, Daniel Bulanda, Adam Kozlowski, Thomas Kosch, Albrecht
Schmidt, Tobias Grosse-Puppendahl | HappyRouting: Learning Emotion-Aware Route Trajectories for Scalable
In-The-Wild Navigation | 17 pages | null | null | null | cs.HC cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Routes represent an integral part of triggering emotions in drivers.
Navigation systems allow users to choose a navigation strategy, such as the
fastest or shortest route. However, they do not consider the driver's emotional
well-being. We present HappyRouting, a novel navigation-based empathic car
interface guiding drivers through real-world traffic while evoking positive
emotions. We propose design considerations, derive a technical architecture,
and implement a routing optimization framework. Our contribution is a machine
learning-based generated emotion map layer, predicting emotions along routes
based on static and dynamic contextual data. We evaluated HappyRouting in a
real-world driving study (N=13), finding that happy routes increase
subjectively perceived valence by 11% (p=.007). Although happy routes take 1.25
times longer on average, participants perceived the happy route as shorter,
presenting an emotion-enhanced alternative to today's fastest routing
mechanisms. We discuss how emotion-based routing can be integrated into
navigation apps, promoting emotional well-being for mobility use.
| [
{
"version": "v1",
"created": "Sun, 28 Jan 2024 16:44:17 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 12:02:55 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Bethge",
"David",
""
],
[
"Bulanda",
"Daniel",
""
],
[
"Kozlowski",
"Adam",
""
],
[
"Kosch",
"Thomas",
""
],
[
"Schmidt",
"Albrecht",
""
],
[
"Grosse-Puppendahl",
"Tobias",
""
]
] |
2401.15782 | Mark Hertzberg | Mark P. Hertzberg, Abraham Loeb | Constraints on an Anisotropic Universe | 10 pages in double column format, 4 figures. V2: Added references.
V3: Updated towards version published in Phys. Rev. D | Phys. Rev. D 109, 083538 (2024) | 10.1103/PhysRevD.109.083538 | null | astro-ph.CO gr-qc hep-ph hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze the possibility of global anisotropy of the universe. We consider
an altered Friedmann Lemaitre Robertson Walker metric in which there are
different scale factors along the three different axes of space. We construct
the corresponding altered Friedmann equations. We show that any initial
anisotropies decrease into the future. At late times, the difference in Hubble
parameters changes as $1/\sqrt{t}$ in a radiation dominated era and as $1/t$ in
a matter dominated era. We use constraints from Big Bang Nucleosynthesis and
the Cosmic Microwave Background to constrain the level of anisotropies at early
times. We also examine how the approach back in time to the singularity is
radically altered; happening much more abruptly, as a function of density, in
an anisotropic universe. We also mention improved bounds that can arise from
measurements of primordial gravitons, Weakly interacting massive particles, and
neutrinos.
| [
{
"version": "v1",
"created": "Sun, 28 Jan 2024 22:18:40 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Feb 2024 01:24:01 GMT"
},
{
"version": "v3",
"created": "Mon, 29 Apr 2024 14:49:53 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Hertzberg",
"Mark P.",
""
],
[
"Loeb",
"Abraham",
""
]
] |
2401.15929 | Ichiro Shimada | Ichiro Shimada | Topology of a complex double plane branching along a real line
arrangement | 38 pages, 8 figures, a new reference is added | null | null | null | math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the topology of a double cover of a complex affine plane
branching along a nodal real line arrangement. We define certain topological
2-cycles in the double plane using the real structure of the arrangement, and
calculate their intersection numbers.
| [
{
"version": "v1",
"created": "Mon, 29 Jan 2024 07:39:14 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Feb 2024 05:43:48 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Apr 2024 08:35:57 GMT"
},
{
"version": "v4",
"created": "Thu, 3 Apr 2025 05:20:59 GMT"
},
{
"version": "v5",
"created": "Sun, 4 May 2025 07:30:02 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Shimada",
"Ichiro",
""
]
] |
2401.17360 | Colin Defant | Grant Barkley, Colin Defant, Eliot Hodges, Noah Kravitz, Mitchell Lee | Bender--Knuth Billiards in Coxeter Groups | 52 pages, 13 figures | Forum Math. Sigma 13 (2025), Paper No. e7, 55 pp | 10.1017/fms.2024.159 | null | math.CO math.DS math.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $(W,S)$ be a Coxeter system, and write $S=\{s_i:i\in I\}$, where $I$ is a
finite index set. Fix a nonempty convex subset $\mathscr{L}$ of $W$. If $W$ is
of type $A$, then $\mathscr{L}$ is the set of linear extensions of a poset, and
there are important Bender--Knuth involutions
$\mathrm{BK}_i\colon\mathscr{L}\to\mathscr{L}$ indexed by elements of $I$. For
arbitrary $W$ and for each $i\in I$, we introduce an operator $\tau_i\colon
W\to W$ (depending on $\mathscr{L}$) that we call a noninvertible Bender--Knuth
toggle; this operator restricts to an involution on $\mathscr{L}$ that
coincides with $\mathrm{BK}_i$ in type $A$. Given a Coxeter element
$c=s_{i_n}\cdots s_{i_1}$, we consider the operator
$\mathrm{Pro}_c=\tau_{i_n}\cdots\tau_{i_1}$. We say $W$ is futuristic if for
every nonempty finite convex set $\mathscr{L}$, every Coxeter element $c$, and
every $u\in W$, there exists an integer $K\geq 0$ such that
$\mathrm{Pro}_c^K(u)\in\mathscr{L}$. We prove that finite Coxeter groups,
right-angled Coxeter groups, rank-3 Coxeter groups, affine Coxeter groups of
types $\widetilde A$ and $\widetilde C$, and Coxeter groups whose Coxeter
graphs are complete are all futuristic. When $W$ is finite, we actually prove
that if $s_{i_N}\cdots s_{i_1}$ is a reduced expression for the long element of
$W$, then $\tau_{i_N}\cdots\tau_{i_1}(W)=\mathscr{L}$; this allows us to
determine the smallest integer $\mathrm{M}(c)$ such that
$\mathrm{Pro}_c^{{\mathrm{M}}(c)}(W)=\mathscr{L}$ for all $\mathscr{L}$. We
also exhibit infinitely many non-futuristic Coxeter groups, including all
irreducible affine Coxeter groups that are not of type $\widetilde A$,
$\widetilde C$, or $\widetilde G_2$.
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2024 19:00:03 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Feb 2024 22:23:10 GMT"
},
{
"version": "v3",
"created": "Sat, 21 Dec 2024 15:52:29 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Barkley",
"Grant",
""
],
[
"Defant",
"Colin",
""
],
[
"Hodges",
"Eliot",
""
],
[
"Kravitz",
"Noah",
""
],
[
"Lee",
"Mitchell",
""
]
] |
2402.00651 | Subhajit Chattopadhyay | Subhajit Chattopadhyay, Kalyan Das and Sumitra Purkayastha | Skew-elliptical copula based mixed models for non-Gaussian longitudinal
data with application to an HIV-AIDS study | 24 pages, 5 figures and 7 tables | null | null | null | stat.ME stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This study was sparked by an extensive longitudinal dataset focusing on HIV
CD4 T$^+$ cell counts from Livingstone district, Zambia. Analysis of the
corresponding histogram plots reveals an absence of symmetry in the marginal
distributions, while pairwise scatter plots uncover non-elliptical dependence
patterns. Traditional linear mixed models designed for longitudinal data fail
to capture these complexities adequately. Therefore, it appears prudent to
explore a broader framework for modeling such data. In this article, we delve
into generalized linear mixed models (GLMM) for the marginals (e.g., the Gamma
mixed model), and we address the temporal dependency of repeated measurements
by utilizing copulas associated with skew-elliptical distributions (such as the
skew-normal/skew-$t$). Our proposed class of copula-based mixed models
simultaneously accommodates asymmetry, between-subject variability, and
non-standard temporal dependence, thus offering extensions to the standard
linear mixed model based on multivariate normality. We estimate the model
parameters using the IFM (inference function of margins) method and outline the
process of obtaining standard errors for parameter estimates. Through extensive
simulation studies covering skewed and symmetric marginal distributions and
various copula choices, we assess the finite sample performance of our
approach. Finally, we apply these models to the HIV dataset and present our
findings.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2024 15:13:13 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Jan 2025 14:32:44 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 15:50:02 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Chattopadhyay",
"Subhajit",
""
],
[
"Das",
"Kalyan",
""
],
[
"Purkayastha",
"Sumitra",
""
]
] |
2402.00785 | Ahmad Sheykhi | Kimet Jusufi and Ahmad Sheykhi | Apparent Dark Matter Inspired by Einstein Equation of State | 8 pages | Eur. Phys. Lett. 147 ( 2024)19001 | 10.1209/0295-5075/ad59bd | null | gr-qc hep-th | http://creativecommons.org/licenses/by/4.0/ | The purpose of this article is twofold. First, by means of Padmanabhan's
proposal on the emergence nature of gravity, we recover the $\Lambda$CDM model
and the effect of the dark matter in the context of cosmology. Toward this
goal, we use the key idea of Padmanabhan that states cosmic space emerges as
the cosmic time progress and link the emergence of space to the difference
between the number of degrees of freedom on the boundary and in the bulk.
Interestingly enough, we show that the effect of the cold dark matter in the
cosmological setup can be understood by assuming an interaction between the
numbers of degrees of freedom in the bulk. In the second part, we follow the
Jacobson's argument and obtain the modified Einstein field equations with
additional dark matter component emerging due to the interaction term between
dark energy and baryonic matter related by $\Omega_{DM,0}=\sqrt{2 \alpha
\Omega_{M,0} \Omega_{DE,0}}$, where $\alpha$ is a coupling constant. Finally, a
correspondence with Yukawa cosmology is pointed out, and the role of massive
gravitons as a possibility in explaining the nature of the dark sector as well
as the theoretical origin of the Modified Newtonian Dynamics (MOND) are
addressed. We speculate that the interaction coupling $\alpha$ fundamentally
measures the entanglement between the gravitons and matter fields and there
exists a fundamental limitation in measuring the gravitons wavelength.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2024 17:13:12 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Feb 2024 13:38:02 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Jusufi",
"Kimet",
""
],
[
"Sheykhi",
"Ahmad",
""
]
] |
2402.01110 | Mengmeng Zhang | Jingyan Li, Jie Wu, Shing-Tung Yau and Mengmeng Zhang | Homotopy Groups and Puppe Sequence of Digraphs | null | null | null | null | math.AT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce homotopy groups of digraphs that admit an intuitive description
of grid structures, which is a variation of the GLMY homotopy groups introduced
by Grigor'yan, Lin, Muranov and Yau in 2014. This direct approach enables a
descriptive interpretation of GLMY theory in applications such as network
science. Furthermore, we prove that there exists a long exact sequence of
homotopy groups of digraphs associated to any based digraph map, that is, there
exists a digraph version of the Puppe sequence.
| [
{
"version": "v1",
"created": "Fri, 2 Feb 2024 02:58:16 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Apr 2024 11:38:42 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Apr 2024 10:41:51 GMT"
},
{
"version": "v4",
"created": "Sun, 4 May 2025 11:26:47 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Li",
"Jingyan",
""
],
[
"Wu",
"Jie",
""
],
[
"Yau",
"Shing-Tung",
""
],
[
"Zhang",
"Mengmeng",
""
]
] |
2402.01685 | Haozheng Luo | Yu Zhang, Mei Di, Haozheng Luo, Chenwei Xu, Richard Tzong-Han Tsai | SMUTF: Schema Matching Using Generative Tags and Hybrid Features | Information Systems | null | null | null | cs.CL cs.AI cs.DB | http://creativecommons.org/licenses/by/4.0/ | We introduce SMUTF (Schema Matching Using Generative Tags and Hybrid
Features), a unique approach for large-scale tabular data schema matching (SM),
which assumes that supervised learning does not affect performance in
open-domain tasks, thereby enabling effective cross-domain matching. This
system uniquely combines rule-based feature engineering, pre-trained language
models, and generative large language models. In an innovative adaptation
inspired by the Humanitarian Exchange Language, we deploy "generative tags" for
each data column, enhancing the effectiveness of SM. SMUTF exhibits extensive
versatility, working seamlessly with any pre-existing pre-trained embeddings,
classification methods, and generative models.
Recognizing the lack of extensive, publicly available datasets for SM, we
have created and open-sourced the HDXSM dataset from the public humanitarian
data. We believe this to be the most exhaustive SM dataset currently available.
In evaluations across various public datasets and the novel HDXSM dataset,
SMUTF demonstrated exceptional performance, surpassing existing
state-of-the-art models in terms of accuracy and efficiency, and improving the
F1 score by 11.84% and the AUC of ROC by 5.08%. Code is available at
https://github.com/fireindark707/Python-Schema-Matching.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2024 08:47:50 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Feb 2024 06:03:13 GMT"
},
{
"version": "v3",
"created": "Sat, 3 May 2025 07:53:12 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Zhang",
"Yu",
""
],
[
"Di",
"Mei",
""
],
[
"Luo",
"Haozheng",
""
],
[
"Xu",
"Chenwei",
""
],
[
"Tsai",
"Richard Tzong-Han",
""
]
] |
2402.01989 | Hassan Zahid Butt | Hassan Zahid Butt and Xingpeng Li | Enhancing Optimal Microgrid Planning with Adaptive BESS Degradation
Costs and PV Asset Management: An Iterative Post-Optimization Correction
Framework | null | null | 10.1016/j.epsr.2025.111785 | null | eess.SY cs.SY | http://creativecommons.org/licenses/by/4.0/ | The transition to renewable energy has positioned photovoltaic (PV) systems
and battery energy storage systems (BESS) as essential assets in microgrids,
particularly for remote installations. However, traditional planning models
often neglect dynamic degradation costs or rely on complex or non-linear
approaches, limiting their scalability and practical applicability. This paper
introduces a microgrid planning model that integrates adaptive degradation cost
modeling to enable accurate, efficient, and scalable long-term resource
allocation. The proposed model employs the iterative post-optimization
correction (IPOC) framework, solving a sequence of mixed-integer linear
programming problems. Each iteration refines BESS degradation costs based on
observed depth-of-discharge profiles and incorporates PV degradation costs to
ensure realistic asset performance assessments. Sensitivity analysis of PV and
BESS capital costs further underscores the model's robustness under varying
economic conditions, with the IPOC framework achieving up to ~1% additional
cost savings for the given test system compared to static approaches. The
results demonstrate that by iteratively adjusting degradation penalties based
on actual usage, the methodology optimizes BESS performance, ensures precise
resource allocation, resolves issues of under- or overutilization, enhances
system reliability, and facilitates scalable, sustainable microgrid planning.
| [
{
"version": "v1",
"created": "Sat, 3 Feb 2024 02:20:36 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Feb 2025 22:14:04 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Butt",
"Hassan Zahid",
""
],
[
"Li",
"Xingpeng",
""
]
] |
2402.03100 | Aur\'elien Velleret | Viktor Bezborodov, Tyll Krueger, Cornelia Pokalyuk, Piotr Szyma\'nski
and Aur\'elien Velleret | Inter-city infections and the role of size heterogeneity in containment
strategies | main text: 46 pages, supplementary material: 28p keywords: Epidemic
spreading; Stochastic processes; SIR epidemic model; Random graphs;
Containment strategies; Transportation networks; Lockdowns | null | null | null | physics.soc-ph math.PR | http://creativecommons.org/licenses/by/4.0/ | This study examines the effectiveness of regional lockdown strategies in
mitigating pathogen spread across regional units, termed cities hereinafter. We
develop simplified models to analyze infection spread across cities within a
country during an epidemic wave. Isolation of a city is initiated when
infection numbers within the city surpass defined thresholds. We compare two
strategies: strategy (P) consists in prescribing thresholds proportionally to
city sizes, while the same threshold is used for all cities under strategy (U).
Given the heavy-tailed distribution of city sizes, strategy (P) may result in
more secondary infections from larger cities than strategy (U).
Random graph models are constructed to represent infection spread as a
percolation process. In particular, we consider a model in which mobility
between cities only depends on city sizes. We assess the relative efficiency of
the two strategies by comparing the ratios of the number of individuals under
isolation to the total number of infections by the end of the epidemic wave
under strategy (P) and (U). Additionally, we derive analytical formulas for
disease prevalence and basic reproduction numbers.
Our models are calibrated using mobility data from France, Poland and Japan,
validated through simulation. The findings indicate that mobility between
cities in France and Poland is mainly determined by city sizes. However, a poor
fit was observed with Japanese data, highlighting the importance to include
other factors like e.g. geography for some countries in modeling. Our analysis
suggest similar effectiveness for both strategies in France and Japan, while
strategy (U) demonstrates distinct merits in Poland.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2024 15:29:04 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Jul 2024 14:22:58 GMT"
},
{
"version": "v3",
"created": "Sat, 3 May 2025 07:51:19 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Bezborodov",
"Viktor",
""
],
[
"Krueger",
"Tyll",
""
],
[
"Pokalyuk",
"Cornelia",
""
],
[
"Szymański",
"Piotr",
""
],
[
"Velleret",
"Aurélien",
""
]
] |
2402.04168 | Daniel Bogdoll | Daniel Bogdoll, Jing Qin, Moritz Nekolla, Ahmed Abouelazm, Tim Joseph,
J. Marius Z\"ollner | Informed Reinforcement Learning for Situation-Aware Traffic Rule
Exceptions | Daniel Bogdoll and Jing Qin contributed equally. Accepted for
publication at ICRA 2024 | null | 10.1109/ICRA57147.2024.10610842 | null | cs.LG cs.CV cs.RO | http://creativecommons.org/licenses/by/4.0/ | Reinforcement Learning is a highly active research field with promising
advancements. In the field of autonomous driving, however, often very simple
scenarios are being examined. Common approaches use non-interpretable control
commands as the action space and unstructured reward designs which lack
structure. In this work, we introduce Informed Reinforcement Learning, where a
structured rulebook is integrated as a knowledge source. We learn trajectories
and asses them with a situation-aware reward design, leading to a dynamic
reward which allows the agent to learn situations which require controlled
traffic rule exceptions. Our method is applicable to arbitrary RL models. We
successfully demonstrate high completion rates of complex scenarios with recent
model-based agents.
| [
{
"version": "v1",
"created": "Tue, 6 Feb 2024 17:24:06 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jun 2024 11:34:30 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Bogdoll",
"Daniel",
""
],
[
"Qin",
"Jing",
""
],
[
"Nekolla",
"Moritz",
""
],
[
"Abouelazm",
"Ahmed",
""
],
[
"Joseph",
"Tim",
""
],
[
"Zöllner",
"J. Marius",
""
]
] |
2402.07002 | Yuecheng Li | Yuecheng Li, Lele Fu, Tong Wang, Jian Lou, Bin Chen, Lei Yang, Jian
Shen, Zibin Zheng, Chuan Chen | Clients Collaborate: Flexible Differentially Private Federated Learning
with Guaranteed Improvement of Utility-Privacy Trade-off | Accepted by ICML 2025 | null | null | null | cs.LG cs.AI cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To defend against privacy leakage of user data, differential privacy is
widely used in federated learning, but it is not free. The addition of noise
randomly disrupts the semantic integrity of the model and this disturbance
accumulates with increased communication rounds. In this paper, we introduce a
novel federated learning framework with rigorous privacy guarantees, named
FedCEO, designed to strike a trade-off between model utility and user privacy
by letting clients ''Collaborate with Each Other''. Specifically, we perform
efficient tensor low-rank proximal optimization on stacked local model
parameters at the server, demonstrating its capability to flexibly truncate
high-frequency components in spectral space. This capability implies that our
FedCEO can effectively recover the disrupted semantic information by smoothing
the global semantic space for different privacy settings and continuous
training processes. Moreover, we improve the SOTA utility-privacy trade-off
bound by order of $\sqrt{d}$, where $d$ is the input dimension. We illustrate
our theoretical results with experiments on representative datasets and observe
significant performance improvements and strict privacy guarantees under
different privacy settings. The code is available at
https://github.com/6lyc/FedCEO_Collaborate-with-Each-Other.
| [
{
"version": "v1",
"created": "Sat, 10 Feb 2024 17:39:34 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 17:50:42 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Li",
"Yuecheng",
""
],
[
"Fu",
"Lele",
""
],
[
"Wang",
"Tong",
""
],
[
"Lou",
"Jian",
""
],
[
"Chen",
"Bin",
""
],
[
"Yang",
"Lei",
""
],
[
"Shen",
"Jian",
""
],
[
"Zheng",
"Zibin",
""
],
[
"Chen",
"Chuan",
""
]
] |
2402.07407 | Yiqi Zhao | Yiqi Zhao, Xinyi Yu, Matteo Sesia, Jyotirmoy V. Deshmukh, Lars
Lindemann | Conformal Predictive Programming for Chance Constrained Optimization | null | null | null | null | eess.SY cs.LG cs.SY math.OC stat.ML | http://creativecommons.org/licenses/by/4.0/ | We propose conformal predictive programming (CPP), a framework to solve
chance constrained optimization problems, i.e., optimization problems with
constraints that are functions of random variables. CPP utilizes samples from
these random variables along with the quantile lemma - central to conformal
prediction - to transform the chance constrained optimization problem into a
deterministic problem with a quantile reformulation. CPP inherits a priori
guarantees on constraint satisfaction from existing sample average
approximation approaches for a class of chance constrained optimization
problems, and it provides a posteriori guarantees that are of conditional and
marginal nature otherwise. The strength of CPP is that it can easily support
different variants of conformal prediction which have been (or will be)
proposed within the conformal prediction community. To illustrate this, we
present robust CPP to deal with distribution shifts in the random variables and
Mondrian CPP to deal with class conditional chance constraints. To enable
tractable solutions to the quantile reformulation, we present a mixed integer
programming method (CPP-MIP) encoding, a bilevel optimization strategy
(CPP-Bilevel), and a sampling-and-discarding optimization strategy
(CPP-Discarding). We also extend CPP to deal with joint chance constrained
optimization (JCCO). In a series of case studies, we show the validity of the
aforementioned approaches, empirically compare CPP-MIP, CPP-Bilevel, as well as
CPP-Discarding, and illustrate the advantage of CPP as compared to scenario
approach.
| [
{
"version": "v1",
"created": "Mon, 12 Feb 2024 04:59:34 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 00:42:41 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Zhao",
"Yiqi",
""
],
[
"Yu",
"Xinyi",
""
],
[
"Sesia",
"Matteo",
""
],
[
"Deshmukh",
"Jyotirmoy V.",
""
],
[
"Lindemann",
"Lars",
""
]
] |
2402.07837 | Mohammed Adjieteh | Mohammed Adjieteh and Vytaras Brazauskas | Quantile Least Squares: A Flexible Approach for Robust Estimation and
Validation of Location-Scale Families | null | null | null | null | stat.ME stat.CO | http://creativecommons.org/licenses/by/4.0/ | In this paper, the problem of robust estimation and validation of
location-scale families is revisited. The proposed methods exploit the joint
asymptotic normality of sample quantiles (of i.i.d random variables) to
construct the ordinary and generalized least squares estimators of location and
scale parameters. These quantile least squares (QLS) estimators are easy to
compute because they have explicit expressions, their robustness is achieved by
excluding extreme quantiles from the least-squares estimation, and efficiency
is boosted by using as many non-extreme quantiles as practically relevant. The
influence functions of the QLS estimators are specified and plotted for several
location-scale families. They closely resemble the shapes of some well-known
influence functions yet those shapes emerge automatically (i.e., do not need to
be specified). The joint asymptotic normality of the proposed estimators is
established, and their finite-sample properties are explored using simulations.
Also, computational costs of these estimators, as well as those of MLE, are
evaluated for sample sizes n = 10^6, 10^7, 10^8, 10^9. For model validation,
two goodness-of-fit tests are constructed and their performance is studied
using simulations and real data. In particular, for the daily stock returns of
Google over the last four years, both tests strongly support the logistic
distribution assumption and reject other bell-shaped competitors.
| [
{
"version": "v1",
"created": "Mon, 12 Feb 2024 17:46:58 GMT"
},
{
"version": "v2",
"created": "Fri, 2 May 2025 19:42:20 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Adjieteh",
"Mohammed",
""
],
[
"Brazauskas",
"Vytaras",
""
]
] |
2402.09607 | Surendra Nepal | Surendra Nepal, Vishnu Raveendran, Michael Eden, Rainey Lyons, Adrian
Muntean | Numerical Exploration of Nonlinear Dispersion Effects via a Strongly
Coupled Two-scale System | 29 pages, 10 figures, 3 tables | null | null | null | math.NA cs.NA math.AP | http://creativecommons.org/licenses/by/4.0/ | The effective, fast transport of matter through porous media is often
characterized by complex dispersion effects. To describe in mathematical terms
such situations, instead of a simple macroscopic equation (as in the classical
Darcy's law), one may need to consider two-scale boundary-value problems with
full coupling between the scales where the macroscopic transport depends
non-linearly on local (i.e. microscopic) drift interactions, which are again
influenced by local concentrations. Such two-scale problems are computationally
very expensive as numerous elliptic partial differential equations (cell
problems) have to constantly be recomputed. In this work, we investigate such
an effective two-scale model involving a suitable nonlinear dispersion term and
explore numerically the behavior of its weak solutions. We introduce two
distinct numerical schemes dealing with the same non-linear scale-coupling: (i)
a Picard-type iteration and (ii) a time discretization decoupling. In addition,
we propose a precomputing strategy where the calculations of cell problems are
pushed into an offline phase. Our approach works for both schemes and
significantly reduces computation times. We prove that the proposed
precomputing strategy converges to the exact solution. Finally, we test our
schemes via several numerical experiments that illustrate dispersion effects
introduced by specific choices of microstructure and model ingredients.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2024 22:28:25 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 17:14:47 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Nepal",
"Surendra",
""
],
[
"Raveendran",
"Vishnu",
""
],
[
"Eden",
"Michael",
""
],
[
"Lyons",
"Rainey",
""
],
[
"Muntean",
"Adrian",
""
]
] |
2402.10092 | Dimitra Tsigkari | Joana Tirana, Dimitra Tsigkari, George Iosifidis, Dimitris
Chatzopoulos | Workflow Optimization for Parallel Split Learning | IEEE INFOCOM 2024 | null | 10.1109/INFOCOM52122.2024.10621348 | null | cs.DC cs.LG cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Split learning (SL) has been recently proposed as a way to enable
resource-constrained devices to train multi-parameter neural networks (NNs) and
participate in federated learning (FL). In a nutshell, SL splits the NN model
into parts, and allows clients (devices) to offload the largest part as a
processing task to a computationally powerful helper. In parallel SL, multiple
helpers can process model parts of one or more clients, thus, considerably
reducing the maximum training time over all clients (makespan). In this paper,
we focus on orchestrating the workflow of this operation, which is critical in
highly heterogeneous systems, as our experiments show. In particular, we
formulate the joint problem of client-helper assignments and scheduling
decisions with the goal of minimizing the training makespan, and we prove that
it is NP-hard. We propose a solution method based on the decomposition of the
problem by leveraging its inherent symmetry, and a second one that is fully
scalable. A wealth of numerical evaluations using our testbed's measurements
allow us to build a solution strategy comprising these methods. Moreover, we
show that this strategy finds a near-optimal solution, and achieves a shorter
makespan than the baseline scheme by up to 52.3%.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2024 14:16:10 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Tirana",
"Joana",
""
],
[
"Tsigkari",
"Dimitra",
""
],
[
"Iosifidis",
"George",
""
],
[
"Chatzopoulos",
"Dimitris",
""
]
] |
2402.10165 | Xiaoyu Xu | Renxing Wan, Xiaoyu Xu, Wenyuan Yang | Marked length spectrum rigidity in groups with contracting elements | 45 pages; final version | J. London Math. Soc. 111 (2025), no.4, e70146 | 10.1112/jlms.70146 | null | math.GR math.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a study of the well-known marked length spectrum rigidity
problem in the coarse-geometric setting. For any two (possibly non-proper)
group actions $G\curvearrowright X_1$ and $G\curvearrowright X_2$ with
contracting property, we prove that if the two actions have the same marked
length spectrum, then the orbit map $Go_1\to Go_2$ must be a rough isometry. In
the special case of cusp-uniform actions, the rough isometry can be extended to
the entire space. This generalizes the existing results in hyperbolic groups
and relatively hyperbolic groups. In addition, we prove a finer marked length
spectrum rigidity from confined subgroups and further, geometrically dense
subgroups. Our proof is based on the Extension Lemma and uses purely elementary
metric geometry. This study produces new results and recovers existing ones for
many more interesting groups through a unified and elementary approach.
| [
{
"version": "v1",
"created": "Thu, 15 Feb 2024 18:10:29 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Feb 2024 11:03:31 GMT"
},
{
"version": "v3",
"created": "Sat, 3 May 2025 13:28:56 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Wan",
"Renxing",
""
],
[
"Xu",
"Xiaoyu",
""
],
[
"Yang",
"Wenyuan",
""
]
] |
2402.12575 | Enrique Ide | Enrique Ide | Revisiting the Impact of Upstream Mergers with Downstream Complements
and Substitutes | null | null | null | null | econ.GN q-fin.EC | http://creativecommons.org/licenses/by/4.0/ | I examine how upstream mergers affect negotiated prices when suppliers
bargain with a monopoly intermediary selling products to final consumers.
Conventional wisdom holds that such transactions lower negotiated prices when
the products are complements for consumers and raise them when they are
substitutes. The idea is that consumer demand relationships carry over to
upstream negotiations, where mergers between complements weaken the suppliers'
bargaining leverage, while mergers between substitutes strengthen it. I
challenge this view, showing that it breaks down when the intermediary sells
products beyond those of the merging suppliers. In such cases, the merging
suppliers' products may act as substitutes for the intermediary even if they
are complements for consumers, or as complements for the intermediary even if
they are substitutes for consumers. These findings show that upstream
conglomerate mergers can raise prices without foreclosure or monopolization and
help explain buyer-specific price effects resulting from such mergers.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2024 21:55:41 GMT"
},
{
"version": "v2",
"created": "Sat, 18 Jan 2025 02:15:10 GMT"
},
{
"version": "v3",
"created": "Fri, 2 May 2025 22:01:10 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Ide",
"Enrique",
""
]
] |
2402.14264 | Jikai Jin | Jikai Jin and Vasilis Syrgkanis | Structure-agnostic Optimality of Doubly Robust Learning for Treatment
Effect Estimation | 31 pages, to appear in COLT 2025 | null | null | null | stat.ML cs.LG econ.EM math.ST stat.ME stat.TH | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Average treatment effect estimation is the most central problem in causal
inference with application to numerous disciplines. While many estimation
strategies have been proposed in the literature, the statistical optimality of
these methods has still remained an open area of investigation, especially in
regimes where these methods do not achieve parametric rates. In this paper, we
adopt the recently introduced structure-agnostic framework of statistical lower
bounds, which poses no structural properties on the nuisance functions other
than access to black-box estimators that achieve some statistical estimation
rate. This framework is particularly appealing when one is only willing to
consider estimation strategies that use non-parametric regression and
classification oracles as black-box sub-processes. Within this framework, we
prove the statistical optimality of the celebrated and widely used doubly
robust estimators for both the Average Treatment Effect (ATE) and the Average
Treatment Effect on the Treated (ATT), as well as weighted variants of the
former, which arise in policy evaluation.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2024 04:03:32 GMT"
},
{
"version": "v2",
"created": "Sat, 2 Mar 2024 02:00:58 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 01:30:17 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Jin",
"Jikai",
""
],
[
"Syrgkanis",
"Vasilis",
""
]
] |
2402.14801 | Durga Keerthi Mandarapu | Durga Keerthi Mandarapu, Nicholas James, Milind Kulkarni | Mochi: Fast \& Exact Collision Detection | null | null | null | null | cs.GR | http://creativecommons.org/licenses/by/4.0/ | Collision Detection (CD) has several applications across the domains such as
robotics, visual graphics, and fluid mechanics. Finding exact collisions
between the objects in the scene is quite computationally intensive. To quickly
filter the object pairs that do not result in a collision, bounding boxes are
built on the objects, indexed using a Bounding Volume Hierarchy(BVH), and
tested for intersection before performing the expensive object-object
intersection tests. In state-of-the-art CD libraries, accelerators such as GPUs
are used to accelerate BVH traversal by building specialized data structures.
The recent addition of ray tracing architecture to GPU hardware is designed to
do the same but in the context of implementing a Ray Tracing algorithm to
render a graphical scene in real-time. We present Mochi, a fast and exact
collision detection engine that accelerates both the broad and narrow phases by
taking advantage of the capabilities of Ray Tracing cores. We introduce
multiple new reductions to perform generic CD to support three types of objects
for CD: simple spherical particles, objects describable by mathematical
equations, and complex objects composed of a triangle mesh. By implementing our
reductions, Mochi achieves several orders of magnitude speedups on synthetic
datasets and 5x-28x speedups on real-world triangle mesh datasets. We further
evaluate our reductions thoroughly and provide several architectural insights
on the ray tracing cores that are otherwise unknown due to their
proprietorship.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2024 18:56:19 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Apr 2025 15:13:28 GMT"
},
{
"version": "v3",
"created": "Wed, 30 Apr 2025 15:45:22 GMT"
},
{
"version": "v4",
"created": "Sun, 4 May 2025 14:44:53 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Mandarapu",
"Durga Keerthi",
""
],
[
"James",
"Nicholas",
""
],
[
"Kulkarni",
"Milind",
""
]
] |
2402.15213 | Juan Manuel Gorriz Saez | Juan M Gorriz, J. Ramirez, F. Segovia, F. J. Martinez-Murcia, C.
Jim\'enez-Mesa and J. Suckling | Statistical Agnostic Regression: a machine learning method to validate
regression models | 23 pages, 18 figures | null | 10.1016/j.jare.2025.04.026 | null | stat.ML cs.LG math.ST stat.CO stat.TH | http://creativecommons.org/licenses/by/4.0/ | Regression analysis is a central topic in statistical modeling, aimed at
estimating the relationships between a dependent variable, commonly referred to
as the response variable, and one or more independent variables, i.e.,
explanatory variables. Linear regression is by far the most popular method for
performing this task in various fields of research, such as data integration
and predictive modeling when combining information from multiple sources.
Classical methods for solving linear regression problems, such as Ordinary
Least Squares (OLS), Ridge, or Lasso regressions, often form the foundation for
more advanced machine learning (ML) techniques, which have been successfully
applied, though without a formal definition of statistical significance. At
most, permutation or analyses based on empirical measures (e.g., residuals or
accuracy) have been conducted, leveraging the greater sensitivity of ML
estimations for detection. In this paper, we introduce Statistical Agnostic
Regression (SAR) for evaluating the statistical significance of ML-based linear
regression models. This is achieved by analyzing concentration inequalities of
the actual risk (expected loss) and considering the worst-case scenario. To
this end, we define a threshold that ensures there is sufficient evidence, with
a probability of at least $1-\eta$, to conclude the existence of a linear
relationship in the population between the explanatory (feature) and the
response (label) variables. Simulations demonstrate the ability of the proposed
agnostic (non-parametric) test to provide an analysis of variance similar to
the classical multivariate $F$-test for the slope parameter, without relying on
the underlying assumptions of classical methods. Moreover, the residuals
computed from this method represent a trade-off between those obtained from ML
approaches and the classical OLS.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2024 09:19:26 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Mar 2024 07:26:48 GMT"
},
{
"version": "v3",
"created": "Sat, 9 Nov 2024 09:49:57 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Gorriz",
"Juan M",
""
],
[
"Ramirez",
"J.",
""
],
[
"Segovia",
"F.",
""
],
[
"Martinez-Murcia",
"F. J.",
""
],
[
"Jiménez-Mesa",
"C.",
""
],
[
"Suckling",
"J.",
""
]
] |
2402.15290 | Tongyi Liang | Tongyi Liang and Han-Xiong Li | Efficient State Space Model via Fast Tensor Convolution and Block
Diagonalization | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing models encounter bottlenecks in balancing performance and
computational efficiency when modeling long sequences. Although the state space
model (SSM) has achieved remarkable success in handling long sequence tasks, it
still faces the problem of large number of parameters. In order to further
improve the efficiency of SSM, we propose a new state space layer based on
multiple-input multiple-output SSM, called efficient SSM (eSSM). Our eSSM is
built on the convolutional representation of multi-input and multi-input (MIMO)
SSM. We propose a variety of effective strategies to improve the computational
efficiency. The diagonalization of the system matrix first decouples the
original system. Then a fast tensor convolution is proposed based on the fast
Fourier transform. In addition, the block diagonalization of the SSM further
reduces the model parameters and improves the model flexibility. Extensive
experimental results show that the performance of the proposed model on
multiple databases matches the performance of state-of-the-art models, such as
S4, and is significantly better than Transformers and LSTM. In the model
efficiency benchmark, the parameters of eSSM are only 12.89\% of LSTM and
13.24\% of Mamba. The training speed of eSSM is 3.94 times faster than LSTM and
1.35 times faster than Mamba. Code is available at:
\href{https://github.com/leonty1/essm}{https://github.com/leonty1/essm}.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2024 12:36:31 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Jun 2024 05:59:38 GMT"
},
{
"version": "v3",
"created": "Sun, 6 Oct 2024 15:14:53 GMT"
},
{
"version": "v4",
"created": "Mon, 5 May 2025 02:20:07 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Liang",
"Tongyi",
""
],
[
"Li",
"Han-Xiong",
""
]
] |
2402.15388 | Matin Fallahi | Matin Fallahi, Patricia Arias Cabarcos, Thorsten Strufe | On the Usability of Next-Generation Authentication: A Study on Eye
Movement and Brainwave-based Mechanisms | null | null | 10.1145/3706599.3720118 | null | cs.CR cs.HC | http://creativecommons.org/licenses/by/4.0/ | Passwords remain a widely-used authentication mechanism, despite their
well-known security and usability limitations. To improve on this situation,
next-generation authentication mechanisms, based on behavioral biometric
factors such as eye movement and brainwave have emerged. However, their
usability remains relatively under-explored. To fill this gap, we conducted an
empirical user study (n=32 participants) to evaluate three brain-based and
three eye-based authentication mechanisms, using both qualitative and
quantitative methods. Our findings show good overall usability according to the
System Usability Scale for both categories of mechanisms, with average SUS
scores in the range of 78.6-79.6 and the best mechanisms rated with an
"excellent" score. Participants particularly identified brainwave
authentication as more secure yet more privacy-invasive and effort-intensive
compared to eye movement authentication. However, the significant number of
neutral responses indicates participants' need for more detailed information
about the security and privacy implications of these authentication methods.
Building on the collected evidence, we identify three key areas for
improvement: privacy, authentication interface design, and verification time.
We offer recommendations for designers and developers to improve the usability
and security of next-generation authentication mechanisms.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2024 15:34:43 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Fallahi",
"Matin",
""
],
[
"Cabarcos",
"Patricia Arias",
""
],
[
"Strufe",
"Thorsten",
""
]
] |
2402.15886 | Aritram Dhar | Alexander Berkovich, Aritram Dhar | Extension of Bressoud's generalization of Borwein's conjecture and some
exact results | 17 pages, 2 figures | The Ramanujan Journal (2025) | 10.1007/s11139-025-01063-0 | null | math.CO math.NT | http://creativecommons.org/licenses/by/4.0/ | In this paper, we conjecture an extension to Bressoud's 1996 generalization
of Borwein's famous 1990 conjecture. We then state a few infinite hierarchies
of non-negative $q$-series identities which are interesting examples of our
proposed conjecture and Bressoud's generalized conjecture. Finally, using
certain positivity-preserving transformations for $q$-binomial coefficients, we
prove the non-negativity of the infinite families.
| [
{
"version": "v1",
"created": "Sat, 24 Feb 2024 19:34:15 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Mar 2024 23:11:52 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Jun 2024 21:14:30 GMT"
},
{
"version": "v4",
"created": "Wed, 7 Aug 2024 00:28:53 GMT"
},
{
"version": "v5",
"created": "Sun, 4 May 2025 17:57:02 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Berkovich",
"Alexander",
""
],
[
"Dhar",
"Aritram",
""
]
] |
2402.16310 | Bangchao Deng | Bangchao Deng, Bingqing Qu, Pengyang Wang, Dingqi Yang, Benjamin
Fankhauser and Philippe Cudre-Mauroux | REPLAY: Modeling Time-Varying Temporal Regularities of Human Mobility
for Location Prediction over Sparse Trajectories | Accepted by IEEE Transactions on Mobile Computing | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Location prediction forecasts a user's location based on historical user
mobility traces. To tackle the intrinsic sparsity issue of real-world user
mobility traces, spatiotemporal contexts have been shown as significantly
useful. Existing solutions mostly incorporate spatiotemporal distances between
locations in mobility traces, either by feeding them as additional inputs to
Recurrent Neural Networks (RNNs) or by using them to search for informative
past hidden states for prediction. However, such distance-based methods fail to
capture the time-varying temporal regularities of human mobility, where human
mobility is often more regular in the morning than in other periods, for
example; this suggests the usefulness of the actual timestamps besides the
temporal distances. Against this background, we propose REPLAY, a general RNN
architecture learning to capture the time-varying temporal regularities for
location prediction. Specifically, REPLAY not only resorts to the
spatiotemporal distances in sparse trajectories to search for the informative
past hidden states, but also accommodates the time-varying temporal
regularities by incorporating smoothed timestamp embeddings using Gaussian
weighted averaging with timestamp-specific learnable bandwidths, which can
flexibly adapt to the temporal regularities of different strengths across
different timestamps. Our extensive evaluation compares REPLAY against a
sizable collection of state-of-the-art techniques on two real-world datasets.
Results show that REPLAY consistently and significantly outperforms
state-of-the-art methods by 7.7\%-10.5\% in the location prediction task, and
the bandwidths reveal interesting patterns of the time-varying temporal
regularities.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2024 05:28:36 GMT"
},
{
"version": "v2",
"created": "Mon, 6 May 2024 04:05:18 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Jun 2024 01:14:26 GMT"
},
{
"version": "v4",
"created": "Mon, 5 May 2025 01:48:08 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Deng",
"Bangchao",
""
],
[
"Qu",
"Bingqing",
""
],
[
"Wang",
"Pengyang",
""
],
[
"Yang",
"Dingqi",
""
],
[
"Fankhauser",
"Benjamin",
""
],
[
"Cudre-Mauroux",
"Philippe",
""
]
] |
2402.16631 | Qiyang Zhao | Hang Zou, Qiyang Zhao, Samson Lasaulce, Lina Bariah, Mehdi Bennis,
Merouane Debbah | GenAINet: Enabling Wireless Collective Intelligence via Knowledge
Transfer and Reasoning | null | null | null | null | cs.AI cs.NI eess.SP | http://creativecommons.org/licenses/by/4.0/ | Generative Artificial Intelligence (GenAI) and communication networks are
expected to have groundbreaking synergies for 6G. Connecting GenAI agents via a
wireless network can potentially unleash the power of Collective Intelligence
(CI) and pave the way for Artificial General Intelligence (AGI). However,
current wireless networks are designed as a "data pipe" and are not suited to
accommodate and leverage the power of GenAI. In this paper, we propose the
GenAINet framework in which distributed GenAI agents communicate knowledge
(facts, experiences, and methods) to accomplish arbitrary tasks. We first
propose an architecture for a single GenAI agent and then provide a network
architecture integrating GenAI capabilities to manage both network protocols
and applications. Building on this, we investigate effective communication and
reasoning problems by proposing a semantic-native GenAINet. Specifically, GenAI
agents extract semantics from heterogeneous raw data, build and maintain a
knowledge model representing the semantic relationships among pieces of
knowledge, which is retrieved by GenAI models for planning and reasoning. Under
this paradigm, different levels of collaboration can be achieved flexibly
depending on the complexity of targeted tasks. Furthermore, we conduct two case
studies in which, through wireless device queries, we demonstrate that
extracting, compressing and transferring common knowledge can improve query
accuracy while reducing communication costs; and in the wireless power control
problem, we show that distributed agents can complete general tasks
independently through collaborative reasoning without predefined communication
protocols. Finally, we discuss challenges and future research directions in
applying Large Language Models (LLMs) in 6G networks.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2024 15:03:46 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Feb 2024 19:43:51 GMT"
},
{
"version": "v3",
"created": "Sun, 4 May 2025 20:44:38 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Zou",
"Hang",
""
],
[
"Zhao",
"Qiyang",
""
],
[
"Lasaulce",
"Samson",
""
],
[
"Bariah",
"Lina",
""
],
[
"Bennis",
"Mehdi",
""
],
[
"Debbah",
"Merouane",
""
]
] |
2402.16799 | Robert N\"urnberg | Klaus Deckelnick and Robert N\"urnberg | Finite element schemes with tangential motion for fourth order geometric
curve evolutions in arbitrary codimension | 30 pages, 10 figures | null | null | null | math.NA cs.NA | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We introduce novel finite element schemes for curve diffusion and elastic
flow in arbitrary codimension. The schemes are based on a variational form of a
system that includes a specifically chosen tangential motion. We derive optimal
$L^2$- and $H^1$-error bounds for continuous-in-time semidiscrete finite
element approximations that use piecewise linear elements. In addition, we
consider fully discrete schemes and, in the case of curve diffusion, prove
unconditional stability for it. Finally, we present several numerical
simulations, including some convergence experiments that confirm the derived
error bounds. The presented simulations suggest that the tangential motion
leads to equidistribution in practice.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2024 18:17:34 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Oct 2024 09:30:22 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 07:14:03 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Deckelnick",
"Klaus",
""
],
[
"Nürnberg",
"Robert",
""
]
] |
2402.17206 | Tianshuo Zhou | Tianshuo Zhou, Wei Yu Tang, Apoorv Malik, David H. Mathews, Liang
Huang | Scalable and Interpretable Identification of Minimal Undesignable RNA
Structure Motifs with Rotational Invariance | null | null | 10.1007/978-3-031-90252-9_10 | null | cs.DS | http://creativecommons.org/licenses/by-nc-nd/4.0/ | RNA design aims to find a sequence that folds with highest probability into a
designated target structure. However, certain structures are undesignable,
meaning no sequence can fold into the target structure under the default
(Turner) RNA folding model. Understanding the specific local structures (i.e.,
"motifs") that contribute to undesignability is crucial for refining RNA
folding models and determining the limits of RNA designability. Despite its
importance, this problem has received very little attention, and previous
efforts are neither scalable nor interpretable. We develop a new theoretical
framework for motif (un-)designability, and design scalable and interpretable
algorithms to identify minimal undesignable motifs within a given RNA secondary
structure. Our approach establishes motif undesignability by searching for
rival motifs, rather than exhaustively enumerating all (partial) sequences that
could potentially fold into the motif. Furthermore, we exploit rotational
invariance in RNA structures to detect, group, and reuse equivalent motifs and
to construct a database of unique minimal undesignable motifs. To achieve that,
we propose a loop-pair graph representation for motifs and a recursive graph
isomorphism algorithm for motif equivalence. Our algorithms successfully
identify 24 unique minimal undesignable motifs among 18 undesignable puzzles
from the Eterna100 benchmark. Surprisingly, we also find over 350 unique
minimal undesignable motifs and 663 undesignable native structures in the
ArchiveII dataset, drawn from a diverse set of RNA families. Our source code is
available at https://github.com/shanry/RNA-Undesign and our web server is
available at http://linearfold.org/motifs.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2024 04:55:30 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Nov 2024 07:00:37 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Feb 2025 00:41:13 GMT"
},
{
"version": "v4",
"created": "Sun, 4 May 2025 09:38:31 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Zhou",
"Tianshuo",
""
],
[
"Tang",
"Wei Yu",
""
],
[
"Malik",
"Apoorv",
""
],
[
"Mathews",
"David H.",
""
],
[
"Huang",
"Liang",
""
]
] |
2402.18226 | Jean-Simon Lemay | Robin Cockett, Jean-Simon Pacaud Lemay, Priyaa Varshinee Srinivasan | Drazin Inverses in Categories | Accepted and published in a special volume of Theory and Applications
of Categories celebrating William (Bill) Lawvere's contributions to category
theory | null | null | null | math.CT | http://creativecommons.org/licenses/by/4.0/ | Drazin inverses are a fundamental algebraic structure which have been
extensively deployed in semigroup theory, ring theory, and matrix theory.
Drazin inverses can also be defined for endomorphisms in any category. However,
beyond a paper by Puystjens and Robinson from 1987, there has been almost no
further development of Drazin inverses in category theory. Here we provide a
survey of the theory of Drazin inverses from a categorical perspective. We
introduce Drazin categories, in which every endomorphism has a Drazin inverse,
and provide various examples including the category of matrices over a field,
the category of finite length modules over a ring, and finite set enriched
categories. We also introduce the notion of expressive rank and prove that a
category with expressive rank is Drazin. Moreover, we not only study Drazin
inverses in mere categories, but also in additive categories and dagger
categories. In an arbitrary category, we show how a Drazin inverse corresponds
to an isomorphism in the idempotent splitting, as well as explain how Drazin
inverses relate to Leinster's notion of eventual image duality. In additive
categories, we consider core-nilpotent decompositions, image-kernel
decompositions, and Fitting decompositions. We also develop the notion of
Drazin inverses for pairs of opposing maps, generalizing the usual notion of
Drazin inverse for endomorphisms. As an application of this new kind of Drazin
inverse, for dagger categories, we provide a novel characterization of the
Moore-Penrose inverse in terms of being a Drazin inverse of the pair of a map
and its adjoint.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2024 10:46:39 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Jan 2025 19:25:50 GMT"
},
{
"version": "v3",
"created": "Sat, 3 May 2025 00:35:53 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Cockett",
"Robin",
""
],
[
"Lemay",
"Jean-Simon Pacaud",
""
],
[
"Srinivasan",
"Priyaa Varshinee",
""
]
] |
2402.18729 | Graham Pash | Graham Pash, Malik Hassanaly, Shashank Yellapantula | A Priori Uncertainty Quantification of Reacting Turbulence Closure
Models using Bayesian Neural Networks | null | null | 10.1016/j.engappai.2024.109821 | null | physics.flu-dyn cs.LG physics.data-an | http://creativecommons.org/licenses/by/4.0/ | While many physics-based closure model forms have been posited for the
sub-filter scale (SFS) in large eddy simulation (LES), vast amounts of data
available from direct numerical simulation (DNS) create opportunities to
leverage data-driven modeling techniques. Albeit flexible, data-driven models
still depend on the dataset and the functional form of the model chosen.
Increased adoption of such models requires reliable uncertainty estimates both
in the data-informed and out-of-distribution regimes. In this work, we employ
Bayesian neural networks (BNNs) to capture both epistemic and aleatoric
uncertainties in a reacting flow model. In particular, we model the filtered
progress variable scalar dissipation rate which plays a key role in the
dynamics of turbulent premixed flames. We demonstrate that BNN models can
provide unique insights about the structure of uncertainty of the data-driven
closure models. We also propose a method for the incorporation of
out-of-distribution information in a BNN. The efficacy of the model is
demonstrated by a priori evaluation on a dataset consisting of a variety of
flame conditions and fuels.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2024 22:19:55 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Jul 2024 03:06:54 GMT"
},
{
"version": "v3",
"created": "Wed, 30 Oct 2024 23:03:59 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Pash",
"Graham",
""
],
[
"Hassanaly",
"Malik",
""
],
[
"Yellapantula",
"Shashank",
""
]
] |
2403.01954 | Chen Xu | Chen Xu, Tian Lan, Yu Ji, Changlong Yu, Wei Wang, Jun Gao, Qunxi Dong,
Kun Qian, Piji Li, Wei Bi, and Bin Hu | DECIDER: A Dual-System Rule-Controllable Decoding Framework for Language
Generation | Accepted by IEEE TKDE 2025, 14 pages, 6 figures | null | null | null | cs.CL cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constrained decoding approaches aim to control the meaning or style of text
generated by the pre-trained large language models (LLMs or also PLMs) for
various tasks at inference time. However, these methods often guide plausible
continuations by greedily and explicitly selecting targets. Though fulfilling
the task requirements, these methods may overlook certain general and natural
logics that humans would implicitly follow towards such targets. Inspired by
cognitive dual-process theory, in this work, we propose a novel decoding
framework DECIDER where the base LLMs are equipped with a First-Order Logic
(FOL) reasoner to express and evaluate the rules, along with a decision
function that merges the outputs of both systems to guide the generation.
Unlike previous constrained decodings, DECIDER transforms the encouragement of
target-specific words into all words that satisfy several high-level rules,
enabling us to programmatically integrate our logic into LLMs. Experiments on
CommonGen and PersonaChat demonstrate that DECIDER effectively follows given
FOL rules to guide LLMs in a more human-like and logic-controlled manner.
| [
{
"version": "v1",
"created": "Mon, 4 Mar 2024 11:49:08 GMT"
},
{
"version": "v2",
"created": "Thu, 9 May 2024 09:21:47 GMT"
},
{
"version": "v3",
"created": "Sun, 7 Jul 2024 15:32:31 GMT"
},
{
"version": "v4",
"created": "Sun, 4 May 2025 06:48:20 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Xu",
"Chen",
""
],
[
"Lan",
"Tian",
""
],
[
"Ji",
"Yu",
""
],
[
"Yu",
"Changlong",
""
],
[
"Wang",
"Wei",
""
],
[
"Gao",
"Jun",
""
],
[
"Dong",
"Qunxi",
""
],
[
"Qian",
"Kun",
""
],
[
"Li",
"Piji",
""
],
[
"Bi",
"Wei",
""
],
[
"Hu",
"Bin",
""
]
] |
2403.02017 | Ying-Tao Zhang | Cheng-Ming Miao, Lizhou Liu, Yu-Hao Wan, Qing-Feng Sun, Ying-Tao Zhang | The General Principle behind Magnetization-induced Second-Order
Topological Corner States in the Kane-Mele Model | null | Phys. Rev. B 109, 205417 (2024) | 10.1103/PhysRevB.109.205417 | null | cond-mat.mes-hall | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a general principle for realizing second-order topological corner
states in the modified Kane-Mele model with magnetization. It is demonstrated
that the sign of the edge Dirac mass depends on the magnetization of the edge
sublattice termination. By adjusting the directions of magnetization according
to the type of sublattice at the termination of two edges, a mass domain wall
can be induced in the presence of topological corner states at an arbitrary
position. All previous work on introducing magnetization in the Kane-Mele model
to realize second-order topological corner states can be explained by the
presence of the Dirac mass domain wall with opposite signs. Applying this
principle, we design square-shaped and armchair-type hexagon-shaped graphene
nanoflakes with edge magnetization, allowing for the emergence of second-order
topological corner states. Our findings serve as a general theory,
demonstrating that the realization of second-order topological corner states is
not limited by boundary type or nanoflake shape.
| [
{
"version": "v1",
"created": "Mon, 4 Mar 2024 13:19:30 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Miao",
"Cheng-Ming",
""
],
[
"Liu",
"Lizhou",
""
],
[
"Wan",
"Yu-Hao",
""
],
[
"Sun",
"Qing-Feng",
""
],
[
"Zhang",
"Ying-Tao",
""
]
] |
2403.02023 | Ying-Tao Zhang | Xuan Zhang, Cheng-Ming Miao, Qing-Feng Sun, Ying-Tao Zhang | Realization of the Non-endpoint Majorana Bound States in an Extended
Kitaev Chain | null | Phys. Rev. B 109, 205119 (2024) | 10.1103/PhysRevB.109.205119 | null | cond-mat.mes-hall | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the energy levels and transport properties of an extended Kitaev
chain with a phase gradient. It is demonstrated that the hopping phase
difference can effectively induce the generation of Majorana bound states,
which are located at the non-endpoint sites of the chain. The number and
positions of the non-endpoint Majorana bound states can be modulated by the
hopping phase difference and initial hopping phase, respectively. In addition,
we propose a protocol to realize topological braiding operation by exchanging
the positions of two Majorana bound states in the extended Kitaev ring.
Furthermore, we also implement the braiding of any two of the multiple Majorana
bound states in the extended Kitaev double rings.
| [
{
"version": "v1",
"created": "Mon, 4 Mar 2024 13:27:43 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Zhang",
"Xuan",
""
],
[
"Miao",
"Cheng-Ming",
""
],
[
"Sun",
"Qing-Feng",
""
],
[
"Zhang",
"Ying-Tao",
""
]
] |
2403.03156 | Yuyi Wang | Yuyi Wang, Aiqiang Zhang, Yiyang Wu, Benda Xu, Xuewei Liu, Jiajie
Chen, Zhe Wang, Shaomin Chen | The Fast Stochastic Matching Pursuit for Neutrino and Dark Matter
Experiments | null | null | null | null | hep-ex physics.data-an physics.ins-det | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Photomultiplier tubes (PMT) are widely deployed at neutrino and dark matter
experiments for photon counting. When multiple photons hit a PMT consecutively,
their photo-electron (PE) pulses pile up to hinder the precise measurements of
the count and timings. We introduce Fast Stochastic Matching Pursuit (FSMP) to
analyze the PMT signal waveforms into individual PEs with the strategy of
reversible-jump Markov-chain Monte Carlo. We demonstrate that FSMP improves the
energy and time resolution of PMT-based experiments, gains acceleration on GPUs
and is extensible to microchannel-plate (MCP) PMTs with jumbo-charge outputs.
In the condition of our laboratory characterization of 8-inch MCP-PMTs, FSMP
improves the energy resolution by up to 10% from the long-serving method of
waveform integration.
| [
{
"version": "v1",
"created": "Tue, 5 Mar 2024 17:49:06 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Dec 2024 07:25:48 GMT"
},
{
"version": "v3",
"created": "Sun, 19 Jan 2025 09:32:13 GMT"
},
{
"version": "v4",
"created": "Mon, 5 May 2025 16:47:58 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Wang",
"Yuyi",
""
],
[
"Zhang",
"Aiqiang",
""
],
[
"Wu",
"Yiyang",
""
],
[
"Xu",
"Benda",
""
],
[
"Liu",
"Xuewei",
""
],
[
"Chen",
"Jiajie",
""
],
[
"Wang",
"Zhe",
""
],
[
"Chen",
"Shaomin",
""
]
] |
2403.03709 | Jeffrey Larson | Stephen Hudson and Jeffrey Larson and John-Luke Navarro and Stefan M.
Wild | Portable, heterogeneous ensemble workflows at scale using libEnsemble | null | null | 10.1177/10943420241298297 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | libEnsemble is a Python-based toolkit for running dynamic ensembles,
developed as part of the DOE Exascale Computing Project. The toolkit utilizes a
unique generator--simulator--allocator paradigm, where generators produce input
for simulators, simulators evaluate those inputs, and allocators decide whether
and when a simulator or generator should be called. The generator steers the
ensemble based on simulation results. Generators may, for example, apply
methods for numerical optimization, machine learning, or statistical
calibration. libEnsemble communicates between a manager and workers. We
overview the unique characteristics of libEnsemble as well as current and
potential interoperability with other packages in the workflow ecosystem. We
highlight libEnsemble's dynamic resource features: libEnsemble can detect
system resources, such as available nodes, cores, and GPUs, and assign these in
a portable way. These features allow users to specify the number of processors
and GPUs required for each simulation; and resources will be automatically
assigned on a wide range of systems, including Frontier, Aurora, and
Perlmutter. Such ensembles can include multiple simulation types, some using
GPUs and others using only CPUs, sharing nodes for maximum efficiency. We also
describe the benefits of libEnsemble's generator--simulator coupling, which
easily exposes to the user the ability to cancel, and portably kill, running
simulations based on models that are updated with intermediate simulation
output. We demonstrate libEnsemble's capabilities, scalability, and scientific
impact via a Gaussian process surrogate training problem for the longitudinal
density profile at the exit of a plasma accelerator stage. The study uses gpCAM
for the surrogate model and employs either Wake-T or WarpX simulations,
highlighting efficient use of resources that can easily extend to exascale.
| [
{
"version": "v1",
"created": "Wed, 6 Mar 2024 13:48:44 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Mar 2024 02:11:35 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Jul 2024 18:38:01 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Hudson",
"Stephen",
""
],
[
"Larson",
"Jeffrey",
""
],
[
"Navarro",
"John-Luke",
""
],
[
"Wild",
"Stefan M.",
""
]
] |
2403.04598 | Boris Epstein | Boris Epstein and Will Ma (Columbia University) | Optimizing Inventory Placement for a Downstream Online Matching Problem | null | null | null | null | cs.DS | http://creativecommons.org/licenses/by/4.0/ | We study the inventory placement problem of splitting $Q$ units of a single
item across warehouses in advance of a downstream online matching problem that
represents the dynamic fulfillment decisions of an e-commerce retailer. This is
a challenging problem both theoretically, due to the computational complexity
of the downstream matching problem, and practically, as the fulfillment team
continuously updates its algorithm while the placement team lacks direct
evaluation of placement decisions.
We compare the performance of three placement procedures based on optimizing
surrogate functions that have been studied and applied: Offline, Myopic, and
Fluid placement. On the theory side, we show that optimizing inventory
placement for the Offline surrogate leads to an $\alpha
(1-(1-1/d)^d)$-approximation for the joint placement and fulfillment problem
under any demand model that admits an $\alpha$-competitive fulfillment policy.
We assume $d$ is an upper bound on how many warehouses can serve any demand
location. The crux of our theoretical contribution is to use randomized
rounding to derive a tight $(1-(1-1/d)^d)$-approximation for the integer
programming problem of optimizing the Offline surrogate. We further show how to
extend this result to a multi-SKU setting, improving upon the best known
approximation of $1/2$. We use statistical learning to show that rounding after
optimizing a sample-average Offline surrogate, which is necessary due to the
exponentially-sized support, indeed has vanishing loss. On the experimental
side, we evaluate how different combinations of placement and fulfillment
procedures perform on a wide array of synthetic instances. When coupled with a
good fulfillment procedure, optimizing the Offline surrogate performs best even
compared to computationally-intensive simulation procedures, corroborating our
theory.
| [
{
"version": "v1",
"created": "Thu, 7 Mar 2024 15:46:19 GMT"
},
{
"version": "v2",
"created": "Thu, 2 May 2024 15:03:05 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 16:04:18 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Epstein",
"Boris",
"",
"Columbia University"
],
[
"Ma",
"Will",
"",
"Columbia University"
]
] |
2403.05007 | Xingran Chen | Xingran Chen, Yi Zhuang, and Kun Yang | Age of Computing: A Metric of Computation Freshness in Communication and
Computation Cooperative Networks | null | null | null | null | eess.SY cs.SY | http://creativecommons.org/licenses/by/4.0/ | In communication and computation cooperative networks (3CNs), timely
computation is crucial but not always guaranteed. There is a strong demand for
a computational task to be completed within a given deadline. The time taken
involves both processing time, communication time, and the impact of the
deadline. However, a measure of such timeliness in 3CNs is lacking. In this
paper, we introduce the novel concept, Age of Computing (AoC), to capture
computation freshness in 3CNs. We analyze AoC in a line topology consisting of
a source, a transmitter, a receiver, and a computational node. Tasks generated
by the source are immediately available at the transmitter, where they enter a
communication queue. These tasks then pass to the receiver and subsequently to
a computation queue at the computational node for processing. Each task has a
deadline, requiring completion within this timeframe. AoC is evaluated under
two types of deadlines: (i) soft deadline, tasks can be fed back to the source
if delayed beyond the deadline, but with additional latency; (ii) hard
deadline, tasks delayed beyond the deadline are discarded. Under both
deadlines, we derive the AoC formula and a general expression for the
time-average AoC. For the first-come, first-serve discipline, we obtain a
closed-form expression for the average AoC under the soft deadline and an
approximation for the hard deadline. In addition to freshness, we define
computation throughput, providing a general expression and an approximation. To
explore the relationship between freshness and throughput, we construct an
optimization problem and prove that the objective pair is a weakly
Pareto-optimal point. Numerical results validate all the theoretical findings.
Additionally, they reveal that under the hard deadline, the computation
throughput serves as a reliable proxy for the average AoC.
| [
{
"version": "v1",
"created": "Fri, 8 Mar 2024 03:06:39 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Mar 2024 10:51:35 GMT"
},
{
"version": "v3",
"created": "Tue, 19 Mar 2024 03:49:22 GMT"
},
{
"version": "v4",
"created": "Wed, 24 Jul 2024 09:26:12 GMT"
},
{
"version": "v5",
"created": "Thu, 25 Jul 2024 00:55:10 GMT"
},
{
"version": "v6",
"created": "Tue, 14 Jan 2025 04:36:20 GMT"
},
{
"version": "v7",
"created": "Sat, 3 May 2025 17:11:11 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Chen",
"Xingran",
""
],
[
"Zhuang",
"Yi",
""
],
[
"Yang",
"Kun",
""
]
] |
2403.05012 | Lexian Yang Prof. | Y. D. Li, Y. T. Cao, L. Y. Liu, P. Peng, H. Lin, C. Y. Pei, M. X.
Zhang, H. Wu, X. Du, W. X. Zhao, K. Y. Zhai, J. K. Zhao, M.-L. Lin, P. H.
Tan, Y. P. Qi, G. Li, H. J. Guo, Luyi Yang, and L. X. Yang | Ultrafast Dynamics of Bilayer and Trilayer Nickelate Superconductors | null | Science Bulletin 70, 180 (2025) | 10.1016/j.scib.2024.10.011 | null | cond-mat.supr-con cond-mat.str-el | http://creativecommons.org/licenses/by/4.0/ | In addition to the pressurized high-temperature superconductivity, bilayer
and trilayer nickelate superconductors Lan+1NinO3n+1 (n = 2 and 3) exhibit many
intriguing properties at ambient pressure, such as orbital-dependent electronic
correlation, non-Fermi liquid behavior, and density-wave transitions. Here,
using ultrafast reflectivity measurement, we observe a drastic difference
between the ultrafast dynamics of the bilayer and trilayer nickelates at
ambient pressure. Firstly, we observe a coherent phonon mode in La4Ni3O10
involving the collective vibration of La, Ni, and O atoms, which is absent in
La3Ni2O7. Secondly, the temperature-dependent relaxation time diverges near the
density-wave transition temperature of La4Ni3O10, in drastic contrast to
kink-like changes in La3Ni2O7. Moreover, we estimate the electron-phonon
coupling constants to be 0.05~0.07 and 0.12~0.16 for La3Ni2O7 and La4Ni3O10,
respectively, suggesting a relatively minor role of electron-phonon coupling in
the electronic properties of Lan+1NinO3n+1. Our work not only sheds light on
the relevant microscopic interaction but also establishes a foundation for
further studying the interplay between superconductivity and density-wave
transitions in nickelate superconductors.
| [
{
"version": "v1",
"created": "Fri, 8 Mar 2024 03:18:46 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Li",
"Y. D.",
""
],
[
"Cao",
"Y. T.",
""
],
[
"Liu",
"L. Y.",
""
],
[
"Peng",
"P.",
""
],
[
"Lin",
"H.",
""
],
[
"Pei",
"C. Y.",
""
],
[
"Zhang",
"M. X.",
""
],
[
"Wu",
"H.",
""
],
[
"Du",
"X.",
""
],
[
"Zhao",
"W. X.",
""
],
[
"Zhai",
"K. Y.",
""
],
[
"Zhao",
"J. K.",
""
],
[
"Lin",
"M. -L.",
""
],
[
"Tan",
"P. H.",
""
],
[
"Qi",
"Y. P.",
""
],
[
"Li",
"G.",
""
],
[
"Guo",
"H. J.",
""
],
[
"Yang",
"Luyi",
""
],
[
"Yang",
"L. X.",
""
]
] |
2403.05526 | Mikhail Borovikov | Mikhail Borovikov | On Koebe radius and coefficients estimate for univalent harmonic
mappings | null | null | null | null | math.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem on estimate of the Koebe radius for univalent harmonic mappings
of the unit disk $\mathbb D=\{z\in\mathbb C : |z|<1\}$ is considered. For a
subclass of harmonic mappings with the standard normalization and a certain
growth estimate for analytic dilatation, we provide new estimate for the Koebe
radius. New estimate for Taylor coefficients of the holomorphic part of a
function from the subclass under consideration is obtained as a corollary.
| [
{
"version": "v1",
"created": "Fri, 8 Mar 2024 18:48:19 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 11:10:47 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Borovikov",
"Mikhail",
""
]
] |
2403.06432 | Jungwon Choi | Jungwon Choi, Hyungi Lee, Byung-Hoon Kim, Juho Lee | Joint-Embedding Masked Autoencoder for Self-supervised Learning of
Dynamic Functional Connectivity from the Human Brain | Under review | null | null | null | cs.LG q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph Neural Networks (GNNs) have shown promise in learning dynamic
functional connectivity for distinguishing phenotypes from human brain
networks. However, obtaining extensive labeled clinical data for training is
often resource-intensive, making practical application difficult. Leveraging
unlabeled data thus becomes crucial for representation learning in a
label-scarce setting. Although generative self-supervised learning techniques,
especially masked autoencoders, have shown promising results in representation
learning in various domains, their application to dynamic graphs for dynamic
functional connectivity remains underexplored, facing challenges in capturing
high-level semantic representations. Here, we introduce the Spatio-Temporal
Joint Embedding Masked Autoencoder (ST-JEMA), drawing inspiration from the
Joint Embedding Predictive Architecture (JEPA) in computer vision. ST-JEMA
employs a JEPA-inspired strategy for reconstructing dynamic graphs, which
enables the learning of higher-level semantic representations considering
temporal perspectives, addressing the challenges in fMRI data representation
learning. Utilizing the large-scale UK Biobank dataset for self-supervised
learning, ST-JEMA shows exceptional representation learning performance on
dynamic functional connectivity demonstrating superiority over previous methods
in predicting phenotypes and psychiatric diagnoses across eight benchmark fMRI
datasets even with limited samples and effectiveness of temporal reconstruction
on missing data scenarios. These findings highlight the potential of our
approach as a robust representation learning method for leveraging label-scarce
fMRI data.
| [
{
"version": "v1",
"created": "Mon, 11 Mar 2024 04:49:41 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 14:29:25 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Choi",
"Jungwon",
""
],
[
"Lee",
"Hyungi",
""
],
[
"Kim",
"Byung-Hoon",
""
],
[
"Lee",
"Juho",
""
]
] |
2403.06869 | Hao Chen | Hao Chen, Zihan Wang, Ran Tao, Hongxin Wei, Xing Xie, Masashi
Sugiyama, Bhiksha Raj, Jindong Wang | Impact of Noisy Supervision in Foundation Model Learning | 18 pages, 10 figures, 6 tables, preprint. arXiv admin note:
substantial text overlap with arXiv:2309.17002 | null | null | null | cs.LG cs.AI cs.CL cs.CV | http://creativecommons.org/licenses/by/4.0/ | Foundation models are usually pre-trained on large-scale datasets and then
adapted to downstream tasks through tuning. However, the large-scale
pre-training datasets, often inaccessible or too expensive to handle, can
contain label noise that may adversely affect the generalization of the model
and pose unexpected risks. This paper stands out as the first work to
comprehensively understand and analyze the nature of noise in pre-training
datasets and then effectively mitigate its impacts on downstream tasks.
Specifically, through extensive experiments of fully-supervised and image-text
contrastive pre-training on synthetic noisy ImageNet-1K, YFCC15M, and CC12M
datasets, we demonstrate that, while slight noise in pre-training can benefit
in-domain (ID) performance, where the training and testing data share a similar
distribution, it always deteriorates out-of-domain (OOD) performance, where
training and testing distributions are significantly different. These
observations are agnostic to scales of pre-training datasets, pre-training
noise types, model architectures, pre-training objectives, downstream tuning
methods, and downstream applications. We empirically ascertain that the reason
behind this is that the pre-training noise shapes the feature space
differently. We then propose a tuning method (NMTune) to affine the feature
space to mitigate the malignant effect of noise and improve generalization,
which is applicable in both parameter-efficient and black-box tuning manners.
We additionally conduct extensive experiments on popular vision and language
models, including APIs, which are supervised and self-supervised pre-trained on
realistic noisy data for evaluation. Our analysis and results demonstrate the
importance of this novel and fundamental research direction, which we term as
Noisy Model Learning.
| [
{
"version": "v1",
"created": "Mon, 11 Mar 2024 16:22:41 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Mar 2025 22:46:43 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 03:07:00 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Chen",
"Hao",
""
],
[
"Wang",
"Zihan",
""
],
[
"Tao",
"Ran",
""
],
[
"Wei",
"Hongxin",
""
],
[
"Xie",
"Xing",
""
],
[
"Sugiyama",
"Masashi",
""
],
[
"Raj",
"Bhiksha",
""
],
[
"Wang",
"Jindong",
""
]
] |
2403.06948 | Thomas Lam | Thomas Lam | On the face stratification of the $m=2$ amplituhedron | 12 pages. v2: minor changes. v3: minor changes | null | null | null | math.CO hep-th math-ph math.AG math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define and study the face stratification of the m=2 amplituhedron. We show
that the face poset is an upper order ideal in the face poset of the totally
nonnegative Grassmannian. Our construction is consistent with earlier work of
Lukowski, and we confirm various predictions of Lukowski.
| [
{
"version": "v1",
"created": "Mon, 11 Mar 2024 17:33:30 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Mar 2024 15:28:14 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 04:35:01 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Lam",
"Thomas",
""
]
] |
2403.07569 | \"Umit Mert \c{C}a\v{g}lar | \"Umit Mert \c{C}a\u{g}lar, Baris Yilmaz, Melek T\"urkmen, Erdem
Akag\"und\"uz, Salih Tileylioglu | Exploring Challenges in Deep Learning of Single-Station Ground Motion
Records | 9 Pages, 12 Figures, 5 Tables | null | null | null | eess.SP cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Contemporary deep learning models have demonstrated promising results across
various applications within seismology and earthquake engineering. These models
rely primarily on utilizing ground motion records for tasks such as earthquake
event classification, localization, earthquake early warning systems, and
structural health monitoring. However, the extent to which these models truly
extract meaningful patterns from these complex time-series signals remains
underexplored. In this study, our objective is to evaluate the degree to which
auxiliary information, such as seismic phase arrival times or seismic station
distribution within a network, dominates the process of deep learning from
ground motion records, potentially hindering its effectiveness. Our
experimental results reveal a strong dependence on the highly correlated
Primary (P) and Secondary (S) phase arrival times. These findings expose a
critical gap in the current research landscape, highlighting the lack of robust
methodologies for deep learning from single-station ground motion recordings
that do not rely on auxiliary inputs.
| [
{
"version": "v1",
"created": "Tue, 12 Mar 2024 11:56:50 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 18:56:15 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Çağlar",
"Ümit Mert",
""
],
[
"Yilmaz",
"Baris",
""
],
[
"Türkmen",
"Melek",
""
],
[
"Akagündüz",
"Erdem",
""
],
[
"Tileylioglu",
"Salih",
""
]
] |
2403.08745 | Leandro Galo | Leandro Galo-Mendoza | Boundary controllability for a fourth order degenerate parabolic
equation with a singular potential | arXiv admin note: substantial text overlap with arXiv:2307.04580,
arXiv:2302.01197, arXiv:2308.07290 | null | null | null | math.AP math.OC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | In this paper, we prove the null controllability of a one-dimensional
fourth-order degenerate parabolic equation with a singular potential. Here, we
analyze cases where boundary control conditions are applied at the left
endpoint. We utilize a spectral decomposition involving Bessel functions and
their zeros in a convenient weighted Sobolev space for a degenerate parabolic
operator with specific boundary conditions. We establish the well-posedness of
the system using semigroup operator theory. Subsequently, we employ the moment
method by Fattorini and Russell to obtain an upper estimate of the cost of
controllability. Additionally, we derive a lower estimate of the cost of
controllability using a representation theorem for analytic functions of
exponential type.
| [
{
"version": "v1",
"created": "Wed, 13 Mar 2024 17:47:02 GMT"
},
{
"version": "v2",
"created": "Sat, 20 Apr 2024 19:05:54 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 16:41:09 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Galo-Mendoza",
"Leandro",
""
]
] |
2403.09335 | Carlo Bellingeri | Carlo Bellingeri, Peter K. Friz, Sylvie Paycha | Generalized Euler-Maclaurin formula and Signatures | Reorganised the order of the sections, typos corrected | Int. Math. Res. Not., Vol. 2025, No. 8, April 2025, rnaf092 | 10.1093/imrn/rnaf092 | null | math.PR math.CA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Euler-Maclaurin formula which relates a discrete sum with an integral, is
generalised to the setting of Riemann-Stieltjes sums and integrals on
stochastic processes whose paths are a.s. rectifiable, namely, continuous and
with bounded variation. For this purpose, new variants of the signature are
introduced, such as the flip and the sawtooth signature. The counterparts of
the Bernoulli numbers that arise in the classical Euler-Maclaurin formula are
shown to be the integration constants in the repeated integration by parts
which ``recursively minimise the error'' at every truncation level.
| [
{
"version": "v1",
"created": "Thu, 14 Mar 2024 12:24:55 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Dec 2024 15:23:06 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Bellingeri",
"Carlo",
""
],
[
"Friz",
"Peter K.",
""
],
[
"Paycha",
"Sylvie",
""
]
] |
2403.09628 | Hanna Eveliina Peltola | Sid Maibach and Eveliina Peltola | From the Conformal Anomaly to the Virasoro Algebra | v3: 44 pages, 4 figures; minor corrections following referees'
reports; to appear in Proc. Lond. Math. Soc | null | 10.1112/plms.70040 | null | math-ph math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The conformal anomaly and the Virasoro algebra are fundamental aspects of 2D
conformal field theory and conformally covariant models in planar random
geometry. In this article, we explicitly derive the Virasoro algebra from an
axiomatization of the conformal anomaly in terms of real determinant lines,
one-dimensional vector spaces associated to Riemann surfaces with analytically
parametrized boundary components. Here, analytical orientation-preserving
diffeomorphisms and deformations of the circle naturally act on the boundary
components. We introduce a sewing operation on the real determinant lines over
the semigroup of annuli, which then induces central extensions of the
diffeomorphism group, as well as of the complex deformations.
Our main theorem shows that on the one hand, the cocycle associated to the
central extension of diffeomorphisms is trivial, while on the other hand, the
Lie algebra cocycle associated to the central extension of complex deformations
is nontrivial, yielding the imaginary part of the Gel'fand-Fuks cocycle. We
thus answer a question, partly negatively and partly affirmatively, discussed
by Andre Henriques and Dylan Thurston in 2011. The proof uses concrete
computations, which we aim to be accessible to a wide audience.
We also show an explicit relation to loop Loewner energy, anticipating the
real determinant lines to be pertinent to locally conformally covariant
(Malliavin-Kontsevich-Suhov) measures on curves and loops, as well as to
K\"ahler geometry and geometric quantization of moduli spaces of Riemann
surfaces. Inherently, the conformal anomaly and real determinant line bundles
are expected to be universal, following a classification of modular functors.
| [
{
"version": "v1",
"created": "Thu, 14 Mar 2024 17:58:09 GMT"
},
{
"version": "v2",
"created": "Wed, 29 May 2024 17:59:12 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Mar 2025 19:38:41 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Maibach",
"Sid",
""
],
[
"Peltola",
"Eveliina",
""
]
] |
2403.09782 | Siddhartha Borkotoky | Kushwanth Sistu and Siddhartha S. Borkotoky | Time-Constrained Erasure Correction for Data Recovery in UAV-LoRa-WuR
Networks | null | null | null | null | cs.NI eess.SP | http://creativecommons.org/licenses/by/4.0/ | We described two erasure-correction schemes for data recovery in UAV-LoRa-WuR
networks. Our results show that unless the maximum number for redundant frames
a sensor can send per data-collection cycle is very small, erasure coding
provides noticeable improvements over an uncoded transmissions. Whether to
employ coding -- and if so, which type -- should be determined based on the
sensors' energy budget (which dictates the maximum redundancy), the UAV's
hovering time, and the node density. The analytical framework presented above
aids in this decision making.
| [
{
"version": "v1",
"created": "Thu, 14 Mar 2024 18:04:26 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Mar 2024 10:02:14 GMT"
},
{
"version": "v3",
"created": "Sat, 3 May 2025 11:53:52 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Sistu",
"Kushwanth",
""
],
[
"Borkotoky",
"Siddhartha S.",
""
]
] |
2403.09803 | Anton Klyachko | Natalia S. Dergacheva and Anton A. Klyachko | Tiny non-Leighton complexes | 5 pages. A Russian version of this paper is at
http://halgebra.math.msu.su/staff/klyachko/papers.htm . V4: Minor misprint
corrections | Geometriae Dedicata, 219:3 (2025), 48 | 10.1007/s10711-025-01005-6 | null | math.GT math.CO math.GR | http://creativecommons.org/licenses/by/4.0/ | How complex must two finite 2-complexes be to admit a common, but not finite
common, covering? We obtain an almost answer: the minimum possible number of
triangles in a pseudo-simplicial triangulation of each complex is 3, 4, or 5.
| [
{
"version": "v1",
"created": "Thu, 14 Mar 2024 18:51:07 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Apr 2024 19:06:14 GMT"
},
{
"version": "v3",
"created": "Wed, 4 Sep 2024 14:43:50 GMT"
},
{
"version": "v4",
"created": "Mon, 7 Apr 2025 20:25:01 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Dergacheva",
"Natalia S.",
""
],
[
"Klyachko",
"Anton A.",
""
]
] |
2403.09960 | Krishnakumar Balasubramanian | Zhaoyang Shi, Chinmoy Bhattacharjee, Krishnakumar Balasubramanian,
Wolfgang Polonik | Multivariate Gaussian Approximation for Random Forest via Region-based
Stabilization | null | null | null | null | math.ST math.PR stat.ML stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We derive Gaussian approximation bounds for $k$-Potential Nearest Neighbor
($k$-PNN) based random forest predictions based on a set of training points
given by a Poisson process under fairly mild regularity assumptions on the data
generating process. Our approach is based on the key observation that $k$-PNN
based random forest predictions satisfy a certain geometric property called
region-based stabilization. We also compare the rates with those of $k$-nearest
neighbor-based random forests, highlighting a form of universality in our
result. In the process of developing our results, we also establish a
probabilistic result on multivariate Gaussian approximation bounds for general
functionals of Poisson process that are region-based stabilizing. This general
result makes use of the Malliavin-Stein method, and is potentially applicable
to various related statistical problems.
| [
{
"version": "v1",
"created": "Fri, 15 Mar 2024 01:50:41 GMT"
},
{
"version": "v2",
"created": "Sat, 23 Mar 2024 23:24:02 GMT"
},
{
"version": "v3",
"created": "Tue, 26 Mar 2024 02:01:22 GMT"
},
{
"version": "v4",
"created": "Fri, 2 May 2025 23:21:36 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Shi",
"Zhaoyang",
""
],
[
"Bhattacharjee",
"Chinmoy",
""
],
[
"Balasubramanian",
"Krishnakumar",
""
],
[
"Polonik",
"Wolfgang",
""
]
] |
2403.10266 | Xuanlei Zhao | Xuanlei Zhao, Shenggan Cheng, Chang Chen, Zangwei Zheng, Ziming Liu,
Zheming Yang, Yang You | DSP: Dynamic Sequence Parallelism for Multi-Dimensional Transformers | ICML 2025 | null | null | null | cs.DC cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scaling multi-dimensional transformers to long sequences is indispensable
across various domains. However, the challenges of large memory requirements
and slow speeds of such sequences necessitate sequence parallelism. All
existing approaches fall under the category of embedded sequence parallelism,
which are limited to shard along a single sequence dimension, thereby
introducing significant communication overhead. However, the nature of
multi-dimensional transformers involves independent calculations across
multiple sequence dimensions. To this end, we propose Dynamic Sequence
Parallelism (DSP) as a novel abstraction of sequence parallelism. DSP
dynamically switches the parallel dimension among all sequences according to
the computation stage with efficient resharding strategy. DSP offers
significant reductions in communication costs, adaptability across modules, and
ease of implementation with minimal constraints. Experimental evaluations
demonstrate DSP's superiority over state-of-the-art embedded sequence
parallelism methods by remarkable throughput improvements ranging from 32.2% to
10x, with less than 25% communication volume.
| [
{
"version": "v1",
"created": "Fri, 15 Mar 2024 12:53:50 GMT"
},
{
"version": "v2",
"created": "Mon, 27 May 2024 18:51:52 GMT"
},
{
"version": "v3",
"created": "Sat, 24 Aug 2024 06:39:52 GMT"
},
{
"version": "v4",
"created": "Sun, 4 May 2025 06:05:21 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Zhao",
"Xuanlei",
""
],
[
"Cheng",
"Shenggan",
""
],
[
"Chen",
"Chang",
""
],
[
"Zheng",
"Zangwei",
""
],
[
"Liu",
"Ziming",
""
],
[
"Yang",
"Zheming",
""
],
[
"You",
"Yang",
""
]
] |
2403.10673 | Patrick L. Combettes | Patrick L. Combettes and Javier I. Madariaga | Almost-Surely Convergent Randomly Activated Monotone Operator Splitting
Methods | null | null | null | null | math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose stochastic splitting algorithms for solving large-scale composite
inclusion problems involving monotone and linear operators. They activate at
each iteration blocks of randomly selected resolvents of monotone operators
and, unlike existing methods, achieve almost sure convergence of the iterates
to a solution without any regularity assumptions or knowledge of the norms of
the linear operators. Applications to image recovery and machine learning are
provided.
| [
{
"version": "v1",
"created": "Fri, 15 Mar 2024 20:49:08 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Nov 2024 17:07:23 GMT"
},
{
"version": "v3",
"created": "Sat, 3 May 2025 23:33:37 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Combettes",
"Patrick L.",
""
],
[
"Madariaga",
"Javier I.",
""
]
] |
2403.11559 | Eleonora Vitagliano | E. Vitagliano, L. Improta, L. Pizzino, N. D'Agostino | Pore pressure study in the Irpinia area (Southern Apennines, Italy) | null | null | 10.1016/j.tecto.2025.230761 | null | physics.geo-ph | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Subsurface pore pressure studies are crucial for understanding the
geomechanical behaviours of the geological formations and for preventing the
failure conditions of the rocks. Although the interplay between pore pressure
changes and rock deformation is nowadays widely treated in the literature, the
magnitude and the distribution of the fluid pressure regimes at depth is not
completely clear, especially in those areas, such as the fold and thrust belts,
characterised by a complex tectonostratigraphic setting. The proposed study
deals with the subsurface fluid dynamics of the Irpinia region, located in the
Southern Apennines (Italy) and marked by intense tectonic activity and
seismicity. In that area, the most recent and notable Italian earthquake
occurred in November 1980 (6.9 Mw) and caused significant damage and loss of
life. Irpinia area is also a site of deep gas rising to the surface and
exhibits clear correlations between crustal deformation and groundwater
circulation. The pressure analysis herein proposed has been performed using
direct and indirect pressure measurements collected from 13 hydrocarbon
exploration wells available in open source. It provides a detailed description
of the methodology used to identify where overpressures develop within the
sediments of both autochthonous and allochthonous layers. It also investigates
the relationship between pore pressures, gas occurrences found at well sites,
and the possible sources of overpressures. The results show that the carbonate
successions of the South-Apennines and Apulian Platforms are characterized by
predominantly hydrostatic pressure regimes, while the shale-rich successions of
the Lagonegrese pelagic basin and the Miocene-Pliocene foredeep basin locally
demonstrate moderate overpressured gradients. Finally, the highest
overpressures are observed in the evaporitic deposits and Pliocene shales.
| [
{
"version": "v1",
"created": "Mon, 18 Mar 2024 08:25:39 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Vitagliano",
"E.",
""
],
[
"Improta",
"L.",
""
],
[
"Pizzino",
"L.",
""
],
[
"D'Agostino",
"N.",
""
]
] |
2403.13980 | Alexey Balitskiy | Alexey Balitskiy, Baris Coskunuzer, Facundo M\'emoli | Geometric Bounds for Persistence | 56 pages, 4 figures. Version 2 contains the same results as version
1, but reworked/improved exposition and introduction. To appear in the
Transactions of the AMS | null | null | null | math.AT math.MG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we offer a new perspective on persistent homology by
integrating key concepts from metric geometry. For a given compact subset
$\mathcal{X}$ of a Banach space $\mathbf{Y}$, we analyze the topological
features arising in the family $\mathcal{N}_\bullet(\mathcal{X} \subset
\mathbf{Y})$ of nested neighborhoods of $\mathcal{X}$ in $\mathbf{Y}$ and
provide several geometric bounds on their persistence (lifespans).
We begin by examining the lifespans of these homology classes in terms of
their filling radii in $\mathbf{Y}$, establishing connections between these
lifespans and fundamental invariants in metric geometry, such as the Urysohn
width. We then derive bounds on these lifespans by considering the
$\ell^\infty$-principal components of $\mathcal{X}$, also known as Kolmogorov
widths.
Additionally, we introduce and investigate the concept of extinction time of
a metric space $\mathcal{X}$: the critical threshold beyond which no
homological features persist in any degree. We propose methods for estimating
the \v{C}ech and Vietoris-Rips extinction times of $\mathcal{X}$ by relating
$\mathcal{X}$ to its convex hull and to its tight span, respectively.
| [
{
"version": "v1",
"created": "Wed, 20 Mar 2024 21:22:33 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 21:15:03 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Balitskiy",
"Alexey",
""
],
[
"Coskunuzer",
"Baris",
""
],
[
"Mémoli",
"Facundo",
""
]
] |
2403.15262 | Manav Raj | Shun Yiu, Rob Seamans, Manav Raj, Ted Liu | Strategic Responses to Technological Change: Evidence from Online Labor
Markets | null | null | null | null | econ.GN q-fin.EC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | In this project, we examine how freelancers changed their strategic
positioning on an online work platform following the launch of ChatGPT in
November 2022 - a major advance in AI technologies. We document that
post-ChatGPT, freelancers bid on fewer jobs and reposition themselves by
differentiating their distribution of bids (i.e., job applications) relative to
their prior behavior. We disentangle heterogeneity in strategic responses by
exploring how exposure to changes in demand or supply shape incumbent
repositioning. We find that the launch of ChatGPT was associated with a
short-term decrease in labor demand and an increase in labor supply, though
these changes vary across work domains. In response to decreases in labor
demand, workers changed their horizontal positioning and withdrew from the
platform. In response to increases in labor supply, workers were less likely to
decrease bidding or reposition horizontally but shifted their vertical position
by targeting lower-value jobs. We further show that repositioning is less
likely for high-skill freelancers who face greater adjustment costs. This
research contributes to our understanding of how and why workers respond to
technological change in the context of recent advances in AI technologies.
| [
{
"version": "v1",
"created": "Fri, 22 Mar 2024 15:00:42 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Apr 2024 13:11:39 GMT"
},
{
"version": "v3",
"created": "Thu, 20 Mar 2025 13:38:02 GMT"
},
{
"version": "v4",
"created": "Fri, 21 Mar 2025 15:14:01 GMT"
},
{
"version": "v5",
"created": "Mon, 5 May 2025 15:31:02 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Yiu",
"Shun",
""
],
[
"Seamans",
"Rob",
""
],
[
"Raj",
"Manav",
""
],
[
"Liu",
"Ted",
""
]
] |
2403.15343 | Laura \'Alvaro G\'omez | L. \'Alvaro-G\'omez, J. Hurst, S. Hegde, S. Ruiz-G\'omez, E. Pereiro,
L. Aballe, J.C Toussaint, L. P\'erez, A. Masseboeuf, C. Thirion, O. Fruchart,
D. Gusakova | Topological analysis and experimental control of transformations of
domain walls in magnetic cylindrical nanowires | null | Phys. Rev. Research 7, 023092 (2025) | 10.1103/PhysRevResearch.7.023092 | null | cond-mat.mes-hall math-ph math.MP | http://creativecommons.org/licenses/by/4.0/ | Topology is a powerful tool for categorizing magnetization textures by
defining a topological index in both two-dimensional (2D) systems, such as thin
films or curved surfaces, and in 3D bulk systems. In the emerging field of 3D
nanomagnetism, both volume and surface topological numbers must be considered,
requiring the identification of a proper global topological invariant to
support categorization. Here we consider domain walls in cylindrical nanowires
as an excellent playground for 3D nanomagnetic systems, excited by a charge
current, that generates an OErsted field. We first provide experimental
evidence of previously unreported domain-wall transformations of topology
occurring at the nanosecond timescale. We investigate these transformations
with micromagnetic simulations, tracking both bulk and surface topological
signatures.We demonstrate a topological invariant combining both signatures,
while the topological charge varies from bulk to surface during the dynamics.
The experimental change of topology is reproduced when the pulse duration
matches the timescale of the internal transformations of the wall, and the
current is switched off before the transformation is complete. We expect that
the topological categorization and dynamical exploitation apply to any 3D
nanomagnetic system.
| [
{
"version": "v1",
"created": "Fri, 22 Mar 2024 16:53:12 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 10:41:46 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Álvaro-Gómez",
"L.",
""
],
[
"Hurst",
"J.",
""
],
[
"Hegde",
"S.",
""
],
[
"Ruiz-Gómez",
"S.",
""
],
[
"Pereiro",
"E.",
""
],
[
"Aballe",
"L.",
""
],
[
"Toussaint",
"J. C",
""
],
[
"Pérez",
"L.",
""
],
[
"Masseboeuf",
"A.",
""
],
[
"Thirion",
"C.",
""
],
[
"Fruchart",
"O.",
""
],
[
"Gusakova",
"D.",
""
]
] |
2403.16933 | Paul Haider | Benjamin Ellenberger, Paul Haider, Jakob Jordan, Kevin Max, Ismael
Jaras, Laura Kriener, Federico Benitez, Mihai A. Petrovici | Backpropagation through space, time, and the brain | First authorship shared by Benjamin Ellenberger and Paul Haider | null | null | null | q-bio.NC cs.AI cs.LG cs.NE eess.SP | http://creativecommons.org/licenses/by-nc-sa/4.0/ | How physical networks of neurons, bound by spatio-temporal locality
constraints, can perform efficient credit assignment, remains, to a large
extent, an open question. In machine learning, the answer is almost universally
given by the error backpropagation algorithm, through both space and time.
However, this algorithm is well-known to rely on biologically implausible
assumptions, in particular with respect to spatio-temporal (non-)locality.
Alternative forward-propagation models such as real-time recurrent learning
only partially solve the locality problem, but only at the cost of scaling, due
to prohibitive storage requirements. We introduce Generalized Latent
Equilibrium (GLE), a computational framework for fully local spatio-temporal
credit assignment in physical, dynamical networks of neurons. We start by
defining an energy based on neuron-local mismatches, from which we derive both
neuronal dynamics via stationarity and parameter dynamics via gradient descent.
The resulting dynamics can be interpreted as a real-time, biologically
plausible approximation of backpropagation through space and time in deep
cortical networks with continuous-time neuronal dynamics and continuously
active, local synaptic plasticity. In particular, GLE exploits the morphology
of dendritic trees to enable more complex information storage and processing in
single neurons, as well as the ability of biological neurons to phase-shift
their output rate with respect to their membrane potential, which is essential
in both directions of information propagation. For the forward computation, it
enables the mapping of time-continuous inputs to neuronal space, effectively
performing a spatio-temporal convolution. For the backward computation, it
permits the temporal inversion of feedback signals, which consequently
approximate the adjoint variables necessary for useful parameter updates.
| [
{
"version": "v1",
"created": "Mon, 25 Mar 2024 16:57:02 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jul 2024 17:37:05 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 14:43:33 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Ellenberger",
"Benjamin",
""
],
[
"Haider",
"Paul",
""
],
[
"Jordan",
"Jakob",
""
],
[
"Max",
"Kevin",
""
],
[
"Jaras",
"Ismael",
""
],
[
"Kriener",
"Laura",
""
],
[
"Benitez",
"Federico",
""
],
[
"Petrovici",
"Mihai A.",
""
]
] |
2403.19125 | Wei Jia | Wei Jia | Generic reduction theory for Fermi sea topology in metallic systems | 11 pages, 7 figures, 1 table, References are updated | Phys. Rev. B 111, 155115 (2025) | 10.1103/PhysRevB.111.155115 | null | cond-mat.mes-hall cond-mat.quant-gas cond-mat.supr-con | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Fermi sea of a metal can host exotic quantum topology, which governs its
conductance quantization and is characterized by the Euler characteristic
($\chi_F$). In contrast to the well-known band topology, which is determined by
the global features of wave functions, the topology of such metallic systems is
intrinsically linked to the geometry of the Fermi sea. As a result, probing and
identifying $\chi_F$ in high-dimensional systems presents a challenge. Here, we
propose a generic dimensional reduction theory for the Fermi sea topology in
$d$-dimensional metallic systems, showing that $\chi_F$ can be determined by
the features of so-called reduced critical points on Fermi surfaces. Moreover,
we reveal that $\chi_F$ can be interpreted as a topological invariant of band
topology by mapping a metallic system to a gapped system. Building on this
nontrivial result, we identify a broad class of topological superconductors
(SCs) whose topological numbers are precisely determined by the $\chi_F$ of
their normally filled bands. This provides an indirect method to capture
$\chi_F$ by measuring the (pseudo)spin polarizations of these topological SCs.
Our findings are expected to significantly advance research into Fermi sea
topology.
| [
{
"version": "v1",
"created": "Thu, 28 Mar 2024 03:36:45 GMT"
},
{
"version": "v2",
"created": "Sun, 28 Apr 2024 01:49:18 GMT"
},
{
"version": "v3",
"created": "Mon, 16 Sep 2024 15:59:12 GMT"
},
{
"version": "v4",
"created": "Mon, 17 Feb 2025 02:52:50 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Jia",
"Wei",
""
]
] |
2404.00372 | Fayssal Saadi | Fayssal Saadi | Non-ergodicity on the SU(2)-character varieties | minor corrections, to appear in Commentarii Mathematici Helvetici | null | null | null | math.GT | http://creativecommons.org/licenses/by/4.0/ | We describe the dynamics of a group $\Gamma$ generated by Dehn twists along
two filling multi-curves or a family of filling curves on the
SU(2)-representation variety of closed surfaces. Consequently, we provide
explicit $\Gamma$-invariant rational functions on the representation variety of
the genus two closed surface $S_2$ for some pair of multi-curves. We establish
a similar result for the SU(2)-character variety of genus four non-orientable
surfaces $N_4$ for some family of filling curves.
| [
{
"version": "v1",
"created": "Sat, 30 Mar 2024 13:58:04 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 17:13:52 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Saadi",
"Fayssal",
""
]
] |
2404.00570 | Xingxuan Li | Xingxuan Li, Xuan-Phi Nguyen, Shafiq Joty, Lidong Bing | ParaICL: Towards Parallel In-Context Learning | Accepted by NAACL 2025 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large language models (LLMs) have become the norm in natural language
processing (NLP), excelling in few-shot in-context learning (ICL) with their
remarkable abilities. Nonetheless, the success of ICL largely hinges on the
choice of few-shot demonstration examples, making the selection process
increasingly crucial. Existing methods have delved into optimizing the quantity
and semantic similarity of these examples to improve ICL performances. However,
our preliminary experiments indicate that the effectiveness of ICL is limited
by the length of the input context. Moreover, varying combinations of few-shot
demonstration examples can significantly boost accuracy across different test
samples. To address this, we propose a novel method named parallel in-context
learning (ParaICL) that effectively utilizes all demonstration examples without
exceeding the manageable input context length. ParaICL employs parallel
batching to distribute demonstration examples into different batches according
to the semantic similarities of the questions in the demonstrations to the test
question. It then computes normalized batch semantic scores for each batch. A
weighted average semantic objective, constrained by adaptive plausibility, is
applied to select the most appropriate tokens. Through extensive experiments,
we validate the effectiveness of ParaICL and conduct ablation studies to
underscore its design rationale. We further demonstrate that ParaICL can
seamlessly integrate with existing methods.
| [
{
"version": "v1",
"created": "Sun, 31 Mar 2024 05:56:15 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 09:49:56 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Li",
"Xingxuan",
""
],
[
"Nguyen",
"Xuan-Phi",
""
],
[
"Joty",
"Shafiq",
""
],
[
"Bing",
"Lidong",
""
]
] |
2404.01249 | Rohit Jena | Rohit Jena, Pratik Chaudhari, James C. Gee | FireANTs: Adaptive Riemannian Optimization for Multi-Scale Diffeomorphic
Matching | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | The paper proposes FireANTs, the first multi-scale Adaptive Riemannian
Optimization algorithm for dense diffeomorphic image matching. One of the most
critical and understudied aspects of diffeomorphic image matching algorithms
are its highly ill-conditioned nature. We quantitatively capture the extent of
ill-conditioning in a typical MRI matching task, motivating the need for an
adaptive optimization algorithm for diffeomorphic matching. To this end,
FireANTs generalizes the concept of momentum and adaptive estimates of the
Hessian to mitigate this ill-conditioning in the non-Euclidean space of
diffeomorphisms. Unlike common non-Euclidean manifolds, we also formalize
considerations for multi-scale optimization of diffeomorphisms. Our rigorous
mathematical results and operational contributions lead to a state-of-the-art
dense matching algorithm that can be applied to generic image data with
remarkable accuracy and robustness. We demonstrate consistent improvements in
image matching performance across a spectrum of community-standard medical and
biological correspondence matching challenges spanning a wide variety of image
modalities, anatomies, resolutions, acquisition protocols, and preprocessing
pipelines. This improvement is supplemented by 300x to 3200x speedup over
existing CPU-based state-of-the-art algorithms. For the first time, we perform
diffeomorphic matching of sub-micron mouse isocortex volumes at native
resolution, and generate a 25{\mu}m mouse brain atlas in under 25 minutes. Our
fast implementation also enables hyperparameter studies that were intractable
with existing correspondence matching algorithms.
| [
{
"version": "v1",
"created": "Mon, 1 Apr 2024 17:12:47 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Jan 2025 05:13:29 GMT"
},
{
"version": "v3",
"created": "Sat, 3 May 2025 17:00:29 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Jena",
"Rohit",
""
],
[
"Chaudhari",
"Pratik",
""
],
[
"Gee",
"James C.",
""
]
] |
2404.02225 | Di Qiu | Di Qiu, Yinda Zhang, Thabo Beeler, Vladimir Tankovich, Christian
H\"ane, Sean Fanello, Christoph Rhemann, Sergio Orts Escolano | CHOSEN: Contrastive Hypothesis Selection for Multi-View Depth Refinement | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | We propose CHOSEN, a simple yet flexible, robust and effective multi-view
depth refinement framework. It can be employed in any existing multi-view
stereo pipeline, with straightforward generalization capability for different
multi-view capture systems such as camera relative positioning and lenses.
Given an initial depth estimation, CHOSEN iteratively re-samples and selects
the best hypotheses, and automatically adapts to different metric or intrinsic
scales determined by the capture system. The key to our approach is the
application of contrastive learning in an appropriate solution space and a
carefully designed hypothesis feature, based on which positive and negative
hypotheses can be effectively distinguished. Integrated in a simple baseline
multi-view stereo pipeline, CHOSEN delivers impressive quality in terms of
depth and normal accuracy compared to many current deep learning based
multi-view stereo pipelines.
| [
{
"version": "v1",
"created": "Tue, 2 Apr 2024 18:27:03 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 15:35:26 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Qiu",
"Di",
""
],
[
"Zhang",
"Yinda",
""
],
[
"Beeler",
"Thabo",
""
],
[
"Tankovich",
"Vladimir",
""
],
[
"Häne",
"Christian",
""
],
[
"Fanello",
"Sean",
""
],
[
"Rhemann",
"Christoph",
""
],
[
"Escolano",
"Sergio Orts",
""
]
] |
2404.02810 | Yu Wang | Yu Wang, Lei Sang, Yi Zhang, Yiwen Zhang and Xindong Wu | Generative-Contrastive Heterogeneous Graph Neural Network | 12 pages, 8 figures | null | null | null | cs.LG cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Heterogeneous Graphs (HGs) effectively model complex relationships in the
real world through multi-type nodes and edges. In recent years, inspired by
self-supervised learning (SSL), contrastive learning (CL)-based Heterogeneous
Graphs Neural Networks (HGNNs) have shown great potential in utilizing data
augmentation and contrastive discriminators for downstream tasks. However, data
augmentation remains limited due to the graph data's integrity. Furthermore,
the contrastive discriminators suffer from sampling bias and lack local
heterogeneous information. To tackle the above limitations, we propose a novel
Generative-Contrastive Heterogeneous Graph Neural Network (GC-HGNN).
Specifically, we propose a heterogeneous graph generative learning method that
enhances CL-based paradigm. This paradigm includes: 1) A contrastive view
augmentation strategy using a masked autoencoder. 2) Position-aware and
semantics-aware positive sample sampling strategy for generating hard negative
samples. 3) A hierarchical contrastive learning strategy aimed at capturing
local and global information. Furthermore, the hierarchical contrastive
learning and sampling strategies aim to constitute an enhanced contrastive
discriminator under the generative-contrastive perspective. Finally, we compare
our model with seventeen baselines on eight real-world datasets. Our model
outperforms the latest baselines on node classification and link prediction
tasks.
| [
{
"version": "v1",
"created": "Wed, 3 Apr 2024 15:31:18 GMT"
},
{
"version": "v2",
"created": "Wed, 8 May 2024 01:40:25 GMT"
},
{
"version": "v3",
"created": "Sun, 4 May 2025 10:56:16 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Wang",
"Yu",
""
],
[
"Sang",
"Lei",
""
],
[
"Zhang",
"Yi",
""
],
[
"Zhang",
"Yiwen",
""
],
[
"Wu",
"Xindong",
""
]
] |
2404.04748 | Hongchuan Zeng | Hongchuan Zeng, Hongshen Xu, Lu Chen, Kai Yu | Multilingual Brain Surgeon: Large Language Models Can be Compressed
Leaving No Language Behind | 22 pages, 8 figures, 13 tables. Accepted by LREC-COLING 2024 | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Large Language Models (LLMs) have ushered in a new era in Natural Language
Processing, but their massive size demands effective compression techniques for
practicality. Although numerous model compression techniques have been
investigated, they typically rely on a calibration set that overlooks the
multilingual context and results in significant accuracy degradation for
low-resource languages. This paper introduces Multilingual Brain Surgeon (MBS),
a novel calibration data sampling method for multilingual LLMs compression. MBS
overcomes the English-centric limitations of existing methods by sampling
calibration data from various languages proportionally to the language
distribution of the model training datasets. Our experiments, conducted on the
BLOOM multilingual LLM, demonstrate that MBS improves the performance of
existing English-centric compression methods, especially for low-resource
languages. We also uncover the dynamics of language interaction during
compression, revealing that the larger the proportion of a language in the
training set and the more similar the language is to the calibration language,
the better performance the language retains after compression. In conclusion,
MBS presents an innovative approach to compressing multilingual LLMs,
addressing the performance disparities and improving the language inclusivity
of existing compression techniques.
| [
{
"version": "v1",
"created": "Sat, 6 Apr 2024 22:16:32 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 13:07:19 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Zeng",
"Hongchuan",
""
],
[
"Xu",
"Hongshen",
""
],
[
"Chen",
"Lu",
""
],
[
"Yu",
"Kai",
""
]
] |
2404.05230 | Ariel Neufeld | Ariel Neufeld, Julian Sester | Non-concave stochastic optimal control in finite discrete time under
model uncertainty | null | null | null | null | math.OC math.PR q-fin.MF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article we present a general framework for non-concave robust
stochastic control problems under model uncertainty in a discrete time finite
horizon setting. Our framework allows to consider a variety of different
path-dependent ambiguity sets of probability measures comprising, as a natural
example, the ambiguity set defined via Wasserstein-balls around path-dependent
reference measures with path-dependent radii, as well as parametric classes of
probability distributions. We establish a dynamic programming principle which
allows to derive both optimal control and worst-case measure by solving
recursively a sequence of one-step optimization problems. Moreover, we derive
upper bounds for the difference of the values of the robust and non-robust
stochastic control problem in the Wasserstein uncertainty and parameter
uncertainty case. As a concrete application, we study the robust hedging
problem of financial derivatives under an asymmetric (and non-convex) loss
function accounting for different preferences of sell- and buy side when it
comes to the hedging of financial derivatives. As our entirely data-driven
ambiguity set of probability measures, we consider Wasserstein-balls around the
empirical measure derived from real financial data. We demonstrate that during
adverse scenarios such as a financial crisis, our robust approach outperforms
typical model-based hedging strategies such as the classical Delta-hedging
strategy as well as the hedging strategy obtained in the non-robust setting
with respect to the empirical measure and therefore overcomes the problem of
model misspecification in such critical periods.
| [
{
"version": "v1",
"created": "Mon, 8 Apr 2024 06:53:05 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 16:34:16 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Neufeld",
"Ariel",
""
],
[
"Sester",
"Julian",
""
]
] |
2404.07452 | Yupeng Cao | Yupeng Cao, Zhi Chen, Prashant Kumar, Qingyun Pei, Yangyang Yu,
Haohang Li, Fabrizio Dimino, Lorenzo Ausiello, K.P. Subbalakshmi, Papa Momar
Ndiaye | RiskLabs: Predicting Financial Risk Using Large Language Model based on
Multimodal and Multi-Sources Data | null | null | null | null | q-fin.RM cs.AI cs.CE cs.LG q-fin.PM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The integration of Artificial Intelligence (AI) techniques, particularly
large language models (LLMs), in finance has garnered increasing academic
attention. Despite progress, existing studies predominantly focus on tasks like
financial text summarization, question-answering, and stock movement prediction
(binary classification), the application of LLMs to financial risk prediction
remains underexplored. Addressing this gap, in this paper, we introduce
RiskLabs, a novel framework that leverages LLMs to analyze and predict
financial risks. RiskLabs uniquely integrates multimodal financial data,
including textual and vocal information from Earnings Conference Calls (ECCs),
market-related time series data, and contextual news data to improve financial
risk prediction. Empirical results demonstrate RiskLabs' effectiveness in
forecasting both market volatility and variance. Through comparative
experiments, we examine the contributions of different data sources to
financial risk assessment and highlight the crucial role of LLMs in this
process. We also discuss the challenges associated with using LLMs for
financial risk prediction and explore the potential of combining them with
multimodal data for this purpose.
| [
{
"version": "v1",
"created": "Thu, 11 Apr 2024 03:14:50 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 01:01:19 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Cao",
"Yupeng",
""
],
[
"Chen",
"Zhi",
""
],
[
"Kumar",
"Prashant",
""
],
[
"Pei",
"Qingyun",
""
],
[
"Yu",
"Yangyang",
""
],
[
"Li",
"Haohang",
""
],
[
"Dimino",
"Fabrizio",
""
],
[
"Ausiello",
"Lorenzo",
""
],
[
"Subbalakshmi",
"K. P.",
""
],
[
"Ndiaye",
"Papa Momar",
""
]
] |
2404.07678 | Frederik F. Fl\"other | Maria Fay, Frederik F. Fl\"other | On the role of ethics and sustainability in business innovation | null | Artificial Intelligence, Entrepreneurship and Risk. Springer, 2025 | 10.1007/978-3-658-45544-6_24 | null | cs.CY econ.GN q-fin.EC | http://creativecommons.org/licenses/by-sa/4.0/ | For organizations to survive and flourish in the long term, innovation and
novelty must be continually introduced, which is particularly true in today's
rapidly changing world. This raises a variety of ethical and sustainability
considerations that seldom receive the attention they deserve. Existing
innovation adoption frameworks often focus on technological, organizational,
environmental, and social factors impacting adoption. In this chapter, we
explore the ethical and sustainability angles, particularly as they relate to
emerging technologies, artificial intelligence (AI) being a prominent example.
We consider how to facilitate the development and cultivation of innovation
cultures in organizations, including budding startups as well as established
enterprises, through approaches such as systems thinking.
| [
{
"version": "v1",
"created": "Thu, 11 Apr 2024 12:18:01 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Fay",
"Maria",
""
],
[
"Flöther",
"Frederik F.",
""
]
] |
2404.07878 | Andrew Adiletta | Andrew Adiletta, M. Caner Tol, Kemal Derya, Berk Sunar, and Saad Islam | LeapFrog: The Rowhammer Instruction Skip Attack | Accepted at EuroS&P 2025 and Hardware.io 2024, | null | null | null | cs.CR cs.AR | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Since its inception, Rowhammer exploits have rapidly evolved into
increasingly sophisticated threats compromising data integrity and the control
flow integrity of victim processes. Nevertheless, it remains a challenge for an
attacker to identify vulnerable targets (i.e., Rowhammer gadgets), understand
the outcome of the attempted fault, and formulate an attack that yields useful
results.
In this paper, we present a new type of Rowhammer gadget, called a LeapFrog
gadget, which, when present in the victim code, allows an adversary to subvert
code execution to bypass a critical piece of code (e.g., authentication check
logic, encryption rounds, padding in security protocols). The LeapFrog gadget
manifests when the victim code stores the Program Counter (PC) value in the
user or kernel stack (e.g., a return address during a function call) which,
when tampered with, repositions the return address to a location that bypasses
a security-critical code pattern.
This research also presents a systematic process to identify LeapFrog
gadgets. This methodology enables the automated detection of susceptible
targets and the determination of optimal attack parameters. We first show the
attack on a decision tree algorithm to show the potential implications.
Secondly, we employ the attack on OpenSSL to bypass the encryption and reveal
the plaintext. We then use our tools to scan the Open Quantum Safe library and
report on the number of LeapFrog gadgets in the code. Lastly, we demonstrate
this new attack vector through a practical demonstration in a client/server TLS
handshake scenario, successfully inducing an instruction skip in a client
application. Our findings extend the impact of Rowhammer attacks on control
flow and contribute to developing more robust defenses against these
increasingly sophisticated threats.
| [
{
"version": "v1",
"created": "Thu, 11 Apr 2024 16:10:16 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Nov 2024 02:19:16 GMT"
},
{
"version": "v3",
"created": "Fri, 2 May 2025 21:00:19 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Adiletta",
"Andrew",
""
],
[
"Tol",
"M. Caner",
""
],
[
"Derya",
"Kemal",
""
],
[
"Sunar",
"Berk",
""
],
[
"Islam",
"Saad",
""
]
] |
2404.10278 | Igor Shparlinski | Sary Drappeau and Igor E. Shparlinski | Exponential sums over integers without large prime divisors | New version: It has a new co-author, uses a different approach and
gives a substantial improvement of results from the previous version | null | null | null | math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We obtain a new bound on exponential sums over integers without large prime
divisors, improving that of Fouvry and Tenenbaum (1991). For a fixed integer
$\nu\ne 0$, we also obtain new bounds on exponential sums with $\nu$-th powers
of such integers. The improvement is based on exploiting more precisely the
factorisation of integers without large prime divisors, along with existing
Type~I and Type~II bounds. For $\nu=1$ we use the classical bounds of
Vinogradov (1937), while for $\nu\neq 1$ we use bounds of Vaughan (1975) as
well as of Fouvry, Kowalski and Michel (2014).
| [
{
"version": "v1",
"created": "Tue, 16 Apr 2024 04:36:34 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 16:40:58 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Drappeau",
"Sary",
""
],
[
"Shparlinski",
"Igor E.",
""
]
] |
2404.10400 | Qihong Huang | Qihong Huang, He Huang, Bing Xu and Kaituo Zhang | Evolution of the early universe in Einstein-Cartan theory | null | Universe 2025,11(5),147 | 10.3390/universe11050147 | null | gr-qc | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Einstein--Cartan theory is a generalization of general relativity that
introduces spacetime torsion. In this paper, we perform phase space analysis to
investigate the evolution of the early universe in Einstein--Cartan theory. By
studying the stability of critical points in the dynamical system, we find that
there exist two stable critical points which represent an Einstein static
solution and an expanding solution, respectively. After analyzing the phase
diagram of the dynamical system, we find that the early universe may exhibit an
Einstein static state, an oscillating state, or a bouncing state. By assuming
the equation of state $\omega$ can decrease over time $t$, the universe can
depart from the initial Einstein static state, oscillating state, or bouncing
state and then evolve into an inflationary phase. Then, we analyze four
different inflationary evolution cases in Einstein--Cartan theory and find that
a time-variable equation of state $\omega$ cannot yield values of $n_{s}$ and
$r$ consistent with observations, while a time-invariant equation of state
$\omega$ is supported by the Planck 2018 results. Thus, in Einstein--Cartan
theory, the universe likely originates from a bouncing state rather than an
Einstein static state or an oscillating state.
| [
{
"version": "v1",
"created": "Tue, 16 Apr 2024 08:56:36 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Mar 2025 05:16:50 GMT"
},
{
"version": "v3",
"created": "Sat, 3 May 2025 03:24:09 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Huang",
"Qihong",
""
],
[
"Huang",
"He",
""
],
[
"Xu",
"Bing",
""
],
[
"Zhang",
"Kaituo",
""
]
] |
2404.10716 | Kang Liao | Kang Liao, Zongsheng Yue, Zhonghua Wu, Chen Change Loy | MOWA: Multiple-in-One Image Warping Model | Accepted to TPAMI. Project page:
https://kangliao929.github.io/projects/mowa/ | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While recent image warping approaches achieved remarkable success on existing
benchmarks, they still require training separate models for each specific task
and cannot generalize well to different camera models or customized
manipulations. To address diverse types of warping in practice, we propose a
Multiple-in-One image WArping model (named MOWA) in this work. Specifically, we
mitigate the difficulty of multi-task learning by disentangling the motion
estimation at both the region level and pixel level. To further enable dynamic
task-aware image warping, we introduce a lightweight point-based classifier
that predicts the task type, serving as prompts to modulate the feature maps
for more accurate estimation. To our knowledge, this is the first work that
solves multiple practical warping tasks in one single model. Extensive
experiments demonstrate that our MOWA, which is trained on six tasks for
multiple-in-one image warping, outperforms state-of-the-art task-specific
models across most tasks. Moreover, MOWA also exhibits promising potential to
generalize into unseen scenes, as evidenced by cross-domain and zero-shot
evaluations. The code and more visual results can be found on the project page:
https://kangliao929.github.io/projects/mowa/.
| [
{
"version": "v1",
"created": "Tue, 16 Apr 2024 16:50:35 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Jun 2024 14:57:39 GMT"
},
{
"version": "v3",
"created": "Sun, 4 May 2025 03:35:31 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Liao",
"Kang",
""
],
[
"Yue",
"Zongsheng",
""
],
[
"Wu",
"Zhonghua",
""
],
[
"Loy",
"Chen Change",
""
]
] |
2404.12978 | Tasnuba Binte Jamal | Tasnuba Binte Jamal, Samiul Hasan, Omar I. Abdul-Aziz, Pallab Mozumder
and Rounak Meyur | Strengthening Infrastructure Resilience to Hurricanes by Modeling
Transportation and Electric Power Network Interdependencies | null | null | 10.1061/NHREFO.NHENG-2236 | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This study presents an agent-based model (ABM) developed to simulate the
resilience of a community to hurricane-induced infrastructure disruptions,
focusing on the interdependencies between electric power and transportation
networks. In this ABM approach, agents represent the components of a system,
where interactions within a system shape intra-dependency of a system and
interactions among systems shape interdependencies. To study household
resilience subject to a hurricane, a library of agents has been created
including electric power network, transportation network, wind/flooding
hazards, and household agents. The ABM is applied over the household and
infrastructure data from a community (Zip code 33147) in Miami-Dade County,
Florida. Interdependencies between the two networks are modeled in two ways,
(i) representing the role of transportation in fuel delivery to power plants
and restoration teams' access, (ii) impact of power outage on transportation
network components. Restoring traffic signals quickly is crucial as their
outage can slow down traffic and increase the chance of crashes. We simulate
three restoration strategies: component based, distance based, and traffic
lights based restoration. The model is validated against Hurricane Irma data,
showing consistent behavior with varying hazard intensities. Scenario analyses
explore the impact of restoration strategies, road accessibility, and wind
speed intensities on power restoration. Results demonstrate that a traffic
lights based restoration strategy efficiently prioritizes signal recovery
without delaying household power restoration time. Restoration of power
services will be faster if restoration teams do not need to wait due to
inaccessible roads and fuel transportation to power plants is not delayed.
| [
{
"version": "v1",
"created": "Fri, 19 Apr 2024 16:09:11 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 17:05:10 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Jamal",
"Tasnuba Binte",
""
],
[
"Hasan",
"Samiul",
""
],
[
"Abdul-Aziz",
"Omar I.",
""
],
[
"Mozumder",
"Pallab",
""
],
[
"Meyur",
"Rounak",
""
]
] |
2404.14392 | Dongsung Choi | Dongsung Choi, Masataka Mogi, Umberto De Giovannini, Doron Azoury,
Baiqing Lv, Yifan Su, Hannes H\"ubener, Angel Rubio, Nuh Gedik | Direct observation of Floquet-Bloch states in monolayer graphene | null | null | 10.1038/s41567-025-02888-8 | null | cond-mat.mes-hall cond-mat.other | http://creativecommons.org/licenses/by/4.0/ | Floquet engineering is a novel method of manipulating quantum phases of
matter via periodic driving [1, 2]. It has successfully been utilized in
different platforms ranging from photonic systems [3] to optical lattice of
ultracold atoms [4, 5]. In solids, light can be used as the periodic drive via
coherent light-matter interaction. This leads to hybridization of Bloch
electrons with photons resulting in replica bands known as Floquet-Bloch
states. After the direct observation of Floquet-Bloch states in a topological
insulator [6], their manifestations have been seen in a number of other
experiments [7-14]. By engineering the electronic band structure using
Floquet-Bloch states, various exotic phase transitions have been predicted
[15-22] to occur. To realize these phases, it is necessary to better understand
the nature of Floquet-Bloch states in different materials. However, direct
energy and momentum resolved observation of these states is still limited to
only few material systems [6, 10, 14, 23, 24]. Here, we report direct
observation of Floquet-Bloch states in monolayer epitaxial graphene which was
the first proposed material platform [15] for Floquet engineering. By using
time- and angle-resolved photoemission spectroscopy (trARPES) with mid-infrared
(mid-IR) pump excitation, we detected replicas of the Dirac cone. Pump
polarization dependence of these replica bands unequivocally shows that they
originate from the scattering between Floquet-Bloch states and photon-dressed
free-electron-like photoemission final states, called Volkov states. Beyond
graphene, our method can potentially be used to directly observe Floquet-Bloch
states in other systems paving the way for Floquet engineering in a wide range
of quantum materials.
| [
{
"version": "v1",
"created": "Mon, 22 Apr 2024 17:54:18 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Choi",
"Dongsung",
""
],
[
"Mogi",
"Masataka",
""
],
[
"De Giovannini",
"Umberto",
""
],
[
"Azoury",
"Doron",
""
],
[
"Lv",
"Baiqing",
""
],
[
"Su",
"Yifan",
""
],
[
"Hübener",
"Hannes",
""
],
[
"Rubio",
"Angel",
""
],
[
"Gedik",
"Nuh",
""
]
] |
2404.14570 | Junaid Aftab | Junaid Aftab, Haizhao Yang | Approximating Korobov Functions via Quantum Circuits | We have i) included more references ii) improved exposition iii)
added more details in proofs. To appear in Communications in Mathematical
Sciences | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | Understanding the capacity of quantum circuits through the lens of
approximation theory is essential for evaluating the complexity of quantum
circuits required to solve various problems in scientific computation. We
design quantum circuits capable of approximating d-dimensional functions within
the Korobov function space. This is achieved by leveraging the quantum signal
processing (QSP) and the linear combination of unitaries (LCU) algorithms to
build quantum circuits that output Chebyshev polynomials. We also present a
quantitative analysis of the approximation error rates and evaluates the
computational complexity of implementing the proposed circuits. Since the
Korobov function space is a subspace of the certain Sobolev spaces, our work
develops a theoretical foundation for implementing a large class of functions
suitable for applications on a quantum computer.
| [
{
"version": "v1",
"created": "Mon, 22 Apr 2024 20:33:53 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Sep 2024 21:42:02 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Dec 2024 17:08:36 GMT"
},
{
"version": "v4",
"created": "Sun, 4 May 2025 14:52:49 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Aftab",
"Junaid",
""
],
[
"Yang",
"Haizhao",
""
]
] |
2404.15222 | Anna Zhigun | Mabel Lizzy Rajendran and Anna Zhigun | Local well-posedness for a novel nonlocal model for cell-cell adhesion
via receptor binding | null | null | null | null | math.AP | http://creativecommons.org/licenses/by/4.0/ | Local well-posedness is established for a highly nonlocal nonlinear
diffusion-adhesion system for bounded initial values with small support.
Macroscopic systems of this kind were previously obtained by the authors
through upscaling in [32] and can account for the effect of microscopic
receptor binding dynamics in cell-cell adhesion. The system analysed here
couples an integro-PDE featuring degenerate diffusion of the porous media type
and nonlocal adhesion with a novel nonlinear integral equation. The approach is
based on decoupling the system and using Banach's fixed point theorem to solve
each of the two equations individually and subsequently the entire system. The
main challenge of the implementation lies in selecting a suitable framework.
One of the key results is the local well-posedness for the integral equation
with a Radon measure as a parameter. The analysis of this equation utilizes the
Kantorovich-Rubinstein norm, marking the first application of this norm in
handling a nonlinear integral equation.
| [
{
"version": "v1",
"created": "Tue, 23 Apr 2024 16:54:18 GMT"
},
{
"version": "v2",
"created": "Sun, 30 Jun 2024 14:25:20 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Feb 2025 09:38:27 GMT"
},
{
"version": "v4",
"created": "Fri, 25 Apr 2025 06:49:05 GMT"
},
{
"version": "v5",
"created": "Sun, 4 May 2025 15:24:08 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Rajendran",
"Mabel Lizzy",
""
],
[
"Zhigun",
"Anna",
""
]
] |
2404.17518 | Eckhard Meinrenken | Eckhard Meinrenken, Selim Tawfik | Manin pairs and moment maps revisited | 42 pages | null | null | null | math.DG | http://creativecommons.org/licenses/by/4.0/ | The notion of quasi-Poisson $G$-spaces with $D/G$-valued moment maps was
introduced by Alekseev and Kosmann-Schwarzbach in 1999. Our main result is a
\emph{Lifting Theorem}, establishing a bijective correspondence between the
categories of quasi-Poisson $G$-spaces with $D/G$-valued moment maps and of
quasi-Poisson $G\times G$-spaces with $D$-valued moment maps. Using this
result, we give simple constructions of fusion and conjugation for these
spaces, and new examples coming from moduli spaces.
| [
{
"version": "v1",
"created": "Fri, 26 Apr 2024 16:37:59 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 20:04:22 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Meinrenken",
"Eckhard",
""
],
[
"Tawfik",
"Selim",
""
]
] |
2404.19233 | Chi Hoi Yip | Gabriel Currier, Kenneth Moore, Chi Hoi Yip | Avoiding short progressions in Euclidean Ramsey theory | 14 pages, main results on l4 and l5 improved, revised revised based
on referee comments | null | null | null | math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a general framework to construct colorings avoiding short
monochromatic arithmetic progressions in Euclidean Ramsey theory. Specifically,
if $\ell_m$ denotes $m$ collinear points with consecutive points of distance
one apart, we say that $\mathbb{E}^n \not \to (\ell_r,\ell_s)$ if there is a
red/blue coloring of $n$-dimensional Euclidean space that avoids red congruent
copies of $\ell_r$ and blue congruent copies of $\ell_s$. We show that
$\mathbb{E}^n \not \to (\ell_3, \ell_{20})$, improving the best-known result
$\mathbb{E}^n \not \to (\ell_3, \ell_{1177})$ by F\"uhrer and T\'oth, and also
establish $\mathbb{E}^n \not \to (\ell_4, \ell_{14})$ and $\mathbb{E}^n \not
\to (\ell_5, \ell_{8})$ in the spirit of the classical result $\mathbb{E}^n
\not \to (\ell_6, \ell_{6})$ due to Erd\H{o}s et. al. We also show a number of
similar $3$-coloring results, as well as $\mathbb{E}^n \not \to (\ell_3,
\alpha\ell_{6889})$, where $\alpha$ is an arbitrary positive real number. This
final result answers a question of F\"uhrer and T\'oth in the positive.
| [
{
"version": "v1",
"created": "Tue, 30 Apr 2024 03:30:31 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 01:47:02 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Currier",
"Gabriel",
""
],
[
"Moore",
"Kenneth",
""
],
[
"Yip",
"Chi Hoi",
""
]
] |
2405.00318 | Jens Egholm Pedersen | Jens Egholm Pedersen, J\"org Conradt, Tony Lindeberg | Covariant spatio-temporal receptive fields for spiking neural networks | Code available at https://github.com/jegp/nrf | null | null | null | cs.NE cs.CV cs.LG | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Biological nervous systems constitute important sources of inspiration
towards computers that are faster, cheaper, and more energy efficient.
Neuromorphic disciplines view the brain as a coevolved system, simultaneously
optimizing the hardware and the algorithms running on it. There are clear
efficiency gains when bringing the computations into a physical substrate, but
we presently lack theories to guide efficient implementations. Here, we present
a principled computational model for neuromorphic systems in terms of
spatio-temporal receptive fields, based on affine Gaussian kernels over space
and leaky-integrator and leaky integrate-and-fire models over time. Our theory
is provably covariant to spatial affine and temporal scaling transformations,
and with close similarities to the visual processing in mammalian brains. We
use these spatio-temporal receptive fields as a prior in an event-based vision
task, and show that this improves the training of spiking networks, which
otherwise is known as problematic for event-based vision. This work combines
efforts within scale-space theory and computational neuroscience to identify
theoretically well-founded ways to process spatio-temporal signals in
neuromorphic systems. Our contributions are immediately relevant for signal
processing and event-based vision, and can be extended to other processing
tasks over space and time, such as memory and control.
| [
{
"version": "v1",
"created": "Wed, 1 May 2024 04:51:10 GMT"
},
{
"version": "v2",
"created": "Tue, 7 May 2024 23:54:23 GMT"
},
{
"version": "v3",
"created": "Sun, 4 May 2025 14:07:15 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Pedersen",
"Jens Egholm",
""
],
[
"Conradt",
"Jörg",
""
],
[
"Lindeberg",
"Tony",
""
]
] |
2405.01101 | Quang Huy Che | Quang-Huy Che and Le-Chuong Nguyen and Duc-Tuan Luu and Vinh-Tiep
Nguyen | Enhancing person re-identification via Uncertainty Feature Fusion Method
and Auto-weighted Measure Combination | null | Knowledge-Based Systems 307 (2025) 112737 | 10.1016/j.knosys.2024.112737 | null | cs.CV | http://creativecommons.org/licenses/by-sa/4.0/ | Person re-identification (Re-ID) is a challenging task that involves
identifying the same person across different camera views in surveillance
systems. Current methods usually rely on features from single-camera views,
which can be limiting when dealing with multiple cameras and challenges such as
changing viewpoints and occlusions. In this paper, a new approach is introduced
that enhances the capability of ReID models through the Uncertain Feature
Fusion Method (UFFM) and Auto-weighted Measure Combination (AMC). UFFM
generates multi-view features using features extracted independently from
multiple images to mitigate view bias. However, relying only on similarity
based on multi-view features is limited because these features ignore the
details represented in single-view features. Therefore, we propose the AMC
method to generate a more robust similarity measure by combining various
measures. Our method significantly improves Rank@1 accuracy and Mean Average
Precision (mAP) when evaluated on person re-identification datasets. Combined
with the BoT Baseline on challenging datasets, we achieve impressive results,
with a 7.9% improvement in Rank@1 and a 12.1% improvement in mAP on the MSMT17
dataset. On the Occluded-DukeMTMC dataset, our method increases Rank@1 by 22.0%
and mAP by 18.4%. Code is available:
https://github.com/chequanghuy/Enhancing-Person-Re-Identification-via-UFFM-and-AMC
| [
{
"version": "v1",
"created": "Thu, 2 May 2024 09:09:48 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Aug 2024 10:51:54 GMT"
},
{
"version": "v3",
"created": "Tue, 26 Nov 2024 03:09:15 GMT"
},
{
"version": "v4",
"created": "Fri, 6 Dec 2024 19:42:48 GMT"
},
{
"version": "v5",
"created": "Mon, 5 May 2025 14:24:48 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Che",
"Quang-Huy",
""
],
[
"Nguyen",
"Le-Chuong",
""
],
[
"Luu",
"Duc-Tuan",
""
],
[
"Nguyen",
"Vinh-Tiep",
""
]
] |
2405.01463 | Ravi B. Sojitra | Ravi B. Sojitra, Vasilis Syrgkanis | Dynamic Local Average Treatment Effects | null | null | null | null | econ.EM cs.LG stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider Dynamic Treatment Regimes (DTRs) with One Sided Noncompliance
that arise in applications such as digital recommendations and adaptive medical
trials. These are settings where decision makers encourage individuals to take
treatments over time, but adapt encouragements based on previous
encouragements, treatments, states, and outcomes. Importantly, individuals may
not comply with encouragements based on unobserved confounders. For settings
with binary treatments and encouragements, we provide nonparametric
identification, estimation, and inference for Dynamic Local Average Treatment
Effects (LATEs), which are expected values of multiple time period treatment
effect contrasts for the respective complier subpopulations. Under One Sided
Noncompliance and sequential extensions of the assumptions in Imbens and
Angrist (1994), we show that one can identify Dynamic LATEs that correspond to
treating at single time steps. In Staggered Adoption settings, we show that the
assumptions are sufficient to identify Dynamic LATEs for treating in multiple
time periods. Moreover, this result extends to any setting where the effect of
a treatment in one period is uncorrelated with the compliance event in a
subsequent period.
| [
{
"version": "v1",
"created": "Thu, 2 May 2024 16:52:09 GMT"
},
{
"version": "v2",
"created": "Mon, 13 May 2024 20:42:46 GMT"
},
{
"version": "v3",
"created": "Sun, 4 May 2025 20:29:04 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Sojitra",
"Ravi B.",
""
],
[
"Syrgkanis",
"Vasilis",
""
]
] |
2405.01950 | Jens St\"ucker | Jens St\"ucker, Marcos Pellejero-Ib\'a\~nez, Raul E. Angulo, Francisco
Maion and Rodrigo Voivodic | Probabilistic Lagrangian bias estimators and the cumulant bias expansion | 26 pages, 16 figures, submitted to A&A | null | null | null | astro-ph.CO astro-ph.GA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The spatial distribution of galaxies is a highly complex phenomenon currently
impossible to predict deterministically. However, by using a statistical
$\textit{bias}$ relation, it becomes possible to robustly model the average
abundance of galaxies as a function of the underlying matter density field.
Understanding the properties and parametric description of the bias relation is
key to extract cosmological information from future galaxy surveys. Here, we
contribute to this topic primarily in two ways: (1) We develop a new set of
probabilistic estimators for bias parameters using the moments of the
Lagrangian galaxy environment distribution. These estimators include spatial
corrections at different orders to measure bias parameters independently of the
damping scale. We report robust measurements of a variety of bias parameters
for haloes, including the tidal bias and its dependence with spin at a fixed
mass. (2) We propose an alternative formulation of the bias expansion in terms
of "cumulant bias parameters" that describe the response of the logarithmic
galaxy density to large-scale perturbations. We find that cumulant biases of
haloes are consistent with zero at orders $n > 2$. This suggests that: (i)
previously reported bias relations at order $n > 2$ are an artefact of the
entangled basis of the canonical bias expansion; (ii) the convergence of the
bias expansion may be improved by phrasing it in terms of cumulants; (iii) the
bias function is very well approximated by a Gaussian -- an avenue which we
explore in a companion paper.
| [
{
"version": "v1",
"created": "Fri, 3 May 2024 09:23:51 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Jun 2024 15:11:42 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 15:28:24 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Stücker",
"Jens",
""
],
[
"Pellejero-Ibáñez",
"Marcos",
""
],
[
"Angulo",
"Raul E.",
""
],
[
"Maion",
"Francisco",
""
],
[
"Voivodic",
"Rodrigo",
""
]
] |
2405.02646 | Matous Kozak | Matous Kozak, Luca Demetrio, Dmitrijs Trizna, Fabio Roli | Updating Windows Malware Detectors: Balancing Robustness and Regression
against Adversarial EXEmples | 17 pages, 4 figures, 13 tables | Computers & Security. 155 (2025) 104466 | 10.1016/j.cose.2025.104466 | null | cs.CR | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Adversarial EXEmples are carefully-perturbed programs tailored to evade
machine learning Windows malware detectors, with an ongoing effort to develop
robust models able to address detection effectiveness. However, even if robust
models can prevent the majority of EXEmples, to maintain predictive power over
time, models are fine-tuned to newer threats, leading either to partial updates
or time-consuming retraining from scratch. Thus, even if the robustness against
adversarial EXEmples is higher, the new models might suffer a regression in
performance by misclassifying threats that were previously correctly detected.
For these reasons, we study the trade-off between accuracy and regression when
updating Windows malware detectors by proposing EXE-scanner, a plugin that can
be chained to existing detectors to promptly stop EXEmples without causing
regression. We empirically show that previously proposed hardening techniques
suffer a regression of accuracy when updating non-robust models, exacerbating
the gap when considering low false positives regimes and temporal drifts
affecting data. Also, through EXE-scanner we gain evidence on the detectability
of adversarial EXEmples, showcasing the presence of artifacts left inside while
creating them. Due to its design, EXE-scanner can be chained to any classifier
to obtain the best performance without the need for costly retraining. To
foster reproducibility, we openly release the source code, along with the
dataset of adversarial EXEmples based on state-of-the-art perturbation
algorithms.
| [
{
"version": "v1",
"created": "Sat, 4 May 2024 12:12:23 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 11:11:53 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Kozak",
"Matous",
""
],
[
"Demetrio",
"Luca",
""
],
[
"Trizna",
"Dmitrijs",
""
],
[
"Roli",
"Fabio",
""
]
] |
2405.02655 | Jiangbin Lyu Dr. | Yiling Wang, Jiangbin Lyu, Liqun Fu | Fast Online Movement Optimization of Aerial Base Stations Based on
Global Connectivity Map | 6 pages, 7 figures. Investigate site-specific movement optimization
of UAV-mounted aerial base stations to cover a group of moving ground users,
based on site-specific Global Connectivity Map. arXiv admin note: text
overlap with arXiv:2312.10490 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Aerial base stations (ABSs) mounted on unmanned aerial vehicles (UAVs) are
capable of extending wireless connectivity to ground users (GUs) across a
variety of scenarios. However, it is an NP-hard problem with exponential
complexity in $M$ and $N$, in order to maximize the coverage rate (CR) of $M$
GUs by jointly placing $N$ ABSs with limited coverage range. The complexity of
the problem escalates in environments where the signal propagation is
obstructed by localized obstacles such as buildings, and is further compounded
by the dynamic GU positions. In response to these challenges, this paper
focuses on the optimization of a multi-ABS movement problem, aiming to improve
the mean CR for mobile GUs within a site-specific environment. Our proposals
include 1) introducing the concept of global connectivity map (GCM) which
contains the connectivity information between given pairs of ABS/GU locations;
2) partitioning the ABS movement problem into ABS placement sub-problems and
formulate each sub-problem into a binary integer linear programming (BILP)
problem based on GCM; 3) and proposing a fast online algorithm to execute
(one-pass) projected stochastic subgradient descent within the dual space to
rapidly solve the BILP problem with near-optimal performance. Numerical results
demonstrate that our proposed method achieves a high CR performance close to
the upper bound obtained by the open-source solver (SCIP), yet with
significantly reduced running time. Moreover, our method also outperforms
common benchmarks in the literature such as the K-means initiated evolutionary
algorithm or the ones based on deep reinforcement learning (DRL), in terms of
CR performance and/or time efficiency.
| [
{
"version": "v1",
"created": "Sat, 4 May 2024 12:44:04 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 14:22:37 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Wang",
"Yiling",
""
],
[
"Lyu",
"Jiangbin",
""
],
[
"Fu",
"Liqun",
""
]
] |
2405.02660 | Jiangbin Lyu Dr. | Rongyou Cao, Yuheng Zhong, Jiangbin Lyu, Deqing Wang, Liqun Fu | AFDM Channel Estimation in Multi-Scale Multi-Lag Channels | presented in GLOBECOM 2024. Investigate AFDM under underwater
multi-scale multi-lag channels. Derive the new input-output formula with the
impact of Doppler time scaling. Propose two new channel estimation methods to
tackle different level of Doppler factors. Perform diversity analyis based on
CFR overlap probability (COP) and mutual incoherent property (MIP) | null | 10.1109/GLOBECOM52923.2024.10901055 | null | cs.IT eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Affine Frequency Division Multiplexing (AFDM) is a brand new chirp-based
multi-carrier (MC) waveform for high mobility communications, with promising
advantages over Orthogonal Frequency Division Multiplexing (OFDM) and other MC
waveforms. Existing AFDM research focuses on wireless communication at high
carrier frequency (CF), which typically considers only Doppler frequency shift
(DFS) as a result of mobility, while ignoring the accompanied Doppler time
scaling (DTS) on waveform. However, for underwater acoustic (UWA) communication
at much lower CF and propagating at speed of sound, the DTS effect could not be
ignored and poses significant challenges for channel estimation. This paper
analyzes the channel frequency response (CFR) of AFDM under multi-scale
multi-lag (MSML) channels, where each propagating path could have different
delay and DFS/DTS. Based on the newly derived input-output formula and its
characteristics, two new channel estimation methods are proposed, i.e., AFDM
with iterative multi-index (AFDM-IMI) estimation under low to moderate DTS, and
AFDM with orthogonal matching pursuit (AFDM-OMP) estimation under high DTS.
Numerical results confirm the effectiveness of the proposed methods against the
original AFDM channel estimation method. Moreover, the resulted AFDM system
outperforms OFDM as well as Orthogonal Chirp Division Multiplexing (OCDM) in
terms of channel estimation accuracy and bit error rate (BER), which is
consistent with our theoretical analysis based on CFR overlap probability
(COP), mutual incoherent property (MIP) and channel diversity gain under MSML
channels.
| [
{
"version": "v1",
"created": "Sat, 4 May 2024 13:01:04 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 09:06:37 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Cao",
"Rongyou",
""
],
[
"Zhong",
"Yuheng",
""
],
[
"Lyu",
"Jiangbin",
""
],
[
"Wang",
"Deqing",
""
],
[
"Fu",
"Liqun",
""
]
] |
2405.02975 | Morteza Kayyalha | Asmaul Smitha Rashid, Le Yi, Takashi Taniguchi, Kenji Watanabe, Nitin
Samarth, R\'egis M\'elin, Morteza Kayyalha | Nonequilibrium Andreev resonances in ballistic graphene Andreev
interferometers | null | null | null | null | cond-mat.mes-hall cond-mat.supr-con | http://creativecommons.org/licenses/by/4.0/ | We study nonequilibrium Andreev resonances in a voltage-biased graphene
three-terminal Josephson junction (JJ). We observe periodic oscillations of
resistance with maxima at multiples of the magnetic flux quantum (noninversion
regime). As we increase the bias voltage, we further observe a transition point
beyond which oscillations exhibit a $\pi$ phase shift (inversion regime) with
maxima of resistance occuring at multiples of half-flux quantum. At this
transition point, the frequency of the oscillations is doubled. We develop a
model based on the coupling of the static Andreev bound states (ABSs) to the
nonequilibrium Fermi surface of graphene to explain the observed noninversion
to inversion crossovers. Our model associates these crossovers to microscopic
phase-sensitive Andreev reflections which couple the normal and superfluid
components of the current. Our findings show that multiterminal JJs can be used
to engineer unconventional energy-phase relations such as those expected in the
$\pi$-shifted ABSs without relying on quartet and Floquet physics. These
nonequilibrium ABSs could potentially find applications in superconducting
$\pi$ qubits.
| [
{
"version": "v1",
"created": "Sun, 5 May 2024 15:40:00 GMT"
},
{
"version": "v2",
"created": "Tue, 14 May 2024 21:52:45 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 14:36:49 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Rashid",
"Asmaul Smitha",
""
],
[
"Yi",
"Le",
""
],
[
"Taniguchi",
"Takashi",
""
],
[
"Watanabe",
"Kenji",
""
],
[
"Samarth",
"Nitin",
""
],
[
"Mélin",
"Régis",
""
],
[
"Kayyalha",
"Morteza",
""
]
] |
2405.03158 | Yaolong Yu | Yaolong Yu, Haipeng Chen | Decentralized Online Learning in General-Sum Stackelberg Games | Accepted for the 40th Conference on Uncertainty in Artificial
Intelligence (UAI 2024) | Proceedings of the Fortieth Conference on Uncertainty in
Artificial Intelligence, PMLR 244:4056-4077, 2024 | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | We study an online learning problem in general-sum Stackelberg games, where
players act in a decentralized and strategic manner. We study two settings
depending on the type of information for the follower: (1) the limited
information setting where the follower only observes its own reward, and (2)
the side information setting where the follower has extra side information
about the leader's reward. We show that for the follower, myopically best
responding to the leader's action is the best strategy for the limited
information setting, but not necessarily so for the side information setting --
the follower can manipulate the leader's reward signals with strategic actions,
and hence induce the leader's strategy to converge to an equilibrium that is
better off for itself. Based on these insights, we study decentralized online
learning for both players in the two settings. Our main contribution is to
derive last-iterate convergence and sample complexity results in both settings.
Notably, we design a new manipulation strategy for the follower in the latter
setting, and show that it has an intrinsic advantage against the best response
strategy. Our theories are also supported by empirical results.
| [
{
"version": "v1",
"created": "Mon, 6 May 2024 04:35:01 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Yu",
"Yaolong",
""
],
[
"Chen",
"Haipeng",
""
]
] |
2405.03869 | Anshuman Chhabra | Anshuman Chhabra, Bo Li, Jian Chen, Prasant Mohapatra, Hongfu Liu | Outlier Gradient Analysis: Efficiently Identifying Detrimental Training
Samples for Deep Learning Models | Accepted to ICML 2025 (Spotlight) | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A core data-centric learning challenge is the identification of training
samples that are detrimental to model performance. Influence functions serve as
a prominent tool for this task and offer a robust framework for assessing
training data influence on model predictions. Despite their widespread use,
their high computational cost associated with calculating the inverse of the
Hessian matrix pose constraints, particularly when analyzing large-sized deep
models. In this paper, we establish a bridge between identifying detrimental
training samples via influence functions and outlier gradient detection. This
transformation not only presents a straightforward and Hessian-free formulation
but also provides insights into the role of the gradient in sample impact.
Through systematic empirical evaluations, we first validate the hypothesis of
our proposed outlier gradient analysis approach on synthetic datasets. We then
demonstrate its effectiveness in detecting mislabeled samples in vision models
and selecting data samples for improving performance of natural language
processing transformer models. We also extend its use to influential sample
identification for fine-tuning Large Language Models.
| [
{
"version": "v1",
"created": "Mon, 6 May 2024 21:34:46 GMT"
},
{
"version": "v2",
"created": "Sun, 12 May 2024 20:20:57 GMT"
},
{
"version": "v3",
"created": "Tue, 1 Oct 2024 15:07:09 GMT"
},
{
"version": "v4",
"created": "Wed, 2 Oct 2024 01:38:15 GMT"
},
{
"version": "v5",
"created": "Sat, 3 May 2025 14:54:17 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Chhabra",
"Anshuman",
""
],
[
"Li",
"Bo",
""
],
[
"Chen",
"Jian",
""
],
[
"Mohapatra",
"Prasant",
""
],
[
"Liu",
"Hongfu",
""
]
] |
2405.05572 | Prashant Kodali | Prashant Kodali, Anmol Goel, Likhith Asapu, Vamshi Krishna Bonagiri,
Anirudh Govil, Monojit Choudhury, Ponnurangam Kumaraguru, Manish Shrivastava | From Human Judgements to Predictive Models: Unravelling Acceptability in
Code-Mixed Sentences | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by-sa/4.0/ | Current computational approaches for analysing or generating code-mixed
sentences do not explicitly model ``naturalness'' or ``acceptability'' of
code-mixed sentences, but rely on training corpora to reflect distribution of
acceptable code-mixed sentences. Modelling human judgement for the
acceptability of code-mixed text can help in distinguishing natural code-mixed
text and enable quality-controlled generation of code-mixed text. To this end,
we construct Cline - a dataset containing human acceptability judgements for
English-Hindi~(en-hi) code-mixed text. Cline is the largest of its kind with
16,642 sentences, consisting of samples sourced from two sources: synthetically
generated code-mixed text and samples collected from online social media. Our
analysis establishes that popular code-mixing metrics such as CMI, Number of
Switch Points, Burstines, which are used to filter/curate/compare code-mixed
corpora have low correlation with human acceptability judgements, underlining
the necessity of our dataset. Experiments using Cline demonstrate that simple
Multilayer Perceptron (MLP) models when trained solely using code-mixing
metrics as features are outperformed by fine-tuned pre-trained Multilingual
Large Language Models (MLLMs). Specifically, among Encoder models XLM-Roberta
and Bernice outperform IndicBERT across different configurations. Among
Encoder-Decoder models, mBART performs better than mT5, however Encoder-Decoder
models are not able to outperform Encoder-only models. Decoder-only models
perform the best when compared to all other MLLMS, with Llama 3.2 - 3B models
outperforming similarly sized Qwen, Phi models. Comparison with zero and
fewshot capabilitites of ChatGPT show that MLLMs fine-tuned on larger data
outperform ChatGPT, providing scope for improvement in code-mixed tasks.
Zero-shot transfer from En-Hi to En-Te acceptability judgments are better than
random baselines.
| [
{
"version": "v1",
"created": "Thu, 9 May 2024 06:40:39 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 14:51:58 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Kodali",
"Prashant",
""
],
[
"Goel",
"Anmol",
""
],
[
"Asapu",
"Likhith",
""
],
[
"Bonagiri",
"Vamshi Krishna",
""
],
[
"Govil",
"Anirudh",
""
],
[
"Choudhury",
"Monojit",
""
],
[
"Kumaraguru",
"Ponnurangam",
""
],
[
"Shrivastava",
"Manish",
""
]
] |
2405.06045 | Antonio Francesco Mello | Antonio Francesco Mello, Alessandro Santini, Mario Collura | Hybrid Stabilizer Matrix Product Operator | 7 pages, 5 figures | Phys. Rev. Lett. 133, 150604 (2024) | 10.1103/PhysRevLett.133.150604 | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | We introduce a novel hybrid approach combining tensor network methods with
the stabilizer formalism to address the challenges of simulating many-body
quantum systems. By integrating these techniques, we enhance our ability to
accurately model unitary dynamics while mitigating the exponential growth of
entanglement encountered in classical simulations. We demonstrate the
effectiveness of our method through applications to random Clifford T-doped
circuits and Random Clifford Floquet Dynamics. This approach offers promising
prospects for advancing our understanding of complex quantum phenomena and
accelerating progress in quantum simulation.
| [
{
"version": "v1",
"created": "Thu, 9 May 2024 18:32:10 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Mello",
"Antonio Francesco",
""
],
[
"Santini",
"Alessandro",
""
],
[
"Collura",
"Mario",
""
]
] |
2405.08705 | Aritram Dhar | Aritram Dhar | Pfaff's Method Revisited | 17 pages. To appear in Contributions to Discrete Mathematics | null | null | null | math.NT math.CA | http://creativecommons.org/licenses/by/4.0/ | In 1797, Pfaff gave a simple proof of a ${}_3F_2$ hypergeometric series
summation formula which was much later reproved by Andrews in 1996. In the same
paper, Andrews also proved other well-known hypergeometric identities using
Pfaff's method. In this paper, we prove a number of terminating
$q$-hypergeometric series-product identities using Pfaff's method thereby
providing a detailed account of its wide applicability.
| [
{
"version": "v1",
"created": "Tue, 14 May 2024 15:45:43 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Jun 2024 21:29:29 GMT"
},
{
"version": "v3",
"created": "Tue, 6 Aug 2024 23:19:51 GMT"
},
{
"version": "v4",
"created": "Sun, 4 May 2025 17:52:58 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Dhar",
"Aritram",
""
]
] |
2405.08781 | Italo Dejter Prof | Italo J. Dejter | Total coloring of regular graphs of girth = degree + 1 | 19 pages, 2 figures | null | null | null | math.CO | http://creativecommons.org/licenses/by/4.0/ | Let $2\le k\in\mathbb{Z}$. A total coloring of a $k$-regular simple graph via
$k+1$ colors is an {\it efficient total coloring} if each color yields an
efficient dominating set, where the efficient domination condition applies to
the restriction of each color class to the vertex set. In this work, focus is
set upon graphs of girth $k+1$. Efficient total colorings of finite connected
simple cubic graphs of girth 4 are constructed starting at the 3-cube. It is
conjectured that all of them are obtained by means of four basic operations. In
contrast, the Robertson 19-vertex $(4,5)$-cage, the alternate union $Pet^k$ of
a (Hamilton) $10k$-cycle with $k$ pentagon and $k$-pentagram $5$-cycles, for
$k>1$ not divisible by 5, and its double cover $Dod^k$, contain TCs that are
nonefficient. Applications to partitions into 3-paths and 3-stars are given.
| [
{
"version": "v1",
"created": "Tue, 14 May 2024 17:18:06 GMT"
},
{
"version": "v10",
"created": "Mon, 9 Sep 2024 19:58:58 GMT"
},
{
"version": "v11",
"created": "Wed, 9 Oct 2024 13:08:34 GMT"
},
{
"version": "v12",
"created": "Wed, 16 Oct 2024 18:55:25 GMT"
},
{
"version": "v13",
"created": "Wed, 30 Oct 2024 19:22:51 GMT"
},
{
"version": "v14",
"created": "Mon, 11 Nov 2024 18:06:39 GMT"
},
{
"version": "v15",
"created": "Wed, 20 Nov 2024 15:04:36 GMT"
},
{
"version": "v16",
"created": "Thu, 28 Nov 2024 09:50:49 GMT"
},
{
"version": "v17",
"created": "Tue, 24 Dec 2024 17:13:33 GMT"
},
{
"version": "v18",
"created": "Thu, 2 Jan 2025 16:09:17 GMT"
},
{
"version": "v19",
"created": "Fri, 10 Jan 2025 20:02:58 GMT"
},
{
"version": "v2",
"created": "Thu, 16 May 2024 16:03:20 GMT"
},
{
"version": "v20",
"created": "Sun, 4 May 2025 14:49:50 GMT"
},
{
"version": "v3",
"created": "Fri, 17 May 2024 12:22:28 GMT"
},
{
"version": "v4",
"created": "Thu, 6 Jun 2024 16:38:01 GMT"
},
{
"version": "v5",
"created": "Wed, 10 Jul 2024 17:08:11 GMT"
},
{
"version": "v6",
"created": "Wed, 17 Jul 2024 16:09:00 GMT"
},
{
"version": "v7",
"created": "Wed, 24 Jul 2024 19:17:03 GMT"
},
{
"version": "v8",
"created": "Wed, 7 Aug 2024 16:12:31 GMT"
},
{
"version": "v9",
"created": "Tue, 20 Aug 2024 19:22:24 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Dejter",
"Italo J.",
""
]
] |
2405.08930 | Brennan de Neeve | Brennan de Neeve, Andrey V. Lebedev, Vlad Negnevitsky, Jonathan P.
Home | Time-adaptive phase estimation | null | Phys. Rev. Res., Vol. 7, issue 2, pages 023070, Apr. 2025 | 10.1103/PhysRevResearch.7.023070 | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | Phase estimation is known to be a robust method for single-qubit gate
calibration in quantum computers, while Bayesian estimation is widely used in
devising optimal methods for learning in quantum systems. We present Bayesian
phase estimation methods that adaptively choose a control phase and the time of
coherent evolution based on prior phase knowledge. In the presence of noise, we
find near-optimal performance with respect to known theoretical bounds, and
demonstrate some robustness of the estimates to noise that is not accounted for
in the model of the estimator, making the methods suitable for calibrating
operations in quantum computers. We determine the utility of control parameter
values using functions of the prior probability of the phase that quantify
expected knowledge gain either in terms of expected narrowing of the posterior
or expected information gain. In particular, we find that by maximising the
rate of expected gain we obtain phase estimates having standard deviation a
factor of 1.43 larger than the Heisenberg limit using a classical sequential
strategy. The methods provide optimal solutions accounting for available prior
knowledge and experimental imperfections with minimal effort from the user. The
effect of many types of noise can be specified in the model of the measurement
probabilities, and the rate of knowledge gain can easily be adjusted to account
for times included in the measurement sequence other than the coherent
evolution leading to the unknown phase, such as times required for state
preparation or readout.
| [
{
"version": "v1",
"created": "Tue, 14 May 2024 19:49:22 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jul 2024 10:44:13 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 17:51:54 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"de Neeve",
"Brennan",
""
],
[
"Lebedev",
"Andrey V.",
""
],
[
"Negnevitsky",
"Vlad",
""
],
[
"Home",
"Jonathan P.",
""
]
] |
2405.09295 | Sungkyung Kang | Sungkyung Kang, JungHwan Park, Masaki Taniguchi | Cables of the figure-eight knot via real Fr{\o}yshov invariants | Revised version; 39 pages, several figures | null | null | RIKEN-iTHEMS-Report-24 | math.GT | http://creativecommons.org/licenses/by/4.0/ | We prove that the $(2n,1)$-cable of the figure-eight knot is not smoothly
slice when $n$ is odd, by using the real Seiberg-Witten Fr{\o}yshov invariant
of Konno-Miyazawa-Taniguchi. For the computation, we develop an
$O(2)$-equivariant version of the lattice homotopy type, originally introduced
by Dai-Sasahira-Stoffregen. This enables us to compute the real Seiberg-Witten
Floer homotopy type for a certain class of knots. Additionally, we present some
computations of Miyazawa's real framed Seiberg-Witten invariant for 2-knots.
| [
{
"version": "v1",
"created": "Wed, 15 May 2024 12:36:18 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 18:54:32 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Kang",
"Sungkyung",
""
],
[
"Park",
"JungHwan",
""
],
[
"Taniguchi",
"Masaki",
""
]
] |
2405.09591 | Zaitian Wang | Zaitian Wang, Pengfei Wang, Kunpeng Liu, Pengyang Wang, Yanjie Fu,
Chang-Tien Lu, Charu C. Aggarwal, Jian Pei, and Yuanchun Zhou | A Comprehensive Survey on Data Augmentation | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | Data augmentation is a series of techniques that generate high-quality
artificial data by manipulating existing data samples. By leveraging data
augmentation techniques, AI models can achieve significantly improved
applicability in tasks involving scarce or imbalanced datasets, thereby
substantially enhancing AI models' generalization capabilities. Existing
literature surveys only focus on a certain type of specific modality data, and
categorize these methods from modality-specific and operation-centric
perspectives, which lacks a consistent summary of data augmentation methods
across multiple modalities and limits the comprehension of how existing data
samples serve the data augmentation process. To bridge this gap, we propose a
more enlightening taxonomy that encompasses data augmentation techniques for
different common data modalities. Specifically, from a data-centric
perspective, this survey proposes a modality-independent taxonomy by
investigating how to take advantage of the intrinsic relationship between data
samples, including single-wise, pair-wise, and population-wise sample data
augmentation methods. Additionally, we categorize data augmentation methods
across five data modalities through a unified inductive approach.
| [
{
"version": "v1",
"created": "Wed, 15 May 2024 11:58:08 GMT"
},
{
"version": "v2",
"created": "Fri, 17 May 2024 07:03:16 GMT"
},
{
"version": "v3",
"created": "Fri, 2 May 2025 03:47:29 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Wang",
"Zaitian",
""
],
[
"Wang",
"Pengfei",
""
],
[
"Liu",
"Kunpeng",
""
],
[
"Wang",
"Pengyang",
""
],
[
"Fu",
"Yanjie",
""
],
[
"Lu",
"Chang-Tien",
""
],
[
"Aggarwal",
"Charu C.",
""
],
[
"Pei",
"Jian",
""
],
[
"Zhou",
"Yuanchun",
""
]
] |
2405.12951 | Daniel Commey | Daniel Commey, Sena Hounsinou, Garth V. Crosby | Strategic Deployment of Honeypots in Blockchain-based IoT Systems | null | null | 10.1109/AICAS59952.2024.10595866 | null | cs.CR cs.AI cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the challenge of enhancing cybersecurity in
Blockchain-based Internet of Things (BIoTs) systems, which are increasingly
vulnerable to sophisticated cyberattacks. It introduces an AI-powered system
model for the dynamic deployment of honeypots, utilizing an Intrusion Detection
System (IDS) integrated with smart contract functionalities on IoT nodes. This
model enables the transformation of regular nodes into decoys in response to
suspicious activities, thereby strengthening the security of BIoT networks. The
paper analyses strategic interactions between potential attackers and the
AI-enhanced IDS through a game-theoretic model, specifically Bayesian games.
The model focuses on understanding and predicting sophisticated attacks that
may initially appear normal, emphasizing strategic decision-making, optimized
honeypot deployment, and adaptive strategies in response to evolving attack
patterns.
| [
{
"version": "v1",
"created": "Tue, 21 May 2024 17:27:00 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Commey",
"Daniel",
""
],
[
"Hounsinou",
"Sena",
""
],
[
"Crosby",
"Garth V.",
""
]
] |
2405.13745 | Qiujie Dong | Qiujie Dong, Huibiao Wen, Rui Xu, Shuangmin Chen, Jiaran Zhou, Shiqing
Xin, Changhe Tu, Taku Komura, Wenping Wang | NeurCross: A Neural Approach to Computing Cross Fields for Quad Mesh
Generation | SIGGRAPH 2025 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quadrilateral mesh generation plays a crucial role in numerical simulations
within Computer-Aided Design and Engineering (CAD/E). Producing high-quality
quadrangulation typically requires satisfying four key criteria. First, the
quadrilateral mesh should closely align with principal curvature directions.
Second, singular points should be strategically placed and effectively
minimized. Third, the mesh should accurately conform to sharp feature edges.
Lastly, quadrangulation results should exhibit robustness against noise and
minor geometric variations. Existing methods generally involve first computing
a regular cross field to represent quad element orientations across the
surface, followed by extracting a quadrilateral mesh aligned closely with this
cross field. A primary challenge with this approach is balancing the smoothness
of the cross field with its alignment to pre-computed principal curvature
directions, which are sensitive to small surface perturbations and often
ill-defined in spherical or planar regions.
To tackle this challenge, we propose NeurCross, a novel framework that
simultaneously optimizes a cross field and a neural signed distance function
(SDF), whose zero-level set serves as a proxy of the input shape. Our joint
optimization is guided by three factors: faithful approximation of the
optimized SDF surface to the input surface, alignment between the cross field
and the principal curvature field derived from the SDF surface, and smoothness
of the cross field. Acting as an intermediary, the neural SDF contributes in
two essential ways. First, it provides an alternative, optimizable base surface
exhibiting more regular principal curvature directions for guiding the cross
field. Second, we leverage the Hessian matrix of the neural SDF to implicitly
enforce cross field alignment with principal curvature directions...
| [
{
"version": "v1",
"created": "Wed, 22 May 2024 15:32:34 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 02:01:46 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Dong",
"Qiujie",
""
],
[
"Wen",
"Huibiao",
""
],
[
"Xu",
"Rui",
""
],
[
"Chen",
"Shuangmin",
""
],
[
"Zhou",
"Jiaran",
""
],
[
"Xin",
"Shiqing",
""
],
[
"Tu",
"Changhe",
""
],
[
"Komura",
"Taku",
""
],
[
"Wang",
"Wenping",
""
]
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.