id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
sequence |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2504.04362 | Peng Xie | Peng Xie, Johannes Betz, Davide M. Raimondo, Amr Alanwar | Data-Driven Reachability Analysis for Piecewise Affine Systems | 8 pages, 6 figures | null | null | null | eess.SY cs.SY | http://creativecommons.org/licenses/by/4.0/ | Hybrid systems play a crucial role in modeling real-world applications where
discrete and continuous dynamics interact, including autonomous vehicles, power
systems, and traffic networks. Safety verification for these systems requires
determining whether system states can enter unsafe regions under given initial
conditions and uncertainties, a question directly addressed by reachability
analysis. However, hybrid systems present unique difficulties because their
state space is divided into multiple regions with distinct dynamic models,
causing traditional data-driven methods to produce inadequate
over-approximations of reachable sets at region boundaries where dynamics
change abruptly. This paper introduces a novel approach using hybrid zonotopes
for data-driven reachability analysis of piecewise affine systems. Our method
addresses the boundary transition problem by developing computational
algorithms that calculate the family of set models guaranteed to contain the
true system trajectories. Additionally, we extend and evaluate three methods
for set-based estimation that account for input-output data with measurement
noise.
| [
{
"version": "v1",
"created": "Sun, 6 Apr 2025 05:23:56 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 11:10:30 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Xie",
"Peng",
""
],
[
"Betz",
"Johannes",
""
],
[
"Raimondo",
"Davide M.",
""
],
[
"Alanwar",
"Amr",
""
]
] |
2504.04519 | Junjie Jiang | Junjie Jiang, Zelin Wang, Manqi Zhao, Yin Li, DongSheng Jiang | SAM2MOT: A Novel Paradigm of Multi-Object Tracking by Segmentation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Segment Anything 2 (SAM2) enables robust single-object tracking using
segmentation. To extend this to multi-object tracking (MOT), we propose
SAM2MOT, introducing a novel Tracking by Segmentation paradigm. Unlike Tracking
by Detection or Tracking by Query, SAM2MOT directly generates tracking boxes
from segmentation masks, reducing reliance on detection accuracy. SAM2MOT has
two key advantages: zero-shot generalization, allowing it to work across
datasets without fine-tuning, and strong object association, inherited from
SAM2. To further improve performance, we integrate a trajectory manager system
for precise object addition and removal, and a cross-object interaction module
to handle occlusions. Experiments on DanceTrack, UAVDT, and BDD100K show
state-of-the-art results. Notably, SAM2MOT outperforms existing methods on
DanceTrack by +2.1 HOTA and +4.5 IDF1, highlighting its effectiveness in MOT.
Code is available at https://github.com/TripleJoy/SAM2MOT.
| [
{
"version": "v1",
"created": "Sun, 6 Apr 2025 15:32:08 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Apr 2025 10:49:02 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 15:24:49 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Jiang",
"Junjie",
""
],
[
"Wang",
"Zelin",
""
],
[
"Zhao",
"Manqi",
""
],
[
"Li",
"Yin",
""
],
[
"Jiang",
"DongSheng",
""
]
] |
2504.04526 | Kamal Das | Kamal Das, Yufei Zhao and Binghai Yan | Surface-Dominated Quantum Metric-Induced Nonlinear Transport in the
Layered Antiferromagnet CrSBr | 6 pages, 4 figures, Comments are welcome | null | null | null | cond-mat.mes-hall cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The van der Waals (vdW) antiferromagnet CrSBr has recently garnered
significant attention due to its air stability, high magnetic transition
temperature, and semiconducting properties. We investigate its nonlinear
transport properties and identify a quantum metric dipole-induced nonlinear
anomalous Hall effect and nonlinear longitudinal resistivity, which switch sign
upon reversing the N\'eel vector. The significant quantum metric dipole
originates from Dirac nodal lines near the conduction band edge within the
experimentally achievable doping range. Known the weak interlayer coupling, it
is unexpected that the nonlinear conductivities do not scale with sample
thickness but are dominantly contributed by surface layers. In the
electron-doped region, the top layer dominates the response while the top three
layers contribute the most in the hole-doped region. Our results establish
topological nodal lines as a guiding principle to design high-performance
nonlinear quantum materials and suggest that surface-sensitive transport
devices will provide new avenues for nonlinear electronic applications.
| [
{
"version": "v1",
"created": "Sun, 6 Apr 2025 15:49:22 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 13:17:20 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Das",
"Kamal",
""
],
[
"Zhao",
"Yufei",
""
],
[
"Yan",
"Binghai",
""
]
] |
2504.04592 | Uri Menkes | Uri Menkes, Assaf Hallak, Ofra Amir | "Trust me on this" Explaining Agent Behavior to a Human Terminator | 6 pages, 3 figures, in proceedings of ICML 2024 Workshop on Models of
Human Feedback for AI Alignment | null | null | null | cs.HC cs.AI | http://creativecommons.org/licenses/by-sa/4.0/ | Consider a setting where a pre-trained agent is operating in an environment
and a human operator can decide to temporarily terminate its operation and
take-over for some duration of time. These kind of scenarios are common in
human-machine interactions, for example in autonomous driving, factory
automation and healthcare. In these settings, we typically observe a trade-off
between two extreme cases -- if no take-overs are allowed, then the agent might
employ a sub-optimal, possibly dangerous policy. Alternatively, if there are
too many take-overs, then the human has no confidence in the agent, greatly
limiting its usefulness. In this paper, we formalize this setup and propose an
explainability scheme to help optimize the number of human interventions.
| [
{
"version": "v1",
"created": "Sun, 6 Apr 2025 19:29:45 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 17:48:40 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Menkes",
"Uri",
""
],
[
"Hallak",
"Assaf",
""
],
[
"Amir",
"Ofra",
""
]
] |
2504.04660 | Attila Egri-Nagy | Attila Egri-Nagy, Chrystopher L. Nehaniv | Representation Independent Decompositions of Computation | 16 pages, 8 figures, final version will be published elsewhere, v2:
errors corrected in examples | null | null | null | math.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constructing complex computation from simpler building blocks is a defining
problem of computer science. In algebraic automata theory, we represent
computing devices as semigroups. Accordingly, we use mathematical tools like
products and homomorphisms to understand computation through hierarchical
decompositions. To address the shortcomings of some of the existing
decomposition methods, we generalize semigroup representations to semigroupoids
by introducing types. On the abstraction level of category theory, we describe
a flexible, iterative and representation independent algorithm. Moving from the
specific state transition model to the abstract composition of arrows unifies
seemingly different decomposition methods and clarifies the three algorithmic
stages: collapse, copy and compress. We collapse some dynamics through a
morphism to the top level; copy the forgotten details into the bottom level;
and finally we apply compression there. The hierarchical connections are solely
for locating the repeating patterns in the compression. These theoretical
findings pave the way for more precise computer algebra tools and allow for
understanding computation with other algebraic structures.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2025 01:13:41 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 03:40:13 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Egri-Nagy",
"Attila",
""
],
[
"Nehaniv",
"Chrystopher L.",
""
]
] |
2504.04849 | Sam Kirkham | Sam Kirkham | Discovering dynamical laws for speech gestures | Accepted for publication in 'Cognitive Science' | Cognitive Science 49(5), e70064 (2025) | 10.1111/cogs.70064 | null | cs.CL nlin.AO | http://creativecommons.org/licenses/by/4.0/ | A fundamental challenge in the cognitive sciences is discovering the dynamics
that govern behaviour. Take the example of spoken language, which is
characterised by a highly variable and complex set of physical movements that
map onto the small set of cognitive units that comprise language. What are the
fundamental dynamical principles behind the movements that structure speech
production? In this study, we discover models in the form of symbolic equations
that govern articulatory gestures during speech. A sparse symbolic regression
algorithm is used to discover models from kinematic data on the tongue and
lips. We explore these candidate models using analytical techniques and
numerical simulations, and find that a second-order linear model achieves high
levels of accuracy, but a nonlinear force is required to properly model
articulatory dynamics in approximately one third of cases. This supports the
proposal that an autonomous, nonlinear, second-order differential equation is a
viable dynamical law for articulatory gestures in speech. We conclude by
identifying future opportunities and obstacles in data-driven model discovery
and outline prospects for discovering the dynamical principles that govern
language, brain and behaviour.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2025 09:03:32 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Kirkham",
"Sam",
""
]
] |
2504.05012 | Tom Favereau | Tom Favereau and Ville Salo | Descriptive Complexity of Sensitivity of Cellular Automata | 16 pages, 4 figures, accepted to AUTOMATA 2025. Addressed referee
comments | null | null | null | math.DS cs.CC math.LO | http://creativecommons.org/licenses/by/4.0/ | We study the computational complexity of determining whether a cellular
automaton is sensitive to initial conditions. We show that this problem is
$\Pi^0_2$-complete in dimension 1 and $\Sigma^0_3$-complete in dimension 2 and
higher. This solves a question posed by Sablik and Theyssier.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2025 12:38:07 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 11:58:31 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Favereau",
"Tom",
""
],
[
"Salo",
"Ville",
""
]
] |
2504.05123 | Leonardo Saud Maia Leite | Teemu Lundstr\"om and Leonardo Saud Maia Leite | Order polytopes of crown posets | 24 pages, 9 figures. Typos were fixed, Remark 4.3 was added, abstract
was edited, and Corollary 5.19 was removed | null | null | null | math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the last decade, the order polytope of the zigzag poset has been
thoroughly studied. A related poset, called \emph{crown poset}, obtained by
adding an extra relation between the endpoints of an even zigzag poset, is not
so well understood. In this paper, we study the order polytopes of crown
posets. We provide explicit formulas for their $f$-vectors. We provide
recursive formulas for their Ehrhart polynomial, giving a counterpart to
formulas found in the zigzag case by Petersen--Zhuang (2025). We use these
formulas to simplify a computation by Ferroni--Morales--Panova (2025) of the
linear term of the order polynomial of these posets. Furthermore, we provide a
combinatorial interpretation for the coefficients of the $h^*$-polynomial in
terms of the cyclic swap statistic on cyclically alternating permutations,
which provides a circular version of a result by Coons--Sullivant (2023).
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2025 14:27:07 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 14:51:59 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Lundström",
"Teemu",
""
],
[
"Leite",
"Leonardo Saud Maia",
""
]
] |
2504.05159 | Antti Haavikko | Wilmar Bola\~nos, Antti Haavikko, Rodrigo Mart\'in S\'anchez-Ledesma | A Fast Multiplication Algorithm and RLWE-PLWE Equivalence for the
Maximal Real Subfield of the $2^r p^s$-th Cyclotomic Field | null | null | null | null | cs.CR math.NT | http://creativecommons.org/licenses/by/4.0/ | This paper proves the RLWE-PLWE equivalence for the maximal real subfields of
the cyclotomic fields with conductor $n = 2^r p^s$, where $p$ is an odd prime,
and $r \geq 0$ and $s \geq 1$ are integers. In particular, we show that the
canonical embedding as a linear transform has a condition number bounded above
by a polynomial in $n$. In addition, we describe a fast multiplication
algorithm in the ring of integers of these real subfields. The multiplication
algorithm uses the fast Discrete Cosine Transform (DCT) and has computational
complexity $\mathcal{O}(n \log n)$. Both the proof of the RLWE-PLWE equivalence
and the fast multiplication algorithm are generalizations of previous results
by Ahola et al., where the same claims are proved for a single prime $p = 3$.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2025 15:01:48 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 08:51:24 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Bolaños",
"Wilmar",
""
],
[
"Haavikko",
"Antti",
""
],
[
"Sánchez-Ledesma",
"Rodrigo Martín",
""
]
] |
2504.05197 | Yong Ren | Yong Ren, Jiangyan Yi, Tao Wang, Jianhua Tao, Zheng Lian, Zhengqi Wen,
Chenxing Li, Ruibo Fu, Ye Bai, Xiaohui Zhang | P2Mark: Plug-and-play Parameter-level Watermarking for Neural Speech
Generation | null | null | null | null | cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neural speech generation (NSG) has rapidly advanced as a key component of
artificial intelligence-generated content, enabling the generation of
high-quality, highly realistic speech for diverse applications. This
development increases the risk of technique misuse and threatens social
security. Audio watermarking can embed imperceptible marks into generated
audio, providing a promising approach for secure NSG usage. However, current
audio watermarking methods are mainly applied at the audio-level or
feature-level, which are not suitable for open-sourced scenarios where source
codes and model weights are released. To address this limitation, we propose a
Plug-and-play Parameter-level WaterMarking (P2Mark) method for NSG.
Specifically, we embed watermarks into the released model weights, offering a
reliable solution for proactively tracing and protecting model copyrights in
open-source scenarios. During training, we introduce a lightweight watermark
adapter into the pre-trained model, allowing watermark information to be merged
into the model via this adapter. This design ensures both the flexibility to
modify the watermark before model release and the security of embedding the
watermark within model parameters after model release. Meanwhile, we propose a
gradient orthogonal projection optimization strategy to ensure the quality of
the generated audio and the accuracy of watermark preservation. Experimental
results on two mainstream waveform decoders in NSG (i.e., vocoder and codec)
demonstrate that P2Mark achieves comparable performance to state-of-the-art
audio watermarking methods that are not applicable to open-source white-box
protection scenarios, in terms of watermark extraction accuracy, watermark
imperceptibility, and robustness.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2025 15:47:09 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 16:34:37 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Ren",
"Yong",
""
],
[
"Yi",
"Jiangyan",
""
],
[
"Wang",
"Tao",
""
],
[
"Tao",
"Jianhua",
""
],
[
"Lian",
"Zheng",
""
],
[
"Wen",
"Zhengqi",
""
],
[
"Li",
"Chenxing",
""
],
[
"Fu",
"Ruibo",
""
],
[
"Bai",
"Ye",
""
],
[
"Zhang",
"Xiaohui",
""
]
] |
2504.05287 | Hui Zhang | Hui Zhang, Zijian Wu, Linyi Huang, Sammy Christen, Jie Song | RobustDexGrasp: Robust Dexterous Grasping of General Objects | Project Page: https://zdchan.github.io/Robust_DexGrasp/ | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ability to robustly grasp a variety of objects is essential for dexterous
robots. In this paper, we present a framework for zero-shot dynamic dexterous
grasping using single-view visual inputs, designed to be resilient to various
disturbances. Our approach utilizes a hand-centric object shape representation
based on dynamic distance vectors between finger joints and object surfaces.
This representation captures the local shape around potential contact regions
rather than focusing on detailed global object geometry, thereby enhancing
generalization to shape variations and uncertainties. To address perception
limitations, we integrate a privileged teacher policy with a mixed curriculum
learning approach, allowing the student policy to effectively distill grasping
capabilities and explore for adaptation to disturbances. Trained in simulation,
our method achieves success rates of 97.0% across 247,786 simulated objects and
94.6% across 512 real objects, demonstrating remarkable generalization.
Quantitative and qualitative results validate the robustness of our policy
against various disturbances.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2025 17:38:19 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 17:42:57 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Zhang",
"Hui",
""
],
[
"Wu",
"Zijian",
""
],
[
"Huang",
"Linyi",
""
],
[
"Christen",
"Sammy",
""
],
[
"Song",
"Jie",
""
]
] |
2504.05412 | Jun Kitagawa | Jun Kitagawa and Cyril Letrouit and Quentin M\'erigot | Stability of optimal transport maps on Riemannian manifolds | 22 pages, bibliography re-formatted, added example on sharpness of
exponent, some typos fixed. Comments welcome! | null | null | null | math.MG math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove quantitative bounds on the stability of optimal transport maps and
Kantorovich potentials from a fixed source measure $\rho$ under variations of
the target measure $\mu$, when the cost function is the squared Riemannian
distance on a Riemannian manifold. Previous works were restricted to subsets of
Euclidean spaces, or made specific assumptions either on the manifold, or on
the regularity of the transport maps. Our proof techniques combine
entropy-regularized optimal transport with spectral and integral-geometric
techniques. As some of the arguments do not rely on the Riemannian structure,
our work also paves the way towards understanding stability of optimal
transport in more general geometric spaces.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2025 18:32:03 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 08:37:30 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Kitagawa",
"Jun",
""
],
[
"Letrouit",
"Cyril",
""
],
[
"Mérigot",
"Quentin",
""
]
] |
2504.06509 | Qi Jia | Qi Jia, Yu-Chia Chen, Delin Zhang, Yang Lv, Shuang Liang, Onri Jay
Benally, Yifei Yang, Brahmdutta Dixit, Deyuan Lyu, Brandon Zink and Jian-Ping
Wang | Ultrafast and Directional Magnetization Control via Voltage-Controlled
Exchange Coupling | 20 pages, 5 figures | null | null | null | physics.app-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ultrafast and energy-efficient electrically controlled magnetization
switching is critical for next-generation spintronic devices. Voltage-driven
switching offers an alternative to current-driven methods, significantly
improving energy efficiency. Although voltage-controlled exchange coupling
(VCEC) has been proposed to switch magnetic states, its ultrafast response has
not been experimentally verified. Here, we demonstrate that VCEC induces a
directional exchange field that persists under nanosecond voltage pulses in a
perpendicular magnetic tunnel junction (pMTJ) with an exchange-coupled free
layer. This establishes that VCEC can operate on ultrafast timescales with
deterministic control over the switching polarity. The magnetization reversal
is primarily assisted by voltage-induced magnetic anisotropy (VCMA), which
transiently lowers the energy barrier. This combination enables magnetization
switching within 87.5 ps with a 50% switching probability. The fast switching
is attributed to enhanced magnetic relaxation of the free layer, facilitated by
the exchange-coupled structure, which accelerates voltage-driven magnetization
switching. These findings reveal that purely voltage-driven switching is viable
for fast, bidirectional magnetization switching for future spintronic logic and
memory technologies.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2025 01:02:51 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 17:41:20 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Jia",
"Qi",
""
],
[
"Chen",
"Yu-Chia",
""
],
[
"Zhang",
"Delin",
""
],
[
"Lv",
"Yang",
""
],
[
"Liang",
"Shuang",
""
],
[
"Benally",
"Onri Jay",
""
],
[
"Yang",
"Yifei",
""
],
[
"Dixit",
"Brahmdutta",
""
],
[
"Lyu",
"Deyuan",
""
],
[
"Zink",
"Brandon",
""
],
[
"Wang",
"Jian-Ping",
""
]
] |
2504.06559 | Ali Eslamian | Ali Eslamian, Alireza Afzal Aghaei and Qiang Cheng | TabKAN: Advancing Tabular Data Analysis using Kolmogorov-Arnold Network | 22 pages, 12 figures, 13 tables | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tabular data analysis presents unique challenges due to its heterogeneous
feature types, missing values, and complex interactions. While traditional
machine learning methods, such as gradient boosting, often outperform deep
learning approaches, recent advancements in neural architectures offer
promising alternatives. This paper introduces TabKAN, a novel framework that
advances tabular data modeling using Kolmogorov-Arnold Networks (KANs). Unlike
conventional deep learning models, KANs leverge learnable activation functions
on edges, which improve both interpretability and training efficiency. Our
contributions include: (1) the introduction of modular KAN-based architectures
for tabular data analysis, (2) the development of a transfer learning framework
for KAN models that supports knowledge transfer between domains, (3) the
development of model-specific interpretability for tabular data learning, which
reduces dependence on post hoc and model-agnostic analysis, and (4)
comprehensive evaluation of vanilla supervised learning across binary and
multi-class classification tasks. Through extensive benchmarking on diverse
public datasets, TabKAN demonstrates superior performance in supervised
learning while significantly outperforming classical and Transformer-based
models in transfer learning scenarios. Our findings highlight the advantage of
KAN-based architectures in transferring knowledge across domains and narrowing
the gap between traditional machine learning and deep learning for structured
data.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2025 03:46:10 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 02:59:16 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Eslamian",
"Ali",
""
],
[
"Aghaei",
"Alireza Afzal",
""
],
[
"Cheng",
"Qiang",
""
]
] |
2504.06997 | Mingliang Pan | Mingliang Pan, Chenxu Li, Yuanzhe Zhang, Alan Mollins, Quan Wang,
Ahmet T. Erdogan, Yuanyuan Hua, Zhenya Zang, Neil Finlayson, Robert K.
Henderson, David Day-Uei Li | Cerebral blood flow monitoring using a deep learning implementation of
the two-layer DCS analytical model with a 512x512 SPAD array | 23 pages, 11 figures | null | null | null | physics.med-ph physics.bio-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diffuse correlation spectroscopy (DCS) analyzes the autocorrelation function
of photons scattered by red blood cells, enabling non-invasive, continuous
measurement of deep tissue blood flow at the bedside. Multi-layer DCS models
(two- and three-layer) enhance cerebral blood flow index (CBFi) sensitivity and
mitigate interference from extracerebral tissues. However, these models require
multiple predefined parameters and are computationally intensive, making them
impractical for real-time bedside monitoring. To address this challenge, we
integrate a single-photon avalanche diode (SPAD) array with a deep learning
(DL)-based approach trained on data generated by the two-layer analytical
model. This method bypasses traditional model fitting, enabling real-time CBFi
monitoring while minimizing superficial tissue contamination. We first validate
our approach using Monte Carlo-simulated test datasets, demonstrating superior
accuracy in relative CBFi estimation (5.8% error vs. 19.1% for conventional
fitting) and enhanced CBFi sensitivity (87.1% vs. 55.4%). Additionally, our
method effectively isolates shallow blood flow changes and 750-fold faster than
single-exponential fitting in a realistic scenario. We further evaluate the
system in a healthy adult, achieving real-time CBFi monitoring and pulsatile
waveform recovery during a brain activity test using a 512 512 SPAD array
sensor. These results highlight the potential of our approach for real-time
brain activity monitoring.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2025 16:09:34 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 08:25:26 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Pan",
"Mingliang",
""
],
[
"Li",
"Chenxu",
""
],
[
"Zhang",
"Yuanzhe",
""
],
[
"Mollins",
"Alan",
""
],
[
"Wang",
"Quan",
""
],
[
"Erdogan",
"Ahmet T.",
""
],
[
"Hua",
"Yuanyuan",
""
],
[
"Zang",
"Zhenya",
""
],
[
"Finlayson",
"Neil",
""
],
[
"Henderson",
"Robert K.",
""
],
[
"Li",
"David Day-Uei",
""
]
] |
2504.07230 | Poetri Sonya Tarabunga | Poetri Sonya Tarabunga and Tobias Haug | Efficient mutual magic and magic capacity with matrix product states | 11+8 pages, 5+8 figures | null | null | null | quant-ph cond-mat.stat-mech cond-mat.str-el | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Stabilizer R\'enyi entropies (SREs) probe the non-stabilizerness (or magic)
of many-body systems and quantum computers. Here, we introduce the mutual
von-Neumann SRE and magic capacity, which can be efficiently computed in time
$O(N\chi^3)$ for matrix product states (MPSs) of bond dimension $\chi$. We find
that mutual SRE characterizes the critical point of ground states of the
transverse-field Ising model, independently of the chosen local basis. Then, we
relate the magic capacity to the anti-flatness of the Pauli spectrum, which
quantifies the complexity of computing SREs. The magic capacity characterizes
transitions in the ground state of the Heisenberg and Ising model, randomness
of Clifford+T circuits, and distinguishes typical and atypical states. Finally,
we make progress on numerical techniques: we design two improved Monte-Carlo
algorithms to compute the mutual $2$-SRE, overcoming limitations of previous
approaches based on local update. We also give improved statevector simulation
methods for Bell sampling and SREs with $O(8^{N/2})$ time and $O(2^N)$ memory,
which we demonstrate for $24$ qubits. Our work uncovers improved approaches to
study the complexity of quantum many-body systems.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2025 19:12:26 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 21:54:04 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Tarabunga",
"Poetri Sonya",
""
],
[
"Haug",
"Tobias",
""
]
] |
2504.07242 | Uthman Olawoye | Uthman Olawoye, Cagri Kilic and Jason N Gross | Analysis of the Unscented Transform for Cooperative Localization with
Ranging-Only Information | 8 pages, 8 figures. The paper will be presented at the 2025 IEEE/ION
Position, Location and Navigation Symposium (PLANS) | null | null | null | cs.RO | http://creativecommons.org/licenses/by/4.0/ | Cooperative localization in multi-agent robotic systems is challenging,
especially when agents rely on limited information, such as only peer-to-peer
range measurements. Two key challenges arise: utilizing this limited
information to improve position estimation; handling uncertainties from sensor
noise, nonlinearity, and unknown correlations between agents measurements; and
avoiding information reuse. This paper examines the use of the Unscented
Transform (UT) for state estimation for a case in which range measurement
between agents and covariance intersection (CI) is used to handle unknown
correlations. Unlike Kalman Filter approaches, CI methods fuse complete state
and covariance estimates. This makes formulating a CI approach with
ranging-only measurements a challenge. To overcome this, UT is used to handle
uncertainties and formulate a cooperative state update using range measurements
and current cooperative state estimates. This introduces information reuse in
the measurement update. Therefore, this work aims to evaluate the limitations
and utility of this formulation when faced with various levels of state
measurement uncertainty and errors.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2025 19:29:16 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 15:57:12 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Olawoye",
"Uthman",
""
],
[
"Kilic",
"Cagri",
""
],
[
"Gross",
"Jason N",
""
]
] |
2504.07299 | Alexander Zhuk | \"Ozg\"ur Akarsu, Maxim Eingorn, Leandros Perivolaropoulos, A. Emrah
Y\"ukselci, Alexander Zhuk | Dynamical dark energy with AdS-dS transitions vs. Baryon Acoustic
Oscillations at $z =$ 2.3-2.4 | 12 pages, 1 figure, 2 tables. A contribution to the book "Open Issues
in Gravitation and Cosmology - Original Contributions, Essays and
Recollections in Honor of Alexei Starobinsky", to be published by Springer,
edited by Andrei Barvinsky and Alexander Kamenshchik. In version 2, we
updated the Acknowledgements | null | null | null | astro-ph.CO gr-qc hep-ph hep-th | http://creativecommons.org/licenses/by/4.0/ | In this paper, written in memory of Alexei Starobinsky, we discuss the
observational viability of the Ph-$\Lambda_{\rm s}$CDM model - a dynamical dark
energy scenario based on a phantom scalar field undergoing an anti-de Sitter
(AdS) to de Sitter (dS) transition - and revisit the Sahni-Shtanov braneworld
model in light of updated BAO Ly-$\alpha$ data at $z \sim 2.3$. Both models are
able to remain consistent with Planck CMB data while offering potential
resolutions to the $H_0$ tension. In both cases, the expansion rate $H(z)$ is
suppressed relative to Planck-$\Lambda$CDM at high redshift and enhanced at low
redshift, while remaining consistent with the comoving distance to
recombination as estimated by Planck-$\Lambda$CDM. Comparing model predictions
with BAO-inferred values of $H(z)$, we find that SDSS Ly-$\alpha$ data at $z
\approx 2.33$ mildly favor such dynamical models, whereas the recent DESI
Ly-$\alpha$ measurements agree more closely with $\Lambda$CDM. Although current
high-redshift BAO data do not decisively favor one model over another, our
findings illustrate how frameworks originally developed to address earlier
anomalies - such as the braneworld scenario - may gain renewed relevance in
confronting today's cosmological tensions.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2025 21:41:35 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 15:00:56 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Akarsu",
"Özgür",
""
],
[
"Eingorn",
"Maxim",
""
],
[
"Perivolaropoulos",
"Leandros",
""
],
[
"Yükselci",
"A. Emrah",
""
],
[
"Zhuk",
"Alexander",
""
]
] |
2504.07392 | Darian Toma\v{s}evi\'c | Darian Toma\v{s}evi\'c, Fadi Boutros, Chenhao Lin, Naser Damer,
Vitomir \v{S}truc and Peter Peer | ID-Booth: Identity-consistent Face Generation with Diffusion Models | IEEE International Conference on Automatic Face and Gesture
Recognition (FG) 2025, 14 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent advances in generative modeling have enabled the generation of
high-quality synthetic data that is applicable in a variety of domains,
including face recognition. Here, state-of-the-art generative models typically
rely on conditioning and fine-tuning of powerful pretrained diffusion models to
facilitate the synthesis of realistic images of a desired identity. Yet, these
models often do not consider the identity of subjects during training, leading
to poor consistency between generated and intended identities. In contrast,
methods that employ identity-based training objectives tend to overfit on
various aspects of the identity, and in turn, lower the diversity of images
that can be generated. To address these issues, we present in this paper a
novel generative diffusion-based framework, called ID-Booth. ID-Booth consists
of a denoising network responsible for data generation, a variational
auto-encoder for mapping images to and from a lower-dimensional latent space
and a text encoder that allows for prompt-based control over the generation
procedure. The framework utilizes a novel triplet identity training objective
and enables identity-consistent image generation while retaining the synthesis
capabilities of pretrained diffusion models. Experiments with a
state-of-the-art latent diffusion model and diverse prompts reveal that our
method facilitates better intra-identity consistency and inter-identity
separability than competing methods, while achieving higher image diversity. In
turn, the produced data allows for effective augmentation of small-scale
datasets and training of better-performing recognition models in a
privacy-preserving manner. The source code for the ID-Booth framework is
publicly available at https://github.com/dariant/ID-Booth.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2025 02:20:18 GMT"
},
{
"version": "v2",
"created": "Sun, 13 Apr 2025 20:39:40 GMT"
},
{
"version": "v3",
"created": "Fri, 18 Apr 2025 23:24:31 GMT"
},
{
"version": "v4",
"created": "Sun, 4 May 2025 18:23:15 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Tomašević",
"Darian",
""
],
[
"Boutros",
"Fadi",
""
],
[
"Lin",
"Chenhao",
""
],
[
"Damer",
"Naser",
""
],
[
"Štruc",
"Vitomir",
""
],
[
"Peer",
"Peter",
""
]
] |
2504.08199 | Jian Zhou | J. Zhou and C. Zhang | Contrasting Light-Induced Spin Torque in Antiferromagnetic and
Altermagnetic Systems | 3 figures, a slightly longer version than will be published in PRL | Physical Review Letters 134, 176902 (2025) | 10.1103/PhysRevLett.134.176902 | null | cond-mat.mtrl-sci | http://creativecommons.org/licenses/by/4.0/ | Light-matter interaction has become one of the promising routes to
manipulating various physical feature of quantum materials in an ultrafast
kinetics. In this work, we focus on the nonlinear optical effects of the
spintronic behavior in antiferromagnetic (AFM) and altermagnetic (AM) systems
with compensated magnetic moments, which has been extensively attractive for
their potential applications. With vanishing net magnetic moments, one of the
main concerns is how to distinguish and disentangle AFMs and AMs in
experiments, as they usually behave similarly in many susceptibility
measurements. To address this challenge, we propose that linearly polarized
light could trigger contrasting nonequilibrium local spin torques in these
systems, unravelling hidden light-induced spintronic behaviors. In general, one
could achieve light-induced spin canting in AMs, while only Neel vector torques
in AFMs. We scrutinize and enumerate their symmetry constraints of all 122
magnetic point groups. We also adopt low energy Hamiltonian models and
first-principles calculations on two representative materials to illustrate our
theory. Our work provides a new perspective for the design and optimization of
spintronic devices.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2025 02:05:12 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Zhou",
"J.",
""
],
[
"Zhang",
"C.",
""
]
] |
2504.08229 | Subrata Panda | K. H. Singh, S. K. Panda, S. M. Hanasoge, S. Dhanpal | Seismic constraints on the spin evolution of slowly rotating young
intermediate-mass stars | null | null | null | null | astro-ph.SR | http://creativecommons.org/licenses/by/4.0/ | $\delta$ Scuti stars are hot, rapid rotators and are a poorly understood
class of pulsators. Asteroseismology provides the only means with which to
probe their interior dynamics. However, their complex and unexplained
oscillation patterns restrict analyses to only a small fraction with
interpretable pulsations. Here, we identify 5381 $\delta$ Scuti stars from 63
sectors of TESS observations, of which 300 had interpretable oscillations, with
24 showing rotational splittings. We inferred compositions and ages ($\tau$)
for the 300 stars finding them in near-ZAMS states (Bedding et al. 2020), and
measured the mean envelope rotation rates ($< f_{rot} >$) for 24 of them.
Analyzing their age-dependent rotation, we found these stars essentially
exhibit weak-to-no spindown, while evolving past the ZAMS across a narrow
time-span during which they show regular pulsations. A quantitative fit to
their spin-evolution results in a trend $f_{rot} (d^{-1}) \propto
(\tau/{Gyr})^{-0.048 \pm 0.016}$, much slower than the spindown of cooler
late-type stars due to magnetic braking (Skumanich's law: $f_{rot} (d^{-1})
\propto (\tau/{Gyr})^{-0.5}$). Based on stellar evolution calculations, we show
this weak spindown is consistent with the gradual increase in their
moment-of-inertia.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2025 03:22:09 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 05:56:42 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Singh",
"K. H.",
""
],
[
"Panda",
"S. K.",
""
],
[
"Hanasoge",
"S. M.",
""
],
[
"Dhanpal",
"S.",
""
]
] |
2504.08623 | Vineeth Sai Narajala | Vineeth Sai Narajala, Idan Habler | Enterprise-Grade Security for the Model Context Protocol (MCP):
Frameworks and Mitigation Strategies | 11 pages, 2 figures, 1 table, typos corrected, references added | null | null | null | cs.CR cs.AI | http://creativecommons.org/licenses/by/4.0/ | The Model Context Protocol (MCP), introduced by Anthropic, provides a
standardized framework for artificial intelligence (AI) systems to interact
with external data sources and tools in real-time. While MCP offers significant
advantages for AI integration and capability extension, it introduces novel
security challenges that demand rigorous analysis and mitigation. This paper
builds upon foundational research into MCP architecture and preliminary
security assessments to deliver enterprise-grade mitigation frameworks and
detailed technical implementation strategies. Through systematic threat
modeling and analysis of MCP implementations and analysis of potential attack
vectors, including sophisticated threats like tool poisoning, we present
actionable security patterns tailored for MCP implementers and adopters. The
primary contribution of this research lies in translating theoretical security
concerns into a practical, implementable framework with actionable controls,
thereby providing essential guidance for the secure enterprise adoption and
governance of integrated AI systems.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2025 15:25:58 GMT"
},
{
"version": "v2",
"created": "Fri, 2 May 2025 18:26:39 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Narajala",
"Vineeth Sai",
""
],
[
"Habler",
"Idan",
""
]
] |
2504.08661 | Xiaobing Dai | Xiaobing Dai, Zewen Yang, Dian Yu, Shanshan Zhang, Hamid Sadeghian,
Sami Haddadin and Sandra Hirche | Safe Flow Matching: Robot Motion Planning with Control Barrier Functions | null | null | null | null | cs.RO cs.SY eess.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent advances in generative modeling have led to promising results in robot
motion planning, particularly through diffusion and flow matching (FM)-based
models that capture complex, multimodal trajectory distributions. However,
these methods are typically trained offline and remain limited when faced with
new environments with constraints, often lacking explicit mechanisms to ensure
safety during deployment. In this work, we propose Safe Flow Matching
(SafeFlow), a motion planning framework, for trajectory generation that
integrates flow matching with safety guarantees. SafeFlow leverages our
proposed flow matching barrier functions (FMBF) to ensure the planned
trajectories remain within safe regions across the entire planning horizon.
Crucially, our approach enables training-free, real-time safety enforcement at
test time, eliminating the need for retraining. We evaluate SafeFlow on a
diverse set of tasks, including planar robot navigation and 7-DoF manipulation,
demonstrating superior safety and planning performance compared to
state-of-the-art generative planners. Comprehensive resources are available on
the project website: https://safeflowmatching.github.io
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2025 16:10:58 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 16:10:16 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Dai",
"Xiaobing",
""
],
[
"Yang",
"Zewen",
""
],
[
"Yu",
"Dian",
""
],
[
"Zhang",
"Shanshan",
""
],
[
"Sadeghian",
"Hamid",
""
],
[
"Haddadin",
"Sami",
""
],
[
"Hirche",
"Sandra",
""
]
] |
2504.08685 | Lu Jiang | Team Seawead, Ceyuan Yang, Zhijie Lin, Yang Zhao, Shanchuan Lin,
Zhibei Ma, Haoyuan Guo, Hao Chen, Lu Qi, Sen Wang, Feng Cheng, Feilong Zuo,
Xuejiao Zeng, Ziyan Yang, Fangyuan Kong, Meng Wei, Zhiwu Qing, Fei Xiao,
Tuyen Hoang, Siyu Zhang, Peihao Zhu, Qi Zhao, Jiangqiao Yan, Liangke Gui,
Sheng Bi, Jiashi Li, Yuxi Ren, Rui Wang, Huixia Li, Xuefeng Xiao, Shu Liu,
Feng Ling, Heng Zhang, Houmin Wei, Huafeng Kuang, Jerry Duncan, Junda Zhang,
Junru Zheng, Li Sun, Manlin Zhang, Renfei Sun, Xiaobin Zhuang, Xiaojie Li,
Xin Xia, Xuyan Chi, Yanghua Peng, Yuping Wang, Yuxuan Wang, Zhongkai Zhao,
Zhuo Chen, Zuquan Song, Zhenheng Yang, Jiashi Feng, Jianchao Yang, Lu Jiang | Seaweed-7B: Cost-Effective Training of Video Generation Foundation Model | Technical report (some typos fixed) | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | This technical report presents a cost-efficient strategy for training a video
generation foundation model. We present a mid-sized research model with
approximately 7 billion parameters (7B) called Seaweed-7B trained from scratch
using 665,000 H100 GPU hours. Despite being trained with moderate computational
resources, Seaweed-7B demonstrates highly competitive performance compared to
contemporary video generation models of much larger size. Design choices are
especially crucial in a resource-constrained setting. This technical report
highlights the key design decisions that enhance the performance of the
medium-sized diffusion model. Empirically, we make two observations: (1)
Seaweed-7B achieves performance comparable to, or even surpasses, larger models
trained on substantially greater GPU resources, and (2) our model, which
exhibits strong generalization ability, can be effectively adapted across a
wide range of downstream applications either by lightweight fine-tuning or
continue training. See the project page at https://seaweed.video/
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2025 16:46:20 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 03:31:30 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Seawead",
"Team",
""
],
[
"Yang",
"Ceyuan",
""
],
[
"Lin",
"Zhijie",
""
],
[
"Zhao",
"Yang",
""
],
[
"Lin",
"Shanchuan",
""
],
[
"Ma",
"Zhibei",
""
],
[
"Guo",
"Haoyuan",
""
],
[
"Chen",
"Hao",
""
],
[
"Qi",
"Lu",
""
],
[
"Wang",
"Sen",
""
],
[
"Cheng",
"Feng",
""
],
[
"Zuo",
"Feilong",
""
],
[
"Zeng",
"Xuejiao",
""
],
[
"Yang",
"Ziyan",
""
],
[
"Kong",
"Fangyuan",
""
],
[
"Wei",
"Meng",
""
],
[
"Qing",
"Zhiwu",
""
],
[
"Xiao",
"Fei",
""
],
[
"Hoang",
"Tuyen",
""
],
[
"Zhang",
"Siyu",
""
],
[
"Zhu",
"Peihao",
""
],
[
"Zhao",
"Qi",
""
],
[
"Yan",
"Jiangqiao",
""
],
[
"Gui",
"Liangke",
""
],
[
"Bi",
"Sheng",
""
],
[
"Li",
"Jiashi",
""
],
[
"Ren",
"Yuxi",
""
],
[
"Wang",
"Rui",
""
],
[
"Li",
"Huixia",
""
],
[
"Xiao",
"Xuefeng",
""
],
[
"Liu",
"Shu",
""
],
[
"Ling",
"Feng",
""
],
[
"Zhang",
"Heng",
""
],
[
"Wei",
"Houmin",
""
],
[
"Kuang",
"Huafeng",
""
],
[
"Duncan",
"Jerry",
""
],
[
"Zhang",
"Junda",
""
],
[
"Zheng",
"Junru",
""
],
[
"Sun",
"Li",
""
],
[
"Zhang",
"Manlin",
""
],
[
"Sun",
"Renfei",
""
],
[
"Zhuang",
"Xiaobin",
""
],
[
"Li",
"Xiaojie",
""
],
[
"Xia",
"Xin",
""
],
[
"Chi",
"Xuyan",
""
],
[
"Peng",
"Yanghua",
""
],
[
"Wang",
"Yuping",
""
],
[
"Wang",
"Yuxuan",
""
],
[
"Zhao",
"Zhongkai",
""
],
[
"Chen",
"Zhuo",
""
],
[
"Song",
"Zuquan",
""
],
[
"Yang",
"Zhenheng",
""
],
[
"Feng",
"Jiashi",
""
],
[
"Yang",
"Jianchao",
""
],
[
"Jiang",
"Lu",
""
]
] |
2504.08883 | Xiaofei Yu | Xiaofei Yu, Evan J. Villafranca, Stella Wang, Jessica C. Jones, Mouzhe
Xie, Jonah Nagura, Ignacio Chi-Dur\'an, Nazar Delegan, Alex B. F. Martinson,
Michael E. Flatt\'e, Denis R. Candido, Giulia Galli, and Peter C. Maurer | Engineering Dark Spin-Free Diamond Interfaces | Main text: 7 pages, 5 figures | null | null | null | quant-ph cond-mat.mes-hall | http://creativecommons.org/licenses/by/4.0/ | Nitrogen-vacancy (NV) centers in diamond are extensively utilized as quantum
sensors for imaging fields at the nanoscale. The ultra-high sensitivity of NV
magnetometers has enabled the detection and spectroscopy of individual electron
spins, with potentially far-reaching applications in condensed matter physics,
spintronics, and molecular biology. However, the surfaces of these diamond
sensors naturally contain electron spins, which create a background signal that
can be hard to differentiate from the signal of the target spins. In this
study, we develop a surface modification approach that eliminates the unwanted
signal of these so-called dark electron spins. Our surface passivation
technique, based on coating diamond surfaces with a thin titanium oxide (TiO2)
layer, reduces the dark spin density. The observed reduction in dark spin
density aligns with our findings on the electronic structure of the
diamond-TiO2 interface. The reduction, from a typical value of
$2,000$~$\mu$m$^{-2}$ to a value below that set by the detection limit of our
NV sensors ($200$~$\mu$m$^{-2}$), results in a two-fold increase in spin echo
coherence time of near surface NV centers. Furthermore, we derive a
comprehensive spin model that connects dark spin depolarization with NV
coherence, providing additional insights into the mechanisms behind the
observed spin dynamics. Our findings are directly transferable to other quantum
platforms, including nanoscale solid state qubits and superconducting qubits.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2025 18:00:01 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 22:42:37 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Yu",
"Xiaofei",
""
],
[
"Villafranca",
"Evan J.",
""
],
[
"Wang",
"Stella",
""
],
[
"Jones",
"Jessica C.",
""
],
[
"Xie",
"Mouzhe",
""
],
[
"Nagura",
"Jonah",
""
],
[
"Chi-Durán",
"Ignacio",
""
],
[
"Delegan",
"Nazar",
""
],
[
"Martinson",
"Alex B. F.",
""
],
[
"Flatté",
"Michael E.",
""
],
[
"Candido",
"Denis R.",
""
],
[
"Galli",
"Giulia",
""
],
[
"Maurer",
"Peter C.",
""
]
] |
2504.08895 | Hao Chen | Hao Chen, Dan Mao, Andrea Kouta Dagnino, Glenn Wagner, Mark H.
Fischer, Juraj Hasik, Eun-Ah Kim, Titus Neupert | How quantum fluctuations freeze a classical liquid and then melt it into
a topological one | 14 pages, 10 figures | null | null | null | cond-mat.str-el | http://creativecommons.org/licenses/by/4.0/ | Topologically ordered quantum liquids are highly sought-after quantum phases
of matter, and recently, fractional Chern insulators (FCIs) joined the few
experimental realizations of such phases. Here, we ask whether a gapped
classical, highly degenerate liquid can be the birthplace of FCIs upon the
addition of suitable quantum fluctuations. Two competing tendencies can be
anticipated: (i) following the quantum order-by-disorder paradigm, quantum
fluctuations could induce symmetry-breaking (charge) order, or (ii) the
classical liquid builds up long-range entanglement and turns into a quantum
liquid. We study spinless fermions on a honeycomb lattice subject to
cluster-charging interactions and introduce quantumness through a Haldane
kinetic term, featuring complex second-nearest-neighbor hopping. Based on
extensive exact diagonalization calculations and high-order perturbation
theory, we find that neither scenario (i) nor (ii) prevails, but (i) and (ii)
manifest sequentially as the kinetic energy is increased. We demonstrate how
the gradual lifting of kinematic constraints gives rise to this sequence of
phases. Our results relate to the regime of intermediate-scale interactions
present in moir\'e systems, where band projections are not suitable to model
FCIs and competing charge-ordered phases have been identified.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2025 18:05:31 GMT"
},
{
"version": "v2",
"created": "Fri, 2 May 2025 20:25:07 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Chen",
"Hao",
""
],
[
"Mao",
"Dan",
""
],
[
"Dagnino",
"Andrea Kouta",
""
],
[
"Wagner",
"Glenn",
""
],
[
"Fischer",
"Mark H.",
""
],
[
"Hasik",
"Juraj",
""
],
[
"Kim",
"Eun-Ah",
""
],
[
"Neupert",
"Titus",
""
]
] |
2504.08982 | Kyle Stein | Kyle Stein, Andrew Arash Mahyari, Guillermo Francia III, Eman
El-Sheikh | Adaptive Additive Parameter Updates of Vision Transformers for Few-Shot
Continual Learning | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Integrating new class information without losing previously acquired
knowledge remains a central challenge in artificial intelligence, often
referred to as catastrophic forgetting. Few-shot class incremental learning
(FSCIL) addresses this by first training a model on a robust dataset of base
classes and then incrementally adapting it in successive sessions using only a
few labeled examples per novel class. However, this approach is prone to
overfitting on the limited new data, which can compromise overall performance
and exacerbate forgetting. In this work, we propose a simple yet effective
novel FSCIL framework that leverages a frozen Vision Transformer (ViT) backbone
augmented with parameter-efficient additive updates. Our approach freezes the
pre-trained ViT parameters and selectively injects trainable weights into the
self-attention modules via an additive update mechanism. This design updates
only a small subset of parameters to accommodate new classes without
sacrificing the representations learned during the base session. By fine-tuning
a limited number of parameters, our method preserves the generalizable features
in the frozen ViT while reducing the risk of overfitting. Furthermore, as most
parameters remain fixed, the model avoids overwriting previously learned
knowledge when small novel data batches are introduced. Extensive experiments
on benchmark datasets demonstrate that our approach yields state-of-the-art
performance compared to baseline FSCIL methods.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2025 21:17:30 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 03:41:21 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Stein",
"Kyle",
""
],
[
"Mahyari",
"Andrew Arash",
""
],
[
"Francia",
"Guillermo",
"III"
],
[
"El-Sheikh",
"Eman",
""
]
] |
2504.09029 | William Cook | William Cook | A Hierarchical Decomposition of Kullback-Leibler Divergence:
Disentangling Marginal Mismatches from Statistical Dependencies | 17 pages, 3 figures | null | null | null | cs.OH | http://creativecommons.org/licenses/by/4.0/ | The Kullback-Leibler (KL) divergence is a foundational measure for comparing
probability distributions. Yet in multivariate settings, its single value often
obscures the underlying reasons for divergence, conflating mismatches in
individual variable distributions (marginals) with effects arising from
statistical dependencies. We derive an algebraically exact, additive, and
hierarchical decomposition of the KL divergence between a joint distribution
P(X1,...,Xn) and a standard product reference distribution Q(X1,...,Xn) =
product_i q(Xi), where variables are assumed independent and identically
distributed according to a common reference q. The total divergence precisely
splits into two primary components: (1) the summed divergence of each marginal
distribution Pi(Xi) from the common reference q(Xi), quantifying marginal
deviations; and (2) the total correlation (or multi-information), capturing the
total statistical dependency among variables. Leveraging Mobius inversion on
the subset lattice, we further decompose this total correlation term into a
hierarchy of signed contributions from distinct pairwise, triplet, and
higher-order statistical interactions, expressed using standard Shannon
information quantities. This decomposition provides an algebraically complete
and interpretable breakdown of KL divergence using established information
measures, requiring no approximations or model assumptions. Numerical
validation using hypergeometric sampling confirms the decomposition's exactness
to machine precision across diverse system configurations.
| [
{
"version": "v1",
"created": "Sat, 12 Apr 2025 00:59:07 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Apr 2025 21:48:52 GMT"
},
{
"version": "v3",
"created": "Sat, 3 May 2025 15:22:25 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Cook",
"William",
""
]
] |
2504.09503 | Meng Yang | Meng Yang | $p$-Poincar\'e inequalities and cutoff Sobolev inequalities on metric
measure spaces | 49 pages, major revision. The capacity upper bound is replaced by the
cutoff Sobolev inequality, which is much stronger. The proof of this new
condition is added in Proposition 4.4 and Proposition 6.5. A new section
(Section 8) on potential theory is added to clarify the definition of this
new condition and to provide the necessary tools for its proof | null | null | null | math.FA math.AP math.MG | http://creativecommons.org/licenses/by/4.0/ | For $p\in(1,+\infty)$, we introduce the cutoff Sobolev inequality on general
metric measure spaces, and prove that there exists a metric measure space
endowed with a $p$-energy that satisfies the chain condition, the volume
regular condition with respect to a doubling scaling function $\Phi$, and that
both the Poincar\'e inequality and the the cutoff Sobolev inequality with
respect to a doubling scaling function $\Psi$ hold if and only if
$$\frac{1}{C}\left(\frac{R}{r}\right)^p\le\frac{\Psi(R)}{\Psi(r)}\le
C\left(\frac{R}{r}\right)^{p-1}\frac{\Phi(R)}{\Phi(r)}\text{ for any }r\le R.$$
In particular, given any pair of doubling functions $\Phi$ and $\Psi$
satisfying the above inequality, we construct a metric measure space endowed
with a $p$-energy on which all the above conditions are satisfied. As a direct
corollary, we prove that there exists a metric measure space which is
$d_h$-Ahlfors regular and has $p$-walk dimension $\beta_p$ if and only if
$$p\le\beta_p\le d_h+(p-1).$$ Our proof builds on the Laakso-type space theory,
which was recently developed by Murugan (arXiv:2410.15611).
| [
{
"version": "v1",
"created": "Sun, 13 Apr 2025 10:00:51 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 08:52:59 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Yang",
"Meng",
""
]
] |
2504.09913 | Jongmin Lee | Jonmin Lee, Ernest K. Ryu | Optimal Non-Asymptotic Rates of Value Iteration for Average-Reward
Markov Decision Processes | null | International Conference on Learning Representations, 2025 | null | null | math.OC | http://creativecommons.org/licenses/by/4.0/ | While there is an extensive body of research on the analysis of Value
Iteration (VI) for discounted cumulative-reward MDPs, prior work on analyzing
VI for (undiscounted) average-reward MDPs has been limited, and most prior
results focus on asymptotic rates in terms of Bellman error. In this work, we
conduct refined non-asymptotic analyses of average-reward MDPs, obtaining a
collection of convergence results that advance our understanding of the setup.
Among our new results, most notable are the $\mathcal{O}(1/k)$-rates of
Anchored Value Iteration on the Bellman error under the multichain setup and
the span-based complexity lower bound that matches the $\mathcal{O}(1/k)$ upper
bound up to a constant factor of $8$ in the weakly communicating and unichain
setups
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 06:22:14 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Lee",
"Jonmin",
""
],
[
"Ryu",
"Ernest K.",
""
]
] |
2504.09938 | Ois\'in Flynn-Connolly | Ois\'in Flynn-Connolly | On the divisibility of sums of Fibonacci numbers | 6 pages | null | null | null | math.NT math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that for infinitely many odd integers $n$, the sum of the first $n$
nonzero Fibonacci numbers is divisible by $n$. This resolves a conjecture of
Fatehizadeh and Yaqubi.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 07:00:48 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 14:10:47 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Flynn-Connolly",
"Oisín",
""
]
] |
2504.10019 | Aldo Conca | Winfried Bruns, Aldo Conca, Francesca Lembo | Sagbi bases, defining ideals and algebra of minors | References added, typos corrected and exposition improved | null | null | null | math.AC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper extends the article of the Bruns and Conca on SAGBI bases and
their computation (J. Symb. Comput. 120 (2024)) in two directions. (i) We
describe the extension of the Singular library sagbiNormaliz.sing to the
computation of defining ideals of subalgebras of polynomial rings. (ii) We give
a complete classification of the algebras of minors for which the generating
set is a SAGBI basis with respect to a suitable monomial order and we identify
universal SAGBI basis in three cases. The investigation is illustrated by
several examples.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 09:25:29 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 12:35:09 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Bruns",
"Winfried",
""
],
[
"Conca",
"Aldo",
""
],
[
"Lembo",
"Francesca",
""
]
] |
2504.10370 | Karl Schlechta | Karl Schlechta | Further Comments on Yablo's Construction | null | null | null | null | math.CO cs.LO | http://creativecommons.org/licenses/by/4.0/ | We continue our analysis of Yablo's coding of the liar paradox by infinite
acyclic graphs. The present notes are based on and continue the author's
previous results on the problem. In particular, our approach is often more
systematic than before.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 16:16:54 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 17:18:22 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Schlechta",
"Karl",
""
]
] |
2504.10637 | Afra Amini | Afra Amini, Tim Vieira, Ryan Cotterell | Better Estimation of the KL Divergence Between Language Models | null | null | null | null | cs.CL cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Estimating the Kullback--Leibler (KL) divergence between language models has
many applications, e.g., reinforcement learning from human feedback (RLHF),
interpretability, and knowledge distillation. However, computing the exact KL
divergence between two arbitrary language models is intractable. Thus,
practitioners often resort to the use of sampling-based estimators. While it is
easy to fashion a simple Monte Carlo (MC) estimator that provides an unbiased
estimate of the KL divergence between language models, this estimator
notoriously suffers from high variance, and can even result in a negative
estimate of the KL divergence, a non-negative quantity. In this paper, we
introduce a Rao--Blackwellized estimator that is also unbiased and provably has
variance less than or equal to that of the standard Monte Carlo estimator. In
an empirical study on sentiment-controlled fine-tuning, we show that our
estimator provides more stable KL estimates and reduces variance substantially
in practice. Additionally, we derive an analogous Rao--Blackwellized estimator
of the gradient of the KL divergence, which leads to more stable training and
produces models that more frequently appear on the Pareto frontier of reward
vs. KL compared to the ones trained with the MC estimator of the gradient.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 18:40:02 GMT"
},
{
"version": "v2",
"created": "Fri, 2 May 2025 23:58:03 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Amini",
"Afra",
""
],
[
"Vieira",
"Tim",
""
],
[
"Cotterell",
"Ryan",
""
]
] |
2504.10667 | William Cook | William Cook | Beyond Coordinates: Meta-Equivariance in Statistical Inference | 21 pages. Includes numerical simulations and visualisations.
Developed independently using a live co-discovery process combining human
intuition and computational validation. The principle of meta-equivariance
generalises convex invariance under affine reparameterisation, with
implications for statistical decision theory and information geometry | null | null | null | cs.OH | http://creativecommons.org/licenses/by/4.0/ | Optimal statistical decisions should transcend the language used to describe
them. Yet, how do we guarantee that the choice of coordinates - the
parameterisation of an optimisation problem - does not subtly dictate the
solution? This paper reveals a fundamental geometric invariance principle. We
first analyse the optimal combination of two asymptotically normal estimators
under a strictly convex trace-AMSE risk. While methods for finding optimal
weights are known, we prove that the resulting optimal estimator is invariant
under direct affine reparameterisations of the weighting scheme. This
exemplifies a broader principle we term meta-equivariance: the unique minimiser
of any strictly convex, differentiable scalar objective over a matrix space
transforms covariantly under any invertible affine reparameterisation of that
space. Distinct from classical statistical equivariance tied to data
symmetries, meta-equivariance arises from the immutable geometry of convex
optimisation itself. It guarantees that optimality, in these settings, is not
an artefact of representation but an intrinsic, coordinate-free truth.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 19:40:39 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 15:25:11 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Cook",
"William",
""
]
] |
2504.10678 | Ettore Vicari | Andrea Pelissetto, Davide Rossini, Ettore Vicari | Out-of-equilibrium dynamics across the first-order quantum transitions
of one-dimensional quantum Ising models | 22 pages, 16 figs, some data added | null | null | null | cond-mat.stat-mech quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the out-of-equilibrium dynamics of one-dimensional quantum Ising
models in a transverse field $g$, driven by a time-dependent longitudinal field
$h$ across their {\em magnetic} first-order quantum transition at $h=0$, for
sufficiently small values of $|g|$. We consider nearest-neighbor Ising chains
of size $L$ with periodic boundary conditions. We focus on the
out-of-equilibrium behavior arising from Kibble-Zurek protocols, in which $h$
is varied linearly in time with time scale $t_s$, i.e., $h(t)=t/t_s$. The
system starts from the ground state at $h_i\equiv h(t_i)<0$, where the
longitudinal magnetization $M$ is negative. Then it evolves unitarily up to
positive values of $h(t)$, where $M(t)$ becomes eventually positive. We
identify several scaling regimes characterized by a nontrivial interplay
between the size $L$ and the time scale $t_s$, which can be observed when the
system is close to one of the many avoided level crossings that occur for $h\ge
0$. In the $L\to\infty$ limit, all these crossings approach $h=0^+$, making the
study of the thermodynamic limit, defined as the limit $L\to\infty$ keeping $t$
and $t_s$ constant, problematic. We study such limit numerically, by first
determining the large-$L$ quantum evolution at fixed $t_s$, and then analyzing
its behavior with increasing $t_s$. Our analysis shows that the system switches
from the initial state with $M<0$ to a positively magnetized state at $h =
h_*(t_s)>0$, where $h_*(t_s)$ decreases with increasing $t_s$, apparently as
$h_*\sim 1/\ln t_s$. This suggests the existence of a scaling behavior in terms
of the rescaled time $\Omega = t \ln t_s/t_s$. The numerical results also show
that the system converges to a nontrivial stationary state in the large-$t$
limit, characterized by an energy significantly larger than that of the
corresponding homogeneously magnetized ground state.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 20:00:27 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 15:14:08 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Pelissetto",
"Andrea",
""
],
[
"Rossini",
"Davide",
""
],
[
"Vicari",
"Ettore",
""
]
] |
2504.10749 | Bill Truong | Bill P. Truong, Kartiek Agarwal, and T. Pereg-Barnea | Shuttling Majorana zero modes in disordered and noisy topological
superconductors | 18 pages, 9 figures; v2: small changes to abstract, updated
acknowledgements | null | null | null | cond-mat.mes-hall | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The braiding of Majorana zero modes (MZMs) forms the fundamental building
block for topological quantum computation. Braiding protocols which involve the
physical exchange of MZMs are typically envisioned on a network of topological
superconducting wires. An essential component of these protocols is the
transport of MZMs, which can be performed by using electric gates to locally
tune sections ("piano keys") of the wire between topologically trivial and
non-trivial phases. In this work, we numerically simulate this piano key
transport on a superconducting wire which contains either disorder
(uncorrelated and correlated) or noise. We focus on the impact of these
additional effects on the diabatic error, which describes unwanted transitions
between the ground state and excited states. We show that the behavior of the
average diabatic error is predominantly controlled by the statistics of the
minimum bulk energy gap which is suppressed in the presence of disorder. The
increase in diabatic error can be several orders of magnitude and is most
deleterious when the disorder correlation length is a finite fraction of the
piano key size and negligible when these lengths are far apart. In the presence
of noise, the diabatic error is significantly enhanced due to optical
transitions which depend on the minimum bulk energy gap as well as the
frequency modes present in the noise. The results presented here serve to
further characterize the diabatic error in disordered and noisy settings, which
are important considerations in practical implementations of physical braiding
schemes.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 22:41:36 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 12:06:06 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Truong",
"Bill P.",
""
],
[
"Agarwal",
"Kartiek",
""
],
[
"Pereg-Barnea",
"T.",
""
]
] |
2504.11540 | Andreas Zimmerer | Andreas Zimmerer, Damien Dam, Jan Kossmann, Juliane Waack, Ismail
Oukid and Andreas Kipf | Pruning in Snowflake: Working Smarter, Not Harder | 12 pages, 13 figures, to be published in SIGMOD 2025 | null | null | null | cs.DB | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Modern cloud-based data analytics systems must efficiently process petabytes
of data residing on cloud storage. A key optimization technique in
state-of-the-art systems like Snowflake is partition pruning - skipping chunks
of data that do not contain relevant information for computing query results.
While partition pruning based on query predicates is a well-established
technique, we present new pruning techniques that extend the scope of partition
pruning to LIMIT, top-k, and JOIN operations, significantly expanding the
opportunities for pruning across diverse query types. We detail the
implementation of each method and examine their impact on real-world workloads.
Our analysis of Snowflake's production workloads reveals that real-world
analytical queries exhibit much higher selectivity than commonly assumed,
yielding effective partition pruning and highlighting the need for more
realistic benchmarks. We show that we can harness high selectivity by utilizing
min/max metadata available in modern data analytics systems and data lake
formats like Apache Iceberg, reducing the number of processed micro-partitions
by 99.4% across the Snowflake data platform.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 18:14:40 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Zimmerer",
"Andreas",
""
],
[
"Dam",
"Damien",
""
],
[
"Kossmann",
"Jan",
""
],
[
"Waack",
"Juliane",
""
],
[
"Oukid",
"Ismail",
""
],
[
"Kipf",
"Andreas",
""
]
] |
2504.11591 | Michal Knapek | Tom\'a\v{s} Tayari, Michal Knapek, Eli\v{s}ka Ja\v{c}a, Peter
Min\'arik, Josef Pe\v{s}i\v{c}ka | On the microplasticity and dynamic strain aging in an FeAlCrMo
complex-concentrated alloy | Accepted manuscript (Elsevier, Materials Science and Engineering: A);
contains 13 pages, 4 figures | null | 10.1016/j.msea.2025.148437 | null | cond-mat.mtrl-sci | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We show by acoustic emission analysis that FeAlCrMo complex-concentrated
alloy (CCA) exhibits signatures of self-organization of deformation processes
during both microplasticity and serrated flow (dynamic strain aging). Due to
complex microstructures of CCAs and scarcity of literature data, these novel
alloys are a prominent subject of future research efforts.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 20:09:28 GMT"
},
{
"version": "v2",
"created": "Fri, 2 May 2025 20:30:41 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Tayari",
"Tomáš",
""
],
[
"Knapek",
"Michal",
""
],
[
"Jača",
"Eliška",
""
],
[
"Minárik",
"Peter",
""
],
[
"Pešička",
"Josef",
""
]
] |
2504.11764 | SunHyun Youn | Sun-Hyun Youn | Thermal Noise as a Window into the Quantum Vacuum: Spatial Patterns
Revealed by Simple Experiments | 18pages, 6 figures | null | null | null | quant-ph | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We show that the spatial structure of electromagnetic vacuum fluctuations,
predicted by quantum electrodynamics, can be indirectly observed using thermal
noise at radio frequencies. Using simple lab equipment like coaxial cables and
RF splitters, we detect a clear suppression of thermal noise near conducting
boundaries, mirroring the expected modulation of vacuum modes. This provides
accessible, experimental evidence for quantum vacuum behavior without requiring
advanced optics or cryogenics.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:59:14 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 02:43:17 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Youn",
"Sun-Hyun",
""
]
] |
2504.11936 | Xia Deng | Xia Deng, Shen Chen, Jiale Zhou, Lei Li | Mind2Matter: Creating 3D Models from EEG Signals | null | null | null | null | cs.GR cs.HC eess.SP | http://creativecommons.org/licenses/by/4.0/ | The reconstruction of 3D objects from brain signals has gained significant
attention in brain-computer interface (BCI) research. Current research
predominantly utilizes functional magnetic resonance imaging (fMRI) for 3D
reconstruction tasks due to its excellent spatial resolution. Nevertheless, the
clinical utility of fMRI is limited by its prohibitive costs and inability to
support real-time operations. In comparison, electroencephalography (EEG)
presents distinct advantages as an affordable, non-invasive, and mobile
solution for real-time brain-computer interaction systems. While recent
advances in deep learning have enabled remarkable progress in image generation
from neural data, decoding EEG signals into structured 3D representations
remains largely unexplored. In this paper, we propose a novel framework that
translates EEG recordings into 3D object reconstructions by leveraging neural
decoding techniques and generative models. Our approach involves training an
EEG encoder to extract spatiotemporal visual features, fine-tuning a large
language model to interpret these features into descriptive multimodal outputs,
and leveraging generative 3D Gaussians with layout-guided control to synthesize
the final 3D structures. Experiments demonstrate that our model captures
salient geometric and semantic features, paving the way for applications in
brain-computer interfaces (BCIs), virtual reality, and neuroprosthetics. Our
code is available in https://github.com/sddwwww/Mind2Matter.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:16:03 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Apr 2025 12:17:59 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 13:22:05 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Deng",
"Xia",
""
],
[
"Chen",
"Shen",
""
],
[
"Zhou",
"Jiale",
""
],
[
"Li",
"Lei",
""
]
] |
2504.12279 | Mikhail Osipov | Mikhail Osipov | Dysarthria Normalization via Local Lie Group Transformations for Robust
ASR | Preprint. 15 pages, 6 figures, 6 tables, 11 appendices. Code and data
available upon request | null | null | null | cs.SD cs.CL cs.LG eess.AS | http://creativecommons.org/licenses/by-nc-sa/4.0/ | We present a geometry-driven method for normalizing dysarthric speech by
modeling time, frequency, and amplitude distortions as smooth, local Lie group
transformations of spectrograms. Scalar fields generate these deformations via
exponential maps, and a neural network is trained - using only synthetically
warped healthy speech - to infer the fields and apply an approximate inverse at
test time. We introduce a spontaneous-symmetry-breaking (SSB) potential that
encourages the model to discover non-trivial field configurations. On real
pathological speech, the system delivers consistent gains: up to 17
percentage-point WER reduction on challenging TORGO utterances and a 16 percent
drop in WER variance, with no degradation on clean CommonVoice data. Character
and phoneme error rates improve in parallel, confirming linguistic relevance.
Our results demonstrate that geometrically structured warping provides
consistent, zero-shot robustness gains for dysarthric ASR.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 17:41:19 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 11:11:30 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Osipov",
"Mikhail",
""
]
] |
2504.12551 | Saulo Queiroz | Saulo Queiroz, Jo\~ao P. Vilela, Benjamin Koon Kei Ng, Chan-Tong Lam,
Edmundo Monteiro | Fast Computation of the Discrete Fourier Transform Rectangular Index
Coefficients | This work has been submitted to the IEEE for possible publication | null | null | null | eess.SP cs.CC cs.DS | http://creativecommons.org/licenses/by/4.0/ | In~\cite{sic-magazine-2025}, the authors show that the square index
coefficients (SICs) of the $N$-point discrete Fourier transform (DFT) -- that
is, the coefficients $X_{k\sqrt{N}}$ for $k = 0, 1, \ldots, \sqrt{N} - 1$ --
can be losslessly compressed from $N$ to $\sqrt{N}$ points, thereby
accelerating the computation of these specific DFT coefficients accordingly.
Following up on that, in this article we generalize SICs into what we refer to
as rectangular index coefficients (RICs) of the DFT, formalized as $X_{kL},
k=0,1,\cdots,C-1$, in which the integers $C$ and $L$ are generic roots of $N$
such that $N=LC$. We present an algorithm to compress the $N$-point input
signal $\mathbf{x}$ into a $C$-point signal $\mathbf{\hat{x}}$ at the expense
of $\mathcal{O}(N)$ complex sums and no complex multiplication. We show that a
DFT on $\mathbf{\hat{x}}$ is equivalent to a DFT on the RICs of $\mathbf{x}$.
In cases where specific frequencies of $\mathbf{x}$ are of interest -- as in
harmonic analysis -- one can conveniently adjust the signal parameters (e.g.,
frequency resolution) to align the RICs with those frequencies, and use the
proposed algorithm to compute them significantly faster. If $N$ is a power of
two -- as required by the fast Fourier transform (FFT) algorithm -- then $C$
can be any power of two in the range $[2, N/2]$ and one can use our algorithm
along with FFT to compute all RICs in $\mathcal{O}(C\log C)$ time complexity.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 00:44:22 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 14:11:17 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Queiroz",
"Saulo",
""
],
[
"Vilela",
"João P.",
""
],
[
"Ng",
"Benjamin Koon Kei",
""
],
[
"Lam",
"Chan-Tong",
""
],
[
"Monteiro",
"Edmundo",
""
]
] |
2504.12727 | Yao Cheng | Yao Cheng, Jingsheng Yu, Ling Zheng | Efficient Major Transition Exchange under Distributional and Dual
Priority-respecting Constraints | null | null | null | null | econ.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many real matching markets encounter distributional and fairness constraints.
Motivated by the Chinese Major Transition Program (CMT), this paper studies the
design of exchange mechanisms within a fresh framework of both distributional
and dual priority-respecting constraints. Specifically, each student has an
initial assigned major and applies to transfer to a more desirable one. A
student can successfully transfer majors only if they obtain eligibility from
both their initial major and the applied major. Each major has a dual priority:
a strict priority over current students who wish to transfer out and a strict
priority over students from other majors who wish to transfer in. Additionally,
each major faces a ceiling constraint and a floor constraint to regulate
student distribution. We show that the existing mechanisms of CMT result in
avoidable inefficiencies, and propose two mechanisms that can match students to
majors in an efficient way as well as respecting each major's distributional
and dual priority. The efficient mechanisms are based on a proposed solution
concept: eligibility maximization (EM), and two processes for identifying
improvement cycles--specifically, transfer-in exchangeable cycles and
transfer-out exchangeable cycles.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 08:09:05 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 13:08:49 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Cheng",
"Yao",
""
],
[
"Yu",
"Jingsheng",
""
],
[
"Zheng",
"Ling",
""
]
] |
2504.13034 | Yangxin Fan | Yangxin Fan, Haolai Che, Yinghui Wu | Inference-friendly Graph Compression for Graph Neural Networks | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Graph Neural Networks (GNNs) have demonstrated promising performance in graph
analysis. Nevertheless, the inference process of GNNs remains costly, hindering
their applications for large graphs. This paper proposes inference-friendly
graph compression (IFGC), a graph compression scheme to accelerate GNNs
inference. Given a graph $G$ and a GNN $M$, an IFGC computes a small compressed
graph $G_c$, to best preserve the inference results of $M$ over $G$, such that
the result can be directly inferred by accessing $G_c$ with no or little
decompression cost. (1) We characterize IFGC with a class of inference
equivalence relation. The relation captures the node pairs in $G$ that are not
distinguishable for GNN inference. (2) We introduce three practical
specifications of IFGC for representative GNNs: structural preserving
compression (SPGC), which computes $G_c$ that can be directly processed by GNN
inference without decompression; ($\alpha$, $r$)-compression, that allows for a
configurable trade-off between compression ratio and inference quality, and
anchored compression that preserves inference results for specific nodes of
interest. For each scheme, we introduce compression and inference algorithms
with guarantees of efficiency and quality of the inferred results. We conduct
extensive experiments on diverse sets of large-scale graphs, which verifies the
effectiveness and efficiency of our graph compression approaches.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 15:42:13 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 00:06:16 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Fan",
"Yangxin",
""
],
[
"Che",
"Haolai",
""
],
[
"Wu",
"Yinghui",
""
]
] |
2504.13158 | Stewart Ethier | Stewart N. Ethier | Testing for dice control at craps | 33 pages, 3 figures. An error in v1 is corrected in v2 | null | null | null | stat.ME | http://creativecommons.org/licenses/by/4.0/ | Dice control involves "setting" the dice and then throwing them carefully, in
the hope of influencing the outcomes and gaining an advantage at craps. How
does one test for this ability? To specify the alternative hypothesis, we need
a statistical model of dice control. Two have been suggested in the gambling
literature, namely the Smith-Scott model and the Wong-Shackleford model. Both
models are parameterized by $\theta\in[0,1]$, which measures the shooter's
level of control. We propose and compare four test statistics: (a) the sample
proportion of 7s; (b) the sample proportion of pass-line wins; (c) the sample
mean of hand-length observations; and (d) the likelihood ratio statistic for a
hand-length sample. We want to test $H_0:\theta = 0$ (no control) versus
$H_1:\theta > 0$ (some control). We also want to test $H_0:\theta\le\theta_0$
versus $H_1:\theta>\theta_0$, where $\theta_0$ is the "break-even point." For
the tests considered we estimate the power, either by normal approximation or
by simulation.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 17:57:32 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 21:22:09 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Ethier",
"Stewart N.",
""
]
] |
2504.13423 | William Cook | William Cook | Mixed Fractional Information: Consistency of Dissipation Measures for
Stable Laws | 20 pages, 1 figure | null | null | null | cs.OH | http://creativecommons.org/licenses/by/4.0/ | Symmetric alpha-stable (S alpha S) distributions with alpha<2 lack finite
classical Fisher information. Building on Johnson's framework, we define Mixed
Fractional Information (MFI) via the initial rate of relative entropy
dissipation during interpolation between S alpha S laws with differing scales,
v and s. We demonstrate two equivalent formulations for MFI in this specific S
alpha S-to-S alpha S setting. The first involves the derivative D'(v) of the
relative entropy between the two S alpha S densities. The second uses an
integral expectation E_gv[u(x,0) (pF_v(x) - pF_s(x))] involving the difference
between Fisher scores (pF_v, pF_s) and a specific MMSE-related score function
u(x,0) derived from the interpolation dynamics. Our central contribution is a
rigorous proof of the consistency identity: D'(v) = (1/(alpha v)) E_gv[X
(pF_v(X) - pF_s(X))]. This identity mathematically validates the equivalence of
the two MFI formulations for S alpha S inputs, establishing MFI's internal
coherence and directly linking entropy dissipation rates to score function
differences. We further establish MFI's non-negativity (zero if and only if
v=s), derive its closed-form expression for the Cauchy case (alpha=1), and
numerically validate the consistency identity. MFI provides a finite, coherent,
and computable information-theoretic measure for comparing S alpha S
distributions where classical Fisher information fails, connecting entropy
dynamics to score functions and estimation concepts. This work lays a
foundation for exploring potential fractional I-MMSE relations and new
functional inequalities tailored to heavy-tailed systems.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 02:49:24 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 15:31:12 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Cook",
"William",
""
]
] |
2504.13612 | Dejan Stancevic | Dejan Stancevic, Luca Ambrogioni | Entropic Time Schedulers for Generative Diffusion Models | 17 pages | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The practical performance of generative diffusion models depends on the
appropriate choice of the noise scheduling function, which can also be
equivalently expressed as a time reparameterization. In this paper, we present
a time scheduler that selects sampling points based on entropy rather than
uniform time spacing, ensuring that each point contributes an equal amount of
information to the final generation. We prove that this time reparameterization
does not depend on the initial choice of time. Furthermore, we provide a
tractable exact formula to estimate this \emph{entropic time} for a trained
model using the training loss without substantial overhead. Alongside the
entropic time, inspired by the optimality results, we introduce a rescaled
entropic time. In our experiments with mixtures of Gaussian distributions and
ImageNet, we show that using the (rescaled) entropic times greatly improves the
inference performance of trained models. In particular, we found that the image
quality in pretrained EDM2 models, as evaluated by FID and FD-DINO scores, can
be substantially increased by the rescaled entropic time reparameterization
without increasing the number of function evaluations, with greater
improvements in the few NFEs regime.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 10:35:19 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 11:04:09 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Stancevic",
"Dejan",
""
],
[
"Ambrogioni",
"Luca",
""
]
] |
2504.13807 | Zhengtong Xu | Zhengtong Xu, Zichen Miao, Qiang Qiu, Zhe Zhang, Yu She | DiffOG: Differentiable Policy Trajectory Optimization with
Generalizability | null | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Imitation learning-based visuomotor policies excel at manipulation tasks but
often produce suboptimal action trajectories compared to model-based methods.
Directly mapping camera data to actions via neural networks can result in jerky
motions and difficulties in meeting critical constraints, compromising safety
and robustness in real-world deployment. For tasks that require high robustness
or strict adherence to constraints, ensuring trajectory quality is crucial.
However, the lack of interpretability in neural networks makes it challenging
to generate constraint-compliant actions in a controlled manner. This paper
introduces differentiable policy trajectory optimization with generalizability
(DiffOG), a learning-based trajectory optimization framework designed to
enhance visuomotor policies. By leveraging the proposed differentiable
formulation of trajectory optimization with transformer, DiffOG seamlessly
integrates policies with a generalizable optimization layer. Visuomotor
policies enhanced by DiffOG generate smoother, constraint-compliant action
trajectories in a more interpretable way. DiffOG exhibits strong generalization
capabilities and high flexibility. We evaluated DiffOG across 11 simulated
tasks and 2 real-world tasks. The results demonstrate that DiffOG significantly
enhances the trajectory quality of visuomotor policies while having minimal
impact on policy performance, outperforming trajectory processing baselines
such as greedy constraint clipping and penalty-based trajectory optimization.
Furthermore, DiffOG achieves superior performance compared to existing
constrained visuomotor policy.
| [
{
"version": "v1",
"created": "Fri, 18 Apr 2025 17:20:27 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 03:17:11 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Xu",
"Zhengtong",
""
],
[
"Miao",
"Zichen",
""
],
[
"Qiu",
"Qiang",
""
],
[
"Zhang",
"Zhe",
""
],
[
"She",
"Yu",
""
]
] |
2504.13902 | Fahad Alrasheedi | Fahad S. Alrasheedi and Hesham H. Ali | A Graph Theoretic Approach for Exploring the Relationship between EV
Adoption and Charging Infrastructure Growth | 13 pages | null | null | null | physics.soc-ph cs.SI | http://creativecommons.org/publicdomain/zero/1.0/ | The increasing global demand for conventional energy has led to significant
challenges, particularly due to rising CO2 emissions and the depletion of
natural resources. In the U.S., light-duty vehicles contribute significantly to
transportation sector emissions, prompting a global shift toward electrified
vehicles (EVs). Among the challenges that thwart the widespread adoption of EVs
is the insufficient charging infrastructure (CI). This study focuses on
exploring the complex relationship between EV adoption and CI growth. Employing
a graph theoretic approach, we propose a graph model to analyze correlations
between EV adoption and CI growth across 137 counties in six states. We examine
how different time granularities impact these correlations in two distinct
scenarios: Early Adoption and Late Adoption. Further, we conduct causality
tests to assess the directional relationship between EV adoption and CI growth
in both scenarios. Our main findings reveal that analysis using lower levels of
time granularity result in more homogeneous clusters, with notable differences
between clusters in EV adoption and those in CI growth. Additionally, we
identify causal relationships between EV adoption and CI growth in 137
counties, and show that causality is observed more frequently in Early Adoption
scenarios than in Late Adoption ones. However, the causal effects in Early
Adoption are slower than those in Late Adoption.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2025 07:43:59 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 00:59:34 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Alrasheedi",
"Fahad S.",
""
],
[
"Ali",
"Hesham H.",
""
]
] |
2504.13930 | Matteo Gorgone | M. Gorgone, G. Inferrera, C.F. Munafo' | Operatorial formulation of crimo-taxis phenomena in a street | 26 pages, 27 figures | null | null | null | physics.soc-ph quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, the ladder operators and a quantum-like approach are used to
construct an operatorial version of a model dubbed crimo-taxis. In a classical
framework, the crimo-taxis model is represented by reaction-diffusion partial
differential equations describing a population divided into three interacting
subgroups (ordinary citizens, drug users/dealers, and law enforcement
personnel). In this new framework, the agents of the subgroups are modeled
using annihilation, creation, and number fermionic operators, and their time
evolution is assumed to be ruled by a Hermitian time-independent Hamiltonian
operator suitable to capture the interactions among the subgroups. Furthermore,
a recent extension of the standard Heisenberg view, namely
$(\mathcal{H},\rho)$--induced dynamics, is also taken into account. Two
scenarios, characterized by different initial spatial distributions of the
subgroups, are considered. The results of some numerical simulations in a
one--dimensional setting are presented and discussed.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 17:03:13 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 20:45:09 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Gorgone",
"M.",
""
],
[
"Inferrera",
"G.",
""
],
[
"Munafo'",
"C. F.",
""
]
] |
2504.14116 | Maxim Olshanskii | Maxim A. Olshanskii and Arnold Reusken | Analysis of a finite element method for PDEs in evolving domains with
topological changes | null | null | null | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents the first rigorous error analysis of an unfitted finite
element method for a linear parabolic problem posed on an evolving domain
$\Omega(t)$ that may undergo a topological change, such as, for example, a
domain splitting. The domain evolution is assumed to be $C^2$-smooth away from
a critical time $t_c$, at which the topology may change instantaneously. To
accommodate such topological transitions in the error analysis, we introduce
several structural assumptions on the evolution of $\Omega(t)$ in the vicinity
of the critical time. These assumptions allow a specific stability estimate
even across singularities. Based on this stability result we derive
optimal-order discretization error bounds, provided the continuous solution is
sufficiently smooth. We demonstrate the applicability of our assumptions with
examples of level-set domains undergoing topological transitions and discuss
cases where the analysis fails. The theoretical error estimate is confirmed by
the results of a numerical experiment.
| [
{
"version": "v1",
"created": "Sat, 19 Apr 2025 00:23:09 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 02:14:03 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Olshanskii",
"Maxim A.",
""
],
[
"Reusken",
"Arnold",
""
]
] |
2504.14284 | Satoshi Fujii | Satoshi Fujii | On automorphisms of some semidirect product groups and ranks of Iwasawa
modules | null | null | null | null | math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $p$ be an odd prime number and $k$ an imaginary quadratic field in which
$p$ does not split. Based on their heuristic, Kundu and Washington posed a
question which asks whether $\lambda$- and $\mu$-invariant of the
anti-cyclotomic ${\Bbb Z}_p$-extension $k_{\infty}^a$ of $k$ are always
trivial. Also, if $k_{\infty}^a/k$ is totally ramified, for $n\geq 1$, they
showed that the $p$-part of the ideal class group of the $n$th layer of the
anti-cyclotomic ${\Bbb Z}_p$-extension of $k$ is not cyclic. In this article,
inspired by their paper, we study anti-cyclotomic like ${\Bbb Z}_p$-extensions,
extending both the above question and Kundu-Washington's result. We show that
the values of $\lambda$ of certain anti-cyclotomic like ${\Bbb Z}_p$-extensions
are always even. We also show the $p$-part of the ideal class groups of certain
anti-cyclotomic like ${\Bbb Z}_p$-extensions of CM-fields are always not
cyclic.
| [
{
"version": "v1",
"created": "Sat, 19 Apr 2025 13:00:34 GMT"
},
{
"version": "v2",
"created": "Thu, 1 May 2025 09:21:38 GMT"
},
{
"version": "v3",
"created": "Sun, 4 May 2025 05:50:00 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Fujii",
"Satoshi",
""
]
] |
2504.14480 | Margarida Ferreira | Margarida Ferreira, Victor Nicolet, Joey Dodds, Daniel Kroening | Program Synthesis From Partial Traces | To appear at PLDI 2025 (46th ACM SIGPLAN Conference on Programming
Language Design and Implementation) | null | 10.1145/3729316 | null | cs.PL | http://creativecommons.org/licenses/by-sa/4.0/ | We present the first technique to synthesize programs that compose
side-effecting functions, pure functions, and control flow, from partial traces
containing records of only the side-effecting functions. This technique can be
applied to synthesize API composing scripts from logs of calls made to those
APIs, or a script from traces of system calls made by a workload, for example.
All of the provided traces are positive examples, meaning that they describe
desired behavior. Our approach does not require negative examples. Instead, it
generalizes over the examples and uses cost metrics to prevent
over-generalization. Because the problem is too complex for traditional
monolithic program synthesis techniques, we propose a new combination of
optimizing rewrites and syntax-guided program synthesis. The resulting program
is correct by construction, so its output will always be able to reproduce the
input traces. We evaluate the quality of the programs synthesized when
considering various optimization metrics and the synthesizer's efficiency on
real-world benchmarks. The results show that our approach can generate useful
real-world programs.
| [
{
"version": "v1",
"created": "Sun, 20 Apr 2025 04:09:09 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 13:58:54 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Ferreira",
"Margarida",
""
],
[
"Nicolet",
"Victor",
""
],
[
"Dodds",
"Joey",
""
],
[
"Kroening",
"Daniel",
""
]
] |
2504.14693 | Enxin Song | Enxin Song, Wenhao Chai, Weili Xu, Jianwen Xie, Yuxuan Liu, and Gaoang
Wang | Video-MMLU: A Massive Multi-Discipline Lecture Understanding Benchmark | Code, docs, and benchmark are all avaliable at
https://enxinsong.com/Video-MMLU-web/ | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent advancements in language multimodal models (LMMs) for video have
demonstrated their potential for understanding video content, yet the task of
comprehending multi-discipline lectures remains largely unexplored. We
introduce Video-MMLU, a massive benchmark designed to evaluate the capabilities
of LMMs in understanding Multi-Discipline Lectures. We evaluate over 90
open-source and proprietary models, ranging from 0.5B to 40B parameters. Our
results highlight the limitations of current models in addressing the cognitive
challenges presented by these lectures, especially in tasks requiring both
perception and reasoning. Additionally, we explore how the number of visual
tokens and the large language models influence performance, offering insights
into the interplay between multimodal perception and reasoning in lecture
comprehension.
| [
{
"version": "v1",
"created": "Sun, 20 Apr 2025 17:58:46 GMT"
},
{
"version": "v2",
"created": "Fri, 2 May 2025 22:30:26 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Song",
"Enxin",
""
],
[
"Chai",
"Wenhao",
""
],
[
"Xu",
"Weili",
""
],
[
"Xie",
"Jianwen",
""
],
[
"Liu",
"Yuxuan",
""
],
[
"Wang",
"Gaoang",
""
]
] |
2504.14766 | Saniya Karwa | Saniya Karwa and Navpreet Singh | Disentangling Linguistic Features with Dimension-Wise Analysis of Vector
Embeddings | null | https://aclanthology.org/2025.trustnlp-main.30/ | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Understanding the inner workings of neural embeddings, particularly in models
such as BERT, remains a challenge because of their high-dimensional and opaque
nature. This paper proposes a framework for uncovering the specific dimensions
of vector embeddings that encode distinct linguistic properties (LPs). We
introduce the Linguistically Distinct Sentence Pairs (LDSP-10) dataset, which
isolates ten key linguistic features such as synonymy, negation, tense, and
quantity. Using this dataset, we analyze BERT embeddings with various methods,
including the Wilcoxon signed-rank test, mutual information, and recursive
feature elimination, to identify the most influential dimensions for each LP.
We introduce a new metric, the Embedding Dimension Impact (EDI) score, which
quantifies the relevance of each embedding dimension to a LP. Our findings show
that certain properties, such as negation and polarity, are robustly encoded in
specific dimensions, while others, like synonymy, exhibit more complex
patterns. This study provides insights into the interpretability of embeddings,
which can guide the development of more transparent and optimized language
models, with implications for model bias mitigation and the responsible
deployment of AI systems.
| [
{
"version": "v1",
"created": "Sun, 20 Apr 2025 23:38:16 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Karwa",
"Saniya",
""
],
[
"Singh",
"Navpreet",
""
]
] |
2504.15210 | Marina Sakharova | Marina Sakharova and Abhinav Anand and Mira Mezini | Integrating Symbolic Execution into the Fine-Tuning of Code-Generating
LLMs | null | null | null | null | cs.SE cs.AI | http://creativecommons.org/licenses/by/4.0/ | Code-generating Large Language Models (LLMs) have become essential tools in
modern software development, enhancing productivity and accelerating
development. This paper aims to investigate the fine-tuning of code-generating
LLMs using Reinforcement Learning and Direct Preference Optimization, further
improving their performance. To achieve this, we enhance the training data for
the reward model with the help of symbolic execution techniques, ensuring more
comprehensive and objective data. With symbolic execution, we create a custom
dataset that better captures the nuances in code evaluation. Our reward models,
fine-tuned on this dataset, demonstrate significant improvements over the
baseline, CodeRL, in estimating the quality of generated code. Our
code-generating LLMs, trained with the help of reward model feedback, achieve
similar results compared to the CodeRL benchmark.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2025 16:29:07 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 06:56:16 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Sakharova",
"Marina",
""
],
[
"Anand",
"Abhinav",
""
],
[
"Mezini",
"Mira",
""
]
] |
2504.15268 | J.D. Opdyke | JD Opdyke | Beating the Correlation Breakdown: Robust Inference, Flexible Scenarios,
and Stress Testing for Financial Portfolios | null | null | null | null | q-fin.RM q-fin.PM q-fin.ST stat.AP | http://creativecommons.org/licenses/by/4.0/ | We live in a multivariate world, and effective modeling of financial
portfolios, including their construction, allocation, forecasting, and risk
analysis, simply is not possible without explicitly modeling the dependence
structure of their assets. Dependence structure can drive portfolio results
more than the combined effects of other parameters in investment and risk
models, but the literature provides relatively little to define the
finite-sample distributions of dependence measures in useable and useful ways
under challenging, real-world financial data conditions. Yet this is exactly
what is needed to make valid inferences about their estimates, and to use these
inferences for essential purposes such as hypothesis testing, dynamic
monitoring, realistic and granular scenario and reverse scenario analyses, and
mitigating the effects of correlation breakdowns during market upheavals. This
work develops a new and straightforward method, Nonparametric Angles-based
Correlation (NAbC), for defining the finite-sample distributions of any
dependence measure whose matrix of pairwise associations is positive definite
(e.g. Pearsons, Kendalls, Spearmans, Tail Dependence Matrix, and others). The
solution remains valid under marginal asset distributions characterized by
notably different and varying degrees of serial correlation, non-stationarity,
heavy-tailedness, and asymmetry. Importantly, NAbCs p-values and confidence
intervals remain analytically consistent at both the matrix level and the
pairwise cell level. Finally, NAbC maintains validity even when selected cells
in the matrix are frozen for a given scenario or stress test, thus enabling
flexible, granular, and realistic scenarios. NAbC stands alone in providing all
of these capabilities simultaneously, and should prove to be a very useful
means by which we can better understand and manage financial portfolios in our
multivariate world.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2025 17:52:36 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 15:34:21 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Opdyke",
"JD",
""
]
] |
2504.15338 | Zhi-Qiang Gao | Zhi-Qiang Gao, Taige Wang, Dung-Hai Lee | Interacting Chern insulator transition on the sphere: revealing the
Gross-Neveu-Yukawa criticality | 5+10 pages, 3 figures | null | null | null | cond-mat.str-el cond-mat.mes-hall cond-mat.stat-mech hep-th | http://creativecommons.org/licenses/by/4.0/ | In two spatial dimensions, the transition between topological and trivial
Chern insulators exemplifies a class of beyond-Landau critical phenomena. We
show that the interaction-driven multicritical point of this transition falls
into the Gross-Neveu-Yukawa (GNY) universality class, a topic of considerable
interest in both high-energy and condensed matter physics. In this work, we
focus on the $N=2$ case of the GNY criticality. We employ exact diagonalization
of Dirac fermions on a sphere to circumvent the parity anomaly, capitalize on
full SO(3) symmetry to reduce finite-size effects, and directly extract
operator scaling dimensions from the excitation spectrum. Despite working with
only modest system sizes, our results closely match conformal bootstrap
predictions for low-scaling dimension operators and reveal several previously
uncharacterized higher primaries. These findings highlight the efficacy of
spherical geometry for probing interacting Dirac criticality.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2025 18:00:01 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 11:53:31 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Gao",
"Zhi-Qiang",
""
],
[
"Wang",
"Taige",
""
],
[
"Lee",
"Dung-Hai",
""
]
] |
2504.15441 | Xinyuan Zheng | Xinyuan Zheng, Mahmoud Jalali Mehrabad, Avik Dutt, Nathan Schine, Edo
Waks | Quantum simulation of interacting bosons with propagating waveguide
photons | null | null | null | null | quant-ph physics.atom-ph | http://creativecommons.org/licenses/by/4.0/ | Optical networks composed of interconnected waveguides are a versatile
platform to simulate bosonic physical phenomena. Significant work in the
non-interacting regime has demonstrated the capabilities of this platform to
simulate many exotic effects such as photon transport in the presence of gauge
fields, dynamics of quantum walks, and topological transition and dissipation
phenomena. However, the extension of these concepts to simulating interacting
quantum many-body phenomena such as the Bose-Hubbard and the fractional quantum
Hall (FQH) physics has remained elusive. In this work, we address this problem
and demonstrate a framework for quantum many-body simulation as well as drive
and dissipation in photonic waveguides. Specifically, we show that for
waveguide photons, a tunable on-site interaction can be simulated using a
photon-number-selective phase gate. We propose an implementation of such a
phase gate based on a three-level-atom-mediated photon subtraction and
addition. We apply this approach to bosonic lattice models and propose circuits
that can accurately simulate the Bose-Hubbard and FQH Hamiltonian as
benchmarking examples. Moreover, we show how to simulate the Lindbladian
evolution with engineered dissipators such that the steady state of the
Lindbadlian corresponds to the ground state of desired Hamiltonians. Our scheme
extends the waveguide photonic simulation platform to the strongly interacting
quantum many-body regime while retaining all of its crucial advantages, such as
single-site addressability, Hamiltonian parameter controllability, and hardware
efficiency.
| [
{
"version": "v1",
"created": "Mon, 21 Apr 2025 21:14:37 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Apr 2025 15:22:59 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 15:38:36 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Zheng",
"Xinyuan",
""
],
[
"Mehrabad",
"Mahmoud Jalali",
""
],
[
"Dutt",
"Avik",
""
],
[
"Schine",
"Nathan",
""
],
[
"Waks",
"Edo",
""
]
] |
2504.15608 | Zurab Kepuladze | Zurab Kepuladze | Lorentz Violation: Loop-Induced Effects in QED and Observational
Constraints | total 13 pages | null | null | null | hep-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Lorentz invariance is a cornerstone of modern physics, yet its possible
violation remains both theoretically intriguing and experimentally significant.
In this work, using quantum electrodynamics as an example, we explore how
Lorentz invariance violation, introduced into a specific sector of the theory,
spreads through loop corrections, modifying the propagation and dispersion
relations of other particles. Self-energy and vacuum polarization graphs reveal
how LIV effects transfer across sectors, influencing particle kinematics. Due
to these loop effects, constraints from cosmic-ray observations and other
Earth-based experiments impose limits on induced LIV parameters that would
otherwise be less constrained. We show that while interaction-based LIV effects
require unrealistically large parameters for detection, modifications to
dispersion relations can be probed down to $\delta \sim 10^{-8} \text{ to }
10^{-9}$ at the LHC. This suggests that accelerator-based resonance studies
provide a promising avenue for stringent LIV constraints, potentially rivaling
astrophysical observations.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 05:58:04 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 11:50:12 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Kepuladze",
"Zurab",
""
]
] |
2504.15638 | Dingrong Xiong | Dingrong Xiong, Mouyuan Sun, Jun-Xian Wang, Junhui Fan, Yongquan Xue,
Minfeng Gu, Liang Chen, Yongyun Chen, Nan Ding, Fei Guo, Jirong Mao, Guowei
Ren, Rui Xue, Dahai Yan, Shenbang Yang, Haiyun Zhang, Jinming Bai | A characteristic optical variability time scale in jetted active
galactic nuclei: a large gamma-ray emission sample | 23 pages, 14 figures, 3 tables, accepted for publication in ApJS | null | null | null | astro-ph.GA astro-ph.HE | http://creativecommons.org/licenses/by/4.0/ | The variability mechanisms from jetted AGNs are still under debate. Here the
damped random walk (DRW) model, implemented through Gaussian Processe (GPs), is
used to fit the $ZTF$ long-term optical light curves of 1684 $\gamma$-ray
emission jetted AGNs. This analysis yields one of the largest samples with
characteristic optical variability timescales for jetted AGNs. A single DRW
model from GPs can fit the optical light curve of most jetted AGNs
well/potentially well, while there are still some jetted AGNs whose light curve
can not be fitted well by a single DRW model. After the jet power, proxied by
gamma-ray luminosity, is introduced as a new parameter, new relationships among
intrinsic variability time scales, black hole mass and jet power are discovered
for efficient accretion AGNs ($\tau^{\rm in} \propto M_{\rm
BH}^{0.29^{+0.06}_{-0.06}}P_{\rm jet}^{-0.3^{+0.03}_{-0.03}}$ with scatter of
approximately 0.09~dex) and for inefficient accretion AGNs ($\tau^{\rm in}
\propto M_{\rm BH}^{0.06^{+0.07}_{-0.07}}P_{\rm jet}^{0.37^{+0.11}_{-0.11}}$
with scatter of approximately 0.14~dex), respectively. Our results support that
the optical variability of jetted AGNs with efficient accretion may originate
within the standard accretion disk at UV emitting radii similar to non-jetted
AGNs, and is directly related to the acceleration of shock in the jet and then
enhanced through the beaming effect in beamed AGNs. For the jetted AGNs with
inefficient accretion, the intrinsic timescale is consistent with the escape
timescale of electrons.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 06:57:01 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 03:35:16 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Xiong",
"Dingrong",
""
],
[
"Sun",
"Mouyuan",
""
],
[
"Wang",
"Jun-Xian",
""
],
[
"Fan",
"Junhui",
""
],
[
"Xue",
"Yongquan",
""
],
[
"Gu",
"Minfeng",
""
],
[
"Chen",
"Liang",
""
],
[
"Chen",
"Yongyun",
""
],
[
"Ding",
"Nan",
""
],
[
"Guo",
"Fei",
""
],
[
"Mao",
"Jirong",
""
],
[
"Ren",
"Guowei",
""
],
[
"Xue",
"Rui",
""
],
[
"Yan",
"Dahai",
""
],
[
"Yang",
"Shenbang",
""
],
[
"Zhang",
"Haiyun",
""
],
[
"Bai",
"Jinming",
""
]
] |
2504.15656 | Ruowen Qiu | Ruowen Qiu, Yuanyang Yu, Fukun Zhao | Existence and multiplicity of $L^2$-Normalized solutions for the
periodic Schr\"{o}dinger system of Hamiltonian type | 27 pages | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the following nonlinear Schr\"{o}dinger system of
Hamiltonian type \begin{equation*} \left\{\begin{array}{l} -\Delta
u+V(x)u=\partial_v H(x,u,v)+\omega v, \ x \in \mathbb{R}^N, \\ -\Delta
v+V(x)v=\partial_u H(x,u,v)+\omega u,\ x \in \mathbb{R}^N, \\
\displaystyle\int_{\mathbb{R}^N}|z|^2dx=a^2, \end{array}\right. \end{equation*}
where the potential function $V(x)$ is periodic,
$z:=(u,v):\mathbb{R}^N\rightarrow \mathbb{R}\times\mathbb{R}$, $\omega\in
\mathbb{R}$ appears as a Lagrange multiplier, $a>0$ is a prescribed constant.
The existence and multiplicity of $L^2$-normalized solutions for the above
Schr\"{o}dinger system are obtained, and the combination of the
Lyapunov-Schmidt reduction, a perturbation argument and the multiplicity
theorem of Ljusternik-Schnirelmann is involved in the proof. In addition, a
bifurcation result is also given.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 07:26:52 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 11:14:54 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Qiu",
"Ruowen",
""
],
[
"Yu",
"Yuanyang",
""
],
[
"Zhao",
"Fukun",
""
]
] |
2504.15758 | Andrew Gracyk | Andrew Gracyk | Observability conditions for neural state-space models with eigenvalues
and their roots of unity | Corrections and improvements to objective functions and new
experiments | null | null | null | cs.LG cs.SY eess.SY math.DS math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We operate through the lens of ordinary differential equations and control
theory to study the concept of observability in the context of neural
state-space models and the Mamba architecture. We develop strategies to enforce
observability, which are tailored to a learning context, specifically where the
hidden states are learnable at initial time, in conjunction to over its
continuum, and high-dimensional. We also highlight our methods emphasize
eigenvalues, roots of unity, or both. Our methods effectuate computational
efficiency when enforcing observability, sometimes at great scale. We formulate
observability conditions in machine learning based on classical control theory
and discuss their computational complexity. Our nontrivial results are
fivefold. We discuss observability through the use of permutations in neural
applications with learnable matrices without high precision. We present two
results built upon the Fourier transform that effect observability with high
probability up to the randomness in the learning. These results are worked with
the interplay of representations in Fourier space and their eigenstructure,
nonlinear mappings, and the observability matrix. We present a result for Mamba
that is similar to a Hautus-type condition, but instead employs an argument
using a Vandermonde matrix instead of eigenvectors. Our final result is a
shared-parameter construction of the Mamba system, which is computationally
efficient in high exponentiation. We develop a training algorithm with this
coupling, showing it satisfies a Robbins-Monro condition under certain
orthogonality, while a more classical training procedure fails to satisfy a
contraction with high Lipschitz constant.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 10:10:52 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 10:05:05 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Gracyk",
"Andrew",
""
]
] |
2504.15941 | Fanny Jourdan PhD | Fanny Jourdan, Yannick Chevalier, C\'ecile Favre | FairTranslate: An English-French Dataset for Gender Bias Evaluation in
Machine Translation by Overcoming Gender Binarity | FAccT 2025 | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Large Language Models (LLMs) are increasingly leveraged for translation tasks
but often fall short when translating inclusive language -- such as texts
containing the singular 'they' pronoun or otherwise reflecting fair linguistic
protocols. Because these challenges span both computational and societal
domains, it is imperative to critically evaluate how well LLMs handle inclusive
translation with a well-founded framework.
This paper presents FairTranslate, a novel, fully human-annotated dataset
designed to evaluate non-binary gender biases in machine translation systems
from English to French. FairTranslate includes 2418 English-French sentence
pairs related to occupations, annotated with rich metadata such as the
stereotypical alignment of the occupation, grammatical gender indicator
ambiguity, and the ground-truth gender label (male, female, or inclusive).
We evaluate four leading LLMs (Gemma2-2B, Mistral-7B, Llama3.1-8B,
Llama3.3-70B) on this dataset under different prompting procedures. Our results
reveal substantial biases in gender representation across LLMs, highlighting
persistent challenges in achieving equitable outcomes in machine translation.
These findings underscore the need for focused strategies and interventions
aimed at ensuring fair and inclusive language usage in LLM-based translation
systems.
We make the FairTranslate dataset publicly available on Hugging Face, and
disclose the code for all experiments on GitHub.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 14:35:16 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 12:19:32 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Jourdan",
"Fanny",
""
],
[
"Chevalier",
"Yannick",
""
],
[
"Favre",
"Cécile",
""
]
] |
2504.15984 | Lukas Gehrke | Lukas Gehrke, Aleksandrs Koselevs, Marius Klug, Klaus Gramann | Neuroadaptive Haptics: Comparing Reinforcement Learning from Explicit
Ratings and Neural Signals for Adaptive XR Systems | 15 pages, 6 figures | null | null | null | cs.HC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Neuroadaptive haptics offers a path to more immersive extended reality (XR)
experiences by dynamically tuning multisensory feedback to user preferences. We
present a neuroadaptive haptics system that adapts XR feedback through
reinforcement learning (RL) from explicit user ratings and brain-decoded neural
signals. In a user study, participants interacted with virtual objects in VR
while Electroencephalography (EEG) data were recorded. An RL agent adjusted
haptic feedback based either on explicit ratings or on outputs from a neural
decoder. Results show that the RL agent's performance was comparable across
feedback sources, suggesting that implicit neural feedback can effectively
guide personalization without requiring active user input. The EEG-based neural
decoder achieved a mean F1 score of 0.8, supporting reliable classification of
user experience. These findings demonstrate the feasibility of combining
brain-computer interfaces (BCI) and RL to autonomously adapt XR interactions,
reducing cognitive load and enhancing immersion.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 15:34:19 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 08:43:02 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Gehrke",
"Lukas",
""
],
[
"Koselevs",
"Aleksandrs",
""
],
[
"Klug",
"Marius",
""
],
[
"Gramann",
"Klaus",
""
]
] |
2504.16062 | Jiaxu Xing | Hardik Shah, Jiaxu Xing, Nico Messikommer, Boyang Sun, Marc Pollefeys,
Davide Scaramuzza | ForesightNav: Learning Scene Imagination for Efficient Exploration | null | null | null | null | cs.RO cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Understanding how humans leverage prior knowledge to navigate unseen
environments while making exploratory decisions is essential for developing
autonomous robots with similar abilities. In this work, we propose
ForesightNav, a novel exploration strategy inspired by human imagination and
reasoning. Our approach equips robotic agents with the capability to predict
contextual information, such as occupancy and semantic details, for unexplored
regions. These predictions enable the robot to efficiently select meaningful
long-term navigation goals, significantly enhancing exploration in unseen
environments. We validate our imagination-based approach using the Structured3D
dataset, demonstrating accurate occupancy prediction and superior performance
in anticipating unseen scene geometry. Our experiments show that the
imagination module improves exploration efficiency in unseen environments,
achieving a 100% completion rate for PointNav and an SPL of 67% for ObjectNav
on the Structured3D Validation split. These contributions demonstrate the power
of imagination-driven reasoning for autonomous systems to enhance generalizable
and efficient exploration.
| [
{
"version": "v1",
"created": "Tue, 22 Apr 2025 17:38:38 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Apr 2025 14:31:24 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 06:53:10 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Shah",
"Hardik",
""
],
[
"Xing",
"Jiaxu",
""
],
[
"Messikommer",
"Nico",
""
],
[
"Sun",
"Boyang",
""
],
[
"Pollefeys",
"Marc",
""
],
[
"Scaramuzza",
"Davide",
""
]
] |
2504.16376 | Yashuai Cao | Yashuai Cao and Jintao Wang and Xu Shi and Wei Ni | Lightweight and Self-Evolving Channel Twinning: An Ensemble DMD-Assisted
Approach | Accepted for publication in the IEEE Transactions on Wireless
Communications | null | 10.1109/TWC.2025.3564276 | null | eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional channel acquisition faces significant limitations due to ideal
model assumptions and scalability challenges. A novel environment-aware
paradigm, known as channel twinning, tackles these issues by constructing radio
propagation environment semantics using a data-driven approach. In the
spotlight of channel twinning technology, a radio map is recognized as an
effective region-specific model for learning the spatial distribution of
channel information. However, most studies focus on static channel map
construction, with only a few collecting numerous channel samples and using
deep learning for radio map prediction. In this paper, we develop a novel
dynamic radio map twinning framework with a substantially small dataset.
Specifically, we present an innovative approach that employs dynamic mode
decomposition (DMD) to model the evolution of the dynamic channel gain map as a
dynamical system. We first interpret dynamic channel gain maps as
spatio-temporal video stream data. The coarse-grained and fine-grained evolving
modes are extracted from the stream data using a new ensemble DMD (Ens-DMD)
algorithm. To mitigate the impact of noisy data, we design a median-based
threshold mask technique to filter the noise artifacts of the twin maps. With
the proposed DMD-based radio map twinning framework, numerical results are
provided to demonstrate the low-complexity reproduction and evolution of the
channel gain maps. Furthermore, we consider four radio map twin performance
metrics to confirm the superiority of our framework compared to the baselines.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 02:52:42 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 00:27:04 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Cao",
"Yashuai",
""
],
[
"Wang",
"Jintao",
""
],
[
"Shi",
"Xu",
""
],
[
"Ni",
"Wei",
""
]
] |
2504.16693 | Hang Zhao | Wenxuan Li, Hang Zhao, Zhiyuan Yu, Yu Du, Qin Zou, Ruizhen Hu, Kai Xu | PIN-WM: Learning Physics-INformed World Models for Non-Prehensile
Manipulation | Robotics: Science and Systems 2025 | null | null | null | cs.LG cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While non-prehensile manipulation (e.g., controlled pushing/poking)
constitutes a foundational robotic skill, its learning remains challenging due
to the high sensitivity to complex physical interactions involving friction and
restitution. To achieve robust policy learning and generalization, we opt to
learn a world model of the 3D rigid body dynamics involved in non-prehensile
manipulations and use it for model-based reinforcement learning. We propose
PIN-WM, a Physics-INformed World Model that enables efficient end-to-end
identification of a 3D rigid body dynamical system from visual observations.
Adopting differentiable physics simulation, PIN-WM can be learned with only
few-shot and task-agnostic physical interaction trajectories. Further, PIN-WM
is learned with observational loss induced by Gaussian Splatting without
needing state estimation. To bridge Sim2Real gaps, we turn the learned PIN-WM
into a group of Digital Cousins via physics-aware randomizations which perturb
physics and rendering parameters to generate diverse and meaningful variations
of the PIN-WM. Extensive evaluations on both simulation and real-world tests
demonstrate that PIN-WM, enhanced with physics-aware digital cousins,
facilitates learning robust non-prehensile manipulation skills with Sim2Real
transfer, surpassing the Real2Sim2Real state-of-the-arts.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 13:27:07 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 12:21:40 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Li",
"Wenxuan",
""
],
[
"Zhao",
"Hang",
""
],
[
"Yu",
"Zhiyuan",
""
],
[
"Du",
"Yu",
""
],
[
"Zou",
"Qin",
""
],
[
"Hu",
"Ruizhen",
""
],
[
"Xu",
"Kai",
""
]
] |
2504.16902 | Vineeth Sai Narajala | Idan Habler and Ken Huang and Vineeth Sai Narajala and Prashant
Kulkarni | Building A Secure Agentic AI Application Leveraging A2A Protocol | 13 pages, 4 figures, 1 table, Authors contributed equally to this
work, typos corrected, references added | null | null | null | cs.CR cs.AI | http://creativecommons.org/licenses/by/4.0/ | As Agentic AI systems evolve from basic workflows to complex multi agent
collaboration, robust protocols such as Google's Agent2Agent (A2A) become
essential enablers. To foster secure adoption and ensure the reliability of
these complex interactions, understanding the secure implementation of A2A is
essential. This paper addresses this goal by providing a comprehensive security
analysis centered on the A2A protocol. We examine its fundamental elements and
operational dynamics, situating it within the framework of agent communication
development. Utilizing the MAESTRO framework, specifically designed for AI
risks, we apply proactive threat modeling to assess potential security issues
in A2A deployments, focusing on aspects such as Agent Card management, task
execution integrity, and authentication methodologies.
Based on these insights, we recommend practical secure development
methodologies and architectural best practices designed to build resilient and
effective A2A systems. Our analysis also explores how the synergy between A2A
and the Model Context Protocol (MCP) can further enhance secure
interoperability. This paper equips developers and architects with the
knowledge and practical guidance needed to confidently leverage the A2A
protocol for building robust and secure next generation agentic applications.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 17:27:49 GMT"
},
{
"version": "v2",
"created": "Fri, 2 May 2025 18:28:07 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Habler",
"Idan",
""
],
[
"Huang",
"Ken",
""
],
[
"Narajala",
"Vineeth Sai",
""
],
[
"Kulkarni",
"Prashant",
""
]
] |
2504.16928 | Carlos Trallero | Jan Tro\ss, Travis Severt, eorgios Kolliopoulos, Pratap Timilsina,
Itzik Ben-Itzhak, Carlos A. Trallero-Herrero | Enhancing high-order harmonic generation in two-color laser fields: A
comparison of single- and two-color schemes | submitted to APS | null | null | null | physics.optics physics.app-ph physics.atom-ph | http://creativecommons.org/licenses/by/4.0/ | We compare the enhancement of high-order harmonic generation in argon using
800--400 and 800--266~nm laser fields with their optimized single-color
counterparts. We observe that the two-color fields generally outperform the
single-color 800~nm field by factors of 2 to 3800, depending on the photon
energy and generation scheme. From this comparison, we determine which scheme
is optimal for each photon energy. We also observe that the divergence of HHG
produced by the 800--266~nm laser fields is smaller than that of the other
single- and two-color driving fields, perhaps suggesting that the 800--266~nm
fields optimize the recombination probability of the so-called ``short"
electron trajectories.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 17:56:57 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 14:36:23 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Troß",
"Jan",
""
],
[
"Severt",
"Travis",
""
],
[
"Kolliopoulos",
"eorgios",
""
],
[
"Timilsina",
"Pratap",
""
],
[
"Ben-Itzhak",
"Itzik",
""
],
[
"Trallero-Herrero",
"Carlos A.",
""
]
] |
2504.16978 | Yu Shi | Yu Shi | Scientific Spirit of Chien-Shiung Wu: From Quantum Entanglement to
Parity Nonconservation | 18 pages, translated transcript of the speech the author made at the
International Symposium Commemorating the 110th Anniversary of the Birth of
Chien-Shiung Wu, on May 31, 2022 | null | null | null | physics.hist-ph hep-ex hep-ph hep-th quant-ph | http://creativecommons.org/licenses/by/4.0/ | In 1950, Chien-Shiung Wu and her student published a coincidence experiment
on entangled photon pairs that were created in electron-positron annihilation.
This experiment precisely verified the prediction of quantum electrodynamics.
Additionally, it was also the first instance of a precisely controlled quantum
entangled state of spatially separated particles, although Wu did not know
about this at the time. In 1956, Wu initiated and led the so-called Wu
experiment, which discovered parity nonconservation, becoming one of the
greatest experiments of the 20th century. As Chen Ning Yang said, Wu's
experiments were well known for their precision and accuracy. Experimental
precision and accuracy manifested Wu's scientific spirit, which we investigate
here in some detail. This paper is the translated transcript of the speech the
author made at the International Symposium Commemorating the 110th Anniversary
of the Birth of Chien-Shiung Wu, on May 31, 2022. The above abstract is the
translation of the original abstract of the speech.
| [
{
"version": "v1",
"created": "Wed, 23 Apr 2025 17:36:42 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Shi",
"Yu",
""
]
] |
2504.17329 | Misha Stepanov | Misha Stepanov | On Runge-Kutta methods of order 10 | 21 pages, 5 figures, 3 tables, comment on c6 is added at the end of
sec. 5 | null | null | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A family of explicit 15-stage Runge-Kutta methods of order 10 is derived.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2025 07:45:51 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 00:28:57 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Stepanov",
"Misha",
""
]
] |
2504.17348 | ChengJie Wang | Chengjie Wang | On the length of generating sets with conditions on minimal polynomial | 24 pages | null | null | null | math.RA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Linear upper bounds may be derived by imposing specific structural conditions
on a generating set, such as additional constraints on ranks, eigenvalues, or
the degree of the minimal polynomial of the generating matrices. This paper
establishes a linear upper bound of \(3n-5\) for generating sets that contain a
matrix whose minimal polynomial has a degree exceeding \(\frac{n}{2}\), where
\(n\) denotes the order of the matrix. Compared to the bound provided in
\cite[Theorem 3.1]{r2}, this result reduces the constraints on the Jordan
canonical forms. Additionally, it is demonstrated that the bound
\(\frac{7n}{2}-4\) holds when the generating set contains a matrix with a
minimal polynomial of degree \(t\) satisfying \(2t\le n\le 3t-1\). The primary
enhancements consist of quantitative bounds and reduced reliance on Jordan form
structural constraints.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2025 08:09:32 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Apr 2025 05:12:54 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 09:38:26 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Wang",
"Chengjie",
""
]
] |
2504.17456 | Yingyu Yang | Shaohua Xue, Yingyu Yang, Li-Xin Li | Thermodynamics and Holographic RG Flow in 3D C-metric | null | null | null | null | hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate the microscopic derivation of the entropy and
the holographic RG flow in 3D C-metric. We first discuss the case of a sector
in BTZ (Banados-Teitelboim-Zanelli) black hole. By rescaling the Newton's
constant we recover the area law of entropy of this sector by microstate
counting. Then we apply this technique to all accelerating BTZ phases in 3D
C-metric. Finally, for the boundary entropy in 3D C-metric, we study the
monotonicity of the $g$-function of 3D C-metric in small acceleration limit and
find that the $g$-theorem is satisfied only in $\rm I_{2}$.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2025 11:37:06 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 13:59:13 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Xue",
"Shaohua",
""
],
[
"Yang",
"Yingyu",
""
],
[
"Li",
"Li-Xin",
""
]
] |
2504.17570 | Salvatore Capozziello | Silvia De Bianchi, Salvatore Capozziello, and Emmanuele Battista | Atemporality from Conservation Laws of Physics in Lorentzian-Euclidean
Black Hole | 14 pages, accepted for publication in Foundations of Physics | null | 10.1007/s10701-025-00848-z | null | gr-qc astro-ph.HE hep-th | http://creativecommons.org/licenses/by/4.0/ | Recent results have shown that singularities can be avoided from the general
relativistic standpoint in Lorentzian-Euclidean black holes by means of the
transition from a Lorentzian to an Euclidean region where time loses its
physical meaning and becomes imaginary. This dynamical mechanism, dubbed
``atemporality'', prevents the emergence of black hole singularities and the
violation of conservation laws. In this paper, the notion of atemporality
together with a detailed discussion of its implications is presented from a
philosophical perspective. The main result consists in showing that
atemporality is naturally related to conservation laws.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2025 13:59:42 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"De Bianchi",
"Silvia",
""
],
[
"Capozziello",
"Salvatore",
""
],
[
"Battista",
"Emmanuele",
""
]
] |
2504.17918 | Piotr Beling | Piotr Beling, Peter Sanders | PHast -- Perfect Hashing with fast evaluation | null | null | null | null | cs.DS cs.DB cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Perfect hash functions give unique "names" to arbitrary keys requiring only a
few bits per key. This is an essential building block in applications like
static hash tables, databases, or bioinformatics. This paper introduces the
PHast approach that has the currently fastest query time with competitive
construction time and space consumption. PHast improves bucket-placement which
first hashes each key k to a bucket, and then looks for the bucket seed s such
that a secondary hash function maps pairs (s,k) in a collision-free way. PHast
can use small-range primary hash functions with linear mapping, fixed-width
encoding of seeds, and parallel construction. This is achieved using small
overlapping slices of allowed values and bumping to handle unsuccessful seed
assignment.
| [
{
"version": "v1",
"created": "Thu, 24 Apr 2025 20:19:07 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 20:21:25 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Beling",
"Piotr",
""
],
[
"Sanders",
"Peter",
""
]
] |
2504.18267 | Prajwal Chauhan | Prajwal Chauhan, Salah Eddine Choutri, Mohamed Ghattassi, Nader
Masmoudi, Saif Eddin Jabari | Neural operators struggle to learn complex PDEs in pedestrian mobility:
Hughes model case study | 26 pages, 15 figures, 6 tables, under review at Artificial
Intelligence for Transportation | Journal | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper investigates the limitations of neural operators in learning
solutions for a Hughes model, a first-order hyperbolic conservation law system
for crowd dynamics. The model couples a Fokker-Planck equation representing
pedestrian density with a Hamilton-Jacobi-type (eikonal) equation. This Hughes
model belongs to the class of nonlinear hyperbolic systems that often exhibit
complex solution structures, including shocks and discontinuities. In this
study, we assess the performance of three state-of-the-art neural operators
(Fourier Neural Operator, Wavelet Neural Operator, and Multiwavelet Neural
Operator) in various challenging scenarios. Specifically, we consider (1)
discontinuous and Gaussian initial conditions and (2) diverse boundary
conditions, while also examining the impact of different numerical schemes.
Our results show that these neural operators perform well in easy scenarios
with fewer discontinuities in the initial condition, yet they struggle in
complex scenarios with multiple initial discontinuities and dynamic boundary
conditions, even when trained specifically on such complex samples. The
predicted solutions often appear smoother, resulting in a reduction in total
variation and a loss of important physical features. This smoothing behavior is
similar to issues discussed by Daganzo (1995), where models that introduce
artificial diffusion were shown to miss essential features such as shock waves
in hyperbolic systems. These results suggest that current neural operator
architectures may introduce unintended regularization effects that limit their
ability to capture transport dynamics governed by discontinuities. They also
raise concerns about generalizing these methods to traffic applications where
shock preservation is essential.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2025 11:26:41 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 07:05:20 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Chauhan",
"Prajwal",
""
],
[
"Choutri",
"Salah Eddine",
""
],
[
"Ghattassi",
"Mohamed",
""
],
[
"Masmoudi",
"Nader",
""
],
[
"Jabari",
"Saif Eddin",
""
]
] |
2504.18443 | Simon Dold | Simon Dold, Malte Helmert, Jakob Nordstr\"om, Gabriele R\"oger, Tanja
Schindler | Pseudo-Boolean Proof Logging for Optimal Classical Planning | 35th International Conference on Automated Planning and Scheduling
(ICAPS'2025) | null | null | null | cs.AI | http://creativecommons.org/licenses/by/4.0/ | We introduce lower-bound certificates for classical planning tasks, which can
be used to prove the unsolvability of a task or the optimality of a plan in a
way that can be verified by an independent third party. We describe a general
framework for generating lower-bound certificates based on pseudo-Boolean
constraints, which is agnostic to the planning algorithm used.
As a case study, we show how to modify the $A^{*}$ algorithm to produce
proofs of optimality with modest overhead, using pattern database heuristics
and $h^\textit{max}$ as concrete examples. The same proof logging approach
works for any heuristic whose inferences can be efficiently expressed as
reasoning over pseudo-Boolean constraints.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2025 15:54:09 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 00:44:16 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Dold",
"Simon",
""
],
[
"Helmert",
"Malte",
""
],
[
"Nordström",
"Jakob",
""
],
[
"Röger",
"Gabriele",
""
],
[
"Schindler",
"Tanja",
""
]
] |
2504.18468 | Georgios Kouros | Georgios Kouros and Minye Wu and Tinne Tuytelaars | RGS-DR: Reflective Gaussian Surfels with Deferred Rendering for Shiny
Objects | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce RGS-DR, a novel inverse rendering method for reconstructing and
rendering glossy and reflective objects with support for flexible relighting
and scene editing. Unlike existing methods (e.g., NeRF and 3D Gaussian
Splatting), which struggle with view-dependent effects, RGS-DR utilizes a 2D
Gaussian surfel representation to accurately estimate geometry and surface
normals, an essential property for high-quality inverse rendering. Our approach
explicitly models geometric and material properties through learnable
primitives rasterized into a deferred shading pipeline, effectively reducing
rendering artifacts and preserving sharp reflections. By employing a
multi-level cube mipmap, RGS-DR accurately approximates environment lighting
integrals, facilitating high-quality reconstruction and relighting. A residual
pass with spherical-mipmap-based directional encoding further refines the
appearance modeling. Experiments demonstrate that RGS-DR achieves high-quality
reconstruction and rendering quality for shiny objects, often outperforming
reconstruction-exclusive state-of-the-art methods incapable of relighting.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2025 16:23:50 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Apr 2025 08:42:50 GMT"
},
{
"version": "v3",
"created": "Mon, 5 May 2025 09:14:51 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Kouros",
"Georgios",
""
],
[
"Wu",
"Minye",
""
],
[
"Tuytelaars",
"Tinne",
""
]
] |
2504.18721 | Ellis Owen | Ellis R. Owen, Yoshiyuki Inoue, Tatsuki Fujiwara, Albert K. H. Kong | High energy extragalactic multimessenger backgrounds from starburst and
dead galaxies | 10 pages, 2 figures, proceedings of the 28th European Cosmic Ray
Symposium (ECRS2024). v2 fixes typo in affiliations | null | null | RIKEN-iTHEMS-Report-25 | astro-ph.HE astro-ph.GA | http://creativecommons.org/licenses/by/4.0/ | Starburst galaxies are $\gamma$-ray sources. Canonically, their emission is
driven by hadronic cosmic rays (CRs) interacting with interstellar gas, forming
$\gamma$-rays via the decay of neutral pions. Charged pions are also formed in
this process. They decay into secondary leptons, including electrons and
neutrinos. Starburst galaxies are therefore also expected to be neutrino
sources, and their high-energy $\gamma$-ray emission may include a secondary
leptonic component. Leptonic $\gamma$-rays may also originate from electrons
directly energized by shocks within the interstellar medium of galaxies, or
from pulsars and their surrounding halos. In the Milky Way, pulsars/pulsar
halos are the dominant $\gamma$-ray source class. They are associated with
stellar remnants or old stellar populations, and are presumably abundant in old
galaxies. In this work, we show that the collective high-energy emission from
galaxies can account for only a fraction of extragalactic neutrinos, but can
form a major component of the extragalactic $\gamma$-ray background. Contrary
to the traditional view, a substantial fraction of this radiation may originate
from leptonic processes, including from old, quiescent galaxies.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2025 22:16:08 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 04:21:56 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Owen",
"Ellis R.",
""
],
[
"Inoue",
"Yoshiyuki",
""
],
[
"Fujiwara",
"Tatsuki",
""
],
[
"Kong",
"Albert K. H.",
""
]
] |
2504.18728 | Zhenze Yang | Zhenze Yang, Yifan Wu, Xu Han, Ziqing Zhang, Haoen Lai, Zhenliang Mu,
Tianze Zheng, Siyuan Liu, Zhichen Pu, Zhi Wang, Zhiao Yu, Sheng Gong, Wen Yan | A Unified Predictive and Generative Solution for Liquid Electrolyte
Formulation | null | null | null | null | cond-mat.mtrl-sci | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Liquid electrolytes are critical components of next-generation energy storage
systems, enabling fast ion transport, minimizing interfacial resistance, and
ensuring electrochemical stability for long-term battery performance. However,
measuring electrolyte properties and designing formulations remain
experimentally and computationally expensive. In this work, we present a
unified framework for designing liquid electrolyte formulation, integrating a
forward predictive model with an inverse generative approach. Leveraging both
computational and experimental data collected from literature and extensive
molecular simulations, we train a predictive model capable of accurately
estimating electrolyte properties from ionic conductivity to solvation
structure. Our physics-informed architecture preserves permutation invariance
and incorporates empirical dependencies on temperature and salt concentration,
making it broadly applicable to property prediction tasks across molecular
mixtures. Furthermore, we introduce -- to the best of our knowledge -- the
first generative machine learning framework for molecular mixture design,
demonstrated on electrolyte systems. This framework supports
multi-condition-constrained generation, addressing the inherently
multi-objective nature of materials design. This unified framework advances
data-driven electrolyte design and can be readily extended to other complex
chemical systems beyond electrolytes.
| [
{
"version": "v1",
"created": "Fri, 25 Apr 2025 22:40:50 GMT"
},
{
"version": "v2",
"created": "Fri, 2 May 2025 22:42:33 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Yang",
"Zhenze",
""
],
[
"Wu",
"Yifan",
""
],
[
"Han",
"Xu",
""
],
[
"Zhang",
"Ziqing",
""
],
[
"Lai",
"Haoen",
""
],
[
"Mu",
"Zhenliang",
""
],
[
"Zheng",
"Tianze",
""
],
[
"Liu",
"Siyuan",
""
],
[
"Pu",
"Zhichen",
""
],
[
"Wang",
"Zhi",
""
],
[
"Yu",
"Zhiao",
""
],
[
"Gong",
"Sheng",
""
],
[
"Yan",
"Wen",
""
]
] |
2504.18793 | Santosh Bhupathi | Santosh Bhupathi | Building Scalable AI-Powered Applications with Cloud Databases:
Architectures, Best Practices and Performance Considerations | 9 pages | null | null | null | cs.DB cs.AI | http://creativecommons.org/licenses/by/4.0/ | The rapid adoption of AI-powered applications demands high-performance,
scalable, and efficient cloud database solutions, as traditional architectures
often struggle with AI-driven workloads requiring real-time data access, vector
search, and low-latency queries. This paper explores how cloud-native databases
enable AI-driven applications by leveraging purpose-built technologies such as
vector databases (pgvector), graph databases (AWS Neptune), NoSQL stores
(Amazon DocumentDB, DynamoDB), and relational cloud databases (Aurora MySQL and
PostgreSQL). It presents architectural patterns for integrating AI workloads
with cloud databases, including Retrieval-Augmented Generation (RAG) [1] with
LLMs, real-time data pipelines, AI-driven query optimization, and
embeddings-based search. Performance benchmarks, scalability considerations,
and cost-efficient strategies are evaluated to guide the design of AI-enabled
applications. Real-world case studies from industries such as healthcare,
finance, and customer experience illustrate how enterprises utilize cloud
databases to enhance AI capabilities while ensuring security, governance, and
compliance with enterprise and regulatory standards. By providing a
comprehensive analysis of AI and cloud database integration, this paper serves
as a practical guide for researchers, architects, and enterprises to build
next-generation AI applications that optimize performance, scalability, and
cost efficiency in cloud environments.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2025 04:17:46 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Bhupathi",
"Santosh",
""
]
] |
2504.18794 | Brendon Johnson | Brendon Johnson and Alfredo Weitzenfeld | Hierarchical Reinforcement Learning in Multi-Goal Spatial Navigation
with Autonomous Mobile Robots | null | null | null | null | cs.AI cs.RO | http://creativecommons.org/licenses/by/4.0/ | Hierarchical reinforcement learning (HRL) is hypothesized to be able to take
advantage of the inherent hierarchy in robot learning tasks with sparse reward
schemes, in contrast to more traditional reinforcement learning algorithms. In
this research, hierarchical reinforcement learning is evaluated and contrasted
with standard reinforcement learning in complex navigation tasks. We evaluate
unique characteristics of HRL, including their ability to create sub-goals and
the termination function. We constructed experiments to test the differences
between PPO and HRL, different ways of creating sub-goals, manual vs automatic
sub-goal creation, and the effects of the frequency of termination on
performance. These experiments highlight the advantages of HRL and how it
achieves these advantages.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2025 04:30:10 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 17:21:55 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Johnson",
"Brendon",
""
],
[
"Weitzenfeld",
"Alfredo",
""
]
] |
2504.18852 | Francis Headley | Francis J. Headley | Magnetic Dipole Trapping Potential between Infinite Superconducting
Plates | 4 pages, 2 figures. Fixed Typos | null | null | null | cond-mat.supr-con physics.app-ph | http://creativecommons.org/licenses/by/4.0/ | We derive the exact analytic form of the potential experienced by a magnetic
dipole trapped between two infinite parallel superconducting plates using the
method of image dipoles, providing a benchmark for numerical methods and a
foundation for studying the stability and dynamics of magnetically levitated
systems in precision measurements and fundamental physics experiments.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2025 08:32:45 GMT"
},
{
"version": "v2",
"created": "Fri, 2 May 2025 12:29:31 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Headley",
"Francis J.",
""
]
] |
2504.18863 | Somdeb Lahiri | Somdeb Lahiri | Numerical Representation of Preferences over Random Availability
Functions | 6 pages. An example has been included. JEL Classification: D 81.
Keywords: random availability function, preference relation, weakly dominant,
weakly continuous | null | null | null | econ.TH math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We interpret a fuzzy set as a random availability function and provide
sufficient conditions under which a preference relation over the set of all
random availability functions can be represented by a utility function.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2025 09:14:01 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 16:06:37 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Lahiri",
"Somdeb",
""
]
] |
2504.19039 | Haoze Wu | Haoze Wu, Clark Barrett, Nina Narodytska | Cubing for Tuning | null | null | null | null | cs.LO | http://creativecommons.org/licenses/by-sa/4.0/ | We are exploring the problem of building an automated reasoning procedure
that adaptively tunes the high-level solving strategy for a given problem.
There are two main distinctive characteristics of our approach: tuning is
performed solely online, unlike the common use of tuning as an offline process;
and tuning data comes exclusively from the given instance, so we do not rely on
the availability of similar benchmarks and can work with unique challenging
instances. Our approach builds on top of the divide-and-conquer paradigm that
naturally serves partitioned sub-problems for an automated tuning algorithm to
obtain a good solving strategy. We demonstrate performance improvement on two
classes of important problems--SAT-solving and neural network verification--and
show that our method can learn unconventional solving strategies in some cases.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2025 22:14:55 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 02:09:39 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Wu",
"Haoze",
""
],
[
"Barrett",
"Clark",
""
],
[
"Narodytska",
"Nina",
""
]
] |
2504.19043 | Connor Jerzak | Connor T. Jerzak and Priyanshi Chandra and Rishi Hazra | Selecting Optimal Candidate Profiles in Adversarial Environments Using
Conjoint Analysis and Machine Learning | 57 pages, 22 figures, 4 tables | null | null | null | stat.ME | http://creativecommons.org/licenses/by/4.0/ | Conjoint analysis, an application of factorial experimental design, is a
popular tool in social science research for studying multidimensional
preferences. In such political analysis experiments, respondents are often
asked to choose between two hypothetical political candidates with randomly
selected features, which can include partisanship, policy positions, gender,
and race. We consider the problem of identifying optimal candidate profiles.
Because the number of unique feature combinations far exceeds the total number
of observations in a typical conjoint experiment, it is impossible to determine
the optimal profile exactly. To address this identification challenge, we
derive an optimal stochastic intervention that represents a probability
distribution of various attributes aimed at achieving the most favorable
average outcome. We first consider an environment where one political party
optimizes their candidate selection. We then move to the more realistic case
where two political parties optimize their own candidate selection
simultaneously and in opposition to each other. We apply the proposed
methodology to an existing candidate choice conjoint experiment concerning vote
choice for US president. We find that, in contrast to the non-adversarial
approach, expected outcomes in the adversarial regime fall within range of
historical electoral outcomes, with optimal strategies suggested by the method
more likely to match the actual observed candidates compared to strategies
derived from a non-adversarial approach. These findings highlight that
incorporating adversarial dynamics into conjoint analysis can provide more
realistic insights into strategic analysis while opening up novel ways to test
the empirical implications of institutional design.
| [
{
"version": "v1",
"created": "Sat, 26 Apr 2025 22:35:58 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 14:20:56 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Jerzak",
"Connor T.",
""
],
[
"Chandra",
"Priyanshi",
""
],
[
"Hazra",
"Rishi",
""
]
] |
2504.19168 | Yan-Hong Bao | Y.-H. Bao, D.-X. Fu, J.-N. Xu, Y. Ye, J.J. Zhang, Y.-F. Zhang and
Z.-B. Zhao | Codimension sequence, grade, and generating degree: an operadic approach | null | null | null | null | math.RA | http://creativecommons.org/licenses/by/4.0/ | We study several classes of operadic ideals of the unital associative algebra
operad $\uas$. As an application, we classify quotient operads of $\uas$ of
GK-dimension $\leq 6$. This corresponds to a classification of all T-ideals of
codimension growth $n^g$ with $g\leq 5$ (or equivalently, varieties of grade
$g$ with $g\leq 5$).
| [
{
"version": "v1",
"created": "Sun, 27 Apr 2025 09:10:02 GMT"
},
{
"version": "v2",
"created": "Thu, 1 May 2025 02:00:31 GMT"
},
{
"version": "v3",
"created": "Sun, 4 May 2025 06:26:22 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Bao",
"Y. -H.",
""
],
[
"Fu",
"D. -X.",
""
],
[
"Xu",
"J. -N.",
""
],
[
"Ye",
"Y.",
""
],
[
"Zhang",
"J. J.",
""
],
[
"Zhang",
"Y. -F.",
""
],
[
"Zhao",
"Z. -B.",
""
]
] |
2504.19170 | Jiuyu Liu | Jiuyu Liu and Yi Ma and Rahim Tafazolli | SA-MIMO: Scalable Quantum-Based Wireless Communications | This work has been submitted to the IEEE for possible publication | null | null | null | cs.IT eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Rydberg atomic receivers offer a quantum-native alternative to conventional
RF front-ends by directly detecting electromagnetic fields via highly excited
atomic states. While their quantum-limited sensitivity and hardware simplicity
make them promising for future wireless systems, extending their use to
scalable multi-antenna and multi-carrier configurations, termed Scalable
Atomic-MIMO (SA-MIMO), remains largely unexplored. This paper introduces a
novel RF transmitter-atomic receiver architecture that addresses this gap. The
core idea lies in a novel modulation technique called Phase-Rotated Symbol
Spreading (PRSS), which transforms the nonlinear phase retrieval problem
inherent to atomic detection into a tractable linear demultiplexing task. PRSS
enables efficient signal processing and supports scalable MUX/DeMUX operations
in both atomic MIMO and atomic OFDM systems. Simulation results show that the
proposed system achieves up to 2.5 dB gain under optimal maximum-likelihood
detection and over 10 dB under suboptimal detection in MIMO settings. These
results establish PRSS assisted SA-MIMO as a promising architecture for
realizing high-sensitivity, interference-resilient atomic wireless
communication.
| [
{
"version": "v1",
"created": "Sun, 27 Apr 2025 09:14:57 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 12:48:23 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Liu",
"Jiuyu",
""
],
[
"Ma",
"Yi",
""
],
[
"Tafazolli",
"Rahim",
""
]
] |
2504.19174 | Xueqi Ma | Xueqi Ma, Yilin Liu, Tianlong Gao, Qirui Huang, Hui Huang | CLR-Wire: Towards Continuous Latent Representations for 3D Curve
Wireframe Generation | ACM SIGGRAPH 2025 (Patent Protected); Project page:
https://vcc.tech/research/2025/CLRWire | null | null | null | cs.GR cs.CV | http://creativecommons.org/licenses/by/4.0/ | We introduce CLR-Wire, a novel framework for 3D curve-based wireframe
generation that integrates geometry and topology into a unified Continuous
Latent Representation. Unlike conventional methods that decouple vertices,
edges, and faces, CLR-Wire encodes curves as Neural Parametric Curves along
with their topological connectivity into a continuous and fixed-length latent
space using an attention-driven variational autoencoder (VAE). This unified
approach facilitates joint learning and generation of both geometry and
topology. To generate wireframes, we employ a flow matching model to
progressively map Gaussian noise to these latents, which are subsequently
decoded into complete 3D wireframes. Our method provides fine-grained modeling
of complex shapes and irregular topologies, and supports both unconditional
generation and generation conditioned on point cloud or image inputs.
Experimental results demonstrate that, compared with state-of-the-art
generative approaches, our method achieves substantial improvements in
accuracy, novelty, and diversity, offering an efficient and comprehensive
solution for CAD design, geometric reconstruction, and 3D content creation.
| [
{
"version": "v1",
"created": "Sun, 27 Apr 2025 09:32:42 GMT"
},
{
"version": "v2",
"created": "Thu, 1 May 2025 13:59:59 GMT"
},
{
"version": "v3",
"created": "Sat, 3 May 2025 07:24:20 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Ma",
"Xueqi",
""
],
[
"Liu",
"Yilin",
""
],
[
"Gao",
"Tianlong",
""
],
[
"Huang",
"Qirui",
""
],
[
"Huang",
"Hui",
""
]
] |
2504.19262 | Cong Zhou | Cong Zhou and Changsheng You and Shuo Shi and Jiasi Zhou and Chenyu Wu | Super-resolution Wideband Beam Training for Near-field Communications
with Ultra-low Overhead | null | null | null | null | eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a super-resolution wideband beam training method
for near-field communications, which is able to achieve ultra-low overhead. To
this end, we first study the multi-beam characteristic of a sparse uniform
linear array (S-ULA) in the wideband. Interestingly, we show that this leads to
a new beam pattern property, called rainbow blocks, where the S-ULA generates
multiple grating lobes and each grating lobe is further splitted into multiple
versions in the wideband due to the well-known beam-split effect. As such, one
directional beamformer based on S-ULA is capable of generating multiple rainbow
blocks in the wideband, hence significantly extending the beam coverage. Then,
by exploiting the beam-split effect in both the frequency and spatial domains,
we propose a new three-stage wideband beam training method for extremely
large-scale array (XL-array) systems. Specifically, we first sparsely activate
a set of antennas at the central of the XL-array and judiciously design the
time-delay (TD) parameters to estimate candidate user angles by comparing the
received signal powers at the user over subcarriers. Next, to resolve the
angular ambiguity introduced by the S-ULA, we activate all antennas in the
central subarray and design an efficient subcarrier selection scheme to
estimate the true user angle. In the third stage, we resolve the user range at
the estimated user angle with high resolution by controlling the splitted beams
over subcarriers to simultaneously cover the range domain. Finally, numerical
results are provided to demonstrate the effectiveness of proposed wideband beam
training scheme, which only needs three pilots in near-field beam training,
while achieving near-optimal rate performance.
| [
{
"version": "v1",
"created": "Sun, 27 Apr 2025 14:42:01 GMT"
},
{
"version": "v2",
"created": "Fri, 2 May 2025 18:08:38 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Zhou",
"Cong",
""
],
[
"You",
"Changsheng",
""
],
[
"Shi",
"Shuo",
""
],
[
"Zhou",
"Jiasi",
""
],
[
"Wu",
"Chenyu",
""
]
] |
2504.19267 | Dmitry Ignatov PhD | Mohamed Gado, Towhid Taliee, Muhammad Memon, Dmitry Ignatov, Radu
Timofte | VIST-GPT: Ushering in the Era of Visual Storytelling with LLMs? | null | null | null | null | cs.CL cs.AI cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Visual storytelling is an interdisciplinary field combining computer vision
and natural language processing to generate cohesive narratives from sequences
of images. This paper presents a novel approach that leverages recent
advancements in multimodal models, specifically adapting transformer-based
architectures and large multimodal models, for the visual storytelling task.
Leveraging the large-scale Visual Storytelling (VIST) dataset, our VIST-GPT
model produces visually grounded, contextually appropriate narratives. We
address the limitations of traditional evaluation metrics, such as BLEU,
METEOR, ROUGE, and CIDEr, which are not suitable for this task. Instead, we
utilize RoViST and GROOVIST, novel reference-free metrics designed to assess
visual storytelling, focusing on visual grounding, coherence, and
non-redundancy. These metrics provide a more nuanced evaluation of narrative
quality, aligning closely with human judgment.
| [
{
"version": "v1",
"created": "Sun, 27 Apr 2025 14:55:51 GMT"
},
{
"version": "v2",
"created": "Sat, 3 May 2025 08:32:16 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Gado",
"Mohamed",
""
],
[
"Taliee",
"Towhid",
""
],
[
"Memon",
"Muhammad",
""
],
[
"Ignatov",
"Dmitry",
""
],
[
"Timofte",
"Radu",
""
]
] |
2504.19442 | Size Zheng | Size Zheng, Wenlei Bao, Qi Hou, Xuegui Zheng, Jin Fang, Chenhui Huang,
Tianqi Li, Haojie Duanmu, Renze Chen, Ruifan Xu, Yifan Guo, Ningxin Zheng,
Ziheng Jiang, Xinyi Di, Dongyang Wang, Jianxi Ye, Haibin Lin, Li-Wen Chang,
Liqiang Lu, Yun Liang, Jidong Zhai, Xin Liu | Triton-distributed: Programming Overlapping Kernels on Distributed AI
Systems with the Triton Compiler | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this report, we propose Triton-distributed, an extension of existing
Triton compiler, to overcome the programming challenges in distributed AI
systems. Triton-distributed is the first compiler that supports native
overlapping optimizations for distributed AI workloads, providing a good
coverage of existing optimizations from different frameworks. First, we
integrate communication primitives compliant with the OpenSHMEM standard into
the compiler. This enables programmers to utilize these primitives with a
higher-level Python programming model. Second, we illustrate how to achieve
complex joint optimization of computation, memory access, and communication
with the assistance of the compiler. In particular, we show how to use
overlapping techniques to hide latency and present our compiler-based
programming methods in both single-node and multi-node scenarios. Finally, we
showcase the performance of the code generated by our compiler. In a test
environment with up to 64 devices, our compiler can fully utilize heterogeneous
communication and computation resources to provide effective overlapping and
high performance. In many cases, the performance of the generated code can even
outperform hand-optimized code. Moreover, the development difficulty and the
time cost for development using our compiler are far less than those of
low-level programming such as CUDA/C++, which clearly demonstrates significant
productivity advantages.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2025 03:09:22 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 08:05:49 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Zheng",
"Size",
""
],
[
"Bao",
"Wenlei",
""
],
[
"Hou",
"Qi",
""
],
[
"Zheng",
"Xuegui",
""
],
[
"Fang",
"Jin",
""
],
[
"Huang",
"Chenhui",
""
],
[
"Li",
"Tianqi",
""
],
[
"Duanmu",
"Haojie",
""
],
[
"Chen",
"Renze",
""
],
[
"Xu",
"Ruifan",
""
],
[
"Guo",
"Yifan",
""
],
[
"Zheng",
"Ningxin",
""
],
[
"Jiang",
"Ziheng",
""
],
[
"Di",
"Xinyi",
""
],
[
"Wang",
"Dongyang",
""
],
[
"Ye",
"Jianxi",
""
],
[
"Lin",
"Haibin",
""
],
[
"Chang",
"Li-Wen",
""
],
[
"Lu",
"Liqiang",
""
],
[
"Liang",
"Yun",
""
],
[
"Zhai",
"Jidong",
""
],
[
"Liu",
"Xin",
""
]
] |
2504.19451 | Ali Saraeb | Ali Saraeb | Artificial Intelligence in Number Theory: LLMs for Algorithm Generation
and Ensemble Methods for Conjecture Verification | null | null | null | null | math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents two applications of Artificial Intelligence to number
theory.
Part I: We evaluate the state-of-the-art LLM Qwen2.5-Math-7B-Instruct on 30
algorithmic and 30 computational number theory problems. The model achieves at
least 0.95 accuracy on every problem with an optimal non-spoiling hint. For a
fixed hint strategy, mean accuracies are 0.88 and 0.89 on algorithmic and
computational tasks respectively. We introduce the Hinted Algorithmic Number
Theory (HANT) dataset and release code and data at doi:10.5281/zenodo.15293187.
Part II: We empirically verify the folklore conjecture that the modulus q of
a Dirichlet character chi is uniquely determined by its initial nontrivial
zeros in small modulus regimes. Using data from LMFDB, we formulate a
classification problem with feature vectors derived from initial zeros and
labels given by q. A feed-forward neural network and random forest classifier,
combined via a meta-ensemble, achieve perfect test accuracy of 1.0 when
appropriate zero statistics are included. Based on these results, we propose
two new conjectures: (i) hidden statistical patterns exist in the nontrivial
zeros of each Dirichlet L-function; (ii) an underlying statistical connection
links zeros of L-functions of characters sharing the same modulus. Code and
data are available at doi:10.5281/zenodo.15293203.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2025 03:36:47 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 22:19:56 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Saraeb",
"Ali",
""
]
] |
2504.19501 | Lili Yang | Lili Yang, Longlong Feng and Pengming Zhang | Spin-Orbit Coupling in Helical Waveguides: A Local Duality Perspective
and Emergent Gauge Fields | null | null | null | null | physics.optics | http://creativecommons.org/licenses/by/4.0/ | Dual symmetry is an intrinsic property of Maxwell's equations, corresponding
to a global U(1) symmetry in vacuum, with helicity as the associated conserved
quantity. In this paper, we investigate light propagation in a spin-degenerate
medium using a field-theoretical approach and introduce an effective gauge
field A_s that emerges from the localization of dual symmetry. Within the
geometric optics approximation, we show that the helical trajectory of light
rays reveals this gauge field as a manifestation of spin-orbit coupling.
Although orbital-orbit coupling also arises in such systems, the spin-orbit
interaction possesses deeper physical significance, as it originates from the
intrinsic dual symmetry embedded in Maxwell's equations.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2025 05:43:36 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 06:20:22 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Yang",
"Lili",
""
],
[
"Feng",
"Longlong",
""
],
[
"Zhang",
"Pengming",
""
]
] |
2504.19507 | Aimin Li | Aimin Li, Shaohua Wu, Gary C.F. Lee, and Sumei Sun | From Freshness to Effectiveness: Goal-Oriented Sampling for Remote
Decision Making | 35 pages. Submitted to the IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data freshness, measured by Age of Information (AoI), is highly relevant in
networked applications such as Vehicle to Everything (V2X), smart health
systems, and Industrial Internet of Things (IIoT). Yet, freshness alone does
not equate to informativeness. In decision-critical settings, some stale data
may prove more valuable than fresh updates. To explore this nuance, we move
beyond AoI-centric policies and investigate how data staleness impacts
decision-making under data-staleness-induced uncertainty. We pose a central
question: What is the value of information, when freshness fades, and only its
power to shape remote decisions remains? To capture this endured value, we
propose AR-MDP, an Age-aware Remote Markov Decision Process framework, which
co-designs optimal sampling and remote decision-making under a sampling
frequency constraint and random delay. To efficiently solve this problem, we
design a new two-stage hierarchical algorithm namely Quick
Bellman-Linear-Program (QuickBLP), where the first stage involves solving the
Dinkelbach root of a Bellman variant and the second stage involves solving a
streamlined linear program (LP). For the tricky first stage, we propose a new
One-layer Primal-Dinkelbach Synchronous Iteration (OnePDSI) method, which
overcomes the re-convergence and non-expansive divergence present in existing
per-sample multi-layer algorithms. Through rigorous convergence analysis of our
proposed algorithms, we establish that the worst-case optimality gap in OnePDSI
exhibits exponential decay with respect to iteration $K$ at a rate of
$\mathcal{O}(\frac{1}{R^K})$. Through sensitivity analysis, we derive a
threshold for the sampling frequency, beyond which additional sampling does not
yield further gains in decision-making. Simulation results validate our
analyses.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2025 06:17:09 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 13:52:32 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Li",
"Aimin",
""
],
[
"Wu",
"Shaohua",
""
],
[
"Lee",
"Gary C. F.",
""
],
[
"Sun",
"Sumei",
""
]
] |
2504.19555 | Cong Zhou | Tianyu Liu and Changsheng You and Cong Zhou and Yunpu Zhang and Shiqi
Gong and Heng Liu and Guangchi Zhang | Physical-Layer Security in Mixed Near-Field and Far-Field Communication
Systems | null | null | null | null | eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Extremely large-scale arrays (XL-arrays) have emerged as a promising
technology to improve the spectrum efficiency and spatial resolution of future
wireless systems. Different from existing works that mostly considered physical
layer security (PLS) in either the far-field or near-field, we consider in this
paper a new and practical scenario, where legitimate users (Bobs) are located
in the far-field of a base station (BS) while eavesdroppers (Eves) are located
in the near-field for intercepting confidential information at short distance,
referred to as the mixed near-field and far-field PLS. Specifically, we
formulate an optimization problem to maximize the sum-secrecy-rate of all Bobs
by optimizing the power allocation of the BS, subject to the constraint on the
total BS transmit power. To shed useful insights, we first consider a
one-Bob-one-Eve system and characterize the insecure-transmission region of the
Bob in closed form. Interestingly, we show that the insecure-transmission
region is significantly \emph{expanded} as compared to that in conventional
far-field PLS systems, due to the energy-spread effect in the mixed-field
scenario. Then, we further extend the analysis to a two-Bob-one-Eve system. It
is revealed that as compared to the one-Bob system, the interferences from the
other Bob can be effectively used to weaken the capability of Eve for
intercepting signals of target Bobs, thus leading to enhanced secrecy rates.
Furthermore, we propose an efficient algorithm to obtain a high-quality
solution to the formulated non-convex problem by leveraging the successive
convex approximation (SCA) technique. Finally, numerical results demonstrate
that our proposed algorithm achieves a higher sum-secrecy-rate than the
benchmark scheme where the power allocation is designed based on the
(simplified) far-field channel model.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2025 08:00:36 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 15:26:53 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Liu",
"Tianyu",
""
],
[
"You",
"Changsheng",
""
],
[
"Zhou",
"Cong",
""
],
[
"Zhang",
"Yunpu",
""
],
[
"Gong",
"Shiqi",
""
],
[
"Liu",
"Heng",
""
],
[
"Zhang",
"Guangchi",
""
]
] |
2504.19580 | Renju Feng | Renju Feng, Ning Xi, Duanfeng Chu, Rukang Wang, Zejian Deng, Anzheng
Wang, Liping Lu, Jinxiang Wang, Yanjun Huang | ARTEMIS: Autoregressive End-to-End Trajectory Planning with Mixture of
Experts for Autonomous Driving | null | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents ARTEMIS, an end-to-end autonomous driving framework that
combines autoregressive trajectory planning with Mixture-of-Experts (MoE).
Traditional modular methods suffer from error propagation, while existing
end-to-end models typically employ static one-shot inference paradigms that
inadequately capture the dynamic changes of the environment. ARTEMIS takes a
different method by generating trajectory waypoints sequentially, preserves
critical temporal dependencies while dynamically routing scene-specific queries
to specialized expert networks. It effectively relieves trajectory quality
degradation issues encountered when guidance information is ambiguous, and
overcomes the inherent representational limitations of singular network
architectures when processing diverse driving scenarios. Additionally, we use a
lightweight batch reallocation strategy that significantly improves the
training speed of the Mixture-of-Experts model. Through experiments on the
NAVSIM dataset, ARTEMIS exhibits superior competitive performance, achieving
87.0 PDMS and 83.1 EPDMS with ResNet-34 backbone, demonstrates state-of-the-art
performance on multiple metrics.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2025 08:41:08 GMT"
},
{
"version": "v2",
"created": "Sun, 4 May 2025 09:51:07 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Feng",
"Renju",
""
],
[
"Xi",
"Ning",
""
],
[
"Chu",
"Duanfeng",
""
],
[
"Wang",
"Rukang",
""
],
[
"Deng",
"Zejian",
""
],
[
"Wang",
"Anzheng",
""
],
[
"Lu",
"Liping",
""
],
[
"Wang",
"Jinxiang",
""
],
[
"Huang",
"Yanjun",
""
]
] |
2504.19589 | Daniele Rege Cambrin | Daniele Rege Cambrin, Luca Colomba, Paolo Garza | Magnifier: A Multi-grained Neural Network-based Architecture for Burned
Area Delineation | Accepted in IEEE Journal of Selected Topics in Applied Earth
Observations and Remote Sensing | null | 10.1109/jstars.2025.3565819 | null | cs.CV eess.IV | http://creativecommons.org/licenses/by/4.0/ | In crisis management and remote sensing, image segmentation plays a crucial
role, enabling tasks like disaster response and emergency planning by analyzing
visual data. Neural networks are able to analyze satellite acquisitions and
determine which areas were affected by a catastrophic event. The problem in
their development in this context is the data scarcity and the lack of
extensive benchmark datasets, limiting the capabilities of training large
neural network models. In this paper, we propose a novel methodology, namely
Magnifier, to improve segmentation performance with limited data availability.
The Magnifier methodology is applicable to any existing encoder-decoder
architecture, as it extends a model by merging information at different
contextual levels through a dual-encoder approach: a local and global encoder.
Magnifier analyzes the input data twice using the dual-encoder approach. In
particular, the local and global encoders extract information from the same
input at different granularities. This allows Magnifier to extract more
information than the other approaches given the same set of input images.
Magnifier improves the quality of the results of +2.65% on average IoU while
leading to a restrained increase in terms of the number of trainable parameters
compared to the original model. We evaluated our proposed approach with
state-of-the-art burned area segmentation models, demonstrating, on average,
comparable or better performances in less than half of the GFLOPs.
| [
{
"version": "v1",
"created": "Mon, 28 Apr 2025 08:51:54 GMT"
}
] | 2025-05-06T00:00:00 | [
[
"Cambrin",
"Daniele Rege",
""
],
[
"Colomba",
"Luca",
""
],
[
"Garza",
"Paolo",
""
]
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.