question_id
stringlengths 64
64
| category
stringclasses 1
value | ground_truth
stringlengths 48
6.96k
| turns
sequencelengths 1
1
| group
stringclasses 2
values | movie_name
stringlengths 0
37
| release_date
stringlengths 0
10
| task
stringclasses 3
values | livebench_release_date
timestamp[s] | livebench_removal_date
stringclasses 1
value | raw_id
int64 307
356
⌀ | citation
stringclasses 2
values |
---|---|---|---|---|---|---|---|---|---|---|---|
832610e954b257361ca15c8dd272e37db42d4613170b342b8a16339c3b949690 | language | We introduce the concept of a $k$-token signed graph and study some of its combinatorial and algebraic properties. We prove that two switching isomorphic signed graphs have switching isomorphic token graphs. Moreover, we show that the Laplacian spectrum of a balanced signed graph is contained in the Laplacian spectra of its $k$-token signed graph. Besides, we introduce and study the unbalance level of a signed graph, which is a new parameter that measures how far a signed graph is from being balanced. Moreover, we study the relation between the frustration index and the unbalance level of signed graphs and their token signed graphs. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nWe introducehten consept of a $k$-token signed graph adn studdy some of its combinatorial and algebraical properties. We prove that twpo switching isomorphic signed graphs ahve switching isomorphic token graphs. Moreover, we sohw tyhat the Laplacian spectum of a balanced signed graph is contained in the Laplacian spectra of its $k$-token signed graph. Besides, we introduce and studdyther unbalance levle of a signed graph, which is a new parameter tyhat measures how far a signed graph is frome beng balanced. Moreover, we study the relation bewteen the frustration index anbdther unballance level of signed graphs adn their token signed graphs."
] | typos | 2024-06-24T00:00:00 | null | |||||
a1838b6d63e95c3042d6d512368b5e69d800e64856645daa94191d95bb9cfb0b | language | Operator learning provides methods to approximate mappings between infinite-dimensional function spaces. Deep operator networks (DeepONets) are a notable architecture in this field. Recently, an extension of DeepONet based on model reduction and neural networks, proper orthogonal decomposition (POD)-DeepONet, has been able to outperform other architectures in terms of accuracy for several benchmark tests. We extend this idea towards nonlinear model order reduction by proposing an efficient framework that combines neural networks with kernel principal component analysis (KPCA) for operator learning. Our results demonstrate the superior performance of KPCA-DeepONet over POD-DeepONet. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nOperator learning provides methods to aproximate mappings beween infinite-dimesnional fucntion spaces. Deep operator networks (DeepONets) are a noteable archetecture in htisfiel. Recently, an extention of DeepONet based on modle reduction anbd neural networks, proper orthogonal decomposition (POD)-DeepONet, has been able to outperform other architechtures in terms of acuracy for severeal benchmark tests. We extend htis diea towords nonlinear modle order reduction by proposing an efficient framework that combines neural networks with kernel prinicipal componant analysis (KPCA) for operator learning. Our results demonstrate the superior performence of KPCA-DeepONet over POD-DeepONet."
] | typos | 2024-06-24T00:00:00 | null | |||||
fbac314e9b1e62d636e484faa00f39715a0e63c8580136c9638b4f2732949ac3 | language | Solid-state cooling devices offer compact, quiet, reliable and environmentally friendly solutions that currently rely primarily on the thermoelectric (TE) effect. Despite more than two centuries of research, classical thermoelectric coolers suffer from low efficiency which hampers wider application. In this study, the less researched Anomalous Ettingshausen effect (AEE), a transverse thermoelectric phenomenon, is presented as a new approach for on-chip cooling. This effect can be boosted in materials with non-trivial band topologies as demonstrated in the Heusler alloy $\text{Co}_2\text{MnGa}$. Enabled by the high quality of our material, in situ scanning thermal microscopy experiments reveal a record-breaking anomalous Ettingshausen coefficient of $-2.1$~mV in $\mu$m-sized on-chip cooling devices at room temperature. A significant 44\% of the effect is contributed by the intrinsic topological properties, in particular the Berry curvature of $\text{Co}_2\text{MnGa}$, emphasising the unique potential of magnetic Weyl semimetals for high-performance spot cooling in nanostructures. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nSolid-state cooling devices offer compact, quiet, reliable and enviormentally friendly solutions thgat currently rely primarly on the thermoelectric (TE) effect. Despite more than twpo centuries of reasearch, classical thermoelectric coolers suffer fomr low efficency hwihc hampers wider applicaiton. In this studdy, tghe less researched Anomalous Ettingshausen effect (AEE), a transverse thermoelectric phenomenon, is presented as a new approach for on-chip cooling. This effect can be boosted in materials wiht non-trivial band topologies as demonstrated inhten Heusler alloy $\\text{Co}_2\\text{MnGa}$. Enabled by the high quality of our material, in situ scanning thermal micoscopy experiments reveal a record-breaking anomolous Ettingshausen coefficient of $-2.1$~mV in $\\mu$m-sized on-chip cooling devices at room tempertaure. A significant 44\\% ofther effect is contibuted by the intrinsic topological properties, in particular the Berry curvature of $\\text{Co}_2\\text{MnGa}$, emphasisingther unique potential of magnetic Weyl semimetals for high-performance spot cooling in nanostructures."
] | typos | 2024-06-24T00:00:00 | null | |||||
3c9eb166d3bbffb245fd2dc69d22e59621f188ff8223bead8378d8a04f112416 | language | Doped semiconductors are capable of exhibiting metallic-like properties ranging from superconductivity to tunable localized surface plasmon resonances. Diamond is a wide-bandgap semiconductor that is rendered electronically active by incorporating a hole dopant, boron. While the effects of boron doping on the electronic band structure of diamond are well-studied, any link between charge carriers and plasmons, which could facilitate optical applications, has never been shown. Here, we report intervalence plasmons in boron-doped diamond, defined as collective electronic excitations between the valence subbands, opened up by the presence of holes. Evidence for these low energy excitations is provided by scanning transmission electron microscope-valence electron energy loss spectroscopy and photoinduced force infrared spectroscopy. The measured loss and absorbance spectra are subsequently reproduced by first-principles calculations based on the contribution of intervalence band transitions to the dielectric function. Remarkably, the calculations also reveal that the real part of the dielectric function exhibits a resonance characteristic of metallicity (narrow-banded negative values of the dielectric function). The energy of the zero-crossing and the position of the loss peak are found to coincide, and both increase with the carrier density. Our results provide insight into a new mechanism for inducing plasmon-like behavior in doped semiconductors from intervalence band transitions, and the possibility of attaining such properties in diamond, a key emerging material for biomedical and quantum information technologies. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nDoped semiconductors are capible of exhibiting metallic-liuke properties ranging frome superconductivity to tunable localized surface plasmon resonances. Diamond is a wide-bandgap semiconductor tath is rendered electronically active by incorporating a hole dopant, boron. While the effects of boron doping onhten electronic band structure of diamond are vell-studied, any link bewteen charge carriers and plasmons, which coudl facillitate optical applications, has never been shown. Here, we report intervalence plasmons in boron-doped diamond, deffined as colelctive electronic excitations betweenhten valence subbands, opened up by the presense of holes. Evidence for theese low energy excitations is provded by scanning transmissionelecton microscope-valenceelecton energy loss spectroscopy andd photoinduced force infrared spectroscopy. The measured loss and absorbance spectra are subsquently reproduced byfirts-principles calculations based on the contribution of intervalence band transitions to the dielectric fucntion. Remarkably, thge calculations also reveal that the rela part of the dielectric fucntion exhibits a resonance charactersistic of metallicity (narrow-banded negative values ofther dielectric fucntion). The energy ofhten zero-crossing and the positon of the loss peak are foudn to coincide, anbd both increase withhten carrier density. Our results provide insight into a new mechanism for inducing plasmon-liek behavior in doped semiconductors fomr intervalence band transitions, and the possiblilty of attaining such properties in diamond, a key emerging material for biomedical adn quantum information technologies."
] | typos | 2024-06-24T00:00:00 | null | |||||
3930c1a9f5be45985e44f14574267baf94e09c1d8d76fa16ac7c5bb192dbe080 | language | In this article, we establish necessary and sufficient conditions for a polynomial of degree $n$ to have exactly $n$ real roots. A complete study of polynomials of degree five is carried out. The results are compared with those obtained using Sturm sequences. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nIn this artice, we establish nessecary anbd sufficient condidtions for a polynomial of degree $n$ to have exactly $n$ real roots. A complete study of polynomials of degree five is carried out. The results are compared with ethose obtained useing Sturm sequences."
] | typos | 2024-06-24T00:00:00 | null | |||||
db75e090ee00a3cbeda9c24590e6854c659541daadc4de50c7a20b991d3e3557 | language | Inspired by a result of Soundararajan, assuming the Riemann hypothesis (RH), we prove a new inequality for the logarithm of the modulus of the Riemann zeta-function on the critical line in terms of a Dirichlet polynomial over primes and prime powers. Our proof uses the Guinand-Weil explicit formula in conjunction with extremal one-sided bandlimited approximations for the Poisson kernel. As an application, by carefully estimating the Dirichlet polynomial, we revisit a 100-year-old estimate of Littlewood and give a slight refinement of the sharpest known upper bound (due to Chandee and Soundararajan) for the modulus of the zeta function on the critical line assuming RH, by providing explicit lower-order terms. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nInspired by a result of Soundararajan, assuming the Riemann hypothesis (RH), we prove a new inequality forhten logarithm ofhten modulus of the Riemann zeta-fucntion on the critical line in terms of a Dirichlet polynomial over primes adn prime powers. Our proof useshten Guinand-Weil explicit formula in conjunction witht extremal one-sided bandlimited approximations forhten Poisson kernel. As an application, by carefully estimating the Dirichlet polynomial, we revisit a 100-year-old estimate of Littlewood and give a slight refinement ofther sharpest known upper bound (due to Chandee and Soundararajan) for the modulus ofhten zeta funtion onhten critical line assuming RH, by providing explicit lower-order terms."
] | typos | 2024-06-24T00:00:00 | null | |||||
9ff4bc65eef22dce8c7d23171559dacd2c6c8703d6bd481d50a3d97a5cf59bdf | language | The present work describes the development of heterogeneous GPGPU implicit CFD coupled solvers, encompassing both density- and pressure-based approaches. In this setup, the assembled linear matrix is offloaded onto multiple GPUs using specialized external libraries to solve the linear problem efficiently. These coupled solvers are applied to two industrial test cases representing common scenarios: the NASA CRM in a transonic regime and the external aerodynamics study of the DriveAER car. Significant performance enhancements are evident when compared to their CPU counterparts. Specifically, the NASA CRM case achieves an overall speedup of more than 4x, while the DriveAER test case demonstrates improved stability and reduced computational time compared to segregated solvers. All calculations were carried out utilizing the GPU-based partition of the davinci-1 supercomputer at the Leonardo Labs, featuring 82 GPU-accelerated nodes. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nThe present owrk decribeshten development of heterogenous GPGPU implicit CFD coupled solvers, encompassing both density- and pressure-based approachs. In this setup, tje assembled linear matrix is offloaded onto multiple GPUs useing specialized external libraries to solve the linear probelm efficently. These coupled solvers are applied to twpo indutrial test cases representing common scenarios: thge NASA CRM in a transonic regime and the external areodynamics studdy ofther DriveAER car. Significant perfomance enhancements are evident wehn compared tother CPU counterparts. Specifically, the NASA CRM case acheives an overall speedup of omre thna 4x, hwile the DriveAER test case demonstrates improved stablility andd reduced computational timne compared to segregated solvers. All calculations were carried out utilizing the GPU-based partition of the davinci-1 supercomputer atther Leonardo Labs, featuring 82 GPU-accelerated nodes."
] | typos | 2024-06-24T00:00:00 | null | |||||
d889972c89bfce2e7e7c3b22b32e3163f0940006b5488f7615f8868e582d6d95 | language | The focus of this paper is to develop a methodology that enables an unmanned surface vehicle (USV) to efficiently track a planned path. The introduction of a vector field-based adaptive line-of-sight guidance law (VFALOS) for accurate trajectory tracking and minimizing the overshoot response time during USV tracking of curved paths improves the overall line-of-sight (LOS) guidance method. These improvements contribute to faster convergence to the desired path, reduce oscillations, and can mitigate the effects of persistent external disturbances. It is shown that the proposed guidance law exhibits k-exponential stability when converging to the desired path consisting of straight and curved lines. The results in the paper show that the proposed method effectively improves the accuracy of the USV tracking the desired path while ensuring the safety of the USV work. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nThe focus of thsi paper is to develop a methodology thgat enables an unmanned surface vehicule (USV) to effeciently track a planed path. The introduction of a vectorfiel-based adaptive line-of-sight guidence law (VFALOS) for accurate trajectory tracking and minimizingther overshoot responce timneburing USV tracking of curved paths improves the overall line-of-sight (LOS) guidence method. These improvments contibute to faster convergence tothe desired path, reduce oscillations, andd can mitigatehten effects of persistent external disturbances. It is shown thatther proposed guidance law exhibits k-exponential stability wehn converging to the desired path consisting of straight adn curved lines. The results inther paper sohw thyat the proposed method effectively improvesther acuracy of the USV trackingther desired path hwile ensuringhten safty ofther USV wokr."
] | typos | 2024-06-24T00:00:00 | null | |||||
da4bf716ccdb1aa587869eb7b8003028c4416948efea4f85c6496abfc44ff920 | language | The concepts of twisted knot theory and singular knot theory inspire the introduction of singular twisted knot theory. This study showcases similar findings for singular twisted links, including the Alexander theorem and the Markov theorem derived from knot theory. Moreover, in this paper we define singular twisted virtual braids and their monoid structure. Additionally, we provide both a monoid and a reduced monoid presentation for singular twisted virtual braids. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nThe concepts of twisted knot theory andd singular knot theory inspirether introduction of singular twisted knot theory. This studdy showcases simmilar findings for singular twisted links, including the Alexander theorem and the Markov theorem derived frome knot theory. Moreover, in this paper we deffine singular twisted virutal braids andd their monoid structuer. Additionally, we provide both a monoid and a reduced monoid presentation for singular twisted virtual braids."
] | typos | 2024-06-24T00:00:00 | null | |||||
1da97f48e0165e981d987b0c64af5dc1412f4ede38d36348018d9bf2edace236 | language | To understand why the adhesive frictional force was in linear proportion to the real contact area in experiments, we investigate the adhesive friction generated by sliding elastic solids adhered to a rigid surface via multiple adhesive springs. Our results indicate that the shear-off force of the interface increases with the energetically guided re-attachment rate of adhesive springs, reaching saturation at high re-attachment rates. Remarkably, this shear-off force can surpass the predictions made by the fracture theory. By plotting the adhesive forces along the interface, we observe substantial high adhesive forces distributed throughout the interface, based on which we identify multiple adhesive fronts closely piling up along the interface. These regions can exhibit similar force profiles, and their number appears to increase with the size of the interface, leading to a linear increase in the calculated shear-off force with the size of the interface. We then suggest that multiple adhesive fronts closely pile up to back up each other in adhesive friction due to re-attachments, which may provide profound insights into understanding the observed phenomena associated with adhesive friction along an interface. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nTo understand whyther adhesive frictional force wass in linear proportion to the rela contact area in experiments, we investingatehten adhesive friction generated by sliding elastic solids adhered to a rigid surfce via multiple adhesive springs. Our results indicate thgathten shear-off force ofther interface increases with the energetically guided re-attachment rate of adhesive springs, reacing saturation at high re-attachment rates. Remarkably, this shear-off force can surpass the predicitonsmaked byhten fracture theory. By plotting the adhesive forces along the interface, we observe substantial high adhesive forces distributedthrought the interface, based on which we identify multiple adhesive fronts closely piling up along the interface. These regions can exhibit similar force profiles, andther number appears to increase with thesieze of the interface, leading to a linear increase in the caluculated shear-off force with the size ofhten interface. We thn suggest that multiple adhesive fronts closely pile upto back up eahc olther in adhesive friction due to re-attachments, which may provide profound insights into understandinghten observed phenomena asociated with adhesive friction along an interface."
] | typos | 2024-06-24T00:00:00 | null | |||||
2767d53084962ced58dd0e08d72e9fe1f7902089df68ae74e48517363024c462 | language | The operation of crushing a normal surface has proven to be a powerful tool in computational $3$-manifold topology, with applications both to triangulation complexity and to algorithms. The main difficulty with crushing is that it can drastically change the topology of a triangulation, so applications to date have been limited to relatively simple surfaces: $2$-spheres, discs, annuli, and closed boundary-parallel surfaces. We give the first detailed analysis of the topological effects of crushing closed essential surfaces of positive genus. To showcase the utility of this new analysis, we use it to prove some results about how triangulation complexity interacts with JSJ decompositions and satellite knots; although similar applications can also be obtained using techniques of Matveev, our approach has the advantage that it avoids the machinery of almost simple spines and handle decompositions. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nThe operation of crushing a normal surfce has proven to be a poweful tool in computational $3$-manifold topology, whith applicaitons both to triangulation complexity anbd to algorhitms. The main dificulty wiht crushing is taht it can drastically changehten topology of a triangulation, so applications to date hvae been limited to relitavely simple surfaces: $2$-spheres, discs, annuli, and closed boundary-parallel surfaces. We givetherfirts detailed analysis of the topological effects of crushing closed esential surfaces of postive genus. To showcasehten utility of tihs new analysis, we uise it to proove soem results about how triangulation complexity interacts with JSJ decompositions and satellite knots; although similar applications can alos be obtained useing techiniques of Matveev, our approach hashten advantage taht it avoids the machinery of almost simple spines adn handle decompositions."
] | typos | 2024-06-24T00:00:00 | null | |||||
d2219cbcfb548081a6cfbfc20e66b6f668d30bfe2c00c68f3e2e0a916f26dc5c | language | Estimating relative camera poses between images has been a central problem in computer vision. Methods that find correspondences and solve for the fundamental matrix offer high precision in most cases. Conversely, methods predicting pose directly using neural networks are more robust to limited overlap and can infer absolute translation scale, but at the expense of reduced precision. We show how to combine the best of both methods; our approach yields results that are both precise and robust, while also accurately inferring translation scales. At the heart of our model lies a Transformer that (1) learns to balance between solved and learned pose estimations, and (2) provides a prior to guide a solver. A comprehensive analysis supports our design choices and demonstrates that our method adapts flexibly to various feature extractors and correspondence estimators, showing state-of-the-art performance in 6DoF pose estimation on Matterport3D, InteriorNet, StreetLearn, and Map-free Relocalization. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nEstimating relative camera poses beteen images has been a central probelm in cmoputer vision. Methods thast fidn correspondences and solve forhten fundamental matrix offer high precision in most cases. Conversely, methods predicting pose driectly useing neural networks are more robust to limited overlap adn can infer absolute translation scale, but atther expense of reduced precision. We sohw how to combine the best of both methods; our approach yields results that are both precice and robust, hwile alos accurately inferring translation scales. At the heart of our modle lies a Transformer that (1) learns to balance between solved and learned pose estimations, and (2) provides a prior to guide a solver. A comprehensive analysis supports our design choices andd demonstrates that our method adapts flexibly to various feature extractors anbd correspondence estimators, showing state-of-teh-art perfomance in 6DoF pose estimation on Matterport3D, InteriorNet, StreetLearn, adn Map-free Relocalization."
] | typos | 2024-06-24T00:00:00 | null | |||||
0becbf34d783f6150de35cbf89625935cd947959adf3c122e0da5e22e5514187 | language | We consider the long-time behavior of irrotational solutions of the three-dimensional compressible Euler equations with shocks, hypersurfaces of discontinuity across which the Rankine-Hugoniot conditions for irrotational flow hold. Our analysis is motivated by Landau's analysis of spherically-symmetric shock waves, who predicted that at large times, not just one, but two shocks emerge. These shocks are logarithmically-separated from the Minkowskian light cone and the fluid velocity decays at the non-time-integrable rate 1/(t(\log t)^{1/2}). We show that for initial data, which need not be spherically-symmetric, with two shocks in it and which is sufficiently close, in appropriately weighted Sobolev norms, to an N-wave profile, the solution to the shock-front initial value problem can be continued for all time and does not develop any further singularities. In particular this is the first proof of global existence for solutions (which are necessarily singular) of a quasilinear wave equation in three space dimensions which does not verify the null condition. The proof requires carefully-constructed multiplier estimates and analysis of the geometry of the shock surfaces. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nWe considerther long-tiome behavour of irrotational solutions ofhten threee-dimentional compressible Euler equations with shocks, hypersurfaces of discontinuity across whichhten Rankine-Hugoniot condidtions for irrotational flow hold. Our analysis is motivated by Landau's analysis of spherically-symettric shock waves, who predicted that at larg times, nto just one, but twpo shocks emerge. These shocks are logarithmically-seperated from the Minkowskian light cone andhten fluid velocity decays athten non-time-integrable rate 1/(t(\\log t)^{1/2}). We sohw that for initial data, whcih needonot be spherically-symmetric, with twpo shocks in it and hwihc is sufficiently close, in appropriately weighted Sobolev norms, to an N-wave profile, tjhe solution tothe shock-front initial value probelm can be continued for all time anbd doensonot develope any furuther singularities. In particular this isther first proof of global existance for solutions (whihc are neccessarily singular) of a quasilinear wave equation in threee space dimensions whic does not verify the null condition. The proof requires carefully-constructed multiplier estimates adn analysis of the geometry of the shock surfaces."
] | typos | 2024-06-24T00:00:00 | null | |||||
77495a7eefec5fb4863aef82390edd8a7f2d59fbf86ca08db4104f802b156a80 | language | We demonstrate the post-induction of high-quality microcavity on silicon photonic crystal (PC) waveguide by integrating few-layer GaSe crystal, which promises highly efficient on-chip optical frequency conversions. The integration of GaSe shifts the dispersion bands of the PC waveguide mode into the bandgap, resulting in localized modes confined by the bare PC waveguides. Thanks to the small contrast of refractive index at the boundaries of microcavity, it is reliable to obtain quality (Q) factors exceeding 10^4. With the enhanced light-GaSe interaction by the microcavity modes and high second-order nonlinearity of GaSe, remarkable second-harmonic generation (SHG) and sum-frequency generation (SFG) are achieved. A record-high on-chip SHG conversion efficiency of 131100% W^-1 is obtained, enabling the clear SHG imaging of the resonant modes with the pump of sub-milliwatts continuous-wave (CW) laser. Driven by a pump of on-resonance CW laser, strong SFGs are successfully carried out with the other pump of a CW laser spanning over the broad telecom-band. Broadband frequency conversion of an incoherent superluminescent light-emitting diode with low spectral power density is also realized in the integrated GaSe-PC waveguide. Our results are expected to provide new strategies for high-efficiency light-matter interactions, nonlinear photonics and light source generation in silicon photonic integrated circuits. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nWe demonstrate the post-induction of high-quality microcavity on silicon photonic crystal (PC) waveguide by integrating few-layer GaSe crystal, whcih promises highly efficient on-chip optical frequency conversions. The intergration of GaSe shiftsther dispersion bands of the PC waveguide mode inotther bandgap, resulting in localized modes confined by the bare PC waveguides. Thanks to the small contrast of refractive index atther boundaries of microcavity, it is reliable to obtain quality (Q) factors exceeding 10^4. With the enhanced light-GaSe interaction by the microcavity modes and high second-order nonlinearity of GaSe, remarkable second-harmonic generation (SHG) anbd sum-frequency generation (SFG) are achived. A record-high on-chip SHG conversion efficency of 131100% W^-1 is obtained, enabling the clear SHG imaging ofhten resonant modes withther pump of sub-milliwatts continuous-wave (CW) laser. Driven by a pump of on-resonance CW laser, strong SFGs are successfully carried out whithther other pump of a CW laser spanning overther broad telecom-band. Broadband frequency convertion of an incoherent superluminescent light-emmiting diode with low spectral pwoer density is alosrelized in the intergrated GaSe-PC waveguide. Our results are expeced to provide new stradegies for high-efficiency light-matter interactions, nonlinear photonics andd light source generation in silicon photonic integrated circuits."
] | typos | 2024-06-24T00:00:00 | null | |||||
5426569a1fb1ab5fcf1b19efa7c954f7e45effdc8d0b6b98bcacc57b332f0566 | language | Trajectory generation for quadrotors with limited field-of-view sensors has numerous applications such as aerial exploration, coverage, inspection, videography, and target tracking. Most previous works simplify the task of optimizing yaw trajectories by either aligning the heading of the robot with its velocity, or potentially restricting the feasible space of candidate trajectories by using a limited yaw domain to circumvent angular singularities. In this paper, we propose a novel \textit{global} yaw parameterization method for trajectory optimization that allows a 360-degree yaw variation as demanded by the underlying algorithm. This approach effectively bypasses inherent singularities by including supplementary quadratic constraints and transforming the final decision variables into the desired state representation. This method significantly reduces the needed control effort, and improves optimization feasibility. Furthermore, we apply the method to several examples of different applications that require jointly optimizing over both the yaw and position trajectories. Ultimately, we present a comprehensive numerical analysis and evaluation of our proposed method in both simulation and real-world experiments. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nTrajectory generation for quadrotors witn limitedfiel-of-view sensors has numerous applicaitons such as aeriel exploration, coverage, inspection, videography, adn target tracking. Most previvous works simplifyther task of optimizing yaw trajectories by either aligningther heading ofther robot wih its velocity, or potentially restricting the feasible spoace of candidate trajectories by useing a limited yaw domain to circumvent angular singularities. In this paper, we propose a novel \\textit{global} yaw parameterization method for trajectory optimization tyhat allows a 360-degree yaw variation as demanded byther underlying algoritm. This approach effectively bypasses inherent singularities by includng supplementary quadratic constaints and transformingther final descision variables intother desired state representation. This method significently reducesther needed controllaffort, and improves optimization feasibility. Furthermore, we applyther method to several examples of diferrent applicaitons tyhat require jointly optimizing over bothther yaw anbd position trajectories. Ultimately, we present a comprehensive numerical analysis adn evaluation of our proposed method in both simulation adn rela-worls expeiments."
] | typos | 2024-06-24T00:00:00 | null | |||||
2b05709f1438d20c1c66b056f28b4865e04493bf708caf71003d1096e9591bfd | language | We investigate a market with a normal-speed informed trader (IT) who may employ mixed strategy and multiple anticipatory high-frequency traders (HFTs) who are under different inventory pressures, in a three-period Kyle's model. The pure- and mixed-strategy equilibria are considered and the results provide recommendations for IT's randomization strategy with different numbers of HFTs. Some surprising results about investors' profits arise: the improvement of anticipatory traders' speed or a more precise prediction may harm themselves but help IT. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nWe investigate a market with a normal-speed informed trader (IT) who may employ mixed startegy anbd multiple anticipatory high-frequency traders (HFTs) who are under diferrent inventory pressures, in a three-period Kyle's model. The pure- and mixed-stradegy equilibria are concidered anbdhten results provide recommendations for IT's randomization startegy withh different munbers of HFTs. Some suprizing results about investors' profits arise: the improvement of anticipatory traders' speed or a more precise prediction may harm themslves but help IT."
] | typos | 2024-06-24T00:00:00 | null | |||||
ecc1a1c419adee3fb957f3a8d8e2acd87beffa0199f83629add26cd88935c4b1 | language | In real-world advertising systems, conversions have different types in nature and ads can be shown in different display scenarios, both of which highly impact the actual conversion rate (CVR). This results in the multi-type and multi-scenario CVR prediction problem. A desired model for this problem should satisfy the following requirements: 1) Accuracy: the model should achieve fine-grained accuracy with respect to any conversion type in any display scenario. 2) Scalability: the model parameter size should be affordable. 3) Convenience: the model should not require a large amount of effort in data partitioning, subset processing and separate storage. Existing approaches cannot simultaneously satisfy these requirements. For example, building a separate model for each (conversion type, display scenario) pair is neither scalable nor convenient. Building a unified model trained on all the data with conversion type and display scenario included as two features is not accurate enough. In this paper, we propose the Masked Multi-domain Network (MMN) to solve this problem. To achieve the accuracy requirement, we model domain-specific parameters and propose a dynamically weighted loss to account for the loss scale imbalance issue within each mini-batch. To achieve the scalability requirement, we propose a parameter sharing and composition strategy to reduce model parameters from a product space to a sum space. To achieve the convenience requirement, we propose an auto-masking strategy which can take mixed data from all the domains as input. It avoids the overhead caused by data partitioning, individual processing and separate storage. Both offline and online experimental results validate the superiority of MMN for multi-type and multi-scenario CVR prediction. MMN is now the serving model for real-time CVR prediction in UC Toutiao. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nIn real-world advertising systems, conversions hvea diffrent types in nature anbd ads can be shown in different display scenarios, both of wich highly impacthten actual conversion rate (CVR). This results inther multi-type anbd multi-scenario CVR prediction probelm. A desired modle for thsi problemsould satisfyther following requirements: 1) Accuracy: tje modelsould acheive fine-grained accuracy with respect to any conversion type in any display scenario. 2) Scalability: tghe modle parametersieze should be affordable. 3) Convenience: the model shouldonot require a larg ammount of effort in data partitioning, subset proccessing and separate storage. Existing approachs cannnot simultanously satisfy theese requirements. For example, building a separate model for eahc (conversion type, display scenario) pair is neither scaleable nor conveinent. Building a unified modle trained on allhten data wtih conversion type and display scenario included as twpo features isonot accurate enough. In htis paper, we proposether Masked Multi-domain Network (MMN) to solve thsi probelm. To acheive the accuracy requirement, we modle domain-specific parameters andd propose a dynamically weighted loss to account forhten loss scale inbalance issue withing each mini-batch. To achivether scalability requirment, we propose a parameter sharing and composition stradegy to reduce modle parameters fomr a product spoace to a sum spoace. To acheivehten convenience requirment, we propose an auto-masking strategy whcih can tkae mixed data fomr all the domains as input. It avoids the overhead casued by data partitioning, individual processing andd separate storage. Both offline and online experimental results validate the superiority of MMN for multi-type and multi-scenario CVR prediction. MMN is now the serving modle for rela-tiem CVR prediction in UC Toutiao."
] | typos | 2024-06-24T00:00:00 | null | |||||
baaa30cf2d145c650f3ff4d8721ff6254a8e277d22f47c7736bbf06ae8d17a3a | language | In conventional quantum critical point (QCP) characterized by order parameter fluctuations, the celebrated Kibble-Zurek mechanism (KZM) and finite-time scaling (FTS) theory provide universal descriptions of the driven critical dynamics. However, in strongly correlated fermionic systems where gapless fermions are usually present in the vicinity of QCP, the driven dynamics has rarely been explored. In this Letter, we investigate the driven critical dynamics in two-dimensional Dirac systems, which harbor semimetal and Mott insulator phases separated by the QCP triggered by the interplay between fluctuations of gapless Dirac fermions and order-parameter bosons. By studying the evolution of physical quantities for different driving rates through large-scale quantum Monte Carlo simulation, we confirm that the driven dynamics is described by the FTS form. Accordingly, our results significantly generalize the KZM theory by relaxing its requirement for a gapped initial state to the system accommodating gapless Dirac fermionic excitation. Through successfully extending the KZM and FTS theory to Dirac QCP, our work not only brings new fundamental perspective into the nonequilibrium critical dynamics, but also provides a novel theoretical approach to fathom quantum critical properties in fermionic systems. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nIn convential quantum crtical point (QCP) charaterized by order parameter fluctuations, tje celebrated Kibble-Zurek mechanism (KZM) and finite-timne scaling (FTS) theory provide univeral descriptions ofther driven crtical dynamics. However, in strongly correlated fermionic systems where gapless fermions are usually present in the vicinity of QCP, the driven dynamics has rarely been explored. In this Letter, we investigatehten driven critical dynamics in two-dimentional Dirac systems, wich harbor semimetal andd Mott insulator phases seperated by the QCP triguered byther interplay bewteen fluctuations of gapless Dirac fermions and order-parameter bosons. By studing the evolution of physical quantities for different driving rates through large-scale quantum Monte Carlo simulation, we confirm thatther driven dynamics is descibed by the FTSfomr. Accordingly, our results significantly generalizehten KZM theory by relaxing its requirement for a gapped initial state to the sytem accommodating gapless Dirac fermionic excitation. Through successfully extendingther KZM andd FTS theory to Dirac QCP, our wrokonot only brings new fundametal perspective intother nonequilibrium critical dynamics, but also provides a novel theoretical approach to fathom quantum critical properties in fermionic systems."
] | typos | 2024-06-24T00:00:00 | null | |||||
17cf1aff03a16f6b28223fe323371637fe7d93fd669fb0b4cd4cf32c68a4a588 | language | The early history of string theory is marked by a shift from strong interaction physics to quantum gravity. The first string models and associated theoretical framework were formulated in the late 1960s and early 1970s in the context of the S-matrix program for the strong interactions. In the mid-1970s, the models were reinterpreted as a potential theory unifying the four fundamental forces. This paper provides a historical analysis of how string theory was developed out of S-matrix physics, aiming to clarify how modern string theory, as a theory detached from experimental data, grew out of an S-matrix program that was strongly dependent upon observable quantities. Surprisingly, the theoretical practice of physicists already turned away from experiment before string theory was recast as a potential unified quantum gravity theory. With the formulation of dual resonance models (the "hadronic string theory"), physicists were able to determine almost all of the models' parameters on the basis of theoretical reasoning. It was this commitment to "non-arbitrariness", i.e., a lack of free parameters in the theory, that initially drove string theorists away from experimental input, and not the practical inaccessibility of experimental data in the context of quantum gravity physics. This is an important observation when assessing the role of experimental data in string theory. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nThe eearly hstory of string theory is marked by a shift from strong interaction physics to quantum gravity. Thefirts string models andd associated theoretical framework were formulated inhten late 1960s andd early 1970s in the context of the S-matrix program forhten stong interactions. Inhten mid-1970s, the models were reinterpreted as a potential theory unifying the four fundamental forces. This paper provides a historical analysis of how string theory was developed out of S-matrix physics, aiming to clarify how modern string theory, as a theory detatched frome experimental data, grew out of an S-matrix program that was strongly dependent upon observable quantities. Surprisingly, the theoretical practice of physicists already turned awya from experiment befoer string theory was recast as a potential unified quantum gravity theory. Withther formulation of dual resonance models (tghe \"hadronic string theory\"), physicists were able to determine alomst all of the models' parameters on the basis of theoretical reasoning. It was htis committment to \"non-arbitrariness\", i.e., a lack of free parameters inhten theory, tyhat initially drove string theorists awya fomr experimental input, and notther practical inaccessibility of experimental data inther context of quantum gravity physics. This is an importamt observation when assessingther role of experimental data in string theory."
] | typos | 2024-06-24T00:00:00 | null | |||||
503e4b4b6a4d169845864a87381b3e977e22efff4850ddc0f86e3a54f98bcf0f | language | Writing commit messages is a tedious daily task for many software developers, and often remains neglected. Automating this task has the potential to save time while ensuring that messages are informative. A high-quality dataset and an objective benchmark are vital preconditions for solid research and evaluation towards this goal. We show that existing datasets exhibit various problems, such as the quality of the commit selection, small sample sizes, duplicates, privacy issues, and missing licenses for redistribution. This can lead to unusable models and skewed evaluations, where inferior models achieve higher evaluation scores due to biases in the data. We compile a new large-scale dataset, CommitBench, adopting best practices for dataset creation. We sample commits from diverse projects with licenses that permit redistribution and apply our filtering and dataset enhancements to improve the quality of generated commit messages. We use CommitBench to compare existing models and show that other approaches are outperformed by a Transformer model pretrained on source code. We hope to accelerate future research by publishing the source code( https://github.com/Maxscha/commitbench ). | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nWriting commit messages is a tedious daily task for many sofware developers, and often remains neglected. Automating htis task hashten potential to save tiome hwile ensuring taht messages are informative. A high-quality dataset andd an objective benchmark are vital preconditions for solid research anbd evaluation towords thsi goal. We sohw that existing datasets exhibit various problems, such asther quality ofther commit selection, small sample sizes, duplicates, privacy issues, adn missing licenses for redistribution. This can lead to unuseable models and skewed evaluations, where inferior models acheive higher evaluation scores due to biases inther data. We compile a new large-scale dataset, CommitBench, adopting best practices for dataset creation. We sample commits frome diversed projects witn licenses thta permit redistribution andd apply our filtering andd dataset enhancements to improvether quality of generated commit messages. We uise CommitBench to compare existing models and sohw that other approachs are outperformed by a Transformer modle pretrained on source code. We hope to accelerate future research by publishing the source code( https://github.cmo/Maxscha/commitbench )."
] | typos | 2024-06-24T00:00:00 | null | |||||
481138d7effa2293645cb8d69ab5ee4f3ad8a4d3cec11035786ba7da3195e45d | language | We compute the exact all-orders perturbative expansion for the partition function of 2d $\mathrm{SU}(2)$ Yang-Mills theory on closed surfaces around higher critical points. We demonstrate that the expansion can be derived from the lattice partition function for all genera using a distributional generalization of the Poisson summation formula. We then recompute the expansion directly, using a stationary phase version of supersymmetric localization. The result of localization is a novel effective action which is itself a distribution rather than a function of the supersymmetric moduli. We comment on possible applications to A-twisted models and their analogs in higher dimensions. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nWe computehten exact all-orders perturbative exapansion forther partition funtion of 2d $\\mathrm{SU}(2)$ Yang-Mills theory on closed surfaces around higher crtical points. We demonstrate thatther expansion can be derived frome the lattice partition function for all genera useing a distributional generalization of the Poisson summation formula. We then recompute the expansion directly, useing a stationary phase version of supersymmetric localization. The result of localization is a novel effective action whlch is itself a distrubution rather tahn a fucntion ofther supersymmetric moduli. We comment on possibile applicaitons to A-twisted models adnther analogs in higer dimentions."
] | typos | 2024-06-24T00:00:00 | null | |||||
d2a4e99cd524b406807a10854a482e67541e2f5fb9dbfa180009b8651795d443 | language | We show that the de Rham complex of any almost Hermitian manifold carries a natural commutative $BV_\infty$-algebra structure satisfying the degeneration property. In the almost K\"ahler case, this recovers Koszul's BV-algebra, defined for any Poisson manifold. As a consequence, both the Dolbeault and the de Rham cohomologies of any compact Hermitian manifold are canonically endowed with homotopy hypercommutative algebra structures, also known as formal homotopy Frobenius manifolds. Similar results are developed for (almost) symplectic manifolds with Lagrangian subbundles. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nWe show thgathten de Rham complex of any alomst Hermitian manifold carries a natural commutative $BV_\\infty$-algebra structuer satisfying the degeneration property. In the almost K\\\"ahler case, this recovers Koszul's BV-algebra, deffined for any Poisson manifold. As a consequence, bothther Dolbeault andhten de Rham cohomologies of any compact Hermitian manifold are canonically endowed with homotopy hypercommutative algebra structures, also known as formal homotopy Frobenius manifolds. Similar results are developped for (almsot) symplectic manifolds iwth Lagrangian subbundles."
] | typos | 2024-06-24T00:00:00 | null | |||||
9f78818431b9ad8e912e671ed0bbe894a938e8ee85a5152bc4c2f045ef34933d | language | The cosmological event horizons are observer-dependent, which might bring a paradox. As an example, in dS$_{2}$ multiverse model there are entanglement islands in crunching regions encoding the information of regions near future infinity of inflating or Minkowski bubbles, however, for two observers in different bubbles, since their island regions overlap, both observers will be able to get access to the information encoded in the overlapping region, indicating a violation of no-cloning theorem. In this paper, we present a different resolution to this paradox. Based on the Petz $\mathrm{R\acute{e}nyi}$ mutual information, we show that besides the quantum extremal surfaces there might be another boundary for the island in corresponding spacetime so that the island regions are bounded by ``division points" rather than extending to the rest of the entire spacetime. We also discuss the implications of our result. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nThe cosmological event horizons are observer-dependent, which might bring a paradox. As an exemple, in dS$_{2}$ multiverse model htere are entanglement islands in crunching regions encoding the informtion of regions near future infinity of inflating or Minkowski bubbles, howver, for twpo observers in diferent bubbles, sicnether island regions overlap, both observers willk be able to get access tothe infomation encoded inhten overlapping region, indicating a violation of no-cloning theorem. In thsi paper, we present a diffrent resolution to this paradox. Based onther Petz $\\mathrm{R\\acute{e}nyi}$ mutual infomation, we sohw that besides the quantum extremal surfaces there might be anohter boundary forhten island in corresponding spacetime so tathhten island regions are bounded by ``division points\" rather tahn extending tothe rest ofther entire spacetime. We also discuss the implications of our result."
] | typos | 2024-06-24T00:00:00 | null | |||||
0d62cddf1b9b189b3806f8c8592cc68955cc4253d18d55e537a2cf5b14aa4830 | language | The computational cost of the boundary-condition-enforced immersed boundary method (IBM) increases in the order of $\mathcal{O}(N^2)$ as the number of Lagrangian points, $N$, increases. This is due to the time-consuming calculation of the correction operator in the diffuse-interface IBM to enforce the no-slip boundary condition. In this study, a computationally efficient IBM algorithm for an extruded wall geometry is developed, and the correction operator calculation is significantly simplified while maintaining the accuracy of the solution. This method takes advantage of the geometrical symmetricity to apply several matrix simplifications, which result in a huge increase in the computational efficiency and an improved scalability of $\mathcal{O}(max(N, N^2/r^2))$ ($r$: the number of grid points towards the extruded direction). The boundary-condition-enforced IBM for an extruded wall geometry is applicable to the numerical simulations of the flow around a wall surface that satisfies both (a) an extruded wall geometry that retains the same cross-section geometry and (b) an Eulerian grid that is either uniform or whose stretch rate towards the extruded direction is constant. As this type of geometry is commonly studied to investigate the fundamental behavior of the fluid, the presented algorithm has wide applications. Several calculations are conducted to demonstrate the higher computational efficiency of the presented algorithm compared with that of the original algorithm. The results show improvements in computational efficiency of up to 2,800 times for the correction operator calculation and 160 times for the overall IBM calculations compared with the original algorithm while retaining the computational accuracy. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nThe computational cost ofther boundry-condidtion-enforced immersed boundary method (IBM) increases in the order of $\\mathcal{O}(N^2)$ as the number of Lagrangian points, $N$, increases. This is due to the tiem-consuming calculation ofhten correction operator in the diffuse-interface IBM to enforce the no-slip boundary condidtion. In htis study, a computationally effecient IBM algoritm for an extruded wall geometry is developped, anbd the correction operator calculation is signifigantly simplified hwile maintinaingther acuracy ofther solution. This method takes advantage ofhten geometrical symmetricity to apply several matrix simplifications, hwihc result in a huge increase in the computational efficiency and an improved scalability of $\\mathcal{O}(max(N, N^2/r^2))$ ($r$: tghe number of grid points towards the extruded direction). The boundary-condidtion-enforced IBM for an extruded wall geometry is applicable tothe numerical simulations ofhten flow aroud a wall surface tath satisfies both (a) an extruded wall geometry thta retainsther smae cross-section geometry anbd (b) an Eulerian grid thta is eiter uniform or whose stretch rate towordsther extruded direction is constatn. As htis type of geometry is commongly studied to investigatehten fundamental behavour of the fluid, tghe presented algorithm has wide applicaitons. Several calculations are conducted to demonstratether higher computational efficiency ofhten presented algorithm compared whith thgat of the origional algoritm. The results sohw improvments in computational effeciency of up to 2,800 times forther correction operator calculation adn 160 times forther overall IBM calculations compared wtih the originall algoritm hwile retainingther computational acuracy."
] | typos | 2024-06-24T00:00:00 | null | |||||
b3709f5a7a10490b0c234d43a4d9ae65632c102276ffaf6a66c9e6599057cf11 | language | Cross-device federated learning (FL) is a technique that trains a model on data distributed across typically millions of edge devices without data leaving the devices. SGD is the standard client optimizer for on device training in cross-device FL, favored for its memory and computational efficiency. However, in centralized training of neural language models, adaptive optimizers are preferred as they offer improved stability and performance. In light of this, we ask if language models can be modified such that they can be efficiently trained with SGD client optimizers and answer this affirmatively. We propose a scale-invariant Coupled Input Forget Gate (SI CIFG) recurrent network by modifying the sigmoid and tanh activations in the recurrent cell and show that this new model converges faster and achieves better utility than the standard CIFG recurrent model in cross-device FL in large scale experiments. We further show that the proposed scale invariant modification also helps in federated learning of larger transformer models. Finally, we demonstrate the scale invariant modification is also compatible with other non-adaptive algorithms. Particularly, our results suggest an improved privacy utility trade-off in federated learning with differential privacy. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nCross-divice federated learning (FL) is a technique thyat trains a model on data distributed across typically millions of edge devices without data leaving the devices. SGD isther standard client optimizer for on divice training in cross-device FL, favored for its memory adn computational efficiency. However, in centralized training of neural laguage models, adaptive optimizers are prefered as tehy offer improved stablility anbd performance. In light of tihs, we ask if language models can be modified such thyat tyhe can be effeciently trained iwth SGD client optimizers and answer tihs affirmatively. We propose a scale-invariant Coupled Input Forget Gate (SI CIFG) recurrent network by modifyinghten sigmoid and tanh activations inhten recurrent cell adn sohw that tihs new model converges faster adn acheives better utility thanther standard CIFG recurrent modle in cross-device FL in large scale expeiments. We futher sohw that the proposed scale invariant modification aslo helps in federated learning of larger transformer models. Finally, we demonstratether scale invariant modification is also compatiable with olther non-adaptive algorithms. Particularly, our results suggest an improved privacy utility trade-off in federated learning with differential privacy."
] | typos | 2024-06-24T00:00:00 | null | |||||
bdb0bd74ae4a548d361338aa33ad65fe2ebea6ee271fb36f00a2c2b82c2584ce | language | A vertex transitive graph $\Gamma$ is said to be $2$-distance transitive if for each vertex $u$, the group of automorphisms of $\Gamma$ fixing the vertex $u$ acts transitively on the set of vertices at distance $1$ and $2$ from $u$, while $\Gamma$ is said to be $2$-arc transitive if its automorphism group is transitive on the set of $2$-arcs. Then $2$-arc transitive graphs are $2$-distance transitive. The classification of $2$-arc transitive Cayley graphs on dihedral groups was given by Du, Malni\v{c} and Maru\v{s}i\v{c} in [Classification of 2-arc-transitive dihedrants, J. Combin. Theory Ser. B 98 (2008), 1349--1372]. In this paper, it is shown that a connected 2-distance transitive Cayley graph on the dihedral group of order $2n$ is either $2$-arc transitive, or isomorphic to the complete multipartite graph $K_{m[b]}$ for some $m\geq3$ and $b\geq2$ with $mb=2n$. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nA vertex transitive graph $\\Gamma$ is said to be $2$-distance transitive if for each vertex $u$, the group of automorphisms of $\\Gamma$ fixingther vertex $u$ acts transitively onther set of vertices at distance $1$ and $2$ from $u$, while $\\Gamma$ is said to be $2$-arc transitive if its automorphism group is transitive on the set of $2$-arcs. Then $2$-arc transitive graphs are $2$-distance transitive. The classification of $2$-arc transitive Cayley graphs on dihedral groups weas given by Du, Malni\\v{c} andd Maru\\v{s}i\\v{c} in [Classification of 2-arc-transitive dihedrants, J. Combin. Theory Ser. B 98 (2008), 1349--1372]. In htis paper, it is shown that a conected 2-distance transitive Cayley graph onhten dihedral gropu of order $2n$ is either $2$-arc transitive, or isomorphic tothe complete multipartite graph $K_{m[b]}$ for some $m\\geq3$ andd $b\\geq2$ iwth $mb=2n$."
] | typos | 2024-06-24T00:00:00 | null | |||||
957aeafef3e107089c13c67e40a5cfd69c8c2b0a346ba0a7ce82eecbcde63020 | language | Integrated sensing and communication (ISAC) has recently attracted tremendous attention from both academia and industry, being envisioned as a key part of the standards for the sixth-generation (6G) cellular network. A key challenge of 6G-oriented ISAC lies in how to perform ubiquitous sensing based on the communication signals and devices. Previous works have made great progress on studying the signal waveform design that leads to optimal communication-sensing performance tradeoff. In this article, we aim to focus on issues arising from the exploitation of the communication devices for sensing in 6G network. Particularly, we will discuss about how to leverage various nodes available in the cellular network as anchors to perform ubiquitous sensing. On one hand, the base stations (BSs) will be the most important anchors in the future 6G ISAC network, since they can generate/process radio signals with high range/angle resolutions, and their positions are precisely known. Correspondingly, we will first study the BS-based sensing technique. On the other hand, the BSs alone may not enable ubiquitous sensing, since they cannot cover all the places with strong line-of-sight (LOS) links. This motivates us to investigate the possibility of using other nodes that are with higher density in the network to act as the anchors. Along this line, we are interested in two types of new anchors - user equipments (UEs) and reconfigurable intelligent surfaces (RISs). This paper will shed light on the opportunities and challenges brought by UE-assisted sensing and RIS-assisted sensing. Our goal is to devise a novel 6G-oriented sensing architecture where BSs, UEs, and RISs can work together to provide ubiquitous sensing services. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nIntegrated sensing adn communiation (ISAC) has recently attracted tremendous attention frome both academia anbd inudstry, beeing envisioned as a key part ofhten standars for the sixth-generation (6G) cellular network. A key challege of 6G-oriented ISAC lies in how to perform ubiquitious sensing based on the communication signals anbd devices. Previous works ahevmaked graet progress on studyingther signal waveform design that leads to optimal comminication-sensing performance tradeoff. In this artical, we aim to focus on issues arising frome the exploitation ofther communiation devices for sensing in 6G network. Particularly, we will discussboaut how to leverage various nodes available inhten cellular network as anchors to perform ubiquitous sensing. On one hand, the base stations (BSs) willk behten most important anchors inther future 6G ISAC network, sicne they can generate/proccess radio signals withh high range/angle resolutions, andther positions are precisly known. Correspondingly, we willfirts studdyhten BS-based sensing technique. Onther other hand, the BSs alone mayonot enable ubiquitious sensing, since they cannot cover all the places with strong line-of-sight (LOS) links. This motivates us to investigate the possibilty of useing other nodes thast are with higher density inther network to act ashten anchors. Along tihs line, we are interested in twpo types of new anchors - user equipments (UEs) andd reconfigurable intelligent surfaces (RISs). This paper will shed light onther opportunities and challenges brought by UE-assisted sensing and RIS-assisted sensing. Our goal is to devise a novel 6G-oriented sensing architecture where BSs, UEs, andd RISs can owrk toghether to provide ubiquitious sensing services."
] | typos | 2024-06-24T00:00:00 | null | |||||
c705c2cb748828079f1df6200f61c13b90b7b6018432be18dfa10824356d7bbc | language | Advances in ubiquitous computing have enabled end-user authoring of context-aware policies (CAPs) that control smart devices based on specific contexts of the user and environment. However, authoring CAPs accurately and avoiding run-time errors is challenging for end-users as it is difficult to foresee CAP behaviors under complex real-world conditions. We propose Fast-Forward Reality, an Extended Reality (XR) based authoring workflow that enables end-users to iteratively author and refine CAPs by validating their behaviors via simulated unit test cases. We develop a computational approach to automatically generate test cases based on the authored CAP and the user's context history. Our system delivers each test case with immersive visualizations in XR, facilitating users to verify the CAP behavior and identify necessary refinements. We evaluated Fast-Forward Reality in a user study (N=12). Our authoring and validation process improved the accuracy of CAPs and the users provided positive feedback on the system usability. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nAdvances in ubiquitious computing hvea enabled end-user authoring of context-aware policies (CAPs) thgat controll smart devices based on specfic contexts ofhten user adn environment. However, authoring CAPs accurately and avoiding run-tiem errors is challenging for end-users as it is difficult to foresee CAP behaviors under complex real-world condidtions. We propose Fast-Forward Reality, an Extended Reality (XR) based authoring workflow that enables end-users to iteratively author adn refine CAPs by validating their behaviors via simulated unit test cases. We develope a computational approach to automaticly ganerate test cases based onther authored CAP anbd the user's context hstory. Our sytem delivers each test case witht immersive visualizations in XR, facilitating users to verify the CAP behavior anbd identify necesary refinements. We evaluated Fast-Forward Reality in a user study (N=12). Our authoring and validation process improved the acuracy of CAPs anbd the users provided postive feedback onther sytem usability."
] | typos | 2024-06-24T00:00:00 | null | |||||
4448a8e9fb03ca8dd75b5a740f7f8955c9a9ce5e1abbfa568449c1a06e029f2e | language | A topology optimization method is presented and applied to a blazed diffraction grating in reflection under conical incidence. This type of gratings is meant to disperse the incident light on one particular diffraction order and this property is fundamental in spectroscopy. Conventionally, a blazed metallic grating is made of a sawtooth profile designed to work with the +/-1st diffraction order in reflection. In this paper, we question this intuitive triangular pattern and look for optimal opto-geometric characteristics using topology optimization based on Finite Element modelling of Maxwell's equations. In practical contexts, the grating geometry is mono-periodic but it is enlightened by a 3D plane wave with a wavevector outside of the plane of invariance. Consequently, this study deals with the resolution of a direct and inverse problem using the Finite Element Method in this intermediate state between 2D and 3D: the so-called conical incidence. A multi-wavelength objective is used in order to obtain a broadband blazed effect. Finally, several numerical experiments are detailed. The results show that it is possible to reach a 98% diffraction efficiency on the -1st diffraction order if the optimization is performed on a single wavelength, and that the reflection integrated over the [400,1500]nm wavelength range can be 29% higher in absolute, 56% in relative, than that of the sawtooth blazed grating when using a multi-wavelength optimization criterion (from 52% to 81%). | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nA topology optimization method is presented anbd applied to a blazed diffraction grating in reflection under conical incidence. This type of gratings is meant to disperse the incident light on one particular diffraction order andd this property is fundametal in spectroscopy. Conventionally, a blazed metallic grating is made of a sawtooth profile designed to work withhten +/-1st diffraction order in reflection. In this paper, we question this intutive triangular pattern adn look for optimal opto-geometric characteristics useing topology optimization based on Finite Element modelling of Maxwell's equations. In practical contexts, the grating geometry is mono-periodic but it is enlightened by a 3D plane wave whith a wavevector outside of the plane of invariance. Consequently, htis studdy deals wtihhten resolution of a direct and inverse probelm usinghten Finite Element Method in tihs intermediate state between 2D andd 3D: tje so-called conical incidence. A multi-wavelength objective is unsed in order to obtain a broadband blazed effect. Finally, several numerical experiments are detailed. The results sohw thyat it is possibile to reach a 98% diffraction efficency onhten -1st diffraction order ifther optimization is performes on a single wavelength, anbd thtather reflection integrated over the [400,1500]nm wavelength range can be 29% higher in absolute, 56% in relative, tahn thyat ofhten sawtooth blazed grating wehn using a multi-wavelength optimization critereon (frome 52% to 81%)."
] | typos | 2024-06-24T00:00:00 | null | |||||
f8b213cd630106d9701d588f12817bca82a2414e2e2766ec6b092d57f7e9f131 | language | The interaction of condensed phase systems with external electric fields is crucial in myriad processes in nature and technology ranging from the field-directed motion of cells (galvanotaxis), to energy storage and conversion systems including supercapacitors, batteries and solar cells. Molecular simulation in the presence of electric fields would give important atomistic insight into these processes but applications of the most accurate methods such as ab-initio molecular dynamics are limited in scope by their computational expense. Here we introduce Perturbed Neural Network Potential Molecular Dynamics (PNNP MD) to push back the accessible time and length scales of such simulations at virtually no loss in accuracy. The total forces on the atoms are expressed in terms of the unperturbed potential energy surface represented by a standard neural network potential and a field-induced perturbation obtained from a series expansion of the field interaction truncated at first order. The latter is represented in terms of an equivariant graph neural network, trained on the atomic polar tensor. PNNP MD is shown to give excellent results for the dielectric relaxation dynamics, the dielectric constant and the field-dependent IR spectrum of liquid water when compared to ab-initio molecular dynamics or experiment, up to surprisingly high field strengths of about 0.2 V/A. This is remarkable because, in contrast to most previous approaches, the two neural networks on which PNNP MD is based are exclusively trained on zero-field molecular configurations demonstrating that the networks not only interpolate but also reliably extrapolate the field response. PNNP MD is based on rigorous theory yet it is simple, general, modular, and systematically improvable allowing us to obtain atomistic insight into the interaction of a wide range of condensed phase systems with external electric fields. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nThe interaction of condensed phase systems whith exerternalelecticfiels is crutial in myriad processes in nature adn technology ranging from the field-directed motion of cells (galvanotaxis), to energy storage and convertion systems includng supercapacitors, batteries adn solar cells. Molecular simulation in the presense of electric fields owudl give importamt atomistic insight into theese processes but applicaitons ofther most accurate methods such as ab-initio molecular dynamics are limited in scope byther computational expense. Here we introduce Perturbed Neural Network Potential Molecular Dynamics (PNNP MD) to push bcakhten accessable time adn length scales of such simulations at virtualy no loss in acuracy. The total forces onhten atoms are expressed in terms ofhten unperturbed potential energy surfce represented by a standard neural network potential anbd afiel-induced pertubation obtained frome a series expansion ofhten field interaction truncated atfirts order. The latter is represented in terms of an equivariant graph neural network, trained onther atomic polar tensor. PNNP MD is shown to give excellent results forhten dielectric relaxation dynamics, the dielectric constant andhtenfiel-dependent IR spectum of liquid water whn compared to ab-initio molecular dynamics or experiment, up to suprisingly high field strengths of about 0.2 V/A. This is remarkable because, in contrast to most previous approachs, tje twpo neural networks on hwihc PNNP MD is based are exclusively trained on zero-field molecular configurations demonstrating tyhathten networksonotlonly interpolate but alsot reliably extrapolate thefiel response. PNNP MD is based on rigorous theory yet it is simple, general, modular, anbd systematically improvable alowing us to obtain atomistic insight intohten interaction of a wide range of condensed phase systems with exerternalelectic fields."
] | typos | 2024-06-24T00:00:00 | null | |||||
2daa99bf8b8fd26c8648c214ce4bbcb9cf2fcd679cb6b1df4fc14d688894e33d | language | A widely accepted explanation for robots planning overcautious or overaggressive trajectories alongside humans is that the crowd density exceeds a threshold such that all feasible trajectories are considered unsafe -- the freezing robot problem. However, even with low crowd density, the robot's navigation performance could still drop drastically when in close proximity to humans. In this work, we argue that a broader cause of suboptimal navigation performance near humans is due to the robot's misjudgement for the human's willingness (flexibility) to share space with others, particularly when the robot assumes the human's flexibility holds constant during interaction, a phenomenon of what we call human robot pacing mismatch. We show that the necessary condition for solving pacing mismatch is to model the evolution of both the robot and the human's flexibility during decision making, a strategy called distribution space modeling. We demonstrate the advantage of distribution space coupling through an anecdotal case study and discuss the future directions of solving human robot pacing mismatch. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nA widely accepted explanation for robots planning overcautious or overaggressive trajectories alongside humans is thathten crowd density exceeds a threshhold such taht all feasible trajectories are concidered unsafe -- the freezing robot probelm. However, even with low crowd density, tghe robot's navigation perfomance sould still drop drastically whn in close proximty to humans. In thsi owrk, we argue that a broader casue of suboptimal navigation performance near humans is due to the robot's misjudgement forhten human's willingness (flexibility) to share spoace witht others, particularly whenther robot assumesther human's flexibility holds constantburing interaction, a phenomenon of whta we call human robot pacing mismatch. We sohw thathten nessecary condition for solving pacing mismatch is to modelhten evolution of bothther robot andhten human's flexibility during descision making, a strategy called distribution spoace modeling. We demonstrate the advantage of distrubution spoace coupling through an anecdotal case study and descusshten future directions of solving human robot pacing mismatch."
] | typos | 2024-06-24T00:00:00 | null | |||||
97b7c7b7f7a800f48bd5bc841ecea2a4fc33594f07d009e4460252cc1a5cc26e | language | In order to estimate the proportion of `immune' or `cured' subjects who will never experience failure, a sufficiently long follow-up period is required. Several statistical tests have been proposed in the literature for assessing the assumption of sufficient follow-up, meaning that the study duration is longer than the support of the survival times for the uncured subjects. However, for practical purposes, the follow-up would be considered sufficiently long if the probability for the event to happen after the end of the study is very small. Based on this observation, we formulate a more relaxed notion of `practically' sufficient follow-up characterized by the quantiles of the distribution and develop a novel nonparametric statistical test. The proposed method relies mainly on the assumption of a non-increasing density function in the tail of the distribution. The test is then based on a shape constrained density estimator such as the Grenander or the kernel smoothed Grenander estimator and a bootstrap procedure is used for computation of the critical values. The performance of the test is investigated through an extensive simulation study, and the method is illustrated on breast cancer data. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nIn order to estimate the proportion of `immune' or `cured' subjects who will never expierence failure, a sufficently long follow-up period is required. Several statistical tests have been proposed in the literture for assessing the assumption of sufficient follow-up, meaninng thathten study duration is longer tahn the support of the survival times for the uncured subjects. However, for practial purposes, the follow-up owudl be consdidered sufficently long ifther probalibity for the event to ahppen after the end ofhten studdy is very small. Based on this observation, we formulate a moreso relaxed notion of `practially' sufficent follow-up characterized by the quantiles ofhten distrubution andd develop a novel nonparametric statistical test. The proposed method relies mainly onhten assumption of a non-increasing density function in the tail of the distrubution. The test is hten based on a shape constrained density estimator such asther Grenander orther kernel smoothed Grenander estimator and a bootstrap procedure is used for computation ofther critical values. The performance ofther test is investigatedthrought an extensive simulation studdy, adn the method is illustrated on breast cancer data."
] | typos | 2024-06-24T00:00:00 | null | |||||
9a0005b9e33afce67a4835c0a3b3b02bda98607bb9eef4daeae1c1620980a85c | language | We propose the $\alpha$-generalized no-scale supergravity, and study the corresponding inflationary models. With a new parameter $0<\alpha\leq 1$, the $\alpha$-generalized no-scale supergravity provides the continuous connections among the generic no-scale supergravity from string theory compactifications. The resulting prediction of the CMB, spectrum index $n_s$, and tensor-to-scalar ratio $r$ can be highly consistent with the latest Planck/BICEP/Keck Array observations. Notably, the models with $\alpha\neq 1$ give a smaller ratio $r\leq 10^{-3}$, which is flexible even under the anticipated tighter observational constraints at the future experiments. Additionally, these models have the potential to generate a broad-band stochastic gravitational wave background, and thus explain the NANOGrav 15yr signal. Furthermore, they predict the formation of primordial black holes (PBHs) with various mass scales, which could account for a significant portion of dark matter relic density in the Universe. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nWe propose the $\\alpha$-generalized no-scale supergravity, andd studdy the corresponding inflationary models. With a new parameter $0<\\alpha\\leq 1$, teh $\\alpha$-generalized no-scale supergravity provideshten continous connections amoung the generic no-scale supergravity frome string theory compactifications. The resulting prediction of the CMB, spectrum index $n_s$, and tensor-to-scalar ratio $r$ can be highly consistant wihtther latest Planck/BICEP/Keck Array observations. Notably, teh models with $\\alpha\\neq 1$ give a smaller ratio $r\\leq 10^{-3}$, whcih is flexible even underther anticipated tighter observational constaints at the future expeiments. Additionally, these models havehten potential to ganerate a broad-band stochastic gravitational wave backgorund, and thus explain the NANOGrav 15yr signal. Furthermore, htey predict the formation of primordal black holes (PBHs) with various mass scales, whic sould account for a signficiant portion of dark matter relic density in the Universe."
] | typos | 2024-06-24T00:00:00 | null | |||||
4f2b4c6927ce41d050d4919b9548c3dca241f32a9583e02177cce65cf8c8f73e | language | Precise measurements of energy spectra of different cosmic ray species were obtained in recent years, by particularly the AMS-02 experiment on the International Space Station. It has been shown that apparent differences exist in different groups of the primary cosmic rays. However, it is not straightforward to conclude that the source spectra of different particle groups are different since they will experience different propagation processes (e.g., energy losses and fragmentations) either. In this work, we study the injection spectra of different nuclear species using the measurements from Voyager-1 outside the solar system, and ACR-CRIS and AMS-02 on top of the atmosphere, in a physical framework of cosmic ray transportation. Two types of injection spectra are assumed, the broken power-law and the non-parametric spline interpolation form. The non-parametric form fits the data better than the broken power-law form, implying that potential structures beyond the constrained spectral shape of broken power-law may exist. For different nuclei the injection spectra are overall similar in shape but do show some differences among each other. For the non-parametric spectral form, the helium injection spectrum is the softest at low energies and the hardest at high energies. For both spectral shapes, the low-energy injection spectrum of neon is the hardest among all these species, and the carbon and oxygen spectra have more prominent bumps in 1-10 GV in the R2dN/dR presentation. Such differences suggest the existence of differences in the sources or acceleration processes of various nuclei of cosmic rays. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nPrecise measurements of energy spectra of different cosmic ray speices were obtained in recent years, by particuallyther AMS-02 experiment on the International Space Station. It has been shown that aparent differences exist in diffrent groups of the primary cosmic rays. However, it isonot straightforward to conclude thathten source spectra of diferrent particle groups are differnt since tehy wille experience diferrent propagation processes (e.g., energy losses anbd fragmentations) eiter. In tihs work, we studdyhten injection spectra of different nucular species usingther measurements fomr Voyager-1 outsidehten solar sytem, andd ACR-CRIS anbd AMS-02 on top of the atmosphere, in a physical framework of cosmic ray transporation. Two types of injection spectra are assumed, thge broken power-law anddther non-parametric spline interpolation form. The non-parametricfomr fitsther data better tahnther broken pwoer-lawfomr, implying that potential structures beyondther constrained spectral shape of broken pwoer-law may exist. For diffrent nuclei the injection spectra are overall simmilar in shape but do sohw smoe differences amung each otehr. Forhten non-parametric spectralfomr, the helium injection spectum ishten softest at low energies andther hardest at high energies. For both spectral shapes, tjhe low-energy injection spectum of neon is the hardest amoung all theese species, and the carbon and oxigen spectra have mroe prominent bumps in 1-10 GV inhten R2dN/dR presentation. Such differences suggesthten existince of differences in the sources or acceleration processes of various nuclei of cosmic rays."
] | typos | 2024-06-24T00:00:00 | null | |||||
032e5f4f783412d63296cc024f9b72799491127b20cbccafe1f8430091cd16ea | language | Recent studies have put into question the belief that emergent abilities in language models are exclusive to large models. This skepticism arises from two observations: 1) smaller models can also exhibit high performance on emergent abilities and 2) there is doubt on the discontinuous metrics used to measure these abilities. In this paper, we propose to study emergent abilities in the lens of pre-training loss, instead of model size or training compute. We demonstrate that the models with the same pre-training loss, but different model and data sizes, generate the same performance on various downstream tasks. We also discover that a model exhibits emergent abilities on certain tasks -- regardless of the continuity of metrics -- when its pre-training loss falls below a specific threshold. Before reaching this threshold, its performance remains at the level of random guessing. This inspires us to redefine emergent abilities as those that manifest in models with lower pre-training losses, highlighting that these abilities cannot be predicted by merely extrapolating the performance trends of models with higher pre-training losses. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nRecent studies hvea put inot questionhten belief tyhat emergent abilties in laguage models are exclusive to large models. This skepticism arises fomr twpo observations: 1) smaller models can also exhibit high performence on emergent abilties andd 2) htere is doub on the discontinuous metrics unsed to measure theese abilityes. In this paper, we propose to studdy emergent abilityes inhten lens of pre-training loss, instead of modle size or training compute. We demonstrate tyhathten models wihtther smae pre-training loss, but differnt modle andd data sizes, generate the same perfomance on various downstream tasks. We alos dicover thgat a model exhibits emergent abilties on certian tasks -- irregardless ofther continuity of metrics -- wehn its pre-training loss falls below a specfic threshold. Before reaching htis threshold, its perfomance remains at the leval of random guessing. This inspires us to redefine emergent abilityes as those that manifest in models wih lower pre-training losses, highlighting tyhat theese abilities cannot be predicted by merely extrapolatingther performance trends of models with heigher pre-training losses."
] | typos | 2024-06-24T00:00:00 | null | |||||
6fc6c2e211c79957180694c8615044dcdcc92bc36226a9fd4f6803fc04e03d4b | language | Large Language models (LLMs) have demonstrated significant potential in transforming healthcare by automating tasks such as clinical documentation, information retrieval, and decision support. In this aspect, carefully engineered prompts have emerged as a powerful tool for using LLMs for medical scenarios, e.g., patient clinical scenarios. In this paper, we propose a modified version of the MedQA-USMLE dataset, which is subjective, to mimic real-life clinical scenarios. We explore the Chain of Thought (CoT) reasoning based on subjective response generation for the modified MedQA-USMLE dataset with appropriate LM-driven forward reasoning for correct responses to the medical questions. Keeping in mind the importance of response verification in the medical setting, we utilize a reward training mechanism whereby the language model also provides an appropriate verified response for a particular response to a clinical question. In this regard, we also include human-in-the-loop for different evaluation aspects. We develop better in-contrast learning strategies by modifying the 5-shot-codex-CoT-prompt from arXiv:2207.08143 for the subjective MedQA dataset and developing our incremental-reasoning prompt. Our evaluations show that the incremental reasoning prompt performs better than the modified codex prompt in certain scenarios. We also show that greedy decoding with the incremental reasoning method performs better than other strategies, such as prompt chaining and eliminative reasoning. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nLarge Language models (LLMs) hvea demonstrated signficant potential in transforming healthercare by automating tasks such as clinical documentation, informtion retrieval, adn decision wupport. In tihs aspect, carefully engineered prompts have emerged as a powerful tool for using LLMs for medical senarios, e.g., patient clincial senarios. In tihs paper, we propose a modified verison ofther MedQA-USMLE dataset, which is subjective, to mimic rela-life clinical scenarios. We explore the Chain of Thought (CoT) reasoning based on subjective reponse generation forhten modified MedQA-USMLE dataset withh appropriate LM-driven forward reasoning for correct responses tothe medical questions. Keeping in mind the importance of responce verification inther medical setting, we utilize a reward training mechanism wherebyther language modle also provides an apropriate verified responce for a particular reponse to a clincial question. In thsi regard, we also include human-in-the-loop for diferrent evaluation spects. We develope better in-contrast learning startegies by modifying the 5-shot-codex-CoT-prompt from arXiv:2207.08143 for the subjective MedQA dataset and developing our incremental-reasoning prompt. Our evaluations sohw tathhten incremental reasoning promptperformes better thnather modified codex prompt in ceratin senarios. We also sohw that greedy decoding with the incremental reasoning methodperformes better tahn otehr startegies, such as prompt chaining andd eliminative reasoning."
] | typos | 2024-06-24T00:00:00 | null | |||||
91f39e760d7351ea928f4760bf8dfbcf281172392aa379cddd8115df3ec00758 | language | Few-shot named entity recognition (NER) detects named entities within text using only a few annotated examples. One promising line of research is to leverage natural language descriptions of each entity type: the common label PER might, for example, be verbalized as ''person entity.'' In an initial label interpretation learning phase, the model learns to interpret such verbalized descriptions of entity types. In a subsequent few-shot tagset extension phase, this model is then given a description of a previously unseen entity type (such as ''music album'') and optionally a few training examples to perform few-shot NER for this type. In this paper, we systematically explore the impact of a strong semantic prior to interpret verbalizations of new entity types by massively scaling up the number and granularity of entity types used for label interpretation learning. To this end, we leverage an entity linking benchmark to create a dataset with orders of magnitude of more distinct entity types and descriptions as currently used datasets. We find that this increased signal yields strong results in zero- and few-shot NER in in-domain, cross-domain, and even cross-lingual settings. Our findings indicate significant potential for improving few-shot NER through heuristical data-based optimization. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nFew-shot named entity recognition (NER) detects named entities withing text useinglonly a few annotated examples. One promising line of reasearch is to leverage natural language descriptions of eahc entitity type: tjhe common label PER might, for exmaple, be verbalized as ''persan entitity.'' In an intial label intepretation learning phase, tghe modle lerans to interpet such verbalized descriptions of entitity types. In a subsquent few-shot tagset extention phase, thsi model is hten given a descripton of a previously unseen entitity type (such as ''music album'') andd optionally a few training examples to perform few-shot NER for thsi type. In tihs paper, we systematically explore the impact of a strong semantic prior to interpret verbalizations of new entitity types by massively scaling uphten number andd granularity of entity types unsed for label intepretation learning. To this end, we leverage an entitity linking benchmark to create a dataset with orders of magnitude of omre distinct entity types andd descriptions as currenly unsed datasets. We fidn thta this inclreased signal yields stong results in zero- anbd few-shot NER in in-domain, cross-domain, anbd even cross-lingual settings. Our findings indicate signficiant potential for inproving few-shot NER through heuristical data-based optimization."
] | typos | 2024-06-24T00:00:00 | null | |||||
6d563010cc93b0e647f06347a5404c1f9bdc1a57f4b4f0a16e8d0624447f61b7 | language | We introduce a mean field game for a family of filtering problems related to the classic sequential testing of the drift of a Brownian motion. To the best of our knowledge this work presents the first treatment of mean field filtering games with stopping and an unobserved common noise in the literature. We show that the game is well-posed, characterize the solution, and establish the existence of an equilibrium under certain assumptions. We also perform numerical studies for several examples of interest. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nWe introduce a meanfiel gae for a family of filtering problems related tothe clasic sequential testing ofhten drift of a Brownian motion. Tother best of our knowlege htis work presents the first treatment of mean field filtering ganes witn stopping adn an unobserved common noise in the litature. We show thathten gae is vell-posed, characterize the solution, anbd establish the existence of an equilibrium under ceratin assumptions. We also perform numerical studies for several examples of intrest."
] | typos | 2024-06-24T00:00:00 | null | |||||
d22f56a40a227b92aaebf04776e513722caec1a8d654c16cab8285a9adca98d9 | language | In water monitoring, environmental analysis, cell culture stability, and biomedical applications, precise pH control is demanded. Traditional methods like pH strips and meters have limitations: pH strips lack precision, while electrochemical meters, though more accurate, are fragile, prone to drift, and unsuitable for small volumes. In this paper, we propose a method for optical detection of the pH value based on the multiplexed sensor with 4D microcavities fabricated with two-photon polymerization. This approach employs pH-triggered reversible variations in microresonator geometry and integrates hundreds of dual optically coupled 4D microcavities to achieve the detection limit of 0.003 pH units. The proposed solution is a clear instance for the use-case oriented application of the two-photon polymerized structures of high optical quality. With benefits of the multiplexed imaging platform, dual 4D microresonators can be integrated alongside other microresonator types for pH-corrected biochemical studies. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nIn water monitoring, enviormental analysis, cell culture stablility, and biomedical applicaitons, precise pH control is demanded. Traditional methods like pH strips and meters have limitations: pH strips lack precision, while electrochemical meters, though mroe accurate, are fragile, prone to drift, adn unsuitable for small volumes. In this paper, we propose a method for optical detection ofther pH value based on the multiplexed sensor with 4D microcavities fabricated with twpo-photon polymerization. This approach employs pH-triguered reversible varations in microresonator geometry adn integrates hundreds of dual optically coupled 4D microcavities to achive the detection limit of 0.003 pH units. The proposed solution is a clear instatance for the uise-case oriented applicaiton of the twpo-photon polymerized structures of high optical quality. With benifits ofhten multiplexed imaging platform, dual 4D microresonators can be integrated alongside olther microresonator types for pH-corrected biochemical studies."
] | typos | 2024-06-24T00:00:00 | null | |||||
55f742aa5a40676e93a5cb4f379c084eb5256e1e8b81c274a6f02c46b69ac5ca | language | So Long Sucker is a strategy board game requiring 4 players, each with $c$ chips of their designated color, and a board made of $k$ empty piles. With a clear set-up come intricate rules, such as: players taking turns but not in a fixed order, agreements between some players being made and broken at any time, and a player winning the game even without any chips in hand. One of the main points of interest in studying this game, is finding when a player has a winning strategy. The game begins with four players that get eliminated successively until the winner is left. To study winning strategies, it is of interest to look at endgame situations. We present the following game set-up: there are two players left in the game, Blue and Red, and only their respective chip colors. In this paper, we characterize Blue's winning situations and strategies through inductive reasoning. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nSo Long Sucker is a stradegy board gae requiring 4 players, each whith $c$ chips of their designated color, adn a boardmaked of $k$ empty piles. With a clear set-up come intricate rules, such as: players tkaing turns but not in a fixed order, agreements beween soem players beingmaked adn broken at any time, adn a player winningther gae even without any chips in hand. One ofhten main points of interest in studying this game, is finding when a player has a winning stradegy. The gae beggins wih four players thast get eleminated successively untilther winner is lefted. To study winning strategies, it is of interest to look at endgame situations. We presenthten folowing gae set-up: there are twpo players lefted inhten gae, Blue and Red, and onlyther respective chip colors. In this paper, we characterize Blue's winning situations adn strategies through inductive reasoning."
] | typos | 2024-06-24T00:00:00 | null | |||||
b5990c412f03bcec2161c61d2298dff958a56b38aae440942810c7b9c8e764d8 | language | In a recent paper, we defined twisted unitary $1$-groups and showed that they automatically induced error-detecting quantum codes. We also showed that twisted unitary $1$-groups correspond to irreducible products of characters thereby reducing the problem of code-finding to a computation in the character theory of finite groups. Using a combination of GAP computations and results from the mathematics literature on irreducible products of characters, we identify many new non-trivial quantum codes with unusual transversal gates. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nIn a recent paper, we deffined twisted unitary $1$-groups and showed taht they automatically induced error-detecting quantum codes. We also showed thta twisted unitary $1$-groups corrispond to irreducible products of characters thereby reducing the probelm of code-finding to a computation in the carachter theory of fianite groups. Using a combination of GAP computations and results frome the mathamatics literature on irreducible products of characters, we identify many new non-trivial quantum codes witht unusual transversal gates."
] | typos | 2024-06-24T00:00:00 | null | |||||
4ca443ff77e5a6b2046e0d96835ef7e0b478ce19a82af1e98e08ccec2df02f06 | language | Accurate electrical load forecasting is of great importance for the efficient operation and control of modern power systems. In this work, a hybrid long short-term memory (LSTM)-based model with online correction is developed for day-ahead electrical load forecasting. Firstly, four types of features are extracted from the original electrical load dataset, including the historical time series, time index features, historical statistical features, and similarity features. Then, a hybrid LSTM-based electrical load forecasting model is designed, where an LSTM neural network block and a fully-connected neural network block are integrated that can model both temporal features (historical time series) and non-temporal features (the rest features). A gradient regularization-based offline training algorithm and an output layer parameter fine-tuning-based online model correction method are developed to enhance the model's capabilities to defend against disturbance and adapt to the latest load data distribution, thus improving the forecasting accuracy. At last, extensive experiments are carried out to validate the effectiveness of the proposed electrical load forecasting strategy with superior accuracy compared with commonly used forecasting models. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nAccurate electrial load forecasting is of great importance forther effecient operation adn controll of modern power systems. In tihs wrok, a hybrid long short-term memory (LSTM)-based modle with online correction is developped for day-ahead electrial load forecasting. Firstly, four types of features are extracted fromether original electrial load dataset, including the historical time series, tiem index features, historical statistical features, anbd similiarity features. Then, a hybrid LSTM-based electrial load forecasting modle is dessigned, where an LSTM neural network block and a fully-conected neural network block are intergrated thta can modle both temporal features (historical time series) and non-temporal features (the rest features). A gradient regularization-based offline training algoritm and an output layer parameter fine-tuning-based online modle correction method are developed to enhancether model's capabilities to defend agianst disturbance adn adapt tothe latest load data distrubution, thus inprovinghten forecasting accuracy. At lastr, extensive expeiments are carried out to validate the effectiveness of the proposed electrical load forecasting strategy whith superior acuracy compared withh commonly unsed forecasting models."
] | typos | 2024-06-24T00:00:00 | null | |||||
5209745bf0710424baed34d6d7b08c599122313b8a1d052d081865b9387071bb | language | This paper is a complement of the modularity result of Bruinier, Howard, Kudla, Rapoport and Yang (BHKRY) for the special case $U(1,1)$ not considered there. The main idea is to embed a $U(1, 1)$ Shimura curve to many $U(n-1, 1)$ Shimura varieties for big $n$, and prove a precise pullback formula of the generating series of arithmetic divisors. Afterwards, we use the modularity result of BHKRY together with the existence of non-vanishing of classical theta series at any given point in the upper half plane to prove the modularity result on $U(1, 1)$ Shimura curves. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nThis paper is a complement of the modularity result of Bruinier, Howard, Kudla, Rapoport and Yang (BHKRY) for the special case $U(1,1)$ not considered ther. The main idea is to embed a $U(1, 1)$ Shimura curve to many $U(n-1, 1)$ Shimura varieties for big $n$, andd prove a precise pullback formula ofther generating series of arithmetic divisors. Afterwards, we uise the modularity result of BHKRY together iwth the existince of non-vanishing of clasical theta series at any given point inhten upper half plane to proovehten modularity result on $U(1, 1)$ Shimura curves."
] | typos | 2024-06-24T00:00:00 | null | |||||
a463da57f37f3d6bbd30dbb93b204621c38f8ddfee4a9c0273dad126453ed660 | language | We investigate odd-in-time (or odd-frequency) pairing of fermions in equilibrium systems within the particle-number-conserving framework of Penrose, Onsager and Yang, where superfluid order is defined by macroscopic eigenvalues of reduced density matrices. We show that odd-frequency pair correlations are synonymous with even fermion-exchange symmetry in a time-dependent correlation function that generalises the two-body reduced density matrix. Macroscopic even-under-fermion-exchange pairing is found to emerge from conventional Penrose-Onsager-Yang condensation in two-body or higher-order reduced density matrices through the symmetry-mixing properties of the Hamiltonian. We identify and characterise a transformer matrix responsible for producing macroscopic even fermion-exchange correlations that coexist with a conventional Cooper-pair condensate, while a generator matrix is shown to be responsible for creating macroscopic even fermion-exchange correlations from hidden orders such as a multi-particle condensate. The transformer scenario is illustrated using the spin-imbalanced Fermi superfluid as an example. The generator scenario is demonstrated by the composite-boson condensate arising for itinerant electrons coupled to magnetic excitations. Structural analysis of the transformer and generator matrices is shown to provide general conditions for odd-frequency pairing order to arise in a given system. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nWe investingate odd-in-timne (or odd-frequency) pairing of fermions in equelibrium systems withinther particle-number-conserving framework of Penrose, Onsager and Yang, where superfluid order is defined by macroscopic eigenvalues of reduced density matrices. We sohw taht odd-frequency pair correlations are synonymous with even fermion-excange symetry in a time-dependent correlation function thgat generalises the twpo-body reduced density matrix. Macroscopic even-under-fermion-excange pairing is found to emerge frome conventional Penrose-Onsager-Yang condensation in twpo-body or heigher-order reduced density matricesthroughtther symetry-mixing properties of the Hamiltonian. We identify and characterise a transformer matrix responisble for producing macroscopic even fermion-excange correlations tyhat coexist iwth a convential Cooper-pair condensate, while a generator matrix is shown to be responisble for creating macroscopic even fermion-excange correlations frome hidden orders such as a multi-particle condensate. The transformer scenario is illustrated useingther spin-imbalanced Fermi superfluid as an exmaple. The generator scenario is demonstrated by the composite-boson condensate arising for itinerant electrons coupled to magnetic excitations. Structural analysis of the transformer andd generator matrices is shown to provide general condidtions for odd-frequency pairing order to arise in a given sytem."
] | typos | 2024-06-24T00:00:00 | null | |||||
a76d69ca91cac24a5ba0e4f9f119301c569091af5f877d1d82f0facb2f120203 | language | nimCSO is a high-performance tool implementing several methods for selecting components (data dimensions) in compositional datasets, which optimize the data availability and density for applications such as machine learning. Making said choice is a combinatorially hard problem for complex compositions existing in highly dimensional spaces due to the interdependency of components being present. Such spaces are encountered, for instance, in materials science, where datasets on Compositionally Complex Materials (CCMs) often span 20-45 chemical elements, 5-10 processing types, and several temperature regimes, for up to 60 total data dimensions. At its core, nimCSO leverages the metaprogramming ability of the Nim language (nim-lang.org) to optimize itself at the compile time, both in terms of speed and memory handling, to the specific problem statement and dataset at hand based on a human-readable configuration file. As demonstrated in this paper, nimCSO reaches the physical limits of the hardware (L1 cache latency) and can outperform an efficient native Python implementation over 400 times in terms of speed and 50 times in terms of memory usage (not counting interpreter), while also outperforming NumPy implementation 35 and 17 times, respectively, when checking a candidate solution. It is designed to be both (1) a user-ready tool, implementing two efficient brute-force approaches (for handling up to 25 dimensions), a custom search algorithm (for up to 40 dimensions), and a genetic algorithm (for any dimensionality), and (2) a scaffold for building even more elaborate methods in the future, including heuristics going beyond data availability. All configuration is done with a simple human-readable YAML config file and plain text data files, making it easy to modify the search method and its parameters with no knowledge of programming and only basic command line skills. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nnimCSO is a high-performence tool implamenting severeal methods for selecting components (data dimensions) in compositional datasets, whlch optimizether data availability and density for applications such as maching learning. Making said choice is a combinatorially hard probelm for complex compositions existing in highly dimesnional spaces due to the interdependency of components being present. Such spaces are encountered, for instance, in materials science, where datasets on Compositionally Complex Materials (CCMs) oftenly span 20-45 chemical elements, 5-10 proccessing types, and sevral temperture regimes, for upto 60 total data dimensions. At its core, nimCSO leveragesther metaprogramming ability ofhten Nim laguage (nim-lang.org) to optimize itself at the compile tiome, both in terms of speed and memory handling, tothe specific problem statment adn dataset at hand based on a human-readable configurationfiel. As demonstrated in thsi paper, nimCSO reachesther physical lmits of the hardware (L1 cache latency) and can outperform an efficent native Python implementation over 400 times in terms of speed anbd 50 times in terms of memory useage (nto counting interpreter), hwile alos outperforming NumPy implementation 35 andd 17 times, repsectively, wehn checking a candiate solution. It is desgined to be both (1) a user-ready tool, implamenting twpo efficient brute-force approachs (for handling up to 25 dimentions), a custom seach algorithm (for upto 40 dimenions), and a genetic algoritm (for any dimensionality), andd (2) a scaffold for building even mroe elaborate methods inther future, including heuristics going beyond data availablity. All configuration is done with a simple human-readable YAML config file and plain text data files, making it easy to modifyhten seach method adn its parameters with no knowlege of programming and only basic command line skills."
] | typos | 2024-06-24T00:00:00 | null | |||||
ea360aad7a839ecd2201ee0dd04a6a34c4ee036dc1e1684bfd9f5bf174924f9c | language | We revisit the "dataset classification" experiment suggested by Torralba and Efros a decade ago, in the new era with large-scale, diverse, and hopefully less biased datasets as well as more capable neural network architectures. Surprisingly, we observe that modern neural networks can achieve excellent accuracy in classifying which dataset an image is from: e.g., we report 84.7% accuracy on held-out validation data for the three-way classification problem consisting of the YFCC, CC, and DataComp datasets. Our further experiments show that such a dataset classifier could learn semantic features that are generalizable and transferable, which cannot be simply explained by memorization. We hope our discovery will inspire the community to rethink the issue involving dataset bias and model capabilities. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nWe revisithten \"dataset classification\" experiment suggested by Torralba andd Efros a decade ago, inhten new era withh large-scale, diverse, anbd hopefully less biased datasets aswell as moreso capible neural network architechtures. Surprisingly, we observe that modern neural networks can achieve exelent acuracy in classifying which dataset an image is frome: e.g., we report 84.7% acuracy on held-out validation data forther three-way classification probelm consisting ofhten YFCC, CC, andd DataComp datasets. Our futher expeiments show that such a dataset classifier could learn semantic features thyat are generalizable and transferable, whic cannnot be simply explained by memorization. We hope our dicovery willkinspitehten community to rethink the issue involving dataset bias anbd modle capabilities."
] | typos | 2024-06-24T00:00:00 | null | |||||
36e5f9c0f69f85de942ebe91bd9e7ce214ac937ebb02579e3957f24de471556d | language | We investigate the effective elastic properties of periodic dilute two-phase composites consisting of a homogeneous isotropic matrix and a periodic array of rigid inclusions. We assume the rigid inclusion in a unit cell is a simply connected, bounded domain so that there exists an exterior conformal mapping corresponding the inclusion. Recently, an analytical series solution method for the elastic problem with a rigid inclusion was developed based on the layer potential technique and the geometric function theory \cite{Mattei:2021:EAS}. In this paper, by using the series solution method, we derive expression formulas for the elastic moment tensors--the coefficients of the multipole expansion associated with an elastic inclusion--of an inclusion of arbitrary shape. These formulas for the elastic moment tensors lead us to analytic asymptotic formulas for the effective parameters of the periodic elastic composites with rigid inclusions in terms of the associated exterior conformal mapping. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nWe investigatether effective elastic properties of periodic dilute twpo-phase composites consisting of a homogeneous isotropic matrix andd a periodic array of rigid inclusions. We asume the rigid inclusion in a unit cell is a simpley connected, bounded domain so that there exists an exterior conformal mapping correpondinghten inclusion. Recently, an analytical series solution method for the elastic problem iwth a rigid inclusion wass developed based onther layer potential technique andther geometric funtion theory \\cite{Mattei:2021:EAS}. In thsi paper, by using the series solution method, we derive expression formulas for the elastic moment tensors--the coefficients of the multipole expansion asociated with an elastic inclusion--of an inclusion of abritrary shape. These formulas forther elastic moent tensors lead us to analytic asymptotic formulas for the effective parameters ofhten periodic elastic composites with rigid inclusions in terms ofther associated exterior conformal mapping."
] | typos | 2024-06-24T00:00:00 | null | |||||
7b70ee428f5ac4e79a3a006a61a229b378c31b9a081b24c3b62a0238d7585c6a | language | The analysis of large population economies with incomplete information often entails the integration of a continuum of random variables. We showcase the usefulness of the integral notion à la Pettis (1938) to study such models. We present several results on Pettis integrals, including convenient sufficient conditions for Pettis integrability and Fubini-like exchangeability formulae, illustrated through a running example. Building on these foundations, we conduct a unified analysis of Bayesian games with arbitrarily many heterogeneous agents. We provide a sufficient condition on payoff structures, under which the equilibrium uniqueness is guaranteed across all signal structures. Our condition is parsimonious, as it turns out necessary when strategic interactions are undirected. We further identify the moment restrictions, imposed on the equilibrium action-state joint distribution, which have crucial implications for information designer's problem of persuading a population of strategically interacting agents. To attain these results, we introduce and develop novel mathematical tools, built on the theory of integral kernels and reproducing kernel Hilbert spaces in functional analysis. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nThe analysis of large popoulation economies with imcomplete information oftenly entailsther intergration of a continuum of random variables. We showcase the usefulness of the integral notion à la Pettis (1938) to studdy such models. We present several results on Pettis integrals, includng conveinent sufficient condidtions for Pettis integrability andd Fubini-liek exchangeability formulae, illustratedthrought a runnung exmaple. Building on theese foundations, we conduct a unified analysis of Bayesian ganes with arbitarily many heterogeneous agents. We provide a sufficent condidtion on payoff structures, under whihc the equilibium uniqueness is guarenteed accross all signal structures. Our condidtion is parsimonious, as it turns out necessary wehn startegic interactions are undirected. We futher identify the moment restrictions, imposed on the equilibrum action-state joint distrubution, whihc have crutial implications for information designer's probelm of persuading a population of stratagically interacting agents. To atain theese results, we introduce anbd develope novel mathematical tools, built on the theory of integral kernels adn reproducing kernel Hilbert spaces in functional analysis."
] | typos | 2024-06-24T00:00:00 | null | |||||
474eeae91f6ebb2bdd47bbea238e946ef345a289ace8f0eaceb5f01ce8373b46 | language | C-based interpreters such as CPython make extensive use of C "extension" code, which is opaque to static analysis tools and faster runtimes with JIT compilers, such as PyPy. Not only are the extensions opaque, but the interface between the dynamic language types and the C types can introduce impedance. We hypothesise that frequent calls to C extension code introduce significant overhead that is often unnecessary. We validate this hypothesis by introducing a simple technique, "typed methods", which allow selected C extension functions to have additional metadata attached to them in a backward-compatible way. This additional metadata makes it much easier for a JIT compiler (and as we show, even an interpreter!) to significantly reduce the call and return overhead. Although we have prototyped typed methods in PyPy, we suspect that the same technique is applicable to a wider variety of language runtimes and that the information can also be consumed by static analysis tooling. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nC-based interpreters such as CPython make extensive uise of C \"extention\" code, wich is opaque to static analysis tools and faster runtimes with JIT compilers, such as PyPy. Notlonly are the extensions opaque, buthten interface vetweenhten dynamic laguage types andhten C types can introduce impedence. We hypothesise thta frequent calls to C extension code inctroduce signifigant overhead thgat is oftenly unnecessary. We validate tihs hypothesis by introducing a simple technique, \"typed methods\", which allow selected C extention functions to have addtional metadata attached to them in aackward-compatable way. This addtional metadata makes it much easier for a JIT compiler (anbd as we sohw, even an interpreter!) to significantly reducether call and return overhead. Although we have prototyped typed methods in PyPy, we suspect thathten smae technique is applicable to a wider vreity of language runtimes andd thathten informtion can alos be consumed by static analysis tooling."
] | typos | 2024-06-24T00:00:00 | null | |||||
c57a21d679d639e6a2567a39f486226807806fd543c86dd3295b3ebb50424738 | language | We introduce a Bayesian estimation approach for the passive localization of an acoustic source in shallow water using a single mobile receiver. The proposed probabilistic focalization method estimates the time-varying source location in the presence of measurement-origin uncertainty. In particular, probabilistic data association is performed to match time-differences-of-arrival (TDOA) observations extracted from the acoustic signal to TDOA predictions provided by the statistical model. The performance of our approach is evaluated using real acoustic data recorded by a single mobile receiver. | [
"Please output this exact text, with no changes at all except for fixing the misspellings. Please leave all other stylistic decisions like commas and US vs British spellings as in the original text.\n\nWe inctroduce a Bayesian estimation approach forther passive localization of an accoustic source in shallow water using a single mobile receiver. The proposed probablistic focalization method estimates the timne-varying source location inther presense of measurement-origin uncertainty. In particular, probabilistic data assocation is performed to match tiome-differences-of-arival (TDOA) observations extracted from the acoustic signal to TDOA predicitons provded by the statistical modle. The performence of our approach is evaluated useing rela acoustic data recorded by a single mobile reciever."
] | typos | 2024-06-24T00:00:00 | null | |||||
4daa28759bda96791bea6b2732d1314b9f81f4e3fac5e2539c0cf00547cfd96e | language | The first king of Aurea leads a futile attack on a dragon residing in his realm. All the king's men are killed, leaving the king at the Dragon's mercy. Centuries later, Elodie, the adolescent daughter of Lord Bayford, receives a proposal from Queen Isabelle of Aurea to marry her son, Prince Henry. On her father's urging, Elodie agrees to the marriage so her bride price can help their impoverished people. Upon arriving in Aurea, Elodie and Henry are initially uninterested in each other, but begin to bond as they share a desire to travel. Elodie's stepmother, Lady Bayford, becomes suspicious of the motives of Queen Isabelle, leading her to futilely implore Elodie to end the engagement. After the wedding, Elodie and Henry take part in an ancient ritual in the mountains, supposedly to celebrate their union. Isabelle describes the pact between the first king and the Dragon, where he had to sacrifice his three daughters to ensure peace between his people and the dragon. Following a ceremony where their palms are cut and held together, Henry carries Elodie across the narrow path over the Dragon's lair, then at Isabelle's behest throws her down the chasm. Recovering from the fall, Elodie realizes that she is the actual sacrifice. She escapes the Dragon after it burns her leg, and discovers an illuminated cave filled with glowing silk worms, which she collects as a light source. Elodie reaches a chamber with the note 'Safe Here She Cannot Reach', the names of past victims, and a map carved into the wall. In Elodie's sleep, the worms heal the burn on her leg. Elodie follows the map to a dead end at a high vertical drop on the mountainside. She discovers the remains of dead dragon hatchlings, explaining the reason for the royal sacrifices. A rescue party led by Lord Bayford arrives. The Dragon kills them, including Lord Bayford, but the distraction allows Elodie to escape the mountain. She takes one of the rescue party's horses and hides under a rock as the Dragon burns the surrounding area in an unsuccessful pursuit. Alerted by the conflagration that Elodie's sacrifice has failed, Isabelle resorts to kidnapping Elodie's younger sister Floria as a replacement. After learning this from a desperate Lady Bayford, Elodie returns to the mountain to rescue Floria, who the dragon has left alive as bait. Elodie creates a diversion to reach Floria. Telling her sister to hide, she confronts the Dragon and tries to convince her that they were deceived by the Aureans: by joining their cut hands at the wedding, the blood of the brides and the Aurean royals mingled, making the Dragon think of the princesses as being of Aurean descent. Refusing to believe Elodie, the Dragon states that the first king's assault was unprovoked, and then attacks her, but Elodie tricks her into burning herself. With the Dragon at her mercy, she convinces the Dragon of the truth and heals both of them with the glowing worms. Elodie then interrupts the wedding of another sacrifice at the palace, exposing the Aurean royal family's treachery. Elodie advises the new bride and her family to flee, and the Dragon burns the palace with all the Aurean royals and nobles inside. Days later, Elodie, Floria, and Lady Bayford sail home, loaded with supplies and accompanied by the Dragon. | [
"The following plot summary of a movie has had the sentences randomly reordered. Rewrite the plot summary with the sentences correctly ordered. Begin the plot summary with <PLOT_SUMMARY>.\n\nThe sentences are:\n\nElodie then interrupts the wedding of another sacrifice at the palace, exposing the Aurean royal family's treachery. The Dragon kills them, including Lord Bayford, but the distraction allows Elodie to escape the mountain. She takes one of the rescue party's horses and hides under a rock as the Dragon burns the surrounding area in an unsuccessful pursuit. With the Dragon at her mercy, she convinces the Dragon of the truth and heals both of them with the glowing worms. Alerted by the conflagration that Elodie's sacrifice has failed, Isabelle resorts to kidnapping Elodie's younger sister Floria as a replacement. Isabelle describes the pact between the first king and the Dragon, where he had to sacrifice his three daughters to ensure peace between his people and the dragon. Elodie creates a diversion to reach Floria. Elodie advises the new bride and her family to flee, and the Dragon burns the palace with all the Aurean royals and nobles inside. Days later, Elodie, Floria, and Lady Bayford sail home, loaded with supplies and accompanied by the Dragon. Refusing to believe Elodie, the Dragon states that the first king's assault was unprovoked, and then attacks her, but Elodie tricks her into burning herself. The first king of Aurea leads a futile attack on a dragon residing in his realm. Elodie reaches a chamber with the note 'Safe Here She Cannot Reach', the names of past victims, and a map carved into the wall. In Elodie's sleep, the worms heal the burn on her leg. Telling her sister to hide, she confronts the Dragon and tries to convince her that they were deceived by the Aureans: by joining their cut hands at the wedding, the blood of the brides and the Aurean royals mingled, making the Dragon think of the princesses as being of Aurean descent. Elodie's stepmother, Lady Bayford, becomes suspicious of the motives of Queen Isabelle, leading her to futilely implore Elodie to end the engagement. All the king's men are killed, leaving the king at the Dragon's mercy. Elodie follows the map to a dead end at a high vertical drop on the mountainside. After learning this from a desperate Lady Bayford, Elodie returns to the mountain to rescue Floria, who the dragon has left alive as bait. A rescue party led by Lord Bayford arrives. Following a ceremony where their palms are cut and held together, Henry carries Elodie across the narrow path over the Dragon's lair, then at Isabelle's behest throws her down the chasm. Centuries later, Elodie, the adolescent daughter of Lord Bayford, receives a proposal from Queen Isabelle of Aurea to marry her son, Prince Henry. Recovering from the fall, Elodie realizes that she is the actual sacrifice. She escapes the Dragon after it burns her leg, and discovers an illuminated cave filled with glowing silk worms, which she collects as a light source. Upon arriving in Aurea, Elodie and Henry are initially uninterested in each other, but begin to bond as they share a desire to travel. She discovers the remains of dead dragon hatchlings, explaining the reason for the royal sacrifices. After the wedding, Elodie and Henry take part in an ancient ritual in the mountains, supposedly to celebrate their union. On her father's urging, Elodie agrees to the marriage so her bride price can help their impoverished people."
] | writing | Damsel | 2024-03-08 | plot_unscrambling | 2024-06-24T00:00:00 | null | ||
89f12fb28a6a38bd97ceac13bfb7416a0523cf0e9b6901235c7530a7338c6629 | language | In Chicago, Mea Harper, a seasoned defense attorney, faces ongoing marital strife, exacerbated by her husband Kal's infidelity and his mother Azalia's domineering influence. Amidst these challenges, a family gathering brings news that her brother-in-law, Ray Hawthorne, an ambitious assistant district attorney, is set to prosecute a high-profile murder case against Zyair Malloy, a charismatic local artist. Despite the familial discord, Mea becomes intrigued when Zyair, proclaiming his innocence, approaches her to represent him, claiming that Ray has a personal grudge against him. As Mea delves deeper into the case, she encounters a tangle of evidence that seems compelling at first glance but shows inconsistencies under scrutiny. Zyair, desperate to clear his name, insists he was framed, hinting at hidden motives behind the charges. Complicating matters, Mea's professional interactions with Zyair gradually blur into a personal connection, challenging her objectivity and professional ethics. The situation is further strained by Kal and Azalia who vehemently oppose her involvement in the case, fearing the scandal could tarnish the family's reputation, especially as Ray prepares for a mayoral run. Despite these pressures, Mea's commitment to uncovering the truth strengthens. Her investigation reveals that the prosecution's case hinges on questionable evidence, including a dubious video and forensic reports that Zyair contests. She begins to suspect that the case against Zyair may be part of a larger scheme orchestrated by Ray and possibly other political figures, who aim to use the high-profile case to boost their careers. As Mea pushes forward, her relationship with Kal deteriorates. Kal's struggles with unemployment and substance abuse come to the forefront, revealing the financial and emotional strains on their marriage. He accuses Mea of neglecting their family for her career, while Mea fires back about his inability to contribute and support. The personal stakes rise when Mea learns that Kal, together with Azalia, has been hiding crucial information about Azalia's health to manipulate her. Amidst this turmoil, Mea's pursuit of justice for Zyair leads her into dangerous territory. She faces threats not only from external forces aligned with the prosecution but also from within her own family, who are prepared to go to great lengths to protect their interests. Her resolve is tested as new revelations about Zyair's past relationships and his interactions with the victim come to light, painting a complex picture of the artist. Determined to see the case through, Mea arranges a clandestine meeting with a key witness who can blow the case wide open. This meeting, however, ends with shocking revelations that force Mea to reconsider whom she can trust. Betrayals come to a head in a dramatic confrontation that exposes the deep corruption and personal vendettas driving the case. | [
"The following plot summary of a movie has had the sentences randomly reordered. Rewrite the plot summary with the sentences correctly ordered. Begin the plot summary with <PLOT_SUMMARY>.\n\nThe sentences are:\n\nDespite these pressures, Mea's commitment to uncovering the truth strengthens. Despite the familial discord, Mea becomes intrigued when Zyair, proclaiming his innocence, approaches her to represent him, claiming that Ray has a personal grudge against him. She begins to suspect that the case against Zyair may be part of a larger scheme orchestrated by Ray and possibly other political figures, who aim to use the high-profile case to boost their careers. Betrayals come to a head in a dramatic confrontation that exposes the deep corruption and personal vendettas driving the case. She faces threats not only from external forces aligned with the prosecution but also from within her own family, who are prepared to go to great lengths to protect their interests. Amidst this turmoil, Mea's pursuit of justice for Zyair leads her into dangerous territory. As Mea pushes forward, her relationship with Kal deteriorates. The situation is further strained by Kal and Azalia who vehemently oppose her involvement in the case, fearing the scandal could tarnish the family's reputation, especially as Ray prepares for a mayoral run. In Chicago, Mea Harper, a seasoned defense attorney, faces ongoing marital strife, exacerbated by her husband Kal's infidelity and his mother Azalia's domineering influence. Complicating matters, Mea's professional interactions with Zyair gradually blur into a personal connection, challenging her objectivity and professional ethics. As Mea delves deeper into the case, she encounters a tangle of evidence that seems compelling at first glance but shows inconsistencies under scrutiny. Kal's struggles with unemployment and substance abuse come to the forefront, revealing the financial and emotional strains on their marriage. He accuses Mea of neglecting their family for her career, while Mea fires back about his inability to contribute and support. Her investigation reveals that the prosecution's case hinges on questionable evidence, including a dubious video and forensic reports that Zyair contests. This meeting, however, ends with shocking revelations that force Mea to reconsider whom she can trust. Her resolve is tested as new revelations about Zyair's past relationships and his interactions with the victim come to light, painting a complex picture of the artist. The personal stakes rise when Mea learns that Kal, together with Azalia, has been hiding crucial information about Azalia's health to manipulate her. Determined to see the case through, Mea arranges a clandestine meeting with a key witness who can blow the case wide open. Zyair, desperate to clear his name, insists he was framed, hinting at hidden motives behind the charges. Amidst these challenges, a family gathering brings news that her brother-in-law, Ray Hawthorne, an ambitious assistant district attorney, is set to prosecute a high-profile murder case against Zyair Malloy, a charismatic local artist."
] | writing | Mea Culpa | 2024-02-23 | plot_unscrambling | 2024-06-24T00:00:00 | null | ||
6996f1aa6bab48689671d9591ccb8116158a332e8a09778fd3884a67d430302c | language | Charlotte, a rebellious 12-year-old girl, lives in a dilapidated apartment building in New York City with her parents, overworked stepfather Ethan and mother Heather. A fan of comic books, Charlotte regularly bonds with Ethan over the creation of her character 'Fang Girl', but feels constantly isolated due to the presence of her infant half-brother Liam One night, Charlotte stumbles upon a tiny spider hatched from a strange, glowing object that crash-lands in her great-aunt's apartment. Intrigued, Charlotte decides to keep the spider as a pet, naming it Sting. As Charlotte cares for Sting, the spider begins to grow at an alarming rate. She initially keeps its size a secret, but as it becomes more difficult to hide, Ethan and some of the apartment tenants start to notice strange occurrences around the building. Sting's growing size and insatiable appetite soon lead to the death of pets and residents, which worsen after Charlotte leaves it in the care of her neighbor Eric. Following an argument with Ethan after Eric exposes Sting's presence, Charlotte's relationship with him becomes strained over the fact that her biological father has been neglecting her. Sometime after, Sting attacks and kidnaps both Ethan and Heather along Liam, forcing a distressed Charlotte to intervene. The tension escalates when Sting, now a gigantic, traps several residents in the building using mimicked sounds to lure prey. Charlotte learns the spider's weakness from her grandmother and goes on a hunt for her now missing family. As Charlotte saves Ethan, they face numerous obstacles, including Sting's intelligence and adaptability. During a showdown in the building's basement, Sting attacks the group until Charlotte manages to lure it into a trap with the help of Ethan. Using a trash compression device, they finally destroy Sting, but not without sustaining significant losses. With Charlotte's family safe, they do not realize that Sting has laid several eggs, with one beginning to hatch. | [
"The following plot summary of a movie has had the sentences randomly reordered. Rewrite the plot summary with the sentences correctly ordered. Begin the plot summary with <PLOT_SUMMARY>.\n\nThe sentences are:\n\nAs Charlotte cares for Sting, the spider begins to grow at an alarming rate. Intrigued, Charlotte decides to keep the spider as a pet, naming it Sting. During a showdown in the building's basement, Sting attacks the group until Charlotte manages to lure it into a trap with the help of Ethan. With Charlotte's family safe, they do not realize that Sting has laid several eggs, with one beginning to hatch. Sting's growing size and insatiable appetite soon lead to the death of pets and residents, which worsen after Charlotte leaves it in the care of her neighbor Eric. As Charlotte saves Ethan, they face numerous obstacles, including Sting's intelligence and adaptability. A fan of comic books, Charlotte regularly bonds with Ethan over the creation of her character 'Fang Girl', but feels constantly isolated due to the presence of her infant half-brother Liam One night, Charlotte stumbles upon a tiny spider hatched from a strange, glowing object that crash-lands in her great-aunt's apartment. She initially keeps its size a secret, but as it becomes more difficult to hide, Ethan and some of the apartment tenants start to notice strange occurrences around the building. Charlotte, a rebellious 12-year-old girl, lives in a dilapidated apartment building in New York City with her parents, overworked stepfather Ethan and mother Heather. The tension escalates when Sting, now a gigantic, traps several residents in the building using mimicked sounds to lure prey. Using a trash compression device, they finally destroy Sting, but not without sustaining significant losses. Sometime after, Sting attacks and kidnaps both Ethan and Heather along Liam, forcing a distressed Charlotte to intervene. Charlotte learns the spider's weakness from her grandmother and goes on a hunt for her now missing family. Following an argument with Ethan after Eric exposes Sting's presence, Charlotte's relationship with him becomes strained over the fact that her biological father has been neglecting her."
] | writing | Sting | 2024-04-12 | plot_unscrambling | 2024-06-24T00:00:00 | null | ||
6afebaafff5ac5662a544392a0179da1c6b58ac9c07f63bb589fe7cdc02476bb | language | In late 1941, during World War II the United Kingdom is struggling to halt Nazi Germany's attempts to take over Europe, with London regularly suffering bombing runs at the hands of the Luftwaffe. With their supply and aid ships constantly sunk by German submarines, Brigadier Colin Gubbins, with the indirect backing of Prime Minister Winston Churchill, prepares to initiate Operation Postmaster, an off the books black-ops sabotage mission intended to disrupt the Nazis' U-boat resupply operation on the Spanish-controlled island Fernando Po. While SOE agents Marjorie Stewart and Richard Heron depart by train, Gubbins enlists Gus March-Phillips to assemble a ground team to destroy the Italian supply ship Duchessa d'Aosta and two tugboats attached to it. Using the neutral Swedish fishing trawler Maid of Honor, Gus and his allies, Graham Hayes, Freddy Alvarez, and Danish naval officer Anders Lassen (the only non-British subject to be awarded the Victoria Cross), begin the slow sail to Fernando Po. Upon discovering that SOE saboteur Geoffrey Appleyard, whom Gubbins had sent ahead on the assumption that Gus would show interest in wanting him on the team, was captured by Gestapo agents, they divert course to a Nazi-controlled section of the Canary Islands for a rescue mission. Meanwhile, arriving early on Fernando Po, Marjorie and Heron use the latter's 'illegal' gambling hall to recruit backup for Gus' team while Marjorie seduces Heinrich Luhr, the SS commander in charge. Upon learning that the Duchessa intends to depart three days ahead of schedule, Gus has his crew sail through a British naval blockade of Nazi-occupied West Africa despite knowing they'll be arrested should their unauthorized mission be discovered. On the night of the intended raid, Marjorie and Heron learn that Luhr has had the Duchessa's hull reinforced despite the Italian attache's reservations. Barely warned of this in time, Gus and Appleyard decide that their best course of action is to hijack the ships and use them as a bartering chip after a mole in Gubbins' staff reveals the mission to senior command. Although Luhr eventually catches on when Marjorie's act begins to 'slip', the raid is ultimately successful, and Marjorie shoots Luhr in the head. Delivering the boats to a British fleet outside Lagos, the team is nonetheless arrested. While waiting to be court-martialed, they are saved and recruited by Churchill as part of his 'Ministry of Ungentlemanly Warfare', as their actions have not only severely damaged the Nazis' naval strength, but also have allowed the United States, who recently entered the war following the Japanese attack on Pearl Harbor, to join the European theatre. A montage of details before the end credits reveal the post operation activities of several protagonists: Gus became a war hero and would helm several similar raids during the war before marrying Marjorie at the start of her acting career; Appleyard would receive several commendations for his role in the mission, much to the king's amusement; Hayes would go on to become a highly accomplished spy notable for surviving a year of Nazi torture without breaking; Lassen would go on to take part in raids outside the group until his death in 1945; Ian Fleming, who had been part of Gubbins' inner circle during this time, would use Operation Postmaster as the inspirational basis for his James Bond novels. | [
"The following plot summary of a movie has had the sentences randomly reordered. Rewrite the plot summary with the sentences correctly ordered. Begin the plot summary with <PLOT_SUMMARY>.\n\nThe sentences are:\n\nOn the night of the intended raid, Marjorie and Heron learn that Luhr has had the Duchessa's hull reinforced despite the Italian attache's reservations. With their supply and aid ships constantly sunk by German submarines, Brigadier Colin Gubbins, with the indirect backing of Prime Minister Winston Churchill, prepares to initiate Operation Postmaster, an off the books black-ops sabotage mission intended to disrupt the Nazis' U-boat resupply operation on the Spanish-controlled island Fernando Po. Meanwhile, arriving early on Fernando Po, Marjorie and Heron use the latter's 'illegal' gambling hall to recruit backup for Gus' team while Marjorie seduces Heinrich Luhr, the SS commander in charge. Using the neutral Swedish fishing trawler Maid of Honor, Gus and his allies, Graham Hayes, Freddy Alvarez, and Danish naval officer Anders Lassen (the only non-British subject to be awarded the Victoria Cross), begin the slow sail to Fernando Po. Barely warned of this in time, Gus and Appleyard decide that their best course of action is to hijack the ships and use them as a bartering chip after a mole in Gubbins' staff reveals the mission to senior command. While waiting to be court-martialed, they are saved and recruited by Churchill as part of his 'Ministry of Ungentlemanly Warfare', as their actions have not only severely damaged the Nazis' naval strength, but also have allowed the United States, who recently entered the war following the Japanese attack on Pearl Harbor, to join the European theatre. Delivering the boats to a British fleet outside Lagos, the team is nonetheless arrested. Upon discovering that SOE saboteur Geoffrey Appleyard, whom Gubbins had sent ahead on the assumption that Gus would show interest in wanting him on the team, was captured by Gestapo agents, they divert course to a Nazi-controlled section of the Canary Islands for a rescue mission. While SOE agents Marjorie Stewart and Richard Heron depart by train, Gubbins enlists Gus March-Phillips to assemble a ground team to destroy the Italian supply ship Duchessa d'Aosta and two tugboats attached to it. In late 1941, during World War II the United Kingdom is struggling to halt Nazi Germany's attempts to take over Europe, with London regularly suffering bombing runs at the hands of the Luftwaffe. A montage of details before the end credits reveal the post operation activities of several protagonists: Gus became a war hero and would helm several similar raids during the war before marrying Marjorie at the start of her acting career; Appleyard would receive several commendations for his role in the mission, much to the king's amusement; Hayes would go on to become a highly accomplished spy notable for surviving a year of Nazi torture without breaking; Lassen would go on to take part in raids outside the group until his death in 1945; Ian Fleming, who had been part of Gubbins' inner circle during this time, would use Operation Postmaster as the inspirational basis for his James Bond novels. Upon learning that the Duchessa intends to depart three days ahead of schedule, Gus has his crew sail through a British naval blockade of Nazi-occupied West Africa despite knowing they'll be arrested should their unauthorized mission be discovered. Although Luhr eventually catches on when Marjorie's act begins to 'slip', the raid is ultimately successful, and Marjorie shoots Luhr in the head."
] | writing | The Ministry of Ungentlemanly Warfare | 2024-04-13 | plot_unscrambling | 2024-06-24T00:00:00 | null | ||
9c6ebc2d726db5bfd090d912720e1f4591cf0d0cfb7f03f5d91a9ce9ef2196b6 | language | Years after a global catastrophe, Australia is a radioactive wasteland and the Green Place of Many Mothers is one of the last remaining areas with fresh water and agriculture. Raiders discover the Green Place while two kids, Furiosa and Valkyrie, are picking peaches. Furiosa attempts to sabotage their motorbikes, but the raiders capture her as a prize for their leader, warlord Dementus of the Biker Horde. Furiosa's mother Mary pursues them to the Horde's camp, killing all but one raider. The last raider delivers Furiosa to Dementus, but Furiosa mortally wounds him before he can reveal the Green Place's location. Mary sneaks into the camp and rescues Furiosa; the Horde gives chase. Mary stays back to buy Furiosa time to escape and gives her a peach pit to remember her by, but Furiosa returns to her mother anyway. Dementus forces Furiosa to watch her mother's crucifixion. Haunted by the death of his family, he adopts Furiosa as his daughter, hoping that she will lead him to the Green Place. Furiosa tattoos a star chart to the Green Place on her left arm to find her way home. After receiving a tip from a stranded soldier, Dementus and the Biker Horde besiege the Citadel, another Wasteland settlement with fresh water and agriculture. They are repelled by the War Boys, the fanatical army of Citadel warlord Immortan Joe. Dementus changes course, using a Trojan Horse strategy to capture Gastown, an oil refinery that supplies the Citadel with gasoline. At peace negotiations, Joe agrees to recognize Dementus's authority over Gastown and increase its supplies of food and water in exchange for the Horde's physician and Furiosa. At the Citadel, Immortan Joe imprisons Furiosa in the vault with his stable of 'wives'. After Joe's son Rictus shows an attraction to her, she devises a plan to escape. One night, Rictus breaks Furiosa out of the vault to make sexual advances toward her; using a wig made from her own hair, she slips from his grasp and disappears. Disguised as a mute teenage boy, Furiosa works her way up the ranks of Immortan Joe's men for over a decade and helps build the 'War Rig', a heavily-armed supply tanker that can withstand raider attacks in the lawless Wasteland. During one such attack, the Rig's crew are wiped out, leaving its commander, Praetorian Jack, and Furiosa as the only survivors. Furiosa attempts to carjack the Rig and return to the Green Place, but Jack easily thwarts her. However, Jack recognizes her potential and offers to train her to escape the Citadel if she helps him rebuild his crew. Furiosa becomes Jack's second-in-command and is promoted to Praetorian; the two bond and resolve to escape together one day. Immortan Joe decides to attack Gastown, as Dementus's mismanagement has led the facility to near-ruin. He orders Furiosa and Jack to collect weapons and ammunition from the Bullet Farm, an allied mining facility. However, Dementus, having preemptively attacked and captured the Bullet Farm, ambushes the War Rig on arrival; Furiosa and Jack barely escape, and Furiosa's left arm is severely injured. Dementus eventually chases them down and tortures Jack to death. Furiosa escapes her chains by severing her own injured arm, sacrificing her star map to escape; a loner watches Furiosa return to the Citadel. Upon arrival, Furiosa helps Joe plan a 40-day war, during which most of Dementus's horde is killed. Having lost her path home, Furiosa shaves her head again, replaces her arm with a mechanical prosthetic, and pursues Dementus by herself as he flees with the remnants of his horde. After an extended chase, she captures him in the desert. Dementus taunts her, saying revenge will not make her whole. In a voiceover, the potentially unreliable narrator claims that Furiosa imprisoned Dementus at the Citadel and used his living body as fertilizer to grow a peach tree from her mother's seed. For her services, Immortan Joe promotes Furiosa to 'Imperator' and gives her command of a new War Rig. She eventually meets Joe's five remaining wives in the vault where Joe once held her prisoner. In the final scene, the 'Five Wives' hide in Furiosa's War Rig the night before another supply run. | [
"The following plot summary of a movie has had the sentences randomly reordered. Rewrite the plot summary with the sentences correctly ordered. Begin the plot summary with <PLOT_SUMMARY>.\n\nThe sentences are:\n\nAfter Joe's son Rictus shows an attraction to her, she devises a plan to escape. Disguised as a mute teenage boy, Furiosa works her way up the ranks of Immortan Joe's men for over a decade and helps build the 'War Rig', a heavily-armed supply tanker that can withstand raider attacks in the lawless Wasteland. Furiosa's mother Mary pursues them to the Horde's camp, killing all but one raider. However, Jack recognizes her potential and offers to train her to escape the Citadel if she helps him rebuild his crew. In a voiceover, the potentially unreliable narrator claims that Furiosa imprisoned Dementus at the Citadel and used his living body as fertilizer to grow a peach tree from her mother's seed. He orders Furiosa and Jack to collect weapons and ammunition from the Bullet Farm, an allied mining facility. During one such attack, the Rig's crew are wiped out, leaving its commander, Praetorian Jack, and Furiosa as the only survivors. Haunted by the death of his family, he adopts Furiosa as his daughter, hoping that she will lead him to the Green Place. One night, Rictus breaks Furiosa out of the vault to make sexual advances toward her; using a wig made from her own hair, she slips from his grasp and disappears. In the final scene, the 'Five Wives' hide in Furiosa's War Rig the night before another supply run. Upon arrival, Furiosa helps Joe plan a 40-day war, during which most of Dementus's horde is killed. At the Citadel, Immortan Joe imprisons Furiosa in the vault with his stable of 'wives'. For her services, Immortan Joe promotes Furiosa to 'Imperator' and gives her command of a new War Rig. The last raider delivers Furiosa to Dementus, but Furiosa mortally wounds him before he can reveal the Green Place's location. Furiosa becomes Jack's second-in-command and is promoted to Praetorian; the two bond and resolve to escape together one day. Dementus changes course, using a Trojan Horse strategy to capture Gastown, an oil refinery that supplies the Citadel with gasoline. At peace negotiations, Joe agrees to recognize Dementus's authority over Gastown and increase its supplies of food and water in exchange for the Horde's physician and Furiosa. Immortan Joe decides to attack Gastown, as Dementus's mismanagement has led the facility to near-ruin. Dementus forces Furiosa to watch her mother's crucifixion. Years after a global catastrophe, Australia is a radioactive wasteland and the Green Place of Many Mothers is one of the last remaining areas with fresh water and agriculture. However, Dementus, having preemptively attacked and captured the Bullet Farm, ambushes the War Rig on arrival; Furiosa and Jack barely escape, and Furiosa's left arm is severely injured. After an extended chase, she captures him in the desert. Dementus eventually chases them down and tortures Jack to death. Dementus taunts her, saying revenge will not make her whole. Furiosa attempts to sabotage their motorbikes, but the raiders capture her as a prize for their leader, warlord Dementus of the Biker Horde. After receiving a tip from a stranded soldier, Dementus and the Biker Horde besiege the Citadel, another Wasteland settlement with fresh water and agriculture. They are repelled by the War Boys, the fanatical army of Citadel warlord Immortan Joe. She eventually meets Joe's five remaining wives in the vault where Joe once held her prisoner. Raiders discover the Green Place while two kids, Furiosa and Valkyrie, are picking peaches. Furiosa attempts to carjack the Rig and return to the Green Place, but Jack easily thwarts her. Mary stays back to buy Furiosa time to escape and gives her a peach pit to remember her by, but Furiosa returns to her mother anyway. Having lost her path home, Furiosa shaves her head again, replaces her arm with a mechanical prosthetic, and pursues Dementus by herself as he flees with the remnants of his horde. Furiosa escapes her chains by severing her own injured arm, sacrificing her star map to escape; a loner watches Furiosa return to the Citadel. Furiosa tattoos a star chart to the Green Place on her left arm to find her way home. Mary sneaks into the camp and rescues Furiosa; the Horde gives chase."
] | writing | Furiosa: A Mad Max Saga | 2024-05-15 | plot_unscrambling | 2024-06-24T00:00:00 | null | ||
a60d61c26ec845244966b6d211548c72c8892e9cad79b5f65e99237066e872d8 | language | Following the destruction of House Atreides by House Harkonnen, Princess Irulan, the daughter of Padishah Emperor Shaddam IV, secretly journals her distaste over how her father betrayed the Atreides. On Arrakis, Stilgar's Fremen troops, including Paul Atreides and his pregnant Bene Gesserit mother, Lady Jessica, overcome a Harkonnen patrol. When Jessica and Paul reach Sietch Tabr, some Fremen suspect they are spies, while Stilgar and others see signs of the prophecy that a mother and son from the 'Outer World' will bring prosperity to Arrakis. Stilgar tells Jessica that Sietch Tabr's Reverend Mother is dying and that Jessica must succeed her by drinking the Water of Life—a poison fatal for males and untrained women. Jessica transmutes and survives the poison, inheriting the memories of all the past Reverend Mothers. The liquid also prematurely awakens the mind of her unborn daughter, Alia, allowing Jessica to communicate with her; they agree to focus on convincing the more skeptical northern Fremen of the prophecy. Chani and her friend, Shishakli, correctly believe the prophecy was fabricated to manipulate the Fremen, but begins to respect Paul after he declares that he only intends to fight alongside the Fremen, not to rule them. Paul and Chani fall in love as Paul immerses himself in Fremen culture: learning their language, becoming a Fedaykin fighter, riding a sandworm, and raiding Harkonnen spice operations. Paul adopts the Fremen names 'Usul' and 'Muad'Dib'. Due to the continuing spice raids, Baron Vladimir Harkonnen replaces his nephew, Rabban, as Arrakis's ruler with his more cunning yet psychotic younger nephew, Feyd-Rautha. Lady Margot Fenring, a Bene Gesserit, is sent to evaluate Feyd-Rautha as a prospective Kwisatz Haderach and secure his genetic lineage. Jessica travels south to unite with Fremen fundamentalists who believe most strongly in the prophecy. Paul remains in the north, fearful that his visions of an apocalyptic holy war will come to pass if he goes south as a messiah. During another raid on a spice harvester, Paul reunites with Gurney Halleck, who leads Paul to the hidden atomic stockpile of House Atreides. Feyd-Rautha unleashes a devastating attack on the northern Fremen, destroying Sietch Tabr, killing Shishakli, and forcing Paul and the survivors to journey south. Upon arrival, Paul drinks the Water of Life and falls into a coma. This angers Chani, but she is compelled by Jessica to mix her tears with the liquid, which awakens him. Now possessing clairvoyance across space and time, Paul sees an adult Alia on water-filled Arrakis. He also sees a singular path to victory among all possible futures, and that Jessica is the Baron's daughter. Paul meets with the southern Fremen war council, galvanizing the crowd by demonstrating his ability to discern their deepest thoughts. He declares himself the Lisan al Gaib and sends a challenge to Shaddam, who arrives on Arrakis with Irulan and the Sardaukar. As Shaddam chastises the Harkonnens for their failures, the Fremen launch an offensive, using atomics and sandworms to overpower the Sardaukar. Paul executes the Baron and captures Shaddam and his entourage. Meanwhile, Gurney leads an assault on Arrakeen where he intercepts and kills a fleeing Rabban. Paul challenges Shaddam for the throne and, to Chani's dismay, demands to marry Irulan. Previously summoned by the Baron, the Great Houses arrive in orbit—Paul threatens to destroy the spice fields with atomics if they intervene. Feyd-Rautha volunteers to be Shaddam's champion, but Paul kills him in a duel. Irulan agrees to Paul's request for marriage on the condition that her father lives. Shaddam surrenders, but the Great Houses reject Paul's ascendancy, so he orders the Fremen to attack the orbiting fleet. As Stilgar leads the Fremen onto the captured Sardaukar ships, Jessica and Alia reflect on the beginning of Paul's holy war. Chani refuses to bow to Paul and departs alone on a sandworm. | [
"The following plot summary of a movie has had the sentences randomly reordered. Rewrite the plot summary with the sentences correctly ordered. Begin the plot summary with <PLOT_SUMMARY>.\n\nThe sentences are:\n\nChani and her friend, Shishakli, correctly believe the prophecy was fabricated to manipulate the Fremen, but begins to respect Paul after he declares that he only intends to fight alongside the Fremen, not to rule them. Stilgar tells Jessica that Sietch Tabr's Reverend Mother is dying and that Jessica must succeed her by drinking the Water of Life—a poison fatal for males and untrained women. This angers Chani, but she is compelled by Jessica to mix her tears with the liquid, which awakens him. Due to the continuing spice raids, Baron Vladimir Harkonnen replaces his nephew, Rabban, as Arrakis's ruler with his more cunning yet psychotic younger nephew, Feyd-Rautha. Previously summoned by the Baron, the Great Houses arrive in orbit—Paul threatens to destroy the spice fields with atomics if they intervene. Jessica travels south to unite with Fremen fundamentalists who believe most strongly in the prophecy. Paul adopts the Fremen names 'Usul' and 'Muad'Dib'. Paul remains in the north, fearful that his visions of an apocalyptic holy war will come to pass if he goes south as a messiah. Irulan agrees to Paul's request for marriage on the condition that her father lives. As Shaddam chastises the Harkonnens for their failures, the Fremen launch an offensive, using atomics and sandworms to overpower the Sardaukar. Shaddam surrenders, but the Great Houses reject Paul's ascendancy, so he orders the Fremen to attack the orbiting fleet. During another raid on a spice harvester, Paul reunites with Gurney Halleck, who leads Paul to the hidden atomic stockpile of House Atreides. Feyd-Rautha volunteers to be Shaddam's champion, but Paul kills him in a duel. Paul challenges Shaddam for the throne and, to Chani's dismay, demands to marry Irulan. Chani refuses to bow to Paul and departs alone on a sandworm. On Arrakis, Stilgar's Fremen troops, including Paul Atreides and his pregnant Bene Gesserit mother, Lady Jessica, overcome a Harkonnen patrol. As Stilgar leads the Fremen onto the captured Sardaukar ships, Jessica and Alia reflect on the beginning of Paul's holy war. When Jessica and Paul reach Sietch Tabr, some Fremen suspect they are spies, while Stilgar and others see signs of the prophecy that a mother and son from the 'Outer World' will bring prosperity to Arrakis. He declares himself the Lisan al Gaib and sends a challenge to Shaddam, who arrives on Arrakis with Irulan and the Sardaukar. Paul and Chani fall in love as Paul immerses himself in Fremen culture: learning their language, becoming a Fedaykin fighter, riding a sandworm, and raiding Harkonnen spice operations. Meanwhile, Gurney leads an assault on Arrakeen where he intercepts and kills a fleeing Rabban. The liquid also prematurely awakens the mind of her unborn daughter, Alia, allowing Jessica to communicate with her; they agree to focus on convincing the more skeptical northern Fremen of the prophecy. Upon arrival, Paul drinks the Water of Life and falls into a coma. Lady Margot Fenring, a Bene Gesserit, is sent to evaluate Feyd-Rautha as a prospective Kwisatz Haderach and secure his genetic lineage. Paul executes the Baron and captures Shaddam and his entourage. Paul meets with the southern Fremen war council, galvanizing the crowd by demonstrating his ability to discern their deepest thoughts. Jessica transmutes and survives the poison, inheriting the memories of all the past Reverend Mothers. Following the destruction of House Atreides by House Harkonnen, Princess Irulan, the daughter of Padishah Emperor Shaddam IV, secretly journals her distaste over how her father betrayed the Atreides. Feyd-Rautha unleashes a devastating attack on the northern Fremen, destroying Sietch Tabr, killing Shishakli, and forcing Paul and the survivors to journey south. He also sees a singular path to victory among all possible futures, and that Jessica is the Baron's daughter. Now possessing clairvoyance across space and time, Paul sees an adult Alia on water-filled Arrakis."
] | writing | Dune: Part Two | 2024-02-06 | plot_unscrambling | 2024-06-24T00:00:00 | null | ||
fa160ae2f685d6f3bf73d384b79a96acdce5927a42616a4005607c918bcd4e2d | language | A civil war has engulfed the United States, fought between the federal government led by a third-term president and secessionist movements. Despite the president claiming that victory is close at hand, it is considered only a matter of time before the 'Western Forces' (WF), led by Texas and California, reach Washington, D.C. After surviving a suicide bombing in New York City, veteran war photographer Lee Smith and journalist colleague Joel meet with their mentor Sammy to share their plan to interview the isolated president. While trying to dissuade them from heading to the capital, Sammy joins them so that he can reach the frontline at Charlottesville, Virginia. The next morning, Lee finds that Joel has allowed a young aspiring photojournalist who Lee encountered at the bombing, Jessie Cullen, to join them. After departing the city, the group stops at a gas station that is protected by armed men. Jessie explores a nearby car wash, where she finds the men torturing two alleged looters. One of the guards follows Jessie, but Lee defuses the situation by taking a photo of the man posing with his victims. Later, Jessie berates herself for being too scared to take photos. When Lee has her shoot a downed helicopter, Jessie asks if Lee would photograph Jessie being killed, to which Lee responds, 'What do you think?'. Following an overnight stop near ongoing fighting, the group documents combat the next day as secessionist militiamen assault a loyalist-held building. Lee recognizes Jessie's potential as a war-photographer and begins to mentor her, while Jessie photographs the militia executing loyalist prisoners. Continuing, the group spends the night at a refugee camp before passing through a small town where, under watchful guard, residents attempt to live in blissful ignorance. Lee and Jessie grow closer, trying on clothes at a shop. They are caught in a sniper battle amid the remains of a Christmas fair. Nearby snipers mock Joel's questioning what side they are on, instead displaying a cynical kill-or-be-killed attitude. Jessie's nerve and photography skills improve as she becomes desensitized to violence. While driving, the four encounter two Hongkonger reporters who they know, Tony and Bohai. Tony and Jessie switch vehicles before Bohai drives ahead with Jessie in his car. The others catch up to find the pair held at gunpoint by unknown uniformed militia who are burying bodies in a mass grave. Against Sammy’s objection, the other three attempt to negotiate their release, but the leader of the militia executes both Bohai and Tony for not being American. The others are saved by Sammy after he rams the group's truck into members of the militia, but he is mortally wounded during the escape and dies. Traumatized, the remaining three arrive at the Charlottesville WF base. Joel learns from Lee's British reporter friend Anya that most remaining loyalists have surrendered, leaving D.C. undefended beside fanatical remnants of the armed forces and Secret Service. Joel drunkenly lashes out at what he views as Sammy's pointless death; Lee tells Jessie that Sammy died while doing what he wanted. Lee deletes a photo that she took of his body. The trio embeds itself with the WF as they assault Washington, D.C., where Jessie repeatedly exposes herself during fighting to capture photographs, while Lee struggles with combat fatigue. After the WF breach the White House's fortified perimeter, the presidential limousine attempts to flee but is quickly intercepted and its occupants (which do not include the president) killed. Understanding it to be a distraction, the trio instead heads inside and is followed by a squad of WF soldiers. Advancing through the largely-abandoned building and against the few remaining Secret Service agents, they shoot a negotiator who is requesting the president's safe passage. Jessie steps into the line of fire while taking photos, as Lee sees imminent danger, intercedes and takes a fatal gun shot; Jessie photographs Lee's death as she pushes Jessie to safety. Jessie unemotionally continues into the Oval Office, watching soldiers drag the president from under his desk and prepare to execute him summarily. Joel momentarily stops them to get a quote from the president, who replies, 'Don't let them kill me'. Satisfied, Joel stops delaying the soldiers; while Jessie photographs WF soldiers killing the president before posing with his corpse. | [
"The following plot summary of a movie has had the sentences randomly reordered. Rewrite the plot summary with the sentences correctly ordered. Begin the plot summary with <PLOT_SUMMARY>.\n\nThe sentences are:\n\nTraumatized, the remaining three arrive at the Charlottesville WF base. After surviving a suicide bombing in New York City, veteran war photographer Lee Smith and journalist colleague Joel meet with their mentor Sammy to share their plan to interview the isolated president. Lee and Jessie grow closer, trying on clothes at a shop. Despite the president claiming that victory is close at hand, it is considered only a matter of time before the 'Western Forces' (WF), led by Texas and California, reach Washington, D. Satisfied, Joel stops delaying the soldiers; while Jessie photographs WF soldiers killing the president before posing with his corpse. When Lee has her shoot a downed helicopter, Jessie asks if Lee would photograph Jessie being killed, to which Lee responds, 'What do you think?'. Tony and Jessie switch vehicles before Bohai drives ahead with Jessie in his car. Understanding it to be a distraction, the trio instead heads inside and is followed by a squad of WF soldiers. Jessie's nerve and photography skills improve as she becomes desensitized to violence. Jessie explores a nearby car wash, where she finds the men torturing two alleged looters. They are caught in a sniper battle amid the remains of a Christmas fair. Against Sammy’s objection, the other three attempt to negotiate their release, but the leader of the militia executes both Bohai and Tony for not being American. Advancing through the largely-abandoned building and against the few remaining Secret Service agents, they shoot a negotiator who is requesting the president's safe passage. The trio embeds itself with the WF as they assault Washington, D. undefended beside fanatical remnants of the armed forces and Secret Service. A civil war has engulfed the United States, fought between the federal government led by a third-term president and secessionist movements. C. C. , where Jessie repeatedly exposes herself during fighting to capture photographs, while Lee struggles with combat fatigue. Jessie unemotionally continues into the Oval Office, watching soldiers drag the president from under his desk and prepare to execute him summarily. Continuing, the group spends the night at a refugee camp before passing through a small town where, under watchful guard, residents attempt to live in blissful ignorance. Nearby snipers mock Joel's questioning what side they are on, instead displaying a cynical kill-or-be-killed attitude. Lee recognizes Jessie's potential as a war-photographer and begins to mentor her, while Jessie photographs the militia executing loyalist prisoners. The others are saved by Sammy after he rams the group's truck into members of the militia, but he is mortally wounded during the escape and dies. After the WF breach the White House's fortified perimeter, the presidential limousine attempts to flee but is quickly intercepted and its occupants (which do not include the president) killed. While trying to dissuade them from heading to the capital, Sammy joins them so that he can reach the frontline at Charlottesville, Virginia. The next morning, Lee finds that Joel has allowed a young aspiring photojournalist who Lee encountered at the bombing, Jessie Cullen, to join them. Joel momentarily stops them to get a quote from the president, who replies, 'Don't let them kill me'. Joel drunkenly lashes out at what he views as Sammy's pointless death; Lee tells Jessie that Sammy died while doing what he wanted. After departing the city, the group stops at a gas station that is protected by armed men. One of the guards follows Jessie, but Lee defuses the situation by taking a photo of the man posing with his victims. Jessie steps into the line of fire while taking photos, as Lee sees imminent danger, intercedes and takes a fatal gun shot; Jessie photographs Lee's death as she pushes Jessie to safety. The others catch up to find the pair held at gunpoint by unknown uniformed militia who are burying bodies in a mass grave. C. Later, Jessie berates herself for being too scared to take photos. Following an overnight stop near ongoing fighting, the group documents combat the next day as secessionist militiamen assault a loyalist-held building. While driving, the four encounter two Hongkonger reporters who they know, Tony and Bohai. Joel learns from Lee's British reporter friend Anya that most remaining loyalists have surrendered, leaving D. Lee deletes a photo that she took of his body."
] | writing | Civil War | 2024-03-14 | plot_unscrambling | 2024-06-24T00:00:00 | null | ||
8332227623fde58df515101f1a07779f577ae7547a0c9df6e7c90c9f79ec933f | language | Colt Seavers, a Hollywood stunt performer, works as the stunt double for famous action star Tom Ryder. However, he is severely injured during a stunt gone wrong and he abandons his career and his girlfriend Jody Moreno, a camerawoman. Eighteen months later, Colt, now a valet for a small Mexican restaurant, is contacted by Gail Meyer, Tom's film producer. She tells him that Jody is directing her first film, a science fiction epic titled Metalstorm, and wants Colt to join the production in Sydney. After arriving on set, Colt learns that Jody never asked for him and is still angry about their breakup, with the film being a less-than-subtle attempt at airing her grievances at Colt. Gail reveals that Tom has disappeared after getting into trouble with drug dealers, and she wants Colt to find him before his absence causes the already overbudget film's cancelation. Not wanting Jody's directorial debut ruined, Colt starts to track down Tom. He first goes to Tom's apartment where he is ‘attacked’ by Tom's girlfriend Iggy. She gives him a lead, so he visits a nightclub, where he meets drug dealer Doone, who tricks Colt into drinking a cocktail laced with hallucinogenic drugs. After getting into a fight with the drug dealer's goons, he visits Tom's hotel room where he finds a dead body in a bathtub full of ice. When Colt returns with the police, he finds the body has disappeared. Meanwhile, as production of Metalstorm continues, Colt and Jody begin to rekindle their relationship until Gail abruptly informs him that he must return to the United States. Instead, he continues looking for Tom by tracking down his PA Alma Milan. They are both attacked by people looking for a phone belonging to Tom in Alma's possession. Colt defeats them after an extended chase through Sydney, involving a rubbish truck. He and his longtime friend Dan Tucker, the stunt coordinator on Metalstorm, unlock the phone at Tom's apartment. They discover a video of an intoxicated Tom accidentally killing his previous stuntman Henry Herrera. The henchmen attack Colt and Dan, destroying the phone with shotgun pellets. Dan escapes, but Colt is captured and brought face-to-face with Tom, who has been hiding out on a yacht on Gail's instructions. He reveals that Gail is framing Colt for the crime using deepfake technology to replace Tom's face with Colt's on the incriminating video. Tom also reveals that he orchestrated both Colt's and Henry's ‘accidents’ over his resentment of them thinking he's cowardly for not wanting to do his own stunts. Henry's body is discovered and the doctored video is released on news media, while Gail tries to convince Jody that Colt is guilty. Colt escapes and is presumed dead after a boat chase, though he swims to safety. The next day, Tom arrives at the Metalstorm set with his goons and the production continues. Colt secretly returns to the set and convinces Jody of his innocence. Together, they trick Tom into participating in a stunt sequence and into confessing while he is wired with a lav mike. The rest of the crew, led by Dan, hold off his goons. Gail steals the recording at gunpoint and tries to escape in a helicopter with Tom, but Jody helps Colt leap onto the helicopter in mid-air. He retrieves the recording and falls onto a crash mat prepared by Dan, while the helicopter crashes with Gail and Tom in it. Metalstorm's trailer premieres at San Diego Comic-Con, with Jason Momoa replacing Tom as the lead, and the film eventually becomes a box-office hit. Colt gets exonerated, and he and Jody get back together. In a flashback, prop crew members dressed as police surround Gail and Tom, prompting Tom to run towards stunt pyrotechnics while trying to phone his agent, accidentally blowing himself up. | [
"The following plot summary of a movie has had the sentences randomly reordered. Rewrite the plot summary with the sentences correctly ordered. Begin the plot summary with <PLOT_SUMMARY>.\n\nThe sentences are:\n\nThe henchmen attack Colt and Dan, destroying the phone with shotgun pellets. Eighteen months later, Colt, now a valet for a small Mexican restaurant, is contacted by Gail Meyer, Tom's film producer. He retrieves the recording and falls onto a crash mat prepared by Dan, while the helicopter crashes with Gail and Tom in it. Metalstorm's trailer premieres at San Diego Comic-Con, with Jason Momoa replacing Tom as the lead, and the film eventually becomes a box-office hit. In a flashback, prop crew members dressed as police surround Gail and Tom, prompting Tom to run towards stunt pyrotechnics while trying to phone his agent, accidentally blowing himself up. Meanwhile, as production of Metalstorm continues, Colt and Jody begin to rekindle their relationship until Gail abruptly informs him that he must return to the United States. Instead, he continues looking for Tom by tracking down his PA Alma Milan. Colt Seavers, a Hollywood stunt performer, works as the stunt double for famous action star Tom Ryder. She tells him that Jody is directing her first film, a science fiction epic titled Metalstorm, and wants Colt to join the production in Sydney. Henry's body is discovered and the doctored video is released on news media, while Gail tries to convince Jody that Colt is guilty. She gives him a lead, so he visits a nightclub, where he meets drug dealer Doone, who tricks Colt into drinking a cocktail laced with hallucinogenic drugs. Colt defeats them after an extended chase through Sydney, involving a rubbish truck. The next day, Tom arrives at the Metalstorm set with his goons and the production continues. They are both attacked by people looking for a phone belonging to Tom in Alma's possession. However, he is severely injured during a stunt gone wrong and he abandons his career and his girlfriend Jody Moreno, a camerawoman. Not wanting Jody's directorial debut ruined, Colt starts to track down Tom. He reveals that Gail is framing Colt for the crime using deepfake technology to replace Tom's face with Colt's on the incriminating video. Dan escapes, but Colt is captured and brought face-to-face with Tom, who has been hiding out on a yacht on Gail's instructions. He first goes to Tom's apartment where he is ‘attacked’ by Tom's girlfriend Iggy. Gail reveals that Tom has disappeared after getting into trouble with drug dealers, and she wants Colt to find him before his absence causes the already overbudget film's cancelation. They discover a video of an intoxicated Tom accidentally killing his previous stuntman Henry Herrera. After getting into a fight with the drug dealer's goons, he visits Tom's hotel room where he finds a dead body in a bathtub full of ice. Colt gets exonerated, and he and Jody get back together. The rest of the crew, led by Dan, hold off his goons. After arriving on set, Colt learns that Jody never asked for him and is still angry about their breakup, with the film being a less-than-subtle attempt at airing her grievances at Colt. Colt escapes and is presumed dead after a boat chase, though he swims to safety. Tom also reveals that he orchestrated both Colt's and Henry's ‘accidents’ over his resentment of them thinking he's cowardly for not wanting to do his own stunts. Gail steals the recording at gunpoint and tries to escape in a helicopter with Tom, but Jody helps Colt leap onto the helicopter in mid-air. Colt secretly returns to the set and convinces Jody of his innocence. When Colt returns with the police, he finds the body has disappeared. Together, they trick Tom into participating in a stunt sequence and into confessing while he is wired with a lav mike. He and his longtime friend Dan Tucker, the stunt coordinator on Metalstorm, unlock the phone at Tom's apartment."
] | writing | The Fall Guy | 2024-03-12 | plot_unscrambling | 2024-06-24T00:00:00 | null |
End of preview. Expand
in Dataset Viewer.
Dataset Card for "livebench/language"
LiveBench is a benchmark for LLMs designed with test set contamination and objective evaluation in mind. It has the following properties:
- LiveBench is designed to limit potential contamination by releasing new questions monthly, as well as having questions based on recently-released datasets, arXiv papers, news articles, and IMDb movie synopses.
- Each question has verifiable, objective ground-truth answers, allowing hard questions to be scored accurately and automatically, without the use of an LLM judge.
- LiveBench currently contains a set of 18 diverse tasks across 6 categories, and we will release new, harder tasks over time. This is the instruction_following category of livebench.
See more in our paper, leaderboard, and datasheet.
- Downloads last month
- 5,574